Connect with us
[the_ad id="89560"]

Crime

Red Deer RCMP charge male with sexual offences

Published

3 minute read

 From Red Deer RCMP

On August 02, 2023, a report was made to the Red Deer RCMP that a female teen was followed off a city bus, grabbed and assaulted by a male.  The female was able to fight the male off and run to safety nearby. The female was not physically injured in this incident.

A second incident occurred on August 10, 2023, and was reported later that evening. A female teen had been followed off the city bus to her residence by an unknown male. The same male was captured on video surveillance looking into the window of the residence later that evening.

On August 11, 2023 a third teenaged female reported having been sexually assaulted, touched unwillingly, by an unknown male while seated on the City bus. Video Surveillance from the same date captures a fourth female teen being unwillingly touched by a male on the city bus. This female has not yet been identified.

All incidents took place in the north west end of the city, in the neighborhoods of Johnstone, Kentwood and Highland Green.

As a result of the investigations, a single male was identified as being responsible for these incidents.

Matthew Ryan (24) a resident of Red Deer, was arrested and has been charged with the following:

  • Assault
  • Sexual Assault X2
  • Harassment X2
  • Indecent Act
  • Failing to comply with an Undertaking

Ryan was held for a judicial interim release hearing where he was remanded to Alberta Court of Justice in Red Deer on August 25, 2023.

Further subsequent and preceding incidents are being investigated dating back to April 2023. Incidents are believed to have taken place on or off the city bus and possibly in different areas of the city.

At this time Red Deer RCMP are looking to speak with any other members of the public who may have witnessed or been involved in a similar incident.

Matthew Ryan is described as:

  • White male
  • Mid 20’s
  • Brown hair
  • Grown out buzz cut or shaggy hair
  • Unshaven
  • Bigger build

Anyone with further information is encouraged to make a report and contact the Red Deer RCMP at 403-406-2200.  If you wish to remain anonymous, you can contact Crime Stoppers at 1-800-222-8477 (TIPS), online at www.P3Tips.com or using the “P3 TIPS” app available through the Apple App or Google Play Store.

Before Post

Todayville is a digital media and technology company. We profile unique stories and events in our community. Register and promote your community event for free.

Follow Author

Business

Canadian Police Raid Sophisticated Vancouver Fentanyl Labs, But Insist Millions of Pills Not Destined for U.S.

Published on

Sam Cooper

Mounties say labs outfitted with high-grade chemistry equipment and a trained chemist reveal transnational crime groups are advancing in technical sophistication and drug production capacity

Amid a growing trade war between Washington and Beijing, Canada—targeted alongside Mexico and China for special tariffs related to Chinese fentanyl supply chains—has dismantled a sophisticated network of fentanyl labs across British Columbia and arrested an academic lab chemist, the RCMP said Thursday.

At a press conference in Vancouver, senior investigators stood behind seized lab equipment and fentanyl supplies, telling reporters the operation had prevented millions of potentially lethal pills from reaching the streets.

“This interdiction has prevented several million potentially lethal doses of fentanyl from being produced and distributed across Canada,” said Cpl. Arash Seyed. But the presence of commercial-grade laboratory equipment at each of the sites—paired with the arrest of a suspect believed to have formal training in chemistry—signals an evolution in the capabilities of organized crime networks, with “progressively enhanced scientific and technical expertise among transnational organized crime groups involved in the production and distribution of illicit drugs,” Seyed added.

This investigation is ongoing, while the seized drugs, precursor chemicals, and other evidence continue to be processed, police said.

Recent Canadian data confirms the country has become an exporter of fentanyl, and experts identify British Columbia as the epicenter of clandestine labs supplied by Chinese precursors and linked to Mexican cartel distributors upstream.

In a statement that appears politically responsive to the evolving Trump trade threats, Assistant Commissioner David Teboul said, “There continues to be no evidence, in this case and others, that these labs are producing fentanyl for exportation into the United States.”

In late March, during coordinated raids across the suburban municipalities of Pitt Meadows, Mission, Aldergrove, Langley, and Richmond, investigators took down three clandestine fentanyl production sites.

The labs were described by the RCMP as “equipped with specialized chemical processing equipment often found in academic and professional research facilities.” Photos released by authorities show stainless steel reaction vessels, industrial filters, and what appear to be commercial-scale tablet presses and drying trays—pointing to mass production capabilities.

The takedown comes as Canada finds itself in the crosshairs of intensifying geopolitical tension.

Fentanyl remains the leading cause of drug-related deaths in Canada, with toxic supply chains increasingly linked to hybrid transnational networks involving Chinese chemical brokers and domestic Canadian producers.

RCMP said the sprawling B.C. lab probe was launched in the summer of 2023, with teams initiating an investigation into the importation of unregulated chemicals and commercial laboratory equipment that could be used for synthesizing illicit drugs including fentanyl, MDMA, and GHB.

The Bureau is a reader-supported publication.

To receive new posts and support my work, consider becoming a free or paid subscriber.

Invite your friends and earn rewards

If you enjoy The Bureau, share it with your friends and earn rewards when they subscribe.

Invite Friends

Continue Reading

Automotive

Dark Web Tesla Doxxers Used Widely-Popular Parking App Data To Find Targets, Analysis Shows

Published on

 

From the Daily Caller News Foundation

By Thomas English

A dark web doxxing website targeting Tesla owners and allies of Elon Musk appears to be compiled from hacked data originally stolen from a massive ParkMobile app breach in 2021, according to records obtained by a data privacy group. 

The site, known as DogeQuest, first appeared in March and publishes names, home addresses, contact details and other personal information tied to Tesla drivers and DOGE staff. Marketed as a hub for anti-Musk “creative expressions of protest,” the platform has been linked to real-world vandalism and remains live on the dark web. Federal investigations into DogeQuest are already underway, the New York Post first reported.

“If you’re on the hunt for a Tesla to unleash your artistic flair with a spray can, just step outside — no map needed! At DOGEQUEST, we believe in empowering creative expressions of protest that you can execute from the comfort of your own home,” the surface-web DogeQuest site reads. “DOGEQUEST neither endorses nor condemns any actions.”

A screenshot of the DogeQuest surface website captured on April 3, 2025. (Captured by Thomas English/Daily Caller News Foundation)

ObscureIQ, a data privacy group, compiled a breakdown of the data — obtained by the Daily Caller News Foundation — and determined 98.2% of records used to populate the site matched individuals affected by the 2021 ParkMobile breach.

DogeQuest originally appeared as a surface web doxxing hub, encouraging vandalism of Teslas and displaying names, addresses, contact details and, in some cases, employment information for roughly 1,700 individuals. The site used stolen ParkMobile records along with data purchased from brokers, flagging anyone who had a Tesla listed in their vehicle registration profile, according to ObscureIQ’s analysis.

The platform — now operating as “DogeQuest Unleashed” via a .onion dark web address — has also published personal details of high-value targets including senior military officials, federal employees and private sector executives in Silicon Valley. A spreadsheet reviewed by the Daily Caller News Foundation indicates several individuals targeted work areas like cybersecurity, defense contracting, public health and diplomatic policy. DOGE staff and their families appear prominently throughout the data.

A screenshot of DogeQuest's surface website, captured on April 3, 2025. (Captured by Thomas English/Daily Caller News Foundation)

A screenshot of DogeQuest’s surface website, captured on April 3, 2025. (Captured by Thomas English/Daily Caller News Foundation)

No other reporting has yet tied DogeQuest directly to the ParkMobile breach, which impacted over 21 million users in 2021. The company, which facilitates cashless parking across the U.S., quietly disclosed the breach in April of that year, admitting that “basic user information” had been accessed. ObscureIQ’s research shows that exposed data included email addresses, license plate numbers and phone numbers — enough to triangulate identity when paired with commercial data brokers.

The company agreed to a $32 million settlement to resolve a class-action lawsuit stemming from the data breach. The lawsuit alleged that ParkMobile failed to secure its Amazon Web Services cloud storage, allowing access to the data. Although payment data were reportedly not compromised, plaintiffs argued the exposed information still posed serious privacy risks — a claim now reinforced by its use in the DogeQuest doxxing campaign.

Despite federal attention, the site has proven difficult to keep offline, as the dark web mirror incorporates anonymized hosting methods, frustrating law enforcement takedown efforts.

The Department of Justice charged three suspects last week linked to physical attacks on Tesla vehicles, charging stations and dealerships across multiple states, though it has not publicly confirmed any link between those suspects and DogeQuest. Meanwhile, the FBI has acknowledged it is “actively working” on both the doxxing campaign and a parallel rise in swatting incidents affecting DOGE affiliates.

Continue Reading

Trending

X