Agenda:
Assessing state-sponsored cyber warfare and its threats to international security
Chairperson’s Letter:
“It is forbidden to kill; therefore, all murderers are punished unless they kill in large numbers and to the sound of trumpets.” - Voltaire
Dear Delegates,
It is time! We are Jack R. and Anshu P., the co-chairs of the DISEC Committee, and we are excited to welcome you to SMUN 2025’s committee on cyber warfare.
Modern warfare has seen massive developments over the past century. From the industrial revolution, bringing us modern semiautomatic rifles, to developments in armor bringing us high-powered tanks and sea vessels, to the atomic age, bringing us nuclear weapons. However, today, some experts believe that the advancements in cyber warfare can dwarf them all. The DISEC Committee in the United Nations is the primary global body responsible for addressing challenges in disarmament and preventing conflict before it escalates. Today, we need a solid plan at the global stage, one that will be able to define this digital age of innovation. As delegates, you will get to decide how this digital age advances.
Your insights, research, and solutions will power resolutions that can shine as the first concrete international policy regulating and punishing cyber warfare. You stand at the crossroads of history, whether the UN will be able to control innovation for the betterment of the planet effectively, or if it will spiral out of control. Your voice, your mind, and your dedication will play a key role in the ability of this body to create those historic solutions.
Both of us have chaired more Model United Nations committees than we can count, and out of everything, we hope to see a debate that is rich in insights, non-repetitive, diplomatic, and inquisitive. We challenge every one of you to excel, participate, and formulate the solutions that this world so desperately needs.
We look forward to your enthusiastic involvement, meaningful contributions, and two days of fruitful debate & diplomacy!
Best of Luck,
Anshu P. and Jack R.
Chairs
DISEC
Background Guide
Introduction
State-sponsored cyber war has emerged as an important area in the landscape of international security, redefining traditional concepts of war by moving conflict away from physical battlefields to the virtual world. Over the past two decades, nations have not only used cyber capabilities for intelligence and espionage purposes but have also developed offensive tools that have the ability to sabotage critical infrastructure, undermine political systems, and cause physical damage. This development has made the application of existing legal and diplomatic mechanisms more challenging. The purpose of this guide is to provide a more detailed but still introductory analysis, outlining the main controversies and strategic challenges to help you prepare for our committee sessions.
The Nature of State-Sponsored Cyber Warfare
State-sponsored cyber warfare refers to the use of computer tools by a state to conduct hostile operations against another state or its associated interests. The cyber world is marked by its lack of geographical constraints and decentralized structure, which enables aggressors to operate from nearly everywhere and typically employ tactics that conceal their points of origin. In this environment, classical security mantras, including deterrence and defending civilian infrastructure, are confronted with unprecedented challenges.
The major driving factors of such activities include national interests, typically pursued to gain a strategic advantage. This can include:
Espionage: Stealing classified information, military intel, and intellectual property. Sabotage is the weakening of a rival's critical infrastructure, which includes energy networks, money systems, and transport systems. Political Interference: Politically interfering with processes such as elections or disseminating falsehoods. Deterrence: this involves conveying a nation's cyber capabilities to possible adversaries. Regulatory and Normative Structures
The swift development of cyber war has revealed deep lacunae in current international legal regimes. Classical International Humanitarian Law (IHL), meant to regulate conflicts involving physical violence, has difficulty in applying concepts such as distinction (the requirement to distinguish between fighters and non-combatants) and proportionality to cyber operations. For example, a cyber attack on a country's electricity supply could be catastrophic to civilians even if the attack is only strategic in intent.
One of the main problems is the attribution, i.e., the difficulty of being able to attribute a cyberattack to a specific nation-state in a clear way. The technical tools used - proxy networks, anonymizing services, and sophisticated malware - allow states to maintain plausible deniability (1). This uncertainty brings a reduced ability to have foreseeable legal repercussions and adds a "grey area" where state actions can avoid full accountability.
Thus, controversy exists as to how far existing treaties, such as the Geneva Conventions, can be stretched in order to permit a proper response to these new threats, or whether new treaties, or even new protocols, need to be established. The concept of "cyber sovereignty" where states claim a right to govern and protect their virtual territories has also appeared as a major legal consideration.
Diplomatic and Strategic Dimensions
The field of diplomacy has been drastically altered with the advent of cyber warfare. States are creating new models of cyber diplomacy that are aimed at creating norms of behavior in the cyber space and engaging in activities that create trust. This is different from "digital diplomacy" that simply implies the use of digital channels for diplomatic communication.
The majority of nations are now considering cyberspace to be a distinct form of warfare, similar to land, water, air, and space. Due to this, separate cyber commands have been established, and cyber operations have been integrated into national defense strategies. In addition, there is a real danger that increased investment in offensive cyber capabilities could spark a cyber arms race, thus the lowered bar to war. Efforts such as the UN Group of Governmental Experts (GGE) and the "Paris Call for Cyber Peace" reflect the need for a multilateral measure in creating norms and preventing escalation.
Economic and Infrastructural Factors
Computer attacks pose a significant threat to national economies and critical infrastructure. Sizable industries, such as energy, transportation, healthcare, and finance, are becoming more interconnected through digital networks. Disruption of one of these industries can potentially engender cascading effects to a nation's economic infrastructure. The loss can be staggering, both in the immediacy of the effect as well as in the ongoing loss of public confidence and destabilizing effects on international markets.
Nation-states can deliberately prioritize economic infrastructure as a means to undermine the political stability or economic competitiveness of a competitor. The dual-use nature of digital technologies unavoidably has a tendency to blur the line between legitimate intelligence gathering and aggressive sabotage. Economic imperatives are also a strong driver of cyber espionage, with states stealing intellectual property or engaging in algorithmic manipulation as a desire to strengthen their own industrial bases.
Attribution and Accountability Questions
One of the key challenges of dealing with state-sponsored cyber war is one of proper attribution of hostile incursions. Unlike conventional war, which tends to leave physical evidence that favors easy identification, cyber operations are founded on sophisticated stages of cover and deceptive signs. The cyber environment's anonymity allows states to take a plausible stance of deniability.
The intricacy of this problem is compounded by the tendency of states to conduct operations in collaboration with non-state actors or outsource operations to them, hence the heightened difficulty of attributing blame to a single party. Despite the growing agreement that a state should be held responsible for attacks emanating from its territory, the operational difficulty in establishing immediate involvement persists. It is felt that greater international collaboration and the establishment of information-sharing mechanisms are adopted in a bid to enhance attribution techniques and mechanisms for accountability.
Strategic Deterrence and Escalation Risk
Cyberwar has compelled most nations to reevaluate their war strategy and spend considerable amounts of money on both offensive and defensive technologies. The cheapness and quick deployability of cyber weapons have raised concerns of an arms race. Conventional deterrence could be less effective if the aggressor is unknown and the outcome of an attack is not clear.
The risk of escalation is also compounded by the challenges of attribution, which, when coupled with swift automatic responses, will create flawed judgments that prompt overresponse or the transition to kinetic conflict. Deterrent measures can only be implemented in the cyber domain, both technical and political, which involve building resilience by deploying widespread defensive measures and conducting active dialogue to create normative guidelines for action.
Case Studies
Historical case studies give us useful insight into the risks of state-sponsored cyber war:
2007 Estonian Cyberattack: A massive cyberattack on the government, bank, and media websites showed the weaknesses of an ultra-networked society and emphasized the importance of international cooperation
Stuxnet (2010): An advanced worm that had infected Iranian nuclear plants, proving cyber weapons could cause real physical harm to critical infrastructure.
Ukraine (2014 to present): Conventional military operations have been combined with cyberattacks against power plants and government infrastructure as a force multiplier.
The accusations of state-sponsored interference in the 2016 U.S. election highlighted the geopolitical significance of cyber espionage and information warfare and their ability to affect democratic processes.
SolarWinds attack (2020): United States federal government data breach;
Lazarus Group attacks, such as the Bangladesh Bank heist.
Questions a Resolution Must Answer (QARMA)
How can the international community come up with a consistent legal framework for cyber war that can handle the issue of attribution and the nuances of dual-use infrastructure?
What are the responsibilities that international organizations like the United Nations can undertake in promoting international behavioral norms in cyberspace?
How do governments balance the need for national cybersecurity with protecting civil liberties and digital privacy?
What are the diplomatic tools that can be used to prevent cyber wars from escalating to real war?
How do we ensure critical infrastructure in each nation is protected from state-sponsored cyberattacks?
References and Resources
Shan Ali. Legal Framework of Right of Self Defense in Cyber Warfare: Application through Laws of Armed Conflict. Journal of Development and Social Sciences (2022). Shan Ali. Legal Framework of Right of Self Defense in Cyber Warfare: Application through Laws of Armed Conflict. Journal of Development and Social Sciences (2022). Shan Ali. Legal Framework of Right of Self Defense in Cyber Warfare: Application through Laws of Armed Conflict. Journal of Development and Social Sciences (2022). Shan Ali. Legal Framework of Right of Self Defense in Cyber Warfare: Application through Laws of Armed Conflict. Journal of Development and Social Sciences (2022). Amel Attatfa, Karen Renaud, Stefano De Paoli. Cyber Diplomacy: A Systematic Literature Review. Procedia Computer Science (2020).