throbber
.=A2AHIK=@AHI
`
`2=CAB$
`
`Business Report
`
`Fake Persuaders
`
`Fake accounts can inflate follower counts, suppress political messages, and run
`
`stealthy social marketing.
`
`by Tom Simonite March 23, 2015
`
`dvertising revenue is soaring at Facebook and Twitter as
`
`A
`
`consensus grows that people can profitably be influenced
`
`by promotional messages woven in between updates from
`
`their friends.
`

`

`
`
`
`But not every commercial enterprise exploiting the persuasive power
`

`
`of social media has set up a corporate account or pays for ads. Fake
`
`accounts operated by low-paid humans or automated software have
`
`become good business, too. They are used to inflate follower counts, to
`
`push spam or malware, and even to skew political discourse. The tactic
`
`appears to be pervasive and growing in sophistication.
`
`On Twitter as many as one in 20 active accounts are fakes. Facebook’s
`
`equivalent number is a little more than one in 100 active users. Software
`
`tools that help you make new accounts in bulk can easily be found or
`
`bought online, says Christo Wilson, an assistant professor at
`
`Northeastern University who has studied the problem of fake accounts.
`
`DJJFI MMMJA?DCOHALEAM?I#!#'B=AFAHIK=@AHI
`
` ' $
`
`Twilio v. TeleSign – IPR2016-01688 | TeleSign Ex.
`Page 1
`
`
`
`2002
`
`

`
`.=A2AHIK=@AHI
`
`2=CA B$
`
`This story is part of our May/June 2015 Issue
`
`See the rest of the issue
`
`Subscribe
`
`One of his students recently tested some of those tools and set up 40
`
`Twitter accounts and 12 Facebook accounts in a single day before the
`
`companies blocked new registrations from that Internet connection.
`
`Simple evasive measures would probably have allowed many more
`
`accounts to be made. Investors closely scrutinize active user counts to
`
`gauge the value and potential of social networks. That encourages sites
`
`to ensure that their security systems don’t block legitimate users, says
`
`Wilson, making it easier for fake accounts to flourish.
`
`Fake accounts are given a veneer of humanity by copying profile
`
`information and photos from elsewhere around the Web. They can gain
`
`fake friends by exploiting human nature and the fact that people on a
`
`social network are often looking for new connections and content.
`
`“Choose a picture of a beautiful woman, and all of a sudden people
`
`accept your friend request,” says Wilson. Celebrities often have large
`
`numbers of fake followers because aping what many real users do is an
`
`easy way to make a fake account look legitimate.
`
`Once a fake account is established, the simplest way to make money
`
`with it is by quickly inflating the numbers of things like followers or
`
`“likes.” It is easy to find sites offering 100,000 new Twitter followers for
`
`DJJFI MMMJA?DCOHALEAM?I#!#'B=AFAHIK=@AHI
`
` ' $
`
`Twilio v. TeleSign – IPR2016-01688 | TeleSign Ex.
`Page 2
`
`
`
`2002
`
`

`
`.=A2AHIK=@AHI
`
`2=CA!B$
`
`as little as $70. Instagram and Facebook “likes” and Pinterest “pins” are
`
`also easily bought. Having more followers or likes helps people and
`
`businesses look good. It can also influence the algorithms used by social
`
`networks or other companies to recommend influential accounts.
`
`Fake accounts have been used in more sophisticated ways to fake social
`
`support for something, and to influence real users to join in. The
`
`accounts are controlled either by software or by paying Internet users in
`
`developing countries a few cents per action.
`
`In 2010, a conservative group in
`
`Iowa used automated accounts to
`
`send messages supporting
`
`Republican candidate Scott Brown’s
`
`attempt to win a Massachusetts seat
`
`in the U.S. Senate. Thanks to
`
`retweets by some real users, the
`
`messages reached an audience of
`
`As social networks
`become more tightly
`coupled to personal
`spending and economic
`activity, incentives grow.
`
`60,000. In Mexico’s 2012 general election, the Institutional
`
`Revolutionary Party used more than 10,000 automated accounts to
`
`swamp online discussion. Both parties won their races, although it’s not
`
`clear what impact these social-media manipulations had.
`
`Recently, automated accounts have been seen staging more commercial
`
`campaigns. A 2014 study of 12 million users of China’s influential Weibo
`
`social network, which is similar to Twitter, found 4.7 million accounts
`
`involved in campaigns that try to manufacture word-of-mouth support
`
`for particular products. Most were automated accounts that amplified
`
`certain messages, mentioning products or services, from people with
`
`large followings (messages likely paid for by the brand behind them).
`
`DJJFI MMMJA?DCOHALEAM?I#!#'B=AFAHIK=@AHI
`
` ' $
`
`Twilio v. TeleSign – IPR2016-01688 | TeleSign Ex.
`Page 3
`
`
`
`2002
`
`

`
`.=A2AHIK=@AHI
`
`2=CA"B$
`
`Also last year, automated tweets were part of a scam that inflated the
`
`value of penny-stock tech company Cynk to $5 billion in just a few days.
`
`Filippo Menczer, a professor at Indiana University, says more
`
`sophisticated “social bots” that engage with other users are probably
`
`active on Twitter and other networks but escaping detection. Research
`
`experiments with such bots have shown that they can successfully gain
`
`social capital and even shape the social connections humans make with
`
`one another, says Menczer.
`
`As social networks become more tightly coupled to personal spending
`
`and wider economic activity, the incentives to use them grow stronger,
`
`Menczer says.
`
`In 2014, the security company Bit-defender picked up a social bot using
`
`names including “Aaliyah” that was stalking men on the casual-dating
`
`app Tinder. Aaliyah would start a simple, scripted conversation, then
`
`ask the victim to play a particular social game, offering her phone
`
`number in exchange. The scam didn’t have a clear business model, but
`
`Bogdan Botezatu, a senior threat analyst at Bitdefender, believes it was
`
`“a test run for something much bigger.”
`
`The Pentagon’s research agency DARPA, which has its own concerns
`
`about what it calls “deception or misinformation campaigns” in social
`
`media, sponsored a contest in which teams of researchers compete to
`
`detect social bots at work in a Twitter-style social feed. Menczer, who
`
`took part, hopes the contest will lead to tools that are better at policing
`
`real social networks. “It’s kind of scary that we don’t know how to detect
`
`these kind of bots and campaigns if they are out there,” he says.
`
`DJJFI MMMJA?DCOHALEAM?I#!#'B=AFAHIK=@AHI
`
` ' $
`
`Twilio v. TeleSign – IPR2016-01688 | TeleSign Ex.
`Page 4
`
`
`
`2002
`
`

`
`.=A2AHIK=@AHI
`
`2=CA#B$
`
`Next in this Business Report
`Persuasive Technology
`
`Consumers encounter technology designed to influence their choices daily. This report describes how
`
`that technology is being created and used by marketers, politicians, lawyers, and others.
`
`01
`
`Technology and
`Persuasion
`
`Persuasive technologies surround us,
`and they’re growing smarter. How do
`these technologies work? And why?
`
`by Nanette Byrnes
`
`02
`
`Persuasive Texting in
`Mozambique
`
`Inspired by trials that used text
`messages to change behaviors, a U.K.
`charity tested whether it could
`persuade HIV-positive people to
`attend their appointments.
`
`by Kristin Majcher
`
`03
`
`New Technologies
`Persuade in Old Ways
`
`Robert Cialdini, an expert in the
`science of persuasion, talks about its
`most modern methods.
`
`by George Anders
`
`04
`
`Pretrial Technology
`
`Lawyers are testing arguments and
`evidence online.
`
`by Nanette Byrnes
`
`DJJFI MMMJA?DCOHALEAM?I#!#'B=AFAHIK=@AHI
`
` ' $
`
`Twilio v. TeleSign – IPR2016-01688 | TeleSign Ex.
`Page 5
`
`
`
`2002
`
`

`
`.=A2AHIK=@AHI
`
`2=CA$B$
`
`Nir Eyal is showing software designers
`how to hook users in four easy steps.
`Welcome to the new era of habit-
`forming technology.
`
`by Ted Greenwald
`
`DJJFI MMMJA?DCOHALEAM?I#!#'B=AFAHIK=@AHI
`
` ' $
`
`Twilio v. TeleSign – IPR2016-01688 | TeleSign Ex.
`Page 6
`
`
`
`2002

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket