CFP last date
20 January 2025
Reseach Article

Mobile Forensic of Facebook Messenger on Cyber Fraud Case using National Institute of Standard Technology Method

by Regina Fitria, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 42
Year of Publication: 2021
Authors: Regina Fitria, Imam Riadi
10.5120/ijca2021921825

Regina Fitria, Imam Riadi . Mobile Forensic of Facebook Messenger on Cyber Fraud Case using National Institute of Standard Technology Method. International Journal of Computer Applications. 183, 42 ( Dec 2021), 43-49. DOI=10.5120/ijca2021921825

@article{ 10.5120/ijca2021921825,
author = { Regina Fitria, Imam Riadi },
title = { Mobile Forensic of Facebook Messenger on Cyber Fraud Case using National Institute of Standard Technology Method },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2021 },
volume = { 183 },
number = { 42 },
month = { Dec },
year = { 2021 },
issn = { 0975-8887 },
pages = { 43-49 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number42/32214-2021921825/ },
doi = { 10.5120/ijca2021921825 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:19:29.747696+05:30
%A Regina Fitria
%A Imam Riadi
%T Mobile Forensic of Facebook Messenger on Cyber Fraud Case using National Institute of Standard Technology Method
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 42
%P 43-49
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In Indonesia, Facebook messenger users are growing rapidly, especially on mobile devices, this development brings positive and negative impacts. The most common impact at this time is crimes committed in cyberspace, one of which is online buying and selling fraud. Facebook messenger is one of the instant messaging applications with the largest number of users, so there are opportunities for cybercrime. To obtain digital evidence, this research uses the National Institute of Standards and Technology (NIST) stages. The research was conducted using a mobile-based Facebook messenger application with a conversation scenario created by the author. The study was conducted to restore deleted conversations, the steps used in this study were collection, examination, analysis and reporting. This study also uses two smartphones in the condition that one smartphone is rooted and the second smartphone is not rooted, both smartphones are used as evidence. The acquisition process uses several forensic software including MOBILedit Forensic Express, Systool SQLite and AccessData FTK imager. Digital evidence obtained using the MOBILedit Forensic Express tools is 75%, then Systool SQLite tools are 67% and AccessData FTK imager tools are 67%. The results obtained from this research are conversations that have been deleted and user accounts on smartphones that are rooted while in unrooted smartphones don't get digital proof.

References
  1. I. Anshori, K. E. Setya Putri, and U. Ghoni, “Analysis of Digital Evidence for Facebook Messenger Applications on Android Smartphones Using the NIJ Method,” IT J. Res. Dev., vol. 5, no. 2, pp. 118–134, 2020, doi: 10.25299/itjrd.2021.vol5(2).4664.
  2. I. Ali, “Crime Against Information (Cybercrime) In the Context of Digital Libraries,” Visi Pustaka, vol. 14, no. 1, pp. 32–38, 2012.
  3. I. Alsmadi et al., “Mobile Forensics,” Pract. Inf. Secur., pp. 297–308, 2018, doi: 10.1007/978-3-319-72119-4_13.
  4. A. N. Ichsan and I. Riadi, “Mobile Forensic on Android-based IMO Messenger Services using Digital Forensic Research Workshop (DFRWS) Method,” Int. J. Comput. Appl., vol. 174, no. 18, pp. 34–40, 2021, doi: 10.5120/ijca2021921076.
  5. I. Zuhriyanto et al., “Forensic Digital Design In Applications,” Semin. Nas. Inform., vol. 2018, no. November, pp. 86–91, 2018.
  6. J. P. Soepomo, “Forensic analysis of the KakaoTalk application using the National Institute Standard Technology method,” vol. 2018, no. November, pp. 129–133, 2018.
  7. M. I. Syahib et al., “Beetalk Application Digital Forensic Analysis For Handling,” vol. 2018, no. November, pp. 134–139, 2018.
  8. R. Ayatulloh, K. Noor, R. Umar, and A. Yudhana, “Facebook Lite Social Media Analysis with Forensic tools using the NIST Method,” vol. 21, no. 2, pp. 125–131, 2020.
  9. P. T. Informasi and F. Tarbiyah, “Application Of The National Institute Of Standards And Technology (Nist) Method In Digital Forensic Analysis For Cyber Crime Handling,” vol. 4, pp. 29–39, 2020.
  10. S. R. Ardiningtias et al., “Digital Investigation On Facebook Messenger,” pp. 19–26, 2018.
  11. G. Atiko, R. H. Sudrajat, K. Nasionalita, and U. Telkom, "Abstract The development of technology, information and communication that continues to increase makes the number of Internet users also higher throughout the world every year, Indonesia is no exception. Besides Facebook, Twitter, Youtube, Path, Line," Anal. strategy. Tourism Promotion Through Social Media. By The Ministry Of Tourism Of The Republic Of Indonesia (studi deskriptif pada akun Instagram @indtravel), vol. 3, no. 2, pp. 2349–23
  12. R. A. K. N. Bintang, R. Umar, and U. Yudhana, “Live forensics comparison design on Instagram, Facebook and Twitter social media security on Windows 10,” Pros. SNST ke-9 Tahun 2018 Fak. Tek. Univ. Wahid Hasyim, pp. 125–128, 2018.
  13. D. A. Putri, “Forensic Mobile against Threat WhatsApp Services using National Institute of Standards Technology Method,” vol. 183, no. 30, pp. 1–8, 2021.
  14. O. El, C. Natalia, S. I. Kom, and M. Si, “Youth, Social Media And Cyberbullying Background on the role of youth as a means to connect with social media. tool people to do,” vol. 5, 2016.
  15. R. Firmansyah, “News Clarification Web to Minimize the Spread of Hoax News,” vol. 4, no. 2, pp. 230–235, 2017.
  16. D. Hariyadi et al., “Analysis Of Digital Evidence Applications On Paziim Phone Paziim Digital Evidence Analysis Application On Android,” vol. 2, no. 2, pp. 52–56, 2019.
  17. T. Jual et al., “consumers to internet transactions, electronic means can also be under the Criminal Law Act. – Law on Information and there are two important things, namely,” vol. 5, no. 7, pp. 1–13, 2016.
  18. W. A. Luqyana, I. Cholissodin, and R. S. Perdana, “Cyberbullying Sentiment Analysis on Instagram Comments with the Support Vector Machine Classification Method,” J. Pengemb. Teknol. Inf. dan Ilmu Komput. Univ. Brawijaya, vol. 2, no. 11, pp. 4704–4713, 2018.
  19. Y. Prayudi and D. S. Afrianto, “Anticipation Of Cybercrime Using Computer Engineering,” vol. 2007, no. Snati, 2007.
  20. B. Raharjo, “Digital forensics at a glance,” pp. 384–387.
  21. J. P. Soepomo, “Forensic Analysis Of Digital Evidence On Frozen Solid State Drive Using The National Institute Of Standards And Technology (Nist) Method,” Vol. 2, No. 2, Pp. 33–40, 2017.
  22. D. A. Putri, “Forensic Mobile against Threat WhatsApp Services using National Institute of Standards Technology Method,” vol. 183, no. 30, pp. 1–8, 2021.
  23. R. Sistem et al., “Investigating Cyberbullying on WhatsApp Using Digital Forensics,” vol. 1, no. 10, pp. 730–735, 2021.
  24. P. Studi, T. Informatika, U. Ahmad, J. P. Soepomo, and S. H. J. Yogyakarta, “Forensic Analysis Instant Messenger Application,” vol. 2, no. 2, pp. 25–32, 2017.
  25. P. Widiandana and I. Riadi, “Cyberbullying Forensic Investigation Analysis On Whatsapp Messenger Using The National Institute Of Standards And Technology (Nist) Method,” pp. 488–493, 2019.
  26. P. A. K. D. J. Kharade, “Rooting & Custom Rom in Android,” Int. J. Sci. Res., vol. 6, no. 4, pp. 1945–1950, 2017, doi: 10.21275/ART20172750.
  27. I. Z. Yadi and Y. N. Kunang, “National Conference on Computer Science (KONIK) 2014 Forensic Analysis on Android Platform,” Konf. Nas. Ilmu Komput., p. 142, 2014, [Online]. Available: http://eprints.binadarma.ac.id/2191/.
Index Terms

Computer Science
Information Sciences

Keywords

Mobile forensics Facebook Messenger Cybercrime Online buying and selling fraud NIST Smartphone