Home » Featured » High School Teacher Arrested for Downloading and Sharing Child Porn
Click Here To Hide Tor

High School Teacher Arrested for Downloading and Sharing Child Porn

An investigation into a user of the messaging application “Kik Messenger” led to the arrest of a high school math teacher who had been downloading child abuse content on the dark web and then sharing the illegal content with other users of Kik Messenger. Kik Interactive, a Canadian company, reached out to the Royal Canadian Mounted Police (RCMP) Canadian Police Centre for Missing and Exploited Children (CPCMEC) with information regarding a Kik user in Harvard, Massachusetts. Homeland Security Investigations in Boston worked with Canadian authorities and Kik Interactive to identify the owner of the Kik account connected to child pornography distribution.

In early 2018, Kik Interactive sent the Royal Canadian Mounted Police (RCMP) Canadian Police Centre for Missing and Exploited Children (CPCMEC) the username of an account that had triggered Kik’s internal child pornography monitoring system. Kik, like many companies that provide similar services, automatically compares hashes of pictures uploaded by its members with the hashes of confirmed child abuse pictures stored and maintained by law enforcement agencies across the globe (with assistance from various parts of the private sector). If the picture’s hash matches any hash in the Canadian Police Centre for Missing and Exploited Children’s database, Kik bans the offending member and forwards the member’s account information to the Royal Canadian Mounted Police.

Kik provided Canadian authorities with a username of the offending account, the name associated with the account, the email address associated with the account, and the IP address(es) used to access the account. The IP address was registered to a subscriber of an internet service provider in Massachusetts, according to information provided by a Homeland Security Investigations Special Agent in Boston, Massachusetts. One IP address connected to the account was registered to an address in Lowell and the other was registered to an address in Harvard. Searching public databases for the email address associated with the Kik account resulted in a dead end. The email address was fake. However, using tools provided by Kik, a Homeland Security Investigations Special Agent identified another Kik account that used a name very similar to a name used in the fake email address. Kik provided law enforcement with information on the second account.

The second account provided law enforcement with a tangible connection to the account holder and accused pedophile, Warren Anderson. The IP addresses used to access the Kik account matched the IP addresses from the first dataset provided by Kik. Searching other information associated with the account led law enforcement to the identity of Anderson. The evidence would not likely have convinced a jury that Anderson was guilty; it simply connected him to one of the addresses and the username used on one of the Kik accounts. Information from the second Kik account matched information used by Warren Anderson’s Facebook account. Homeland Security Investigations failed to identify Anderson, even after conducting physical surveillance at both locations. And even though his Facebook profile listed one of the addresses as his home, his car was primarily parked at the second address. Authorities were not completely convinced they had the correct person until they asked the school listed on Anderson’s profile if Anderson lived at either of the addresses. An official from Narraganset School District high school confirmed Anderson’s address and that he taught math at the school.

Homeland Security Investigations then obtained a search warrant for the address. A woman opened the door, according to court documents filed after the arrest. The woman identified herself as Anderson’s mother and confirmed that Anderson had been living at her house. She led the officers to Anderson’s room. The man was in his room when Police entered. The Homeland Security Investigations Special Agent asked Anderson if he knew why law enforcement was at his house. Anderson responded, “because of my internet activity.”

Anderson told the officers that he had been regularly accessing three dark web child abuse sites. He admitted using several more but focused primarily on three. He said that one of his computers—a Dell laptop running an unidentified Linux operating system—was used exclusively to access dark web child abuse sites and to download new content. He transferred the content to his cell phone and then shared it with others through Kik, according to a statement he gave to the police. Magistrate Judge Donald L. Cabell ordered Anderson’s detention on one count of receipt of child pornography and one count of possession of child pornography.

One comment

  1. —a Dell laptop running an unidentified Linux operating system— > possibly tails

    self incrimination> you are idiot
    sharing CP> do you want to be rape in prison

    luckily, pedophiles are mentally retarded

Leave a Reply

Your email address will not be published. Required fields are marked *

*

Captcha: *