Automated influence and the challenge of cognitive security