For instance, if a State provides hacking tools to an insurgent group operating on another State’s territory that are subsequently employed by the group on its own initiative against the State where the group is based, the mere provision of these tools is insufficient to attribute the group’s operation to the supplying State. Nevertheless, the provision of the hacking tools may itself constitute a violation of international law (see Rule 66 on intervention and 68 on the use of force).