Feeds

Tony Blair closes RSA 2012, denounces WikiLeaks

Self-confessed tech know-nothing speaks his piece

Using blade systems to cut costs and sharpen efficiencies

RSA 2012 Former British Prime Minister Anthony Charles Lynton Blair was RSA's pick to close out their annual security conference in San Francisco, and he took the opportunity to bash WikiLeaks as "disgraceful."

Blair took time out from his busy official role of bringing peace to the Middle East to pad his pockets speak for an unspecified sum at the conference's closing keynote, where he told his audience that he had very little knowledge of technology – claiming he never even owned a mobile phone until he left political office. This was an advantage, as it turned out, given the News International hacking scandal, he joked.

Tony Blair closes the RSA 2012 conference

Privacy is for politicians Blair claims

That said, he has some trenchant views on privacy and the activities of organizations such as WikiLeaks. Individuals need to have private communications, he said, but at the same time there are people who threaten our way of life that have to be stopped. Politicians, however, need privacy to function, and he denounced WikiLeaks for breaking that by publishing State Department cables.

"The thing with the WikiLeaks is that it was, in my view, a very bad and disgraceful thing to do," he said. "I was in Washington for meetings yesterday, and I have to be able to speak frankly. You can't have a situation where you're dealing with issues of extraordinary sensitivity and say there has to be complete openness."

Blair did say that, when it came to IT security legislation, politicians need to talk to people on the front lines to formulate laws that make sense and would work in the real world – a remark that bought warm applause from the audience.

He also admitted to getting social media wrong. When social media first emerged, he said that politicians saw it as something which would act as a brake on the conventional media. In fact, he said it was having a multiplier effect, and now it was up to the mainstream media to provide clear facts. Social media is also having a revolutionary effect in cutting the influence of government censorship, he said.

He also described explaining technology to his 11-year old son. While the younger generation was adopting technology faster than their parents, Blair asserted that you needed "the wisdom of the oldies" to put the technology itself in context.

Blair said that, despite massive changes in geopolitics, democracy was the future for the world, and cited the creation of the internet as an example of how free thinking is superior in driving innovation. Ultimately the economies of China and others will move towards a democratic model, in his opinion.

One can't help but wonder at RSA's recent choices for keynote closers. Past alumni have included Simon Singh, author of "The Code Book", and serial (but reformed) fraudster Frank Abagnale – people with knowledge of, and an interest in, security. But in the last few years RSA's choices have strayed from this path in favor of politicians giving stump speeches.

Last year Bill Clinton gave the closing address (from which press were barred – possibly to disguise the fact that Bubba gave almost exactly the same speech as he had at several other tech conferences that year), and this time we got another technology know-nothing.

While booking washed-up politicians might look good, one suspects delegates would rather have something on-topic. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
NEW, SINISTER web tracking tech fingerprints your computer by making it draw
Have you been on YouPorn lately, perhaps? White House website?
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Black Hat anti-Tor talk smashed by lawyers' wrecking ball
Unmasking hidden users is too hot for Carnegie-Mellon
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.