New Law Tackles Digital Ticket Touts

The UK Government has announced that cyber touts caught using specialised software called ‘bots’ to purchase tickets in bulk for re-sale at inflated prices on secondary websites, could soon face unlimited fines.

Bots Ban This Year

The UK Government stated at the end of December that it planned to make this year a great year for music and sports fans by passing new legislation to ban ticket tout bots. The proposed legislation will be designed to deter ticket touts from exploiting automated software to bulk-buy tickets thus bypassing ticket limits imposed by the management team behind the events.

The fact that the UK government has now notified the European Commission is further evidence that it now wants to press ahead with the bots ban as soon as possible.

Digital Economy Act

The UK already has the Digital Economy Act (2017) in place, and the new legislation will be added as a provision to this existing Act. The DEA (2017) already has additional requirements on ticket sellers to provide a bespoke ticket numbering system.

The changes will also mean a revision of the Consumer Rights Act in order to help clarify the restrictions imposed on secondary re-selling of tickets.

Examples

Recent examples of the reason why the government wants to push ahead with the legislation include concert tours by Adele and Ed Sheeran, where bots were used by touts to purchase large quantities of tickets before re-selling them at inflated prices, thereby leaving fans feeling let down and excluded. Also, for the Broadway hit show Hamilton in London’s West End, touts’ use of bots has led to tickets being sold for upward of £6,000.

Live Sport And Music At A Fair And Reasonable Price

The Rt Hon. Matt Hancock MP, the Minister of State for Digital, Culture, Media and Sport, believes this new statutory clampdown will help fans see live sport and music at a fair and reasonable price. He has stated that the government plans to work together with improvements by industry, to help make the market more transparent and improve Britain’s thriving live events scene.

Industry Collaboration – A Future Partnership?

The government hopes that industry can be more innovative to help deal with the ticket tout bot problem. The Department for Digital, Culture, Media & Sport (DCMS) cites pioneering examples from DICE, the UK software giant, using mobile technology to ‘lock-in’ tickets to user accounts to circumvent the possibility of touts acquiring digitally locked tickets.

Well-known musicians who have been hit by touts have also launched a partnership to sell tickets that cannot be sold on at a profit. For example, Twickets.co.uk has support from big names like Ed Sheeran and others.

Also, GUTS, a Dutch start-up is using Blockchain, the technology behind Bitcoin, to create a system that makes it impossible to sell on tickets for a profit. The hope is that a legislative drive, along with industry-based innovation, can help make fans experience of live music and sport more enjoyable and preferably a lot less expensive.

What Does This Mean For Your Business?

The buying-up and re-selling (at hugely inflated prices) of music and sport event tickets has only benefitted the touts and has had a serious downward effect on the profits of promoters, artists and sporting stars as fans have felt disillusioned, ripped-off and abandoned. The image of some major artists (and therefore, the value of their brands) and the loyalty of fans has also been affected because the activities of touts has a rub-off effect on the artists themselves.

This move by the government is an important and long-overdue move in the right direction for the live entertainment industry. Although introducing a change to law in itself will not stop the activity of technology-toting touts overnight, if used in partnership with innovations in the industry such as locked-in tickets and the use of Blockchain technology, and coupled with the very public support for systems where fans can buy tickets at fair prices e.g. Ed Sheeran’s public support for Twickets.co.uk, the activity of touts could be limited. In short, this will benefit the industry and the fans.

Tech Tip – Windows 10: “Print” Documents Straight To PDF

Windows 10 finally lets you “print” documents to PDF, which means that you no longer need to install a third-party app to save a web page or document for use offline. You can now simply select PDF as a printing output option.

To Print to PDF in Windows 10:

  1. Open up your document e.g. in a text editor like Microsoft Word (this actually works from any program that lets you print, not just Word, and not just with a text document).
  2. Click File > Print.
  3. Under Printer or Destination, choose Print as a PDF.

All iPhones, iPads and Macs Affected by 2 Major Bugs – Meltdown and Spectre

Two major security flaws which are present in nearly all modern processors / microchips mean that most computerised devices are potentially vulnerable to attack, including all iPhones, iPads and Macs.

What Security Flaws?

The 2 hardware bugs / flaws in nearly all computer processors made in the last 20 years are known as ‘Meltdown’ and ‘Spectre’. The 2 flaws could make it easier for something like a malicious program to steal data that is stored in the memory of other running programs.

Meltdown

Meltdown, discovered by researchers from Google’s Project Zero, the Technical University of Graz in Austria and the security firm Cerberus Security in Germany, affects all Intel, ARM, and other processors that use ‘speculative execution’ to improve their performance (most of the modern global market). Speculative execution is when a computer performs a task that may not be actually needed in order to reduce overall delays for the task – a kind of optimisation.

Meltdown could, for example, leave passwords and personal data vulnerable to attacks, and could be applied to different cloud service providers as well as individual devices. It is believed that Meltdown could affect every processor since 1995, except for Intel Itanium and Intel Atom before 2013.

Spectre

Spectre, which affects Intel, AMD and ARM (mainly Cortex-A) processors, allows applications to be fooled into leaking confidential information. Spectre affects almost all systems including desktops, laptops, cloud servers, and smartphones.

Apple Systems and Devices Affected

Apple is reported to have said that all Mac systems and iOS devices are affected, although the Apple Watch is not believed to be affected by it.

No Known Exploits Yet

It should be said that researchers have uncovered the existence of the flaws, and while the potential for exploitation is there, there have been no known exploits to date. In the light of the wide publicity that the existence of the flaws has received, this could change.

What’s Being Done?

Intel has announced that that it is working with AMD, ARM, other technology companies and some operating system vendors to find a fix. Intel and ARM are also planning to release patches for the flaws in upcoming software updates from them and operating system makers.

Google has said that the flaw didn’t exist in many of its products, and it has mitigated the issue in those products where it was present. Google has also said that an upcoming browser update (Chrome 64) will offer further protection when it is rolled out on 23 January.

Microsoft has released an emergency patch for all Windows 10 devices with other updates for other Windows versions scheduled for release within days. Amazon is reported to have said that its whole EC2 fleet is now protected.
Apple has issued a partial fix in macOS 10.13.2 and will continue to fix the issue in 10.3.3.

What Does This Mean For Your Business?

It is highly likely that your devices are affected by the flaws because they are hardware flaws at architectural level, more or less across the board for all devices that use processors. The best advice is to install all available patches without delay and make sure that you are receiving updates for all your systems, software and devices.

Although closing hardware flaws using software patches is a big job for manufacturers and software companies, it is the only quick answer to a large-scale problem that has been around but apparently ‘under the radar’ for a long time.

Regular patching is a good basic security habit to get into anyway. Research from summer 2017 (Fortinet Global Threat Landscape Report) shows that 9 out of 10 impacted businesses are being hacked through un-patched vulnerabilities, and that many of these vulnerabilities are 3 or more years old, and there are already patches available for them.

‘Ripple’ Takes Second Place To Bitcoin

As investors look for alternatives to the volatile bitcoin bubble, crypto-currency Ripple has become the second most valuable virtual cash system, followed by ethereum and litecoin.

Bitcoin Bubble Fear Means Ripple Looks Attractive

The media has been full of reports about the steep and rapid rise in the value of the blockchain-powered crypto-currency. From a value of £740 per bitcoin at the beginning of 2017, to in excess of £15,000 in December, falling (with a few bumpy troughs) to £11,000 this week, many investors, spooked by what many see as a bubble have been looking for alternatives.

It is likely to be no coincidence, therefore, that the value of crypto-currency Ripple has risen as bitcoin’s value fell to see it take second place to bitcoin at $2.34 (1.73) per XRP (the name for a single Ripple unit). Although this doesn’t seem to be a large amount, it is much higher than the $0.0065 (just over half a US cent) each unit was worth a year ago.

The crypto-currency of Ripple is now worth $142bn, second in value to bitcoin at $251.4bn, and ahead of ethereum at $100.6bn and litecoin at $13.2bn.

The Ripple

Unlike bitcoin which operates outside of the reach of the banks, Ripple was set up to help banks speed up and modernise how they pay each other. 100 banks, so far, have signed up to use Ripple’s payments system. These sign-ups include big hitters like Bank of America and UBS, Japan’s big credit card companies (for payments and settlement), and some South Korean and Japanese banks (through a pilot project to handle cross-border payments).

Ripple has no real assets or revenue streams to support the rate, and the market is calculated by multiplying the number of XRP coins in existence by the current dollar exchange rate. Also, Ripple XRP coins, unlike e.g. bitcoin, aren’t ‘mined’ by the members of the network that processes the transactions, but have been pre-mined and are slowly released as the network is used.

It is believed, therefore, that the recent adoption of the currency by these banks and credit card companies, and the search for alternatives to the uncertainty of the bitcoin bubble have been the main drivers of the value of Ripple.

Ethereum and Litecoin

Ethereum, the next highest value crypto-currency after Ripple has seen an increase in value of 9,240 % year over year. Litecoin meanwhile, has also seen a rapid and steep rise in value of 5,195 % year over year (Coinbase figures).

The rise in the value of these crypto-currencies also corresponds with the fall in value of bitcoin.

Crypto-Jacking Warning

With the rise in value and popularity of crypto-currencies, experts have warned that there are likely to be more incidents of ‘crypto-jacking’, where people’s devices are taken over by people trying to mine crypto-currencies. Earlier this month, for example, the Android phone-wrecking Trojan malware, dubbed ‘Loapi’, was discovered by Kaspersky researchers. In tests, after running it for several days mining the Minero crypto-currency, the android phone used in the test was overloaded with activity (trying to open about 28,000 unique URLs in 24 hours) to the point that the battery and phone cover were badly damaged and distorted by the resulting heat.

What Does This Mean For Your Business?

The rise of crypto-currencies, such as bitcoin, to the point where it was finally being taken up by investors, businesses and governments, has been filled with high profile ups and downs e.g. a fall in its value on the Tokyo-based Mt. Gox exchange following a hack in late 2013. Predictions of the value being a risky bubble, coupled with a hack of the NiceHash digital currency marketplace’s payment system resulting in the theft of bitcoin to an estimated value of $80m have sent the value of bitcoin downwards again in December. As investors look elsewhere for safer alternatives or the next big thing, and as they become more used to the concept of crypto-currencies, Ripple ethereum and litecoin have benefitted.

Bitcoin has many attractive advantages for businesses such as the speed and ease with which transactions can take place due to the lack of central bank and traditional currency control (Ripple is actually a product of the banks).

Crypto-currencies generally mean easier, faster and more convenient cross-border and global trading, but traditional currencies tend to have the backing of assets or promises of assets of some kind. Crypto-currencies, therefore, tend to be less trusted and more volatile in the markets, and it’s likely there will be many more ups and downs with many different crypto-currencies, although bitcoin has a head start and has weathered storms before. It’s a case of watch this space.

Dodgy Apps in Google Play

Security researchers have discovered 36 fake and malicious apps for Android that can harvest your data and track your location, masquerading as security tools in the trusted Google Play Store.

Hidden

The 36 malicious apps were, on the surface, the kind of security apps that are commonly downloaded by (Android) smartphone users to protect their device and data from cyber attacks and hackers. Ironically, the apps, which had re-assuring names such as Security Defender and Security Keeper, and which performed some legitimate tasks on the surface, such as cleaning junk, saving battery, scanning, and CPU cooling, were found to be hiding malware, adware and even tracking software.

Once the apps were launched, researchers discovered that they would not appear on the device launcher’s list of applications, and the shortcuts would also not be shown on the user’s phone screen.

The malicious app makers are thought to have known that the “hide” function would not work on some devices (e.g. Google Nexus 6P, LGE LG-H525n and ZTE N958St.) because the hide was designed not to run on them. They may also have done this to avoid attracting the attention of Google Play’s inspection / checking system.

False Notifications, Fake Alerts, and Adverts

The fake apps were even found to have been designed to deliver false, often convincing, but sometimes alarming security notifications, warnings and pop-up windows to the user. For example, users would be shown pop-ups to show them that fake security issues had been resolved. Also, if the user installed another app, then it would be reported as suspicious.

Users of these fake apps could also fall victim to an aggressive barrage of advertisements with each action, because the app may have been designed for display and click fraud.

Asked To Sign – But Collecting Data

In some cases, in an abuse of privacy, the malicious apps were found to ask users to sign and agree to an end-user licence agreement (EULA) relating to the information to be gathered and used by the app. In fact, the hidden aspects of these apps were found to be able to collect large amounts of device and user information, such as Android ID, model and brand of the device, screen size, language, location, and data on the other installed apps e.g. Facebook.

Removed

It has been reported that, since the researchers alerted Google to the presence and nature of the apps in December, they have now been removed from Google Play.

Not The First Time

Unfortunately, this isn’t the first time that fake apps have been found in the Google Play Store. Last November, a fake version of WhatsApp, the free, cross-platform instant messaging service for smartphones, was downloaded from the Google Play store by more than one million unsuspecting people before it was discovered to be fake.

What Does This Mean For Your Business?

What is a little shocking about this story is that Google Play is a trusted source for apps, and it is particularly ironic that in this case that users could have downloaded the apps as a security measure to protect them, only to find that they did the opposite.

Although the obvious advice is to always check what you are downloading and the source of the download, the difference between fake apps and real apps can be subtle, and even Google (in this case) didn’t spot the hidden aspects of the apps.

The fact that many of us now store most of our personal lives on our smartphones makes reports such as these all the more alarming. It also undermines our confidence in (and causes potentially costly damage to) the brands that are associated with such incidents e.g. the reputation of Google Play Store.

To minimise the risk of falling victim to damage caused by fake apps, users should check the publisher of an app, check which permissions the app requests when you install it, delete apps from your phone that you no longer use, and contact your phone’s service provider or visit the High Street store if you think you’ve downloaded a malicious / suspect app.
It may also be time for Google Play Store to review its systems and procedures for checking the apps that it offers.

Cloud Companies The Next Big Target For Ransomware

The latest Massachusetts Institute of Technology (MIT) Review has predicted that ransomware targeting cloud services will be one of the biggest cyber-crime threats of this year.

What Is Ransomware?

Ransomware is a form of malware that typically encrypts important files on the victim’s computer. The victim is then given a ransom demand, the payment of which should mean that the encrypted files can be released. In reality, some types of ransomware delete many important files anyway, and paying the ransom does not guarantee that any files will be released.

Huge Data Sources

One of the main reasons why the MIT puts the ransomware aimed at cloud services in the top 6 cyber threats for 2018 is because attacking a single cloud services company can give criminals access to huge amounts of data being stored and handled for multiple companies and organisations.

The MIT predictions, however, point to smaller, more vulnerable cloud providers who are more likely to pay as being a more likely target than the apparently well-protected larger CSPs such as Google, Amazon, and IBM.

Other Big Threats For 2018

Other MIT predictions for more common cyber-crime in 2018 include the targeting of electrical grids, transportation systems and other types of national critical infrastructure, cyber-physical attacks to cause disruption and extort money, and the targeting of old systems in transport modes (planes, trains and ships).

Also, another prediction for increased activity is the hijacking of more computing to mine crypto-currencies, and the resulting (potentially devastating) collateral damage if computing resources at hospitals, airports and other similar locations are targeted.

Evolution of Crime and Protection

The last 3 years have seen a rapid evolution of the threat of things like ransomware. 2016 was a huge year for ransomware attacks globally. For example, Kaspersky Labs estimated that in the 3rd quarter of 2016 a ransomware infection occurred every 30 seconds. Intel Security also reported that infections rose by more than a quarter in the first 3 months of the year.

The massive WannaCry ransomware attack of spring 2017 infected the computers of an estimated 300,000 victims in 150 countries worldwide, many of them large, well-known businesses and organisations (including 16 health service organisations in the UK), and has been a massive Internet and data security wake-up call.

Last year also saw AI used by both attackers and defenders, and MIT predicts that 2018 will see greater machine learning models, neural networks and other AI technologies used on a more regular basis by cyber attackers.

What Does This Mean For Your Business?

Cyber attackers are becoming ever-more sophisticated in their attack methods, using the latest technologies, multi-layered attacks, and the use of social engineering. Ransomware is a popular tool because it is often relatively cheap to create and use, it can spread easily (like WannaCry), the attackers can remain anonymous, and it yields the main motivation for many attacks – financial gain. It stands to reason that CSPs would make an ideal target because of the huge amount of data from many companies that is stored with them.

For individual UK businesses and other organisations, it’s a case of always being on the lookout for suspicious emails and updates, keeping security software up to date and regularly backing up critical data. With GDPR due to come into force in May, there is an even greater motivation to pay attention to data and Internet security, and there is a danger and false economy of staying with old operating systems as long as possible.

In order to provide maximum protection against prevalent and varied threats this coming year, businesses should adopt multi-layered security solutions. Businesses should accept that there is a real likelihood that they will be targeted and therefore prepare for this by implementing the most up to date security solutions, virtual patching and education of employees in order to mitigate risks from as many angles (‘vectors’) as possible.

Having workable and well-communicated Disaster Recovery and Business Continuity Plans in place is now also an important requirement.

Are Screens Causing Short-Sightedness In Young People?

With increasing levels of short-sightedness among young people, some experts have concluded that a young life spent looking at small screens rather than in the great outdoors could be one explanation.

90% Myopic

Studies in East Asia, have shown that a staggering 90% of 18-year-olds, a group that would normally be associated with relatively good eyesight, are suffering from short-sightedness, also known as Myopia.

Also, in Western Europe, studies have shown a rise from 20% to 30% of young (mid-20s) adults being short-sighted to levels of 40% to 50% today.

Natural Sunlight A Key Preventative Factor

Spending too much time in places / situations where there is a lack of natural daylight / direct sunlight is believed by eye experts to be a contributing factor to the development of conditions such as myopia / short-sightedness. This is one of the reasons why experts are focusing (no pun intended) on children’s use of computers, smartphones or tablet computers e.g. to study at home, may go some way to explain the rise in Myopia in young people in recent years.

This has also led some experts to compare the surprisingly high levels of Myopia in East Asian countries with the existence of intensive educational approaches involving technology e.g. very intensive education, spent indoors, out of direct sunlight, studying information close up on computerised devices.

Time Outdoors Is The Key

2008 Research from Sydney Australia, the Sydney Myopia Study (SMS), a population-based study of school-aged children in Sydney, Australia showed that Time spent outdoors was strongly and inversely related to myopia levels. The Sydney-based research showed that only 3% of Chinese-heritage children living in Sydney (who spent two hours a day outdoors) were short-sighted by the age of six. This compared to nearly 30% of six-year-olds in Singapore, and helped to add fuel to the growing body of research and supporters of the idea that the risk of myopia development can be seriously reduced by simply spending more time outdoors e.g. spending two hours per day outdoors, perhaps pursuing sport and leisure activities.

Symptoms of Myopia

Some common symptoms of Myopia to look out for in children include needing to sit near the front of the class to read the board, sitting too close to the television, regular rubbing of the eyes, and suffering from headaches or tired eyes.

Other Ways To Help

Experts suggest that other broad ways to help reduce the chances of children developing Myopia include having a healthy diet, particularly one that includes omega-3 essential fatty acids, and vitamins A, C and E and nutrients, which contribute to the good health of the back of the eye. Also, over-the-counter supplements e.g. those claiming to help brain function and health are good for the eyes too.

What Does This Mean For Your Business?

For businesses where staff use devices for work for many hours of the day, providing information about the risks of looking too long and too intensely at screens could be helpful, as could arranging for some breaks / activities to be spent outdoors in the natural light e.g. perhaps in a team situation / environment and / or with incentives to improve participation.

As parents will know, once a child / young person is used to using their iPad, tablet, it is likely to be very difficult (and potentially damaging to their current social life) to remove it / ban it / reduce its use. Again, informing them of the dangers on a regular basis is important, and / or encouraging and arranging regular outdoor activities e.g. sports clubs or family pursuits / outings may be a good option.

The requirement that young people are proficient at using computerised devices to connect with their peer group and compete effectively with others at school, college, university and work means that the amount of time spent on computerised devices indoors, and consequently the high levels of Myopia development are unlikely to decline soon.

Tech Tip – Currency Converter In The Calculator

If you haven’t already spotted it, the Windows 10 Fall Creators update from last year means that a helpful currency converter is built into the calculator on a Windows 10 PC.

The calculator also now includes converters for time, power, and temperature, so you can easily and quickly convert e.g. from Fahrenheit to Celsius and back again. To use it:

  • Open the Calculator.
  • Click on the menu button on the left.
  • Select what you’d like to convert.

iPhone Deliberate Slowdown: Apple Apology

Tech giant Apple has apologised after it confirmed that long-held customer suspicions that it deliberately slowed down older iPhone models to encourage an upgrade turned to be true.

What Happened?

Some customers had been sharing their concerns online for some time that their iPhone’s performance had slowed with age but had sped up after a battery replacement. This led to a customer sharing comparative performance tests of different models of the iPhone 6S on Reddit, which appeared to support the customer suspicions.

Technology website Geeknebench also shared the results of its own tests of several iPhones running different versions of the iOS operating system where some showed slower performance than others.

After customers concerns mounted and received more press, Apple publicly admitted that it had made changes about a year ago in the iOS 10.2.1 software update that is likely to have been responsible for the slowdown that customers may have experienced in iPhone 6, iPhone 6 Plus, iPhone 6s, iPhone 6s Plus, and iPhone SE.

Motivation Good

Some reports of customer suspicions, comments and speculation had focused on the idea that Apple’s motivation for causing the iPhone slowdown was purely commercial as part of a built-in obsolescence and motivated by profit. Apple, however, has pointed out that its motivations were based on a desire to prolong the life of customer devices by managing their ageing lithium-ion batteries, and to prevent the inconvenience of a sudden and unexpected shutdown.

The Problem With Lithium-Ion Batteries

According to Apple, Lithium-ion batteries need to be managed because they are incapable of supplying peak current demands when in cold conditions, when they have a low battery charge or as they age. The discharging cycle of Lithium-ion batteries (the migration of lithium ions through the material forming the battery) means that they are known to degrade over time.

Regaining Trust

Apple’s admission that it has been slowing down some phones with ageing batteries, and its acknowledgement that customer trust may have been shaken by the episode have led to Apple announcing 3 measures to address customer concerns and regain trust, which are:

  1. A reduction, from December 2017, in the price of out-of-warranty iPhone battery replacements by $50 from $79 to $29 for customers with an iPhone 6 or later whose battery needs to be replaced. N.B. the $29 battery out-of-warranty replacements have been available since 30th December.
  2. An iOS software update, in early 2018, to allow customers to see how their iPhone’s battery is affecting performance.
  3. A pledge that Apple is working on ways to improve how they manage performance and avoid unexpected shutdowns as batteries age.

Legal Action

The announcement that Apple does slow down older phones has, of course, led to legal action being taken against the company by disgruntled customers. For example, Apple has been hit by a class action lawsuit, led by Stefan Bogdanovich and Dakota Speas, which cites “Breach of implied contract” and “Trespass to chattel” as the two complaints. More lawsuits are expected to follow.

What Does This Mean For Your Business?

The idea that Apple may have chosen to keep quiet about something that could be viewed (without an explanation) as secretly taking away performance that somebody has paid for, and only appearing to explain it when challenged by enough customers and tech commentators is likely to have caused some damage to the brand and to customer loyalty.

Some commentators have suggested that greater transparency and an early explanation of the apparently legitimate reasons (helping to mitigate the problem of the diminishing battery) for Apple’s actions may have been a better approach.

Apple is renowned for being able to engender fan-like behaviour in some customers, and for being able to maintain a good a loyal relationship with its customers. This story illustrates how managing customer relationships in an age where information is shared quickly and widely by customers via the Internet involves making smart decisions about transparency and being seen to be up-front with loyal customers.

Lie Detector App

A UK company has developed a lie-detecting app that could be used interviews or other situations where high levels of honesty in (initially) completing forms is required.

Video Combined With Analytics

The London based company, called ‘Human’, founded by Yi Xu, a former investment banker and investment news TV presenter, has a team that includes a data scientist, a micro-expression coder and a psychologist. The company has developed a system that uses video from a mobile device (or CCTV camera) combined with analytics software that can examine a person’s face and thereby determine the most likely emotions being felt at that instant.

The company says that it is able to humanise technology to decipher emotion and characteristics and predict human behaviour. The machine learning aspect of the system is also thought to deliver a better and more accurate understanding of a human’s feelings, emotions, characteristics and personality, with minimum human bias.

How?

The system is able to use a phone video (for example) to capture 172,000 tiny points of an individual’s face, and to use those to read subliminal facial expressions live, and to convert them into a range of deeper emotions and specific characteristic traits in real time.

Why?

The obvious application is a kind of commercial lie-detection system and as a way of getting more from a person’s responses than what is actually said or written by them. The idea is that a person’s reactions to various questions could be more useful than what their answers are, particularly where understanding strengths, weaknesses, and true motivations are concerned. In short, the ‘Human’ system could help companies / organisations with anything from hiring staff to fraud detection to customer satisfaction analysis, and the technology can profile potential customers based on their personality, as analyzed by A.I.

According to ‘Human’, an app of this kind could have real-world applications in:

  • Recruiting and employee retention – finding out about a candidate’s personality, screening candidates by emotional intelligence, and increasing diversity with minimum human bias.
  • Financial fraud detection – insurance claims and loan applications fraud based on subliminal behaviour.
    Customer satisfaction analysis – getting beyond any financial motivation to customer engagement and getting a better understanding of customer experiences.
  • Sales prediction – profiling customer characteristics and behaviour by personality, and predicting purchase behaviour.
  • Security detection – although facial recognition in crowds is already being used, the ‘Human’ system could identify a face in a crowd and detect concerned emotions.
  • Professional sports intelligence – detecting potential players’ characteristics and personality and predicting mental and emotional status before games.
  • Dating EQ – quantify dating partner’s emotional intelligence, and profiling characteristics and personality with empathy level.

Not Just ‘Human’

The ‘Human’ company is not the only company working on new kinds of combined technologies focused on learning more about people. For Example:

  • Utah-based company, Converus, has a product called EyeDetect, which monitors pupil dilation in the human eye to detect truths and lies. The system boasts 86% accuracy – better than a human expert.
  • Researchers at the U.S. National Center for Border Security and Immigration at the University of Arizona and the U.S.
  • The Department of Homeland Security are testing Automated Virtual Agent for Truth Assessments in Real-Time (AVATAR) which is a kiosk based system where a virtual agent asks security questions, then alerts human agents when the kiosk detects lying.
  • Back in July 2016, Toronto startup NuraLogix developed their Transdermal Optical Imaging app software which is able to read different blood flow patterns in the face to reveal different human emotions and thereby detect truth or lies.

AI -The Big Difference

The addition of AI into the technology mix is the element that could help these kinds of technologies to rapidly increase in capabilities and in real-world value e.g. lie detection connected to AI smart glasses or to a video-conferencing system, that can enable detection to take place without anyone but the user knowing about it.

Consent Issues

Capturingand using footage is however likely to present some potential issues based around consent e.g. with GDPR, as well as issues about how responsibly and legally they could be used and monitored in a commercial setting, not to mention issues around privacy and security (storage of profiling results and data used in the systems).

What Does This Mean For Your Business?

So much of the workings of business and the many relationships with all stakeholders is based around contracts (verbal and written), conversations and behaviour that have to rely upon a large element of trust and judgement, without having access to the full picture of true emotions, motivations, personalities, and likely outcomes. These new technologies, supercharged by AI could add value to many different areas of business that are based around decision-making and screening. The result of being able to use them in an affordable and convenient format e.g. apps and easy-to-operate systems, could deliver new insights that could translate into significant competitive advantages.