logo
Texas student-teacher who allegedly had sex with teen told cops she saw him as ‘a little brother'

Texas student-teacher who allegedly had sex with teen told cops she saw him as ‘a little brother'

New York Post21-05-2025

A Texas high school student teacher who admitted to having sex with a teen boy she taught told cops she saw him 'as a little brother,' authorities said.
Darian Christine Rogers, 22, has been charged with second-degree felony improper relationship between an educator and a student, arrest records show.
She first met the boy at a grocery store where the pair worked at the time, before she became a student teacher at Rouse High School in Leander, a suburb north of Austin, FOX 7 reports.
Advertisement
Rogers, who has been working at the high school since January this year, was reported to authorities in April by a student who said she had 'personal knowledge' of a teacher being involved in a sexual relationship with a minor, court paperwork seen by the local outlet states.
7 Texas student teacher Darian Christine Rogers, 22, told police she saw her victim as a 'little brother.'
Williamson County Jail
The student also provided a voicemail from a woman — identified as Rogers by Williamson County Sheriff's Office — in which she admitted to sending explicit photos to a 17-year-old male.
Advertisement
Her alleged victim initially denied the illicit relationship to police until he was confronted with messages detectives found on his phone between him and Rogers discussing the Plan B contraceptive pill, FOX 7 reported.
Rogers denied having sex with the boy in her police interview and described their relationship as that of a 'big sister and little brother,' according to the affidavit.
7 Rogers started working as a student teacher in January this year.
Instagram / Darian Rogers
She then admitted to having sex with the student 'one time' in his truck in a parking lot near the H-E-B grocery store where they both worked after she was confronted with the text evidence, the affidavit states.
Advertisement
7 Rogers also confessed to an illicit relationship with another student.
Facebook / Darian Rogers
Rogers warned the student to avoid 'inappropriate comments' in front of school staff as she was interviewing for a position there, the affidavit states.
7 The illicit relationship happened before Rogers started working as a student teacher at Rouse High School in Leander, Texas.
Google Maps
A video of Rogers taking the Plan B pill and a screenshot of the receipt were also found on her phone by detectives.
Advertisement
7 Rogers had sex with the underage boy when the pair worked at an H-E-B grocery store.
LinkedIn / Darian Rogers
Another text thread between Rogers and a friend described a previous sexual relationship between her and a different child who was 17 and a student in the Leander Independent School District at the time.
7 The school's principal sent a letter to students' families after Rogers' arrest.
Google Maps
The school's principal sent a letter to the families of students on Friday following Rogers' arrest.
7 Rogers confessed to having sex with the boy in his truck outside the H-E-B where they worked together.
Google Maps
'The individual was not a Leander ISD or Rouse High School employee and was immediately removed from campus once the district was made aware of the situation,' the letter from Rouse High School principal Vincent Hawkins and seen by FOX 7 reads.
'Any accusations of misconduct did not happen on our campus, during school hours, or at any school-sponsored event,' the letter continues.
Advertisement
Rogers was booked into Williamson County Jail on Friday and released the following day on a $20,000 bond.
She is next due in court on June 4 for a pre-indictment docket call, arrest records show.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Suspect in ‘King of the Hill' star Jonathan Joss' murder allowed to walk free after posting bail
Suspect in ‘King of the Hill' star Jonathan Joss' murder allowed to walk free after posting bail

New York Post

time2 hours ago

  • New York Post

Suspect in ‘King of the Hill' star Jonathan Joss' murder allowed to walk free after posting bail

The Texas man accused of murdering 'King of the Hill' actor Jonathan Joss has been released after posting bond, according to reports. Sigfredo Ceja Alvarez, 56, is confined under full house arrest after posting $200,000 bond Monday evening, Bexar County Court records show. 3 Suspect Sigfredo Ceja Alvarez in his booking photo. He's accused of murder. Getty Images 3 Actor Jonathan Joss was fatally shot. NBC He is barred from possessing any firearms during his release, is subject to random drug testing, and cannot contact Joss' family, Fox 7 reported. Alvarez allegedly gunned 59-year-old Joss down on their San Antonio street Sunday evening after a heated argument. 3 Actor Jonathan Joss (R) and his husband Tristan Kern de Gonzales. Facebook/Jonathan Joss Joss' husband claimed the attack was motivated by homophobia, but police have said they've found no evidence supporting that.

Hackers are using a modified Salesforce app to trick employees and extort companies, Google says
Hackers are using a modified Salesforce app to trick employees and extort companies, Google says

CNN

time2 hours ago

  • CNN

Hackers are using a modified Salesforce app to trick employees and extort companies, Google says

Hackers are tricking employees at companies in Europe and the Americas into installing a modified version of a Salesforce-related app, allowing the hackers to steal reams of data, gain access to other corporate cloud services and extort those companies, Google said on Wednesday. The hackers – tracked by the Google Threat Intelligence Group as UNC6040 – have 'proven particularly effective at tricking employees' into installing a modified version of Salesforce's Data Loader, a proprietary tool used to bulk import data into Salesforce environments, the researchers said. The hackers use voice calls to trick employees into visiting a purported Salesforce connected app setup page to approve the unauthorized, modified version of the app, created by the hackers to emulate Data Loader. If the employee installs the app, the hackers gain 'significant capabilities to access, query, and exfiltrate sensitive information directly from the compromised Salesforce customer environments,' the researchers said. The access also frequently gives the hackers the ability to move throughout a customer's network, enabling attacks on other cloud services and internal corporate networks. Technical infrastructure tied to the campaign shares characteristics with suspected ties to the broader and loosely organized ecosystem known as 'The Com,' known for small, disparate groups engaging in cybercriminal and sometimes violent activity, the researchers said. A Google spokesperson told Reuters that roughly 20 organizations have been affected by the UNC6040 campaign, which has been observed over the past several months. A subset of those organizations had data successfully exfiltrated, the spokesperson said. A Salesforce spokesperson told Reuters in an email that 'there's no indication the issue described stems from any vulnerability inherent in our platform.' The spokesperson said the voice calls used to trick employees 'are targeted social engineering scams designed to exploit gaps in individual users' cybersecurity awareness and best practices.' The spokesperson declined to share the specific number of affected customers, but said that Salesforce was 'aware of only a small subset of affected customers,' and said it was 'not a widespread issue.' Salesforce warned customers of voice phishing, or 'vishing,' attacks and of hackers abusing malicious, modified versions of Data Loader in a March 2025 blog post.

Hackers are using a modified Salesforce app to trick employees and extort companies, Google says
Hackers are using a modified Salesforce app to trick employees and extort companies, Google says

CNN

time2 hours ago

  • CNN

Hackers are using a modified Salesforce app to trick employees and extort companies, Google says

Hackers are tricking employees at companies in Europe and the Americas into installing a modified version of a Salesforce-related app, allowing the hackers to steal reams of data, gain access to other corporate cloud services and extort those companies, Google said on Wednesday. The hackers – tracked by the Google Threat Intelligence Group as UNC6040 – have 'proven particularly effective at tricking employees' into installing a modified version of Salesforce's Data Loader, a proprietary tool used to bulk import data into Salesforce environments, the researchers said. The hackers use voice calls to trick employees into visiting a purported Salesforce connected app setup page to approve the unauthorized, modified version of the app, created by the hackers to emulate Data Loader. If the employee installs the app, the hackers gain 'significant capabilities to access, query, and exfiltrate sensitive information directly from the compromised Salesforce customer environments,' the researchers said. The access also frequently gives the hackers the ability to move throughout a customer's network, enabling attacks on other cloud services and internal corporate networks. Technical infrastructure tied to the campaign shares characteristics with suspected ties to the broader and loosely organized ecosystem known as 'The Com,' known for small, disparate groups engaging in cybercriminal and sometimes violent activity, the researchers said. A Google spokesperson told Reuters that roughly 20 organizations have been affected by the UNC6040 campaign, which has been observed over the past several months. A subset of those organizations had data successfully exfiltrated, the spokesperson said. A Salesforce spokesperson told Reuters in an email that 'there's no indication the issue described stems from any vulnerability inherent in our platform.' The spokesperson said the voice calls used to trick employees 'are targeted social engineering scams designed to exploit gaps in individual users' cybersecurity awareness and best practices.' The spokesperson declined to share the specific number of affected customers, but said that Salesforce was 'aware of only a small subset of affected customers,' and said it was 'not a widespread issue.' Salesforce warned customers of voice phishing, or 'vishing,' attacks and of hackers abusing malicious, modified versions of Data Loader in a March 2025 blog post.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store