CIA operators reportedly use Assassin like a C2 to execute a series of duties, collect, then periodically mail person information on the CIA Listening Article(s) (LP). Much like backdoor Trojan actions. Equally AfterMidnight and Assassin run on Home windows working program, are persistent, and periodically beacon for their configured LP to either a