Deciphering The Implications Of State-Sponsored Cyber Operations For Ir Theory