scholarly journals IDENTIFICATION OF DIGITAL EVIDENCE FACEBOOK MESSENGER ON MOBILE PHONE WITH NATIONAL INSTITUTE OF STANDARDS TECHNOLOGY (NIST) METHOD

Kursor ◽  
2019 ◽  
Vol 9 (3) ◽  
Author(s):  
Anton Yudhana ◽  
Imam Riadi ◽  
Ikhwan Anshori

Facebook Messenger is a popular social media. The increasing number of Facebook Messenger users certainly has a positive and negative impact, one of the negative effects is being used for digital crime. One of the sciences to get digital evidence is to do Digital forensics. Digital forensics can be done on a smartphone used by criminals. This research will carry out as much evidence of digital crime as possible from Facebook Messenger. In this study the forensic devices, Magnet AXIOM and Oxygen Forensics Suite 2014 were used using the National Institute of Standards Technology (NIST) method. NIST has work guidelines for both policies and standards to ensure that each examiner follows the same workflow so that their work is documented and the results can be repeated and maintained. The results of the research in the Magnet AXIOM and Oxygen Forensics Suite 2014 get digital evidence in the form of accounts, conversation texts, and images. This study successfully demonstrated the results of an analysis of forensic devices and digital evidence on Facebook Messenger. The results of the performance evaluation of forensic tools in the acquisition process using AXIOM Magnets are considered the best compared to Oxygen Forensics Suite 2014.

Symmetry ◽  
2020 ◽  
Vol 12 (1) ◽  
pp. 104 ◽  
Author(s):  
Sandeepak Bhandari ◽  
Vacius Jusas

Acquiring a clear perspective of events and artefacts that occur over time is a challenging objective to accomplish in digital forensics. Reconstruction of the timeline of events and artefacts, which enables digital investigators to understand the timeline of digital crime and interpret the conclusion in the form of digital evidence, is one of the most paramount and challenging tasks in digital forensics. This challenging task requires the analysis of immense amounts of events because of the explosive growth of the internet, interconnected devices, and innovative technology nowadays. Various approaches have been developed during the last decade, but most of them are not able to handle huge volumes of data, explore evidence, and enhance the understandability of timelines in a competent way to assist the investigator. For this purpose, we introduce a methodology backed by an abstraction concept and forensic tools that can support investigators during the reconstruction, understanding of the timeline of events and artefacts, and interpretation of evidence by tracing the activities performed by users of the typical computer system. The Java programming language is used to implement the proposed methodology, which is object-oriented and follows the symmetry definition in software. Generally, symmetry in software can be viewed as an invariant change that aims to preserve a specific property of the system, namely its structure, behaviour, regularity, similarity, familiarity and uniformity. Similarly, the abstraction-based methodology also permits us to follow the properties of symmetry. For instance, a uniform structure is stipulated for all the sources at the particular level of abstraction, such as the number of fields to be considered to provide the abstract level of timeline. The primary purpose of this approach is to assist with the analysis of the timeline in an optimum way. This paper illustrates the approach and then focuses on conceptual aspects of the methodology. The performed experiment shows that the proposed approach enhanced the analysis of the timeline.


2021 ◽  
Vol 5 (1) ◽  
pp. 45-54
Author(s):  
Imam Riadi ◽  
Rusydi Umar ◽  
Muhammad Irwan Syahib

Viber is one of the most popular social media in the Instant Messenger application category that can be used to send text messages, make voice calls, send picture messages and video messages to other users. As many as 260 million people around the world have used this application. Increasing the number of viber users certainly brings positive and negative impacts, one of the negative impacts of this application is the use of digital forensic crime. This research simulates and removes digital crime evidence from the viber application on Android smartphones using the National Institute of Standards Technology (NIST) method, which is a method that has work guidelines on forensic policy and process standards to ensure each investigator follows the workflow the same so that their work is documented and the results can be accounted for. This study uses three forensic tools, MOBILedit Forensic Express, Belkasoft and Autopsy. The results in this study show that MOBILedit Forensic Express gets digital evidence with a percentage of 100% in getting accounts, contacts, pictures and videos. While proof of digital chat is only 50%. Belkasoft gets digital evidence with a percentage of 100% in getting accounts, contacts, pictures and videos. While proof of digital chat is only 50%. For Autopsy does not give the expected results in the extraction process, in other words the Autopsy application gives zero results. It can be concluded that MOBILedit Forensic Express and Belkasoft have a good performance compared to Autopsy and thus this research has been completed and succeeded in accordance with the expected goals.


2020 ◽  
Vol 2 (1) ◽  
pp. 17-27
Author(s):  
Mohammad Kamal

This study tries to find answers to the application of social media as a new form of culture in learning. SD Muhammadiyah 9 Malang which is the object of research has characteristics that are in line with the research theme. SD Muhammadiyah 9 Malang has implemented social media in the last few years. In the results of this study found many interesting things that can be said as a form of habit which in social language is called culture. In addition, the impact of this new learning culture is very positive. This means it is different from the previous community's understanding that social media must be kept away from children because it can interfere with learning. From the application of social media for learning, SD Muhammadiyah 9 Malang can encourage students to be creative, innovative and able to adapt critically to the negative effects of social media. Although there are some notes that need attention or just tips and tricks from teachers or teachers to avoid the negative impact of social media.


Author(s):  
Imam Riadi ◽  
Sunardi Sunardi ◽  
Muhamad Ermansyah Rauli

 The development of computer technology is increasing rapidly. This has positive and negative effects. One of the negative effects that occurred was the use of Line applications to conduct online shop fraud. Line is one of the instant messenger applications that can be used on computers, especially on Windows 8.1 operating system computers. Applications that run on the computer leave traces of data on Random Access Memory (RAM). Data left in RAM can be obtained using digital forensic techniques, namely live forensics which is used when the computer is running and connected to the internet. This study aims to find digital evidence regarding cases of online shop fraud using the National Institute of Standards and Technology (NIST) method. Digital evidence can be obtained using forensic tools, namely RamCapturer, FTK Imager and Winhex. RamCapturer is used to acquire data in RAM, FTK Imager is used for imaging and Winhex is used to analyze data that has been taken. The results obtained in this study were conversational recordings consisting of conversation time, conversation content and conversation status which could be digital evidence in uncovering the online shop fraud crime that occurred.


2020 ◽  
Vol 4 (3) ◽  
pp. 576-583
Author(s):  
Sunardi ◽  
Imam Riadi ◽  
Muh. Hajar Akbar

Steganography is one of the anti-forensic techniques that allow criminals to hide information in other messages so that during the investigation, the investigator will experience problems and difficulty in getting evidence of original information on the crime. Therefore an investigator is required to have the ability to be able to find and extract (decoding) using the right tools when opening messages that have been inserted by steganography techniques. The purpose of this study is to analyze digital evidence using the static forensics method by applying the six stages to the Digital Forensics Research Workshop (DFRWS) framework and extracting steganography on files that have been compromised based on case scenarios involving digital crime. The tools used are FTK Imager, Autopsy, WinHex, Hiderman, and StegSpy. The results of extraction of 9 out of 10 files that were scanned by steganography files had 90% success and 10% of steganography files were not found, so it can be concluded that the extraction files in steganographic messages can be used as legal digital proofs according to law.  


Author(s):  
Monika Arora ◽  
Yogita Gigras

The number of mobile phone users has increased exponentially in the past decade. In India itself, it has crossed to over 1.2 billion mobile phone users, with at least 45% being the smartphone users, and this number is growing by the day. Almost 75% of internet traffic is generated by Smartphone users, traffic growth is irrespective of the demography of users. In this chapter, the focus is on two main categories of users (i.e., adolescents and senior citizens), who are not very tech-savvy. It discusses the threat they face even in normal usage of smartphones, and how digital forensics shall provide a secure environment without compromising much on ease of usage. Android apps are prone to attacks by hackers as basic information shared by a user on social media turns out to be very lucrative information for intruders. This chapter discusses some of the methods adopted by digital forensic experts to deal with such cybercrimes, the software/hardware tools present in a smartphone, and what preventive steps shall be taken by users to safeguard themselves against cybercrimes.


Author(s):  
Karzan Wakil ◽  
Rebwar Nasraddin ◽  
Rajab Abdulrahan

In academia, social media is an educational tool that can attract students inside and outside classrooms and affect their total success. Using social media can have negative effects on the students like wasting time and social problems which have negative effects on grades and studying performance. In this work, conducted a survey in a basic school at Sulaymaniyah Governorate about the impact of using social media on students, Facebook particularly. We received 127 forms; then our analysis shows that using social media has a negative impact on students’ grades. Students who use Facebook for more than three hours had average grades of (66.88%), (73.59%) for one to three hours, and (%82.93) for less than an hour usage. Overall, every one hour using Facebook, the average score decreases by (%5.35). Therefore, decreasing the duration of using Facebook is helpful to increase the student’s average grades. Abstrak Dalam dunia pendidikan media sosial merupakan perangkat pendidikan yang dapat menarik perhatian siswa baik di dalam maupun di luar kelas dan memengaruhi kesuksesan mereka. Salah satunya wujudnya adalah penggunaan media sosial yang berlebihan dan membuahkan masalah-masalah sosial serta berimbas pada prestasi akademik mereka. Dalam penelitian ini peneliti melakukan survei di beberapa sekolah dasar di daerah Sulaimaniyah berkaitan dengan efek penggunaan media sosial, terutama Facebook, terhadap capaian akademik siswa. Balikan survei yang diterima oleh peneliti sejumlah 127 dokumen dan hasil analisis menunjukkan bahwa penggunaan media sosial berimbas negatif pada prestasi siswa. Rinciannya, siswa yang menggunakan Facebook lebih dari tiga jam rata-rata prestasinya 66,88%, untuk penggunaan antara satu hingga tiga jam rata-rata prestasinya 73,59%, dan untuk penggunaan di bawah satu jam rata-rata prestasinya 82,93%. Secara keseluruhan tiap penggunaan Facebook selama satu jam rata-rata prestasi siswa menurun 5,35%, oleh karena itu dapat disimpulkan bahwa pengurangan durasi penggunaan Facebook dapat membantu meningkatkan skor ratarata prestasi siswa  Keywords: Facebok; educational technology; social media; GPA


Author(s):  
Rauhulloh Ayatulloh Bintang ◽  
Rusydi Umar ◽  
Anton Yudhana

Social Media is becoming very popular among the public today, and the increasing number of social media use has of course a good or bad impact on the course of human life, for example the bad impact is doing cyberbully or chating on social media. Digital forensics is one of the sciences for how to catch criminals in digital which will be needed in evidence in court. Social media criminals need Smartphones to commit digital cybercrime. This research will raise evidence of digital crimes on the Facebook Lite application using forensics. In this study, the forensic tool that will be used is the MOBILEedit Forensic Pro forensic tools with the help of using methods NIST National Institute Of Standars Techlogogy. NIST has a good workflow for extracting digital forensic data. The research results will be obtained in the form of accounts Id, audio, conversations, and images


Author(s):  
Imam Riadi ◽  
Rusydi Umar ◽  
Arizona Firdonsyah

Blackberry Messenger is one of the popularly used instant messaging applications on Android with user’s amount that increase significantly each year. The increase off Blackberry Messenger users might lead to application misuse, such as for commiting digital crimes. To conduct investigation involving smartphone devices, the investigators need to use forensic tools. Therefore, a research on current forensic tool’s performance in order to handle digital crime cases involving Android smartphones and Blackberry Messenger in particular need to be done. This research focuses on evaluating and comparing three forensic tools to obtain digital evidence from Blackberry Messenger on Android smartphones using parameter from National Institute of Standard Technology and Blackberry Messenger’s acquired digital evidences. The result shows that from comparative analysis conducted, Andriller gives 25% performance value, Oxygen Forensic Suite gives 100% performance value, and Autopsy 4.1.1 gives 0% performance value. Related to National Institute of Standard Technology parameter criterias, Andriller has performance value of 47.61%. Oxygen Forensic Suite has performance value of 61.90%. Autopsy 4.1.1 has performance value of 9.52%.


2021 ◽  
Vol 15 ◽  
Author(s):  
Hao Li ◽  
Jingyi Yue ◽  
Yufeng Wang ◽  
Feng Zou ◽  
Meng Zhang ◽  
...  

The prevalence of mobile phone addiction (MPA) has increased rapidly in recent years, and it has had a certain negative impact on emotions (e.g., anxiety and depression) and cognitive capacities (e.g., executive control and working memory). At the level of neural circuits, the continued increase in activity in the brain regions associated with addiction leads to neural adaptations and structural changes. At present, the spontaneous brain microstates that could be negatively influenced by MPA are unclear. In this study, the temporal characteristics of four resting-state electroencephalogram (RS-EEG) microstates (MS1, MS2, MS3, and MS4) related to mobile phone addiction tendency (MPAT) were investigated using the Mobile Phone Addiction Tendency Scale (MPATS). We attempted to analyze the correlation between MPAT and corresponding microstates and provide evidence to explain the brain and behavioral changes caused by MPA. The results showed that the total score of the MPATS was positively correlated with the duration of MS1, related to phonological processing and negatively correlated with the duration of MS2, related to visual or imagery processing, and MS4, related to the attentional network; the score of the withdrawal symptoms subscale was additionally associated with duration of MS3, related to the cingulo-opercular emotional network. Based on these results, we believe that MPAT may have some negative effects on attentional networks and sensory brain networks; moreover, withdrawal symptoms may induce some negative emotions.


Sign in / Sign up

Export Citation Format

Share Document