[1][sixty eight] Among the many procedures borrowed by UMBRAGE was the file wiping implementation utilized by Shamoon. As outlined by Computer system Planet, several of the techniques and code snippets have already been employed by CIA in its inner projects, whose end result can not be inferred from the leaks. Personal computer World commented that