<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Subject &#8211; News Journos</title>
	<atom:link href="https://newsjournos.com/tag/subject/feed/" rel="self" type="application/rss+xml" />
	<link>https://newsjournos.com</link>
	<description>Independent News and Headlines</description>
	<lastBuildDate>Wed, 03 Dec 2025 02:27:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://newsjournos.com/wp-content/uploads/2025/02/cropped-The_News_Journos_Fav-1-32x32.png</url>
	<title>Subject &#8211; News Journos</title>
	<link>https://newsjournos.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Phishing Emails Use Soft Hyphens in Subject Lines to Evade Security Measures</title>
		<link>https://newsjournos.com/phishing-emails-use-soft-hyphens-in-subject-lines-to-evade-security-measures/</link>
					<comments>https://newsjournos.com/phishing-emails-use-soft-hyphens-in-subject-lines-to-evade-security-measures/?noamp=mobile#respond</comments>
		
		<dc:creator><![CDATA[News Editor]]></dc:creator>
		<pubDate>Wed, 03 Dec 2025 02:27:53 +0000</pubDate>
				<category><![CDATA[Tech]]></category>
		<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Blockchain]]></category>
		<category><![CDATA[Cloud Computing]]></category>
		<category><![CDATA[Consumer Electronics]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Data Science]]></category>
		<category><![CDATA[E-Commerce]]></category>
		<category><![CDATA[Emails]]></category>
		<category><![CDATA[Evade]]></category>
		<category><![CDATA[Fintech]]></category>
		<category><![CDATA[Gadgets]]></category>
		<category><![CDATA[Hyphens]]></category>
		<category><![CDATA[Innovation]]></category>
		<category><![CDATA[Internet of Things]]></category>
		<category><![CDATA[Lines]]></category>
		<category><![CDATA[Measures]]></category>
		<category><![CDATA[Mobile Devices]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Programming]]></category>
		<category><![CDATA[Robotics]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Soft]]></category>
		<category><![CDATA[Software Updates]]></category>
		<category><![CDATA[Startups]]></category>
		<category><![CDATA[Subject]]></category>
		<category><![CDATA[Tech Reviews]]></category>
		<category><![CDATA[Tech Trends]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Virtual Reality]]></category>
		<guid isPermaLink="false">https://newsjournos.com/phishing-emails-use-soft-hyphens-in-subject-lines-to-evade-security-measures/</guid>

					<description><![CDATA[<p>This article is published by News Journos</p>
<p>Recent cybercriminals have devised a new method to bypass automated email filters by manipulating subject lines with invisible Unicode characters. This trick allows phishing emails to avoid detection while still appearing legitimate to unsuspecting recipients. Researchers warn that this evolving threat not only compromises individual email security but also stresses the importance of vigilance and [...]</p>
<p>©2025 News Journos. All rights reserved.</p>
]]></description>
										<content:encoded><![CDATA[<p>This article is published by News Journos</p>
<p></p>
<p style="text-align:left;">Recent cybercriminals have devised a new method to bypass automated email filters by manipulating subject lines with invisible Unicode characters. This trick allows phishing emails to avoid detection while still appearing legitimate to unsuspecting recipients. Researchers warn that this evolving threat not only compromises individual email security but also stresses the importance of vigilance and education in preventing such attacks.</p>
<table style="width:100%; text-align:left; border-collapse:collapse;">
<thead>
<tr>
<th style="text-align:left; padding:5px;">
        <strong>Article Subheadings</strong>
      </th>
</tr>
</thead>
<tbody>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>1)</strong> Overview of the New Threat
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>2)</strong> How the New Trick Works
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>3)</strong> Why This Phishing Technique is Super Dangerous
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>4)</strong> Identifying Phishing Emails
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>5)</strong> Practical Steps for Protection
      </td>
</tr>
</tbody>
</table>
<h3 style="text-align:left;">Overview of the New Threat</h3>
<p style="text-align:left;">In an era where email communication is a daily necessity, phishing attacks have grown increasingly sophisticated. Cybercriminals continuously adapt their tactics, and a recent report indicates that the subject line of emails has become a new target for manipulation. By embedding invisible characters within the subject, these attackers ensure that their emails evade detection by standard security filters. This recent evolution in phishing tactics raises concerns about the effectiveness of current email security protocols.</p>
<p style="text-align:left;">Historically, phishing attacks aimed to deceive individuals into giving away sensitive information through more overt means, such as alarming messages that prompt immediate action. However, as defenses have advanced, so too have the methods employed by cybercriminals. The adjustment in strategy now involves creating seemingly harmless email subject lines capable of bypassing necessary security scrutiny.</p>
<h3 style="text-align:left;">How the New Trick Works</h3>
<p style="text-align:left;">Researchers have closely analyzed the mechanics of this latest phishing technique. By incorporating invisible Unicode characters, such as soft hyphens, cybercriminals can hide these markers within the subject line of emails. This issue arises because traditional email filters primarily rely on detecting specific patterns and keywords to identify malicious content. When attackers insert invisible characters, the filters fail to recognize the phishing attempt, allowing these emails to slip through undetected.</p>
<p style="text-align:left;">For instance, a subject line that reads &#8220;Your Password is About to Expire&#8221; could have soft hyphens inserted between every letter, rendering it unreadable by security systems while still appearing normal to the human eye. This method of encoding, particularly when combined with deceptive language in the body of the email, significantly increases the chances that a user will engage with the phishing content.</p>
<h3 style="text-align:left;">Why This Phishing Technique is Super Dangerous</h3>
<p style="text-align:left;">This new method poses a unique risk because it exploits the limitations of automated systems designed to protect users&#8217; inboxes. Most phishing detection strategies rely on identifying common patterns, keywords, and known malicious URLs. However, when these patterns are disrupted through the manipulation of subject lines, it creates vulnerabilities that can be easily exploited at scale.</p>
<p style="text-align:left;">Additionally, the simplicity with which cybercriminals can adopt this technique is alarming. The necessary tools and encoding methods are readily available, enabling widespread implementation with minimal technical know-how. This flexibility allows attackers to generate large volumes of phishing emails quickly, each designed to look legitimate and evoke a sense of urgency among recipients.</p>
<p style="text-align:left;">Furthermore, the psychological effects of urgency combined with familiarity play a vital role in the success of such scams. The more authentic an email seems, the less likely a recipient is to scrutinize it fully. This increase in deception reaffirms the need for continuous education about recognizing phishing tactics.</p>
<h3 style="text-align:left;">Identifying Phishing Emails</h3>
<p style="text-align:left;">Skilled cybercriminals have learned to create phishing emails that mimic legitimate communications, so identifying these threats requires a keen eye. A lack of visible red flags can lead to casual users clicking through without hesitation. Therefore, understanding how to spot these harmful messages is crucial for individual protection.</p>
<p style="text-align:left;">A hallmark of phishing emails often lies in their links. Cybercriminals disguise malicious URLs behind seemingly harmless text, leading unsuspecting recipients to unsafe websites. One effective preventive strategy is to utilize a private email service that reveals the actual destination of the links before opening them. This safeguard ensures that users can ascertain the validity of a link without exposing themselves to potential harm.</p>
<h3 style="text-align:left;">Practical Steps for Protection</h3>
<p style="text-align:left;">While the landscape of phishing attacks may be evolving, there are proactive measures individuals can take to mitigate risks. Implementing robust security practices can significantly limit opportunities for cybercriminals to succeed.</p>
<p style="text-align:left;">First, utilizing a password manager remains one of the most effective ways to protect against phishing attempts. By generating unique passwords for each account, users can ensure that even if one account is compromised, the others remain secure. Password managers often include built-in breach scanners that alert users if any of their information has been exposed in known attacks.</p>
<p style="text-align:left;">Moreover, activating two-factor authentication (2FA) adds an additional layer of security. In this case, even if attackers acquire a user&#8217;s password, they would still require access to a secondary verification method such as a mobile device.</p>
<p style="text-align:left;">Installing reliable antivirus software can further bolster defenses. This software not only scans for malware but can also identify and block suspicious activity before it affects your devices, preventing cybercriminals from gaining access to sensitive information.</p>
<p style="text-align:left;">Additionally, users are advised to limit the amount of personal data they share online. Attackers frequently utilize publicly available information to tailor their phishing messages, making them appear more convincing. By mitigating one&#8217;s digital footprint, users reduce the material available for attackers to exploit.</p>
<p style="text-align:left;">Lastly, actively reviewing the sender&#8217;s details is crucial. Cybercriminals often take advantage of minor alterations in email addresses, where a single misspelled character can make an email appear legitimate.</p>
<table style="width:100%; text-align:left;">
<thead>
<tr>
<th style="text-align:left;"><strong>No.</strong></th>
<th style="text-align:left;"><strong>Key Points</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td style="text-align:left;">1</td>
<td style="text-align:left;">Cybercriminals use invisible characters to bypass email filters.</td>
</tr>
<tr>
<td style="text-align:left;">2</td>
<td style="text-align:left;">Phishing emails increasingly mirror legitimate communications.</td>
</tr>
<tr>
<td style="text-align:left;">3</td>
<td style="text-align:left;">Most filters rely on recognizable patterns that this technique disrupts.</td>
</tr>
<tr>
<td style="text-align:left;">4</td>
<td style="text-align:left;">Users can employ password managers and 2FA for additional security.</td>
</tr>
<tr>
<td style="text-align:left;">5</td>
<td style="text-align:left;">Awareness and education are critical in defending against new phishing tactics.</td>
</tr>
</tbody>
</table>
<h2 style="text-align:left;">Summary</h2>
<p style="text-align:left;">The rise of phishing attacks that leverage invisible characters poses a significant threat to email security systems. As cybercriminals continue to evolve their tactics, it becomes increasingly important for users to maintain vigilance and adopt robust protective measures. Awareness, combined with practical security strategies, remains essential for keeping personal information safe.</p>
<h2 style="text-align:left;">Frequently Asked Questions</h2>
<p><strong>Question: What are invisible Unicode characters?</strong></p>
<p style="text-align:left;">Invisible Unicode characters are special symbols that do not display visibly but can change how text is interpreted by email systems. Attackers use them to manipulate subject lines in phishing emails so that they evade detection by filters.</p>
<p><strong>Question: How can I tell if an email is a phishing attempt?</strong></p>
<p style="text-align:left;">Common signs of phishing emails include unexpected requests for personal information, misspelled words, and urgent calls to action. Always inspect the sender&#8217;s email address and avoid clicking on any hyperlink until its legitimacy is confirmed.</p>
<p><strong>Question: What should I do if I suspect I’ve received a phishing email?</strong></p>
<p style="text-align:left;">If you receive an email that you believe is a phishing attempt, do not engage with it. Report the email to your email provider, and delete it immediately. Consider running a security check on your accounts to ensure they have not been compromised.</p>
<p>©2025 News Journos. All rights reserved.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://newsjournos.com/phishing-emails-use-soft-hyphens-in-subject-lines-to-evade-security-measures/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Subject in Charlie Kirk Shooting Case Released from Custody, FBI Confirmed</title>
		<link>https://newsjournos.com/subject-in-charlie-kirk-shooting-case-released-from-custody-fbi-confirmed/</link>
					<comments>https://newsjournos.com/subject-in-charlie-kirk-shooting-case-released-from-custody-fbi-confirmed/?noamp=mobile#respond</comments>
		
		<dc:creator><![CDATA[News Editor]]></dc:creator>
		<pubDate>Thu, 11 Sep 2025 00:49:21 +0000</pubDate>
				<category><![CDATA[U.S. News]]></category>
		<category><![CDATA[case]]></category>
		<category><![CDATA[Charlie]]></category>
		<category><![CDATA[Confirmed]]></category>
		<category><![CDATA[Congress]]></category>
		<category><![CDATA[Crime]]></category>
		<category><![CDATA[custody]]></category>
		<category><![CDATA[Economy]]></category>
		<category><![CDATA[Education]]></category>
		<category><![CDATA[Elections]]></category>
		<category><![CDATA[Environmental Issues]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[Healthcare]]></category>
		<category><![CDATA[Immigration]]></category>
		<category><![CDATA[Kirk]]></category>
		<category><![CDATA[Natural Disasters]]></category>
		<category><![CDATA[Politics]]></category>
		<category><![CDATA[Public Policy]]></category>
		<category><![CDATA[released]]></category>
		<category><![CDATA[Shooting]]></category>
		<category><![CDATA[Social Issues]]></category>
		<category><![CDATA[Subject]]></category>
		<category><![CDATA[Supreme Court]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[White House]]></category>
		<guid isPermaLink="false">https://newsjournos.com/subject-in-charlie-kirk-shooting-case-released-from-custody-fbi-confirmed/</guid>

					<description><![CDATA[<p>This article is published by News Journos</p>
<p>A tragic incident unfolded in Orem, Utah, where conservative political activist Charlie Kirk was fatally shot while addressing a crowd at Utah Valley University on September 10, 2025. Initial reports indicated that a suspect was taken into custody, but they were later released following questioning. The investigation continues, and law enforcement is working to ensure [...]</p>
<p>©2025 News Journos. All rights reserved.</p>
]]></description>
										<content:encoded><![CDATA[<p>This article is published by News Journos</p>
<div id="RegularArticle-ArticleBody-5" data-module="ArticleBody" data-test="articleBody-2" data-analytics="RegularArticle-articleBody-5-2"><span class="HighlightShare-hidden" style="top:0;left:0"/></p>
<div role="region" aria-labelledby="Placeholder-ArticleBody-Video-108197191">
<div role="button" tabindex="0" id="Placeholder-ArticleBody-Video-108197191" class="PlaceHolder-wrapper" data-vilynx-id="7000388440" data-test="VideoPlaceHolder">
<div class="InlineVideo-videoEmbed" id="InlineVideo-0" data-test="InlineVideo">
<div class="InlineVideo-wrapper">
<div class="InlineVideo-inlineThumbnailContainer"><span class="InlineVideo-videoButton"/><span/></div>
</div>
</div>
</div>
</div>
<div class="group">
<p style="text-align:left;">A tragic incident unfolded in Orem, Utah, where conservative political activist <strong>Charlie Kirk</strong> was fatally shot while addressing a crowd at Utah Valley University on September 10, 2025. Initial reports indicated that a suspect was taken into custody, but they were later released following questioning. The investigation continues, and law enforcement is working to ensure justice for Kirk’s untimely death, which has drawn widespread condemnation from political figures across the spectrum.</p>
</div>
<div class="InlineImage-imageEmbed" id="ArticleBody-InlineImage-108197247" data-test="InlineImage">
<div class="InlineImage-wrapper">
<div>
<p style="text-align:left;">Utah Gov. Spencer Cox, left, speaks with Utah Valley University Chief of Police Jeff Long, right, at the Keller Building on the Utah Valley University campus after Charlie Kirk was shot and died during Turning Point&#8217;s visit to the university, Wednesday, Sept. 10, 2025, in Orem, Utah.</p>
<p style="text-align:left;">Hannah Schoenbaum | AP Photo</p>
</div>
</div>
</div>
<div class="group">
<p style="text-align:left;">Governor Cox labeled the event a &#8220;political assassination,&#8221; amplifying concerns about political violence in the U.S. This grim incident highlights ongoing issues surrounding political discourse and raises important questions about security measures at public events. As authorities continue their investigation, the need for effective responses to prevent such tragic occurrences has gained renewed urgency.</p>
</div>
</div>
<table style="width:100%; text-align:left; border-collapse:collapse;">
<thead>
<tr>
<th style="text-align:left; padding:5px;">
        <strong>Article Subheadings</strong>
      </th>
</tr>
</thead>
<tbody>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>1)</strong> Overview of the Shooting Incident
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>2)</strong> Investigative Efforts and Releases
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>3)</strong> Reactions from Political Leaders
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>4)</strong> Charlie Kirk&#8217;s Political Legacy
      </td>
</tr>
<tr>
<td style="text-align:left; padding:5px;">
        <strong>5)</strong> The Broader Impact of Political Violence
      </td>
</tr>
</tbody>
</table>
<h3 style="text-align:left;">Overview of the Shooting Incident</h3>
<p style="text-align:left;">On September 10, 2025, during a speaking engagement at Utah Valley University, <strong>Charlie Kirk</strong> was shot while addressing an audience of approximately 2,000 individuals. Kirk was hit in the neck by a bullet fired from a campus building located about 200 yards away. He was immediately taken to a local hospital where he underwent surgery but succumbed to his injuries shortly after the announcement of his death by former President <strong>Donald Trump</strong>.</p>
<p style="text-align:left;">The shooting occurred just after noon local time, during the beginning of Kirk&#8217;s &#8220;American Comeback Tour.&#8221; With Kirk being one of the significant figures in conservative circles, this incident starkly underscores the volatility of political discourse in modern America. The gravity of the situation was compounded by the fact that Kirk’s remarks prior to the shooting were focused on deep societal issues, including discussions on gun control.</p>
<h3 style="text-align:left;">Investigative Efforts and Releases</h3>
<p style="text-align:left;">Following the shooting, local law enforcement and the FBI moved swiftly to investigate the incident. Initial reports indicated that a suspect was taken into custody and was being questioned. The FBI Director, <strong>Kash Patel</strong>, confirmed via social media that the individual had been interrogated but was released without charges. As the investigation continues, officials remain committed to transparency and ensuring justice.</p>
<p style="text-align:left;">Governor <strong>Spencer Cox</strong> emphasized that while one individual was in custody, the investigation would not be limited to that suspect alone. He reassured the public that the authorities were vigilant in their pursuit of justice, assuring them that they would hold anyone involved in Kirk&#8217;s assassination accountable. This commitment reflects the serious nature of the investigation and the emotions surrounding the case, given its political implications.</p>
<h3 style="text-align:left;">Reactions from Political Leaders</h3>
<p style="text-align:left;">The aftermath of Kirk&#8217;s assassination sparked a wave of reactions from political leaders of varying affiliations. Governor <strong>Spencer Cox</strong> described the event as a political assassination and vowed to find those responsible. Officials from both sides of the aisle echoed calls for unity against violence, as messages of support poured in for Kirk&#8217;s family and condemnation for the attack.</p>
<p style="text-align:left;">Former President <strong>Barack Obama</strong> stated that the motives behind the act are still unclear but insisted that such violence has no place in democracy. Additionally, former President <strong>Joe Biden</strong> and other prominent figures called for an end to political violence, emphasizing that society must address the root causes of such brutality. This bipartisan response underscores the serious concerns regarding escalating political tension and the safety of political figures.</p>
<h3 style="text-align:left;">Charlie Kirk&#8217;s Political Legacy</h3>
<p style="text-align:left;">Charlie Kirk, co-founder of <strong>Turning Point USA</strong>, was a recognized figure in American conservative circles, particularly among the youth. His organization aimed to empower young conservatives and had raised substantial funds for that mission. Known for his controversies surrounding contentious political subjects, Kirk had cultivated a devoted following but also generated significant opposition.</p>
<p style="text-align:left;">Throughout his career, Kirk&#8217;s views stirred passionate debates, particularly concerning Second Amendment rights and various social issues. His frequent appearances in media, public speaking engagements, and leadership in grassroots movements established him as a key defender of right-wing ideologies. As the investigation continues into his tragic death, reflections on his impact on American conservatism are likely to dominate discussions in the coming weeks.</p>
<h3 style="text-align:left;">The Broader Impact of Political Violence</h3>
<p style="text-align:left;">Kirk&#8217;s assassination is part of a larger trend of political violence that has been increasingly alarming to both citizens and lawmakers. In recent years, incidents have grown, often linked to heightened rhetorical tensions in political dialogue. The shooting serves as a stark reminder that actions have consequences, and the discourse surrounding political beliefs can spiral out of control, leading to tragic outcomes.</p>
<p style="text-align:left;">This incident raises critical questions about the security of public events, political rhetoric, and the role of media in exacerbating divisive sentiments. If unchecked, the cycle of violence could pose a significant threat to democracy and civil discourse in America. The bipartisan calls for unity and action against such violence signal a collective recognition of the urgent need to address these troubling trends.</p>
<table style="width:100%; text-align:left;">
<thead>
<tr>
<th style="text-align:left;"><strong>No.</strong></th>
<th style="text-align:left;"><strong>Key Points</strong></th>
</tr>
</thead>
<tbody>
<tr>
<td style="text-align:left;">1</td>
<td style="text-align:left;">Charlie Kirk was shot and killed during a public speaking event at Utah Valley University.</td>
</tr>
<tr>
<td style="text-align:left;">2</td>
<td style="text-align:left;">An initial suspect in the case was taken into custody but later released.</td>
</tr>
<tr>
<td style="text-align:left;">3</td>
<td style="text-align:left;">Political leaders from across the spectrum condemned the violence and offered condolences.</td>
</tr>
<tr>
<td style="text-align:left;">4</td>
<td style="text-align:left;">Kirk was known for his advocacy for youth conservatism through Turning Point USA.</td>
</tr>
<tr>
<td style="text-align:left;">5</td>
<td style="text-align:left;">The assassination raises concerns about escalating political violence and public safety.</td>
</tr>
</tbody>
</table>
<h2 style="text-align:left;">Summary</h2>
<p style="text-align:left;">The assassination of Charlie Kirk is a devastating reminder of the consequences of political violence in today&#8217;s society. This tragic event not only highlights the vulnerability of public figures but also prompts essential dialogues about political discourse, security, and societal values. As investigations continue and reactions from leaders prompt a call for unity, the ongoing discourse regarding political violence and its implications serves as a critical juncture for American society.</p>
<h2 style="text-align:left;">Frequently Asked Questions</h2>
<p><strong>Question: Who was Charlie Kirk?</strong></p>
<p style="text-align:left;">Charlie Kirk was a conservative political activist and co-founder of Turning Point USA, an organization aimed at promoting conservative values among young Americans.</p>
<p><strong>Question: What happened during Kirk&#8217;s speaking event?</strong></p>
<p style="text-align:left;">During his speaking engagement at Utah Valley University, Charlie Kirk was shot and later died from his injuries, marking the event as a significant instance of political violence.</p>
<p><strong>Question: How have political leaders responded to Kirk&#8217;s assassination?</strong></p>
<p style="text-align:left;">Political leaders from various backgrounds have condemned the act of violence, with many calling for unity against political violence and expressing condolences for Kirk&#8217;s family.</p>
</div>
<p>©2025 News Journos. All rights reserved.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://newsjournos.com/subject-in-charlie-kirk-shooting-case-released-from-custody-fbi-confirmed/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
