shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the...

24
DISEC SHMUN V Topics: 1. Cyber Security 2. International Regulation of Lethal Autonomous Weapons Systems Presidents:

Transcript of shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the...

Page 1: shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the United States (DOD) in order to use it as a mean of communication between different

DISECSHMUN V

Topics:

1. Cyber Security

2. International Regulation of Lethal Autonomous Weapons

Systems

Presidents:

Martín Rodriguez Velasquez

Laura Delgado Arroyave

Page 2: shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the United States (DOD) in order to use it as a mean of communication between different

Index

1. Welcoming Letter IV

2. About the Committee V

2.1 General Information V

2.2 Purpose V

3. Topic A: Cybersecurity VI

3.1 Introduction VI

3.2 Concepts VI

3.3 Historical Background VII

3.4 Present Situation IX

3.5 previous resolutions XI

4. Topic B: International Regulation of Lethal Autonomous Weapons Systems. XII

4.1. Introduction XII

4.3 Historical Background XII

4.4 Present situation XV

4.5 Possible missions for autonomous weapons systems XVII

5. Qarmas: XVIII

5.1 Topic A: Cybersecurity. XVIII

5.2 Topic B: International Regulation of Lethal Autonomous Weapons Systems.

XVIII

SHMUN V DISEC

II

Page 3: shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the United States (DOD) in order to use it as a mean of communication between different

6. Useful links XIX

7. Bibliography XIX

8. List of countries XXI

SHMUN V DISEC

III

Page 4: shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the United States (DOD) in order to use it as a mean of communication between different

1. Welcoming Letter

The world is a changing place, each day we see how the architecture of a new building is different from the one that already existed, how the global warming is taking power, and how man is always trying to innovate.Technology is one great example of the last one, because if we pay attention we will be able to realize the huge differences between, how we used to do things and the ways we use nowadays.Convinced by the need of conscience about our society in constant transformation, it is our pleasure to welcome you to Montemayor Model of United Nations, for us, Martin Rodriguez and Laura Delgado it’s an honor to have you present in the United Nations Disarmament and International Security Committee.

As your presidents, we hope you to have an interesting and productive experience that contributes to your academic and personal development.From you, we expect not only an adequate process of investigation and preparation, but also a high level of argumentation, and speech that will make the committee find solutions to real problems which are taking place nowadays. Our strongest desire is that you enjoy the committee and understand the importance of being heard of being respected and of defending your country ́s position along the debate.

Always remember, this is not the world we are condemned to live in, this is the world we've been proposed to change, a Nation is not great because of its tools, but because of how it decides to use them.

We are here for any doubt you can have,

thoughtfully,

Martin Rodriguez Velasquez

Laura Delgado Arroyave.

SHMUN V DISEC

IV

Page 5: shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the United States (DOD) in order to use it as a mean of communication between different

2. About the Committee

2.1 General Information

In light of the events in Hiroshima and Nagasaki, the first resolution by DISEC was created in 1946 to address international concerns for the “Establishment of a Commission to Deal with the Problems Raised by the Discovery of Atomic Energy.”The First Committee deals with disarmament, global challenges, and threats to peace that affect the international community and seeks out solutions to the challenges in the international security regime.

It considers all disarmament and international security matters within the scope of the Charter or relating to the powers and functions of any other organ of the United Nations; the general principles of cooperation in the maintenance of international peace and security, as well as principles governing disarmament and the regulation of armaments; promotion of cooperative arrangements and measures aimed at strengthening stability through lower levels of armaments.

The Disarmament and International Security Committee is the First Committee of the United Nations General Assembly. It includes all nations that are United Nations Member States. DISEC deals with issues regarding the promotion, establishment, and subsequent maintenance of global peace while simultaneously working to prevent weapons proliferation. Under the UN Charter, all member states and observers of the United Nations are automatically part of the first committee of the General Assembly, and have an equal vote. Documents drafted by this committee require a simple majority to be passed. Like the other committees of the United Nations General Assembly, DISEC is unable to impose sanctions, authorize armed intervention, or pass binding resolutions. With the increase of weapons and growing security threats, DISEC continues to grow in importance and becomes a significant part of resolving international crisis.

2.2 Purpose

The United Nations is an organization that brings together countries that work towards the same objectives: world peace, social, economic and cultural development, and fraternity among nations. DISEC mandate is to “promote the establishment and maintenance of international peace and security with the least diversion for armaments of the world’s human and economic resources”.

Topics discussed in DISEC are considered similar to those discussed in the Security Council; however, DISEC does not have the ability to pass resolutions that authorize

SHMUN V DISEC

V

Page 6: shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the United States (DOD) in order to use it as a mean of communication between different

interventions since DISEC is part of the General Assembly. DISEC looks to prevent and reduce global threats that are constantly putting at stake international security.

DISEC deals with topics that center on disarmament, global issues, and threats to peace that jeopardize international security. Under Article 11 of Chapter IV of the UN Charter, “The General Assembly may consider the general principles of co-operation in the maintenance of international peace and security, including the principles governing disarmament and the regulation of armament.”

3. Topic A: Cybersecurity

3.1 Introduction:

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These attacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes.

In today’s connected world, everyone benefits from advanced cyber defense programs. At an individual level, a cybersecurity attack can result in everything from identity theft, to extortion attempts, to the loss of important data like family photos, and in a collective one (the case of Nations or Institutions), a cyber attack is more related to confidential information, and lots of money. Everyone relies on critical infrastructures like power plants, hospitals, and financial service companies. Securing these and other organizations is essential to keeping our society functioning.

3.2 Concepts:

Ransomware: is a type of malicious software. It is designed to extort money by blocking access to files or the computer system until the ransom is paid. Paying the ransom does not guarantee that the files will be recovered or the system restored.Example: WannaCry.

Malware: is a type of software designed to gain unauthorized access or to cause damage to a computer. (malicious software).

Social engineering: is a tactic that adversaries use to trick you into revealing sensitive information. They can solicit a monetary payment or gain access to your confidential data. Social engineering can be combined with any of the threats listed above to make you more likely to click on links, download malware, or trust a malicious source.

SHMUN V DISEC

VI

Page 7: shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the United States (DOD) in order to use it as a mean of communication between different

Phishing: is the practice of sending fraudulent emails that resemble emails from reputablesources. The aim is to steal sensitive data like credit card numbers and login information. It’s the most common type of cyber attack. You can help protect yourself through education or a technology solution that filters malicious emails.

Firewall: is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules.

Hardware: the machines, wiring, and other physical components of a computer or other electronic system.

Software: in its most general sense, is a set of instructions or programs instructing a computer to do specific tasks. Software is a generic term used to describe computer programs.

3.3 Historical Background

The history of cybersecurity began with a research project. A man named Bob Thomas realized that it was possible for a computer program to move across a network, leaving a small trail wherever it went. He named the program Creeper, and designed it to travel between Tenex terminals on the early ARPANET, printing the message “I’M THE CREEPER: CATCH ME IF YOU CAN.”

A man named Ray Tomlinson (the same guy who invented email) saw this idea and liked it. He tinkered with the program and made it self-replicating—the first computer worm. Then he wrote another program—Reaper, the first antivirus software—which would chase Creeper and delete it.

For much of the 70s and 80s, threats to computer security were clear and present, these threats were in the form of malicious insiders reading documents they shouldn’t, the practice of computer security revolved around governance, risk management and compliance (GRC) therefore evolved separately from the history of computer security software.

Network breaches and malware did exist and were used for malicious ends during the early history of computers, some examples of violations to governments and governmental institutions have been: The Russians, whome quickly began to deploy cyberpower as a weapon.

SHMUN V DISEC

VII

Page 8: shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the United States (DOD) in order to use it as a mean of communication between different

In 1986, the German computer hacker, Marcus Hess, hacked an internet gateway in Berkeley, and used that connection to piggyback on the Arpanet1. He hacked 400 military computers, including mainframes at the Pentagon, with the intent of selling their secrets to the KGB2.(only one example of the hundreds of cases during the cold war).

In 1998 series of attacks on DOD computers were detected. The prevailing theory at the time was a preemptive move on the part of the Iraqi government.

In 2007 over 45 million credit and debit card details were lost in a data breach at TJX companies. At the time it was the largest loss of such data. The biggest breach before that? 40 million records in 2005 at CardSystems Solutions.

In 1988, a man named Robert Morris had an idea: he wanted to gauge the size of the internet. To do this, he wrote a program designed to propagate across networks, infiltrate Unix terminals using a known bug, and then copy itself. This last instruction proved to be a mistake. The Morris worm replicated so aggressively that the early internet slowed to a crawl, causing untold damage.

The worm had effects that lasted beyond an internet slowdown. For one thing, Robert Morris became the first person successfully charged under the Computer Fraud and Abuse Act, More importantly, this act also led to the formation of the Computer Emergency Response Team (the precursor to US-CERT3), which functions as a nonprofit research center for systemic issues that might affect the internet as a whole.

After the Morris worm, viruses started getting deadlier and deadlier, affecting more and more systems. It seems as though the worm presaged the era of massive internet outages in which we live. You also began to see the rise of antivirus as a commodity—1987 saw the release of the first dedicated antivirus company.

As the evolution of the network, the programs and the media change, but there is always someone who wants to hack people's personal information, an institution that wants to tear down another or something as simple as wanting to spy on a friend, it's a violation of the cybernetic security of a person, state, nation or institution.

1 A computer network created by the Department of Defense of the United States (DOD) in order to use it as a mean of communication between different academic and state institutions.2 KGB(Komitet gosudarstvennoy bezopasnosti): Committee for State Security, was the main security agency for the Soviet Union from 1954 until its break-up in 1991.

3 https://www.us-cert.gov

SHMUN V DISEC

VIII

Page 9: shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the United States (DOD) in order to use it as a mean of communication between different

3.4 Present Situation

Nowadays All governmental institutions operate with a database, through a platform, a network, an operating system, which, like everything created by man, has flaws, but more importantly, it has gaps through which viruses can infiltrate,information or money could be stolen , which would be a problem of incalculable measurements for person, or seeing it in bigger proportions for any nation as well, because in our present, all the records of patients, along with their clinical histories are stored on the network, firefighters communicate by means of electronic devices, the jails are controlled by closed security circuits, the streets monitored by cameras, and according to a report made by the United Nations:The International Telecommunications Union (ITU) said that subscriptions will exceed 7,000 million at the beginning of 2014, which means that since in 2014, there were more cell phones than people in the world, people that publish locations, friends and family in social media.

The ITU watching the inevitable importance of it , created The Global Cybersecurity Index (GCI)4, which is a trusted reference that measures the commitment of countries to cybersecurity at a global level to raise awareness of the importance and different dimensions of the issue. As cybersecurity has a broad field of application, cutting across many industries and various sectors, each country’s level of development or engagement is assessed along five pillars :Legal Measures, Technical Measures, Organizational Measures, Capacity Building, and Cooperation; and then aggregated into an overall score, which is a beginning but certainly not the end of cybercrime.

Usually the countries with the most complex cybersecurity systems, are also the ones with the highest probabilities of being hacked, for example the united states of America, that counts with the DOD and the CIA, in order to protect their Nation, which they saw completely necessary after the uncountable times that the Soviet Union tried to steal their information.While many countries are always trying to improve their networks and cyber world in order to make it more secure, there are others that in every moment are looking for a way to break them, for example:

Russia: Crime syndicates in Russia use some of the most technologically advanced tools in the trade. Even before the latest revelations of stolen online records, the United States charged a Russian man, Evgeniy Bogachev, of participating in a large-scale operation to

4 https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2017-PDF-E.pdf

SHMUN V DISEC

IX

Page 10: shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the United States (DOD) in order to use it as a mean of communication between different

infect hundreds of thousands of computers around the world. The massive data breach of the retailer Target last year has also been traced to Eastern Europe.Trained computer engineers and skilled techies in Russia and countries like Ukraine and Romania may be opting for lucrative underground work instead of the often low-paying I.T. jobs available there. But the Russian government has in the past also been less than helpful in helping U.S. authorities track down wanted cybercriminals. “The key really is the lack of law enforcement environment, the feeling that you can do almost anything and get away with it,” says Dmitri Alperovitch, a Russia-born U.S. citizen and co-founder and CTO of security firm CrowdStrike. “They were able to grow and evolve into organized enterprises.”

China: is considered to be another stalwart hotbed for hackers, though the spotlight has primarily fallen not on gangs of criminals, but on the Chinese government, which has been linked to economic and political espionage against the U.S.

Brazil: Has been called “an emerging cybercrime economy.” Cybercriminals there and across South America are increasingly learning from their counterparts in Eastern Europe via underground forums, and buying softwares at a black market which has become so sophisticated that Eastern European hackers now provide I.T. support for customers buying their malware. So far, most of the attacks that originate in Brazil target local individuals and firms, but the fact that they are developing that kind of technology represents an issue for the international community.

Nigeria: The original home of low-tech scam emails remains a key player in underground cyber activity and has become a destination for international cybercrime syndicates, according to Sherry (the vice president of technology and solutions at Trend Micro, a Tokyo-based cyber-security firm).Authorities in Nigeria and other African countries have been slow to crackdown on scammers and hackers, even as more people connect to the Internet. Recent efforts by President Jonathan Goodluck to legislate cybercrime in Nigeria have served to push some of the activity into other countries in the region, such as Ghana.

Vietnam: The I.T. industry has expanded at a rapid rate in the last decade, a hacker allegedly masterminded the theft of up to 200 million personal records in the U.S. and Europe that included Social Security numbers, credit card data, and bank account information. The communist government there has also been recruiting local hackers to spy on journalists, dissidents, and activists, according to the Electronic Frontier Foundation5.

5 https://www.eff.org

SHMUN V DISEC

X

Page 11: shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the United States (DOD) in order to use it as a mean of communication between different

Even if it’s important to see this problem in a gubernamental level, it’s also important to take into consideration the problem that it represent to any citizen.

3.5 previous resolutions

Resolution 55/63, January 2001: Combating the criminal misuse of information technologies.Resolution 56/121, January 2002: Combating the criminal misuse of information technologies.Resolution 57/239, January 2003: Creation of a global culture of cybersecurity.Resolution 58/199, January 2004: Creation of a global culture of cybersecurity and the protection of critical information infrastructures.Resolution 64/211, March 2010: Creation of a global culture of cybersecurity and taking stock of national efforts to protect critical information infrastructures.

SHMUN V DISEC

XI

Page 12: shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the United States (DOD) in order to use it as a mean of communication between different

4. Topic B: International Regulation of Lethal Autonomous Weapons Systems.

4.1. Introduction

Autonomous weapons systems are moving from science fiction movies to designer’s hands, laboratories and to the battlefield. These autonomous weapons have brought discussion among military experts, roboticists, and ethicist about the use of weapons that can perform increasingly advances functions such as targeting, attacking and even killing with almost or non-human intervention.Military experts have mentioned that autonomous weapons systems not only have strategic and tactical advantages in battlegrounds but also they are mostly preferred on moral grounds instead of human fighters. In the other hand, critics stay that these weapons should be stopped or banned, for a variety of moral and legal reasons.

4.2. Concepts

Lethal Autonomous Weapon Systems: Any weapon system with autonomy in its critical functions—that is, a weapon system that can select and attack based on programmed constraints and descriptions targets without human intervention.Also known as: Killer robots, lethal autonomous robots(LAR), Robotic weapons or only Lethal Autonomous weapons.

Autonomy: The ability of a machine to perform an intended task without human intervention using interaction of its sensors and computer programming with the environment. Autonomy can be created or improved by machine learning. The use of machine learning in weapon systems is still experimental, as it continues to pose fundamental problems regarding predictability6

Artificial Intelligence: Artificial intelligence (AI), the ability of a digital computer or computer-controlled robot to perform tasks commonly associated with intelligent beings. Intelligent beings are those that can adapt to changing circumstances.

4.3 Historical Background

6 Boulanin, V., & Verbruggen, M. (2017). Mapping The Development Of Autonomy In Weapon Systems [Ebook]. Stockholm International Peace Research Institute. Retrieved from https://www.sipri.org/publications/2017/other-publications/mapping-development-autonomy-weapon-systems

SHMUN V DISEC

XII

Page 13: shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the United States (DOD) in order to use it as a mean of communication between different

For decades LAWS have been a science fiction matter, but rapid advancement in artificial intelligence may bring those technologies faster than we can imagine. In order to adequately discuss lethal autonomous weapons, a previous learning in the development of them thought history is needed.

1495Leonardo Da Vinci designed a mechanical knight with the capacity of making many human motions such as raising its arms, sitting up, and open and closing its jaws. In his sketches, it shows a detailed system of cranks and pulleys, also the armored exterior.

1898Nikola Tesla creates the first wireless remote controlled vehicle; it was an iron-hulled boat. Using a small, radio-transmitting control box, Tesla was able to control a tiny ship in a pool of water, also he could flash its light on and of without any visible connection between the boat and controller.

1914 World War I brings a series of advances in robotic warfare as the countries were searching for the better way to defend and attack, as an example we have pilotless drones, hydrophones, tanks, and many other technological advancements.

1943World War Two brought together scientists from many disciplines, including the emerging fields of neuroscience and computing.

1950British mathematician Alan Turing7, arguably the godfather of artificial intelligence, writes, “I propose to consider the question, ‘Can machines think?'” In Turing’s mind, it’s less a matter of whether machines can reason like humans than how well they can imitate them.

1963 Worried about the Soviet Union capability of exceeding technologically the United States, the Defense Advanced Research Projects Agency invest 2 million dollars to explore the “machine aided cognition” with the MIT (Massachusetts Institute of Technology. All of these opened a door for the research in artificial intelligence and computer science.1978 The U.S. Defense Department launches the first Navstar satellite8 a major development in modern global positioning technology. The system reaches full operational capacity in 1995

7 Alan Turing: Considered one of the fathers of computer science and the precursor of modern computing.

SHMUN V DISEC

XIII

Page 14: shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the United States (DOD) in order to use it as a mean of communication between different

— the same year that GPS is used to guide an unmanned aerial vehicle for the first time, marking a leap forward for drones.

1994It was the creation of the RQ-1 Predator, a long-endurance, medium-altitude unmanned aircraft system for surveillance and reconnaissance missions.

1999Sony launches its first consumer robot pet dog AiBo with skills and personality that is developed over time.

2001The same unmanned aircraft system was upgraded to carry up Hellfire missiles, with this the killer drone era started.

2005The US began to invest in autonomous robots. BigDog, made by Boston Dynamics, was one of the first. Built to serve as a robotic pack animal in terrain too rough for conventional vehicles, it has never actually seen active service.

2006South Korea announces plans to install Samsung Techwin SGR-A1 sentry robots along the Demilitarized Zone with North Korea. Armed with machine guns, they are capable of fully autonomous tracking and targeting, though human approval is reportedly required before they fire.

2010These new computers enabled humanoid robots, like the NAO robot, which could do things predecessors like Shakey had found almost impossible.It was a whole new generation of robots with many features never seen.

2014Sixty-four years after Turing published his idea of a test that would prove machine intelligence, a chatbot called Eugene Goostman finally passed.

It is important you to know the past in charge to understand how these technologies have evolved and why they had been created.

8 Navstar Satellite: It is a network of U.S. satellites that provide global positioning system (GPS) services.

SHMUN V DISEC

XIV

Page 15: shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the United States (DOD) in order to use it as a mean of communication between different

4.4 Present situation

Throughout history, technology has enabled people to complete more tasks in less time and with less energy. People call this an easier way to live. Technology has had profound effects on lifestyle throughout human history, and as the rate of progress increases, society must deal with both the good and bad implications. The same thing happens with LAWS, they are pretended to perform better than anything. The benefits of Lethal Autonomous Weapons Systems are uncountable, they go from thing such as reducing military expenditures to saving human casualties.

Autonomous Weapons Systems act as a force multiplier that not only is stronger but also it is much more resistant than a soldier, it is much more efficient than any warfighter, having in mind that they are better suited than humans for dull, dirty and dangerous’ missions. A dull mission is a long duration, dirty missions are the ones that expose humans to potentially harmful material and a dangerous mission are the ones that have high risks such as explosives. As a result, it would require fewer soldiers for each given mission and human casualties could be reduced to almost none of them. Military experts and roboticists argue that LAWS should not only be regarded morally accepted but also they would be ethically preferable to human fighters. Roboticist Ronald C. Arkin believes that autonomous robots in the future will be able to act more “humanely” on the battlefield for a number of reasons, those robots do not need to be programmed with a self-preservation instinct, eventually leaving the need for a “shoot-first, ask questions later” attitude.

Autonomous weapons systems judgment will not be clouded by emotions such as fear, revenge, sadness and other, the systems will be able to process better and more incoming sensory information than humans. An open letter to ban autonomous weapons was released in July of 2015 at an international conference on artificial intelligence. The letters marks, Artificial intelligence technologies have reached a point in which the deployment of such system is feasible within the years, autonomous weapons have been described as the third

SHMUN V DISEC

XV

Page 16: shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the United States (DOD) in order to use it as a mean of communication between different

revolution in warfare, after gunpowder and nuclear arms.

Engineers, AI and robotics experts, and other scientists and researchers from thirty-seven countries issued the “Scientists’ Call to Ban Autonomous Lethal Robots. They state that “the functionality required for accurate target identification, situational awareness, or decisions regarding the proportional use of force.” Hence, they may cause a high level of collateral damage. The statement ends by insisting that “decisions about the application of violent force must not be delegated to machines.

In fact, decision making of life or death of nonhuman agents is a recurrent concern of those who are opposed to autonomous weapons systems. Systems that are capable of choosing their own targets are one of the main issue regarding the manifestations, computer science Noel Sharkey has called a ban of targeting of LAWS because it violates the the principle of distinction, considered one of the most important rules of armed conflict. Keeping in mind that autonomous weapons system will find it hard to determine who is a civilian and who is a combatant, which is difficult even for humans. Allow AI to target will only result in more civilian casualties.

Another major concern is the problem of accountability when autonomous weapons systems are deployed. Ethicist Robert Sparrow highlights this ethical issue by noting that a fundamental condition of international humanitarian law, or jus in bello9, requires that some person must be held responsible for civilian deaths. Any weapon or other means of war that

9 Jus in bello: is the law that governs the way in which warfare is conducted.

SHMUN V DISEC

XVI

Page 17: shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the United States (DOD) in order to use it as a mean of communication between different

makes it impossible to identify responsibility for the casualties it causes does not meet the requirements of jus in bello,and, therefore, should not be employed in war.Regulation will have to emerge along with the technology because some believe that morality will coevolve with technological development. They suggest that as humans become more accustomed to machines performing functions with life-or-death implications or consequences (such as driving cars or performing surgeries), humans will most likely become more comfortable with AI technology’s incorporation into weaponry.

4.5 Possible missions for autonomous weapons systems

4.6 Previous Resolutions

CCW/GGE.2/2018/WP.2 - Categorizing lethal autonomous weapons systems - A technical and legal perspective to understanding LAWS.

SHMUN V DISEC

XVII

Page 18: shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the United States (DOD) in order to use it as a mean of communication between different

CCW/GGE.2/2018/WP.3 - Human-machine interaction in the development, deployment and use of emerging technologies in the area of lethal autonomous weapons systems.Deployment, and Use of Emerging Technologies in the Area of Lethal Autonomous Weapons Systems.CCW/GGE.2/2018/WP.5 - Areas of Convergence on LAWS.CCW/GGE.2/2018/WP.7 - Proposal for a Mandate to Negotiate a Legally-binding Instrument that addresses the Legal, Humanitarian and Ethical concerns posed by Emerging Technologies in the Area of Lethal Autonomous Weapons Systems (LAWS).CCW/GGE.1/2018/WP.2 - Strengthening of the review mechanisms of a new weapon, means or methods of warfare.CCW/GGE.1/2018/WP.4 - Humanitarian benefits of emerging technologies in the area of lethal autonomous weapons systems.

5. Qarmas:

5.1 Topic A: Cybersecurity.

1. ¿How is the level of cybersecurity in your country?

2. ¿What is the legal framework of your delegation according to cybercrimes?

3. ¿Has your State been involved in any problem related to hackers or hacking? (as the

victim or the victimizer).

4. ¿Is your country part of any alliance, with the purpose of improving the

cybersecurity of the participants, or the eradication of the international cybercrime?

5. ¿What measures has your delegation taken to protect its citizens from cybercrimes?

6. ¿What measures has your country taken to protect its confidential information?

7. ¿Does your State has a special institution in charge of the cybersecurity?

5.2 Topic B: International Regulation of Lethal Autonomous Weapons Systems.

1. ¿Does your country have any programme for the development of Lethal

Autonomous Weapon system?

2. ¿Does your country support the use of Lethal Autonomous Weapons Systems?

3. ¿Does your country regulate the use of LAWS?

4. ¿Does your country is in favor to ban LAWS?

SHMUN V DISEC

XVIII

Page 19: shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the United States (DOD) in order to use it as a mean of communication between different

5. ¿What could be the advantages and disadvantages of having lethal autonomous

weapons systems for your country?

6. Useful links Topic A: Cibersecurityhttps://www.youtube.com/watch?v=O5R4XHw0PQ0

https://www.youtube.com/watch?v=JdfmV2KW11I

https://www.itu.int/es/about/Pages/default.aspx

Topic B: International Regulation of Lethal Autonomous Weapons Systems.

https://autonomousweapons.org/research-and-reports/

https://nationalinterest.org/feature/autonomous-weapon-systems-the-militarys-smartest-

toys-11708

https://www.youtube.com/watch?v=9CO6M2HsoIA

https://www.youtube.com/watch?v=5qBjFZV19p0

7. Bibliography

UN General Assembly - First Committee - Disarmament and International Security. (2018).

Retrieved from http://www.un.org/en/ga/first/

How-to Model UN Research: GA First Committee – DISEC. (2015). Retrieved from

http://bestdelegate.com/how-to-model-un-research-ga-first-committee-disec/

McCormick, T. (2014). Lethal Autonomy: A Short History. Retrieved from

https://foreignpolicy.com/2014/01/24/lethal-autonomy-a-short-history/

Boulanin, V., & Verbruggen, M. (2017). Mapping The Development Of Autonomy In

Weapon Systems [Ebook]. Stockholm International Peace Research Institute. Retrieved

SHMUN V DISEC

XIX

Page 20: shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the United States (DOD) in order to use it as a mean of communication between different

from https://www.sipri.org/publications/2017/other-publications/mapping-development-

autonomy-weapon-systems

Sass, E. (2017). 12 Technological Advancements of World War I. Retrieved from

http://mentalfloss.com/article/31882/12-technological-advancements-world-war-i

Santos, P. (2015). Autonomous weapons and the curse of history - Bulletin of the Atomic

Scientists. Retrieved from https://thebulletin.org/roundtable_entry/autonomous-weapons-

and-the-curse-of-history/

Tanji, M. (2018). Listening to the echoes of cybersecurity history. Retrieved from

https://www.csoonline.com/article/3248964/data-protection/listening-to-the-echoes-of-

cybersecurity-history.html

Endpoint Security Software | SentinelOne. (2018). Retrieved from

https://www.sentinelone.com

Cyber-attacks - BBC News. (2018). Retrieved from

https://www.bbc.com/news/topics/cp3mvpdp1r2t/cyber-attacks

Los celulares superarán en número a las personas en 2014. (2013). Retrieved from

https://www.bbc.com/mundo/ultimas_noticias/2013/05/130509_ultnot_celulares_superaran

_personas_proximo_ano_ap

Global Cybersecurity Index. (2018). Retrieved from

https://www.itu.int/en/ITU-D/Cybersecurity/Pages/global-cybersecurity-index.aspx

Services, P. (2018). What Is Cybersecurity?. Retrieved from

https://www.cisco.com/c/en/us/products/security/what-is-cybersecurity.html

SHMUN V DISEC

XX

Page 21: shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the United States (DOD) in order to use it as a mean of communication between different

Horowitz, M., & Scharre, P. (2018). Opinion | The Morality of Robotic War. Retrieved

from https://www.nytimes.com/2015/05/27/opinion/the-morality-of-robotic-war.html?_r=2

Etzioni, A., & Etzioni, O. (2017). Pros and Cons of Autonomous Weapons Systems.

Retrieved from https://www.armyupress.army.mil/Journals/Military-Review/English-

Edition-Archives/May-June-2017/Pros-and-Cons-of-Autonomous-Weapons-Systems/

2018 Group of Governmental Experts on Lethal Autonomous Weapons Systems (LAWS).

(2018). Retrieved from

https://www.unog.ch/__80256ee600585943.nsf/(httpPages)/

7c335e71dfcb29d1c1258243003e8724?OpenDocument&ExpandSection=3#_Section1

Copeland, B. (2018). artificial intelligence | Definition, Examples, and Applications.

Retrieved from https://www.britannica.com/technology/artificial-intelligence

TEISS. (2017). These are the major sources of cyber-attacks on businesses [Image].

Retrieved from https://www.teiss.co.uk/news/major-sources-cyber-attacks-businesses/

Stop Killer Robots. Who´s involved [Image]. Retrieved from

https://www.weforum.org/agenda/2016/01/robots-in-war-the-next-weapons-of-mass-

destruction/

8. List of countries

1. United States of America

2. Russian Federation

3. United Kingdom of Great Britain and Northern Island

4. French Republic

5. People’s Republic of China

6. Democratic People’s Republic of Korea

7. Republic of Korea

SHMUN V DISEC

XXI

Page 22: shmun.weebly.com€¦ · Web viewA computer network created by the Department of Defense of the United States (DOD) in order to use it as a mean of communication between different

8. Federal Republic of Germany

9. Republic of Iraq

10. Islamic Republic of Pakistan

11. Republic of South Africa

12. Republic of India

13. Federative Republic of Brazil

14. Kingdom of Saudi Arabia

15. State of Japan

16. State of Israel

17. Republic of Turkey

18. Islamic republic of Iran

19. Federal Republic of Nigeria

20. United Arab Emirates

SHMUN V DISEC

XXII