Feeds

Police investigate angry eBayer's revenge site

Met called in laptop dispute

The Power of One eBook: Top reasons to choose HP BladeSystem

Police are investigating a disgruntled eBayer who took online revenge after paying £375 for a laptop which, he said, did not work.

The buyer recovered the hard drive from the malfunctioning notebook, finding it full of personal details, allegedly including access to email accounts, 90 voyeuristic leg shots taken on the London Underground and gay porn. He posted the material on a website, naming and shaming Barnet 19-year-old Amir Tofangsazan as the seller.

Clearly, someone doesn't see the funny side. A Scotland Yard spokeswoman said Barnet police are investigating a complaint made on 29 May at Fulham police station regarding improper use of a public electronic communications network. She added: "The allegation follows from a civil dispute. No arrests have been made and inquiries continue."

At time of writing the site had clocked up almost 950,000 hits. A dismayed Amir told the Daily Mail the website had made his life a "living hell", and that his family had received threats. He said: "The laptop wasn't even broken. It was in working order. The last few days have been a nightmare, some of my friends have seen it and my father is very angry."

Amir said he had not received any "polite requests" for a refund. On his revenge site the buyer counters: "This site is 100 per cent genuine, I swear I'm not making anything up."

Amir told the Daily Mail: "I will obviously be trying to get the website taken down as soon as possible." In the meantime, the site is available here

Bootnote

The buyer has been named as Thomas Sawyer, a 23-year-old student from Exeter. He offers to pull the site sown voluntarily in exchange for a refund.

Meanwhile, The Daily Mail reports that Amir allegedly pulled a similar scam on Newport Pagnell woman Debbie McInerney, who says she paid him £147 for an iPod which never arrived. Amir said: "The police are investigating the iPod case and I can't comment on it."

Top three mobile application threats

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
Stick a 4K in them: Super high-res TVs are DONE
4,000 pixels is niche now... Don't say we didn't warn you
Philip K Dick 'Nazi alternate reality' story to be made into TV series
Amazon Studios, Ridley Scott firm to produce The Man in the High Castle
Sonos AXES support for Apple's iOS4 and 5
Want to use your iThing? You can't - it's too old
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Too many IT conferences to cover? MICROSOFT to the RESCUE!
Yet more word of cuts emerges from Redmond
Joe Average isn't worth $10 a year to Mark Zuckerberg
The Social Network deflates the PC resurgence with mobile-only usage prediction
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.