List of articles

About the project
About the project

Scenarios
Scenario 101 Scenario 102

General international law and peacetime cyber operations

 * Sovereignty
 * Due diligence
 * Jurisdiction
 * State responsibility
 * Internationally wrongful act
 * Breach of international obligation
 * Attribution
 * Circumstances precluding wrongfulness
 * Countermeasures
 * Necessity
 * Peacetime cyber espionage
 * Non-state actors
 * Specialised regimes
 * International human rights law
 * Diplomatic and consular law
 * Law of the sea
 * Air law
 * Space law
 * International telecommunications law
 * Prohibited intervention

Cyber law of armed conflict (JAB, JIB)

 * Jus ad bellum:
 * Use of force
 * Armed attack
 * Self-defence
 * Jus in bello:
 * International armed conflict
 * Non-international armed conflict
 * Criminal responsibility
 * Conduct of hostilities - the subtopics can be developed
 * Certain persons, objects and activities - again
 * Occupation
 * Neutrality

Real-world examples

 * Estonia (2007)
 * Georgia (2008)
 * Cyber operations in Iraq since 2003
 * Stuxnet (2010)
 * Ababil (2011–13)
 * Shamoon (2012)
 * Heartbleed (2014) (what happens when a widespread vulnerability is disclosed)
 * Sony pictures hack (2014)
 * Sands Casino (2014)
 * Steel mill in Germany (2014)
 * OPM data breach (2015)
 * Bundestag hack (2015)
 * Power grid cyberattack in Ukraine (2015)
 * DNC email leak (2016)
 * Shamoon 2.0 (2016)
 * WannaCry (2017)
 * NotPetya (2017)
 * French elections (2017)
 * APT-28
 * APT-29
 * Unit 61398
 * Unit 61398

Keywords
List of keywords