List of articles: Difference between revisions
Jump to navigation
Jump to search
Content added Content deleted
No edit summary |
mNo edit summary |
||
Line 86:
* [[Power grid cyberattack in Ukraine (2015)]]
* [[Bundestag Hack (2015)]]
* [[Office of Personnel Management data breach (2015)]]▼
* [[DNC email leak (2016)]]
* [[The Shadow Brokers publishing the NSA vulnerabilities (2016)]]
Line 94 ⟶ 93:
* [[Operation Cloudhopper (2017)]]
* [[Ethiopian surveillance of journalists abroad (2017)]]
* [[Wu Yingzhuo, Dong Hao and Xia Lei indictments (2017)]]▼
* [[African Union headquarters hack (2018)]]
*
<!-- The following examples will be created as a priority, in this order:
▲* [[Office of Personnel Management data breach (2015)]]
▲* [[Wu Yingzhuo, Dong Hao and Xia Lei indictments (2017)]]
* [[APT-29 attacks on ministries (2016-2017)]] (CCDCOE WIP)
* [[SamSam ransomware attack (2018)]] (KUBO WILL ASSIGN)
|
Revision as of 07:25, 27 March 2019
This page serves as the equivalent of a table of contents in a printed book. It contains an updated list of all substantive articles in the Toolkit.
About the project
Scenarios
- Scenario 01: Election interference
- Scenario 02: Political espionage
- Scenario 03: Power grid
- Scenario 04: International organizations
- Scenario 05: Criminal investigation
- Scenario 06: Enabling State
- Scenario 07: Hacking tools
- Scenario 08: Certificate authority
- Scenario 09: Economic espionage
- Scenario 10: Cyber weapons
- Scenario 11: Surveillance tools
- Scenario 12: Computer data
- Scenario 13: Armed conflict
Legal concepts
General international law
- Jurisdiction
- State responsibility
- Attribution
- State organs
- Non-State actors
- Evidence
- Breach of an international obligation
- Responses and justifications
- Circumstances precluding wrongfulness
- Consent
- Self-defence (state responsibility)
- Countermeasures
- Force majeure
- Distress
- Necessity
- Retorsion
- Circumstances precluding wrongfulness
- Attribution
- Due diligence
- Sovereignty
- Prohibition of intervention
- Cyber operations not per se regulated by international law
Specialised regimes of peacetime international law
- International human rights law
- Diplomatic and consular law
- Law of the sea
- Air law
- Space law
- International telecommunications law
Use of force, conflict and international law
- International law on the use of force (jus ad bellum)
- International humanitarian law (jus in bello)
- Conflict qualification
- Conduct of hostilities
- Military objectives
- Means and methods of warfare
- Certain persons, objects and activities
- Occupation
- Neutrality
- Criminal responsibility
Real-world examples
- Cyber attacks against Estonia (2007)
- Georgia-Russia conflict (2008)
- Stuxnet (2010)
- DigiNotar (2011)
- Shamoon (2012)
- Ukrainian parliamentary election interference (2014)
- Chinese PLA Unit 61398 indictments (2014)
- Sony Pictures Entertainment attack (2014)
- Steel mill in Germany (2014)
- The Hacking Team Hack (2015)
- Power grid cyberattack in Ukraine (2015)
- Bundestag Hack (2015)
- DNC email leak (2016)
- The Shadow Brokers publishing the NSA vulnerabilities (2016)
- French presidential election leak (2017)
- WannaCry (2017)
- NotPetya (mock ransomware) (2017)
- Operation Cloudhopper (2017)
- Ethiopian surveillance of journalists abroad (2017)
- African Union headquarters hack (2018)