To exfiltrate data back again towards the CIA or to await even further Recommendations the malware need to communicate with CIA Command & Manage (C2) units placed on Web linked servers. But these types of servers are typically not permitted to carry labeled information and facts, so CIA command and Management systems may also be built unclassified.