Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Data Search for Pornographic Content on Twitter Services using National Institute of Standard and Technology (NIST) Method

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2021
Vioni Retno Gita Leri, Imam Riadi

Vioni Retno Gita Leri and Imam Riadi. Data Search for Pornographic Content on Twitter Services using National Institute of Standard and Technology (NIST) Method. International Journal of Computer Applications 183(24):25-31, September 2021. BibTeX

	author = {Vioni Retno Gita Leri and Imam Riadi},
	title = {Data Search for Pornographic Content on Twitter Services using National Institute of Standard and Technology (NIST) Method},
	journal = {International Journal of Computer Applications},
	issue_date = {September 2021},
	volume = {183},
	number = {24},
	month = {Sep},
	year = {2021},
	issn = {0975-8887},
	pages = {25-31},
	numpages = {7},
	url = {},
	doi = {10.5120/ijca2021921610},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


The development of mobile device technology, especially on social media to interact with two or more people, has become a necessity that cannot be separated from daily life. Twitter is an online social networking and microblogging service that allows its users to send and read text-based messages,Twitter is currently experiencing rapid growth and is popular throughout the world, due to its high popularity, Twitter is often used for various purposes at this time Twitter is the social media with the highest pornographic content contributor. This study will scenario the crime case using the Twitter application that runs on application mobile using the NIST stages related to the topic of cyberporn distribution. The stages of theforensics National Institute of Standards and Technology (NIST)are collection, examination, analysis, and reporting. This study uses a smartphone with a rooted condition and the Twitter application is installed. The crime case scenario in cyberporn this research is the distribution of pornographic content on Twitter based on examples of existing cases. The process of collecting digital evidence through the Twitter API and using two forensic tools, namely MOBILedit forensic express and SQLite. This study produces digital evidence in the form of account information, posts or tweets that have been deleted including text, images and videos from smartphone a rooted.The results of the evidence obtained will be given to the court if needed, to assist in the law enforcement process to uncover digital crime cases.


  1. T. E. Damayanti, "Utilization of Twitter as Media Information Sharing in Libraries (Case Study About Utilization of Social Media Twitter as Media Information Sharing in Libraries of City 2Surabaya)."
  2. I. Riadi, S. Sunardi, and A. A. Kadim, “Monitoring of Mobile Native Application Logs Using the Grr Rapid Response Framework,” J. Buana Inform., vol. 10, no. 1, p. 1, 2019, doi:10.24002/jbi.v10i1.1909.
  3. D. Hariyadi, U. Jenderal, and A. Yani, "Identification of Conversation Evidence on the Dual Apps Whatsapp Application," no. November, 2018, doi:10.13140/RG.2.2.20253.56805.
  4. I. Riadi, R. Umar, and I. M. Nasrulloh, "Digital Forensic Analysis on Frozen Solid State Drives Using the National Institute of Justice (NIJ)," MethodElinvo (Electronics, Informatics, Vocat. Educ., vol. 3, no. 1, pp. 70–82, 2018, doi: 10.21831/elinvo.v3i1.19308.
  5. R. Umar and Sahiruddin, “Nist Method For Forensic Analysis of Digital Evidence On Android Devices,” Pros. SENDU_U_2019, p. 978–979, 2019.
  6. E. S. Wijaya, “Analysis of Digital Evidence on Android Random Access Memory Using the Live Forensic Method of Child Abduction Cases,” Media Pratama Journal, pp. 1–11, 2017.
  7. M. N. Fadillah, R. Umar, and A. Yudhana, “Design of the Nist Method for Forensic Android-Based Mobile Payment Applications,” Semin. Nas. Inform. 2018 (semnasIF 2018), vol. 2018, no. November, pp. 115–119, 2018, [Online] Available at:
  8. R. Y. Prasongko, A. Yudhana, and A. Fadil, “Forensic analysis of the KakaoTalk application using national institute s method standard technology,” Semin. Nas. information. 2018 (semnasIF 2018) UPN “Veteran” Yogyakarta, 24 Novemb. 2018 ISSN 1979-2328, vol. 2018, no. November, p. 129–133, 2018.
  9. H. Nurhairani and I. Riadi, “Analysis of Mobile Forensics on Twitter Application using the National Institute of Justice (NIJ) Method,” Int. J. Comput. app., vol. 177, no. 27, p. 35–42, 2019, doi:10.5120/ijca2019919749.
  10. B. Carrier, “Open {Source} {Digital} {Forensics} {Tools}: {The} {Legal} {Argument}," no. October, 2002.
  11. S. Pambayun dan I. Riadi, “Investigation on Instagram Android-based using Digital Forensics Research Workshop Framework,” Int. J. Comput. Appl., vol. 175, no. 35, hal. 15–21, 2020, doi: 10.5120/ijca2020920904.
  12. R. Umar, A. Yudhana, and M. Nur Faiz, "Performance Analysis of Live Forensics Methods for Random Access Memory Investigations in Proprietary Systems," Pros. conf. Nas. The 4 Asos. program. Postgraduate. teacher. Muhammadiyah High, no. June 2016, p. 207–211, 2016.
  13. R. Montasari, “Review and Assessment of the Existing Digital Forensic Investigation Process Models,” Int. J. Comput. Appl., vol. 147, no. 7, pp. 1–9, 2016.
  14. Buyens, Jim. 2001. Web Database Development. Elex Media Komputindo. Jakarta
  15. I. Riadi, R. Umar, and A. Firdonsyah, “Identification of Digital Evidence on Android's Blackberry Messenger Using NIST Mobile Forensic Method,” Int. J. Comput. science. inf. Secur., vol. 15, no. 5, p. 3–8, 2017.
  16. I. Publication, “International Journal of Computer Science and Information Security (IJCSIS),” Int. J. Comput. science. inf. Secur. IJCSIS, vol. 9, no. 6, p. 355, 2011, [Online]. Available at:
  17. M. S. Ahmad, I. Riadi, and Y. Prayudi, “A Live Forensic Investigation from the User's Side to Analyze Man in the Middle Attack Attacks Based on Evil Twins,” Ilk. J. Ilm., vol. 9, no. 1, p. 1–8, 2017, doi:10.33096/ilkom.v9i1.103.1-8.
  18. T. Pandela and I. Riadi, “Browser Forensics on Webbased Tiktok Applications,” 2020.
  19. P. W. Setyaningsih, Y. Prayudi, and B. Sugiantoro, "Management of Digital Evidence from the Acquisition of Dfxml," J. Tek. information., vol. 11, no. 1, p. 47–54, 2018, doi:10.15408/jti.v11i1.6680.
  20. R. Saputra dan I. Riadi, “Forensic Browser of Twitter based on Web Services,” Int. J. Comput. Appl., vol. 175, no. 29, hal. 34–39, 2020, doi: 10.5120/ijca2020920832.
  21. M. N. Faiz, R. Umar, and A. Yudhana, "Analysis of Live Forensics for Comparison of Email Security on Proprietary Operating Systems," Ilk. J. Ilm., vol. 8, no. 3, p. 242–247, 2016, doi:10.33096/ilkom.v8i3.79.242-247.
  22. A. Yudhana, I. Riadi, and I. Anshori, “Analysis of Digital Evidence for Facebook Messenger Using the Nist Method,” It J. Res. Dev., vol. 3, no. 1, p. 13–21, 2018, doi:10.25299/itjrd.2018.vol3(1).1658.
  23. Raka, Z. D, “4523/Kom-D/Sd-S1/2021 Analysis of P3Sps Violations on Bigo Live Application Shows,” 2021.


Forensics, Cellular, Twitter, Cyberporn, NIST