Crime
3 arrested after RCMP vehicle rammed in Red Deer

From Red Deer RCMP
Red Deer RCMP arrest three after police vehicle rammed
Two men and a woman face charges after the stolen truck they were driving rammed a Red Deer RCMP police vehicle the afternoon of October 25; the collision caused damage to a residential fence, a garage and a power transformer, resulting in power outages in the Johnstone area.
RCMP were on patrol in north Red Deer at approximately 5:30 pm on October 25 when they located the stolen truck driving in the area of Jewel Street and James Street. When the truck entered an alley behind James Street, police initiated a traffic stop; the suspect truck, a Ford F150, rammed the police vehicle in an attempt to flee; that collision caused significant structural damage to a fence and garage at one residence. The truck then became stuck on the transformer box, causing the neighbourhood to lose power for several hours while City of Red Deer staff repaired the damage. RCMP arrested two at the truck, and arrested a third suspect after a brief foot pursuit. RCMP continue to investigate the identity of a fourth suspect who fled the scene and was not located.
No police officers or civilians were injured in the collisions; the female suspect sustained minor injuries and was treated at hospital before being released into RCMP custody. RCMP seized fentanyl during the arrests. The truck, a Ford F150, had been reported stolen out of Blackfalds; the license plate on the truck had been reported stolen out of Fort McMurray.
21 year old Nickolas Tweedle was wanted on outstanding warrants for failing to comply with probation and failing to appear in court; he now faces the following additional charges:
- Criminal Code 355(a) – Possession of stolen property over $5,000
- Criminal Code 355(b) – Possession of stolen property under $5,000
- Criminal Code 249.1(1) – Flight from police
- Criminal Code 733.1(1) – Fail to comply with probation order
- TSA 54(1)(a) – Drive without insurance
- TSA 52(1)(a) – Drive without registration
- TSA 94(1)(a) – Drive while unauthorized
Tweedle made his first appearance in court in Red Deer today and is scheduled to appear next on October 31.
25 year old Trent Tyler Roan faces the following charges:
- Criminal Code 127(1) – Breach of court order X 2
Roan made his first appearance in court in Red Deer on Friday and is scheduled to appear next on November 1.
23 year old Shyla Loustel faces the following charges:
- CDSA 4(1) – Possession of Schedule I substance
- Criminal Code 129(a) – Resist/ obstruct peace officer
Loustel is scheduled to appear in court in Red Deer on October 30.
Automotive
Dark Web Tesla Doxxers Used Widely-Popular Parking App Data To Find Targets, Analysis Shows

From the Daily Caller News Foundation
By Thomas English
A dark web doxxing website targeting Tesla owners and allies of Elon Musk appears to be compiled from hacked data originally stolen from a massive ParkMobile app breach in 2021, according to records obtained by a data privacy group.
The site, known as DogeQuest, first appeared in March and publishes names, home addresses, contact details and other personal information tied to Tesla drivers and DOGE staff. Marketed as a hub for anti-Musk “creative expressions of protest,” the platform has been linked to real-world vandalism and remains live on the dark web. Federal investigations into DogeQuest are already underway, the New York Post first reported.
“If you’re on the hunt for a Tesla to unleash your artistic flair with a spray can, just step outside — no map needed! At DOGEQUEST, we believe in empowering creative expressions of protest that you can execute from the comfort of your own home,” the surface-web DogeQuest site reads. “DOGEQUEST neither endorses nor condemns any actions.”

A screenshot of the DogeQuest surface website captured on April 3, 2025. (Captured by Thomas English/Daily Caller News Foundation)
ObscureIQ, a data privacy group, compiled a breakdown of the data — obtained by the Daily Caller News Foundation — and determined 98.2% of records used to populate the site matched individuals affected by the 2021 ParkMobile breach.
Encouraging destruction of Teslas throughout the country is extreme domestic terrorism!! https://t.co/8TCNIbrQxA
— Elon Musk (@elonmusk) March 18, 2025
DogeQuest originally appeared as a surface web doxxing hub, encouraging vandalism of Teslas and displaying names, addresses, contact details and, in some cases, employment information for roughly 1,700 individuals. The site used stolen ParkMobile records along with data purchased from brokers, flagging anyone who had a Tesla listed in their vehicle registration profile, according to ObscureIQ’s analysis.
The platform — now operating as “DogeQuest Unleashed” via a .onion dark web address — has also published personal details of high-value targets including senior military officials, federal employees and private sector executives in Silicon Valley. A spreadsheet reviewed by the Daily Caller News Foundation indicates several individuals targeted work areas like cybersecurity, defense contracting, public health and diplomatic policy. DOGE staff and their families appear prominently throughout the data.

A screenshot of DogeQuest’s surface website, captured on April 3, 2025. (Captured by Thomas English/Daily Caller News Foundation)
No other reporting has yet tied DogeQuest directly to the ParkMobile breach, which impacted over 21 million users in 2021. The company, which facilitates cashless parking across the U.S., quietly disclosed the breach in April of that year, admitting that “basic user information” had been accessed. ObscureIQ’s research shows that exposed data included email addresses, license plate numbers and phone numbers — enough to triangulate identity when paired with commercial data brokers.
The company agreed to a $32 million settlement to resolve a class-action lawsuit stemming from the data breach. The lawsuit alleged that ParkMobile failed to secure its Amazon Web Services cloud storage, allowing access to the data. Although payment data were reportedly not compromised, plaintiffs argued the exposed information still posed serious privacy risks — a claim now reinforced by its use in the DogeQuest doxxing campaign.
Despite federal attention, the site has proven difficult to keep offline, as the dark web mirror incorporates anonymized hosting methods, frustrating law enforcement takedown efforts.
The Department of Justice charged three suspects last week linked to physical attacks on Tesla vehicles, charging stations and dealerships across multiple states, though it has not publicly confirmed any link between those suspects and DogeQuest. Meanwhile, the FBI has acknowledged it is “actively working” on both the doxxing campaign and a parallel rise in swatting incidents affecting DOGE affiliates.
Crime
Europol takes out one of the largest pedophile networks in the world with almost 2 million users

From LifeSiteNews
An international group of police agencies has taken down one of the largest pedophile networks in the world with almost two million users.
Investigators from Bavaria, Germany, announced yesterday that they dismantled an online pedophile platform called “Kidflix” used to distribute child pornography that had around 1.8 million users worldwide. Police carried out raids in 31 countries and arrested 79 people in total.
The European police unit Europol coordinated the operation led by the Bavarian criminal police. Europol announced that around 1,400 suspects have been identified worldwide in “one of the biggest blows against child pornography in recent years, if not ever.”
According to Europol, the platform “Kidflix” was one of the largest pedophile networks in the world. Guido Limmer, deputy head of the Bavarian criminal police, said it was the “largest operation ever” organized by Europol. The platform’s server, with over 70,000 videos at the time, was reportedly shut down by German and Dutch authorities in early March.
The 79 people arrested were not only suspected of having watched or downloaded videos of child sexual abuse but some were also suspected of personally harming children. The police units carried out the raids from March 10 to 23 and reportedly confiscated thousands of electronic devices. In Germany alone, 96 locations were raided. Among the suspects was a 36-year-old man who not only viewed illegal material but also reportedly offered up his young son for sexual abuse. The child was given to child protection services after the man was arrested, the Bavarian police spokesman said.
Limmer also noted that one of the arrested suspects was a “serial” abuser from the United States.
According to Europol, “Kidflix” was set up by cybercriminals in 2021 and became one of the most popular platforms for pedophiles. The international police agency said that the investigation into the network began in 2022.
In October 2024, German police dismantled another large online pedophile network with hundreds of thousands of users, arresting six men associated with the platform.
Last year, Germany’s Federal Criminal Police Office revealed that the cases of sexual abuse against children and adolescents had more than tripled in the past five years.
-
2025 Federal Election18 hours ago
Mark Carney refuses to clarify 2022 remarks accusing the Freedom Convoy of ‘sedition’
-
2025 Federal Election22 hours ago
Poilievre To Create ‘Canada First’ National Energy Corridor
-
Bruce Dowbiggin20 hours ago
Are the Jays Signing Or Declining? Only Vladdy & Bo Know For Sure
-
2025 Federal Election21 hours ago
Fixing Canada’s immigration system should be next government’s top priority
-
Daily Caller19 hours ago
Biden Administration Was Secretly More Involved In Ukraine Than It Let On, Investigation Reveals
-
2025 Federal Election2 days ago
Canada Continues to Miss LNG Opportunities: Why the World Needs Our LNG – and We’re Not Ready
-
Health2 days ago
Selective reporting on measles outbreaks is a globalist smear campaign against Trump administration.
-
2025 Federal Election2 days ago
Mark Carney is trying to market globalism as a ‘Canadian value.’ Will it work?