Pennsylvania State Police arrested and charged a Levittown man for possessing more than 10,000 images and videos depicting children in various stages of undress and engaged in sex acts last week.
According to the probable cause filed by the investigative division of the Pennsylvania State Police, on December 4, 2024, a sexual abuse of children investigation that focused on an IP address observed to be requesting blocks of suspected child pornography files on a network known to law enforcement.
A check on the IP address was conducted through Maxmind’s IP address database. Maxmind, on the same day, indicated that the IP address is provided by Verizon and is believed to be used in the Levittown PA area. An additional check of publicly available records located online by an organization known as the American Registry of Internet Numbers (ARIN), confirmed that the IP address was assigned to Verizon, authorities said.
An administrative subpoena was authorized by the Pennsylvania Office of Attorney General and served on Verizon. It directed them to release subscriber and other pertinent information regarding the user identified with the identified IP also on the same day.
Verizon, according to court records, responded to the subpoena two weeks later identifying Jacob Mamolou, 49, as the account holder and subscriber assigned the IP address in question and was assigned that IP address from 1/07/2023 through 12/04/2024. Additionally, Verizon provided the following service address: Azalea Lane in Bristol Twp.
The Bucks County District Attorney’s Office approved a search warrant on January 9. The warrant was approved by District Judge Terrence Hughes, Sr. on January 21. It was executed the following morning at 6:05 a.m. by the Pennsylvania State Police Computer Crime Unit.
During the search warrant execution, the residence’s only occupant, Mamolou was interviewed. He was notified that he was not under arrest, not required to speak with them and free to leave. Mamolou was read his Miranda rights and warnings. Mamolou indicated that he wanted to learn more about the search warrant, according to the probable cause.
Mamolou said that he had lived at the property for about 7 years and that nobody else had lived in the house with him. Mamolou stated that the house has Wi-Fi. Mamolou stated that the Wi-Fi network was password protected and he does not share it with any of his neighbors. I asked Mamolou if he ever heard of the computer software application used to conduct the investigation and he replied yes. The computer software application name is known to law enforcement and is not named in this affidavit, investigators said.
At the conclusion of the search warrant, numerous electronic devices were seized and entered into evidence. The electronic devices were later transported to the Pennsylvania State Police Southeast Computer Crime Lab. A forensic examination of electronic devices seized from the Azalea Lane address was conducted. During examination of the 45 electronic devices, more than 12,000 media files of both pictures and videos were located that depicted apparent child pornography across the devices, the criminal complaint alleges.
State Police Findings on Mamolou Devices
-A black custom PC tower that contained numerous internal hard drives had 11, 886 media files consisting of both pictures and videos that depicted apparent child pornography of individuals under the age of 18 involved in various stages of undress as well as sexual acts.
-Device contained multiple hard drives and the operating system hard drive included numerous artifacts to indicating that the device was utilized by Mamolou.
-Included a PDF document such as an utility bill in the name of Jacob Mamolou, cloud passwords and tokens, saved credit card information, emails social media accounts and message communications. Additionally, the computer software application which was responsible for requesting blocks of suspected child pornography files on a network known to law enforcement and that initiated this investigation was located and installed on the computer.
-LNK file artifacts are a link or a shortcut that provides a pointer to other data files and folders of the target file on the computer’s operating system. LNK files contain dates and times of when the target file was opened. Hundreds of LNK files were located that had file names indicative of file names consistent with file names that contain child pornography material being opened.
Below is a random sampling of three media files depicting apparent child pornography located during the forensic examination:
1-Description: This video is in full color and depicts a baby aged female child victim approx. less than 18 months of age. An adult male is engaging in anal sex with the child victim. Investigators viewed this file and the video is in violation of PA CC 6312 Sexual Abuse of Children.
2-This video is in full color and depicts a toddler aged female child victim approx. 2-4 years of age. An adult male performs oral sex on the child victim. The female child victim performs oral sex on an adult male. The officer personally viewed this file and the video is in violation of PA CC 6312 Sexual Abuse of Children.
3-This video is in full color and depicts a toddler aged female child victim approx. 3-4 years of age. The child victim is performs oral sex on an adult male. Police personally viewed this file and the video is in violation of PA CC 6312 Sexual Abuse of Children.
A forensic examination of the Google Pixel 6 Cell phone revealed that over 86 media files contained pictures and videos depicting apparent child pornography involving individuals under 18 involved in stages of undress as well as sexual acts, according to the probable cause.
Additionally, the device contained numerous artifacts to indicate the device was utilized by Mamolou. These artifacts included PDF documents such as airline and hotel reservations, insurance policy information, mortgage application documents in Mamolou’s name plus cloud passwords and tokens. They also included saved credit card information, email and message communications, state authorities said.
Mamolou was arraigned by Judge Hughes on a single count felony count of child pornography and was released after an approved bail reduction request from 10 percent of $5oo,000.00 to 10 percent of $50,000.00 by his attorney, Sara M. Webster, Esq, of Webster Law, according to court records.
Mamolou is scheduled to appear in court to answer the charge on April 15.