Welcome to Ad Hoc on Terror! - hbhsmun

Transcription

Welcome to Ad Hoc on Terror! - hbhsmun
Ad Hoc on
Terror
topics:
 Narcoterrorism
 Cyberterrorism
Chaired by the Honorable
Joyce Wu, Taren Bhakta, Lilly Mattes, and Emily Le
S i n c e
HBHS
April 25th, 2015
1 9 7 8
Novice
hbhsmun.webs.com
Huntington Beach High School Model United Nations
Ad Hoc on Terror
April 25th, 2015
Welcome to Ad Hoc on Terror!
Welcome to the Ad Hoc Terrorism Committee! The purpose of Ad
Hoc Terrorism is to create an international force to suppress and develop
legal frameworks against terrorist activities. With this, our goal by the end
of this committee is to establish solutions on how to combat and prevent
further terrorist attacks.
Hello Delegates! My name is Joyce Wu and I am very excited to be
one of your chairs for the upcoming HBHS Novice MUN Conference. I am
currently a junior at Huntington Beach High School and have been in our
school’s Model United Nations program for three years. Throughout these
three years, MUN has impacted my life greatly in terms of enlightening me
on international conflicts as well as transforming me from a meek, softspoken girl into an outgoing, sociable student. In addition to MUN and 5 AP
courses this year, I am also the Junior President of the National Honor
Society, a member of the California Scholarship Federation (CSF), a
competitor in the Science and Math Academic Competition Team
(SMACT), a leader in Link Crew, and a Varsity tennis player (I am quite the
busy person #nosleep). I hope that Ad Hoc Terrorism will provide a
memorable experience and I can’t wait to hear all your creative solutions!
Hello Delegates. I am Taren Bhakta and I will be one of your chairs
for this year’s novice MUN Conference. I am a junior and have been in
MUN for three years but this is my first time chairing for a conference. I
have attended 11 conferences so far, mostly 1st DISEC and Terrorism
committees. I also am a part of our school’s Science and Math Academic
Competition Team (SMACT) and the president of our school’s Engineering
Club. I love working with computers and coding programs and am looking
forward to hearing all of your innovative solutions and knowledge on the
topics. See you all in committee.
2
1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected]
Ad Hoc on Terror
April 25th, 2015
Hello Delegates! My name is Lilly Mattes and I will also be one of
your co-chairs for the upcoming HBHS Surf City Novice Conference. As a
sophomore this is my first conference chairing and I am more than excited
to see what brilliant proposals you will all bring into the Ad Hoc Terrorism
committee. This is my second year participating in the Modeled United
Nations program at HBHS and not only has it opened up my eyes to issues
prevalent around the world, but has given me more confidence and greatly
improved my speaking. Outside of MUN, I am active in National Honors
Society and the United Nations International Children’s Emergency Fund
club. I am also a part of the varsity field hockey team at Huntington. Other
activities I enjoy include hanging out with my friends, going to the beach,
watching Criminal Minds, and playing with my dog, Elvis. I am so beyond
excited to be a part of your HBHS Surf City experience and I am looking
forward to hearing your unique solutions and meeting you all in Ad Hoc
Terrorism!
Hello Delegates! My name is Emily Le and I will be one of your chairs
for the HBHS Novice MUN Conference. I am a sophomore and this is my
first time chairing and I am super excited. I have been in the MUN program
for only 2 years but am absolutely in love with it and have already learned
so much from the program. My favorite committees are UN Women and
Human Rights. I am also in National Honors Society and really enjoy
helping people and volunteering around our community. My other hobbies
include reading and painting. I am very excited to be your chairs and to
hear all your solutions to the problems concerning narco and cyber
terrorism. I promise I will work really hard to make this a great conference
for all of you delegates and I look forward to seeing all of you in committee!
Position Papers must be submitted to your Dais’s central email no later than 11:59 PM on
April 19th, 2015 to be considered for a Research Award. Research Awards will be presented
during committee; please be sure to follow the HBHSMUN Position Paper format available on
our website. Your Dais’s central email is: [email protected]
3
1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected]
Ad Hoc on Terror
April 25th, 2015
I. Narcoterrorism
Topic Background
trafficking routes.v On the other hand, while
some terrorist organizations may collect
funds from their own elaborate system of
drug trafficking, others may generate
revenue from extortion fees paid by drug
farmers and drug cartels for operating on
their territory. vi Either way, these are all
examples of narco-terrorism.
The dangerous combination of
terrorism and drug trafficking poses a high
threat to the international community as
these groups seek to exploit the
vulnerabilities of the civilian population for
their own gain and can be situated across
several countries. Today, up to 60 percent
of terrorist organizations are linked to the
illegal drugs industry which, accumulated
internationally, generates $322 billion
annually. vii Such organizations include the
Kurdistan Worker’s Party (PKK) in Turkey,
Fuerzas Armadas Revolucionarias de
Colombia
(FARC),
the
Taliban
in
Afghanistan, and the Islamic Movement of
Uzbekistan (IMU).
The Kurdistan Worker’s Party (PKK)
was founded in 1974 with the goal of
establishing an independent Kurdish state
within Turkey. Initially using armed attacks
against Turkish security forces, the PKK,
since the mid-1990s, has escalated their
violence to include urban terrorism. Since
then, more than 40,000 people have died,
thousands of villages have been destroyed,
and thousands of Kurds have been
displaced or fled to other parts of the
country. viii Due to this, the PKK is
considered a terrorist organization by both
Turkey and the international community.
According to the Turkish government, the
Narco-terrorism is essentially a term
derived of two words: narcotics, meaning
illegal drugs, and terrorism, most commonly
defined as intentional acts intended to
create fear for a religious, political, or
ideological goal. This term was initially
coined back in 1983 to describe the use of
terrorist-like attacks such as car bombs,
assassinations,
kidnapping,
by
drug
traffickers against anti-narcotic police in
Peru, Colombia, and Spain.i Since then, the
definition of narco-terrorism has evolved
and can be considered as all of the
following: “a mutually beneficial alliance
between drug cartels and terrorist
organizations”ii, “political violence committed
by drug traffickers concerned with the
protection of their criminal enterprise”iii, or,
as according to the Drug Enforcement
Agency (DEA), “an organized group that is
complicit in the activities of drug trafficking
in order to further, or fund, politically
motivated violence perpetrated against
noncombatant targets with the intention to
influence”.
The similar necessities of drug
traffickers and terrorist organizations such
as extensive networks, efficient method of
transferring money across countries and
continents,
methods
of
brutality,
connections in lawless areas, and weaponry
are all contributing reasons why narcoterrorism continues to exist. iv Globalization
has made the world a smaller place, and in
doing so, systems of criminal entrepreneurs
were born. Exemplifying this, terrorist
groups can provide weapons to drug cartels
in exchange for funding and the use of their
4
1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected]
Ad Hoc on Terror
April 25th, 2015
country.xi Such success can be attributed to
their heavy involvement in the narcotics
industry. This control over the drug industry
in Afghanistan essentially funds their food,
weapons, suicide bombers, and luxury that
Taliban leaders live in. The drug trade is
hardly a new occurrence in the nation as
Afghanistan has been a major source
country for opiate cultivation and trafficking,
producing over 70 percent of the world’s
supply of opium as of 2000. xii In fact,
according to the United Nations Office on
Drugs and Crime (UNODC), Afghanistan
produced over 3,600 tons of opium over
120,000 hectares in 2004 alone.xiii Through
this influx of income from drugs, the Taliban
has been able to maintain its power through
large narcotic operations despite its fall in
political power in 2001.
Furthermore, a group spawned by
the Al Qaeda and Taliban, the Islamic
Movement of Uzbekistan (IMU) was
founded in 1998 to overthrow the
Uzbekistani government. The IMU mainly
funds itself by controlling the main drug
trafficking routes through the Central Asian
region, specifically the Pamir Mountains of
Tajikistan. According to official estimates
and investigation, in 2000, the IMU stored
1,500 tons of heroin and illicit drugs in the
Tavildara district of northern Tajikistan.xiv
Overall, it is important to keep in
mind that narco-terrorism is not bound to
one region; it is a problem that has plagued
the international community for decades.
These organizations can all be linked
together through the common interest of
drug trafficking; however, each organization
has their own specific motivations for their
operations.
PKK’s funds, in addition to other criminal
activities such as kidnapping and extortion
of money from Kurdish businessmen and
professionals, stem largely from drug
trafficking, producing 60 tons of heroin per
year that amasses to around $40 million
USD average annually. ix Although they are
responsible for the majority of illicit drug
trafficking in Turkey, the PKK has also run
operations in Europe in the past. In fact, in
1993, the PKK extorted around $56 million
from Europe alone. In 1999, the PKK
experienced a major setback when its
leader, Abdullah Ocalan, was arrested;
however, despite his calling for a cease fire
in 2013, the implementation of this is
questionable as there is still much tension
between the PKK and the Turkish
government.
Similarly to the PKK, the Fuerzas
Armadas Revolucionarias de Colombia
(FARC) emerged in 1964 and was
motivated for political reasons, in particular,
the overthrow of the Colombian government
for a leftist, anti- US regime. The FARC has
maintained itself through kidnappings,
extortion, bank robberies, and the drug
trade. In order to expand their weapons
base, FARC fronts promote coca cultivation
and sale, control local cocaine markets, and
distribute
cocaine
to
international
x
organizations. Notably, the 16th front has
been confirmed to be one of the cocaine
sources of supply that contributes to the
circulation of the drug.
On the other hand, the Taliban,
residing in Pashtun areas of Afghanistan
and Pakistan, is driven by religious
purposes and utilizes terrorism to restore
Sharia law. They proved to be largely
successful and by the late 1900’s, the
Taliban had exerted control over 90% of the
5
1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected]
Ad Hoc on Terror
April 25th, 2015
United Nations Involvement
drugs, crime, and terrorism. xx The UNODC
has been a huge contributor in fighting
narco-terrorism through ways such as
creating the Terrorism Prevention Branch,
which works coherently with the General
Assembly to assist Member States in legal
cases as well as providing the Universal
Legal Framework Against Terrorism that
was created on April 27, 2009. xxi These
complex guidelines give Member States
guidance on how to specifically combat
terrorism and Narco-terrorism within their
own nation.
Since the establishment of CND,
their role has been elevated to becoming
the governing body of the UNODC as well
as organizing some of the most important
conventions, such as the United Nations
General Assembly Special Sessions
(UNGASS).xxii After the success at the last
UNGASS on world drug control in 1998, the
General Assembly and CND have been
pushing to ensure another convention which
is scheduled to take place in March of
2016.xxiii From the UNGASS in 1998 and the
preparatory work since then for the one
scheduled next year, a Civil Society Task
Force was launched in order to fulfill the
new international health approach Member
States believe could detrimentally decrease
the international drug war. xxiv Furthermore,
ten years after the 1998 UNGASS, the
Political Declaration and Plan of Action on
International Cooperation towards an
Integrated and Balanced Strategy to
Counter the World Drug Problem was
adopted which encourages Member States
to focus on demand reduction, supply
reduction, and enhancing international
cooperation
by
countering
money
laundering
and
promoting
judicial
cooperation.xxv
As early as 1946, ECOSOC
recognized increasing drug related issues
and therefore created the Commission on
Narcotic Drugs (CND) to help in regulating
international drug control and abuse
treaties. xv Since the creation of this body,
the CND has assisted in setting early and
basic guidelines for the international
community to follow regarding the
international drug war. The CND heavily
influenced the creation of the Single
Convention on Narcotic Drugs of 1961,
which aims to combat drug abuse by
xvi
coordinated
international
action.
Moreover, in 1970, the CND endorsed the
United Nations Fund for Drug Abuse Control
which began to take countermeasures if
emergencies were to occur.xvii Shortly after,
the CND adopted the Convention on
Psychotropic Drugs of 1971 stating that
there is an international drug control
spectrum in which a psychotropic drug is
valued by its abuse potential and
therapeutic value.xviii In addition, in 1988, the
UN expanded upon this with the
endorsement of the United Nations
Convention against Illicit Traffic in Narcotic
Drugs and Psychotropic Substances which
applied the convention of 1971 to terrorist
organizations.xix
Although the CND provided the
world with necessities it needed to suppress
the drug war, their efforts were not enough
to completely eliminate the problem.
Therefore, in 1997, the merging of the
United Nations Drug Control Program and
the Center for International Crime
Prevention led to the establishment of the
United Nation Office on Drugs and Crime
which specifically works to combat illicit
6
1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected]
Ad Hoc on Terror
April 25th, 2015
Since the start of 1983, narcoterrorism has been on the rise due to the
improvement of efficiency in the way
terrorist groups are funded. Seeing the
detrimental effects narco-terrorism has
worldwide, the United Nations has been
working hard to cease the prevalence it has
today by using tactics to decrease funds
going directly to terrorist groups through
narcotics. To combat money-laundering
specifically, the Money Laundering Control
Act was passed in 1986 and stated that
money-laundering
is
deemed
an
international crime.xxvi In addition, under the
UNODC,
the
International
Money
Laundering Information Network was
established to monitor reported cases
globally. xxvii It is theorized that if moneylaundering is greatly reduced, so will narcoterrorism.
Early
resolutions
have
substantially decreased narco-terrorism
throughout the world, such as S/RES/1373,
which established a Committee of the
Council to focus primarily on combatting all
efforts from terrorist groups including
money-laundering, illegal-arms trafficking,
and illegal movement of deadly materials
through a 90 day report system under the
Security Council. xxviii Another resolution
passed was A/RES/46/104 which called for
the formation of the Vienna NGO
Committee on Drugs. xxix Also, in A/RES/S17/2, the General Assembly affirmed the
Implementation of the Global Programme of
Action against illicit production, supply,
demand, trafficking and distribution of
narcotic drugs and psychotropic substances
which acts as a global. xxx This Global
Programme of Action is an agreement of all
Member States to strive to eradicate narco
terrorism by working coherently to diminish
all the factors involved in narco terrorism.
Despite many actions taken by the United
Nations and the Member States, narco
terrorism continues to be a struggle globally
due to increases in technology and
efficiency within terrorist organizations.
Case Study: Colombia
Despite
millions
of
dollars
accumulated through narco terrorism,
Colombia supplies 90% of the world’s
cocaine due to terrorist groups operating
within their own nation. Due to the
extremities occurring within Colombia, the
international community has worked
coherently with the government to
drastically decrease the horrors that
reached an all-time high in the 1980s. With
the aid of the United States as well as
nations within Europe, kidnapping within
Colombia has decreased tremendously by
23% since 2000. Although this number has
significantly decreased, the drug war within
Colombia continues to rage on.
The biggest threat within Colombia is the
Fuerza Armadas Revolucionarias de
Colombia (FARC). The FARC is a
communist terrorist group composed of
17,500 members that believes the
Colombian government is corrupt and
should be overthrown. Each year FARC
accumulates between 500 and 600 million
dollars and more than 65% is derived from
illegal narcotrafficking. xxxi Due to steady
funding, FARC can harness highly
technological guerilla weapons including
explosives,
landmines
and
bombs
camouflaged as necklaces, soccer balls,
and soup cans. xxxii This highly developed
technology gives these groups more
advantages over the aiding Member States
which enables these terrorist to commit
7
1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected]
Ad Hoc on Terror
April 25th, 2015
atrocities such as murder, sexual violence,
kidnapping, torture, forced displacement,
and forced recruitment. xxxiii FARC is highly
dedicated
toward
expanding
their
organization to accommodate as many
members as they can. Despite age, FARC
will recruit anyone from ages 13 to 60, male
or female. They are desperate for success
and believe that the overthrow will be more
easily orchestrated by ordering prison
breaks.xxxiv
Along with technology, Colombia has been
able to increase and implement impressive
security throughout the nation as well as
harvest a rapidly growing economy.
However, all this economic gain and illegal
trafficking has been detrimental to the
environment of Colombia. Due to illegal
mining
and
constant
transportation,
Colombia’s pollution has reached an all-time
high. In non-urban areas, activities like
coffee production, mining, and the clearing
of land for livestock and agriculture help
increase deforestation as well as the
prevalence and ability to attain cocaine
within Colombia.xxxv This extensive cocaine
production also allows for insurgent and
paramilitary groups to barter with Russian
drug cartels for more guerilla weaponry. In
addition, these groups are in control of most
of south Colombia as well as all of the
cocaine fields and laboratories that exist in
those regions. Along with the trafficking of
these drugs, 100 to 500 kilograms are
collected in these regions in taxes.xxxvi
Despite all of FARC’s success, FARC has
lost momentum and many of its current
members due to the death of its founder,
Manuel "Sureshot" Marulanda, in 2008 and
its top military general, Jorge Briceno, in
2010. Although FARC is on a downward
spiral, more and more terrorist organizations
continue to rise not only within Colombia,
but globally as well.
8
1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected]
Ad Hoc on Terror
April 25th, 2015
II. Cyberterrorism
Topic Background
gain sympathizers. Terrorists also utilize the
internet to send threats and fear-inducing
messages to countries such as videos of
public executions. xxxix Additionally, Cyber
terrorism can also be used to train new
members, plan attacks, and to help raise
funds to continue terrorist activities such as
through hacking into banks or organizations
and carrying out false money transfers.
Another common method is creating false
philanthropic organizations to collect
donations. xl It is estimated by the United
Nations that internationally, cybercrime
accumulates to 110 million dollars a year.xli
There are many types of attacks that
can be attributed to cyber terrorism. Worms,
viruses and DDOS attacks are the most
prevalent types of cyber terrorist attacks
due to their specific uses. DDOS attacks, or
Distributed Denial of Service attacks, are
meant to disable a network by creating
access requests and flooding the network
with them to halt the network. This was
used in July of 2009 on US and South
Korean government websites disabling
governmental sites for at least a week. xlii
DDOS attacks are effective distractions and
are often committed using a botnet, a
collection of "bots" that autonomously and
simultaneously
stimulate
a
target's
computer or network to "keep it busy". The
most common defense that some websites
put up to prevent the success of DDOS
attack is Captcha, a system that ensures a
human is accessing a site by implementing
a random image associated with a code that
can only be visually derived. By ensuring
that a user is human the sites that use this
system restrict the access of "bots" that can
In our current technological age,
cybercrime has become the most prevalent
and effective form of crime today.
Cybercrime is mostly financially and
politically motivated by hacking bank
accounts to tampering with voting records.
Often times, cyber-attacks are a means to
gain access to a certain network and fund
criminal organizations and activities. Due to
its online nature, these crimes can be
committed from any place and on a very
large scale. In 2012 alone, more than 1.5
billion cyber-attacks occurred.xxxvii
Interpol divides cybercrime into
three categories: attacks on hardware and
software, financial crimes or corruption, and
abuse, most often directed against children.
Cyberterrorism is the first two types on a
grander scale that is meant to disable or
crash a nation's security or economy as well
as an attack on the networks international
organizations.xxxviii These attacks can range
from simple attacks that take 0.06 USD from
over 8 million bank accounts to attacks
meant to disable governmental websites.
With over 1.5 million victims a day, an
average of $200 USD lost per attack, and at
least 20 international agencies falling victim
to an attack each year, cyber terrorism is a
prevalent issue that can strike anyone from
civilians to government agencies.
Terrorists can also utilize the
cyberworld for propaganda. Forms of cyber
propaganda may include using videos to
send
messages,
justifications,
or
explanations of terrorist activities. This
method is used by terrorist organizations to
9
1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected]
Ad Hoc on Terror
April 25th, 2015
overload the site. Worms and viruses are
common ways to install malware and
spyware on a target's computer Worms and
viruses are the easiest to contract especially
when the Trojan Horse system is
implemented. They are mostly used for
espionage and hacking of bank accounts.
Cyber terrorists use these types of attacks
to threaten a nation's economy or hold data
for ransom under the threat of international
exposure.xliii
Cyber terrorists use these three
main types of attacks to threaten a nation's
economy or hold data for ransom under the
threat of international exposure. Last year,
the Crypto Wall scheme cost Americans
around $1000 USD worth of bitcoins, an
online currency that is not backed by
international economy, per attack. This
scheme involved holding personal files
ransom by encrypting them and requesting
payment for a decryption key. xliv Civilians
can easily take safety precautions regarding
malware. Most of these tips include
consistently monitoring what files are
downloaded and getting antivirus software
installed. Countries use advanced firewalls
and encryption keys to secure their nation’s
databases and networks. On a national
scale,
countries
all
utilize
various
punishments to fit certain cyber-crimes but
macrocosmically, there is a lack of an
international body which can adequately
deal with cyber-attacks.
Cyber
terrorism
is
becoming
increasingly prevalent in today’s day and
age. It is especially dangerous due to the
difficulty of tracing cybercrime and
identifying the perpetrators. This often
requires governments to have extremely
advanced technology as well as many,
highly trained forces.xlv Due to the fact that
cyber terrorism is a recently emerging issue,
there is a lack of training for cyber
defenders, leaving countries to fall victim to
advanced hackers. The lack of agreement
of an international definition for terrorism as
well as a global structure for cyber terrorism
is also very concerning and further weakens
countries against cyberattacks. Measures
must be quickly taken by the international
community to meet the always growing
cyber-world and to prevent cyber terrorism.
United Nations Involvement
Despite the lack of an official
international
legal
instrument
which
explicitly addresses cyber terrorism, the
United Nations condemns all manifestations
of terrorism and has taken many actions to
specifically combat its cyber form. xlvi In
2005, the United Nations Counter-Terrorism
Implementation Task Force (CTITF) was
created by the United Nation's SecretaryGeneral. xlvii The task force works to aid
multilateral efforts in combating all forms of
terrorism, provides nations with the needed
knowledge, policy framework, and strategy,
and consists of 34 entities as well as
INTERPOL which together work to prevent
terrorism.xlviii Together, CTITF and the many
international entities established the United
Nations Global Counter-Terrorism Strategy
(A/RES/60/88), which was adopted by the
General Assembly in 2006. xlix The strategy
urges the international community to follow
four pillars concerning the following:
discovering the conditions which allows for
the spread of terrorism, taking action
against the act of terrorism, strengthening
the relationship between the United Nations
and a state, and respecting human rights
when combatting terrorism. l Also, in the
10
1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected]
Ad Hoc on Terror
April 25th, 2015
Global Counter-Terrorism Strategy, the
resolution specifically addresses cyber
terrorism in operative 12, sub-operative A,
stating that nations must work to combat all
forms of terrorism including attacks
involving the internet.li
The United Nations Office of Drug
and Crime (UNODC) has also contributed
greatly to the international community’s
efforts in countering cyber terrorism, being
one of the thirty-four entities working with
CTITF. lii The UNODC has separated the
cyber terrorism into six different categories:
cyber
attacks;
propaganda;
training;
planning; financing; and execution. These
classifications are found in the UNODC's
document, “The Use of the Internet for
Terrorist Purposes,” released in 2012.
Within the document, the United Nations
Office on Drugs and Crime also outlined
universal actions, state and region policies,
prosecutions,
investigations,
and
international
cooperation
concerning
terrorism in the cyber form. Although there
is no universal legal instrument regarding
cyber terrorism, a regional multilateral
instrument was constructed by the Council
of Europe in 2001, labeled the Council of
Europe Convention on Cybercrime. This
convention is mentioned in the UNODC's
document, elaborating the actions of the
convention in order to combat cyber
terrorism. liii As of currently, the convention
on cybercrime has been either signed or
ratified by 45 member states of the Council
of Europe and 8 non-member states of the
Council of Europe.liv
Currently, the United Nations does
not have a set definition of terrorism nor a
definition of cyber terrorism, despite the
many meetings held since 2000 between
members of the international community.
This is due to the international community's
lack of agreement upon a single definition.
lv
The United Nations believes that a
universal definition, as well as international
cooperation is needed in order to further
progress
of
investigations
and
lvi
prosecutions. Another entity of the United
Nations Counter-Terrorism Implementation
Task Force (CTITF) which has also taken
action against cyber-attacks is the North
Atlantic Treaty Organization (NATO). NATO
has established defense and security
against cyber terrorism as a priority,
adopting its first policy regarding cyber
defense in 2008. lvii NATO has also
enhanced its partnerships and cooperation
with international organizations as well as
member states for the reason of multilateral
support concerning information, countering,
and relief of any cyber attacks. In addition,
NATO also contributes cyber training and
education.lviii
Although many General Assembly
and Security Council resolutions have been
adopted in regards to ending terrorism,
none specifically address cyber terrorism,
and only a few resolutions even
acknowledge
this
manifestation.
In
A/RES/68/119, adopted by the General
Assembly in 2013, cyber terrorism is lightly
regarded within the first operative stating
that the international community condemns
terrorism in all of its forms and views the act
as a criminal offence. lix This similar
statement is then repeated in General
Assembly resolutions, 51/210, 67/99, and
66/105. Although multiple actions have
been taken by the United Nations to help
combat cyber terrorism, there is still a large
lack of consideration placed explicitly upon
cyber terrorism. The United Nations must
continue to take action and fully
11
1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected]
Ad Hoc on Terror
April 25th, 2015
acknowledge this form of terrorism in order
to successfully prevent it.
Attacks like this usually are meant to
expose vulnerabilities and open a doorway
into another country's network. They are
also used as distractions that disable the
targets network so another attack can take
place without interference. A South Korean
professor at Seoul's Dongguk University,
Kim Yong-Hyun, predicted that North Korea
may have launched the attack for the
purpose of expressing that they not only
have military power but cyberpower as well.
Many cyber attacks usually occur following
disputes between the countries involved. lxiii
Although cyber attacks have the potential of
being very detrimental, such as its potential
to gather classified information, financially
cripple a nation, and instill widespread
panic, this attack merely slowed down or
rendered inaccessible, media, commercial,
and government websites of the United
States and South Korea, for the purposes of
instilling fear and exerting power. Cyber
attacks are exceptionally dangerous due to
the ease of hacking into sites as well as the
little skill needed to do so. These 2009
attacks were reported to be thoroughly
planned but, the attacks only generated a
maximum amount of twenty-five megabits of
data per second. Manager of security
research at Arbor Networks also stated that
the code that was used to launch these
attacks were very simply and “pretty
elementary”.lxiv
The United States was able to get
their sites running with ex post facto
rebooting that restricted the attack and
allowed public access to the websites. In
South Korea, the government administered
“vaccine programs” which prevented any
further attacks. lxv Investigators say that the
attack was a coordinated strike from a
group of hackers with advanced enough
Case Study: South Korea
and USA 2009
There have been many cyber
attacks in this new century as technology is
steadily advancing, and as technology is
advancing cyber terrorism has become
increasingly worse. In July of 2009, the
websites of the United States and South
Korean government were attacked by a
Distributed Denial of Service (DDOS)
attack. This attack, occurring on July 4th,
7th, and 9th, rendered certain websites
inaccessible. lx These attacks happened in
three different waves, starting in the US and
spreading to South Korea. The United
States’
Treasury
Department,
Transformation Department, Federal Trade
Commission, as well as the Pentagon were
all targeted in this attack. According to the
South Korean National Intelligence Agency,
the hackers attacked these websites by
flooding them with access requests from
over 20,000 computers. The DDOS attack
slowed down the sites and rendered them
inert. The attack eventually spread to the
New York Stock exchange as well as other
notable commercial and media sites.lxi The
first wave of attacks started in the United
States on July 4th but spread to South
Korea on July 7th in the second wave of the
attacks. Sites such as the Defense Ministry,
Shinhan Bank the National Assembly, and
the presidential Blue House were attacked
in South Korea. By the end of the third wave
in July 9th, about a total of twenty-two major
sites were attacked in South Korea and
twenty-seven sites within the United
States.lxii
12
1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected]
Ad Hoc on Terror
April 25th, 2015
skills to get the attack to crash the sites but
with code was not highly developed.
Although both the United States as well as
South Korea believe that North Korea or
pro-North Korean groups were behind these
attacks, the perpetrators of this attack was
never confirmed. lxvi These 2009 attacks
were only the start of attacks from North
Korea mainly targeted at South Korea. Both
targeted countries regarded the 2009 attack
as only a moderate and mostly harmless
attack since no valuable data was gathered
nor destroyed. Although the attack may
have been viewed as “non-worrisome”, it
was only a precursor of what was to
come. lxvii Cyber attacks since then have
been much more detrimental. With the
always
current
advancements
of
technology, cyber attacks will only worsen
and become more frequent, this makes it
necessary for the international community to
take more action towards combating cyber
terrorism.
13
1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected]
Ad Hoc on Terror
April 25th, 2015
Questions to Consider
Narcoterrorism:
1. Is your country an area of occupation by any terrorist organizations, and if so, do they
fund themselves through drug trafficking?
2. In what ways has your country been involved with terrorism and drug trafficking - has
your country contributed towards its eradication or catalyzed its growth?
3. How can the international community cooperate against the threat of narco-terrorists?
4. How can drug trafficking be made less appealing and beneficial to terrorist organizations
as a source of funding?
5. What ways can we protect civilians from the dangers of narco-terrorism?
Cyberterrorism:
1. Has your country or anything associated with your country - companies, allies - been
victim to a cyber attack? How has this affected your economy and/or security? What
types of attacks were they?
2. Does your country’s security or weaponry rely on technology and network systems?
3. Has your country done anything to defend against or prevent cyber attacks? If so, how
has it been effective?
4. How does one address a crime with this magnitude of anonymity? What has been done
to ensure the protection of your citizens as well as their rights?
5. What has your country done to help its allies or the international community in cyber
defense?
14
1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected]
Ad Hoc on Terror
April 25th, 2015
i
Akyeampong, Emmanuel, ‘Diaspora and Drug Trafficking in West Africa: A Case Study of Ghana,’ African
Affairs, 104/416 (2005) pp. 429 – 447
ii
http://www.loc.gov/rr/frd/pdf-files/NarcsFundedTerrs_Extrems.pdf
iii
Combs & Slann, “ The Encyclopedia of Terrorism,” Facts on File; 2 Revised edition (March 2007)
iv
http://www.eurad.net/en/news/supply_reduction/The+narco-terrorism+connection.9UFRjY0z.ips
v
A GLOBAL OVERVIEW OF NARCOTICS-FUNDED TERRORIST AND OTHER EXTREMIST
GROUPS." Library of Congress.N.p., n.d. Web.
vi
http://web.mit.edu/cis/pdf/Audit_01_06_Vanda.pdf
vii
https://www.washingtoninstitute.org/uploads/Documents/opeds/4bbcba42e5c8a.pdf
viii
http://www.bbc.com/news/world-europe-20971100
ix
http://fas.org/irp/world/para/docs/mfa-t-pkk2.htm
x
http://www.nctc.gov/site/groups/farc.html
xi
http://www.encyclopedia.com/topic/Kabul.aspx
xii
http://www.newsweek.com/2013/06/12/talibans-new-role-afghanistans-drug-mafia-237524.html
xiii
http://www.globalresearch.ca/the-spoils-of-war-afghanistan-s-multibillion-dollar-heroin-trade/91
xiv
http://www.loc.gov/rr/frd/pdf-files/NarcsFundedTerrs_Extrems.pdf
xv
http://www.unodc.org/unodc/commissions/CND/
xvi
http://www.unodc.org/unodc/en/treaties/single-convention.html
xvii
http://www.unodc.org/unodc/en/data-and-analysis/bulletin/bulletin_1971-01-01_2_page002.html
xviii
http://www.unodc.org/unodc/en/treaties/psychotropics.html
xix
http://www.unodc.org/unodc/en/treaties/illicit-trafficking.html
xx
http://www.unodc.org/unodc/en/about-unodc/index.html?ref=menutop
xxi
http://www.unodc.org/unodc/en/terrorism/index.html
xxii
http://www.unodc.org/unodc/commissions/CND/
xxiii
http://www.unodc.org/ungass2016/en/about.html
xxiv
http://www.opensocietyfoundations.org/explainers/what-ungass-2016
xxv
http://www.unodc.org/documents/ungass2016/V0984963-English.pdf
http://www.fincen.gov/news_room/aml_history.html
xxvii
https://www.imolin.org/
xxviii
http://www.un.org/press/en/2001/sc7158.doc.htm
xxix
http://www.un.org/documents/ga/res/46/a46r104.htm
xxx
http://www.un.org/documents/ga/res/45/a45r148.htm
xxxi
http://www.unric.org/en/colombia/27013-the-guerrilla-groups-in-colombia
xxvi
xxxii
http://www.cocaine.org/colombia/farc.html
xxxiii
http://www.ft.com/cms/s/0/62f812b2-17dd-11e4-b842-00144feabdc0.html#axzz3UWUYxaeF
http://www.tni.org/briefing/revolutionary-armed-forces-colombia-farc-and-illicit-drug-trade
xxxv
http://corrosion-doctors.org/AtmCorros/mapColombia.htm
xxxvi
http://www.loc.gov/rr/frd/pdf-files/NarcsFundedTerrs_Extrems.pdf
xxxiv
xxxvii
http://www.un.org/en/sc/ctc/docs/2013/2013-05-24_ITU-Session%20I.pdf
http://www.interpol.int/Crime-areas/Cybercrime/Cybercrime
xxxix
http://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf
xl
http://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf
xli
http://www.un.org/en/sc/ctc/docs/2013/2013-05-24_ITU-Session%20I.pdf
xlii
http://list25.com/25-biggest-cyber-attacks-in-history
xliii
http://www.personal.psu.edu/users/j/m/jms6423/Engproj/Types%20of%20Attacks.xhtml
xxxviii
15
1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected]
Ad Hoc on Terror
April 25th, 2015
xliv
http://www.nytimes.com/2015/01/04/opinion/sunday/how-my-mom-got-hacked.html?_r=1
http://www.carnegiecyberacademy.com/facultyPages/cyberCrime.html
xlvi
http://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf
xlvii
http://www.un.org/en/terrorism/ctitf/index.shtml
xlviii
http://www.un.org/en/terrorism/ctitf/index.shtml
xlix
http://www.un.org/en/terrorism/ctitf/pdfs/ctitf_interagency_wg_compendium_legal_technical_aspects_web.pdf
l
http://www.un.org/en/terrorism/ctitf/pdfs/ctitf_interagency_wg_compendium_legal_technical_aspects_web.pdf
li
http://www.un.org/en/ga/search/view_doc.asp?symbol=A/RES/60/288
lii
http://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf
liii
http://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf
liv
http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=&DF=&CL=ENG
lv
http://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf
lvi
http://www.unodc.org/unodc/en/frontpage/2012/October/unodc-launches-report-to-assist-member-states-tocounter-the-use-of-the-internet-for-terrorist-purposes.html?ref=fs2
lvii
http://www.nato.int/cps/en/natohq/topics_78170.htm?
lviii
http://www.nato.int/cps/en/natohq/topics_78170.htm?
lix
http://www.un.org/en/ga/search/view_doc.asp?symbol=A/RES/68/119
lx
http://list25.com/25-biggest-cyber-attacks-in-history/
lxi
http://www.nytimes.com/2009/07/09/technology/09cyber.html?_r=0
lxii
http://www.huffingtonpost.com/2009/07/07/massive-cyber-attack-knoc_n_227483.html
lxiii
https://www.victoriaadvocate.com/news/2009/jul/07/bc-as-skorea-cyber-attack5th-ld-writethru/
lxiv
http://www.nytimes.com/2009/07/09/technology/09cyber.html?_r=0
lxv
http://www.nytimes.com/2009/07/09/technology/09cyber.html?_r=0
lxvi
http://www.nytimes.com/2009/07/09/technology/09cyber.html?_r=0
lxvii
http://www.cnn.com/2009/TECH/07/08/government.hacking/index.html?iref=24hours
xlv
16
1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected]