Feeds

Daily Mail group boss spoof tweeter fights to protect anonymity

@UnSteveDorkland lawyers up after publisher sues Twitter

Security for virtualized datacentres

An anonymous wag who lampooned a Daily Mail group boss using a spoof Twitter account has six days to prevent his unmasking.

The publishing giant launched legal action in California to compel the social network to reveal the identity of whoever's behind the @UnSteveDorkland handle. The account sends up Steve Auckland, the former Metro managing director who is now CEO of Northcliffe Media, the British regional newspaper arm of the Daily Mail and General Trust.

Twitter's lawyers said the tweeter has six days to object to the court order. An email from the social network's legal team, seen by The Register, suggests that UnSteveDorkland contacts rights campaign group Electronic Frontier Foundation for advice.

If no objection to the order is received by Twitter by 1 August then it will hand over what personal details it holds on the user to the troubled publisher, the email stated. The court writ requested all data associated with the account, including an email address, a record of logins, IP addresses, and private messages sent from and to the account.

The Not Steve Dorkland twitter account, screengrab

The fake Steve Auckland's typical banter

According to the court document [hosted on the political tittle-tattle Order Order blog] anyone hoping to quash or modify the subpoena must successfully argue that the information required is privileged or should be subject to protection.

UnSteve told The Reg that a Californian lawyer has offered to represent him pro bono. Northcliffe Media has yet to supply us with a statement but we will update this story if it does.

Twitter declined to comment on this specific case. When asked whether the social network is failing to protect anonymous users, a spokesperson would say only: "In all such cases, Twitter believes it has to comply with a ruling from courts in its Californian home, but give those targeted the information they need to get a lawyer and defend themselves." ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
'Cowardly, venomous trolls' threatened with TWO-YEAR sentences for menacing posts
UK government: 'Taking a stand against a baying cyber-mob'
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Don't bother telling people if you lose their data, say Euro bods
You read that right – with the proviso that it's encrypted
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.