The 'menu' also asks for information if recurring usage of the target can be done and just how long unobserved access to the computer can be preserved. This facts is employed by the CIA's 'JQJIMPROVISE' program (see underneath) to configure a set of CIA malware suited to the specific demands https://hbrcasesolution03682.azzablog.com/36087829/harvard-case-study-solution-fundamentals-explained