Murder-accused Julia DeLuney quizzed on blood spread around crime scene
Photo:
RNZ / Mark Papalii
Murder-accused Julia DeLuney's second video interview with police has been played to the court, with a detective questioning how so much blood was spread around the house.
DeLuney is on trial at the High Court in Wellington for the murder of 79-year-old mother Helen Gregory on 24 January last year, a charge she denies.
On Friday, the jury watched her second video interview, recorded at the Porirua police station on 27 January, 2024, three days after her mother's death.
During the interview, she told Detective Olivia Meares, who was conducting the interview, she might have put the bloody smears on the wall in the hallway and around the attic herself.
"I was trying to get it off me," she said. "There was a lot of it ... it looked like coagulated.
"Look, it just gave me ... it freaked me out, so I was just trying to get it off."
Meares asked her to explain further, saying, "There's a few things that aren't making sense to me".
The Crown's case is that DeLuney attacked her mother and staged it to look like a fall, but the defence says, in the 90-minute window when she went to get help after the fall, someone else caused fatal injuries to her elderly mother.
During this second interview, Meares asked DeLuney: "From what you've described to me, I'm struggling to understand how there is all this blood on the top of the ladder."
"I think that's my blood, I mean, mum's blood on me," DeLuney said. "I was trying to get it off." .
"Julia, that doesn't make sense," Meares said, questioning why she would go up into the attic to do that.
"I don't know what I was doing," DeLuney said.
"You've got to get over all this stuff [she gestures to a picture of the cupboard's contents strewn on the floor] and then climb up," Meares said. "It's not making sense."
DeLuney did not offer an explanation to this point.
When pressed for more detail about what had happened immediately after the fall, DeLuney explained her mother was struggling and trying to get up, so she had straddled her to try and keep her still.
Meares asked: "Julia, did you get angry at your mum when that was happening?"
"I didn't get angry. I was getting scared, I didn't get angry."
DeLuney explained she panicked she would be in trouble for letting her mother go up into the roof.
Meares told DeLuney that, according to the pathologist, her mother's injuries - "multiple blunt force trauma to the back of her head" - were not consistent with a fall.
"Can you tell me how that happened?"
"No, I can't," DeLuney replied. "I think we should stop now, I think I need a lawyer.
"I didn't hit my mum, I didn't hurt her at all, I was trying to help her."
The interview ended at 10.01pm.
The trial continues, with the defence expected to call its first witnesses next week.
Sign up for Ngā Pitopito Kōrero
,
a daily newsletter curated by our editors and delivered straight to your inbox every weekday.

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles

RNZ News
9 hours ago
- RNZ News
Supermarket loyalty card cyberattack prompts password warning
New World says some customer accounts may have been accessed in the cyberattack. Photo: Google Maps A cybersecurity attack has prompted a warning for supermarket customers to change their passwords and some accounts may have been accessed by outsiders. Members of supermarket loyalty and online shopping programme New World Clubcard received an email on Friday night, telling them scammers had attempted to gain access to accounts by trying commonly used passwords. A "recent" cybersecurity incident had affected "a number of New World Clubcard accounts", the email said. "Our technology team has identified suspicious external activity where scammers have attempted to gain access to accounts by trying commonly used passwords across many usernames," the supermarket said. "Based on our investigation, it appears that some New World Clubcard accounts with weaker or reused passwords may have been accessed, without the cardholder's authorisation." Photo: Supplied Most customers were told their account had not been affected, but the supermarket advised them to change their passwords to be safe. In the email, New World said its own systems had not been breached and its technology team was monitoring for "any further malicious activity". The supermarket retailer, which is owned by parent company Foodstuffs, said it was working with cybersecurity experts to ensure customers' data remained secure. "We sincerely apologise for any inconvenience. Your privacy and security are extremely important to us, we have taken these actions to protect you, and strongly recommend you [establish] a refreshed and strong password." Foodstuffs did not respond to RNZ's requests for comment. Sign up for Ngā Pitopito Kōrero, a daily newsletter curated by our editors and delivered straight to your inbox every weekday.

RNZ News
14 hours ago
- RNZ News
Home build dream shattered after Waikato business hacked and woman launders couple's $150k
By Belinda Feek, Open Justice reporter of Sophie Winchester-Krishan outside the Hamilton District Court after being sentenced on three charges of money laundering. Photo: NZME / Open Justice / Belinda Feek A woman's bank account went from a balance of 5c to almost $150,000 overnight - but it was not her money. Instead, it was the money of a couple who were in the process of building their dream home and had fallen prey to hackers. Sophie Mareta Moerangi Winchester-Krishan was the middleman in the scam, where her bank account was used to deposit the funds and she then transferred them to offshore accounts. The 66-year-old, who was charged with three counts of money-laundering as a result, was paid $5000 for her role in the scam. She was recently sentenced in Hamilton District Court, where the couple spoke of their building dream being shattered and how they had been left with "a lifetime of loss and heartache". It wasn't made clear in court exactly how Winchester-Krishan and the scammers first connected. Her defence lawyer argued Winchester-Krishan had been so keen to get back into work that she ignored what might have been red flags. Those red flags included queries by Kiwibank about the suspicious transactions and her account being briefly frozen. Despite this, she assured the bank that the transactions were legitimate. Now, the case has earned caution from Netsafe, which warned it was difficult to recover money in these events and urged people to be sceptical when being told a company's invoice details had changed. The court heard that in August 2021, the email account of a Waikato-based building firm was hacked. The hackers were able to access the company's client database and then created an email with a similar domain name. They then sent the couple an email stating the company was having difficulty with its regular bank and asked them to direct their next payment into a Kiwibank account. The victims later discovered the account belonged to Winchester-Krishan and, before the transfer, it had a balance of 5c. The money was transferred over two days. One payment was $100,000 - the ASB Bank's daily transfer limit - followed by a second transfer of $54,263.01. By the morning of 16 August 2021, the full amount had made its way into Winchester-Krishan's account. She then sent some of the funds to an account in Australia, after receiving payment instructions from an "almost certainly fictitious overseas doctor", the court heard. Kiwibank then contacted her to alert her to a "suspicious transaction" and froze her bank account. Winchester-Krishan later told Kiwibank the transaction was genuine and the money was released. She then transferred almost $30,000 to an account in the US. Kiwibank contacted her about the suspicious account and, again, Winchester-Krishan confirmed it was genuine. Later that same day, she transferred $66,280.77 to a different US bank account. Over two days, Winchester-Krishan transferred just under $150,000 of the couple's money into offshore bank accounts. She kept $5000 as payment. In a statement to the court, the woman said she and her husband bought a piece of land to build their dream home in September 2020. Filled with excitement, they visited the section with their newborn baby in July 2021, after the concrete had been poured. A month later, she received the fake email from the "building company", asking for the $154,263.01 instalment. She duly paid it into what she was told was the company's Kiwibank account. Shortly afterwards, she was informed that the company's computer system had been hacked and their money was gone. "In a matter of seconds, our whole world changed," she told the court. She said their plan to build their dream home had been shattered. Their excitement turned to stress and worry, which was compounded by the fact that she had worked in IT for 17 years. She was left asking herself, "How could I let this happen to us?" The woman said she was so stressed that she was no longer able to produce milk to breastfeed her daughter. "The opportunity to bond [with her] was taken away from me," she said. The woman then developed a chronic illness that she would never fully recover from. She and her husband ended up having to walk away from the building project. "It's hard to believe all this happened for the offender to gain $5000, and it has left us with a lifetime of loss and heartache." Crown solicitor James Lewis characterised Winchester-Krishan's offending as "a sequence of reckless acts carried out by the defendant for financial gain". "The devastating impacts on the victim and their family include life-altering consequences," Lewis said. "The defendant should have heard and seen the alarm bells. "She was being asked to transfer large sums of money to offshore accounts by people she hardly knew. "She was being questioned by the bank about their concerns... but nevertheless, it still happened." He urged the judge not to issue any discount for Winchester-Krishan's previous good character, given her previous dishonesty convictions, and pushed for a jail term or at least home detention. Defence counsel Martin Dillon said his client's remorse was genuine. While she had defended the charge at trial, he said she had only wanted to challenge whether she was reckless in transferring the money overseas. Sophie Winchester-Krishan transferred the couple's money to a number of offshore accounts in August 2021. Photo: NZME / Open Justice / Belinda Feek "She accepts that she was essentially blinded by the opportunity of an online job being given to her," Dillon said. "She did close her mind or eyes to what might have been red flags... she was not motivated by financial gain... but instead of getting back into the workforce and working again, albeit remotely from home." He suggested Winchester-Krishan moved the money within 24 hours, but Judge Arthur Tompkins disagreed. "That's not quite right," the judge said. "The money arrived and then there were about three days' worth of interactions with the bank. "This is not money-laundering where money arrives and it's flicked on immediately. "Winchester-Krishan had to visit the bank in person and then field inquiries from the bank as to the suspicious transaction, which she confirmed was a genuine payment." The judge said the transaction was clearly suspicious, as it was for a "fictitious orphanage in Turkey" with a different "tale" about where the money was going. Dillon also submitted that Winchester-Krishan had co-operated with police in their investigation and was assessed as a low risk of re-offending. He suggested that an end sentence of community detention and supervision was appropriate. Judge Tompkins said, while Winchester-Krishan's offending was not premeditated, she made "minimal" inquiries about where the money had come from, when it landed in her account. "Particularly, when the bank alerted her to suspicious transactions, she took some trouble to satisfy the bank that the transactions she sought to make were not suspicious." After considering all of the submissions, Judge Tompkins found that home detention was the most appropriate sentence and imposed a term of 10 months. Winchester-Krishan has spent some of the $5000 she was paid, but police were about to claw back $1400 of it. However, the full amount the couple lost was not being sought through the court. NZME understood the victims were trying to recover it through other avenues. Netsafe chief online safety officer Sean Lyons said business email compromise (BEC) scams were "a quiet kind of attack". "That's part of what makes it effective. "The email might come from a familiar name. The invoice might match work that's genuinely been done - it lands in the inbox at just the right time. "All of that lowers the chances anyone will pause and question it." However, BEC scams can hit from both sides, he said. A business might unknowingly send a doctored invoice from a compromised account or a customer might receive what looks like a routine bill from a supplier they trust. "Either way, the money ends up in the hands of criminals and it's often very difficult to recover." Lyons said, for businesses, email security was key, while for customers it paid to be "sceptical". "If payment details suddenly change or something feels slightly off, don't reply to the email. "Instead, contact the business directly, using a phone number or address you already know." * This story originally appeared in the New Zealand Herald.

RNZ News
17 hours ago
- RNZ News
Gas leak at house in Feilding hospitalises one
A FENZ hazmat unit was sent from Whanganui to the house. Photo: RNZ / Samuel Rillstone A person is in a serious condition after a gas leak at a house in Manawatū on Saturday morning. Emergency services were called to a house in Feilding shortly before 9.30am. A Hato Hone St John spokesperson said four patients were assessed and treated by its crews. "One [is in] in a moderate condition and two in a minor condition at the scene, and one in a serious condition who was transported to Palmerston North hospital." A Fire and Emergency (FENZ) spokesperson said one person was found unconscious. A FENZ hazmat unit, "with a super-sensitive gas detector" was deployed from Whanganui, the spokesperson said. It arrived late morning and was being used to check gas levels and ventilate the property. Fire crews turned off the LPG cylinders attached to the house. The cause of the leak was yet to be determined. Sign up for Ngā Pitopito Kōrero , a daily newsletter curated by our editors and delivered straight to your inbox every weekday.