Cambridge Analytica Goes Out Of Business

The closure of Cambridge Analytica will not stop a probe into the firm's handling of millions of people's data, investigators have said.

The firm has been accused of acquiring data from up to 87 million Facebook profiles for use in political campaigns.
Cambridge Analytica closed on Wednesday 2nd May citing a loss of business.

The Information Commissioner's Office (ICO) said its investigation will still "pursue individuals and directors". Damian Collins, chair of the UK House of  Commons select committee for Digital, Culture, Media and Sport (DCMS) tweeted: "Cambridge Analytica and [parent company] SCL Group cannot be allowed to delete their data history by closing. "The investigations into their work are vital."

How the scandal unfolded

17 March: The Observer and the New York Times publish accounts by Cambridge Analytica's ex-employee Christopher Wylie, saying 50 million Facebook accounts were improperly harvested by the company
19 March: Channel of Cambridge Analytica's CEO, Alexander Nix, giving examples of how the firm could swing elections around the world with tactics such as smear campaigns and honey traps. The company denies any wrongdoing
20 March: Alexander Nix is suspended
23 March: The UK's data watchdog is granted a warrant to search Cambridge Analytica's office
27 March: Christopher Wylie appears in front of a committee of UK MPs
4 April: Facebook says it now believes up to 87 million people's data was improperly shared with Cambridge Analytica
10 April: Facebook CEO Mark Zuckerberg is questioned by US lawmakers about the scandal 
17 April: Alexander Nix, the former boss of Cambridge Analytica, refuses to appear before British MPs
26 April: The UK parliamentary committee threatens to issue Mark Zuckerberg with a "formal summons for him to appear when he is next in the UK" as questions remain unanswered 
2 May: Cambridge Analytica announces its closure 

Twitter Also Sold Access to Cambridge Analytica

Since it was revealed that Cambridge Analytica  improperly accessed the personal data of millions of Facebook users, one question has lingered in the minds of the public: What other data did Dr. Aleksandr Kogan gain access to?

Twitter  confirmed to The Telegraph recently that GSR, Kogan’s own commercial enterprise, had purchased one-time API access to a random sample of public tweets from a five-month period between December 2014 and April 2015. Twitter had told Bloomberg that, following an internal review, the company did not find any access to private data about people who use Twitter.

Twitter sells API access into large organisations, or enterprises, for the purposes of surveying sentiment or opinion during various events, or around certain topics or ideas.

A Twitter spokesperson reportedly said that Twitter has also made the policy decision to off-board advertising from all accounts owned and operated by Cambridge Analytica. 

This decision is based on our determination that Cambridge Analytica operates using a business model that inherently conflicts with acceptable Twitter Ads business practices. Cambridge Analytica may remain an organic user on our platform, in accordance with the Twitter Rules.

Obviously, this doesn’t have the same scope as the data harvested about users on Facebook. Twitter’s data on users is far less personal. Location on the platform is opt-in and generic at that, and users are not forced to use their real name on the platform.

Techcrunch:                 BBC

You Might Also Read: 

The Cambridge Analytica Scandal 'highlights need for AI regulation':

The Cambridge Analytica Case Is A Red Herring:

« AI Increases The Risks of Nuclear War
TSB's IT Meltdown Was Evident A Year Before »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Cyber Fusion Center - Maryville University

Cyber Fusion Center - Maryville University

Maryville University Cyber Fusion Center is a virtual lab for working on real-world cyber security challenges.

Australian Cyber Security Growth Network (AustCyber)

Australian Cyber Security Growth Network (AustCyber)

AustCyber brings together businesses and researchers to develop the next generation of cyber security products and services.

TechDefence Labs

TechDefence Labs

TechDefence Labs provide pentesting and security assessment services for networks, web apps, mobile apps and source code reviews.

Cyberbit

Cyberbit

Cyberbit empowers cybersecurity teams to be fully prepared with a product portfolio ready to detect and respond effectively across both IT and OT networks.

SlashNext

SlashNext

The SlashNext Internet Access Protection System (IAPS) provides Zero-Day protection against all internet access threats including Social Engineering & Phishing, Malware, Exploits and Callback Attacks.

Cyberhaven

Cyberhaven

Cyberhaven provides rapid enablement for GDPR and CCPA compliance, streamlined data security and modern risk management.

Prevailion

Prevailion

Prevailion’s technology provides unprecedented visibility into your own network as well as third party partners empowering you to mitigate their compromise before it becomes your own.

Cyan AG

Cyan AG

Cyan provide best-in-class cyber security solutions for mobile Internet and mobile devices that are extremely effective and highly intuitive in their use.

Heidrick & Struggles International

Heidrick & Struggles International

Heidrick & Struggles is a premier provider of leadership consulting and senior-level executive search services for roles including Information & Technology Officers and Cybersecurity.

Bridgeway Security Solutions

Bridgeway Security Solutions

Bridgeway - a fresh approach to information security and risk management. We have proven experience in delivering security solutions around mobility, cloud and security intelligence.

Chess

Chess

Chess is one of the UK’s leading independent and trusted technology service providers offering a range of services including cyber security.

Netstar

Netstar

Netstar is an IT Support company based in Central London providing fully managed IT Support, Cyber Security and Technology Consulting services.