Articles

IDENTIFICATION OF DIGITAL EVIDENCE FACEBOOK MESSENGER ON MOBILE PHONE WITH NATIONAL INSTITUTE OF STANDARDS TECHNOLOGY (NIST) METHOD

Main Article Content

Anton Yudhana Imam Riadi Ikhwan Anshori

Abstract

Facebook Messenger is a popular social media. The increasing number of Facebook Messenger users certainly has a positive and negative impact, one of the negative effects is being used for digital crime. One of the sciences to get digital evidence is to do Digital forensics. Digital forensics can be done on a smartphone used by criminals. This research will carry out as much evidence of digital crime as possible from Facebook Messenger. In this study the forensic devices, Magnet AXIOM and Oxygen Forensics Suite 2014 were used using the National Institute of Standards Technology (NIST) method. NIST has work guidelines for both policies and standards to ensure that each examiner follows the same workflow so that their work is documented and the results can be repeated and maintained. The results of the research in the Magnet AXIOM and Oxygen Forensics Suite 2014 get digital evidence in the form of accounts, conversation texts, and images. This study successfully demonstrated the results of an analysis of forensic devices and digital evidence on Facebook Messenger. The results of the performance evaluation of forensic tools in the acquisition process using AXIOM Magnets are considered the best compared to Oxygen Forensics Suite 2014.

Downloads

Download data is not yet available.

Article Details

How to Cite
YUDHANA, Anton; RIADI, Imam; ANSHORI, Ikhwan. IDENTIFICATION OF DIGITAL EVIDENCE FACEBOOK MESSENGER ON MOBILE PHONE WITH NATIONAL INSTITUTE OF STANDARDS TECHNOLOGY (NIST) METHOD. Jurnal Ilmiah Kursor, [S.l.], v. 9, n. 3, jan. 2019. ISSN 2301-6914. Available at: <http://kursorjournal.org/index.php/kursor/article/view/152>. Date accessed: 19 apr. 2019. doi: https://doi.org/10.28961/kursor.v9i3.152.
Section
Articles

References

[1] S. Sahiruddin, I. Riyadi, and S. Sunardi, “Forensic Analysis Of Security With Fingerprint Recovery On Android Smartphone,” Pros. Sensei 2017, vol. 1, no. 1, 2017.
[2] I. Riadi, J. Eko, A. Ashari, and S. -, “Internet Forensics Framework Based-on Clustering,” Int. J. Adv. Comput. Sci. Appl., vol. 4, no. 12, pp. 115–123, 2013. [3] M. Faiz, R. Umar, A. Yudhana, and U. A. Dahlan “Performance Analysis Method Of Live Forensics Investigation To Random Access Memory On A Proprietary System,” no. April, 2017.
[4] A. Mahajan, M. S. Dahiya, and H. P. Sanghvi, “Forensic Analysis of Instant Messenger Applications on Android Devices,” Int. J. Comput. Appl., vol. 68, no. 8, pp. 38–44, 2013.
[5] J. Fahana, U. Rusydi, and R. Faizin, “The utilization of the Telegram as a Notification for the purposes of Forensic Network Attacks,” Query J. Inf. Syst., vol. 1, no. 2, pp. 6–14, 2017.
[6] T. D. Larasati and B. C. Hidayanto, “Analisis Live Forensics Untuk Perbandingan Aplikasi Instant Messenger Pada Sistem Operasi Windows 10,” Sesindo, vol. 6, no. November, pp. 456–256, 2017.
[7] F. Albanna and I. Riadi, “Forensic Analysis of Frozen Hard Drive Using Static Forensics Method,” Int. J. Comput. Sci. Inf. Secur., vol. 15, no. 1, pp. 173–178, 2017.
[8] I. Riadi and R. Umar, “Identification Of Digital Evidence On Android ’ s,” vol. 15, no. 5, pp. 3–8, 2017.
[9] S. Bommisetty, R. Tamma, and H. Mahalik, Practical Mobile Forensics.
[10] R. A. Putra, A. Fadlil, and I. Riadi, “Forensic Mobile On Android-Based Smartwach,” Jurti, vol. 1, no. 1. pp. 41–47, 2017.
[11] A. Thufail, S. Michrandi, and B. Irawan, “Analysis And Implementation Of Mobile Forensic Recovery Of Lost Data On A Smartphone-Based Android Operating System,” pp. 1–6, 2013.

[12] M. Sasmito, “Utilization Of Social Media Facebook For Indonesian Language Learning Media,” vol. 1, no. 2, pp. 184–198, 2015.
[13] R. Umar, I. Riadi, and G. maulana Zamroni, “A Comparative Study of Forensic Tools for WhatsApp Analysis using NIST Measurements,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 12, pp. 69–75, 2017.
[14] C. Anglano, “Forensic analysis of WhatsApp Messenger on Android smartphones,” Digit. Investig., vol. 11, no. 3, pp. 1–13, 2014.
[15] K. Kent, S. Chevalier, T. Grance, and H. Dang, “Guide to integrating forensic techniques into incident response,” 2006.
[16] C. A. Murphy, “Developing Process for Mobile Device Forensics,” pp. 1–9, 2012.