Professional Documents
Culture Documents
TABLE OF CONTENTS
LETTER FROM EXECUTIVE BOARD….………………………………………………...2
CRITERIA MARKS ASSIGNED………………………………………………………….....3
HOW TO PREPARE FOR THE COMMITTEE………………………………………….3-5
SOME POINTERS ON CHITS.........................................................................................................5-6
HOW TO RESEARCH FOR THE COMMITTEE………………………………………….6
A STEP-BY-STEP GUIDE TO UNDERSTAND YOUR COUNTRY AND ITS
FOREIGN POLICY……………………………………………………………………….....6
DOCUMENTATION SUBMISSION AND PREPARATION….………………………...6-7
VALID SOURCE OF PROOF IN THE COMMITTEE.…………………………………....7
NEWS SOURCES…….……………………………………………………………………...7
GOVERNMENT REPORTS………….………………………………………………..…7-8
UNREPORTS………………………………………………………………………………..8
COMMITTEE MANDATE….………………………………………………………………9
FINANCIAL CRIME LEGISLATION AND DATA ANALYTICS IN FIGHTING
FINANCIAL CRIMES…………………………………………………………………....9-13
SOLUTIONS AND APPROACHES TO FIGHT DATA
CRIMES………………………………………………..………...………………………….14
THE RISKS OF PUBLIC DATA: BALANKCING PRIVACY AND
GOVERNMENT FUNCTIONS…………………………………...….…………………….16
CHALLENGES OF TRANSPARENCY IN ADDRESSING INFORMATION
ASYMMETRIES IN THE DATA-DRIVEN MARKET …………………………..…….17-18
CONCLUSION…………………………………………………………………………..18-19
P age |2
For example: You see someone’s marksheet and see that person has scored 90+ out
of 100 in 4 out 5 subjects however in the 5th subject, the person has scored just 53
out of 100. The part till here is called your research, this is something you’ve found
out by searching somewhere.
When it comes to analysis, analysis means interpretation, now for example in the
above example a good analysis would be finding out that the person if gives more
time to the 5th subject rather spending so much time on other subjects, his/her
marks in the individual subjects might fall a bit but he/she would improve overall
because now that person would be scoring well in 5th subject as well.
In simple language, analysis means to interpret and understand what you’ve research
and being able to present it as an argument in the committee which will help in the
flow of the debate. So, for 3 days of the conference, you’ll be marked upon following
things:
1. Verbatim: Research (3 Marks) + Analysis (3 Marks) + Foreign Policy & Guidance
of Debate (2 Marks; Explained below) = 8 Marks
2. Chits: [Research (3 Marks) + Analysis (3 Marks) + Foreign Policy (2 Marks)]/2
+ 1 = 5 Marks
3. Foreign Policy: Ensuring the fact that the statements made by a delegate in the
committee in the verbatim or chits are in line with their foreign policy; which
basically means that your statements should not oppose something which has been
said by high positioned representatives of your state/country;
4. Guidance of Debate: Being able to lobby in the committee and ensuring your
points in the committee are creating good arguments and ensuring debate in the
committee including in the unmoderated caucuses;
Substantive Chits shall be holding equal recognition in terms of marking for
Research, Analysis and Foreign Policy; however, they won’t be given marks for
Guidance of Debate, hence the overall marking for verbatim and chits won’t be
equal. Also, we understand that since the chits would be of equal recognition in the
committee, that doesn’t mean that you bring a pack of substantive chits written from
home. Only those chits will be marked which would be related to the topic being
discussed.
After going through the National and International reports, do go through the
general news report on the agenda which will tell you about all the progress which
has been related to the agenda.
After you’re done with the above things, try to pick up case studies and find the
problems in it and how can they be improved (which will test your analytical skills)
and being able to implement the solution for that problem will help you in your
application skills. The above is just one of the many ways of research, and one can
differ as well. But in the end, just ensure that you understand what the agenda means
and what all requires to be done in order to have a successful result.
A STEP-BY-STEP GUIDE TO UNDERSTAND YOUR COUNTRY AND
ITS FOREIGN POLICY
1. Research whether your country has provided aid to either parties or has in any
form dependent upon either parties for trade or finances and what were the
statements made by your respective delegations
2. Go to the website of foreign affairs of your respective allotments and research the
latest statements and issues they have highlighted along with the foreign policy
documents. (Note: not all countries have a foreign policy document on a website. In
such cases use Wikipedia and look up your country and understand where it stands
in the geopolitical scenario)
3. It is okay to use Wikipedia for understanding but do not depend on the
information provided in it, try to utilize the references they have used as a
substantive way of researching.
DOCUMENTATION SUBMISSION & PREPARATION
The executive board has also provided a document with regards to the rules of
procedures, in the said document you will find the details of how to create all the
types of documents, their uses and reasons for creation along with other procedures
of the committee.
It should be noted that the executive board will make certain changes in the rules of
procedure according to what it feels is in the benefit of the committee.
Documents that will be accepted in the committee during the conference time:
1. Plan of Actions
2. Press release or statements
3. Working papers
4. Draft resolution (only 2 by the whole committee)
P age |7
Note: there is no numeric restriction on components 1-3 but the marking will be
done on an average basis for the same.
VALID SOURCE OF PROOF IN THE COMMITTEE NEWS SOURCES:
a. Reuters – Any Reuters article which clearly makes mention of the fact, or is in
contradiction of the fact being stated by a delegate in council.
(http://www.reuters.com/)
b. State-operated News Agencies – These reports can be used in the support of
or against the State that owns the News Agency. These reports, if credible or
substantial enough, can be used in support of or against any Country as such but in
that situation, they can be denied by any other country in the council. Some examples
are,
i. RIA Novosti (Russia) http://en.rian.ru/
ii. IRNA (Iran) http://www.irna.ir/ENIndex.htm
iii. BBC (United Kingdom) http://www.bbc.co.uk/
iv. Xinhua News Agency and CCTV (P.R. China) http://cctvnews.cntv.cn/
GOVERNMENT REPORTS: These reports can be used in a similar way as the
State Operated News Agencies reports and can, in all circumstances, be denied by
another country.
a. Government Websites like the State Department of the United States of America
(http://www.state.gov/index.htm) or the Ministry of Defense of the Russian
Federation (http://www.eng.mil.ru/en/index.htm)
b. Ministry of Foreign Affairs of various nations like India
(http://www.mea.gov.in/), People’s Republic of China
(http://www.fmprc.gov.cn/eng/), France (http://www.diplomatie.gouv.fr/en/),
Russian Federation (http://www.mid.ru/brp_4.nsf/main_eng).
c. Permanent Representatives to the United Nations Reports
http://www.un.org/en/members/ (Click on any country to get the website of the
Office of its Permanent Representative)
d. Multilateral Organizations like the NATO
(http://www.nato.int/cps/en/natolive/index.htm), ASEAN
(http://www.aseansec.org/), OPEC (http://www.opec.org/opec_web/en/), etc.
UN REPORTS: All UN Reports are considered are credible information or
evidence for the Executive Board of the Security Council.
P age |8
COMMITTEE MANDATE
“The pursuit of peace and progress cannot end in a few years in either victory or
defeat. The pursuit of peace and progress, with its trials and its errors, its successes
and its setbacks, can never be relaxed and never abandoned.”
Introduction Article 1(1) of the Charter of the United Nations (1945) states that the
first purpose of the United Nations (UN) is “[to] maintain international peace and
security, and to that end: to take effective collective measures for the prevention and
removal of threats ”
The General Assembly is made up of 6 main committees: Economic & Financial
(ECOFIN), Social, Cultural and Humanitarian (SOCHUM), Special Political and
Decolonization (SPECPOL), Administrative & Budgetary, Legal, and Disarmament
and International Security (DISEC). DISEC is the first committee of the General
P age |9
Assembly, discussing issues of diplomatic and military stability with the goals of
disarmament and increased international security. The idea of disarmament can
extent to a wide variety of potential threats; nuclear, biological and chemical warfare,
civil strife within nations, weaponization of space and many more.
According to Chapter IV, Article 10 of the UN Charter, committees of the UNGA
have the power and responsibility to make recommendations to the Security Council
and members states of the UNO after thorough discussions of issues that fit into
the mandate of their specific committee. It is important to remember that the
committee will be responsible for making recommendations for action: DISEC, as
part of the UNGA, is never authorized to declare sanctions, make war, or impose
other regulations on nations.
According to Chapter IV, Article 11(3): “The General Assembly may call the
attention of the Security Council to situations which are likely to endanger
international peace and security.”
FINANCIAL CRIME LEGISLATION AND DATA ANALYTICS IN FIGHTING
FINANCIAL CRIMES
Financial crime legislation aims to enhance transparency in financial transactions and
prevent criminals from using financial institutions for money laundering, terrorist
financing, bribery, and corruption. Financial integrity laws play a crucial role in
combating these crimes by imposing regulations on financial institutions and non-
financial entities. One of the key tools used to comply with these regulations and
fight financial crime is big data analytics. However, the effectiveness of these efforts
is often hampered by challenges related to data quality, quantity, regulatory
asymmetry across jurisdictions, and the tension between financial integrity laws and
data privacy.
KEY CONCEPTS:
Financial Crime Legislation and Integrity Laws: These laws aim to prevent and
deter money laundering, terrorist financing, and other financial crimes by enforcing
regulations that require financial institutions to gather information about their
customers, employees, and vendors. This includes "Know Your Customer" (KYC)
obligations, transaction monitoring, and reporting of suspicious activities
Big Data and Analytics: Big data refers to the large volumes of structured and
unstructured data that organizations generate. Analytics tools are used to extract
insights from this data, helping in identifying patterns, trends, and anomalies that
could indicate financial crimes.
P a g e | 10
When discussing threats to the illicit storage of data, we're referring to risks
associated with unauthorized, illegal, or malicious storage of personal or sensitive
information. These threats could include:
Data Breaches: Unauthorized individuals or entities may gain access to stored data
through cyberattacks or other means, leading to breaches of sensitive information.
Identity Theft: Illegally stored data can be used to impersonate individuals, commit
fraud, or steal identities for financial gain.
Black Market Activities: Criminals may store illegally obtained data on the black
market, where it can be bought and sold for various malicious purposes, including
financial fraud.
Illegal Surveillance: Illicit storage of data can also involve unlawful surveillance,
where personal information is collected and stored without consent or legal
authorization.
Espionage: Governments and other actors may engage in the unauthorized storage
of sensitive data for espionage or intelligence purposes.
Data quality and quantity are challenges that impact the effectiveness of efforts to
combat financial crime, whereas threats to illicit data storage relate to risks associated
with unauthorized or malicious storage of personal or sensitive information.
Regulatory Asymmetry:
Inconsistent implementation of financial integrity regulations across countries
creates opportunities for criminals to exploit regulatory gaps. Inconsistent Laws and
Standards: Different countries have different legal frameworks and standards for
addressing data crimes. This inconsistency can create confusion for international
cooperation and hinder the ability to effectively prosecute cybercriminals or respond
to cross-border data breaches.
Jurisdictional Challenges: Data crimes often cross-national borders, making it
difficult to determine which jurisdiction has the authority to investigate and
prosecute. Criminals can exploit jurisdictional gaps, operating in countries with lax
regulations to evade consequences.
Differing Definitions: The definitions of various data crimes, such as hacking,
identity theft, and unauthorized access, may vary across jurisdictions. This can
complicate international cooperation and coordination in tackling these crimes.
Extradition and Cooperation: Extraditing cybercriminals from one country to
another for prosecution can be challenging if the legal systems and extradition
treaties between the countries do not align.
P a g e | 12
Data Sharing and Reporting: Reporting data breaches and cyber incidents to
authorities can be inconsistent due to varying reporting requirements and thresholds
in different jurisdictions. This can impede the timely response to data breaches and
hinder efforts to prevent further damage.
Digital Evidence Handling: The rules and procedures for collecting, preserving, and
presenting digital evidence in court may differ among countries. This can affect the
admissibility of evidence and the successful prosecution of data crimes.
Legal Barriers: Some jurisdictions may have legal barriers to accessing data stored in
their territory for investigation purposes. This can hinder the ability to gather critical
evidence and track down cybercriminals.
Resource Disparities: Not all countries have the same resources and capabilities to
combat data crimes. Criminals may target jurisdictions with weaker cybersecurity
measures or law enforcement capabilities.
Addressing Regulatory Asymmetry:
To address regulatory asymmetry and enhance the effectiveness of combating data
crimes, international cooperation and coordination are crucial. This includes:
International Agreements: Developing international agreements, treaties, and
conventions that establish common standards for addressing data crimes and
ensuring consistent enforcement across borders.
Information Sharing: Establishing channels for sharing information and intelligence
about cyber threats and data breaches among countries and relevant law
enforcement agencies.
Capacity Building: Assisting less-resourced countries in building their cybersecurity
and law enforcement capabilities to better combat data crimes.
Harmonization of Laws: Encouraging countries to harmonize their legal frameworks
for addressing data crimes, ensuring consistent definitions, reporting requirements,
and penalties.
Mutual Legal Assistance Treaties (MLATs): Strengthening and streamlining MLATs
to facilitate cooperation in investigating and prosecuting data crimes across
jurisdictions.
Cross-Border Collaboration: Promoting collaboration between law enforcement
agencies, cybersecurity experts, private sector entities, and international
organizations to address data crimes collectively.
Regulatory asymmetry poses challenges to combating data crimes due to the
inconsistent implementation of laws and standards across jurisdictions. Addressing
P a g e | 13
The challenge arises from the conflict between these two important priorities:
Access to Data for Financial Integrity: Effective measures to combat financial crime
often require access to a wide range of data, including personal and transactional
information. Privacy regulations may restrict the collection and sharing of such data.
Respecting Data Privacy: Stricter data privacy laws limit the extent to which
organizations can collect, use, and share personal data, even for legitimate purposes
like fraud prevention and financial integrity.
SOLUTIONS AND APPROACHES TO FIGHT DATA CRIMES
Risk-Based Approach: Tailoring data collection and usage based on the level of risk
involved. Organizations can focus their efforts on high-risk areas while minimizing
data collection in low-risk scenarios.
Anonymization and Encryption: Implementing strong data security measures, like
anonymizing and encrypting data, can protect individuals' privacy while still enabling
effective analysis for financial integrity purposes.
Consent Management: Developing consent management processes that provide
clear explanations of how data will be used for financial integrity purposes can help
individuals understand and agree to data processing.
Cross-Border Collaboration: Encouraging international cooperation to establish
common standards for data privacy and financial integrity. This could involve
creating frameworks that facilitate data sharing while respecting privacy rights.
Technology Innovation: Developing advanced technologies, such as privacy-
preserving data analytics, that allow financial institutions to analyse data without
exposing individual identities.
Balancing data privacy and financial integrity is a complex challenge that requires
careful consideration and collaboration among regulators, financial institutions,
technology experts, and privacy advocates. Striking the right balance ensures that
individuals' privacy rights are respected while also enabling effective measures to
combat data crimes and safeguard the integrity of the financial system.
Cross-Border Cooperation: Criminal activities transcend national borders,
necessitating international cooperation among regulatory bodies and law
enforcement agencies.
RECOMMENDATIONS AND SOLUTIONS:
Transparency Exemptions: Regulatory bodies like the Financial Stability Board
(FSB) and FATF should collaborate to establish exemptions in data privacy laws for
P a g e | 15
Privacy policies hold a crucial role in defining the consumer's stance vis-à-vis data-
driven service providers, serving as the primary means for data controllers to meet
their obligations per GDPR Articles 13 and 14. Unfortunately, research shows that
few consumers fully read privacy policies. Moreover, privacy policies are often
convoluted, and user settings granting consumers control over personal data are
challenging to locate and may not always be effective. The complexity of data
collection compounds this challenge.
Challenges in Data Analysis and Profiling
The complexity of behavioral profiling algorithms and the broader data-driven
market engenders a profound lack of transparency. Algorithms involved in creating
profiles are exceptionally intricate and yield results almost unintelligible to humans.
The datasets they analyze are vast and diverse, and their reasoning methods differ
from conventional human deductive reasoning. Consequently, even IT experts
struggle to comprehend these algorithms, making transparency challenging.
The Conundrum of Informed Decision-Making
In the face of such information asymmetry, transparency serves as an essential
safeguard for consumers. It enables data subjects to understand how their data is
processed, empowering them to act on it and maintain control over their privacy.
Nonetheless, the complexity of data flows, processing, and analysis within the data-
driven market renders transparency ineffective. Consumers struggle to identify
relevant data controllers, investigate processing, and manage their online personal
data footprint.
Transparency is pivotal for individuals to exercise their rights and assert control over
their privacy. Yet, within the data-driven realm, the extent of information asymmetry
surpasses consumers' ability to make informed decisions and protect themselves
from excessive data collection, unauthorized sharing, and profiling consequences.
This predicament underscores the pressing need for novel approaches to address
information asymmetries within the data-driven landscape.
CONCLUSION
Efforts to combat financial crime rely heavily on effective data analytics powered by
high-quality, accessible data. Achieving this goal involves addressing challenges
posed by data privacy laws, regulatory asymmetry, and the need for international
cooperation. By implementing the recommended solutions and promoting
collaboration among regulatory bodies, financial institutions, and technology
innovators, the fight against financial crime can be bolstered, leading to a more
secure and transparent financial ecosystem. The Executive Board expects the
delegates to formulate topics for moderated caucus from the key concepts explained
P a g e | 19
in this background guide. The Dias also expects a holistic approach wherein arguing
on your portfolio’s national laws in context with the International platform is
necessary in coming onto a collaborative conclusion and solution.
In the digital age, the challenges surrounding public data have become more
pronounced than ever before. As technology continues to evolve, governments must
adapt their data practices to strike the right balance between efficient operations and
the protection of citizens' privacy. With a forward-thinking approach and a
commitment to responsible data management, government entities can navigate
these challenges and maintain the trust of the public they serve.