TABLE OF CONTENTS Introduction .......................................................................................................................................... 3 I. The protection of sovereignty in cyberspace and violations of the principle of non-intervention .. 4 II. The application of the Law of States Responsibility to activities in the cyberspace ...................... 5 a) Attribution .................................................................................................................................. 5 b) Due diligence .............................................................................................................................. 6 c) Countermeasures ........................................................................................................................ 7 III. Cyber operations and the Use of Force .......................................................................................... 8 a) Cyber operations and Article 2(4) of the UN Charter ................................................................ 8 b) Cyber operations and the exercise of self-defence by States...................................................... 9 c) Cyber operations and the application of International Humanitarian Law ................................ 9 d) Cyber operations and the law of neutrality............................................................................... 10 IV. Human rights in cyberspace ......................................................................................................... 10 V. The role of private stakeholders in cyberspace ............................................................................. 11 VI. International cooperation in the cybersecurity domain ............................................................... 11

Select target paragraph3