Feeds

Cops tweet about cuffed twits who incited violence via Twitter

Police and thieves in the social network streets

Maximizing your infrastructure through virtualization

As the Prime Minister condemned social networks for being "used for ill" this morning, police forces across the country sent a steady stream of tweets confirming arrests connected with inciting violence via the likes of Twitter and Facebook.

"Three people have been arrested on suspicion of using Twitter and Blackberry Messenger to incite violent disorder..." tweeted Hampshire police earlier today.

Hampshire's Twitter feed has done a good job of reducing fears of imminent melt-down and repeatedly requested people not use the service to pass on rumour. Top tweets included: "There have been NO riots/looting in #Southampton or anywhere across #Hants. Our advice is to keep calm and carry on as normal." and the almost maternal: "Hi Gemmie, can you contact HantsPolice on 101 pls? You're not in any trouble. It's regarding your tweet about adlershotFC. Thanks!".

And, although rioting has so far been an England-only affair, police have reportedly been rounding up individuals who have taken to social networks to encourage looting and thuggery in Wales.

Chief Superintendent Josh Jones of the South Wales police force said:

“Monitoring of social networking sites has continued and despite some efforts to generate disorder in our communities these have failed. Anyone who is found to incite criminal activity will be traced and dealt with by the police."

Cops across England have been using Twitter to warn people against false alerts and rumours that circulated on the micro-blogging site at the height of the troubles.

“We have seen the benefits of social media being used responsibly. We thank the community for their ongoing support,” said West Midlands chief super Phil Kay a few hours before Cameron moaned about the networks.

"We are aware of rumours circulating on social networks which are untrue, unhelpful and intended to increase tension between communities," said Scotland Yard this afternoon.

"Those involved in the violent disorder and thefts over the past few days are not from any single race, religion or community group. This is unnecessary and we urge people to stop using recent events as an opportunity to cause unrest."

Meanwhile the government's e-petitions site had another crap day. It was only available intermittently and no new petitions appeared today - suggesting a stunning lack of interest or technical problems.

The call for: "Convicted London rioters should loose all benefits." had received 97,541 votes at the time of writing.

If the site stays available for another two hours it will easily pass the 100,000 vote barrier. ®

Top three mobile application threats

More from The Register

next story
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.