For example, particular CIA malware discovered in "Calendar year Zero" will be able to penetrate, infest and Command equally the Android cell phone and apple iphone software package that runs or has operate presidential Twitter accounts. The CIA attacks this software package through the use of undisclosed security vulnerabilities ("zero days") poss