The 'menu' also asks for details if recurring access to the goal is possible and how much time unobserved usage of the pc could be managed. This facts is utilized by the CIA's 'JQJIMPROVISE' software program (see below) to configure a list of CIA malware suited to the specific demands https://milopqpmo.mybuzzblog.com/15664220/stanford-case-study-analysis-for-dummies