Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

Cybercrime Data Search Fraud Case on Mobile based MiChat Service

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2022
Dimas Amirul Mu'minin, Imam Riadi

Dimas Amirul Mu'minin and Imam Riadi. Cybercrime Data Search Fraud Case on Mobile based MiChat Service. International Journal of Computer Applications 183(47):43-49, January 2022. BibTeX

	author = {Dimas Amirul Mu'minin and Imam Riadi},
	title = {Cybercrime Data Search Fraud Case on Mobile based MiChat Service},
	journal = {International Journal of Computer Applications},
	issue_date = {January 2022},
	volume = {183},
	number = {47},
	month = {Jan},
	year = {2022},
	issn = {0975-8887},
	pages = {43-49},
	numpages = {7},
	url = {},
	doi = {10.5120/ijca2022921880},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


The development of software such as Smartphones in this era is very fast along with technological development. Social media is the most popular technology today, one of which is MiChat. The search feature for nearby users on MiChat presents many users who can bring up cybercrime, pornography,gambling online, fraud and cyberbullying. This research uses the method of the National Institute of Standards and Technology (NIST) to uncover evidence of fraud on the application MiChat. National Institute of Standards and Technology (NIST) is a method with four stages, namely collection, examination, analysis, and reporting. This research begins with the stages of collecting, examining, analyzing, and reporting using two Smartphones with different conditions, namely Smartphones with conditions root and not rooted. The results of this study are in the form of proof with the condition that the Smartphone has been rooted and the Smartphone has not been rooted. The condition of the smartphone that has been rooted has found evidence in the form of account information MiChat, pictures and profile photos between the perpetrator and the victim, while on the Smartphone that is not rooted the evidence is not found at all but is used to compare the smartphone of the perpetrator. Evidence in the form of media data obtained from Smartphone rooted with a forensic success rate of more than 50% proves that there has been an act of fraud between the perpetrator and the victim and forensics carried out on a smartphone has succeeded in recovering the evidence needed to prove the fraud.


  1. M. Sumenge, “Fraud Using Internet Media in the Form of Buying and Selling Online,” Lex Crim., vol. 2, no. 4, pp. 102–112, 2013.
  2. I. Zuhriyanto et al., “Forensic Digital Design In Applications,” Semin. Nas. Inform., vol. 2018, no. November, pp. 86–91, 2018.
  3. K. Dwi, O. Mahendra, and I. K. Ari, “Digital Forensic Analysis of Michat Applications on Android as Digital Proof in Handling Online Prostitution Cases,” vol. 9, no. 3, pp. 381–390, 2021.
  4. R. Umar and Sahiruddin, “Nist Method For Forensic Analysis Of Digital Evidence On Android Device,” Pros. SENDU_U_2019, pp. 978–979, 2019.
  5. ahwan ahmadi, T. Akbar, and H. Mandala Putra, “Comparison of Forensic Tool Results on Android Smartphone Image Files Using the Nist Method,” JIKO (Jurnal Inform. dan Komputer), vol. 4, no. 2, pp. 92–97, 2021, doi: 10.33387/jiko.v4i2.2812.
  6. Z. Akbar, B. Nugraha, and M. Alaydrus, “Whatsapp Forensics On Android Smartphone  : a Survey,” Sinergi, vol. 20, no. 3, p. 207, 2016, doi: 10.22441/sinergi.2016.3.006.
  7. R. Rizal, I. Riadi, and Y. Prayudi, “Network Forensics for Detecting Flooding Attack on Internet of Things ( IoT ) Device,” Int. J. Cyber-Security Digit. Forensics, vol. 7, no. 4, pp. 382–390, 2018.
  8. N. Iman, A. Susanto, and R. Inggi, “Analysis of the Development of Digital Forensics in Cybercrime Investigations in Indonesia (Systematic Review),” J. Telekomun. dan Komput., vol. 9, no. 3, p. 186, 2020, doi: 10.22441/incomtech.v9i3.7210.
  9. A. Fauzan, I. Riadi, and A. Fadlil, “Digital Forensic Analysis On Line Messenger For Cybercrime Handling,” Annu. Res. Semin., vol. 2, no. 1, pp. 159–163,2017,[Online].Available:
  10. N. Nasirudin, S. Sunardi, and I. Riadi, “Forensic Analysis of Android Smartphones Using the NIST Method and the MOBILedit Forensic Express Tool,” J. Inform. Univ. Pamulang, vol. 5, no. 1, p. 89, 2020, doi: 10.32493/informatika.v5i1.4578.
  11. M. Dweikat, D. Eleyan, and A. Eleyan, “Digital Forensic Tools Used in Analyzing Cybercrime,” J. Univ. Shanghai Sci. Technol., vol. 23, no. 3, pp. 367–379, 2021, doi: 10.51201/jusst12621.
  12. I. F. Rohman, N. Widiyasono, and R. Gunawan, “Jurnal Sustainable :Journal of Applied Research and Industry Results Digital Evidence Analysis Simulation Skype Applications Android-Based using NIST SP 800 - 101 R1,” vol. 08, no. 01, 2019.
  13. S. Madiyanto, H. Mubarok, and N. Widiyasono, “Mobile Forensics Investigation Process on IOS Based Smartphone,” J. Rekayasa Sist. Ind., vol. 4, no. 01, pp. 93–98, 2017, doi: 10.25124/jrsi.v4i01.149.
  14. M. I. Syahib, I. Riadi, and R. Umar, “Digital Forensic Analysis Beetalk Application for Handling Cybercrime Using the NIST Method,” Semin. Nas. Inform., vol. 2018, no. November, p. 134, 2018, [Online].Available:
  15. I. Riadi, “Examination of Digital Evidence on Android-based LINE Messenger,” Int. J. Cyber-Security Digit. Forensics, vol. 7, no. 3, pp. 336–343, 2018, doi: 10.17781/p002472.
  16. I. Riadi, A. Yudhana, M. Caesar, and F. Putra, “1490-Article Text-2859-1-10-20190413,”Digital Evidence Acquisition on Android-Based Instagram Messenger Using National Institute Justice Method, vol. 4, pp. 219–227, 2018.
  17. I. Riadi, R. Umar, and A. Firdonsyah, “Forensic tools performance analysis on android-based blackberry messenger using NIST measurements,” Int. J. Electr. Comput. Eng., vol. 8, no. 5, pp. 3991–4003, 2018, doi: 10.11591/ijece.v8i5.pp3991-4003.
  18. I. Riadi, A. Yudhana, M. Caesar, and F. Putra, “Instagram Messenger Digital Evidence Recovery Analysis Using the National Institute of Standards and Technology (Nist) Method,” Semin. Nas. Teknol. Inf. dan Komun. - Semant., pp. 161–166, 2017.
  19. F. Mobile, P. Kasus, and C. Fraud, “Mobile Forensics in Cyber Fraud Cases Signal Messenger Service Using the NIST Method,” vol. 3, no. 28, pp. 137–144, 2022.
  20. M. Fitriana, K. A. AR, and J. M. Marsya, “Application of the National Institute of Standards and Technology (NIST) Methods in Digital Forensic Analysis for Handling Cyber Crime,” Cybersp. J. Pendidik. Teknol. Inf., vol. 4, no. 1, pp. 29–39, 2020, doi: 10.22373/cj.v4i1.7241.
  21. M. Riskiyadi, “Forensic Investigation of Digital Evidence in Exposing Cybercrime,” CyberSecurity dan Forensik Digit., vol. 3, no. 2, pp. 12–21, 2020.
  22. R. A. K. N. Bintang, R. Umar, and U. Yudhana, “Live forensics comparison design on Instagram, Facebook and Twitter social media security on Windows 10,” Pros. SNST ke-9 Tahun 2018 Fak. Tek. Univ. Wahid Hasyim, pp. 125–128, 2018.
  23. S. Ferreira, M. Antunes, and M. E. Correia, “Exposing manipulated photos and videos in digital forensics analysis,” J. Imaging, vol. 7, no. 7, 2021, doi: 10.3390/jimaging7070102.
  24. D. A. Putri, “Forensics Mobile Against Threat Cases Through WhatsApp Services,” pp. 1–8.
  25. R. Y. Prasongko, A. Yudhana, and A. Fadil, “Forensic analysis of the KakaoTalk application using the National Institute Standard Technology method,” Semin. Nas. Inform. 2018 (semnasIF 2018) UPN ”Veteran” Yogyakarta, 24 Novemb. 2018 ISSN 1979-2328, vol. 2018, no. November, pp. 129–133, 2018.
  26. T. D. Larasati and B. C. Hidayanto, “Live Forensics Analysis For Comparison Of Instant Messenger Applications On Windows 10 Operating System,” Sesindo, vol. 6, no. November, pp. 456–256, 2017.
  27. R. Umar, I. Riadi, and G. Maulana, “A Comparative Study of Forensic Tools for WhatsApp Analysis using NIST Measurements,” Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 12, pp. 69–75, 2017, doi: 10.14569/ijacsa.2017.081210.


Forensic, MiChat, Smartphone, NIST