The 'menu' also asks for information if recurring access to the focus on is possible and how long unobserved use of the computer can be preserved. This facts is employed by the CIA's 'JQJIMPROVISE' software package (see below) to configure a list of CIA malware suited to the precise requirements https://milooqnjc.wssblogs.com/35781167/the-smart-trick-of-hbs-case-solution-that-no-one-is-discussing