List of articles
About the project
Scenarios
Areas of law
General international law and peacetime cyber operations
- Sovereignty
- Due diligence
- Jurisdiction
- State responsibility
- Peacetime cyber espionage
- Non-state actors
- Specialised regimes
- Prohibited intervention
Cyber law of armed conflict (JAB, JIB)
- Jus ad bellum:
- Jus in bello:
- International armed conflict
- Non-international armed conflict
- Criminal responsibility
- Conduct of hostilities - the subtopics can be developed
- Certain persons, objects and activities - again
- Occupation
- Neutrality
Real-world examples
- (...)
- Estonia (2007)
- Georgia (2008)
- Cyber operations in Iraq since 2003
- Stuxnet (2010)
- Ababil (2011–13)
- Shamoon (2012)
- Heartbleed (2014) (what happens when a widespread vulnerability is disclosed)
- Sony pictures hack (2014)
- Sands Casino (2014)
- Steel mill in Germany (2014)
- OPM data breach (2015)
- Bundestag hack (2015)
- Power grid cyberattack in Ukraine (2015)
- DNC email leak (2016)
- Shamoon 2.0 (2016)
- WannaCry (2017)
- NotPetya (2017)
- French elections (2017)
- APT-28
- APT-29
- Unit 61398
- (...)