The International Group of Experts agreed that cyber operations conducted by non-State actors that are not attributable to States (Rules 15 and 17) do not violate the sovereignty of the State into which they are launched (Rule 4), constitute intervention (Rule 66), or amount to a use of force (Rule 68) because these breaches can be committed only by States.