If you feel you're already authorized, what are the constraints that you're operating under? How have constraints been established to make sure that any potential offensive cyber-organization would not come into conflict with international law and would adhere to some of those basic principles of distinguishing between military and civilian targets and those kinds of principles?
On January 30th, 2018. See this statement in context.