These have ranged from simple comment abuse (mass comments from the same IP address, slating both sides of the argument, designed to stir up trouble) to more sophisticated attacks, hacking into the blog and change content.
Around the time the IDs were about to be introduced, our team noticed certain patterns in comments which purported to come from both suburban drivers and all London drivers. Using a simple checker program attached to blogger we were able to source comments and found they came from the same IP address.
That IP address, happened to be part of a wifi network given the name of a Taxi representative group.
As I have long since lost the evidence I won't name the Org involved, but I did write an article at the time, which was published in an early copy of UCG News.
Shortly after this misuse of our comment section, my attention was bought to certain content appearing on the blog, which seemed to be sailing close to the wind and was highly libellous.
As we always keep a back up of posts, we were able to replace most of the offending material before complaints were received.
But the fact was, we had been hacked.
Even though we changed to uncrackable passwords, because the offender was permanently signed in, they were able to carry on changing the odd post. In the end it was easier to close down the blog and start again.
Taxi Leaks now has a more secure sign in process, but we still get reports from Google of mass password attempted sign-ins.
Starting again has been hard, we'd built up a large and loyal audience. But after just a couple of years, we have now surpassed the readership of The Anderson Shelter.
Our team of contributors have also been the victim of constant attempts of email account hacking, the latest attack being last night.
About a year ago, it was revealed in a leaked memo that the editor's twitter time line was being printed off and circulated to certain individuals at Palestra and Windsor house...this we have kept proof of.
Notice that Helen Chapman used her personal email account and not her TfL account to send this screen shot to John Mason, who then sent it on to other staff at Palestra.
After the above email was fired off, the sender realised the person being observed had been mistakenly copied in.
A number of attempts were then made to try to retrieve the email. But it was took late. It had already been recieved and opened.
So big brother is watching....it's just a shame they are not watching what's going on outside clubs and bars and putting their skills to better use.
The attacks continue.
The latest casualty to fall foul of a hacking attempt has been the RMT email client, which has had to be taken down after being hacked into.