UNSC - Analysing The Threat of Cyber Warfare in Digital Age
UNSC - Analysing The Threat of Cyber Warfare in Digital Age
UNSC - Analysing The Threat of Cyber Warfare in Digital Age
STUDY GUIDE
INTRODUCTION
Defining cyber-warfare
Cyber warfare encompasses the use of digital technologies to launch attacks on computer
systems, networks, and other digital infrastructures. These attacks, ranging from hacking to
phishing and malware, are aimed at disrupting or destroying digital assets, stealing sensitive
information, or gaining unauthorised access.
Cyber Balkanization
Cyber balkanization, the fragmentation of the internet into isolated groups with shared
interests, poses unique challenges to the openness and inclusivity envisioned for the online
space. The proliferation of online platforms, personalised content, and censorship can
contribute to the creation of echo chambers, limiting exposure to diverse perspectives. This
phenomenon threatens the very essence of the internet as a global, open, and inclusive space.
HISTORY
Emergence of Cyber Warfare
The roots of cyber warfare extend back to the 1980s when the U.S. recognized the potential
of cyber tools for espionage, sabotage, and propaganda³. This marked the realisation phase,
followed by the take-off phase and the modern militarization phase, bringing about
significant shifts like cyber threats. Early instances, such as the Solar Sunrise incident in
1998, the Moonlight Maze operation in 1999, and the Titan Rain campaign in 2003,
exemplify the evolution of cyber warfare.
CURRENT SCENARIO
Cyber warfare, defined as a series of attacks targeting a nation's critical systems, has become
an escalating concern for global security. Nations such as the United States, United Kingdom,
Russia, China, Israel, Iran, and North Korea actively engage in cyber warfare programs,
underscoring the gravity of the situation. The intricate nature of cyber warfare impacts
diverse domains of critical infrastructure, including network security, application security,
and information security. Attribution in cyber warfare remains challenging due to the use of
techniques like proxies, encryption, and malware to conceal identities. The lack of consensus
on the definition, legality, and ethics further complicates efforts to deter cyber threats. Recent
high-profile cyber attacks, such as the SolarWinds hack, Colonial Pipeline ransomware
attack, and Microsoft Exchange Server hack, underscore the vulnerabilities in global
cybersecurity frameworks.
PROPOSED SOLUTIONS
International Cooperation
Strengthening international cooperation is paramount to fostering trust and confidence among
states. A collaborative approach is needed to develop common norms and rules for
responsible behaviour in cyberspace. Sharing information, expertise, and best practices can
bolster the global defence against cyber threats. The urgency for international cooperation is
underlined by the imperative to prevent economic and social disasters. Governments,
industries, academia, and civil society must join forces to curb cyber warfare, restrict
offensive cyber operations, and safeguard the global digital economy.
BLOC POSITIONS
India
India, positioned among third-tier countries in terms of cyber warfare capabilities, faces
frequent cyberattacks from both state and non-state actors, particularly from neighbours
Pakistan and China. India advocates for a multilateral, democratic, and transparent global
governance of cyberspace, supporting the application of international law, including the UN
Charter. The nation has a national cybersecurity policy and a cyber command coordinating
defensive and offensive capabilities.
China
China, known for its cyber prowess, often engages in cyber activities, both defensive and
offensive, with a focus on the United States and its allies. China emphasizes the concept of
cyber sovereignty and stands against the interference of cyberspace in domestic affairs. The
global concern rises due to China's substantial presence in cyberspace, supported by robust
cyber laws and a dedicated cyber auxiliary force.
France
As a leading cyber actor in Europe, France endorses the applicability of international law and
humanitarian law to cyberspace. The country supports the development of a European
cybersecurity strategy and has a national cyber defence strategy, facing threats from
state-sponsored hackers, terrorists, and criminals.
Russia
Russia, a dominant cyber force, conducts sophisticated cyber activities targeting the West.
Russia challenges the applicability of international law to cyberspace, proposing a new treaty
to ban cyber weapons. Advocating for state sovereignty, Russia has a national security
strategy and a cyber doctrine guiding its actions.
United Kingdom
The United Kingdom, a global cyber power, faces serious threats from state and non-state
actors, especially Russia and China. The UK affirms the applicability of international law to
cyberspace, emphasising the need to uphold the rules-based international order. With a
national cyber security strategy and a national cyber force, the UK actively engages in
defensive and offensive cyber operations.
(Note Delegates, some of the links are only meant for light reading and thus are not
highlighted, Only refer to the highlighted sources as valid proof as others may or may not be
accepted as a source of proof in the Council. The decision of the Presiding Officer regarding
the acceptable sources is Final and Binding.)
1. https//www.rand.org/topics/cyber-warfare.html
2. https//www.fortinet.com/resources/cyberglossary/cyber-warfare
3. https//press.un.org/en/2021/sc14563.doc.htm
4. https//www.un.org/counterterrorism/cybersecurity
5. https//www.velocenetwork.com/tech/what-is-cyberbalkanization
6. https//cyberdefensereview.army.mil/Portals/6/Documents/2022_fall/16_Luzzatto.pdf?
ver=zwpuHOOAyHZyINRB7jQCPA%3D%3D
7. https//www.neit.edu/blog/what-is-a-cyber-war-explained
8. https//www.wearethemighty.com/articles/how-cyber-warfare-has-changed-over-time/.
9. https//graquantum.com/a-brief-history-of-cyberwarfare/
10. https//www.cfr.org/cyber-operations/stuxnet
11. https//cisac.fsi.stanford.edu/news/stuxnet.
12. https//www.crn.com/news/security/10-major-cyberattacks-and-data-breaches-in-2023
13. https//www.historyhit.com/the-biggest-cyberattacks-in-history/
14. https//courses.cs.duke.edu/common/compsci092/papers/cyberwar/stuxnet2.pdf.
15. https//www.fortinet.com/resources/cyberglossary/artificial-intelligence-in-cybersecuri
ty.
16. https//nacta.gov.pk/wp-content/uploads/2021/09/Dr.-Saba-Sahar-Areesha-Anwer.pdf
17. https//www.cybersecurityintelligence.com/blog/the-current-state-of-cyber-warfare-29
43.html.
18. http//america.aljazeera.com/articles/2014/1/7/defense-leaders-saycyberwarfaregreatest
threattous.html.
19. https//www.cirsd.org/en/horizons/horizons-spring-2020-issue-no-16/the-need-for-an-i
nternational-convention-on-cyberspace
20. https//safeguardingjustice.org/cybersecurity-cooperation