Connect with us
[bsa_pro_ad_space id=12]

Crime

Venezuelan prison gang crime, arrests confirmed in 22 U.S. states

Published

6 minute read

Surveillance photos, Gateway Hotel, El Paso County Attorney’s Office

From The Center Square

By

Of the more than 14 million illegal border crossers reported under the Biden administration, an unknown number of violent Venezuelan Tren de Aragua prison gang members illegally entered the country.

Now, police records and official law enforcement statements confirm TdA-linked crime and arrests have occurred in 22 U.S. states.

They include Arizona, California, Colorado, Connecticut, Florida, Georgia, Illinois, Indiana, Louisiana, Missouri, New Jersey, New Mexico, New York, North Carolina, North Dakota, South Dakota, Tennessee, Texas, Utah, Virginia, Wisconsin and Wyoming. TdA activity also has been reported in the District of Columbia.

TdA is known for violence, murder, kidnapping, extortion, bribery and human and drug trafficking and are linked to more than 100 law enforcement investigations nationwide. The U.S. Department of Homeland Security is currently looking for 600 suspected TdA members and “subjects of interest” illegally in the U.S., NBC News reported.

While TdA is likely operating in nearly all U.S. states, local police reports and official public statements have yet to confirm this. Federal and state agencies have issued bulletins to law enforcement partners on how to identify TdA members.

In the West: TdA members have been arrested in Arizona, California, Colorado, Utah, New Mexico and Wyoming, The Center Square reported. In New Mexico, federal agents arrested TdA fugitives wanted for capital murder and aggravated kidnapping in Texas.

Multiple crimes have been committed by illegal border crossers in California, including residential burglaries allegedly committed by Colombians and Chileans involved in a South American theft group (SATG), The Center Square reported. While several social media reports appear to confuse TdA with SATG, police reports have yet to confirm TdA affiliation with SATG crimes.

Border Patrol and other federal agents in Arizona, California, Florida, New Mexico and Texas continue to arrest TdA and other violent gang members.

In the Midwest: TdA members were arrested for violent crimes in Illinois, Indiana, Missouri and Wisconsin, with law enforcement officers in Ohio involved in a multi-state ATM theft investigation, The Center Square reported.

TdA members were arrested this year for the first time in North and South Dakota and in Missouri, prompting state and federal lawmakers to demand answers and introduce legislation, The Center Square exclusively reported.

In Gulf states: TdA members have been arrested in Texas and Louisiana. In Louisiana, they’re tied to a multi-state sex trafficking operation involving smuggling women into the U.S., holding them in stash houses in Louisiana, Florida, New Jersey, Texas and Virginia, and forcing them into prostitution, authorities found, The Center Square reported.

In Texas, Gov. Greg Abbott declared TdA a foreign terrorist organization and state and local law enforcement are actively working to target and eliminate them in multiple operations.

TdA crime in Texas is linked to a multi-state investigation into an ATM bank robbery scheme, sex trafficking rings and other violent crimes.

In the Southeast: TdA members were arrested in Florida, Georgia, North Carolina, Tennessee and Virginia, charged with multiple felonies. In North Carolina, law enforcement officers arrested a TdA lieutenant and fugitive wanted by Interpol on terrorism related charges. In Tennessee, TdA members were arrested in a sex trafficking ring operating in multiple states. Tennesee’s attorney general argues federal agents are releasing “murderers and rapists from its migrant detention facilities onto American streets,” The Center Square reported.

In the Northeast: TdA members were arrested in New Jersey and New York for a slew of violent crimes, including a recent murder in Connecticut. Arrests are for multiple felonies including fugitives wanted in their home countries, The Center Square reported.

Several on social media appear to confuse SATF with TdA. Some claim SATG robberies targeting NFL and NBA players in Michigan and Minnesota are TdA when no confirmed TdA arrests have been reported.

Although TdA has established a stronghold in Colombia, Chile and Peru, authorities have yet to confirm TdA affiliation when making SATG announcements. Many investigations are ongoing and SATG culprits remain at large.

SATG operatives target wealthy neighborhoods, burglarize homes and quickly leave the scene. TdA operatives entrench themselves in migrant communities, perpetrate human trafficking, forced prostitution, aggravated assault and murder, among other violent crimes.

The underlying commonality is they illegally entered the U.S. under the Biden administration and are identified as top targets for removal by the Trump administration.

Todayville is a digital media and technology company. We profile unique stories and events in our community. Register and promote your community event for free.

Follow Author

Automotive

Dark Web Tesla Doxxers Used Widely-Popular Parking App Data To Find Targets, Analysis Shows

Published on

 

From the Daily Caller News Foundation

By Thomas English

A dark web doxxing website targeting Tesla owners and allies of Elon Musk appears to be compiled from hacked data originally stolen from a massive ParkMobile app breach in 2021, according to records obtained by a data privacy group. 

The site, known as DogeQuest, first appeared in March and publishes names, home addresses, contact details and other personal information tied to Tesla drivers and DOGE staff. Marketed as a hub for anti-Musk “creative expressions of protest,” the platform has been linked to real-world vandalism and remains live on the dark web. Federal investigations into DogeQuest are already underway, the New York Post first reported.

“If you’re on the hunt for a Tesla to unleash your artistic flair with a spray can, just step outside — no map needed! At DOGEQUEST, we believe in empowering creative expressions of protest that you can execute from the comfort of your own home,” the surface-web DogeQuest site reads. “DOGEQUEST neither endorses nor condemns any actions.”

A screenshot of the DogeQuest surface website captured on April 3, 2025. (Captured by Thomas English/Daily Caller News Foundation)

ObscureIQ, a data privacy group, compiled a breakdown of the data — obtained by the Daily Caller News Foundation — and determined 98.2% of records used to populate the site matched individuals affected by the 2021 ParkMobile breach.

DogeQuest originally appeared as a surface web doxxing hub, encouraging vandalism of Teslas and displaying names, addresses, contact details and, in some cases, employment information for roughly 1,700 individuals. The site used stolen ParkMobile records along with data purchased from brokers, flagging anyone who had a Tesla listed in their vehicle registration profile, according to ObscureIQ’s analysis.

The platform — now operating as “DogeQuest Unleashed” via a .onion dark web address — has also published personal details of high-value targets including senior military officials, federal employees and private sector executives in Silicon Valley. A spreadsheet reviewed by the Daily Caller News Foundation indicates several individuals targeted work areas like cybersecurity, defense contracting, public health and diplomatic policy. DOGE staff and their families appear prominently throughout the data.

A screenshot of DogeQuest's surface website, captured on April 3, 2025. (Captured by Thomas English/Daily Caller News Foundation)

A screenshot of DogeQuest’s surface website, captured on April 3, 2025. (Captured by Thomas English/Daily Caller News Foundation)

No other reporting has yet tied DogeQuest directly to the ParkMobile breach, which impacted over 21 million users in 2021. The company, which facilitates cashless parking across the U.S., quietly disclosed the breach in April of that year, admitting that “basic user information” had been accessed. ObscureIQ’s research shows that exposed data included email addresses, license plate numbers and phone numbers — enough to triangulate identity when paired with commercial data brokers.

The company agreed to a $32 million settlement to resolve a class-action lawsuit stemming from the data breach. The lawsuit alleged that ParkMobile failed to secure its Amazon Web Services cloud storage, allowing access to the data. Although payment data were reportedly not compromised, plaintiffs argued the exposed information still posed serious privacy risks — a claim now reinforced by its use in the DogeQuest doxxing campaign.

Despite federal attention, the site has proven difficult to keep offline, as the dark web mirror incorporates anonymized hosting methods, frustrating law enforcement takedown efforts.

The Department of Justice charged three suspects last week linked to physical attacks on Tesla vehicles, charging stations and dealerships across multiple states, though it has not publicly confirmed any link between those suspects and DogeQuest. Meanwhile, the FBI has acknowledged it is “actively working” on both the doxxing campaign and a parallel rise in swatting incidents affecting DOGE affiliates.

Continue Reading

Crime

Europol takes out one of the largest pedophile networks in the world with almost 2 million users

Published on

From LifeSiteNews

By Andreas Wailzer

An international group of police agencies has taken down one of the largest pedophile networks in the world with almost two million users.

Investigators from Bavaria, Germany, announced yesterday that they dismantled an online pedophile platform called “Kidflix” used to distribute child pornography that had around 1.8 million users worldwide. Police carried out raids in 31 countries and arrested 79 people in total.

The European police unit Europol coordinated the operation led by the Bavarian criminal police. Europol announced that around 1,400 suspects have been identified worldwide in “one of the biggest blows against child pornography in recent years, if not ever.”

According to Europol, the platform “Kidflix” was one of the largest pedophile networks in the world. Guido Limmer, deputy head of the Bavarian criminal police, said it was the “largest operation ever” organized by Europol. The platform’s server, with over 70,000 videos at the time, was reportedly shut down by German and Dutch authorities in early March.

The 79 people arrested were not only suspected of having watched or downloaded videos of child sexual abuse but some were also suspected of personally harming children. The police units carried out the raids from March 10 to 23 and reportedly confiscated thousands of electronic devices. In Germany alone, 96 locations were raided. Among the suspects was a 36-year-old man who not only viewed illegal material but also reportedly offered up his young son for sexual abuse. The child was given to child protection services after the man was arrested, the Bavarian police spokesman said.

Limmer also noted that one of the arrested suspects was a “serial” abuser from the United States.

According to Europol, “Kidflix” was set up by cybercriminals in 2021 and became one of the most popular platforms for pedophiles. The international police agency said that the investigation into the network began in 2022.

In October 2024, German police dismantled another large online pedophile network with hundreds of thousands of users, arresting six men associated with the platform.

Last year, Germany’s Federal Criminal Police Office revealed that the cases of sexual abuse against children and adolescents had more than tripled in the past five years.

Continue Reading

Trending

X