Akuisisi Bukti Digital Pada Aplikasi Michat di Smartphone Menggunakan Metode National Institute of Standards and Technology (NIST)

  • Soni Soni Universitas Muhammadiyah Riau
  • Regiolina Hayami Universitas Muhammadiyah Riau
  • Muhammad Hamadi Universitas Muhammadiyah Riau

Abstract

The development of technology in the world of mobile devices is growing. However, these developments have a detrimental impact, one of which is cybercrime. Cybercrime is a crime that uses information technology. One of the smart phone technologies which includes cases of cybercrime that are often found in Indonesia include online prostitution of minors. This is done by utilizing social media, namely Michat as a medium of communication. The “chat with nearby users” feature by uploading a status that  can be connected to the surrounding area within a certain radius and after being connected, the actor and his potential customer will negotiate and transact with each other until they finally meet. To eliminate digital evidence in the form of conversations in messages, usually perpetrators will delete the history of messages that produce data that can be used as evidence and perpetrators who can avoid legal traps, which are ultimately online. prostitution will be rampant. For online prostitution activities, it is necessary to carry out mobile forensics to find evidence which is then useful to be given to the authorities. This research uses the National Institute of Standards and Technology (NIST) method.

Downloads

Download data is not yet available.

References

I. Riadi, S. Sunardi, and M. E. Rauli, “Identifikasi Bukti Digital WhatsApp pada Sistem Operasi Proprietary Menggunakan Live Forensics,” J. Tek. Elektro, vol. 10, no. 1, pp. 18–22, 2018, doi: 10.15294/jte.v10i1.14070.

M. N. Rizky, R. I. Fitriani, M. W. Sudibyo, F. A Husnasari, and F. Maulana, “Perlindungan Hukum Terhadap Anak Korban Eksploitasi Seksual Komersial Melalui Media Sosial,” Media Iuris, vol. 2, no. 2, p. 197, 2019, doi: 10.20473/mi.v2i2.13193.

A. Yudhana, I. Riadi, and I. Anshori, “Analisis Bukti Digital Facebook Messenger Menggunakan Metode Nist,” It J. Res. Dev., vol. 3, no. 1, pp. 13–21, 2018, doi: 10.25299/itjrd.2018.vol3(1).1658.

I. G. N. Guna Wicaksana and I. K. Gede Suhartana, “Forensic Analysis of Telegram Desktop-based Applications using the National Institute of Justice (NIJ) Method,” JELIKU (Jurnal Elektron. Ilmu Komput. Udayana), vol. 8, no. 4, p. 381, 2020, doi: 10.24843/jlk.2020.v08.i04.p03.

M. I. Syahib, I. Riadi, and R. Umar, “Analisis Forensik Digital Aplikasi Beetalk untuk Penanganan Cybercrime Menggunakan Metode NIST,” Semin. Nas. Inform., vol. 2018, no. November, p. 134, 2018, [Online]. Available: http://jurnal.upnyk.ac.id/index.php/semnasif/article/view/26 29.

I. Riadi, A. Yudhana, and M. Al Barra, “Forensik Mobile pada Layanan Media Sosial LinkedIn,” JISKA (Jurnal Inform. Sunan Kalijaga), vol. 6, no. 1, pp. 9–20, 2021, doi: 10.14421/jiska.2021.61-02.

S. RACHMIE, “Peranan Ilmu Digital Forensik Terhadap Penyidikan Kasus Peretasan Website,” Litigasi, vol. 21, no. 21, pp. 104–127, 2020, doi: 10.23969/litigasi.v21i1.2388.

M. Chernyshev, S. Zeadally, Z. Baig, and A. Woodward, “Mobile Forensics: Advances, Challenges, and Research Opportunities,” IEEE Secur. Priv., vol. 15, no. 6, pp. 42– 51, 2017, doi: 10.1109/MSP.2017.4251107.

M. Fitriana, K. A. AR, and J. M. Marsya, “Penerapana Metode National Institute of Standars and Technology (Nist) Dalam Analisis Forensik Digital Untuk Penanganan Cyber Crime,” Cybersp. J. Pendidik. Teknol. Inf., vol. 4, no. 1, p. 29, 2020, doi: 10.22373/cj.v4i1.7241.

V. G. Larenda, M. Unik, and H. Mukhtar, “Analisis SMS Forensik Smartphone sebagai Rujukan Menghadirkan Barang Bukti yang Sah di Pengadilan,” 2016.

S. Azizah, S. A. Ramadhona, and K. W. Gustitio, “Analisis Bukti Digital pada Telegram Messenger Menggunakan Framework NIST,” J. Repos., vol. 2, no. 10, pp. 1400-1405, 2020, doi: 10.22219/repositor.v2i10.1066.

Soni, Prayudi, Y., & Sugiantoro, B. (2017). Teknik Akuisisi Virtualisasi Server Menggunakan Metode Live Forensic. Teknomatika, 9(2).

S, S., Hafid, A., & Sudyana, D. (2019). Analysis of Security Awareness in using Technology and Social Media at Muhammadiyah University of Riau. International Journal of Computer Applications, 177(18), 20–25. https://doi.org/10.5120/ijca2019919631

Soni, Prayudi, Y., Sugiantoro, B., Sudyana, D., & Mukhtar, H. (2019). Server Virtualization Acquisition Using Live Forensics Method. 190, 18–23. https://doi.org/10.2991/iccelst-st-19.2019.4

Sudyana, D., Putra, R. T., & Soni, S. (2019). Digital Forensics Investigation on Proxmox Server Virtualization Using SNI 27037:2014. Sinkron, 3(2), 67–72. https://doi.org/10.33395/sinkron.v3i2.10029.

Soni, S., Fatma, Y., & Anwar, R. (2022). Akuisisi Bukti Digital Aplikasi Pesan Instan “Bip”Menggunakan Metode National Institute Of Justice (NIJ). Jurnal CoSciTech (Computer Science and Information Technology), 3(1), 34–42. https://doi.org/10.37859/coscitech.v3i1.3694

Published
2022-12-19
Abstract views: 31 , PDF downloads: 27