Connect with us
[the_ad id="89560"]

Crime

Woman charged after lengthy series of B&Es into seniors’ residences

Published

2 minute read

June 13, 2019

Downtown Division Special Projects Team has charged a woman in connection with a series of break and enters into seniors’ assisted living residences since October 2018.

Between October 2018 and May 2019, a total of 22 break and enter incidents targeting seniors’ living residences in Downtown Division, committed by a lone female suspect.  

During all the offences the suspect entered the residence unnoticed and would walk from floor to floor looking for unlocked suite doors to enter and would then proceed to steal valuables.

“The vast majority of the incidents occurred while residents were inside their suites,” says Const. Justin Miller, of Downtown Special Projects Team. “On one occasion a male complainant tried to physically prevent the accused from leaving his suite, knowing that she just stole from him, but the accused got away.  It’s fortunate he was unhurt.”

In another incident, the suspect was found inside the suite by the complainant and reportedly solicited a sexual act to distract him while she allegedly stole his wallet. In other instances, the suspect offered to help a complainant with her groceries, or posed as a new housekeeper.

Investigators were able to identify the suspect on May 9, 2019 and made an arrest on May 15, 2019.

Cynthia Verna Louise Hamelin, 48, has been charged with housebreaking and commit theft (x8), housebreaking with intent, theft of motor vehicle, theft under $5,000, housebreaking and commit threats, fraud under $5,000 (property), use of a stolen credit card, and possess stolen property under $5,000.

“The harsh reality is that seniors are being treated as easy targets,” says Const. Miller.  “Through my investigation I learned that the majority of the tenants left their suite doors unlocked, allowing for easy access. We want to remind residents to protect themselves by keeping their rooms secured and doors locked at all times.”

Additional charges are pending against the accused from another seven break-and-enter incidents. Investigators also believe there could be more complainants and are encouraging them to come forward by calling EPS at 780-423-4567.

Before Post

Todayville is an independently-owned digital media company. We specialize in helping community groups, local businesses and organizations tell their story. Our team has years of media and video production experience. Talk to us about advertising, brand journalism stories, opinion pieces, event promotion, or other ideas you have to make our product better. We also own and operate Todayville Red Deer and Todayville Calgary.

Follow Author

Business

Canadian Police Raid Sophisticated Vancouver Fentanyl Labs, But Insist Millions of Pills Not Destined for U.S.

Published on

Sam Cooper

Mounties say labs outfitted with high-grade chemistry equipment and a trained chemist reveal transnational crime groups are advancing in technical sophistication and drug production capacity

Amid a growing trade war between Washington and Beijing, Canada—targeted alongside Mexico and China for special tariffs related to Chinese fentanyl supply chains—has dismantled a sophisticated network of fentanyl labs across British Columbia and arrested an academic lab chemist, the RCMP said Thursday.

At a press conference in Vancouver, senior investigators stood behind seized lab equipment and fentanyl supplies, telling reporters the operation had prevented millions of potentially lethal pills from reaching the streets.

“This interdiction has prevented several million potentially lethal doses of fentanyl from being produced and distributed across Canada,” said Cpl. Arash Seyed. But the presence of commercial-grade laboratory equipment at each of the sites—paired with the arrest of a suspect believed to have formal training in chemistry—signals an evolution in the capabilities of organized crime networks, with “progressively enhanced scientific and technical expertise among transnational organized crime groups involved in the production and distribution of illicit drugs,” Seyed added.

This investigation is ongoing, while the seized drugs, precursor chemicals, and other evidence continue to be processed, police said.

Recent Canadian data confirms the country has become an exporter of fentanyl, and experts identify British Columbia as the epicenter of clandestine labs supplied by Chinese precursors and linked to Mexican cartel distributors upstream.

In a statement that appears politically responsive to the evolving Trump trade threats, Assistant Commissioner David Teboul said, “There continues to be no evidence, in this case and others, that these labs are producing fentanyl for exportation into the United States.”

In late March, during coordinated raids across the suburban municipalities of Pitt Meadows, Mission, Aldergrove, Langley, and Richmond, investigators took down three clandestine fentanyl production sites.

The labs were described by the RCMP as “equipped with specialized chemical processing equipment often found in academic and professional research facilities.” Photos released by authorities show stainless steel reaction vessels, industrial filters, and what appear to be commercial-scale tablet presses and drying trays—pointing to mass production capabilities.

The takedown comes as Canada finds itself in the crosshairs of intensifying geopolitical tension.

Fentanyl remains the leading cause of drug-related deaths in Canada, with toxic supply chains increasingly linked to hybrid transnational networks involving Chinese chemical brokers and domestic Canadian producers.

RCMP said the sprawling B.C. lab probe was launched in the summer of 2023, with teams initiating an investigation into the importation of unregulated chemicals and commercial laboratory equipment that could be used for synthesizing illicit drugs including fentanyl, MDMA, and GHB.

The Bureau is a reader-supported publication.

To receive new posts and support my work, consider becoming a free or paid subscriber.

Invite your friends and earn rewards

If you enjoy The Bureau, share it with your friends and earn rewards when they subscribe.

Invite Friends

Continue Reading

Automotive

Dark Web Tesla Doxxers Used Widely-Popular Parking App Data To Find Targets, Analysis Shows

Published on

 

From the Daily Caller News Foundation

By Thomas English

A dark web doxxing website targeting Tesla owners and allies of Elon Musk appears to be compiled from hacked data originally stolen from a massive ParkMobile app breach in 2021, according to records obtained by a data privacy group. 

The site, known as DogeQuest, first appeared in March and publishes names, home addresses, contact details and other personal information tied to Tesla drivers and DOGE staff. Marketed as a hub for anti-Musk “creative expressions of protest,” the platform has been linked to real-world vandalism and remains live on the dark web. Federal investigations into DogeQuest are already underway, the New York Post first reported.

“If you’re on the hunt for a Tesla to unleash your artistic flair with a spray can, just step outside — no map needed! At DOGEQUEST, we believe in empowering creative expressions of protest that you can execute from the comfort of your own home,” the surface-web DogeQuest site reads. “DOGEQUEST neither endorses nor condemns any actions.”

A screenshot of the DogeQuest surface website captured on April 3, 2025. (Captured by Thomas English/Daily Caller News Foundation)

ObscureIQ, a data privacy group, compiled a breakdown of the data — obtained by the Daily Caller News Foundation — and determined 98.2% of records used to populate the site matched individuals affected by the 2021 ParkMobile breach.

DogeQuest originally appeared as a surface web doxxing hub, encouraging vandalism of Teslas and displaying names, addresses, contact details and, in some cases, employment information for roughly 1,700 individuals. The site used stolen ParkMobile records along with data purchased from brokers, flagging anyone who had a Tesla listed in their vehicle registration profile, according to ObscureIQ’s analysis.

The platform — now operating as “DogeQuest Unleashed” via a .onion dark web address — has also published personal details of high-value targets including senior military officials, federal employees and private sector executives in Silicon Valley. A spreadsheet reviewed by the Daily Caller News Foundation indicates several individuals targeted work areas like cybersecurity, defense contracting, public health and diplomatic policy. DOGE staff and their families appear prominently throughout the data.

A screenshot of DogeQuest's surface website, captured on April 3, 2025. (Captured by Thomas English/Daily Caller News Foundation)

A screenshot of DogeQuest’s surface website, captured on April 3, 2025. (Captured by Thomas English/Daily Caller News Foundation)

No other reporting has yet tied DogeQuest directly to the ParkMobile breach, which impacted over 21 million users in 2021. The company, which facilitates cashless parking across the U.S., quietly disclosed the breach in April of that year, admitting that “basic user information” had been accessed. ObscureIQ’s research shows that exposed data included email addresses, license plate numbers and phone numbers — enough to triangulate identity when paired with commercial data brokers.

The company agreed to a $32 million settlement to resolve a class-action lawsuit stemming from the data breach. The lawsuit alleged that ParkMobile failed to secure its Amazon Web Services cloud storage, allowing access to the data. Although payment data were reportedly not compromised, plaintiffs argued the exposed information still posed serious privacy risks — a claim now reinforced by its use in the DogeQuest doxxing campaign.

Despite federal attention, the site has proven difficult to keep offline, as the dark web mirror incorporates anonymized hosting methods, frustrating law enforcement takedown efforts.

The Department of Justice charged three suspects last week linked to physical attacks on Tesla vehicles, charging stations and dealerships across multiple states, though it has not publicly confirmed any link between those suspects and DogeQuest. Meanwhile, the FBI has acknowledged it is “actively working” on both the doxxing campaign and a parallel rise in swatting incidents affecting DOGE affiliates.

Continue Reading

Trending

X