List of articles

About the project
Main page

About the project

FAQ

Note on the structure of articles

Editing rules

Glossary

Bibliography

Toolkit macrostructure (to be removed at some point)

Scenarios

 * Scenario 01: Election interference
 * Scenario 02: Political espionage
 * Scenario 03: Power grid
 * Scenario 04: International organizations
 * Scenario 05: Criminal investigation
 * Scenario 06: Enabling State
 * Scenario 07: Hacking tools
 * Scenario 08: Certificate authority
 * Scenario 09: Economic espionage
 * Scenario 10: Cyber weapons
 * Scenario 11: Surveillance tools
 * Scenario 12: Computer data
 * Scenario 13: Armed conflict

Areas of law
''Each of these titles will link to an article containing a "frame" that may then be used (by way of transclusion) in several individual scenarios. Each such article must contain a list of scenarios in which the frame is used. Each frame will be designed to resemble frames used on Wikipedia Main Page, if possible, they will be yellow in colour and contain an icon representing the idea being described (eg a crown like this one for sovereignty).''

General international law

 * Sovereignty
 * Due diligence
 * Jurisdiction
 * Prohibition of intervention
 * State responsibility
 * Internationally wrongful act
 * Attribution
 * State organs
 * Non-State actors
 * Evidence
 * Breach of an international obligation
 * Responses and justifications
 * Circumstances precluding wrongfulness
 * Consent
 * Self-defence (state responsibility)
 * Countermeasures
 * Force majeure
 * Distress
 * Necessity
 * Retorsion

Specialised regimes

 * International human rights law
 * Diplomatic and consular law
 * Law of the sea
 * Air law
 * Space law
 * International telecommunications law

Peacetime cyber operations
what else can we put here?
 * Peacetime cyber espionage

Use of force and law of armed conflict

 * Use of force
 * Law of armed conflict:
 * Jus ad bellum:
 * Armed attack
 * Self-defence (jus ad bellum)
 * Jus in bello:
 * International armed conflict
 * Non-international armed conflict
 * Criminal responsibility
 * Conduct of hostilities - the subtopics can be developed
 * Military objectives
 * Means and methods of warfare
 * Legal review of cyber weapons
 * Certain persons, objects and activities - again
 * Occupation
 * Neutrality

Real-world examples

 * Incidents:
 * Estonia (2007)
 * Georgia (2008)
 * Cyber operations in Iraq since 2003
 * Stuxnet (2010)
 * Ababil (2011–13)
 * Shamoon (2012)
 * Heartbleed (2014) (what happens when a widespread vulnerability is disclosed)
 * Sony pictures hack (2014)
 * Sands Casino (2014)
 * Steel mill in Germany (2014)
 * OPM data breach (2015)
 * Bundestag hack (2015)
 * Power grid cyberattack in Ukraine (2015)
 * DNC email leak (2016)
 * Shamoon 2.0 (2016)
 * WannaCry (2017)
 * NotPetya (mock ransomware) (2017)
 * French elections (2017)
 * Actors:
 * APT-28
 * APT-29
 * Unit 61398
 * Unit 61398

Keywords
TO BE ORGANIZED AS CATEGORY PAGES - LEVEL 1:  LIST OF ALL KEYWORDS; LEVEL 2: EACH KEYWORD IS A CATEGORY WHICH CONTAINS (USUALLY) DEFINITION OF THE TERM; ALL (OTHER) ARTICLES WHICH CONTAIN KEYWORD

List of keywords