The 'menu' also asks for details if recurring access to the goal can be done and how much time unobserved usage of the pc can be preserved. This information is used by the CIA's 'JQJIMPROVISE' application (see underneath) to configure a set of CIA malware suited to the specific demands https://elliotyzxtw.pages10.com/new-step-by-step-map-for-pay-someome-to-do-case-study-71197155