Risk
8/9/2011
12:41 PM
Connect Directly
LinkedIn
Twitter
RSS
E-Mail
50%
50%

Don't Blame RIM, Twitter For London Riots

You may dislike social networking or smartphones all you want--but remember they're just tools used by people.

InformationWeek Now--What's Hot Right Now
Based on some of the headlines and stories that popped up in the past 24 hours or so regarding the London riots, some people want to blame technology for the spread of the problem. That's easier, and perhaps less painful, than blaming human beings. Twitter and BBM, the RIM BlackBerry free messenger system, have become part of this story. Some people love to hate Twitter and its social networking cousin, Facebook, much the same way as some people still love to hate Microsoft. But let's not blame the technology tools themselves for the riots. These riots in London are about people, not Twitter, or BBM.

Looking at the coverage of this issue on Google News, I saw headlines like this one from the BBC: "Is technology to blame for the London riots?". The BBC story reports that politicians, journalists and even police have assigned some blame to Twitter and BBM for aiding rioters--then goes on to say that "some experts fear the extent to which technology is to blame may have been overstated."

There was this, from The Guardian: "London riots: how BlackBerry Messenger played a key role." And this, from TechCrunch Europe: "How Blackberry, not Twitter, fuelled the fire under London's riots".

BlackBerry fueled the fire under riots? Did cell phones cause drug wars? No, human greed did.

People will use Twitter, IM, BBM, or whatever tools they have at their disposal, to communicate. Twitter isn't encouraging evil, nor is RIM. Yet after the stories about teenagers and their reliance on BBM, RIM tweeted this from its @UK_BlackBerry account: "We feel for those impacted by the riots in London. We have engaged with the authorities to assist in any way we can."

As of Tuesday morning, it's still unclear exactly how RIM will help police. Authorities can ask RIM to turn over encrypted BBM communications, as InformationWeek.com's Mathew Schwartz reports. "But RIM, based in Canada, wouldn't necessarily have to comply with those requests," Schwartz reports.

Yet RIM, or BBM encryption, or teen obsession with smartphones, should not become the focus of this story.

As CNET's Chris Matyszczyk, who wrote a thoughtful opinion piece on the social media story related to the riots, points out: "Technology does have a negative role--when those who use it have a negative purpose. In a literal sense, it helps them with that purpose. But does it really give them that negative purpose?"

If you look for a positive spin on Twitter, you can find that too. As Schwartz points out, some Londoners coined a Twitter hashtag, #riotcleanup, for organizing purposes of a different kind.

Maybe my least favorite headline that popped on Google News around this story this morning was: "Top 10 Concerned Celebrity Tweets Over London Riots" (International Business Times.) Yes, Justin Bieber had his say.

A separate story broke Monday about Facebook use and teen psychological disorders, a story that started with a California State University psychology professor, discussing research that he's done. "Too much Facebook time may be unhealthy for kids" declared the LA Times. "Facebook Use May Lead to Psychological Disorders in Teens [STUDY]" warned Mashable.

But as the author of the study told Computerworld "overdoing it on social networking sites can draw out negative emotional behaviors. However ... he's not trying to imply that Facebook creates psychological disorders. That has not been shown."

You may dislike Facebook, Twitter, or smartphones. But that doesn't make them evil.

Reading about the U.S. economic crisis this morning, I came across a Harvard Business School historian discussing the current state of affairs. We can talk ourselves into a recession, she said.

We can talk ourselves into many things, due to the glut of information now available online. But we can't blame the Internet for that. We make our own choices.

Laurianne McLaughlin is editor-in-chief for InformationWeek.com. Follow her on Twitter at @lmclaughlin.

At the 2011 InformationWeek 500 Conference, C-level executives from leading global companies will gather to discuss how their organizations are turbo-charging business execution and growth--how their accelerated enterprises manage cash more effectively, invest more wisely, delight customers more consistently, manage risk more profitably. The conference will feature a range of keynote, panel, and workshop sessions. St. Regis Monarch Beach, Calif., Sept. 11-13. Find out more and register.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6090
Published: 2015-04-27
Multiple cross-site request forgery (CSRF) vulnerabilities in the (1) DataMappingEditorCommands, (2) DatastoreEditorCommands, and (3) IEGEditorCommands servlets in IBM Curam Social Program Management (SPM) 5.2 SP6 before EP6, 6.0 SP2 before EP26, 6.0.3 before 6.0.3.0 iFix8, 6.0.4 before 6.0.4.5 iFix...

CVE-2014-6092
Published: 2015-04-27
IBM Curam Social Program Management (SPM) 5.2 before SP6 EP6, 6.0 SP2 before EP26, 6.0.4 before 6.0.4.6, and 6.0.5 before 6.0.5.6 requires failed-login handling for web-service accounts to have the same lockout policy as for standard user accounts, which makes it easier for remote attackers to cause...

CVE-2015-0113
Published: 2015-04-27
The Jazz help system in IBM Rational Collaborative Lifecycle Management 4.0 through 5.0.2, Rational Quality Manager 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Team Concert 4.0 through 4.0.7 and 5.0 through 5.0.2, Rational Requirements Composer 4.0 through 4.0.7, Rational DOORS Next Generation...

CVE-2015-0174
Published: 2015-04-27
The SNMP implementation in IBM WebSphere Application Server (WAS) 8.5 before 8.5.5.5 does not properly handle configuration data, which allows remote authenticated users to obtain sensitive information via unspecified vectors.

CVE-2015-0175
Published: 2015-04-27
IBM WebSphere Application Server (WAS) 8.5 Liberty Profile before 8.5.5.5 does not properly implement authData elements, which allows remote authenticated users to gain privileges via unspecified vectors.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.