0% found this document useful (0 votes)
13 views22 pages

Example BG EHMUN

Uploaded by

agrawala2866
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views22 pages

Example BG EHMUN

Uploaded by

agrawala2866
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

BACKGROUND GUIDE

Table of Contents
1. Letter from the Executive Board 4
2. About the committee 5
3. Introduction 7
4. History of privacy and security 8
5. Current state of surveillance 10
6. Legal frameworks governing 11
surveillance
7. Human rights implications towards 12
affected groups
8. Cyber-security and ethical 14
considerations
9. Obligations of governments towards 15
privacy and security
10. Past international actions 16
11. Case studies 18
12. Questions a resolution must answer 20
13. Bibliography 21

The Emerald Heights Model United Nations 2023 DISEC | 3


Letter from the Board
Greetings Delegates,

It is an absolute honor to welcome you all to the ninth edition of


EHMUN 2023 on behalf of the Executive Board of the Disarmament
and International Security Committee (DISEC).

I, Sahil, would be serving as your chairperson during the course of this


mega-event. I am a huge fan of quizzing and you could probably find
me streaming Spotify (not between the committee sessions, though) at
any time of the day. I would be assisted by my Vice-Chair, Lakshya
Talreja, an immensely talented public speaker who hopes to pursue
economics; alongside my rapporteur, Manveer Pratap Rathore, a skilled
debater and a true follower of Stephen Curry.
In recent times, increase in cyber crimes, online frauds, multiple
scandals, and the rapid invasion of privacy of citizens all around the
world is becoming an increasingly urgent issue to tackle. Hundreds of
millions of people already have their online activities tracked every
minute, unaware that their data is being collected, sold, and utilized
for a variety of purposes. Now in 2023, countries around the world are
keeping a watch of people’s everyday activities through the use of
video surveillance systems. While such advancements continue to
provide evidence for how far mankind has progressed, they do knock
on our doors with their own set of problems and threats.
As a delegate, it is your duty to represent your country to the truest
extent possible while coming up with an equitable solution that is
acceptable to various blocs and keeps insight into crucial issues. This
council will give no way to sub-standard levels of debate. Alongside
research, another thing that the Executive Board feels strongly about is
the importance of diplomatic conduct throughout the course of the
conference and a sensitive outlook towards the agenda. Keep in mind
that these are crucial issues and real lives that we are talking about, so
finding solutions to such a vast agenda is not going to be an easy task.
The topic demands you to find out all the solutions that have been
proposed to solve this issue, while also finding out what worked, what
may work, and what didn’t work. We highly encourage you to read
treaties, statements, and documents as you get along with your
research.
Lastly, do keep in mind that this guide is only a mere introduction to the
agenda and shall serve as the starting point of your research. We
encourage you to go beyond this background guide and delve into the
extremities of the agenda to further enhance your knowledge.

Please feel free to approach the Executive Board with any queries that
you might have. We wish you all the best for the conference. Please
send all your queries relating to research, procedure, and speaking in
committee to [email protected].

Warm regards,
Sahil Chawla Lakshya Talreja
Chairperson Vice-Chairperson
Manveer Pratap Rathore
Rapporteur

The Emerald Heights Model United Nations 2023 DISEC | 4


About the Committee
1.1 Introduction
Disarmament and International Security Council (DISEC) is the General Assembly’s
First Committee which deals with issues relating to disarmament, international
conflict, and dangers to peace that affect the global community. DISEC was
established as the first of major committees in the General Assembly, which is why it
is also referred to as the First Committee. Under the UN’s Charter Article 9, all 193 UN
members are automatically eligible as representatives of DISEC, and their votes are
all considered equal.
However, DISEC cannot directly intervene in the decision-making process of the
United Nations Security Council, and as per the 4th Chapter of the United Nations
Charter, DISEC can only recommend actions to the Security Council’s consideration.
Furthermore, it seeks out interpretations and solutions with regard to the international
security arena.
DISEC characterizes a crucial mandate which considers disarmament and
international security issues across the world in order to ensure peace and
development globally without any hindrances. Issues addressed in this vast
committee cover both disarmament and international security.
The General Assembly (GA) was established under Chapter IV of the United Nations
(UN) Charter. The ‘DISEC’ OR ‘UNGA I’ OR ‘Disarmament and International Security
Committee’ was founded in 1946 to prevent further attacks like the bombing of
Hiroshima and Nagasaki which took place in 1945 as an attack of World War II. In light
of these events, the first resolution by DISEC was created in 1946 to address
international concerns for the “Establishment of a Commission to Deal with the
Problems Raised
by the Discovery of Atomic Energy.”
DISEC deals with various problems around the world regarding disarmament, global
peace issues relating to Militarization and warfare, and threats to peace that
jeopardize international security.
Under Article 11 of Chapter IV of the UN Charter, “The General Assembly” may
consider the general principles of co-operation in the maintenance of international
peace and security, including the principles governing disarmament and the
regulation of armament.”
A few of DISEC’s landmark documents include:-
Resolution 1378: The very first General Assembly resolution that was co-sponsored by
all Member States at that time.
It expressed strong support for the Afghans to initiate the formation of a government
that is Multi-Ethnic, Broad-Based, and a complete representation of all Afghans. It
was committed towards ensuring peace with Afghanistan's neighbors, respecting the
human rights of all Afghan people regardless of gender, ethnicity or religion,
respecting Afghanistan's international obligations, including full cooperation in
international efforts to combat terrorism and illicit drug trafficking within and from
Afghanistan, and facilitating the urgent delivery of humanitarian assistance and the
orderly return of refugees and internally displaced persons, when the situation
permits.

The Emerald Heights Model United Nations 2023 DISEC | 5


Resolution 1 (I): The very first General Assembly resolution, entitled
“Establishment of a Commission to Deal with the Problems Raised by the
Discovery of Atomic Energy”, was adopted on recommendation by the
First Committee on 24 January 1946, in London.
Special sessions on disarmament (resolutions and decisions adopted at the
10th, 12th, and 15th special sessions of the General Assembly):-
A/S-10/4 (23 May – 30 June 1978)
A/S-12/6 (7 June – 10 July 1982)
A/S-15/6 (31 May – 25 June 1988)
The Mandate of the DISEC clearly states its differences from other committees like
the United Nations Security Council. The Mandate summarizes: “to promote the
establishment and maintenance of international peace and security with the least
diversion for armaments of the world's human and economic resources”.
Though the mandate limits its role to recommendations, it has proven to be one of
the most influential bodies in the United Nations as its resolutions deal with some of
the most complex topics in the international community.
The Committee works in close cooperation with the United Nations Disarmament
Commission and the Geneva-based Conference on Disarmament. It is the only Main
Committee of the General Assembly entitled to verbatim records coverage.

The Emerald Heights Model United Nations 2023 DISEC | 6


Introduction
The rapid advancement of technology has led to an increase in the use of
surveillance measures by governments, private companies, and individuals. While
surveillance tools are purportedly being deployed for combating issues like extremism
and crime, they have often been used for illegitimate reasons. These include
clamping down on critical or dissenting views and on those who express them,
including journalists and the opposition’s political figures. Regardless of all the
benefits technology brings to society, surveillance comes at a very high cost while
possibly undermining the development of liberal democracies. These measures have
the potential to violate privacy and security rights of individuals and the Disarmament
and International Security Committee would be discussing this issue in the context of
international security, privacy and disarmament.
The aim of the agenda is to explore the balance between privacy and security
concerns and to evaluate the extent to which surveillance measures can be deemed
acceptable under international law. The committee will discuss the ethical and legal
implications of surveillance measures such as the use of facial recognition
technology, the collection of personal data, and monitoring of online activities. The
committee will also consider the potential impact of surveillance on civil liberties and
human rights.
The committee will assess the role of international organizations, such as the United
Nations, in regulating surveillance measures and enforcing privacy and security rights.
It will also consider the effectiveness of current legal frameworks in protecting
privacy and security rights and will explore potential measures to strengthen them.

The Emerald Heights Model United Nations 2023 DISEC | 7


History of Privacy and Security
Privacy and security have been issues of significant importance throughout human
history, evolving in response to changing technologies, social norms, and political
systems.
3.1 Early Privacy and Security Measures (LINK)
In ancient civilizations, privacy and security were often ensured through physical
barriers and personal vigilance. For example, the walls and gates of ancient cities
protected citizens from outside threats, while the use of seals and passwords
provided individuals with some measure of personal security.
In medieval Europe, privacy and security took on a more individualistic character. The
development of private property rights and the emergence of the concept of the
"castle doctrine" led to the construction of fortified manors and castles which were
designed to protect the inhabitants from outside threats.

3.2 The Emergence of Surveillance


The 17th and 18th centuries brought new challenges to privacy and security. As
governments began to take a more active role in regulating and controlling their
populations, they developed new surveillance technologies to monitor and gather
information about their citizens.
One of the earliest forms of government surveillance was the postal system, which
allowed rulers to intercept and read private correspondence. This practice became
more widespread in the 19th century with the invention of the telegraph and the
telephone, which made it easier for governments to monitor communication
channels.
The 20th century saw the development of even more sophisticated surveillance
technologies, including closed-circuit television (CCTV), electronic databases, and
satellite imagery. Governments also began to use propaganda and media
manipulation to shape public opinion and control the narrative surrounding political
events.

3.3 The Digital Age and the Era of Mass Surveillance


The advent of the internet and the proliferation of digital technologies and
surveillance in the late 20th century have given rise to a new era of mass
surveillance. Governments and corporations now have unprecedented access to vast
amounts of personal data, which they can use to track, monitor, and influence
individuals and groups.
At the same time, the proliferation of social media and other online platforms has
made it easier for individuals to share personal information with others, often without
fully understanding the consequences of their actions.

The Emerald Heights Model United Nations 2023 DISEC | 8


History of Privacy and Security

Current State of Surveillance


Surveillance, which refers to the monitoring
M and tracking of individuals, has become
a pervasive and controversial issue in recent years. Advances in technology have
made it easier for governments, corporations, and other entities to collect vast
amounts of personal data, often without the knowledge or consent of those being
watched. This has raised concerns about violations of privacy and security, and the
potential for abuses of power.
4.1 Current State of Surveillance:
The current state of surveillance is complex, as different countries have different
laws, regulations, and practices regarding the use of surveillance technologies.
However, there are some common trends and challenges that can be observed
globally.
4.2 Mass Surveillance: Many governments around the world have implemented
mass surveillance programs in which they collect data on a large scale from various
sources, such as social media, phone records, and internet traffic. This has raised
concerns about the violation of privacy rights and the potential for abuse of power.
4.3 Cybersecurity: As surveillance technologies become more advanced, the risk of
cyber attacks and data breaches also increases. This can have serious consequences
for individuals, businesses, and even entire countries, as sensitive information can be
stolen, manipulated, or used for malicious purposes.
4.4 Corporate Surveillance: In addition to government surveillance, many
corporations also engage in monitoring and tracking activities, often for commercial
purposes. This can include collecting data on users' online activities, location, and
preferences, and using this information to target advertisements or influence
consumer behavior.

The Emerald Heights Model United Nations 2023 DISEC | 9


4.5 International Cooperation: Given the global nature of surveillance and cyber
threats, international cooperation and collaboration is crucial for addressing these
challenges. However, there are also tensions and disagreements among countries
regarding the use of surveillance technologies, as well as concerns about human
rights abuses and unequal power dynamics.
Surveillance is a complex and multi-faceted issue that requires careful consideration
of the trade-offs between security, privacy, and human rights. While advances in
technology have made it easier to collect and analyze vast amounts of data, there is
also a need for greater accountability, transparency, and regulation to prevent
abuses of power and protect individual freedoms. International cooperation and
dialogue are essential for addressing the global challenges of surveillance and cyber
threats, while also respecting the diversity of values and perspectives among
different countries and stakeholders.

The Emerald Heights Model United Nations 2023 DISEC | 10


Legal Frameworks Governing
Surveillance
While surveillance can serve various legitimate purposes, including maintaining public
safety and protecting national security, it can also pose significant threats to
individuals' privacy and security. As such, there are various legal frameworks in place
to govern surveillance and protect individuals' rights.
5.1 International Legal Frameworks:
There are several international legal frameworks that provide guidance on
surveillance and privacy issues. The Universal Declaration of Human Rights (UDHR)
is a key document that recognizes the right to privacy as a fundamental human right.
The International Covenant on Civil and Political Rights (ICCPR) further
elaborates on this right and outlines the legal obligations of states to protect
individuals from arbitrary or unlawful interference with their privacy.
Additionally, the General Data Protection Regulation (GDPR) is a comprehensive
legal framework implemented by the European Union that aims to protect individuals'
personal data and privacy rights. It requires organizations to obtain explicit consent
from individuals before collecting and processing their personal data and imposes
strict penalties for non-compliance.
5.2 National Legal Frameworks:
Most countries have their own legal frameworks to regulate surveillance and protect
individuals' privacy. For example, the Fourth Amendment to the United States
Constitution provides protection against unreasonable searches and seizures by the
government. Similarly, the UK has the Investigatory Powers Act, which outlines the
legal requirements and limitations for surveillance activities by intelligence agencies.
5.3 Industry Self-Regulation:
In addition to legal frameworks, some industries have implemented self-regulatory
measures to protect individuals' privacy rights. For instance, tech companies such as
Google and Facebook have implemented privacy policies and user agreements to
govern the collection and use of personal data. However, critics argue that such
measures may not be sufficient, as companies may prioritize their own interests over
individual rights.
Overall, legal frameworks play a critical role in regulating surveillance and protecting
individuals' privacy rights. However, there is still ongoing debate about the adequacy
and effectiveness of these frameworks, and the extent to which they balance
legitimate security concerns with individual rights. As such, it is important for
policymakers and citizens to remain vigilant and engaged in ongoing discussions
about privacy and surveillance.

The Emerald Heights Model United Nations 2023 DISEC | 11


Human Rights Implications
towards Affected Groups
The use of surveillance technologies has far-reaching implications for human rights,
particularly for marginalized and vulnerable groups. While surveillance can be used
for legitimate purposes such as national security or law enforcement, it can also be
abused to infringe on individual freedoms, violate privacy rights, and discriminate
against certain groups. As such, it is important to consider the human rights
implications of surveillance when assessing its use in the age of advanced
technology.
6.1 Human Rights Implications towards Affected Groups:
6.1.1 Right to Privacy: One of the most significant human rights implications of
surveillance is the violation of the right to privacy. Surveillance technologies can be
used to monitor and track individuals without their knowledge or consent, invading
their personal space and potentially exposing sensitive information. This can be
particularly concerning for vulnerable groups such as political dissidents, journalists,
and minority groups who may be targeted based on their beliefs or identities.
6.1.2 Freedom of Expression: Surveillance can also have a chilling effect on
freedom of expression and the right to dissent. The fear of being monitored or
punished for expressing dissenting opinions can silence individuals and stifle the free
exchange of ideas. This can be especially harmful for those who rely on freedom of
expression to advocate for their rights, such as human rights defenders or
marginalized groups fighting for justice and equality.
6.1.3 Non-Discrimination: Surveillance can also perpetuate discrimination against
certain groups, particularly those who are already marginalized or vulnerable. For
example, facial recognition technologies have been found to be less accurate for
some people, which can lead to false accusations and wrongful arrests. In addition,
surveillance can be used to target certain groups based on their color, ethnicity,
religion, or other characteristics, leading to human rights abuses and discrimination.
6.1.4 Due Process and Fair Trial: Surveillance can also impact the right to due
process and a fair trial, particularly in the context of law enforcement and criminal
investigations. When surveillance is used as evidence in court, it may not be subject
to the same legal standards as traditional forms of evidence, raising questions about
the fairness and accuracy of legal proceedings.
Surveillance can have significant impacts on human rights and the lives of people,
especially people from vulnerable sections of society. In order to assess the use of
surveillance technologies in the age of advanced technology, it is crucial to consider
the potential impacts on privacy, freedom of expression, non-discrimination, due
process, and fair trial. Governments and other stakeholders must take into account
the potential risks and harms associated with surveillance and work to ensure that it
is used in a way that respects and protects human rights for all individuals, regardless
of their identity or background.

The Emerald Heights Model United Nations 2023 DISEC | 12


Cyber-Security and Ethical
Considerations
Cyber-security is a critical concern in today's digital age, as we rely on technology
for communication, commerce, and data storage. While technological advancements
have brought tremendous benefits to society, they have also created new threats
and vulnerabilities that can compromise individuals' privacy and security. As a result,
it is essential to understand the ethical considerations and principles that underpin
cyber-security practices to protect individuals and prevent violations of privacy and
security.
The first ethical consideration in cyber-security is the respect for privacy. Individuals
have the right to control their personal information and any collection, use, or
disclosure of their data must be lawful, transparent, and proportionate to the
purpose. Therefore, any cyber-security measures should be designed to protect
privacy and avoid unnecessary surveillance or intrusion into personal data.
The second ethical consideration is the principle of security. Cyber-security measures
must be effective and robust, ensuring that data is protected against unauthorized
access, modification, or destruction. At the same time, security measures must also
be proportionate, avoiding overreaching or excessive measures that infringe on
individuals' rights or lead to unintended consequences.
Another ethical consideration is the need for accountability and transparency in
cyber-security practices. Organizations and governments responsible for cyber-
security must be transparent about their activities, policies, and data processing
practices. They should also be accountable for any breaches or violations of privacy
or security and provide remedies and compensation for affected individuals.

The Emerald Heights Model United Nations 2023 DISEC | 13


The fourth ethical consideration is the respect for human dignity and autonomy.
Cyber-security measures should not undermine individuals' dignity or autonomy, nor
should they be used to discriminate or stigmatize individuals based on their race,
gender, religion, or other personal characteristics. Any cyber-security measures
should be designed to protect individuals' dignity and autonomy and avoid any form
of discrimination or prejudice.
Finally, the ethical considerations in cyber-security also include the need for
international cooperation and collaboration. Cyber-security threats are global and
require cooperation and coordination among governments, organizations, and
individuals across borders. Any cyber-security measures should be based on
international law, standards, and best practices, ensuring that they respect the
sovereignty and human rights of all nations and individuals.
In conclusion, cyber-security is a critical issue that requires a balanced approach
that respects privacy, security, accountability, human dignity, and international
cooperation. Understanding and applying these ethical considerations and principles
is essential for protecting individuals and preventing violations of privacy and security
in the age of surveillance.

The Emerald Heights Model United Nations 2023 DISEC | 14


Obligations of Governments
towards Privacy and Security
The right to privacy and security is a fundamental human right that should be
protected by governments. However, in the age of surveillance, violations of privacy
and security have become more prevalent, making it essential for governments to
reassess their obligations towards these fundamental rights. In this study guide, we
will examine the obligations of governments towards privacy and security and how
they can address violations of these rights.
8.1 Privacy and Security Obligations of Governments:
Respect for Human Rights: Governments have a duty to respect, protect and fulfill
the human rights of their citizens, including the right to privacy and security. This
means that they must ensure that their surveillance activities do not infringe on these
rights.
Transparency: Governments must be transparent about their surveillance activities
and laws governing them. This includes publishing the scope and purpose of the
surveillance activities and ensuring that there are adequate checks and balances to
prevent abuse of power.
Accountability: Governments must be held accountable for any violations of privacy
and security. This means that there should be appropriate remedies available to
individuals who have suffered harm as a result of unlawful surveillance activities.
Proportionality: Governments must ensure that their surveillance activities are
proportionate to the threat they are trying to address. They should not engage in
indiscriminate mass surveillance or engage in surveillance activities that are not
necessary for national security purposes.
Minimization: Governments must minimize the collection, use, and retention of
personal data obtained through surveillance activities. This includes ensuring that the
data collected is relevant, accurate, and up-to-date and deleting it when it is no
longer necessary.
8.2 Addressing Violations of Privacy and Security:
Strengthening Oversight: Governments must establish independent oversight bodies
to ensure that surveillance activities are conducted lawfully and in accordance with
human rights standards. These oversight bodies should have the power to investigate
complaints and make recommendations for reform.
Enforcing Accountability: Governments must ensure that those responsible for
violations of privacy and security are held accountable. This includes conducting
investigations, prosecuting perpetrators, and providing compensation to victims.
Reforming Laws: Governments must reform their surveillance laws to ensure that they
are consistent with human rights standards. This includes ensuring that surveillance
activities are only conducted for legitimate national security purposes and are
subject to appropriate safeguards.
Promoting Transparency: Governments must be transparent about their surveillance
activities and engage in public dialogue to ensure that the public understands the
scope and purpose of these activities.

The Emerald Heights Model United Nations 2023 DISEC | 15


The protection of privacy and security is a fundamental human right that should be
protected by governments. In the age of surveillance, it is essential that governments
reassess their obligations towards these rights and take steps to address any
violations. By respecting human rights, promoting transparency, and strengthening
oversight, governments can ensure that their surveillance activities are conducted
lawfully and in accordance with human rights standards.

Past International Actions


Undertaken to Tackle the Violation
of Privacy and Security
There have been numerous international actions undertaken to tackle the violation of
privacy and security, especially in the age of surveillance. Here are a few notable
examples:
9.1 The Universal Declaration of Human Rights: This is a landmark document
adopted by the United Nations General Assembly in 1948. It recognizes the inherent
dignity and equal rights of all human beings, including the right to privacy. Article 12
of the declaration states that "no one shall be subjected to arbitrary interference
with his privacy, family, home or correspondence."
9.2 The International Covenant on Civil and Political Rights: This treaty, adopted
in 1966, is a binding agreement that obligates countries to protect and respect the
civil and political rights of their citizens. Article 17 of the covenant explicitly
recognizes the right to privacy and prohibits arbitrary or unlawful interference with a
person's privacy.
9.3 The Council of Europe Convention on Human Rights and Biomedicine: This
convention was adopted in 1997 and focuses specifically on the protection of human
rights in the context of biomedicine. It recognizes the right to privacy with regard to
medical data and calls for appropriate safeguards to ensure the confidentiality and
security of such data.
9.4 The Snowden revelations: In 2013, former National Security Agency (NSA)
contractor Edward Snowden leaked classified documents that revealed the extent of
the US government's surveillance programs. The revelations sparked a global debate
about the balance between national security and individual privacy, and led to
increased scrutiny of government surveillance practices.
These international actions have played an important role in raising awareness about
the importance of privacy and security in the digital age. However, there is still much
work to be done to ensure that these rights are protected and respected around the
world. The United Nations and other international organizations continue to monitor
and address violations of privacy and security, and it is the responsibility of all
nations to uphold these fundamental rights.

The Emerald Heights Model United Nations 2023 DISEC | 16


9.5 The General Data Protection Regulation (GDPR): This regulation was adopted
by the European Union in 2016 and went into effect in 2018. It is designed to protect
the privacy and personal data of EU citizens and imposes strict rules on the
collection, use, and storage of such data by organizations.
The number of privacy laws globally has risen, with the United Nations reporting that
about 66% of countries currently have data protection and privacy legislation.

The Emerald Heights Model United Nations 2023 DISEC | 17


Case Studies
10.1 Hyderabad: Nationwide Confidential Data Breach
In the Indian City of Hyderabad, the police busted a gang on 23rd March 2023 for
selling personal and confidential data of close to 170 million people across the
country including personnel from the army, the air force and the navy. Events like
these pose a grave threat to national security and result in violations of human rights,
privacy and security. The police commissioner stated that the fallout of the data
leakage has the ability to lead to espionage and jeopardize national security. Senior
police officers concede to the fact that until the Digital Personal Protection Bill,
2022, is passed, the data of citizens in the country shared with different
organizations is not safe.

The accused were found selling different categories of information exceeding more
than 140 categories that include some important and sensitive categories like details
of defense personnel, mobile numbers of citizens, NEET students, employees from
Energy and Power sector, PAN card details, government employees, information
regarding gas and petroleum, D-MAT accounts, students' database, women’s
database, Bangalore women consumer data, loans, insurance, credit card, debit
card holders (of Axis, HSBC and other banks), Whatsapp users, Facebook users, IT
Organization employees, frequent flyers, and others. The leakage of such data also
portrays the human rights implications of surveillance and violations of privacy. The
accused were selling the data through Justdial (e-commerce platform) openly
without any action taken against the sellers by the platform.
The country’s officials were skeptical about sharing more details about how data
related to defense personnel, their ranks, their addresses and other personal and
confidential data was accessed. Database of 30 million users was probably leaked
from telecom service providers.
Data of defense personnel and government employees can be used for espionage,
impersonation and committing serious offenses, which can jeopardize national
security. The data related to PAN cards can be used to commit serious offenses. The
data is being used to commit a large number of cyber crimes by gaining confidence
with the victim by disclosing the above information.

The Emerald Heights Model United Nations 2023 DISEC | 18


Investigators said that an e-commerce platform named Justdial played a key role
between persons in possession of illegally accessed data and fraudsters. The
officials ensure that proper action will be taken and Justdial will be served a notice
and their explanation will be sought. Justdial was allegedly providing contact details
of the concerned data agent depending on the caller's requirement. When the caller
(data seeker) in turn contacts the data agent, the latter would first share sample
data. If the caller was satisfied with information, full data would be provided. Data
of 50,000 members was provided by the data agents for a mere amount of Rs 2,000
Key questions delegates must answer:
What are some of the threats that technological development poses to data
privacy?
What are some legal flaws that lead to such events?
Have legal frameworks related to privacy and surveillance become obsolete in
the present age of technological developments?

10.2 Chinese Spy Balloon Flies Above Limits


The Chinese Spy balloon incident is a highlight in recent times when it comes to
crimes related to privacy and security. Spotted on January 28th 2023, this incident
made headlines globally due to its nature as a rumored hit on US-China relations.
When confirmed to be of Chinese descent, a mission to shoot it down was put into
action by the US and was successfully shot down on 4th february. The balloon
contained collection pod equipment, including high-tech equipment that could
collect communication signals and other sensitive information. It was run by solar
panels on its metal chassis.
A balloon of this composition and form is extremely effective for spying purposes due
to 3 main reasons: high-resolution images from high altitudes, being difficult to track
in airspaces, and its ability to stay in one spot longer than satellites. But, apart from
its alleged spying and surveillance uses, the World Meteorological Organisation also
notes its very effective use in climate monitoring, providing two sides to this case.
China has stated that it was a civilian airship used for meteorological research
purposes, and claimed that it strayed from its airspace, and that the US is using it as
an excuse to escalate tensions between the 2 nations. The US has focused on the
other side of the case wherein they focused on its spying nature. It claims that the
balloon was a violation of International Law and makes all advancements in China-
US relations pointless.
This case remains a zenith in the violations of privacy and security in the past few
months. Further, we leave it to you to decide whether this was a violation of privacy
and security, or a mere misunderstanding between the 2 nations, and really just a
meteorological research balloon.

The Emerald Heights Model United Nations 2023 DISEC | 19


Questions A Resolution
Must Answer
What measures can be taken to protect individuals' privacy rights in the face of
increasing surveillance technologies?
How can governments balance national security concerns with the protection of
individual privacy rights?
What are the potential consequences of government surveillance on free speech
and expression?
How can international cooperation be improved to prevent cross-border
violations of privacy and security?
What role should technology companies play in protecting individuals' privacy
rights?
What regulations and oversight mechanisms should be put in place to ensure that
surveillance technologies are not used for discriminatory or abusive purposes?
How can the United Nations and other international organizations better address
the challenge of balancing privacy rights with national security concerns?
What are the ethical considerations involved in the use of surveillance
technologies, and how can they be addressed?
How can the rights of marginalized communities, such as refugees or political
dissidents, be protected in the face of surveillance technologies?
How can whistleblower protections be improved to encourage individuals to
come forward with information about government surveillance abuses?
What actions can be taken to hold governments and organizations accountable
for violations of privacy and security?
How can surveillance technologies be used to combat terrorism and other threats
while respecting individual privacy rights?
What impact does surveillance have on the relationship between citizens and the
state, and how can this be addressed?
How can education and awareness campaigns be used to inform individuals
about the risks and benefits of surveillance technologies, and empower them to
protect their privacy rights?

The Emerald Heights Model United Nations 2023 DISEC | 20


BIBLIOGRAPHY
https://privacyinternational.org/
https://timesofindia.indiatimes.com/city/hyderabad/hyderabad-police-bust-
gang-selling-personal-data-of-16-8-crore-people-6-
held/articleshow/98943097.cms
https://ssd.eff.org/
https://unctad.org/page/data-protection-and-privacy-legislation-worldwide
https://www.ohchr.org/en/privacy-in-the-digital-age
https://www.hrw.org/
https://www.pewresearch.org/internet/2019/11/15/americans-and-privacy-
concerned-confused-and-feeling-lack-of-control-over-their-personal-
information/
https://www.cnbc.com/2023/02/23/spy-balloon-comparing-us-china-
statements-after-blinken-wang-
met.html#:~:text=U.S.%20State%20Department%3A%20The%20Secretary,act%2
0must%20never%20again%20occur
https://news.un.org/en/story/2023/02/1133652
https://www.theguardian.com/world/china-spy-balloon-incident-2023
https://www.reuters.com/world/china/china-warns-us-suffer-consequences-if-
it-escalates-balloon-incident-2023-02-19/
https://thediplomat.com/2023/02/the-chinese-spy-balloon-incident-an-
urgent-need-for-communication/
https://www.reuters.com/world/chinese-weather-balloon-maker-denies-
connection-downed-spy-balloon-2023-02-25/

The Emerald Heights Model United Nations 2023 DISEC | 21


[email protected]
[email protected]
[email protected]

www.ehmun.com

You might also like