List of articles: Difference between revisions
Jump to navigation
Jump to search
Content added Content deleted
(real world incidents) |
|||
Line 89:
* [[WannaCry (2017)]]
* [[African Union headquarters hack (2018)]]
*[[Chinese PLA Unit 61398 indictments (2014)]]
*[[Bundestag Hack (2015)]]
*[[Shamoon (2012)]]
*[[Office of Personnel Management data breach (2015)]]
*[[Georgia-Russia conflict (2008)]]
*[[Ukrainian parliamentary election interference (2014)]]
*[[Ethiopian surveillance of journalists abroad (2017)]]
*[[Wu Yingzhuo, Dong Hao and Xia Lei indictments (2017)]]
*
<!-- The following examples will be created as a priority, in this order:
Line 115 ⟶ 123:
-->
==
[[Special:Categories|List of keywords]]
|
Revision as of 07:20, 27 March 2019
This page serves as the equivalent of a table of contents in a printed book. It contains an updated list of all substantive articles in the Toolkit.
About the project
Scenarios
- Scenario 01: Election interference
- Scenario 02: Political espionage
- Scenario 03: Power grid
- Scenario 04: International organizations
- Scenario 05: Criminal investigation
- Scenario 06: Enabling State
- Scenario 07: Hacking tools
- Scenario 08: Certificate authority
- Scenario 09: Economic espionage
- Scenario 10: Cyber weapons
- Scenario 11: Surveillance tools
- Scenario 12: Computer data
- Scenario 13: Armed conflict
Legal concepts
General international law
- Jurisdiction
- State responsibility
- Attribution
- State organs
- Non-State actors
- Evidence
- Breach of an international obligation
- Responses and justifications
- Circumstances precluding wrongfulness
- Consent
- Self-defence (state responsibility)
- Countermeasures
- Force majeure
- Distress
- Necessity
- Retorsion
- Circumstances precluding wrongfulness
- Attribution
- Due diligence
- Sovereignty
- Prohibition of intervention
- Cyber operations not per se regulated by international law
Specialised regimes of peacetime international law
- International human rights law
- Diplomatic and consular law
- Law of the sea
- Air law
- Space law
- International telecommunications law
Use of force, conflict and international law
- International law on the use of force (jus ad bellum)
- International humanitarian law (jus in bello)
- Conflict qualification
- Conduct of hostilities
- Military objectives
- Means and methods of warfare
- Certain persons, objects and activities
- Occupation
- Neutrality
- Criminal responsibility
Real-world examples
- Cyber attacks against Estonia (2007)
- Stuxnet (2010)
- DigiNotar (2011)
- Sony Pictures Entertainment attack (2014)
- Steel mill in Germany (2014)
- The Hacking Team Hack (2015)
- Power grid cyberattack in Ukraine (2015)
- Bundestag Hack (2015)
- DNC email leak (2016)
- The Shadow Brokers publishing the NSA vulnerabilities (2016)
- French presidential election leak (2017)
- NotPetya (mock ransomware) (2017)
- Operation Cloudhopper (2017)
- WannaCry (2017)
- African Union headquarters hack (2018)
- Chinese PLA Unit 61398 indictments (2014)
- Bundestag Hack (2015)
- Shamoon (2012)
- Office of Personnel Management data breach (2015)
- Georgia-Russia conflict (2008)
- Ukrainian parliamentary election interference (2014)
- Ethiopian surveillance of journalists abroad (2017)
- Wu Yingzhuo, Dong Hao and Xia Lei indictments (2017)