Talk about a marketing campaign gone horribly, horribly wrong! Nine electronic devices placed throughout Boston’s major highways and bridges were only part of a marketing campaign for Cartoon Network’s Aqua Teen Hunger Force cartoon, Time Warner acknowledged in a statement. The “suspicious” packages backed up traffic across the city as bridges and major thoroughfares were closed and authorities carefully disabled each device. Boston’s Orange and Red “T” lines were also shut down for a time, according to a report by MarketWatch. Other reports indicate the U.S. Coast Guard temporarily blocked off the Charles River.How much this fiasco will cost taxpayers is anyone’s guess at this point, but I think Time Warner should be held responsible for any associated costs. Don’t you? On the flip side, my partner in crime, Bob McMillan, reminds me that our law enforcement personnel really should be able to tell the difference between a simple computer and a bomb or other threatening device.As Bob says, “Personally, I think the best response to terrorism is to be intelligent in our investigations, but not to do these blanket freak-outs. In Europe they’ve had bombs for years and they don’t react with as much panic as we do to a Cartoon Network promotion.” Another point of concern is that Cartoon Network said the devices, which are reportedly in nine other cities as part of the campaign, have been in place for two to three weeks. No one was suspicious before now? Where’s the “enhanced security” we were told was in place post-9/11?Tell us what you think.-Shawna McAlearney Related content opinion Direct Marketing Association on information security: Be safe By Robert McMillan Apr 08, 2011 3 mins Data and Information Security opinion As violence escalates, Libya cuts off the Internet By Robert McMillan Feb 18, 2011 2 mins Core Java opinion An FBI backdoor in OpenBSD? By Robert McMillan Dec 15, 2010 5 mins Data and Information Security opinion Congressional candidate says Democrats leaked his Social Security number By Robert McMillan Sep 28, 2010 1 min Data and Information Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe