Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Mobile Forensic for Cyber Fraud Case on WhatsApp Services using National Institute of Standard Technology Method

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2021
Syofia Nur Aniza, Imam Riadi

Syofia Nur Aniza and Imam Riadi. Mobile Forensic for Cyber Fraud Case on WhatsApp Services using National Institute of Standard Technology Method. International Journal of Computer Applications 183(41):44-50, December 2021. BibTeX

	author = {Syofia Nur Aniza and Imam Riadi},
	title = {Mobile Forensic for Cyber Fraud Case on WhatsApp Services using National Institute of Standard Technology Method},
	journal = {International Journal of Computer Applications},
	issue_date = {December 2021},
	volume = {183},
	number = {41},
	month = {Dec},
	year = {2021},
	issn = {0975-8887},
	pages = {44-50},
	numpages = {7},
	url = {},
	doi = {10.5120/ijca2021921811},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


The development of information technology is very rapid, one of which is social media such as WhatsApp. WhatsApp is a communication medium that has many features and conveniences it. The ease with which WhatsApp is used has led to an increase in crimes such as buying and selling fraud online. This research was conducted with a conversation scenario about buying and selling fraud through-based WhatsApp mobile services. This research aims to restore evidence of conversations that have been deleted by applying the NIST forensic stages (National Institute of Standards and Technology), namely collection, examination, analysis, and reporting. Based on the test results from conversations (evidence) that have been deleted, it can be obtained using two tools, forensic namely MOBILedit Forensic Express and AccessData FTK Imager. Evidence obtained from a smartphone in the rooted form of user information, profile photo, phone number, picture, voice recording, date and time the message was sent/received. The evidence of conversation findings that have been found is 100%, user information is 50%, contacts smartphone are 100%, and the time when messages are sent/received is 50%. Smartphones are already at the root of secured evidence in accordance with the stages of digital forensics.


  1. I. Zuhriyanto, A. Yudhana, and I. Riadi, “Designing Digital Forensics on Twitter Applications Using Live Forensics Methods,” Semin. Nas. information. 2008 (semnasIF 2008), vol. 2018, no. November, pp. 86–91, 2018.
  2. Y. Yenni, I. Utnasari, and M. Rahmawati, “Socialization of The Utilization of Internet Information Technology Based on Social Media As Business And Transactions,” vol. 4, no. 1, pp. 1–6, 2021.
  3. B. Mahendra, “Adolescent Social Existence in Instagram (A Communication Perspective),” J. Visi Komun., vol. 16, no. 1, pp. 151–160, 2017.
  4. Julian Arisandi, “NEWS: Digital 2020: Indonesian Internet Users in Numbers,” Cyberthreat.Id. pp. 1–1, 2020, [Online]. Available:
  5. A. Aqmarina, A. Mujahidin, and M.zainudin, "Analysis of Social Media as a Promotional Media and Online Customer Review of Purchase Decisions at Beaqis Olshop," vol. 5, no. 1, pp. 1–8, 2021.
  6. T. Arifiyadi, “How Investigators Track Fraud Perpetrators in Online Selling," no. Iclc, 2019.
  7. A. Dermawan, Amalia, and Sudarmin, "The role of mothers in being aware of online shopping fraud on social media,"Communnity Dev. J., vol. 2, no. 2, pp. 214–218, 2021.
  8. J. Solim, MS Rumapea, A. Wijaya, B. Monica, and W. Lionggodinata, “Online Buying and Selling Site Fraud in Indonesia,” vol. 5, no. 1, pp. 96–109, 2019.
  9. R. Ayatulloh, K. Noor, R. Umar, and A. Yudhana, “Facebook Lite Social Media Analysis with Forensic tools using the NIST Method,” vol. 21, no. 2, pp. 125–131, 2020.
  10. P. Widiandana and I. Riadi, “Forensic Investigation Analysis of Cyberbullying on Whatsapp Messenger Using the National Institute Of Standards and Technology (NIST) Method,” pp. 488–493, 2019.
  11. MW Indriyanto, D. Hariyadi, and M. Habibi, “Digital Forensic Investigation and Analysis on WhatsApp Group Conversations Using NIST SP 800-86 and Support Vector Machine,” vol. 3, no. 2, pp. 34–38, 2020.
  12. MR Setyawan, A. Yudhana, A. Fadlil, P. Studi, M. Teknik, and UA Dahlan, “Identification of Skype Digital Evidence on Android Smartphones with the National Institute Of Justice (NIJ) Method, ” pp. 565–570, 2019.
  13. D. Ari Mukti, Vishnu; Ummi Masruroh, Siti; Khairani, “Analysis and Comparison of Forensic Evidence for Facebook and Twitter Social Media Applications on Android Smartphones,” no. May, 2020, doi: 10.15408/jti.v10i1.6820.
  14. B. Raharjo, “An Overview of Digital Forensics,” J. Sociotechnology, vol. 12, no. 29, pp. 384–387, 2013, doi:10.5614/sostek.itbj.2013.12.29.3.
  15. G. Hendita, A. Kusuma, and IN Prawiranegara, “Digital Forensic Analysis of CCTV Video Recordings Using Metadata and Hashes,” Pros. Semin. Nas. Sis. inf. and Technol., vol. 3, no. 1, pp. 223–227, 2019.
  16. AP Heriyanto, Mobile Phone Forensics: Theory: Mobile Phone Forensics and Security Series, 1st ed. Yogyakarta: Cv Offset Andi, 2016.
  17. S. Madiyanto, H. Mubarok, and N. Widiyasono, “Mobile Forensics Investigation Process of Mobile Forensics Investigation on IOS-Based Smartphones,” J. Rekayasa Sist. eng., vol. 4, no. 01, pp. 93–98, 2017, doi:10.25124/jrsi.v4i01.149.
  18. VRG Leri and I. Riadi, “Data Search for Pornographic Content on Twitter Services using National Institute of Standard and Technology (NIST) Method,” Int. J. Comput. app., vol. 183, no. 24, pp. 25–31, 2021, doi:10.5120/ijca2021921610.
  19. SM Dusu, “Mobile Forensic of Facebook Services using National Institute of Standard Technology (NIST) Method,” vol. 183, no. 33, pp. 9–15, 2021.
  20. MS Asyaky, “Analysis and Comparison of Digital Evidence of Instant Messenger Applications on Android,” J. Researcher. Tech. information., vol. Vol. 3 No., No. 1, pp. 220–231, 2019.
  21. IW Putra, A. Suharso, and C. Rozikin, “Digital Evidence Acquisition and Image Authenticity Detection on Whatsapp Using NIST and ELA Methods,” vol. 5, no. September, pp. 712–726, 2021.
  22. DA Imtinan, “Digital Forensics of Android-Based Facebook Messenger Services, Digital Forensics of Android-Based Facebook Messenger Services,” 2020.
  23. Intan Trivena Maria Daeng, N. . Mewengkang, and ER Kalesaran, “91161-ID-usage-smartphone-dalam-menunjang-ak,” e-journal “Acta Diurna,” vol. 1, no. 1, pp. 1–15, 2017.
  24. A. Sah, I. Riadi, and Y. Prayudi, “Online Gambling Digital Evidence Detection Using Live Forensics on Android-Based Smartphones,” CyberSecurity and Digit Forensics., vol. 1, no. 1, pp. 14–19, 2018.
  25. R. Kumalasari, DW Setiyanto, and AF Yogananti, “Preventing Online Sales and Purchase Fraud through Designing Public Service Advertisements,” 2016.
  26. AU Awaliah and HY Prabowo, “Analysis of the role of Polda D . I . Yogyakarta in disclosure,” vol. 3, pp. 140–156, 2021, doi:10.20885/ncaf.vol3.art13.
  27. I. Riadi, A. Yudhana, M. Caesar, and F. Putra, "Analysis of Digital Evidence Recovery for Instagram Messengers Using the National Institute of Standards and Technology (Nist) Method,"Semin. Nas. Technol. inf. and Commune. - Semant., pp. 161–166, 2017.
  28. DA Putri, “Forensic Mobile against Threat WhatsApp Services using National Institute of Standards Technology Method,” vol. 183, no. 30, pp. 1–8, 2021.
  29. AP Utami, “Mobile Forensics Analysis of Line Messenger on Illegal Drug Transaction Case using National Institute of Standard Technology (NIST) Method,” vol. 183, no. 32, pp. 23–33, 2021.
  30. M. Jannah, “Forensic Browser on Line Messenger Services for Handling Cyberfraud using National Institute of Standard Technology Method,” vol. 183, no. 30, pp. 9–16, 2021.


Forensics, WhatsApp, Smartphone, Fraud, NIST