NORTH ATLANTIC TREATY ORGANIZATION (NATO)

Similar documents
INTERVIEW WITH ANDERS FOGH RASMUSSEN *

UN Emergency Summit on Cyber Security Topic Abstract

Cybersecurity & International Relations. Assist. Prof. D. ARIKAN AÇAR, Ph.D. Department of International Relations, Yaşar University, Turkey.

Option 1: Use the Might of the U.S. Military to End the Assad Regime

Active Engagement, Modern Defence

Research Note Engaging in Cyber Warfare

Foreign Affairs and National Security

Cyber Security Strategy for Germany

Confrontation or Collaboration?

Cybersecurity. Canisius College

Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

UNDERSTANDING NATO THE ORIGINS OF THE ALLIANCE

NATO-Enlargement After the Riga Summit

ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM

Trends Concerning Cyberspace

Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference.

Harmful Interference into Satellite Telecommunications by Cyber Attack

UNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. June 15th, 2015

Home Security: Russia s Challenges

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

The Meaning of Russia s Campaign in Syria

Cyber Diplomacy A New Component of Foreign Policy 6

"The European Union's Security Architecture and its role to strengthen Peace and Security"

Advanced & Persistent Threat Analysis - I

AFGHANISTAN: FRANCE IS ALSO IN THE SOUTH

Cyber Security Strategy of Georgia

CYBER SECURITY THREAT REPORT Q1

STRATEGIC OBJECTIVE 2.4 OVERCOME GLOBAL SECURITY CHALLENGES THROUGH DIPLOMATIC ENGAGEMENT AND DEVELOPMENT COOPERATION

Cybersecurity Global status update. Dr. Hamadoun I. Touré Secretary-General, ITU

Delegations will find attached the conclusions adopted by the European Council at the above meeting.

the Council of Councils initiative

Problem analysis: why the EU Battlegroups have not been used so far. Four factors hampering the deployability of the Battlegroups can be identified:

Hybrid Warfare & Cyber Defence

New Battlegrounds: The Future of Cyber Security and Cyber Warfare

2. SECURITY OF COMMUNICATION AND INFORMATION SYSTEMS IN THE GLOBALIZATION PROCESS

The main object of my research is :

Releasable U.S. and ISRAEL

European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS

Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace

Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.

The final version of the Cyber Security Strategy and Action Plan note the following priorities to be implemented in :

Cyber defence in the EU Preparing for cyber warfare?

ORF ISSUE BRIEF. Virtual Alarm: Social Engineering Attacks Imperil Cyber Security

The North Atlantic Treaty (1949)

The Defence Strategy of the Slovak Republic

Theme: The Growing Role of Private Security Companies in Protecting the Homeland.

THE PRAGUE SUMMIT AND NATO S TRANSFORMATION

Guidelines for Applicants: Advanced Training Course

The Implication of TMD System in Japan to China s Security

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

NATO & Cyber Conflict: Background & Challenges

What is Cyber Liability

Assessment of the terror threat to Denmark

International Progress Organization. Organisation Internationale pour le Progrès M E M O R A N D U M

THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY

working group on foreign policy and grand strategy

Prospects for the NATO Warsaw Summit Testimony before the U.S. Helsinki Commission By Hans Binnendijk June 23, 2016

At the same time, the Ministers agreed that all sides need to fully respect the ceasefire and provide the Organization for Security and Cooperation

Assessment of the Terror Threat to Denmark

Legal Issues / Estonia Cyber Incident

Chapter 4. Health Care Eligibility, Constraints, Availability of and Access to the Military Health System, Public Benefits and Health Insurance

NATO/G8. The Global 1% and Their Private Army

A New Obstacle For Cyberinsurance Coverage

Session 9 Cyber threats in the EU s and NATO s new strategic context General Kees Homan: Introduction Political cyber attacks

Chicago Summit Declaration

Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary

Chicago Summit Declaration

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Policy Recommendations on. Japan-Australia Security Cooperation

THE NATO-EU STRATEGIC PARTNERSHIP

Russian National Security Policy in 2000

NATIONAL DEFENSE AND SECURITY ECONOMICS

UNITED STATES EUROPEAN COMMAND Theater Strategy. Gen Philip M. Breedlove, USAF Commander

Chapter 2 Strengthening of the Japan-U.S. Alliance

U.S. POLICY IN THE BLACK SEA REGION

September 20, 2013 Senior IT Examiner Gene Lilienthal

Syria: Civil-military relations during civil war

White Paper: Cyber Hawk or Digital Dove

Inhibition of an Arms Race in Outer Space

Online International Interdisciplinary Research Journal, {Bi-Monthly}, ISSN , Volume-III, Issue-IV, July-Aug 2013

Ministry of Defence Bosnia and Herzegovina

Nuclear Projection of the United States

Defending Against Data Beaches: Internal Controls for Cybersecurity

General Assembly. United Nations A/69/723

(U) Appendix E: Case for Developing an International Cybersecurity Policy Framework

The Double Democratic Deficit Parliamentary Accountability and the Use of Force under International Auspices

The European Security Strategy Austrian Perspective

THE WHITE HOUSE Office of the Press Secretary. Annex to U.S. - Gulf Cooperation Council Camp David Joint Statement

TITLE and AFFILIATION: EXECUTIVE VICE PRESIDENT, TURKISH HERITAGE ORGANIZATION (THO)

The BGF-G7 Summit Initiative Ise-Shima Norms

AT A HEARING ENTITLED THREATS TO THE HOMELAND

UNCLASSIFIED. Executive Cyber Intelligence Bi-Weekly Report by INSS-CSFI. January 1st, 2015

What legal aspects are needed to address specific ICT related issues?

The cavalry has arrived EU external representation in The Hague and at the OPCW

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

The Asian Event Dedicated to Homeland and Civil Security

Chapter 4A: World Opinion on Terrorism

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

WRITTEN TESTIMONY OF

Transcription:

SPECIALIZED COMMITTEES 2014e NORTH ATLANTIC TREATY ORGANIZATION (NATO)

UTMUN Background Guide NATO (North Atlantic Treaty Organization) 2013-2014 http://www.utmun.org

Topic I: Cyber-Warfare I. Introduction to the Topic A. General Background A great debate circles around the concept of cyber-warfare. While some claim that cyberwarfare is the fifth domain of warfare (after land, sea, air and space), others simply claim the term is an attempt at sensationalism. From a more specific perspective, cyber-warfare refers to any action by a nation-state to penetrate another nation s computer networks for the purpose of causing some sort of damage. However, broader definitions claim that cyber-warfare also includes acts of cyber-hooliganism, cyber-vandalism or cyberterrorism. 1 Cyber-warfare imposes an intensifying threat on national and private sectors. Attacks are intensifying day by day due to the international connectivity and the domination of computer-controlled systems. Hence a nation s infrastructure and private data are more exposed and vulnerable than ever, especially in areas of communication, transportation, and power. Now that nations in the international arena are in a new race for information, cyber-terrorism has become a worldwide practice invested in by leading countries. This issue is of severe importance, since the origin of cyber-attacks is often untraceable. Such attacks can cause complete breakdowns of governmental systems and nations infrastructures, as well as infiltrating the personal life of civilians. (quote) Cyber-warfare B. Definition of Key Terms There is no official international definition for cyber-warfare. However, the U.S. government security expert Richard A. Clarke, in his book Cyber War (May 2010), defines cyber-warfare as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption. 2 Espionage Espionage involves a government or individual obtaining information considered secret or confidential without the permission of the holder of the information. 3 Cyber deterrence

This term is used to describe systems that designed to prevent cyber-attacks. Sabotage Sabotage is a deliberate action aimed at weakening another entity through subversion, obstruction, disruption, or destruction. In a workplace setting, sabotage is the conscious withdrawal of efficiency generally directed at causing some change in workplace conditions. 4 SCADA (Supervisory Control and Data Acquisition) Computer controlled systems that monitor industrial processes. Trojan A Trojan horse, or Trojan, is a non-self-replicating type of malware, which gains privileged access to the operating system while appearing to perform a desirable function but instead drops a malicious payload; often including a backdoor allowing unauthorized access to the target's computer. 5 Computer Virus A computer virus is a type of malware that, when executed, replicates by inserting copies of itself (possibly modified) into other files; when replication succeeds, the files are then said to be infected". 6 C. UN Involvement The discussion of this topic in the United Nations in 1998 proposed several resolutions since. In 1998, the Russian Federation proposed draft resolution 53/70 which was adopted in January 1999. The main key elements consisted of the following: Recognition of the military potential of information and communication technology for the first time as well as an expression of concern about the use of such technology inconsistent with the objectives of maintaining international stability and security; Clarifying the need to prevent cyber-crime and cyber terrorism; Inviting all member states to propose their opinion towards this topic. Later, the Russian Federation proposed several resolutions in order to specify the

rather general one proposed in 1999. Henceforward, the proposed resolution in 2005, which was sponsored not only by Russia, but also by the People s Republic of China, Armenia, Belarus, Kazakhstan, Kyrgyzstan, Myanmar, Tajikistan, and Uzbekistan, was adopted by many more votes, with only the USA voting against the implementation of this resolution. This matter shows that there was an international clash. NATO Involvement: In opposition to the notion of increasing dependence on technology and web-based communications, NATO is advancing its efforts to confront the wide range of cyber threats targeting the Alliance s networks on a daily basis. NATO s Strategic Concept and the 2012 Chicago Summit Declaration recognized that the growing sophistication of cyber attacks makes the protection of the Alliance s information and communications systems an urgent task for NATO. In June 2011, NATO adopted a new cyber defense policy and an associated Action Plan, which sets out a clear vision of how the Alliance plans to bolster its cyber defense efforts. This policy reiterates that the priority is the protection of the NATO network but that any collective defense response is subject to a decision by the North Atlantic Council, NATO s principal political decision-making body. D. Recent Events Experts say that concentrated cyber-attacks have the ability to cripple a nation's ability to defend itself and destroy its economy and national wealth. Here is a list of some large recent cyber attacks: 1) 2011: Operation Shady RAT is an ongoing series of cyber attacks that began in mid-2006 and have been targeted at national governments, military contractors and organizations such as the United Nations. 2) December 2010: The Pakistan Cyber Army hacked into the website of India's Central Bureau of Investigation. 3) November 2010: The Indian Cyber Army accessed websites operated by the Pakistan Army and several government ministries, including the foreign affairs, education and finance ministries. 4) November 2010: The United States Department of Defense admits its internet traffic was rerouted through China for a period of 18 minutes in April. China denied the

claim. 7 A recent report published by Reuters on September 17, 2013, stated that researchers have discovered a group of highly sophisticated hackers operating for hire out of China. A US computer security company known as Symantec Corp linked them to some of the bestknown espionage attacks in recent years. This company believes that this group has been involved with the 2009 Operation Aurora attacks, the most well known cyber espionage campaign uncovered to date against U.S. companies. In Operation Aurora, hackers attacked Google Inc., Adobe Systems Inc. and dozens of other companies. 8 Another report published on October 3, 2013 says that Adobe, the American multinational computer software company, was hit by a massive cyber attack. The company says that an intrusion led to an untold number of Adobe IDs and passwords falling into the hands of hackers, which may have compromised around 2.9 million customers. Among that data set are customer names, encrypted credit / debit card numbers, and expiration dates. 9 E. Possible Solutions A first attempt to solve such an issue can be through acknowledging cyber attacks as an infringement on human rights, and a threat to national security. Organizations could be established to monitor international computer systems to better control cyber attacks and strive for more clandestineness. There could be conflicts regarding national interest if such a solution was established. It is up to the delegate to discuss a wide range of possibilities and ideas in order to reach the best solution for this issue. II. References: http://www.unicri.it/special_topics/cyber_threats/cyber_crime/explanations/cyberwarfare/ 1 http://encyclopedia.thefreedictionary.com/cyber+warfare 2 http://encyclopedia.thefreedictionary.com/espionage 3 http://encyclopedia.thefreedictionary.com/sabotage 4 http://encyclopedia.thefreedictionary.com/trojan+horse+(computing) 5 http://encyclopedia.thefreedictionary.com/pc+virus 6 http://www.telegraph.co.uk/news/worldnews/asia/japan/8775632/a-history-of-major-

cyber-attacks.html 7 http://www.reuters.com/article/2013/09/17/us-cyberattacks-chinaidusbre98g0m720130917 8 http://www.theverge.com/2013/10/3/4800042/adobe-suffers-cyber-attack-millions-ofcustomers-affected 9 Topic II: NATO membership expansion in Eastern Europe I. Introduction to the Topic A. Background Information NATO s expansion has been a vital episode in history. In early 1952, Turkey and Greece were the two nations participating in the first expansion of NATO. In 2004, NATO saw its biggest expansion yet, where seven nations were accepted to become member states in the North Atlantic Treaty Organization. Those countries included Bulgaria, Estonia, Latvia, Lithuania, Romania, Slovakia and Slovenia, symbolizing NATO s biggest expansion in Eastern Europe. However, the year 2009 marked the last NATO enlargement, when Albania and Croatia s bids where both accepted. NATO still has its doors open for expansion; NATO s open door policy is based on Article 10 of its founding treaty 1, which states: The Parties may, by unanimous agreement, invite any other European State in a position to further the principles of this Treaty and to contribute to the security of the North Atlantic area to accede to this Treaty. Any State so invited may become a Party to the Treaty by depositing its instrument of accession with the Government of the United States of America. The Government of the United States of America will inform each of the Parties of the deposit of each such instrument of accession. 2 Delegates will be required to discuss the possibilities of further expansions for NATO in Eastern Europe. They are encouraged to tackle the likelihood of Ukraine, Georgia or Russia joining in, and discuss what could be the consequences and further strive to find the best compromised solution. B. NATO-Russia Relations The 28 Allies in NATO and Russia work together as equal partners in the NATO-Russia Council (NRC), which was established in 2002. The NRC provides a framework for consultation on current security issues and practical cooperation in a wide range of areas

of common interest. Its agenda builds on the basis for bilateral cooperation that was set out in the 1997 NATO-Russia Founding Act, which provided the formal basis for relations. Cooperation between Russia and NATO member states is directed by the NRC and developed through various subordinate working groups and committees. Every year, NRC member countries agree on an annual work program. Key areas of cooperation include: the fight against terrorism, defense reform, military-tomilitary cooperation, counter-narcotics training of Afghan, Central Asian and Pakistani personnel, theatre missile defense/missile defense, counter-piracy, crisis management, non-proliferation, airspace management, civil emergency planning, scientific cooperation and environmental security. 3 C. Should NATO expands more? Many question whether NATO should expand into Eastern Europe or not. Some see it as a threat to Russia, since with every expansion into that area means that NATO must establish its defense systems in that country. Some others see it as further accomplishing one of its main goals, which is to advance a Europe whole, free and at peace by integrating once vulnerable European nations into a community of free-market democracies committed to one another s collective defense. Delegates are encouraged to tackle this issue and discuss what is more beneficial for NATO and Europe s security. Should NATO decided to expand, what countries may join the Organization? What might be the reaction of neighboring countries; will they consider it as a threat? D. Possible Solutions Delegates must discuss solutions concerning the addition of new members to NATO. They must see if this is necessary and study what could be the consequences of such action. For instance, accepting a possible bid from Ukraine or Georgia might be considered as a threat to Russia, therefore risks the NATO-Russia relations. Is there a road to compromise? II. References: http://www.nato.int/cps/en/natolive/topics_49212.htm 1

http://www.nato.int/cps/en/natolive/official_texts_17120.htm?selectedlocale=en 2 http://www.nato.int/cps/en/natolive/topics_50090.htm? 3 Topic III: 1. Responding to the Crisis in Syria I. Introduction to the Topic A. General Background On the 15th of March 2011, protests broke out in Daraa, a city in the South West of Syria, and then spread to other cities across the country. These protests where part of the wider Middle Eastern protest movement known as the Arab Spring. Protesters demanded the resignation of President Bashar al-assad, whose family has held the presidency in Syria since 1971, as well as the end of Ba'ath Party rule, which began in 1963. In April 2011, the Syrian Army was deployed to quell the uprising; soldiers fired live ammunition on protesters across the country. 1 After several months of military sieges, the protests evolved into an unorganized, but armed, rebellion, mainly composed of defecting soldiers and civilian volunteers, without a central leadership. Many foreign fighters from neighboring countries are currently involved in the conflict, fighting either with the Opposition or the Regime. Some of these groups are extremists, such as, but not limited to, Al Nusra Front and the Islamic State of Iraq and Syria (ISIS), whom are known to be fighting against the Regime, and are recognized as associates with Al-Qaeda. Some other foreigners, such as Hezbollah (also known as the Lebanese Resistance) and Liwaa Abul Fadel Al Abbassy from Iraq, are fighting with the Regime. Hezbollah s Secretary General has confirmed on 25 May 2013 that his soldiers are directly involved in fighting the rebels along side the Regime. Recent documents exposed by the Opposition activists have shown the presence of, not just Iranian, but also Russian, mercenaries fighting along side President Assad. Whether these documents where to be true or not, the Syrian Crisis is getting out of control. According to the Syrian Observatory for Human Rights (SOHR) in a documented posted on the 30th of October 2013, more than 120,000 people are killed in Syria since the beginning of the uprising in March of 2011. 2 B. NATO on the Crisis in Syria NATO has always kept a close eye on the situation in Syria, especially after the national

security of Turkey became threatened. Therefore, NATO deployed 6 patriot batteries on the borders between Syria and Turkey in the cities Kahramanmaras, Adana, and Gaziantep. Together, these Patriot batteries are actively defending 3.5 million people in Turkey against missile attacks. 3 Furthermore, NATO s Secretary General Anders Fogh Rasmussen said that the option of carrying out a military strike or similar operation in Syria must be kept open as a way of dealing with the crisis. He continued: I think, irrespective of the outcome of the deliberations in the U.N. Security Council, the military option will still be on the table. 4 Mr. Rasmussen also welcomed the U.S.-Russian agreement on the elimination of Syrian chemical weapons; however, he insisted that a military intervention must still be in order. C. Possible Solutions The situation in Syria is deteriorating on a daily basis. A UN military intervention is out of question; both Russia and China have threatened to use VETO power to block any resolution that legalize a military intervention in Syria in the Security Council. NATO, however, can intervene militarily because NATO is a separate entity from the UN, therefore it has the independence on deciding whether a military intervention is to occur. Delegates are encouraged to envisage such a solution and evaluate the consequences of a NATO intervention in Syria. They must decide if NATO should use their military against specific targets on the ground, such as in Libya, or launch a full-scale battle against the Regime. Delegates must find short and long term solutions to end the crisis. II. References: http://www.hrw.org/node/99345/section/5 1 http://syriahr.com/en/index.php? option=com_news&nid=1064&itemid=2&task=displaynews#.upuy6pgexuy 2 http://www.nato.int/cps/en/sid-17a115ff-3b9bb9b3/natolive/news_98494.htm 3 http://www.reuters.com/article/2013/09/19/us-syria-crisis-natoidusbre98i06720130919 4