List of articles: Difference between revisions
Jump to navigation
Jump to search
Content added Content deleted
No edit summary |
No edit summary |
||
Line 27:
** [[Space law]]
** [[International telecommunications law]]
* [[
=== Cyber law of armed conflict (JAB, JIB) ===
|
Revision as of 17:19, 14 August 2018
About the project
Scenarios
Areas of law
General international law and peacetime cyber operations
- Sovereignty
- Due diligence
- Jurisdiction
- State responsibility
- Peacetime cyber espionage
- Non-state actors
- Specialised regimes
- Prohibition of intervention
Cyber law of armed conflict (JAB, JIB)
- Jus ad bellum:
- Jus in bello:
- International armed conflict
- Non-international armed conflict
- Criminal responsibility
- Conduct of hostilities - the subtopics can be developed
- Certain persons, objects and activities - again
- Occupation
- Neutrality
Real-world examples
- Incidents:
- Estonia (2007)
- Georgia (2008)
- Cyber operations in Iraq since 2003
- Stuxnet (2010)
- Ababil (2011–13)
- Shamoon (2012)
- Heartbleed (2014) (what happens when a widespread vulnerability is disclosed)
- Sony pictures hack (2014)
- Sands Casino (2014)
- Steel mill in Germany (2014)
- OPM data breach (2015)
- Bundestag hack (2015)
- Power grid cyberattack in Ukraine (2015)
- DNC email leak (2016)
- Shamoon 2.0 (2016)
- WannaCry (2017)
- NotPetya (2017)
- French elections (2017)
- (...)
- Actors:
- APT-28
- APT-29
- Unit 61398
- (...)