{"id":43,"date":"2018-05-04T15:08:00","date_gmt":"2018-05-04T15:08:00","guid":{"rendered":"http:\/\/62dc4224-4c74-47c0-b254-86d33640af69"},"modified":"2018-05-04T15:08:00","modified_gmt":"2018-05-04T15:08:00","slug":"tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\/","title":{"rendered":"Tales of the scary data lifecycle: Cambridge Analytica and Emerdata"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/r\/2018\/05\/04\/fbf2a105-2666-4820-8b7e-53fbe5feb8ea\/thumbnail\/770x578\/2967bdda8d27d3c7efc56688915b0664\/image-2018-05-04-at-11-07-11-am.jpg\" class=\"ff-og-image-inserted\"\/><\/div>\n<p><em>Video: A violation of trust: Where Facebook and Cambridge Analytica went wrong<\/em><\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"><span class=\"int\">More security news<\/span><\/h3>\n<\/div>\n<p>When salacious tales of <a href=\"https:\/\/www.zdnet.com\/article\/how-cambridge-analytica-used-your-facebook-data-to-help-elect-trump\/\" target=\"_blank\">Cambridge Analytica&#8217;s activities<\/a> emerged in 2018, we thought the company was finished. The many on-air discussions of illegal activities, law enforcement warrants, legal action threats from partners, and questionable ethics had appeared to doom them. We then saw multiple suspensions and resignations, and on May 2, 2018 Cambridge Analytica announced it would file for bankruptcy. For a brief moment, it seemed like the world was a better place: The &#8220;good team&#8221; had won, the evil doers were vanquished, and the world was moving on.<\/p>\n<p><strong>Read also: <a href=\"https:\/\/www.zdnet.com\/article\/facebook-confirms-cambridge-analytica-took-more-data-than-first-thought\/\">Facebook: Cambridge Analytica took a lot more data than first thought<\/a><\/strong><\/p>\n<p>Of course, this wasn&#8217;t actually the case. Instead&#8230;<\/p>\n<h3>21ST CENTURY MONSTERS ARE FILING PAPERWORK AS CORPORATIONS<\/h3>\n<p>The victory celebration was short-lived. On the heels of the bankruptcy news, we learned that Emerdata &#8212; a company founded in 2017 &#8212; was using the same address as Cambridge Analytica&#8217;s parent company SCL. So, in continuing proof that we might be living in the darkest timeline possible, Emerdata is listing the chairman of Frontier Services Group as one of its directors, and his lineage dates back to Blackwater. Is this a nod to the rebranding efforts of the infamous private security firm? Does Emerdata want you to forget about its evil past? Most definitely yes. Not only is Cambridge Analytica rising from the dead (like a zombie), it&#8217;s rising with enhanced predator capabilities (like a vampire). A vampire with legal paperwork and tax documentation prepared and filed, that is.<\/p>\n<h3>WE&#8217;RE WITNESSING THE DANGER OF THE SCARY DATA LIFECYCLE<\/h3>\n<p>When you collect data, and then build platforms and business models that monetize that data, you risk losing control of the data. Companies might use that information for good, perhaps making medical advances, and other companies might use it for evil. To make this as clear as possible &#8212; no matter how much evil Cambridge Analytica did with the data it obtained from Facebook, Facebook is in way more trouble. We outline the dangers of the scary data lifecycle in our <a href=\"https:\/\/www.forrester.com\/report\/The+Future+Of+Cybersecurity+And+Privacy+Defeat+The+Data+Economys+Demons\/-\/E-RES142754?utm_source=zdnet&amp;utm_medium=pr&amp;utm_campaign=tmbg_et&amp;utm_content=report_pollard\"><em>Future of Cybersecurity and Privacy<\/em> research<\/a>.<\/p>\n<p><strong>Read also: <a href=\"https:\/\/www.zdnet.com\/article\/the-ciam-implications-of-the-facebookcambridge-analytica-scandal\/\">The CIAM implications of the Facebook\/Cambridge Analytica scandal<\/a><\/strong><\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>If you&#8217;re actively monetizing information, <a href=\"https:\/\/www.zdnet.com\/article\/microsoft-facebook-dozens-more-sign-cybersecurity-tech-accord\/\" target=\"_blank\">you could be the next Facebook<\/a>. Your digital supply chain is now loaded with ethical and moral dilemmas you will need to confront sooner rather than later. Cambridge Analytica is simply rebranding and emerging as something &#8220;different.&#8221; In fact, the asymmetry between the firms is striking. Facebook can&#8217;t simply rebrand or change in a few days. Yet the company that helped to make them public enemy No. 1 in 2018 has pulled a disappearing act while eyes were focused in the other direction. Is it worth becoming the next data distributor only to be crushed by your third-party&#8217;s ethics?<\/p>\n<h3>WEAPONIZING DATA COMBINED WITH PARAMILITARY EXPERTISE SHOULD CONCERN&#8230; EVERYONE<\/h3>\n<p>Cambridge Analytica &#8212; Emerdata, SCL Group &#8212; has already proven its willingness to engage in destabilizing behavior aimed at governments. It turns out that weaponizing <em>data<\/em> <em>is<\/em> an effective way to influence elections on a global basis. (Are you scared yet?) Now in a <a href=\"https:\/\/www.zdnet.com\/blog\/government\/\" target=\"_blank\">government-esque move<\/a>, Emerdata has coupled its background of destabilizing data analytics with para-military expertise. Regardless of political affiliation or viewpoint, this should concern governments and enterprises as one of the more terrifying geopolitical threats.<\/p>\n<h3>WEAPONIZED DATA WILL TARGET YOUR BRAND<\/h3>\n<p>While the group of clients Cambridge Analytica represents featured politicians and political movements, enterprises should worry about what will happen when influence campaigns take aim at their brand and reputation. It will be more than a PR and advertising battle. <a href=\"https:\/\/www.zdnet.com\/article\/protecting-data-protecting-truth\/\" target=\"_blank\">Disinformation<\/a>, misinformation, and feedback loops designed to elicit the most emotional responses possible will seek to degrade &#8212; or distort -= the customer experiences and customer engagements that your business has created.<\/p>\n<p><strong>Read also: <a href=\"https:\/\/www.zdnet.com\/article\/how-to-tell-if-cambridge-analytica-accessed-your-facebook-data\/\">How to tell if Cambridge Analytica accessed your Facebook data<\/a><\/strong><\/p>\n<p><em>&#8211;By Jeff Pollard, Principal Analyst<\/em><\/p>\n<p><em>For more on that topic, attend my session titled: &#8220;Defending Your Brand In The Post Truth Era&#8221; at<\/em> <em><a href=\"https:\/\/events.forrester.com\/ehome\/dt2018\/605639\/\">Digital Transformation 2018<\/a><\/em> <em>on May 8, 2018 in Chicago.<\/em><\/p>\n<div class=\"relatedContent alignNone\">\n<h3 class=\"heading\"><span class=\"int\">More Facebook F8<\/span><\/h3>\n<\/div>\n<p>Read More <a href=\"https:\/\/www.zdnet.com\/article\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;re in the midst of witnessing a scary data lifecycle and the dangers it can bring to brands &#8212; and beyond.<br \/>\nRead More HERE&#8230;<\/p>\n","protected":false},"author":1,"featured_media":44,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-43","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tales of the scary data lifecycle: Cambridge Analytica and Emerdata 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tales of the scary data lifecycle: Cambridge Analytica and Emerdata 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-04T15:08:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"thadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@thadmin\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"thadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\\\/\"},\"author\":{\"name\":\"thadmin\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/b07e00649871a6dd150cd57b33f7db66\"},\"headline\":\"Tales of the scary data lifecycle: Cambridge Analytica and Emerdata\",\"datePublished\":\"2018-05-04T15:08:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\\\/\"},\"wordCount\":697,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata.jpg\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\\\/\",\"name\":\"Tales of the scary data lifecycle: Cambridge Analytica and Emerdata 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata.jpg\",\"datePublished\":\"2018-05-04T15:08:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/05\\\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata.jpg\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tales of the scary data lifecycle: Cambridge Analytica and Emerdata\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/b07e00649871a6dd150cd57b33f7db66\",\"name\":\"thadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g\",\"caption\":\"thadmin\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/thadmin\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tales of the scary data lifecycle: Cambridge Analytica and Emerdata 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\/","og_locale":"en_US","og_type":"article","og_title":"Tales of the scary data lifecycle: Cambridge Analytica and Emerdata 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2018-05-04T15:08:00+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata.jpg","type":"image\/jpeg"}],"author":"thadmin","twitter_card":"summary_large_image","twitter_creator":"@thadmin","twitter_site":"@threatshub","twitter_misc":{"Written by":"thadmin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\/"},"author":{"name":"thadmin","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/b07e00649871a6dd150cd57b33f7db66"},"headline":"Tales of the scary data lifecycle: Cambridge Analytica and Emerdata","datePublished":"2018-05-04T15:08:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\/"},"wordCount":697,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata.jpg","articleSection":["ZDNet | Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\/","url":"https:\/\/www.threatshub.org\/blog\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\/","name":"Tales of the scary data lifecycle: Cambridge Analytica and Emerdata 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata.jpg","datePublished":"2018-05-04T15:08:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2018\/05\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata.jpg","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/tales-of-the-scary-data-lifecycle-cambridge-analytica-and-emerdata\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Tales of the scary data lifecycle: Cambridge Analytica and Emerdata"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/b07e00649871a6dd150cd57b33f7db66","name":"thadmin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/64b2823a5e0933c780cab004122ddae4375b28e7a87014931eaea97478ab540f?s=96&d=mm&r=g","caption":"thadmin"},"sameAs":["https:\/\/x.com\/thadmin"]}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/44"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}