Palm Springs fertility clinic bomber documented plans in chilling online posts before attack
Authorities have identified the perpetrator behind the weekend bombing at a fertility clinic in Palm Springs, California, as a 26-year-old suspect motivated by a fringe ideology known as "pro-mortalism."
"Pro-mortalism," a radical offshoot of anti-natalism, views human reproduction as inherently immoral and embraces death as a moral corrective.
According to federal and local law enforcement, the suspect targeted the American Reproductive Centers facility specifically to destroy human embryos stored on-site.
Surveillance footage and online postings suggest he parked in the rear of the building to remain unnoticed, ingested drugs, and then detonated an explosive device – killing himself in the process.
The FBI has classified the bombing as an act of domestic terrorism, citing the ideological motivation behind the violence that killed the suspect and injured four others.
Palm Springs Bombing Suspect Identified
Read On The Fox News App
On its Facebook page, American Reproductive Centers wrote that all embryos "are safe."
"I received a call saying there was a massive explosion that destroyed a couple of our buildings. My biggest concern was obviously my staff and the embryos we have in storage," said Dr. Maher Abdallah, the clinic's director. "Fortunately for us, our staff was unharmed and the IVF lab is intact, untouched, unharmed. The embryos are safe."
Retired NYPD investigator and Fox News contributor Paul Mauro, through his publication Ops Desk, exclusively uncovered a disturbing trail of digital breadcrumbs left by the suspect, who had posted videos documenting his experiments with homemade explosives.
The videos, posted on his YouTube channel but now taken down, captured the alleged suspect testing explosives in the desert as well as what appeared to be a garage.
WATCH:
The Ops Desk also revealed that he left behind a suicide note on an online forum populated by like-minded extremists.
"I have made a 'device' that, once triggered, will activate after one hour and will ensure I never wake up again," he wrote.
Fbi, Dhs Warn Of Possible Copycat Attacks After Nola Isis-inspired Vehicle Attack
Officials have said that it is the first high-profile case linked to the pro-mortalist ideology and are now monitoring it as a potential emerging threat. Authorities have urged families and communities to remain vigilant for signs of ideological extremism, especially among those who may feel disenfranchised.
As the investigation into the bombing continues, law enforcement is probing whether anyone else assisted or encouraged the suspect in constructing the device.Original article source: Palm Springs fertility clinic bomber documented plans in chilling online posts before attack

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles
Yahoo
an hour ago
- Yahoo
Atlanta-area rapper sentenced for bringing stolen loaded ‘machine gun' into hospital labor unit
A 21-year-old Henry County man has learned his fate after he was convicted of bringing a stolen gun into the labor and delivery unit of a hospital. [DOWNLOAD: Free WSB-TV News app for alerts as news breaks] Last Wednesday, a judge sentenced Terrell Monquez Searcy, 21, also known as rapper Quez 2RR, to serve 66 months in prison, followed by three years of supervised release. This was after the 21-year-old pleaded guilty to one count of possession of a machine gun in March, from the incident that occurred in August 2023. According to court documents, Searcy was arrested after security at Piedmont Walton Hospital found he had hidden a gun under a couch cushion inside a hospital room in the labor unit on Aug. 17, 2023. Investigators said Searcy handed over the Glock Model 17 9mm handgun with a loaded 30-round extended magazine to the security officers. TRENDING STORIES: Teen dead, 6 others injured after shooting in Troup County Porn shown in high school class in Henry County 2 accused of stealing vehicle left on I-75 'Hospital security noticed that a full-auto sear pin appeared to have been attached to the rear of the slide, making the firearm a machine gun, prompting the call by hospital security to police. Police ran the serial number on the firearm and found out it was reported stolen from Walton County, Georgia. Searcy was taken into custody,' investigators said in a news release. ATF agents ended up testing the gun and confirmed that it functioned as a machine gun. During the investigation into Searcy, investigators learned that he had showcased the converted pistol in his music videos posted to his YouTube page. 'In a music video titled 'Traffic,' Searcy rapped, 'I pop out a switch on the back of my Glock' and 'I put a switch on the back of my Glock, just to clean up the street when it's time for that action.' At one point in the video, Searcy's holding a pistol in his waistband with what appears to be a machine gun conversion device attached to the back,' investigators said. Searcy was ultimately indicted on charges of possessing a machine gun in August 2024. During the indictment process, 'agents located Instagram messages between Searcy and a female law enforcement officer with the Clayton County Police Department. Between January and March 2023, Searcy asked the police officer to run his information to see if there were any warrants for his arrest.' [SIGN UP: WSB-TV Daily Headlines Newsletter] Agents learned that the officer gave Searcy information about an active homicide investigation. During an interview with Clayton County police detectives, the officer admitted to giving Searcy the info, including information about active warrants for his arrest. On Feb. 11, 2025, ATF and several other agencies executed a search warrant on Search's home in McDonough. Searcy was there with two other men. During the search, they found several firearms. ATF agents ran tests on the firearms they collected that they had been used in other crimes in the area, including one that 'was used in a drive-by shooting in DeKalb County where four people, including two juveniles, were shot inside their homes.' 'Each shooting occurred within just days of Searcy receiving information from the Clayton County police officer on the active Clayton County homicide where his friend was shot and killed,' the news release said. 'Holding people found in possession of machine guns and with illegal conversion devices accountable for breaking federal law remains a top priority in the Middle District of Georgia,' said Acting U.S. Attorney C. Shanelle Booker.
Yahoo
3 hours ago
- Yahoo
Rubio condemns assassination attempt on Colombian presidential candidate Miguel Uribe
Secretary of State Marco Rubio and other politicians from the U.S. and Latin America condemned the shooting of Colombian presidential candidate Miguel Uribe on Sunday. Rubio blamed the assassination attempt on "violent leftist rhetoric" originating from the Colombian government. Uribe, a Colombian senator, is currently fighting for his life after sustaining three gunshot wounds, one of which was to the head. "The United States condemns in the strongest possible terms the attempted assassination of Senator Miguel Uribe. This is a direct threat to democracy and the result of the violent leftist rhetoric coming from the highest levels of the Colombian government," Rubio wrote. "Having seen firsthand Colombia's progress over the past few decades to consolidate security and democracy, it can't afford to go back to dark days of political violence. President Petro needs to dial back the inflammatory rhetoric and protect Colombian officials," he added. Who Is Colombia's President Gustavo Petro, Former Marxist Guerrilla And Country's First Leftist Leader? Ohio Sen. Bernie Moreno also condemned the attack in a statement on social media. Read On The Fox News App "The assassination attempt on leading presidential candidate Miguel Uribe is a vile attack on democracy. This evil act must be investigated and anyone responsible, directly or indirectly, must face swift punishment," Moreno wrote. Chilean President Gabriel Boric also reacted to Uribe's shooting. "My strongest condemnation of the attack against Miguel Uribe Turbay, pre-presidential candidate in Colombia. In a democracy, violence has no place or justification," Boric wrote. Fbi's Kash Patel Vows 'You're Going To Know Everything We Know' About Trump Assassination Attempt Authorities say Uribe was shot by a boy less than 15 years old, and they are investigating who was behind the attack. Police recovered a 9mm "Glock-type" pistol from the suspect. "Miguel is fighting for his life at this moment. Let us ask God to guide the hands of the doctors who are attending to him," Maria Claudia Tarazona, Miguel's wife, wrote on her husband's X account. "I ask everyone to join together in a prayer chain for Miguel's life." Tarazona later announced that Uribe's initial surgery at the hospital "went well," though he remains in intensive care. Colombian President Gustavo Petro, Uribe's chief opponent in the presidential race, said the attack crossed a "red line" and ordered an investigation. He also canceled a planned trip to France this week, citing the "seriousness of the events." Colombia's Ministry of Defense has offered a nearly $750,000 reward for information relating to the assassination attempt. Reuters contributed to this reportOriginal article source: Rubio condemns assassination attempt on Colombian presidential candidate Miguel Uribe


Forbes
7 hours ago
- Forbes
Do Not Answer These Calls — Google Issues New Smartphone Warning
Beware the UNC6040 smartphone threat. Update, June 8, 2025: This story, originally published on June 6, has been updated with further warnings from the FBI regarding dangerous phone calls, as well as additional information from the Google Threat Intelligence Group report potentially linking the UNC6040 threat campaign to an infamous cybercrime collective known as The Com. Google's Threat Intelligence Group has issued a new warning about a dangerous cyberattack group known only as UNC6040, which is succeeding in stealing data, including your credentials, by getting victims to answer a call on their smartphone. There are no vulnerabilities to exploit, unless you include yourself: these attackers 'abuse end-user trust,' a Google spokesperson said, adding that the UNC6040 campaign 'began months ago and remains active.' Here's what you need to know and do. TL;DR: Don't answer that call, and if you do, don't act upon it. If you still need me to warn you about the growing threat from AI-powered cyberattacks, particularly those involving calls to your smartphone — regardless of whether it's an Android or iPhone — then you really haven't been paying attention. It's this lack of attention, on the broadest global cross-industry scale, that has left attackers emboldened and allowed the 'vishing' threat to evolve and become ever-increasingly more dangerous. If you won't listen to me, perhaps you'll take notice of the cybersecurity and hacking experts who form the Google Threat Intelligence Group. A June 4 posting by GTIG, which has a motto of providing visibility and context on the threats that matter most, has detailed how it's been tracking a threat group known only as UNC6040. This group is financially motivated and very dangerous indeed. 'UNC6040's operators impersonate IT support via phone,' the GTIG report stated, 'tricking employees into installing modified (not authorized by Salesforce) Salesforce connected apps, often Data Loader variants.' The payload? Access to sensitive data and onward lateral movement to other cloud services beyond the original intrusion for the UNC67040 hackers. Google's threat intelligence analysts have designated UNC6040 as opportunistic attackers, and the broad spectrum of that opportunity has been seen across hospitality, retail and education in the U.S. and Europe. One thought is that the original attackers are working in conjunction with a second group that acts to monetize the infiltrated networks and stolen data, as the extortion itself often doesn't start for some months following the initial intrusion itself. The Google Threat Intelligence Group report has linked the activity of the UNC640 attack group, specifically through shared infrastructure characteristics, with a cybercrime collective known as The Com. The highly respected investigative cybersecurity journalist, Brian Krebs, has described The Com as being a 'distributed cybercriminal social network that facilitates instant collaboration.' This social network exists within Telegram and Discord servers that are home to any number of financially motivated cybercrime actors. Although it is generally agreed that The Com is something of a boasting platform, where criminal hackers go to boost their exploit kudos while also devaluing the cybercrime activities of others, its own value as a resource for threat actors looking to find collaborative opportunities with like-minded individuals should not be underestimated. 'We've also observed overlapping tactics, techniques, and procedures,' Google's TIG researchers said with regard to The Com and UNC6040, 'including social engineering via IT support, the targeting of Okta credentials, and an initial focus on English-speaking users at multinational companies.' However, the GTIG report admits that it is also quite possible these overlaps are simply a matter of associated threat actors who all boast within the same online criminal communities, rather than being evidence of 'a direct operational relationship' between them. The Federal Bureau of Investigation has now also joined the chorus of security experts and agencies warning the public about the dangers of answering smartphone calls and messages from specific threat groups and campaigns. Public cybersecurity advisory I-051525-PSA has warned that the FBI has observed a threat campaign, ongoing since April 2025, that uses malicious text and voice messages impersonating senior U.S. officials, including those in federal and state government roles, to gain access to personal information and ultimately valuable online accounts. As with the latest Google Threat Intelligence Group warning, these attacks are based around the fishing tactic of using AI-generated voice messages along with carefully crafted text messages, known as smishing, as a method of engendering trust and, as the FBI described it, establishing rapport with the victim. 'Traditionally, malicious actors have leveraged smishing, vishing, and spear phishing to transition to a secondary messaging platform,' the FBI warned, 'where the actor may present malware or introduce hyperlinks that direct intended targets to an actor-controlled site that steals log-in information, like usernames and passwords.' The latest warnings regarding this scam call campaign have appeared on social media platforms such as X, formerly known as Twitter, from the likes of the FBI Cleveland and FBI Nashville, as well as on law enforcement websites, including the New York State Police. The message remains the same: the FBI won't call you demanding money or access to online accounts, and the New York State Police won't call you demanding sensitive information or threatening you with arrest over the phone. 'Malicious actors are more frequently exploiting AI-generated audio to impersonate well-known, public figures or personal relations to increase the believability of their schemes,' the FBI advisory warned. The FBI has recommended that all smartphone users, whether they iPhone or Android devices, must seek to verify the true identity of the caller or sender of a text message before responding in any way. 'Research the originating number, organization, and/or person purporting to contact you,' the FBI said, 'then independently identify a phone number for the person and call to verify their authenticity.' To mitigate the UNC6040 attack risk, GITG said that organisations should consider the following steps: And, of course, as Google has advised in previous scam warnings, don't answer those phone calls from unknown sources. If you do, and it's someone claiming to be an IT support person, follow the FBI advice to hang up and use the established methods within your organization to contact them for verification.