scholarly journals Comparative analysis of Forensic Tools on Twitter applications using the DFRWS method

2020 ◽  
Vol 4 (5) ◽  
pp. 829-836
Author(s):  
Ikhsan Zuhriyanto ◽  
Anton Yudhana ◽  
Imam Riadi

Current crime is increasing, one of which is the crime of using social media, although no crime does not leave digital evidence. Twitter application is a social media that is widely used by its users. Acts of crime such as fraud, insults, hate speech, and other crimes lately use many social media applications, especially Twitter. This research was conducted to find forensic evidence on the social media Twitter application that is accessed using a smartphone application using the Digital Forensics Research Workshop (DFRWS) method. These digital forensic stages include identification, preservation, collection, examination, analysis, and presentation in finding digital evidence of crime using the MOBILedit Forensic Express software and Belkasoft Evidence Center. Digital evidence sought on smartphones can be found using case scenarios and 16 variables that have been created so that digital proof in the form of smartphone specifications, Twitter accounts, application versions, conversations in the way of messages and status. This study's results indicate that MOBILedit Forensic Express digital forensic software is better with an accuracy rate of 85.75% while Belkasoft Evidence Center is 43.75%.

2021 ◽  
Vol 8 (1) ◽  
pp. 1-9
Author(s):  
Rauhulloh Noor Bintang ◽  
Rusydi Umar ◽  
Anton Yudhana

The increase in social media use of Facebook lite by using Android-based smartphones is quite high. Activities when communicating through the social media network Facebook Lite Facebook lite can send a text message, image, or Video. Not a few users of Facebook lite social media abusing this app to commit fraud crimes, pornographic acts, or defamation actions from social media users Facebook lite. In such cases, it can be a digital forensic benchmark to get results from digital evidence from the Facebook lite application. In this investigation, National Institute of Standards and Technology NIST research methods with various stages, namely Collection, Examination, Analysis, and Reporting. While the forensic tools to be used are Magnet Axiom Forensic and MOBILedit Forensic Express Pro. Comparison and results of data conducted with forensic tools Magnet Axiom Forensic and MOBILedit Forensic Express Pro in the form of parameter data specified. Axiom Forensic Magnet data is 57.14% while MOBILedit Forensic Express Pro data is 85.71%. This data is the data of the performance results of both forensic tool applications in obtaining digital evidence on Facebook lite application.


2017 ◽  
Vol 2 (11) ◽  
pp. 8-16
Author(s):  
Moses Ashawa ◽  
Innocent Ogwuche

The fast-growing nature of instant messaging applications usage on Android mobile devices brought about a proportional increase on the number of cyber-attack vectors that could be perpetrated on them. Android mobile phones store significant amount of information in the various memory partitions when Instant Messaging (IM) applications (WhatsApp, Skype, and Facebook) are executed on them. As a result of the enormous crimes committed using instant messaging applications, and the amount of electronic based traces of evidence that can be retrieved from the suspect’s device where an investigation could convict or refute a person in the court of law and as such, mobile phones have become a vulnerable ground for digital evidence mining. This paper aims at using forensic tools to extract and analyse left artefacts digital evidence from IM applications on Android phones using android studio as the virtual machine. Digital forensic investigation methodology by Bill Nelson was applied during this research. Some of the key results obtained showed how digital forensic evidence such as call logs, contacts numbers, sent/retrieved messages, and images can be mined from simulated android phones when running these applications. These artefacts can be used in the court of law as evidence during cybercrime investigation.


2018 ◽  
Vol 10 (1) ◽  
pp. 73-84
Author(s):  
Wisnu Ari Mukti ◽  
Siti Ummi Masruroh ◽  
Dewi Khairani

ABSTRAK Perkembangan teknologi internet dan smartphone yang semakin pesat diikuti pula oleh meningkatnya pengguna media sosial yang mengakses menggunakan smartphone khususnya Android. Salah satu permasalahan yang tak luput dari media sosial adalah tindak kejahatan dunia maya yang memanfaatkan media sosial. Karena pada dasarnya tidak ada kejahatan yang tidak meninggalkan jejak. Penelitian ini dilakukan untuk menemukan dan membandingkan bukti-bukti forensik tersebut pada aplikasi media sosial Facebook dan Twitter yang diakses pada smartphone Android. Facebook dan Twitter dipilih karena memiliki beberapa fitur yang mirip. Pada penelitian ini, metode simulasi digunakan dalam penelitian dengan menjalankan 11 skenario diantaranya adalah pengembalian file yang dihapus, pencarian bukti forensik berupa nama akun, lokasi, nomor telpon, tanggal lahir, photo profile, cover photo, posting berupa teks, posting berupa gambar, isi private message berupa teks dan isi private message berupa gambar. Hasil dari penelitian ini menunjukkan bahwa semua bukti forensik pada aplikasi media sosial Facebook berhasil ditemukan semua. Sedangkan pada aplikasi media sosial Twitter hanya berhasil ditemukan berupa nama akun, data lokasi, photo profile, cover photo, posting berupa teks dan posting berupa gambar.  ABSTRACT The development of internet technology and smartphones are increasing rapidly followed by increasing social media users who access using a smartphone, especially Android. One of the problems that did not escape from social media is cyber crime acts that utilize social media. Because basically no crime does not leave a trace. This study was conducted to find and compare the forensic evidence on social media applications Facebook and Twitter are accessed on Android smartphones. Facebook and Twitter are selected for having some similar features. In this study, the simulation method used in the research by running 11 scenarios such as the return of deleted files, the search for forensic evidence in the form of account name, location, phone number, birth date, photo profile, photo cover, text posts, Private message in the form of text and private message content in the form of picture. The results of this study indicate that all forensic evidence on Facebook social media applications found all. While in the social media application Twitter only managed to be found in the form of account name, location data, photo profile, photo cover, text posts and post images. How to Cite : Mukti, W.A. Masruroh, S.U. Khairani, D. (2017). Analisa dan Perbandingan Bukti Forensik Aplikasi Media Sosial Facebook dan Twitter pada Smartphone Android. Jurnal Teknik Informatika, 10(1), 73-84. doi:10.15408/jti.v10i1.6820Permalink/DOI: http://dx.doi.org/10.15408/jti.v10i1.6820


2020 ◽  
Vol 4 (4) ◽  
pp. 730-735
Author(s):  
Imam Riadi ◽  
Sunardi ◽  
Panggah Widiandana

Cyberbullying in group conversations in one of the instant messaging applications is one of the conflicts that occur due to social media, specifically WhatsApp. This study conducted digital forensics to find evidence of cyberbullying by obtaining work in the Digital Forensic Research Workshop (DFRWS). The evidence was investigated using the MOBILedit Forensic Express tool as an application for evidence submission and the Cosine Similarity method to approve the purchase of cyberbullying cases. This research has been able to conduct procurement to reveal digital evidence on the agreement in the Group's features using text using MOBILedit. Identification using the Cosine method. Similarities have supported actions that lead to cyberbullying with different levels Improved Sqrt-Cosine (ISC) value, the largest 0.05 and the lowest 0.02 based on conversations against requests.  


2019 ◽  
Vol 28 (13) ◽  
pp. 870-877
Author(s):  
Calvin Moorley ◽  
Theresa Chinn

Background: In 2016 the Nursing and Midwifery Council in the UK introduced revalidation, which is the process nurses are required to follow to renew their registration. This provides an opportunity for nurses to shape, develop and evolve social media to meet their professional requirements. Aims: to examine different ways nurses can use social media tools for continuous professional development (CPD) and revalidation. Methods: using a qualitative reflective design, data were gathered from content on the @WeNurses platform and activities organised with other leading health organisations in England. These data were analysed using the social media relationship triangle developed by the authors with a thematic analysis approach. Findings: analysis revealed that social media was used in six categories: publishing, sharing, messaging, discussing, collaborating, and networking. Organised social media events such as: blogs, tweetchats, Twitter storms, webinars, infographics, podcasts, videos and virtual book clubs can support nurses with revalidation and professional development. Conclusion: Through using a participatory CPD approach and embracing professional social media applications nurses have moved social media from the concept of a revolution to an evolution.


2021 ◽  
Vol 5 (1) ◽  
pp. 45-54
Author(s):  
Imam Riadi ◽  
Rusydi Umar ◽  
Muhammad Irwan Syahib

Viber is one of the most popular social media in the Instant Messenger application category that can be used to send text messages, make voice calls, send picture messages and video messages to other users. As many as 260 million people around the world have used this application. Increasing the number of viber users certainly brings positive and negative impacts, one of the negative impacts of this application is the use of digital forensic crime. This research simulates and removes digital crime evidence from the viber application on Android smartphones using the National Institute of Standards Technology (NIST) method, which is a method that has work guidelines on forensic policy and process standards to ensure each investigator follows the workflow the same so that their work is documented and the results can be accounted for. This study uses three forensic tools, MOBILedit Forensic Express, Belkasoft and Autopsy. The results in this study show that MOBILedit Forensic Express gets digital evidence with a percentage of 100% in getting accounts, contacts, pictures and videos. While proof of digital chat is only 50%. Belkasoft gets digital evidence with a percentage of 100% in getting accounts, contacts, pictures and videos. While proof of digital chat is only 50%. For Autopsy does not give the expected results in the extraction process, in other words the Autopsy application gives zero results. It can be concluded that MOBILedit Forensic Express and Belkasoft have a good performance compared to Autopsy and thus this research has been completed and succeeded in accordance with the expected goals.


Author(s):  
Poonkodi Mariappan ◽  
Padhmavathi B. ◽  
Talluri Srinivasa Teja

Digital Forensic as it sounds coerce human mind primarily with exploration of crime. However in the contemporary world, digital forensic has evolved as an essential source of tools from data acquisition to legal action. Basically three stages are involved in digital forensic namely acquisition, analysis and reporting. Digital Forensic Research Workshop (DFRW) defined digital forensic as “Use of Scientifically derived and proven method towards the identification, collection, analysis, interpretation, documentation and presentation of digital evidence derived from digital sources for the purpose of facilitating or furthering the reconstruction of event to be criminal”. The hard problem in digital forensic is such that the acquired data need to be cleaned and is required to be intelligible for reading by human. As a solution to this complexity problem a number of tools are present which may be repeated until relevant data is obtained.


Al-Risalah ◽  
2018 ◽  
Vol 17 (01) ◽  
pp. 23
Author(s):  
Aan Asphianto

This study analyzes the hate speech as a behavior that develops and cause social problems for the population. A speech of hatred into behaviors that are developed today, where the behaviors of people, whether it was saying about something implies write status in the social media or said that implies a hatred of another person may fall into the category of hate speech. The act if it is deliberately then it can be considered a crime, but if it's just pouring anger alone or intend to harm anyone is also categorized as a criminal offense. This social phenomenon that developed in Indonesian society should be anticipated in order not to cause conflict in society. other than that in the view of Islam, that Islam as a religion rahmatan lil Alamin, the basic principle in Islam prohibits defamation and incitement against others which resulted in the dispute, because in the Al-Hujurat: 11, God forbids all human beings to each other to spread hatred and insulting others, where the verse forbids mankind to do the speech of hatred. In this study using research doctrinal approach to legislation.


2020 ◽  
Vol 13 (1) ◽  
pp. 74
Author(s):  
Joko Sutarso

Abstrak. Penggunaan media sosial semakin meningkat dari tahun ke tahun, namun demikian tidak semua konten media sosial memiliki sisi positif. Beberapa dampak negatif penggunaan media sosial seperti penyebaran berita bohong (hoax), ujaran kebencian (hate speech), perundungan (cyberbullying) dan konten negatiflainnya merupakan bentuk-bentuk penyalahgunaan media sosial menjadi keprihatinan masyarakat karena telah memasuki  ranah sosial, politik, ekonomi dan bahkan keagamaan. Hal ini tidak terlepas dari kapitalisasi koorporasi media sosial yang terus berkembang dengan terpaan yang semakin meluas melintasi batas negara dan bangsa, masuk dalam kehidupan berbagai generasi, strata sosial ekonomi, tingkat pendidikan dan latar belakang pendidikan serta pengalaman. Metode yang digunakan dalam tulisan ini adalah teoritis kualitatif yang didasarkan pada pengamatan terhadap isi media sosial dan kajian teoritis yang berusaha menjelaskan pengaruh isi media terhadap perilaku masyarakat dalam bermedia sebagai bahan pengayaan  (enrichment) bagi kegiatan literasi media sosial di kalangan masyarakat bagi para pegiat literasi. Penjelasan teoritis yang dipakai meliputi aspek positif dan negatif dilihat dari aspek sosial, politik, psikologi, pendidikan dan kebudayaan. Hasilnya konten budaya lokal memiliki peluang mengisi konten dalam ruang media sosial dan konten budaya lokal yang selektif, kreatif, edukatif, dan sekaligus menghibur  dapat digunakan untuk meminimalkan dampak negatif globalisasi dan kapitalisme media sosial. Manfaat lain dari sosialisasi dari promosi budaya lokal di media sosial adalah untuk meningkatkan integrasi masyarakat karena didalamnya terdapat nilai-nilai kearifan lokal yang memiliki nilai bersifat nasional bahkan universal.Abstract. Social media uses have been increasing from year to year. However, not all social media content has a positive side. Some negative effects of social media from hoaxes, hate speech, cyberbullying to other negative content are the forms of abuse of social media. It is concern to the public because these have entered the social, political, economic and religious spheres. It is definitely inseparable from the capitalization of a social media corporation. It has been developing with increasingly widespread exposure across national borders, and it has been entering into the lives of various generations, socio-economic strata, education levels and educational backgrounds and experiences as well. The research method used in this research was a qualitative theoretical approach based on observations of social media content and theoretical studies. It aims at seeking to explain the influence of media content on people's behavior in their media use as the enrichment material for social media literacy activities in society for literacy activists. The theoretical explanations used in this research include positive and negative aspects. In this matter the social, political, psychological, educational and cultural perspectives will see the aspects. Moreover, the research results show that local cultural content has the opportunity to fill content in the social media space. Selective, creative, educative, and entertaining local cultural content can be used to minimize the negative effects of globalization and social media capitalism. Another benefit of socialization of local culture promotion on social media is to increase social integration because in the local culture there are local wisdom values and national or universal values as well.


Author(s):  
Imam Riadi ◽  
Sunardi Sunardi ◽  
Muhamad Ermansyah Rauli

 The development of computer technology is increasing rapidly. This has positive and negative effects. One of the negative effects that occurred was the use of Line applications to conduct online shop fraud. Line is one of the instant messenger applications that can be used on computers, especially on Windows 8.1 operating system computers. Applications that run on the computer leave traces of data on Random Access Memory (RAM). Data left in RAM can be obtained using digital forensic techniques, namely live forensics which is used when the computer is running and connected to the internet. This study aims to find digital evidence regarding cases of online shop fraud using the National Institute of Standards and Technology (NIST) method. Digital evidence can be obtained using forensic tools, namely RamCapturer, FTK Imager and Winhex. RamCapturer is used to acquire data in RAM, FTK Imager is used for imaging and Winhex is used to analyze data that has been taken. The results obtained in this study were conversational recordings consisting of conversation time, conversation content and conversation status which could be digital evidence in uncovering the online shop fraud crime that occurred.


Sign in / Sign up

Export Citation Format

Share Document