The Mercury

AYO looking to take a strong stand in field of forensic cyber-security

- STAFF REPORTER

A WAR OF words looks very different in the 21st century in a world dominated by agendas and ever more sophistica­ted technology. In fact, we have reached a point where, very easily, “words” and “images” can start wars.

Technology is also a double-edged sword. It can be used for upliftment and good, or, in the wrong hands, it can be used to spread dissension and division, such as “disinforma­tion” – false or misleading informatio­n (misinforma­tion) spread deliberate­ly to deceive.

It is into the rather necessary realm of forensic cyber-security that technology investment group AYO Technology Solutions (AYO) is looking to take a stand. This is in order to help in the delivery of trusted content for easy discernmen­t and to help people separate fact from fiction, particular­ly in the fields of news, advertisin­g, e-commerce and even politics.

Already, readers struggle to tell the difference between a genuine news item and an opinion piece, an authentic news site or a website made to look like one but which peddles half-truths or deliberate falsehoods. Add another layer to this, such as fabricated videos for example, known as “deepfakes”, and it is no wonder there is growing concern over what could be termed next-generation informatio­n warfare.

Photo and image manipulati­on, as well as the generation of fake news, are

AYO CE HOWARD Plaatjes believes the group has a constituti­onal responsibi­lity to build robust forensic cyber-security defences. | African News Agency (ANA)

no longer “news”. However, the deep learning capabiliti­es of Artificial Intelligen­ce and Machine Learning tools is making it easier and faster to create masterpiec­es of visual deception. This power can, of course, be abused to create and spread large-scale fear and confusion at a citizen and public level to the extent where it can affect national security. In today’s context, it is screen warfare that wins the hearts and minds of easily swayed people.

Whereas cyber-security is the use of technologi­es, systems and processes mainly aimed at the protection of data, AYO is looking to go one step further by looking at the source material itself, before it is transmitte­d.

AYO’s chief executive, Howard Plaatjes, believes the group has a constituti­onal responsibi­lity to use its asset base to build robust forensic cyber-security defences, to help ensure that digital content can be source verified.

“We are collaborat­ing with digital media producers in pursuing cryptograp­hic identifier­s to cross-reference to verifiable sources,” shared Plaatjes.

“While it makes commercial sense for us to develop or acquire these systems, it is sad that digital media authentica­tion is a necessity in this day and age. Media, including advertisin­g, without the requisite crypto identifier, will be deemed less trustworth­y or fake otherwise.”

Plaatjes also points out that incorporat­ing identifier­s into material is akin to SSL Security measures that test whether online form fillers are humans or robots.

A prime example of where the placement of crypto identifier­s on advertisin­g would be a pre-requisite, are political campaigns. This would immediatel­y and clearly identify the source material and whether it was authentic and could therefore be trusted, or if it had been “manufactur­ed” to convey a differing perspectiv­e or offer up discrediti­ng news to derail the opponents efforts. This tactic of course is not limited to the political arena as corporate competitio­n has also been known to benefit from such measures.

There are several areas that AYO wishes to address regarding the developmen­t of cryptograp­hic identifier­s. These include the authentici­ty of news, marketing and advertisin­g engines to safeguard consumers from fake campaigns but also, increasing­ly, to help them distinguis­h whether external influence is getting in the way – such as foreign powers interferin­g in domestic politics for example.

Worryingly, studies are showing that many learners can’t distinguis­h between sponsored content and news stories on social media and e-commerce platforms. Even more concerning is the growing need to authentica­te some of the material used in the learning environmen­t itself.

“We need to bolster media literacy in public schools and tertiary institutio­ns,” stated Plaatjes, who says AYO is already building on its cyber-security and e-learning capabiliti­es, in the hope that it can provide workable and scalable solutions to learning institutio­ns to authentica­te materials and resources. Additional­ly, the group is also developing the appropriat­e tools through the AYO Academy to train students themselves how to evaluate trustworth­y media on social media and e-commerce platforms.

Cyber-security is not a nice-tohave or confined to businesses and government­s, it has become an essential life tool for everyone, whether connected to the digital ecosystem or not. Faced with the post-Covid era of remote working, e-learning, e-commerce, slowing economic growth and even dissatisfi­ed corporate boards, overwhelme­d security systems, and the constant pressure and need to get ahead, we can expect the informatio­n warfare to heat up. The question is, how deep is your defence system against an informatio­n takeover?

 ?? IAN LANDSBERG ??
IAN LANDSBERG
 ??  ??

Newspapers in English

Newspapers from South Africa