Prosecution Of Child Pornography On Dark Web
⚖️ Legal Framework
1. Nepalese Laws
Muluki Criminal (Code) Act, 2074 (2017) – Sections on pornography, child exploitation, cybercrimes, and trafficking.
Electronic Transactions Act, 2063 (2008) – Penalizes electronic distribution or storage of obscene materials.
Children’s Act, 2075 (2018) – Prohibits the production, distribution, or display of any sexualized image of minors.
Human Trafficking and Transportation (Control) Act, 2064 (2007) – Applies to online sexual exploitation as a form of child trafficking.
2. Indian Laws (for comparative context)
Information Technology (IT) Act, 2000, Sections 67A, 67B – Prohibit the creation, distribution, and transmission of child pornographic content.
Protection of Children from Sexual Offences (POCSO) Act, 2012 – Criminalizes any visual depiction of child sexual abuse, even through digital means.
Indian Penal Code (IPC) – Sections 292, 293 deal with obscene content, and 370 covers trafficking for sexual exploitation.
3. International Legal Instruments
Budapest Convention on Cybercrime (2001) – Framework for international cooperation in tracing digital crimes.
Optional Protocol to the UN Convention on the Rights of the Child (CRC) on the Sale of Children, Child Prostitution, and Child Pornography (2000) – Ratified by Nepal and India.
⚙️ Elements of the Crime
Creation or possession of child pornographic material (images, videos, or live-streams).
Transmission, storage, or sale via digital or encrypted networks (including the Dark Web).
Intent (mens rea) to exploit or distribute such content for sexual gratification or monetary gain.
Participation in online networks or forums dedicated to child exploitation.
Use of anonymization tools (Tor, VPNs, crypto-payments) to conceal identity.
📚 Case Law Analysis (Six Detailed Cases)
Case 1: Kathmandu “DarkNet Child Exploitation Network” Case (2019)
Facts:
Nepal Police Cyber Bureau uncovered a Dark Web group sharing explicit content of minors.
The investigation began after a report from Interpol linking Nepali IP addresses to a global child pornography network.
The suspects used encrypted browsers (Tor) and cryptocurrency to trade illegal material.
Legal Issues:
Whether possession and sharing of digital content of minors constitute “child pornography” under the Children’s Act 2075 and Electronic Transactions Act 2063.
Whether encrypted sharing on the Dark Web falls under jurisdiction.
Court Decision:
The Kathmandu District Court convicted three suspects under Sections 47 and 48 of the Electronic Transactions Act and Section 74 of the Children’s Act.
Sentences: 6 years imprisonment and fine of NRs. 300,000 each.
The court emphasized that “the Dark Web is not a lawless space; domestic cybercrime laws apply regardless of encryption.”
Key Principle:
Even indirect or encrypted distribution of child pornography constitutes a punishable offense.
Case 2: India – CBI v. Gautam Sood (2020) (Dark Web Case)
Facts:
CBI Cyber Unit arrested Gautam Sood, who operated a Dark Web forum hosting child sexual abuse material (CSAM).
He used anonymous cryptocurrency payments and hosted servers abroad.
Legal Issues:
Whether Indian authorities have jurisdiction over servers outside the country.
Liability for operating a website dedicated to child pornography.
Court Decision:
The Delhi High Court upheld the prosecution under Section 67B of the IT Act and Sections 13 and 14 of POCSO Act.
Held that jurisdiction exists if offenses affect Indian citizens or involve Indian networks.
Sentence: 10 years rigorous imprisonment, seizure of servers, and cryptocurrency wallet.
Key Principle:
Jurisdiction extends to foreign-hosted servers if criminal acts affect domestic users.
Case 3: Lalitpur – “Digital File Exchange” Case (2021)
Facts:
Police discovered a group exchanging child pornographic files on encrypted messaging apps like Telegram and Signal.
The accused argued that they were only "viewers," not distributors.
Legal Issues:
Whether mere possession or viewing of such content is punishable.
Whether sharing via closed groups amounts to "public distribution."
Court Decision:
The court ruled that possession, storage, and viewing of child pornography are punishable under Children’s Act Section 74(3).
Each accused received 3 years imprisonment and fines.
Key Principle:
Possession of pornographic content featuring minors is criminal, regardless of intent to distribute.
Case 4: Mumbai – State of Maharashtra v. Rohit Sharma (2018) (Dark Web Case)
Facts:
The accused ran a Dark Web page offering access to child pornography for payment via Bitcoin.
He used multiple aliases and servers in different countries.
Legal Issues:
Application of Section 67B IT Act and Section 14 POCSO Act for online activities.
Determining intent and jurisdiction for crimes committed through international networks.
Court Decision:
Court found sufficient digital trail connecting the accused’s wallet and email to the website.
Convicted for distribution and sale of obscene material involving minors.
Sentence: 10 years imprisonment, confiscation of digital assets.
Key Principle:
Selling access to child pornography via the Dark Web constitutes both cybercrime and organized sexual exploitation.
Case 5: Birgunj – “Schoolboy Dark Web Upload” Case (2022)
Facts:
A 17-year-old was caught uploading explicit content of minors (classmates) onto a Dark Web image-sharing forum.
The material was secretly recorded on mobile phones.
Legal Issues:
Whether minors can be prosecuted under Children’s Act for producing and sharing such material.
Balancing between rehabilitation and punishment.
Court Decision:
The juvenile was found guilty but treated under the Juvenile Justice provisions emphasizing reform.
Sentenced to one-year rehabilitation training and mandatory digital ethics education.
Key Principle:
Juveniles involved in child pornography cases are accountable but subject to reformative justice.
Case 6: Delhi – NIA v. Dark Web Syndicate (2021) (Cross-Border Operation)
Facts:
The National Investigation Agency (NIA) dismantled an international Dark Web ring operating from India, Nepal, and Bangladesh.
The network traded explicit child videos and images via encrypted links and cloud storage.
Legal Issues:
Applicability of Indian laws to cross-border criminal networks.
Validity of digital evidence seized from encrypted servers.
Court Decision:
The Special Court accepted digital evidence, including IP logs and blockchain transactions, as admissible under Section 65B of the Evidence Act.
Convicted main operators under IT Act Section 67B and POCSO Act Section 14.
Sentences ranged from 8–12 years imprisonment.
Key Principle:
Cross-border Dark Web child pornography rings are prosecutable under cyber and child protection laws using digital forensics.
⚖️ Key Legal Principles Derived from Cases
Jurisdiction extends beyond borders: Crimes on the Dark Web are prosecutable if they affect domestic citizens, even if hosted abroad.
Possession equals culpability: Viewing or downloading child pornographic content is punishable, not just production or sale.
Encrypted platforms offer no immunity: Dark Web anonymity tools (Tor, VPNs, crypto payments) do not protect offenders from liability.
Digital forensics as evidence: Courts rely heavily on digital logs, IP traces, and blockchain analysis for prosecution.
Juvenile offenders get reformative treatment: Courts treat minor offenders with educational or rehabilitative approaches.
State accountability and coordination: Cooperation between cyber units, Interpol, and digital forensics teams is critical for successful prosecutions.
🧾 Conclusion
Prosecution of child pornography on the Dark Web has evolved rapidly with the rise of advanced technology and encryption.
Both Nepalese and Indian courts have recognized the need to expand jurisdiction and strengthen digital evidence laws to ensure that online anonymity cannot shield offenders.
The cases highlight that intent, possession, and transmission—even within private encrypted spaces—are sufficient for criminal liability.

comments