Event JSON
{
"id": "6c711545b7263e184f03d9e24e0c73d93017bbd9434d7ef2194c64e6d9d09d4c",
"pubkey": "742fd4b00ed3d1c2d33d49e2eb36ef627a882adc126eb09df80d48cfe5f0c0d2",
"created_at": 1732275355,
"kind": 1,
"tags": [
[
"t",
"foia"
],
[
"t",
"fbi"
],
[
"t",
"hacking"
],
[
"imeta",
"url https://assets.chaos.social/media_attachments/files/113/526/390/844/422/519/original/961b0ec4ba7c5bf9.png",
"m image/png",
"dim 633x825",
"blurhash U5SY{q00?b~qD%j[ofof?b%MRjM{IUIUj[%M"
],
[
"imeta",
"url https://assets.chaos.social/media_attachments/files/113/526/392/072/451/165/original/3d8aae837a0ca20d.png",
"m image/png",
"dim 516x361",
"blurhash UBSPX_00%M?b?bxuRjRjxuxuRjWBM{WBxut7"
],
[
"proxy",
"https://chaos.social/users/realhackhistory/statuses/113526397667205636",
"activitypub"
]
],
"content": "Fascinating to see, from #FOIA docs, how agencies like the #FBI structure their paperwork for investigating #hacking. What details did they feel should be included or might be relevant, how did the forms develop over time? This example is from 2004. Always makes me wonder why they care about CPU\n\nhttps://assets.chaos.social/media_attachments/files/113/526/390/844/422/519/original/961b0ec4ba7c5bf9.png\nhttps://assets.chaos.social/media_attachments/files/113/526/392/072/451/165/original/3d8aae837a0ca20d.png",
"sig": "98cd09679132aba8395a9f50f012554d7c537515510e9dd8ff0ab6ee7d772a4b1a1ed69a963a7da5f93746aab5fbf65edd9c8fc79f2305b640d51c7c4e80f66b"
}