a computer monitor and keyboard on a desk

Man Accused of Using Encrypted Apps to Communicate With Teen Before She was Found Dead

You follow this story because it shows how a private conversation can become a public tragedy. Court records say a 39-year-old man communicated with a 17-year-old on encrypted platforms for about a year before she disappeared, and investigators later found her remains. You need to know how encrypted apps can hide exchanges that lead to real-world harm.

This post breaks down the timeline investigators uncovered, explains what role encrypted messaging played, and points to the warning signs that mattered in the case. Expect clear details about the communications investigators flagged and why those digital traces mattered for the investigation.

Key Events Leading to the Teen’s Tragic Death

man in white crew neck t-shirt wearing eyeglasses
Photo by Sophie

Court records and investigators show a months-long online relationship, a planned meeting that led to Hailey Buzbee leaving home, and law enforcement tracing conversations on an encrypted app to locate her remains.

How Tyler Thomas and Hailey Buzbee Connected Online

Court documents indicate Hailey, a Fishers teen, communicated with 39-year-old Tyler Thomas across multiple gaming platforms before moving their conversation to the encrypted messaging app Session. Investigators say the pair exchanged messages for more than a year, with conversations including planning and logistics. Session’s design—no phone or email required, minimal account data—meant the chats left little conventional trace.

Prosecutors allege Thomas used the platforms to gain Hailey’s trust and coordinate her travel. The affidavit filed in Ohio cites specific exchanges and times that investigators used to establish the relationship and intent. Public reporting links the communications pattern to both gaming accounts and direct Session messages.

Timeline of Hailey Buzbee’s Disappearance

Hailey was last seen on January 5 when she reportedly left home voluntarily. Family members and police noted her absence and filed missing-person reports within days. Investigators say messages on Session show coordination of a “runaway attempt and transport,” with timestamps that align to her last known movements.

Search efforts intensified as days passed without contact. Authorities followed digital leads from gaming platforms and the encrypted app, then expanded physical searches. By late January, law enforcement had identified Tyler Thomas as a person of interest based on the digital timeline and witness statements.

Law Enforcement’s Discovery and Response

Investigators executed searches and obtained court-authorized documents linking Thomas to the encrypted communications. The FBI became involved after leads suggested cross-jurisdictional movement; agents say Thomas led them to Hailey’s remains on February 1. Court filings describe how the mix of gaming-platform messages and Session chats formed probable cause for searches and arrests.

Officials also used the affidavit to justify requests for evidence and to map the sequence of contacts between Hailey and Thomas. Prosecutors have cited the encrypted-app exchanges in charging decisions and in court pleadings that outline investigative steps taken after Hailey went missing. For reporting on the app and related documents, see reporting on the use of the Session app in the investigation.

The Role of Encrypted Messaging Apps in Criminal Investigations

Encrypted messaging apps can both enable secrecy and leave investigatory trail pieces that investigators use. Courts, law enforcement and digital forensic teams often must blend technical methods with traditional policing to reconstruct contacts, timelines, and file transfers.

Session and Other Encrypted Messaging Platforms

Investigators found that apps marketed for strong privacy—like Session and Signal-style platforms—offer end-to-end encryption and minimal metadata, which complicates attribution. Those apps typically do not retain readable message content on servers, so law enforcement depends on device seizures, backups, or operator mistakes to recover chats.

Court documents from previous operations show law enforcement has used server seizures, undercover accounts, and cooperation from hosting countries to obtain data. In several international takedowns, authorities relied on intercepted registration logs, payment trails, or malware-style implants to link usernames to real identities.

Forensic teams prioritize volatile memory, cached thumbnails, and metadata cached by the app on phones. Homeland Security investigators and local detectives often coordinate to map contacts and transaction histories when direct message decryption is impossible.

How Encrypted Apps Hindered the Search

Encrypted instant message apps reduced investigators’ ability to read exchanges in real time during the critical missing-person window. In this case, absence of server-stored content meant detectives could not immediately trace the teen’s last online interactions from remote servers.

Investigators in Butler County and allied agencies instead focused on device forensics, triangulating IPs from intermittent backups, and tracking account purchases through payment processors. Court documents in similar cases show delays caused by mutual legal assistance requests to foreign jurisdictions that hosted infrastructure.

Undercover homeland security or local undercover officers sometimes join chat rooms to gather context, but such tactics require time and careful legal authorization. Those delays can slow searches and complicate evidence that would normally direct search teams quickly to a location.

Child Exploitation and Distribution Crimes Using Messaging Apps

Encrypted chat environments have been used to share child sexual abuse material and coordinate exploitation, increasing prosecution complexity. Distribution of child pornography through private chat rooms or group channels often leaves traces in file hashes, transfer timestamps, and user lists that investigators exploit.

Prosecutors use preserved thumbnails, upload logs, and peer lists from seized devices to prove distribution and identify participants. Homeland Security investigators and local prosecutors commonly reference specific file hashes and messaging metadata in court documents to establish possession and dissemination.

Digital evidence collection must follow strict chain-of-custody and legal standards to hold up in court. When messaging apps erase content or use ephemeral features, forensic analysts lean on backups, cached media, and corroborating witness testimony to build cases against suspects alleged to have communicated with minors.

More from Decluttering Mom: