You are on page 1of 25

A Background Guide for the

Legal Committee

Harvard Model United Nations India

August 12 - 15, 2018


Table of Contents

Letter from the Secretary-General................................................................................ 3


Letter from the Under-Secretary-General.................................................................... 4
Letter from the Director.............................................................................................. 5
Introduction................................................................................................................ 6
History of the Committee........................................................................................... 7
Summary of the Problem............................................................................................. 9
Prevention and Treatment......................................................................................... 12
Current Situation...................................................................................................... 15
Bloc Positions............................................................................................................ 18
Position Papers.......................................................................................................... 18
Suggestions for Further Research............................................................................... 18
Endnotes................................................................................................................... 19
Harvard Model United Nations India
A LETTER FROM THE SECRETARY-GENERAL

Dear Delegates,

It is my pleasure to welcome you to the eighth session of the Harvard Model United Nations India,
to be held at the Hyderabad International Convention Centre from Sunday, August 12 to Wednes-
Eliza Ennis day, August 15, 2018.
Secretary-General Over the past seven years, HMUN India has witnessed the participation of over 8,000 high school
students representing some of the best schools from over 40 cities across 20 countries. Following
the success of the previous years as well as over 60 years of experience in hosting the Harvard Model
United Nations for high school students from around the world in Boston, we are excited to return
to India for HMUN India 2018. In partnership with our local host, Worldview Education Services
JingJing Zhu Pvt. Ltd, we will bring the conference to life through sixteen dynamic committees, an exceptional ar-
Director-General ray of speakers, and the beloved tradition of vibrant social events such as HMUN India’s GotTalent.
Since its inception, HMUN India has strived to create a community of ambitious and talented
delegates from all corners of the globe who feel passionately about our future and recognize their
power to mold it. HMUN India is driven by an educational mission that intends to shed light on the
Larry Liang
importance of collaboration, the art of diplomacy and the value of key skills such as research, public
Under-Secretary-General
speaking, debate and negotiation. Above all, we hope that the lessons learned from HMUN India will
Administration
inspire and empower delegates to form a voice beyond the committee room. We hope this experience
will challenge students to think critically about policy and to drive change in their own communities.
The theme of the 2018 conference is Act to Impact, and we hope to see delegates make an impact in
Adil Bhatia the committee room and beyond this year!
Under-Secretary-General At the core of HMUN India are its committees. To help you prepare, our directors work tirelessly
Operations to prepare the guide you will find over the following pages. This committee guide will provide you
information about the history, context, events, implications, problems, and solutions that you will be
asked to tackle at HMUN India. In addition, we have a Guide to Delegate Preparation on the web-
Jenna Wong site, a series of webinars released throughout the summer, and a tailored preparation program called
Under-Secretary-General RESOLVE that will be released in early May. All of these will help you in your path to committee in
Committees August. Yet, we also encourage you to do research of your own, learning more about your country
position or individual policies. If you have any questions about any part of the preparation process,
you should feel free to reach out to your director or any member of secretariat.
I wish you the best in your preparation efforts, and please do not hesistate to reach out with any
questions or concerns. I cannot wait to see you at conference in Hyderbad!

Sincerely,

Eliza R. Ennis
Secretary-General
Harvard Model United Nations India 2018
secgen@hmunindia.org

59 Shepard Street, Box 205


Cambridge, MA 02138
Email: info@hmunindia.org
www.hmunindia.org
Harvard Model United Nations India is co-produced by the Harvard International Relations Council and
Worldview Education Services, Ltd.
Harvard Model United Nations India
A LETTER FROM THE UNDER-SECRETARY-GENERAL
FOR COMMITTEES
Dear Delegates,

It is my honor and privilege to welcome you to the eighth session of Harvard Model United
Nations India! My name is Jenna Wong, and I will be serving as your Under-Secretary-
Eliza Ennis General for Committees. I am currently a third year student at Harvard, studying Social
Secretary-General Studies, Psychology, and Spanish.Outside of my academics, I spend most of my time working
for the International Relations Council, competing as Head Delegate of our travel model
United Nations team and chairing at our conferences in Boston and China.

I could not be more proud of the slate of committees that HMUN India is offering this year.
JingJing Zhu From rewriting the Declaration of Human Rights to combatting migrant smuggling, debate
Director-General
in the General Assemblies will push delegates to think beyond their own country’s interests
to create international frameworks to protect vulnerable communities. In the Economic and
Social Councils, you will be pushed to establish labor codes to protect women in Southeast
Larry Liang Asia, to combat the effects of climate change, and to guarantee rights to those with special
Under-Secretary-General
needs. In this committees, delegates thus will be challenged to look at a diverse array of issues
Administration
from new perspectives.

Your directors have worked tirelessly to make these committees memorable, challenging, and
incredibly rewarding, and they cannot wait to share their hard work with you. As you prepare
Adil Bhatia for committee, please remember that HMUN India aims to simulate situations requiring
Under-Secretary-General
international diplomacy. For that reason, you must research for your committee as if you
Operations
were actually preparing to represent your country—or, in the case of several committees,
your actor—in a negotiation.
Jenna Wong What are your main goals? What compromises are you willing to make? Who might you
Under-Secretary-General collaborate with? Thinking about these questions as you move into committee will allow for
Committees more substantive and productive debate because, ultimately, your goal is to produce the most
innovative and effective solutions as a committee, not to simply reiterate what the problems
are or prove that your country is best.

As you read through your background guide and then move into further research and
preparation, know that I am here for you along the way. Ultimately, my goal is to make your
committee experience the most enjoyable and rewarding possible, so please reach out if you
have any questions or concerns before or during conference.

Sincerely,

Jenna M. Wong

Under-Secretary-General for Committees

Harvard Model United Nations India 2018


59 Shepard Street, Box 205
Cambridge, MA 02138 committees@hmunindia.org
Email: info@hmunindia.org
Harvard Model United Nations India is co-produced by the Harvard International Relations Council and
Worldview Education Services, Ltd.
Harvard Model United Nations India
A LETTER FROM THE DIRECTOR

Dear Delegates,

I’m Dylan Parker, and I’ll be directing the Legal Committee this year at HMUN India.
I originally hail from Pittsford, NY. Academically speaking, I’m a sophomore studying
Eliza Ennis Computer Science and Statistics.
Secretary-General
I’m particularly passionate about our topic, Cybersecurity and Cyberwarfare, because
of these interests in computer science, statistics, and national security. But more than that,
I think that there has been a critical lack of cooperation between scientists who refuse to
engage in politics and politicians who do not understand science. Given the defining role of
science and technology in 21st century politics, this divide must be bridged. I hope that you
JingJing Zhu all will take on these responsibilities at HMUN India this year, crafting solutions that are
Director-General
both scientifically prudent and politically feasible.

That said, do not be deterred if science isn’t your bread and butter. We will discuss a lot of
Larry Liang cool and revolutionary technologies, but my goal is to make the topic accessible to everyone.
Under-Secretary-General Moreover, many of the most difficult issues in cybersecurity and cyberwarfare do not require
Administration extensive knowledge of the underlying technologies; it is more important to know what is
possible than it is to know exactly how a particular technology is implemented.

Adil Bhatia Since we will be debating just a single topic, you will be able to really delve into the many
Under-Secretary-General sub-issues pertaining to Cybersecurity and Cyberwarfare. To succeed in this committee,
Operations therefore, you will have to consider every dimension of this issue. For instance, some of
your subtopics will compel you to shrewdly negotiate and navigate contentious political
issues Others subtopics, however, will require that you understand the fundamental concepts
Jenna Wong behind the technology that will define 21st century cyber-politics. Approaching global issues
Under-Secretary-General from this dual scientific-political perspective is something at which the world’s leaders have
Committees largely failed, so I’m excited to see the leadership, insight, and innovation you all bring to
committee.

I check my email compulsively and am super passionate about these issues, so please reach
out to me if you have any questions, concerns, or points of confusion as you prepare for
committee. I cannot put into words how excited I am for HMUN India, and I really look
forward to meeting you all!

Sincerely,

Dylan Parker

Director, Legal Committee

legal@hmunindia.org
59 Shepard Street, Box 205
Cambridge, MA 02138
Email: info@hmunindia.org
www.hmunindia.org
Harvard Model United Nations India is co-produced by the Harvard International Relations Council and
Worldview Education Services, Ltd.
6 Legal Committee

Introduction to the Topic

On February 19, 2018, the newly-elected cyberspace, and proposing sanctions for to deter
Secretary-General of the United Nations, acts of aggression. However, diplomats abandoned
Antonio Guterres, was speaking at the University the 13-year-old talks in late August, resolving that
of Lisbon. During his talk, he was asked about insurmountable differences in national policies
the prospect of war in the 21st century. This was would make it impossible to reach an agreement.
his response: Nations like Russia, China, and Cuba resolved
that the Western countries had more to lose from
“I am absolutely convinced that, differently the current chaos in cyberspace. Western nations
from the great battles of the past, which opened like the US and UK, on the other hand, were
with a barrage of artillery or aerial bombardment, only willing to accept an agreement that imposed
the next war will begin with a massive cyber- harsh sanctions against, unambiguous restrictions
attack to destroy military capacity…and paralyze on, and the right to retaliate against aggressive
basic infrastructure such as the electric networks.” acts in cyberspace. Another major roadblock was
It has been estimated that cybercrime costs the matter of accountability, as it is often difficult
the global economy $1 trillion per year. Perhaps to prove that hackers responsible for attacks
even more stunning is the fact that much of this were being directed by a particular government.
cybercrime occurs at the hands of small groups Together, these difficulties forced diplomats
of hackers working independently or on behalf of to discard over a decade of negotiation. But as
rogue nations with few resources. It is, therefore, Secretary-General Guterres warned in Lisbon,
nearly unimaginable how devastating a cyber- the danger of a major cyberattack has only grown
attack by Russia, China, or the United States over the past year. The issues mentioned above
could be to a nation’s infrastructure. In Lisbon, will indeed be difficult to overcome, but they are
Secretary-General Guterres emphasized his fear of by no means insurmountable. Through diligent
such a catastrophe, noting that international law study, debate, and negotiation, there is no doubt
and nations defense systems are unprepared for that the UN Legal Committee can succeed where
and have done little to mitigate the possibility of the GGE failed. Our aim in this committee
a major cyber-attack: will not necessarily be preventing cyberwarfare.
Rather, we first must establish rules with which
“Episodes of cyber-warfare between states international bodies can govern and control
already exist. What is worse is that there is no cyberspace. Armed with this legal framework,
regulatory scheme for that type of warfare, it the nations of the world will be better equipped
is not clear how the Geneva Convention or to police each other, cooperate, and deter future
international humanitarian law applies to it.” cyber-attacks. In particular, we will focus on the
following three issues:
Unfortunately, similar warnings about the
tremendous threat cyber-warfare poses to global Definition of a Cyberattack. What constitutes a
economies, infrastructure, and peace have often cyberattack? Must it be an attack on government or
fallen on deaf ears. Over the past decade, dozens public institutions, or would an attack on a private
of attempted treaties and agreements on cyber- military contractor by a foreign government
security have fallen apart. For instance, the UN count as a cyberattack? How large must it be in
Group of Government Experts (GGE) held a scale? What must a nation to do prove that it
series of negotiations from 2004 until late 2017 has been the victim of a cyberattack? In order to
with the objective of establishing standards for address any issue related to cyberwarfare, we must
cyber self-defense, curbing the militarization of
Harvard Model United Nations India 2018 7

first answer these (and many other) questions and involve a physical or kinetic confrontation (e.g.
establish a universal definition of a cyberattack. nation A directs a cyberattack toward nation B,
and nation B responds by bombing nation A)?
The Prohibition of Force. Article 2(4) of the UN What constitutes a “proportional response”?
Charter prohibits the use of force: “All Members It might be difficult to imagine retaliating to a
shall refrain in their international relations from cyberattack with kinetic warfare, but it sounds
the threat or use of force against the territorial much more reasonable when one considers the
integrity or political independence of any state, fact that a major cyberattack could be much more
or in any other manner inconsistent with the devastating than a bombing, ground assault, or
Purposes of the United Nations.”1 When should other tool of traditional warfare.
cyber-attacks be considered the use or threat of
force? What criteria should be used to evaluate The descriptions above just scrape the surface of
whether a cyber-attack rises to this level? Without these incredibly complex issues. As the questions
strong definitions and clear criteria, it will be up accompanying each issue hopefully suggested,
to the individual nations to decide when a cyber- many of the controversies we will consider may
attack constitutes an illegal use of force. seem simple at first, but they become significantly
more complex when one attempts to put them
The Right to Self-Defense. Article 51 of the into writing. For instance, we might all think
UN Charter endows nations with the right to we intuitively know what a cyberattack is, but
self-defense: “Nothing in the present Charter establishing a strong, all-encompassing, legal
shall impair the inherent right of individual or definition of a cyberattack is a monumental
collective self-defense if an armed attack occurs task. Therefore, as you continue reading this
against a Member of the United Nations.”2 But background guide, be sure to constantly question
when does a cyber-attack rise to the level of an your immediate conclusions, as the issues we
armed attack? Legal precedent has made it clear consider will often turn out to be far more
that not all uses of force are also armed attacks. As complicated than they originally seem.
we will see, there are multiple schools of thought
and sets of criteria for determining whether a Both in this background guide and during
cyber-attack constitutes an armed attack. It will committee, the staff of the Legal committee will
be the responsibility of the Legal Committee to do everything we can to assist you in meeting
establish universal, unambiguous, and widely- these objectives and expectations. Note that
accepted criteria for this purpose. HMUN India has a unique format and set of
expectations as compared to other conferences
Necessity, Proportionality, and National in South Asia. Therefore, be sure to brush up
Accountability. To what extent should nations on the general differences between HMUN and
be held responsible for the operations of their other conferences by referring to the HMUN
hackers? How does the international community India website, in particular the page devoted
decide that it was in fact the national government, to delegate preparation. However, the staff of
not simply a rogue group of hackers, that directed the Legal Committee also has a specific set of
a cyberattack? This is perhaps the most difficult expectations, objectives, and plans for committee
issue we will address, as it is nearly impossible to that we would like to emphasize in this guide.
prove that a government was directly responsible As we have and will state repeatedly throughout
for the actions of group of hackers. As for this guide, we are looking for delegates to come
necessity and proportionality, must retaliation prepared with workable, in-depth, and specific
be contained to the cyber realm, or can it solutions to the issues described in this guide.
1 UN Charter We have intentionally limited the scope of this
2 UN Charter
guide to just three principle issues. Therefore, we
8 Legal Committee

hope that you will be able to research and propose and most importantly the specificity, creativity,
very specific and well-thought solutions to each and feasibility of your solutions.
of the three subtopics. We cannot emphasize how
much we want you to be specific and creative
in crafting your proposals. It is far preferable for
you to address one subtopic in great detail in
your resolution than to address all the sub-topics
superficially. During committee, we will do our
best as a staff to give you every opportunity to
discuss your proposals with your fellow delegates
and work together to craft detailed resolutions.
Therefore, we will frequently provide you with
opportunities to engage in unmoderated caucuses
and cooperate with other delegates. These will be
balanced with more formal moderated caucuses
and speakers lists, which you should use as an
opportunity to describe what is special about your
proposals. Delegates will distinguish themselves
by producing and describing proposals that are
of greater depth or include new and creative
solutions, not by repeating the same speeches
that every other delegate has made. For instance,
if you are speaking about the definition of a
cyberattack, then you should not just say that we
need a definition of what constitutes a cyberattack
and give a broad outline of some ideas. Surely
other delegates will have already said this, so it
will not add much to the debate. Instead, it might
be advisable to give a more specific proposal,
such as raising a specific example that the current
definition of a cyberattack does not encompass
and that should be included in the committee’s
resolution. After proposing this in the moderated
caucus, you could then use a moderated caucus
to make this proposal a reality. This is just an
example, but hopefully it gives you a general idea
of how to approach moderated and unmoderated
caucuses.
Finally, we would like to note that the staff
of the Legal Committee will evaluate delegates
holistically when we are determining awards. We
will consider the quality of your working paper,
your efficacy in advocating your specific solutions
in moderated caucuses, your adherence to
national policy, your leadership of your bloc, your
cooperation and diplomacy with other delegates,
Harvard Model United Nations India 2018 9

Subtopic I: Definitions in Cyberspace

Introduction, Background, and Examples the Russian government denies that it directed
these attacks, but it is widely believed that Russian
Before the international community of officials instigated, funded, and coordinated the
diplomats and legal scholars puts forth laws to operations in hope of influencing the 2016 US
govern cyberspace, it must first reach a consensus Presidential Election.
on a few terms that will underpin any agreements
that are made. For instance, it does not matter The four examples above are some of the
that a treaty prescribes a harsh punishment most famous cyber operations conducted in
for nations that engage in cyber-attacks if the recent memory. However, analysts fear that these
international community cannot agree on what a constitute the beginning of a period of pervasive
cyber-attack even is; without strong definitions, cyber operations and even all-out cyber war. Such
it will be near impossible to enforce international events could include a bug that incapacitates the
law in cyberspace. Before we begin considering stock market and therefore the global economy,3
the terms we must define, we will first provide a an infiltration that wrongly causes a dam to open
few examples of cyber-attacks that have occurred or a chemical or nuclear plant to malfunction,4
in the past, as well as potential cyber-attacks and a virus that disrupts air traffic control (leading
that experts fear could lead to future geopolitical to crashes, misrouting, and general chaos).5 In
crises. Hopefully this will give you an intuitive this background guide we will also consider a
understanding of how conflict in cyberspace plays number of other forms of cyber-attacks, such as
out. operations directed against military targets (e.g.
mission control and air defense systems) and
Perhaps the most successful cyber operation civilian targets (e.g. the release of large amounts
in history was the Stuxnet bug, which American of personal financial data). Hopefully, though, the
hackers used to derail Iran’s nuclear program.* examples above give you an idea of the type of
Months later, an uncommon cyber power, the operations we are considering.
government of Burma, unleashed an attack
against its own citizens; the ruling military junta
used a “distributed denial of service” operation NATO and the Shanghai Cooperation
to essentially take down the internet just before Organization
a national election (Hathaway). In 2011, it was
As you can see, cyber-attacks can adopt
revealed that China’s military “had engaged in a
many different forms. It will be the aim of this
years-long cyber-attack program aimed at a range
committee to determine a strong definition
of governments, U.S. corporations, and United
of what constitutes a cyber-attack. This is
Nations groups” (Hathaway). It is worth noting
incredibly important because, as we will see
that the Chinese government has and continues
to vigorously deny these allegations. However, we 3 Duncan B. Hollis, Why States Need an Inter-
can be confident in saying that it is widely believed national Law for Information Operations, 11 LEWIS &
CLARK L. REV. 1023, 1042 (2007).

that the Chinese military was responsible for these
attacks, especially after a Chinese government 4 Barton Gellman, Cyber Attacks by Al Qaeda
documentary inadvertently caught an attack on Feared; Terrorists at Threshold of Using Internet as
Tool of Bloodshed, Experts Say, WASH. POST, June 27,
an Alabama website in-progress. Finally, the 2002, at A01.

2016 hacking of the US Democratic National
5 General Accounting Office, Air Traffic
Committee by Russian groups amounts to the Control: Weak Computer Security Practices Jeopardize
largest and most recent cyber operation. Again, Flight Safety (May 1998).
10 Legal Committee

later in the guide, the way we define a cyber- call for stricter definitions and stronger rights of
attack determines whether, how, and against retaliation. Moreover, conflicts in cyberspace have
whom a nation is allowed to respond to a cyber frequently pitted one nation from the SCO against
operation. This is a very difficult issue, so we will a NATO nation; the Stuxnet bug and the Russia
attempt to understand the fundamental issues DNC hack are each examples of such a conflict.
that must be taken into account by examining This has caused many experts to liken the state of
proposed definitions of cyber-attacks and their affairs in cyberspace to the Cold War, when the US
shortcomings. We will first consider the definition and its Western allies faced off against the Soviet
of a cyber-attack put forth by the U.S. National Union, China, and the Communist Bloc. In terms
Research Council, which classifies cyber-attacks of the definition of cyber-attacks, SCO nations
as “deliberate actions to alter, disrupt, deceive, “have adopted an expansive vision of cyber-
degrade, or destroy computer systems or networks attacks to include the use of cyber-technology to
or the information and/or programs resident in undermine political stability.”8 According to the
or transiting these systems or networks.”6 This Shanghai Cooperation Agreement, the founding
definition focuses on the objectives of a cyber- document of the SCO, one of the greatest cyber
attack as opposed to the method of execution, threats posed is the spread of information that
which makes sense since broad objectives are is dangerous to “social and political, social and
sometimes easier to ascertain than the exact bug economic systems, as well as spiritual, moral and
or virus used to disrupt the computer network. cultural spheres of other states.”9 As you might
However, according to legal scholar Oona A. imagine, NATO nations have not welcomed
Hathaway’s article in the California Law Review such a definition of a cyber-attack, as they fear it
on cyber warfare, this definition falls short because will lend legal legitimacy to Chinese and Russian
it “fails to distinguish between a simple cyber- efforts to suppress free expression and minority
crime and a cyber-attack.” Instead, Hathaway groups. China and Russia, on the other hand,
proposes the development of a “simpler, uniform see this clause as protection against Western
definition [that] would avoid ambiguity, overlap, interference in their affairs.
and coverage gaps; facilitate a cleaner delineation
between cyber-attack and cyber-crime; and
A Universal Definition
promote greater inter-agency cooperation.”7
Both the NATO and SCO nations have
The Shanghai Cooperation Organization
expressed valid concerns when it comes to the
has expressed similar dissatisfaction with the
definition of a cyber-attack. The Legal Committee,
definitions advanced by the US and other NATO
therefore, will have to appease both blocs and
nations. For reference, the Shanghai Cooperation
craft a consensus-based definition. Between
Organization includes China, Russia, Iran,
2009 and 2012, an international group of legal
Pakistan, and many Central Asian nations. The
experts at the NATO Cooperative Cyber Defense
SCO nations have often been diametrically
Center for Excellence attempted to do just that.
opposed to NATO’s cyber policies, which generally
However, even though SCO nations were invited
to and sent representatives to the talks, they
6 COMM. ON OFFENSIVE INFORMATION
eventually abandoned the discussions on account
WARFARE, ET. AL., NAT’L RES. COUNCIL, TECH- of irreconcilable differences with NATO officials.
NOLOGY, POLICY LAW AND ETHICS REGARD- As a result, the experts’ final product, called the
ING U.S. ACQUISITION AND USE OF CYBERAT-
TACK CAPABILITIES (WILLIAM A. OWENS, ET. 8 Hathaway
AL. EDS., 2009). 9 Shanghai Cooperation Agreement, Annex I, at
7 Hathaway 209.
Harvard Model United Nations India 2018 11

Tallinn Manual, incorporated both NATO and cyber-attacks, then a large-scale denial of service
SCO opinions, but adopted primarily Western attack that took down the internet, but caused
positions on divisive issues. The Tallinn Manual no physical damage, would not be a cyber-attack.
defined a cyber-attack as “a cyber operation, The greater implication of this is that the victim
whether offensive or defensive, that is reasonably of the attack would not be entitled to retaliation
expected to cause injury or death to persons or or self-defense under the UN Charter, as we will
damage or destruction to objects.”10 This simple discuss later in the guide.
definition seems reasonable, but it has a few
critical shortcomings. First, as we might have The Tallinn definition also forces to question
expected, it does not include the dissemination of the implications of the use of the word “expect.”
information dangerous to a foreign government as This would potentially include cyber-attacks that
a cyber-attack, which is very important for China, were expected to cause pervasive damage, but
Russia, and other SCO nations. (Note that the somehow floundered. On the other hand, the use
definition we produce in the Legal Committee of “expect” in the definition means that attacks
does not necessarily have to include this; as we with large unintended consequences might not be
saw above, including such a clause would make included as cyber-attacks. The second implication
it difficult for the definition to appeal to Western in particular seems problematic, since it is
nations. However, because this is so important to straightforward to show that a cyber-operation
some SCO nations, delegates should recognize caused significant harm, but more difficult to
that significant concessions will be necessary to prove that it was expected to cause such damage.
SCO nations if the clause is not included and to As you can see, the definition this committee
NATO nations if the clause is included). produces will be examined in great detail, word
Beyond raising controversy, the Tallinn Manual by word—and every word will have immense
definition also raises a number of questions. A implications. Therefore, even though the
cyber-attack must be “expected to cause injury definition we eventually propose may only be one
or death to persons or damage or destruction to sentence, it will likely require an entire working
objects.” But what counts as an object? Obviously paper to explain. As an aside, recall that no matter
physical structures, such as power generating the definition you propose, it will be important
infrastructure, would be covered under this to differentiate between cyber operations that
definition. What about software, data, websites, constitute attacks between nations and cyber
or code? Would they classify as objects? The operations that are better classified as cyber-
Tallinn Manual also fails to define what classifies terrorism or cyber-crime. In preparing their
as damage. Again, physical damage to physical definitions, delegates should consider all the
objects would certainly be covered by this questions raised above, as well as issues that their
definition. But what about damage to intangible specific definitions raise. If you were writing a
objects in cyberspace? Would manipulation working paper that proposed the Tallinn Manual
of government data count as damage? Would definition, for instance, then you would first
destroying software responsible for the national write the definition itself. Then, you would need
grid be included under this definition? Would to explain what exactly you mean by “expect”
the disabling of a large network be considered a (e.g. Would an attack with large unintended
cyberattack? These questions may seem trivial, consequences still count as a cyberattack? Must
but they are incredibly important. For instance, nations prove that the aggressor anticipated the
if only cyber operations that caused physical attack would cause large-scale damage? Would
damage to some object or person were considered attacks that were intended to be very harmful, but
failed, still classify as cyber-attacks and provoke
10 Tallinn Manual
retaliation?). You would also need to explain
12 Legal Committee

what classifies as an object, as well as what the of the examples and counterexamples she explores,
definition means by damage to an object. For each the depth of her explanations, and the way she
of these explanations, it will likely be useful to breaks down the definition clause by clause. Since
give examples that illustrate the threshold (e.g. an it is an appendix, you are not required to read it,
example of something that would be considered but we do believe that it will be very useful—so
an object and an example of something that would useful, in fact, that we recommend you skip to the
not be considered an object in the definition, a appendix and read it now instead of waiting until
consequence that would be considered sufficient you finish the rest of the background guide.
damage for the operation to be considered a
cyber-attack and a consequence that would be
considered insufficient damage for the operation
to be considered a cyber-attack, etc.).
Clarifying the definition with examples and
explanations will be a very difficult process, which
is why we have devoted a third of this background
guide to the definition of a cyber-attack and
expositions of proposed definitions. As you
hopefully have noticed, each definition sounds
reasonable until you unpack what each word
means, what is included and what is excluded
under the definition, and how the definition
would classify examples like Stuxnet and the DNA
hack. This is where most of the controversy will
arise in committee; it is easy to agree on a vaguely
worded definition, but not as easy to agree on a
definition accompanied detailed explanations
and many examples that demonstrate what the
words in the definition truly mean. Nonetheless,
the committee must produce such a definition,
as every law we write will depend on a strong,
consistent, and universal definition of a cyber-
attack.
Although it is far too long to include in the body
of this background guide, previously-mentioned
legal scholar Oona A. Hathaway proposed a
definition of what constitutes a cyber-attack in
2012. The definition itself has its strengths and
weaknesses. However, the level of detail devoted
to explaining every word in the definition and
providing countless examples makes the definition
very strong and clear. The Legal Committee should
strive to craft a definition of equal strength and
clarity. Therefore, we have included her definition
and exposition as an appendix to this section. We
highly recommend that you study it, taking note
Harvard Model United Nations India 2018 13

Subtopic II: The Prohibition of Force

The Latin phrase jus ad bellum translates to political perspective. Historically, the obvious
“right to war.” In international law, jus ad bellum problem is that Article 2(4) was written in
refers to the body of laws that govern when a 1945—the last thing that the authors of the UN
nation may engage in conflict with another nation. Charter were thinking of was a global network of
(In the next subtopic, we will examine jus in bello, computers dominating economics and politics
which translates to “right in war” and refers to the in the 21st century. Combined with the fact that
body of laws that limit the actions nations may cyber-warfare is unlike any other form of conflict,
take while engaged in conflict.) This subtopic will this means that the UN Charter itself provides
be divided into two subsections: the prohibition little direction as to how we should incorporate
of force and exceptions to the prohibition of cyber-warfare into the current legal norms.
force. We will begin each of the subsections by
introducing a tenet of international law and then Politically, no matter how the Legal Committee
examining it with regard to cyber-attacks and extends Article 2(4) to cyberspace, it will likely
cyber-warfare. The first of these core principles is prove controversial. This is because cyber-warfare
Article 2(4) of the UN Charter: is a paradigm shift for international conflict and
the balance of power. For centuries, the nations
All Members shall refrain in their international with the largest, most expensive militaries have
relations from the threat or use of force against dominated international politics. But cyber-
the territorial integrity or political independence warfare completely changes this; the most powerful
of any state, or in any other manner inconsistent nations today are also the most reliant on expansive
with the Purposes of the United Nations. computer networks. In the US, for instance,
computers control the financial system, air-traffic
This is the main justification for the illegality control, offensive and defensive nuclear weapon
of the use of force in international relations, and facilities, and nearly every aspect of civilian and
it has also given rise to the legal norm of non- military communication. A widespread denial of
intervention. Different member-states have service attack could cripple the US economy and
adopted different interpretations of Article 2(4). military, rendering a global hegemon obsolete and
While the US, as well as most Western nations, defenseless in a matter of minutes. Thus, cyber-
contend that this clause only prohibits the use warfare presents an incredibly powerful way to
of physical or armed force, some nations in the check the power of developed nations cheaply; it
SCO argue that it also bans political, social, would require billions of dollars to compete with
and economic coercion. Such an interpretation the US navy at sea, but only a skilled team of
is particularly distasteful to NATO nations, hackers and a little luck to incapacitate the US
which often use these tactics to pressure rogue military using a few computers across the world.
or oppressive regimes. It is worth noting that the
more limited, NATO-supported interpretation This is why experts call cyber-warfare a paradigm
that Article 2(4) only applies to kinetic force has shift. It is also why the application of Article 2(4)
generally prevailed in international courts. It is, to cyberspace is so controversial. NATO nations,
therefore, the current legal norm. in contrast to their more limited interpretation of
Article 2(4) with respect to physical force, prefer a
Since Article 2(4) is a foundational principle of broader extension of Article 2(4) that classifies all
just ad bellum, the laws governing international cyber-operations in foreign nations as “the threat
conflict, it must be extended to the fifth realm or use of force against the territorial integrity or
of warfare: cyberspace. However, this has proven political independence of any state.” This would
incredibly difficult from both a historical and mean that, legally, a cyber-operation would be
14 Legal Committee

equivalent to a physical, armed operation against of harmful information to the government as a


another state. The perpetrator of a cyber-attack violation of Article 2(4), which aligns with their
would then be subject to the same punishments interpretation that the article should include
as the perpetrator of a kinetic attack (e.g. UN political, social, and economic coercion in
Security Council sanctions), as well as perhaps a addition to kinetic operations as “force.” As you
retaliatory strike by the victim of the attack (which can see, some of these controversies are very
we will discuss in greater detail in the second part similar to the issues you will consider in crafting
of this section). NATO nations and other more the definition of a cyber-attack. Therefore, it will
developed nations favor this interpretation, as be important for you to leverage the definition you
they have the most to lose from the rise of cyber- have established when considering the application
warfare and the new balance of power it would of Article 2(4) to cyber-attacks.
bring. In fact, NATO has already extended the
NATO treaty to address cyber-attacks in this It will likely be beneficial for you to adopt a
way; in 2008, the NATO nations resolved that similar format for this subtopic as for the first
cyber-attacks trigger Article 4 of the NATO subtopic. The extension you write to Article 2(4)
treaty,11 which states that “The Parties will consult might be short. However, the explanation of and
together whenever, in the opinion of any of them, examples that illustrate your extension to 2(4)
the territorial integrity, political independence will likely be much longer. The fundamental
or security of any of the Parties is threatened.”12 question you should keep in mind as you amend
In 2014, faced with increasingly frequent cyber- Article 2(4) should be: When should a cyber-
attacks from Russia and China, NATO announced attack be classified as “force” under Article 2(4)?
that cyber-attacks could trigger Article 5 of the More specifically, when does a cyber-attack count
NATO treaty, which is given below: as the use of force “against the territorial integrity
or political independence of any state”? What do
The Parties agree that an armed attack against territorial integrity and political independence
one or more of them in Europe or North America mean in cyberspace? Remember, any cyber-
shall be considered an attack against them all and operation that you classify as “the threat or
consequently they agree that, if such an armed use of force against the territorial integrity or
attack occurs, each of them…will assist the Party political independence of any state” will violate
or Parties so attacked by taking forthwith…such international law and trigger the same legal
action as it deems necessary, including the use of countermeasures an armed assault would trigger.
armed force.13
You should also answer the following question:
As you can see, the question of whether cyber- how should we address the threat of a cyber-
attacks should be classified as uses of armed force attack? Article 2(4) states that the threat of force
has profound implications and is therefore highly is equivalent to the use of force. Should the threat
controversial. In contrast to the NATO position, of cyber-attacks be equivalent to the use of cyber-
SCO nations will likely prefer a looser extension attacks? If so, what exactly should be included as
of Article 2(4) to cyberspace. On the other hand, a threat of a cyber-attack? Would a nation have
they might also look to include the dissemination to administer a literal threat in words? Would
covertly planning a cyber-attack be included as a
11 NATO Agrees on Common Approach to Cyber
threat of force?
Defence, EURACTIV.COM, Apr. 4, 2008, available at
http://www.euractiv.com/en/infosociety/nato-agrees- The questions above are by no means an
common-approachcyber- defence/article-171377.
 exhaustive list, but they should give you an idea of
what you should address when extending Article
12 NATO Treaty
2(4) to cyberspace. Remember, our objective
13 NATO Treaty
Harvard Model United Nations India 2018 15

is to craft an unambiguous legal framework for


cyber-warfare; you should unpack every word of
Article 2(4) and consider how it would apply to
cyber-attacks, giving explanations and examples
as necessary.
16 Legal Committee

Subtopic III: The Right to Self-Defense

There are exceptions to every rule—including as “frontier incidents” not sufficiently grave to
the prohibition of force in international law. trigger Article 51.17
The first exception refers to the right of the UN
Security Council to “determine the existence of Just as the ICJ established which kinetic
any threat to the peace, breach of the peace, or act uses of force are included as armed attacks, the
of aggression, and [to] make recommendations, or Legal Committee ought to determine which, if
decide what measures shall be taken . . . to maintain any, cyber-attacks should be classified as armed
or restore international peace and security.”14 This attacks and trigger the right to self-defense.
will not be the focus of the committee. Instead, This is a difficult task, but luckily three schools
we will consider the second exception. Article 51 of thought have emerged that may guide your
of the UN Charter states the following: approach to classifying cyber-attacks.

Nothing in the present Charter shall impair The most traditional position is the instrument-
the inherent right of individual or collective based approach. According to scholars at the Yale
self-defense if an armed attack occurs against a School of Law, the instrument-based approach
Member of the United Nations, until the Security “treats a cyber-attack as an armed attack only if
Council has taken measures necessary to maintain it uses military weapons. For example, bombing
international peace and security. Measures taken computer servers or Internet cables could meet
by Members in exercise of this right of self-defense the requirements of an armed attack if the strike
shall be immediately reported to the Security was of sufficient gravity.”18 Depending on how
Council.15 the Legal Committee decides to define a cyber-
attack, bombings of servers or cables might not
The key phrase is that a nation may engage in even be classified as cyber-attacks since they are
self-defense “if an armed attack occurs” against it. kinetic assaults against cyber-related facilities.
The main objective of the Legal Committee will The instrument-based approach, therefore,
be determining what, if any, cyber-operations includes very few (if any) cyber-attacks as armed
should be considered armed attacks and trigger attacks. This has the clear disadvantage that
the right to self-defense under Article 51. Note victims of cyber-attacks do not have the right
that “armed attack” is distinct from the wording to self-defense, even though cyber-attacks can
of Article 2(4), which bans the threat or use of be far more damaging than bombings or other
force. Indeed, in a famous case between Nicaragua physical assaults. However, the severity problem
and the United States, the International Court of is highly dependent on the definition of the use
Justice (ICJ) has ruled that there are threats or uses of force. For instance, if the committee adopts the
of force that are not considered armed attacks and instrument-based approach and does not include
thus do not allow the victim to invoke the right cyber-attacks as uses or threats of force, then—
to self-defense. Armed attacks only include the even though the victim of a cyber-attack will not
“most grave forms of the use of force.”16 Border be entitled to self-defense under Article 51—the
intrusions, for instance, have been classified victim would be permitted to engage in retaliatory
cyber-attacks that are not classified as uses of
force (since only uses or threats of force are illegal
14 UN Charter
15 UN Charter 17 Military and Paramilitary Activities in and
16 Military and Paramilitary Activities in and Against Nicaragua (Nicar. v. U.S.), 1986 ICJ 14, para.
Against Nicaragua (Nicar. v. U.S.), 1986 ICJ 14, para. 195 (June 27)
191 (June 27).
 18 Hathaway
Harvard Model United Nations India 2018 17

under Article 2(4)). (You should read the previous Nations that advocate strong rights to
sentence again. It can be quite confusing, but it is defend oneself from a cyber-attack—mostly
incredibly important. If you can understand that industrialized nations that have the most to lose
sentence, it means that you have a solid grasp on from a cyber-attack—also tend to prefer the
the issues involved with defining a cyber-attack, target-based approach. Opponents of the target-
determining whether cyber-attacks are uses of based approach argue that, because it sanctions
force, and classifying cyber-attacks as armed aggressive defense of critical infrastructure, it
attacks or lesser offenses). Article 41 of the UN will allow nations to use small breaches of critical
Charter supports the instrument-based approach, infrastructure as justification massive cyber
stating that “partial or complete interruption… or kinetic counterattacks against the original
of…telegraphic, radio, and other means of offender; Chinese and Russian officials in particular
communication” are “measures not involving the fear that the US will launch disproportionate
use of armed force.”19 Any delegates proposing retaliatory attacks in response to minor cyber-
the instrument-based approach should answer operations. Delegates supporting the target-based
the following questions, among others: what approach should be sure to answer the following
classifies as a military instrument? Is there any questions, among others: What is classified as
cyber-attack, as you have defined a cyber-attack, critical infrastructure? If nations have the right to
that would make use of a military instrument, as choose what exactly they would like to classify as
you have defined a military instrument? What critical infrastructure, what would prevent them
recourse should be available to nations that are from listing everything as critical infrastructure?
victims of cyber-attacks that did not employ Are there any small-scale penetrations of critical
military instruments and thus do not trigger the infrastructure that should not trigger the right to
right to self-defense? How does your classification self-defense? If so, how do you differentiate those
of when cyber-attacks reach the level of armed- from attacks that should trigger the right to self-
attacks fit with your classification of when cyber- defense?
attacks reach the level of uses of force?
The third perspective on the right to
The second school of thought is called the self-defense is called the effects-based approach,
target-based approach. Sean Condron, one of the which is a compromise between the instrument-
most outspoken proponents of the target-based and target-based approaches and “classifies a
approach, has described in depth when cyber- cyber-attack based on the gravity of its effects.”21
attacks should constitute armed attacks under the The target-based approach is the most widely held
target-based approach: position, but, in the eyes of the Legal Committee
dias, this is mainly because the target-based
When the attack targets the state’s critical approach is also the most vague definition of an
infrastructure, the state should be able to exercise armed-attack. It is very sensible to classify an attack
active defense measures...states should be required based on its gravity, but, if the Legal Committee
to maintain a publicly available list of critical decides to adopt the target-based approach, it
infrastructure, which a state may protect with must establish the level of gravity that triggers the
active defense measures and, if the identified right to self-defense. Experts have offered several
critical infrastructure were subjected to a cyber different systems for assessing the gravity of an
attack, a state could respond in cyberspace without attack. There are far too many to include in this
first attributing or characterizing the attack.20 guide, so we will mention only a few prominent
schools of thought and describe even fewer.
19 UN Charter
20 Sean M. Condron, Getting it Right: Protect- HARV. J.L. & TECH. 403, 415-16 (2007)
ing American Critical Infrastructure in Cyberspace, 20 21 Hathaway
18 Legal Committee

Delegates proposing the effects-based approach


are highly encouraged to research and look for
inspiration in the perspectives we mention but
do not have space to describe. Michael Schmitt
offered six criteria for assessing gravity, including
the timing of the attack, the long-term damage
caused, the scale of the attack, etc. However,
with so many criteria, each of which requires a
subjective judgement, it would be difficult for the
international community to reach a consensus
as to whether a specific cyber-attack should be
considered an armed-attack. On the other hand,
CIA official Dean Silver has proposed that cyber-
attacks only reach the level of armed attacks “if
its foreseeable consequence is to cause physical
injury or property damage and...the severity
of the foreseeable consequences resembles the
consequences that are associated with armed
coercion.”22 This definition is difficult to object
to, but it is also vague. What does it mean for
something to be a foreseeable consequence? What
if a cyber-attack disables an electronic air defense
system? Would the foreseeable consequence of
that attack be to cause physical injury? These are
all questions that delegates using this definition or
a similar definition will have to address.
The specific questions you must answer in
your working papers and resolutions will depend
on the definitions you propose. However, it will
again be the case that even if your definition
of when a cyber-attack is classified as an armed
attack is relatively short, you should follow it
with a length explanation that unpacks the
meaning of every word in your definition. You
should also consider many different examples of
cyber-attacks, determine whether they would be
classified as armed attacks using your definition,
and explain why that is the case.

22
Harvard Model United Nations India 2018 19

Subtopic IV: The Exercise of Self Defense

Necessity and Proportionality computer virus, launching a retaliatory cyber-


attack against the hackers will not affect the spread
There are two final principles of jus ad of the virus. Therefore, responses to cyber-attacks
bellum we have yet to describe: necessity and are not necessary to repel an armed attack. It is
proportionality. Intuitively, these principles check possible that they could, however, be considered
the right to self-defense; necessity requires that necessary to avert an armed attack. This raises the
the use of force in response to an armed-attack be question as to whether international law should
necessary, meaning that there are no diplomatic permit anticipatory self-defense in cyberspace.
alternatives available to repel the initial attack,
and proportionality requires the retaliatory use In terms of proportionality, the Legal
of force to resemble the severity and scope of the Committee must determine how nations are
original aggression. It will be the responsibility permitted respond to a cyber-attack. Should
of the Legal Committee to extend the concepts responses to cyber-attacks also be cyber-attacks?
of necessity and proportionality to cyber-warfare May a nation engage in a kinetic response to a
and determine what actions a state may take in cyber-attack? On one hand, we would not want a
response to a cyber-attack. nation bombing the capital of another nation that
engaged in a cyber-attack. But on the other hand,
It is particularly difficult to extend the a cyber-attack can be far more damaging than a
principle of necessity to cyberspace. According convention, kinetic attack, so some scholars argue
to Nils Melzer of the University of Zurich and that nations should be permitted to respond to
the International Committee of the Red Cross, cyber-attacks with physical force. Furthermore,
necessity means that the action “be objectively the victim of the cyber-attack may not have the
necessary to avert or repel an armed attack... technical resources to engage in a counterattack
[meaning] self-defensive action may not lawfully in cyberspace, meaning that physical force
be carried out before it has actually become would be the only option. How should the Legal
necessary to repel an armed attack, nor when it Committee weight these considerations? Should
no longer is necessary for that purpose.”23 This a response in cyberspace be the preferred method
is problematic because cyber-warfare is unique. of retaliation, with physical force being used only
Experts at the Yale Law School recently described as a last resort?
the distinction between cyber-warfare and kinetic
warfare that complicates the law of necessity: The questions of necessity and proportionality
will be particularly difficult to extend to
The speed, unpredictability and clandestine cyberspace. They will also be controversial; the
nature of most cyber operations severely hamper US and its NATO allies will likely prefer fewer
the defending state’s ability to react in time to restrictions on the right of self-defense, whereas
detect and prevent or repel an imminent or SCO nations will prefer stronger checks on the
ongoing attack, which may well be designed and actions nations may take in response to a cyber-
timed to produce its harmful effects only months attack. The Legal Committee should aim to find
after the attacker’s intrusion.24 a mutually acceptable solution that answers, in
detail, each of the questions raised above. As with
Generally speaking, cyber-attacks just happen.
previous subtopics, it will be important to give
Once hackers have infected a system with a
examples of responses that would be considered
23 Melzer necessary and proportional, as well as responses
that would not be considered as such.
24 Melzer
20 Legal Committee

National Accountability The example above illustrates one of the most


fundamental problems with the implementation
We have now answered the questions “When of cyber-laws: it is very difficult to determine who
is a nation entitled to self-defense?” and “What is accountable and link national governments to
measures may a nation take in self-defense?” One groups of hackers. The Legal Committee must
question remains to be addressed: Against whom establish reasonable requirements for evidence
may a nation exercise its right to self-defense? In such that nations cannot offload their cyber-
kinetic warfare, the answer is obvious; an invaded attacks to “independent” groups of hackers and
nation, for instance, may take up arms and repel skirt international law. However, the committee
the invader. There is rarely any question as to the should also be mindful of the fact that rogue
invader’s identity. However, cyberspace cloaks groups of hackers, particularly in China and the
offenders in a veil of secrecy. It can be incredibly US, exist and do not reflect the priorities of their
difficult to determine where a cyber-attack governments. Striking this balance will be very
originated, and even more difficult to determine difficult, particularly because this issue is highly
who ordered the attack to occur. This section of contentious among China, Russia, and the US;
the background guide will address this question the US has expressed dissatisfaction with frequent
of national accountability. cyber-attacks by Chinese and Russian hackers,
Consider the following scenario. Bankers in the whom US experts are confident operated under
United States wake up one morning to a flurry of the orders of government officials. However, it
news reports. New York Stock Exchange, which is near impossible to prove that this was the case
depends on algorithmic trading through expansive under current international law.
computer networks, has been taken offline by a Benjamin Brake, an international affairs fellow
group of hackers. Chaos immediately engulfs the at the Council on Foreign Relations, recently
US economy; within hours, the stock market has wrote an article that exposed the fundamental
tumbled 30% and the President has ordered stock problems with the current requirements for
exchanges across the nation to be shut down. The assigning national responsibility:
US Federal Bureau of Investigation traces the
virus that infected the stock exchange computers A state is accountable for the actions of
to Italy, and from there to Morocco, and from individuals acting under its “effective control”
there to Bangladesh, and from there to China. ...The International Court of Justice has ruled that
They determine that the virus originated in China, violations of the law of armed conflict by private
about 45 kilometers outside of Shanghai. The individuals can be attributed to a state only if it
US Military Cyber-Command and the National could be shown the state “directed or enforced” an
Security Agency prepare a cyber counterstrike operation...A victim of a cyberattack would likely
against critical Chinese infrastructure while have to prove more than an adversary supplied
the US Delegate to the United Nations calls an a cyber weapon to a non-state actor. A victim
emergency meeting the Security Council and would instead have to show the state ordered
invokes the right to self-defense. What should the or had “effective control” over all aspects of the
UNSC do? Should it rule that the US does indeed cyberattack. Without such evidence, a victim’s
have the right to self-defense (let’s ignore the fact lawful response options may be limited to actions
that China has veto power)? The problem is that against the non-state actors—cold comfort for a
the Chinese government denies responsibility nation reeling from a cyberattack perpetrated by
for the attack. While it originated in Chinese hackers financed, organized, trained, supplied,
territory, there is no evidence that Chinese officials and equipped by a nation-state adversary.25
provided support to the hackers or directed their
25 Benjamin Brake. “Cyberspace’s Other At-
activities. tribution Problem.” Council on Foreign Relations, 5
Harvard Model United Nations India 2018 21

Obviously, this state of affairs is unacceptable; evidence that would meet the proposed threshold
it is essentially impossible to achieve the burden for state responsibility?
of proof required by the law of state responsibility.
Without more reasonable requirements, none of
the definitions or laws the Legal Committee writes
will be of any use; offenders will circumvent them
by pointing out that the law of state responsibility
has not been met and they cannot be held
accountable for the efforts of “independent”
hackers working inside their nations.
One potential solution is to loosen the
requirement that a government must direct or
enforce an operation. Instead, a government can be
held responsible for any operation that it financed,
organized, trained, supplied, equipped, directed,
or enforced. A bolder and more controversial
proposal would hold governments responsible for
any operations they were aware of. The law could
also stipulate that any operations a government
becomes aware of should be immediately
combatted and reported to the intended target.
The US and other NATO nations would likely
strongly support these requirements, which, in
their opinion, would eliminate a major loophole
in international law that has absolved the Chinese
and Russian governments of responsibility for
their hackers. SCO nations would likely oppose
the lighter burden of proof, arguing that it would
give the US an easy excuse to conduct cyber-
operations against international rivals—most
likely Russia, China, and other members of the
SCO. There are several potential improvements to
the law of state responsibility, but any proposal is
likely to be controversial. For delegates crafting
working papers and resolutions dealing with
the law of state responsibility, it will again be
important to provide a wealth of examples.
Delegates should answer the following questions,
among others: What amendments to the law of
state responsibility do you propose? What exactly
counts as equipping, directing, financing, etc. a
group of hackers? What are examples of evidence
that would not meet the proposed threshold
for state responsibility? What are examples of

Aug. 2015. Web. 17 Mar. 2018.


22 Legal Committee

Logistics: Resolutions, Position Papers, Blocs, and Research

Resolutions and Working Papers also the source of most debate about solutions to
global issues.
This and the following sections outline non-
substantive, but very important, aspects of the If you keep in mind the suggestions above, we
topic and committee. Working papers and draft are more than confident that you will leverage
resolutions are obviously some of the most your expertise of the situation to produce excellent
important parts of committee, so it is critical to working papers. We also understand that it is
understand what the staff will be looking for. As always useful to have examples. For your reference,
mentioned previously, the staff will place a high here is a working paper that we would consider
value on the specificity, depth, and quality of your too superficial (it’s actually a resolution, but the
proposed solutions; we would rather you address point still holds): http://www.unausa.org/global-
one issue effectively than address everything classrooms-model-un/how-to-participate/model-
superficially. The issues surrounding cybersecurity un-preparation/resolutions/sample-resolution.
and cyberwarfare are incredibly complex, so they
Speaking of resolutions, since you will be
will not be met by a single two-page working
crafting very specific working papers, we expect
paper. Therefore, we encourage you to use the
you to use the draft resolution stage as an
working paper stage to deeply explore one aspect
opportunity to merge working papers into more
of the situation and then look to merge with other
comprehensive solutions. If indeed you only
working papers that explore other subtopics.
address a few topics in great depth in your working
We cannot emphasize enough how important
papers, then there should be little conflict between
cooperation will be.
working papers and this merging stage should
Also, remember that it is often easy to figure out be relatively straightforward. The discussion
what to do, but much more difficult to determine on working papers should make it clear what a
how to do it. Because of this, we hope that you take draft resolution should look like: a collection of
time to consider how to execute your proposed in-depth working papers, weaved together into a
solutions and describe this in your working paper. comprehensive plan that retains the same level of
Suppose you are crafting a working paper to specificity as the working papers.
establish a proper definition of what constitutes a
cyberattack. This would be an excellent scope for Questions a Resolution Must Answer
a working paper—it is not too broad, but still very
important. The working paper should not only Any resolution should answer the following
include what would be the literal definition of a questions. However, we cannot begin to
cyberattack (which should still take up a decent emphasize that this list of questions should only
amount of space), but it should also address the give a broad sense of the topics a resolution
related issues of implementation. For instance, should address. Answering any one of these
who will be in charge of determining whether an questions requires answering at least five to
attack falls under the definition of a cyberattack? ten more specific questions, which have been
Will an international body be tasked with this given to you throughout the guide. We highly
responsibility or will it be up to individual nations recommend going back through the background
to decide, perhaps under the supervision of the guide and highlighting every question that was
UNSC? These details about how your solutions asked. Your resolution should answer every one
will be accomplished are arguably the most of these questions (or at least every question
important part of your working paper. They are that is applicable to your proposals). Below are
Harvard Model United Nations India 2018 23

a few general questions that summarize the four density of information, and many of them contain
subtopics this committee should address: links to related articles and studies that should
provide you with even more useful information.
What constitutes a cyber-attack? Beginning with the news articles and using the
When should a cyber-attack be classified as the articles that they cite to guide your research into
threat or use of force? the topic is a highly advisable way to conduct
additional research.
When, if ever, is a cyber-attack an armed attack
that triggers the right to self-defense? Another excellent resource is the United
Nations itself, as well as governmental research
How can the principles of necessity and bodies whose reports may be more digestible
proportionality be extended to address responses after you have read the background guide and
to cyber-attacks? some news articles about cyberwarfare. Many of
these organizations have fact sheets and other
How should the law of national accountability be reports that will provide you with the essence of
applied to or adjusted for cyber-attacks? the problem, without the “fluff” of some news
articles. Therefore, we also recommend that you
Suggestions for Further Research look through the websites of these organizations
for information related to the topic (e.g. google
With a topic as widely-known and broad as “US congressional report on cyberwarfare”).
cyberwarfare, research can be overwhelming;
there are so many resources out there, so it can be Finally, the Legal staff is always here to assist
quite difficult to parse through them and decide you. Since we are expecting you to have a solid
on a reasonable research strategy. In this section, understanding of the topic and produce excellent,
we will hopefully be able to assuage any fears detailed solutions, it is only reasonable that we
you have about researching and give you some do everything we can to help you achieve these
pointers as you dive into the topics more deeply. objectives. So, if you have any questions, please
reach out to us. For example, if you are having
First and most importantly, if you are reading difficulty finding information about issues
this, then you are already doing an excellent job surrounding national accountability, just shoot us
researching! This background guide was pretty long an email and we will do our best to help you find
and detailed, so reading it carefully will hopefully resources and guide you in the right direction for
provide you with the foundational knowledge you further research.
need in order to succeed in committee. However,
additional research is always an excellent idea. One
way to go about this is to google the resources that
this background guide has cited. These guided the Position Papers
scope of the background guide and played a large
role in informing the staff about the topic, so they This section is very important, as we are
are an excellent source for additional research. Do requesting that you use a special format for
note, though, that some of these resources are long your position papers. Writing your position
guides and policy reports that are fairly dense and paper will help you understand the topics being
not broadly applicable. We would recommend discussed, forcing you to think creatively and
that you stay away from these. Instead, we would originally about complex problems and your
advise you to begin your research by reading the country’s position on them. You may not always
news articles we cited in the background guide. find a concise statement of your country’s actual
These are often more user-friendly in terms of the position on all of these issues – but we hope you
24 Legal Committee

can look at the facts and think rationally about believes the international community should deal
what would be in your nation’s interest. We will with the issue of national accountability. Finally,
not penalize delegates for taking a slightly different address the right to retaliate at the same level of
approach than their assigned country has in the detail as the topics above. For each subtopic, you
past – issues surrounding trade, development, and are welcome to include descriptions of the main
international economics are evolving quickly and issues and how those issues affect your country,
new political pressures arise all the time. Provided but you are only expected to include these items
you can justify a change in policy by pointing if they are key to supporting the rationale behind
out political and economic developments at a your proposed solutions. As you proceed with
national level, we would view such a change very this discussion, push yourself to be as detailed as
favorably, as better reflecting the actual context of possible. We’ve said it before and we will say it
the committee. again—the staff places a very high value on the
depth of your proposed solutions, rather than on
Traditionally, position papers have three parts: their breadth! Therefore, it is acceptable if you
a summary of the problem, how the issue affects decide to focus on a few aspects of each subtopic
your country, and what your country proposes in your solutions, so long as you make sure that
as a solution. While there is nothing wrong with you still understand the topic as a whole.
this format, we strongly encourage you to use
the format described herein for your position Finally, remember that these position papers
papers. While you are permitted to begin your are representation of a nation’s position and not
position paper with a general introduction a statement of your personal opinion. Therefore,
describing the issue and how it affects your they should be written formally and in third
country, this is not necessary; we are already person. For example, a paper written from the
familiar with the topic and its consequences, perspective of Nigeria should read, “Nigeria
so only include such a description if you feel it believes that…” Position papers should be at
will benefit you personally. Most importantly, least two single-spaced pages in size 12 font, with
organize the body of your position paper one-inch margins. Please follow the guidelines
by subtopic and focus on describing your on HMUN India’s website for the heading of the
SOLUTIONS TO THE PROBLEMS IN position paper.
DEPTH, not the problems themselves. (Note
that I have italicized, bolded, and capitalized
Closing Remarks
the worlds “solutions to the problems.” I cannot
possibly emphasize how important this is. The Thank you for reading this background guide. I
whole purpose of this committee is to propose understand that it is quite long, so I truly cannot
workable solutions to the topics we are discussing. say how much I appreciate and are impressed
Therefore, even if you know the issues in incredible that you have taken the time to read it (unless
depth, you will not be in a strong position to you skipped to this section, in which case I
contribute to committee unless you are ready to hope that my heartfelt thank you inspired you
propose in-depth and feasible solutions. In other to return to the beginning). Over the course of
words, the most important question to ask is not researching and learning more about this issue, I
“what is going on with cyberwarfare?”, but rather have become very passionate about it, and I hope
“what are we going to do about cyberwarfare?” that you will have a similar experience. While I
Make sure you come to committee ready to answer have attempted to make this background guide as
this question in depth.) Begin your position exhaustive as possible, I was not able to include
paper discussing definitions of cyberwarfare and everything relevant to the issue at hand. After
describe the definition you support or propose. all, it is a guide, meaning that it should guide
Then, proceed to discussing how your country
Harvard Model United Nations India 2018 25

your additional research into the topic. I cannot


emphasize how important this will be. I have
deliberately limited the scope of the committee
to a few fundamental issues, so I very much
hope that you seize the opportunity to research
these topics in great depth. Remember that it is
preferable to put forth a few detailed and feasible
solutions than it is to have many lofty and broad
proposals. On that note, I cannot wait to listen to
the solutions you propose and the discussions and
debates that ensue during committee. I hope that
you will leverage your new knowledge of the crisis
to implement novel solutions. I am really looking
forward to meeting you this winter, listening to
your ideas in committee, and watching you put
them into action. If you have any questions or
concerns, or if you are just bored and want to talk,
do not hesitate to reach out to me. I’m more than
happy to help, and I cannot wait to meet you all!

Sincerely,
Dylan Parker
Director, Legal Committee
Harvard Model United Nations India 2018

You might also like