curious #5

20
CURIOUS URIOS MAGAZINE Liberated by the dark web. An article on HiddenWiki and its doors into the hidden world of the internet. Interview with Paul Duchaine: professor of military law of cyber security and cyber operations 10 things you need to know about Anonymous URIOS.ORG VOL. 1 ISSUE NR. 5 The Modern Mafia

Upload: urios-magazine

Post on 31-Jul-2016

228 views

Category:

Documents


1 download

DESCRIPTION

Urios Magazine Volume 1 Issue 5 May/June 2016

TRANSCRIPT

Page 1: Curious #5

CURIOUSURIOS MAGAZINE

Liberated by the dark web. An article on HiddenWiki

and its doors into the hidden world of the internet.

Interview with Paul Duchaine: professor

of military law of cyber security and cyber operations

10 things you need to know about Anonymous

URIOS.ORG VOL. 1 ISSUE NR. 5

The Modern Mafia

Page 2: Curious #5

...................................................

Page 3: Curious #5

URIOS MAGAZINE

CONTENTS ...................................................

Preface 5

Liberated by the Dark Web 6

Study Trip: Israel and Palestina 8

Interview Paul Ducheine 12

5 facts about Anonymous 14

Report: PIMUN 16

Symposium: Russia vs. The West 18

Member’s Page 19

The cover picture shows the phenomenon of ‘Phish-ing’. “Phishing is a kind of social engineering attack in which criminals use spoofed emails to trick people into sharing sensitive information or installing malware on their computers. Victims perceive these emails as as-sociated with a trusted brand, while in reality they are the work of con artists. Rather than directly targeting the systems people use, phishing attacks target the people using those systems.”1 An example of cyber crime, which is the central theme to this issue of Cu-rious. Forbes magazine calls cyber crime the “Mod-ern-Day Mafia”.2

1 J. Hong, “The State of Phishing Attacks,” Communications of the ACM, vol. 55, no. 1, pp. 74–81, 2012.2 Tony Bradley, “Cybercrime is the Modern-Day Mafia”, Forbes Magazine, October 16, 2015.

Page 4: Curious #5

....................................................

Page 5: Curious #5

....................................................

URIOS MAGAZINEPAGE 5 PREFACE

PREFACE

ROOS BOSEditor-in-Chief

Dear readers,

Ten years ago you would go to a thrift store nearby, when you were interested in buying a cheap new stereo installation or you were in need of a new kitchen cabinet. When Internet made its debut on almost every computer in the world, a drive to a musty remote store was not necessary any more. With just one click of the mouse you can nowadays enter an enormous digital warehouse called Ebay, where you can sell and buy products and services. But which URL do you type in your browser if you are longing to buy an AK-47 or if you’d like something more delicate like a pocket pistol?

The answer is: Download a tor browser and enter the depths of the dark net.The upswing of anonymous untraceable Internet behaviour can give a voice to the voiceless, because this kind of Internet use, veils all physical appearances of inequal-ities and power relations. On the other hand, the Darknet also creates millions of ob-

scure alleyways in which the most notorious criminals can disappear in the shadows.The Dutch police recently sounded the alarm bells about the lack of control over cyber criminals, and a new bill was submitted that would allow for more police powers in the area of online criminality. It seems that even the EU feels hounded by modern cyber criminals, since the European parliament recently approved new powers for Europol in

their fight against electronic offences.

Besides the use of modern technology by individuals on their criminal career paths, governments have also integrated the use of cyber strategies in several policy plans. Governments are interested in comprehending and influencing global social rela-tionships and because individuals nowadays interact on a different level than before, surveillance too has a new global and technological dimension. Having access to in-formation about people in a foreign jurisdiction gives a state influence. Reaching or retaining a strong position in international cyber surveillance, is beneficiary for secur-ing economy, territory and culture. This month the Pentagon revealed some of her concerns about China’s cyber warfare capacities. Also in Europe we have been treated with screaming headlines about cyber warfare. Germany’s intelligence service accused Russia of attacking the German parliament, NATO members and the French TV, with

modern cyber undertakings.

In this issue we discuss one of the most current ways of committing crimes, practicing politics, and fully exercising your right to privacy. When you finish reading the fifth issue

of Curious you’ll know a lot more about the new vaguely defined area of cybercrime.

Page 6: Curious #5

It is no secret anymore that nowadays we are able to make a full profile of a person, by analysing their online behaviour. We’re leaving data all over the place. It makes the internet more accessible and more user-friendly, but it also makes you more vulnerable. Like the case of a 13-year old boy, getting arrested for making a joke about possessing a gun on twitter. Or people that are being watched closely, because of using the words ‘bombing’ or ‘terror-ists’ in their conversations on WhatsApp. Do we even dare to google ‘how to make a bomb?’ without being afraid of the intelligence services crushing in?

URIOS MAGAZINEPAGE 6 ARTICLE

Yet, despite the fact that internet is mak-ing us less anonymous, we can’t imagine a world without it. The internet feels like the universe; we can’t make up our minds about where it starts and where it ends. But there is a black hole. There is a dark-er side of the internet. Internet where you can’t get access to, using your regular Firefox browser. To get to the dark web, you have to dig deeper. And no, using ‘in-cognito mode’ on Chrome is not enough.

The Hiddenwiki holds the key to this se-cret part of the internet. Yes, it is the kind of Wikipedia where well known whis-tleblower Edward Snowden posted his

findings. Places like HiddenWiki contain lists of dark sites. You can get to this place by using your regular browser, but you are not able to click on the links. In order to really get to the dark sites, you have to download the Tor browser, which is, sur-prisingly, legal. What Tor basically does, is sending your data to servers all over the world, so it is not traceable to your own computer. You might as well be surfing from Japan or somewhere in Guatamala. The URL’s of these dark sites all end with .onion, since Tor is based on the principle of layering, like onions themselves. Within a few steps you can get access to this sin-ister place that is called the dark web.

Liberated by the DARK WEB

By Alina Chakh

Page 7: Curious #5

By using special search engines, like DuckDuckGo, you can get to sites that are not indexable by the conventional search engines. These sites don’t have common URL’s, but contain numbers and letters, mixed together.

On the dark web, you can find virtual mar-ketplaces, where you can buy anything. We’re talking about Spotify accounts for two dollars, software, medicine and drugs, but you can even hire a hacker. If you want to hack someone’s Facebook account, just hire a hacker for 100 dollars. But it doesn’t stop there. You can also buy weapons and complete US identities, with social secu-rity numbers, a new birthday and creden-tials. Hiring a hitman costs around 600 dollars. The payment goes through the Bitcoin system, which makes your trans-actions untraceable.

This dark web is used by whistleblow-ers, journalists and special agents, and even by people in China, since many sites are censored by Chinese authorities. But more often, the dark web is used for ille-gal purposes and terrible things, like child pornography. Or hiring a hitman to assas-sinate someone. But none of above where in the original purpose of the creator of the very first dark marketplace, called ‘Silk Road’. Ross Ulbricht, a bright student from the metropolitan area in Austin, Texas, is now serving a life sentence without the possibility of parole. Ulbricht created Silk Road to evade law enforcement. It is even said so that he made possible statements about creating this illegal website on his Linkedin profile.

Ulbricht began to grow hallucinogenic mushrooms and sell them on the internet almost a decade ago. He didn’t see himself as a Mafioso or cybercriminal, but he was driven by libertarian thoughts. He declared his intention to build an economic simula-tion, and create an economic theory, as a means to abolish the use of coercion and aggression against mankind. He wanted to show to people what it would feel like to live in a world without the ‘systemic use of force’. The libertarian hope to create one day an entirely free market system. They also want to contribute to a drug-war free world. Since the drugs are being sold and shipped anonymously, drugdeal-ers won’t be able to put up fights on the

streets. People weren’t encouraged to buy drugs, but to do it in the safest way. On the Silk Road forums, there were discussions about philosophy, the free market system and restraining from the government of the United States. Dread Pirate Roberts was their preacher. They were develop-ing a world, a secret, hidden world, where law enforcement couldn’t get access to. A place where you could call yourself safe.

But, Ulbricht got caught and arrested. US law enforcement was spying on Silk Road, and one agent in particular, became close to DPR. DPR got threatened by one of the users of Silk Road, threatening that he would expose all the information he got on the moderators. DPR was alleged to hire a hitman to assassinate the traitor. And that is the moment that Ulbricht was caught. The problem with the dark web is, is that law enforcement can work in the dark as well. As said before, in the dark web, there are no rules and no legislation. Does that count for the law enforcement as well?

The libertarian view didn’t die with the prosecution of Ulbricht. Many more virtual marketplaces came up, and a war began between law enforcement and authori-ties against the cybercriminals/libertarian thinkers. The cybercriminals will always find a way to hack the system and come up with a new, encrypted marketplace.

Despite the fact that the dark web is used for horrible things, the people behind it leave us thinking. Have we just agreed with the fact that our lives aren’t private anymore? The technologies advance much more fast than our laws do. There are, not yet, very strict rules upon spying. Those people, who are spending their days encrypting and decoding, have a vision, a goal to achieve. They want to set us free. And maybe, that isn’t a bad thing after all.

PAGE 7 URIOS MAGAZINE ARTICLE

Page 8: Curious #5

URIOS MAGAZINEPAGE 8 REPORT

Urios Study Trip

Israel and Palestina

April 26th to May 4th

On 26 April, we, a group of 22 very excited stu-dents, travelled to Israel. We had no idea we were about to embark on an amazing adventure. We had a bit of a rocky start – one flight was can-celled –, but we arrived safely in Tel Aviv-Yafo late at night. The next few days, we visited, among other things, a private university and the law firm Herzog, Fox & Neeman. We also went on a tour in the beautiful neighbourhood of Yafo. Luckily, we had enough spare time to explore everything Tel Aviv has to offer, such as the beach, good food, and a great nightlife.

Before we knew it, it was time to go to Jerusalem. Jerusalem is a very interesting and beautiful city. We were in Israel during Passover (Jewish Easter), which made it even more impressive. We visited the Parliament and the Supreme Court. The Yad Vashem Holocaust Remembrance Centre was very impressive. We also visited a NGO that helps Palestinian people with legal issues. We realised that the situation of Palestinians is even more complicated than we thought.

PAGE 8 REPORT

By Carlijn Spijkers

Page 9: Curious #5

REPORTPAGE 9

Although it was rather peaceful in Isra-el, the conflict between the Israeli and the Palestinians is visible. We were lucky enough to meet many locals, and we have noticed that all they want is to live in peace. Israel is a very complicated coun-try. Most of us were able to go on a tour to the Palestinian territories. It felt surreal to see the Wall with our own eyes instead of on TV. Some of us visited a refugee camp near Bethlehem. Hundreds of people share a space that is not bigger than 1 km². As families expand, so do their houses by adding new floors on top. The streets are narrow and there is no grass on which chil-dren can play. Almost all Palestinians that live there are educated, but their future is uncertain because they cannot move out of the camp. This tour really made us real-ise how lucky we are to live in the Nether-lands. In Bethlehem, our tour guide told us that, due to the many attacks, there had not been big groups of tourists for over a decade. This is very sad considering most of the people living there depend on tour-ism as their main source of income. Beth-

lehem is also the birthplace of Jesus, so of course we visited the church that was built where Jesus was born.

Walking through the old city of Jerusalem felt like going back in time. It is called the Holy City for a reason. Many religions are represented in this city. One of the most important Mosques in the world is locat-ed right next to the Western Wall. The Via Dolorosa (which is the last walk Jesus sup-posedly walked before he got crucified) and the Church of the Holy Sepulchre are very impressive.

As if all of this was not adventurous enough, most of us went to the Dead Sea as well. We floated happily and scrubbed our bod-ies with the famous Dead Sea Mud.

All in all, we learned a lot about the situa-tion of the country, met the most friend-ly locals ever, learned about international law in Israel, and we explored the country as well. The Urios trip to Israel is one we will never forget.

Page 10: Curious #5

URIOS MAGAZINEPAGE 8 REPORTPAGE 8 REPORTURIOS MAGAZINEPAGE 22 ARTICLEURIOS MAGAZINEPAGE 23 ARTICLE

Page 11: Curious #5

REPORTPAGE 9

Extended deadline until June 5th!

Page 12: Curious #5

URIOS MAGAZINEPAGE 12 INTERVIEW

Talking with Paul Ducheine

Curious had the chance to interview profes-sor Paul Ducheine, an expert on military law of cyber security and cyber operations, he had some very interesting insights and findings on

this relatively new field of law!

Hi Paul Ducheine, it’s great to have the chance to interview you. To start off, can you tell us a little bit about yourself, how did you end up in your line of work?

When I finished high school, I didn’t go to university like you did, I went to the military academy. After ten years I went to work for the military legal services and got my law de-gree in Utrecht. In 2003 I finished my PHD, my research was focused on the legal framework in the fight against terrorism. I answered the dual question: When should we de-ploy armed forces and how should we deploy them? When in 2011 it be-came clear that defence was going to enter the world of cyber warfare, information had to be gathered and research teams were set up. The same question that I had answered in my PHD had to be answered in the context of cyber warfare, so this how I got involved in this field of work.

In 2011 cyber security became an important item on the political agenda, what triggered this focus?

Formally a resolution of Raymond Knops in the parliament. The reso-lution was very broad but its main focus was on rethinking security issues in the digital domain. In the meanwhile, the Dutch defence team and the commander of the armed forces especially, already thought about future scenarios in the con-text of strategic reconnaissance. In 2011, nine years after 9/11 the phys-ical manifestations of the war on terror decreased, troops were with-drawn from Iraq and Afghanistan, but the Snowden files revealed that governmental actions surrounding cyber security increased immensely.

Which country is the cyber security hegemony and what position does the Netherlands hold on the world-wide stage?

The United states definitely holds the strongest position; they are ap-proximately 5 to 8 years ahead of the competition. There are a few competitors, Israel for example de-veloped various ICT services and cyber infrastructures that can be used for military operations. China

also has a lot of know-how on cyber services, the US and China recently agreed on ceasing all economic spy-ing activities.

The Dutch position in the cyber do-main has been on the frontline, es-pecially when cyber security was still in its children shoes, the Neth-erlands developed quite quickly. Countries from all over the world, often look at the Netherlands to see how we did that back then.

One of your expertise is cyber war-fare, what does this entail?

Everything that we use in our daily lives in the digital domain, can be used in cyber warfare. Your fantasy is the limit of what you can employ as a cyber “weapon”. The most im-portant question you should ask is: Is it effective and legitimate? Not to be forgotten, you must be in an armed conflict, otherwise law of war does not apply. I’ll give you some ex-amples of the use of digital instru-ments in a current conflict. In the fight against ISIS, twitter accountswere hacked, communication dis-

BY ROOS BOS

Page 13: Curious #5

URIOS MAGAZINEPAGE 13 INTERVIEW

rupted and files manipulated.

When is the intensity of cyber vi-olence enough to cause an armed conflict?

There are two types of situations in which cyber-attacks are used. First a “normal” physical armed conflict, in which one of the weapons used is cyber related. For example, in the war with Syria and Iraq, parties publicly declared to have used dig-ital weapons. The second situation arises when there are only digital weapons used and no other forms of physical means are deployed. In theory the use of digital combat methods can activate law of war. In order to do so, there must be a min-imum of two armed combating par-ties and the level of violence must be of a certain intensity. These kinds of situations haven’t arisen yet, but will without a doubt in the future exist. I can give you some examples of situations in which the “intensi-ty” will probably activate law of war. There are known tests of generators exploding due to digital activities, we know that uranium processes can be disrupted by digital attacks and when you use your imagination you can think of situation in which the direct consequences of the use cyber weapons can cause deaths. The more connections we built be-tween human beings and software and the more we are dependent on that software, the more vulnerable we will be.

What are the biggest problems and pitfalls in the field of cyber warfare?

There are a few important questions that have to be answered. The first is what is the effect of the cyber weapons and how far do these ef-fects extend. The question whether, for example, the communication of ISIS is a military target is a “normal” physical question. It gets hard when the effect of the attack does not translate in material damage, but stay virtual. The biggest question that has to be answered is whether we should keep using the analogy of the physical situation in cases where a new digital situation arises, or we should use a fundamentally differ-

ent approach.

People often say that legislation about cybersecurity is outdated, what is your opinion on that state-ment?

First it is important to note that there are all kinds of security issues in the digital domain, but it is crucial to see the differences. There is a different framework for every subdomain, for example there is a framework for cyber criminality, and cyber warfare or countering cyber spying. These frameworks are shaped by legal, executive and organizationally par-adigms. A legal paradigm is only in-complete when it doesn’t meet your requirements. I find it immoral to ask security from the legislator and at the same time not willing to give up some privileges, either rights or paying more tax money. I hammer on a balance between security and privacy, I am happy that I am not the legislator it is a very difficult and complex job.

Do you have any insights on future legislation surrounding cyber secu-rity?

Two new bills have been submitted to the second chamber, one is about intelligence and the other about criminal law. There are some major criticisms on both bills. The previous act on intelligence and security ser-vices is from 2002, but was drafted 10 years before. In this era phones were still attached by wires so the act was already outdated when it was enacted. There are two types of connections, phone connections and connections via radio signals. Nowadays 99,9% of all communi-cation goes through fiberglass, the legislator did not anticipate on this development and the act does not arrange anything about intelligence on communication via fiberglass. The current situation is like checking car speeding on sand roads instead of the highway.

The other bill submitted to the sec-ond chamber made it possible to force suspects to give up their en-cryptions for, for example, their computers like in the Robert M.

case. This might be against your privilege against self-incrimination. There are plenty of exciting legal developments in this field, definitely interesting to keep your eye on!

Paul Ducheine was born in 1965 and graduated in Political Science / Pub-lic Administration (VU University Amsterdam) and Law (Utrecht Uni-versity). He is extraordinary profes-sor in Cyber Operations and Military (Operational) law. Ducheine is guest lecturer International Humanitarian Law at the University of Amsterdam, the University of Groningen and Maastricht University. Furthermore, Ducheine is (guest) lecturer Military & Constitutional Law and senior re-searcher (Amsterdam Centre of In-ternational Law) at the University of Amsterdam. He also is professor of Cyber Warfare at the Faculty of Mil-irary Sciences of the Dutch Defense Academy. Together with Eric Pouw he gives lectures about Targeted Killing, Targeting and Targeting in Counterinsurgencies ( T.M.C. Asser Institute, in cooperation with the In-ternational Centre for Counter- Ter-rorism, Summer School Programme Countering Terriorism in the Post 9/11 World).

Source: http://www.uva.nl/over-de-uva/organisatie/medewerkers/content/d/u/p.a.l.ducheine/p.a.l.ducheine.html

Page 14: Curious #5

URIOS MAGAZINEPAGE 18 10 THINGS LIST

5 things you didn’t know about

1.They birthed out of an in-nocent online board

4chan is the most popular British board, dedicated to Japanese culture and such. It’s actually mostly used for sharing pictures and commenting on them; many memes have actually originated from this board. On 4chan, everyone is anonymous, it is not even possible to use a name. These are great circumstances for hackers, since no one will find out who they are. Originating from this board, the group of ‘hacktivists’ came to life around 2003.

2.There’s a story behind their mask

Anonymous is easily recognized be-cause of the use of the Guy Fawkes mask. Guy Fawkes was a famous Brit-ish activist in the 17th century, and the mask now stands for activism and protest in general. It was originally used in the movie V for Vendetta, but became part of the Anonymous iden-tity during the Scientology Church protests in 2008. Fun fact: Time War-ner, who produced the V for Vendetta movie, still has the rights to the mask and earns money every time someone buys the Guy Fawkes mask online.as the National Gazette which was open-ly against Washington’s administration. Nevertheless, on the principle of free-dom of speech it was allowed and even encouraged to stand.

By Judith Bel

ANONYMOUS

URIOS MAGAZINEPAGE 14 10 THINGS LIST

5 things you didn’t know about

1.They birthed out of an in-nocent online board

4chan is the most popular British board, dedicated to Japanese culture and such. It’s actually mostly used for sharing pictures and commenting on them; many memes have actually originated from this board. On 4chan, everyone is anonymous, it is not even possible to use a name. These are great circumstances for hackers, since no one will find out who they are. Origi-nating from this board, the group of ‘hacktivists’ came to life around 2003.

2.There’s a story behind their mask

Anonymous is easily recognized be-cause of the use of the Guy Fawkes mask. Guy Fawkes was a famous Brit-ish activist in the 17th century, and the mask now stands for activism and pro-test in general. It was originally used in the movie V for Vendetta, but became part of the Anonymous identity during the Scientology Church protests in 2008. Fun fact: Time Warner, who pro-duced the V for Vendetta movie, still has the rights to the mask and earns mon-ey every time someone buys the Guy Fawkes mask online.as the National Ga-zette which was openly against Wash-ington’s administration. Nevertheless, on the principle of freedom of speech it was allowed and even encouraged to stand.

By Judith Bel

ANONYMOUSMore than 10 years after they first arose, hacker group Anonymous still doesn’t sleep. Last October, after the Paris attacks, they declared war with ISIS. The be-ginning the of this month, they announced to attack several banks around the world to fight the “global financial system”. Anonymous is famous for their vid-eos and masks, yet there still is a lot of mysterie around the group. Hopefully, these 5 facts will give you a little bit more insight in the world of these hackers.

“We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.”

Page 15: Curious #5

URIOS MAGAZINEPAGE 19 10 THINGS LIST

3.Anyone can be a member

The members of Anonymous are literally anonymous, even for other members. If you want to be a member, all you really have to do is proclaim yourself as one. Thus, Anonymous cannot be seen as a structured group that exists of certain members with specific functions; several Anonymous attacks could even be done by completely different people around the world who have no real life connection at all.

4.They have connections with WikiLeaks?

It is often said that some mem-bers of Anonymous have close bonds with the people behind WikiLeaks. We can never be sure of this, but we know that in 2010 Anonymous has chosen the side of WikiLeaks when they were on great pressure to stop publishing secret diplomatic documents of the United States. Several web-sites, like PayPal and Amazon

then didn’t support any money transfers to WikiLeaks anymore. Anonymous took great efforts to block the actions of these web-sites

5.Their philosophy may differ from time to timeThere have been many attacks since the start of Anonymous. After the Paris attacks many of jihadists Twitter accounts were hacked, and in another event even some address details of ji-hadists were published online. In the Netherlands, they hacked the website of pedophile association MARTIJN after a law suit on sexu-al offenses. Yet, hacking does not always happen is such a setting against such an ‘evil’. Even gov-ernments and many companies have experienced trouble be-cause of Anonymous. The hacker group sometimes proclaims that there philosophy is about ‘free-dom of expession’, for example when they hacked WikiLeaks. Yet this is not always applicable. In that sense, anonymous stays mysterious and unpredictable.

URIOS MAGAZINEPAGE 15 10 THINGS LIST

3.Anyone can be a member

The members of Anonymous are literal-ly anonymous, even for other members. If you want to be a member, all you re-ally have to do is proclaim yourself as one. Thus, Anonymous cannot be seen as a structured group that exists of cer-tain members with specific functions; several Anonymous attacks could even be done by completely different people around the world who have no real life connection at all.

4.They have connections with WikiLeaks?

It is often said that some members of Anonymous have close bonds with the people behind WikiLeaks. We can nev-er be sure of this, but we know that in 2010 Anonymous has chosen the side of WikiLeaks when they were on great pressure to stop publishing secret diplomatic documents of the United States. Several websites, like PayPal and Amazon then didn’t support any money transfers to WikiLeaks anymore. Anony-mous took great efforts to block the ac-tions of these websites

5.Their philosophy may differ from time to time

There have been many attacks since the start of Anonymous. After the Paris at-tacks many of jihadists Twitter accounts were hacked, and in another event even some address details of jihadists were published online. In the Netherlands, they hacked the website of pedophile association MARTIJN after a law suit on sexual offenses. Yet, hacking does not always happen is such a setting against such an ‘evil’. Even governments and many companies have experienced trouble because of Anonymous. The hacker group sometimes proclaims that there philosophy is about ‘freedom of expession’, for example when they hacked WikiLeaks. Yet this is not always applicable. In that sense, anonymous stays mysterious and unpredictable.

Page 16: Curious #5

URIOS MAGAZINEPAGE 22 ARTICLE

Page 17: Curious #5

URIOS MAGAZINEPAGE 17 ARTICLE

THE URIOS DELEGATION AT

PIMUN 2016By Vidette Adjorlolo

On the 24th of May ten us from the URIOS MUN delegation set forth on a journey to Par-is, the city of light, to participate in the Model United Nations simulation, many of us being first and second time participants in this con-ference. Despite having to endure a six-hour coach ride to Paris we were all bubbling with pure joy and excitement not aware of what to expect.

We arrived in Paris at 6am, had the chance to have some breakfast and walk around the beautiful city for a while. It was soon time to attend the Welcoming Ceremony, which was hosted in the OECD institute. We were greet-ed with amazing speeches where we were told quite rightly that ‘agreements make headlines but implementation changes lives’. With this speech in mind, free wine, maca-roons and finger food we prepared ourselves mentally for four unforgettable days of de-bating.

On Tuesday we were all up by 8:00am, suit-ed and booted, ready to pass a useful draft resolution. In the presence of nerves and eu-phoria, we each set off to our committees where we participated in 8 hours of intense debating (and shouting), arguing with other member states in order for our point of view to be heard. Occasionally each of us would be

visited by two familiar faces in our delegation who were part of the UN news and as such bestowed with the mandate of documenting our intellectual screams.

The following days proceeded in a similar fashion, except with each day our delegates got closer to the different individuals they met and better with each speech they made. With every passing day we all had something to share. If it was not Maxime telling us about how she had started war with North Korea, it was probably Alina ranting about how upset she was that the big 5 were consistently ve-toing her resolution.

The various socials we had also created an av-enue for us to meet with delegates from dif-ferent places. Through this we were all able to build deep friendships by merely clicking ‘accept’ on Facebook. The morning after our last social, there was consensus that we had just experienced one of the best nights as a delegation.

The cherry on top of our trip was when four of our delegates received certificates for their excellent performance in their committees. We could not have asked for a better experi-ence, new friendships and new perspectives on life were gained.

Page 18: Curious #5

URIOS MAGAZINEPAGE 24 MEMBER’S PAGEURIOS MAGAZINEPAGE 24 MEMBER’S PAGE

SYMPOSIUM: RUSSA VS THE WEST

Page 19: Curious #5

URIOS MAGAZINEPAGE 19 FEATURED IN CURIOUS

FEATURED IN CURIOUS: OLAF VAN DEN DOOLMy name is Olaf van den Dool and I am a sixth-year Law student at Utrecht University. After doing my bachelor from 2010 to 2013, I start-ed my master Private Law and finished my thesis that same academic year. From September 2014 to August 2015, I did a legal internship at CMS Derks Star Busmann, after which I travelled to Colombia. In Sep-tember 2015 I started the master Public International Law, which I am due to finish at the end of this August. Afterwards, I will attempt to get a job at the Ministry of Foreign Affairs or some other interesting internationally oriented organization. I joined Urios exactly because of the previous: I would really love to work in the international field and joining Urios is an excellent way of exploring the opportunities. Previ-ously I served as Committee Member of the Career Event Committee, but currently I am member of the Symposium Committee. I would like to encourage other Urios members to join committees and to attend events, as they are often very interesting and let you explore possi-ble internship/career opportunities. My best experience at Urios yet, was organizing a lecture on the peace negotiations between the Co-lombian government and FARC, at which the Colombian Ambassador attended as keynote speaker. Many people attended and I felt really proud of the event, partly because of my high level of involvement in the organization of it.

..............................

Page 20: Curious #5

COLOPHON

Curious - Urios MagazineVol. 1 Issue 5May 2016

EditorsRoos Bos, Judith Bel, Natasha McArd-le-Ismaguilova, Alina Chakh, Sofia van Dijk

AddressJanskerkhof 33512BK UtrechtThe [email protected]

CopyrightThe copyrights of the articles, photo-graphs and pictures are reserved to the authors and artists. Nothing in this issue may in any way be duplicated or made public without permission from the au-thors.