Connect with us

Crime

Red Deer RCMP recent arrests include two who rammed police vehicles

Published

7 minute read

 Red Deer, Alberta – Red Deer RCMP recent arrests include the arrests of prolific offenders identified through Pinpoint, the Red Deer crime reduction strategy; police located a number of offenders while patrolling targeted crime hot spots, and more arrests came thanks to tips from the public regarding suspicious activity. Two suspects were arrested after ramming police vehicles and fleeing; both were identified by police and arrested later the same day.

 

January 8 – 201835429

Shortly before 10:30 pm on January 8, RCMP responded to a report of a disturbance in the downtown and arrested a suspect who was found to be breaching a number of court-imposed conditions and his probation.

 

28 year old Travis Kowalchuk faces the following charges:

·         Criminal Code 733.1(1) – Fail to comply with probation X 2

·         Criminal Code 145(3) – Fail to comply with conditions X 4

Kowalchuk was remanded to appear in court on January 10 at 9:30 am.

 

January 5 – 201823022

At 10 pm on January 5, RCMP responded to a report of suspicious activity in the Kentwood neighbourhood involving an alleged attempt to break into a vehicle. RCMP attended and arrested one male without incident.

 

29 year old Michael Shimaro-Campbell faces the following charges:

·         Criminal Code 430(4) – Mischief under $5,000

·         Criminal Code 145(3) – Fail to comply with conditions

Shimaro-Campbell was remanded to appear in court in Red Deer on January 8 at 9:30 am; his charges have since been dealt with by the courts.

 

January 5 – 201818591

Shortly before 2 am on January 5, RCMP located a suspect driving a stolen U-Haul and initiated a traffic stop; the driver refused to stop for police and rammed the police vehicle, pushing it aside and fleeing the area. RCMP quickly identified the suspect through the course of their investigation and located him several hours later at a north end hotel, where police arrested him without incident. The U-Haul was recovered by Lacombe Police Service the same morning. The Red Deer RCMP police vehicle sustained minor damage as a result of the ramming but the police officer was not injured in the collision.

 

22 year old Jessie Proulx faces the following charges:

·         Criminal Code 252(1.1) – Fail to stop or remain at scene of accident

·         Criminal Code 249.1(1) – Operate motor vehicle while pursued by police

·         Criminal Code 355(a) – Possession of stolen property over $5,000

·         Criminal Code 259(4) – Drive while prohibited

Proulx was remanded to appear in court in Red Deer on January 8 at 9:30 am. He is scheduled to appear in court again on January 15 at 9:30 am.

 

January 1 – 20184341

RCMP on patrol in a high-crime area at 9 pm on January 1 located a vehicle being driven by a male suspect who was wanted on a number of outstanding warrants out of Blackfalds for possession of a weapon and failing to comply with probation. The suspect was arrested without incident.

 

30 year old Dustin Corey Malone is scheduled to appear in court in Red Deer on January 24 at 9:30 am on his outstanding warrants.

 

December 30 – 20171753172

Shortly before 4 pm on December 30, RCMP responded to a report of a stolen taxi cab, and soon located the taxi as it drove through north Red Deer. Police officers waited until the vehicle was parked and the male driver had exited before moving in to arrest the suspect. RCMP recovered the victim’s identification and credit card and merchandise that had been purchased with it.

 

47 year old Trevor James Larmondin faces the following charges:

·         Criminal Code 355(b) – Possession of stolen property under $5,000 X 3

·         Criminal Code 380(1)(b) – Fraud

Larmondin was remanded to appear in court on January 3 and is scheduled to appear again on January 16 at 9:30 am in Red Deer.

 

December 28 – 20171744064

The afternoon of December 28, RCMP on patrol in a crime hot spot located a station wagon with a stolen license plate driving in the area. The car refused to stop for police when they initiated a traffic stop, and collided at low speed with the police cruiser before driving away. The collision resulted in minimal damage to the police car and no injuries; police did not pursue the vehicle but arrested the suspect, who was known to police, at his residence later the same day.

 

40 year old Michael Cedric Langille faces the following charges:

·         Criminal Code 252 – Fail to stop or remain at scene of accident

·         Criminal Code 249.1(1) – Operate motor vehicle while pursued by police

·         Criminal Code 355(a) – Possession of stolen property over $5,000

·         Criminal Code 145(3) – Fail to comply with conditions

·         TSA 52(1)(a) – Drive without registration

·         TSA 54(1)(a) – Drive without insurance

Langille is scheduled to appear in court in Red Deer on January 12 at 9:30 am.

 

December 28 – 20171742481

Shortly after 1:30 am on December 28, RCMP responded to a report of someone attempting to enter a residence they were no longer permitted in. On arrival, RCMP located a male suspect hiding on the roof of the apartment building; the suspect was arrested without incident and police seized a firearm and ammunition that the suspect was prohibited by court order from possessing. The suspect was further wanted on outstanding warrants for breaching his probation.

 

34 year old Dennis Jay Kunzelman faces the following charges:

·         Criminal Code 90(1) – Carry concealed weapon

·         Criminal Code 91(1) – Unauthorized possession of firearm

·         Criminal Code 117.01(1) – Possession of firearm while prohibited from doing so by reason of order

·         Criminal Code 733.1(1) – Fail to comply with probation

Kunzelman was remanded for court January 2 and makes his next court appearance in Red Deer on January 12 at 9:30 am.

 

December 27 – 20171738912

Shortly after 8 am on December 27, RCMP responded to a report of a break-in at the downtown Servus Credit Union; by 9:30 am, police had the suspect in custody thanks to surveillance images and a report from a citizen about a suspicious male in the downtown. The suspect was located wielding a piece of banister that had been broken off during the bank break-in.

 

47 year old James Jack Smaaslet faces the following charges:

·         Criminal Code 348(1)(a) – Break and enter

·         Criminal Code 430(4) – Mischief under $5,000

Smaaslet was remanded for court January 2 and made his next court appearance in Red Deer on January 10 at 9:30 am.

 

Todayville is a digital media and technology company. We profile unique stories and events in our community. Register and promote your community event for free.

Follow Author

Crime

Red Deer RCMP warn public regarding circulation of counterfeit currency

Published on

News release from Red Deer RCMP

Red Deer RCMP are alerting the public to look out for counterfeit currency.

Red Deer RCMP have received multiple reports of transactions where $50 and $100 counterfeit bills were used or attempted to be used. Anyone in the area who handles currency are alerted to be on the lookout for suspicious bills and should they come into contact with it, report it to police.

The Bank of Canada has the following advice for dealing with counterfeit currency:

  • Politely refuse the note and explain that you suspect that it may be counterfeit.
  • Ask for another note (and check it too).
  • Advise the person to check the note with the local police.
  • Inform your local police of a possible attempt to pass suspected counterfeit money.
  • Be courteous. Remember that the person in possession of the bill could be an innocent victim who does not realize that the note is suspicious.

If you think you have come across counterfeit currency please contact Red Deer RCMP at 403-406-2200. If you wish to remain anonymous, you can contact Crime Stoppers at 1-800-222-8477 (TIPS), online at www.P3Tips.com or by using the “P3 Tips” app available through the Apple App or Google Play Store. To report crime online, or for access to RCMP news and information, download the Alberta RCMP app through Apple or Google Play.

Continue Reading

Business

DOJ charges 7 Chinese spies with targeting US political leaders, major businesses

Published on

From LifeSiteNews

By Matt Lamb

The hackers ‘spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials’ as part of a massive Chinese espionage operation, according to the DOJ.

Hackers targeted defense contractors, American political leaders, and U.S. companies with malware as part of a surveillance operation for the Chinese Communist Party, the Department of Justice (DOJ) alleges.

The DOJ released details on the indictment of seven Chinese individuals who have been charged with “conspiracy to commit computer intrusions and conspiracy to commit wire fraud,” according to a Monday news release.

The individuals are part of a People’s Republic of China (PRC) group who “spent approximately 14 years targeting U.S. and foreign critics, businesses, and political officials in furtherance of the PRC’s economic espionage and foreign intelligence objectives,” according to the DOJ.

Officials unsealed the indictment on Monday, though charges were originally filed in January.

The indictment provides further insight into how the CCP targets American companies and political leaders for retribution and influence using computer viruses.

The CCP and its Ministry of State Security “sought to obtain information on political, economic and security policies that might affect the PRC, along with military, scientific and technical information of value to the PRC,” the indictment states. “Among other things, the MSS and its state security departments focused on surreptitiously identifying and influencing the foreign policy of other countries, including the United States.”

The hackers used a front company called Wuhan XRZ beginning in at least 2010. They would send fake emails to U.S. senators, business leaders, and information technology companies looking to gain access. They were successful in hacking defense contractors, information technology providers, and universities, among other victims.

The DOJ itself was targeted, along the Commerce Department, the Treasury Department, and the White House.

The Justice Department alleges:

These computer network intrusion activities resulted in the confirmed and potential compromise of work and personal email accounts, cloud storage accounts and telephone call records belonging to millions of Americans, including at least some information that could be released in support of malign influence targeting democratic processes and institutions, and economic plans, intellectual property, and trade secrets belonging to American businesses, and contributed to the estimated billions of dollars lost every year as a result of the PRC’s state-sponsored apparatus to transfer U.S. technology to the PRC.

“If the recipient activated the tracking link by opening the email, information about the recipient, including the recipient’s location, IP addresses, network schematics and specific devices used to access the pertinent email accounts, was transmitted to a server controlled by the Conspirators,” the DOJ stated. “The Conspirators used this method to enable more direct and sophisticated targeting of recipients’ home routers and other electronic devices, including those of high ranking U.S. government officials and politicians and election campaign staff from both major U.S. political parties.”

In just a few months in 2018, the hackers “sent more than 10,000 malicious email messages” to “high-ranking U.S. government officials and their advisors, including officials involved in international policy and foreign trade issues.”

They also targeted campaign staff for “a presidential campaign” in 2020. The filing does not state which campaign.

European Union and United Kingdom leaders who were part of the anti-Communist Inter Parliamentary Alliance on China were also targeted.

Other victims included: “a nuclear power engineering company,” a defense contractor, an aerospace contractor, and “a leading American manufacturer of software and computer services based in California.”

Telecommunications companies, law firms, and steel companies were also targeted.

The CCP impersonated real steel companies in order to gain access to their emails during a battle over tariffs on China. After the Trump administration announced new steel tariffs in 2018, the hackers “registered a malicious domain impersonating the legitimate domain of one of the largest steel producers in the United States (the ‘American Steel Company’)” as well as the International Steel Trade Forum.

“These malicious domains allowed the Conspirators to communicate with malware they installed on the network of the American Steel Company to access and surveil the victim,” the DOJ stated.

They also targeted the Norwegian government in 2018 because it was considering awarding the Nobel Prize to Hong Kong democracy activists.

The PRC is a “malicious nation state,” a federal prosecutor stated in the DOJ news release.

“These allegations pull back the curtain on China’s vast illegal hacking operation that targeted sensitive data from U.S. elected and government officials, journalists, and academics; valuable information from American companies; and political dissidents in America and abroad. Their sinister scheme victimized thousands of people and entities across the world, and lasted for well over a decade,”  U.S. Attorney Breon Peace for the Eastern District of New York stated in the news release.

“America’s sovereignty extends to its cyberspace. Today’s charges demonstrate my office’s commitment to upholding and protecting that jurisdiction, and to putting an end to malicious nation state cyber activity.”

Continue Reading

Trending

X