Evaluate at least one key ethical and one key legal challenge pertaining to the United States government engaging in cyberattacks against other nations and entities.
Explain at least one technique that the United States currently utilizes to protect valuable data from potential cyberattacks from other nations and entities.
Analyze whether the technique you explained has any legal, ethical, or moral ambiguities.