Disec BG
Disec BG
New ideas are by their very nature disruptive, but far less disruptive than a
world set against the backdrop of stereotypes and regional instability due to
which reform is essential in policy making and conflict resolution. At any point
during your research, do not hesitate to contact the Executive Board Members
for clarifications or in case you need help in any other aspect. We look forward
to a fruitful discussion and an enriching experience with all of you.
Best regards,
Eswar Chava Sriram Kalluri
Chairperson Vice Chairperson
Important Points to Remember
2. Foreign Policy: Following the foreign policy of one’s country is the most
important aspect of a Model UN Conference. This is what essentially
differentiates a Model UN from other debating formats. To violate one’s
foreign policy without adequate reason is one of the worst mistakes a delegate
can make.
c. News Sources:
1. Reuters: Any Reuters article that clearly makes mention of the fact or is in
contradiction of the fact being stated by a delegate in council.
2. State operated News Agencies: These reports can be used in the support of
or against the State that owns the News Agency. These reports, if credible or
substantial enough, can be used in support of or against any country as such
but in that situation, may be denied by any other country in the council. Some
examples are – RIA Novosti (Russian Federation), Xinhua News Agency (People’s
Republic of China), etc.
***Please Note: Reports from NGOs working with UNESCO, UNICEF and other
UN bodies will be accepted. Under no circumstances will sources like
Wikipedia, or newspapers like the Guardian, Times of India, etc. be accepted.
However, notwithstanding the criteria for acceptance of sources and evidence,
delegates are still free to quote/cite from any source as they deem fit as a part
of their statements
Guidelines
· Read the entirety of the background guide in the order it was written. Make
sure to highlight the names of specific treaties, documents, resolutions,
conventions, international bodies, events and any other specific incidents so
that you can get back to them later and do a lot more thorough research.
· Understand some of the basic details regarding the country that you've been
allotted whether this be the capital, current affairs regarding geopolitical
situation, political hierarchy etc. While not strictly necessary, you never know
when this can turn out to be handy. Geography Now's A - Z Country List has
been a particularly helpful resource for this.
· Use a search engine of your choice to create as many tabs as possible for
the highlighted terms from your background guide. Wikipedia or a YouTube
video act as a great way to get a brief summary of the incidents at hand but
such sources (especially Wikipedia articles) cannot be used in committee as
sources.
· Find the website for the foreign ministry of the country you have been
assigned alongside the "Permanent Mission of COUNTRY to the United
Nations" website and search for a key term relating to the agenda, this
should often give you statements from recent press conferences or UN
committee sessions that can act as valuable sources of information in
forming a position.
· Keep a handy copy of the Charter of the United Nations, whether as a .pdf
file extension or a physical copy works. This contains the founding
principles of the United Nations and contains articles that lay out the
mandate of the six bodies that the United Nations is primarily divided into.
Spend some additional time researching the specific mandate and functions
of the committee that you have been assigned.
· The Executive Board may ask for the source of a statement that a delegate
makes in committee either during a Point of Order circumstance or if said
statement stands to be of interest to the Executive Board. Therefore, it is
recommended that delegates keep track of their sources when making /
disputing a claim and also ensure their validity. Please do remember that
while you as a delegate are allowed to cite any source you wish during
committee.
Hierarchy of evidence
Evidence can be presented from a wide variety of sources, but not all
sources are treated as equal. Here’s the hierarchy in which evidence is
categorised:
Tier 2: Includes: any news article published by any official media source
that is owned and controlled by a UN member state. E.g.: Xinhua News
(China), Prasar Bharti (India), BBC (United Kingdom) etcetera. The evidence
falling in this tier is considered sufficiently reliable in case no other
evidence from any Tier 1 source is available on that particular fact, event,
or situation.
Your foreign policy should dictate everything from the arguments you make,
the reasoning you give for making those arguments, and the actions you take
in the Council.
Foreign Relations on the other hand refers to the diplomatic ties that one
country has with another and considers elements such as the mutual
presence of embassies, consulates, ambassadors & diplomatic dialogue. More
often than not, foreign policy is what will be of your primary concern during
the MUN, but it is important to also consider any extremities in your allotted
country's foreign relations.
Introduction to the committee
DISEC works closely with other UN bodies and agencies like the United
Nations Office on Disarmament Affairs (UNODA) and International Atomic
Energy Agency (IAEA). The First Committee sessions are structured into
three distinctive stages:
1. General debate,
3. Action on Drafts.
Introduction: Fourth-Generation Warfare in Perspective
The term fourth-generation warfare came into use among military strategists and
planners in the late 1980s as a way to characterize the dynamics and future
direction of warfare. This community postulated the evolution of warfare in
several distinct phases. The first generation of modern (post-Westphalian) war
was dominated by mass manpower and culminated in the Napoleonic Wars.
Firepower characterized the second generation, which culminated in World War I.
The third generation was dominated by maneuvering as developed by the
Germans in World War II. The fourth generation has evolved in ways that take
advantage of the political, social, economic, and technical changes since World
War II. It makes use of the advantages those changes offer an unconventional
enemy.
The Generations
Thomas X. Hammes, a retired Marine Corps colonel and one of the principal
proponents of the idea, writes:
The first generation of modern war was dominated by massed manpower and
culminated in the Napoleonic Wars. The second generation, which was quickly
adopted by the world's major powers, was dominated by firepower and ended in
World War I. In relatively short order, during World War II the Germans introduced
third-generation warfare, characterized by maneuver…[fourth-generation warfare
is an] evolved form of insurgency [that] uses all available networks political,
economic, social, military—to convince the enemy's decision makers that their
strategic goals are either unachievable or too costly for the perceived benefit.
On the other hand, Lind, arguably the person who first outlined the concept and
who is among its most prominent proponents, describes these generations in the
following terms:
● First Generation: Mid-17th to early 20th century. Characterized by a battlefield
of order (i.e., line and column tactics), which created a bureaucratic military
culture of order. This began to break down with the development of industrial-age
armies, as the military culture of order clashed with the increasingly disorderly
battlefield, leading to a period of often bloody confusion.
Although everyone may not agree completely with him, John Robb, a former Air
Force officer, journalist, and businessman, and another prominent advocate of
4GW, has a neat summary of what he views as the critical factors favoring this
new way of war:
● Global: Modern technologies and economic integration enable global
operations by small actors.
All of the proponents of 4GW argue that its principal objective is not the
destruction of the enemy's forces, but of his will to continue the fight. As
Robb states it:
Victory … is won in the moral sphere. The aim of 4GW is to destroy the
moral bonds that allow the organic whole to exist—cohesion.
Proponents of 4GW often argue that the “Clausewitzian Trinity” of
warmaking, the ties among government, people, and armed forces, which
prevailed during the first three generations, is no longer valid. Marginalized
during the first three generations of modern war, the “non-state actors”
such as tribes, sects, criminals, corporations, and more are once again able
to engage in war. Thus, to some extent, 4GW is a return to the pre-
Westphalian politico-military environment, and, given this “decline of the
state,” there “can be no purely military solution to Fourth Generation
threats.” Some critical elements of 4GW are that:
Characteristics of 4GW
1. Social Characteristics
● The loss of the state's monopoly on war and on the first loyalty of its
citizens gives a fillip to 4GW. At the same time, 4GW uses the responsibility
that the state continues to have for its citizens to develop a strategy where,
by making its citizens targets for terror, it can force the state to conform to
the desired behavior.
● The rise of non-state entities that command the primary loyalty of people
based upon highlighted differences. These entities may be gangs, religions,
races and ethnic groups within races, localities, tribes, business enterprises,
and ideologies. The variety is almost limitless.
3. Military Characteristics
● The primary target of military action is to defeat the will of the people and
take over control of their political system.
● For the weaker side, the preferred terrain for operations is the urban
jungle. This complex terrain provides cover from the superior technology of
one side, while also providing means of modern communication and access
to media and instant audiences. It is ideally suited to 4GW.
Psychological warfare
Psychological warfare refers to an aspect of a war or conflict, where one side
tries to change the moral attitude, beliefs, behavior, emotions, and thoughts
mainly by the use of media. Everything can be the target of psychological
warfare, states as well as individuals, but they also may use psychological
warfare themselves. It can also be used in non-conflict situations in order to
achieve certain political or economic changes or advantages and can
therefore be used not only by states but also by individuals or non-state
actors. This is why psychological warfare is often very subtle and cannot be
recognized as war. The goals of psychological warfare can be very different; it
may be used to lower the enemy’s morale and motivation but also to influence
elections.
Guerilla warfare
The term is used for conflicts in which small groups of irregular forces, which
may include military forces as well as normal civilians, use hit-and-run tactics
to win against a larger, less mobile army with regular soldiers that occupy their
territory. These groups can be part of a greater organization or act
individually. They often use the element of surprise to ambush the enemies in
order to inflict great damage but retreat fast to lessen their own casualties. If
done right, it is a very effective tactic against big military forces but often
leads to great losses.
Non-state actors
Non-state actors (NSA) are groups and organizations that are big and strong
enough to have an influence on world politics and cause changes. They do
not belong to any state though they may work together. Examples of NSAs
are NGOs, religious groups, multinational corporations as well as violent non-
state actors (VNSA). VNSAs play a crucial role in the 4GW. They use illegal
violence, such as terrorism, to reach their goals. But VNSAs should not only
be seen as terrorist groups, they can also be warlords, gangs, or militias.
Low-intensity conflicts
Low-intensity conflicts (LIC) describe conflicts in which military forces are
selectively used and have certain restrictions. It includes objectives such as
peacekeeping, antiterrorism as well as assistance to other countries.
Because of these restrictions, LICs cause fewer casualties and destruction
than a war. LICs can include 4GW as sometimes state forces fight against
(violent) NSAs.
Center of Gravity
The center of gravity (CoG) was first used by a Prussian military officer and is
described as the element, object, or ideology which provides the physical
and mental strength to fight for one’s goals. The US military tries to reduce
all aspects to one CoG and has defined the friendly CoG as the element
which motivates the own people to fight whereas the enemy CoG is the
obstacle that is in the way of the army achieving its objective.
With the state losing its monopoly on war, the road is paved for groups such as Al-Qaeda,
Boko Haram, Hamas, and Hezbollah to exercise great influence. The violent nonstate actors
(VNSAs) are able to act with great mobility, as they are not concerned with protecting their
territory, but rather are primarily interested in spreading their respective ideologies.
Because of the methods involved in fourth-generation warfare, some experts say that
traditional superpowers are actually at a disadvantage on operational, strategic, mental and
even moral levels. There is a heightened emphasis on concurrent actions within both the
opponent’s physical and societal entities, coupled with the blurring of distinctions between
military members and civilians.
Additionally, elements that gave superpowers advantages in past generations, such as large
headquarters for troops and fixed communication sites, have become obsolete, and even
detrimental, to the needs of fourth-generation battle. These features create too great of a
risk to the total functionality of the mission within the scope of these warfare developments.
Guerrilla warfare of any kind prevents the possibility of striking an opponent’s headquarters,
forcing countries to rethink previously successful wartime strategies. Former superpowers,
however, have struggled with this new system, most notably the US and France in Vietnam,
and the Soviet Union in Afghanistan.
With fourth-generation warfare, the key is to “apply force to an enemy without giving him a
point at which to carry out a decisive counter-strike.” This viewpoint is radically different
from the traditional approaches of major European powers and the United States, forcing
these states to adopt new war philosophies and defend against evolving types of combat.
Major powers have faced challenges when occupying territories in which much
of the population resist occupation. This was most notably seen in the United
States’ involvement in Iraq and Afghanistan. It is widely believed that the US
inadvertently created a breeding ground for terrorists and opened the door
for fourth-generation warfare by establishing a declining, relatively weak
Afghani state. To be successful, many experts say that superpowers must learn
to fight “battles of encirclement,” by having an infantry that can move farther
and faster on foot than the enemies.
The Liberation Tigers of Tamil Eelam (LTTE), commonly known as the Tamil
Tigers, were a separatist militant organization fighting for an independent
homeland for Sri Lanka’s Tamil minority in northern Sri Lanka. Velupillai
Prabhakaran founded the group in 1972 and by the late 1980s was the dominant
Tamil militant group in Sri Lanka. After a number of failed negotiations, the Sri
Lankan government declared an all-out offensive against the LTTE in 2006. By
May 2009, government forces had defeated the LTTE and killed Prabhakaran. An
estimated 70,000 people were killed during the conflict between the LTTE and
the Sri Lankan government.
The LTTE is recognized for having carried out a number of high-profile
assassinations, including the assassination of Sri Lankan President Ranasinghe
Premadasa in 1993 and the former Indian Prime Minister Rajiv Gandhi in 1991.
The LTTE consisted of a highly developed military wing and a secondary political
wing. The military wing had a naval group, an airborne unit, an intelligence wing,
and even a specialized suicide terrorist unit. The group was also notorious for its
use of women and children in combat.
The LTTE was largely supported by the Tamil diaspora overseas; although in the
1980s, the LTTE received supplies and training from the Indian Intelligence
services. The LTTE was suspected of having links with a number of Islamist
groups, such as the Moro Islamic Liberation Front (MILF) in the Philippines and
the Taliban in Afghanistan; these links, however, were largely restricted to arms
transfers and other commercial activities. The LTTE also earned a portion of
their annual $200-300 million revenue from taxation and extortion in LTTE-
controlled areas in northern and eastern Sri Lanka.
The LTTE was disbanded in 2009 after their military defeat by the Sri Lankan
government and some 6,000 LTTE members were rehabilitated and re-
integrated into society. The Sri Lankan government stated in 2011 that the
international network of the LTTE was still searching to revive the organization.
The LTTE is organized hierarchically under the leadership of the group's founder,
Prabhakaran. The LTTE maintains army, navy, and air capabilities, but is most
well-known for its use of suicide operations by a small, special armed group
called the Black Tigers. The Black Tigers use traditional land and sea tactics, as
well as guerrilla warfare and targeted bombings and assassinations, particularly
in the northern and eastern areas of Sri Lanka. They are one of the first
organizations to utilize suicide attacks on a large scale. For example, former
Indian leader Rajeev Gandhi was assassinated in 1991 by a female suicide
bomber from the LTTE. According to Jane’s Intelligence Review, the LTTE carried
out 168 suicide attacks between 1980-2000
LTTE attacks targeted individuals and groups who did not support their
overarching goal of attaining an independent Tamil state, which included the
Sri Lankan military, Sri Lankan and Indian politicians, police, and sometimes
various civilian populations. The LTTE also targeted Sri Lankan Tamil
politicians who did not support the LTTE and their goals, as well as other rival
Tamil militant groups in Sri Lanka. Some of the group’s most controversial
suicide attacks include the assassinations of former Indian Prime Minister
Rajiv Gandhi, and former Sri Lankan President Ranasinghe Premadasa. The
majority of LTTE victims were Sinhalese Buddhists. The LTTE also attacked
symbols of national importance to the Sri Lankan state, such as the Sri Lankan
Central Bank and the country’s world trade center
One of the LTTE’s primary tactics was to create front organizations and
gangs to project its influence, procure funds from these overseas Sri
Lankan Tamil diaspora communities, and then use these funds to purchase
arms.
The LTTE also adopted guerilla tactics that were initially very effective
against the Sri Lankan government. LTTE forces would often ambush
government troops and attack in “waves,” meaning here that the LTTE
would first swarm the enemy and then engage in suicide bombings, which
would often confuse and scare Sri Lankan government forces.
It is important to note that terrorism and terrorist groups are not defining
elements, or characteristics of, fourth-generation warfare. Instead, many
cases of fourth-generation warfare in the modern era include terrorist groups
as insurgents. When considering the situation and dealings of fourth-
generation warfare, it is not limited to terrorist operations; issues of terrorism
have been at the forefront of the transition.
To properly deal with issues associated with fourth-generation warfare, and to
dominate the actual battle, significant costs that were not relevant in the past
have become pertinent in the present. Spending has included reinforcing cyber
security to protect vital infrastructure, diplomacy, foreign assistance, strategic
communications, and other instruments of national security. Successful
insurgents recognize the notion that the political or economic paralysis of a nation
can have broader-reaching effects than those of a more direct attack. For
example, security instability has a direct effect on the ability to receive loans to
help develop the nation. Even a threat could impact the financial health of a
nation, as evidenced by Muqtada al-Sadr’s militia in southern Iraq, which
specifically targeted oil production infrastructure.
This was also seen in Nigeria, with rebels threatening future attacks on the oil
industry to disrupt the nation’s oil output; the intent was to cripple the Nigerian
economy, thus placing the government in a compromised state. With the onset of
globalization, the potential effects of a simple attack could have devastating, far-
reaching consequences. A particular challenge, especially in regard to this body, is
that geographical sovereignty is not a contingent factor in fourth-generation
warfare. Therefore, it is incredibly difficult for world powers to establish control
over military situations and provide guidance and standards in their operations.
Although there has been an increase in activity from the United Nations, the
European Union, and the Organization of American States, these organizations
have very limited capabilities to effectively counter subnational extremist groups.
Furthermore, globalization has weakened the ability of states to act as fully
separate and sovereign entities. As the world has become increasingly
interconnected, many of these subnational groups have expanded to become
transnational groups. When the operations of counter-groups extend over
multiple borders, organizational attack strategies become much more difficult.
A different type of force is needed in the fourth generation. There needs to be less
of an emphasis on order and more of an emphasis on mobility. In order to have
flexibility to make quick, reactionary decisions, units should not be at the mercy of
decision-makers. A major issue for troops in nations like the United States is
resistance to changing strategies and tactics due to prior successes. Other groups
are less hampered by convention, allowing them to be innovative and speedy in
their battle tactics
The Vietnam War is one major example of a superpower like the United States
failing to fully adopt the innovative tactics of guerrilla warfare, and suffering
major political repercussions as a result. Having to adjust to the new military
tactics of their opponents, the US struggled to achieve clearly defined “wins” in
battle. Leaders in Vietnam reached out to popular groups within the US, such as
Vietnam Veterans Against the War and international charities, to try to spur a
shift in American public opinion. Vietnam also used the media and other
international networks to turn the Tet Offensive into a strategic move that
would ultimately force the United States to withdraw troops. Leaders in
Vietnam understood that political and public support could tip the balance of
the war in their favor.
Fourth-generation warfare has opened the door for dramatic shifts in political
thought and has contributed to interrupting the political balance in various
regions. Additionally, although many means of fourth-generation warfare are
supported or created by non-military technology, new techniques have still
resulted in numerous casualties. Due to the magnitude of these consequences,
fourth-generation warfare should be monitored and, potentially, regulated.
At the heart of the conflict was the desire of North Vietnam, which had
defeated the French colonial administration of Vietnam in 1954, to unify the
entire country under a single communist regime modelled after those of the
Soviet Union and China. The South Vietnamese government, on the other hand,
fought to preserve a Vietnam more closely aligned with the West. U.S. military
advisers, present in small numbers throughout the 1950s, were introduced on a
large scale beginning in 1961, and active combat units were introduced in 1965.
By 1969 more than 500,000 U.S. military personnel were stationed in Vietnam.
Meanwhile, the Soviet Union and China poured weapons, supplies, and advisers
into the North, which in turn provided support, political direction, and regular
combat troops for the campaign in the South.
The costs and casualties of the growing war proved too much for the United
States to bear, and U.S. combat units were withdrawn by 1973. In 1975 South
Vietnam fell to a full-scale invasion by the North.
Vietnam emerged from the war as a potent military power within Southeast Asia,
but its agriculture, business, and industry were disrupted, large parts of its
countryside were scarred by bombs and defoliation and laced with land mines,
and its cities and towns were heavily damaged. A mass exodus in 1975 of people
loyal to the South Vietnamese cause was followed by another wave in 1978 of
“boat people,” refugees fleeing the economic restructuring imposed by the
communist regime. Meanwhile, the United States, its military demoralized and its
civilian electorate deeply divided, began a process of coming to terms with
defeat in what had been its longest and most controversial war. The two
countries finally resumed formal diplomatic relations in 1995.
Engaged in a war that many viewed as having no way to win, U.S. leaders lost the
American public's support for the war. The Vietnam War is one major example of
a superpower like the United States failing to fully adapt the innovative tactics of
guerrilla warfare, and suffering major political repercussions as a result.
Having to adjust to the new military tactics of their opponents, the US struggled
to achieve clearly defined “wins” in battle. Leaders in Vietnam reached out to
popular groups within the US, such as Vietnam Veterans against the War and
international charities, to try to spur a shift in American public opinion. Vietnam
also used the media and other international networks to turn the Tet Offensive
into a strategic move that would ultimately force the United States to withdraw
troops. Leaders in Vietnam understood that political and public support could
tip the balance of the war in their favour
Impact on Disarmament Frameworks
Fourth Generation Warfare (4GW), characterized by blurred lines between
combatants and civilians, decentralization of force, and the use of asymmetric
and non-kinetic tactics, poses fundamental challenges to the architecture of
traditional disarmament frameworks. Treaties such as the Nuclear Non-
Proliferation Treaty (NPT), Chemical Weapons Convention (CWC), and
Conventional Arms Control regimes like the Conventional Armed Forces in
Europe (CFE) Treaty were negotiated with state actors in mind, assuming
hierarchical command structures, identifiable armed forces, and verifiable
stockpiles. In contrast, 4GW actors often operate as networked cells, lack
formal territorial control, and can exploit dual-use technologies such as
commercial drones, cyber tools, and 3D-printed components making them
difficult to detect and regulate under existing verification regimes.
4GW tactics exploit the “grey zone” of attribution: cyber sabotage of arms
verification systems, use of civilian infrastructure for weapons assembly, and
proxy warfare all allow actors to deny direct responsibility, undermining the
trust and transparency on which arms control depends. Without adapting these
frameworks to account for decentralization, anonymity, and technological
proliferation, the credibility of disarmament regimes risks erosion. Future
mechanisms may require hybrid legal models that bridge international
humanitarian law, counterterrorism frameworks, and arms control treaties,
ensuring accountability for all actors regardless of state status.
Relevant Legal Instruments
International Law
The body of law that is the International Humanitarian Law is commonly separated
into two branches: Geneva Law and Hague Law. The former regulates protection of
people that are affected by armed conflict, whereas the latter regulates means
and methods in warfare, such as the use of certain weapons and conduct of
hostilities.
Geneva Convention
Since Geneva Convention I, several treaties within the area of IHL have been
adopted. GC I was revised in 1906, 1929, and 1949, each time updated with a new
convention expanding the scope of IHL. Although now comprising four
conventions, the whole set is commonly referred to as “the Geneva Convention”.
GC I deals with the protection of the wounded and sick in armed forces in the field;
GC II sick and shipwrecked members of armed forces at sea; GC III prisoners of
war; and, as a response to the devastating effects of World War II (WW II), GC IV the
protection of civilians. The GC has been almost universally ratified, and is
considered to have passed into customary international law in its entirety. The
only practical implication of the rules having become customary is thus when a
new state has come into existence and is involved in an armed conflict without
having had the time to ratify the conventions.
Hague Law
The term Hague Law is commonly used as a generic name for treaties governing
means and methods of warfare. The core of the Hague Law is the Hague
Conventions (HC) of 1899 and 1907, which governs the conduct of hostilities on
land, at sea, and in air. The HC have in large parts been recognized as customary
international law, and most provisions are thus binding on all states. The cardinal
principles deriving from the HC are that (a) parties do not have an unlimited choice
of means and methods in armed conflicts, (b) the causing of superfluous and
unnecessary suffering is prohibited, and (c) the only legitimate object of war is to
overpower or weaken enemy forces in order to get in control of territory or to
enforce a political will, not to kill as many as possible.
Use of Irregular and Asymmetric WeaponrY
Irregular and asymmetric weaponry can be weapons, arms, tactics or any
kind of devices which are employed by non-traditional actors, or sometimes
in non-traditional ways by parties looking to offset/defeat rivals of far
higher military capabilities.
Irregular Weaponry:
Irregular weaponry can be defined as any arms or devices that deviate from
the stand and conventional weapons used for military purposes or state-
manufactured tools. These are often repurposed from civilian technology
and infrastructure to meet the special demands of irregular warfare. Some
examples can be homemade mortars, weaponization of commercial drones,
etc.
During the course of the Iraq war, many reports and first hand accounts
confirmed the usage of IEDs (Improvised Explosive Devices) by insurgents
which were explosive devices made with crude infrastructure and
craftsmanship from used artillery shells, fertilizers (for their nitrate
content) and cell phones antenna triggers.
These devices were cheap and easy to make and extremely hard to detect
as they passed for everyday objects. Their effects were devastating
physically and also psychologically.
To read more about IEDs:
https://www.dhs.gov/xlibrary/assets/prep_ied_fact_sheet.pdf
Rebel leaders credit the drones with reducing casualties among their fighters
while destabilising regime forces.
1. Espionage
2. Sabotage
3. Denial-of-Service attacks (DOS Attacks)
4. Electrical Power Grid Attacks
5. Propaganda Attacks
6. Economic Disruption
7. Surprise Attacks
CrowdStrike claims that the Russian organized cybercrime group Fancy Bear
targeted Ukrainian rocket forces and artillery between 2014 and 2016. The
malware was spread via an infected Android application used by the D-30
Howitzer artillery unit to manage targeting data.
Ukrainian officers made wide use of the app, which contained the X-Agent
spyware. This is considered to be a highly successful attack, resulting in the
destruction of over 80% of Ukraine’s D-30 Howitzers.
Electronic Warfare
Electronic Warfare (EW) refers to the strategic use of the electromagnetic
spectrum to gain an advantage over adversaries, either by attacking their
systems or defending against electronic threats. Unlike traditional forms of
warfare, EW operates invisibly, disrupting an enemy’s critical operations
without direct physical confrontation.
As modern military systems increasingly rely on electronic communications
and sensors, EW has become an essential element of contemporary military
strategy.
Weaponization of social media refers to the use of social media platforms such
as Facebook, Twitter, Instagram, WhatsApp, Telegram, YouTube etc to spread
propaganda, misinformation, disinformation, fake news, deep fakes, manipulate
public opinion, and influence political outcomes. Weaponization of social media
platforms is a growing concern because of its potential to undermine democratic
processes, erode trust in institutions, promote extremist ideologies and
exacerbate social and political polarization.
● Brexit Referendum: The 2016 Brexit referendum in the UK was also influenced
by social media manipulation. False information and propaganda were spread on
social media platforms such as Facebook, which allowed political advertising to
be targeted to specific demographics.
● Indian Elections: In recent years, social media has played a significant role in
Indian elections, with political parties using social media platforms to target
specific demographics with tailored messaging. False information and
propaganda have also been spread on social media platforms in an attempt to
influence public opinion.
Weaponization of social media can have serious consequences for democratic
processes, social cohesion, and human rights. Social media can be used to
manipulate public opinion and to promote extremist ideologies, and to take steps
to combat the spread of disinformation and hate speech. This includes efforts to
improve media literacy, strengthen democratic institutions, and promote civil
discourse. The weaponization of social media poses a significant threat to
individuals, society, politics, economics, national security, and global stability.
Disinformation Campaigns
The UAE discreetly dispatched hundreds of special mercenary forces to fight that
Houthis, backed by Iran, in Yemen. Many of these soldiers hailed from Latin
America, from countries such as El Salvador, Chile, Colombia and Panama. There
were battle hardened soldiers who were veterans of the drug wars and cartel wars
in Latin America and brought about a new frontier of tactics to the wars in the
middle east.
These soldiers were also much cheaper than American or British mercenaries.
Allegedly, African mercenaries are also fighting in Yemen for Saudi Arabia and
come from countries like Sudan, Chad, and Eritrea. Private force has proved a
useful option for wealthy Arab nations, particularly Saudi Arabia, Qatar, and the
Emirates, that want to wage war but do not have an aggressive military. Their
mercenaries have fought in Yemen, Syria, and Libya in recent years.
Turning profit motive into a war strategy, Syria rewards mercenaries who seize
territory from terrorists with oil and mining rights. At least two Russian
companies have received contracts under this policy: Evro Polis and
Stroytransgaz. These oil and mining firms then hired mercenaries to do the dirty
work. For example, Evro Polis employed the Wagner Group to capture oil fields
from the so-called Islamic State (IS) in central Syria, which it did. Reports show
there are about 2,500 Russia-bought mercenaries in Syria. Russia also uses
them in Ukraine, and the Ukrainians fight back with their own mercenaries. The
war is awash in Russian, Chechen, French, Spanish, Swedish, and Serbian
mercenaries, fighting for both sides in eastern Ukraine’s bloody conflict.
Mercenaries were a constant in the Ukraine conflict. Companies like the Wagner
Group conducted a wide range of secret missions, all denied by the Russian
government. Ukrainian oligarchs hired mercenaries, too, but not for the
country’s sake. Billionaire Igor Kolomoisky employed private warriors to capture
the headquarters of oil company UkrTransNafta in order to protect his financial
assets.
Nigeria secretly hired mercenaries to solve a big problem: Boko Haram. This
Islamic terrorist group fights to carve out a caliphate in Nigeria, and the
Nigerian army fights back, its methods no better. There is a saying in Africa:
When elephants fight, the grass gets trampled. Tens of thousands of people
were killed, and 2.3 million more were displaced from their homes. Boko Haram
abducted 276 schoolgirls for “wives,” many of whom were never seen again.
International outrage was swift but impotent.
There are mercenaries on the sea as well, similar to privateers 2 centuries ago.
International shipping lines hire them to protect their ships traveling through
pirate waters in the Gulf of Aden, Strait of Malacca, and Gulf of Guinea. Here’s
how it works. Armed contractors sit on “arsenal ships” in pirate waters and
chopper to a client freighter or tanker when called. Once aboard, they act as
“embarked security,” hardening the ship with razor wire and protecting it with
high-caliber firepower.
After the ship passes through pirate waters, the team returns to its arsenal
ship and awaits the next client. The industry is based in London, and seeks
legitimacy through ISO 28007 certification.5 Some would like to see true
privateers: private naval vessels that could hunt and kill pirates. Americans
will be pleased to know that Congress is authorized to hire privateers under
Article 1, Section 8, of the U.S. Constitution, and this could prove more
efficient than sending Arleigh Burke–class destroyers after pirate zodiacs.
Private force is manifesting everywhere. After 150 years underground, the
market for force is returning in just a few decades and is growing at an
alarming rate. In military strategy, there are five domains of war: land, sea,
air, space, and cyber. In less than 20 years, private force has proliferated
among every domain except space, but that too may change. Space is
already privatized with companies like SpaceX, and it is possible that private
armed satellites may one day orbit the Earth. Worse things are to come. In
just 10 years, the market for force has moved beyond Blackwater in Iraq and
become more lethal. Mercenaries are appearing everywhere, and no longer
just in the fringe. Contract warfare has become a new way of warfare,
resurrected by the United States and imitated by others. The rise of
mercenaries is producing a new kind of threat—private war—that threatens
chaos. It is literally the marketization of war, where military force is bought
and sold like any other commodity. It is an ancient form of armed conflict
that modern militaries have forgotten how to fight. Should this trend
develop, the super-rich could become superpowers, leading to wars without
states. In such a world, states would be mere prizes to be won rather than
agents of their own destiny. This has the potential to upend international
relations as we know it
Instruments such as the Firearms Protocol, Arms Trade Treaty, and the
Convention on Prohibitions or Restrictions on the Use of Certain Conventional
Weapons do not recognize the possibility of PMSCs engaging in weapons
transfers. Similarly, the Montreux Document ‘best practices’ and the ICoCA ‘Code
of Conduct’ – neither of which are legally binding instruments – place the
responsibility of arms acquisition and transfer on contracting, home and
territorial states.
In other words, autonomous weapons systems can determine who is a threat, and
whether or not coercive action should be taken against that threat. Both
intelligence and independence are important in determining the level of
autonomy, although it can be argued that independence is the defining factor. A
machine may be programmed to fulfill complex tasks and consider a plethora of
variables, but without independence to act, it cannot execute its programming.
Challenges Posed by Lethal Autonomous Weapons
Lethal Autonomous Weapons Systems pose profound challenges that
demand consideration and decisive action from the global community. One
of the most pressing concerns is the potential for LAWS to operate without
human control, raising ethical questions about accountability and the
ability to adhere to international humanitarian law. Allowing machines to
make life-or-death decisions on the battlefield without human oversight
raises profound moral dilemmas and uncertainties about the
consequences of delegating such critical decisions to autonomous
systems.
The absence of clear legal frameworks and regulations governing the use of
LAWS further complicates the issue. While international humanitarian law
provides guidelines for the conduct of armed conflict, it may not
adequately address the unique challenges posed by autonomous weapons.
There is a crucial need for new international agreements and mechanisms
to ensure that LAWS are developed, deployed, and used in a manner that
complies with international law and ethical standards.
Moreover, there are deep concerns about the impact of LAWS on human
dignity and the principles of humanity. The development and deployment
of LAWS raise fundamental questions about the role of humans in warfare
and the ethical implications of delegating lethal decision-making to
machines. There is a genuine fear that LAWS could be used to target
civilians or engage in disproportionate attacks, leading to egregious
violations of international humanitarian law and an erosion of the
principles of humanity that underpin the laws of war.
Weaponization of Artificial Intelligence
Advanced algorithms can process vast amounts of data from sources like
satellite imagery, social media, and communication networks to identify
potential threats and monitor adversaries. AI-powered surveillance systems can
track movements, recognize faces, and analyse behaviour patterns, providing
military and intelligence agencies with valuable insights. While this can help
prevent terrorist attacks and improve national security, it also poses privacy
concerns and the potential for misuse by authoritarian regimes to control
populations.
AI systems can perpetuate and amplify biases present in training data, leading to
unfair outcomes in areas like targeting and threat assessment. The extensive
data collection required for AI systems raises privacy concerns, and as AI
systems become more autonomous, questions about human control and
decision-making become more pressing.
The rapid advancement of AI in weaponization requires careful management to
balance innovation with ethical considerations, ensuring that AI development
benefits humanity while addressing its potential risks and challenges. In the realm
of international security, AI offers both strategic advantages and potential risks,
making it crucial for global security organisations to establish proper frameworks
for its development and use.
Three specific challenges in contemporary IHL can be lined out: the fact that most
armed conflicts today are non-international in character whereas most rules
pertaining to armed conflict governs international armed conflicts means that
regulation becomes unclear due to diverse interpretation. Further, when non-
state adversaries use means and methods not in line with IHL, it leads to a
downward reciprocal spiral where reprisals become an unwelcomed element of
warfare. Lastly, when warfare is taking place in urban environments rather than on
traditional battlefields, the risk is apparent that innocents will be affected by
hostilities, as those who participate in the conflict blend in with the civilian
population and use civilian objects as a cover for operations.
It is today perhaps more important than ever that IHL serves as protection in
armed conflicts. We see insurgencies and terrorist attacks getting more and more
common, leading to devastating effects for those affected. New instruments
governing these types of conflicts in more detail would certainly be helpful, but
since it is a very long way to go before such instruments would see daylight, it
would be a helpful first step if states could start agreeing upon fundamental
definitions and unite against the increased violence directed towards innocent
civilians.
Conclusion
Although “terrorism,” that is, seemingly gratuitous violence against civilians and
noncombatants, is a common technique for 4GW groups, it is only that, one
technique. We must stay focused on much larger objectives: Who is attacking us?
Why? Who supports them? Why? How do we want the issues finally solved? The key
point being that to win against “terrorism,” we need to reduce its effects to the
point where we can concentrate on the larger goal of winning a fourth-generation
war.
As the lines between conventional and unconventional combat blur under the
influence of Fourth Generation Warfare (4GW), existing disarmament frameworks
face unprecedented stress. The diffusion of battlefield power to non-state actors,
the integration of cyber warfare, autonomous systems, and hybrid strategies, and
the exploitation of legal and normative grey zones challenge traditional arms
control and verification mechanisms. The delegates must focus on identifying gaps
where current treaties, norms, and verification regimes fail to address 4GW
dynamics, particularly the use of proxy forces, weaponized information, and dual-
use technologies. They should prioritize discussions on the adaptation of existing
frameworks such as the NPT, BTWC, CCW, and cyber-related norms to account for
these evolving threats, while also exploring cooperative measures amongst the
entire world.
QUESTIONS A RESOLUTION MUST ANSWER (QARMA)
2. What mechanisms can be introduced to address the use of proxy forces and
non-state actors in ways that undermine disarmament obligations?
8. Should small, portable, and improvised weapons such as drones, IEDs and
loitering munitions be incorporated into arms control monitoring frameworks?