Crime
RCMP Bust B.C. Fentanyl Superlab Linked to Mexico and Transnational Exports

In a remote mountainous area of British Columbia, federal police have dismantled the largest fentanyl laboratory ever discovered in Canada. This western province has become a critical front in the Five Eyes battle against the production and distribution of deadly synthetic narcotics trafficked globally by networks involving Chinese and Iranian state-sponsored mafias and Mexican cartels.
In a groundbreaking discovery, the RCMP located the superlab in Falkland—a village of 946 residents nestled in the rugged terrain between Calgary and Vancouver—using Phenyl-2-Propanone (P2P) to manufacture methamphetamine. This production method, primarily employed by Mexican cartels, stems from the precursors and scientific expertise Mexican cartels have gathered from elite Chinese criminals since the early 2000s, according to U.S. enforcement sources.
David Teboul, Commander of the RCMP Federal Policing program in the Pacific Region, underscored the significance: “Manufacturing methamphetamine using P2P had not been seen in Western Canada until now,” he said. “The P2P manufacturing method has been the primary method used by Mexican cartels to produce methamphetamine for years.”
Demonstrating the destructive power of the cartels involved, the RCMP seized a staggering cache of illicit substances and weapons. Officers confiscated 54 kilograms of fentanyl, massive amounts of precursor chemicals, 390 kilograms of methamphetamine, 35 kilograms of cocaine, 15 kilograms of MDMA, and 6 kilograms of cannabis. The superlab was described as the largest and most sophisticated of its kind, capable of producing multiple types of illicit drugs.
“To put things into context,” Teboul said, “the over 95 million potentially lethal doses of fentanyl that have been seized could have taken the lives of every Canadian at least twice over.”
A large portion of the product was destined for other countries.
During the investigation, RCMP officers learned of several large shipments of methamphetamine prepared for international export. They intercepted 310 kilograms of methamphetamine before it could leave Canada, preventing a significant quantity from reaching global markets—a critical point as Canada faces pressure from its allies over its role in the global fentanyl and methamphetamine trade.
Teboul noted that the RCMP collaborated with its Five Eyes enforcement partners—an intelligence alliance comprising Canada, the United States, the United Kingdom, Australia, and New Zealand. Although Teboul did not provide specific details, this cooperation underscores the international scope of the transnational investigation.
The first suspect, Gaganpreet Singh Randhawa, was identified and arrested during raids. He is currently in custody and faces multiple charges, including possession and export of controlled substances, possession of prohibited firearms and devices, and possession of explosive devices. More arrests are expected, Teboul said.
The scale of this criminal network echoes the power and violence fueling gang wars that have rocked British Columbia, putting innocent lives at risk during high-powered shootouts in Vancouver. Investigators seized a total of 89 firearms, including 45 handguns, 21 AR-15-style rifles, and submachine guns—many of which were loaded and ready for use. The searches also uncovered small explosive devices, vast amounts of ammunition, firearm silencers, high-capacity magazines, body armor, and $500,000 in cash.
British Columbia has been grappling with an influx of synthetic opioids like fentanyl, significantly exacerbating the opioid crisis across Canada. The province has witnessed a surge in overdose deaths, prompting law enforcement to intensify efforts against drug production and trafficking networks. Experts highlight weaknesses in Canadian laws and a lack of federal oversight at the Port of Vancouver, which have been exploited by transnational crime and money laundering organizations from China, Iran, and Mexico.
This significant bust comes at a time when Canada is under increased scrutiny from international allies over its role as a hub for the export of fentanyl and methamphetamine. The superlab takedown appears to align with serious concerns raised by lawmakers in Washington about how Canada and Mexico are being used by transnational crime organizations to distribute fentanyl worldwide.
A recent U.S. congressional report argues that the Chinese Communist Party’s (CCP) strategy relies less on overt military actions and more on covert tactics, including trafficking of fentanyl and leveraging money laundering, aimed at exploiting vulnerabilities across social, economic, and health domains.
“Fentanyl precursors are manufactured in China and shipped to Mexico and Canada. For precursors that arrive in Mexico, Chinese transnational mafias work with Mexican cartels to smuggle and distribute fentanyl in the United States on behalf of the CCP,” the report states. “The DEA confirmed Chinese transnational crime leaders hold government positions in the CCP and indicated that Chinese transnational crime organizations are dedicated to the CCP.”
“The public deserves to know about the CCP’s role in fentanyl production and how the Party is using fentanyl as a chemical weapon to kill Americans,” the report adds. It recommends that Washington publicly “blame the CCP as much as the DEA and its partners currently blame the Sinaloa Cartel” for fentanyl trafficking and urges the government to “educate international allies about CCP chemical warfare” and encourage them to condemn Chinese transnational crime.
According to congressional investigations, Beijing is actively incentivizing the export of fentanyl and methamphetamine worldwide. The report alleges that Chinese criminal organizations, including Triads led by individuals with official positions in the CCP, are working alongside Mexican cartels to generate profit to fund interference operations in America.
The Bureau is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.
Automotive
Dark Web Tesla Doxxers Used Widely-Popular Parking App Data To Find Targets, Analysis Shows

From the Daily Caller News Foundation
By Thomas English
A dark web doxxing website targeting Tesla owners and allies of Elon Musk appears to be compiled from hacked data originally stolen from a massive ParkMobile app breach in 2021, according to records obtained by a data privacy group.
The site, known as DogeQuest, first appeared in March and publishes names, home addresses, contact details and other personal information tied to Tesla drivers and DOGE staff. Marketed as a hub for anti-Musk “creative expressions of protest,” the platform has been linked to real-world vandalism and remains live on the dark web. Federal investigations into DogeQuest are already underway, the New York Post first reported.
“If you’re on the hunt for a Tesla to unleash your artistic flair with a spray can, just step outside — no map needed! At DOGEQUEST, we believe in empowering creative expressions of protest that you can execute from the comfort of your own home,” the surface-web DogeQuest site reads. “DOGEQUEST neither endorses nor condemns any actions.”

A screenshot of the DogeQuest surface website captured on April 3, 2025. (Captured by Thomas English/Daily Caller News Foundation)
ObscureIQ, a data privacy group, compiled a breakdown of the data — obtained by the Daily Caller News Foundation — and determined 98.2% of records used to populate the site matched individuals affected by the 2021 ParkMobile breach.
Encouraging destruction of Teslas throughout the country is extreme domestic terrorism!! https://t.co/8TCNIbrQxA
— Elon Musk (@elonmusk) March 18, 2025
DogeQuest originally appeared as a surface web doxxing hub, encouraging vandalism of Teslas and displaying names, addresses, contact details and, in some cases, employment information for roughly 1,700 individuals. The site used stolen ParkMobile records along with data purchased from brokers, flagging anyone who had a Tesla listed in their vehicle registration profile, according to ObscureIQ’s analysis.
The platform — now operating as “DogeQuest Unleashed” via a .onion dark web address — has also published personal details of high-value targets including senior military officials, federal employees and private sector executives in Silicon Valley. A spreadsheet reviewed by the Daily Caller News Foundation indicates several individuals targeted work areas like cybersecurity, defense contracting, public health and diplomatic policy. DOGE staff and their families appear prominently throughout the data.

A screenshot of DogeQuest’s surface website, captured on April 3, 2025. (Captured by Thomas English/Daily Caller News Foundation)
No other reporting has yet tied DogeQuest directly to the ParkMobile breach, which impacted over 21 million users in 2021. The company, which facilitates cashless parking across the U.S., quietly disclosed the breach in April of that year, admitting that “basic user information” had been accessed. ObscureIQ’s research shows that exposed data included email addresses, license plate numbers and phone numbers — enough to triangulate identity when paired with commercial data brokers.
The company agreed to a $32 million settlement to resolve a class-action lawsuit stemming from the data breach. The lawsuit alleged that ParkMobile failed to secure its Amazon Web Services cloud storage, allowing access to the data. Although payment data were reportedly not compromised, plaintiffs argued the exposed information still posed serious privacy risks — a claim now reinforced by its use in the DogeQuest doxxing campaign.
Despite federal attention, the site has proven difficult to keep offline, as the dark web mirror incorporates anonymized hosting methods, frustrating law enforcement takedown efforts.
The Department of Justice charged three suspects last week linked to physical attacks on Tesla vehicles, charging stations and dealerships across multiple states, though it has not publicly confirmed any link between those suspects and DogeQuest. Meanwhile, the FBI has acknowledged it is “actively working” on both the doxxing campaign and a parallel rise in swatting incidents affecting DOGE affiliates.
Crime
Europol takes out one of the largest pedophile networks in the world with almost 2 million users

From LifeSiteNews
An international group of police agencies has taken down one of the largest pedophile networks in the world with almost two million users.
Investigators from Bavaria, Germany, announced yesterday that they dismantled an online pedophile platform called “Kidflix” used to distribute child pornography that had around 1.8 million users worldwide. Police carried out raids in 31 countries and arrested 79 people in total.
The European police unit Europol coordinated the operation led by the Bavarian criminal police. Europol announced that around 1,400 suspects have been identified worldwide in “one of the biggest blows against child pornography in recent years, if not ever.”
According to Europol, the platform “Kidflix” was one of the largest pedophile networks in the world. Guido Limmer, deputy head of the Bavarian criminal police, said it was the “largest operation ever” organized by Europol. The platform’s server, with over 70,000 videos at the time, was reportedly shut down by German and Dutch authorities in early March.
The 79 people arrested were not only suspected of having watched or downloaded videos of child sexual abuse but some were also suspected of personally harming children. The police units carried out the raids from March 10 to 23 and reportedly confiscated thousands of electronic devices. In Germany alone, 96 locations were raided. Among the suspects was a 36-year-old man who not only viewed illegal material but also reportedly offered up his young son for sexual abuse. The child was given to child protection services after the man was arrested, the Bavarian police spokesman said.
Limmer also noted that one of the arrested suspects was a “serial” abuser from the United States.
According to Europol, “Kidflix” was set up by cybercriminals in 2021 and became one of the most popular platforms for pedophiles. The international police agency said that the investigation into the network began in 2022.
In October 2024, German police dismantled another large online pedophile network with hundreds of thousands of users, arresting six men associated with the platform.
Last year, Germany’s Federal Criminal Police Office revealed that the cases of sexual abuse against children and adolescents had more than tripled in the past five years.
-
2025 Federal Election22 hours ago
Canada Continues to Miss LNG Opportunities: Why the World Needs Our LNG – and We’re Not Ready
-
International3 hours ago
Germany launches first permanent foreign troop deployment since WW2
-
COVID-192 days ago
Trump’s new NIH head fires top Fauci allies and COVID shot promoters, including Fauci’s wife
-
Freedom Convoy2 days ago
Freedom Convoy leaders Tamara Lich, Chris Barber found guilty of mischief
-
2025 Federal Election20 hours ago
Mainstream Media Election Coverage: If the Election Was a NHL Game, the Ice Would be Constantly Tilted Up and to the Left
-
2025 Federal Election6 hours ago
Poilievre To Create ‘Canada First’ National Energy Corridor
-
Business1 day ago
‘Time To Make The Patient Better’: JD Vance Says ‘Big Transition’ Coming To American Economic Policy
-
2025 Federal Election1 day ago
Poilievre promises to drop ‘radical political ideologies’ in universities