Exploration of legal considerations in conducting cybersecurity operations, focusing on surveillance, data acquisition, and the use of intelligence.