List of articles

About the project
Main page (to include following info in frames: infographic for all scenarions [a la flag set]; "did you know..."/other trivia [a la Wikipedia Main Page]; about the project; one more)

About the project

FAQ

Note on the structure of articles

Editing rules

Glossary

Bibliography

Scenarios
Naming convention: S01: Election interference through cyber means

Order of scenarios to be finalized to broadly correspond to areas of law covered (as in section below), they must be listed in ascending numerical order (i.e. S01, S02, S03....)

Scenario 101 Scenario 102 Scenario 103

Scenarios 104-113

Areas of law
''Each of these titles will link to an article containing a "frame" that may then be used (by way of transclusion) in several individual scenarios. Each such article must contain a list of scenarios in which the frame is used. Each frame will be designed to resemble frames used on Wikipedia Main Page, if possible, they will be yellow in colour and contain an icon representing the idea being described (eg a crown like this one for sovereignty).''

TOMAS: PLEASE RESTRUCTURE IN THE FOLLOWING WAY: I. GENERAL (APPLIES ACROSS PEACE AND WAR SITUATIONS); II. PEACETIME (EVERYTHING EXCEPT JUS IN AND JUS AD); III. USE OF FORCE AND LAW OF ARMED CONFLICT

I+II General international law and peacetime cyber operations

 * Sovereignty
 * Due diligence
 * Jurisdiction
 * State responsibility
 * Internationally wrongful act
 * Breach of international obligation
 * Attribution
 * Circumstances precluding wrongfulness
 * Countermeasures
 * Necessity
 * Peacetime cyber espionage
 * Non-state actors
 * Specialised regimes
 * International human rights law
 * Diplomatic and consular law
 * Law of the sea
 * Air law
 * Space law
 * International telecommunications law
 * Prohibition of intervention
 * Prohibition of intervention (conditions)

III Cyber law of armed conflict (JAB, JIB)

 * Jus ad bellum:
 * Use of force
 * Armed attack
 * Self-defence
 * Jus in bello:
 * International armed conflict
 * Non-international armed conflict
 * Criminal responsibility
 * Conduct of hostilities - the subtopics can be developed
 * Certain persons, objects and activities - again
 * Occupation
 * Neutrality

Real-world examples

 * Incidents:
 * Estonia (2007)
 * Georgia (2008)
 * Cyber operations in Iraq since 2003
 * Stuxnet (2010)
 * Ababil (2011–13)
 * Shamoon (2012)
 * Heartbleed (2014) (what happens when a widespread vulnerability is disclosed)
 * Sony pictures hack (2014)
 * Sands Casino (2014)
 * Steel mill in Germany (2014)
 * OPM data breach (2015)
 * Bundestag hack (2015)
 * Power grid cyberattack in Ukraine (2015)
 * DNC email leak (2016)
 * Shamoon 2.0 (2016)
 * WannaCry (2017)
 * NotPetya (2017)
 * French elections (2017)
 * Actors:
 * APT-28
 * APT-29
 * Unit 61398
 * Unit 61398

Keywords
TO BE ORGANIZED AS CATEGORY PAGES - LEVEL 1:  LIST OF ALL KEYWORDS; LEVEL 2: EACH KEYWORD IS A CATEGORY WHICH CONTAINS (USUALLY) DEFINITION OF THE TERM; ALL (OTHER) ARTICLES WHICH CONTAIN KEYWORD

List of keywords