UNGA Study Guide
Agenda:
Cyber Warfare – Defining the Rules of Engagement in the Digital
Battlefield
Committee:
United Nations General Assembly (UNGA)
School:
Nirmal Convent School
Prepared by:
The Executive Board
1. Welcome Note
Dear Delegates,
Welcome to the United Nations General Assembly at Nirmal Convent School
MUN. This year, we confront an issue that sits at the crossroads of national
security, diplomacy, and digital
innovation: Cyber Warfare. Unlike traditional threats, cyber attacks know no
borders, leave no physical trace, and often operate in legal grey zones.
In this committee, you will be expected to tackle the ethical, political, and
strategic dilemmas of this new digital battlefield. We encourage you to
think creatively but diplomatically—balancing national interests with
international cooperation. The future of warfare is here, and the rules must be
written by thoughtful leaders like you.
We look forward to a robust and respectful debate. Best of luck in your
preparations.
Warm regards,
The Executive Board
2. Introduction to the UNGA
The United Nations General Assembly (UNGA) is one of the six principal
organs of the United Nations and serves as its main deliberative,
policymaking, and representative body. Established in 1945 under the UN
Charter, the UNGA is the only UN body in which all 193 member states have
equal representation, each with one vote.
The General Assembly meets annually in September at the UN Headquarters in
New York City, during what is known as the General Debate, where world
leaders gather to discuss global issues. It addresses a wide range of international
matters covered by the UN Charter, including peace and security,
development, international law, and human rights.
3. Understanding Cyber Warfare
Cyber warfare refers to politically motivated attacks carried out by nation-states
or non-state actors using computers and digital networks to cause disruption,
damage, or fear. Targets may include:
● Military databases
● Critical infrastructure (e.g., power grids, water supply, hospitals)
● Financial institutions
● Government servers
● Communication systems
Unlike traditional warfare, cyber attacks are invisible, fast, and often
untraceable. The consequences can be massive—from economic collapse to
public panic—yet international law is still playing catch-up. The absence of
an agreed definition or red lines makes cyber warfare a major global security
threat.
4. Background of the Issue
In the 21st century, cyberspace has emerged as a critical domain for global
security, economic stability, and political influence. As digital infrastructure
becomes increasingly integrated into the core functions of states, cyber warfare
has transformed from isolated incidents of hacking into a sophisticated form of
modern conflict. Nations and non-state actors now possess the capability to
disrupt financial systems, manipulate information, damage critical infrastructure,
and interfere in democratic processes—all without deploying a single soldier.
Despite the growing frequency and severity of cyber attacks, there is still no
comprehensive international framework defining the rules of engagement in
cyberspace. Unlike traditional warfare governed by treaties such as the Geneva
Conventions, cyber warfare exists in a legal and ethical grey area, where
attribution is difficult and accountability often absent. This lack of regulation has
led to heightened tensions, cyber arms races, and an urgent need for multilateral
dialogue. As digital threats continue to evolve, the international community must
grapple with complex questions surrounding sovereignty, proportionality,
civilian protection, and state responsibility in the digital battlefield.
Notable Incidents:
● 2007: Estonia Cyber Attacks – Suspected Russian hackers brought down banking
and media systems, sparking the first real global concern about cyber war.
● 2010: Stuxnet Worm – A sophisticated virus targeted Iranian nuclear facilities,
allegedly developed by U.S. and Israeli agencies.
● 2015–2016: Ukraine Power Grid Hack – Suspected Russian actors shut down power
to over 200,000 Ukrainians.
These events raised several questions:
● When does a cyber attack become an act of war?
● Who can be held accountable?
● Is retaliation—cyber or kinetic—justified?
Despite these concerns, the international community has yet to agree on a legal
definition, rules of engagement, or response framework.
5. Current Situation
Today, cyber warfare is no longer futuristic—it is current, frequent, and
escalating.
Developments Include:
● AI-powered cyber attacks that adapt in real-time
● State-sponsored hacking groups targeting elections, research, and military
assets
● Ransomware attacks paralyzing entire city governments and hospitals
● Growing use of cyber proxies—non-state actors working on behalf of
states
➢ Many countries have begun forming cyber commands within their
defense ministries. But because attacks are hard to trace, many states act
with impunity. Meanwhile, cyber weapons can easily spill over into
civilian sectors—causing widespread disruption.
6. Major Stakeholders
United States
● Has some of the world’s most advanced cyber capabilities
● Advocates international rules for cyberspace
● Victim of multiple high-profile cyberattacks (e.g., SolarWinds, Colonial
Pipeline)
Russia
● Frequently accused of supporting cyber operations
● Denies involvement, calls for cyber sovereignty
● Prefers bilateral agreements over multilateral rules
China
● Developing strong cyber offensive tools
● Advocates for greater state control of the internet
● Opposes “Western-dominated” internet governance
India
● Increasingly active in the cyber domain
● Supports open and secure cyberspace
● Advocates for cooperation and capacity building
European Union
● Strong emphasis on data privacy and ethics
● Supports international regulation of state behavior
● Has a Cyber Diplomacy Toolbox to respond to threats
Non-State Actors
● Hacktivists (like Anonymous), cyber terrorists, and ransomware gangs
● Often unregulated but highly effective in causing disruption
● Can serve as cyber proxies for states to avoid direct accountability
7. Previous UN Action
The UN has taken steps to address cyber warfare, though mostly through non-binding
mechanisms:
Key Efforts:
● UN Group of Governmental Experts (GGE) (2004–2021): Sought to define
responsible behavior and cyber norms.
● Open-Ended Working Group (OEWG) (2018–present): More inclusive platform
discussing cyber threats and cooperation.
● UN General Assembly Resolutions on ICT and international security: Promote
voluntary norms and capacity building.
8. Key Challenges
1. Attribution
○ How do you prove who launched the attack?
○ Most cyber operations are masked or outsourced to third parties.
2. Legal Grey Zones
○ No universally accepted definitions of terms like “cyber attack,” “armed
aggression,” or “digital retaliation.”
3. Escalation Risks
○ A cyber attack could provoke military response and lead to conflict.
4. Disparity of Resources
○ Developing countries often lack the tools to protect themselves.
5. Digital Sovereignty vs. Global Norms
○ Some nations reject international norms in favor of their own internet laws.
9. Possible Solutions
As delegates, you are encouraged to propose a balanced, practical framework that respects
sovereignty but prevents abuse. Ideas may include:
● Defining “Cyber Warfare” and “Cyber Peace” through a new international treaty
● Creating a UN-led Cyber Response Task Force for investigation and rapid support
● Establishing a Cyber Rules of Engagement Charter outlining proportional response
● Implementing Global Attribution Mechanisms using AI and independent cyber
forensics
● Encouraging Confidence-Building Measures (e.g., sharing information, early
warnings)
● Funding Cybersecurity Capacity Building in developing nations
10. Questions to Consider
● Should cyber warfare be treated the same as conventional warfare under
international law?
● What specific thresholds make a cyber operation an “act of war”?
● Can a country be sanctioned or held accountable if attribution is uncertain?
● What role should private companies and tech giants play in cyber regulation?
● Should the UN create a new body or strengthen existing ones to handle cyber
conflict?
11. Position Paper Guidelines
All delegates must submit a position paper
before the first session
. This paper should reflect your country’s stance and outline clear
solutions.
Format:
● Font: Times New Roman, Size: 12
● Spacing: 1.5 lines, justified alignment
● Length: 1 page (500–600 words maximum)
Structure:
1. Introduction
Briefly state your country’s position on cyber warfare.
2. Past Actions
Mention any relevant laws, treaties, or global initiatives your country has supported or
opposed.
3. National Concerns and Interests
What are your country’s vulnerabilities or strengths in cyberspace?
4. Proposed Solutions
Offer concrete, practical measures that align with your national interests while addressing
the global challenge.
12. References and Further Reading
United Nations Office for Disarmament Affairs (UNODA) – Cybersecurity in
the Context of International Security
Group of Governmental Experts (GGE) and Open-Ended Working Group
(OEWG) Reports
Useful links
[Link]
[Link]