List of articles: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
Content added Content deleted
(→‎Real-world examples: updates to comments)
(→‎Real-world examples: updating the to-do list of examples)
Line 159: Line 159:
The following examples should be created as a priority, in this order:
The following examples should be created as a priority, in this order:
* Kaseya / REvil
* Kaseya / REvil
* [[Pegasus Project revelations (2021)]] work in progress (NÚKIB)
* [[Google shuts down an active counterterrorism operation (2021)]]: https://www.technologyreview.com/2021/03/26/1021318/google-security-shut-down-counter-terrorist-us-ally/
* [[Google shuts down an active counterterrorism operation (2021)]]: https://www.technologyreview.com/2021/03/26/1021318/google-security-shut-down-counter-terrorist-us-ally/
* [[Chinese infiltration into EU parliamentary proceedings (2018)]]

The following were proposed to be added to SCN02:
* Bugging Device found in UN Offices (2004)
* Bugging Devices found in EU Offices (2003)
* Operation Titan Rain (2003-2007)
* U.S. spying on Angela Merkel and other European leaders (2012-2014)
* Spying on G20 delegations using hacked USB sticks in gift bags (2013)


The following examples are to be considered before being created:
The following examples are to be considered before being created:
* [[APT-29 attacks on ministries (2016-2017)]] (scarce information, difficult to fit in a table)
* [[Chinese infiltration into EU parliamentary proceedings (2018)]]
* [[China Telecom internet traffic misdirection (2010-2017)]]
* [[China Telecom internet traffic misdirection (2010-2017)]]
* [[Attempted hack of the OPCW (2018)]] : operation stopped in preparatory phase, not many technical details
* [[Attempted hack of the OPCW (2018)]] : operation stopped in preparatory phase, not many technical details
Line 170: Line 179:
* [[1718 sanctions committee hack (2016)]] : not too well-known
* [[1718 sanctions committee hack (2016)]] : not too well-known
* [[Shamoon 2.0 (2016)]] : similar to Shamoon (2012)
* [[Shamoon 2.0 (2016)]] : similar to Shamoon (2012)
* [[APT-29 attacks on ministries (2016-2017)]] (CCDCOE WIP)
* [[APT Turla hijacking systems of APT-34]] - see https://www.zdnet.com/article/russian-apt-turla-targets-35-countries-on-the-back-of-iranian-infrastructure/
* [[APT Turla hijacking systems of APT-34]] - see https://www.zdnet.com/article/russian-apt-turla-targets-35-countries-on-the-back-of-iranian-infrastructure/



Revision as of 11:59, 9 September 2021

__NUMBEREDHEADINGS__ This page serves as the equivalent of a table of contents in a printed book. It contains an updated list of all substantive articles in the Toolkit.

About the project

Scenarios

Legal concepts

General international law

Specialised regimes of peacetime international law

Use of force, conflict and international law

Real-world examples

Keywords

2007  2008  2010  2011  2012  2014  2015  2016  2017  2018  2019  2020  2021  2022  2023  Advanced persistent threat  Applicability of international law  Article 36  Attack (international humanitarian law)  Attacks against persons  Attribution  Breach of an international obligation  Causation  Combatancy  Computer data  Conduct of hostilities  Countermeasures  Crime of genocide  Crimes against humanity  Critical infrastructure  Cyber weapons  Cybercrime  DDoS  Deception  Defacement  Diplomatic and consular law  Direct participation in hostilities  Distinction  Due diligence  Economic cyber espionage  Effective control  Election interference  Evidence  Example  Flag State jurisdiction  Freedom of navigation  Hospitals  Humanitarian assistance  Hybrid threats  Indiscriminate attack  Individual criminal responsibility under international law  Industrial control system  International armed conflict  International cooperation  International export control law  International human rights law  International humanitarian law  International organization  International sanctions  International telecommunication law  Internationalization  Internet access  Inviolability  Law of the sea  Legal concepts  Legal personality  Legal review of cyber weapons  Legally binding unilateral declarations of States  Malware  Maritime law enforcement  Means and methods of cyber warfare  Medical units  Methods and means of warfare  Military objectives  Misattribution  Mistake of fact  Misuse of established indicators  National position  Neutrality  Non-State actors  Non-international armed conflict  Object  Objects indispensable to the survival of the civilian population  Overall control  Pages transcluding nonexistent sections  Peaceful settlement of disputes  Peacetime cyber espionage  Perfidy and ruses of war  Persona non grata  Plea of necessity  Premises of the mission  Principle of precautions  Prohibition of genocide  Prohibition of intervention  Proportionality  Ransomware  Retorsion  Right to life  Scenario  Self-defence  Sovereign immunity  Sovereignty  Specially protected persons, objects and activities  State organs  State responsibility  Stuxnet  Supply chain  Surveillance  Targeted restrictive measures  Targeting  Threats  Transboundary harm  Use of force  Voluntary norms  War crimes  Weapons review