The 'menu' also asks for information if recurring use of the focus on is achievable and just how long unobserved access to the pc can be managed. This data is utilized by the CIA's 'JQJIMPROVISE' program (see below) to configure a set of CIA malware suited to the specific desires https://sethobevf.blogmazing.com/34924310/detailed-notes-on-hbs-case-study-help