delhi international model united nations 2020guide) as a singular topic and research accordingly,...

14
United Nations General Assembly 1 | Page Delhi International Model United Nations 2020 The United Nations General Assembly: Disarmament and Security AGENDA: The situation in South Asia. AKUL HALLAN Krishna Thakur Lakshit Vedant Chairperson Vice Chairperson Co-Vice Chairperson

Upload: others

Post on 14-Feb-2021

0 views

Category:

Documents


0 download

TRANSCRIPT

  • United Nations General Assembly

    1 | P a g e

    Delhi International

    Model United Nations 2020

    The United Nations General Assembly:

    Disarmament and Security AGENDA: The situation in South Asia.

    AKUL HALLAN Krishna Thakur Lakshit Vedant Chairperson Vice Chairperson Co-Vice Chairperson

  • United Nations General Assembly

    2 | P a g e

    Contents:

    Letter from the Executive Board

    Introduction to the Council

    Proof/Evidence in the Council

    Introduction to the Agenda

    Terrorism and Counter-Terrorism Measures

    Illegal acquisition of territories and related land disputes

    Cyber-terrorism and Data Privacy

  • United Nations General Assembly

    3 | P a g e

    Letter from the Executive Board

    Respected Delegates,

    On the behalf of the entire Executive Board of the United Nations General

    Assembly, I would like to welcome you all to Delhi International Model United

    Nations 2020.

    I am sure it will be a great learning experience for the delegates both experienced

    and the ones who will experience it for the first time, I would want you to

    embrace this opportunity and participate enthusiastically.

    From each of you, we expect impeccable diplomacy, high levels of debate, and of

    course, zeal to find solutions to the given problem posed before you. Knowledge

    of international politics, the state of global affairs is required to make

    constructive progress to complex multi-lateral problems. Remember, it’s the

    delegates who set the level of debate and maintain the flow of it.

    The agenda as a whole is also one of the most fascinating topics as it deals with

    various aspects of logic, reasoning and most importantly International law.

    Regular UNA USA Rules of Procedures will be followed in this committee, with

    some slight variation which shall be explained in the committee itself.

    I suggest all delegates to focus on the topics (divided further in the background

    guide) as a singular topic and research accordingly, however a division in regard

    to the approach shall also be welcomed.

    The Background Guide is intended to give you an insight as to what we as the

    Executive Board expect from you in terms of what to debate upon, and we hope

    you do not base your entire research on this document. Feel free to revert back to

    the executive board for any queries or for any form of assistance you shall need.

    As delegates, you will be expected to be thorough with your research and base

    your analysis and conclusions on the same during debate. Please remember, a

    Council is only as strong as its individual delegates, and that the Executive Board

    is here merely to guide debate, not to take part in it.

    Looking forward to 2 days of impeccable diplomacy and meaningful debate!

    Best of preparations!

    Akul Hallan

    Chairperson

    United Nations General Assembly

    [email protected]

    +91-9953022134

    mailto:[email protected]

  • United Nations General Assembly

    4 | P a g e

    Introduction to the Council

    The Disarmament and International Security Committee was established in

    1993. It is the First and one of the main committees of the General Assembly.

    The role of DISEC is outlined in Chapter IV, Article 11 of the United Nations

    Charter which states, “The General Assembly may consider the general

    principles of cooperation in the maintenance of international peace and security,

    including the principles governing disarmament and the regulation of

    armaments and may make recommendations with regard to such principles to

    the Members or to the Security Council or to both”. As per this article, the

    mandate of DISEC is highlighted as, “to promote the establishment and

    maintenance of international peace and security with the least diversion for

    armaments of the world's human and economic resources”.

    Voting in the General Assembly on important questions, namely,

    recommendations on peace and security, budgetary concerns and the election,

    admission, suspension or expulsion of members – is by a two-thirds majority of

    those present and voting. Other questions are decided by a straightforward

    majority. Each member country has one vote. Apart from approval of budgetary

    matters, including adoption of a scale of assessment, Assembly resolutions are

    not binding on the members. The Assembly may make recommendations on any

    matters within the scope of the UN, except matters of peace and security under

    Security Council consideration. The one state, one vote power structure

    potentially allows states comprising just five percent of the world population to

    pass a resolution by a two-thirds vote. 1

    1 http://www.un.org/en/ga/first/

    http://www.un.org/en/ga/first/

  • United Nations General Assembly

    5 | P a g e

    Proof/Evidence in the Council

    Evidence or proof is acceptable from sources:

    1. News Sources:

    a. REUTERS – Any Reuters article which clearly makes mention of the fact or is in

    contradiction of the fact being stated by a delegate in council.

    (http://www.reuters.com/ )

    b. State operated News Agencies – These reports can be used in the support of or

    against the State that owns the News Agency. These reports, if credible or substantial

    enough, can be used in support of or against any Country as such but in that situation,

    they can be denied by any other country in the council. Some examples are,

    i. RIA Novosti (Russia) http://en.rian.ru/

    ii. IRNA (Iran) http://www.irna.ir/ENIndex.htm

    iii. BBC (United Kingdom) http://www.bbc.co.uk/

    iv. Xinhua News Agency and CCTV (P.R. China) http://cctvnews.cntv.cn/

    2. Government Reports: These reports can be used in a similar way to the State

    Operated News Agencies reports and can, in all circumstances, be denied by another

    country. However, a nuance is that a report that is being denied by a certain

    country can still be accepted by the Executive Board as credible information.

    Examples are,

    http://www.reuters.com/http://www.reuters.com/http://www.reuters.com/http://en.rian.ru/http://en.rian.ru/http://en.rian.ru/http://www.irna.ir/ENIndex.htmhttp://www.irna.ir/ENIndex.htmhttp://www.bbc.co.uk/http://www.bbc.co.uk/http://cctvnews.cntv.cn/http://cctvnews.cntv.cn/

  • United Nations General Assembly

    6 | P a g e

    a. Government Websites like the State Department of the United States of

    America http://www.state.gov/index.htm or the Ministry of Defense of the Russian

    Federation http://www.eng.mil.ru/en/index.htm

    b. Ministry of Foreign Affairs of various nations like

    India(http://www.mea.gov.in/), People’s Republic of

    China(http://www.fmprc.gov.cn/eng/),

    France(http://www.diplomatie.gouv.fr/en/), Russian

    Federation(http://www.mid.ru/brp_4.nsf/main_eng)

    c. Permanent Representatives to the United Nations Reports

    http://www.un.org/en/members/(Click on any country to get the website of the

    Office of its Permanent Representative.

    d. Multilateral Organizations like the NATO

    (http://www.nato.int/cps/en/natolive/index.htm), ASEAN

    (http://www.aseansec.org/), OPEC (http://www.opec.org/opec_web/en/), etc.

    3. UN Reports: All UN Reports are considered are credible information or evidence

    for the Executive Board of the Security Council.

    a. UN Bodies: Like the SC(http://www.un.org/Docs/sc/ ),

    GA(http://www.un.org/en/ga/),

    HRC(http://www.ohchr.org/EN/HRBodies/HRC/Pages/HRCIndex.aspx) etc.

    b. UN Affiliated bodies like the International Atomic Energy Agency

    (http://www.iaea.org/), World Bank (http://www.worldbank.org/),

    International Monetary Fund (http://www.imf.org/external/index.htm),

    International Committee of the Red Cross

    (http://www.icrc.org/eng/index.jsp), etc.

    c. Treaty Based Bodies like the Antarctic Treaty System

    (http://www.ats.aq/e/ats.htm), the International Criminal Court

    (http://www.icc-cpi.int/Menus/ICC)

    Under no circumstances will sources like Wikipedia

    (http://www.wikipedia.org/), Human Rights Watch (http://www.hrw.org/) or

    newspapers like the Guardian (http://www.guardian.co.uk/), Times of India

    (http://timesofindia.indiatimes.com/), etc. be accepted.

    http://www.state.gov/index.htmhttp://www.state.gov/index.htmhttp://www.eng.mil.ru/en/index.htmhttp://www.eng.mil.ru/en/index.htmhttp://www.mea.gov.in/http://www.mea.gov.in/http://www.fmprc.gov.cn/eng/http://www.fmprc.gov.cn/eng/http://www.diplomatie.gouv.fr/en/http://www.diplomatie.gouv.fr/en/http://www.mid.ru/brp_4.nsf/main_enghttp://www.mid.ru/brp_4.nsf/main_enghttp://www.un.org/en/members/http://www.un.org/en/members/http://www.nato.int/cps/en/natolive/index.htmhttp://www.nato.int/cps/en/natolive/index.htmhttp://www.nato.int/cps/en/natolive/index.htmhttp://www.aseansec.org/http://www.aseansec.org/http://www.aseansec.org/http://www.opec.org/opec_web/en/http://www.opec.org/opec_web/en/http://www.un.org/Docs/sc/http://www.un.org/Docs/sc/http://www.un.org/en/ga/http://www.un.org/en/ga/http://www.ohchr.org/EN/HRBodies/HRC/Pages/HRCIndex.aspxhttp://www.ohchr.org/EN/HRBodies/HRC/Pages/HRCIndex.aspxhttp://www.iaea.org/http://www.iaea.org/http://www.iaea.org/http://www.worldbank.org/http://www.worldbank.org/http://www.imf.org/external/index.htmhttp://www.imf.org/external/index.htmhttp://www.imf.org/external/index.htmhttp://www.icrc.org/eng/index.jsphttp://www.icrc.org/eng/index.jsphttp://www.icrc.org/eng/index.jsphttp://www.ats.aq/e/ats.htmhttp://www.ats.aq/e/ats.htmhttp://www.ats.aq/e/ats.htmhttp://www.icc-cpi.int/Menus/ICChttp://www.icc-cpi.int/Menus/ICChttp://www.icc-cpi.int/Menus/ICChttp://www.icc-cpi.int/Menus/ICChttp://www.icc-cpi.int/Menus/ICChttp://www.wikipedia.org/http://www.wikipedia.org/http://www.hrw.org/http://www.hrw.org/http://www.hrw.org/http://www.guardian.co.uk/http://www.guardian.co.uk/http://timesofindia.indiatimes.com/http://timesofindia.indiatimes.com/

  • United Nations General Assembly

    7 | P a g e

    Introduction to the Agenda

    South Asia is home to many developing nations; and much like any other developing

    nations around the world, South Asia has its own share of Disarmament and Security

    issues to be handled.

    The agenda that is provided is a vast one, and hence, the executive board suggests the

    delegates to correspond with each and systematically tackle the agenda.

    A few important headers we could deliberate on, under the agenda, and under the

    ambit of the DISEC, as per the executive board are as follows:

    Terrorism and counter-terrorism measures.

    Illegal acquisition of territories and related land disputes.

    Regulations on cyberspace and combatting cyber-terrorism with emphasis on

    data privacy.

    The executive board will only be providing a brief over the aforementioned headers,

    and it is on the delegates to further correspond and decide which path they find more

    feasible to approach during the committee.

    Terrorism and counter-terrorism measures

    Like many other regions, South Asia is confronted with a rapidly transforming

    terrorism threat landscape that is increasingly transnational in nature. Local grievances

    and socio-political dynamics have been exploited by groups such as al-Qaeda and the

    Islamic State of Iraq and the Levant (ISIL) and linked to a global master narrative of

    conflict. At the national and local levels, civil society actors, with a wide range of

    experts and practitioners, seek to address many of these conditions and grievances that

    fuel support for terrorism and violent extremism, for instance, through improving

    access to public health, education, and social services; promoting pluralist and tolerant

    societies; and advocating for more effective and accessible national institutions.

    These efforts provide important lessons and good practices that can inform

    cooperative multi-stakeholder policies aimed at addressing terrorism and countering

    violent extremism (CVE) in South Asia.

    Since 2009, the Global Center on Cooperative Security (previously the Center on

    Global Counterterrorism Cooperation) has been working with the UN Security

    Council Counter-Terrorism Committee Executive Directorate (CTED), with generous

    support from the government of Norway, to develop a process to enhance regional

    cooperation among all eight member states of the South Asian Association for

    Regional Cooperation (SAARC). The process initially focused on actors in the

  • United Nations General Assembly

    8 | P a g e

    criminal justice domain, namely judges, prosecutors, and police officers (the criminal

    justice process), but expanded to include a complementary track that focused on civil

    society, experts, and practitioners from the region through a series of four workshops

    (the civil society and experts process). This complementary civil society and experts

    process, undertaken in partnership with the Institute of South Asian Studies at the

    National University of Singapore, encompassed regular dialogue and engagement with

    nongovernmental actors in South Asia to foster deeper understanding of local and

    regional drivers of terrorism and violent extremism and to identify critical gaps,

    opportunities, and priorities for capacity-building support to address the threat. The

    process generated greater awareness about established international counterterrorism

    norms and frameworks. These include the emphasis on regional cooperation in UN

    Security Council Resolution 1373; the importance of addressing incitement to

    terrorism while balancing fundamental freedoms, as highlighted in Resolution 1624;

    the international consensus around implementation of the United Nations Global

    Counter-Terrorism Strategy across its four pillars; multi-stakeholder approaches to the

    challenge of foreign terrorist fighters (FTFs), as highlighted in Resolution 2178; and

    the counterterrorism and CVE activities of UN entities such as the Alliance of

    Civilizations (UNAOC) and UN Women through implementation of Resolutions

    1325, 2122, and 2242. This assessment presents key outcomes of this multiyear civil

    society and experts process. It provides an overview of regional challenges and the

    efforts by the Global Center and CTED to identify key needs and priorities to inform

    responsive policies and programs to address the threat of terrorism and violent

    extremism in South Asia. This assessment concludes with a set of recommendations

    on practical ways that multilateral and regional organizations and national

    governments can work with civil society, experts, and practitioners to address this

    threat in the region.2

    Recent years have seen a dramatic rise in terrorist activities around the world,

    including in South Asia. Effective and timely international and regional cooperation is

    essential for States to prevent terrorist acts and bring terrorists to justice. The United

    Nations Counter-Terrorism Committee Executive Directorate (CTED), with the

    assistance of the Global Center on Cooperative Security and other partners, has been

    assisting South Asia in these efforts in a unique and concrete fashion for over a

    decade. What started as a series of regional workshops, bringing together judges,

    prosecutors and police officers, has since grown considerably. Through 12 workshops

    in 9 years, over 300 judges, prosecutors, and police from Afghanistan, Bangladesh,

    Bhutan, India, the Maldives, Nepal, Pakistan, and Sri Lanka have shared experiences,

    lessons learned, and best practices on how to counter terrorism in their region and

    beyond. The aim of the workshops is to promote habits of regional cooperation,

    2 https://www.un.org/sc/ctc/wp-content/uploads/2017/02/2016-12_Bhulai-Fink-South-Asia-CSE-Process.pdf

    https://www.un.org/sc/ctc/wp-content/uploads/2017/02/2016-12_Bhulai-Fink-South-Asia-CSE-Process.pdf

  • United Nations General Assembly

    9 | P a g e

    expand professional networks, and develop a regional platform for the delivery of

    technical assistance and training. Over the years, these discussions have played a vital

    role in CTED’s assessment of counter-terrorism capacities and priorities in the region,

    as well as the identification of emerging trends and threats. The gatherings serve as a

    laboratory for innovation by generating and testing new technical ideas, many of

    which inform the core work of the UN Counter-Terrorism Committee, UN entities,

    and implementing partners. The workshops have focused on a broad range of topics,

    usually proposed by the participants, including anti-money laundering and countering

    the financing of terrorism (AML/CFT); effective interview and interrogation

    techniques; the education and training of law enforcement personnel; foreign terrorist

    fighters; gender dimensions of the criminal justice response to terrorism; and the

    collection and use of electronic evidence in terrorism cases. A parallel process in

    support of the practitioners’ dialogue was launched in 2011 by the Global Center, in

    partnership with the Institute of South Asian Studies at the National University of

    Singapore, bringing together key experts, academics, and practitioners to explore

    national and civil society responses. With support from the government of Norway,

    this initiative informed and supported CTED’s work on the basis that non-

    governmental actors and practitioner networks can be valuable partners in developing

    cooperative efforts to address terrorism and violent extremism, complementing more

    formal regional initiatives. In 2018, in an initiative funded by the government of

    Japan, CTED and the Global Center plan to bring practitioners and civil society

    leaders together to discuss criminal justice issues and to further promote practitioner

    engagement with civil society. CTED greatly appreciates the commitment to this

    innovative initiative of the eight States of the South Asian Association for Regional

    Cooperation (SAARC), as well as the SAARC Secretariat, which participates as an

    observer. The Executive Directorate is also grateful for the generous support provided

    by Australia, Canada, Denmark, India, Japan, Norway, Sweden, and the United States

    of America. Participating entities have included numerous United Nations Member

    States, INTERPOL, OHCHR, the UNODC Terrorism Prevention Branch (TPB), and

    the pro bono contributions of Baker McKenzie. 3

    3 https://www.un.org/sc/ctc/wp-content/uploads/2017/11/Judicial-Workshop-Brochure_2.pdf

    https://www.un.org/sc/ctc/wp-content/uploads/2017/11/Judicial-Workshop-Brochure_2.pdf

  • United Nations General Assembly

    10 | P a g e

    Illegal acquisition of territories and related land disputes.

    South Asia and Southeast Asia have the maximum number of land disputes in

    comparison to other parts of the world. Not only have they been domestic in nature,

    but a lot of them have also taken place between countries.

    The dispute of Kashmir, under the mainland of India has been one of the longest

    dispute in the history of the world.

    The Kashmir conflict:

    While India, Pakistan and China have been arguing and fighting over the land over the

    years, the recent status stands as follows for the 3 nations:

    India and Pakistan:

    India’s unilateral decision to revoke Article 370 of its constitution has severely

    hampered the chances of a renewal of the peace process between New Delhi and

    Islamabad. From Pakistan's perspective the Indian action constitutes a grave violation

    of the U.N. Security Council resolutions on Kashmir and bilateral Pakistan-India

    agreements, such as the 1972 Shimla Agreement and the Lahore Declaration.

    Prime Minister Narenda Modi’s government’s decision will have far reaching

    consequences for Pakistan-India relations and regional peace and security. Islamabad

    says that increased repression and human rights violations by Indian forces in Indian

    Occupied Kashmir will breed violence, fuel indigenous uprising, and further generate

    tension with Pakistan. Yet, since August 5, India has mobilized hundreds of thousands

    of troops, detained thousands of Kashmiris, and imposed a curfew resulting in food

    and medicine shortages. In Islamabad’s eyes, the disputed region of Jammu and

    Kashmir has become a garrison area.

    With the illegal steps taken by the Indian government—imposition of curfew, arrests

    of political leaders and blockade of communications—the situation has reached a

    tipping point. Intensifying violence in Indian-occupied Kashmir poses serious

    challenges for Pakistan and the region. These challenges include:

    For Pakistan, Kashmir remains the core issue and Islamabad cannot envision a

    dialogue with India that excludes the Kashmir issue.

    Islamabad rejects India’s claim that Kashmir is an internal matter, pointing to

    past and present international and bilateral calls for a peaceful resolution

    through dialogue. India’s move violates multiple U.N. Security Council

    resolutions and is unacceptable to Pakistan and the international community.

    The faint hope for a reasonable settlement based on the four-point formula—

    which became the basis of back-channel negotiations during the 2004-08 peace

  • United Nations General Assembly

    11 | P a g e

    process and envisaged self-governance for Kashmiris, demilitarization, travel

    across the Line of Control and a monitoring mechanism, while also protecting

    the vital interests of the two countries—has been extinguished.

    Pakistan fears India could stage a false flag in either Jammu and Kashmir or

    mainland India and blame it on Pakistan in order to divert attention from the

    volatile situation in Kashmir.

    The possibility of direct Indian intervention in Azad Kashmir or subversion

    inside Pakistan cannot be ruled out. In case India directly intervenes in Pakistan

    or in Azad Kashmir or Gilgit-Baltistan (both of which are part of what the U.N.

    calls Pakistan-administered Kashmir), it could result in war between the nuclear

    powers with incalculable implications for both countries and the region.

    The outcome of the current Indian actions could result in more refugees from

    India into Pakistan.

    The latest Indian action will complicate the resolution of other long-standing

    disputes over issues like the Siachen Glacier and Sir Creek.

    The Indian decision will adversely impact people-to-people contacts and trade

    relations between the two countries.

    Tension between India and Pakistan will have a negative impact on regional

    security. The South Asian Association for Regional Cooperation process is

    already suspended due to India-Pakistan tensions. India’s move is a further blow

    to regional cooperation.

    Irrespective of India’s actions, the fact is that Kashmir is an internationally

    recognized disputed territory and will remain so until the legitimate aspirations

    of the Kashmiris are fulfilled. India’s repression in Kashmir is unlikely to

    change this reality.

    India and China:

    Why are they fighting?

    The military superpowers have been arguing for decades over territory in the high-

    altitude, largely uninhabited region. Their armies come face to face at many points

    along the 3,440km (2,100-mile) shared border. The confrontation came after tensions

    bubbled up in recent months over a new road India built in Ladakh, along the Line of

    Actual Control which divides the sides. That angered China, which deployed troops

    and built infrastructure of its own in disputed territory, bringing the two sides' forces

    in closer proximity and heightening the risk of clashes.

    Why does it matter?

    Both sides see the area as strategically important, economically and militarily. If

    neither gives way, the stand-off could have destabilising consequences for the region.

  • United Nations General Assembly

    12 | P a g e

    The loss of life raises the stakes. Those deaths are believed to be the first in 45 years in

    a border confrontation between India and China. They have fought only one war, in

    1962, when India suffered a humiliating defeat.

    Cyber-terrorism and Data Privacy

    Cyberspace is an attractive medium for computer-savvy generation of terrorists due to

    its anonymity, psychological impact and also it’s potential to inflict massive damage.

    There have been numerous studies by researchers in Europe, the Middle East and

    North America in analyzing the illicit activities and terrorism in cyberspace. However,

    there are limited studies on similar cases in the Southeast Asian region.

    Southeast Asian region supports illicit activities and terrorism in cyberspace such as

    the spreading of propaganda, recruitment, as well as planning and coordination. There

    is a great possibility that the virtual world evolves and plays a critical role in

    promoting illicit activities and terrorism in cyberspace.

    There are currently gaps in identifying terrorist content on various social media

    platforms. There may be a need for greater in-house expertise in technology

    companies, with the requisite language and cultural knowledge, to know where to look

    for content that might be missed by algorithms.

    There is a link between hate speech and terrorist activity in South Asia. Given the

    extent of inter-communal violence in the region, it is critical to carry out further

    research on this link.

    Terrorists’ use of end-to-end encrypted communications is a common feature of all

    three case studies in this paper: Pakistan; Bangladesh; and Sri Lanka. However,

    government responses to this in South Asia have so far been unhelpful, as their

    suggestions have been un-implementable and social media blocks have had limited

    effectiveness.

    There is a need for greater public–private dialogue on how the internet and social

    media are used by terrorists and for counterterrorism. A multi-stakeholder approach

    would not only help technology companies develop better approaches to managing the

    issues but also build links between communities and authorities to develop more

    cooperative approaches.

    Governments should consult technology companies and civil society while designing

    regulations aimed at countering terrorist use of the internet to enhance the

    effectiveness and feasibility of regulations.

  • United Nations General Assembly

    13 | P a g e

    Government officials in South Asia need to be trained on effective identification of

    terrorist content, reporting mechanisms and the use of metadata on encrypted

    communication platforms for investigative purposes.

    Technology companies should recruit more content moderators speaking Baloch,

    Sinhala, Tamil and Bangla, and support qualitative research into the dissemination of

    terrorist propaganda in regional languages.

    Social media platforms should consider developing easier ways for users to report

    terrorist content.

    Governments in South Asia need to clarify the scope of counter-extremism legislation

    and its applicability online, and clearly define hate speech and terrorist content.

    Terrorism in Southeast Asia has long been a threat. Previously, the spectre of terrorism

    haunted the region via threats of physical violence, from bombings to kidnappings.

    However, in the current internet age, terrorism has found new ways to attack its

    targets. Cyber-terrorism in the region has been a growing concern and experts have

    called out ASEAN’s slow response to it.

    At the moment, Southeast Asian countries are lagging behind when it comes to cyber-

    security. Based on a report by global management consultants, AT Kearney, ASEAN

    countries are also being used for cyber-attacks; with Indonesia, Malaysia, and Vietnam

    serving as global launch pads for malware attacks.

    In October 2017, the personal information of around 46 million mobile subscribers in

    Malaysia was compromised. The personal details leaked included home addresses,

    national identification card numbers, and SIM card information. It was reported that

    the data breach had actually occurred in 2014 but was only discovered a year later.

    This is due to the lack of data breach notification laws in the country which would

    require a company that has had its data breached to notify its customers.

    Singapore has also been the victim of cyber-attacks. In 2017, the country was the

    target of three major cyber-attacks, namely the Ministry of Defence cyber breach in

    February, WannaCry Ransomware attacks in May, and Petya Ransomware activity in

    June.

    These incidents exemplify how far behind the region is in terms of cyber-security.

    Cyber-security at this juncture of time is particularly necessary as internet penetration

    in the region is at its highest and will continue to grow. Hootsuite’s report on

    Southeast Asia’s digital usage indicates that the region has an internet penetration rate

    of 58 percent which means there are more than 370 million internet users currently.

    According to data from AT Kearney, Southeast Asia is not spending enough to protect

    its citizens from cyber-security attacks. Despite high levels of growth, data shows that

  • United Nations General Assembly

    14 | P a g e

    ASEAN member states spent an estimated US$1.9 billion in 2017 or a measly 0.06

    percent of the region’s gross domestic product (GDP) on cyber-security. The financial

    impact from cyber-attacks can be crippling and devastating. According to the Asia

    Pacific Risk Centre, the global cost of data breaches is projected to reach US$2.1

    trillion by 2019.

    With technology advancing rapidly and embedding itself deeper in our lives, ASEAN

    countries need to realise the importance of investing in cyber-security. As technology

    gets more pervasive, the more vulnerable we are to exploitation by cyber criminals,

    unless there is proper protection in place.

    One of the biggest threats in cyberspace last year was the threat of ransomware.

    Ransomware is a form of digital extortion where attackers use a trojan to gain access

    to a user’s computer and threatens to publish the victim’s data or perpetually block

    access to the victim’s computer unless a ransom is paid.

    People’s finances could be at risk with internet banking, e-wallets and even crypto-

    currency usage on the rise. Without proper security measures in place, people could

    lose their livelihoods in the event of a cyber-attack. Earlier this year, hackers managed

    to get away with US$440 million in crypto-currency after hacking a Japanese crypto-

    currency exchange.

    The overall financial impact of cyber-attacks can be devastating to an economy.

    According to the Asia Pacific Risk Centre, the global cost of data breaches is projected

    to reach US$2.1 trillion by 2019.

    One of the steps ASEAN can take moving forward is to introduce a digital strategy to

    combat cyber-attacks and data breaches. However, a deeper understanding of the tech

    sector and the workings of the internet is required. Aside from that, the initiative needs

    to transcend borders, as information and data move freely without borders on the

    internet.

    ASEAN has taken steps to cooperate with other countries to tighten cyber-security. At

    a previous ASEAN Summit, ASEAN and the United States (US) released a joint

    statement reaffirming their commitment to strengthening cyber-security. Russia has

    also made similar pledges in developing cyber-security cooperation with ASEAN.

    In combating cyber-security, a common misnomer is that most attacks are carried out

    by cyber criminals. However, governments need to realise that corporations are just as

    capable of carrying out questionable actions when it comes to personal data, as seen in

    Facebook’s multiple scandals recently. Governments also need to figure out an

    overarching strategy that can keep multi-national corporations in check as well as

    ensuring that the right infrastructure is in place to prevent future attacks from cyber-

    terrorists.