permits the redirection of all outbound network site visitors to the target computer to CIA controlled machines for ex- and infiltration functions. The malware is made up of a kernel module that results in a concealed netfilter table on a Linux concentrate on; with understanding of the desk title, an operator can develop principles that take preced