List of articles: Difference between revisions
Jump to navigation
Jump to search
Content added Content deleted
(real world incidents) |
No edit summary |
||
Line 75:
== Real-world examples ==
* [[Cyber attacks against Estonia (2007)]]
* [[Georgia-Russia conflict (2008)]]▼
* [[Stuxnet (2010)]]
* [[DigiNotar (2011)]]
* [[Shamoon (2012)]]▼
* [[Ukrainian parliamentary election interference (2014)]]▼
* [[Chinese PLA Unit 61398 indictments (2014)]]▼
* [[Sony Pictures Entertainment attack (2014)]]
* [[Steel mill in Germany (2014)]]
Line 82 ⟶ 86:
* [[Power grid cyberattack in Ukraine (2015)]]
* [[Bundestag Hack (2015)]]
* [[Office of Personnel Management data breach (2015)]]▼
* [[DNC email leak (2016)]]
* [[The Shadow Brokers publishing the NSA vulnerabilities (2016)]]
* [[French presidential election leak (2017)]]
* [[WannaCry (2017)]]
* [[NotPetya (mock ransomware)|NotPetya (mock ransomware) (2017)]]
* [[Operation Cloudhopper (2017)]]
* [[
* [[Wu Yingzhuo, Dong Hao and Xia Lei indictments (2017)]]▼
* [[African Union headquarters hack (2018)]]
*
<!-- The following examples will be created as a priority, in this order:
* [[APT-29 attacks on ministries (2016-2017)]] (CCDCOE WIP)
▲* [[Chinese PLA Unit 61398 indictments (2014)]]
▲* [[Office of Personnel Management data breach (2015)]]
▲* [[Shamoon (2012)]]
▲* [[Georgia-Russia conflict (2008)]]
▲* [[Ukrainian parliamentary election interference (2014)]]
* [[SamSam ransomware attack (2018)]] (KUBO WILL ASSIGN)
▲* [[Wu Yingzhuo, Dong Hao and Xia Lei indictments (2017)]]
The following examples are to be considered before being created:
|
Revision as of 07:23, 27 March 2019
This page serves as the equivalent of a table of contents in a printed book. It contains an updated list of all substantive articles in the Toolkit.
About the project
Scenarios
- Scenario 01: Election interference
- Scenario 02: Political espionage
- Scenario 03: Power grid
- Scenario 04: International organizations
- Scenario 05: Criminal investigation
- Scenario 06: Enabling State
- Scenario 07: Hacking tools
- Scenario 08: Certificate authority
- Scenario 09: Economic espionage
- Scenario 10: Cyber weapons
- Scenario 11: Surveillance tools
- Scenario 12: Computer data
- Scenario 13: Armed conflict
Legal concepts
General international law
- Jurisdiction
- State responsibility
- Attribution
- State organs
- Non-State actors
- Evidence
- Breach of an international obligation
- Responses and justifications
- Circumstances precluding wrongfulness
- Consent
- Self-defence (state responsibility)
- Countermeasures
- Force majeure
- Distress
- Necessity
- Retorsion
- Circumstances precluding wrongfulness
- Attribution
- Due diligence
- Sovereignty
- Prohibition of intervention
- Cyber operations not per se regulated by international law
Specialised regimes of peacetime international law
- International human rights law
- Diplomatic and consular law
- Law of the sea
- Air law
- Space law
- International telecommunications law
Use of force, conflict and international law
- International law on the use of force (jus ad bellum)
- International humanitarian law (jus in bello)
- Conflict qualification
- Conduct of hostilities
- Military objectives
- Means and methods of warfare
- Certain persons, objects and activities
- Occupation
- Neutrality
- Criminal responsibility
Real-world examples
- Cyber attacks against Estonia (2007)
- Georgia-Russia conflict (2008)
- Stuxnet (2010)
- DigiNotar (2011)
- Shamoon (2012)
- Ukrainian parliamentary election interference (2014)
- Chinese PLA Unit 61398 indictments (2014)
- Sony Pictures Entertainment attack (2014)
- Steel mill in Germany (2014)
- The Hacking Team Hack (2015)
- Power grid cyberattack in Ukraine (2015)
- Bundestag Hack (2015)
- Office of Personnel Management data breach (2015)
- DNC email leak (2016)
- The Shadow Brokers publishing the NSA vulnerabilities (2016)
- French presidential election leak (2017)
- WannaCry (2017)
- NotPetya (mock ransomware) (2017)
- Operation Cloudhopper (2017)
- Ethiopian surveillance of journalists abroad (2017)
- Wu Yingzhuo, Dong Hao and Xia Lei indictments (2017)
- African Union headquarters hack (2018)