List of articles: Difference between revisions
Jump to navigation
Jump to search
Content added Content deleted
Line 75: | Line 75: | ||
== Real-world examples == |
== Real-world examples == |
||
* Incidents: |
* Incidents: |
||
** |
**[[Cyber attacks against Estonia (2007)]] |
||
** [[Georgia-Russia conflict (2008)]] |
** [[Georgia-Russia conflict (2008)]] |
||
** [[Cyber operations in Iraq since 2003]] |
** [[Cyber operations in Iraq since 2003]] |
||
Line 104: | Line 104: | ||
** [[African Union headquarters hack (2018)]] |
** [[African Union headquarters hack (2018)]] |
||
** [[Attempted hack of the OPCW (2018)]] |
** [[Attempted hack of the OPCW (2018)]] |
||
**[[SamSam ransomware attack (2018)]] |
|||
** (...) |
** (...) |
||
* Actors: |
* Actors: |
Revision as of 14:59, 4 February 2019
This page serves as the equivalent of a table of contents in a printed book. It contains an updated list of all substantive articles in the Toolkit.
About the project
Scenarios
- Scenario 01: Election interference
- Scenario 02: Political espionage
- Scenario 03: Power grid
- Scenario 04: International organizations
- Scenario 05: Criminal investigation
- Scenario 06: Enabling State
- Scenario 07: Hacking tools
- Scenario 08: Certificate authority
- Scenario 09: Economic espionage
- Scenario 10: Cyber weapons
- Scenario 11: Surveillance tools
- Scenario 12: Computer data
- Scenario 13: Armed conflict
Legal concepts
General international law
- Jurisdiction
- State responsibility
- Attribution
- State organs
- Non-State actors
- Evidence
- Breach of an international obligation
- Responses and justifications
- Circumstances precluding wrongfulness
- Consent
- Self-defence (state responsibility)
- Countermeasures
- Force majeure
- Distress
- Necessity
- Retorsion
- Circumstances precluding wrongfulness
- Attribution
- Due diligence
- Sovereignty
- Prohibition of intervention
- Cyber operations not per se regulated by international law
Specialised regimes of peacetime international law
- International human rights law
- Diplomatic and consular law
- Law of the sea
- Air law
- Space law
- International telecommunications law
Use of force, conflict and international law
- International law on the use of force (jus ad bellum)
- International humanitarian law (jus in bello)
- Conflict qualification
- Conduct of hostilities
- Military objectives
- Means and methods of warfare
- Certain persons, objects and activities
- Occupation
- Neutrality
- Criminal responsibility
Real-world examples
- Incidents:
- Cyber attacks against Estonia (2007)
- Georgia-Russia conflict (2008)
- Cyber operations in Iraq since 2003
- Stuxnet (2010)
- DigiNotar (2011)
- Operation Ababil (2012-2013)
- Shamoon (2012)
- Chinese PLA Unit 61398 indictments (2014)
- Heartbleed (2014)
- Sony Pictures Entertainment attack (2014)
- Sands Casino hack (2014)
- Steel mill in Germany (2014)
- Ukraine-Russia conflict (2014-)
- Office of Personnel Management data breach (2015)
- Bundestag hack (2015)
- The Hacking Team Hack (2015)
- Power grid cyberattack in Ukraine (2015)
- 1718 sanctions committee hack (2016)
- DNC email leak (2016)
- The Shadow Brokers publishing the NSA vulnerabilities (2016)
- Shamoon 2.0 (2016)
- Ethiopian surveillance of journalists abroad (2017)
- French presidential election leak (2017)
- NotPetya (mock ransomware) (2017)
- Operation Cloudhopper (2017)
- WannaCry (2017)
- Wu Yingzhuo, Dong Hao and Xia Lei indictments (2017)
- African Union headquarters hack (2018)
- Attempted hack of the OPCW (2018)
- SamSam ransomware attack (2018)
- (...)
- Actors:
- APT-28
- APT-29
- Unit 61398
- (...)