Atlantic College Model United Nations A/RES/2011/1

Security Council

2011 Session
Agenda Item 1
Resolution adopted by the Security Council
Observing that a single person, known as a cyberterrorist, can potentially cause strife and havoc
to the world of information technology, with relatively little funds, equipment or experience;
Further Observing that most cyberterrorists act and plan either individually or in groups on the
Believing that it is crucial to warn member states on potential cyberterror threats that may be
directed at them from radical or violent groups or individuals, so they can take action to defend
themselves from such attacks;
Further believing that member states should also respect, as best as possible, civil liberties and
the individual right to privacy when tackling cyberterrorism;
Stating that the body believes cooperation of countries can be better developed by resolving
existing disagreement between one another - in the context of the internet,

1. Defines for the purpose of this resolution:
a. Information technology, as the development, implementation, and
maintenance of computing devices and software systems to organize and
communicate information electronically;
b. Cyberterrorism: as any premeditated, politically or ideologically motivated
attack, or threat thereof, through the use of information technology, against
information or telecommunication networks, computer systems, computer
programs, and data, which results in significant disruption, distress or
losses of physical, economic, or infrastructural nature to targets, by sub-
national groups or agents;
c. Internet Service Provider(ISP): as any person or entity that operates or
resells and controls any facility used to provide Internet access directly to
the public;
2. Declares that conspiring, planning, carrying out, funding or aiding acts of
cyberterrorism shall be outlawed in all member states, and that member states
SecurlLv Councll Chalr
22 !anuarv 2011

will commit to prosecute violators to the fullest extent possible in their
3. Discourages member states from conspiring, planning, carrying out, funding or
aiding acts of cyberterrorism, and requires member states who carry out such
activities to cease and desist immediately;
4. #equires member states and ISPs to do as much as possible within their
jurisdiction to prevent and combat cyberterrorism at home and abroad, with
respect given to civil liberties and the individual right to privacy under applicable
national and international laws;
5. &rges member states to share information with each other on individuals and
organizations who are suspected or known to have a history of cyberterrorism to
combat the spread of cyberterrorist activities on to the international level, while
respecting applicable national and international laws regarding privacy;
6. urther &rges member states to coordinate counter-cyberterrorism activities
against such cyberterrorist groups;
7. #equires member states to freeze the assets of cyberterrorist individuals or
organizations which may be used to support international cyberterrorist acts -
including but not limited to: funds, computers or storage devices;
8. alls for member states to shut down ISPs that knowingly host and allow cyber
terrorist activities to originate from their servers;
9. Demands member states ban or restrict convicted individual cyberterrorists from
computer activity;
10. urther requires member states to raise awareness about cyberterrorism and
educate the general populace about protecting themselves from such attacks.
11. #equests that developing member states may request monetary and
technological assistance from the Counter Terrorism International Taskforce in
the case of cyber terrorism
12. $trongly &rges the creation of regional information security systems
(membership is voluntary). We insist that these regional blocs should include
international legal norms and threat monitoring continuing identification and
assessment centers within the framework of existing bodies, such as the
Collective Security Treaty Organization. (International legal norms should be
drawn up by the Security Council, which we all agree on).
13. #ecommends consultations on most complex problems regarding international
information security. We would like to initiate joint research on ways to solve the
most pressing problems of IIS, and the publication of a report which updates us
upon the status of existing and newly developing cyber threats. This would be in
the form of a journal under the UN aegis.

Committee Session 1
22 January 2011

Sign up to vote on this title
UsefulNot useful