permits the redirection of all outbound network visitors on the target Laptop or computer to CIA controlled machines for ex- and infiltration purposes. The malware consists of a kernel module that results in a concealed netfilter table over a Linux goal; with knowledge of the desk name, an operator can produce policies that get precedence above cur