Study Guide - SPECPOL - AIMUNIV 1
Study Guide - SPECPOL - AIMUNIV 1
IV
STUDY GUIDE
Addressing Malpractices in Media Censorship &
Cybersecurity Vulnerabilities
Message from the Academics Team
Greetings delegates,
It is our utmost pleasure to have you as a part of Adamjee Intra Model United
Nations IV At our conference, we put some of the most contentious geopolitical
issues of the modern age at the forefront of different committees. The issue that
is to be discussed at the committee, Special Political and Decolonization
Committee (SPECPOL) is,
The study guide attached below will give you an extensive overview of the issue
and various conflicts that have unfolded due to this problem. However, it is not
an exhaustive account of all of the aspects of the agenda, and adequate research
is also expected on your part.
Warmest Regards,
Head of Academics:
Shakiya Sharmin Ahona
Dear Delegates,
We, the Executive Board members, eagerly await to meet you all in the first Adamjee Intra
Model United Nations IV session. We hope that all of you are preparing rigorously for the
conference, and may all of you be able to showcase your diplomacy skills blended with your
knowledge and aptitude. We expect you to have your thoughtful arguments and conclusions
rehearsed and revised well before presenting them to us.
We encourage you to review this study guide and familiarise yourself with the agenda, its
background, the stances of major nations, and the potential solutions to the issue at hand.
Furthermore, we want to remind all delegates of the importance of ethical conduct throughout
the conference. We expect all delegates to demonstrate integrity, professionalism, and respect
towards the opinions of fellow delegates while engaging in diplomacy and negotiation.
We wish you all the best for AIMUN IV. We will try our best to provide any kind of
assistance and utmost guidance to all of you. If you have any queries, feel free to contact any
of the Executive Board members.
Warm regards,
Chairperson:
Siam Murshed
Director:
Arony Aswad
Rapporteur:
Tasnim Ishraque
About the United Nations
SPECPOL MANDATE
SPECPOL works to solve political issues and global decolonization initiatives within the
framework of the United Nations. The primary duties of the committee include:
5) Space Affairs: SPECPOL is also in charge of debating and establishing guidelines for
the peaceful use of space. The committee discusses satellite technology, space-related
security issues, and space exploration.
Agenda Overview
Agenda: The Question of Abortion as a Fundamental Human Right
Censorship, the suppression of words, images, or ideas that are “offensive,” happens
whenever some people succeed in imposing their personal political or moral values on others.
Censorship can be carried out by the government as well as private pressure groups.
Media censorship is a global phenomenon that has foreshadowed information outlets for
centuries. A common ground for censorship is maintaining an orderly state, whereas the
underlying motive is to keep the public ignorant of the information that can potentially
threaten authorities. The worldwide Internet connectivity in the contemporary era allows
information to pass through within and beyond borders in minimal time; therefore, an
increasing number of media consumers depend on the Internet for a wide variety of
information. Historically, access to news has not been this easy: the press in most of Europe
in the 18th century was under the draconian reins of censorship, which gradually abated by
the 19th century due to public demand.
However, autocratic and heavily centralized governments still openly or subtly employ
censorship to silence government opposition. To combat information coup, tech-savvy
journalists and independent reporters channel information through social media, blogs, and
news websites. The governments survive by using stringent Internet surveillance apparatus
that effectively block websites and subtly filter information; hence, only selective news can
penetrate the firewall. The governments also hunt down citizens and journalists accessing
disallowed websites to create a ubiquitous atmosphere of fear, harassment, and persecution.
The role of media in society is not limited to bringing information to the public; therefore,
media mustn't capitalize on selling meaningless sensations that can potentially harm people,
sects, races, and religions. This paper will focus on information coup through media
censorship and the responsibility media is laden with to cultivate tolerance and responsibility
in the public.
MEDIA CENSORSHIP MALPRACTICES
The advent of digital media has transformed the landscape of information dissemination,
providing unprecedented access to various perspectives. However, this evolution has also
brought forth challenges as malicious actors exploit the dynamic nature of the digital realm.
Once confined to physical constraints, traditional media censorship methods have evolved
into highly sophisticated digital strategies. Governments, interest groups, and other entities
use content filtering, website blocking, and online surveillance to control narratives, suppress
dissent, and manipulate public opinion. Not only that, this attempt at controlling the media
has also crossed national boundaries and become a significant national security issue for
many countries. This has made necessary the collaborative efforts of the International
community to come together and address the challenges posed by censorship malpractices.
At the core of media censorship, malpractices lie the direct assault on the fundamental human
right of freedom of expression.
People’s right to privacy is coming under ever more tremendous pressure from the use of
modern networked digital technologies whose features make them formidable tools for
surveillance, control, and oppression, a new UN report has warned. This makes it essential
that these technologies are reined in by effective regulation based on international human
rights law and standards.
The report – the latest on privacy in the digital age by the UN Human Rights Office* – looks
at three key areas: the abuse of intrusive hacking tools (“spyware”) by State authorities; the
critical role of robust encryption methods in protecting human rights online; and the impacts
of widespread digital monitoring of public spaces, both offline and online.
The report details how surveillance tools such as the “Pegasus” software can turn most
smartphones into “24-hour surveillance devices”, allowing the “intruder” access not only to
everything on our mobiles but also weaponizing them to spy on our lives.
Urgent steps are needed to address the spread of spyware, the report flags, reiterating the call
for a moratorium on the use and sale of hacking tools until adequate safeguards to protect
human rights are in place.
Encryption is a key enabler of privacy and human rights in the digital space, yet it is being
undermined. The report calls on States to avoid taking steps that could weaken encryption,
including mandating so-called backdoors that give access to people’s encrypted data or
employing systematic screening of people’s devices, known as client-side scanning.
The report also raises the alarm about the growing surveillance of public spaces. Previous
practical limitations on the scope of surveillance have been swept away by large-scale
automated data collection and analysis, as well as new digitized identity systems and
extensive biometric databases that greatly facilitate the breadth of such surveillance
measures.
New technologies have also enabled the systematic monitoring of what people say online,
including collecting and analyzing social media posts.
Governments often fail to adequately inform the public about their surveillance activities, and
even where surveillance tools are initially rolled out for legitimate goals, they can easily be
repurposed, often serving ends for which they were not originally intended.
The report emphasizes that states should limit public surveillance measures to “strictly
necessary and proportionate,” focusing on specific locations and time. The duration of data
storage should similarly be limited. There is also an immediate need to restrict the use of
biometric recognition systems in public spaces.
All States should also act immediately to implement robust export control regimes for
surveillance technologies that pose severe risks to human rights. They should also ensure
human rights impact assessments are carried out that consider what the technologies in
question are capable of and the situation in the recipient country. In short, the right to privacy
is more at risk than ever.
Digital inequality, or the digital divide, refers to the gap between those with access to modern
information and communications technology (ICT) and those without.
A person’s ability – or inability – to access computers and smart devices can impact many
facets of their life, from paying bills to receiving emergency SMS alerts. It can also impact
their health.
Although technologies such as artificial intelligence and blockchain are opening new
frontiers of productivity and providing opportunities to people and societies, they pose
numerous risks. Almost half the world’s population, 3.7 billion people, mostly women, and
most in developing countries, are still offline. Collectively, the task is to help design digital
environments that can connect everyone with a positive future. This is why there is a need for
a joint effort, with collaboration among national and local governments, the private sector,
civil society, academia, and multilateral organizations.
Now more than ever, we need a global town hall to address these issues and to capitalize on
technology’s transformational potential to create new jobs, boost financial inclusion, close the
gender gap, spur a green recovery, and redesign the cities. The UN deputy chief underlined
the value of engagement, as achieving universal connectivity cannot be left solely to
governments or individual tech companies. The critical barriers to digital inclusion are related
to:
Accessing networks – living in urban areas where high-speed broadband is usually available
versus rural environments where internet connectivity could be problematic or even
non-existent.
The cost of devices or data – socioeconomic factors, including income and employment, can
limit a person’s ability to purchase and access digital technology.
Skills and literacies – education, experience, language, racial background, gender, and age
can impact a person’s ability and experience to navigate the digital realm to find, evaluate,
create, and communicate information.
Modern discussions of censorship center on the legitimacy of the regulatory structures and
actions through which expression and communication are governed and the extent to which
these structures meet the requirements of democratic societies.
Beyond formal legal restrictions, the rise of online harassment poses a significant threat to
freedom of expression. The committee should delve into how journalists, activists, and
individuals face intimidation, trolling, and cyberbullying, hindering their ability to express
opinions freely and contributing to a harmful effect on public discourse.
Governments worldwide plan to enact sweeping legislation that will crush freedom of
expression online. Several countries are establishing a vast censorship framework under the
guise of preventing “harm” and holding large tech companies accountable. Although
authorities claim their goal is to protect us from “disinformation,” vague definitions and
loopholes will create avenues for broad application, overreach, and abuse.
In Ireland, for example, citizens can now be imprisoned for possessing material that officials
decide is “hateful.” Under the RESTRICT Act in the US, the government may soon have the
authority to monitor the internet activity of any American deemed a security risk. Many new
laws will not only have a chilling effect, but they will also restrict the public’s access to
information. In Canada, a state agency can now filter and manipulate what Canadians can see
online, and in Australia, a single government official can compel social media companies to
remove posts.
Through this international effort, government officials and NGOs aim to gain total control
over online speech by forcing tech companies to comply with their desired rules. UK
lawmakers have threatened to imprison social media managers who don’t censor enough
content. Brazil has introduced some of the strictest penalties for platforms that fail to remove
“fake news.” Under the European Union’s Digital Services Act, large tech companies must
share their data with “vetted researchers” from non-profits and academia, ceding content
moderation to NGOs and their state affiliates.
Technological Manipulation:
Technology companies such as Apple, Facebook, and Google have incorporated various
design features into their mobile devices, operating systems, and social media applications,
making them addictive.
Impact on Countries:
Countries face numerous challenges due to media censorship malpractices. From the erosion
of crucial democratic institutions to the gradual disappearance of cultural and information
sovereignty, the impacts of media malpractices are massive.
These impacts often pose significant challenges for a country attempting to uphold and secure
its national interest. The lack of confidence in democracy and the distrust in the government
due to these practices frequently results in social unrest. Not only that, but media censorship
is also relevant in global diplomacy, where a country’s image may be positively or negatively
impacted depending on how it chooses to operate its own media landscape. Another
significant but rarely mentioned impact is the economic one. Economic growth and
prosperity become highly curtailed without the free and open exchange of ideas. Censorship
prevents this and stifles individual innovation.
Press Freedom:
In an era of transformative digital and social change, the protection of press freedom emerges
as a crucial necessity. Yet, press freedom is continuously on the defensive as new forms of
censorship and media malpractices seek to limit its scope and thwart its capacity as a check
on power.
Journalists worldwide are now facing all kinds of challenges that impede their crucial work.
They are being silenced, intimidated, and harassed, and even the very technologies that they
employ are made to work against them. Algorithms and filters appear impartial, but they
allow their creators, operators, and regulators the capacity to encourage or discourage certain
viewpoints. All of this has made impartial and honest journalism challenging.
These problems exceed the bounds of any one state and encompass journalists all around the
world. This means that the solutions must be similarly broad in scope. Protection mechanisms
and other necessary legal and political steps should be taken internationally to ensure
journalism can function as intended without any impediments.
Cybersecurity Vulnerabilities
As technology makes the world increasingly interconnected, the cybersecurity threat looms
large. With the growing relevance of technology in all aspects of national and international
life, the threats grow in proportion. The challenges themselves are of a wholly new kind and
as such require new ways of thinking about and solving them.
Evolving Landscape
The threats we face in the digital era are wholly different from anything we have ever faced.
These challenges are the direct result of the new technologies that have emerged. Simply put,
harmful actors attempt to turn these technologies against their users.
This can take several forms, including state-sponsored espionage, disruption of critical
infrastructure, the increased sophistication of cyber threats, and economic espionage. The few
mentioned here are not the total of all the challenges faced. More and more threats and
concerns are emerging along with the further development of digital technology. This
continuous evolution remains unabated, and new challenges always take on new shapes.
Nevertheless, the most crucial thing to note here is the willingness to address them
innovatively.
The increased reliance on digital technology has meant new vulnerabilities have emerged.
Nation-states and other actors that seek to exploit these vulnerabilities have jumped at this
opportunity. This has resulted in new forms of cyber warfare and espionage. One particular
type of cyber warfare that is deeply concerning is state-sponsored cyber espionage. Hostile
nation-states may seek to acquire sensitive military, political, or economic information to get
an edge over another country. Cyber-attacks are also unique in that it isn’t easy to attribute
them to a specific source hence, ambiguity and anonymity can be maintained. This has made
it a desirable, relatively low-cost method of harming another country. As expected, this has
significant diplomatic ramifications for all countries as it erodes trust and unnecessarily
heightens tensions.
2. What ethical and legal frameworks surround media censorship, and how can they be
strengthened to combat malpractices?
3. What role can technology play in both facilitating and combating media censorship?
7. How can we balance protecting national security and ensuring freedom of expression
in the digital age?
Types of Documentation
Documentation is one of the most essential parts in a Model UN conference. There are
multiple forms of documents that delegates are required to prepare. The three important
documents that delegates of UNHRC at AIMUN IV will be required to prepare are as
follows:
3. Draft Resolution: A draft resolution is the final document presented in a committee that
outlines proposed solutions on the agenda. It is a formal document that specifies actions to
be taken to solve the problem at hand. Delegates debate and amend the draft resolution
before voting on its adoption as an official committee resolution.
This guide explains the position paper and draft resolution in detail, along with samples.
● Font Size: 12
Preambulatory Clauses: The second section of the resolution draft is the preambulatory
clauses. All of the issues that the committee seeks to resolve are listed in the preambulatory
clauses. It could outline the justifications behind the committee's work on the issue and
highlight previous international actions. It may contain:
● Past UN resolutions, treaties, or conventions related to the topic.
● Past regional, non-governmental, or national efforts in resolving this topic.
● References to the UN Charter or other international frameworks and laws.
● Statements made by the Secretary-General or a relevant UN body or agency.
● General background info formation or facts about the topic, its significance, and its
impact.
Each preambulatory clause begins with a preambulatory phrase and ends with a comma.
One should start preambulatory clauses with preambulatory phrases. Here are some
examples of preambulatory phrases:
Preambulatory Phrases
N.B. Any of these phrases can be reused by adding “further” or “deeply” in front of it. For
example, “Noting” can be reused by becoming “Further noting,” or “Concern by” can be
reused by becoming “Deeply Concerned by”.
Operative Clauses: The third and most crucial section of the Draft Resolution is the
operative clauses. It outlines the approaches the resolution's sponsors suggest to address the
problems. The issues indicated in the pre-ambulatory clauses should be addressed in
operative clauses. An operative clause should answer the “who, what, when, where, why, and
how” questions. By doing so you can strengthen the operative clauses. All of the operative
clauses should follow the format given below:
● Every operative clause should be numbered.
● Each operative clause should support the progression of your desired solution.
● Sub-clauses may be added to a clause to provide more information
and clarification.
● Operative clauses are punctuated by a semicolon, except your last
operative clause, which should end with a period (full stop).
You should write operative clauses starting with operative phrases. Some examples are:
Operative Phrases
Requests Wishes
N.B. Any of these operative phrases can be reused by adding “further” or “strongly” in front
of it. For example: “Requests” can be reused by becoming “Further requests” or “Asks” can
be reused by becoming “Strongly asks”
Annexure: You can add an annexure section to a draft resolution, though optional. An
annexure is like an extension of the operative clauses. If you cannot answer the how, when,
or where question in the operative clause, you can add an annexure to that specific clause. It
is not frequently used. If the answer to the how question is too long, then it is good to write it
in the annexure. By doing so you can keep your operative clauses well-ordered while still
keeping them precise.
The committee's most formal document is a draft resolution. The language used when writing
a draft resolution is crucial. It is strongly advised that you keep your writing formal and
adequate. It is also essential to be precise while writing a draft resolution. Conduct
appropriate research and gather data from reliable sources to strengthen the authenticity of
the solution you offer in the draft resolution.
Sponsors: A sponsor is a delegate or a group of delegates who have drafted the resolution.
They are a key player in developing solutions and have been selected to represent a specific
bloc. Sponsors, having read all the draft resolution points, agree to it completely. Sponsors
have to vote a ‘Yes’ to the draft resolution when it comes to voting. They cannot vote ‘No
‘or ‘Abstain’ on the voting.
Signatories: All countries who wish to support the draft resolution being discussed merely.
They can agree to one or more clauses but have not. They have no obligation regarding
voting. They can vote yes, no, or abstain as they wish and according to their roll call. In a
general assembly, at least 20% of the committee must be signatories for introducing a draft
resolution.
Agenda: Ethnic Cleansing of Rohingya people, and increased xenophobia, racism, and racial
discrimination worldwide
Concerned about the lack of recognition of cultural diversity in human rights, justice, and the
right to development,
Further reaffirming the 1951 Convention relating to the Status of Refugees, together with the
1967 Protocol,
1. Calls upon member nations, international organizations, and NGOs to support intercultural
and inter-communal initiatives on human rights to promote all human rights;
2. Requests the United Nations Educational, Scientific and Cultural Organization to support
the initiatives aimed at promoting intercultural, inter-religious and inter-ethnic dialogue on
human rights;
3. Stresses the necessity of using the media, new information, and communications
technologies freely not to create negative opinions about any specific ethnic or religious
group;
4. Requests humanitarian aid be sent in to help the civilians trapped in this conflict and the:
a. aid would mostly be in the form of food donations that would be distributed to the
refugees,
b. aid would be given to refugees located in Bangladesh to help ease the strain of the
additional people in the country;
6. The government of Myanmar urges UN investigators to carry out a complete and thorough
investigation of the region to allow the UN to assess the current situation in Myanmar better.