CFP last date
20 January 2025
Reseach Article

Browser Forensic of Extortion Case on WhatsApp Web using National Institute of Justice Method

by Cindy Amelia, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 42
Year of Publication: 2021
Authors: Cindy Amelia, Imam Riadi
10.5120/ijca2021921823

Cindy Amelia, Imam Riadi . Browser Forensic of Extortion Case on WhatsApp Web using National Institute of Justice Method. International Journal of Computer Applications. 183, 42 ( Dec 2021), 36-42. DOI=10.5120/ijca2021921823

@article{ 10.5120/ijca2021921823,
author = { Cindy Amelia, Imam Riadi },
title = { Browser Forensic of Extortion Case on WhatsApp Web using National Institute of Justice Method },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2021 },
volume = { 183 },
number = { 42 },
month = { Dec },
year = { 2021 },
issn = { 0975-8887 },
pages = { 36-42 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number42/32213-2021921823/ },
doi = { 10.5120/ijca2021921823 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:19:29.032237+05:30
%A Cindy Amelia
%A Imam Riadi
%T Browser Forensic of Extortion Case on WhatsApp Web using National Institute of Justice Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 42
%P 36-42
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Whatsapp is a messaging application for smartphones that can be used across platforms including Apple iOS, Android, Windows Phone, etc. popularity Whatsapp's among the public can be misused for negative purposes for the development of society itself. One example of a case that often occurs in the community is extortion through the application Whatsapp. This study will carry out a scenario of a crime of extortion that occurs using Whatsapp Web, Whatsapp runs on the Chrome Browser, this research uses the NIJ stage. The stages of the forensics National Institute of Justice (NIJ)are preparation, collection, examination, analysis, and reporting. This research uses a laptop with a condition that is connected to the internet and accesses Whatsapp via the Chrome browser. The process of collecting digital evidence through forensic tools, namely Belkasoft RAM Capturer, FTK Imager, Browser History Capturer, and Browser History Examiner. This research produces digital evidence, namely information on profile photos of perpetrators and victims, when accessing WhatsApp Web, WhatsApp Weblinks accessed via Chrome, as well as evidence of extortion chats that have been deleted by the perpetrators. The percentage of results obtained from the results of imaging data analysis using the FTK Imager tool is 50% in the form of a WhatsApp Web link and chat from the perpetrator to the victim, while the results from the Browser History Examiner are 50% in the form of a cache of the photo perpetrator, as well as the access time WhatsApp.This research uses the stages of the National Institute of Justice (NIJ), it is hoped that future research can use other stages. This research uses OS Windows 10, so it is hoped that for further research it can use OS Linux or macOS.

References
  1. N. Budhisantosa, “Analisis forensik komputer pada timestamps sistem berkas ntfs,” Forum Ilm. Fak. Ilmu Komput. Univ. Esa Unggul, vol. 13, 2016.
  2. I. Riadi, S. Sunardi, and S. Sahiruddin, “Analisis Forensik Recovery pada Smartphone Android Menggunakan Metode National Institute Of Justice (NIJ),” J. Rekayasa Teknol. Inf., vol. 3, no. 1, p. 87, 2019.
  3. I. Riadi, R. Umar, and I. M. Nasrulloh, “Analisis Forensik Digital Pada Frozen Solid State Drive Dengan Metode National Institute of Justice (Nij),” Elinvo (Electronics, Informatics, Vocat. Educ., vol. 3, no. 1, pp. 70–82, 2018.
  4. I. Riadi, S. Sunardi, and M. E. Rauli, “Identifikasi Bukti Digital WhatsApp pada Sistem Operasi Proprietary Menggunakan Live Forensics,” J. Tek. Elektro, vol. 10, no. 1, pp. 18–22, 2018.
  5. D. S. Yudhistira, “Metode Live Forensics Untuk Analisis Random Access Memory Pada Perangkat Laptop,” 2018.
  6. B. Sugiantoro et al., “Penerapan Framework Harmonised Digital Forensic Investigation Process ( Hdfip ) Untuk Mendapatkan Artifak the Implementation of Framework Harmonised Digital Forensic Investigation Process ( Hdfip ) To Get Artifacts Digital Evidence,” CyberSecurity dan Forensik Digit., vol. 1, no. 2, pp. 67–74, 2018.
  7. R. Umar, A. Yudhana, and M. Nur Faiz, “Analisis Kinerja Metode Live Forensics Untuk Investigasi Random Access Memory Pada Sistem Proprietary,” Pros. Konf. Nas. Ke- 4 Asos. Progr. Pascasarj. Perguru. Tinggi Muhammadiyah, pp. 207–211, 2016.
  8. T. Rochmadi, “Live Forensik Untuk Analisa Anti Forensik Pada Web Browser Studi Kasus Browzar,” Indones. J. Bus. Intell., vol. 1, no. 1, p. 32, 2019.
  9. D. S. I. Krisnadi, “Citra Forensik Dari Barang Bukti Elektronik Dengan Metode Physical Menggunakan Acquisition Tools Tableau Imager Dan Ftk Imager,” p. 16, 2020.
  10. T. Rochmadi, “Deteksi Bukti Digital Pada Adrive Cloud Storage Menggunakan Digital Evidence Detection in Adrive Cloud Storage Using Live,” CyberSecurity dan Forensik Digit., vol. 2, no. 2, pp. 21–24, 2019.
  11. E. C. Zatnika, N. Widiyasono, and A. I. Gufroni, “Teknik Live Forensics Dalam Investigasi Malware Pada Memori Komputer Dengan Volatility Framework Versi Windows,” Academia.Edu.
  12. I. Zuhriyanto, A. Yudhana, and I. Riadi, “Perancangan Digital Forensik pada Aplikasi Twitter Menggunakan Metode Live Forensics,” Semin. Nas. Inform. 2008 (semnasIF 2008), vol. 2018, no. November, pp. 86–91, 2018.
  13. A.- Ahmadi, “Akuisisi Data Forensik Google Drive Pada Android Dengan Metode National Institute of Justice ( NIJ ),” J. CoreIT J. Has. Penelit. Ilmu Komput. dan Teknol. Inf., vol. 4, no. 1, p. 8, 2018.
  14. N. Anwar and I. Riadi, “Analisis Investigasi Forensik WhatsApp Messanger Smartphone Terhadap WhatsApp Berbasis Web,” J. Ilm. Tek. Elektro Komput. dan Inform., vol. 3, no. 1, p. 1, 2017.
  15. I. Riadi, A. Yudhana, M. Caesar, and F. Putra, “1490-Article Text-2859-1-10-20190413,” Akuisisi Bukti Digit. Pada Instagram Messenger Berbas. Android Menggunakan Metod. Natl. Inst. Justice, vol. 4, pp. 219–227, 2018.
  16. S. D. Utami, C. Carudin, and A. A. Ridha, “Analisis Live Forensic Pada Whatsapp Web Untuk Pembuktian Kasus Penipuan Transaksi Elektronik,” Cyber Secur. dan Forensik Digit., vol. 4, no. 1, pp. 24–32, 2021.
  17. V. R. G. Leri and I. Riadi, “Data Search for Pornographic Content on Twitter Services using National Institute of Standard and Technology (NIST) Method,” Int. J. Comput. Appl., vol. 183, no. 24, pp. 25–31, 2021.
  18. E. Wahyudi, M. Zulpahmi, K. Gunawan, and B. Imran, “ANALISIS BUKTI DIGITAL WHATSAPP PADA ANDROID SMARTPHONE,” vol. 10, no. 2, pp. 20–26, 2020.
  19. M. N. Faiz, R. Umar, and A. Yudhana, “Analisis Live Forensics Untuk Perbandingan Kemananan Email Pada Sistem Operasi Proprietary,” Ilk. J. Ilm., vol. 8, no. 3, pp. 242–247, 2016.
  20. J. Moedjahedy, “Forensik komputer Studi Kasus: Universitas Klabat,” J. Sist. Inf. dan Teknol. Inf., vol. 5, no. 2, pp. 95–106, 2016.
  21. I. Saputra and M. N. Azhar, “Analisis dan Investigasi Forensik Digital Live Memory untuk Deteksi Tingkah Laku Agresi Pada Aplikasi Whatsapp,” Semin. Nas. dan Disk. Panel Multidisiplin Has. Penelit. Pengabdi. Kpd. Masy., pp. 119–125, 2018.
  22. S. A. Mandowen, “Analisis forensik komputer pada lalu lintas jaringan,” J. Sains, vol. 16, no. 1, pp. 14–20, 2016.
  23. M. Fazarahma, “Forensik Browser pada Aplikasi Facebook Messenger Studi Kasus Ujaran Kebencian Forensik Browser pada Aplikasi Facebook Messenger Studi Kasus Ujaran Kebencian,” 2020.
  24. T. D. Larasati and B. C. Hidayanto, “Analisis Live Forensics Untuk Perbandingan Aplikasi Instant Messenger Pada Sistem Operasi Windows 10,” Sesindo, vol. 6, no. November, pp. 456–256, 2017.
  25. D. A. Putri, “Forensic Mobile against Threat WhatsApp Services using National Institute of Standards Technology Method,” vol. 183, no. 30, pp. 1–8, 2021.
Index Terms

Computer Science
Information Sciences

Keywords

Forensics Chrome WhatsApp Web Extortion NIJ