CFP last date
22 July 2024
Reseach Article

Forensic Mobile on IMO Messenger Services for Drug Trafficking using National Institute of Standard Technology Method

by Whuty Meidilla Vadice, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 40
Year of Publication: 2021
Authors: Whuty Meidilla Vadice, Imam Riadi
10.5120/ijca2021921793

Whuty Meidilla Vadice, Imam Riadi . Forensic Mobile on IMO Messenger Services for Drug Trafficking using National Institute of Standard Technology Method. International Journal of Computer Applications. 183, 40 ( Dec 2021), 22-29. DOI=10.5120/ijca2021921793

@article{ 10.5120/ijca2021921793,
author = { Whuty Meidilla Vadice, Imam Riadi },
title = { Forensic Mobile on IMO Messenger Services for Drug Trafficking using National Institute of Standard Technology Method },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2021 },
volume = { 183 },
number = { 40 },
month = { Dec },
year = { 2021 },
issn = { 0975-8887 },
pages = { 22-29 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number40/32195-2021921793/ },
doi = { 10.5120/ijca2021921793 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:19:17.014511+05:30
%A Whuty Meidilla Vadice
%A Imam Riadi
%T Forensic Mobile on IMO Messenger Services for Drug Trafficking using National Institute of Standard Technology Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 40
%P 22-29
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information technology is currently developing very rapidly in the community. With the development of information technology, there are many positive or negative impacts from the use of technology. The IMO application provides data transmission in real-time over the internet, allowing users to send group chat text messages, share photos, videos, and audio calls. Criminals also use the Instantapplication Messenger for activities illegal such as activity hacker, fraud, drug trafficking, and crimes cyber other.This study was conducted to obtain digital evidence to reveal a criminal case of narcotics transactions that occurred in the IMO application Messenger using the stages National Institute of Standards and Technology (namely, collection, examination, analysis, and reporting. The data collection process uses the data acquisition technique DD Command that runs on the santoku Linux system. Autopsy and FTK Imager tools are used to extract physical images from the data acquisition technique DD Command. The results of data acquisition obtained from the Autopsy tool are exported in CSV format, to make it easier to read the file using a simple program created, namely CSV Reader.Based on the results of the study using the DD Command acquisition technique running on the santoku Linux system, it is possible to find the folder structure and its contents in the IMO application Messenger. Calculation of the percentage of index numbers from evidence obtained on smartphones using Autopsy tools is 100% and FTKImager there is 20% and 80% is not found in the evidence of information data in images, audio, call logs, and contacts.The Autopsy tool, which is used to extract physical images from the DD Command, can find deleted chats, images, and audio that can be used as information to help uncover crime cases on social media, while the FTKtool Imager can only find the text of the perpetrator's conversation.

References
  1. FS Mutma, "Description of Understanding Cyberbullying in Social Media in Students," J. Komun., vol. 13, no. 2, p. 165–182, 2019, doi:10.21107/communication.v13i2.5928.
  2. Muhammad Kukuh Tri Haryanto, “Forensics Analysis of SQLite Database on Android-Based IMO Applications,” p. 17, 2018.
  3. P. Widiandana, I. Riadi, and Sunardi, "Analysis of Forensic Investigations of Cyberbullying on Whatsapp Messenger Using the NIST Method," Semin. Nas. Technol. Fac. Engineering Univ. Krisnadwipayana, p. 488–493, 2019, [Online]. Available at: https://jurnal.teknikunkris.ac.id/index.php/semnastek2019/article/view/308.
  4. M. Fitriana, KA AR, and JM Marsya, "Application of the National Institute of Standards and Technology (Nist) Methods in Digital Forensic Analysis for Handling Cyber ​​Crime," Cybersp. J. Educator. Technol. inf., vol. 4, no. 1, p. 29–39, 2020, doi:10.22373/cj.v4i1.7241.
  5. RY Prasongko, A. Yudhana, and A. Fadil, "Forensic analysis of kakaotalk applications using the national institute standard technology method," Semin. Nas. information. 2018 (semnasIF 2018) UPN “Veteran” Yogyakarta, 24 Novemb. 2018 ISSN 1979-2328, vol. 2018, no. November, p. 129–133, 2018.
  6. MS Asyaky, “Analysis and Comparison of Digital Evidence of Instant Messenger Applications on Android,” J. Researcher. Tech. information., vol. Vol. 3 No., No. 1, p. 220–231, 2019.
  7. D. Hariyadi and IY Pasa, “Dual Whatsapp Apps on Xiaomi Phones,” J. INTEK, vol. 1, p. 1–7, 2018.
  8. ATB SITUNGKIR, “Juridical Review of Digital Forensics in Analyzing Digital Evidence in Criminal Acts Proof because of Law No. 11 of 2008 Junto Law N0 19 of 2016 concerning Information and Electronic Transactions, vol. 53, no. 9, p. 1689–1699, 2013.
  9. B. Raharjo, “An Overview of Digital Forensics,” J. Sociotechnology, vol. 12, no. 29, p. 384–387, 2013, doi:10.5614/sostek.itbj.2013.12.29.3.
  10. R. Montasari, “Review and Assessment of the Existing Digital Forensic Investigation Process Models,” Int. J. Comput. app., vol. 147, no. 7, p. 41–49, 2016, doi:10.5120/ijca2016911194.
  11. I. Alsmadi, R. Burdwell, A. Aleroud, A. Wahbeh, M. Al-Qudah, and A. Al-Omari, “Mobile Forensics,” Pract. inf. Secure., Thing. 297–308, 2018, doi:10.1007/978-3-319-72119-4_13.
  12. S. Madiyanto, H. Mubarok, and N. Widiyasono, “Mobile Forensics Investigation Mobile Forensics Investigation Process on IOS-Based Smartphones,” J. Rekayasa Sist. eng., vol. 4, no. 01, p. 93–98, 2017, doi:10.25124/jrsi.v4i01.149.
  13. IZ Yadi and YN Kunang, "National Conference on Computer Science (KONIK) 2014 Forensic Analysis on the Android Platform," Conf. Nas. Computer Science., Thing. 142, 2014, [Online]. Available at: http://eprints.binadarma.ac.id/2191/.
  14. MR Setyawan, A. Yudhana, and A. Fadlil, "Identification of Skype Digital Evidence on Android Smartphones Using the National Institute Of Justice (NIJ)" MethodSemnastek, p. 565–570, 2019.
  15. BY Prasetyo and I. Riadi, “Investigation Cyberbullying on Kik Messenger using National Institute of Standards Technology Method,” Int. J. Comput. app., vol. 174, no. 17, p. 34–41, 2021, doi:10.5120/ijca2021921060.
  16. S. Lasmadi, "Arrangement of Evidence in Cybercrimes," J. Ilmu Huk. Jambi, vol. 5, no. 2, p. 43274, 2014.
  17. S. Gumuda, “Dynamics of the process of changes in concentration of methane in the air of ventilation currents in mines.,” vol. 2, no. 2, p. 13–21, 1978.
  18. AN Ichsan and I. Riadi, “Mobile Forensic on Android-based IMO Messenger Services using Digital Forensic Research Workshop (DFRWS) Method,” Int. J. Comput. app., vol. 174, no. 18, p. 34–40, 2021, doi: 10.5120/ijca2021921076.
  19. DA Arifah, “CYBERCRIME CASE IN INDONESIA Indonesia's Cybercrime Case,” J. Bisnis and Ekon., vol. 18, no. 2, p. 185–195, 2011.
  20. V. Retno and G. Leri, “Data Search for Pornographic Content on Twitter Services using National Institute of Standard and Technology (NIST) Method,” vol. 183, no. 24, p. 25–31, 2021.
  21. A. P. Utami, “Mobile Forensics Analysis of Line Messenger on Illegal Drug Transaction Case using National Institute of Standard Technology ( NIST ) Method,” vol. 183, no. 32, hal. 23–33, 2021.
  22. SG Mukri, “Educational Measures for Handling Drug Abuse,” 'Is, vol. 3, no. 1, p. 25–30, 2019, doi:10.15408/is.v3i1.10983.
  23. AG Gani, “Cybercrime (Computer Based Crime),” J. Sist. inf., vol. 5, no. 1, p. 16–29, 2018./article/view/18.
  24. WM Yolandi, “Legal Aspects of Narcotics Trading Transactions in the Border Areas Between the Republic of Indonesia and Malaysia,” Dedik. J. Mhs., vol. 1, no. 1, p. 232–249, 2020.
  25. Mustafa, I. Riadi, and R. Umar, “E-mail Forensic Investigation Design with the National Institute of Standards and Technology (NIST),” Method9th Snst, vol. 9, p. 121–124, 2018,
  26. MI Syahib, I. Riadi, and R. Umar, "Digital Forensic Analysis of Beetalk Applications for Cybercrime Handling Using the NIST Method," Semin. Nas. information., vol. 2018, no. November, p. 134, 2018.
Index Terms

Computer Science
Information Sciences

Keywords

Forensics Mobile IMO Messenger Cybercrime NIST