Over the last ten years U.S. hacking functions are already ever more dressed up in army jargon to faucet into Division of Protection funding streams.Lately, the CIA dropped control of virtually all its hacking arsenal together with malware, viruses, trojans, weaponized "zero day" exploits, malware remote control units and related documentation. Thi