Welcome to Ad Hoc on Terror! - hbhsmun
Transcription
Welcome to Ad Hoc on Terror! - hbhsmun
Ad Hoc on Terror topics: Narcoterrorism Cyberterrorism Chaired by the Honorable Joyce Wu, Taren Bhakta, Lilly Mattes, and Emily Le S i n c e HBHS April 25th, 2015 1 9 7 8 Novice hbhsmun.webs.com Huntington Beach High School Model United Nations Ad Hoc on Terror April 25th, 2015 Welcome to Ad Hoc on Terror! Welcome to the Ad Hoc Terrorism Committee! The purpose of Ad Hoc Terrorism is to create an international force to suppress and develop legal frameworks against terrorist activities. With this, our goal by the end of this committee is to establish solutions on how to combat and prevent further terrorist attacks. Hello Delegates! My name is Joyce Wu and I am very excited to be one of your chairs for the upcoming HBHS Novice MUN Conference. I am currently a junior at Huntington Beach High School and have been in our school’s Model United Nations program for three years. Throughout these three years, MUN has impacted my life greatly in terms of enlightening me on international conflicts as well as transforming me from a meek, softspoken girl into an outgoing, sociable student. In addition to MUN and 5 AP courses this year, I am also the Junior President of the National Honor Society, a member of the California Scholarship Federation (CSF), a competitor in the Science and Math Academic Competition Team (SMACT), a leader in Link Crew, and a Varsity tennis player (I am quite the busy person #nosleep). I hope that Ad Hoc Terrorism will provide a memorable experience and I can’t wait to hear all your creative solutions! Hello Delegates. I am Taren Bhakta and I will be one of your chairs for this year’s novice MUN Conference. I am a junior and have been in MUN for three years but this is my first time chairing for a conference. I have attended 11 conferences so far, mostly 1st DISEC and Terrorism committees. I also am a part of our school’s Science and Math Academic Competition Team (SMACT) and the president of our school’s Engineering Club. I love working with computers and coding programs and am looking forward to hearing all of your innovative solutions and knowledge on the topics. See you all in committee. 2 1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected] Ad Hoc on Terror April 25th, 2015 Hello Delegates! My name is Lilly Mattes and I will also be one of your co-chairs for the upcoming HBHS Surf City Novice Conference. As a sophomore this is my first conference chairing and I am more than excited to see what brilliant proposals you will all bring into the Ad Hoc Terrorism committee. This is my second year participating in the Modeled United Nations program at HBHS and not only has it opened up my eyes to issues prevalent around the world, but has given me more confidence and greatly improved my speaking. Outside of MUN, I am active in National Honors Society and the United Nations International Children’s Emergency Fund club. I am also a part of the varsity field hockey team at Huntington. Other activities I enjoy include hanging out with my friends, going to the beach, watching Criminal Minds, and playing with my dog, Elvis. I am so beyond excited to be a part of your HBHS Surf City experience and I am looking forward to hearing your unique solutions and meeting you all in Ad Hoc Terrorism! Hello Delegates! My name is Emily Le and I will be one of your chairs for the HBHS Novice MUN Conference. I am a sophomore and this is my first time chairing and I am super excited. I have been in the MUN program for only 2 years but am absolutely in love with it and have already learned so much from the program. My favorite committees are UN Women and Human Rights. I am also in National Honors Society and really enjoy helping people and volunteering around our community. My other hobbies include reading and painting. I am very excited to be your chairs and to hear all your solutions to the problems concerning narco and cyber terrorism. I promise I will work really hard to make this a great conference for all of you delegates and I look forward to seeing all of you in committee! Position Papers must be submitted to your Dais’s central email no later than 11:59 PM on April 19th, 2015 to be considered for a Research Award. Research Awards will be presented during committee; please be sure to follow the HBHSMUN Position Paper format available on our website. Your Dais’s central email is: [email protected] 3 1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected] Ad Hoc on Terror April 25th, 2015 I. Narcoterrorism Topic Background trafficking routes.v On the other hand, while some terrorist organizations may collect funds from their own elaborate system of drug trafficking, others may generate revenue from extortion fees paid by drug farmers and drug cartels for operating on their territory. vi Either way, these are all examples of narco-terrorism. The dangerous combination of terrorism and drug trafficking poses a high threat to the international community as these groups seek to exploit the vulnerabilities of the civilian population for their own gain and can be situated across several countries. Today, up to 60 percent of terrorist organizations are linked to the illegal drugs industry which, accumulated internationally, generates $322 billion annually. vii Such organizations include the Kurdistan Worker’s Party (PKK) in Turkey, Fuerzas Armadas Revolucionarias de Colombia (FARC), the Taliban in Afghanistan, and the Islamic Movement of Uzbekistan (IMU). The Kurdistan Worker’s Party (PKK) was founded in 1974 with the goal of establishing an independent Kurdish state within Turkey. Initially using armed attacks against Turkish security forces, the PKK, since the mid-1990s, has escalated their violence to include urban terrorism. Since then, more than 40,000 people have died, thousands of villages have been destroyed, and thousands of Kurds have been displaced or fled to other parts of the country. viii Due to this, the PKK is considered a terrorist organization by both Turkey and the international community. According to the Turkish government, the Narco-terrorism is essentially a term derived of two words: narcotics, meaning illegal drugs, and terrorism, most commonly defined as intentional acts intended to create fear for a religious, political, or ideological goal. This term was initially coined back in 1983 to describe the use of terrorist-like attacks such as car bombs, assassinations, kidnapping, by drug traffickers against anti-narcotic police in Peru, Colombia, and Spain.i Since then, the definition of narco-terrorism has evolved and can be considered as all of the following: “a mutually beneficial alliance between drug cartels and terrorist organizations”ii, “political violence committed by drug traffickers concerned with the protection of their criminal enterprise”iii, or, as according to the Drug Enforcement Agency (DEA), “an organized group that is complicit in the activities of drug trafficking in order to further, or fund, politically motivated violence perpetrated against noncombatant targets with the intention to influence”. The similar necessities of drug traffickers and terrorist organizations such as extensive networks, efficient method of transferring money across countries and continents, methods of brutality, connections in lawless areas, and weaponry are all contributing reasons why narcoterrorism continues to exist. iv Globalization has made the world a smaller place, and in doing so, systems of criminal entrepreneurs were born. Exemplifying this, terrorist groups can provide weapons to drug cartels in exchange for funding and the use of their 4 1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected] Ad Hoc on Terror April 25th, 2015 country.xi Such success can be attributed to their heavy involvement in the narcotics industry. This control over the drug industry in Afghanistan essentially funds their food, weapons, suicide bombers, and luxury that Taliban leaders live in. The drug trade is hardly a new occurrence in the nation as Afghanistan has been a major source country for opiate cultivation and trafficking, producing over 70 percent of the world’s supply of opium as of 2000. xii In fact, according to the United Nations Office on Drugs and Crime (UNODC), Afghanistan produced over 3,600 tons of opium over 120,000 hectares in 2004 alone.xiii Through this influx of income from drugs, the Taliban has been able to maintain its power through large narcotic operations despite its fall in political power in 2001. Furthermore, a group spawned by the Al Qaeda and Taliban, the Islamic Movement of Uzbekistan (IMU) was founded in 1998 to overthrow the Uzbekistani government. The IMU mainly funds itself by controlling the main drug trafficking routes through the Central Asian region, specifically the Pamir Mountains of Tajikistan. According to official estimates and investigation, in 2000, the IMU stored 1,500 tons of heroin and illicit drugs in the Tavildara district of northern Tajikistan.xiv Overall, it is important to keep in mind that narco-terrorism is not bound to one region; it is a problem that has plagued the international community for decades. These organizations can all be linked together through the common interest of drug trafficking; however, each organization has their own specific motivations for their operations. PKK’s funds, in addition to other criminal activities such as kidnapping and extortion of money from Kurdish businessmen and professionals, stem largely from drug trafficking, producing 60 tons of heroin per year that amasses to around $40 million USD average annually. ix Although they are responsible for the majority of illicit drug trafficking in Turkey, the PKK has also run operations in Europe in the past. In fact, in 1993, the PKK extorted around $56 million from Europe alone. In 1999, the PKK experienced a major setback when its leader, Abdullah Ocalan, was arrested; however, despite his calling for a cease fire in 2013, the implementation of this is questionable as there is still much tension between the PKK and the Turkish government. Similarly to the PKK, the Fuerzas Armadas Revolucionarias de Colombia (FARC) emerged in 1964 and was motivated for political reasons, in particular, the overthrow of the Colombian government for a leftist, anti- US regime. The FARC has maintained itself through kidnappings, extortion, bank robberies, and the drug trade. In order to expand their weapons base, FARC fronts promote coca cultivation and sale, control local cocaine markets, and distribute cocaine to international x organizations. Notably, the 16th front has been confirmed to be one of the cocaine sources of supply that contributes to the circulation of the drug. On the other hand, the Taliban, residing in Pashtun areas of Afghanistan and Pakistan, is driven by religious purposes and utilizes terrorism to restore Sharia law. They proved to be largely successful and by the late 1900’s, the Taliban had exerted control over 90% of the 5 1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected] Ad Hoc on Terror April 25th, 2015 United Nations Involvement drugs, crime, and terrorism. xx The UNODC has been a huge contributor in fighting narco-terrorism through ways such as creating the Terrorism Prevention Branch, which works coherently with the General Assembly to assist Member States in legal cases as well as providing the Universal Legal Framework Against Terrorism that was created on April 27, 2009. xxi These complex guidelines give Member States guidance on how to specifically combat terrorism and Narco-terrorism within their own nation. Since the establishment of CND, their role has been elevated to becoming the governing body of the UNODC as well as organizing some of the most important conventions, such as the United Nations General Assembly Special Sessions (UNGASS).xxii After the success at the last UNGASS on world drug control in 1998, the General Assembly and CND have been pushing to ensure another convention which is scheduled to take place in March of 2016.xxiii From the UNGASS in 1998 and the preparatory work since then for the one scheduled next year, a Civil Society Task Force was launched in order to fulfill the new international health approach Member States believe could detrimentally decrease the international drug war. xxiv Furthermore, ten years after the 1998 UNGASS, the Political Declaration and Plan of Action on International Cooperation towards an Integrated and Balanced Strategy to Counter the World Drug Problem was adopted which encourages Member States to focus on demand reduction, supply reduction, and enhancing international cooperation by countering money laundering and promoting judicial cooperation.xxv As early as 1946, ECOSOC recognized increasing drug related issues and therefore created the Commission on Narcotic Drugs (CND) to help in regulating international drug control and abuse treaties. xv Since the creation of this body, the CND has assisted in setting early and basic guidelines for the international community to follow regarding the international drug war. The CND heavily influenced the creation of the Single Convention on Narcotic Drugs of 1961, which aims to combat drug abuse by xvi coordinated international action. Moreover, in 1970, the CND endorsed the United Nations Fund for Drug Abuse Control which began to take countermeasures if emergencies were to occur.xvii Shortly after, the CND adopted the Convention on Psychotropic Drugs of 1971 stating that there is an international drug control spectrum in which a psychotropic drug is valued by its abuse potential and therapeutic value.xviii In addition, in 1988, the UN expanded upon this with the endorsement of the United Nations Convention against Illicit Traffic in Narcotic Drugs and Psychotropic Substances which applied the convention of 1971 to terrorist organizations.xix Although the CND provided the world with necessities it needed to suppress the drug war, their efforts were not enough to completely eliminate the problem. Therefore, in 1997, the merging of the United Nations Drug Control Program and the Center for International Crime Prevention led to the establishment of the United Nation Office on Drugs and Crime which specifically works to combat illicit 6 1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected] Ad Hoc on Terror April 25th, 2015 Since the start of 1983, narcoterrorism has been on the rise due to the improvement of efficiency in the way terrorist groups are funded. Seeing the detrimental effects narco-terrorism has worldwide, the United Nations has been working hard to cease the prevalence it has today by using tactics to decrease funds going directly to terrorist groups through narcotics. To combat money-laundering specifically, the Money Laundering Control Act was passed in 1986 and stated that money-laundering is deemed an international crime.xxvi In addition, under the UNODC, the International Money Laundering Information Network was established to monitor reported cases globally. xxvii It is theorized that if moneylaundering is greatly reduced, so will narcoterrorism. Early resolutions have substantially decreased narco-terrorism throughout the world, such as S/RES/1373, which established a Committee of the Council to focus primarily on combatting all efforts from terrorist groups including money-laundering, illegal-arms trafficking, and illegal movement of deadly materials through a 90 day report system under the Security Council. xxviii Another resolution passed was A/RES/46/104 which called for the formation of the Vienna NGO Committee on Drugs. xxix Also, in A/RES/S17/2, the General Assembly affirmed the Implementation of the Global Programme of Action against illicit production, supply, demand, trafficking and distribution of narcotic drugs and psychotropic substances which acts as a global. xxx This Global Programme of Action is an agreement of all Member States to strive to eradicate narco terrorism by working coherently to diminish all the factors involved in narco terrorism. Despite many actions taken by the United Nations and the Member States, narco terrorism continues to be a struggle globally due to increases in technology and efficiency within terrorist organizations. Case Study: Colombia Despite millions of dollars accumulated through narco terrorism, Colombia supplies 90% of the world’s cocaine due to terrorist groups operating within their own nation. Due to the extremities occurring within Colombia, the international community has worked coherently with the government to drastically decrease the horrors that reached an all-time high in the 1980s. With the aid of the United States as well as nations within Europe, kidnapping within Colombia has decreased tremendously by 23% since 2000. Although this number has significantly decreased, the drug war within Colombia continues to rage on. The biggest threat within Colombia is the Fuerza Armadas Revolucionarias de Colombia (FARC). The FARC is a communist terrorist group composed of 17,500 members that believes the Colombian government is corrupt and should be overthrown. Each year FARC accumulates between 500 and 600 million dollars and more than 65% is derived from illegal narcotrafficking. xxxi Due to steady funding, FARC can harness highly technological guerilla weapons including explosives, landmines and bombs camouflaged as necklaces, soccer balls, and soup cans. xxxii This highly developed technology gives these groups more advantages over the aiding Member States which enables these terrorist to commit 7 1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected] Ad Hoc on Terror April 25th, 2015 atrocities such as murder, sexual violence, kidnapping, torture, forced displacement, and forced recruitment. xxxiii FARC is highly dedicated toward expanding their organization to accommodate as many members as they can. Despite age, FARC will recruit anyone from ages 13 to 60, male or female. They are desperate for success and believe that the overthrow will be more easily orchestrated by ordering prison breaks.xxxiv Along with technology, Colombia has been able to increase and implement impressive security throughout the nation as well as harvest a rapidly growing economy. However, all this economic gain and illegal trafficking has been detrimental to the environment of Colombia. Due to illegal mining and constant transportation, Colombia’s pollution has reached an all-time high. In non-urban areas, activities like coffee production, mining, and the clearing of land for livestock and agriculture help increase deforestation as well as the prevalence and ability to attain cocaine within Colombia.xxxv This extensive cocaine production also allows for insurgent and paramilitary groups to barter with Russian drug cartels for more guerilla weaponry. In addition, these groups are in control of most of south Colombia as well as all of the cocaine fields and laboratories that exist in those regions. Along with the trafficking of these drugs, 100 to 500 kilograms are collected in these regions in taxes.xxxvi Despite all of FARC’s success, FARC has lost momentum and many of its current members due to the death of its founder, Manuel "Sureshot" Marulanda, in 2008 and its top military general, Jorge Briceno, in 2010. Although FARC is on a downward spiral, more and more terrorist organizations continue to rise not only within Colombia, but globally as well. 8 1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected] Ad Hoc on Terror April 25th, 2015 II. Cyberterrorism Topic Background gain sympathizers. Terrorists also utilize the internet to send threats and fear-inducing messages to countries such as videos of public executions. xxxix Additionally, Cyber terrorism can also be used to train new members, plan attacks, and to help raise funds to continue terrorist activities such as through hacking into banks or organizations and carrying out false money transfers. Another common method is creating false philanthropic organizations to collect donations. xl It is estimated by the United Nations that internationally, cybercrime accumulates to 110 million dollars a year.xli There are many types of attacks that can be attributed to cyber terrorism. Worms, viruses and DDOS attacks are the most prevalent types of cyber terrorist attacks due to their specific uses. DDOS attacks, or Distributed Denial of Service attacks, are meant to disable a network by creating access requests and flooding the network with them to halt the network. This was used in July of 2009 on US and South Korean government websites disabling governmental sites for at least a week. xlii DDOS attacks are effective distractions and are often committed using a botnet, a collection of "bots" that autonomously and simultaneously stimulate a target's computer or network to "keep it busy". The most common defense that some websites put up to prevent the success of DDOS attack is Captcha, a system that ensures a human is accessing a site by implementing a random image associated with a code that can only be visually derived. By ensuring that a user is human the sites that use this system restrict the access of "bots" that can In our current technological age, cybercrime has become the most prevalent and effective form of crime today. Cybercrime is mostly financially and politically motivated by hacking bank accounts to tampering with voting records. Often times, cyber-attacks are a means to gain access to a certain network and fund criminal organizations and activities. Due to its online nature, these crimes can be committed from any place and on a very large scale. In 2012 alone, more than 1.5 billion cyber-attacks occurred.xxxvii Interpol divides cybercrime into three categories: attacks on hardware and software, financial crimes or corruption, and abuse, most often directed against children. Cyberterrorism is the first two types on a grander scale that is meant to disable or crash a nation's security or economy as well as an attack on the networks international organizations.xxxviii These attacks can range from simple attacks that take 0.06 USD from over 8 million bank accounts to attacks meant to disable governmental websites. With over 1.5 million victims a day, an average of $200 USD lost per attack, and at least 20 international agencies falling victim to an attack each year, cyber terrorism is a prevalent issue that can strike anyone from civilians to government agencies. Terrorists can also utilize the cyberworld for propaganda. Forms of cyber propaganda may include using videos to send messages, justifications, or explanations of terrorist activities. This method is used by terrorist organizations to 9 1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected] Ad Hoc on Terror April 25th, 2015 overload the site. Worms and viruses are common ways to install malware and spyware on a target's computer Worms and viruses are the easiest to contract especially when the Trojan Horse system is implemented. They are mostly used for espionage and hacking of bank accounts. Cyber terrorists use these types of attacks to threaten a nation's economy or hold data for ransom under the threat of international exposure.xliii Cyber terrorists use these three main types of attacks to threaten a nation's economy or hold data for ransom under the threat of international exposure. Last year, the Crypto Wall scheme cost Americans around $1000 USD worth of bitcoins, an online currency that is not backed by international economy, per attack. This scheme involved holding personal files ransom by encrypting them and requesting payment for a decryption key. xliv Civilians can easily take safety precautions regarding malware. Most of these tips include consistently monitoring what files are downloaded and getting antivirus software installed. Countries use advanced firewalls and encryption keys to secure their nation’s databases and networks. On a national scale, countries all utilize various punishments to fit certain cyber-crimes but macrocosmically, there is a lack of an international body which can adequately deal with cyber-attacks. Cyber terrorism is becoming increasingly prevalent in today’s day and age. It is especially dangerous due to the difficulty of tracing cybercrime and identifying the perpetrators. This often requires governments to have extremely advanced technology as well as many, highly trained forces.xlv Due to the fact that cyber terrorism is a recently emerging issue, there is a lack of training for cyber defenders, leaving countries to fall victim to advanced hackers. The lack of agreement of an international definition for terrorism as well as a global structure for cyber terrorism is also very concerning and further weakens countries against cyberattacks. Measures must be quickly taken by the international community to meet the always growing cyber-world and to prevent cyber terrorism. United Nations Involvement Despite the lack of an official international legal instrument which explicitly addresses cyber terrorism, the United Nations condemns all manifestations of terrorism and has taken many actions to specifically combat its cyber form. xlvi In 2005, the United Nations Counter-Terrorism Implementation Task Force (CTITF) was created by the United Nation's SecretaryGeneral. xlvii The task force works to aid multilateral efforts in combating all forms of terrorism, provides nations with the needed knowledge, policy framework, and strategy, and consists of 34 entities as well as INTERPOL which together work to prevent terrorism.xlviii Together, CTITF and the many international entities established the United Nations Global Counter-Terrorism Strategy (A/RES/60/88), which was adopted by the General Assembly in 2006. xlix The strategy urges the international community to follow four pillars concerning the following: discovering the conditions which allows for the spread of terrorism, taking action against the act of terrorism, strengthening the relationship between the United Nations and a state, and respecting human rights when combatting terrorism. l Also, in the 10 1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected] Ad Hoc on Terror April 25th, 2015 Global Counter-Terrorism Strategy, the resolution specifically addresses cyber terrorism in operative 12, sub-operative A, stating that nations must work to combat all forms of terrorism including attacks involving the internet.li The United Nations Office of Drug and Crime (UNODC) has also contributed greatly to the international community’s efforts in countering cyber terrorism, being one of the thirty-four entities working with CTITF. lii The UNODC has separated the cyber terrorism into six different categories: cyber attacks; propaganda; training; planning; financing; and execution. These classifications are found in the UNODC's document, “The Use of the Internet for Terrorist Purposes,” released in 2012. Within the document, the United Nations Office on Drugs and Crime also outlined universal actions, state and region policies, prosecutions, investigations, and international cooperation concerning terrorism in the cyber form. Although there is no universal legal instrument regarding cyber terrorism, a regional multilateral instrument was constructed by the Council of Europe in 2001, labeled the Council of Europe Convention on Cybercrime. This convention is mentioned in the UNODC's document, elaborating the actions of the convention in order to combat cyber terrorism. liii As of currently, the convention on cybercrime has been either signed or ratified by 45 member states of the Council of Europe and 8 non-member states of the Council of Europe.liv Currently, the United Nations does not have a set definition of terrorism nor a definition of cyber terrorism, despite the many meetings held since 2000 between members of the international community. This is due to the international community's lack of agreement upon a single definition. lv The United Nations believes that a universal definition, as well as international cooperation is needed in order to further progress of investigations and lvi prosecutions. Another entity of the United Nations Counter-Terrorism Implementation Task Force (CTITF) which has also taken action against cyber-attacks is the North Atlantic Treaty Organization (NATO). NATO has established defense and security against cyber terrorism as a priority, adopting its first policy regarding cyber defense in 2008. lvii NATO has also enhanced its partnerships and cooperation with international organizations as well as member states for the reason of multilateral support concerning information, countering, and relief of any cyber attacks. In addition, NATO also contributes cyber training and education.lviii Although many General Assembly and Security Council resolutions have been adopted in regards to ending terrorism, none specifically address cyber terrorism, and only a few resolutions even acknowledge this manifestation. In A/RES/68/119, adopted by the General Assembly in 2013, cyber terrorism is lightly regarded within the first operative stating that the international community condemns terrorism in all of its forms and views the act as a criminal offence. lix This similar statement is then repeated in General Assembly resolutions, 51/210, 67/99, and 66/105. Although multiple actions have been taken by the United Nations to help combat cyber terrorism, there is still a large lack of consideration placed explicitly upon cyber terrorism. The United Nations must continue to take action and fully 11 1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected] Ad Hoc on Terror April 25th, 2015 acknowledge this form of terrorism in order to successfully prevent it. Attacks like this usually are meant to expose vulnerabilities and open a doorway into another country's network. They are also used as distractions that disable the targets network so another attack can take place without interference. A South Korean professor at Seoul's Dongguk University, Kim Yong-Hyun, predicted that North Korea may have launched the attack for the purpose of expressing that they not only have military power but cyberpower as well. Many cyber attacks usually occur following disputes between the countries involved. lxiii Although cyber attacks have the potential of being very detrimental, such as its potential to gather classified information, financially cripple a nation, and instill widespread panic, this attack merely slowed down or rendered inaccessible, media, commercial, and government websites of the United States and South Korea, for the purposes of instilling fear and exerting power. Cyber attacks are exceptionally dangerous due to the ease of hacking into sites as well as the little skill needed to do so. These 2009 attacks were reported to be thoroughly planned but, the attacks only generated a maximum amount of twenty-five megabits of data per second. Manager of security research at Arbor Networks also stated that the code that was used to launch these attacks were very simply and “pretty elementary”.lxiv The United States was able to get their sites running with ex post facto rebooting that restricted the attack and allowed public access to the websites. In South Korea, the government administered “vaccine programs” which prevented any further attacks. lxv Investigators say that the attack was a coordinated strike from a group of hackers with advanced enough Case Study: South Korea and USA 2009 There have been many cyber attacks in this new century as technology is steadily advancing, and as technology is advancing cyber terrorism has become increasingly worse. In July of 2009, the websites of the United States and South Korean government were attacked by a Distributed Denial of Service (DDOS) attack. This attack, occurring on July 4th, 7th, and 9th, rendered certain websites inaccessible. lx These attacks happened in three different waves, starting in the US and spreading to South Korea. The United States’ Treasury Department, Transformation Department, Federal Trade Commission, as well as the Pentagon were all targeted in this attack. According to the South Korean National Intelligence Agency, the hackers attacked these websites by flooding them with access requests from over 20,000 computers. The DDOS attack slowed down the sites and rendered them inert. The attack eventually spread to the New York Stock exchange as well as other notable commercial and media sites.lxi The first wave of attacks started in the United States on July 4th but spread to South Korea on July 7th in the second wave of the attacks. Sites such as the Defense Ministry, Shinhan Bank the National Assembly, and the presidential Blue House were attacked in South Korea. By the end of the third wave in July 9th, about a total of twenty-two major sites were attacked in South Korea and twenty-seven sites within the United States.lxii 12 1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected] Ad Hoc on Terror April 25th, 2015 skills to get the attack to crash the sites but with code was not highly developed. Although both the United States as well as South Korea believe that North Korea or pro-North Korean groups were behind these attacks, the perpetrators of this attack was never confirmed. lxvi These 2009 attacks were only the start of attacks from North Korea mainly targeted at South Korea. Both targeted countries regarded the 2009 attack as only a moderate and mostly harmless attack since no valuable data was gathered nor destroyed. Although the attack may have been viewed as “non-worrisome”, it was only a precursor of what was to come. lxvii Cyber attacks since then have been much more detrimental. With the always current advancements of technology, cyber attacks will only worsen and become more frequent, this makes it necessary for the international community to take more action towards combating cyber terrorism. 13 1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected] Ad Hoc on Terror April 25th, 2015 Questions to Consider Narcoterrorism: 1. Is your country an area of occupation by any terrorist organizations, and if so, do they fund themselves through drug trafficking? 2. In what ways has your country been involved with terrorism and drug trafficking - has your country contributed towards its eradication or catalyzed its growth? 3. How can the international community cooperate against the threat of narco-terrorists? 4. How can drug trafficking be made less appealing and beneficial to terrorist organizations as a source of funding? 5. What ways can we protect civilians from the dangers of narco-terrorism? Cyberterrorism: 1. Has your country or anything associated with your country - companies, allies - been victim to a cyber attack? How has this affected your economy and/or security? What types of attacks were they? 2. Does your country’s security or weaponry rely on technology and network systems? 3. Has your country done anything to defend against or prevent cyber attacks? If so, how has it been effective? 4. How does one address a crime with this magnitude of anonymity? What has been done to ensure the protection of your citizens as well as their rights? 5. What has your country done to help its allies or the international community in cyber defense? 14 1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected] Ad Hoc on Terror April 25th, 2015 i Akyeampong, Emmanuel, ‘Diaspora and Drug Trafficking in West Africa: A Case Study of Ghana,’ African Affairs, 104/416 (2005) pp. 429 – 447 ii http://www.loc.gov/rr/frd/pdf-files/NarcsFundedTerrs_Extrems.pdf iii Combs & Slann, “ The Encyclopedia of Terrorism,” Facts on File; 2 Revised edition (March 2007) iv http://www.eurad.net/en/news/supply_reduction/The+narco-terrorism+connection.9UFRjY0z.ips v A GLOBAL OVERVIEW OF NARCOTICS-FUNDED TERRORIST AND OTHER EXTREMIST GROUPS." Library of Congress.N.p., n.d. Web. vi http://web.mit.edu/cis/pdf/Audit_01_06_Vanda.pdf vii https://www.washingtoninstitute.org/uploads/Documents/opeds/4bbcba42e5c8a.pdf viii http://www.bbc.com/news/world-europe-20971100 ix http://fas.org/irp/world/para/docs/mfa-t-pkk2.htm x http://www.nctc.gov/site/groups/farc.html xi http://www.encyclopedia.com/topic/Kabul.aspx xii http://www.newsweek.com/2013/06/12/talibans-new-role-afghanistans-drug-mafia-237524.html xiii http://www.globalresearch.ca/the-spoils-of-war-afghanistan-s-multibillion-dollar-heroin-trade/91 xiv http://www.loc.gov/rr/frd/pdf-files/NarcsFundedTerrs_Extrems.pdf xv http://www.unodc.org/unodc/commissions/CND/ xvi http://www.unodc.org/unodc/en/treaties/single-convention.html xvii http://www.unodc.org/unodc/en/data-and-analysis/bulletin/bulletin_1971-01-01_2_page002.html xviii http://www.unodc.org/unodc/en/treaties/psychotropics.html xix http://www.unodc.org/unodc/en/treaties/illicit-trafficking.html xx http://www.unodc.org/unodc/en/about-unodc/index.html?ref=menutop xxi http://www.unodc.org/unodc/en/terrorism/index.html xxii http://www.unodc.org/unodc/commissions/CND/ xxiii http://www.unodc.org/ungass2016/en/about.html xxiv http://www.opensocietyfoundations.org/explainers/what-ungass-2016 xxv http://www.unodc.org/documents/ungass2016/V0984963-English.pdf http://www.fincen.gov/news_room/aml_history.html xxvii https://www.imolin.org/ xxviii http://www.un.org/press/en/2001/sc7158.doc.htm xxix http://www.un.org/documents/ga/res/46/a46r104.htm xxx http://www.un.org/documents/ga/res/45/a45r148.htm xxxi http://www.unric.org/en/colombia/27013-the-guerrilla-groups-in-colombia xxvi xxxii http://www.cocaine.org/colombia/farc.html xxxiii http://www.ft.com/cms/s/0/62f812b2-17dd-11e4-b842-00144feabdc0.html#axzz3UWUYxaeF http://www.tni.org/briefing/revolutionary-armed-forces-colombia-farc-and-illicit-drug-trade xxxv http://corrosion-doctors.org/AtmCorros/mapColombia.htm xxxvi http://www.loc.gov/rr/frd/pdf-files/NarcsFundedTerrs_Extrems.pdf xxxiv xxxvii http://www.un.org/en/sc/ctc/docs/2013/2013-05-24_ITU-Session%20I.pdf http://www.interpol.int/Crime-areas/Cybercrime/Cybercrime xxxix http://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf xl http://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf xli http://www.un.org/en/sc/ctc/docs/2013/2013-05-24_ITU-Session%20I.pdf xlii http://list25.com/25-biggest-cyber-attacks-in-history xliii http://www.personal.psu.edu/users/j/m/jms6423/Engproj/Types%20of%20Attacks.xhtml xxxviii 15 1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected] Ad Hoc on Terror April 25th, 2015 xliv http://www.nytimes.com/2015/01/04/opinion/sunday/how-my-mom-got-hacked.html?_r=1 http://www.carnegiecyberacademy.com/facultyPages/cyberCrime.html xlvi http://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf xlvii http://www.un.org/en/terrorism/ctitf/index.shtml xlviii http://www.un.org/en/terrorism/ctitf/index.shtml xlix http://www.un.org/en/terrorism/ctitf/pdfs/ctitf_interagency_wg_compendium_legal_technical_aspects_web.pdf l http://www.un.org/en/terrorism/ctitf/pdfs/ctitf_interagency_wg_compendium_legal_technical_aspects_web.pdf li http://www.un.org/en/ga/search/view_doc.asp?symbol=A/RES/60/288 lii http://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf liii http://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf liv http://conventions.coe.int/Treaty/Commun/ChercheSig.asp?NT=185&CM=&DF=&CL=ENG lv http://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf lvi http://www.unodc.org/unodc/en/frontpage/2012/October/unodc-launches-report-to-assist-member-states-tocounter-the-use-of-the-internet-for-terrorist-purposes.html?ref=fs2 lvii http://www.nato.int/cps/en/natohq/topics_78170.htm? lviii http://www.nato.int/cps/en/natohq/topics_78170.htm? lix http://www.un.org/en/ga/search/view_doc.asp?symbol=A/RES/68/119 lx http://list25.com/25-biggest-cyber-attacks-in-history/ lxi http://www.nytimes.com/2009/07/09/technology/09cyber.html?_r=0 lxii http://www.huffingtonpost.com/2009/07/07/massive-cyber-attack-knoc_n_227483.html lxiii https://www.victoriaadvocate.com/news/2009/jul/07/bc-as-skorea-cyber-attack5th-ld-writethru/ lxiv http://www.nytimes.com/2009/07/09/technology/09cyber.html?_r=0 lxv http://www.nytimes.com/2009/07/09/technology/09cyber.html?_r=0 lxvi http://www.nytimes.com/2009/07/09/technology/09cyber.html?_r=0 lxvii http://www.cnn.com/2009/TECH/07/08/government.hacking/index.html?iref=24hours xlv 16 1905 Main Street Huntington Beach, CA 92648 I hbhsmun.webs.com I [email protected]