Feeds

Police-baiting website Fitwatch returns

Back and fitter than ever - not that it ever really went away

High performance access to file storage

The British website briefly removed from the sight of some web surfers by the Met Police's e-crime unit is back in full effect.

Of course Fitwatch never really disappeared; the site's hosting provider JustHost suspended the account after a stroppy email from the Met, but hardly had the plug been pulled than the site sprouted up in hundreds of other places, from Facebook to dozens of blogs and other sites.

Emily from Fitwatch told The Register: "JustHost have not relented and we have moved to another host, and the proxy servers are located outside of the UK."

So depending on how you get internet you might already be able to see the site - depending on whether your ISP has updated its DNS records. If not you can use a proxy server to view it, or look at one of the hundreds of mirror sites.

JustHost sent us a frankly baffling statement of legalese this morning claiming it could not divulge customer information without a subpoena or court order.

But the sometime hosting provider did say: "However, when we become aware of improper activity by one of our customers using a hosted site, which would be a violation of our Terms of Service (TOS) governing the web sites, we take such situations seriously, we investigate promptly, and we take appropriate action."

The Met said yesterday: "We were concerned this website was giving information about destroying evidence. We drew this to the attention of the internet infrastructure provider and they suspended the site."

Fitwatch's site includes a new post thanking the Met Police for all the publicity.

The post said the email asking for the site to be closed "came from DI Paul Hoare, from the Police Central e-crime Unit, the authorisation to close was given much closer to home, by acting Detective Inspector Will Hodgeson".

The post continued: "However, through totally underestimating the power of social media this pathetic attempt has failed miserably. Within minutes of networking what had happened, people were re-publishing the post anywhere and everywhere.

"There are now over 100 sites carrying the original post – we haven’t managed to count them all." ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Big Content goes after Kim Dotcom
Six studios sling sueballs at dead download destination
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
Singapore decides 'three strikes' laws are too intrusive
When even a prurient island nation thinks an idea is dodgy it has problems
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.