List of articles: Difference between revisions

From International cyber law: interactive toolkit
Jump to navigation Jump to search
Content added Content deleted
(→‎Scenarios: adding hidden references to the new scenarios, trying a 3-column view)
(→‎Real-world examples: three-column view)
Tag: Reverted
Line 111: Line 111:


== Real-world examples ==
== Real-world examples ==
* 2021
2021
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
** [[Colonial Pipeline ransomware attack (2021)]]
** [[Health Service Executive ransomware attack (2021)]]
* [[Colonial Pipeline ransomware attack (2021)]]
** [[Microsoft Exchange Server data breach (2021)]]
* [[Health Service Executive ransomware attack (2021)]]
* [[Microsoft Exchange Server data breach (2021)]]
</div>
<!--** [[Pegasus Project revelations (2021)]] work in progress (NÚKIB)-->
<!--** [[Pegasus Project revelations (2021)]] work in progress (NÚKIB)-->
* 2020
2020
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
** [[African Union headquarters hack (2020)]]
** [[Brno University Hospital ransomware attack (2020)]]
* [[African Union headquarters hack (2020)]]
** [[SolarWinds (2020)]]
* [[Brno University Hospital ransomware attack (2020)]]
* [[SolarWinds (2020)]]
* 2019
</div>
** [[Cyber interference against vessels in the Persian Gulf and Gulf of Oman (2019)]]
2019
** [[Iranian internet blackout (2019)]]
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
** [[Israeli attack against Hamas cyber headquarters in Gaza (2019)]]
* [[Cyber interference against vessels in the Persian Gulf and Gulf of Oman (2019)]]
** [[Russia's sovereign internet (2019 onward)]]
** [[Texas Municipality ransomware attack (2019)]]
* [[Iranian internet blackout (2019)]]
* [[Israeli attack against Hamas cyber headquarters in Gaza (2019)]]
* 2018
* [[Russia's sovereign internet (2019 onward)]]
** [[African Union headquarters hack (2018)]]
* [[Texas Municipality ransomware attack (2019)]]
** [[Olympic Destroyer (2018)]]
</div>
** [[SamSam ransomware incidents (2018)]]
2018
* 2017
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
** [[Ethiopian surveillance of journalists abroad (2017)]]
** [[French presidential election leak (2017)]]
* [[African Union headquarters hack (2018)]]
** [[Hate speech in India (since 2017)]]
* [[Olympic Destroyer (2018)]]
** [[Operation Cloudhopper (2017)]]
* [[SamSam ransomware incidents (2018)]]
</div>
** [[NotPetya (2017)]]
2017
** [[Triton (2017)]]
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
** [[WannaCry (2017)]]
** [[Wu Yingzhuo, Dong Hao and Xia Lei indictment (2017)]]
* [[Ethiopian surveillance of journalists abroad (2017)]]
* [[French presidential election leak (2017)]]
* 2016
** [[DNC email leak (2016)]]
* [[Hate speech in India (since 2017)]]
** [[Industroyer – Crash Override (2016)]]
* [[Operation Cloudhopper (2017)]]
** [[Operation Glowing Symphony (2016)]]
* [[NotPetya (2017)]]
* [[Triton (2017)]]
** [[The Shadow Brokers publishing the NSA vulnerabilities (2016)]]
* [[WannaCry (2017)]]
* 2015
* [[Wu Yingzhuo, Dong Hao and Xia Lei indictment (2017)]]
** [[Bundestag Hack (2015)]]
</div>
** [[Office of Personnel Management data breach (2015)]]
2016
** [[Power grid cyberattack in Ukraine (2015)]]
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
** [[The Hacking Team Hack (2015)]]
* [[DNC email leak (2016)]]
* 2014
** [[Chinese PLA Unit 61398 indictments (2014)]]
* [[Industroyer Crash Override (2016)]]
** [[Sony Pictures Entertainment attack (2014)]]
* [[Operation Glowing Symphony (2016)]]
* [[The Shadow Brokers publishing the NSA vulnerabilities (2016)]]
** [[Steel mill in Germany (2014)]]
</div>
** [[Ukrainian parliamentary election interference (2014)]]
2015
* 2012
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
** [[Shamoon (2012)]]
* [[Bundestag Hack (2015)]]
* 2011
* [[Office of Personnel Management data breach (2015)]]
** [[Caucasus internet outage (2011)]]
* [[Power grid cyberattack in Ukraine (2015)]]
** [[Syria’s ‘social media war’ (since 2011)]]
** [[DigiNotar (2011)]]
* [[The Hacking Team Hack (2015)]]
</div>
* 2010
2014
** [[Hate speech in Myanmar (since early 2010s)]]
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
** [[Stuxnet (2010)]]
** [[SuperMicro supply chain breach (since 2010)]]
* [[Chinese PLA Unit 61398 indictments (2014)]]
* [[Sony Pictures Entertainment attack (2014)]]
* 2008
** [[Georgia-Russia conflict (2008)]]
* [[Steel mill in Germany (2014)]]
* [[Ukrainian parliamentary election interference (2014)]]
** [[Bangladesh internet outage (2008)]]
</div>
* 2007
2012
** [[Cyber attacks against Estonia (2007)]]
* [[Shamoon (2012)]]
** [[Operation Orchard/Outside the Box (2007)]]
2011
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
* [[Caucasus internet outage (2011)]]
* [[Syria’s ‘social media war’ (since 2011)]]
* [[DigiNotar (2011)]]
</div>
2010
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
* [[Hate speech in Myanmar (since early 2010s)]]
* [[Stuxnet (2010)]]
* [[SuperMicro supply chain breach (since 2010)]]
</div>
2008
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
* [[Georgia-Russia conflict (2008)]]
* [[Bangladesh internet outage (2008)]]
</div>
2007
<div style="column-count:3;-moz-column-count:3;-webkit-column-count:3">
* [[Cyber attacks against Estonia (2007)]]
* [[Operation Orchard/Outside the Box (2007)]]
</div>
<!--
<!--



Revision as of 16:30, 19 September 2021

__NUMBEREDHEADINGS__ This page serves as the equivalent of a table of contents in a printed book. It contains an updated list of all substantive articles in the Toolkit.

About the project

Scenarios

Legal concepts

General international law

Specialised regimes of peacetime international law

Use of force, conflict and international law

Real-world examples

2021

2020

2019

2018

2017

2016

2015

2014

2012

2011

2010

2008

2007

National positions

Keywords

2007  2008  2010  2011  2012  2014  2015  2016  2017  2018  2019  2020  2021  2022  2023  Advanced persistent threat  Applicability of international law  Article 36  Attack (international humanitarian law)  Attacks against persons  Attribution  Breach of an international obligation  Causation  Combatancy  Computer data  Conduct of hostilities  Countermeasures  Crime of genocide  Crimes against humanity  Critical infrastructure  Cyber weapons  Cybercrime  DDoS  Deception  Defacement  Diplomatic and consular law  Direct participation in hostilities  Distinction  Due diligence  Economic cyber espionage  Effective control  Election interference  Evidence  Example  Flag State jurisdiction  Freedom of navigation  Hospitals  Humanitarian assistance  Hybrid threats  Indiscriminate attack  Individual criminal responsibility under international law  Industrial control system  International armed conflict  International cooperation  International export control law  International human rights law  International humanitarian law  International organization  International sanctions  International telecommunication law  Internationalization  Internet access  Inviolability  Law of the sea  Legal concepts  Legal personality  Legal review of cyber weapons  Legally binding unilateral declarations of States  Malware  Maritime law enforcement  Means and methods of cyber warfare  Medical units  Methods and means of warfare  Military objectives  Misattribution  Mistake of fact  Misuse of established indicators  National position  Neutrality  Non-State actors  Non-international armed conflict  Object  Objects indispensable to the survival of the civilian population  Overall control  Pages transcluding nonexistent sections  Peaceful settlement of disputes  Peacetime cyber espionage  Perfidy and ruses of war  Persona non grata  Plea of necessity  Premises of the mission  Principle of precautions  Prohibition of genocide  Prohibition of intervention  Proportionality  Ransomware  Retorsion  Right to life  Scenario  Self-defence  Sovereign immunity  Sovereignty  Specially protected persons, objects and activities  State organs  State responsibility  Stuxnet  Supply chain  Surveillance  Targeted restrictive measures  Targeting  Threats  Transboundary harm  Use of force  Voluntary norms  War crimes  Weapons review