scholarly journals Forensic Tool Comparison on Instagram Digital Evidence Based on Android with The NIST Method

2018 ◽  
Vol 5 (2) ◽  
pp. 235-247
Author(s):  
Imam Riadi ◽  
Anton Yudhana ◽  
Muhamad Caesar Febriansyah Putra

The growth of Android-based smartphone users to access media in communicating using Instagram social media is very fast. Activities are carried out when using Instagram social media in communicating to share information such as sending chat texts and pictures. A large number of Instagram users make this application vulnerable to abuse of Instagram such as pornography crimes from Instagram users. This case can be forensic to get digital evidence in the form of chat text and pictures from Instagram messenger is a feature of Instagram. The investigation in this study uses the National Institute of Standards and Technology (NIST) method which provides several stages of collecting, examining, analyzing, reporting while forensic tools use forensic oxygen and axiom magnets. The results of the recovery and comparison of data result using Oxygen forensics and Axiom Magnets obtained digital evidence in the form of data in the form of images and chat. The data obtained by Magnet Axiom is 100% while forensic oxygen is 84%. These data are the results of the performance of both forensic applications in obtaining digital evidence that has been deleted from the Instagram messenger.

Kursor ◽  
2019 ◽  
Vol 9 (3) ◽  
Author(s):  
Anton Yudhana ◽  
Imam Riadi ◽  
Ikhwan Anshori

Facebook Messenger is a popular social media. The increasing number of Facebook Messenger users certainly has a positive and negative impact, one of the negative effects is being used for digital crime. One of the sciences to get digital evidence is to do Digital forensics. Digital forensics can be done on a smartphone used by criminals. This research will carry out as much evidence of digital crime as possible from Facebook Messenger. In this study the forensic devices, Magnet AXIOM and Oxygen Forensics Suite 2014 were used using the National Institute of Standards Technology (NIST) method. NIST has work guidelines for both policies and standards to ensure that each examiner follows the same workflow so that their work is documented and the results can be repeated and maintained. The results of the research in the Magnet AXIOM and Oxygen Forensics Suite 2014 get digital evidence in the form of accounts, conversation texts, and images. This study successfully demonstrated the results of an analysis of forensic devices and digital evidence on Facebook Messenger. The results of the performance evaluation of forensic tools in the acquisition process using AXIOM Magnets are considered the best compared to Oxygen Forensics Suite 2014.


2020 ◽  
Vol 4 (5) ◽  
pp. 829-836
Author(s):  
Ikhsan Zuhriyanto ◽  
Anton Yudhana ◽  
Imam Riadi

Current crime is increasing, one of which is the crime of using social media, although no crime does not leave digital evidence. Twitter application is a social media that is widely used by its users. Acts of crime such as fraud, insults, hate speech, and other crimes lately use many social media applications, especially Twitter. This research was conducted to find forensic evidence on the social media Twitter application that is accessed using a smartphone application using the Digital Forensics Research Workshop (DFRWS) method. These digital forensic stages include identification, preservation, collection, examination, analysis, and presentation in finding digital evidence of crime using the MOBILedit Forensic Express software and Belkasoft Evidence Center. Digital evidence sought on smartphones can be found using case scenarios and 16 variables that have been created so that digital proof in the form of smartphone specifications, Twitter accounts, application versions, conversations in the way of messages and status. This study's results indicate that MOBILedit Forensic Express digital forensic software is better with an accuracy rate of 85.75% while Belkasoft Evidence Center is 43.75%.


2021 ◽  
Vol 8 (1) ◽  
pp. 1-9
Author(s):  
Rauhulloh Noor Bintang ◽  
Rusydi Umar ◽  
Anton Yudhana

The increase in social media use of Facebook lite by using Android-based smartphones is quite high. Activities when communicating through the social media network Facebook Lite Facebook lite can send a text message, image, or Video. Not a few users of Facebook lite social media abusing this app to commit fraud crimes, pornographic acts, or defamation actions from social media users Facebook lite. In such cases, it can be a digital forensic benchmark to get results from digital evidence from the Facebook lite application. In this investigation, National Institute of Standards and Technology NIST research methods with various stages, namely Collection, Examination, Analysis, and Reporting. While the forensic tools to be used are Magnet Axiom Forensic and MOBILedit Forensic Express Pro. Comparison and results of data conducted with forensic tools Magnet Axiom Forensic and MOBILedit Forensic Express Pro in the form of parameter data specified. Axiom Forensic Magnet data is 57.14% while MOBILedit Forensic Express Pro data is 85.71%. This data is the data of the performance results of both forensic tool applications in obtaining digital evidence on Facebook lite application.


Author(s):  
Роман Михайлович Морозов ◽  
Дмитрий Юрьевич Волков

Целью статьи было рассмотреть проблемные аспекты тактико-криминалистического применения технических средств при производстве допроса, предложить научно обоснованные рекомендации по их использованию. В статье раскрываются особенности применения технико-криминалистических средств процессуально уполномоченными должностными лицами органов предварительного следствия и дознания при производстве допроса подозреваемых (обвиняемых), в отношении которых избрана мера пресечения в виде заключения под стражу. По результатам проведенных исследований правоприменительной практики и научной литературы авторами раскрываются процессуальные и тактические основания и порядок применения технических средств при производстве допроса на отдельных его этапах, предлагаются решения проблем, связанных с применением технико-криминалистических средств, даются рекомендации по порядку применения отдельных технических средств. Выделяются наиболее целесообразные тактические приемы допроса при применении технических средств фиксации. Авторами предложены изменения в уголовно-процессуальное законодательство по совершенствованию законодательных норм в области применения технических средств при производстве следственных действий. Сформулированные в статье выводы могут быть использованы в правоприменительной практике следователями (дознавателями) при производстве допроса в следственном изоляторе, а также при преподавании отдельных дисциплин: «Уголовный процесс», «Криминалистика», а также специальных курсов (по выбору) уголовно-правового профиля. The purpose of the article was to consider the problematic aspects of the tactical and forensic use of technical means during the interrogation, to offer evidence-based recommendations for their use. The article reveals the features of the use of technical and forensic means by the procedurally authorized officials of the preliminary investigation and inquiry bodies during the interrogation of suspects (accused), in respect of which a preventive measure in the form of detention has been chosen. According to the results of the research of law enforcement practice and scientific literature, the authors reveal the procedural and tactical grounds and the procedure for the use of technical means during the interrogation at its individual stages, offers solutions to problems associated with the use of technical and forensic means, gives some recommendations on the order of application of individual technical means. The most appropriate tactics of interrogation, the use of technical facilities of fixation. The authors propose changes to the criminal procedure legislation to improve the legislative norms in the field of application of technical means in the investigative actions realization. The conclusions formulated in the article can be used in law enforcement practice by investigators (inquirers) during the interrogation in the pretrial detention center, as well as in the teaching of certain disciplines: «Criminal procedure», «Criminalistics», as well as special courses (optional) of criminal law profile.


2017 ◽  
Vol 2 (11) ◽  
pp. 8-16
Author(s):  
Moses Ashawa ◽  
Innocent Ogwuche

The fast-growing nature of instant messaging applications usage on Android mobile devices brought about a proportional increase on the number of cyber-attack vectors that could be perpetrated on them. Android mobile phones store significant amount of information in the various memory partitions when Instant Messaging (IM) applications (WhatsApp, Skype, and Facebook) are executed on them. As a result of the enormous crimes committed using instant messaging applications, and the amount of electronic based traces of evidence that can be retrieved from the suspect’s device where an investigation could convict or refute a person in the court of law and as such, mobile phones have become a vulnerable ground for digital evidence mining. This paper aims at using forensic tools to extract and analyse left artefacts digital evidence from IM applications on Android phones using android studio as the virtual machine. Digital forensic investigation methodology by Bill Nelson was applied during this research. Some of the key results obtained showed how digital forensic evidence such as call logs, contacts numbers, sent/retrieved messages, and images can be mined from simulated android phones when running these applications. These artefacts can be used in the court of law as evidence during cybercrime investigation.


Author(s):  
Emily Sullivan ◽  
Mark Alfano

People have always shared information through chains and networks of testimony. It is arguably part of what makes us human and enables us to live in cooperative communities with populations greater than 150 or so. The invention of the internet and the rise of social media have turbocharged our ability to share information. This chapter develops a normative epistemic framework for sharing information online. This framework takes into account both ethical and epistemic considerations that are intertwined in typical cases of online testimony. The authors argue that, while the current state of affairs is not entirely novel, recent technological developments call for a rethinking of the norms of testimony, as well as the articulation of a set of virtuous dispositions that people would do well to cultivate in their capacity as conduits (not just sources or receivers) of information.


2017 ◽  
Vol 8 (2) ◽  
pp. 30-39
Author(s):  
Mohammed Nasser Al-Suqri ◽  
Salim Said AlKindi ◽  
Abdullah Khamis Al-Kindi

This paper presents the findings of a review of literature to understand the issues facing the Sultanate of Oman in this area, and to identify international examples of best practice in the use of social media to promote political literacy among young people. Evidence-based recommendations for the Government of the Sultanate of Oman are developed, which include the provision of social media literacy training at school and university level, as well as the establishment of an online citizen engagement portal. By adopting international best practice in the use of social media to promote political literacy and citizen engagement among young people, it is believed that the Sultanate of Oman can provide a model for other Middle Eastern Arab states, helping to reduce the potential for political conflict in these countries and promoting participatory approaches to policy-making which reflect the growing demands of young citizens.


Author(s):  
Esty Wulandari ◽  

Along with the rapid development of technology, the current use of social media by the community is also increasing. One of the social media that is currently on the rise is the TikTok application. TikTok application users come from various backgrounds and ages, including teenagers. Video-based TikTok features accompanied by music, writing, and pictures are considered attractive so that they are liked by teenagers as a means of showing their existence and self-disclosure. TikTok is also currently developing as a way to share information. The theory applied by the researcher was Alman and Taylor's Social Penetration Theory. In addition to such theory, this paper are supported and strengthened by the concepts of Self-Disclosure, Social Media, Teenagers, TikTok, and also Self-Existence. This paper was a qualitative descritpive study which applied a qualitative study method. This paper involved several informants namely teenagers who were also the users of the TikTok application. The inclusion criteria here were teenagers who had a TikTok account, were active on TikTok, and used TikTok as part of their existence and self-disclosure. The results of this study explored the process of self-disclosure and also the existence carried out by the informants in accordance with the stages proposed in the social penetration theory. Informants passed through the stages of self-disclosure sequentially from the orientation stage to the stable stage so that the existence of teenagers in presenting themselves on social media could be observed.


2020 ◽  
Author(s):  
Reka Solymosi ◽  
Oana Petcu ◽  
Jack Wilkinson

Police agencies globally are seeing an increase in reports of people going missing. These people are often vulnerable, and their safe and early return is a key factor in preventing them from coming to serious harm. One approach to quickly find missing people is to disseminate appeals for information using social media. Yet despite the popularity of twitter-based missing person appeals, presently little is known about how to best construct these messages to ensure they are shared far and wide. This paper aims to build an evidence-base for understanding how police accounts tweet appeals for information about missing persons, and how the public engage with these tweets by sharing them. We analyse 1,008 Tweets made by Greater Manchester Police between the period of 2011 and 2018 in order to investigate what features of the tweet, the twitter account, and the missing person are associated with levels of retweeting. We find that tweets with different choice of image, wording, sentiment, and hashtags vary in how much they are retweeted. Tweets that use custody images have lower retweets than Tweets with regular photos, while tweets asking the question “have you seen...?” and asking explicitly to be retweeted have more engagement in the form of retweets. These results highlight the need for conscientious, evidence-based crafting of missing appeals, and pave the way for further research into the causal mechanisms behind what affects engagement, to develop guidance for police forces worldwide.


Sign in / Sign up

Export Citation Format

Share Document