23 of 23Image
This server can then be used to analyse traffic for "easy 'target' identification". It is thought that combined hardware and software efforts offer similar (or exact) functionality to deep packet inspection.
If the 'target' connects to the Internet through his infected ISP, the software can send a fake iTunes update to the target system. If the user accepts, then full access to the machine is given to the headquarters.