Menu Close

1st Committee of the GA

Chair: Stefania Zourka

Vice-Chair: Yiannis Liveris

Vice-Chair: Apostolos Symeonidis

Countering cyberattacks and establishing cyber security strategies, through international and cohesive efforts, in the AI era

Cyberwarfare can be a crucial component of the hybrid threats launched by major powers in the 21stcentury due to the rapid technological advancement. Cyber threats, firstly, are characterized by the element of surprise. Furthermore, countries often choose to use cyberwarfare instead of military power for the fact that it is less costly and doesn’t require as many resources. Cyber attacks can paralyze entire systems shutting down banks, ministries and other institutions leading to the malfunctioning of the digital
environment of a country. They can also be used to steal sensitive data interfering with governmental procedures (e.g. national elections) etc. The concept of the weaponization of information is deeply connected with cyberwarfare, as cyber actors are capable of conducting a sophisticated information war for various reasons.


Modern information technology has enhanced the role of information in conflicts coercing different actors in order for them to submit to the wishes of the attacker. Information operations are carried out by campaigns through social media or other means with the sole purpose of confusing the target and thus shaping his opinion in a way that is in line with the predetermined aims of the attacker. A factor that must be put in consideration in dealing with cyberattacks and info-wars is the use of Artificial Intelligence (AI). AI presents multiple security threats, as it can assist the relevant attackers in order for them to spot a network without protection or other vulnerabilities that humans cannot possibly detect. The current issue discussed must enable the international community to achieve further actions that will lead to a framework for quicker and more resilient responses. The war in Ukraine is a significant example of how cyber attacks and information operations pose a serious threat to a state’s (digital) sovereignty

Bibliography and References

  1.  Stuart Madnick (2022), What Russia’s ongoing cyberattacks in Ukraine suggest about the future of cyber warfare, Harvard Business Review
    Retrieved from:
    https://hbr.org/2022/03/what-russias-ongoing-cyberattacks-in-ukraine-suggest-about-the-future-of- cyber-warfare
  2. Bert Kondruss (2022), Cyber attacks and ransomware 2022 today worldwide, Kon Briefing, Retrieved from:https://konbriefing.com/en-topics/cyber-attacks.html
  3. Security Predictions 2022 (2022), Cyber Security Predictions for 2022 and beyond, Mandiant, Retrieved
    from:
    https://www.mandiant.com/sites/default/files/2021-11/rpt-m-Prediction22-000410-02.pdf
  4. World Economic Forum (2022), Global Security outlook 2022, Retrieved from:
    https://www3.weforum.org/docs/WEF_Global_Cybersecurity_Outlook_2022.pdf

  5. Shashi Jayakumar (2021), Cyber Attacks by terrorists and other malevolent actors - prevention and
    preparedness, Handbook of Terrorism Prevention and Preparedness
    Retrieved from:
    https://icct.nl/app/uploads/2021/05/Handbook-ch-29-Jayakumar-Cyber-Attacks-by-Terrorists-and- other-Malevolent-Actors.pdf
  6. Anna-Maria Talihärm, Towards Cyberpeace: Managing Cyberwar Through International Cooperation, United Nations,
    Retrieved from: https://www.un.org/en/chronicle/article/towards-cyberpeace-managing-cyberwar-through- international-cooperation
  7. UN General Assembly (2014), Cyber Warfare, Unchecked, Could Topple Entire Edifice of International Security, Says Speaker in First Committee at Conclusion of Thematic Debate Segment, United Nations,
    Retrieved from:
    https://www.un.org/press/en/2014/gadis3512.doc.htm
  8. Edward Waltz, Information warfare principles and operations, Artech House,
    Retrieved from:http://www.gbv.de/dms/sub-hamburg/24695437X.pdf
  9. Flemming Splidsboel Hansen (2017), The weaponization of information, DIIS
    Retrieved from:
    https://www.diis.dk/en/research/the-weaponization-of-information
  10. Security Council Report (2022), In hindsight: the Security Council and cyber threats, an update,
    Retrieved from:
    https://www.securitycouncilreport.org/monthly-forecast/2022-02/in-hindsight-the-security-council-and-cyber-threats-an-update.php
  11. Security Council Press Release (2021), Explosive’ Growth of Digital Technologies Creating New Potential for Conflict, Disarmament Chief Tells Security Council in First-Ever Debate on Cyberthreats, United Nations,
    Retrieved from: https://www.un.org/press/en/2021/sc14563.doc.htm
  12. Committee on Armed Services (2017), Cyber warfare in the 21st Century: threats, challenges and opportunities, US Government,
    Retrieved from: https://www.govinfo.gov/content/pkg/CHRG-115hhrg24680/pdf/CHRG-115hhrg24680.pdf
  13. Stephen Herzog, Revisiting the Estonian Cyber Attacks: Digital Threats and Multinational Responses, (2011), Journal of Strategic Security, Vol. 4, No.2,
    Retrieved from:
    https://www.jstor.org/stable/pdf/26463926.pdf?refreqid=excelsior%3Ae6c06472b42ca092d49d03595c44f9ac&ab_segments=&origin=
  14. Brussels Summit Communiqué, Issued by the Heads of State and Government participating in the meeting of the North Atlantic Council in Brussels 14 June 2021, Retrieved from: https://www.nato.int/cps/en/natohq/news_185000.htm
  15. OAS, IDB, Cyber Security Report, Risks, Progress and the way forward in Latin America and the Carribean, (2020),
    Retrieved from:
    https://publications.iadb.org/publications/english/document/2020-Cybersecurity-Report-Risks-Progress-and-the-Way-Forward-in-Latin-America-and-the-Caribbean.pdf
  16. Simovic, N., et al., Cyber Warfare and International Cyber Law: Whither?., (2020), Journal of Criminology and Criminal Law (JCCL), vol. 58, no. 3.
  17. Gary Solis, Cyber Warfare., (2014), Military Law Review, 219
  18. Shmuel Even, David Siman-Tov, Cyber Warfare: Concepts and Strategic Trends, INSS,
    Retrieved from:
    https://www.files.ethz.ch/isn/152953/inss%20memorandum_may2012_nr117.pdf