List of articles

About the project
About the project

Scenarios
Scenario 101

General international law and peacetime cyber operations

 * Sovereignty
 * Due diligence
 * Jurisdiction
 * State responsibility
 * Internationally wrongful act
 * Breach of international obligation
 * Attribution
 * Circumstances precluding wrongfulness
 * Countermeasures
 * Necessity
 * Peacetime cyber espionage
 * Non-state actors
 * Specialised regimes
 * International human rights law
 * Diplomatic and consular law
 * Law of the sea
 * Air law
 * Space law
 * International telecommunications law
 * Prohibited intervention

Cyber law of armed conflict (JAB, JIB)

 * Jus ad bellum:
 * Use of force
 * Armed attack
 * Self-defence
 * Jus in bello:
 * International armed conflict
 * Non-international armed conflict
 * Criminal responsibility
 * Conduct of hostilities - the subtopics can be developed
 * Certain persons, objects and activities - again
 * Occupation
 * Neutrality

Real-world examples

 * Estonia 2007
 * Georgia 2008
 * Cyber operations in Iraq since 2003
 * Heartbleed (what happens when a widespread vulnerability is disclosed)
 * Sony hack
 * OPM hack
 * DNC hack
 * Stuxnet
 * WannaCry
 * NotPetya
 * Ababil (2011–13)
 * Sands Casino (2014)
 * Steel mill in Germany (2014)
 * Bundestag hack (2015)
 * Power grid in Ukraine (2015)
 * Shamoon 2.0 (2016)
 * French elections (2017)
 * French elections (2017)

Keywords
List of keywords