Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Web Forensic for Hate Speech Content on Twitter Services using National Institute of Standard Technology Method

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2021
Suryani, Imam Riadi

Suryani and Imam Riadi. Web Forensic for Hate Speech Content on Twitter Services using National Institute of Standard Technology Method. International Journal of Computer Applications 183(40):30-38, December 2021. BibTeX

	author = {Suryani and Imam Riadi},
	title = {Web Forensic for Hate Speech Content on Twitter Services using National Institute of Standard Technology Method},
	journal = {International Journal of Computer Applications},
	issue_date = {December 2021},
	volume = {183},
	number = {40},
	month = {Dec},
	year = {2021},
	issn = {0975-8887},
	pages = {30-38},
	numpages = {9},
	url = {},
	doi = {10.5120/ijca2021921798},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Technological developments in addition to bringing many positive impacts also have negative impacts. The sophistication of various applications today allows the increase in crime cases online. These cases include gambling online, spreading hoax news, fraud, hate speech, cyberbullying, cyberporn, and other cyber cases. These crimes online are very often found in various social media applications, one of which is the Twitter application which is a social networking site that allows users to share things or events that are happening around the world. Users post tweets that can contain photos, videos, links, and text. This research conducts forensics on the Twitter application accessed via the web browser Chrome as the browser with the most users in Indonesia in 2020 according to Stat Counter. The research was conducted using case scenarios based on original cases obtained from various sources. The stages used in this research are the stages from the National Institute of Standards and Technology. These stages are collection, examination, analysis, and reporting. The process of collecting digital evidence is carried out using several forensic tools, namely Belkasoft RAM Capturer, FTK Imager, Browser History Capturer, and Browser History Viewer. This research produces digital evidence in the form of tweets previously deleted or posts that can be retrieved, along with other data. The percentage of results of the digital evidence that has been found successfully 100%.InBelkasoft RAM Capturer and FTK Imager is 50% with digital evidence of text posted, username, password, and web browser history. In Browser History Capturer and Browser History Viewer is 50%with digital evidence of image posted, web browser history, profile photo of the twitter account, and time accessed. The results of this research managed to find evidence of posts that have been deleted.


  1. P. Widiandana, I. Riadi, and Sunardi, “Cyberbullying Forensic Investigation Analysis on Whatsapp Messenger Using the NIST Method” Semin. Nas. Teknol. Fak. Tekinik Univ. Krisnadwipayana, pp. 488–493, 2019, [Online]. Available:
  2. D. Hariyadi and I. Y. Pasa, “Dual Apps Whatsapp on Xiaomi Smartphones” J. INTEK, vol. 1, pp. 1–7, 2018.
  3. G. H. A. Kusuma and Y. Fadhilah, “Digital Forensic Analysis of E-Commerce on Car Rental Websites Using the NIST Method” Pros. Semin. Nas. SISFOTEK, vol. 3, no. 1, pp. 228–234, 2019.
  4. R. Umar and Sahiruddin, “NIST Method For Forensic Analysis Of Digital Evidence On Android Devices” Pros. SENDU_U_2019, pp. 978–979, 2019.
  5. W. A. Mukti, S. U. Masruroh, and D. Khairani, “Analysis and Comparison of Forensic Evidence Facebook and Twitter Social Media Applications on Android Smartphones” J. Tek. Inform., vol. 10, no. 1, pp. 73–84, 2018, doi: 10.15408/jti.v10i1.6820.
  6. N. Iman, A. Susanto, and R. Inggi, “Analysis of the Digital Forensics in Cybercrime Investigations in Indonesia (Systematic Review)” J. Telekomun. dan Komput., vol. 9, no. 3, p. 186, 2020, doi: 10.22441/incomtech.v9i3.7210.
  7. I. Riadi, R. Umar, and A. Firdonsyah, “Identification Of Digital Evidence On Android’s Blackberry Messenger Using NIST Mobile Forensic Method,” Int. J. Comput. Sci. Inf. Secur., vol. 15, no. 5, pp. 3–8, 2017.
  8. A. Fauzan, I. Riadi, and A. Fadlil, “Digital Forensic Analysis On Line Messenger For Cybercrime Handling” Annu. Res. Semin., vol. 2, no. 1, pp. 159–163, 2017, [Online]. Available:
  9. S. Marini, “Digital Forensic Studies in Regulation in Indonesia” Semin. Nas. Energi Tek, pp. 103–106, 2018.
  10. T. Rochmadi, “Live Forensics for Anti-Forensic Analysis on a Web Browser Browzar Study Case” Indones. J. Bus. Intell., vol. 1, no. 1, p. 32, 2019, doi: 10.21927/ijubi.v1i1.878.
  11. M. Jannah, “Forensic Browser on Line Messenger Services for Handling Cyberfraud using National Institute of Standard Technology Method,” vol. 183, no. 30, pp. 9–16, 2021.
  12. T. Pandela and I. Riadi, “Browser Forensics on Web-based Tiktok Applications,” Int. J. Comput. Appl., vol. 175, no. 34, pp. 47–52, 2020, doi: 10.5120/ijca2020920897.
  13. D. Setiawan, R. Setiawan, R. Karunia, and I. W. S. Wicaksana, “Comparing Web Browser Performances” Ilmu Komput. Univ. Gunadarma, vol. 1, no. 1, pp. 1–6, 2007.
  14. K. Widatama, “Digital Evidence Storage Cabinet Concept Using XML Language Structure” no. September, pp. 8–14, 2017.
  15. A. Ivanović, The Wa y of Handling Evidence of Criminal Offences of Computer Crime. 2018.
  16. Y. Prayudi and D. S. Afrianto, “Anticipate Cybercrime Using Forensic Computer Techniques” J. Fak. Huk. UII, vol. 2005, no. Snati, 2005, [Online]. Available:
  17. M. S. Ahmad, I. Riadi, and Y. Prayudi, “Live Forensics Investigation From User Side To Analyze Man in the Middle Attack Attack Based on Evil Twin” Ilk. J. Ilm., vol. 9, no. 1, pp. 1–8, 2017, doi: 10.33096/ilkom.v9i1.103.1-8.
  18. M. Saifulloh and A. Ernanda, “Communication Privacy Management for Teenagers Alter Ego Account Users on Twitter” WACANA, J. Ilm. Ilmu Komun., vol. 17, no. 2, p. 235, 2018, doi: 10.32509/wacana.v17i2.652.
  19. R. Saputra and I. Riadi, “Forensic Browser of Twitter based on Web Services,” Int. J. Comput. Appl., vol. 175, no. 29, pp. 34–39, 2020, doi: 10.5120/ijca2020920832.
  20. M. Musyafaa, “Hate Speech: Perspectives and Ethics in Cyber Media” J. Ilm. Syi’ar, vol. 17, no. 2, p. 21, 2017, doi: 10.29300/syr.v17i2.891.
  21. H. Nurhairani and I. Riadi, “Analysis Forensics Mobile on Twitter Application using the National Institute of Justice (NIJ) Method,” Int. J. Comput. Appl., vol. 177, no. 27, pp. 35–42, 2019, doi: 10.5120/ijca2019919749.
  22. D. J. Ningrum, S. Suryadi, and D. E. Chandra Wardhana, “Hate Speech Study on Social Media” J. Ilm. KORPUS, vol. 2, no. 3, pp. 241–252, 2019, doi: 10.33369/jik.v2i3.6779.
  23. T. Davidson, D. Warmsley, M. Macy, and I. Weber, “Automated hate speech detection and the problem of offensive language,” Proc. 11th Int. Conf. Web Soc. Media, ICWSM 2017, pp. 512–515, 2017.
  24. A. Yudhana, I. Riadi, and I. Anshori, “Facebook Messenger Digital Evidence Analysis Using the NIST Method” It J. Res. Dev., vol. 3, no. 1, pp. 13–21, 2018, doi: 10.25299/itjrd.2018.vol3(1).1658.
  25. C. K. Herawati, “Forensic Browser on Facebook Services using National Institute of Standards Technology Method,” vol. 183, no. 30, pp. 17–24, 2021.


Forensic, Hate speech, Twitter, Browser, NIST