scholarly journals ANALISIS LIVE FORENSIC PADA WHATSAPP WEB UNTUK PEMBUKTIAN KASUS PENIPUAN TRANSAKSI ELEKTRONIK

2021 ◽  
Vol 4 (1) ◽  
pp. 24-32
Author(s):  
Syaza Dyah Utami ◽  
Carudin Carudin ◽  
Azhari Ali Ridha
Keyword(s):  
Log File ◽  

Internet tidak hanya memberikan manfaat bagi masyarakat, namun juga dapat menimbulkan dampak negatif. Salah satunya yaitu kejahatan dunia maya. Sosial media yang sering digunakan oleh masyarakat dapat disalahgunakan untuk dijadikan sebagai media kejahatan. Salah satunya melalui sosial media yang popular di Indonesia, yaitu Whatsapp. Kasus penipuan melalui aplikasi Whatsapp sering terjadi di Indonesia, sehingga memerlukan penanganan lebih lanjut agar kasus kejahatan tersebut dapat diselesaikan dan pelaku dapat mempertanggungjawabkan perbuatannya. Live forensic sebagai cabang ilmu Digital Forensic dapat digunakan untuk mencari bukti digital terkait kasus penipuan dari perangkat bukti yang masih dalam kondisi menyala (on). Tujuan penelitian ini adalah untuk membuktikan kasus penipuan transaksi elektronik pada Whatsapp web dengan menggunakan metode Live forensic. Metodologi NIST (National Institute of Standards and Technology) dengan tahapan koleksi, pemeriksaan, analisis, dan reporting digunakan pada penelitian ini. Pencarian bukti digital dilakukan pada laptop pelaku, sedangkan smartphone korban dijadikan sebagai pembanding. Bukti digital yang dianalisis berupa teks percakapan, gambar, dan video. Live forensic dilakukan dengan RAM imaging serta akuisisi log file, cache, dan riwayat browser dengan menggunakan FTK Imager dan Browser History Viewer. Hasil penelitian yaitu teks percakapan, filename gambar, filename video, timestamp, history, nomor rekening pelaku, dan nomor handphone korban yang merupakan bukti digital untuk pembuktian kasus. Bukti digital dari proses Live Forensic merupakan bukti yang sah berdasarkan UU Nomor 11 Tahun 2008 Tentang Informasi dan Transaksi Elektronik.

2020 ◽  
Vol 8 (4) ◽  
pp. 381
Author(s):  
I Gusti Ngurah Guna Wicaksana ◽  
I Ketut Gede Suhartana

Abstract The development of telecommunications has increased very rapidly since the internet-based instant messaging service has spread rapidly to Indonesia. Telegram application is one of the growing and well-known application services in Indonesia, Desktop or smartphone-based Telegram applications, it is very possible to use digital crimes by using services, user personal information, or by hacking the Telegram application. This study explains the stages of investigation of cybercrime cases that occurred in desktop-based telegram. The method used for this research refers to the stage of investigation that was carried out in previous studies, namely using the National Institute of Justice (NIJ) method with the stages of the preparation stage, the collection stage, the examination stage, the analysis stage, and the reporting stage. The media used in this study is a desktop-based Telegram application that is synchronized with an Android-based Telegram. In this process, the location of the log file, cache, and digital proof image file was obtained in the conversation of a desktop-based Telegram application. Digital forensic evidence obtained is expected to strengthen evidence of criminal cases in court in the form of digital evidence analysis results. Keywords: Telecommunications, Digital Forensic, Telegram, Investigation, Cybercrime


Author(s):  
Himal Lalla ◽  
Stephen Flowerday ◽  
Tendai Sanyamahwe ◽  
Paul Tarwireyi
Keyword(s):  

2012 ◽  
Vol 601 ◽  
pp. 342-346
Author(s):  
Fei Zhao ◽  
Jing Sheng Zhang ◽  
Zhong Xia Wang

The UFS file system of Solaris is not supported undelete operation, so it is a difficult thing to digital forensic. This paper based on the UFS documents of 10 Solaris’ the log file system and the physical structure of UFS file system’s storage, putting forward the method of digital forensic for it. In cases of actual digital forensic for Solaris 10, it can restore the required documents, so this method has good effect


2016 ◽  
Vol 136 (6) ◽  
pp. 858-867
Author(s):  
Hitoshi Kamei ◽  
Osamu Yashiro ◽  
Takaki Nakamura

2012 ◽  
Vol 3 (2) ◽  
pp. 298-300 ◽  
Author(s):  
Soniya P. Chaudhari ◽  
Prof. Hitesh Gupta ◽  
S. J. Patil

In this paper we review various research of journal paper as Web Searching efficiency improvement. Some important method based on sequential pattern Mining. Some are based on supervised learning or unsupervised learning. And also used for other method such as Fuzzy logic and neural network


2017 ◽  
Vol 2 (11) ◽  
pp. 8-16
Author(s):  
Moses Ashawa ◽  
Innocent Ogwuche

The fast-growing nature of instant messaging applications usage on Android mobile devices brought about a proportional increase on the number of cyber-attack vectors that could be perpetrated on them. Android mobile phones store significant amount of information in the various memory partitions when Instant Messaging (IM) applications (WhatsApp, Skype, and Facebook) are executed on them. As a result of the enormous crimes committed using instant messaging applications, and the amount of electronic based traces of evidence that can be retrieved from the suspect’s device where an investigation could convict or refute a person in the court of law and as such, mobile phones have become a vulnerable ground for digital evidence mining. This paper aims at using forensic tools to extract and analyse left artefacts digital evidence from IM applications on Android phones using android studio as the virtual machine. Digital forensic investigation methodology by Bill Nelson was applied during this research. Some of the key results obtained showed how digital forensic evidence such as call logs, contacts numbers, sent/retrieved messages, and images can be mined from simulated android phones when running these applications. These artefacts can be used in the court of law as evidence during cybercrime investigation.


2020 ◽  
Vol 2 ◽  
pp. 100117
Author(s):  
Victor R. Kebande ◽  
Phathutshedzo P. Mudau ◽  
Richard A. Ikuesan ◽  
H.S. Venter ◽  
Kim-Kwang Raymond Choo
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document