True Crime Reporter® Podcast

  • About
  • Crime Stories
  • Subscribe
  • News
  • Contact
You are here: Home / Shows / Why & How Women Murder – Love Triangles and Hiring Hitmen

December 20, 2022 By Robert Riggs Leave a Comment

Why & How Women Murder – Love Triangles and Hiring Hitmen

Podcast: Play in new window | Download (Duration: 35:31 — 48.9MB)

What goes on inside the minds of women who commit murder and other crimes?

In my previous episode on December 13, 2022, titled A Mother’s Pursuit of Justice: The Contract Murder of Dan Markel, I reported that three women are the focus of an eight-year-long murder investigation.

Markel, a distinguished law professor at Florida State University was gunned down by hitmen at his Tallahassee home in 2014.

Katherine Maguahua (phonetic pronunciation: MAC-BANA-WAH) was the go-between for the contract killing. 

In November of 2022, evidence from an FBI sting helped convict Maguahua. 

She received a life sentence plus 60 years for hiring her ex-boyfriend, the father of her children, to execute Dan Markel. Allegedly so his ex-wife could move the couple’s two sons to South Florida. 

The ex-wife, 35- year old Wendi Adelson, a fellow law professor, and her mother, Donna Adelson, have been named as unindicted conspirators in the alleged plot. 

According to criminal trial testimony, Katherine Maguahua hired the hitmen at the request of Wendi Adelson’s brother Charlie Adelson. She was a girlfriend and dental assistant in his office. Charlie Adelson has been charged with the murder and is expected to stand trial in 2023.

But back to Katherine Maguahua, was it for love or money?

I reached out to Meghan Sacks, a criminologist with a Ph.D. who teaches classes on Women and Crime at Fairleigh Dickinson University in New Jersey to explore this true crime subject. 

Sacks is also the co-host of the Women and Crime podcast.

We discuss possible motivations in the Austin cyclist murder case that I covered on July 11, 2022, A Love Triangle Ends In An Alleged Murderous Fit Of Jealous Rage.

You will also hear me discuss interviewing female inmates at Texas prison units.


Archive News Report About Female Inmates Con Games


FOLLOW the True Crime Reporter® Podcast 

SIGN UP FOR my True Crime Newsletter

THANK YOU FOR THE FIVE-STAR REVIEWS ON APPLE Please leave one – it really helps.

TELL ME about a STORY OR SUBJECT  that you want to hear more about

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Subscribe to Podcast

Apple PodcastsSpotifyAndroidPodcast IndexRSSMore Subscribe Options

Real Crime Lessons From Those Who Lived It

Search

Recent Blog Post

One Million Dollar Reward Posted In Cold Case Murder Mystery

Widow of Slain Tennessee Autobody Shop Owner Offers Record Reward To Break The Silence By Robert Riggs A billboard towers above a pasture fence in rural Tennessee, its message blunt and … Continue Reading

Recent Episodes

Widow Offers One Million Dollars To Crack Cold Case Murder Mystery

The Rock: Alcatraz’s Chilling True Crime Legacy

The Click That Opens The Door To Cyber Hell

Search

Copyright © 2025 True Crime Reporter

Sitemap · Privacy Policy · Terms & Conditions · Disclaimer · Cookies Policy

Manage Cookie Consent
We use cookies to optimize our website and our service.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Preferences
{title} {title} {title}