Browsing: it’s clear that the core elements revolve around both the nature of the threat and the targeted technology. The central point is a suite of hacking tools originally intended for government use