List of articles

This page serves as the equivalent of a table of contents in a printed book. It contains an updated list of all substantive articles in the Toolkit.

About the project

 * Main page
 * FAQ
 * Note on the structure of articles
 * Editing rules
 * Glossary
 * Bibliography

Scenarios

 * Scenario 01: Election interference
 * Scenario 02: Political espionage
 * Scenario 03: Power grid
 * Scenario 04: International organizations
 * Scenario 05: Criminal investigation
 * Scenario 06: Enabling State
 * Scenario 07: Hacking tools
 * Scenario 08: Certificate authority
 * Scenario 09: Economic espionage
 * Scenario 10: Cyber weapons
 * Scenario 11: Surveillance tools
 * Scenario 12: Computer data
 * Scenario 13: Armed conflict

General international law

 * Jurisdiction
 * State responsibility
 * Attribution
 * State organs
 * Non-State actors
 * Evidence
 * Breach of an international obligation
 * Responses and justifications
 * Circumstances precluding wrongfulness
 * Consent
 * Self-defence (state responsibility)
 * Countermeasures
 * Force majeure
 * Distress
 * Necessity
 * Retorsion
 * Due diligence
 * Sovereignty
 * Prohibition of intervention
 * Cyber operations not per se regulated by international law
 * Peacetime cyber espionage

Specialised regimes of peacetime international law

 * International human rights law
 * Diplomatic and consular law
 * Law of the sea
 * Air law
 * Space law
 * International telecommunications law

Use of force, conflict and international law

 * International law on the use of force (jus ad bellum)
 * Armed attack
 * Self-defence (jus ad bellum)
 * International humanitarian law (jus in bello)
 * Conflict qualification
 * International armed conflict
 * Non-international armed conflict
 * Conduct of hostilities
 * Military objectives
 * Means and methods of warfare
 * Legal review of cyber weapons
 * Certain persons, objects and activities
 * Occupation
 * Neutrality
 * Criminal responsibility

Real-world examples

 * Incidents:
 * Cyber attacks against Estonia (2007)
 * Georgia-Russia conflict (2008)
 * Cyber operations in Iraq since 2003
 * Stuxnet (2010)
 * DigiNotar (2011)
 * Operation Ababil (2012-2013)
 * Shamoon (2012)
 * Chinese PLA Unit 61398 indictments (2014)
 * Heartbleed (2014)
 * Sony Pictures Entertainment attack (2014)
 * Sands Casino hack (2014)
 * Steel mill in Germany (2014)
 * Ukraine-Russia conflict (2014-)
 * Office of Personnel Management data breach (2015)
 * Bundestag hack (2015)
 * The Hacking Team Hack (2015)
 * Power grid cyberattack in Ukraine (2015)
 * 1718 sanctions committee hack (2016)
 * DNC email leak (2016)
 * The Shadow Brokers publishing the NSA vulnerabilities (2016)
 * Shamoon 2.0 (2016)
 * Ethiopian surveillance of journalists abroad (2017)
 * French presidential election leak (2017)
 * NotPetya (mock ransomware) (2017)
 * Operation Cloudhopper (2017)
 * WannaCry (2017)
 * Wu Yingzhuo, Dong Hao and Xia Lei indictments (2017)
 * African Union headquarters hack (2018)
 * Attempted hack of the OPCW (2018)
 * SamSam ransomware attack (2018)

Keywords
List of keywords