Manipulated Data: The Worst Hack of All?

>