They protect information about the CIA’s functions in addition to code and other facts of its hacking resources which includes “malware, viruses, trojans, weaponized ‘zero working day’ exploits” and “malware remote control devices”.I believe architectural and scientific fascination in geometry (and Euclid in particular) played a role