Criminal Complaint: Gregory Lisby
Criminal Complaint: Gregory Lisby
Criminal Complaint: Gregory Lisby
I, Adam Strode, having been duly sworn, hereby depose and state as follows:
I am a Special Agent (“SA”) of the Federal Bureau of Investigation (“FBI”). I have been so
employed since 2015. I am currently assigned to the Boston Division, Worcester Resident
Agency. My duties include the investigation of violations of the United States Code.
investigations, and have been the affiant on federal search warrants and court orders. I have
include bank fraud, identity theft, child exploitation, and healthcare fraud. I have received
on-the-job training and have attended FBI-sponsored training courses on the investigation of
criminal violations. I have conducted and participated in the execution of search and arrest
I submit this affidavit in support of an application for an arrest warrant and criminal
The facts in this affidavit come from my training and experience, my review of relevant
records, and information obtained from other agents, law enforcement officers, and civilian
witnesses. This affidavit includes only those facts I believe are necessary to establish
probable cause for the issuance of the requested complaint warrant and does not include all
1
RELEVANT STATUTES
Title 18, United States Code, Sections 2252A(a)(5)(B) and (b)(2) prohibits a person from
conspiring to do so, any material that contains an image of child pornography, as defined in
18 U.S.C. § 2256(8), that has been mailed, or shipped or transported using any means or
any means, including by computer, or that was produced using materials that have been
including by computer.
explicit conduct where (a) the production of the visual depiction involved the use of a minor
engaged in sexually explicit conduct, (b) the visual depiction is a digital image, computer
engaged in sexually explicit conduct, or (c) the visual depiction has been created, adapted, or
The term “minor” is defined in 18 U.S.C. § 2256(1) as any person under the age of eighteen
years.
On December 17, 2018 at 17:05:15 UTC, NCMEC received CyberTip Report #44377012
1
An “Electronic Communication Service Provider” (“ESP”) is defined in 18 U.S.C. § 2510(15) as any
service which provides to users thereof the ability to send or receive wire or electronic communications.
2
According to Cybertip Report #44377012, on December 17, 2018 at 14:58:46 UTC, a digital
the OneDrive service, by an individual using the screen/user name “844427362124387,” i.e.
the TARGET ACCOUNT. The user of the TARGET ACCOUNT utilized IP address
Microsoft employee viewed the contents of the SUBJECT FILE and determined that it
NCMEC transmitted the SUBJECT FILE, along with CyberTip Report #44377012, to
I reviewed the SUBJECT FILE identified by Microsoft. The SUBJECT FILE depicts two
males engaged in anal sex. Male1 appears to be kneeling on the ground facing a bed, resting
his torso on the mattress. Male2 is kneeling behind Male1 and appears to be penetrating
Male1’s anus with his penis. The penis of Male2 is partially visible. The faces of Male1 and
Male2 are both partially visible. Neither boy has visible facial hair or body hair. Based upon
their size and the lack of facial and body hair, I estimate that both boys are between 11 and
14 years old.
On August 27, 2019, Microsoft Corporation provided the contents of the TARGET
August 8, 2019.
3
Investigators reviewed the data provided by Microsoft for the TARGET ACCOUNT and
identified approximately 180 images that appear to depict child pornography. Investigators
Data from Microsoft was categorized as “preserved” and “current.” Within both directories,
I located two folders named “Inside” and “CADE” that contained images. Based upon my
training and experience, I believe that the designation “current” indicates that the file was
active in the account as of the date Microsoft prepared the data, on approximately August 15,
2019. The data was produced to the FBI on August 27, 2019.
Specifically, within the “Inside” folder, which appears to have been added to the OneDrive
account on December 17, 2018, there were approximately 140 images that, based upon my
review, appear to depict child pornography. The “upload IP” address for all of the images
contained within the “Inside” folder was 71.87.214.73, which is the same IP address used to
Amongst the files saved within the “Inside” folder was a file named
SUBJECT FILE from Microsoft’s initial Cybertip, more particularly described in paragraph
10, though it has a different filename. A comparison of the hash values of those two files
On September 4, 2019, the FBI computed the hash value of 146 files from the “Inside”
On September 4, 2019, NCMEC sent a response to the FBI via an “Initial Hash Value
4
males engaged in anal sex. Male1 is naked and his face is visible. Male1’s anus is being
penetrated by Male2’s penis. Male2’s face is not visible. Male1 has a small build and no
facial or body hair. I estimate Male1’s age to be between 8 years old and 12 years old. Only
a portion of Male2’s stomach, leg, hand, and penis are visible. Based on Male2’s size and
visible body hair, I estimate that Male2 is an adult over the age of 18.
The contents of the TARGET ACCOUNT also contained a folder entitled “CADE,” which
appears to have been added to the TARGET ACCOUNT on December 13, 2018. The
“upload IP” address for all of the files in the “CADE” folder was 71.87.214.73, which is the
I reviewed the contents of the CADE file and observed approximately 50 images that appear
to be of one unidentified minor male. The majority of these images contain apparent child
a naked male standing with his hands behind his head and his genitals fully visible. Based
upon his slight frame, he appears to be approximately 12-15 years old. The image appears to
be a picture taken by the boy of his own reflection in the mirror. His face is fully visible.
The CADE file also included several videos. The video file named “766e2b2c-5bac-4285-
9cf6-9c44ef9b4310” appears to depict the same male as seen in the still images. In the video,
the boy is naked and masturbating on a bed. The boy’s face and penis can be seen.
On September 4, 2019, a NCMEC Initial Hash Value Comparison Report was generated
containing the hash values from 54 files from the “CADE” folder. NCMEC responded that
5
The records provided by Microsoft Corporation for the TARGET ACCOUNT included
evidence of the download and use of a TOR Browser. 2 In addition, a number of the files
containing apparent child pornography within the folder entitled “Inside” have file names
service (also known as a “hidden service”) that can be reached via the TOR network. Based
on my training and experience, I know that individuals will use TOR to share files containing
B. IDENTIFICATION OF LISBY
Account data provided by Microsoft for the TARGET ACCOUNT listed the subscriber name
as “Greg Lisby,” with a sign-in name of “glisby@gmail.com” and an account creation date of
Further review of the data provided by Microsoft identified several word documents that
introduction letter written by LISBY for an online course. The document states “…My name
is Greg Lisby, and I recently applied to the PBTL in Early Childhood Education.” The letter
then further states, “…If I could teach any grade, I would love to be a kindergarten teacher.
The joy, spontaneity, and openness to learning of younger children is what attracts me to
early childhood education. Plus, the energy of the kids, and the energy required of the
teacher is exhilarating and tiring.” That file appears to have been added to the TARGET
2
TOR (The Onion Router) is free and open-source software for enabling anonymous communications.
TOR directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than
seven thousand relays to help conceal a user’s location and usage from anyone conducting network
surveillance or traffic analysis. In order to access TOR specific websites a user needs to use a TOR
browser or a proxy gateway.
6
A file entitled “Charge Letter 2 – 1-21-18” is a Word document which appears to have been
letter from the Intake Coordinator for the diocese and is addressed to “The Rev. Gregory C.
document appears to have been added to the TARGET ACCOUNT August 13, 2018. The
top of the document states, “Gregory C. Lisby, Pleasant St. Worcester, MA 01602, (401)
, @gmail.com.”
On or about January 22, 2019, Charter Communications provided the following records in
response to a subpoena requested by Massachusetts State Police for customer records related
to the assignment of IP address 71.87.214.73, the IP address used to upload the SUBJECT
FILE, the apparent child pornography within the “Inside” folder, and others:
On May 23, 2019, investigators conducted a public records database search for Pleasant
Street, Worcester, Massachusetts. That query identified Timothy Burger, born 1978, as
living at this address from August 2015 to April 2019. That same query also identified
An internet search of publicly available databases indicates that Timothy Burger and LISBY
are married.
7
On May 23, 2019, a query of the Massachusetts Registry of Motor Vehicles (“RMV”)
address of Pleasant Street, Worcester. The query of the RMV database also identified an
Worcester.
Publicly available information online indicates that LISBY was employed as a kindergarten
teacher for the Holyoke Public Schools for the 2019-2020 school year. On September 10,
2019, a red 2017 Toyota Prius bearing Massachusetts registration 5XX463 registered to
Gregory LISBY’s was observed parked in an elementary school parking lot in Holyoke.
On September 11, the Court issued a warrant authorizing the search of Pleasant Street,
Worcester. 19-mj-4490-DHH. FBI executed the warrant that same day, at approximately
After being advised of his rights pursuant to Miranda, LISBY stated that he used the email
address @gmail.com and phone number of (401) , i.e. the email address and
phone number associated with the TARGET ACCOUNT. LISBY requested an attorney
before agents asked him about the contents of the TARGET ACCOUNT.
Agents also interviewed Timothy Burger. Burger and LISBY separately identified a
Within LISBY’s bedroom, agents found an iPad and a OnePlus mobile phone. Both devices
8
Agents were able to gain access to the iPad found in LISBY’s bedroom. The iPad had an
application for Microsoft OneDrive installed on it. The stored credentials within the
Agents were also able to gain access to the OnePlus mobile phone. They found the
Microsoft OneDrive application installed. The stored credentials for OneDrive included a
Agents performed a preliminary review of the contents of the OneDrive account on both the
iPad and OnePlus phone. They found file names that match those of the Word documents
stored within Target Account described in paragraphs 24, 25, and 26. They were unable to
open the actual files. The images of apparent child pornography that were included in the
Microsoft OneDrive return were not found during the initial review of the contents of the
OneDrive account as accessed from the iPad and OnePlus mobile phone. The absence of
these images and videos suggests that they were removed from the TARGET ACCOUNT at
some point after Microsoft had produced records responsive to the federal search warrant in
August 2019.
the FBI to report an email that had been received from @gmail.com. The email was
directed to the principal of the elementary school that employed LISBY as a kindergarten
Dear [Principal],
Last night, I was accused of an awful crime that could put our Holyoke
children in harms way.
9
Please accept this email as my letter of resignation, effective immediately.
I will have my computer and key delivered to [elementary school] by early next week.
My apologies for this terrible situation and its affect on [elementary school].
Sincerely,
Greg Lisby”
10