Sunday, March 05, 2023 // (IG): BB // Cyber-Roundup// Coffee for Bob
A Private Company Is Using Social Media to Track Down Russian Soldiers
Analyst Comments: The rise of social media platforms has made it easier for fighters in conflicts to share their experiences and locations with the world. As a result, open-source intelligence (OSINT) has become an increasingly valuable tool in tracking foreign fighters and identifying their movements. This technique has been especially effective in the conflict in Ukraine, where private companies like Molfar have emerged as pioneers in using OSINT to locate Russian soldiers and pass the information to Ukrainian intelligence to plan and execute attacks.
FROM THE MEDIA: A Ukrainian military investigations company called Molfar has been using open-source intelligence (OSINT) to track down and target enemy fighters in Ukraine. Molfar's analysts have been constructing target location profiles for Russian and pro-Russian separatist troops using publicly available materials such as social media posts, news reports, and satellite imagery. The company has provided its findings to Ukrainian intelligence, which has used them to plan and execute attacks. Molfar was formed from the due diligence wing of Noosphere, a company specializing in rocket and satellite technology. Its primary enterprise is corporate investigations, but it has diversified its portfolio since the invasion in 2022. The OSINT industry is valued at $5.1 billion in 2021 and is projected to reach $34.9 billion by 2030.
READ THE STORY: FP
Biden Wants to Reboot America’s Cyber Defenses
Analyst Comments: The U.S. government and private sector have faced numerous cyber attacks over the past few years, which have caused significant disruptions and financial losses. These attacks include the 2020 SolarWinds hack, ransomware attacks on the Colonial Pipeline and meat producer JBS, and cyber-attacks by foreign actors, such as Russia, China, Iran, and North Korea. The strategy aims to use all available tools, including diplomatic, financial, and military responses, to disrupt and dismantle the threat actors behind these attacks, as well as invest in new technologies and forge international partnerships to improve the resilience of critical infrastructure and protect against future attacks.
FROM THE MEDIA: The Biden administration has released its National Cybersecurity Strategy, which aims to use all instruments of national power to disrupt and dismantle cyber threat actors. The strategy consists of five key pillars, including defending critical infrastructure, disrupting and dismantling threat actors, shaping market forces to improve resilience, investing in next-generation technologies, and forging international partnerships. The policy reflects a more proactive government approach to defending U.S. cyberspace than in previous administrations, but the key will be convincing corporations and the public of the gravity of the threat. The strategy calls for greater coordination between federal agencies and the private sector to disrupt cyber attackers, as ransomware has become a crucial pillar of cyber defense. Additionally, the strategy lays greater emphasis on the private sector through collaboration and regulation, floating minimum cybersecurity requirements for certain sectors, and greater liability for tech companies that release vulnerable software. Intensifying cooperation with partners and allies will also be key to thwarting cyber adversaries.
READ THE STORY: FP
Chatbots Are Breaking Bad with Messed-Up Responses
Analyst Comments: The prevalence of chatbots in various industries and the competition between big tech companies to develop the best chatbot using machine learning algorithms are discussed in the article. However, there are concerns about the biases and inaccuracies that can be learned and repeated by chatbots since they rely on large datasets of human language. There are also concerns that chatbots may intentionally produce arguments or bad responses to generate controversy and attention. The article provides examples of chatbots producing strange responses and causing monetary losses, as well as efforts to mitigate biases and promote inclusivity in chatbot development.
FROM THE MEDIA: The battle for the best chatbot is in full swing, with companies such as Microsoft, Google, Baidu, Amazon, and others investing billions of dollars into developing their own. OpenAI's ChatGPT, backed by Microsoft, has become the fastest-growing consumer application in history, with 100 million monthly active users just two months after launch. However, chatbots are also causing problems, with some generating biased and even erroneous responses. The onus is on the prompts, as chatbots source their responses from the massive amounts of data collected from humans, which can be biased. OpenAI is working to mitigate bias and create a more inclusive chatbot.
READ THE STORY: Hackernoon
China Is Relentlessly Hacking Its Neighbors
Analyst Comments: According to a cybersecurity alert viewed by WIRED, Chinese-linked hackers were stealing sensitive details and thousands of emails from the Association of Southeast Asian Nations (ASEAN), an intergovernmental body comprising 10 Southeast Asian countries, just before President Joe Biden invited their leaders to the White House to discuss China's influence in the region. Southeast Asia is a crucial region for China, and it is believed that China's state-sponsored hackers are highly active there, with government and military organizations being their primary targets. These hackers are considered to be among the world's most capable and sophisticated.
FROM THE MEDIA: Hackers working on behalf of China stole thousands of emails and sensitive details from the Association of Southeast Asian Nations (ASEAN) in February 2022, just weeks before US President Joe Biden invited the leaders of the 10 ASEAN nations to the White House. The cyberespionage, which was revealed in a cybersecurity alert seen by WIRED, is the third time ASEAN has been compromised since 2019. The cybersecurity alert revealed that the hackers were able to steal “gigabytes” of emails sent by ASEAN countries, amounting to more than 30GB of data. The incident “impacts all ASEAN members due to correspondence that was compromised,” the alert says.
READ THE STORY: WIRED
This Hacker Tool Can Pinpoint a DJI Drone Operator’s Exact Location
Analyst Comments: The researchers were able to reverse engineer the radio signals of DJI drones to decode a radio protocol called DroneID, which was designed to allow governments, regulators, and law enforcement to monitor drones and prevent their abuse. However, the signal is unencrypted and open to anyone who can receive its radio signals, allowing hackers to pinpoint a drone's hidden operator, even if they are miles away. This is particularly concerning given that DJI drones are often used in war zones, where revealing a drone operator's location could make them a target.
FROM THE MEDIA: In response to the challenges of the global economy, many international companies are moving production closer to their customers in a trend known as nearshoring. Chinese companies are following this trend, establishing factories in Mexico to supply Americans with goods such as electronics, clothing, and furniture. This move by Chinese companies to nearshore their production to Mexico reveals that the commercial forces linking the US and China are even more powerful than political tensions. The Mexican state of Nuevo León has been attracting foreign investment and courting Asian companies, such as those from China and South Korea, with a highly skilled workforce and infrastructure. Nuevo León has received nearly $7 billion in foreign investment since October 2021, with Chinese companies responsible for 30% of this investment. Many companies are also demanding that their suppliers set up plants in North America or risk losing their business after the pandemic disrupted the supply chain. Chinese companies such as Lizhong, a manufacturer of automobile wheels, and Man Wah Furniture Manufacturing have established factories in Mexico to take advantage of this trend. The Hofusan Real Estate joint venture, established by a Chinese partner and a corporate lawyer in Monterrey, plans to build a grid of warehouses and factories in the Mexican state. By establishing factories in Mexico and labeling their goods "Made in Mexico," Chinese companies can truck their products into the US duty-free, taking advantage of the expansive North American trade deal.
READ THE STORY: WIRED
Iran agrees to reinstall IAEA cameras at nuclear facilities
Analyst Comments: Iran has agreed to reinstall cameras and monitoring equipment at its nuclear facilities, as reported by the International Atomic Energy Agency (IAEA). The move comes after Iran removed over 20 cameras and equipment from its nuclear plants in 2021, which increased concerns about the country's nuclear program. The IAEA Director-General visited Tehran following leaks in January that particles of uranium enriched to about 84% purity, near weapons grade, were discovered at Iran's Fordow plant. The talks to revive the 2015 nuclear accord between the Biden administration and Iran have been stalled for over a year. Additionally, it's worth noting that hackers can potentially target and access CCTV systems, which raises concerns about the possibility of breaches and tampering with the monitoring equipment at Iran's nuclear facilities.
FROM THE MEDIA: The United Nations’ atomic watchdog, the International Atomic Energy Agency (IAEA), has announced that Iran has agreed to reinstall cameras and other monitoring equipment at its nuclear facilities. This comes after months of mounting western concerns about Iran’s nuclear program. In 2021, Iran removed over 20 cameras and other equipment from its nuclear plants, escalating its standoff with the West. After a two-day visit to Iran, the IAEA Director-General Rafael Mariano Grossi said that Tehran had agreed to reinstall the equipment which is vital for the watchdog’s ability to monitor Iran. A joint statement by the IAEA and Tehran said that Iran would allow the watchdog to implement further appropriate verification and monitoring activities on a voluntary basis. The statement added that Iran had “expressed its readiness” to cooperate on other outstanding “safeguarding issues,” which relate to a longstanding IAEA probe into past nuclear activity at three undeclared sites within the country. Western powers have repeatedly accused the regime of becoming more hostile towards and less cooperative with the watchdog as tensions over Iran’s nuclear program have increased.
READ THE STORY: FT
Like Sputnik, China’s balloon should ignite America’s will to innovate and advance strategic technologies
Analyst Comments: Mentioning nationalism in this context is important because nationalism is often associated with feelings of pride and loyalty towards one's own country and people, which can sometimes lead to negative attitudes towards other countries and people. The mention of nationalism in the article highlights the potential for the public to view the surveillance balloon incident as a threat to national security, which could fuel anti-CCP sentiment and calls for aggressive action against China’s communist leadership.
FROM THE MEDIA: The recent Chinese surveillance balloon and the launch of the Soviet Union's satellite in 1957 have stoked fears of major strategic threats to the United States and have symbolized its vulnerability. While the Chinese balloon itself may not pose a direct security threat, China's intelligence gathering can pose serious security threats. To strengthen strategically important areas of US technology and harden its defenses against foreign intelligence-gathering and cyber hacking, the US should pursue longer-term measures, including increased efforts by the government to work in partnership with US companies to support advanced technologies, hardening its capabilities to protect itself and its networks against cyber intrusions and foreign intelligence penetration, and working closely with like-minded countries to reinforce trusted information networks, data exchanges, and research collaboration. The recent incident can have a positive effect if the US intensifies its efforts to out-compete China in numerous advanced technologies, shifts into a higher gear, and welcomes scientists from many countries, and strengthens its alliances.
READ THE STORY: The Hill
One year later, why do Russians still support the war?
Analyst Comments: There is evidence to suggest that a majority of Russians support Putin's military policy, which includes expansionist actions such as the annexation of Crimea and the ongoing war in Ukraine. Polls conducted by government-backed and independent research centers indicate that approximately 70-74% of Russians support the war in Ukraine, and there was widespread enthusiasm for the annexation of Crimea in 2014. It is unclear, however, whether this support for expansion is a result of Putin's propaganda campaigns or if it is rooted in a deeper cultural and historical desire for Russian dominance and expansionism.
FROM THE MEDIA: Despite significant economic problems and the high number of Russian military casualties, a majority of Russians continue to support the war, leading the author to question why educated individuals would endorse an aggressive conflict with no immediate or strategic benefits. The article suggests that two primary factors contribute to this support: paternalism and the devaluation of human life. Paternalism refers to a long-standing system in Russian history where authorities provide for citizens' needs in exchange for dictating their actions, while the devaluation of human life is a propaganda campaign initiated by Putin that emphasizes Russia's greatness and diverts attention from economic problems and corruption. Putin has established a potent institution of TV propaganda that promotes the right of the strongest installed by Putin as a fundamental principle of power relations in Russian society. The passivity of Russians today is similar to that of the paternalistic society in the past, with individuals delegating decision-making authority to Putin and feeling no responsibility for the outcomes. Instead of supporting a policy, people in Russia support a tzar, with Putin assuming this role in the current spiritless society.
READ THE STORY: ModernDiplomacy
Satellites could beam the poorest nations out of the digital desert
Analyst Comments: The lack of internet access in the world's poorest countries is a significant issue that can limit economic growth, education, and access to information. There is a staggering international connectivity gap that exists between the world's 46 poorest countries and the rest of the world, particularly in Africa where only a quarter of the population can connect to the internet.
FROM THE MEDIA: The UN's International Telecommunication Union has reported that only 36% of the population in the world's poorest countries have access to the internet, compared to more than 90% in the European Union. This digital divide has been highlighted at a UN summit of Least Developed Countries in Doha, where tech giants including Microsoft have pledged to help bridge the gap with low-flying satellites playing a key role. Microsoft has vowed to bring internet access to 100 million Africans by 2025, with satellite coverage playing a significant part in this. Elon Musk's SpaceX and Starlink are also launching thousands of satellites into orbit to compete with land-based fiber broadband.
READ THE STORY: The Japan Times
As the space junk threat grows, governments and investors seek solutions
Analyst Comments: The issue of space debris is a global problem as collisions with debris can cause severe damage or complete destruction of satellites, leading to financial losses, loss of services, and even endangering human lives. Additionally, the debris can trigger a Kessler Syndrome chain reaction, where the amount of debris exponentially increases, making satellite operations and space travel increasingly dangerous. With the increasing number of countries and private companies launching satellites, the risk of collisions and debris generation continues to rise, further emphasizing the need to address the problem of space debris. The potential weaponization of debris to destroy orbits is also a growing concern that needs to be taken into account.
FROM THE MEDIA: The increasing amount of space debris caused by the launch of thousands of commercial satellites is driving up the risk of collisions that could generate swarms of hazardous debris. Governments and private companies are working on ways to tackle the messy orbital environment, with Tokyo-based Astroscale testing a debris removal device called ELSA designed to latch onto defunct satellites and drag them toward Earth's atmosphere for disposal. Meanwhile, US Space Command has released a formal list of responsible space behaviors, including disposing safely of defunct satellites and notifying other operators if any problems with spacecraft might pose a debris hazard. The US government hopes that military norms in orbit will steer towards these responsible behaviors, however, some fear a potential space weapon attack that could generate far more debris. At stake are billions of dollars in assets, including the orbital devices crucial to navigation and smartphone maps, text messaging, calls, and internet connections that are used by industries and people globally.
READ THE STORY: AsiaOne
They sneaked into a derelict arms plant: Instagrammers or spies?
FROM THE MEDIA: Two Russians and a Ukrainian have been arrested in Albania on charges of espionage after they were caught trespassing in an abandoned weapons factory. The three interlopers arrived in a bright orange Chevrolet Camaro and were seen climbing over the back wall in broad daylight. One of the Russians reportedly used a canister of self-defense spray to squirt two guards after he was questioned about what he was doing. The suspects claim they are fans of urban exploration, a pastime that revolves around taking pictures of derelict buildings. The Russian government has sent an urgent request for the extradition of one of the detained Russians, Svetlana Timofeyeva, claiming she is wanted in connection with a 2018 criminal case involving illegal entry into an underground military site in Chekhov. However, her lawyer says she opposes extradition as she had left a clear record on social media against Putin and the war in Ukraine.
READ THE STORY: The New York Times
Maritime Cybersecurity: A Potential Threat to India’s National Security
FROM THE MEDIA: India's maritime sector is crucial for its economy, but with increasing digitalization, there is a growing need for better cybersecurity management systems. The sector is vulnerable to cyber threats, including cyber terrorism, espionage, and activism. Technologies like AIS, ECDIS, GPS, and Industrial Control Systems have enhanced efficiency but are not exempt from cyberattacks. Proper countermeasures and in-depth defense strategies are needed to prevent breaches, and awareness among staff is crucial. Blockchain technology and encryption and authentication measures for AIS and GNSS systems can help improve security. Israel-based Cydome Security offers a cyber solution for securing the maritime IoT ecosystem. AI-driven security systems can help thwart AI-driven threats in real time. Strong cybersecurity is imperative for India to protect against China's growing threat in the Indian Ocean Region.
READ THE STORY: Modern Diplomacy
Now China’s eye on American satellites. Espionage and spying: Now China’s eye on American satellites
FROM THE MEDIA: There are increasing worries that Chinese satellites are spying on other satellites. The Tongshin Jishu Xian Wuxing-3 satellite, launched in July 2020, is an experimental communication satellite operated by the China Academy of Space Technology, with a Ka-band communication payload providing high-speed data transfer services for Chinese government agencies, military organizations, and commercial entities. While China claims that its primary purpose is communication, some experts believe it could be used for military purposes, including satellite-to-satellite espionage. Its unusual movements, including approaching and circling other satellites, have raised suspicions. China has a history of developing anti-satellite capabilities, and the United States has accused it of developing directed-energy weapons, including lasers, to target and disable satellites. The satellite's capabilities and movements have caused some experts to worry about China's intentions in space and the potential for a space-based arms race.
READ THE STORY: Morning Express
Threat Actor TTPs & Cyber Threat Intelligence
FROM THE MEDIA: By analyzing how threat actors operate, businesses can better prepare for potential threats, increase their awareness of potential vulnerabilities, and minimize attack surfaces. TTP-based threat hunting involves identifying common techniques that attackers use, which often remain consistent across different adversaries. The article provides various sources for obtaining TTPs, including honeypots, clear and dark web forums, vendor sources, malware processing, mining unstructured data, and human networking. Flare, a cybersecurity solution that automatically scans dark and clear web sources for cyber threat intelligence and TTPs, is also highlighted. Overall, understanding TTPs is essential for effective cybersecurity management and staying ahead of potential cyber threats.
READ THE STORY: Security Boulevard
Inside the High Risk of Third-Party SaaS Apps
FROM THE MEDIA: A report from Adaptive Shield has revealed that third-party apps connected to Microsoft 365 and Google Workspace pose a significant security risk to organizations. The study discovered that 4,371 apps were connected to both Google Workspace and Microsoft 365 in an average 10,000 SaaS-user company. It also found that 67% of apps connecting to M365 represented a high or medium risk to an organization's SaaS data, while 89% of third-party apps connected to Google Workspace also represented high or medium risks. Such apps may be granted high-risk permissions, allowing them to delete or share proprietary corporate data. Automated tools such as SaaS Security Posture Management platforms are recommended to manage the significant attack surface posed by third-party apps.
READ THE STORY: DARKReading
South American Gold Heist Foiled by Israel
FROM THE MEDIA: Israel has uncovered an illegal gold smuggling operation between Iran and Venezuela, which was used by Iran to provide financial aid to Hezbollah for their terror operations. A Mahan Air flight, sanctioned by the US, was used to transport dozens of kilograms of gold from Venezuela to Tehran in May. The smuggling ring was uncovered through collaboration between the National Bureau for Counter Terror Financing of Israel, the Defence Ministry, the Israel Police, and the Tax Authority. The illicit operation involved the buying of gold in Venezuela and its sale to finance Hezbollah. Security sources have stated that senior Hezbollah officials involved in terrorism are part of the gold trade scheme. Despite the challenge of stopping the financing due to Venezuela's widespread backing, Israel's efforts to stop the gold trade between Caracas and Tehran will continue.
READ THE STORY: TFIGlobal
Attackers Don’t Hack, They Log In
FROM THE MEDIA: LastPass, a password manager, was recently breached due to a vulnerability in third-party software on an employee's personal device. The attacker was able to gain access to LastPass and customer data stored in AWS S3 buckets. This incident highlights the importance of identity and access management in cloud security, as well as the need for continuous monitoring and anomaly detection. To protect critical cloud assets, organizations should take a three-pronged approach: restrict movement, restrict access, and monitor for deviations. This involves gaining a full picture of identities in the cloud, understanding their permissions, locating and classifying data, enforcing least privilege and least access, and continuously monitoring data activity for anomalous access.
READ THE STORY: Security Boulevard
CISA launches Decider to make MITRE ATT&CK more accessible for network defenders
FROM THE MEDIA: NatSec Daily decided to ask ChatGPT some questions about the Biden administration's foreign policy to get some reactions from State, NSC, and USTR comms staffers. The AI's answers were quite verbose, with one answer clocking in at 370 words. However, the responses lacked specificity and were deemed too automated. Spokespersons from the government agencies were not too worried about losing their jobs to the AI, but they acknowledged that the responses did not capture the nuances of their policies. NatSec Daily hopes that they will continue to be the ones making the calls to the agencies in the future, rather than relying on an AI.
READ THE STORY: HelpNetSecurity
Crypto market meltdown affects nation-state actors
FROM THE MEDIA: The Cyber Threat Intelligence (CTI) industry is a term used to describe the skillful use of reason and the act of understanding a corpus of informational phenomena to be useful. Recently, CISA issued an advisory on ongoing ransomware activity against healthcare and public health sector organizations and other critical infrastructure sector entities, in conjunction with the National Intelligence Service of the Republic of Korea and several US agencies. The falling value of cryptocurrencies has forced actors such as North Korea to generate revenue in other ways, and their ransomware campaigns have increased. The government of North Korea is estimated to have funded more than one-third of its weapons program with money stolen through various cyberattacks. As the value of cryptocurrencies falls, North Korea is likely to turn more attention to other forms of income, such as stealing intellectual property. It is crucial to pay attention to the methods and types of threats posed by these actors, as they continue to evolve and pose a heavy drain on resources.
READ THE STORY: Cryptosaurus
How to Solve the Frontrunning Vulnerability in Smart Contracts
FROM THE MEDIA: The "frontrunning vulnerability" in Ethereum smart contracts refers to a situation where transactions that pay higher gas fees are given priority over others, potentially leading to unfair financial rewards for the attacker. This vulnerability is not due to faulty programming, but rather due to the way transactions are ordered and added to a block from the "mempool." Miners are the most likely to watch for transactions with higher gas fees and add their own transactions for an unfair financial reward. To address this vulnerability, there are several strategies that can be employed. One method involves using a transaction counter to lock in the transaction committed by the person who completed the challenge first. Another method involves setting gas limits for all transactions to reduce the preference given to certain transactions. The "submarine-send approach" involves encrypting transaction information to hide it from miners and regular users. Other strategies include using side chains, randomizing the order of transactions, and implementing the Injective Protocol to solve verifiable delay functions.
READ THE STORY: Hackernoon
China boosts defense spending amid 'escalating' US threats
FROM THE MEDIA: China has announced a 7.2% increase in its defense budget for 2023, marking the eighth consecutive year of single-digit percentage point increases. The increase will see military expenditure rise to CNY1.55tn ($224bn), making China's defense budget the world's second-largest. Premier Li Keqiang warned that "external attempts to suppress and contain China is rising." Experts believe that China will use its defense budget to build up its cyber and space capabilities, and its submarine forces, as well as strengthen the new area of cognitive warfare over the Chinese Taipei. The increase comes amid heightened tensions with the US, with both countries trading barbs over the suspected Chinese "surveillance" balloon shot down by US fighter jets.
READ THE STORY: PRESSTV
Big Brother vs Big Tech: Porn hacks the Fed; will Biden's "cyber-strategy" change anything?
FROM THE MEDIA: President Biden launched a national cybersecurity strategy that highlights the need to strengthen defenses around critical infrastructure, bolster software makers’ liability for flawed software, and engage in more Cyber Command disruption campaigns against foreign computer systems and networks. Biden's plan also includes a $39 billion shot-in-the-arm for the creation of a near-nonexistent US chipmaking industry. Meanwhile, lawmakers' latest attempt to ban TikTok from all personal US devices advanced another step in Congress, but actual movement on data privacy came from the FTC, which hit BetterHelp with a $7.8 million fine for sharing sensitive patient data with advertisers while lying to patients about it. The FTC also finalized a $1.5 million settlement with GoodRx, which was sharing patient data with Facebook, Google, and others. Finally, Congress is considering whether to renew the FBI and NSA's ability to spy on US citizens without a warrant, a controversial Section 702 of the Foreign Intelligence Surveillance Act that expires in December.
READ THE STORY: SALON
Items of interest
Why our solar-storm sats corrode – and probably not what you expected
FROM THE MEDIA: Scientists at America's National Institute of Standards and Technology (NIST) and the University of Colorado Boulder's Laboratory for Atmospheric and Space Physics have identified that the water vapor released by thermal blankets, used to control the temperature of instruments onboard satellites, stick to the surface of UV filters. Over time, layers of aluminum oxide are deposited on the surface of the filter, making them cloudy and less effective at absorbing UV light. The team believes that future satellites should have filters containing tubes that block water vapor from their surfaces and be built with layers of carbon to prevent aluminum ions from interacting with hydroxide molecules.
READ THE STORY: The Register
DEF CON 30 - Hack A Sat 3 (Video)
FROM THE MEDIA: Hackasat is a Global Alliance of hackers researchers and enthusiasts working together to secure the future of space that we all depend on for daily life. The first CTF in space moonlighter is set to launch in March 2023 and we will host a hakasat 4 final event on this platform as the first on-orbit competition.
Hacking Satellites with $300 Worth of TV Gear (Video)
FROM THE MEDIA: James Pavur, a Ph.D. student at Oxford University, says satellites are not built for any level of security. Hack-A-Sat is a good step towards getting more people who can apply skills that are probably better than mine to these problems, he says. Pavur: Letting hackers into your system for the sole purpose of having them try to hack it and then reporting the results.
These open-source products are reviewed by analysts at InfoDom Securities, providing possible context about current media trends related to the realm of cyber security. The stories selected to cover a broad array of cyber threats and are intended to aid readers in framing key publicly discussed threats and overall situational awareness. InfoDom Securities does not endorse any third-party claims made in their original material or related links on their sites; the opinions expressed by third parties are theirs alone. For further questions, please contact InfoDom Securities at dominanceinformation@gmail.com.