Connect with us
[the_ad id="89560"]

Crime

Charges laid in historical sex crimes investigation – Grande Prairie

Published

1 minute read

Side of RCMP car

Jan. 27, 2021

Grande Prairie RCMP – Charges laid in historical sex crimes investigation

Grande Prairie, Alta. – RCMP have laid charges against a 36-year-old man following an investigation into allegations of sexual assaults that occurred between 2016 to late 2020.

In Dec. 2020, RCMP received reports of alleged sexual offences that had taken place between 2016 and 2020. The Grande Prairie RCMP Special Investigations Unit initiated an investigation into the allegations.

All of the offences in this investigation are alleged to have taken place between 2016 and 2020 and involve female victims who were known to the accused.

On Jan. 12, 2021, investigators arrested Philip Woodrow (36) of Grande Prairie, Alberta. He faces charges of Sexual Assault (x2) and Sexual Interference (x2). Woodrow has been released on an undertaking with conditions and is scheduled to appear in Grande Prairie Provincial Court on Feb. 24, 2021.

The RCMP are continuing their investigation into this incident and are asking the public to come forward with any similar type incidents in the Grande Prairie area. If you have information, please contact the Grande Prairie RCMP at 780-830-5701 or your local police. If you wish to remain anonymous, you can contact Crime Stoppers at 1-800-222-8477 (TIPS), online at www.P3Tips.com or by using the “P3 Tips” app available through the Apple App or Google Play Store.

Before Post

Todayville is an independently-owned digital media company. We specialize in helping community groups, local businesses and organizations tell their story. Our team has years of media and video production experience. Talk to us about advertising, brand journalism stories, opinion pieces, event promotion, or other ideas you have to make our product better. We also own and operate Todayville Red Deer and Todayville Calgary.

Follow Author

Business

Canadian Police Raid Sophisticated Vancouver Fentanyl Labs, But Insist Millions of Pills Not Destined for U.S.

Published on

Sam Cooper

Mounties say labs outfitted with high-grade chemistry equipment and a trained chemist reveal transnational crime groups are advancing in technical sophistication and drug production capacity

Amid a growing trade war between Washington and Beijing, Canada—targeted alongside Mexico and China for special tariffs related to Chinese fentanyl supply chains—has dismantled a sophisticated network of fentanyl labs across British Columbia and arrested an academic lab chemist, the RCMP said Thursday.

At a press conference in Vancouver, senior investigators stood behind seized lab equipment and fentanyl supplies, telling reporters the operation had prevented millions of potentially lethal pills from reaching the streets.

“This interdiction has prevented several million potentially lethal doses of fentanyl from being produced and distributed across Canada,” said Cpl. Arash Seyed. But the presence of commercial-grade laboratory equipment at each of the sites—paired with the arrest of a suspect believed to have formal training in chemistry—signals an evolution in the capabilities of organized crime networks, with “progressively enhanced scientific and technical expertise among transnational organized crime groups involved in the production and distribution of illicit drugs,” Seyed added.

This investigation is ongoing, while the seized drugs, precursor chemicals, and other evidence continue to be processed, police said.

Recent Canadian data confirms the country has become an exporter of fentanyl, and experts identify British Columbia as the epicenter of clandestine labs supplied by Chinese precursors and linked to Mexican cartel distributors upstream.

In a statement that appears politically responsive to the evolving Trump trade threats, Assistant Commissioner David Teboul said, “There continues to be no evidence, in this case and others, that these labs are producing fentanyl for exportation into the United States.”

In late March, during coordinated raids across the suburban municipalities of Pitt Meadows, Mission, Aldergrove, Langley, and Richmond, investigators took down three clandestine fentanyl production sites.

The labs were described by the RCMP as “equipped with specialized chemical processing equipment often found in academic and professional research facilities.” Photos released by authorities show stainless steel reaction vessels, industrial filters, and what appear to be commercial-scale tablet presses and drying trays—pointing to mass production capabilities.

The takedown comes as Canada finds itself in the crosshairs of intensifying geopolitical tension.

Fentanyl remains the leading cause of drug-related deaths in Canada, with toxic supply chains increasingly linked to hybrid transnational networks involving Chinese chemical brokers and domestic Canadian producers.

RCMP said the sprawling B.C. lab probe was launched in the summer of 2023, with teams initiating an investigation into the importation of unregulated chemicals and commercial laboratory equipment that could be used for synthesizing illicit drugs including fentanyl, MDMA, and GHB.

The Bureau is a reader-supported publication.

To receive new posts and support my work, consider becoming a free or paid subscriber.

Invite your friends and earn rewards

If you enjoy The Bureau, share it with your friends and earn rewards when they subscribe.

Invite Friends

Continue Reading

Automotive

Dark Web Tesla Doxxers Used Widely-Popular Parking App Data To Find Targets, Analysis Shows

Published on

 

From the Daily Caller News Foundation

By Thomas English

A dark web doxxing website targeting Tesla owners and allies of Elon Musk appears to be compiled from hacked data originally stolen from a massive ParkMobile app breach in 2021, according to records obtained by a data privacy group. 

The site, known as DogeQuest, first appeared in March and publishes names, home addresses, contact details and other personal information tied to Tesla drivers and DOGE staff. Marketed as a hub for anti-Musk “creative expressions of protest,” the platform has been linked to real-world vandalism and remains live on the dark web. Federal investigations into DogeQuest are already underway, the New York Post first reported.

“If you’re on the hunt for a Tesla to unleash your artistic flair with a spray can, just step outside — no map needed! At DOGEQUEST, we believe in empowering creative expressions of protest that you can execute from the comfort of your own home,” the surface-web DogeQuest site reads. “DOGEQUEST neither endorses nor condemns any actions.”

A screenshot of the DogeQuest surface website captured on April 3, 2025. (Captured by Thomas English/Daily Caller News Foundation)

ObscureIQ, a data privacy group, compiled a breakdown of the data — obtained by the Daily Caller News Foundation — and determined 98.2% of records used to populate the site matched individuals affected by the 2021 ParkMobile breach.

DogeQuest originally appeared as a surface web doxxing hub, encouraging vandalism of Teslas and displaying names, addresses, contact details and, in some cases, employment information for roughly 1,700 individuals. The site used stolen ParkMobile records along with data purchased from brokers, flagging anyone who had a Tesla listed in their vehicle registration profile, according to ObscureIQ’s analysis.

The platform — now operating as “DogeQuest Unleashed” via a .onion dark web address — has also published personal details of high-value targets including senior military officials, federal employees and private sector executives in Silicon Valley. A spreadsheet reviewed by the Daily Caller News Foundation indicates several individuals targeted work areas like cybersecurity, defense contracting, public health and diplomatic policy. DOGE staff and their families appear prominently throughout the data.

A screenshot of DogeQuest's surface website, captured on April 3, 2025. (Captured by Thomas English/Daily Caller News Foundation)

A screenshot of DogeQuest’s surface website, captured on April 3, 2025. (Captured by Thomas English/Daily Caller News Foundation)

No other reporting has yet tied DogeQuest directly to the ParkMobile breach, which impacted over 21 million users in 2021. The company, which facilitates cashless parking across the U.S., quietly disclosed the breach in April of that year, admitting that “basic user information” had been accessed. ObscureIQ’s research shows that exposed data included email addresses, license plate numbers and phone numbers — enough to triangulate identity when paired with commercial data brokers.

The company agreed to a $32 million settlement to resolve a class-action lawsuit stemming from the data breach. The lawsuit alleged that ParkMobile failed to secure its Amazon Web Services cloud storage, allowing access to the data. Although payment data were reportedly not compromised, plaintiffs argued the exposed information still posed serious privacy risks — a claim now reinforced by its use in the DogeQuest doxxing campaign.

Despite federal attention, the site has proven difficult to keep offline, as the dark web mirror incorporates anonymized hosting methods, frustrating law enforcement takedown efforts.

The Department of Justice charged three suspects last week linked to physical attacks on Tesla vehicles, charging stations and dealerships across multiple states, though it has not publicly confirmed any link between those suspects and DogeQuest. Meanwhile, the FBI has acknowledged it is “actively working” on both the doxxing campaign and a parallel rise in swatting incidents affecting DOGE affiliates.

Continue Reading

Trending

X