List of articles: Difference between revisions
No edit summary |
No edit summary |
||
Line 40: | Line 40: | ||
[[Scenario 10: Cyber weapons review]] |
[[Scenario 10: Cyber weapons review]] |
||
[[Scenario 11: Sale of surveillance tools in defiance of international sanctions]] |
|||
[[Scenario 12: Cyber operations against computer data]] |
[[Scenario 12: Cyber operations against computer data]] |
Revision as of 15:13, 10 October 2018
About the project
Main page (to include following info in frames: infographic for all scenarions [a la flag set]; "did you know..."/other trivia [a la Wikipedia Main Page]; about the project; one more)
Note on the structure of articles
Toolkit macrostructure (to be removed at some point)
Scenarios
Naming convention: S01: Election interference through cyber means
Order of scenarios to be finalized to broadly correspond to areas of law covered (as in section below), they must be listed in ascending numerical order (i.e. S01, S02, S03....)
Scenario 01: Election interference
Scenario 02: Cyber espionage against government departments
Scenario 03: Cyber attack against the power grid
Scenario 04: A State’s failure to assist an international organization
Scenario 06: Cyber countermeasures against an enabling State
Scenario 07: Leak of State-developed hacking tools
Scenario 08: Certificate authority hack
Scenario 09: Economic cyber espionage
Scenario 10: Cyber weapons review
Scenario 11: Sale of surveillance tools in defiance of international sanctions
Scenario 12: Cyber operations against computer data
Scenario 13: Cyber operations as a trigger of the law of armed conflict
Areas of law
Each of these titles will link to an article containing a "frame" that may then be used (by way of transclusion) in several individual scenarios. Each such article must contain a list of scenarios in which the frame is used. Each frame will be designed to resemble frames used on Wikipedia Main Page, if possible, they will be yellow in colour and contain an icon representing the idea being described (eg a crown like this one for sovereignty).
General international law
- Sovereignty
- Due diligence
- Jurisdiction
- State responsibility
- Internationally wrongful act
- Attribution
- State organs
- Non-State actors
- Evidence
- Breach of an international obligation
- Responses and justifications
- Circumstances precluding wrongfulness
- Consent
- Self-defence (state responsibility)
- Countermeasures
- Force majeure
- Distress
- Necessity
- Retorsion
- Circumstances precluding wrongfulness
- Attribution
- Internationally wrongful act
- Specialised regimes
- Prohibition of intervention
Peacetime cyber operations
what else can we put here?
Use of force and law of armed conflict
- Use of force
- Law of armed conflict:
- Jus ad bellum:
- Jus in bello:
- International armed conflict
- Non-international armed conflict
- Criminal responsibility
- Conduct of hostilities - the subtopics can be developed
- Military objectives
- Means and methods of warfare
- Certain persons, objects and activities - again
- Occupation
- Neutrality
Real-world examples
- Incidents:
- Estonia (2007)
- Georgia (2008)
- Cyber operations in Iraq since 2003
- Stuxnet (2010)
- Ababil (2011–13)
- Shamoon (2012)
- Heartbleed (2014) (what happens when a widespread vulnerability is disclosed)
- Sony pictures hack (2014)
- Sands Casino (2014)
- Steel mill in Germany (2014)
- OPM data breach (2015)
- Bundestag hack (2015)
- Power grid cyberattack in Ukraine (2015)
- DNC email leak (2016)
- Shamoon 2.0 (2016)
- WannaCry (2017)
- NotPetya (2017)
- French elections (2017)
- (...)
- Actors:
- APT-28
- APT-29
- Unit 61398
- (...)
Keywords
TO BE ORGANIZED AS CATEGORY PAGES - LEVEL 1: LIST OF ALL KEYWORDS; LEVEL 2: EACH KEYWORD IS A CATEGORY WHICH CONTAINS (USUALLY) DEFINITION OF THE TERM; ALL (OTHER) ARTICLES WHICH CONTAIN KEYWORD