Global usage for "File:Flag of the African Union.svg"
Jump to navigation
Jump to search
This page shows where a file is used on other wikis. You can also find that information at the bottom of the file description page.
Usage on alternatebritainwiki.miraheze.org
- UEFA Champions League
- Sports broadcasting contracts in the United Kingdom
- List of wars involving the United Kingdom
Usage on altverse.miraheze.org
Usage on ballsdex.miraheze.org
Usage on miraheze.org
- Human rights
- African Union
- G20
- Swahili language
- Indian Premier League
- Central African Republic Civil War
- Sudanese Revolution
- Tigray War
Usage on cyberlaw.ccdcoe.org
- Scenario 01: Election interference
- Sovereignty
- Prohibition of intervention
- State responsibility
- Scenario 03: Cyber operation against the power grid
- Scenario 02: Cyber espionage against government departments
- Use of force
- Due diligence
- Scenario 06: Cyber countermeasures against an enabling State
- International armed conflict
- Non-international armed conflict
- Scenario 13: Cyber operations as a trigger of the law of armed conflict
- Scenario 05: State investigates and responds to cyber operations against private actors in its territory
- Scenario 07: Leak of State-developed hacking tools
- International human rights law
- Scenario 08: Certificate authority hack
- Scenario 09: Economic cyber espionage
- Scenario 11: Sale of surveillance tools in defiance of international sanctions
- Scenario 14: Ransomware campaign
- Scenario 15: Cyber deception during armed conflict
- Scenario 16: Cyber attacks against ships on the high seas
- Attacks against persons
- Scenario 18: Legal status of cyber operators during armed conflict
- Scenario 19: Hate speech
- Scenario 17: Collective responses to cyber operations
- Scenario 23: Vaccine research and testing
- Scenario 21: Misattribution caused by deception
- Scenario 20: Cyber operations against medical facilities
- Scenario 24: Internet blockage
- Scenario 26: Export licensing of intrusion tools
- Scenario 28: Extraterritorial incidental civilian cyber harm
- Proportionality
- Scenario 29: Cyber operations against water and water infrastructure