FRONTLINEPRIVACY
Other

Five Louisiana officials in Evangeline Parish arrested in 2026 for leaking active-investigation data to a defendant

2026-04-07·Evangeline Parish, Louisiana

In April 2026, Louisiana State Police arrested five public officials in Evangeline Parish, including a mayor, a 911 dispatch supervisor, and three sworn officers, for accessing state law-enforcement databases and leaking active-investigation data to a criminal defendant. The case is an inverted privacy incident: officers caused the exposure of protected victim and witness information rather than having their own data leaked.

What happened

On April 7, 2026, Louisiana State Police announced the arrests of Ville Platte Mayor Ryan Williams, Ville Platte PD Sergeant Darrien Guillory, Mamou Police Chief Charles 'Pat' Hall, Evangeline Parish 911 Dispatch Supervisor Chasecca Basco, and Opelousas PD Officer Yolanda Lewis. The five were charged with Trespass Against State Computers and Malfeasance in Office. According to LSP, the officials accessed state and local law-enforcement databases and shared sensitive information, including details related to alleged victims in active criminal investigations, with an arrested defendant connected to one of those cases.

What happened

On April 7, 2026, Louisiana State Police announced the arrests of five public officials in Evangeline Parish: Ville Platte Mayor Ryan Williams, Ville Platte PD Sergeant Darrien Guillory, Mamou Police Chief Charles "Pat" Hall, Evangeline Parish 911 Dispatch Supervisor Chasecca Basco, and Opelousas PD Officer Yolanda Lewis. They were charged with Trespass Against State Computers and Malfeasance in Office.

According to the LSP press release, the officials accessed state and local law-enforcement databases and leaked sensitive information, including details related to alleged victims in active criminal investigations, to an arrested defendant connected to one of those cases. WWLTV and other outlets confirmed the arrests the same day.

How it started

This case is the inverse of the typical privacy incident in our corpus. There was no external attacker. The breach was internal and intentional. Five sworn or appointed officials used their legitimate access to law-enforcement databases to extract case-related data and pass it to a defendant.

The exposed data wasn't officers' personal information. It was investigation data, including information about alleged victims and witnesses in active criminal cases. Those are people whose addresses, names, and case involvement now sit in the hands of the defendant the records concerned.

What this means for you

If you're a Louisiana peace officer, the prevention angle here isn't broker removal. It's the system around law-enforcement database access: audit logs, role-based permissions, and the criminal exposure that follows when those controls are abused. The peace-officer public-records exemption (La. R.S. 15:1212.1(E)) and the 2024 amendment to La. R.S. 44:5(B)(11) cover your data, not the protected persons named in active investigations.

For the broader privacy lesson: every database that holds first-responder data also holds the data of the people we serve and protect. When access controls fail, both populations get exposed. Broker removal handles the data brokers republish. The Evangeline Parish case is a reminder that data trust runs in both directions, and that audit and prosecution are the levers when the breach is internal.


Editorial rules: Only public, already-reported incidents. Never name a non-public victim. Always end with the prevention takeaway tied to our service. Cite at minimum one public source per claim.

What would have prevented this

Insider misuse of LE databases is the inverse of what privacy services like ours guard against. Here, sworn officers were the breach actors, exposing protected victim and witness data rather than having their own information leaked. The defensive lever isn't broker removal in this scenario, it's audit, policy, and prosecution after the fact. The case is in the corpus because it illustrates a real exposure pathway: state law-enforcement databases, accessed by people with legitimate credentials, leaking out to the wrong audience. For the officer audience, the takeaway is the systems-level one: data you put into LE databases has more failure modes than ransomware, and the protected persons named in case files have the same exposure risk you do.

Public sources