State A discovers that commander X is a diabetic patient who uses a type of insulin pump that allows a healthcare provider to deliver the commander’s insulin doses through a wireless communications system (i.e., a remote control). In the meantime, State B’s cyber command fails to effectively defend against simultaneous hostile cyber operations launched by State A, which are detailed below. Every time State B’s operatives gain access to a layer of the deceptive platform, they are led to another authentic-appearing environment, losing more time. State B’s cyber command spends a considerable amount of time and resources trying to compromise the fake systems. Although the systems look authentic, they are entirely separate from State A’s actual networks. State A’s operatives set up a complex layered set of fake digital platforms built to lure State B’s cyber operatives to attempt to penetrate State A’s secure military networks ( incident 1). In order to distract and weaken the enemy, State A’s cyber command engages in several discrete deception operations against State B. State A is preparing to launch a major military offensive against State B in region R, which is currently under the control of State B’s forces led by commander X. States A and B are involved in ongoing armed hostilities involving the use of kinetic as well as cyber operations. International armed conflict, international humanitarian law, methods and means of warfare, misuse of indicators, perfidy, ruses of war
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |