North Atlantic Treaty Organization - Vmun

1y ago
10 Views
2 Downloads
1.19 MB
38 Pages
Last View : 7d ago
Last Download : 3m ago
Upload by : Annika Witter
Transcription

VMUN 2018North Atlantic Treaty OrganizationBACKGROUND GUIDE

Vancouver Model United NationsThe 17th Annual Session January 19 - 21, 2018Ken HongSecretary-GeneralCallum ShepardChief of StaffJerry JiaoDirector-GeneralAndrew WeiDirector of LogisticsJadine NganUSG General AssembliesEric ZhangUSG Specialized AgenciesDillon RamlochunUSG ConferenceAngelina ZhangUSG Delegate AffairsJerry XuUSG Delegate AffairsAlan ChenUSG FinanceMeghna LohiaUSG ITDear Delegates,My name is Allan Lee and I am honoured to serve as your director of the North Atlantic TreatyOrganization (NATO). As a grade 11 student at St. George’s, I am very excited to participate inVMUN 2018—my fourth VMUN since grade 8. This is my first time directing and I am morethan excited to be doing so. I have participated in MUN since grade 8 in local conferences andeven some international conferences. Throughout all of my experiences in MUN, I haveimproved my grasp on global issues, engaged with other views and perspectives, diversified myset of knowledge, and argued my points to the best of my ability. Other than MUN, I also debate,play music, and volunteer. Along with me are two incredibly competent staff members that willmake this weekend possible — Inaya Ali as your Chair and Roberto Xavier as your AssistantDirector (AD). Inaya is currently a grade 11 student at Port Moody Secondary who enjoysplaying basketball and spends time volunteering. Roberto, who is from Brazil, is a grade 12student at St. George’s who enjoys playing rugby, watching movies. Inaya, Roberto, and I hopeto bring the best experience to all delegates in VMUN 2018.The two topics I have chosen — Cyber Terrorism and Security in Afghanistan — are bothpertinent issues with catastrophic consequences if not dealt with properly. Both issues arenuanced and complex. As NATO, it is of utmost importance that these issues are treateddelicately with respect to those affected. Thus, it is important that every delegate contributeand discuss a variety of ideas to create the most successful resolution possible to counter thosewho actively cause harm to innocent lives and protect our allies.I wish everyone the best of luck in preparation for this conference. Please do not hesitate tocontact myself or the staff members. We are incredibly excited for VMUN 2018 and we wisheveryone the best experience possible.Sincerely,Allan LeeNATO Director

Position Paper PolicyWhat is a Position Paper?A position paper is a brief overview of a country’s stance on the topics being discussed by a particularcommittee. Though there is no specific format the position paper must follow, it should include a description ofyour positions your country holds on the issues on the agenda, relevant actions that your country has taken,and potential solutions that your country would support.At Vancouver Model United Nations, delegates should write a position paper for each of the committee’s topics.Each position paper should not exceed one page, and should all be combined into a single document perdelegate.FormattingPosition papers should:— Include the name of the delegate, his/her country, and the committee— Be in a standard font (e.g. Times New Roman) with a 12-point font size and 1-inch documentmargins— Not include illustrations, diagrams, decorations, national symbols, watermarks, or page borders— Include citations and a bibliography, in any format, giving due credit to the sources used inresearch (not included in the 1-page limit)Due Dates and Submission ProcedurePosition papers for this committee are mandatory. The submission deadline is January 7th, 2018.Once your position paper is complete, please save the file as your last name, your first name and send it as anattachment in an email, to your committee’s email address, with the subject heading as your last name, yourfirst name — Position Paper. Please do not add any other attachments to the email or write anything else in thebody.Both your position papers should be combined into a single PDF or Word document file; position paperssubmitted in another format will not be accepted.The email address for this committee is nato@vmun.com.

Countering Cybercrime. 6Overview . 6Timeline . 6Historical Analysis . 8Past UN and International Involvement . 10International Criminal Police Organization (INTERPOL) . 10United Nations (UN). 10Private Entities. 10Case Study: The Prosecution of Kevin Mitnick . 11Current Situation. 11Types of Cyber Attacks . 11Difficulties in Fighting Cyberterrorism . 12State-sponsored Attacks . 13Criminal Organizations. 13Hacktivism . 13Possible Solutions . 14Cyber Weapons . 14Increased Surveillance/Restricted Online Access . 14Increased NATO Presence and Support . 14Cooperation with Private Entities. 15Bloc Positions. 15Baltic States . 15European States . 15Major Powers . 16Discussion Questions . 16Additional Resources . 16Bibliography . 18Security in Afghanistan . 22Vancouver Model United Nations 20184

Overview . 22Timeline . 22Historical Analysis . 24Past UN and International Involvement . 26The War on Terror . 26North Atlantic Treaty Organization (NATO) . 27Current Situation. 28Terrorist Presence . 28Governmental Failures . 29Opioids . 30Foreign Support . 31Possible Solutions and Controversies . 31Increased Military Presence . 31Governmental Reforms . 32Limiting the Opium Industry . 32Diplomatic Solutions . 32Bloc Positions. 33Major Powers . 33Less Affected States . 33European States . 33Discussion Questions . 34Additional Resources . 34Bibliography . 35Vancouver Model United Nations 20185

Countering CybercrimeOverviewIn the 21st century, war and conflict don’t merely exist in the form of military engagement on land, sea, or air.In a digital age where the world is increasingly more reliant on computers and the internet, technology, thoughefficient and productive, bears several risks as well. Cyber attacks are becoming more prevalent as technologyadvances. Consequently, NATO is a victim as well, facing “an average of 500 cyber attacks per month” in 2016. 1Cyber attacks take place in multiple forms ranging from phishing, an attempt to “dupe recipients to disclosingsensitive data”, to “distributed denial of service (DDoS), where servers are swamped with so much data that theyoverload and collapse.” 2 Beyond the destructiveness of cyberterrorism, identifying the perpetrator is difficult aswell. In many instances, hackers are completely anonymous and thus hard to track down. Furthermore, themotives behind hackers vary as well. The causes of NATO system shutdowns can range from hacktivism toorganized crime and state-sponsored attacks. The variety of cyber attacks is significant because it can indicatethe source, motive, and possible area of attack. However, the easy access to anonymity and difficulty indistinguishing cyber attacks makes cyberterrorism much more efficient.In response, NATO has already implemented several measures against cyber attacks. The establishment of theNATO Cooperative Cyber Defence Centre of Excellence, for example, has researched and improved its datasecurity and those of its allies. Furthermore, NATO has cooperated with the EU through improving cybersecurityand “boosting counter-hybrid capabilities” 3 Despite NATO’s many attempts to strengthen its digital security,such measures have not all been successful. Several member states in NATO are more vulnerable because theyeither lack the infrastructure or knowledge to strengthen their databases. Furthermore, given the rapid andoverwhelming nature of cyber attacks, NATO often fails to be agile enough to counter cyberterrorism.4 Thosewho oppose NATO will seek any method possible to weaken NATO’s infrastructure; it is of utmost importancethat NATO members cooperate and find a solution.TimelineNovember 2, 1988 — The Morris Worm, one of the world’s first computer worms to be distributed over theinternet, is accidentally created by Cornell graduate Robert Tappan Morris. The worm was originally made togauge the size of the internet; however, a mistake in the production of the worm made it hostile to networks andcomputers. The Morris Worm set a precedence for hacking as the first major computer attack which led todisastrous effects.Browne, R. (2017, January 19). NATO: We ward off 500 cyberattacks each month. Retrieved June 24, 2017, 0-cyberattacks-monthly/index.html2Cendrowicz, L. (2014, October 30). Nato frontline in life-or-death war on cyber-terrorists. Retrieved June 24, 2017, nato-frontline-cyber-terrorists-war3Sen, A. K. (2017, March 8). British Official Calls for Greater NATO-EU Cybersecurity Cooperation. Retrieved June 24, 2017,from rsecurity-cooperation4Correspondent, A. B. (2017, February 17). NATO 'not agile enough' to stop Russian hacking. Retrieved June 24, 2017, to-stop-russian-cyber-attacks-107716301Vancouver Model United Nations 20186

April 2007 — In a dispute with Russia regarding a removal of a war memorial, Estonia falls victim to severalcrippling cyber attacks on government institutions and infrastructures, which “brought down key financial andstate systems.” 5 Analysts explain that such attack was orchestrated by several hundreds of thousands ofcomputers; though there exists no clear evidence proving the perpetrators of such attacks, many pinresponsibility on the Kremlin, which the Russian government denies.May 14, 2008 — Located in Estonia, the Cooperative Cyber Defence Centre of Excellence (CCDCOE) wasestablished by seven nations: Estonia, Germany, Italy, Lithuania, Latvia, Slovak Republic, and Spain. Theorganization, in cooperation with the Estonian national defense administration, aims to protect and enhancecybersecurity systems of all NATO member states.July 20, 2008 — Cyberterrorism in the form of DDoS attacks is used against the Georgian’s internet servers andcompanies, which crippled its limited internet infrastructure and cut off access to key services in Georgiansociety. Though there exists no clear evidence that points to the perpetrator, the Georgian government blamesRussia, specifically “a shadowy St. Petersburg-based criminal gang known as the Russian Business Network.”6Such allegations are denied by the Russian government.May 10-11, 2010 — The CCDCOE, in cooperation with NATO, held its very first international cyber defenseexercise known as the “Baltic Cyber Shield.” 19 nations including Poland and Latvia sent representatives toTallinn to attempt to defend computer networks under different “cyber-attack-related crisis.” 7 The joint exercisesuccessfully improved cyber defense knowledge on mechanisms of defense and varying hostile attacks.November 16, 2011 — The United States and Poland officially join the CCDCOE. 8January 2011 — Three key departments of the Canadian government — the Finance Department, TreasuryBoard, and Defense Research and Development Canada — were penetrated by foreign hackers whose IPaddresses were located in China. However, there was no clear evidence that China was behind such attacksbecause hackers could disguise cyber attacks through Chinese servers. These attacks had devastating effects onCanada as hackers gained access to classified data which led to the shutdown of crucial governmentaldepartments.July 11, 2012 — The NATO Communications and Information Agency (NCI) is established in several NATOmember states as a secure platform to “connect the alliance, defend its network, and provide rapid support toNATO operations and missions.” 9 Through surveillance and providing support for the development of cybersecurity infrastructure, the NCI plays a crucial role in combating cyberterrorism.February 10, 2016 — Facing similar challenges and threats in online security, NATO and EU cooperated andreached an agreement to counter cyberterrorism together. The NATO Computer Incident Response CapabilityHeath, N. (2009, August 25). Nato: Cyber terrorism 'as dangerous as missile attack'. Retrieved June 24, 2017, ism-as-dangerous-as-missile-attack/6Markoff, J. (2008, August 12). Before the Gunfire, Cyberattacks. Retrieved July 8, 2017, 3cyber.html7Jakimczyk, J. (2016, April 22). Largest Cyber-Security Exercise in the World is Being Held in Tallinn. Retrieved July 6, 2017, llinn8ERR, E. (2011, November 15). US, Poland Join NATO's Cyber Defense Center. Retrieved July 6, 2017, s-cyber-defense-center9NCI Agency. (n.d.). Connecting Forces. Retrieved July 8, 2017, from IAgency.aspx5Vancouver Model United Nations 20187

(NCIRC) and the Computer Emergency Response Team of the European Union (CERT-EU), bothestablishments that aim to protect their respective organizations from cyber attacks, agreed to exchangeinformation and practices that better protect online networks. Considered a milestone in NATO-EUcooperation, this agreement strengthens the cyber security of both organizations. 10June 14, 2016 — In the midst of a contentious US presidential election, Russia, allegedly, involves itself throughcyber attacks on the servers of the Democratic National Committee and “stole opposition research on DonaldTrump.” 11 Hesitant to publicly blame Russia due to fear of the geopolitical consequences, private securitycompanies such as Crowdstrike held investigations into such attacks and revealed that the patterns of the cyberattacks are similar to previous hacks to US governmental institutions.May 13, 2017 — Germany’s railway infrastructure was struck by a series of cyber attacks which halted theirtransportation system. Using legitimate documents such as emails and messages to disguise malicious viruses,the perpetrators of such crimes hid malware within those messages that is immediately triggered when thedocument is opened. This is a form of attack known as phishing which restricts user access to their owndocuments; victims must pay up to “ 600 to restore access.” 12 No hackers have been identified for these attacks.Historical AnalysisDigital attacks became common in the 1980s as is shown by the release of the Morris Worm in 2988, which wasthe world’s first computer worm to be distributed over the internet and caused significant damage to over twothousand computers, costing the US Government Accountability Office 100,000 to 10,000,000 and affectingaround 6000 computers. 13 As technology advanced, the methods and efficiency of hackings progressed as well.Historically, hacking was considered a shortcut for programmers to increase the efficiency of computers. In fact,the word “hacker” itself was historically defined as a person who explores, which was attributed to programmerswho explored the different parts of computer operating systems. Given that past computing systems were largeand inefficient, programmers used hacks to access the internal organs of a computer to increase its efficiency andcapability to their needs. However, the reputation of hacking turned for the worse in the 1980s when skilledhackers manipulated computers for their “own questionable gains,” such as the 1989 attack against the USgovernment. The attack came from West Germany and the hackers sold information and software to the KGB. 14Phone phreaking, a predecessor to current day computer hacking that came about in 1957, is the practice ofhacks and manipulations of telephone lines. Phone phreaking rose to prominence in the 1960s and 70s, and seta precedent for the exploitation of technology. In 1957, a young boy named Joe Engressia who has perfect pitch,discovered that “whistling the fourth E above middle C, at a frequency of 2600 Hertz (Hz), would stop a phoneNATO. (2016, February 10). NATO and the European Union enhance cyber defence cooperation. Retrieved July 8, 2017, fromhttp://www.nato.int/cps/en/natohq/news 127836.htm11Kopan, T. (2016, June 14). Russian hackers stole Dems' Trump files, firm says. Retrieved July 8, 2017, p/12Graham, C. (2017, May 13). Cyber attack hits German train stations as hackers target Deutsche Bahn. Retrieved July 8, 2017,from utsche/13Kelty, C. (2012, May 09). The Morris Worm. Retrieved July 13, 2017, from https://limn.it/the-morris-worm/14Devitt, M. (2001, June 18). A Brief History of Computer Hacking. Retrieved July 18, 2017, rticle.php?id 18078.10Vancouver Model United Nations 20188

call.” 15 John Draper, a hacker involved in the phone phreak community, cooperated with Engressia anddiscovered that, interestingly, a toy whistle included in boxes of Cap’n Crunch cereal boxes created the same2600 Hz pitch that could be used to control phone systems. On the basis of a toy whistle, the blue box wasdeveloped that was able to control the audio frequencies of the connection between phone operating systemsand the phone. This means that a single blue box was able to disguise personal phone lines as operating systemsin phone networks such as AT&T and be able to dial to any number that user wishes. In other words, users ofthe blue box were able to manipulate phone lines and make free calls to any number they desire. Interestingly,Steve Jobs and Steve Wozniak worked on the blue box prior to the establishment of Apple; the two creativeinventors even used a blue box to call the pope. 16 However, certain instances of phreaks also had disastrous effectsas well. In the 1970s, Draper was able to retrieve the CIA emergency line to the White House and had directaccess to President Nixon. Though phone phreaks may seem efficient for phone users, it also had associatedharms that allowed owners of the blue box to gain great access to the private lives and information of others. 17Hacking groups and organizations rose to prominence quickly in the late 1980s and early 1990s. Many groupsexisted, ranging from amateur groups such as The 414’s, which only comprised teenagers, to the German hackingorganization Chaos Computer Club, which held annual congress meetings that hosted over 12,000 people. 18 Suchgroups were threatening given their digital capabilities. Despite the young age of the members of The 414’s, “theygained access to different banks, hospitals, and even the Los Alamos Research Laboratory,” which marked thestart of an FBI investigation and the prosecution of over 60 charges of computer intrusion. 19 Due tounderdeveloped technology at the time, becoming a hacker was more difficult in the past than compared totoday. A hacker group was very exclusive and the process of becoming a member was rigorous. This competitionin membership raised the standards of hacking abilities of a group, which made their capacity of digital intrusioneven greater.Competition between groups also became a result of various growing hacker groups. Specifically, in 1989, theMasters of Deception (MOD), a notorious hacker group at the time, had a conflict with a splinter group thatbecame the Legion of Doom (LOD); the conflict was known as the Great Hacker War. Internal disputes sparkedthe beginning of the battle, where simple disagreements between members quickly spiraled into sentiments ofanimosity and hatred. Their conflict ranged from simple prank calls to disastrous hacks that affected globalinternet connections and phone lines. Though the conflict was contained between the two groups, the impactsof such battle were felt by American society. Their cyberattacks had disastrous effects on information security;the two hacker groups accessed confidential data such as credit reports and governmental secrets to gain fameWilliams, H., & Jager, C. (2015, November 17). The Hacker Who Inspired Apple: John 'Captain Crunch' Draper. Retrieved July18, 2017, from nbach, C. (2015, December 23). Blue Box – Why Steve Jobs and Steve Wozniak hacked the phone network. Retrieved July17, 2017, from /blue-box17Lapsley, P. (2013, February 20). The Definitive Story of Steve Wozniak, Steve Jobs, and Phone Phreaking. Retrieved July 17,2017, from obs-andphone-phreaking/273331/18Deutsche Welle. (2015, December 25). Chaos Computer Club: Europe's biggest hackers' congress underway in Hamburg News DW 28.12.2015. Retrieved July 18, 2017, from 61019Torres, R. (2016, May 09). The 414's: The beginning of hacking. Retrieved July 18, 2017, from hacking15Vancouver Model United Nations 20189

and sell for profit. Eventually, the two groups fell after federal investigations led to the prosecution of severalmembers of both groups, which led to the ending of one of the greatest hacking instances in history. 20Past UN and International InvolvementIn the wake of the increasing cyber attacks that are growing in destructiveness, several organizations, inconjunction with private entities, have taken action to fight cyberterrorism through tracing the perpetrators ofsuch attacks and establishing stronger digital security and defense.International Criminal Police Organization (INTERPOL)INTERPOL is an international organization that aims to fight transnational crime, including cyberterrorism.Specifically, INTERPOL strives to detect and prevent cyber crimes from occurring through the establishment of“the INTERPOL Global Complex for Innovation (IGCI) in Singapore,”21 which is a research facility that openedin 2014 that not only investigates cyber crimes and analyzes trends of cyber attacks, but also cooperates withinternational and private corporations to retrieve and decipher data through information sharing andcoordination in its operations. 22 As well, INTERPOL brings together cybersecurity experts to analyze and gatherinformation and trends in regards to cybercrimes, which allows INTERPOL to provide coherent, nuancedintelligence that can be utilized in strengthening a nation’s digital defense. Given that cyberterrorism is aninternational crime, INTERPOL combats the crime with international efforts.United Nations (UN)The United Nations Commission on Crime Prevention and Criminal Justice (CCPCJ), an organ of the UN, hastaken several proactive measures to prevent and limit the effects of cyberterrorism through the establishment ofclear legislation against cyberterrorism and the distribution of aid in training and infrastructure to helpdeveloping states strengthen its cyber security. In particular, UNGA Resolution 65/320 (A/RES/65/320) wasadopted by the CCPCJ which aims to “enhance international cooperation” through providing “technicalassistance” to counter cyberterrorism. 23 There were many other resolutions other than UNGA Resolution 65/320(A/RES/65/320) that were adopted by the CCPCJ to address the complex issue of cyber crime.Private EntitiesThough intergovernmental organ

North Atlantic Treaty Organization. Vancouver Model United Nations The 17th Annual Session January 19 - 21, 2018 Dear Delegates, My name is Allan Lee and I am honoured to serve as your director of the North Atlantic Treaty Organization (NATO). As a grade 11 student at St. George' s, I am very excited to participate in

Related Documents:

The North Atlantic Treaty Organization is an intergovernmental military alliance consisting of 28 European and North American countries. It was established with the signing of the Treaty of Washington on April 4th 1949. The Washington Treaty was signed by its twelve founding members as tensions grew between East and West.

For example, North Atlantic Treaty Organization's North Atlantic Treaty is triggered in response to an attack on Europe or North America. In the case of the U.S.-Japan Security Treaty, the treaty zone is "the territory under the administration of the Nation of Japan." However, the U.S.-Japan Security Treaty has areas called "zones of .

"(3) the term 'NATO' means the North Atlantic Treaty Organization; "(4) the term 'NATO/CFE country' means a member country of NATO that is a party to the CFE Treaty and is listed in paragraph 1(A) of article II of the CFE Treaty within the group of States Parties that signed or acceded to the Treaty of Brus sels of 1948 or the Treaty of .

North Atlantic Treaty Organization committee at AUN XVIII. I am currently a senior in the Academy for the Advancement in Science and Technology at the Bergen County Academies, and have participated in Model UN since my freshman year. My first conference was at AMUN XV in the North Atlantic Treaty Organization committee, and I have since

74 BAB III GAMBARAN UMUM NATO (North Atlantic Treaty Organization) Dalam bab ini penulis akan menjelaskan beberapa pembahasan, Pertama penulis akan menjelaskan profil North Atlantic Treaty Organization (NATO). dalam bab ini akan dijelaskan sejarah terbentuknya NATO, alasan negara-negara Eropa untuk membentuk aliansi, struktur NATO dan cara kerja struktur dalam NATO.

NATO04 North Atlantic Treaty Organization; Brussels Belgium; Operations - Situational Awareness Integration Team (SITCEN) 01.03.2023 - 31.08.2023 x NATO05; North Atlantic Treaty Organization Brussels; Belgium Arms Control, Disarmament and Weapons of Mass Destruction 01.03.2023 - 31.08.2023 x; NATO06 North Atlantic Treaty Organization; Brussels .

sels Treaty Organization. It was also the first step in the process leading to the signature of the North At-lantic Treaty in 1949 and the creation of the North Atlantic Alliance. The Brussels Treaty is the found-ing document of the present day Western European Union (WEU). Negotiations culminated in the signature of the Trea-

anatomi tulang berdasarkan gambar berikut ini! Diaphysis: This is the long central shaft Epiphysis: Forms the larger rounded ends of long bones Metaphysis: Area betweent the diaphysis and epiphysis at both ends of the bone Epiphyseal Plates: Plates of cartilage, also known as growth plates which allow the long bones to grow in length during childhood. Once we stop growing, between 18 and 25 .