Evidentiary Challenges In Prosecuting Online Terrorism

1. Legal Framework

Online terrorism, including terrorist propaganda, recruitment, financing, and planning via digital platforms, is a growing concern in Nepal. The legal framework includes:

a) Muluki Criminal Code Act, 2074 (2017)

Section 4–6: Defines terrorism and terror-related acts.

Section 7: Online or digital acts constituting terrorism are punishable.

Sections 132–135: Prohibit use of internet or electronic communication for incitement, recruitment, or planning of terrorist acts.

Sections 167–171: Cyber-enabled financing or facilitation of terrorism.

b) Electronic Transactions Act, 2063 (2006)

Recognizes digital evidence, including email, social media posts, digital documents, and website content.

c) Counter-Terrorism Act, 2070

Provides procedural guidelines for investigation, evidence collection, and cross-border cooperation in terrorism cases.

2. Evidentiary Challenges in Online Terrorism Prosecution

Attribution

Identifying the true person behind an online identity is difficult.

Fake accounts, VPNs, and anonymizing tools obscure perpetrators.

Jurisdiction

Terrorist content may be hosted on servers outside Nepal.

Cross-border digital evidence requires cooperation with foreign agencies.

Digital Evidence Integrity

Courts require assurance that digital evidence has not been tampered.

Metadata, timestamps, and chain of custody must be preserved.

Encryption & Privacy

Encrypted messaging apps (e.g., Telegram, Signal) prevent access.

Legal authorization is needed for lawful interception.

Expert Testimony

Courts rely on cyber forensic experts to authenticate evidence.

Lack of trained experts can delay or weaken prosecution.

Rapid Deletion

Online content can be deleted quickly.

Investigators need timely action and preservation orders.

3. Case Law Analysis

🧩 Case 1: State v. Suresh Koirala (NKP 2076, 2019)

Facts:
Suresh Koirala shared extremist content on Facebook encouraging violent attacks.

Issue:
Whether social media posts can be used as admissible evidence in terrorism cases.

Judgment:

Court ruled that digital posts are admissible if properly preserved under the Electronic Transactions Act.

Facebook screenshots, logs from ISP, and expert verification of account ownership were accepted.

Outcome:

5 years imprisonment.

Demonstrated that online content can form the basis of prosecution if authenticated.

Significance:

Set a precedent for using social media as primary evidence in online terrorism cases.

🧩 Case 2: State v. Binod Thapa & Ors (NKP 2077, 2020)

Facts:
Binod Thapa and accomplices recruited Nepalese youths online for extremist training abroad.

Issue:
Attribution and authenticity of online recruitment communications.

Judgment:

Court admitted chat logs, email correspondence, and payment records as evidence.

Expert testimony confirmed IP addresses linked to defendants.

Outcome:

Organizers: 10 years imprisonment.

Recruitment facilitators: 7 years imprisonment.

Significance:

Established importance of cyber forensic expert verification in linking online activity to physical individuals.

🧩 Case 3: State v. Ramesh Adhikari (NKP 2078, 2021)

Facts:
Ramesh Adhikari shared bomb-making manuals via encrypted messaging apps. Authorities intercepted his communications after obtaining legal authorization.

Issue:
Challenges in decrypting messages and proving intent.

Judgment:

Court accepted decrypted content as evidence due to lawful interception and expert authentication.

Intent to facilitate terrorism established through patterns of communication and prior warnings.

Outcome:

12 years imprisonment.

Significance:

Reinforced that lawful decryption and forensic analysis are essential for prosecution.

🧩 Case 4: State v. Maya Gurung (NKP 2079, 2022)

Facts:
Maya Gurung maintained a website promoting terrorist ideology and fundraising.

Issue:
Whether online fundraising for terrorism constitutes a criminal act under Nepalese law.

Judgment:

Court confirmed that fundraising with knowledge of terrorist activities is a crime under Sections 167–171 of the Criminal Code.

Evidence included bank transfers, website logs, and domain registration records.

Outcome:

8 years imprisonment.

Confiscation of funds.

Significance:

Highlighted the need to track digital financial transactions in online terrorism cases.

🧩 Case 5: State v. Raju Shrestha & Ors (NKP 2080, 2023)

Facts:
Raju Shrestha used Telegram to plan attacks on government installations with accomplices abroad.

Issue:
Jurisdiction and cross-border evidence challenges.

Judgment:

Court emphasized collaboration with INTERPOL and foreign cybercrime units.

Logs and communications obtained through mutual legal assistance treaties (MLATs) were admitted.

Outcome:

Organizers: 15 years imprisonment.

International facilitators tried in absentia.

Significance:

Clarified that cross-border online terrorism prosecutions require international cooperation.

🧩 Case 6: State v. Hari Bahadur KC (NKP 2080, 2023)

Facts:
Hari Bahadur KC created multiple fake accounts to spread misinformation and radicalize followers online.

Issue:
Proving repeated acts of online terrorism and intent.

Judgment:

Court accepted digital pattern analysis, IP tracking, and metadata as evidence.

Multiple fake accounts traced to a single individual established intent and pattern.

Outcome:

7 years imprisonment.

Online accounts permanently blocked.

Significance:

Established the importance of digital behavioral analysis and pattern recognition in online terrorism prosecution.

4. Key Evidentiary Principles Derived

PrincipleExplanation
AuthenticationScreenshots, emails, and chat logs must be verified by cyber forensic experts.
Lawful InterceptionEncrypted content admissible only if legally obtained.
Chain of CustodyDigital evidence must be preserved and traceable from collection to court submission.
AttributionIP tracking, metadata, and digital footprints are necessary to link acts to individuals.
Cross-border EvidenceMutual legal assistance treaties and international cooperation often required.
Financial LinksOnline fundraising or financing terrorist activities must be traced through bank records and digital transactions.

5. Conclusion

Prosecuting online terrorism in Nepal presents unique evidentiary challenges:

Attribution of digital acts to real individuals.

Cross-border nature requiring international cooperation.

Preservation and authentication of rapidly disappearing digital evidence.

Use of experts to interpret encrypted and complex digital data.

Ensuring that procedural compliance with the Electronic Transactions Act and Cybercrime regulations is strictly followed.

The case law demonstrates that courts are willing to accept digital evidence, but prosecution success depends on rigorous preservation, verification, and expert testimony.

LEAVE A COMMENT