Companies Going To War On Social Media

An increasing number of fraudulent companies are using bots and or fake accounts to run damaging propaganda campaigns against their competitors on social media, according to Lyric Jain, the chief executive of Logically, a British high-tech monitoring firm that uses Artificial Intelligence (AI) software to search social media platforms, including Twitter, Facebook, Instagram and TikTok to find fake news and other disinformation.

Jain says we appear to be “on the cusp of an era” of businesses spreading lies about rivals on social media. Fake information is increasing on social media and many people share an article that they think is true only to discover that it is false and often outdated. 

Jain created his business in 2017, and while its main customers are the British, American and Indian governments, as well as by some leading retail brands, who are asking for help to protect themselves from malicious attacks by rivals. "We are seeing that some of the same practices that have been deployed by nation state actors, like Russia and China, in social media influence operations, are now being adopted by some more unscrupulous competitors of some of the main Fortune 500 and FTSE 100 companies... Attackers are trying to use similar tactics to essentially go to war against them on social media." he said.

One example of fictitious claims includes numerous assertions that 5G mobile networks cause cancer, or even COVID-19, despite there being no scientific evidence to support this claim. This theory is held to be misinformation, because it presents incorrect and out-of-context information as fact.

The main idea behind this false claim is that 5G radio waves are harmful to the brain and cause health issues likes autism or cancer. However, experts have rejected this claim, explaining that 5G radio waves cannot damage the DNA in our cells, nor can they even penetrate past the skin, which acts as a protective barrier.

Jain says that a main attack tactic is the use of fake accounts to "deceptively spread and artificially amplify" negative product or service reviews, both real or made up. In addition, the bots can be used to damage a competitor's wider reputation.

For example, if a retailer has disappointing financial results in a certain three-month period, then an unscrupulous competitor can try to exaggerate their rival's financial woes.

Another British firm that uses AI to monitor social media for misinformation and misinformation on the part of the company’s customers is Factmata, who take a different approach. Its chief executive, Antony Cousins, says that while it can involve humans in surveillance work, AI can be more objective if customers request them. “Our real aim is not to put any human being between AI and the results, or else we risk applying our own biases to the conclusions,” he says. In particular, Cousins says that Factmata’s AI is able to differentiate between lies and satire and humor.

Using technology to combat fake news on social media is a complex issue, says Professor Sandra Wachter, Senior Research Fellow at the at Oxford University's Internet Institute, who says that some humans can also struggle to identify humor. “Given the prevalence and amount of false information and misinformation spreading across the web, it is absolutely understandable that we turn to technologies like AI to tackle this problem,” she says. “AI can be a viable solution to that problem if we have an agreement on what makes counterfeit information removable from the web. Unfortunately, we couldn’t get farther from finding alignment on this.

“Is this content fake or real? What if it’s my opinion? What if it was a joke? And who decides? How should an algorithm deal with it if we humans can’t even agree on the issue. ?”

“In addition, there are many subtleties and nuances in human language that algorithms, and in many cases humans, may not be able to detect. For example research shows that algorithms as well as humans are only able to detect sarcasm and sarcasm 60% of the time.” Wachter commented.

Newsbreak:   CurrentTime:   Times News Network:    Trends:   BeamstartUserwalls:   Business Insider:     BBC:  

You Might Also Read: 

Conversational Commerce Is Going To Be Big - But Could Be Risky:
 

« Two Million Extortion Emails Blocked Every Day
Migrating to the Cloud: Security Risks and Concerns »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

AlgoSec

AlgoSec

The AlgoSec platform enables the world’s most complex organizations to gain visibility, reduce risk and process changes at zero-touch across the hybrid network.

Blueliv

Blueliv

Blueliv is a leading provider of targeted cyber threat information and intelligence. We deliver automated and actionable threat intelligence to protect the enterprise and manage your digital risk.

Trusted Computing Group

Trusted Computing Group

TCG was formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware-based root of trust, for interoperable trusted computing platforms.

Tenfold Software

Tenfold Software

Tenfold is the unique, centralized platform for managing user and permissions efficiently and automatically.

Lumen Technologies

Lumen Technologies

Lumen is an enterprise technology platform that enables companies to capitalize on emerging applications and power the 4th Industrial Revolution (4IR).

QSecure

QSecure

QSecure specializes in the provision of information security and risk management services.

GreyNoise Intelligence

GreyNoise Intelligence

GreyNoise Intelligence is a cyber security company that collects, labels, and analyzes Internet-wide scan and attack data.

CYSEC SA

CYSEC SA

Cysec is equipped to deliver agile security solutions for the most challenging IT infrastructures around the world.

ProcessUnity

ProcessUnity

ProcessUnity is a leading provider of Third-Party Risk Management software, helping companies remediate risks posed by third-party service providers.

Sentinel

Sentinel

Sentinel works with governments, media and defence agencies to help protect democracies from disinformation campaigns by developing a state-of-the-art AI detection platform.

Future Technology Systems Company (FutureTEC)

Future Technology Systems Company (FutureTEC)

FutureTEC is a leading Information Technology Solutions Provider, delivering world-class Information Security, Information Management, and Business Solutions.

Atlantic Data Security

Atlantic Data Security

Atlantic Data Security is skilled in the analysis, recommendation, deployment, and management of all critical components of the security infrastructure.

Avocado Consulting

Avocado Consulting

Avocado helps clients deliver with certainty on their complex IT change, with technology services that automate, monitor and optimise.

V3 Cybersecurity

V3 Cybersecurity

V3 Cybersecurity is a unique company focused on contextualization of security programs from a business perspective. Our mission is to provide enterprise IT Risk Management capabilities.

Securitybricks

Securitybricks

Securitybricks specialize in cloud security and compliance. Our mission is to automate regulatory compliance backed by human validation.

Night Lion Security

Night Lion Security

Night Lion Security provides discreet and bespoke investigation and incident response recovery services.