>>/179171/, >>/179172/, >>/179173/, >>/179174/, >>/179175/, >>/179176/, >>/179177/, >>/179178/, >>/179179/, >>/179180/, >>/179181/, >>/179182/, >>/179183/, >>/179184/, >>/179185/, >>/179186/, >>/179187/, >>/179188/, >>/179189/, >>/179190/, >>/179191/, >>/179192/, >>/179193/, >>/179194/, >>/179195/, >>/179196/
F.A. United States Attorney Bill Essayli @USAttyEssayli - Going after dangerous pedophiles is one of the top priorities of our office. This sick, perverted criminal led an effort to prey on vulnerable children through the internet. The only way to keep the public safe is to lock him up in prison for as long as possible, and that’s exactly what we will fight for at sentencing.
Quote:
US Attorney L.A. @USAO_LosAngeles
Texas man pleads guilty to participating in online neo-Nazi group that exploited children into producing child sexual abuse material
https://www.justice.gov/usao-cdca/pr/texas-man-pleads-guilty-participating-online-neo-nazi-group-exploited-children
https://x.com/USAttyEssayli/status/2037337794377634009
FBI Cyber Division @FBICyberDiv - Your organization’s security extends only as far as your least-protected vendor with network or data access. Adversaries will target the weakest link in your supply chain to bypass strong security measures.
That’s why managing third-party risk is one of Operation Winter SHIELD’s 10 Key Defenses. Start by keeping an up-to-date list of all third parties with access, paired with clear owners of these relationships. Require controls like strong authentication, least-privilege access, and monitored gateways where feasible.
To further reduce risk, regularly audit third-party accounts and promptly disable any that are no longer needed. Vendor contracts should include clauses requiring quick notification if a breach occurs and annual verification of security controls. When a contract ends or changes, make sure to revoke access and confirm proper data disposal.
These simple steps can prevent attackers from exploiting trusted relationships. Recent #FBI advisories have shown how attackers exploit third-party compromise and vendor integrations to sneak into organizations’ networks and steal sensitive data. Learn more about these attacks https://www.ic3.gov/PSA/2026/PSA260325
And see all FBI #OWS recommendations
https://www.fbi.gov/investigate/cyber/operation-winter-shield
https://x.com/FBICyberDiv/status/2036867016833872010
FBI Director Kash Patel @FBIDirectorKash - An IED was placed at MacDill Air Force Base - home to CENTCOM and U.S. Special Operations Command.
A brother and sister have now been indicted. One is in custody for accessory and evidence tampering and the primary suspect is charged with explosives offenses and is currently in China.
This FBI, working with our partners, will continue pursuing all those responsible and ensure they are brought to justice, no matter where they are.
https://x.com/FBIDirectorKash/status/2037208512875336000
FBI Director Kash Patel @FBIDirectorKash - Brother, sister indicted in alleged IED plot at Florida Air Force base tied to Iran war; 1 suspect in China
https://www.foxnews.com/us/brother-sister-indicted-alleged-ied-plot-florida-base-tied-iran-war-one-suspect-in-china
https://x.com/FBIDirectorKash/status/2037208517468115228
FBI Nashville @FBI_Nashville - As a result of an investigation by the FBI Jackson Resident Agency, Bolivar Police Department, the Tennessee Department of Children’s Services, and the Horn Lake, Mississippi Police Department, Cody Ray Brewer, 30, of Saulsbury, Tennessee, has been sentenced to 70 years in federal prison for production and possession of child pornography. Learn more:
https://www.justice.gov/usao-wdtn/pr/west-tennessee-man-sentenced-70-years-prison-production-and-possession-child
https://x.com/FBI_Nashville/status/2037183386750460281
27