Feeds

Tony Blair closes RSA 2012, denounces WikiLeaks

Self-confessed tech know-nothing speaks his piece

The Power of One eBook: Top reasons to choose HP BladeSystem

RSA 2012 Former British Prime Minister Anthony Charles Lynton Blair was RSA's pick to close out their annual security conference in San Francisco, and he took the opportunity to bash WikiLeaks as "disgraceful."

Blair took time out from his busy official role of bringing peace to the Middle East to pad his pockets speak for an unspecified sum at the conference's closing keynote, where he told his audience that he had very little knowledge of technology – claiming he never even owned a mobile phone until he left political office. This was an advantage, as it turned out, given the News International hacking scandal, he joked.

Tony Blair closes the RSA 2012 conference

Privacy is for politicians Blair claims

That said, he has some trenchant views on privacy and the activities of organizations such as WikiLeaks. Individuals need to have private communications, he said, but at the same time there are people who threaten our way of life that have to be stopped. Politicians, however, need privacy to function, and he denounced WikiLeaks for breaking that by publishing State Department cables.

"The thing with the WikiLeaks is that it was, in my view, a very bad and disgraceful thing to do," he said. "I was in Washington for meetings yesterday, and I have to be able to speak frankly. You can't have a situation where you're dealing with issues of extraordinary sensitivity and say there has to be complete openness."

Blair did say that, when it came to IT security legislation, politicians need to talk to people on the front lines to formulate laws that make sense and would work in the real world – a remark that bought warm applause from the audience.

He also admitted to getting social media wrong. When social media first emerged, he said that politicians saw it as something which would act as a brake on the conventional media. In fact, he said it was having a multiplier effect, and now it was up to the mainstream media to provide clear facts. Social media is also having a revolutionary effect in cutting the influence of government censorship, he said.

He also described explaining technology to his 11-year old son. While the younger generation was adopting technology faster than their parents, Blair asserted that you needed "the wisdom of the oldies" to put the technology itself in context.

Blair said that, despite massive changes in geopolitics, democracy was the future for the world, and cited the creation of the internet as an example of how free thinking is superior in driving innovation. Ultimately the economies of China and others will move towards a democratic model, in his opinion.

One can't help but wonder at RSA's recent choices for keynote closers. Past alumni have included Simon Singh, author of "The Code Book", and serial (but reformed) fraudster Frank Abagnale – people with knowledge of, and an interest in, security. But in the last few years RSA's choices have strayed from this path in favor of politicians giving stump speeches.

Last year Bill Clinton gave the closing address (from which press were barred – possibly to disguise the fact that Bubba gave almost exactly the same speech as he had at several other tech conferences that year), and this time we got another technology know-nothing.

While booking washed-up politicians might look good, one suspects delegates would rather have something on-topic. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.