Man sentenced to life for murdering wife in Southern New Mexico desert
EL PASO, Texas (KTSM) — A 57-year-old Louisiana man, described by prosecutors as a career criminal, was found guilty of killing his wife and tampering with evidence by an Otero County jury on Friday, May 23, the 12th Judicial District Attorney's Office (Alamogordo) announced on Sunday night.
Shaun Castain LeFleur, 57, of Louisiana, was found guilty in his wife Nancy LeFleur's murder and was sentenced to life in prison, the DA's Office said.
He will be nearly 90 years old before he is eligible for parole, the DA's Office said.
LeFleur and his wife came to Otero County in late 2023. Shaun LeFleur was living on the run and forcing his wife to come along with him, the DA's Office said.
After beating his wife in late 2023, LeFleur was convicted in the Otero County Magistrate Court of battery against a household member, the DA's Office said.
At the time of the conviction, LeFleur had already murdered his wife and buried her in a shallow grave in the desert just north of Oliver Lee State Park, outside of Alamogordo.
About two months after Nancy LeFleur's murder, a citizen came forward and told authorities that Shaun LeFleur had murdered his wife and buried her in the desert, the DA's Office said.
The New Mexico State Police were called in and led the investigation. Shortly after, Nancy LeFleur's body was discovered buried in a shallow grave approximately 1 mile north of Oliver Lee State Park.
The site of the burial was just mere feet from a spot where LeFleur had previously been seen camped at, the DA's Office said.
The ensuing investigation revealed that Shaun LeFleur and his wife Nancy had been camped near the dispersed camping area outside of the state park south of Alamogordo. From there, Shaun LeFleur moved his camp north into the desert area well away from other people.
Shaun LeFleur then began searching the Internet for local places where he could purchase a gun and potential places in Mexico where he could flee to, according to the DA's Office.
Then, late one night in February 2024, he forced his wife out of their tent and onto her knees. LeFleur then murdered her in an execution-style shooting, the DA's Office said.
He wrapped her body in a tarp and buried her before fleeing to Texas, the DA's Office said.
A month later, LeFleur returned to the scene of the murder and set up camp in an effort to discourage people from stumbling upon the body.
The investigation spanned multiple states and multiple search warrants were executed. In April of 2024, LeFleur was arrested by the New Mexico State Police while parked alongside the Sunspot highway just outside of Cloudcroft.
The case was investigated by the New Mexico State Police and prosecuted by District Attorney Ryan Suggs along with Chief Deputy District Attorney Michael Tighe and Assistant District Attorney Taylor Weary.
Suggs said after the trial: 'This was an extremely tough case to piece together. I'm extremely proud of my team of prosecutors and staff who worked tirelessly alongside me for the duration of this case. I'm thankful that we were able to bring LeFleur to justice and give the family the closure that they deserved.'
Copyright 2025 Nexstar Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


CBS News
14 hours ago
- CBS News
16 billion login credentials from Google and other sites leaked online, report says
Sixteen billion login credentials have been leaked and compiled into datasets online, giving criminals "unprecedented access" to accounts consumers use each day, according to researchers at cybersecurity outlet Cybernews. According to a report published this week, Cybernews researchers have recently discovered 30 exposed datasets that each contain a vast amount of login information — amounting to a total of 16 billion compromised credentials. That includes user passwords for a range of popular platforms including Google, Facebook and Apple. Because 16 billion is roughly double the amount of people on Earth today, the number signals that impacted consumers may have had credentials for more than one account leaked. Cybernews notes that there are most certainly duplicates in the data and so "it's impossible to tell how many people or accounts were actually exposed." It's also important to note that the leaked login information doesn't stem from a single source, such as one breach targeting a company. Instead, it appears that the data was stolen through multiple events over time, and then compiled and briefly exposed publicly, which is when Cybernews reports that its researchers discovered it. Various so-called "infostealers" are most likely the culprit, Cybernews noted. Infostealers are a form of malicious software that breaches a victim's device or systems to take sensitive information. The report comes amid a recent wave of cybersecurity attacks, which have grown more advanced in recent years. Two insurers, Erie Insurance and Philadelphia Insurance Companies, announced that their networks were hacked earlier this month. On Friday, Aflac said hackers gained access to its customers' personal information in a cybersecurity attack last week. Experts worry the situation may only get worse, CBS News' 60 Minutes recently reported. Experts call for "cyber hygiene" Many questions remain about these leaked credentials, including whose hands the login credentials are in now. But, as data breaches become more and more common in today's world, experts continue to stress the importance of maintaining key "cyber hygiene." If you're worried about your account data potentially being exposed in a recent breach, the first thing you can do is change your password — and avoid using the same or similar login credentials on multiple sites. If you find it too hard to memorize all your different passwords, consider a password manager or passkey. And also add multifactor authentication, which can serve as a second layer of verification through your phone, email or USB authenticator key.


Boston Globe
2 days ago
- Boston Globe
After Karen Read was acquitted of killing her boyfriend, a look at the key evidence presented in her successful defense
But her lawyers said Here's a look at several key issues that may have cast doubt about the government's case in the eyes of jurors. Advertisement Brian Higgins's texts, video footage, statements Brian Higgins testifies during the trial of Karen Read on May 24, 2024. Charles Krupa/Associated Press Throughout the retrial, Read's lawyers focused on ATF agent Brian Higgins, who attended the afterparty at the Canton home and was a key figure in the first trial. He did not testify at the retrial, but Read's defense team questioned other witnesses in an effort to show he may have had a motive to harm O'Keefe. Jurors saw Advertisement The jury also learned that State Police never directly searched Higgins's phone; instead, he provided the text messages himself to investigators, according to State Police Sgt. Yuri Bukhenik, who testified that he felt the texts showed Read was pursuing Higgins romantically. Jurors also viewed surveillance footage from the Waterfall, the second bar the group went to before the afterparty, where O'Keefe kisses Read on the forehead in view of Higgins, who's later seen gesturing aggressively towards O'Keefe as Albert's brother grabs his forearm to restrain him. Jurors also viewed In that footage, Higgins is seen briefly ducking into dispatch and then exiting the station on his phone before he retrieves an empty duffel bag from another vehicle in the parking lot. He also retrieves a garden hoe from another area of the lot. (Higgins testified at the first trial that he went to the police station to move cars due to the snowstorm.) Read attorney Alan Jackson also Higggins also testified during the first trial that he disposed of his phone a few months after O'Keefe's death on a Cape Cod military base after a target of one of his ATF probes called him and said his girlfriend had gotten the number off the Internet. Advertisement Jennifer McCabe's Google search, statements, texts Jennifer McCabe continues her cross-examination testimony during the Karen Read murder trial in Norfolk Superior Court on April 30, 2025. Greg Derr/Associated Press Jennifer McCabe, Brian Albert's sister-in-law, But on cross-examination, she was confronted with a Google search on her phone timestamped 2:27 a.m., five minutes after the alleged butt dials between Higgins and Brian Albert, that said 'hos [sic] long to die in cold.' McCabe testified that she actually made that search hours later at the crime scene at Read's request, and government forensic experts The government experts also said the deletion of the search appeared to have been done automatically, rather than manually by the user. The defense also pressed McCabe about her initial evasiveness when the FBI first approached her outside her home to discuss the case in April 2023. The jurors were told only that the agents were from an unspecified law enforcement agency, as they were barred from knowing the Justice Department had convened a separate federal grand jury investigation into the state authorities' handling of O'Keefe's death. Advertisement The authorities later called her when she was in her house and identified themselves as law enforcement, she said. McCabe said she told the investigators she would speak with them but she needed about 10 minutes to get ready. Jackson asked McCabe if she suspended that interview at one point because she didn't feel comfortable, and she said, 'correct.' She said she had also called her husband who returned home, and that she had also called Roberts before the interview began. Omissions in the investigation Jurors learned that authorities, while they questioned some witnesses inside the Canton home on the morning of O'Keefe's death, never conducted a search of the premises. In addition, jurors were told that investigators never reviewed Ring video footage from the front porch of a Canton police official who lived diagonally across the street from Brian Albert. Paul Gallagher, a retired Canton police lieutenant, O'Keefe's injuries Dr. Irini Scordi-Bello, the medical examiner who conducted the autopsy on John O'Keefe, testifies during the trial of Karen Read on May 15, 2025. Mark Stockwell/AP, Pool Dr. Irini Scordi-Bello, the state medical examiner who conducted O'Keefe's autopsy, Scordi-Bello also testified, however, that O'Keefe's manner of death was undetermined, and that she 'did examine his legs and I did not see any evidence of an impact site.' O'Keefe had also sustained a number of linear scratches on his right arm, and a defense expert, Dr. Marie Russell, a veteran emergency room physician in Los Angeles and former Malden police officer, Advertisement A government expert testified that the scratches were consistent with O'Keefe's arm being caught in Read's shattered taillight. But the defense also called another expert, Dr. Elizabeth Laposata, the former chief medical examiner in Rhode Island, who The ARCCA witnesses Expert Daniel Wolfe returns to the stand in the murder retrial of Karen Read in Norfolk Superior Court, Monday June 9, 2025, in Dedham, Mass. (Pat Greenhouse/The Boston Globe via AP, Pool) Pat Greenhouse/Associated Press The defense also called two analysts from the Philadelphia-based crash reconstruction firm ARCCA, who Government experts contradicted that assessment, but the word of the ARCCA analysts, who were initially hired by the Justice Department as part of the federal probe and later retained by the defense, evidently carried weight with jurors. The defense also repeatedly mocked a so-called paint In his closing argument, Jackson likened the 'ridiculous blue paint' test to a 'kindergarten project.' Allegations of vehicle tampering, planting evidence, firing of lead investigato Law enforcement witnesses also testified to recovering a number of taillight shards and a broken drinking glass at the crime scene near O'Keefe's body, Advertisement But jurors learned that many of the pieces on the lawn were discovered days after the initial snowy search, including Jackson asked Bukhenik if he had asked Berkowitz, 'No,' Bukhenik said repeatedly. Canton police quickly recused themselves from the investigation because a detective on the force is Brian Albert's brother. Jurors were also told The jury learned Proctor was Dever Dever, speaking in a deliberate tone, testified that the defense later produced a timeline showing the SUV was brought into the garage after her shift ended that day, 'meaning it is not possible that I saw that.' Dever said it was a 'false memory' that she 'provided in good faith,' which she then 'retracted immediately [upon] being provided evidence that it was not possible.' She also testified that Boston police Commissioner Michael Cox, her boss at her current department, had called her into his office for a one-on-one discussion before her testimony at the retrial. Jackson asked if Cox told her to 'do the right thing,' and Dever said she couldn't recall the direct quote. 'He said nothing with the intent of guiding me one way or the other,' Dever said, adding that Cox 'wanted me to tell the truth up here.' Dever also testified that she must be truthful, adding that 'my entire job revolves around what I say on the stand right now.' Jackson pointedly reminded jurors of that statement at closing, adding, 'you bet it does.' Dighton police officer Nicholas Barros's testimony Jurors also State Police seized the SUV after interviewing Read inside the residence, and Barros told the jury the taillight damage was more severe in a photo of the vehicle inside the Canton police garage than when he saw it in Dighton. 'That taillight is completely smashed out' in the Canton photo, Barros said. 'That middle section was intact when I was there' in Dighton. Prosecutor Hank Brennan highlighted that Barros had testified differently during the first trial. But the officer was adamant. 'I know what I saw,' Barros said. 'And that wasn't it.' Travis Andersen can be reached at


Forbes
2 days ago
- Forbes
You Must Never Call These Numbers On Your Smartphone
Do not call any of these numbers. We are now being repeatedly warned that legitimate infrastructure is being hijacked by attackers. This includes spoofed Google support addresses, Gmail passwords and even federal agency phone numbers. Now there's another such attack to beware. Malwarebytes warns that scammers are crafting malicious search engine results that link to legitimate sites — such as Netflix or Microsoft, but then open a webpage that includes a search box with a dangerous phone number inserted. The team says this could be called 'a search parameter injection attack, because the scammer has crafted a malicious URL that embeds their own fake phone number into the genuine site's legitimate search functionality.' If you call the number, the handler will pretend to represent the brand you called from, 'with the aim of getting their victim to hand over personal data or card details, or even allow remote access to their computer.' If that brand is a financial firm such as PayPal or Bank Of America, scammers will try to empty accounts. Malicious phone numbers on real website Malwarebytes says users should watch for these red flags: This follows another warning this week from Netcraft, that threat actors are 'exploiting [search engine] While Netcraft says SEO poisoning usually 'promotes malicious or fraudulent websites by exploiting the ranking systems of platforms like Google,' in these injection attacks the websites are real, making it much harder for users to immediately detect the threat. The phone numbers can even appear in the search engine results themselves. What's interesting is there has been so much focus from Google, the FBI and others on not responding to proactive technical or account support calls, that this puts the onus back on users, following official advice to find numbers for themselves before contacting any support desk. But adhere to those red flags and you'll be fine.