Feeds

SF Mayor's aide fakes net postings

Jumps on online Astroturf craze

Security for virtualized datacentres

A spokesman for the San Francisco mayor admitted he faked his identity when posting comments favorable to his boss on a blog covering local politics.

Spokesman Peter Ragone initially denied using spoofed and bogus names on the SFist, but came clean after being repeated dogged by a local TV station and other news outlets.

"There are times when I've done them myself," Ragone told the San Francisco Chronicle, referring to posts attributed to a friend who lives in the neighboring Marin county. Ragone said he didn't remember posting other comments under the name Byorn, but didn't dispute that the IP address used in making them came from his residence.

The revelations came as Mayor Gavin Newsom's re-election manager resigned after confronting his boss over an affair he had with the aide's wife, according to the Chronicle. The paper, citing unnamed people in City Hall, said the campaign manager's wife confessed to the tryst as part of a rehabilitation regimen she had been undergoing for substance abuse.

The affair occurred about 18 months ago, while Newsom was divorcing his then-wife, Fox TV news host Kimberly Guilfoyl.

The mayor downplayed his aide's fudging of posts, saying that while they demonstrated poor judgment, he wanted Ragone to remain in his post.

The spoofing of identities in public forums has grown increasingly common over the past few years. Officials with several national politicians - including Minnesota Sen. Norm Coleman, California Sen. Dianne Feinstein and Sen. Tom Harkin of Iowa - have fessed up to editing Wikipedia entries to make their bosses appear more favorably.

Not to be outdone, Ragone attributed comments to his friend, John Nelson. One of them takes the SFist, which frequently lambastes the Mayor, to task. "This not a fun place if you are not here for an idealogy [sic] fix," one of the spoofed comment reads.

We imagine the same could be said about city hall's PR department. ®

Internet Security Threat Report 2014

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Special pleading against mass surveillance won't help anyone
Protecting journalists alone won't protect their sources
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Apple's iPhone 6 first-day sales are MEANINGLESS, mutters analyst
Big weekend queues only represent fruity firm's supply
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Bill Gates, drugs and the internet: Top 10 Larry Ellison quotes
'I certainly never expected to become rich ... this is surreal'
Big Content Australia just blew a big hole in its credibility
AHEDA's research on average content prices did not expose methodology, so appears less than rigourous
EMC, HP blockbuster 'merger' shocker comes a cropper
Stand down, FTC... you can put your feet up for a bit
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.