List of articles: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
Content added Content deleted
(→‎Real-world examples: three-column view)
Tag: Reverted
(reverting the three-column view for incidents)
Tag: Undo
Line 111: Line 111:


== Real-world examples ==
== Real-world examples ==
2021
* 2021
** [[Colonial Pipeline ransomware attack (2021)]]
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
* [[Colonial Pipeline ransomware attack (2021)]]
** [[Health Service Executive ransomware attack (2021)]]
* [[Health Service Executive ransomware attack (2021)]]
** [[Microsoft Exchange Server data breach (2021)]]
* [[Microsoft Exchange Server data breach (2021)]]
</div>
<!--** [[Pegasus Project revelations (2021)]] work in progress (NÚKIB)-->
<!--** [[Pegasus Project revelations (2021)]] work in progress (NÚKIB)-->
2020
* 2020
** [[African Union headquarters hack (2020)]]
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
* [[African Union headquarters hack (2020)]]
** [[Brno University Hospital ransomware attack (2020)]]
* [[Brno University Hospital ransomware attack (2020)]]
** [[SolarWinds (2020)]]
* 2019
* [[SolarWinds (2020)]]
** [[Cyber interference against vessels in the Persian Gulf and Gulf of Oman (2019)]]
</div>
** [[Iranian internet blackout (2019)]]
2019
** [[Israeli attack against Hamas cyber headquarters in Gaza (2019)]]
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
** [[Russia's sovereign internet (2019 onward)]]
* [[Cyber interference against vessels in the Persian Gulf and Gulf of Oman (2019)]]
* [[Iranian internet blackout (2019)]]
** [[Texas Municipality ransomware attack (2019)]]
* 2018
* [[Israeli attack against Hamas cyber headquarters in Gaza (2019)]]
* [[Russia's sovereign internet (2019 onward)]]
** [[African Union headquarters hack (2018)]]
** [[Olympic Destroyer (2018)]]
* [[Texas Municipality ransomware attack (2019)]]
** [[SamSam ransomware incidents (2018)]]
</div>
* 2017
2018
** [[Ethiopian surveillance of journalists abroad (2017)]]
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
* [[African Union headquarters hack (2018)]]
** [[French presidential election leak (2017)]]
* [[Olympic Destroyer (2018)]]
** [[Hate speech in India (since 2017)]]
* [[SamSam ransomware incidents (2018)]]
** [[Operation Cloudhopper (2017)]]
** [[NotPetya (2017)]]
</div>
** [[Triton (2017)]]
2017
** [[WannaCry (2017)]]
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
* [[Ethiopian surveillance of journalists abroad (2017)]]
** [[Wu Yingzhuo, Dong Hao and Xia Lei indictment (2017)]]
* 2016
* [[French presidential election leak (2017)]]
* [[Hate speech in India (since 2017)]]
** [[DNC email leak (2016)]]
* [[Operation Cloudhopper (2017)]]
** [[Industroyer – Crash Override (2016)]]
* [[NotPetya (2017)]]
** [[Operation Glowing Symphony (2016)]]
** [[The Shadow Brokers publishing the NSA vulnerabilities (2016)]]
* [[Triton (2017)]]
* 2015
* [[WannaCry (2017)]]
** [[Bundestag Hack (2015)]]
* [[Wu Yingzhuo, Dong Hao and Xia Lei indictment (2017)]]
** [[Office of Personnel Management data breach (2015)]]
</div>
** [[Power grid cyberattack in Ukraine (2015)]]
2016
** [[The Hacking Team Hack (2015)]]
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
* 2014
* [[DNC email leak (2016)]]
* [[Industroyer Crash Override (2016)]]
** [[Chinese PLA Unit 61398 indictments (2014)]]
* [[Operation Glowing Symphony (2016)]]
** [[Sony Pictures Entertainment attack (2014)]]
** [[Steel mill in Germany (2014)]]
* [[The Shadow Brokers publishing the NSA vulnerabilities (2016)]]
** [[Ukrainian parliamentary election interference (2014)]]
</div>
* 2012
2015
** [[Shamoon (2012)]]
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
* 2011
* [[Bundestag Hack (2015)]]
** [[Caucasus internet outage (2011)]]
* [[Office of Personnel Management data breach (2015)]]
** [[Syria’s ‘social media war’ (since 2011)]]
* [[Power grid cyberattack in Ukraine (2015)]]
* [[The Hacking Team Hack (2015)]]
** [[DigiNotar (2011)]]
* 2010
</div>
** [[Hate speech in Myanmar (since early 2010s)]]
2014
** [[Stuxnet (2010)]]
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
** [[SuperMicro supply chain breach (since 2010)]]
* [[Chinese PLA Unit 61398 indictments (2014)]]
* 2008
* [[Sony Pictures Entertainment attack (2014)]]
* [[Steel mill in Germany (2014)]]
** [[Georgia-Russia conflict (2008)]]
** [[Bangladesh internet outage (2008)]]
* [[Ukrainian parliamentary election interference (2014)]]
* 2007
</div>
** [[Cyber attacks against Estonia (2007)]]
2012
** [[Operation Orchard/Outside the Box (2007)]]
* [[Shamoon (2012)]]
2011
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
* [[Caucasus internet outage (2011)]]
* [[Syria’s ‘social media war’ (since 2011)]]
* [[DigiNotar (2011)]]
</div>
2010
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
* [[Hate speech in Myanmar (since early 2010s)]]
* [[Stuxnet (2010)]]
* [[SuperMicro supply chain breach (since 2010)]]
</div>
2008
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
* [[Georgia-Russia conflict (2008)]]
* [[Bangladesh internet outage (2008)]]
</div>
2007
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
* [[Cyber attacks against Estonia (2007)]]
* [[Operation Orchard/Outside the Box (2007)]]
</div>
<!--
<!--



Revision as of 16:34, 19 September 2021

__NUMBEREDHEADINGS__ This page serves as the equivalent of a table of contents in a printed book. It contains an updated list of all substantive articles in the Toolkit.

About the project

Scenarios

Legal concepts

General international law

Specialised regimes of peacetime international law

Use of force, conflict and international law

Real-world examples

National positions

Keywords

2007  2008  2010  2011  2012  2014  2015  2016  2017  2018  2019  2020  2021  2022  2023  Advanced persistent threat  Applicability of international law  Article 36  Attack (international humanitarian law)  Attacks against persons  Attribution  Breach of an international obligation  Causation  Combatancy  Computer data  Conduct of hostilities  Countermeasures  Crime of genocide  Crimes against humanity  Critical infrastructure  Cyber weapons  Cybercrime  DDoS  Deception  Defacement  Diplomatic and consular law  Direct participation in hostilities  Distinction  Due diligence  Economic cyber espionage  Effective control  Election interference  Evidence  Example  Flag State jurisdiction  Freedom of navigation  Hospitals  Humanitarian assistance  Hybrid threats  Indiscriminate attack  Individual criminal responsibility under international law  Industrial control system  International armed conflict  International cooperation  International export control law  International human rights law  International humanitarian law  International organization  International sanctions  International telecommunication law  Internationalization  Internet access  Inviolability  Law of the sea  Legal concepts  Legal personality  Legal review of cyber weapons  Legally binding unilateral declarations of States  Malware  Maritime law enforcement  Means and methods of cyber warfare  Medical units  Methods and means of warfare  Military objectives  Misattribution  Mistake of fact  Misuse of established indicators  National position  Neutrality  Non-State actors  Non-international armed conflict  Object  Objects indispensable to the survival of the civilian population  Overall control  Pages transcluding nonexistent sections  Peaceful settlement of disputes  Peacetime cyber espionage  Perfidy and ruses of war  Persona non grata  Plea of necessity  Premises of the mission  Principle of precautions  Prohibition of genocide  Prohibition of intervention  Proportionality  Ransomware  Retorsion  Right to life  Scenario  Self-defence  Sovereign immunity  Sovereignty  Specially protected persons, objects and activities  State organs  State responsibility  Stuxnet  Supply chain  Surveillance  Targeted restrictive measures  Targeting  Threats  Transboundary harm  Use of force  Voluntary norms  War crimes  Weapons review