Companies Going To War On Social Media

An increasing number of fraudulent companies are using bots and or fake accounts to run damaging propaganda campaigns against their competitors on social media, according to Lyric Jain, the chief executive of Logically, a British high-tech monitoring firm that uses Artificial Intelligence (AI) software to search social media platforms, including Twitter, Facebook, Instagram and TikTok to find fake news and other disinformation.

Jain says we appear to be “on the cusp of an era” of businesses spreading lies about rivals on social media. Fake information is increasing on social media and many people share an article that they think is true only to discover that it is false and often outdated. 

Jain created his business in 2017, and while its main customers are the British, American and Indian governments, as well as by some leading retail brands, who are asking for help to protect themselves from malicious attacks by rivals. "We are seeing that some of the same practices that have been deployed by nation state actors, like Russia and China, in social media influence operations, are now being adopted by some more unscrupulous competitors of some of the main Fortune 500 and FTSE 100 companies... Attackers are trying to use similar tactics to essentially go to war against them on social media." he said.

One example of fictitious claims includes numerous assertions that 5G mobile networks cause cancer, or even COVID-19, despite there being no scientific evidence to support this claim. This theory is held to be misinformation, because it presents incorrect and out-of-context information as fact.

The main idea behind this false claim is that 5G radio waves are harmful to the brain and cause health issues likes autism or cancer. However, experts have rejected this claim, explaining that 5G radio waves cannot damage the DNA in our cells, nor can they even penetrate past the skin, which acts as a protective barrier.

Jain says that a main attack tactic is the use of fake accounts to "deceptively spread and artificially amplify" negative product or service reviews, both real or made up. In addition, the bots can be used to damage a competitor's wider reputation.

For example, if a retailer has disappointing financial results in a certain three-month period, then an unscrupulous competitor can try to exaggerate their rival's financial woes.

Another British firm that uses AI to monitor social media for misinformation and misinformation on the part of the company’s customers is Factmata, who take a different approach. Its chief executive, Antony Cousins, says that while it can involve humans in surveillance work, AI can be more objective if customers request them. “Our real aim is not to put any human being between AI and the results, or else we risk applying our own biases to the conclusions,” he says. In particular, Cousins says that Factmata’s AI is able to differentiate between lies and satire and humor.

Using technology to combat fake news on social media is a complex issue, says Professor Sandra Wachter, Senior Research Fellow at the at Oxford University's Internet Institute, who says that some humans can also struggle to identify humor. “Given the prevalence and amount of false information and misinformation spreading across the web, it is absolutely understandable that we turn to technologies like AI to tackle this problem,” she says. “AI can be a viable solution to that problem if we have an agreement on what makes counterfeit information removable from the web. Unfortunately, we couldn’t get farther from finding alignment on this.

“Is this content fake or real? What if it’s my opinion? What if it was a joke? And who decides? How should an algorithm deal with it if we humans can’t even agree on the issue. ?”

“In addition, there are many subtleties and nuances in human language that algorithms, and in many cases humans, may not be able to detect. For example research shows that algorithms as well as humans are only able to detect sarcasm and sarcasm 60% of the time.” Wachter commented.

Newsbreak:   CurrentTime:   Times News Network:    Trends:   BeamstartUserwalls:   Business Insider:     BBC:  

You Might Also Read: 

Conversational Commerce Is Going To Be Big - But Could Be Risky:
 

« Two Million Extortion Emails Blocked Every Day
Migrating to the Cloud: Security Risks and Concerns »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Trusted Computing Group

Trusted Computing Group

TCG was formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.

Cloud Foundry Foundation (CFF)

Cloud Foundry Foundation (CFF)

Cloud Foundry supports the full application development lifecycle, from inception, through all testing stages, to deployment.

Black Duck Software

Black Duck Software

Black Duck Hub allows organizations to manage open source code security as well as license compliance risks.

Odix

Odix

Odix security software neutralizes file embedded targeted cyber attacks before they enter your organization’s network.

Ipsidy

Ipsidy

Our identity platform enables mobile users to more easily authenticate their identity to a mobile phone or portable device of their choosing.

Industrial Networking Solutions (INS)

Industrial Networking Solutions (INS)

INS Services specializes in designing, deploying and providing on-going support for critical OT (Operational Technology) and IIoT (Industrial Internet of Things) networks.

RFA

RFA

RFA is an institutional-quality IT, financial cloud and cyber-security services provider to the financial service and investment management sector.

Optimum Speciality Risks

Optimum Speciality Risks

Optimum Speciality Risks are an experienced team of cyber insurance experts, backed by Lloyds of London.

Mphasis

Mphasis

Mphasis is a leading applied technology services company applying next-generation technology to help enterprises transform businesses globally.

Two Six Technologies

Two Six Technologies

Two Six Technologies delivers R&D, innovation, productization and implementation expertise in cyber, data science, mobile, microelectronics and information operations.

Cornami

Cornami

Cornami delivers real-time computing on encrypted data sets, which is vital for data privacy and cloud security.

LastPass

LastPass

LastPass provides award-winning password and identity management solutions that are convenient, effortless, and easy to manage.

Omega Systems

Omega Systems

Omega Systems is a leading managed service provider (MSP) and managed security service provider (MSSP) to mid-market organizations.

Total Secure Technology

Total Secure Technology

Total Secure Technology provides trusted Managed IT Security and Managed IT Services for organizations looking to increase their cybersecurity defensive posture.

Leaf IT

Leaf IT

Leaf IT are a pioneering cloud-first MSP, dedicated to helping businesses in the UK and Ireland. We focus on delivering tangible results for our clients through IT transformation.

Incode

Incode

Incode is the leading provider of world-class identity solutions that is reinventing the way humans authenticate and verify their identities online.