

Although the systems look authentic, they are entirely separate from State A’s actual networks. State A’s operatives set up a complex layered set of fake digital platforms built to lure State B’s cyber operatives to attempt to penetrate State A’s secure military networks ( incident 1). In order to distract and weaken the enemy, State A’s cyber command engages in several discrete deception operations against State B.

State A is preparing to launch a major military offensive against State B in region R, which is currently under the control of State B’s forces led by commander X. States A and B are involved in ongoing armed hostilities involving the use of kinetic as well as cyber operations.

International armed conflict, international humanitarian law, methods and means of warfare, misuse of indicators, perfidy, ruses of war
