Criminal Charges Filed Following Internal Investigation of High Bandwidth Alert
Pennsylvania State Police Corporal Stephen M. Kamnik faces felony charges after investigators discovered approximately 10,000 pornographic images on his work computer in Schwenksville. The 38-year-old Havertown resident drew attention when oversight systems flagged unusual network activity under his credentials. Following a forensic investigation of his work computer, authorities uncovered evidence of both conventional and AI-generated pornographic content, leading to criminal charges, including felony unauthorized use of a computer.
5 Key Points
- Internal systems flagged Kamnik’s computer after detecting a 2.33GB data transfer to an adult website during work hours.
- Forensic investigation revealed approximately 10,000 pornographic images stored in Kamnik’s user profile.
- Investigators identified AI-generated “deepfake” pornography created using non-pornographic photos of women.
- Police discovered an Excel spreadsheet containing family photos alongside email addresses and websites.
- Kamnik, a state trooper since 2011, has been suspended without pay pending an investigation.
Investigation Details
Pennsylvania State Police launched an internal investigation after their oversight system detected unusual network activity on November 21, 2024. Between 10 a.m. and 12:30 p.m., Kamnik’s credentials transferred 2.33 gigabytes of data to datemylove.com, triggering an automated alert for high bandwidth usage. The subsequent forensic search revealed thousands of images cached under Kamnik’s user profile, leading to the seizure of his work computer in late November.
AI-Generated Content Discovery
During their examination, investigators identified a concerning pattern involving AI-generated pornographic content. Court records indicate that non-pornographic photos of women were manipulated using deepfake technology to create explicit images. The affidavit explains that deepfakes result from “deep learning,” a specialized form of machine learning that generates artificial images or video content. Investigators also uncovered an Excel spreadsheet containing Kamnik’s family photos alongside a collection of email addresses and websites associated with his surname.
Legal Proceedings
Kamnik faces multiple charges, including a felony count of unauthorized computer use and a misdemeanor charge of misapplication of entrusted property. The 13-year force veteran has retained prominent Philadelphia attorney Fortunato N. Perri Jr., whose law firm previously represented high-profile clients, including Bill Cosby and Meek Mill. Pennsylvania State Police confirmed Kamnik’s suspension without pay pending the outcome of his preliminary hearing, scheduled for February 5.
FAQ
Q: What specific charges does Stephen Kamnik face?
A: Kamnik faces a felony charge of unauthorized use of a computer and a misdemeanor charge of misapplication of entrusted property.
Q: When did the investigation into Kamnik begin?
A: The investigation began on November 21, 2024, when oversight systems detected high bandwidth usage and a 2.33GB data transfer from Kamnik’s work computer to an adult website between 10 a.m. and 12:30 p.m.
Q: What is Kamnik’s current employment status with the Pennsylvania State Police?
A: Kamnik has been suspended from the Pennsylvania State Police without pay, pending the outcome of the investigation. He had served as a trooper since 2011.
Q: What is a deepfake, as mentioned in the investigation?
A: According to the court affidavit, a deepfake is “an artificial image or video (a series of images) generated by a special kind of machine learning called ‘deep’ learning.” In this case, investigators allege non-pornographic photos of women were manipulated to create explicit content.
Q: When is Kamnik’s preliminary hearing scheduled?
A: Kamnik’s preliminary hearing is scheduled for February 5, 2025.
Citations
Ulrich, Laura (January 13, 2025). 10,000 porn files allegedly found on state cop’s work computer. North Central PA. https://www.northcentralpa.com/news/10-000-porn-files-allegedly-found-on-state-cop-s-work-computer/article_5ed4ad62-d1d6-11ef-868a-6ba94db8c6a9.html