.
China
27th March 2018 China sends massive navy for South China Sea war games. The Liaoning carrier group last week traversed the Taiwan Strait. Yesterday at least 40 ships and submarines were flanking the carrier Liaoning in what some analysts described as an unusually large display of the China’s expanding fleet. It is unclear where the flotilla was headed, or how long operations will last. It does seem they want to show inter-fleet interoperability. As the destroyers, frigates and submarines that would ordinarily support a carrier, the flotilla appeared to include a large oiler for re-supply as well as smaller corvettes and possibly fast attack catamarans. As well as Vietnam, China's claims in the South China Sea are disputed by the Philippines, Malaysia and Brunei while Taiwan also has claims. The exercises come amid fresh signs of tension in the resource-rich waterway, with Vietnam recently halting oil exploration off its coast by Spanish firm Repsol under pressure from Beijing. Beijing also objected to a so-called freedom of navigation patrol by a U.S. warship last week close to one of its artificial islands in the Spratlys archipelago further south. (Source: TheSun)
Israel
Friday, March 30, 2018 High alert on Gaza border after string of incursions. Israeli security forces were on heightened alert on the Gaza border ahead of a planned mass demonstration near the frontier. Riots evolved at the border fence near the Gaza strip marked the Palestinian Land Day. 20,000 men, women and children attended the mass rally calling for Palestinian right of return. "The Hamas terror organization uses women and children in a cynical manner, sending them to the fence and threatening their lives." At 10:15 Defense Minister Liberman issued warning to Gaza protestors on Twitter in Arabic: "To residents of Gaza. Hamas leadership is playing with your lives. Anyone who approaches the fence today is putting himself in danger. I recommend that you continue to live your lives and not join in the provocation." IDF prevented border breaches, dispersed violent riots. The IDF stated that over 30,000 people had taken part in the riots and that the IDF snipers used live ammunition only in cases when the fence was about to be breached or when IDF troops were about to be shot at. 15 dead, over a thousand injured after Palestinians clash with IDF on Gaza border. The IDF soldiers used tear gas fired by drones and sniper fire to prevent terrorists from breaching the fence or firing on Israeli troops. In every spot where there were cases of Palestinians attempting to cross or harm the fence IDF troops returned precise fire. (Source: TheJerusalemPost)
Taiwan
March 22, 2018 China should prepare for military action over self-ruled Taiwan and pressure Washington over cooperation on North Korea after the United States passed a law to boost ties with Taiwan. Beijing was infuriated when U.S. President Trump signed legislation last week that encourages the United States to send senior officials to Taiwan to meet Taiwanese counterparts. Beijing has also been upset by Trump's threats to impose trade restrictions on China over its huge trade surplus with the United States. The Global Times said in an editorial China had to "strike back" against the U.S. law, for example by pressuring the United States in other areas of bilateral cooperation, like over North Korea and Iran. "The mainland must also prepare itself for a direct military clash in the Taiwan Straits. It needs to make clear that escalation of U.S.-Taiwan official exchanges will bring serious consequences to Taiwan," said the paper, which is published by the ruling Communist Party's official People's Daily. "This newspaper has suggested that the mainland can send military planes and warships across the Taiwan Strait middle line. This can be implemented gradually depending on the cross-Straits situation," it said. Taiwan sent ships and an aircraft yesterday to shadow a Chinese aircraft carrier group through the narrow Taiwan Strait, its defence ministry said. (Source: Yahoo)
Turkey
March 22, 2018 Turkey’s latest expansion into control over the media. Turkey’s parliament approved a new law yesterday that allows its radio and TV watchdog to vet Internet broadcasts, granting the government the ability to intervene against content by producers including Netflix Inc. The regulation will require online video streaming companies and pay-TV services to apply for a license from the watchdog, known by its Turkish initials RTUK. Courts can block access for Turkish users if the necessary permits aren’t secured. RTUK has become notorious for aggressively handing out penalties or banning broadcasts that it judges to be immoral, inconsistent with Turkish family values, or that stray from the government line on politics. 80 million Turks are increasingly limited in what they’re permitted to see on their computer screens and televisions. Courts and government agencies have repeatedly blocked access to Twitter and YouTube on complaints of content offensive to the nation’s leadership. Online encyclopedia Wikipedia has been blocked since last year. Twitter says that Turkey submits about half of all global requests made to remove tweets. (Source: Bloomberg)
United States
31 March 2018 Scientists have developed an astonishing mind-reading machine which can translate what you are thinking and instantly display it as text. It has an accuracy rate of 90 per cent or more and say that it works by interpreting consonants and vowels in our brains. The device was developed at the University of California and explained in the Journal of Neural Engineering. (Source: DailyMail)
March 27, 2018 Gourley, founder and CEO of Primer, a company that uses software to mine data sources and automatically generate reports for the CIA and other clients, told a conference in San Francisco organized by MIT Technology Review that the next generation of fake news would be far more sophisticated thanks to AI. In recent interviews, Facebook’s CEO, Zuckerberg suggested that the company would use AI to spot fake news. According to Gourley, AI could be used in the service of the opposite goal as well. Gourley noted that the fake news seen to date has been relatively simple, consisting of crude, hand-crafted stories posted to social media at regular intervals. Technology such as Primer’s could easily be used to generate convincing fake stories automatically, he said, and that could mean fake reports tailored to an individual’s interests and sympathies and carefully tested before being released, to maximize their impact. “I can generate a million stories, see which ones get the most traction, double down on those,” Gourley said. Gourley added that fake news has so far been fed into social-media platforms like Facebook essentially at random. A more sophisticated understanding of network dynamics, as well as the mechanisms used to judge the popularity of content, could amplify a post’s effect. “Where you inject information is going to have a massive impact on how it spreads and diffuses,” Gourley said. (Source: TechnologyReview)
March 27, 2018 Rituximab, one of the first monoclonal antibodies approved for use as an anti-cancer. "Getting the immune system to fight cancer is one of the most recent developments in cancer," Lead Researcher Dr. Levy, a Stanford oncology professor. said The treatment is not a true vaccine that creates lasting immunity, but it does feature a vaccine-like injection carrying two immune stimulators that activate the immune system's T cells to eliminate tumors throughout the body. “When we use these two agents together, we see the elimination of tumors all over the body." Each test subject receives a low dose of radiation plus two rounds of the injected agents, Levy said. No chemotherapy is involved. For the current trials, he is only looking for people with low-grade lymphoma regardless if they have been previously treated. He said Stanford is planning on running two trials by the end of the year with a total of about 35 test subjects. Side effects at this point include fever and soreness at the injection site but no vomiting. He said if the FDA does end up granting final approval, he wouldn't expect it any sooner than a year or two from now. While the vaccine approach to cancer is unique, Levy noted that one approved cancer drug for injection already exists for melanoma skin cancer. In 2017, the FDA approved a type of cell therapy for some types of leukemia and lymphoma known as CAR-T where a patient's immune cells are removed from the body, genetically engineered and reintroduced to attack the tumor cells. Levy is a pioneer in the field of cancer immunotherapy having contributed to the development of rituximab, one of the first monoclonal antibodies approved for use as an anti-cancer treatment in humans. (Source: SFGate): https://tinyurl.com/yabmze93
March 26, 2018 The incoming national-security adviser’s worldview. Bolton’s 2007 memoir, 'Surrender is not an option: defending America at the United Nations", chronicles his time in government and his battles against what he views as unwieldy U.S. and global bureaucracies. "Surrender is not an option" is a clearly written book that spells out Bolton’s worldview. Bolton views the UN as “a sounding board for anti-Western and specifically anti-American criticism” and said it is “viewed in America as ineffective at best, and adverse to U.S. interests and deeply corrupt at worst.” Bolton, who served as U.S. ambassador to the UN under Bush, is not exactly wrong. He and others have called for the UN to be reformed because it is a bloated bureaucracy. But his criticism is also rooted in the fact that he views multilateral institutions and treaties as diminishing U.S. strength worldwide. In a world where the U.S. can no longer financially afford to go it alone, that view has critics. One of the few entities Bolton appears to dislike more than the UN and the multilateral institutions it spawned is the European Union. “[W]e cannot ignore the EU’s proclivity to avoid confronting and actually resolving problems, preferring instead the endless process of diplomatic mastication. In certain circumstances, this approach may have its uses, but for the EU, it is essentially now their solution to everything,” he wrote in his book. Bolton believes that the EU engages in a “High Minded” (his capitalization and quotation marks) advocacy for “norms.” He refers to EU diplomats as “EUroids,” and has said they and the U.S. State Department’s “permanent bureaucracy,” another frequent target in the book, share “a disease of the sophisticated”—moral equivalency. Context: the EU, despite its many weaknesses, is now far more developed as a global foreign-policy heavyweight than it was a decade ago. Because EU member states speak with one voice on issues such as Iran, where they have a strong stake after initiating the negotiations that led to the nuclear agreement, the bloc as a whole - and its proclivity for consensus-based diplomacy - is something Bolton will repeatedly run into while serving in his new position. Luckily for him, Trump shares his view of the bloc. Bolton makes clear what he thinks U.S. priorities are and should be and how the United States should execute those priorities. The trouble is, the president’s new national-security adviser seems to expect the rest of the world to act on those priorities as well. (Source: DefenseOne)
March 26, 2018 On April 8, a foreign firm will initiate the first phase in a Federal Communications Commission-mandated overhaul of the national telecoms database that stores and facilitates millions of American phone numbers. The national database, known as the Number Portability Administration Center (NPAC), handles 6 billion calls and texts per day, and if the system fails, no calls at all will be able to be placed. It is being taken over by a foreign-owned firm with a past of breaching U.S. national security clauses banning it from employing foreign workers, such as those tied to China. The first phase of the transition will focus on nine American states in the southeast, as well as Puerto Rico and the U.S. Virgin Islands. iConnectiv, formally known as the Swedish-owned firm Telcordia is the firm responsible for handling the nation-wide transition. Telcordia was caught in 2016 using a Chinese engineer to work on the sensitive database, a violation of national security clauses included in the firm's contract with the U.S. government. The use of foreign workers triggered an FBI investigation, forcing the company to restart its work, a situation that delayed the project for months and cost U.S. taxpayers some $375 million. (Source: TheWashingtonFreeBeacon)
March 22, 2018 Findings of the investigation into China's acts, policies, and practices related to techology transfer, intellectual property, and innovation under Section 301 of the Trade Act of 1974.China relies primarily on a state-led approach to technology development and economic growth. Through an extensive planning system, China identifies certain sectors and technologies for development and fosters national champions to achieve dominance in both domestic and global markets. China’s industrial plans and innovation goals, such as Made in China 2025, aim to provide support and assistance through the use of state resources to Chinese companies and commercial sectors. At the same time, China maintains an extensive state sector and uses state-invested enterprises and other mechanisms as instruments to achieve the government’s economic objectives. China’s policy of “military-civil fusion” calls for the development of integrated information sharing platforms to facilitate science and technology (S&T) resource sharing and collaboration between state laboratories, the PLA, and enterprises. China’s government-directed cyber capabilities exist alongside an institutional framework that provides state-invested enterprises and national champions with privileged access to various forms of Chinese government support and information. Indeed, the U.S. government has evidence that the Chinese government provides competitive intelligence through cyber intrusions to Chinese state-owned enterprises through a process that includes a formal request and feedback loop, as well as a mechanism for information exchange via a classified communication system. In September 2015, then-U.S. President Obama and Chinese President Xi reached a commitment that “neither country’s government will conduct or knowingly support cyber-enabled theft of intellectual property, including trade secrets or other confidential business information, with the intent of providing competitive advantages to companies or commercial sectors.” The United States has been closely monitoring China’s cyber activities since this consensus was reached, and the evidence indicates that cyber intrusions into U.S. commercial networks in line with Chinese industrial policy goals continue. The U.S. Intelligence Community judges that Chinese state-sponsored cyber operators continue to support Beijing’s strategic development goals, including its S&T advancement, military modernization, and economic development. State-sponsored cyber intrusions originating from China into U.S. commercial networks occur alongside China’s institutional framework for promoting its industrial and technological development through a state-led model in which state-owned enterprises and national champions are the recipients of extensive state support. This conduct provides the Chinese government with unauthorized access to intellectual property, trade secrets, or confidential business information, including, but not limited to, technical data, negotiating positions, and sensitive and proprietary internal business communications. China’s activities stand in contrast to domestic and international standards adopted around the world. A report by the Center for Strategic and International Studies (CSIS) and McAfee, found that cybercrime from all sources costs approximately 200,000 jobs annually in the United States. China’s talent acquisition activities are global in their scope and scale, but reportedly have been particularly concentrated in top U.S. universities and Silicon Valley. With support from various government programs and entities, notably the China Association of Science and Technology, Chinese enterprises reportedly have begun establishing “talent bases” in China and the United States to support cutting-edge R&D and the active recruitment of top talent. Chinese companies have reportedly lured top talent from foreign companies by paying well above market compensation - enabled by government financing, direction,and support. (Source: USTR): https://tinyurl.com/y8msqkgv
March 22, 2018 Worries of a potential trade war. Dow falls more than 700 points on trade fears, now back into correction territory. The Trump administration unveiled tariffs designed to punish China for intellectual property theft, imposing about $60 billion in retaliatory charges. (Source: CNBS)
March 21, 2018 High-powered microwave approaches can effect an electronics kill. Neutral-particle beams - such weapons can be “useful in a variety of environments” and have the “advantage of being non-attributable,” meaning that it can be hard to pin an attack with a particle weapon on any particular culprit since it leaves no evidence behind of who or even what did the damage. Like lasers, neutral-particle beams focus beams of energy that travel in straight lines, unaffected by electromagnetic fields. But instead of light, neutral-particle beams use composed of accelerated subatomic particles traveling at near-light speed, making them easier to work with. When its particles touche the surface of a target, they take on a charge that allows them to penetrate the target’s shell or exterior more deeply. This all makes neutral-particle beams attractive as space-based anti-missile systems. The Pentagon first tested the concept in the late 1980s as part of a program called the Neutral Particle Beam. In July, 1989, the program put a neutral-particle beam into orbit as part of a project called the Beam Experiment Aboard a Rocket. (Source: DefenseOne): https://tinyurl.com/yazr3zud
(March 2018)) Machines should do analytics, people should do analysis. Remaking PED for today's intelligence needs. The military gathers untold terabytes of information every day from sensors arrayed in intelligence, surveillance and reconnaissance (ISR) equipment through land, sea, air, and space platforms – everything from satellites, manned aircraft, and drones, to ground-and water-based equipment and human intelligence teams. Since much of this technology was acquired by the services in separate procurement programs, the data is stored in numerous individual repositories, each with its own set of cataloging procedures and proprietary technologies that effectively place this intelligence in silos. As a result, potentially advantageous communications among databases – for example, a fundamental but critical exercise are limited and, when these communications are possible, they are often not timely enough. Advanced analytic capabilities are now much more viable and streamline the collection of data from an expanding variety of sources, including signal intelligence, full-motion video, photos, unstructured text, and social media. Central to these new approaches is the implementation of a data abstraction layer which liberates the data, bringing together and integrating all the data available to an organization, including from outside sources. Just as important, the entirety of the data is available, all at once, for any inquiry. Operationalizing the tenet that machines should do analytics, and people should do analysis is at the core of processing, exploitation, and dissemination (PED) modernization. (Source: DefenseOne): https://tinyurl.com/y7cjttad
Globalization
30 March 2018 Could enemies target undersea cables that link the world? It’s not Moscow’s warfighting ships and submarines that are making NATO and U.S. officials uneasy. It’s Russia’s Main Directorate of Deep Sea Research, whose specialized surface ships, submarines, underwater drones and mini subs conduct reconnaissance, underwater salvage and other work. One ship run by the directorate is the Yantar. It’s a modest, 354-foot oceanographic vessel that holds a crew of about 60. It most recently was off South America’s coast helping Argentina search for a lost submarine. Parlamentskaya Gazeta, the Russian parliament’s publication, last October said the Yantar has equipment “designed for deep-sea tracking” and “connecting to top-secret communication cables.” The publication said that in September 2015, the Yantar was near Kings Bay, Georgia, home to a U.S. submarine base, “collecting information about the equipment on American submarines, including underwater sensors and the unified (U.S. military) information network.” Rossiya, a Russian state TV network, has said the Yantar can not only connect to top-secret cables, but could cut them and “jam underwater sensors with a special system.” (Source: AP)
Mar. 30. 2018 The next generation of nanomedicines. Last month scientists from China’s National Center for Nanoscience and Technology (NCNT) and Arizona State University said they had developed robots a few hundred nanometers across - there are 25 million nanometers in an inch - and when they injected them into the bloodstream of mice, the nanorobots could shrink tumors by blocking their blood supply. The nanorobots were made from sheets of DNA rolled into tubes containing a blood-clotting drug. On the outside, the researchers placed a small DNA molecule that binds with a protein found only in tumors. When the bots reached tumors, this molecule attached to the protein, triggering the DNA tube to unroll and release the drug. The nanorobots only targeted the tumors and didn’t cause clotting elsewhere in the body. (Source: NBCNews): https://tinyurl.com/ydcnnrky
29 May 2018 Google's data archive is almost ten times larger than scandal hit Facebook's. Mr. Curran decided to download both his Facebook and Google archives. Facebook's 600mb, equivalent to roughly 400,000 Word documents, paled in comparison to Google's data file, which was 5.5gb, around the same size as three million Word documents. If you have location tracking turned on via your smartphone, tablet or other connected device and they're switched on, Google stores details of everywhere you've been. What data Google stores on your travels? Every search made - even if it's been cleared from your browser or device history; every event in your Google calendar - including whether you attended; every location you have visited - including how long it took you to get there, how long you stayed and when you left; every image and file you have downloaded. Every file you've ever uploaded to Google Drive - even if they've been deleted; every Google Fit workout you've done; every photo you have taken - including metadata on where and when it was shot; very ad you’ve ever viewed or clicked on; every marketing topic that might interest you - based on factors like your age, gender, location and web activity; every app you’ve ever searched for, installed or launched; every YouTube video you've ever searched for or watched; every email you ever sent or received - including deleted messages and spam. Google records everything you search for on the internet. This is kept on file even when you delete your search or phone history. To delete it permanently, you have to manually access the My Activity log and delete everything. Google builds a marketing profile on you, based on a number of factors. These include details like your location, gender and age, as well as your hobbies and interests. The Google Takeout file also includes a record of all of the information you've uploaded to your Google Drive account. All the computer coding files and websites You'd ever made, as well as Your PGP private encryption key, which had been deleted, used to protect Your e-mails. Google holds information on all the apps and browser extensions you use. This includes how often you use them, where you use them, and who you interact with through them. This can include details like who you talk to on Facebook, what countries they are in and even when you go to sleep. Google knows all of your YouTube browsing history. This can reveal a multitude of personal details about you, ranging from your political and religious beliefs, to mental and physical health issues. If you use Google Fit, the firm also keeps records on every time you workout. Mr Curran's Takeout file includes details of all of the photos he's ever taken with his phone. This was broken down by year and includes metadata on when and where he captured the images. It also included every picture he'd ever searched for or saved. This included every location he's ever searched for or clicked on, every news article he's ever searched for or read, and every google search he'd made since 2009. If you own an iPhone or iPad, the steps to block targeted adverts are relatively simple. Go to Settings, tap Privacy and then scroll down to click on Advertising. From there, swipe the 'Limit Ad Tracking' button. If you choose to leave the 'Limit Ad Tracking' feature off, that means that advertisers can track your browsing behavior by assigning your device a unique ID number, or a Identifier For Advertising. In turn, it will be harder for ad technology companies to track your browsing behavior. If you own an Android phone or tablet, the process is very similar. Open up Settings, navigate to Accounts and Sync, select Google, then Ads and finally, select 'Opt Out of Interest Based Ads.' (Source: Mail)
March 28, 2018 Three users of the Facebook Messenger app sued Facebook, saying the social network violated their privacy by collecting logs of their phone calls and text messages, in the latest legal challenge facing the company. The U.S. lawsuit filed in federal court in the Northern District of California seeks status as a class action on behalf of all affected users and asks for unspecified damages. Facebook, which is reeling from a scandal over its handling of personal data, on March 25, Sunday acknowledged that it had been logging some users' call and text history but said it had done so only when users of the Android operating system had opted in. Facebook said that it does not collect the content of calls or text messages, and that information is securely stored. The data is not sold to third parties. Android is owned by Alphabet Inc's Google, which is not named as a defendant in the suit. (Source: Yahoo)
March 27, 2018 Cambridge Analytica whistleblower Wylie, appearing before a committee of British MPs, said that Facebook has the ability to spy on users in their homes and offices. Not just Facebook, but generally other apps that pull audio, is for environmental context," Wylie said. "So if, for example, you have a television playing versus if you're in a busy place with a lot of people talking versus a work environment." He clarified, "It's not to say they're listening to what you're saying. It's not natural language processing. That would be hard to scale. But to understand the environmental context of where you are to improve the contextual value of the ad itself" is possible. Wylie continued: "There's audio that could be useful just in terms of are you in an office environment, are you outside, are you watching TV?" (Source: PJMedia)
March 26, 2018 Western nations banded together today to expel more than 100 Russian diplomats they accused of being spies, punishing Moscow for its alleged poisoning of an ex-intelligence officer in Britain. President Trump, under constant political heat for his reluctance to challenge Russia, ordered 60 of its diplomats out of the U.S. and shuttered Russia's consulate in Seattle, deeming it a counterintelligence threat. Located on the 25th floor of a large, downtown office building, the consulate is a particular counter-intelligence concern because of its close proximity to a U.S. submarine base and a Boeing Co. facility. Among the 60 Russians expelled were a dozen posted to Russia's mission to the United Nations. At least 21 countries have ousted more than 135 Russians, including 23 kicked out earlier by the U.K. Ukraine, a non-EU country with its own conflicts with Moscow, was expelling 13 Russians. Britain has accused Moscow of using the Soviet-developed nerve agent Novichok to poison Skripal, a former Russian military intelligence officer convicted of spying for the U.K., and his daughter, Yulia, on British soil. The two remain in critical condition and unconscious. The U.S., France and Germany have agreed it's highly likely Russia was responsible. Russia has denied responsibility, while accusing Britain of leading a global charge against it without proof. Russian officials have claimed the poison may have originated in the Czech Republic. (Source: Yahoo)
March 25, 2016 150 million more people would die from air pollution associated with climate change alone in a two-degree-warmer world than in a 1.5-degree-warmer one. We are locking in place a scale of suffering that has no precedent in our history. Paris is very quickly starting to look like Kyoto. The International Energy Agency announced that carbon emissions grew 1.7 percent in 2017, after an ambiguous couple of years optimists hoped represented a leveling off, or peak. Not a single major industrial nation was on track to fulfill the commitments it made in the Paris treaty. There are 195 signatories, of which only the following are considered even “in range” of their Paris targets: Morocco, Gambia, Bhutan, Costa Rica, Ethiopia, India, and the Philippines. In 1997, the Kyoto Protocol extended the 1992 U.N. Framework Convention on Climate Change into a binding international treaty, committing all nations to reduce greenhouse gas emissions to “a level that would prevent dangerous anthropogenic interference with the climate system. ” You don’t hear much about Kyoto anymore. It was completely ineffective; the 20 years that followed the treaty produced more carbon emissions than the 20 years that preceded it, and brought us where we are today, in dire straits. We don’t just need to draw down fossil fuels to stay below two degrees; doing so also requires “negative emissions” - extracting carbon from the atmosphere, essentially buying back some amount of existing fossil-fuel pollution through a combination of technological and agricultural tools. In 2014, the U.N. Intergovernmental Panel on Climate Change - now somewhat outdated, but still more or less the gold-standard single source for big-picture perspective - presented more than 100 modeled scenarios that would keep global temperatures below two degrees of warming. Nearly all of them relied on negative emissions. Negative-emissions technologies have “limited realistic potential” to even slow the increase in concentration of greenhouse gasses in the atmosphere - let alone meaningfully reduce that concentration. Bioenergy carbon capture and storage (BECCS) would require plantations covering two to three times the size of India - a third of the planet’s arable land. (Source: NewYorkMag)
Mar 22 2018 The most important parts of your identity can be sold online for just a few dollars. The content marketing agency Fractl analyzed all the fraud-related listings on three large “dark web” marketplaces - Dream, Point and Wall Street Market - over several days last month. It accessed the dark web through the browser Tor. Facebook logins can be sold for $5.20 each because they allow criminals to have access to personal data that could potentially let them hack into more of an individual’s accounts. T-Mobile: $10.51; Gmail: $1. The credentials to a PayPal account with a relatively high balance can be sold on the dark web for $247 on average, the report found. One’s entire online identity, including personal identification numbers and hacked financial accounts, can be sold for only about $1,200 on the dark web. With 5.3 billion records released due to accidents and 2.6 billion records released due to hacking last year, personal information is becoming cheap. A college student with not a lot of money in the bank might be worth $50. Voter data are also vulnerable and valuable during election season. (Source: MarketWatch)
.