Skip to main content

31 year old married woman Sentenced to 38 years for having sex with a 12 year old boy 



Former teacher Ethel Anderson, 31, (pictured above) was found guilty and sentenced to 38 years in prison in December 2013 for having sex with her 12 year old student.

The married mother of one had sex with one of her students, whose identity is being kept secret because of his age (he was 12 at the time). The alleged abuse started in 2011 just one month after the teacher and the minor started a tutoring session in her home. During her trial last year, the boy, now 14, told the court that she started by kissing him and progressed to giving him oral sex. 

"I felt like she was a girlfriend, I loved her and she said that I was her boyfriend and she loved me. She would rub on my legs, kiss on my ears, neck and stuff like that. We would tongue kiss. I lost my virginity to her. I told her to stop but she said she wanted me bad"
The boy's angry mother told the former 'teacher of the year', who worked as a language arts teacher at Mango Elementary School, in Florida, that she took her boy's innocence.

'Anger and hatred don't even begin to explain how I feel about what you took from my son.His innocence is lost forever.' She said in a statement read at the sentencing
Now there are people, especially blacks in America, who feel 38 years is too much to spend in prison for having sex with a minor...especially after a teacher, Laura Whitehurst (who is white) was sentenced to prison for 1 year and released after only 6 months for sleeping with three of her students and giving birth to a child fathered by one of them. Watch the people you leave you children with.

Comments

Popular posts from this blog

Top 20 Most Asked Third Party Risk Questions for Vendors  These questions help organizations assess the overall risk posed by third-party vendors, covering critical areas like data protection, regulatory compliance, and incident response. Here’s a list of the Top 20 Most Asked Third-Party Risk Management (TPRM) Questions for Vendors in TPRM questionnaires: 1. What types of sensitive data do you handle for our organization? Vendors should clarify the types of data they collect, process, or store, such as personal information, financial data, or intellectual property. 2. How do you protect data at rest and in transit? This question probes into the encryption methods, protocols, and security controls in place for safeguarding data during storage and transmission. 3. Do you have a formal Information Security Program in place? Vendors should describe their overall cybersecurity framework, including policies, procedures, and governance. 4. How do you manage user access to our data and s...

10 Important Cybersecurity Practices for your Business

  10 Important Cybersecurity Practices for your Business 1. EDUCATION  It’s much easier to prevent a hack than it is to recover from a hack. Once your company’s sensitive data is stolen through a ransomware attack, recovering it is often a long and arduous process. Teaching employees about basic security, personal cybersecurity, and the prevalence of cyber threats goes a long way in stopping ransomware attacks before they can really do damage. Your employees should understand that they might be targets of malicious actors, eager to exploit any entry they can find in your company. The average cost of a cyberattack is 3.86 million and the cumulative total for global cybercrime is expected to cost $6 trillion. If you don’t pay to train your employees about cybersecurity best practices eventually you may end up paying more in the long run. High quality and free trainings for your employees are available from several government resources including Department of Homeland S...

Microsoft Warns of Data Stealing Malware That Pretends to Be Ransomware

  Thursday - Microsoft warned of a "massive email campaign" that's pushing a Java-based STRRAT malware to steal confidential data from infected systems while disguising itself as a ransomware infection. "This RAT is infamous for its ransomware-like behavior of appending the file name extension .crimson to files without actually encrypting them," the Microsoft Security Intelligence team  said  in a series of tweets. The new wave of attacks, which the company spotted last week, commences with spam emails sent from compromised email accounts with "Outgoing Payments" in the subject line, luring the recipients into opening malicious PDF documents that claim to be remittances, but in reality, connect to a rogue domain to download the STRRAT malware. Besides establishing connections to a command-and-control server during execution, the malware comes with a range of features that allow it to collect browser passwords, log keystrokes, and run remote commands an...