scholarly journals Forensic Data Acquisition in UAVs Using the Static Forensic Method to Obtain Digital Evidence

Author(s):  
Septyan Prastya ◽  
Subhan Cipta
Author(s):  
Nur Widiyasono ◽  
Imam Riadi ◽  
Ahmad Luthfi

Layanan Private Cloud Computing memiliki potensi terjadinya penyalahgunaan yang dilakukan oleh internal di dalam perusahaan, sebagai contoh kasus yang yang terjadi di RSIA XYZ. Penyalahgunaan tersebut terjadi dikarenakan adanya kelemahan sistem yang digunakan ,ataupun sebab lain. Proses akuisisi data pada layanan cloud computing penanganannya tidaklah sama dikarenakan jenis dan karakteristik layanan cloud computing tersebut. Isu mengenai masalah realibilitas data atau bagaimana proses data digital evidence didapatkan, pada persidangan akan menjadi perhatian khusus bagi majelis hakim, sehingga untuk menangani masalah tersebut digunakanlah metode ADAM (The Advance Data Acquisition Model), sayangnya metode tersebut belum pernah dilakukan evaluasi secara independen. Penelitian ini menggunakan metode ADAM di dalam melakukan investigasi kasus pada layanan private cloud computing dan telah berhasil 100% menerapkannya, kemudian kontribusi pada penelitian ini telah menemukan penyebab potensi terjadinya penyalahgunaan layanan aplikasi owncloud tersebut.   Kata kunci— Akusisi, ADAM, Cloud, Forensik, Investigasi


2020 ◽  
Vol 5 (2) ◽  
pp. 13-18
Author(s):  
Muhammad Rizki Setyawan ◽  
Anton Yudhana ◽  
Abdul Fadlil

The development of instant messenger, especially Skype applications is growing rapidly. Skype users are usually used as tools to share information using an Android smartphone. The large number of Skype users can be misused for carrying out criminal activities such as illegal goods transactions in the form of vape drugs among Skype users. This case can be resolved by getting digital evidence from the Skype application left on an Android smartphone using the Forensic Digial method. The forensic method used in this study is the National Institute of Justice (NIJ) with several stages, namely identification, collection, examination, analysis, and reporting while the Oxygen Forensic Suite software is used for data acquisition. The results obtained successfully obtained all the desired evidence from the two smartphones that installed Skype, namely EVERCROSS and SAMSUNG J2 in the form of a profile account, contact person, conversation text and image file with the percentage of Skype data acquisition results from the EVERCROSS B75 smartphone succeeding in getting 48% data, and Skype data acquisition results from SAMSUNG J2 managed to get 100% data.


1990 ◽  
Vol 51 (C2) ◽  
pp. C2-939-C2-942 ◽  
Author(s):  
N. DINER ◽  
A. WEILL ◽  
J. Y. COAIL ◽  
J. M. COUDEVILLE

2018 ◽  
Vol 5 (2) ◽  
pp. 73-83
Author(s):  
Hussein Abed Ghannam

WhatsApp is a giant mobile instant message IM application with over 1billion users. The huge usage of IM like WhatsApp through giant smart phone “Android” makes the digital forensic researchers to study deeply. The artefacts left behind in the smartphone play very important role in any electronic crime, or any terror attack. “WhatsApp” as a biggest IM in the globe is considered to be very important resource for information gathering about any digital crime. Recently, end-to-end encryption and many other important features were added and no device forensic analysis or network forensic analysis studies have been performed to the time of writing this paper. This paper explains how can we able to extract the Crypt Key of “WhatsApp” to decrypt the databases and extract precious artefacts resides in the android system without rooting the device. Artefacts that extracted from the last version of WhatsApp have been analysed and correlate to give new valuable evidentiary traces that help in investigating. Many hardware and software tools for mobile and forensics are used to collect as much digital evidence as possible from persistent storage on android device. Some of these tools are commercial like UFED Cellebrite and Andriller, and other are open source tools such as autopsy, adb, WhatCrypt. All of these tools that forensically sound accompanied this research to discover a lot of artefacts resides in android internal storage in WhatsApp application.


2010 ◽  
Vol 6 (2) ◽  
pp. 43 ◽  
Author(s):  
Andreas H Mahnken ◽  

Over the last decade, cardiac computed tomography (CT) technology has experienced revolutionary changes and gained broad clinical acceptance in the work-up of patients suffering from coronary artery disease (CAD). Since cardiac multidetector-row CT (MDCT) was introduced in 1998, acquisition time, number of detector rows and spatial and temporal resolution have improved tremendously. Current developments in cardiac CT are focusing on low-dose cardiac scanning at ultra-high temporal resolution. Technically, there are two major approaches to achieving these goals: rapid data acquisition using dual-source CT scanners with high temporal resolution or volumetric data acquisition with 256/320-slice CT scanners. While each approach has specific advantages and disadvantages, both technologies foster the extension of cardiac MDCT beyond morphological imaging towards the functional assessment of CAD. This article examines current trends in the development of cardiac MDCT.


2020 ◽  
Vol E103.C (8) ◽  
pp. 345-352
Author(s):  
Zhongyuan ZHOU ◽  
Mingjie SHENG ◽  
Peng LI ◽  
Peng HU ◽  
Qi ZHOU

Sign in / Sign up

Export Citation Format

Share Document