For 20 years, Canada’s agents were trained in an area filled with dangerous contaminants.
According to a recently published CBC investigation, a training facility in Ontario, designed to secretly train Royal Canadian Mounted Police (RCMP) members tasked with spy operations included large amounts of mould, water containing lead levels 14 times higher than permitted, as well as asbestos.
The CBC’s investigation furthermore found that “at least six RCMP members who had trained at the facility and who died prematurely.”
The building was officially closed in 2006 after a hazardous occurrence form filled out by members finally forced a response from Health and Safety.
Worryingly, while closing the location, the RCMP did not inform all members who worked there of possible associated health risks.
Want to help us grow? Here's what you can do!

Manitoba's largest meth bust in history just happened
The RCMP has taken more than 22 kg of meth off Manitoba’s streets, after setting up an extended operation.
The force managed to pull off this feat after arresting two Winnipeg residents for trying to import 40 kg of cocaine into the province, in 2018.
That early arrest led the RCMP to launch Project DECLASS, a full-scale investigation into the network involving multiple organized crime groups operating out of Winnipeg. In Aug 2018, 2 Wpg residents were arrested for trying to import 40kg of cocaine into MB. Working w @DEAHQ & @CanBorder, #rcmpmb launched PROJECT DECLASS, a full scale investigation into a drug trafficking network involving different organized crime groups, operating out of Wpg. pic.twitter.com/EmWm3N6O0x
According to the RCMP, that 16-month investigation has led to the seizure of 22 kg of meth alongside 43kg of cocaine.
PROJECT DECLASS is the largest amount of meth seized in an organized crime investigation in Manitoba history. 22 kg of meth (about 220,000 hits) + 43 kg of cocaine = an estimated street value of $6.5 million. 5 vehicles were also seized, incl a Harley & over $100,000 cash #rcmpmb pic.twitter.com/vh8ib5QZ6I— RCMP Manitoba (@rcmpmb) December 10, 2019
As a part of Project DECLASS, the RCMP executed multiple search warrants on December 4th in Calgary, with the help of over 150 officers. Early on Dec 4, 2019, as part of PROJECT DECLASS, over 150 RCMP officers gathered in Winnipeg & St. Laurent to execute search warrants at 8 different residences, while other #rcmpmb, @RCMPAlberta & @CalgaryPolice executed another search warrant & arrest in Calgary. pic.twitter.com/IcalX2jkLd
The warrants led to the arrest of 11 people, including Hells Angels members. In total, PROJECT DECLASS led to the arrest of 11 people, including a full-patch Hells Angels member, charges incl: Trafficking of meth & cocaine, conspiracy to traffic fentanyl, possession of proceeds of crime, & money laundering. #rcmpmb pic.twitter.com/h23CHEcW37— RCMP Manitoba (@rcmpmb) December 10, 2019
Those arrested will be facing charges of trafficking meth and cocaine, conspiracy to traffic fentanyl, possession of proceeds from a crime, and money laundering.
Want to help us grow? Here's what you can do!

Thousands of cyber victims around the world, say RCMP after Canadian charged in malware investigation
There could be thousands of malware victims in multiple countries say RCMP after they charged software developer and former IT professional John Paul Revesz on Nov. 8 under Section 342.1 of the Criminal Code – a vague hybrid offence for unauthorized use of a computer.
RCMP’s National Division Cybercrime Investigative Team aren’t saying much about Revesz except that they believe he orchestrated an “international malware scheme under the company name ‘Orcus Technologies'” following an investigation that spanned more than three years.
“This case highlights the importance of partnerships with law enforcement agencies and private sector organizations,” said the RCMP in a press release that noted police initiated their investigation in July 2016 “after reports of a significant amount of computers… infected with a ‘Remote Access Trojan’ type of virus.”
RCMP did not respond to The Post Millennial‘s queries, in particular if any additional charges were expected and what took them so long to track down Revesz, after a July 21, 2016 article by former Washington Post reporter Brian Krebs essentially outed the alleged perp.
According to Krebs’ story, he was tipped off by cyber security consultant Daniel Gallagher after a Twitter battle with Revesz, involving other malware researchers on ethics and legalities of peddling an application that gave users the ability to take control of another computer, then coaching clients how to use it.
In what’s left of the Twitter thread – John Paul Revesz’ purported allias Ciriis mcGraw has since deleted his side of the conversation – some humour belies the seriousness of Revesz’ alleged activities.
“Can you give me an example where disabling a user’s webcam light might be acceptable use?” asks Gallager sarcastically in the thread.
Another writes: “As we know all legitimate software vendors sell on hackforums”.

Like others in the security business, Gallagher is not anxious for publicity, at least beyond his Twitter following and like the RCMP, did not respond to TPM‘s queries for this story.
With the cloak-and-dagger, shroud of mystery surrounding this oddball case, TPM reached out to the accused Revesz, who obliged.
In a lengthy Facebook conversation with Revesz, he marks the Twitter debate with Gallager et al. as ground zero for two events: shoring up protocols on Orcus to protect user and client, thereby bolstering the software’s legitimacy, and Krebs for sparking the entire investigation by running to the Federal Bureau of Investigation.
“I can tell you exactly how this started: Twitter argument (with Gallagher et al.), they contact Krebs, who in turn contacted the FBI. The FBI contact the RCMP, and that’s how this all started,” claimed Revesz.
Revesz also said he was just the marketing side of the Orcus application business, based on “software” that was “solely developed” by a business partner Revesz declined to name.
Revesz told TPM that he imagined such an idea while working as a Systems administrator for TD Bank, a job he held more than 10 years ago.
“Orcus was for legal, legitimate Systems administrators to easily access and manage their client computers within their network,” said Revesz.
The Torontonian said he plans to fight the charges and that he doesn’t expect any additional charges, despite the hybrid nature of the criminal code offence.
“It comes down to Legal definition. Was Orcus a Remote Administrative Tool, or a Trojan? And secondly, where is the line drawn from legal software, to malware?” said Revesz who compared Orcus to a brick.
“If I pick up a brick and bludgeon someone with it, who is at fault? The brick maker or me for misusing the brick?”
Krebs, who publishes on his eponymous KrebsOnSecurity.com, told TPM that malware of the sort Revesz peddles is traded in online Hacker forums, and dismissed the claim he went to the FBI.
“Anything you want to know is in my stories… I’m not sure there is more I can say about this guy.”
According to Krebs’ latest story on the charge against Revesz, Australian police executed their search warrants coinciding with RCMP warrant on Revesz, in March of 2019.
“Several former customers of (Revesz) took to Hackforums[.]net to complain about being raided by investigators who are trying to track down individuals suspected of using Orcus to infect computers with malware,” writes Krebs.
“‘I got raided [and] within the first 5 minutes they mention Orcus to me,’ complained one customer.”
In a brief interview with TPM, Krebs said typical Orcus clients are individuals, and as he reported in July of 2016, such applications are being created by those who “think they can get away with writing, selling and supporting malicious software and then couching their commerce as a purely legitimate enterprise.”
The cyber security journalist called Revesz’ brick-argument “pretty weak” and likened Orcus business model to selling lock picks then “supporting thieves who are having trouble using them to steal stuff.”
“I can’t take credit for that, but I thought it was pretty funny,” Krebs said of a description he read on social media.
In the July 5 Twitter thread that Revesz cages as seminal to his current legal woes, Malware Tech, aka Marcus Hitchens, makes a similar argument. I call it pretending to be a legitimate software vendor while assisting users with illegal hacking
And like lock picks, Krebs said Orcus-type malware “isn’t terribly sophisticated in terms of the programming that goes into them, but the functionality of them can be extraordinarily sophisticated.”
“The point is, once you get something like this on a machine, you can control it and do what (the computer owner) can do.”
Other cases involving section 342.1 of the Criminal Code–unauthorized use of computers–indicate its broad application.
Most recently, it formed part of espionage charges against RCMP Cameron Ortis. It’s also been used to prosecute people who use computers or mobile devices to lure children, as well as election tampering cases involving robocalls that provided voters incorrect or deceiving information.
Want to help us grow? Here's what you can do!

Critics of Surrey RCMP slammed by top RCMP officer
The Officer in Charge of the Surrey RCMP Asst. Comm. Dwayne McDonald fired back at people who have criticized RCMP officers in Surrey and the plausibility of a full Surrey Police Force swaying RCMP officers to leave for the force.
During an awards speech at the 23rd Annual Surrey RCMP awards, he called criticisms unfair, and reaffirmed RCMP officers’ ability to fight crime, saying they’ve been doing it for decades and will continue to do so.
“We can’t police a large city? We’ve been doing it since 1951. I would challenge any other large city in this country to police with the resources we do and do a better job,” said McDonald.
“I’m just saying, if you want more boots on the ground, give me more boots.”
McDonald didn’t specify who these critics were, but he openly suggested that government officials and others, who are probably being hyperbolic, should butt out and that their criticism isn’t valid.
“If I have to listen to one more ex-chief of police on life support or some fallen-from-grace former public official with an axe to grind or an uninformed academic call into question the integrity and professionalism and dedication of the men and women of the Surrey RCMP, I am going to snap,” said McDonald, who received great applause for his indignation.
“I’m just saying that some of these people have been put out to pasture for a reason, so let’s not forget it.”
Surrey RCMP have been coming under heavy scrutiny over the last three years due to increased gang activity in the region, reports Global News. Various people of note, specifically, former West Vancouver police chief and solicitor general Kash Heed and Ex-Mountie Chris Backus, have suggested the RCMP are unable to satisfy their duties and that some RCMP may switch the new Surrey Police Force if given the opportunity.
Clearly McDonald thinks that’s all nonsense and that the RCMP are doing the best possible job they can given the circumstances.
Want to help us grow? Here's what you can do!

B.C. manhunt suspects planned to continue killing spree and flee to Europe or Africa by boat: RCMP
The British Columbia RCMP released a summary report of their investigation into the three homicides which took place in northern B.C. in August.
The report details the actions of the two suspects Kam McLeod and Bryar Schmegelsky before they eventually took their own lives in the dense bush of Manitoba. McLeod and Schmegelsky are believed to be responsible for the deaths of Lucas Robertson Fowler, Chynna Noel Deese and Leonard Dyck.

“Based on the autopsy findings, the firearms lab report, analysis of the scene and the content of the videos it is believed that McLeod shot Schmegelsky before shooting himself in a suicide pact,” claims the report.
During their press release earlier today, the RCMP announced that they would not be releasing the six videos and three images discovered on their cellular devices out of fear of inspiring copy cats.


“[The RCMP Behavioural Analysis Unit] believed that McLeod and Schmegelsky may have made the video recordings for notoriety and releasing them will be seen as an injustice to the victims and their families,” reads the report.
“In an effort to not sensationalize the actions of McLeod and Schmegelsky and to mitigate the potential of other individuals being inspired by McLeod and Schmegelsky to commit similar acts of violence, the videos will not be released to the public by the RCMP.”
In the videos both McLeod and Schmegelsky repeatedly take responsibility for the three murders and show no remorse for their actions. Their apparent plan was to continue killing more innocent people before hijacking a boat in the Hudson Bay and fleeing to Europe or Africa. They are also alleged to have discussed killing themselves.

The RCMP have also concluded that no clear motive could be declared in the murders but that the victims were picked opportunistically.
Other new information highlighted by the report includes the weapons used by the suspects. The guns, which were bought legally were two SKS rifles.


Furthermore, while on the Alaska Highway, another witness is alleged to have been approached by a man with a rifle before fleeing past a vehicle that matched the description of the suspects.
The pair were also stopped by a constable who failed to recognize them before letting them go in Split Lake, Manitoba.
Social Media