????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????????In accordance with WikiLeaks, it analysed malware assaults from the wild and gave "recommendations into the CIA progress teams for even more investigation and PoC improvement for their unique malware projects." It generally co