New Tools To Fight Fake News

Many sites that generate fake news, or DisInfo-disinformation masquerading as truth, share characteristics that distinguish them from journalistic outlets, according to researchers from MIT and the Qatar Computing Research Institute, who incorporated several of those characteristics into a dataset and then trained an algorithm to identify them. 

Their work could help fight a growing problem that many government experts forecast will only get worse.

Facebook, Twitter, and other social media outlets are building teams of fact checkers and supporting nonprofit organisations like First Draft to spot disinformation. But fact checking and verification takes a lot more time than pushing out disinformation. 

Also, fake news doesn’t always match an expected pattern. Russia DisInfo watchers have long observed that a key Kremlin tactic is to validate conspiratorial ideas on both sides of a given political debate (with the exception of gun control, to which they catered exclusively to pro-gun perspectives.)

That’s why fighting DisInfo piece-by-piece is like bailing a boat that’s filling up faster than buckets can handle. What’s worse, research has shown that news readers of all political persuasions become defensive and resistant to the idea that news they’ve accepted is fake, especially if the act of accepting—and then sharing—that news item furthered their standing within a selected social group.

All of this is why fake news spreads faster than accurately sourced articles, including ones that debunk conspiracy theories and disinformation.

“Automatic fact-checking lags behind in terms of accuracy, and it is generally not trusted by human users. In fact, even when done by reputable fact-checking organisations, debunking does little to convince those who already believe in false information,” the researchers write.

Their study, “Predicting Factuality of Reporting and Bias of News Media Sources,” forthcoming in the Proceedings of the 2018 Conference on Empirical Methods in Natural Language, reveals key features of false news web sites that might be less visible to human fact checkers but can tab a bad news source.

Among the features: specific patterns of so-called “function words” that give a more spoken feel to a news article, as opposed to the far more common “content words.” 

Mainstream news editors clamp down fast and hard on too many function words, but fake news sites may not be edited at all. The number and pattern of words that seem to express some sort of sentiment is another easy giveaway, as is the amount of user engagement and shares; linguistic indicators of bias around specific topics, (or bias generally), also work.

If a news site pumps out a lot of articles with a variety and high degree of these linguistic characteristics, you can safely infer that they’re more likely to be publishing “news” that, well, isn’t.

The researchers found that their algorithm, called the Support Vector Machine, could correctly deduce a high, low, or medium level of “factuality” about 65 percent of the time. It could predict right- or left-leaning bias about 70 percent of the time. While not perfect, it’s a big improvement over a raw guess (50 percent). The authors caution that the algorithm would work best with human fact checkers.

The next step, they write, is “characterising the factuality of reporting for media in other languages. Finally, we want to go beyond left vs. right bias that is typical of the Western world and to model other kinds of biases that are more relevant for other regions, e.g., Islamist vs. secular is one such example for the Muslim World.”

Defense One:                Image: Nick Youngson

You Might Also Read:

Google Is Building A Search Engine For Fact Checks

« Canada Says It Was Targeted By Russian Cyber Attacks
#PresidentialAlert: A US National Alert Test »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

techUK

techUK

techUK represents companies operating in the tech sector in the UK. Focus areas cover all aspects of ICT including cyber security.

OneWelcome

OneWelcome

Onegini and iWelcome have merged to become OneWelcome, the largest European Identity Access Management Saas Vendor.

VerifyMe

VerifyMe

VerifyMe is a global technology solutions company delivering brand protection offerings to mitigate counterfeiting, product diversion, and illicit trade.

GuidePoint Security

GuidePoint Security

GuidePoint Security provide information security solutions that enable commercial and federal organizations to more successfully achieve their security and business goals.

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) - Afghanistan

Information System Security Directorate (ISSD) is the Directorate of MCIT responsible for the security of critical information infrastructures in Afghanistan.

Sysdig

Sysdig

With Sysdig teams find and prioritize software vulnerabilities, detect and respond to threats, and manage cloud configurations, permissions and compliance.

SecureMe2

SecureMe2

SecureMe2 ‘s mission is to make organizations more responsive to digital threats by deploying smart technology in a highly accessible way.

Dellfer

Dellfer

Dellfer secures connected cars and other IOT devices through Intrinsic protection, enabling the most sophisticated cybersecurity attacks to be seen instantly and remediated with precision.

Kleiner Perkins

Kleiner Perkins

For five decades, Kleiner Perkins has made history by partnering with some of the most ingenious and forward-thinking founders in technology and life sciences.

Black Hills Information Security (BHIS)

Black Hills Information Security (BHIS)

Black Hills Information Security provide security testing and vulnerability assessment services.

Selectron Systems

Selectron Systems

Selectron offers system solutions for automation in rail vehicles and support in dealing with your railway cyber security challenges.

VCG Group

VCG Group

VCG provides everything you need for the design, implementation and management of data centres, cyber-secure enterprise networks, cloud and connectivity services.

tru.ID

tru.ID

We’re tru.ID, and we're reimagining mobile authentication, one API at a time.

HashDit

HashDit

HashDit products and services focus on helping build a safe ecosystem for both protocol users and smart contract developers on BNB Chain.

ETI-NET

ETI-NET

ETI-NET is the worldwide leader in managing critical data for industries that never stop.

Metrics that Matter (MTM)

Metrics that Matter (MTM)

Metrics that Matter redefines how organizations approach cybersecurity by offering unprecedented insight into the value of their assets to criminals and tailored action plans to protect.