Consumer tech key in Boston Marathon bombing probe
Social media kept communication flowing during the disaster, and smartphone photos and videos were seen as critical to solving the crime.
Computerworld - Users of consumer technology and social media reacted quickly after explosions ripped through crowds near the finish line of the Boston Marathon last week, sending out updates and snapping photos and recording videos that officials said would be "critical" pieces of evidence in their investigation into the bombings.
In the hours after two bombs exploded within 100 yards of each other in Boston's Copley Square shortly before 3 p.m. on April 15, the FBI set up a hotline for citizens to use to tell investigators about photos and videos taken in the area at the time of the incident. On Thursday, investigators released surveillance photos of two suspects and asked the public for help identifying them. A massive, sometimes violent, manhunt ensued and continued into the day on Friday.
Early in the investigation, police stressed that photos and videos would be crucial to solving the crime. "It's our intent to go through every frame of every video we have," said Boston Police Commissioner Ed Davis a day after the bombing.
FBI special agent Richard DesLauriers, who leads the investigation, also said last week that "assistance from the public" would be critical.
Investigators were so eager to get smartphone images related to the bombing that Massachusetts State Police detectives were asking passengers checking in for flights at Boston's Logan International Airport if they had pertinent videos or photos.
"They were asking, 'Was anybody there who had any images?' " said Will Stofega, an IDC analyst who was at the airport and was asked about images by investigators.
Jack Gold, an analyst at J.Gold Associates, said collecting and processing bombing-related images amounted to a "truly massive challenge."
While there are software tools galore to help with facial recognition and pattern recognition, "it still comes down to having human eyes sort through sources of interest," Gold said. "Despite our strides in video analysis and image processing, at the end of the day, the systems we have in place are still childish in their abilities compared to humans."
Keith Jones, an independent computer forensics examiner, expected investigators to comb through social networks looking for "online discussions about planning the attack."
Meanwhile, Twitter users near the marathon finish line started tweeting as soon as the bombs exploded, and their actions illustrated both the upside and the downside of the use of social media in emergencies.
For instance, Twitter was a useful communications tool for public authorities like the Boston police and marathon organizers, but many people also used it to spread reports that were questionable or just plain inaccurate.
Social media "cuts both ways," noted Greg Sterling, an analyst at Opus Research. "It allows you to get the information out more quickly, but it can also fan hysteria."
The Boston Police Department's Twitter log showed the positive side of social media. It was updated minute by minute in the aftermath of the bombings, often with instructions to avoid certain areas, or with information about where police officers might be stationed. It was also a source of information on Friday as police warned residents in Boston and surrounding communities to stay indoors as the suspects were sought.
Other social media sites were also useful sources of information. For instance, Google set up a Person Finder, as it did after the Japan earthquake two years ago, to help people connect with friends and loved ones after the incident.
Miners is a reporter for the IDG News Service. Sharon Gaudin contributed to this story.
This version of this story was originally published in Computerworld's print edition. It was adapted from articles that appeared earlier on Computerworld.com: "Update: Massive Citizen Smartphone Photo and Video Probe Underway Into Boston Bombings" and "Boston Blasts Show Two Sides of Social Media."
Read more about Mobile/Wireless in Computerworld's Mobile/Wireless Topic Center.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The Critical Role of Support in Your Enterprise Mobility Management Strategy Most business leaders underestimate the importance of tech support when they choose an EMM solution. Here's what to put on your checklist.
- Separating Work and Personal at the Platform Level: How BlackBerry Balance Works BlackBerry® Balance™ separates work from personal on the same mobile device, right at a platform level. Find out how it can work for...
- Protection for Every Enterprise: How BlackBerry Security Works Get an IT-level review of BlackBerry® Security, addressing data leakage protection, certified encryption, containerization and much more.
- Future Focus: What's Coming in Enterprise Mobility Management (EMM) Find out why Enterprise Mobility Management (EMM) solutions that are truly future-ready must be designed to enable Machine-to-Machine (M2M) capabilities and much more.
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Unmasking the Differences between Consumer and Enterprise File Sync & Share The consumerization of IT combined with the rapid pace of the modern mobile workplace is forcing enterprise IT teams to evaluate file sync...
- Live Webcast Workforce Mobilization for Improved Productivity A mobility research director from Aberdeen discusses reasons for extending legacy applications to mobile devices, and an integration strategist from Attachmate shows how...
- Getting Ready for BlackBerry Enterprise Service 10.2 Find out how BlackBerry® Enterprise Service 10 helps organizations address the full spectrum of EMM challenges, while balancing the needs of both the...
- Containerization Options: How to Choose the Best DLP Solution for Your Organization This webcast outlines a framework for making the right choice when it comes to containerization approaches, along with the pros and cons of... All Mobile/Wireless White Papers | Webcasts