Elon Musk Isn't Buying Twitter

Elon Musk is trying to end his $44bn (£36bn) deal to buy Twitter, alleging multiple breaches of the agreement. The announcement is the latest turn in a long-running story after the world's richest person decided to buy Twitter in April. Musk said he has backed out because Twitter failed to provide enough information on the number of spam and fake accounts. 

Twitter says it plans to pursue legal action and to sue Musk to complete the $44bn merger and to enforce the agreement. The original purchase agreement includes a $1bn (£830m) break-up fee. 

The Twitter Board is committed to closing the transaction on the price and terms agreed upon with Mr. Musk, and plans to pursue legal action to enforce the merger agreement. “We are confident we will prevail in the Delaware Court of Chancery." Twitter chairman Bret Taylor wrote in a tweet setting up a potentially long and protracted legal battle between the two sides. 

In May, Musk said the deal was "temporarily on hold" as he was waiting for accurate data on the number of fake and spam accounts on Twitter. Musk had asked for evidence to back the company's assertion that spam and bot accounts make up less than 5% of its total users. 

In a letter to the US Securities and Exchange Commission (SEC) Musk's lawyer said Twitter had failed or refused to provide this information. “Mr. Musk and his financial advisors at Morgan Stanley have been requesting critical information from Twitter as far back as May 9, 2022, and repeatedly since then, on the relationship between Twitter’s disclosed user figures and the prevalence of false or spam accounts on the platform... If there were ever any doubt as to the nature of these information requests, the May 25 Letter made clear that Mr. Musk’s goal was to understand how many of Twitter’s claimed users were, in fact, fake or spam accounts".

That letter noted that “Items 1.03 to 1.13 of the diligence request list contain high-priority requests for enterprise data and other information intended to enable Mr. Musk and his advisors to make an independent assessment of the prevalence of fake or spam accounts on Twitter’s platform…”

The letter then provided Twitter with a detailed list of requests to this effect,” says the letter. "Sometimes Twitter has ignored Mr. Musk's requests, sometimes it has rejected them for reasons that appear to be unjustified, and sometimes it has claimed to comply while giving Mr. Musk incomplete or unusable information," the letter reads. 

Spam accounts are designed to spread information to large numbers of people and manipulate the way they interact with the platform. Twitter has said it removed around 1 million such accounts each day.  Elon Musk clearly believes that spam or bot accounts could account for as many as 20% of Twitter users. Shares in Twitter fell by 7% after the announcement.

SEC:    Twitter:    BBC:     Guardian:    Birmingham Mail:     STV

You Might Also Read: 

Twitter, Free Speech & Disinformation:

 

« Chainalysis Crypto Theft Hotline
Creating A Culture Of Cyber Security Throughout An Organisation »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Tines

Tines

The Tines security automation platform helps security teams automate manual tasks, making them more effective and efficient.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSIRT.CZ

CSIRT.CZ

CSIRT.CZ is the National Computer Security Incident Response Team of the Czech Republic.

SERMA Safety & Security (S3)

SERMA Safety & Security (S3)

SERMA Safety & Security provides a comprehensive cybersecurity offering incorporating Expertise, Evaluation, Consultancy and Training, covering hardware, software and information systems.

Resource Centre for Cyber Forensics (RCCF)

Resource Centre for Cyber Forensics (RCCF)

RCCF is a pioneering institute, pursuing research activities in the area of Cyber Forensics.

CyberGhost

CyberGhost

CyberGhost is a Virtual Private Network services provider offering secure encrypted access to the internet.

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions

CryptoMill Cybersecurity Solutions provides advanced, innovative data security solutions for enterprises, professionals and individuals.

US Secret Service

US Secret Service

The US Secret Service has a pivotal role in securing the nation’s critical infrastructures, specifically in the areas of cyber, banking and finance.

BrandShield

BrandShield

BrandShield is an anti-counterfeiting, anti-phishing and online brand protection solution.

Verificient Technologies

Verificient Technologies

Verificient Technologies specializes in biometrics, computer vision, and machine learning to deliver world-class solutions in continuous identity verification and remote monitoring.

Intechtel

Intechtel

Intechtel is a cyber security company, in addition to providing other internet, technology and telephone services.

Digitale Gründerinitiative Oberpfalz (DGO)

Digitale Gründerinitiative Oberpfalz (DGO)

Digital Founder Initiative Oberpfalz's goal is to build a sustainable start-up culture in the field of digitization throughout the Upper Palatinate district of Bavaria.

PatchAdvisor

PatchAdvisor

PatchAdvisor core services include Vulnerability Assessments/Penetration Testing, Application Vulnerability Assessments, and Incident Response.

Fulcrum Technology Solutions

Fulcrum Technology Solutions

The Fulcrum team of technologists are recognized experts in the fields of IT Infrastructure Technology, Security, Service Management and Support.

Raito

Raito

Raito's unique solution integrates with the data development process and lets data teams monitor, manage, and automate data security across the data stack.

GIS Consulting (GISPL)

GIS Consulting (GISPL)

From General Data Protection Regulations to advanced Network Infrastructure Audits, GIS Consulting has established a reputation as one the leading cyber security companies in the industry.

Equixly

Equixly

Equixly is revolutionizing application security by empowering developers and organizations to build more secure software, elevate their security posture, and stay ahead of emerging threats.

InstaSecure

InstaSecure

InstaSecure’s Preventive Cloud Controls accelerate alert remediation and strengthen cloud configurations. Set your controls once and prevent current and future risks.