List of articles
Jump to navigation
Jump to search
This page serves as the equivalent of a table of contents in a printed book. It contains an updated list of all substantive articles in the Toolkit.
Contents
1 About the project
2 Scenarios
- Scenario 01: Election interference
- Scenario 02: Political espionage
- Scenario 03: Power grid
- Scenario 04: International organizations
- Scenario 05: Criminal investigation
- Scenario 06: Enabling State
- Scenario 07: Hacking tools
- Scenario 08: Certificate authority
- Scenario 09: Economic espionage
- Scenario 10: Cyber weapons
- Scenario 11: Surveillance tools
- Scenario 12: Computer data
- Scenario 13: Armed conflict
3 Legal concepts
3.1 General international law
- Jurisdiction
- State responsibility
- Attribution
- State organs
- Non-State actors
- Evidence
- Breach of an international obligation
- Responses and justifications
- Circumstances precluding wrongfulness
- Consent
- Self-defence (state responsibility)
- Countermeasures
- Force majeure
- Distress
- Plea of necessity
- Retorsion
- Circumstances precluding wrongfulness
- Attribution
- Due diligence
- Sovereignty
- Prohibition of intervention
- Cyber operations not per se regulated by international law
3.2 Specialised regimes of peacetime international law
- International human rights law
- Diplomatic and consular law
- Law of the sea
- Air law
- Space law
- International telecommunications law
3.3 Use of force, conflict and international law
- International law on the use of force (jus ad bellum)
- Armed attack
- Self-defence
- International humanitarian law (jus in bello)
- Conflict qualification
- Conduct of hostilities
- Military objectives
- Means and methods of warfare
- Certain persons, objects and activities
- Occupation
- Neutrality
- Criminal responsibility
4 Real-world examples
- 2018
- 2017
- 2016
- 2015
- 2014
- 2013 and before
5 Keywords
2013 and before 2014 2015 2016 2017 2018 Advanced persistent threat Article 36 Attribution Computer data Countermeasures Critical infrastructure Cyber weapons Cybercrime DDoS Diplomatic and consular law Distinction Due diligence Economic cyber espionage Effective control Election interference Evidence Example Hybrid threats Indiscriminate attack International armed conflict International cooperation International human rights law International humanitarian law International organization International sanctions Internationalization Inviolability Legal concepts Legal personality Legal review of cyber weapons Malware Mass surveillance Methods and means of warfare Military objectives Non-State actors Non-international armed conflict Object Overall control Peacetime cyber espionage Persona non grata Plea of necessity Premises of the mission Prohibition of intervention Retorsion Scenario Self-defence Sovereignty State organs Stuxnet Targeting Use of force Weapons review