Salta al contenuto principale



How The Widget Revolutionized Canned Beer


Walk into any pub and order a pint of Guinness, and you’ll witness a mesmerizing ritual. The bartender pulls the tap, fills the glass two-thirds full, then sets it aside to settle before topping it off with that iconic creamy head. But crack open a can of Guinness at home, and something magical happens without any theatrical waiting period. Pour it out, and you get that same cascading foam effect that made the beer famous.

But how is it done? It’s all thanks to a tiny little device that is affectionately known as The Widget.

Beer Engineering

A pint of Guinness, pictured with the iconic foamy head. Credit: Sami Keinänen, CC BY SA 2.0
In 1959, draught Guinness diverged from other beers. The pints served from the tap at the pub were charged with a combination of nitrogen gas and carbon dioxide, rather than just carbon dioxide alone. Nitrogen is less soluble in beer than carbon dioxide, and low temperatures and higher pressures are required to get it to stay in the fluid. Charging the beer in this way, and then forcing it through a tap with a restrictor plate with many fine holes, allows the pouring of a beer with small, fine bubbles. This is what gives Guinness its signature smooth, creamy texture and characteristic dense head. The lower carbon dioxide level also contributes to the flavor, removing some of the sharp taste present in regular carbonated beers.

When Guinness started using the nitrogenation method, it quickly gained popularity and became the default way to serve the draught beer. The problem was that it wasn’t initially practical to do the same for bottled Guinness. Without being poured through the fine holes of a special tap under pressure, it wasn’t possible to create the same foamy head. Bottled Guinness thus remained carbonated in the traditional manner, and it was thus very much unlike the draught beer served at the pub. The desire was to produce a better version—”bottled draught Guinness” was a term often bandied about. The company experimented with a variety of methods of serving nitrogenated Guinness from a bottle or can. It even sold some bottles with a special “initiator” syringe to generate head in select markets, but it was all too clumsy to catch on with the beer drinking public. A better solution was needed.
The modern floating Guinness widget, pictured in a can that has been cut open. Credit: Duk, CC BY SA 3.0
The modern widget was developed as the technological solution to this fundamental problem in beverage physics. Guinness tackled this challenge by essentially putting a tiny pressure vessel inside the larger pressure vessel of the can itself. The widget is a small plastic sphere, hollow inside, with a tiny hole on the surface. The widget and beer are placed inside the can on the production line. Liquid nitrogen is then added, before the can’s lid is sealed. The can is then inverted as the liquid nitrogen quickly boils off into a gas. This effectively fills the widget with gaseous nitrogen under pressure, often along with a small amount of beer. It’s a charged pressure vessel lurking inside the can itself.

The magic happens when the beverage is served. When you crack open the can, the pressure inside drops rapidly to atmospheric pressure. The nitrogen under pressure in the widget thus wants to equalize with the now lower-pressure environment outside. Thus, the nitrogen sprays out through the tiny hole with tremendous force, creating countless microscopic bubbles that act as nucleation sites for the rest of the nitrogen dissolved in the surrounding beer. As the beer is poured into a glass, a foamy head forms, mimicking the product served fresh from the tap at the local pub.

Today’s widget, first marketed in 1997, is the floating sphere type, but the original version was a little different. The original widget launched in 1989 was a flat disc, which was mounted in the bottom of the can, but fundamentally worked in the same way. However, it had a tendency to cause rapid overflowing of the beer if opened when warm. The floating spherical widget reduced this tendency, though the precise engineering reasons why aren’t openly explained by the company. The fixed widget actually had a surprise return in 2020 due to COVID-19 supply chain issues, suggesting it was still mostly fit for purpose in the brewery’s eyes.

The key to the widget’s performance is in the filling and the construction. It’s important to ensure the widget is filled with pressurized gas, hence the inversion step used in the filling process. If the pressurized nitrogen was allowed to simply sit in the empty space in the top of the can, it would just vent out on opening without making any head. The orifice size on the widget is also critical. Too large, and the pressure equalizes too quickly without creating the necessary turbulence. Too small, and insufficient gas and beer volume flows through to generate adequate nucleation. The widget as it stands today is the result of much research and development to optimize its performance.
A finned “rocket” widget as used in Guinness beer bottles. Credit: Joeinwap, CC0
Further different widget designs have emerged over the years. The company had mastered draught Guinness in a can, though it needed to be poured into a glass to be drank properly. The company later looked to create draught Guinness that could be drank straight from the bottle. This led to the creation of the “rocket widget.” It worked largely in the same way, but was designed to float while remaining in the correct orientation inside the neck of the bottle. Fins ensured it wouldn’t fall out of the bottle during drinking. It would charge the beer with bubbles when first opened, and continue to boost the head to a lesser degree each time the bottle was tilted for a sip.

Guinness could have left this problem unsolved. It could have remained a beautiful tap-based beer, while selling its lesser carbonated products in bottles and cans for home consumption. Instead, it innovated, finding a way to create the same creamy tap-poured experience right out of the can.

The next time you crack open a widget-equipped can and watch that mesmerizing cascade of bubbles, you’re witnessing a masterpiece of beverage engineering that took years to perfect. It’s a reminder that sometimes the most elegant engineering solutions hide in the most ordinary places, waiting for someone clever enough to recognize that a tiny plastic ball could revolutionize how we experience beer outside the pub.


hackaday.com/2025/08/14/how-th…



Dopo Darcula arriva Magic Mouse: il nuovo incubo del phishing ruba 650.000 carte al mese


Dopo la chiusura della piattaforma di phishing Darcula e del software Magic Cat utilizzato dai truffatori, la soluzione Magic Mouse ha guadagnato popolarità tra i criminali. Secondo gli specialisti di Mnemonic, Magic Mouse contribuisce già al furto di dati da almeno 650.000 carte bancarie al mese.

Recentemente abbiamo parlato del lavoro di Darcula e dell’indagine condotta dagli esperti di Mnemonic. Questa piattaforma PhaaS (phishing-as-a-service) ha preso di mira utenti Android e iPhone in oltre 100 paesi. Il servizio criminale ha utilizzato 20.000 domini che imitavano marchi noti per rubare credenziali.

Secondo gli analisti, gli operatori di Darcula sono stati responsabili del furto di 884.000 carte bancarie e le vittime di hacker in tutto il mondo hanno cliccato su link dannosi ricevuti tramite messaggi di testo 13 milioni di volte.

Poco dopo l’attività di Darcula è cessata, ma come hanno spiegato i ricercatori di Mnemonic al DEF CON, un altro servizio di phishing simile sta guadagnando popolarità tra i criminali informatici.

Gli esperti ricordano che il software Magic Cat ha svolto un ruolo chiave nel lavoro di Darcula. Ora Magic Cat è stato sostituito da una piattaforma simile, Magic Mouse, la cui popolarità è aumentata notevolmente dopo la chiusura di Darcula.

Gli esperti ritengono che Magic Mouse sia un’operazione nuova, con sviluppatori diversi dietro. Non è quindi correlato a Darcula. Tuttavia, l’attuale successo di Magic Mouse è dovuto in gran parte al fatto che nuovi operatori si sono appropriati dei kit di phishing che hanno reso così popolare il software del suo predecessore.

Questi kit contengono centinaia di modelli di siti di phishing che Magic Cat ha utilizzato per imitare pagine web legittime di importanti colossi tecnologici, noti servizi al consumatore e servizi di consegna. Tutti questi siti sono stati progettati per indurre le vittime a fornire i dati della propria carta di credito.

Sebbene Magic Mouse sia già popolare e potrebbe diventare ancora più pericoloso di Magic Cat in futuro, portando ai suoi operatori milioni di dollari di profitti (sotto forma di fondi rubati alle vittime), i ricercatori osservano che le forze dell’ordine “non riescono a vedere” oltre alcune segnalazioni isolate di frode. In altre parole, nessuno attualmente considera Magic Mouse una campagna fraudolenta su larga scala.

Allo stesso tempo, Mnemonic ritiene che gran parte della responsabilità dell’esistenza e della prosperità di tali schemi fraudolenti ricada sulle aziende tecnologiche e sui giganti della finanza, che continuano a rendere difficile ai truffatori l’utilizzo di carte rubate.

L'articolo Dopo Darcula arriva Magic Mouse: il nuovo incubo del phishing ruba 650.000 carte al mese proviene da il blog della sicurezza informatica.



Dal 13 al 17 agosto Riccione sta ospitando la missione di evangelizzazione di strada evangelizzazione di strada “Chi ha sete venga a me”, promossa dalla diocesi di Rimini insieme al Punto Giovane, alla comunità Nuovi Orizzonti, alle Sentinelle del Ma…


Join Our Leadership Team — Apply to Be a Team Lead for the European Pirates!


We’re building something big — a European umbrella organisation working to support our pirate parties across Europe and amplify our shared political voice. Our movement is rooted in collaboration, grassroots empowerment, and making real impact at the EU level. To make this happen, we’re looking for motivated, reliable, and passionate people to take on Team Lead roles in our volunteer-run European secretariat.

As a Team Lead, you will:

  • Coordinate the work of your team and help shape its priorities
  • Collaborate closely with other team leads in the Management Team
  • Support volunteers, delegate tasks, and ensure smooth internal communication
  • Help develop the strategy and direction of our European-level work

We are currently seeking Team Leads for the following teams:

  • Communications Team
  • Community & Outreach Team
  • IT Team
  • Policy Team
  • Operations Team

👉 You don’t need to be an expert or have years of experience — we value commitment, collaboration, and curiosity. We’re especially excited to hear from people with lived experience in grassroots activism, digital tools, or cross-border collaboration.

⏳ Time commitment: Flexible and part-time (volunteer-based). We expect most leads to dedicate around 4–6 hours per week, depending on availability.

🌍 Location: Remote / anywhere in Europe

Interested in helping build a stronger, more connected European movement?
📩Apply now or reach out with questions — we’d love to hear from you!
The post Join Our Leadership Team — Apply to Be a Team Lead for the European Pirates! first appeared on European Pirate Party.




PhantomCard: la nuova minaccia NFC che colpisce gli utenti Android in Brasile


@Informatica (Italy e non Italy 😁)
Di recente l’abbiamo visto con NFCgate, ora lo scenario si ripete con l’emergere di PhantomCard, un malware Android sofisticato che sfrutta la tecnologia NFC per perpetrare frodi finanziarie. Scoperto in Brasile ma con potenziali ramificazioni globali, questo



John Lennon & Yoko Ono annunciata l’uscita del box Power To The People
freezonemagazine.com/news/john…
Esce il 10 ottobre il Box deluxe composto di nove CD + tre Blue-Ray più un libro di oltre duecento pagine dedicato a John Lennon e Yoko Ono. 31 brani live tratti dai due storici concerti di John e Yoko al One To One Concert, accompagnati dalla Plastic Ono Band, dagli Elephant’s Memory e da […]
L'articolo John Lennon &


Join Our Leadership Team — Apply to Be a Team Lead for the European Pirates!


@politics
european-pirateparty.eu/join-o…

We’re building something big — a European umbrella organisation working to support our pirate parties across Europe and amplify our shared political

Jure Repinc reshared this.



Ucraina, l’Europa supera gli Usa e diventa il maggior fornitore di aiuti militari a Kyiv

@Notizie dall'Italia e dal mondo

Per la prima volta dall’inizio della guerra in Ucraina, l’Europa ha superato gli Stati Uniti nella produzione e nella fornitura di materiale militare a Kyiv. Lo dicono i numeri diffusi dal Kiel Institute for the World Economy: tra febbraio 2022 e giugno 2025, la produzione militare europea



Samsung si piega a Trump: nuovi investimenti per chip americani

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Il lavoro muscolare di Trump sta dando i suoi frutti: la necessità di Apple e Tesla di trovare una filiera statunitense sta portando Samsung a investire nuovamente negli States. La notizia comunque ha una




Golden Dome, ecco come funzionerà lo scudo spaziale di Trump. I dettagli

@Notizie dall'Italia e dal mondo

Il Dipartimento della Difesa degli Stati Uniti ha deciso di alzare il velo sull’architettura operativa del Golden Dome, il futuro sistema di difesa missilistica destinato a proteggere l’intero territorio statunitense – Alaska e Hawaii inclusi – contro le minacce balistiche,



"Fiat: in autunno le prime immagini del prossimo SUV"

ancora suv? maledetti suv. sono la rovina del mondo. a chi si ostina produrre suv posso solo augurare il fallimento.

RFanciola reshared this.

in reply to simona

peggio: non hai visuale davanti e un bambino per strada è in pericolo. sono peggiori dal punto di vista della frenata. hai meno angolo di visuale in generale. cappottano facilmente. e sopratutto se già era un problema viaggiare in 1 persona da 80kg spendendo energia per trasportare 1000kg, la situazione non è migliorata quando per portare una persona si trasportava 3500kg... e poi compriamo le auto elettriche per fare gli ecologisti? ha senso? compra 1 motorino e inquini di meno. siamo proprio malati. è questo l'unico problema.


il concerto di Gastone Pietrucci e la Macina con Elisa Ridolfi - 13 agosto 2025


Il concerto di Gastone Pietrucci e La Macina insieme a Elisa Ridolfi, vincitrice del Premio Tenco 2024 per la migliore opera prima, si è rivelato un'esperienza suggestiva e toccante. Il luogo prescelto, una radura a pochi metri dal borgo medievale di Cerreto di Montegiorgio, ha donato all'evento un'atmosfera intima e quasi magica. Seduti su semplici assi di legno grezzo, ci siamo ritrovati a stretto contatto con i musicisti, annullando ogni barriera e favorendo una vera e propria comunione tra artisti e ascoltatori.
Nonostante la qualità del suono non fosse sempre eccelsa, quasi a voler dimostrare che quello che conta è la sincerità e non la perfezione artificiale, l'espressività dei musicisti ha superato ogni limite tecnico. Le emozioni scaturite da ogni nota e da ogni parola sono state così coinvolgenti da rendere l'esperienza unica e indimenticabile.
L'esibizione ha offerto un viaggio musicale che ha saputo unire brani originali ad omaggi ad alcuni dei più grandi cantautori italiani: le canzoni di De André, Ciampi, Tenco e Piero Cesanelli (padre della rassegna musicale Musicultura) sono state reinterpretate con passione e rispetto. Momenti di rara intensità si sono raggiunti con le esecuzioni appassionate di "Vedrai, vedrai" di Luigi Tenco e del canto popolare "Sotto la croce Maria", così come con la sorprendente interpretazione della “Ballata degli impiccati” di De André, che è stata introdotta dalla voce nuda e dirompente di Elisa Ridolfi.
Questi passaggi hanno trasformato la serata da un semplice concerto in un'esperienza quasi spirituale di condivisione di sentimenti e storie, confermando ancora una volta il valore di una musica che affonda le radici nella tradizione, ma che sa parlare con forza e attualità al cuore di chi ascolta.
(13agosto2025 - #worldland festival)

Giacomo Franca reshared this.



è una conferma che la risposta è si dentro di noi, epperò è quella sbagliata.


Fortinet VPN sotto attacco: una nuova ondata di attacchi brute-force rilevata da GrayNoise


GreyNoise ha rilevato due importanti ondate di attacchi ai dispositivi Fortinet all’inizio di agosto 2025. La prima, un attacco brute-force mirato alla VPN SSL di Fortinet il 3 agosto, che poi è stato seguito da un brusco cambiamento su FortiManager il 5 agosto, con una nuova firma del traffico. I ricercatori avvertono che tali picchi di attività precedono la pubblicazione di vulnerabilità critiche nell’80% dei casi.

Secondo GreyNoise, il picco del 3 agosto ha coinvolto tentativi di accesso basati su dizionario sulla VPN SSL FortiOS . L’impronta digitale della rete JA4+, che utilizza l’impronta digitale TLS per classificare il traffico crittografato, ha indicato una possibile corrispondenza con l’attività osservata a giugno. Tale traffico proveniva da un indirizzo IP residenziale associato all’ISP Pilot Fiber Inc. Sebbene ciò non dimostri un’attribuzione specifica, i ricercatori suggeriscono il riutilizzo dello stesso toolkit o infrastruttura.

Il 5 agosto, è stata osservata una situazione diversa. L’aggressore è passato da SSL VPN a FortiManager e ha iniziato con attacchi di brute force al servizio FGFM, che fa parte del sistema di gestione Fortinet. Sebbene i filtri GreyNoise continuassero a attivarsi sul vecchio tag “Fortinet SSL VPN Bruteforcer”, la firma del traffico stessa è cambiata. Il nuovo flusso non corrispondeva più a FortiOS, ma corrispondeva esattamente al profilo FortiManager, ovvero FGFM. Ciò indica un cambio di target che utilizza gli stessi strumenti o una continuazione della campagna con un nuovo focus.

GreyNoise sottolinea che queste scansioni non sono solitamente esplorative, poiché le attività esplorative hanno una portata ampia, una frequenza moderata e non comportano l’individuazione delle password. In questo caso, l’attività sembra essere una fase preparatoria prima di un tentativo di sfruttamento. L’obiettivo potrebbe non essere semplicemente quello di scoprire endpoint accessibili, ma di condurre una ricognizione preliminare e valutare il valore dei potenziali obiettivi, con un successivo attacco a una vulnerabilità reale non ancora resa pubblica.

Secondo le statistiche di GreyNoise, i picchi di attività registrati , in particolare quelli contrassegnati con questo tag, presentano un’elevata correlazione con i futuri CVE nei prodotti Fortinet. La maggior parte di questi incidenti si conclude con la pubblicazione di una vulnerabilità entro sei settimane. Pertanto, i responsabili della sicurezza non dovrebbero attribuirli a tentativi di sfruttare bug chiusi da tempo. Al contrario, è giunto il momento di rafforzare le difese, soprattutto sulle interfacce esterne, e limitare l’accesso ai pannelli amministrativi tramite IP.

GreyNoise ha anche pubblicato un elenco degli indirizzi IP coinvolti in entrambe le ondate di attacchi e raccomanda di bloccarli su tutti i dispositivi Fortinet.

Secondo gli analisti, dietro questi indirizzi si cela lo stesso gruppo, che conduce test adattivi e modifica le tattiche in tempo reale. A questo proposito, le aziende che utilizzano FortiGate, FortiManager o SSL VPN di Fortinet dovrebbero urgentemente rafforzare le policy di autenticazione, abilitare la protezione brute-force, applicare limitazioni di velocità e, se possibile, limitare l’accesso alle interfacce di gestione solo tramite VPN affidabili o whitelist IP.

L'articolo Fortinet VPN sotto attacco: una nuova ondata di attacchi brute-force rilevata da GrayNoise proviene da il blog della sicurezza informatica.



L’obsolescenza programmata di Microsoft verrà punita?

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
La sospensione del supporto a Windows 10 finisce in tribunale. Un cittadino californiano accusa Microsoft di spingere all'acquisto di nuovi dispositivi al fine di dominare il mercato dell'IA. Il caso, tra l'altro, ha anche un

reshared this



Il missile nucleare che inquina l’Artico. Putin testa il Burevestnik alla vigilia dei colloqui con Trump

@Notizie dall'Italia e dal mondo

Dal 7 al 12 agosto, le autorità russe hanno chiuso lo spazio aereo per 500 chilometri lungo la costa occidentale di Novaya Zemlya. Almeno quattro navi di supporto hanno raggiunto posizioni di osservazione nel Mare di Barents, mentre due velivoli della Rosatom



Hacking the Bluetooth-Enabled Anker Prime Power Bank


Selling power banks these days isn’t easy, as you can only stretch the reasonable limits of capacity and output wattage so far. Fortunately there is now a new game in town, with ‘smart’ power banks, like the Anker one that [Aaron Christophel] recently purchased for reverse-engineering. It features Bluetooth (BLE), a ‘smart app’ and a rather fancy screen on the front with quite of information. This also means that there’s a lot to hack here beyond basic battery management system (BMS) features.

As detailed on the GitHub project page, after you get past the glue-and-plastic-clip top, you will find inside a PCB with a GD32F303 MCU, a Telink TLSR8253 BLE IC and the 240×240 ST7789 LCD in addition to a few other ICs to handle BMS functions, RTC and such. Before firmware version 1.6.2 you can simply overwrite the firmware, but Anker added a signature check to later firmware updates.

The BLE feature is used to communicate with the Anker app, which the official product page advertises as being good for real-time stats, smart charging and finding the power bank by making a loud noise. [Aaron] already reverse-engineered the protocol and offers his own alternative on the project page. Naturally updating the firmware is usually also done via BLE.

Although the BLE and mobile app feature is decidedly a gimmick, hacking it could allow for some interesting UPS-like and other features. We just hope that battery safety features aren’t defined solely in software, lest these power banks can be compromised with a nefarious or improper firmware update.

youtube.com/embed/WtEIjkMUH_8?…


hackaday.com/2025/08/14/hackin…






Passo qualche giorno da una mia zia 85enne a cui sono molto affezionato, lo faccio un paio di volte l'anno, per ferragosto e per l'ultimo dell'anno.

Da 5 anni io la televisione l'accendo solo per guardare Netflix, la TV vera e propria la guardo solo qui da mia zia, dove è accesa dalla mattina alla sera.

Ecco... io credo che per capire meglio questo paese, e come sia finito così in basso, non si possa prescindere dal riflettere su quello che passa in TV.




La guerra dei chip si tinge di giallo: tracker statunitensi nei semiconduttori per non finire in Cina

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Per evitare che i chip americani finiscano nelle AI cinesi Washington avrebbe iniziato - ben prima dell'arrivo di Trump - a

reshared this



Recensione : Wojtek Mazowleski Quintet – Live Spirit I


Con Live Spirit I, il Wojtek Mazolewski Quintet firma il suo primo album dal vivo: un viaggio sonoro tra jazz spirituale e momenti di estasi collettiva, che celebra la libertà compositiva del suo leader.

iyezine.com/wojtek-mazowleski-…

@Musica Agorà




possibile che i repubblicani non si siano accorti che trump naviga "a vista" con una politica inconsistente come non mai negli ultimi 200 anni, che oscilla fra il lasciare l'europa alla russia, per impegnarsi personalmente extra nato in ucraina, con politiche anti-liberiste come i dazi che poi sono tasse per gli americani, dove neppure si capisce per trump come rendere l'america grande se contro nessuno, contro tutto il mondo, contro solo la cina, contro tutto meno che contro la cina, contro tutti meno che contro la russia, ma si è mai visto un presidente usa così confuso? sembra un nano che continua a prendere sberle da tutti, inconcludente e incapace anche solo di mettere a fuoco o decidere quali sono davvero i problemi che vuole risolvere, o stabilire delle priorità, con l'aiuto o l'appoggio non si sa di chi, e nel contempo, mentre rotea, colpisce a caso, infastidendo più che altro e confondendo. qualcuno ha il coraggio di vederci un raffinato piano che noi non capiamo?



Musk vuole portare in tribunale Apple (a causa di OpenAI)

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Elon Musk starebbe per procedere legalmente nei confronti di Apple, che accusa di favorire solo OpenAI nel suo App Store, violando le norme antitrust. Ma anche Sam Altman ha qualcosa da ridire su X e poi in ballo ci

RFanciola reshared this.



La favola dell’anonimato online. Il post di F-Norm Society sull'attacco degli Stati ai diritti dei cittadini

Si racconta la favola dell’anonimato online come la causa di tutti i mali. Il problema è che qualcuno ci crede. Non solo. Il problema è anche che chi ci crede è anche una politica che pensa così di soddisfare un finto problema con una proposta di soluzione stupida. Così stupida che viene addirittura giustificata con l’intenzione di rendere Internet e gli ecosistemi digitali “più sicuri” rendendoli praticamente ad accesso controllato.

@Privacy Pride

redhotcyber.com/post/f-norm-ri…




OLTRE L’INVISIBILE – Federico Faggin Giugno 2024
freezonemagazine.com/articoli/…
Quando ci si imbatte in una lettura sui massimi sistemi si sa che il percorso è in salita e per niente facile ma il segno che lascia in questo caso è davvero rivoluzionario e avvincente. Federico Faggin è uno scienziato che ha lavorato dal 1968 alla Silicon Valley inventando quel microprocessore che ha cambiato lo […]
L'articolo OLTRE L’INVISIBILE – Federico


Esercizi scritti - zulianis.eu/journal/esercizi-s…
Esercizi perché per certi aspetti assomigliano agli esercizi che facevamo a scuola. Scritti per distinguerli dagli esercizi solo pensati, che sono la maggior parte. Seguire delle regole (dopo essersele date) è un buon modo di sperimentare soluzioni nuove, proprio come fanno i bizzarri consigli di Natalie Goldberg in #Scrivere zen. Quindi ho deciso di fare […]


The Department of Energy said it will close FOIA requests from last year unless the requester emails the agency to say they are still interested. Experts say it's an "attempt to close out as many FOIA requests as possible."

The Department of Energy said it will close FOIA requests from last year unless the requester emails the agency to say they are still interested. Experts say itx27;s an "attempt to close out as many FOIA requests as possible."#FOIA #FOIAForum


Trump Administration Outlines Plan to Throw Out an Agency's FOIA Requests En Masse


The Department of Energy (DOE) said in a public notice scheduled to be published Thursday that it will throw out all Freedom of Information Act (FOIA) requests sent to the agency before October 1, 2024 unless the requester proactively emails the agency to tell it they are still interested in the documents they requested. This will result in the improper closure of likely thousands of FOIA requests if not more; government transparency experts told 404 Media that the move is “insane,” “ludicrous,” a “Pandora’s Box,” and “an underhanded attempt to close out as many FOIA requests as possible.”

The DOE notice says “requesters who submitted a FOIA request to DOE HQ at any time prior to October 1, 2024 (FY25), that is still open and is not under active litigation with DOE (or another Federal agency) shall email StillInterestedFOIA@hq.doe.gov to continue processing of the FOIA request […] If DOE HQ does not receive a response from requesters within the 30-day time-period with a DOE control number, no further action will be taken on the open FOIA request(s), and the file may be administratively closed.” A note at the top of the notice says it is scheduled to be formally published in the Federal Register on Thursday.

The agency will send out what are known as “still interested” letters, which federal agencies have used over the years to see if a requester wants to withdraw their request after a certain period of inactivity. These types of letters are controversial and perhaps not legal, and previous administrations have said that they should be used rarely and that requests should only be closed after an agency made multiple attempts to contact a requester over multiple methods of communication. What the DOE is doing now is sending these letters to submitters of all requests prior to October 1, 2024, which is not really that long ago; it also said it will close the requests of people who do not respond in a specific way to a specific email address.

FOIA requests—especially complicated ones—can often take months or years to process. I have outstanding FOIA requests with numerous federal agencies that I filed years ago, and am still interested in getting back, and I have gotten useful documents from federal agencies after years of waiting. The notion that large numbers of people who filed FOIA requests as recently as September 2024, which is less than a year ago, are suddenly uninterested in getting the documents they requested is absurd and should be seen as an attack on public transparency, experts told 404 Media. The DOE’s own reports show that it often does not respond to FOIA requests within a year, and, of course, a backlog exists in part because agencies are not terribly responsive to FOIA.

“If a requester proactively reaches out and says I am withdrawing my request, then no problem, they don’t have to process it,” Adam Marshall, senior staff attorney at the Reporters Committee for Freedom of the Press, told me. “The agency can’t say we’ve decided we’ve gotten a lot of requests and we don’t want to do them so we’re throwing them out.”

“I was pretty shocked when I saw this to be honest,” Marshall added. “I’ve never seen anything like this in 10 years of doing FOIA work, and it’s egregious for a few reasons. I don’t think agencies have the authority to close a FOIA request if they don’t get a response to a ‘still interested’ letter. The statute doesn’t provide for that authority, and the amount of time the agency is giving people to respond—30 days—it sounds like a long time but if you happen to miss that email or aren’t digging through your backlogs, it’s not a lot of time. The notion that FOIA requesters should keep an eye out in the Federal Register for this kind of notice is ludicrous.”

The DOE notice essentially claims that the agency believes it gets too many FOIA requests and doesn’t feel like answering them. “DOE’s incoming FOIA requests have more than tripled in the past four years, with over 4,000 requests received in FY24, and an expected 5,000 or more requests in FY25. DOE has limited resources to process the burgeoning number of FOIA requests,” the notice says. “Therefore, DOE is undertaking this endeavor as an attempt to free up government resources to better serve the American people and focus its efforts on more efficiently connecting the citizenry with the work of its government.”

Lauren Harper of the Freedom of the Press Foundation told me in an email that she also has not seen any sort of precedent for this and that “it is an underhanded attempt to close out as many FOIA requests as possible, because who in their right mind checks the federal register regularly, and it should be challenged in court. (On that note, I am filing a FOIA request about this proposal.)”

“The use of still interested letters isn't explicitly allowed in the FOIA statute at all, and, as far as I know, there is absolutely zero case law that would support the department sending a mass ‘still interested’ letter via the federal register,” she added. “That they are also sending emails is not a saving grace; these types of letters are supposed to be used sparingly—not as a flagrant attempt to reduce their backlog by any means necessary. I also worry it will open a Pandora's Box—if other agencies see this, some are sure to follow.”

Marshall said that FOIA response times have been getting worse for years across multiple administrations (which has also been my experience). The Trump administration and the Department of Government Efficiency (DOGE) have cut a large number of jobs in many agencies across the government, which may have further degraded response times. But until this, there hadn’t been major proactive attempts taken by the self-defined “most transparent administration in history” to destroy FOIA.

“This is of a different nature than what we have seen so far, this affirmative, large-scale effort to purport to cancel a large number of pending FOIA requests,” Marshall said.




esistono repubblicani onesti e non fascisti negli stati uniti? diciamo quantomeno di ideologia liberista in termini economici... che non abbraccino l'idea dell'uomo forte e a tutti costi solo al potere?


The LAPD attacked reporters, despite a court order. Then it lied about it


Last Friday, officers from the Los Angeles Police Department beat, shoved, detained, and jailed journalists covering a protest over the previous detention of a community activist who had been documenting immigration officers.

It was a brutal and shocking attack on the press, even by the LAPD’s standards. Even before scores of journalists were attacked and detained at recent immigration raid protests, the force had one of the most atrocious track records when it comes to press freedom. The LAPD is also subject to a court order prohibiting it from interfering with journalists covering protests, which it appears to have wantonly violated.

What’s almost as shocking is how little attention these recent attacks have drawn from the mainstream media. Even five days later, the hometown Los Angeles Times, for instance, hadn’t yet written about Friday’s attack on the press. Thankfully, an out-of-town columnist, Will Bunch at the Philadelphia Inquirer, published an article strongly condemning the LAPD’s actions.

But even worse than ignoring the attacks on the press is reporting false information about them spread by the LAPD. Unfortunately, California station KABC-TV appears to have done just that, by reporting uncritically on claims by the LAPD that two people were detained at the protest for “pretending to be media.”

The two were, in fact, journalists, according to reporter Mel Buer, who was at the protest and was also detained, and Adam Rose, who’s been exhaustively tracking the recent attacks for the Los Angeles Press Club. Rose’s tracking spreadsheet identifies the detained journalists as Nate Gowdy and Carrie Schreck.

The U.S. Press Freedom Tracker reported that LAPD officers detained Gowdy and Schreck, who were working together to report on the protest, because they didn’t have physical press badges.

A lack of physical press credentials isn’t a good enough reason to stop a journalist from reporting under the First Amendment, and it certainly isn’t a good enough reason under the order entered by a federal judge in response to a lawsuit by the Los Angeles Press Club restraining the LAPD’s mistreatment of journalists covering protests. Even guidance from the LAPD’s chief of police says that a lack of credentials isn’t enough to justify a detention.

Instead, officers should have considered all the evidence that Gowdy and Schreck were at the protest to gather the news, like the statements from other credentialed reporters who vouched for them, their camera equipment, and Gowdy’s offer to show digital credentials or prove through a quick Google search that he and Schreck were journalists. And if they were still in doubt, officers were required to grant Gowdy and Schreck’s requests to speak to a supervisor.

KABC-TV, which calls itself the “West Coast flagship” of Disney’s ABC-owned TV station group, also should have known better than to simply repeat a statement from the LAPD that people were arrested for “pretending” to be press.

The government often makes this claim and uses it as a justification for why it “can’t” respect the First Amendment rights of journalists and simply must continue to beat and terrorize them along with protesters. But research has shown that protesters or others claiming to be press is rare. Any time government officials make this claim, journalists should be skeptical and investigate it before reporting it.

Journalists must bring a healthy dose of skepticism to any statements by the LAPD about its treatment of the press. The LAPD knows that it violates the First Amendment and California law to detain or otherwise interfere with journalists covering protests, but it continues to do so anyway.

It seems to prefer to risk contempt of court or massive settlements rather than respect the First Amendment, and it apparently has no compunction about making false statements to the press about its actions.

The only response available to journalists — other than suing to enforce their rights — is to report, accurately, on every single First Amendment violation by the LAPD. If they do, perhaps the citizens of Los Angeles will make clear to elected officials and law enforcement leaders that they won’t tolerate their police force acting in such a lawless manner.


freedom.press/issues/the-lapd-…



Strage a Lampedusa: 30 morti e decine di dispersi, tra loro tre neonati


@Giornalismo e disordine informativo
articolo21.org/2025/08/strage-…
Sono già 30 le vittime accertate, tra cui tre neonati, ma i dispersi si contano a decine.La presidente Meloni maledice gli scafisti e invita alla pietà. Certo, questa è l’ora della pietà e della solidarietà, ma sono




Monte Sole, un appello per fermare il massacro di Gaza


@Giornalismo e disordine informativo
articolo21.org/2025/08/monte-s…
Le iniziative per la Pace in Medio Oriente non si fermano. Domani 14 agosto a Monte Sole, terra di stragi e di Resistenza dove è nata la scuola di Pace voluta da don Dossetti, in questo luogo simbolo dove morirono 770 civili innocenti per



Rete criminale organizzata albanese smantellata


Una serie di perquisizioni in Albania, nei giorni scorsi, ha portato all'arresto di 10 presunti membri di una rete criminale organizzata albanese coinvolta nel traffico di cocaina e nel riciclaggio di denaro. La rete, che aveva legami con organizzazioni internazionali, è stata presa di mira dalle forze dell'ordine albanesi in coordinamento con Belgio, Francia, Germania, Italia e Paesi Bassi.

Durante l'operazione, le autorità hanno sequestrato ingenti beni, tra cui immobili, veicoli e azioni di società per un valore di diversi milioni di euro. L'indagine ha inoltre portato alla luce una serie di prove fisiche e digitali, inclusi i dati della piattaforma di comunicazione criptata Sky ECC, che è stata disattivata nel 2021 ma ha comunque prodotto risultati operativi.

Il capo della rete era coinvolto nell'organizzazione di spedizioni e nell'investimento in grandi quantità di cocaina, ed era ricercato per una condanna a 21 anni di carcere emessa da un tribunale italiano per omicidio e altri reati. L'operazione ha segnato un successo basato sui dati: gli investigatori hanno ricostruito consegne di tonnellate di cocaina verso i porti dell'UE e sequestrato milioni di euro di beni.

#SKYECC #criminalitàalbanese

fabrizio reshared this.



10.000 firme per la petizione di Possibile contro Italia-Israele. Stop the game!
possibile.com/10000-firme-noit…
l genocidio va fermato, i governi devono interrompere i rapporti con Israele e soprattutto smettere di vendere armi a uno stato che sta compiendo un genocidio sotto gli occhi del mondo. Finché Israele non affronterà nessuna conseguenza, nemmeno sui campi di gioco internazionali, tanti,

reshared this



A DHS sizzle reel that used "Public Service Announcement" got hit with a copyright takedown request and has been deleted off of X.#Immigration #ICE


ICE Propaganda Video That Used Jay-Z Song Hit With Copyright Takedown


A Department of Homeland Security (DHS) propaganda video that featured Jay-Z’s music was hit with a copyright takedown request on X, and appears to have been hit with copyright violations on both Instagram and Facebook as well.

The video features footage of Immigrations and Customs Enforcement (ICE) agents training and doing immigration raids set to Jay-Z’s 2003 song “Public Service Announcement,” which has recently been used in at least two DHS videos. DHS tweeted the video alongside the caption “Hunt Cartels. Save America. JOIN.ICE.GOV.” The original tweet, from August 10, has 2.9 million views on X; the video has been replaced with the message “This media has been disabled in response to a report by the copyright owner.”

DHS also posted the video on Instagram and Facebook. On both platforms, the video has stayed up but Jay-Z’s music has been removed, suggesting that it got hit with a copyright notice on those platforms too. On Instagram, where it has nearly a million views, a message that says “This audio is no longer available” plays if you try to unmute the video. The sound on the video has been removed on Facebook as well, but a quirk of the platform allowed me to check what the removed audio was by clicking the name of the “sound” in the bottom left corner of the Reel, which showed it was indeed Jay-Z’s “Public Service Announcement. A Facebook user ripped and reposted the video, which still has the sound, and can be found here at the time of publication.

Neither Meta nor X responded to a request for comment. The Recording Industry Association of America, which files a huge number of copyright takedown requests across the internet for major artists, declined to comment to 404 Media. DHS also did not respond to a request for comment. Jay-Z’s Roc Nation also did not respond to a request for comment.

In recent weeks, DHS officials and agents have heavily ratcheted up the number of videos they post to social media. Many of the videos are heavily edited sizzle reels from immigration raids set to rap music or songs like the “Bad Boys” theme and Johnny Cash’s “God’s Gonna Cut You Down.”

The footage is being used to recruit new ICE agents and to promote the cruelty of Trump’s immigration raids; a video posted by chief border patrol agent Gregory Bovino features Los Angeles Mayor Karen Bass warning about the overreach of the federal government in LA and includes a remixed version of “Public Service Announcement” over first-person footage of Customs and Border Protection (CBP) agents doing an immigration raid Thursday at a Home Depot in Los Angeles. That particular raid may have violated a court injunction, experts have argued.

“The Call of Duty aesthetic is sickening,” Chris Gilliard, co-director of The Critical Internet Studies Institute and author of the forthcoming book Luxury Surveillance, told 404 Media.

404 Media reported last week that CBP agents have been wearing Meta’s AI camera glasses to at least two recent immigration raids in Los Angeles (it is unclear what cameras were used to film the footage used in either of the videos featuring Jay-Z music).

“CBP utilize Go Pros mounted to helmets or body armor at times, as well as traditional DSLR handheld cameras,” a CBP spokesperson told 404 Media when we asked about its agents wearing Meta AI glasses. The spokesperson added “CBP does not have an arrangement with Meta. The use of personal recording devices is not authorized. However, Border Patrol agents may wear personally purchased sunglasses.”

DHS has also allowed Fox News reporters to embed with and film agents on raids, and footage from these raids shows DHS agents with DSLR cameras running alongside each other to capture footage. It is clearly important to this administration to capture and widely publicize this footage, which often emphasizes agents grabbing people who are running away from them.

The copyright takedown is notable because it shows DHS is not getting permission from artists to use their music in these propaganda videos, which are being used to recruit ICE agents in the immediate aftermath of a huge funding increase. As we reported earlier this month, ICE is trying to do a social media advertising blitz with part of this new funding, and is looking to plaster ads on social media, TV, and streaming sites. Despite this cash injection, early reports suggest that ICE is having trouble finding people to work for it.




10.000 firme per la petizione di Possibile contro Italia-Israele. Stop the game!


10.000 firme per la petizione di Possibile contro Italia-Israele
Druetti e Di Lenardo: come può lo sport ignorare il genocidio?

“Già diecimila persone hanno firmato su www.possibile.com/unafirmaper la petizione per dire no a Italia-Israele, la partita di qualificazione ai mondiali che è in programma il 14 ottobre a Udine.” Lo dichiarano Francesca Druetti, Segretaria Nazionale di Possibile, e Andrea di Lenardo, Capogruppo di Alleanza Verdi Sinistra Possibile al Consiglio Comunale di Udine.

“Sono più di 60mila le vittime solo negli ultimi due anni — ricordano Druetti e Di Lenardo — un’intera popolazione affamata, Gaza rasa al suolo dai bombardamenti. Nel frattempo, Israele, la sua nazionale, i suoi atleti, dovrebbero continuare a competere come se niente fosse. Oltre 600 vittime erano atleti, calciatori anche. Giocare questa partita è un affronto alla memoria di chi è stato ucciso, e di chiunque abbia a cuore i diritti umani, la giustizia, e lo sport.

“Da quando abbiamo lanciato la petizione — concludono Druetti e di Lenardo — Israele ha ucciso altre centinaia di persone, compresi sei giornalisti in un attacco mirato. Il genocidio va fermato, i governi devono interrompere i rapporti con Israele e soprattutto smettere di vendere armi a uno stato che sta compiendo un genocidio sotto gli occhi del mondo. Finché Israele non affronterà nessuna conseguenza, nemmeno sui campi di gioco internazionali, tanti, troppi continueranno a sentirsi giustificati nel voltarsi dall’altra parte. Ecco perché vi chiediamo di continuare a firmare e condividere la petizione, per far sentire la nostra voce e il nostro dissenso. Stop the game.”

L'articolo 10.000 firme per la petizione di Possibile contro Italia-Israele. Stop the game! proviene da Possibile.

reshared this




F-35 italiani intercettano due caccia russi nello spazio aereo Nato. I dettagli

@Notizie dall'Italia e dal mondo

Per la prima volta, due caccia F-35 Lightning II dell’Aeronautica militare italiana hanno intercettato due velivoli russi operanti vicino allo spazio aereo dell’Alleanza. I due aerei intercettati sono decollati dalla base di Ämari, in Estonia, come confermato



By omitting the "one-third" provision that most other states with age verification laws have adopted, Wyoming and South Dakota are placing the burden of verifying users' ages on all sorts of websites, far beyond porn.

By omitting the "one-third" provision that most other states with age verification laws have adopted, Wyoming and South Dakota are placing the burden of verifying usersx27; ages on all sorts of websites, far beyond porn.#ageverification


Wyoming and South Dakota Age Verification Laws Could Include Huge Parts of the Internet


Last month, age verification laws went into effect in Wyoming and South Dakota, requiring sites hosting “material that is harmful to minors” to verify visitors are over 18 years old. These would normally just be two more states joining the nearly 30 that have so far ceded ground to a years-long campaign for enforcing invasive, ineffective methods of keeping kids away from porn online.

But these two states’ laws leave out an important condition: Unlike the laws passed in other states, they don’t state that this applies only to sites with “33.3 percent” or one-third “harmful” material. That could mean Wyoming and South Dakota would require a huge number of sites to use age verification because they host any material they deem harmful to minors, not just porn sites.

Louisiana became the first state to pass an age verification law in the US in January 2023, and since then, most states have either copied or modeled their laws on Louisiana’s—including in Arizona, Missouri, and Ohio, where these laws will be enacted within the coming weeks. And most have included the “one-third” clause, which would theoretically limit the age verification burden to adult sites. But dropping that provision, as Wyoming and South Dakota have done, opens a huge swath of sites to the burden of verifying the ages of visitors in those states.

Louisiana’s law states:

“Any commercial entity that knowingly and intentionally publishes or distributes material harmful to minors on the internet from a website that contains a substantial portion of such material shall be held liable if the entity fails to perform reasonable age verification methods to verify the age of individuals attempting to access the material.”

A “substantial portion” is 33.3 percent or more material on a site that’s “harmful to minors,” the law says.

The same organizations that have lobbied for age verification laws that apply to porn sites have also spent years targeting social media platforms like Reddit and X, as well as streaming services like Netflix, for hosting adult content they deem “sexploitation.” While these sites and platforms do host adult content, age-gating the entire internet only pushes adult consumers and children alike into less-regulated, more exploitative spaces and situations, while everyone just uses VPNs to get around gates.

Florida Sues Huge Porn Sites Including XVideos and Bang Bros Over Age Verification Law
The lawsuit alleges XVideos, Bang Bros, XNXX, Girls Gone Wild and TrafficFactory are in violation of Florida’s law that requires adult platforms to verify visitors are over 18.
404 MediaSamantha Cole


Adult industry advocacy group the Free Speech Coalition issued an alert about Wyoming and South Dakota’s dropping of the one-third or “substantial” requirement on Tuesday, writing that this could “create civil and criminal liability for social media platforms such as X, Reddit and Discord, retailers such as Amazon and Barnes & Noble, streaming platforms such as Netflix and Rumble,” and any other platform that simply allowed material these states consider “harmful to minors” but doesn’t age-verify. “Under these new laws, a platform with any amount of material ‘harmful to minors,’ is required to verify the age of all visitors using the site. Operators of platforms that fail to do so may be subject to civil suits or even arrest,” they wrote.

I asked Wyoming Representative Martha Lawley, the lead sponsor of the state's bill, if the omission was on purpose and why. "I did not include the '33% or 1/3 rule' in my Age Verification Bill because it creates an almost impossible burden on a victim pursuing a lawsuit for violations of the law. It is more difficult than many might understand to prove percentage of an internet site that qualifies as “pornographic or material harmful to minor'" Lawley wrote in an email. "This was a provision that the porn industry lobbied heavily to be included. In Wyoming, we resisted those efforts. The second issue I had with these types of provisions is that they created some potential U.S. Constitutional concerns. These Constitutional concerns were actually brought up by several U.S. Supreme Court justices during the oral argument in the Texas Age Verification case. So, in short the 1/3 limitation places an undue burden on victims and creates potential U.S. Constitutional concerns."

I asked South Dakota Representative and sponsor of that state's bill Bethany Soye the same question. "We intentionally used the standard of 'regular course of trade or business' instead of 1/3. The 1/3 standard leaves many questions open. How is the amount measured? Is it number of images, minutes of video, number of separate webpages, pixels, etc. During oral argument, a Justice (Alito if I remember correctly) asked the attorney what percentage of porn was on his client’s websites. The attorney couldn’t give him an answer, instead he mentioned the other things on the websites like articles on sexual health and how to be an activist against these laws," Soye told me in an email. "The 1/3 standard also calls into question the government’s compelling interest in protecting kids from porn. Are we saying that 33% is harmful to minors but a website with 30% is not? We chose regular course of business because it is focused on the purpose of the business/website, not an arbitrary number. If you look into the history of the bill, 33% was a totally random number put in the first bill passed in Louisiana. Other states have just been copying it since then. We hope that our standard becomes the norm for state laws moving forward."

Kansas Is About to Pass the Most Extreme Age Verification Law Yet
The bill would make sites with more than 25 percent adult content liable to fines, and lumps homosexuality into “sexual conduct.”
404 MediaSamantha Cole


A version of what could be the future of the internet in the US is already playing out in the UK. Last month, the UK enacted the Online Safety Act, which forces platforms to verify the ages of everyone who tries to access certain kinds of content deemed harmful to children. So far, this has included (but isn’t limited to) Discord, popular communities on Reddit, social media sites like Bluesky, and certain content on Spotify.
playlist.megaphone.fm?p=TBIEA2…
On Monday, a judge dismissed a case brought by the Wikimedia Foundation that argued the over-broadness of the new UK rules would “undermine the privacy and safety of Wikipedia’s volunteer contributors, expose the encyclopedia to manipulation and vandalism, and divert essential resources from protecting people and improving Wikipedia, one of the world’s most trusted and widely used digital public goods,” Wikimedia Foundation wrote. “For example, the Foundation would be required to verify the identity of many Wikipedia contributors, undermining the privacy that is central to keeping Wikipedia volunteers safe.”

"As we're seeing in the UK with the Online Safety Act, laws designed to protect the children from ‘harmful material’ online quickly metastasize and begin capturing nearly all users and all sites in surveillance and censorship schemes,” Mike Stabile, director of public policy at the Free Speech Coalition, told me in an email following the alert. “These laws give the government legal power to threaten platform owners into censoring or removing fairly innocuous content — healthcare information, mainstream films, memes, political speech — while decimating privacy protections for adults. Porn was only ever a Trojan horse for advancing these laws. Now, unfortunately, we're starting to see what we warned was inside all along."

Updated 8/13 2:35 p.m. EST with comment from Rep. Lawley.

Updated 8/13 3:35 p.m. EST with comment from Rep. Soye.




CBP's use of Meta Ray-Bans; the bargain that voice actors are having to make with AI; and how Flock tech is being essentially hacked into by the DEA.

CBPx27;s use of Meta Ray-Bans; the bargain that voice actors are having to make with AI; and how Flock tech is being essentially hacked into by the DEA.#Podcast


Podcast: Why Are DHS Agents Wearing Meta Ray-Bans?


We start this week with Jason’s article about a CBP official wearing Meta Ray-Bans smart glasses to an immigration raid. A lot of stuff happened after we published that article too. After the break, Sam tells us about the bargain that voice actors are making with AI. In the subscribers-only section, Jason tells us how a DEA official used a cop’s password to AI cameras to then do immigration surveillance.
playlist.megaphone.fm?e=TBIEA7…
Listen to the weekly podcast on Apple Podcasts,Spotify, or YouTube. Become a paid subscriber for access to this episode's bonus content and to power our journalism. If you become a paid subscriber, check your inbox for an email from our podcast host Transistor for a link to the subscribers-only version! You can also add that subscribers feed to your podcast app of choice and never miss an episode that way. The email should also contain the subscribers-only unlisted YouTube link for the extended video version too. It will also be in the show notes in your podcast player.
youtube.com/embed/nxHFsQSVRkE?…




Emails obtained by 404 Media show the LAPD was interested in GeoSpy, an AI tool that can quickly figure out where a photo was taken.#FOIA


LAPD Eyes ‘GeoSpy’, an AI Tool That Can Geolocate Photos in Seconds


📄
This article was primarily reported using public records requests. We are making it available to all readers as a public service. FOIA reporting can be expensive, please consider subscribing to 404 Media to support this work. Or send us a one time donation via our tip jar here.

The Los Angeles Police Department (LAPD) has shown interest in using GeoSpy, a powerful AI tool that can pinpoint the location of photos based on features such as the soil, architecture, and other identifying features, according to emails obtained by 404 Media. The news also comes as GeoSpy’s founder shared a video showing how the tool can be used in relation to undocumented immigrants in sanctuary cities, and specifically Los Angeles.

The emails provide the first named case of a law enforcement agency showing clear interest in the tool. GeoSpy can also let law enforcement determine what home or building, down to the specific address, a photo came from, in some cases including photos taken inside with no windows or view of the street.

“Let’s start with one seat/license (me),” an October 2024 email from an LAPD official to Graylark Technologies, the company behind GeoSpy, reads. The LAPD official is from the agency’s Robbery-Homicide division, according to the email. 404 Media obtained the emails through a public records request with the LAPD.

Upgrade to continue reading


Become a paid member to get access to all premium content
Upgrade


#FOIA



Durante la cena pasquale, Gesù rivela che uno dei Dodici sta per tradirlo, eppure “il modo” in cui “parla di ciò che sta per accadere è sorprendente. Non alza la voce, non punta il dito, non pronuncia il nome di Giuda”.