Salta al contenuto principale




Una flotta di droni entro il 2035, il piano di Berlino per dominare i mari

@Notizie dall'Italia e dal mondo

Una flotta di navi/droni di grosso tonnellaggio per condurre missioni ad alto rischio e per tagliare sui tempi di addestramento, questa è la ricetta di Berlino per tornare sui mari. Secondo il documento strategico Kurs Marine, la Germania prevede l’acquisizione di tre



Anche l'Italia nella task force internazionale contro lo sfruttamento sessuale minorile


Oltre 20 paesi hanno partecipato all'operazione, ospitata presso la sede centrale di Europol all'Aia

Un totale di 51 bambini vittime di abusi sessuali sono stati identificati durante la 17a edizione della Victim Identification Task Force (#VIDTF17). L'operazione si è svolta nel corso di due settimane, dall'8 al 19 settembre 2025, presso la sede di #Europol. 27 esperti di Europol, #INTERPOL e 22 paesi in tutto il mondo hanno lavorato fianco a fianco per analizzare le immagini di bambini vittime di abusi non identificati, per identificarli e salvaguardarli.
Gli esperti partecipanti alla task force hanno analizzato oltre 300 set di dati raffiguranti vittime di sfruttamento sessuale minorile (CSE). Gli analisti hanno visto vittime di entrambi i sessi, dai bambini agli adolescenti, con una varietà di origini etniche e di molte nazionalità diverse. A seguito dell'operazione, alle autorità nazionali sono state inviate 213 piste per ulteriori indagini.

La Victim Identification Task Force (#VIDTF) è stata organizzata per la prima volta nel 2014. Da allora, il numero di set di dati analizzati è aumentato in modo esponenziale, insieme al database di Europol, creato nel 2006 e che ora contiene oltre 111 milioni di foto e video unici di sfruttamento sessuale minorile.

Oltre al crescente volume di immagini, lo scambio di materiale pedopornografico (CSAM) sembra ora essere molto più frequente rispetto al passato, probabilmente a causa dell'accessibilità e della grande capacità di archiviazione dei telefoni cellulari. Parallelamente, il CSAM generato dall’intelligenza artificiale è diventato uno dei modi principali in cui i trasgressori producono, acquisiscono e immagazzinano tale materiale.
Nel corso degli anni, i delinquenti hanno anche avuto accesso a strumenti e risorse più sofisticati. Oggi condividono anche tutorial sui forum del dark web che spiegano come creare CSAM iperrealistico generato dall’intelligenza artificiale.

Oltre 1 000 vittime salvaguardate riunendo le forze

Le autorità nazionali spesso non dispongono degli strumenti e delle risorse umane per far fronte alla quantità di CSAM creato e diffuso. Questo è il motivo per cui la Task Force per l’identificazione delle vittime è così preziosa nella lotta contro lo sfruttamento sessuale dei minori: riunisce esperti di molteplici nazionalità, facilita la comunicazione e rafforza la cooperazione tra le forze dell’ordine di tutto il mondo.
Nelle precedenti sedici edizioni del VIDTF, le autorità hanno salvaguardato un totale di 1 010 vittime, arrestato 301 autori di reato, analizzato 8 005 set di dati e diffuso 2 266 pacchetti di intelligence ai partner di Europol.

L'appello di Europol

Europol ha recentemente rilasciato nuove immagini sulla piattaforma “Stop agli abusi sui minori – Trace an Object” (europol.europa.eu/stopchildabu…), che invita tutti i cittadini a esaminare gli oggetti provenienti da casi irrisolti di abusi sessuali su minori e vedere se ne riconoscono qualcuno. Nessun indizio è troppo piccolo: anche il più piccolo dettaglio potrebbe aiutare a identificare e salvaguardare un bambino abusato sessualmente.

L'obiettivo principale è risalire all'origine degli oggetti raffigurati. Chiunque ne riconosca uno può fornire informazioni a Europol in modo anonimo. Una volta identificato il paese o il luogo, Europol informerà l'autorità competente di contrasto per indagare ulteriormente. L'obiettivo è quello di accelerare l'identificazione sia della vittima che dell'autore del reato.

@Attualità, Geopolitica e Satira

fabrizio reshared this.



L’Italia si doti di una strategia di sicurezza nazionale. L’appello dall’Osservatorio UniPegaso

@Notizie dall'Italia e dal mondo

L’Italia è l’unico Paese dell’Unione europea a non disporre ancora di una strategia di sicurezza nazionale. L’assenza di un documento strategico omnicomprensivo, capace di tracciare i profili delle principali minacce e di indicare le



Florida's attorney general claims Nutaku, Spicevids, and Segpay are in violation of the state's age verification law.

Floridax27;s attorney general claims Nutaku, Spicevids, and Segpay are in violation of the statex27;s age verification law.#ageverification


Florida Sues Hentai Site and High-Risk Payment Processor for Not Verifying Ages


Florida is suing massively popular anime and hentai games platform Nutaku, as well as the payment processor Segpay, in two complaints that allege the companies ignored the state’s age verification law.

Nutaku is owned by Aylo, which is also the parent company of Pornhub and some of the biggest porn platforms on the internet. Florida Attorney General James Uthmeier said in a press release last week that his office is suing Aylo and Segpay—a high-risk merchant account that specializes in adult entertainment—and alleges that the companies are violating state law HB3, which requires websites to verify that visitors based in Florida are at least 18 years old.

Uthmeier’s complaint against Segpay and its parent companies claims that because Segpay provides payment processing services to the adult gaming site xh.lustyheroes.com, which is owned by Gethins Ltd., one of the other defendants in that complaint, it should be on the hook for the site not verifying ages in Florida. Segpay also has a business address in Florida, according to the complaint and Segpay’s site.

The complaints were first reported by AVN. Corey Silverstein, an attorney representing Segpay, told AVN last week: "Segpay has yet to be served with any formal complaint and maintains a policy of not commenting on pending or threatened litigation.” Silverman told 404 Media Segpay has no additional comment.

The separate complaint against Nutaku and Aylo also names Spicevids, a site that curates videos from a variety of adult studios. Nutaku has two sites: a safe-for-work game site at nutaku.com, and a “lewd” game site at nutaku.net. Aylo started blocking access to several of its other porn sites, including Pornhub, when Florida’s age verification went into effect in January, but Spicevids and Nutaku’s sites remained available, requiring users to click a box to agree that they’re 18 but not requiring ID.

Florida Sues Huge Porn Sites Including XVideos and Bang Bros Over Age Verification Law
The lawsuit alleges XVideos, Bang Bros, XNXX, Girls Gone Wild and TrafficFactory are in violation of Florida’s law that requires adult platforms to verify visitors are over 18.
404 MediaSamantha Cole


“Aylo believes that Spicevids and Nutaku comply with Florida's age verification requirements. We intend to vigorously defend against these allegations in court,” a spokesperson for Aylo told 404 Media in a statement. “Spicevids has implemented age verification measures consistent with the law's requirements since it took effect on January 1. Nutaku's gaming platform operates within the law's parameters, as games containing sexually explicit content represent less than the statutory threshold. These platforms are committed to ongoing compliance with applicable state laws. We look forward to presenting the facts through the appropriate legal process.”

Florida’s law applies to sites with a “substantial portion,” defined as more than 33.3 percent of total material on the website, of adult material.

Age Verification Laws Drag Us Back to the Dark Ages of the Internet
Invasive and ineffective age verification laws that require users show government-issued ID, like a driver’s license or passport, are passing like wildfire across the U.S.
404 MediaEmanuel Maiberg


Both complaints start with the baseless claim: “Access to online pornography is a pervasive threat to the health and well-being of children and adolescents.”

Florida brought a similar lawsuit against major porn sites outside of the Aylo umbrella last month, claiming that XVideos, Bang Bros, XNXX, Girls Gone Wild and TrafficFactory were all flaunting the state’s age verification law.
playlist.megaphone.fm?p=TBIEA2…




The drone flight log data, which stretches from March 2024 to March 2025, shows CBP flying its drones to support ICE and other agencies. CBP maintains multiple Predator drones and flew them over the recent anti-ICE protests in Los Angeles.#FOIA


CBP Flew Drones to Help ICE 50 Times in Last Year


📄
This article was primarily reported using public records requests. We are making it available to all readers as a public service. FOIA reporting can be expensive, please consider subscribing to 404 Media to support this work. Or send us a one time donation via our tip jar here.

Customs and Border Protection (CBP) flew its drones, which could include the agency’s MQ-9 Predator drones, at least 50 times last year in support of Immigration and Customs Enforcement (ICE), according to new data obtained by 404 Media.

The data shows that CBP continues to support not just ICE but other federal agencies, such as the FBI, with its fleet of drones. In June, 404 Media reported CBP flew two high-powered Predator drones above protests in Los Angeles, flights which CBP said were to provide “officer safety surveillance.”

“This is especially concerning, given ICE’s ongoing unlawful immigration sweeps and this administration’s concerted effort to suppress any dissent,” Jennifer Lynch, general counsel for activist organization the Electronic Frontier Foundation (EFF), which has previously researched CBP’s use of drones, told 404 Media. “These records show that CBP has never stopped operating its drones on behalf of other federal, state, and local agencies, including ICE. In fact, the program has expanded exponentially since EFF first reported on it in 2012.”

💡
Do you know anything else about CBP’s drones or other technology? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.

The new data spans more than 3,100 flights between March 2024 and March 2025. It includes the date of each mission, its category such as whether the flight was for training or enforcement purposes, the mission type (such as reconnaissance against a target), the region the flight took place in, which branch was responsible, and a column that often mentions if the flight was in support of another agency.

For example, on October 22, 2024, CBP flew a drone as part of “investigative support” for ICE as part of its enforcement mission, according to the data. CBP also flew drones for ICE over the next four days, the data shows.

On November 7, 2024, CBP flew a drone to assist ICE with a “special security event,” according to the data.

On February 21, 2024, CBP helped ICE with “reconnaissance surveillance target acquisition,” the data shows.
playlist.megaphone.fm?p=TBIEA2…
In all, CBP flew drones to assist ICE in some capacity a total of 50 times during the one year period the data relates to. 404 Media obtained the data through a Freedom of Information Act (FOIA) request with CBP. The majority of the data covers the Biden presidency, and shows that CBP collaborated regularly with ICE during that administration. But given Trump’s recent crackdowns on protests and the administration’s mass deportation effort, Lynch is concerned about that collaboration during the current presidency.

The data also shows CBP flying drones to assist the U.S. Coast Guard; the DEA and FBI with investigative support; U.S. Southern Command (SOUTHCOM), a part of the military; and in one case the Office of the President of the United States. Other flights are listed as assisting “states” and “local,” indicating CBP assisted local and state agencies too. Some flights are for relocating the drones or for maintenance, the data shows.

The EFF previously obtained similar drone flight logs. Some of those records list more specific organizations CBP has flown drones for, including particular state bodies. In 2014, the EFF found CBP loaned its drones to other agencies more than 700 times in three years.
A screenshot from the data.
CBP’s fleet includes around ten drones, according to a presentation available online. They include the Predator B, which is essentially an unarmed version of the same drone the U.S. flies overseas as part of combat operations. The drones are typically loaded with cameras and other surveillance technology. After flying Predator drones during the recent Los Angeles protests, the official Department of Homeland Security X account posted footage collected by the drones.

“CBP’s drones are equipped with many different types of surveillance technology, from thermal imaging to high definition cameras to tools that can track movement over time. Smaller drones can identify faces and license plates while larger drones like the MQ-9s used to surveil protestors in Los Angeles have extensive range and can stay in the air for 30 hours at a time,” Lynch said.

CBP told 404 Media drones are a critical part of the agency’s border security mission. The agency said this includes illicit border crossings, investigations, intelligence, and reconnaissance patrols. CBP said its drones are only equipped with electro-optical/infrared cameras and Vehicle and Dismount Exploitation Radar (VADER). This can detect vehicle and human movement, the agency said.

Lynch added “Drone surveillance, especially when combined with ICE’s unregulated access to sensitive data like millions of drivers’ license plate records, threatens the privacy and security of people all across the country.”


#FOIA


ClickFix: la truffa che inganna gli utenti Mac e installa il trojan AMOS


I criminali informatici hanno lanciato una campagna su larga scala contro gli utenti macOS, camuffando malware da programmi popolari. Lo ha segnalato LastPass, che ha scoperto che anche il suo prodotto era stato falsificato. Il malware viene distribuito tramite falsi repository GitHub ottimizzati per i motori di ricerca, che gli consentono di apparire in cima ai risultati di ricerca di Google e Bing.

L’attacco utilizza lo schema ClickFix: alla vittima viene chiesto di inserire un comando nel terminale, presumibilmente per installare un’applicazione. In realtà, la vittima esegue una richiesta curl a un URL crittografato e scarica lo script install.sh nella directory /tmp.

Questo file installa il trojan Atomic Stealer (AMOS) sul computer. AMOS è uno strumento MaaS (Malware-as-a-Service) il cui noleggio costa 1.000 dollari al mese. La sua funzione di base è rubare dati dai dispositivi infetti, ma i suoi creatori hanno recentemente aggiunto una backdoor per un accesso furtivo e persistente al sistema.

Secondo LastPass, i truffatori non si limitano a copiare un singolo marchio. L’elenco dei programmi contraffatti supera i 100 e include soluzioni come 1Password, Dropbox, Confluence, Robinhood, Fidelity, Notion , Gemini, Audacity, Adobe After Effects, Thunderbird e SentinelOne.

Per aggirare le restrizioni, i truffatori creano diversi account GitHub falsi e repository duplicati con un pulsante “Download”. Cliccando su questo pulsante si accede a un sito web secondario contenente le istruzioni per eseguire un comando nel terminale.

Scenari simili per macOS sono già stati documentati in precedenza. Rapporti precedenti includevano copie di Booking.com e pseudo-programmi per “risolvere problemi” nel sistema, distribuiti tramite annunci pubblicitari. La campagna attuale è significativamente più ampia: l’automazione consente la rapida riattivazione di nuove pagine dopo il blocco.

LastPass sottolinea che monitora costantemente la situazione e inoltra segnalazioni di progetti falsi all’amministrazione di GitHub, ma la minaccia rimane a causa della facilità di creazione di nuove risorse.

Gli esperti ricordano agli utenti di fidarsi solo dei siti web ufficiali degli sviluppatori. Se il produttore non offre una versione macOS di un prodotto, l'”alternativa” sarà quasi certamente dannosa.

Nei casi in cui un’app sia disponibile, è importante verificare che sia distribuita da una fonte attendibile e non da una terza parte sconosciuta.

L'articolo ClickFix: la truffa che inganna gli utenti Mac e installa il trojan AMOS proviene da il blog della sicurezza informatica.



The Impending CRT Display Revival Will Be Televised


Until the 2000s vacuum tubes practically ruled the roost. Even if they had surrendered practically fully to semiconductor technology like integrated circuits, there was no escaping them in everything from displays to video cameras. Until CMOS sensor technology became practical, proper video cameras used video camera tubes and well into the 2000s you’d generally scoff at those newfangled LC displays as they couldn’t capture the image quality of a decent CRT TV or monitor.

For a while it seemed that LCDs might indeed be just a flash in the pan, as it saw itself competing not just with old-school CRTs, but also its purported successors in the form of SED and FED in particular, while plasma TVs made home cinema go nuts for a long while with sizes, fast response times and black levels worth their high sale prices.

We all know now that LCDs survived, along with the newcomer in OLED displays, but despite this CRTs do not feel like something we truly left behind. Along with a retro computing revival, there’s an increasing level of interest in old-school CRTs to the point where people are actively prowling for used CRTs and the discontent with LCDs and OLED is clear with people longing for futuristic technologies like MicroLED and QD displays to fix all that’s wrong with today’s displays.

Could the return of CRTs be nigh in some kind of format?

What We Have Lost


As anyone who was around during the change from CRT TVs to ‘flat screen’ LCD TVs can attest to, this newfangled display technology came with a lot of negatives. Sure, that 21″ LCD TV or monitor no longer required a small galaxy of space behind the display on the desk or stand, nor did it require at least two people to transport it safely, nor was the monitor on your desk the favorite crispy warm napping spot of your cat.

The negatives mostly came in the form of the terrible image quality. Although active matrix technology fixed the smearing and extreme ghosting of early LC displays at higher refresh rates, you still had multi-millisecond response times compared to the sub-millisecond response time of CRTs, absolutely no concept of blacks and often horrendous backlight bleeding and off-angle visual quality including image inverting with TN-based LCD panels. This is due to how the stack of filters that make up an LC display manipulate the light, with off-angle viewing disrupting the effect.
Color shift comparison for IPS (X800H) versus VA (H9G) LC displays. (Credit: RTINGS)Color shift comparison for IPS (X800H) versus VA (H9G) LC displays. (Credit: RTINGS)
Meanwhile, CRTs are capable of OLED-like perfect blacks due to phosphor being self-luminous and thus requiring no backlight. This is a feat that OLED tries to replicate, but with its own range of issues and workarounds, not to mention the limited lifespan of the organic light-emitting diodes that make up its pixels, and their relatively low brightness that e.g. LG tries to compensate for with a bright white sub-pixel in their WOLED technology.

Even so, OLED displays will get dimmer much faster than the phosphor layer of CRTs, making OLED displays relatively fragile. The ongoing RTINGS longevity test is a good study case of a wide range of LCD and OLED TVs here, with the pixel and panel refresh features on OLEDs turning out to be extremely important to even out the wear.

CRTs are also capable of syncing to a range of resolutions without scaling, as CRTs do not have a native resolution, merely a maximum dot pitch for their phosphor layer beyond which details cannot be resolved any more. The change to a fixed native resolution with LCDs meant that subpixel rendering technologies like Microsoft’s ClearType became crucial.

To this day LCDs are still pretty bad at off-angle performance, meaning that you have to look at a larger LCD from pretty close to forty-five degrees from the center line to not notice color saturation and brightness shifts. While per-pixel response times have come down to more reasonable levels, much of this is due to LCD overdriving, which tries to compensate for ghosting by using higher voltages for the pixel transitions, but can lead to overshoot and a nasty corona effect, as well as reduce the panel’s lifespan.
Blur Busters pursuit camera example of blur reduction. (Credit: Blur Busters)Blur Busters pursuit camera example of blur reduction. (Credit: Blur Busters)
Both OLEDs and LCDs suffer from persistence blurring even when their pixel-response times should be fast enough to keep up with a CRT’s phosphors. One current workaround is to insert a black frame (BFI) which can be done in a variety of ways, including strobing the backlight on LCDs, but this is just one of many motion blur reduction workarounds.

As noted by the Blur Busters article, some of these blur reduction approaches work better than others, with issues like strobe crosstalk generally still being present, yet hopefully not too noticeably.

In short, modern LCDs and OLED displays are still really quite bad by a number of objective metrics compared to CRTs, making it little wonder that there’s a strong hankering for something new, along with blatant nostalgia for plasma and CRT technology, flawed as they are. That said, we live in 2025 and thus do not have to be constrained by the technological limitations of 1950s pre-semiconductor vacuum tube technology.

The SED Future

An LG Flatron CRT TV from around 2007. (Credit: Briho, Wikimedia)An LG Flatron CRT TV from around 2007. (Credit: Briho, Wikimedia)
One major issue with CRTs is hard to ignore, no matter how rose-tinted your nostalgia glasses are. Walking into an electronics store back in the olden days with a wall of CRT TVs on display you’re hit by both the high-pitched squeal from the high-voltage flyback converters and the depth of these absolute units. While these days you got flat panel TVs expanding into every larger display sizes, CRT TVs were always held back by the triple electron gun setup. These generate the electrons which are subsequently magnetically guided to the bit of phosphor that they’re supposed to accelerate into.

Making such CRTs flat can be done to some extent by getting creative with said guidance, but with major compromises like divergence and you’ll never get a real flat panel. This dilemma led to the concept of replacing the glass tube and small number of electron guns with semiconductor or carbon-nanotube electron emitters. Placed practically right on top of the phosphor layer, each sub-pixel could have its own miniscule electron gun this way, with the whole setup being reminiscent of plasma displays in many ways, just thinner, less power-hungry and presumably cheaper.

Internal structures of SED (top) versus FED, showing the difference between the cathode plates. (Source: Fink et al., Applied Nanotech, 2007)Internal structures of SED (top) versus FED, showing the difference between the cathode plates. (Source: Fink et al., Applied Nanotech, 2007)
Canon began research on Surface-conduction Electron-Emitter Display (SED) technology in 1986 as a potential successor to CRT technology. This was joined in 1991 by a similar ‘ThinCRT’ effort that used field emission, which evolved into Sony’s FED take on the very similar SED technology. Although both display technologies are rather similar, they have a very different emitter structure, which affects the way they are integrated and operated.

Both of them have in common that they can be very thin, with the thickness determined by the thickness of the cathode plate – featuring the emitters – combined with that of the anode and the vacuum space in between. As mentioned in the review article by Fink et al. from 2007, the vacuum gap at the time was 1.7 mm for a 36″ SED-type display, with spacers inside this vacuum providing the structural support against the external atmosphere not wanting said vacuum to exist there any more.

This aspect is similar to CRTs and vacuum fluorescent displays (VFDs), though one requirement with both SED and FED is to have a much better vacuum than in CRTs due to the far smaller tolerances. While in CRTs it was accepted that the imperfect vacuum would create ions in addition to electrons, this molecule-sized issue did necessitate the integration of so-called ion traps in CRTs prior to aluminized CRT faces, but this is not an option with these new display types.

For SEDs and FEDs there is fortunately a solution to maintain a pure vacuum through the use of so-called getters, which is a reactive material that reacts with gas molecules to remove them from the vacuum gap. With all of this in place and the unit sealed, the required driving voltage for SED at the time was about 20V compared to 50-100V for FED, which is still far below the kilovolt-level driving voltage for CRTs.

A Tenuous Revival


Both the companies behind SED and Sony decided to spin down their R&D on this new take on the veritable CRT, as LCDs were surging into the market. As consumers discovered that they could now get 32+” TVs without having to check the load-bearing capacity of their floor or resorting to the debauchery of CRT (rear) projectors, the fact that LCD TVs weren’t such visual marvels was a mere trifle compared to the fact that TVs were now wall-mountable.

Even as image quality connoisseurs flocked first to plasma and then OLED displays, the exploding market for LCDs crowded out alternatives. During the 2010s you’d find CRTs discarded alongside once prized plasma TVs, either given away for practically free or scrapped by the thousands. Then came the retro gaming revival, which is currently sending the used CRT market skyrocketing, and which is leading us to ask major questions about where the display market is heading.

Although CRTs never really went away from a manufacturing point of view, it’s mostly through specialized manufacturers like Thomas Electronics who will fulfill your CRT fix, though on a strict ‘contact us for a quote’ basis. Restarting a mass-manufacturing production line for something like once super-common CRT TVs would require a major investment that so far nobody is willing to front.

Meanwhile LCD and OLED technology have hit some serious technological dead-ends, while potential non-organic LED alternatives such as microLED have trouble scaling down to practical pixel densities and yields.

There’s a chance that Sony and others can open some drawers with old ‘thin CRT’ plans, dust off some prototypes and work through the remaining R&D issues with SED and FED for potentially a pittance of what alternative, brand-new technologies like MicroLED or quantum dot displays would cost.

Will it happen? Maybe not. It’s quite possible that we’ll still be trying to fix OLED and LCDs for the next decade and beyond, while waxing nostalgically about how much more beautiful the past was, and the future could have been, if only we hadn’t bothered with those goshdarn twisting liquid crystals.


hackaday.com/2025/09/23/the-im…



Ecco l’F-47, il nuovo caccia Usa che cambia la supremazia dei cieli

@Notizie dall'Italia e dal mondo

In un mondo attraversato da tensioni geopolitiche crescenti, dalla guerra in Ucraina alla competizione tra Stati Uniti e Cina, il controllo dello spazio aereo non è più solo questione di supremazia tecnica, ma di equilibrio strategico globale. Per questo la notizia che il primo F-47,



"La situazione in tutta la striscia di Gaza è terribile particolarmente questi giorni". Lo ha detto padre Gabriel Romanelli, parroco della parrocchia cattolica della Sacra Famiglia in Gaza City, in un video messaggio inviato a Padre Pio Tv in occasio…


Scammers stole the crypto from a Latvian streamer battling cancer and the wider security community rallied to make him whole.#News #Crypto


Steam Hosted Malware Game that Stole $32,000 from a Cancer Patient Live on Stream


A cancer patient lost $32,000 in crypto after installing a Steam game on his computer containing malware that drained one of his crypto wallets. Raivo Plavnieks is a 26 year old self-described “crypto degen” from Latvia who streams on the site Pump.fun under the name Rastaland. After a seven hour stream on September 20, Plavnieks logged off and cashed out his earnings from the stream.. Literally seconds later, someone drained those earnings from his wallet, according to an archive of the livestream and blockchain records reviewed by 404 Media.

Plavnieks had installed a game called BlockBlasters, a 2D platformer listed on Steam that launched July 31, 2025 to a small audience who’d given it positive reviews. But the game was a scam and an August patch injected malware into the game that was meant to scan a user’s hard drive for data and, ultimately, their crypto. BlockBlasters is no longer listed on Steam and has been flagged as malicious by the independent Steam archiving site SteamDB. Valve did not respond to 404 Media’s request for comment.
playlist.megaphone.fm?p=TBIEA2…
The cyber security firm G Data CyberDefense dug into BlockBlasters and detailed how the software got access to user’s crypto. SteamDB’s archive of the game’s patches shows 3 files added in the August 30 patch: game2.bat, and two zip files. According to the G Data writeup, the batch file collected information on the user’s machine and then unpacked the zip files. “The two VBS scripts that ‘game2.bat’ executes are batch file loaders,” G Data said. As the scripts run, they inject more malware into the user’s machine and eventually go after the data and extensions of Chrome, Brave, and Microsoft Edge browsers, the company said.

This is at least the third time this year Valve has pulled a game from Steam after it turned out to contain malware. In February, Valve pulled the survival game PirateFi after users discovered it contained password stealing malware. A month later, in March, people who tried to download a demo for Sniper: Phantom's Resolution were redirected from Steam to GitHub for the installer. Once again, it was malware.

Plavnieks' experience gave the BlockBlasters situation a higher profile than PirateFi and Sniper: Phantom’s Resolution. Footage of emaciated and exhausted Plavnieks sobbing on his livestream while one of his brothers attempted to soothe him struck a nerve with some in the crypto and security community online. The crypto space is full of rug pulls, burns, bad investments, and wild stunts, but stealing from a guy with cancer seemed like a bridge too far.

In addition to the G Data writeup, several other people have reverse-engineered BlockBusters code and, they believe, found the people responsible. “The shitty malware sent all the stolen data to a Telegram the scammers made,” vx-underground, a group of malware researchers, said in a post on X. “We connected to the Telegram channel using the same credentials that were inside of the shitty malware. Inside the channel was the scammer(s). We got their Telegram IDs.”

According to Plavnieks, he was able to get his creator rewards sent to a new (and safe) crypto wallet in the future. Cryptocurrency personality Alex Becker sent Plavnieks $32,000 to cover the cost of the losses. And a group of open-source intelligence hobbyists and interested tech folks dug into BlockBlasters code, figured out the scheme, built a list of alleged victims, and also found the people they think are responsible for the scam.

“I wanted to take a second and just thank you all from the bottom of my heart, me, my brothers, and my mom is completely left without words on all the support we have received past 24h after the hack happened,” Plavineks said in a post on X. “Seems like the whole [community] rallied together behind my story and is showing support one way or another.”




Corte d’appello di Milano: le rette di ricovero per patologie degenerative sono integralmente a carico del SSN


Con sentenza n. 1644 del 9 giugno 2025, la Corte d’Appello di Milano ha riformato la decisione del Tribunale che aveva posto a carico del familiare parte delle rette di ricovero in una struttura sociosanitaria. La Corte ha accolto l’appello del figlio di una paziente affetta da demenza, dichiarando la nullità dell’impegno di pagamento sottoscritto all’ingresso in RSA, in quanto contrario a norme imperative (art. 1418 c.c.).

Il quadro normativo


La disciplina di riferimento è quella dei Livelli Essenziali di Assistenza (LEA), definiti dal D.P.C.M. 14 febbraio 2001 e dal successivo D.P.C.M. 29 novembre 2001.

  • L’art. 3, co. 1 del D.P.C.M. 2001, attuativo del D.lgs 502/92 in materia di prestazioni sociosanitarie prevede la copertura del SSN delle socio-sanitarie ad elevata integrazione sanitaria; queste ultime sono quelle prestazioni, come i ricoveri per gli anziani non autosufficienti o con disabilità gravi e gravissime, che necessitano di assistenza siano inscindibilmente connessa a alla cura.
  • In altre parole, laddove il ricovero è finalizzato al Piano terapeutico individualizzato e dai bisogno anche sanitari non erogabili dalla famiglia in setting domiciliari, è ritenuta assorbente la natura sanitaria, con conseguente gratuità per l’assistito.


La giurisprudenza di legittimità


La Corte di Cassazione ha ormai tracciato un orientamento chiaro:

  • Cass. civ., Sez. III, 24 gennaio 2023, n. 2038: le prestazioni socio-assistenziali connesse inscindibilmente a quelle sanitarie comportano la gratuità integrale;
  • Cass. civ., Sez. III, 11 dicembre 2023, n. 34590: l’attività svolta a favore di malati di Alzheimer in istituto di cura è qualificabile come attività sanitaria, di competenza del SSN;
  • Cass. civ., Sez. III, 22 febbraio 2024, n. 4752: è sufficiente la presenza di poche (e dunque non prevalenti) prestazioni sanitarie collegate per rendere gratuito l’intero trattamento;
  • Cass. civ., Sez. III, ord. 1 febbraio 2024, n. 2216: la componente sanitaria rende nulle le clausole di compartecipazione economica a carico dei pazienti o dei familiari.

La Corte d’Appello di Milano si è allineata a questo filone, riconoscendo che le condizioni cliniche della degente (grave decadimento cognitivo, pluripatologie, necessità di trattamenti continuativi) imponevano un trattamento terapeutico personalizzato, dunque rientrante a pieno titolo nelle prestazioni sanitarie ad elevata integrazione sanitaria.

Profili costituzionali


Il principio trova fondamento negli artt. 2, 3 e 32 Cost.:

  • la dignità e l’eguaglianza sostanziale delle persone non autosufficienti impongono che le cure siano garantite indipendentemente dalle condizioni economiche;
  • il diritto alla salute ha natura di diritto fondamentale e non può essere condizionato dalla capacità di spesa familiare;
  • l’obbligo di garantire i LEA grava sullo Stato e sulle Regioni, senza possibilità di traslazione sui privati.

Questa decisione contribuisce a consolidare un indirizzo giurisprudenziale che non può più essere considerato isolato ma che dal 2012 è ormai granitico.

  • gli impegni di pagamento sottoscritti dai parenti sono nulli;
  • gli enti gestori devono rivolgersi esclusivamente alle Regioni per la copertura delle rette;
  • ogni richiesta economica diretta alle famiglie in presenza di patologie degenerative è contraria al diritto vigente e può essere annullata in giudizio.

La pronuncia della Corte d’Appello di Milano si inserisce in un quadro più ampio: quello della non autosufficienza come questione sociale e politica di prima grandezza.

Le famiglie continuano a sostenere costi insostenibili per garantire assistenza a persone affette da Alzheimer, demenze e patologie cronico-degenerative, nonostante una giurisprudenza ormai univoca. La sentenza ricorda che esiste un diritto esigibile, ma la sua attuazione resta disomogenea sul territorio.

È urgente che il legislatore intervenga:

  • garantendo la piena applicazione dei LEA e elaborando una risposta a livello di programmazione,
  • integrando i Livelli Essenziali delle Prestazioni Sociali (LEPS) con un fondo strutturale per la non autosufficienza,
  • assicurando la presa in carico personalizzata e partecipata prevista dalla L. 328/2000 e recentemente rilanciata dal D.Lgs. 62/2024 sulla riforma dell’anzianità.

Solo così sarà possibile passare dalla tutela giudiziaria del singolo caso a una garanzia effettiva e generalizzata dei diritti, evitando che la risposta allo stato di bisogno passi sempre e soltanto dai tribunali.

L'articolo Corte d’appello di Milano: le rette di ricovero per patologie degenerative sono integralmente a carico del SSN proviene da Associazione Luca Coscioni.



Arriva EDR-Freeze! Mette in coma profondo Windows senza driver vulnerabili


Uno specialista di Zero Salarium ha presentato un metodo che disabilita temporaneamente i processi antivirus e gli agenti EDR su Windows utilizzando strumenti di sistema integrati.

L’articolo descrive in dettaglio il concetto e lo strumento operativo, EDR-Freeze, un modo per interrompere specificamente i processi di monitoraggio senza installare driver vulnerabili aggiuntivi, basandosi sul comportamento dei componenti nativi del sistema operativo e sulle condizioni di competizione tra i processi.

Il trucco sta nel fatto che MiniDumpWriteDump sospende forzatamente tutti i thread del processo di destinazione durante la creazione di uno snapshot, e il processo associato che attiva il dump è responsabile della sua ripresa. La ricerca dimostra come forzare WerFaultSecure a essere eseguito con privilegi di processo protetto (PPL) a livello WinTCB e avviare un dump del PID desiderato.

WerFaultSecure si sospende quindi in un momento critico. Di conseguenza, il processo di destinazione rimane “in stato comatoso” perché anche l’initiator, che avrebbe potuto sbloccarlo, è bloccato.

Per illustrare questo approccio, l’autore utilizza CreateProcessAsPPL, i parametri di avvio WerFaultSecure, il controllo dello stato del processo e la chiamata a NtSuspendProcess sul processo initiator al momento opportuno. Il meccanismo in sé non richiede exploit di driver di terze parti e funziona in modalità utente, rendendolo comodo per test rapidi e l’escalation delle capacità di bypass del monitoraggio.

L’articolo descrive lo strumento EDR-Freeze con un repository GitHub ed esempi di runtime: l’utilità accetta il PID del programma di destinazione e il tempo di pausa in millisecondi, quindi esegue quanto descritto e mantiene il processo antivirus sospeso. La dimostrazione dimostra che MsMpEng.exe (un servizio di Windows Defender) su Windows 11 24H2 è stato sospeso con successo per un periodo di tempo specificato e il suo stato monitorato tramite Process Explorer. L’autore sottolinea che questa tecnica funge da alternativa agli approcci BYOVD ed elimina la necessità di trasferire driver vulnerabili al computer di test.

Lo specialista consiglia di monitorare WerFaultSecure per rilevare parametri di avvio anomali: se i suoi argomenti puntano ai PID di servizi sensibili (LSASS, processi antivirus o agenti EDR ), è opportuno indagare. Inoltre, la protezione richiede meccanismi per controllare le catene di avvio dei processi protetti e verificare la presenza di sequenze insolite durante la creazione di dump.

L'articolo Arriva EDR-Freeze! Mette in coma profondo Windows senza driver vulnerabili proviene da il blog della sicurezza informatica.



Heart Rate Measurement via WiFi, The DIY Way


A few weeks back, we reported on a research group that figured out how to measure heartrate using perturbations in WiFi signals. [Nick Bild] was interested in this so-called “Pulse-Fi” technique, but noted the paper explaining it was behind a paywall. Thus, he worked to recreate the technology himself so he could publish the results openly for anyone eager to learn.

[Nick] paid for the research paper, and noted that it was short on a few of the finer details and didn’t come with any code or data from the original research team. He thus was left to figure out the finer details of how to measure heart rate via WiFi in his own way, though he believes his method is quite close to the original work.

The basic concept is simple enough. One ESP32 is set up to transmit a stream of Channel State Information packets to another ESP32, with a person standing in between. As the person’s heart beats, it changes the way the radio waves propagate from the transmitting unit to the receiver. These changes can be read from the packets, and processed to estimate the person’s heart rate. [Nick] explains the various data-massaging steps involved to go from this raw radio data to a usable heart rate readout.

It’s a great effort from [Nick] to recreate this research all on his own in his home lab. Files are on GitHub for the curious. If you’re eager to learn more about these innovative measurement techniques, you might like to read our prior reporting on the tech. Also, it’s worth remembering—don’t use your homebrew prototypes for any serious healthcare purposes.

youtube.com/embed/Cf6_PGuEiZY?…


hackaday.com/2025/09/23/heart-…



“Nothing from the past is irretrievably lost, and no border is insurmountable.” With these words, Cardinal Matteo Zuppi, Archbishop of Bologna and President of the Italian Episcopal Conference (CEI), embraced the legacy of Gorizia and Nova Gorica, on…


Giancarlo Siani, un Giornalista Giornalista


@Giornalismo e disordine informativo
articolo21.org/2025/09/giancar…
Lui è Giancarlo. Giancarlo Siani, un “giornalista giornalista”. Un ragazzo, un Uomo, che 40 anni fa, quattro giorni dopo il suo compleanno, a soli 26 anni, venne ucciso dalla camorra, semplicemente purché scriveva e lo faceva senza guardare in



È la pace, bellezza


@Giornalismo e disordine informativo
articolo21.org/2025/09/e-la-pa…
Dal 2022 giro l’Italia, tra oratori, scuole, sale varie, spesso in piccoli centri, in posti a volte improbabili invitato, da chi dice NO alla guerra. MI é stato così chiaro sin da subito come l’Italia della Pace fosse maggioritaria ma senza voce sui media. Le manifestazioni di ieri confermano l’isolamento di tv e



Reggio Calabria, blitz contro ‘ndrangheta. Torna in carcere il boss Piromalli

[quote]REGGIO CALABRIA – Si faceva chiamare “il padrone di Gioia Tauro” il boss Pino Piromalli, detto “Facciazza”, intercettato dalla Procura antimafia di Reggio Calabria e arrestato martedì mattina dei carabinieri…
L'articolo Reggio Calabria, blitz contro ‘ndrangheta. Torna in carcere il




Quarant’anni senza Siani. Mattarella:”Uccidere i giornalisti è uccidere la nostra libertà”

[quote]ROMA – “Sono trascorsi quarant’anni da quell’agguato. La sua testimonianza vive nella società che rifiuta l’oppressione delle mafie”. Così il presidente della Repubblica Sergio Mattarella ha ricordato Giancarlo Siani in…
L'articolo Quarant’anni senza Siani.



I dipendenti pubblici chiedono cloud europei “a proprietà dei lavoratori” per l’IA

L'articolo proviene da #Euractiv Italia ed è stato ricondiviso sulla comunità Lemmy @Intelligenza Artificiale
Un sindacato che rappresenta i dipendenti pubblici ha chiesto alla Commissione europea di rafforzare la sovranità dell’Europa nel settore del cloud e



Nvidia investe in OpenAi e accontenta (di nuovo) Trump

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Nvidia investirà fino a 100 miliardi di dollari in OpenAi per realizzare centri dati e altre infrastrutture. L'azienda di microchip di Jensen Huang vuole rimanere fondamentale per l'industria dell'intelligenza artificiale, e strizza l'occhiolino a

in reply to Informa Pirata

NVIDIA, servo della gleba di Trump.

Mi viene da bestemmiare. La bolla può seriamente fare male quando arriverà il momento.

Questa voce è stata modificata (5 giorni fa)




Abusate dai soldati Usa: le donne della Corea del Sud chiedono giustizia in tribunale


@Notizie dall'Italia e dal mondo
Decenni dopo la Guerra di Corea, le donne denunciano abusi, coercizione e sfruttamento sessuale nelle basi militari degli Stati Uniti, chiedendo risarcimento e riconoscimento ufficiale.
L'articolo Abusate dai soldati Usa: le donne della Corea



La fiducia sia nella giustizia

@Politica interna, europea e internazionale

Giustizia non è sinonimo di magistratura: sovrapporre i due concetti è un errore da cui discendono pericolose storture. Antefatto. Nei giorni scorsi, durante una puntata di Omnibus su La7, mi sono trovato a dibattere con Nicola Gratteri. Il conduttore, Gerardo Greco, mi ha chiesto cosa pensassi delle polemiche sulla sovraesposizione mediatica



GAZA. Nata nuova milizia mercenaria sul libro paga di Israele


@Notizie dall'Italia e dal mondo
Frequentatore delle carceri palestinesi, allontanato anche dall'Anp, Husam al Astal sostiene di essere a capo di centinaia di uomini e di voler combattere Hamas assieme a Israele
L'articolo GAZA. Nata nuova milizia mercenaria sul libro paga di Israele proviene da Pagine Esteri.



“Appreciation for the priests who dedicate themselves to the delicate and ever necessary ministry of the exorcist, encouraging them to live it as both a ministry of liberation and of consolation, accompanying the faithful genuinely possessed by the E…


Truffa da 15 mila euro a Mantova: finti agenti della Polizia ingannano una professionista


La Polizia di Stato ha smascherato e denunciato quattro persone coinvolte in una sofisticata truffa informatica ai danni di una cittadina mantovana, che ha subito una frode superiore a 15 mila euro.

La vittima, una nota professionista, ha ricevuto un SMS apparentemente inviato da “Poste Info”, con l’invito a contattare un numero per bloccare un presunto trasferimento fraudolento di 980 euro dal suo conto corrente.

Convinta dall’interlocutore, che si è spacciato per un agente della Polizia, la donna è stata indotta a credere che il suo conto fosse stato compromesso e che fosse necessario trasferire i fondi su conti “sicuri”. Di conseguenza, ha effettuato numerosi trasferimenti, tra ricariche Postepay, bonifici bancari e ricariche Money, per oltre 15 mila euro, che sono finiti direttamente sui conti gestiti dai truffatori

Grazie alla pronta segnalazione della vittima e al tempestivo intervento della Polizia Postale, in collaborazione con Poste Italiane e gli istituti di credito coinvolti, alcuni dei bonifici sono stati bloccati in tempo, evitando così la sottrazione di oltre 9 mila euro.

Le indagini, condotte dalla Sezione Operativa per la Sicurezza Cibernetica di Mantova, hanno consentito di identificare quattro soggetti, tutti residenti nella provincia di Napoli, ritenuti responsabili della truffa.

La Polizia di Stato ricorda che banche, Poste Italiane, Polizia Postale e nessuna forza di polizia contatta gli utenti per avvisare di movimentazioni sospette su conti correnti o chiedere di fornire codici o dati personali o finanziari, che sono strettamente riservati. In generale, invita tutti i cittadini a mantenere alta la guardia di fronte a messaggi e chiamate sospette, raccomandando di verificare sempre l’autenticità delle comunicazioni prima di effettuare qualsiasi operazione finanziaria.

Questa vicenda ci ricorda quanto sia fondamentale mantenere sempre alta la guardia di fronte a messaggi, telefonate o email sospette. Truffatori sempre più sofisticati possono spacciarsi per istituzioni affidabili, come Poste Italiane o la Polizia, inducendo le vittime a compiere operazioni finanziarie che mettono a rischio i propri risparmi.

Alcuni consigli pratici per difendersi:

  • Verifica sempre l’autenticità di messaggi e chiamate: nessuna banca o forza di polizia richiede codici o trasferimenti su conti “sicuri”.
  • Non agire sotto pressione: i truffatori cercano di creare urgenza per farti sbagliare.
  • Contatta direttamente l’ente ufficiale (banca, Poste, Polizia) prima di effettuare qualsiasi operazione.
  • Segnala subito tentativi sospetti alla Polizia Postale e all’istituto finanziario coinvolto.

La cybersecurity non è solo tecnologia, ma anche attenzione e buon senso. Ogni cittadino può diventare la prima linea di difesa contro frodi come questa: rimanere vigili, informati e prudenti può davvero fare la differenza.

L'articolo Truffa da 15 mila euro a Mantova: finti agenti della Polizia ingannano una professionista proviene da il blog della sicurezza informatica.




California journalists make secret police records public


A searchable public database known as the Police Records Access Project has made public for the first time more than 1.5 million pages of previously secret records about the use of force and misconduct by California police officers.

The California Reporting Project, a collaboration between news outlets, universities, and civil society organizations, began collecting and organizing the documents after the passage of SB 1421, a landmark law that made them public records. The law was expanded in 2021 to give the public even greater access.

Now, however, the California legislature is beginning to reverse course. This month, it passed AB 1178, a new bill that would make it harder for the public to access police misconduct records. The bill is awaiting Gov. Gavin Newsom’s signature or veto.

We spoke to journalist Lisa Pickoff-White, who is the director of research at the California Reporting Project, about what the CRP has accomplished so far and what AB 1178 could mean for transparency and accountability.

What are some of the most impactful stories journalists in the CRP have published using these records?

The project had impact from the beginning. A district attorney dropped charges against a woman who was wrongly arrested for allegedly misusing 911, after an investigation into one of the first cases released under SB 1421.

Reporters documented where departments failed to investigate police killings, found a homicide detective whose dishonesty upended criminal cases, and uncovered a pattern of excessive force at a state prison. We identified 22 people who died after officers held them face down, including two people who died after a state law banning the practice.

The governor is expected to sign a law barring agencies from using secret deals to conceal misconduct, prompted by an investigation exposing how 163 departments signed “clean-record agreements.”

What were some of the biggest challenges in collecting, reviewing, and standardizing these records and launching the database?

Obtaining records continues to be a major challenge. Just days before SB 1421 took effect, Inglewood destroyed records, for instance. In August, we sued San Joaquin County over the cost of autopsy reports related to deaths caused by law enforcement officers. We’ve made more than 3,500 record requests and maintain relationships with hundreds of agencies.

Once we have the records, assembling them is a challenge. There’s no standard police report, and we receive a great variety of files, from PDFs to surveillance video. We built tools to extract information, which researchers use to match files into a case. Then we reextract information from each case, some of which is published, and then also used to help us identify places where we need more records.

Now that the database is public, what should journalists know about using it? How has the public responded to the database since it launched?

So far, people have searched our archive more than 1 million times. We’ve heard from people who have lost loved ones to police violence that this database makes it easier to access records.

Expanding the search can help. Multiple agencies may have records about the same incident. If an officer shoots and kills someone, the police, the district attorney, and the medical examiner or coroner may hold records. A review board may have files. The state attorney general could investigate. Sometimes, agencies also investigate cases for each other; a local sheriff may investigate a shooting for a police department.

Officers can also appeal disciplinary charges. If you’re looking at a misconduct case, it might also be worth searching local administrative agencies or the state personnel board.

A new bill awaiting the signature or veto of Gov. Newsom, AB 1178, could lead to more redactions when officers claim their duties require anonymity. What would it mean for transparency and accountability if misconduct records become harder for the press and the public to obtain?

Without AB 1178, agencies can already redact the names of undercover officers. Our records show that agencies across the state continue to improperly redact the names of officers. Meanwhile, the bill’s authors have yet to cite any harm that’s come from releasing the names of officers involved in use-of-force and misconduct incidents.

Our reporting, and other investigations, revealed that agencies can and do hire officers who previously violated policies. These officers are more likely to receive complaints again. For instance, Derek Chauvin had 18 prior complaints in the Minneapolis Police Department, two of which led to discipline, before killing George Floyd.

What lessons can journalists and advocates in other states learn from CRP’s work?

There is a vast amount of work to do and collaboration is the key to doing it. More than 100 reporters have worked on the project for the last seven years, and we needed people with a wide range of expertise to make requests, build tools, and report.

That mix of skills allowed us to build tools to spot the gaps between what cases agencies disclose and incidents listed in other data sources about shootings and sustained complaints. We’ve gained thousands of cases through this kind of check. Having a group of people with request aptitude, coding ability, and domain knowledge allowed us to identify what we needed and the incremental steps to take to get it.


freedom.press/issues/californi…



Noncitizen journalists face risk from ICE — here’s what newsrooms can do


Atlanta-based journalist Mario Guevara has been detained for nearly 100 days and is facing imminent deportation from the United States. His crime? Doing his job.

Guevara was detained first by local police and then by Immigration and Customs Enforcement, in what experts say was retaliation for his reporting on immigration raids and subsequent protests.

Guevara’s case is a disturbing example of how ICE can target non-American journalists, with or without legal status. Recently, Freedom of the Press Foundation (FPF) hosted a panel discussion featuring immigration lawyers, civil rights advocates, and journalists to talk about what to do when a journalist is detained by ICE — and what must happen before that day ever comes.

Here’s what we learned.

youtube.com/embed/zYnWSBocxJ4?…

Why are journalists being detained?

Non-American journalists in the United States—especially those covering immigration or working in vulnerable roles like freelancers or independent journalists—are at serious risk as a result of the Trump administration’s anti-immigrant and anti-press policies.

President Donald Trump’s campaign to retaliate against journalists who contradict the government’s preferred narrative, plus his administration’s promise to ramp up deportations, has created a “perfect storm for those, like immigrant reporters, who are on the front lines,” said Nora Benavidez of Free Press.

“This administration has made it very clear that it considers the public and press documenting immigration enforcement to be a threat,” explained American Civil Liberties Union’s Scarlet Kim, who is part of Guevara’s legal team.

What can be done? Advanced preparation is key.

The experts we spoke to agreed: Newsrooms can’t wait until a journalist is detained to act. Here are key steps newsrooms and reporters can take before it happens.

1. Create an action plan before you need it.

Journalist and Investigative Reporters and Editors board member Alejandra Cancino has been working with fellow reporters to create a checklist to help newsrooms prepare for the potential detention of one of their reporters by ICE.

The checklist includes steps like gathering key information ahead of time, such as about medical needs, emergency contacts, and immigration attorney contacts (more on that below).

Cancino also encouraged newsrooms to talk with non-American reporters about their concerns and how to mitigate them. “We obviously don’t want any reporter to be taken away from their beat,” she explained, but creative risk-mitigation measures can work, such as having a journalist facing heightened risks report from the newsroom based on information being provided from others in the field.

2. Get local immigration counsel — now.

Journalists at risk need an experienced immigration lawyer in place before they’re detained, experts said.

Newsrooms should consider keeping local immigration counsel on retainer. “Getting a roster of vetted attorneys together is the first important step,” explained Marium Uddin, legal director of the Muslim Legal Fund of America and a former immigration judge.

News outlets should also consider having non-American journalists they work with sign a retainer agreement with an immigration attorney in advance, paid for by the newsroom, so that representation of the journalist could be immediate if they were detained, Uddin said.

To build their rosters of immigration attorneys, newsroom lawyers should seek referrals from those in their networks who may already have strong reputations and experience with the local immigration courts. They can also seek referrals by contacting organizations like the American Immigration Lawyers Association, the Immigration Advocates Network, and local legal aid offices.

Unfortunately, asylum cases can be expensive to litigate. In Texas, where Uddin is based, they can cost $10,000 to $20,000. While some immigration attorneys may offer free or low-cost services, newsrooms should budget for the cost of legal defense of non-American journalists detained by immigration authorities. Protecting journalists “is the cost of doing business,” said Cancino.

3. Act immediately to locate the detained journalist.

If a journalist is detained, one of the first steps will be to locate them, a process that can be made difficult by an opaque detention system and strategic shuffling of people around detention facilities.

Newsrooms should first determine if a detained journalist is in local custody, said Samantha Hamilton of the Atlanta Community Press Collective and Asian Americans Advancing Justice-Atlanta, since people who are arrested are often taken first to the county jail before being transferred to ICE.

If they have been transferred to ICE, Hamilton recommended searching for them with the online ICE detainee locator, using the person’s alien registration number and country of birth. If you don’t have that information, you can also search using their last name and country of origin. Hamilton recommended using all variations of the name, especially if the person has multiple names or uses a nickname.

Once a newsroom locates the journalist, it will want to figure out how to contact them. Each facility can have different communication rules, explained Uddin, which can often be found on the facility’s official website or ICE’s general detention center directory. Legal visits may require special steps, like completing a legal notice of representation.

4. Consider all the legal options.

In addition to challenging the journalist’s detention and deportation in immigration court, a legal petition known as habeas corpus may present another way to challenge the detention in court if a journalist is detained in retaliation for their reporting, said ACLU attorney Kim. A habeas petition asks a federal judge for an order that a person in custody be brought before the court to determine if their detention is valid.

A successful habeas petition can free someone from immigration detention. However, it cannot resolve their immigration status or stop deportation proceedings altogether. Those legal issues must be addressed separately in immigration court.

Habeas is especially important in cases where immigration detention is being used to punish people for their speech or journalism. The ACLU has brought habeas petitions in Guevara’s case and also to challenge the detention of students by immigration officials based on their political speech.

One of the biggest challenges in bringing a habeas petition is timing. Kim warned that strategic transfers of detainees between ICE facilities without warning can make legal action harder, because petitions must usually be filed in the jurisdiction where the detainee is being held. That’s why it’s so important to have legal counsel lined up and to file a habeas petition as soon as possible, ideally before any transfer occurs.

The bigger picture

A recent court ruling in California reminded the public that “a camera and a notepad are not threats to the public,” said Uddin. Unfortunately, however, government retaliation against non-American journalists remains a real threat.

So it’s not enough for newsrooms and journalists to prepare. People outside the media industry need to see how detentions of non-American journalists and other attacks on the press impact us all and speak up against them, explained Benavidez. “Because if it is one of those other people today,” she said, “it could be one of us tomorrow.”


freedom.press/issues/noncitize…



EGITTO. Scarcerato Alaa Abdel Fattah, simbolo della rivoluzione del 2011


@Notizie dall'Italia e dal mondo
La liberazione segna la fine di un’odissea giudiziaria e umana durata quasi sei anni, contrassegnata da condizioni detentive durissime
L'articolohttps://pagineesteri.it/2025/09/23/medioriente/egitto-scarcerato-alaa-abdel-fattah-simbolo-della-rivoluzione-del-2011/



Importazioni cinesi fraudolente in Ue. L'operazione Calypso di EPPO, la Procura europea che tutela gli interessi finanziari dell’Unione. Bloccati dalle autorità europee merci (soprattutto biciclette) per un valore di 250 milioni di euro


L’Ufficio del procuratore europeo (#EPPO) ha annunciato l’incriminazione di sei persone per il loro presunto coinvolgimento nell’ingresso fraudolento di merci cinesi (soprattutto biciclette e monopattini elettrici) nel porto greco del #Pireo. I sequestri di navi container sono avvenuti alla fine di giugno, per un totale di 2.435 container coinvolti e un valore della merce pari a 250 milioni di euro.
L’accusa dell’ufficio europeo fa parte dell’inchiesta “Calypso”, che quest’estate ha coinvolto numerosi scali dell’Unione Europea. La procuratrice capo europea, Laura Codruța Kövesi (nell'immagine), ha affermato: “Si trattava di un gruppo molto organizzato di criminali, specializzato in questo tipo di frodi. L’operazione Calypso manda a questi criminali un messaggio semplice: le regole del gioco sono cambiate, non ci sono più rifugi sicuri per voi!”.

Le autorità della dogana greca, a seguito delle prime prove ottenute, hanno accusato due doganieri, uno dei quali fermato venerdì, per false certificazioni e favoreggiamento. Inoltre, tra i fermati ci sono quattro spedizionieri frontalieri, già arrestati dalle autorità greche a giugno.
Il meccanismo fraudolento era in atto da almeno otto anni e ha causato una perdita stimata intorno ai 350 milioni di euro in dazi europei e 450 milioni di euro in IVA. L’EPPO ha stimato che, in media, solo “il 10-15 per cento del numero effettivo di biciclette elettriche in un container è stato dichiarato”.
Il modus operandi utilizzato dai contrabbandieri consisteva nel far entrare la merce dal porto del Pireo, dichiarando un valore molto basso. Operatori doganali, come spedizionieri o fornitori di servizi, facilitavano lo sdoganamento verso altri Paesi dell’Unione attraverso un meccanismo ideato per evadere il pagamento dell’IVA. Lo scopo era quello di assicurarsi un esenzione dal pagamento dell’IVA attraverso l’applicazione della Procedura Doganale 42 (CP42) che permette un esenzione se la merce viene venduta ad altre società comunitarie. In realtà, questi acquirenti finali non esistevano ed erano usati solamente come prestanome per evadere l’imposta. Le merci venivano, invece, stoccate in hub illegali cinesi e poi distribuite con documenti falsi in giro per l’Unione.

L’operazione Calypso, tenutasi quest’estate, è il più grande sequestro di container mai effettuato nell’Ue. L’indagine condotta dall’EPPO riguarda 14 Paesi: Bulgaria, Cina, Repubblica Ceca, Danimarca, Francia, Germania, Grecia, Ungheria, Italia, Polonia, Portogallo, Slovacchia, Slovenia e Spagna. La fese operativa di “Calypso” è iniziata il 26 giugno con l’esecuzione di 101 perquisizioni presso gli uffici di spedizionieri doganali. A giugno sono stati arrestati dieci individui in vari punti d’Europa. Nelle loro abitazioni, sono stati trovati circa 5,8 milioni di euro (di cui 4,75 milioni in Grecia e i restanti in Francia e Spagna), in diverse valute, tra cui dollari di Hong Kong ed euro, spesso custoditi in portafogli digitali e criptovalute.
L'EPPO, o Procura Europea, è un'agenzia dell'Unione Europea istituita nel 2017 per indagare e perseguire i reati che ledono gli interessi finanziari dell'UE, come frodi, corruzione o riciclaggio di denaro. È caratterizzata dall'essere la prima Procura sovranazionale dell'UE, con giurisdizione in 22 Stati membri; avere poteri di indagine e di azione penale diretti a livello transnazionale; essere indipendente sia dalle istituzioni dell'UE che dai singoli Stati membri; mirare a garantire un'applicazione uniforme del diritto penale dell'UE in tutta l'Unione.

@Attualità, Geopolitica e Satira

fabrizio reshared this.




Simone Galassi – Simone Galassi
freezonemagazine.com/articoli/…
Quando ho messo nel lettore il CD di Simone Galassi, ho pensato di aver messo un disco sbagliato. Mi spiego. Non che non sappia chi sia Galassi avendolo visto on stage nella band di Ellen River, ma non sapevo cosa avrei potuto attendermi da un album a suo nome. Non che questo costituisca una sorpresa, perché proprio […]
L'articolo Simone Galassi – Simone Galassi proviene da FREE ZONE MAGAZINE.


Open Letter: The European Commission and Member States must keep AI Act national implementation on track


EDRi, along with a broad coalition of civil society organisations, demands urgent action from the European Commission and Member States to ensure that the rights enshrined in the AI Act do not remain hollow promises, but that the Commission and Member States act decisively and immediately to ensure the timely national implementation of the AI Act now.

The post Open Letter: The European Commission and Member States must keep AI Act national implementation on track appeared first on European Digital Rights (EDRi).

Gazzetta del Cadavere reshared this.



Perché serve un visto europeo per attrarre i cervelli in fuga dagli Stati Uniti

L'articolo proviene da #StartMag e viene ricondiviso sulla comunità Lemmy @Informatica (Italy e non Italy 😁)
Trump, nel tentativo di proteggere il mercato americano con i nuovi visti, rischia di offrire all’Europa un’occasione irripetibile. Bruxelles ha una finestra di opportunità che non deve lasciarsi sfuggire. L'intervento



Giancarlo Siani, mio fratello


@Giornalismo e disordine informativo
articolo21.org/2025/09/giancar…
Era il 1985, avevo da poco terminato il mio turno in ospedale, faceva caldo, era stato un pomeriggio faticoso, ma alle 21,43 del 23 settembre del 1985 all’improvviso la mia vita cambia radicalmente. Non sento più la fatica, né il caldo, la mia vita si ferma bruscamente, accanto alla



Immagini dal corteo cittadino di ieri a #Genova per lo sciopero generale pro #Gaza
Buona notizia è l' ampia partecipazione (20000 circa secondo la questura, ma probabilmente di più) con tanti giovani. Forse c'è ancora un po' speranza per il futuro.
Manifestazione assolutamente pacifica e anche questo è un ottimo segnale

#gaza reshared this.

in reply to Mauro in montagna

Hi ,I haven't received any donations for days. Please help me. My children and I need to go south. We are in danger here. Save my children.💔🙏

chuffed.org/project/save-my-fa…



Adattatore ps/2 + 2 usb2.0 per slot pci - Questo è un post automatico da FediMercatino.it

Prezzo: 17 € + spedizione

Adattatore PS/2 per slot pci (attenzione, non pcie) dotato di due porte ps/2 per mouse e tastiera, e due porte usb 2.0.
Scheda senza marca ne produttore identificabile, e viene distribuita senza confezione ne manuali anche da rivenditori terzi quando nuova.

La scheda è nuova, mai usata, vendo causa acquisto errato.

Spedizione tramite piego di libri. Se desiderate un servizio si spedizione diverso contattatemi tramite messaggi prima dell'acquisto.
Spedizione combinata anche con altri oggetti delle mie altre offerte.
Disponibile per il ritiro in zona.

🔗 Link su FediMercatino.it per rispondere all'annuncio

@Il Mercatino del Fediverso 💵♻️



c'è un motivo se tutti i presidenti usa prima di trump a parole chiedevano all'europa di spendere più per le armi ma alla fine non erano mai così decisi. in fondo sebbene la difesa europea fosse una spesa per gli usa, anche avere un'europa succube ed a traino, in chiave imperialistica mondiale, costituiva un vantaggio per gli usa, che permetteva loro di dettare regole o fare le regole. si rende conto trump che se l'europa diventa davvero più autonoma, potrebbe anche ficcare un bel cazzone giù per il culo degli stati uniti?


404 Media has filed a lawsuit against ICE for access to its contract with Paragon, a company that sells powerful spyware for breaking into phones and accessing encrypted messaging apps.#Announcements


We’re Suing ICE for Its $2 Million Spyware Contract


On Monday 404 Media filed a lawsuit against Immigration and Customs Enforcement (ICE) demanding the agency publish its $2 million contract with Paragon, a company that makes powerful spyware that can remotely break into mobile phones without the target even clicking a link. The sale of the spyware to ICE has activists and lawmakers deeply concerned about what the agency, which continues to push the Trump administration’s mass deportation effort, may use the technology for. The contract and related documents 404 Media is suing for may provide more information on what ICE intends to do with the spyware.

“404 Media has asked ICE to disclose agency records relating to its contract with a company known for its powerful spyware tool whose potential use in the agency’s ongoing mass-deportation campaign has prompted lawmakers, civil liberties organizations, and immigration groups to express deep concerns over potential civil rights abuses,” the lawsuit says.

404 Media first filed a Freedom of Information Act (FOIA) request with ICE for documents related to its Paragon purchase in September 2024. Under the law, agencies are required to provide a response within 20 days, or provide an explanation of why they need more time. ICE acknowledged receipt of the request in September 2024, but has not since replied to any follow up inquiries. 404 Media then filed the lawsuit.

ICE signed the contract with Paragon’s U.S. subsidiary in September 2024. Soon after, the then Biden White House put a freeze on the deal as it investigated whether it clashed with a Biden executive order restricting the government’s use of spyware, WIRED reported. At the end of August with Trump in power, ICE reactivated the contract, independent journalist Jack Poulson reported.

💡
Do you know anything else about Paragon, this contract, or any others? I would love to hear from you. Using a non-work device, you can message me securely on Signal at joseph.404 or send me an email at joseph@404media.co.

The contract itself is for “a fully configured proprietary solution including license, hardware, warranty, maintenance, and training,” according to a description included in a public U.S. procurement database. The funding office for the purchase is listed as a division of Homeland Security Investigations (HSI). It is not clear if the ICE deal is for a custom-made tool or for some version of Paragon’s flagship “Graphite” software.

Graphite is capable of letting police remotely break into messaging apps like WhatsApp, Signal, Facebook Messenger, and Gmail according to a 2021 report from Forbes. While other government spyware tries to take over an entire device allowing all sorts of other capabilities, Paragon sets itself apart by promising to access just the messaging applications, according to Forbes.

Still, that is an exceptionally powerful capability which can skirt the protections offered by end-to-end encrypted apps, and one that is likely very attractive to law enforcement or some intelligence agencies. In March researchers from Citizen Lab, an academic group that investigates the government spyware industry, said they identified suspected Paragon deployments in Australia, Canada, Cyprus, Denmark, Israel, and Singapore. Separately the New York Times reported that the DEA has used Graphite.

Citizen Labs’ researchers said they shared their analysis with Meta, which in turn discovered an active Paragon zero-click exploit for WhatsApp. It involved the attacker adding a target to a WhatApp group and sending them a PDF which automatically infected the device. This meant Paragon’s software could hack into a target phone through its WhatsApp client without any target interaction. Later WhatsApp notified more than 90 people it believed had been targeted with Paragon’s exploit.
playlist.megaphone.fm?p=TBIEA2…
Some of those targets were in Italy, including prominent Italian and other European journalists, and activists who rescue refugees at sea. Those revelations have since ballooned into a full-scale political crisis, with parliamentary inquiries and The Guardian reporting that Paragon cancelled its contract with Italy.

Paragon has positioned itself as a more ethical player in the scandal and abuse-ridden government spyware industry. Tools from other vendors stretching back years, from Hacking Team, to FinFisher, to NSO Group, have all been used at some point to spy on journalists or activists. Like the notorious NSO Group, which also tried to enter the U.S. market, Paragon is based in Israel.

Selling to ICE, an agency that has flaunted due process, accountability, and transparency, may complicate that stance for Paragon. ICE has arrested people who were following the steps necessary for legal immigration; waited outside courtrooms to immediately detain people after their immigration cases were dismissed to rush them out of the country; “de-documented” people who had valid work permits in order to deport them; and continues to pick up people around the country while masking their faces and declining to provide their names.

After ICE reactivated its Paragon contract, Senator Ron Wyden said in a statement to Bloomberg “ICE is already shredding due process and ruining lives in its rush to lock up kids, cooks and firefighters who pose no threat to anyone.”

“I’m extremely concerned about how ICE will use Paragon’s spyware to further trample on the rights of Americans and anyone who Donald Trump labels as an enemy,” he added.

The best way to support 404 Media and fund our ability to sue the Trump administration to release public records is to become a paying subscriber. If you'd like to make a larger, tax deductible donation, please contact us at donate@404media.co.




YouTube removed a channel that posted nothing but graphic Veo-generated videos of women being shot after 404 Media reached out for comment.#News


AI-Generated YouTube Channel Uploaded Nothing But Videos of Women Being Shot


Content warning: This article contains descriptions and images of AI-generated graphic violence.

YouTube removed a channel that was dedicated to posting AI-generated videos of women being shot in the head following 404 Media’s request for comment. The videos were clearly generated with Google’s new AI video generator tool, Veo, according to a watermark included in the bottom right corner of the videos.

The channel, named Woman Shot A.I, started on June 20, 2025. It posted 27 videos, had over 1,000 subscribers, and had more than 175,000 views, according to the channel’s publicly available data.

All the videos posted by the channel follow the exact same formula. The nearly photo-realistic videos show a woman begging for her life while a man with a gun looms over her. Then he shoots her. Some videos have different themes, like compilations of video game characters like Lara Croft being shot, “Japanese Schoolgirls Shot in Breast,” “Sexy HouseWife Shot in Breast,” “Female Reporter Tragic End,” and Russian soldiers shooting women with Ukrainian flags on their chest.



I wasn’t able to confirm if YouTube was running ads in videos posted by this channel, but the person behind the channel did pay to generate these videos with Google’s Veo, and complained about the cost.

“The AI I use is paid, per account I have to spend around 300 dollars per month, even though 1 account can only generate 8-second videos 3 times,” the channel’s owner wrote in a public post on YouTube. “So, imagine how many times I generate a video once I upload, I just want to say that every time I upload a compilation consisting of several 8-second clips, it’s not enough for just 1 account.”

Woman Shot A.I’s owner claimed they have 10 accounts. “I have to spend quite a lot of money just to have fun,” they said.

Shot A.I also posted polls asking subscribers to vote who “you want to be the victims in the next video.” The options were “Japanese/Chinese,” White Caucasian (american,british,italian,etc),” Southeast Asian (thai,filipine,indonesian,etc),” and the N-word.

YouTube removed the channel after 404 Media reached out for comment for this story. A YouTube spokesperson said that it terminated the channel for violating its Terms of Service, and specifically for operating the YouTube channel following a previous termination, meaning This is not the first time YouTube has removed a channel operated by whoever was behind Woman Shot A.I.

In theory Veo should not allow users to generate videos of people being murdered, but the AI video generator’s guardrails clearly didn’t work in this case. Guardrails for generative AI tools including AI video generators often fail, and there are entire communities dedicated to circumventing them.

“[O]ur Gen AI tools are built to follow the prompts a user provides,” Google’s spokesperson said. “We have clear policies around their use that we work to enforce, and the tools continually get better at reflecting these policies.”

In July, YouTube said that it would start taking action against “mass-produced” AI-generated slop channels. However, as our recent story about AI-generated “boring history” videos show, YouTube’s enforcement is still far from perfect.


#News


📌 Ci siamo quasi, tra poco inizierà #TuttiAScuola!

Quest’anno la cerimonia di inaugurazione del nuovo anno scolastico si terrà presso l’Istituto Professionale Statale “G. Rossini” di Napoli.



La Cellula Coscioni di Bologna al Disability Pride Bologna 2025

📍 Bologna – Disability Pride
🗓 Domenica 28 settembre 2025
🕒 Dalle ore 15:00
📌 Piazza VIII Agosto (raduno) > Piazza San Francesco (arrivo e attività)

La Cellula Coscioni di Bologna parteciperà al Disability Pride Bologna 2025, una giornata di mobilitazione, testimonianze e cultura sui diritti delle persone con disabilità, organizzata per rivendicare piena inclusione, autodeterminazione e accessibilità.

La manifestazione inizierà alle ore 15:00 con il raduno in Piazza VIII Agosto. A seguire:

  • Circle Singing a cura di Giulia Matteucci (15:15 e 17:10)
  • Partenza del corteo alle ore 15:30, con testimonianze lungo il percorso e arrivo in Piazza San Francesco
  • Attività e interventi pubblici dalle 17:30, con focus su vita indipendente (Daniele Renda), accessibilità urbana (Presidente Consulta Disabilità), disabilità e migrazione (Irid Domnori, Sarah e Arslan Riaz)
  • Performance a cura del Magnifico Teatrino Errante
  • Concerto finale alle ore 19:00 a cura di Lecicia Sorri

L’iniziativa è realizzata in collaborazione con numerose associazioni del territorio e patrocinata da enti locali.

Una giornata per rendere visibile ciò che troppo spesso resta ai margini, e per ricordare che i diritti – per essere tali – devono essere garantiti a tutte e tutti, senza condizioni.

Per aggiornamenti: @disabilitypride.bologna

L'articolo La Cellula Coscioni di Bologna al Disability Pride Bologna 2025 proviene da Associazione Luca Coscioni.



#NotiziePerLaScuola
È disponibile il nuovo numero della newsletter del Ministero dell’Istruzione e del Merito.


📣 Siete pronti per #TuttiAScuola? L’evento, giunto alla sua XXV edizione, si terrà oggi a...

📣 Siete pronti per #TuttiAScuola? L’evento, giunto alla sua XXV edizione, si terrà oggi a Napoli, presso l’Istituto Professionale di Stato per l’Enogastronomia e l’Ospitalità Alberghiera “G. Rossini”.