List of articles
This page serves as the equivalent of a table of contents in a printed book. It contains an updated list of all substantive articles in the Toolkit.
1 About the projectEdit
2 ScenariosEdit
- Scenario 01: Election interference
- Scenario 02: Political espionage
- Scenario 03: Power grid
- Scenario 04: International organizations
- Scenario 05: Criminal investigation
- Scenario 06: Enabling State
- Scenario 07: Hacking tools
- Scenario 08: Certificate authority
- Scenario 09: Economic espionage
- Scenario 10: Cyber weapons
- Scenario 11: Surveillance tools
- Scenario 12: Computer data
- Scenario 13: Armed conflict
- Scenario 14: Ransomware campaign
- Scenario 15: Cyber deception
- Scenario 16: High seas
- Scenario 17: Collective responses
- Scenario 18: Cyber operators
- Scenario 19: Hate speech
3 Legal conceptsEdit
3.1 General international lawEdit
- Jurisdiction
- State responsibility
- Attribution
- Breach of an international obligation
- Responses and justifications
- Circumstances precluding wrongfulness
- Consent
- Self-defence (state responsibility)
- Countermeasures
- Force majeure
- Distress
- Plea of necessity
- Retorsion
- Circumstances precluding wrongfulness
- Due diligence
- Sovereignty
- Prohibition of intervention
- Prohibition of genocide
- Cyber operations not per se regulated by international law
3.2 Specialised regimes of peacetime international lawEdit
- Diplomatic and consular law
- Law of the sea
- Air law
- Space law
- International telecommunications law
- International human rights law
- International criminal law
3.3 Use of force, conflict and international lawEdit
- International law on the use of force (jus ad bellum)
- Armed attack
- Self-defence
- International humanitarian law (jus in bello)
- Conflict qualification
- Conduct of hostilities
- Certain persons, objects and activities
- Occupation
- Neutrality
4 Real-world examplesEdit
- 2020
- 2019
- 2018
- 2017
- 2016
- 2015
- 2014
- 2013 and before
5 KeywordsEdit
2013 and before 2014 2015 2016 2017 2018 2019 2020 Advanced persistent threat Article 36 Attacks against persons Attribution Combatancy Computer data Countermeasures Crime of genocide Crimes against humanity Critical infrastructure Cyber weapons Cybercrime DDoS Defacement Diplomatic and consular law Direct participation in hostilities Distinction Due diligence Economic cyber espionage Effective control Election interference Evidence Example Flag State jurisdiction Freedom of navigation Hybrid threats Indiscriminate attack Individual criminal responsibility under international law Industrial control system International armed conflict International cooperation International human rights law International humanitarian law International organization International sanctions Internationalization Inviolability Law of the sea Legal concepts Legal personality Legal review of cyber weapons Malware Maritime law enforcement Mass surveillance Methods and means of warfare Military objectives Misuse of established indicators Non-State actors Non-international armed conflict Object Overall control Peacetime cyber espionage Perfidy and ruses of war Persona non grata Plea of necessity Premises of the mission Prohibition of genocide Prohibition of intervention Ransomware Retorsion Scenario Self-defence Sovereign immunity Sovereignty State organs Stuxnet Supply chain Targeted restrictive measures Targeting Threats Use of force War crimes Weapons review