Companies Going To War On Social Media

An increasing number of fraudulent companies are using bots and or fake accounts to run damaging propaganda campaigns against their competitors on social media, according to Lyric Jain, the chief executive of Logically, a British high-tech monitoring firm that uses Artificial Intelligence (AI) software to search social media platforms, including Twitter, Facebook, Instagram and TikTok to find fake news and other disinformation.

Jain says we appear to be “on the cusp of an era” of businesses spreading lies about rivals on social media. Fake information is increasing on social media and many people share an article that they think is true only to discover that it is false and often outdated. 

Jain created his business in 2017, and while its main customers are the British, American and Indian governments, as well as by some leading retail brands, who are asking for help to protect themselves from malicious attacks by rivals. "We are seeing that some of the same practices that have been deployed by nation state actors, like Russia and China, in social media influence operations, are now being adopted by some more unscrupulous competitors of some of the main Fortune 500 and FTSE 100 companies... Attackers are trying to use similar tactics to essentially go to war against them on social media." he said.

One example of fictitious claims includes numerous assertions that 5G mobile networks cause cancer, or even COVID-19, despite there being no scientific evidence to support this claim. This theory is held to be misinformation, because it presents incorrect and out-of-context information as fact.

The main idea behind this false claim is that 5G radio waves are harmful to the brain and cause health issues likes autism or cancer. However, experts have rejected this claim, explaining that 5G radio waves cannot damage the DNA in our cells, nor can they even penetrate past the skin, which acts as a protective barrier.

Jain says that a main attack tactic is the use of fake accounts to "deceptively spread and artificially amplify" negative product or service reviews, both real or made up. In addition, the bots can be used to damage a competitor's wider reputation.

For example, if a retailer has disappointing financial results in a certain three-month period, then an unscrupulous competitor can try to exaggerate their rival's financial woes.

Another British firm that uses AI to monitor social media for misinformation and misinformation on the part of the company’s customers is Factmata, who take a different approach. Its chief executive, Antony Cousins, says that while it can involve humans in surveillance work, AI can be more objective if customers request them. “Our real aim is not to put any human being between AI and the results, or else we risk applying our own biases to the conclusions,” he says. In particular, Cousins says that Factmata’s AI is able to differentiate between lies and satire and humor.

Using technology to combat fake news on social media is a complex issue, says Professor Sandra Wachter, Senior Research Fellow at the at Oxford University's Internet Institute, who says that some humans can also struggle to identify humor. “Given the prevalence and amount of false information and misinformation spreading across the web, it is absolutely understandable that we turn to technologies like AI to tackle this problem,” she says. “AI can be a viable solution to that problem if we have an agreement on what makes counterfeit information removable from the web. Unfortunately, we couldn’t get farther from finding alignment on this.

“Is this content fake or real? What if it’s my opinion? What if it was a joke? And who decides? How should an algorithm deal with it if we humans can’t even agree on the issue. ?”

“In addition, there are many subtleties and nuances in human language that algorithms, and in many cases humans, may not be able to detect. For example research shows that algorithms as well as humans are only able to detect sarcasm and sarcasm 60% of the time.” Wachter commented.

Newsbreak:   CurrentTime:   Times News Network:    Trends:   BeamstartUserwalls:   Business Insider:     BBC:  

You Might Also Read: 

Conversational Commerce Is Going To Be Big - But Could Be Risky:
 

« Two Million Extortion Emails Blocked Every Day
Migrating to the Cloud: Security Risks and Concerns »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Global Knowledge Training

Global Knowledge Training

Global Knowledge is a worldwide leader in IT and business training, featuring Cisco, Microsoft, VMware, IBM, security, cloud computing, and project management.

PeCERT

PeCERT

PeCERT is the national Computer Emergency Response Team for Peru.

Redborder

Redborder

Redborder is an Open Source network visibility, data analytics, and cybersecurity Big Data solution that is scalable up to the needs of enterprise networks and service providers.

Dathena

Dathena

Dathena is a company developing data governance software based on machine learning algorithms.

NTIC Cyber Center

NTIC Cyber Center

NTIC Cyber Center is an organization dedicated to making the National Capital Region (Washington DC) more resilient to cyber-attacks.

Level Effect

Level Effect

Level Effect is developing new capabilities to bring a unique perspective on proactive network defense and advanced security analytics.

Security Engineered Machinery (SEM)

Security Engineered Machinery (SEM)

SEM provides comprehensive end-of-life solutions for the protection of sensitive information in government and commercial markets.

Banshie

Banshie

Banshie is an independent cyber security company with a small team of recognized specialist that are among the best in their field.

iZOOlogic

iZOOlogic

iZOOlogic protects hundreds of the world’s leading brands, across banking, finance and government from cybercrime. We provide strong cyber defence solutions to protect client digital assets.

Guidehouse

Guidehouse

Guidehouse is a leading global provider of consulting services to the public and commercial markets with broad capabilities in management, technology, and risk consulting.

Cyturus Technologies

Cyturus Technologies

Cyturus Technologies delivers cybersecurity business risk quantification services using our proprietary Adaptive Risk Model (ARM).

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries (HII)

Huntington Ingalls Industries is America’s largest military shipbuilding company and a provider of professional services to partners in government and industry.

Neosec

Neosec

We’re reinventing API security. Understanding behavior requires data, analytics, and intelligence. Neosec brings XDR techniques to application security.

Singtel Innov8

Singtel Innov8

Singtel Innov8, the venture capital arm of the Singtel Group, invests in and partners with innovative technology start-ups globally.

Xoriant

Xoriant

Xoriant is a technology leader and execution partner throughout the Build, Run and Transform lifecycle for companies that create and use technology products.

Paperclip

Paperclip

Paperclip provides paperless solutions while enabling compliance and security for the exchange of critical content.