Some Considerations for Conducting Legal Reviews of U.S. Military Cyber Operations