New Tools To Fight Fake News

Many sites that generate fake news, or DisInfo-disinformation masquerading as truth, share characteristics that distinguish them from journalistic outlets, according to researchers from MIT and the Qatar Computing Research Institute, who incorporated several of those characteristics into a dataset and then trained an algorithm to identify them. 

Their work could help fight a growing problem that many government experts forecast will only get worse.

Facebook, Twitter, and other social media outlets are building teams of fact checkers and supporting nonprofit organisations like First Draft to spot disinformation. But fact checking and verification takes a lot more time than pushing out disinformation. 

Also, fake news doesn’t always match an expected pattern. Russia DisInfo watchers have long observed that a key Kremlin tactic is to validate conspiratorial ideas on both sides of a given political debate (with the exception of gun control, to which they catered exclusively to pro-gun perspectives.)

That’s why fighting DisInfo piece-by-piece is like bailing a boat that’s filling up faster than buckets can handle. What’s worse, research has shown that news readers of all political persuasions become defensive and resistant to the idea that news they’ve accepted is fake, especially if the act of accepting—and then sharing—that news item furthered their standing within a selected social group.

All of this is why fake news spreads faster than accurately sourced articles, including ones that debunk conspiracy theories and disinformation.

“Automatic fact-checking lags behind in terms of accuracy, and it is generally not trusted by human users. In fact, even when done by reputable fact-checking organisations, debunking does little to convince those who already believe in false information,” the researchers write.

Their study, “Predicting Factuality of Reporting and Bias of News Media Sources,” forthcoming in the Proceedings of the 2018 Conference on Empirical Methods in Natural Language, reveals key features of false news web sites that might be less visible to human fact checkers but can tab a bad news source.

Among the features: specific patterns of so-called “function words” that give a more spoken feel to a news article, as opposed to the far more common “content words.” 

Mainstream news editors clamp down fast and hard on too many function words, but fake news sites may not be edited at all. The number and pattern of words that seem to express some sort of sentiment is another easy giveaway, as is the amount of user engagement and shares; linguistic indicators of bias around specific topics, (or bias generally), also work.

If a news site pumps out a lot of articles with a variety and high degree of these linguistic characteristics, you can safely infer that they’re more likely to be publishing “news” that, well, isn’t.

The researchers found that their algorithm, called the Support Vector Machine, could correctly deduce a high, low, or medium level of “factuality” about 65 percent of the time. It could predict right- or left-leaning bias about 70 percent of the time. While not perfect, it’s a big improvement over a raw guess (50 percent). The authors caution that the algorithm would work best with human fact checkers.

The next step, they write, is “characterising the factuality of reporting for media in other languages. Finally, we want to go beyond left vs. right bias that is typical of the Western world and to model other kinds of biases that are more relevant for other regions, e.g., Islamist vs. secular is one such example for the Muslim World.”

Defense One:                Image: Nick Youngson

You Might Also Read:

Google Is Building A Search Engine For Fact Checks

« Canada Says It Was Targeted By Russian Cyber Attacks
#PresidentialAlert: A US National Alert Test »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IONU Security

IONU Security

IONU offer a security platform focused specifically on providing Data-centric Security.

Galaxkey

Galaxkey

Galaxkey is a data protection product that protects email, documents and any data using access control and an encryption platform.

MIIS Cyber Initiative

MIIS Cyber Initiative

The Cyber Initiative's mission is to assess the impact of the information age on security, peace and communications.

SAMATE

SAMATE

The Software Assurance Metrics And Tool Evaluation project is an inter-agency project between the US Department of Homeland Security and NIST.

Government Communications Headquarters (GCHQ)

Government Communications Headquarters (GCHQ)

GCHQ defends Government systems from cyber threat, provide support to the Armed Forces and strive to keep the public safe, in real life and online.

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium was created to encourage use-inspired research, training and technology awareness in cybersecurity.

LIFARS

LIFARS

LIFARS is a global leader in Digital Forensics and Cyber Resiliency Services.

Cyverse

Cyverse

Cyverse is a cyber-security firm which provides corporations with state-of-the-art cyber-security service-based and technological solutions made in Israel.

Ogasec

Ogasec

Ogasec is a cybersecurity company formed by the merger between Aker and N-Stalker in 2017. Solutions include Security & Connectivity Networking, Application Security, and Managed Security Services.

Invensity

Invensity

INVENSITY is an interdisciplinary technology and innovation consulting company. Centres of excellence include Cyber Security and Data Privacy.

Area 1 Security

Area 1 Security

Area 1 is the only Pay-per-Phish solution in cyber security. And the only technology that blocks phishing attacks before they damage your business.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

Seemplicity

Seemplicity

Seemplicity revolutionizes the way security teams work by automating, optimizing and scaling all risk reduction workflows in one workspace.

Hadrian

Hadrian

Hadrian is modernizing offensive security practices with automation, making them faster and more scalable. Equipped with the hacker’s perspective, companies can now know what their critical risks are.

InnovateHer

InnovateHer

At InnovateHer, our vision is to make the tech sector more equitable, by increasing diversity across the spectrum and creating more inclusive workplaces.

Identifid

Identifid

Identifid offers a suite of fraud prevention and identity authentication solutions to businesses and governments using the latest advances in AI, vision processing, and biometric recognition.