Boston Dynamics Robot Dog Is Becoming Standard in Policing

Spot, the four-legged robot from Boston Dynamics Inc., is perhaps best known for its viral dance routines to songs like “Uptown Funk.” But beyond its playful antics, Spot’s ability to climb stairs and open doors signals a potentially controversial role as a policing tool.

Five years after its commercial debut, the 75-pound, German Shepherd-sized robot is increasingly being deployed by local law enforcement to handle armed standoffs, hostage rescues and hazardous materials incidents — situations where sending in a human or a real dog could be life-threatening.

More than 60 bomb squads and SWAT teams in the US and Canada are now using Spot, according to previously unreported data shared by Boston Dynamics with Bloomberg News.

[…]

Spot’s role on law enforcement teams varies. In 2022, it approached a man who had crashed a car trying to kidnap his son in St. Petersburg, Florida, to keep an eye on the situation and see if he was armed. In Massachusetts last year, in two different incidents, it helped assess a chemical waste accident at a middle school in North Andover, and it intervened when a suspect in Hyannis took his mother hostage at knifepoint and fired at officers. Spot was deployed to corner him and police eventually followed with tear gas to apprehend him.

“It did its job,” said trooper John Ragosa, a Massachusetts State Police bomb squad member and the Spot operator assigned to the hostage-rescue mission. “The suspect was stunned, thinking ‘What is this dog?’”

The robot, which starts at around $100,000, can operate autonomously in many cases — performing maintenance checks, detecting gas leaks and inspecting faulty equipment — but still relies on human operators like Ragosa for decision making. Using a tablet that resembles a video game controller, an operator guides the machine while monitoring a live video feed from its onboard camera system. Additional built-in sensors handle navigation and mapping. During high-stakes situations, officers can also view the live feed on larger nearby screens.

Spot’s technology continues to evolve. The company recently added a mode to help Spot navigate slippery spots. And it’s working to help Spot better manipulate objects in the real world.

[…]

Roughly 2,000 Spot units are now in operation globally, Boston Dynamics said. The deployments include organizations such as the Dutch Ministry of Defense and Italy’s national police. While most of the company’s customers are still industrial clients, including manufacturers and utility providers, interest from law enforcement has surged over the past two years, said Brendan Schulman, Boston Dynamics’ vice president of policy and government relations.

[…]

“One of the things about the so-called robot dogs that we are a little wary of is this normalization and this sort of affectionate framing of calling it a dog,” she said. “It’s normalizing that for the public when it’s not actually a dog. It’s another piece of police technology.”

Ryan Calo, a professor at the University of Washington School of Law focusing on robotics law, said that the technology could deepen public skepticism toward law enforcement, and said clear guidelines are critical for safe deployment.

“The unease people feel around robotics is not just a psychological quirk,” he said. “They are disconcerting for a reason. The overuse of robotics in policing will further dehumanize police to the public and break down those community ties that have been so important to policing over so many years.”

[…]

“I don’t think every police officer needs a robot partner,” he said. “But the use of robots in certain situations that have been specified in writing in advance is good. No one wants police to risk their lives or fail to gain situational awareness during an emergency — nor do we want to live in a robotic police state.”

Source: A $100,000 Robot Dog Is Becoming Standard in Policing — and Raising Ethical Alarms

EU proposes doing away with constant cookies requests by setting the “No” in your browser settings

People will no longer be bombarded by constant requests to accept or reject “cookies” when browsing the internet, under proposed changes to the European Union’s strict data privacy laws.

The pop-up prompts asking internet users to consent to cookies when they visit a website are widely seen as a nuisance, undermining the original privacy intentions of the digital rules.

[I don’t think this undermines anything – cookie consent got rid of a LOT of spying and everyone now just automatically clicks on NO or uses addons to do this (well, if you are using Firefox as a browser). The original purpose: stop companies spying has been achieved]

Brussels officials have now tabled changes that would allow people to accept or reject cookies for a six-month period, and potentially set their internet browser to automatically opt-in or out, to avoid being repeatedly asked whether they consent to websites remembering information about their past visits.

Cookies allow websites to keep track of a user’s previous activity, allowing sites to pull up items added to an online shopping cart that were not purchased, or remember whether someone had logged in to an account on the site before, as well as target advertisements.

[…]

Source: EU proposes doing away with constant internet ‘cookies’ requests – The Irish Times

Fortinet confirms second 0-day exploited in the wild in just four days

Fortinet has confirmed that another flaw in its FortiWeb web application firewall has been exploited as a zero-day and issued a patch, just days after disclosing a critical bug in the same product that attackers had found and abused a month earlier.

The new bug, tracked as CVE-2025-58034, is an OS command injection vulnerability that allows authenticated attackers to execute unauthorized code on the underlying system using crafted HTTP requests or CLI commands. Updating FortiWeb devices to the most recent software version fixes the problem.

“Fortinet has observed this to be exploited in the wild,” the vendor said in a Tuesday security advisory that credited Trend Micro researcher Jason McFadyen with finding and reporting the vulnerability.

“Trend Micro has observed attacks in the wild using this flaw with around 2,000 detections so far,” Trend Micro senior threat researcher Stephen Hilt told The Register.

Meanwhile, the US Cybersecurity and Infrastructure Security Agency issued its own alert about the FortiWeb bug on Tuesday, adding it to its Known Exploited Vulnerability catalog and giving federal agencies just seven days to apply the patch. CISA usually sets a 15-day deadline to fix critical patches and a 30-day time limit for implementing high-severity bugs.

“This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise,” America’s cyber defense agency warned.

[…]

Source: Fortinet confirms second 0-day in just four days • The Register

Tokyo Court Finds Cloudflare Liable For All Content it Allows Access to, Verification of all Users of the service and Should Follow Lawyers Requests without Court Verdicts in Manga Piracy Lawsuit

Japanese manga publishers have declared victory over Cloudflare in a long-running copyright infringement liability dispute. Kadokawa, Kodansha, Shueisha and Shogakukan say that Cloudflare’s refusal to stop manga piracy sites, meant they were left with no other choice but to take legal action. The Tokyo District Court rendered its decision this morning, finding Cloudflare liable for damages after it failed to sufficiently prevent piracy.

[…]

After a wait of more than three and a half years, the Tokyo District Court rendered its decision this morning. In a statement provided to TorrentFreak by the publishers, they declare “Victory Against Cloudflare” after the Court determined that Cloudflare is indeed liable for the pirate sites’ activities.

In a statement provided to TorrentFreak, the publishers explain that they alerted Cloudflare to the massive scale of the infringement, involving over 4,000 works and 300 million monthly visits, but their requests to stop distribution were ignored.

“We requested that the company take measures such as stopping the distribution of pirated content from servers under its management. However, Cloudflare continued to provide services to the manga piracy sites even after receiving notices from the plaintiffs,” the group says.

The publishers add that Cloudflare continued to provide services even after receiving information disclosure orders from U.S. courts, leaving them with “no choice but to file this lawsuit.”

Factors Considered in Determining Liability

Decisions in favor of Cloudflare in the United States have proven valuable over the past several years. Yet while the Tokyo District Court considered many of the same key issues, various factors led to a finding of liability instead, the publishers note.

“The judgment recognized that Cloudflare’s failure to take timely and appropriate action despite receiving infringement notices from the plaintiffs, and its negligent continuation of pirated content distribution, constituted aiding and abetting copyright infringement, and that Cloudflare bears liability for damages to the plaintiffs,” they write.

“The judgment, in that regard, attached importance to the fact that Cloudflare, without conducting any identity verification procedures, had enabled a massive manga piracy site to operate ‘under circumstances where strong anonymity was secured,’ as a basis for recognizing the company’s liability.”

[…]

According to Japanese media, Cloudflare plans to appeal the verdict, which was expected. In comments to the USTR last month, Cloudflare referred to a long-running dispute in Japan with the potential to negatively affect future business.

“One particular dispute reflects years of effort by Japan’s government and its publishing industry to impose additional obligations on intermediaries like CDNs,” the company’s submission reads (pdf).

“A fully adjudicated ruling that finds CDNs liable for monetary damages for infringing material would set a dangerous global precedent and necessitate U.S. CDN providers to limit the provision of global services to avoid liability, severely restricting market growth and expansion into Asian Pacific markets.”

Whether that heralds Cloudflare’s exit from the region is unclear.

[…]

Source: Tokyo Court Finds Cloudflare Liable For Manga Piracy in Long-Running Lawsuit * TorrentFreak

KC-135 Refueling Pods Have Been Converted Into Flying Communication Nodes

The Utah Air National Guard demonstrated new capabilities that expand the KC-135 aerial refueling tanker’s ability to also act as an airborne communications and data-sharing node during major exercises in the Pacific earlier this year. Additional datalinks and other systems were packed into heavily modified underwing Multipoint Refueling System (MPRS) pods normally used to send gas to receivers via the probe-and-drogue method. More network connectivity for the U.S. Air Force’s KC-135s, as well as its KC-46s, opens the door to a host of new operational possibilities for those aircraft, including when it comes to controlling drones in flight.

At least one KC-135 from the Utah Air National Guard’s 151st Wing flew with the podded networking suites during this year’s Resolute Force Pacific 25 (REFORPAC 25) exercise.

[…]

the 151st Wing, in cooperation with the AATC, has been at the very forefront of Air Force efforts to advance new communications and data-sharing capabilities for the KC-135, specifically, for some time now. The development of podded systems similar, if not identical to the ones demonstrated at REFORPAC 25, traces back at least to 2021, and builds on years of work before then on roll-on/roll-off packages designed to be installed in the aircraft’s cargo deck.

The Roll-On Beyond Line-of-Sight Enhancement (ROBE) package seen here is among the add-on communications and data-sharing capabilities that has been available for use on the KC-135, as well as other aircraft, for years now already. USAF

A self-contained podded system offers a different degree of flexibility when it comes to loading and unloading from aircraft, as required. A KC-135 can only carry one pod under each wing at a time, so being able to readily swap out ones filled with communications gear for standard MRPS types between missions would be very valuable. Leveraging the established MRPS pod design, which the KC-135 is already cleared to carry, also helps significantly reduce costs and overall time required for integration and flight testing.

[…]

Tanker crews being able to control various tiers of drones, including ones launched in mid-air from their aircraft, is one particularly notable element of this future vision. Those drones could help provide further situational awareness, or even a more active defense against incoming threats, as well as perform other missions, as you can read more about here. A Utah Air National Guard KC-135 demonstrated just this kind of capability in a previous test also involving a Kratos Unmanned Tactical Aerial Platform-22, or UTAP-22, also known as the Mako, a low-cost loyal wingman-type drone, back in 2021.

[…]

The pod’s line-of-sight links could even be used to control future stealthy collaborative combat aircraft (CCA) type drones and/or send and receive data from stealthy crewed aircraft, like F-22 and F-35 fighters and the future B-21 Raider bombers. Beyond the immediate value of that information exchange for tankers, including when it comes to survivability, this could open up additional possibilities for data fusion and rebroadcasting. If the pods can communicate with the low probability of interception/low probability of detection (LPI/LPD) datalinks that stealthy aircraft use, such as the Multifunction Advanced Data Link (MADL) and Intra-Fighter Data Link (IFDL), and more general-purpose ones, they could turn tankers into invaluable ‘translator’ nodes between various waveforms. Basically, they could allow aircraft with disparate datalink architectures to share data with each other, with the KC-135 acting as a forward fusion and rebroadcasting ‘gateway.’ The tankers could also use their beyond-line-of-sight links to share critical information globally in near real time. The fact that they would already be operating forward in their tanker role means they can provide these added services alongside their primary refueling mission.

[…]

Source: KC-135 Refueling Pods Have Been Converted Into Flying Communication Nodes

Why “public AI”, built on open source software, is the way forward for the EU and how the EU enables it

A quarter of a century ago, I wrote a book called “Rebel Code”. It was the first – and is still the only – detailed history of the origins and rise of free software and open source, based on interviews with the gifted and generous hackers who took part. Back then, it was clear that open source represented a powerful alternative to the traditional proprietary approach to software development and distribution. But few could have predicted how completely open source would come to dominate computing. Alongside its role in running every aspect of the Internet, and powering most mobile phones in the form of Android, it has been embraced by startups for its unbeatable combination of power, reliability and low cost. It’s also a natural fit for cloud computing because of its ability to scale. It is no coincidence that for the last ten years, pretty much 100% of the world’s top 500 supercomputers have all run an operating system based on the open source Linux.

More recently, many leading AI systems have been released as open source. That raises the important question of what exactly “open source” means in the context of generative AI software, which involves much more than just code. The Open Source Initiative, which drew up the original definition of open source, has extended this work with its Open Source AI Definition. It is noteworthy that the EU has explicitly recognised the special role of open source in the field of AI. In the EU’s recent Artificial Intelligence Act, open source AI systems are exempt from the potentially onerous obligation to draw up a range of documentation that is generally required.

That could provide a major incentive for AI developers in the EU to take the open source route. European academic researchers working in this area are probably already doing that, not least for reasons of cost. Paul Keller points out in a blog post that another piece of EU legislation, the 2019 Copyright in the Digital Single Market Directive (CDSM), offers a further reason for research institutions to release their work as open source:

Article 3 of the CDSM Directive enables these institutions to text and data-mine all “works or other subject matter to which they have lawful access” for scientific research purposes. Text and data mining is understood to cover “any automated analytical technique aimed at analysing text and data in digital form in order to generate information, which includes but is not limited to patterns, trends and correlations,” which clearly covers the development of AI models (see here or, more recently, here).

Keller’s post goes through the details of how that feeds into AI research, but the end-result is the following:

as long as the model is made available in line with the public-interest research missions of the organisations undertaking the training (for example, by releasing the model, including its weights, under an open-source licence) and is not commercialised by these organisations, this also does not affect the status of the reproductions and extractions made during the training process.

This means that Article 3 does cover the full model-development pathway (from data acquisition to model publication under an open source license) that most non-commercial Public AI model developers pursue.

As that indicates, the use of open source licensing is critical to this application of Article 3 of EU copyright legislation for the purpose of AI research.

What’s noteworthy here is how two different pieces of EU legislation, passed some years apart, work together to create a special category of open source AI systems that avoid most of the legal problems of training AI systems on copyright materials, as well as the bureaucratic overhead imposed by the EU AI Act on commercial systems. Keller calls these “public AI”, which he defines as:

AI systems that are built by organizations acting in the public interest and that focus on creating public value rather than extracting as much value from the information commons as possible.

Public AI systems are important for at least two reasons. First, their mission is to serve the public interest, rather than focussing on profit maximisation. That’s obviously crucial at time when today’s AI giants are intent on making as much money as possible, presumably in the hope that they can do so before the AI bubble bursts.

Secondly, public AI systems provide a way for the EU to compete with both US and Chinese AI companies – by not competing with them. It is naive to think that Europe can ever match levels of venture capital investment that big name US AI startups currently enjoy, or that the EU is prepared and able to support local industries for as long and as deeply as the Chinese government evidently plans to do for its home-grown AI firms. But public AI systems, which are fully open source, and which take advantage of the EU right of research institutions to carry out text and data mining, offer a uniquely European take on generative AI that might even make such systems acceptable to those who worry about how they are built, and how they are used.

Source: Why “public AI”, built on open source software, is the way forward for the EU – Walled Culture

How Trademark Ruined Colorado-Style Pizza

You’ve heard of New York style, Chicago deep dish, Detroit square pans. But Colorado-style pizza? Probably not. And there’s a perfectly ridiculous reason why this regional style never spread beyond a handful of restaurants in the Rocky Mountains: one guy trademarked it and scared everyone else away from making it.

This story comes via a fascinating Sporkful podcast episode where reporter Paul Karolyi spent years investigating why Colorado-style pizza remains trapped in obscurity while other regional styles became national phenomena.

The whole episode is worth listening to for the detective work alone, but the trademark angle reveals something important about how intellectual property thinking can strangle cultural movements in their cradle.

Here’s the thing about pizza “styles”: they become styles precisely because they spread. New York, Chicago, Detroit, New Haven—these aren’t just individual restaurant concepts, they’re cultural phenomena adopted and adapted by hundreds of restaurants. That widespread adoption creates the network effects that make a “style” valuable: customers seek it out, restaurants compete to perfect it, food writers chronicle its evolution.

Colorado-style pizza never got that chance. When Karolyi dug into why, he discovered that Beau Jo’s—the restaurant credited with inventing the style—had locked it up legally. When he asked the owner’s daughter if other restaurants were making Colorado-style pizza, her response was telling:

We’re um a trademark, so they cannot.

Really?

Yes.

Beau owns a trademark for Colorado style pizza.

Yep.

When Karolyi finally tracked down the actual owner, Chip (after years of trying, which is its own fascinating subplot), he expected to hear about some grand strategic vision behind the trademark. Instead, he got a masterclass in reflexive IP hoarding:

Cuz it’s different and nobody else is doing that. So, why not do it Colorado style? I mean, there’s Chicago style and there’s Pittsburgh style and Detroit and everything else. Um, and we were doing something that was what was definitely different and um um licensing attorney said, “Yeah, we can do it” and we were able to.

That’s it. No business plan. No licensing strategy. Just “some lawyer said we can do it” so they did. This is the IP-industrial complex in microcosm: lawyers selling trademark applications because they can, not because they should.

I pressed my case to Chip that abandoning the trademark so others could also use it could actually be good for his business.

“If more places made Colorado style pizza, the style itself would become more famous, which would make more people come to Beau Jo’s to try the original. If imitation is the highest form of flattery, like everyone would know that Beau Jo was the originator. Like, do you ever worry or maybe do you think that the trademark has possibly hindered the spread of this style of pizza that you created that you should be getting credit for?”

“Never thought about it.”

“Well, what do you think about it now?”

“I don’t know. I have to think about that. It’s an interesting thought. I’ve never thought about it. I’m going to look into it. I’m going to look into it. I’m going to talk to some people and um I’m not totally opposed to it. I don’t know that it would be a good idea for us, but I’m willing to look at it.”

A few weeks later, Karolyi followed up with Chip. Predictably, the business advisors had circled the wagons. They “unanimously” told him not to give up the trademark—because of course they did. These are the same people who profit from maintaining artificial scarcity, even when it demonstrably hurts the very thing they’re supposedly protecting.

And so Colorado-style pizza remains trapped in its legal cage, known only to a handful of tourists who stumble across Beau Jo’s locations. A culinary innovation that could have sparked a movement instead became a cautionary tale about how IP maximalism kills the things it claims to protect.

This case perfectly illustrates the perverse incentives of modern IP thinking. We’ve created an entire industry of lawyers and consultants whose job is to convince business owners to “protect everything” on the off chance they might license it later. Never mind that this protection often destroys the very value they’re trying to capture.

The trademark didn’t just fail to help Beau Jo’s—it actively harmed them. As Karolyi documents in the podcast, the legal lockup has demonstrably scared off other restaurateurs from experimenting with Colorado-style pizza, ensuring the “style” remains a curiosity rather than a movement. Fewer competitors means less innovation, less media attention, and fewer customers seeking out “the original.” It’s a masterclass in how to turn potential network effects into network defects.

Compare this to the sriracha success story. David Tran of Huy Fong Foods deliberately avoided trademarking “sriracha” early on, allowing dozens of competitors to enter the market. The result? Sriracha became a cultural phenomenon, and Huy Fong’s distinctive rooster bottle became the most recognizable brand in a category they helped create. Even as IP lawyers kept circling, Tran understood what Chip apparently doesn’t:

“Everyone wants to jump in now,” said Tran, 70. “We have lawyers come and say ‘I can represent you and sue’ and I say ‘No. Let them do it.’” Tran is so proud of the condiment’s popularity that he maintains a daily ritual of searching the Internet for the latest Sriracha spinoff.

Sometimes the best way to protect your creation is to let it go. But decades of IP maximalist indoctrination have made this counterintuitive wisdom almost impossible to hear. Even when presented with a clear roadmap for how abandoning the trademark could grow his business, Chip couldn’t break free from the sunk-cost fallacy and his advisors’ self-interested counsel.

The real tragedy isn’t just that Colorado-style pizza remains obscure. It’s that this story plays out thousands of times across industries, with creators choosing artificial scarcity over organic growth, protection over proliferation. Every time someone trademarks a taco style or patents an obvious business method, they’re making the same mistake Chip made: confusing ownership with value creation.

Source: How Trademark Ruined Colorado-Style Pizza | Techdirt

Drones delivering life-saving defibrillators to 911 calls

[…] collaborative team of health experts, community organizations, and universities are in the middle of a pilot program using drones and automated external defibrillators (AEDs). Led by Duke Health and the Duke Clinical Research Institute, EMS responders are now deploying drones AEDs to certain 911 calls in Forsyth County, North Carolina.

Why is cardiac arrest so serious?

Over 350,000 people experience cardiac arrest every year in the United States. When that happens, time is crucial–and AEDs are key to saving lives. Each device includes external sensor pads that adhere to a patient’s chest to monitor their heart. At the appropriate time, the pads deliver a moderately high voltage shock (usually between 200 to 1,000 volts) to readjust and regulate the heartbeat. Modern AEDs are designed to be used with minimal experience, and often include a speaker in the central component to verbally give proper instructions.

Although 90 percent of patients survive if an AED is administered within the first minute, such a rapid response is often out of the question, unless a patient is already in a healthcare facility. The American Red Cross estimates over 70 percent of all cardiac arrests occur at home, with survival odds decreasing around 10 percent for every additional minute of delayed AED application. The national average for EMS response times is around seven minutes, but in rural areas the timeframe can often extend as long as 13 minutes.

Unlike an ambulance or firetruck, a lowflying drone isn’t beholden to traffic slowdowns or winding streets. Researchers like Monique Starks at the Duke University School of Medicine suspect that deploying drones in conjunction with EMS workers may offer opportunities to provide faster AED deliveries.

[…]

Importantly, the trial does not alter any existing 911 response protocols. When EMS is dispatched to the location, a pilot remotely deploys and guides a drone flying 200 feet above the ground to the same address. If it arrives before first responders, the drone descends to 100 feet and lowers the AED down via a winch strap. At that point, a 911 dispatcher can take a bystander step-by-step through using the device on the person in need.

[…]

Source: Drones are delivering life-saving defibrillators to 911 calls | Popular Science

NASA’s X-59 Quiet Supersonic Jet With No Forward Window Completes First Flight, Prepares for More Flight Testing

After years of design, development, and testing, NASA’s X-59 quiet supersonic research aircraft took to the skies for the first time Oct. 28, marking a historic moment for the field of aeronautics research and the agency’s Quesst mission.

The X-59, designed to fly at supersonic speeds and reduce the sound of loud sonic booms to quieter sonic thumps, took off at 11:14 a.m. EDT and flew for 67 minutes. The flight represents a major step toward quiet supersonic flight over land.

[…]

The X-59’s first flight went as planned, with the aircraft operating slower than the speed of sound at 230 mph and a maximum altitude of about 12,000 feet, conditions that allowed the team to conduct in-flight system and performance checks. As is typical for an experimental aircraft’s first flight, landing gear was kept down the entire time while the team focused on ensuring the aircraft’s airworthiness and safety.

The aircraft traveled north to Edwards Air Force Base, circled before landing, and taxied to its new home at NASA’s Armstrong Flight Research Center in Edwards, California, officially marking the transition from ground testing to flight operations.

[…]

The X-59 is the centerpiece of NASA’s Quesst mission and its first flight connects with the agency’s roots of flying bold, experimental aircraft.

“The X-59 is the first major, piloted X-plane NASA has built and flown in over 20 years – a unique, purpose-built aircraft,”

[…]

Getting off the ground was only the beginning for the X-59. The team is now preparing the aircraft for full flight testing, evaluating how it will handle and, eventually, how its design will shape shock waves, which typically result in a sonic boom, in supersonic flight. The X-59 will eventually reach its target cruising speed of about 925 mph (Mach 1.4) at 55,000 feet.

The aircraft’s design sits at the center of that testing, shaping and distributing shock-wave formation. Its engine is mounted on top of the fuselage – the main body of the aircraft – to redirect air flow upward and away from the ground.

The cockpit sits mid-fuselage, with no forward-facing window. Instead, NASA developed an eXternal Vision System – cameras and advanced high-definition displays that allow the pilot to see ahead and below the aircraft, which is particularly critical during landing.

These design choices reflect years of research and modeling – all focused on changing how the quieter sonic thump from a supersonic aircraft will be perceived by people on the ground.

[…]

Source: NASA’s X-59 Completes First Flight, Prepares for More Flight Testing – NASA