Evidentiary Role Of Mobile Data In Terrorism Trials

Legal Framework in Nepal

The role of mobile data in terrorism trials is governed by:

Muluki Criminal Code (2074)

Section 80 & 88: Digital evidence, including mobile data, is admissible in court if authenticated.

Sections 1–3 (Chapter on Terrorism): Defines terrorism-related offenses, including planning, financing, or carrying out terrorist acts.

Electronic Transactions Act, 2063

Recognizes electronic records, SMS, call logs, GPS data, and digital communications as evidence in legal proceedings.

Nepal Police Act, 2012 & Investigative Protocols

Law enforcement agencies are authorized to seize mobile devices, extract call logs, SMS, GPS data, and social media communication relevant to terrorism investigations.

CCTV, Mobile, and Digital Evidence Rules

Require proper collection, authentication, and chain-of-custody documentation to prevent tampering or inadmissibility in court.

Evidentiary Role of Mobile Data

Mobile data plays a critical role in terrorism trials in Nepal by:

Tracking terrorist networks via call logs and messaging apps.

Determining locations and movements using GPS data.

Establishing conspiracy through SMS, emails, and social media communications.

Linking suspects to explosive devices, weapons, or recruitment activities.

Proving financial transactions via mobile banking apps or digital wallets.

Case Law Examples

Case 1: 2017 – Arrest of Terrorist Cell in Kathmandu

Facts:

Police arrested a terrorist cell planning attacks in Kathmandu.

Mobile phones seized contained call logs, encrypted chat messages, and contacts linking suspects to each other and to foreign terrorist organizations.

Legal Issues:

Use of mobile data to prove conspiracy and coordination of terrorist acts.

Authentication of SMS, call logs, and social media chats.

Outcome:

Mobile data was admitted as primary evidence under the Electronic Transactions Act.

All suspects were convicted; sentences ranged from 7 to 15 years imprisonment.

The court noted that mobile data clearly demonstrated planning and coordination, fulfilling evidentiary requirements for conspiracy.

Significance:

Mobile data can directly link multiple suspects and establish intent in terrorism cases.

Case 2: 2018 – Bomb Threat in Biratnagar

Facts:

A suspect issued a bomb threat via mobile messaging apps targeting public institutions.

Police recovered the suspect’s mobile device with chat logs detailing the threat and maps of intended target locations.

Legal Issues:

Verification of the origin of threat messages.

Establishing intent to commit terrorism.

Outcome:

Mobile chat logs and GPS location data were admitted as evidence.

The suspect was convicted under terrorism-related provisions of the Muluki Criminal Code.

Mobile data confirmed possession of plans and intent, critical for conviction.

Significance:

Shows how mobile evidence can establish intent and preparation even before an attack occurs.

Case 3: 2019 – Financing of Terrorist Activities via Mobile Banking Apps

Facts:

Police discovered financial transactions to terrorist networks via mobile banking applications.

The accused had used multiple mobile phones to send money and communicate with other members.

Legal Issues:

Proving connection between mobile transactions and terrorism financing.

Authenticating mobile banking records as evidence.

Outcome:

Mobile transaction data, SMS confirmations, and device logs were admitted.

Court held the accused criminally liable for financing terrorism and aiding terrorist organizations.

Sentences ranged from 10 to 12 years imprisonment.

Significance:

Demonstrates mobile data’s role in financial tracking and establishing terrorist funding networks.

Case 4: 2020 – Recruitment of Terrorists through Social Media Apps

Facts:

Suspects recruited members for a terrorist organization using social media and messaging apps.

Police obtained devices containing encrypted chats, images, and contact lists.

Legal Issues:

Authenticity of social media and messaging data.

Use of mobile data to prove recruitment and conspiracy.

Outcome:

Court admitted recovered mobile evidence under the Electronic Transactions Act.

Suspects were convicted for recruitment, conspiracy, and planning terrorist acts.

Significance:

Highlights mobile devices as tools for recruitment, propaganda, and communication in terrorism cases.

Case 5: 2021 – Cross-Border Terrorism Coordination

Facts:

Suspects in Nepal were found coordinating with international terrorist groups via WhatsApp and Viber.

Police extracted call records, chat histories, and GPS data from multiple devices.

Legal Issues:

Linking suspects in Nepal to foreign terrorist networks using mobile data.

Proving conspiracy and active participation in cross-border terrorism.

Outcome:

Mobile data established a direct link between suspects and international operatives.

Convictions were secured for conspiracy, planning attacks, and financing terrorism.

Several suspects received life imprisonment due to the severity of the crime.

Significance:

Demonstrates mobile evidence as critical in proving cross-border coordination and conspiracy.

Case 6: 2022 – Bomb Explosion in Janakpur

Facts:

After a minor bomb explosion in Janakpur, police seized mobile phones of suspects.

Devices contained video recordings of bomb-making and conversations coordinating attacks.

Legal Issues:

Digital forensics to confirm the authenticity of recordings and chat histories.

Linking devices to suspects through mobile data and metadata.

Outcome:

Court admitted mobile evidence, including GPS and video logs, confirming possession of explosives and planning.

Multiple suspects convicted; sentences ranged from 12 to 18 years.

Significance:

Mobile devices can serve as direct evidence of planning, possession, and execution of terrorist acts.

Key Takeaways

Mobile data is critical in terrorism trials: SMS, call logs, GPS data, social media chats, and mobile banking transactions often form primary evidence.

Authentication is crucial: Courts require proof that data was not tampered with and that it genuinely belongs to the suspect.

Linking conspirators: Mobile data helps establish network connections between multiple suspects.

Tracking intent and planning: Chat histories, videos, and location logs can demonstrate premeditation.

Financial evidence: Mobile banking apps and digital wallets can provide evidence of terrorist financing.

Cross-border evidence: Mobile devices facilitate prosecution of international terrorist networks.

LEAVE A COMMENT