‘No one should go hungry’: street fridges of free food help Americans survive Covid pandemic | The Guardian

A team of ‘fridge-keepers’ coordinates donations, keep the fridge safe and sometimes even donate food or money from their own pocketsIn May, two months after Marianne Pita recovered from Covid-19, she heard about a fridge set up on a street corner not far from her house in the Bronx. Neighbors and local businesses could donate food – homemade, store-bought, or leftover from a day’s sales – and anyone who needed food could take some. The fridge helps feed people in the middle of a pandemic and mass unemployment – in a year where as many as 54m Americans could need food aid. Continue reading…

A team of ‘fridge-keepers’ coordinates donations, keep the fridge safe and sometimes even donate food or money from their own pockets

In May, two months after Marianne Pita recovered from Covid-19, she heard about a fridge set up on a street corner not far from her house in the Bronx. Neighbors and local businesses could donate food – homemade, store-bought, or leftover from a day’s sales – and anyone who needed food could take some.

The fridge helps feed people in the middle of a pandemic and mass unemployment – in a year where as many as 54m Americans could need food aid.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

More Sinister Than Financial Motivations

Geo-Poli-Cyber™ attacks are significantly different from financially motivated cyber-attacks in damage, scale, magnitude as well as in risk mitigation strategies and solutions.

Click to read more