List of articles: Difference between revisions
Jump to navigation
Jump to search
Content added Content deleted
Line 81: | Line 81: | ||
* [[The Hacking Team Hack (2015)]] |
* [[The Hacking Team Hack (2015)]] |
||
* [[Power grid cyberattack in Ukraine (2015)]] |
* [[Power grid cyberattack in Ukraine (2015)]] |
||
* [[Bundestag |
* [[Bundestag Hack (2015)]] |
||
* [[DNC email leak (2016)]] |
* [[DNC email leak (2016)]] |
||
* [[The Shadow Brokers publishing the NSA vulnerabilities (2016)]] |
* [[The Shadow Brokers publishing the NSA vulnerabilities (2016)]] |
Revision as of 07:09, 27 March 2019
This page serves as the equivalent of a table of contents in a printed book. It contains an updated list of all substantive articles in the Toolkit.
About the project
Scenarios
- Scenario 01: Election interference
- Scenario 02: Political espionage
- Scenario 03: Power grid
- Scenario 04: International organizations
- Scenario 05: Criminal investigation
- Scenario 06: Enabling State
- Scenario 07: Hacking tools
- Scenario 08: Certificate authority
- Scenario 09: Economic espionage
- Scenario 10: Cyber weapons
- Scenario 11: Surveillance tools
- Scenario 12: Computer data
- Scenario 13: Armed conflict
Legal concepts
General international law
- Jurisdiction
- State responsibility
- Attribution
- State organs
- Non-State actors
- Evidence
- Breach of an international obligation
- Responses and justifications
- Circumstances precluding wrongfulness
- Consent
- Self-defence (state responsibility)
- Countermeasures
- Force majeure
- Distress
- Necessity
- Retorsion
- Circumstances precluding wrongfulness
- Attribution
- Due diligence
- Sovereignty
- Prohibition of intervention
- Cyber operations not per se regulated by international law
Specialised regimes of peacetime international law
- International human rights law
- Diplomatic and consular law
- Law of the sea
- Air law
- Space law
- International telecommunications law
Use of force, conflict and international law
- International law on the use of force (jus ad bellum)
- International humanitarian law (jus in bello)
- Conflict qualification
- Conduct of hostilities
- Military objectives
- Means and methods of warfare
- Certain persons, objects and activities
- Occupation
- Neutrality
- Criminal responsibility
Real-world examples
- Cyber attacks against Estonia (2007)
- Stuxnet (2010)
- DigiNotar (2011)
- Sony Pictures Entertainment attack (2014)
- Steel mill in Germany (2014)
- The Hacking Team Hack (2015)
- Power grid cyberattack in Ukraine (2015)
- Bundestag Hack (2015)
- DNC email leak (2016)
- The Shadow Brokers publishing the NSA vulnerabilities (2016)
- French presidential election leak (2017)
- NotPetya (mock ransomware) (2017)
- Operation Cloudhopper (2017)
- WannaCry (2017)
- African Union headquarters hack (2018)
- (...)