List of articles: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
Content added Content deleted
(sorting out the real-life examples; only displaying those that are actually created and have some content (14 in total); 10 more will be created as a priority; 8 more are to be considered for being dropped or re-focused)
Line 75: Line 75:
== Real-world examples ==
== Real-world examples ==
* [[Cyber attacks against Estonia (2007)]]
* [[Cyber attacks against Estonia (2007)]]
* [[Georgia-Russia conflict (2008)]]
* [[Cyber operations in Iraq since 2003]]
* [[Stuxnet (2010)]]
* [[Stuxnet (2010)]]
* [[DigiNotar (2011)]]
* [[DigiNotar (2011)]]
* [[Operation Ababil (2012-2013)]]
* [[Shamoon (2012)]]
* [[Chinese PLA Unit 61398 indictments (2014)]]
* [[Heartbleed (2014)]]
* [[Sony Pictures Entertainment attack (2014)]]
* [[Sony Pictures Entertainment attack (2014)]]
* [[Sands Casino hack (2014)]]
* [[Steel mill in Germany (2014)]]
* [[Steel mill in Germany (2014)]]
* [[Ukraine-Russia conflict (2014-)]]
* [[Office of Personnel Management data breach (2015)]]
* [[Bundestag hack (2015)]]
* [[The Hacking Team Hack (2015)]]
* [[The Hacking Team Hack (2015)]]
* [[Power grid cyberattack in Ukraine (2015)]]
* [[Power grid cyberattack in Ukraine (2015)]]
* [[1718 sanctions committee hack (2016)]]
* [[DNC email leak (2016)]]
* [[DNC email leak (2016)]]
* [[The Shadow Brokers publishing the NSA vulnerabilities (2016)]]
* [[The Shadow Brokers publishing the NSA vulnerabilities (2016)]]
* [[Shamoon 2.0 (2016)]]
* [[APT-29 attacks on ministries (2016-2017)]]
* [[Ethiopian surveillance of journalists abroad (2017)]]
* [[French presidential election leak (2017)]]
* [[French presidential election leak (2017)]]
* [[NotPetya (mock ransomware)|NotPetya (mock ransomware) (2017)]]
* [[NotPetya (mock ransomware)|NotPetya (mock ransomware) (2017)]]
* [[Operation Cloudhopper (2017)]]
* [[Operation Cloudhopper (2017)]]
* [[WannaCry (2017)]]
* [[WannaCry (2017)]]
* [[Wu Yingzhuo, Dong Hao and Xia Lei indictments (2017)]]
* [[African Union headquarters hack (2018)]]
* [[African Union headquarters hack (2018)]]
* [[SamSam ransomware attack (2018)]]
* (...)
* (...)

<!--
<!-- The following examples will be created as a priority, in this order:
* [[Attempted hack of the OPCW (2018)]]
* [[APT-29 attacks on ministries (2016-2017)]]
* [[Chinese PLA Unit 61398 indictments (2014)]]
* [[Bundestag hack (2015)]]
* [[Office of Personnel Management data breach (2015)]]
* [[Shamoon (2012)]]
* [[Georgia-Russia conflict (2008)]]
* [[Ukrainian parliamentary election interference (2014)]]
* [[Ethiopian surveillance of journalists abroad (2017)]]
* [[SamSam ransomware attack (2018)]]
* [[Wu Yingzhuo, Dong Hao and Xia Lei indictments (2017)]]

The following examples are to be considered before being created:
* [[Attempted hack of the OPCW (2018)]] : operation stopped in preparatory phase, not many technical details
* [[Operation Ababil (2012-2013)]] : not very well-known, similar to Estonia (2007)
* [[Sands Casino hack (2014)]] : essentially the same as Sony hack, only less famous
* [[Heartbleed (2014)]] : no international responsibility is involved
* [[1718 sanctions committee hack (2016)]] : not too well-known
* [[Shamoon 2.0 (2016)]] : similar to Shamoon (2012)

The following examples are too vague due to their being long-term and comprising various activities; however specific incidents from these campaigns could be singled out and described:
* [[Cyber operations in Iraq since 2003]]
* [[Ukraine-Russia conflict (2014-)]]
-->
-->



Revision as of 12:54, 27 February 2019

This page serves as the equivalent of a table of contents in a printed book. It contains an updated list of all substantive articles in the Toolkit.

About the project

Scenarios

Legal concepts

General international law

Specialised regimes of peacetime international law

Use of force, conflict and international law

Real-world examples


Keywords

List of keywords