???????????????????????????????????????????????????????????????????????????????In keeping with WikiLeaks, it analysed malware attacks in the wild and gave "recommendations into the CIA progress groups for further more investigation and PoC growth for their unique malware tasks." It typically contained Evidence-of-Concept Suggestions partly dependin