0% found this document useful (0 votes)
233 views8 pages

Cyber Warfare Research Report

The document discusses measures to combat cyber warfare at the United Nations Advisory Panel on the Internet (APQi). It provides background on cyber warfare, defines key terms, and outlines the history of UN discussions and resolutions on the issue. It also profiles the positions and cyber capabilities of several major countries and lists some relevant cyber attacks. Finding solutions is difficult as it is hard to attribute attacks and ensure accountability among states.

Uploaded by

Quang Đào Vũ
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
233 views8 pages

Cyber Warfare Research Report

The document discusses measures to combat cyber warfare at the United Nations Advisory Panel on the Internet (APQi). It provides background on cyber warfare, defines key terms, and outlines the history of UN discussions and resolutions on the issue. It also profiles the positions and cyber capabilities of several major countries and lists some relevant cyber attacks. Finding solutions is difficult as it is hard to attribute attacks and ensure accountability among states.

Uploaded by

Quang Đào Vũ
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

DaviMUN 2015

Research Report

Forum: Advisory Panel on the question of the Internet (APQi)


Issue: Measures to combat Cyber Warfare
Student Officer: Andy Whelan (139369@ishweb.nl)
Position: President of the Advisory Panel

Introduction
Cyber warfare is one of the most modern types of warfare in our society. Cyber
warfare is Internet-based conflict involving politically motivated attacks an enemy's
computer and information systems. Cyber attacks can be detrimental to a governments
national privacy, and a menace to the security of civilians. These attacks can disable or
disrupt official websites, networks, services and steal or amend classified data among
countless other possibilities. With the possession of such private data, an opponent can
see enemys war tactics, military possessions and allocations, and can create defections
in military equipment such as aircraft.
Cyber warfare can involve various attack methods such as sabotage or espionage
and/or security breach. When speaking of sabotage, the military and financial computer
systems are at risk for the disruption of normal operations and equipment, such as
communications, fuel, power and transportation infrastructures. When speaking of
espionage and/or security breaches, illegal exploitation methods are used to disable
networks, software, computers or the Internet to steal or acquire classified information
from rival institutions or individuals for military, political or financial gain. 1.
The United Nations have been involved in trying to resolve the issue of cyber warfare
since 1998. For instance, the First Committee (GA1) has been actively examining the
Developments in the Field of Information and Telecommunications in the Context of
International Security for years. 2. Numerous resolution have been put forward in the past
regarding cyber warfare and cyber attacks, most of which came from the Russian
Federation. Most of these resolutions passed with a majority vote in favor, with the
exception of the USA and various other Western nations who voted against them. It has
become clear over the past years that two main diverse opinions have emerged as a
result of the issue of cyber warfare. One thing that is certain is that cyber security has
become one of the major national security priorities over the past years, but is an issue
that still remains active.

Definition of Key Terms


Cyber-warfare
There is no international definition of cyber-warfare, some experts even argue that
there is no such thing as cyber-warfare, but the commonly accepted definition created
by Clarke, a U.S. Government security expert is: actions by nation-states to
penetrate another nations computers or networks for the purposes of causing
damage or disruption."2 This is mostly done by espionage and, sabotage in terms of
worms, viruses or Trojans.
Espionage
Cyber espionage is defined as
the use of computer networks to gain forbidden access to confidential information,
typically that held by a government or other organization.

National security breaches


A security breach is the copying, transmitting, viewing, theft or use of sensitive,
protected or confidential information or data by an individual or a group who doesnt
have the authorization to do so. When spoken of in terms of a national security
breached, it refers to the breaching of confidential data or information possessed by
the government of a state.
Sabotage
Sabotage is mainly used for disruption or even destruction of certain systems, in this
case computer controlled systems. This term is especially important when talking
about infrastructural damage.
Denial-of-service attack
A denial-of-service attack is the deliberate act or attempt to indefinitely or temporarily
interrupt or suspend services of a host connected to the Internet to make the network
resource unavailable to its intended users. This is often done by overwhelming the
online service with traffic from multiple sources. Denial-of-service attacks can range
from attacks on banks to attacks on news websites.

Electrical power grid


An electrical power grid is an interconnected network that delivers electricity between
two places or sources. Two power sources are connected by high-voltage
transmission lines, which in turn carry the power to demand centers and distribution
lines. Electrical grids are sometimes used as communication infrastructure systems.
Sometimes, attacks are done on these infrastructures to interrupt or hinder
communication facilitated by these electrical grids. However, this type of
communication technology is considered to be outdated, and attacks on these
infrastructures are scarce.

History
The UN began discussing the issue of cyber warfare in 1998, where resolutions
concerning this topic were proposed. The Russian Federation proposed a resolution, which
was later adopted as resolution 53/70 in January of 1999. Its main points were:
recognition of the military potential of information and communication technology for the first
time as well as an expression of concern about the use of such technology inconsistent with
the objectives of maintaining international stability and security;
clarifying the need to prevent cyber-crime and cyber terrorism;
inviting all member states to propose their opinion towards this topic.
The Russian Federation further proposed resolutions to specify the generality of resolution
53/70. The resolution proposed in 2005 was largely popular on behalf of member states, and
the USA was the only state to vote against it.
The USA and other western states were generally against the passing of resolutions
regarding cyber warfare, as they believed employing censorship on websites to protect
national security would thwart the liberty of the internet. However, other states believe that
censorship is the only effective way of combating cyber warfare and attacks. These two
different points of view have created big debate within the UN, and a final decision has not yet
been agreed upon on behalf of the member states.

Key Issues
Cyber warfare can both inflict upon nations sovereign rights and security, and can be
detrimental towards the security and civil liberties of civilians. Primarily, cyber warfare can
target both civilian and military resources. For instance, if the US national power grid were to
be attacked, not only would this impede factories from continuing their military developments,
but also it would inflict upon peoples lives and could cause severe accidents.

It is often hard to determine who launched certain cyber attacks, meaning governments
cannot be help accountable for any attacks. If governments cannot be held accountable for
cyber attacks, it can become very difficult to mutually come to an agreement to stop all form
of cyber attacks on behalf of member states.

Major Parties involved

United Kingdom
A cyber-warfare operation was launched by MI6 and GCHQ in an attempt to
disrupt efforts by al-Qaeda in the Arabian Peninsular. On 12 November 2013, financial
organisations in London conducted cyber war games dubbed 'Waking Shark 2 to
simulate massive internet-based attacks against bank and other financial organisations.
United States
The USA uses cyber warfare as a form warfare and military strategy. In 2010 the
Pentagon formally recognized cyberspace as a new domain in warfare, which has become
just as critical to military operations as land, sea, air, and space, according to William J. Lynn,
U.S. Deputy Secretary of Defense. The United States used cyber attacks for tactical
advantage in Afghanistan. In fact, on the official NSA website (https://www.nsa.gov/) they
state that their mission is to gather foreign intelligence and to defend U.S. government
information systems. Communications have evolved from the past. Today, the IT
infrastructure is digital from start to finish. America's national security information depends on
technology as never before.
India
India has often been a victim of minor cyber breaches in the past. A high-profile cyber
attack on 12 July 2012 breached the email accounts of about 12,000 people, including those
of officials from the Ministry of External Affairs, Ministry of Home Affairs amongst others. India
recently recognized that it was imperative for them to put in place a cyber security system.
India, to date, has no cyber warfare policy.
South Korea
In March 2013, South Korea's major banks Shinhan Bank, Woori Bank and
NongHyup Bank as well as many broadcasting stations KBS, YTN and MBC were
hacked and more than 30,000 computers were affected. Claims were made that it was North
Korea who performed these cyber attacks on South Korea.
South Korea recently claimed that they would attempt to improve cyber security in the hopes
of preparing itself for a possible cyber attack.

Relevant events
(There are more events regarding cyber attacks than those listen bellow)
March 1998

The USA hacks into Serbia's air defense system to


compromise air traffic control and facilitate the bombing of
Serbian targets.

April 2007

Estonian ministries, banks and media come under a cyber


attack from Russia. At least 150 people were injured due to
riots on the streets.

September 2007

The USA speculates that Israel used cyberwarfare when they


carried out an airstrike on Syria.

26th November 2010,

Websites belonging to the Pakistan Army Ministry of Foreign


Affairs and the Ministry of Finance, amongst others are
hacked by the Indian Cyber army as an act of revenge
against the Mumbai terrorist attacks.

4th December
2010

Indias top investigating agency website, the Central Bureau


of Investigation is hacked by the Pakistan Cyber Army.

July 2011

South Korean company Sk communications is hacked,


resulting in the theft of the personal details of up to 35 million
people. Is believed to be part of a bigger hacking effort.

Possible Solutions
Finding a measure to combat cyber warfare is truly a difficult task for it is difficult to
Part of the root of the issue surrounding cyber warfare is the misconception of the
definition of the term, and the different interpretations of what a cyber attack is. As a form to
advance the measures to combat cyber warfare, a universal definition of cyber warfare could
be adopted. Once a universal definition has been put in place, it is easier to pin point when a
cyber attack has occurred, and factionary measures can then be taken.
Furthermore, an organization could be created with the purpose of overseeing and
monitoring international computer systems to control possible cyber attacks. This organization
would also play a big role in the solving of cases of cyber attacks between two or more
parties. This organization could track the activities of the parties involved and trace the attack

back to the perpetrator. Some member states may be in favor of the emplacement of such
organization, and may argue that putting an end to cyber warfare is crucial for the security of
civilians and for the privacy of governments, others may be against it, and may argue that it
would be an infringement upon national sovereign rights and national and civil privacy.
However, it must be kept in mind that even with the aid of an organization, it is difficult to hold
the government accountable for an attack, as it is impossible to know if a regular civilian or a
government official performed the attack.

Bibliography
Merriam-Webster. Merriam-Webster, n.d. Web. 21 Feb. 2015.
"Data Breach." Wikipedia. Wikimedia Foundation, n.d. Web. 21 Feb. 2015.
http://en.wikipedia.org/wiki/Data_breach
"DoS Attack - Denial of Service Attack." What Is Denial of Service (DoS) Attack? Webopedia.
N.p., n.d. Web. 20 Feb. 2015.
Wikipedia. Wikimedia Foundation, n.d. Web. 21 Feb. 2015.
http://en.wikipedia.org/wiki/Cyberwarfare
"Site-wide Navigation." Cyber Warfare. N.p., n.d. Web. 19 Feb. 2015.
http://searchsecurity.techtarget.com/definition/cyberwarfare
"How Does Cyber Warfare Work?" Forbes. Forbes Magazine, n.d. Web. 21 Feb. 2015
http://www.forbes.com/sites/quora/2013/07/18/how-does-cyber-warfare-work/
"Here's How Cyber-Warfare Started And Where It's Going." Business Insider. N.p., n.d. Web.
21 Feb. 2015.
www.webopedia.com

"Arms Control Today." The UN Takes a Big Step Forward on Cybersecurity. N.p., n.d. Web. 21
Feb. 2015.
www.armscontrol.org

"Cybersecurity: A Global Issue Demanding a Global Approach | UN DESA | United Nations


Department of Economic and Social Affairs." UN News Center. UN, n.d. Web. 17 Feb. 2015.
http://www.un.org/en/development/desa/news/ecosoc/cybersecurity-demands-globalapproach.html
"Towards Cyberpeace: Managing Cyberwar Through International Cooperation | UN
Chronicle." Towards Cyberpeace: Managing Cyberwar Through International Cooperation |
UN Chronicle. N.p., n.d. Web. 22 Feb. 2015.
http://unchronicle.un.org/article/towards-cyberpeace-managing-cyberwar-throughinternational-cooperation/

"What Is Cyberwarfare (Cyber War)? - Definition from


Techopedia."Techopedias. N.p., n.d. Web. 22 Feb. 2015.
http://www.techopedia.com/definition/13600/cyberwarfare

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy