Feeds

SF Mayor's aide fakes net postings

Jumps on online Astroturf craze

Intelligent flash storage arrays

A spokesman for the San Francisco mayor admitted he faked his identity when posting comments favorable to his boss on a blog covering local politics.

Spokesman Peter Ragone initially denied using spoofed and bogus names on the SFist, but came clean after being repeated dogged by a local TV station and other news outlets.

"There are times when I've done them myself," Ragone told the San Francisco Chronicle, referring to posts attributed to a friend who lives in the neighboring Marin county. Ragone said he didn't remember posting other comments under the name Byorn, but didn't dispute that the IP address used in making them came from his residence.

The revelations came as Mayor Gavin Newsom's re-election manager resigned after confronting his boss over an affair he had with the aide's wife, according to the Chronicle. The paper, citing unnamed people in City Hall, said the campaign manager's wife confessed to the tryst as part of a rehabilitation regimen she had been undergoing for substance abuse.

The affair occurred about 18 months ago, while Newsom was divorcing his then-wife, Fox TV news host Kimberly Guilfoyl.

The mayor downplayed his aide's fudging of posts, saying that while they demonstrated poor judgment, he wanted Ragone to remain in his post.

The spoofing of identities in public forums has grown increasingly common over the past few years. Officials with several national politicians - including Minnesota Sen. Norm Coleman, California Sen. Dianne Feinstein and Sen. Tom Harkin of Iowa - have fessed up to editing Wikipedia entries to make their bosses appear more favorably.

Not to be outdone, Ragone attributed comments to his friend, John Nelson. One of them takes the SFist, which frequently lambastes the Mayor, to task. "This not a fun place if you are not here for an idealogy [sic] fix," one of the spoofed comment reads.

We imagine the same could be said about city hall's PR department. ®

Internet Security Threat Report 2014

More from The Register

next story
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.