Head Chair: Darya Ardehali Vice Chair: Ty Cook Moderator: Kaitlyn Heinecke
Position papers will be due on February 5th, 2021. The position paper format, and all other important conference documents, can be found on our conference website, http://lhhsconference.weebly.com/ Email all position papers to our committee email: [email protected]. Feel free to contact us via email if you have any questions or concerns!
Hi! My name is Darya Ardehali and will be your Head Chair at the Laguna Hills High School MUN conference. I’m a Senior and I have been involved in LHHS MUN for four years. At school, I’m involved in Theatre and Film, and I’m President of the Arts Appreciation club and the YAH club. In my free time, I love listening to music and playing with my dog, Albaloo (she’s a standard poodle). I really hope you enjoy the conference this year!
HI delegates! My name is Ty Cook and I will be your vice chair at the Laguna Hills High School 1st DISEC advanced conference. I am a junior at LHHS and I have been in MUN throughout all of high school. I like MUN because it has really given me a new way to perceive the world around me and has greatly changed my viewpoint on the world itself. In school I'm involved in a few clubs and play golf. Out of school I like swimming, going to the beach, and hanging out with my friends. I can't wait to see everyone in committee!
Hello, delegates! My name is Kaitlyn Heinecke and I will be your moderator in the 1st DISEC Advanced committee. I am a sophomore at LHHS, and I absolutely love MUN because of how much of a global perspective it has given me. Some other extracurricular activities I am part of on campus include ComedySportz, ASB, Cappies Theatre Critics, lacrosse, and the Kindness and Red Cross clubs. Some of my favorite hobbies are journaling and going on hikes with my two golden retrievers. I am looking forward to seeing you all in committee!
Topic: Cybersecurity
Background: Cybersecurity can be defined as the process of protecting online networks, programs, and systems from digital attacks. These digital attacks are normally aimed at extorting money, halting normal processes, and interfering with sensitive data. These attacks can use ransomware, phishing, social engineering, and many more techniques. Cybersecurity is becoming more challenging because of more innovative digital attackers and an increasing digital presence by people. Cybersecurity rose in the 1980s with the creation of “The Morris worm”, the first-ever worm distributed by the internet. This computer worm changed the perspective that people had on internet reliability and security. In the 1990s computer viruses were first experienced, and in the 2000s the first breaches of identities and credit cards occurred. Today, the most important part of cybersecurity is the response to attacks because their sophistication increasingly makes preventing them harder. Advanced cybersecurity measures are needed now more than ever because of ever-developing technologies and their expanding digital presences in the modern world.
UN Involvement: In regards to the issue of global cybersecurity threats, the United Nations prioritizes international peace and stability. According to the United Nations Telecommunications Agency, approximately half of all the countries globally, have a strategy for cybersecurity or are in the process of establishing one. To address the issues regarding threats to cybersecurity, several UN meetings have been held and several resolutions have been passed recently. For example, during its 22nd session, the High-level Committee on Programmes (HLCP) agreed to establish the UN Group on Cybercrime and Cybersecurity. This group was created to address program policies and encourage collaboration in hopes of improving cybersecurity internationally. In 2009, the General Assembly adopted Resolution 64/211. Its purpose was to re-evaluate national efforts taken to protect information infrastructures to ensure greater cybersecurity. In order to measure the impact of this issue on a global scale, the United Nations International Telecommunications Union (ITU) launched the Global Cybersecurity Index (GCI) in order to measure the status of cybersecurity internationally. It’s short term goal was to close security gaps that were affecting countries, especially in developing states, whereas, its long term effects included focus on the implementation of cybersecurity on a global scale. In more recent times, the United Nations has urged states to consider national policies to protect them and their people against cybercrime. Along with this the UN has recently established the Cybersecurity and New Technologies Programme which aims to greater protect member states and private organizations from cyberattacks along with mitigating and reducing the effects a cyberattack would have, should one occur.
Bloc Positions: Western Bloc: The Western Bloc as a whole mostly believes in strong cybersecurity laws. Although some countries more than others are at risk for problems than others, strong policies that are in place seem to be effective. (Wilson Center) The U.S. is a good example of the enforcement of good laws, where punishments range from $1,000 worth of damages to a 20-year sentence. (OLR Research Report). The US experiences a large number of cyber attacks each year.
Latin Bloc: The Latin American region is at risk of having issues with cybersecurity. This is mostly due to many countries’ weak economies. (Forbes) These weak economies make heavy international intervention and investment difficult. (Forbes) Weak and under-involved governments in many countries also contribute to Latin America’s vulnerability. (Forbes) On a positive note, technology companies such as Cisco and Microsoft are increasing their presence in Latin America by training more officials and opening a collaboration center in Mexico, respectively. (Forbes)
African Bloc: Like Latin America, Africa is also highly at risk for problems with cybersecurity due to primitive economies and expanding technologies. Specifically, in 2016, 8.8 million South Africans were victims of cybercrime out of a global 602 million cybercrime cases. Unlike Latin America, however, more countries are putting in the effort and trying to make their internet safer. For example, Ghana collaborated with the U.S. to make regulations for the former. (Africa Business Communities) Egypt even landed in the top 10 nations for international collaboration on this end. (ITU) Although Africa still lags behind others in terms of technology, they clearly have the potential to do well in this area, even with limited resources. Asian Bloc: Asia is a mixed bag with cybersecurity performance. Although most countries do place emphasis on cybersecurity, others use that emphasis to compromise their citizens’ security and privacy. (Brookings) The best countries for cybersecurity in Asia plan their next moves and use financial motivation. (Brookings) The best countries also use monitoring, reporting, do research, and have designated domestic committees. (Cyber Security Malaysia)
Questions to Consider
What are the conditions, either economically or politically, that a country is facing that causes them to be vulnerable in cybersecurity?
Compare the risks developed and developing countries faced due to their lack of cybersecurity.
In what circumstances can a country establish strong cybersecurity laws, policies, and programs?
How did developed countries create strong cybersecurity policies?
Even with their limited number of resources, how did struggling, developing countries develop effective cybersecurity policies?
What directions can be implemented to ensure that cyberspace can be better monitored?
What consequences will international actors be held responsible for if they are caught taking part in cybercrimes?
Koigi, Bob. “US, Ghana Explore Cyber Security Partnership.” Africa Business Communities, 24 Aug. 2018, 6:04, africabusinesscommunities.com/tech/tech-news/us-ghana-explore-cyber-security-partnership/.