CIA operators reportedly use Assassin as a C2 to execute a series of tasks, gather, then periodically mail person information for the CIA Listening Put up(s) (LP). Similar to backdoor Trojan behavior. Equally AfterMidnight and Assassin operate on Windows functioning technique, are persistent, and periodically beacon for their configured LP to both