Forensic Analysis of the WhatsApp Application Using the National Institute of Justice Framework
DOI:
https://doi.org/10.59395/ijadis.v5i2.1328Keywords:
Digital Forensic , Drug Trafficking , National Institute of Justice , Smartphone, WhatsAppAbstract
The advancement of communication media has rapidly evolved with the emergence of various communication applications on smartphones, which have now surpassed mere communication functions to become complex social media platforms. This change has transformed the way we interact, not only through messages and voice but also through the exchange of videos and images. However, along with these developments, there has been a surge in digital crimes such as defamation, fraud, and drug trafficking. This investigation aims to compare the performance of forensic tools in obtaining digital evidence by utilizing applications like Mobiledit, Belkasoft, Mobile Forensic SPF, and Magnet Axiom, and by applying the National Institute of Justice framework, which consists of five stages: identification, collection, examination, analysis, and reporting. The output of the investigation is presented through reports and evidence, resulting in text chat files, contacts, images, audio, and view-once images. Forensic tools have a 100% success rate in finding pieces of evidence. The comparison of the four tools showed different percentages: Mobiledit Forensic 40%, Magnet Axiom 80%, Belkasoft 60%, and Mobile Forensic SPF 60% in obtaining evidence. Digital evidence can be used as strong support in court proceedings.
Downloads
References
D. Sulisdyantoro and M. I. Marzuki, "Identification of Whatsapp Digital Evidence on Android Smartphones using The Android Backup APK (Application Package Kit) Downgrade Method," J. Integr. Adv. Eng., vol. 3, no. 1, pp. 7-22, 2023, doi: 10.51662/jiae.v3i1.70. https://doi.org/10.51662/jiae.v3i1.70
V. RODRIGUES, "Cyber Stalking Issues of Enforcement in Cyber Space," 2020.
A. Becker, J. V. Ford, and T. J. Valshtein, "Confusing Stalking for Romance: Examining the Labeling and Acceptability of Men's (Cyber)Stalking of Women," Sex Roles, vol. 85, no. 1-2, pp. 73-87, 2021, doi: 10.1007/s11199-020-01205-2. https://doi.org/10.1007/s11199-020-01205-2
M. Marzuki and T. Sutabri, "Analisis Forensik Media Sosial Michat Metode Digital Forensik Integrated Investigation Framework (Idfif)," Blantika Multidiscip. J., vol. 2, no. 1, pp. 56-70, 2023, doi: 10.57096/blantika.v2i1.11. https://doi.org/10.57096/blantika.v2i1.11
Sakshi, A. Vashishth, and Teena, "An Analysis of Cyber Crime with Special Reference to Cyber Stalking," J. Posit. Sch. Psychol., vol. 6, no. 4, pp. 1279-1287, 2022.
A. Alhusaini and I. Riadi, "Forensic Mobile Drug Trafficking WhatsApp Services using National Standard of Technology Method," Int. J. Comput. Appl., vol. 183, no. 40, pp. 56-62, 2021, doi: 10.5120/ijca2021921801. https://doi.org/10.5120/ijca2021921801
C. Hu, B. Liu, Y. Ye, and X. Li, "Fine-grained classification of drug trafficking based on Instagram hashtags," Decis. Support Syst., vol. 165, no. February 2022, p. 113896, 2023, doi: 10.1016/j.dss.2022.113896. https://doi.org/10.1016/j.dss.2022.113896
I. Riadi, H. Herman, and I. A. Rafiq, "Mobile Forensic Investigation of Fake News Cases on Instagram Applications with Digital Forensics Research Workshop Framework," Int. J. Artif. Intell. Res., vol. 6, no. 2, 2022, doi: 10.29099/ijair.v6i2.311.
https://doi.org/10.29099/ijair.v6i2.311
W. A. Al-Khater, S. Al-Maadeed, A. A. Ahmed, A. S. Sadiq, and M. K. Khan, "Comprehensive review of cybercrime detection techniques," IEEE Access, vol. 8, pp. 137293-137311, 2020, doi: 10.1109/ACCESS.2020.3011259. https://doi.org/10.1109/ACCESS.2020.3011259
G. M. Zamroni and I. Riadi, "Mobile Forensic Tools Validation and Evaluation for Instant Messaging," Int. J. Adv. Sci. Eng. Inf. Technol., vol. 10, no. 5, pp. 1860-1866, 2020, doi: 10.18517/ijaseit.10.5.7499. https://doi.org/10.18517/ijaseit.10.5.7499
H. Nurhairani and I. Riadi, "Analysis Mobile Forensics on Twitter Application using the National Institute of Justice (NIJ) Method," Int. J. Comput. Appl., vol. 177, no. 27, pp. 35-42, 2019, doi: 10.5120/ijca2019919749. https://doi.org/10.5120/ijca2019919749
A. Yudhana, I. Riadi, and I. Zuhriyanto, "Analisis Live Forensics Aplikasi Media Sosial Pada Browser Menggunakan Metode Digital Forensics Research Workshop (DFRWS)," J. TECHNO, vol. 20, no. 2, pp. 125-130, 2019.
G. Zaida Muflih, "Comparison of Forensic Tools on Social Media Services Using the Digital Forensic Research Workshop Method (DFRWS)," JIKO (Jurnal Inform. dan Komputer), vol. 6, no. 1, pp. 52-61, 2023, doi: 10.33387/jiko.v6i1.5872.
https://doi.org/10.33387/jiko.v6i1.5872
M. S. Jafri, S. Raharjo, and M. R. Arief, "Implementation of ACPO Framework for Digital Evidence Acquisition in Smartphones," CCIT J., vol. 15, no. 1, pp. 82-105, 2022, doi: 10.33050/ccit.v15i1.1586. https://doi.org/10.33050/ccit.v15i1.1586
R. Y. Prasongko, A. Yudhana, and I. Riadi, "Analisis Penggunaan Metode ACPO (Association of Chief Police Officer) pada Forensik WhatsApp," J. Sains Komput. Inform., vol. 6, no. 2, pp. 1112-1120, 2022.
F. F. Febrian and J. Sidabutar, "Comparative Analysis of Forensic for Whatsapp Desktop on Mac OS and Windows Using IDFIF V2," Proc. - 2023 IEEE Int. Conf. Cryptogr. Informatics, Cybersecurity Cryptogr. Cybersecurity Roles, Prospect. Challenges, ICoCICs 2023, pp. 327-331, 2023, doi: 10.1109/ICoCICs58778.2023.10276727. https://doi.org/10.1109/ICoCICs58778.2023.10276727
Jeki Kuswanto, Nur Asyifa, and I. Hadi Purwanto, "Akuisiss Google Drive Android Menggunakan Oxygen dan Mobiledit dengan Metode National Institute of Justice," J. Inform. Teknol. dan Sains, vol. 5, no. 1, pp. 141-147, 2023, doi: 10.51401/jinteks.v5i1.2523. https://doi.org/10.51401/jinteks.v5i1.2523
Irhash Ainur Rafiq, Imam Riadi, and Herman, "Perbandingan Forensic Tools pada Instagram Menggunakan Metode NIST," JISKA (Jurnal Inform. Sunan Kalijaga), vol. 7, no. 2, pp. 134-142, 2022, doi: 10.14421/jiska.2022.7.2.134-142. https://doi.org/10.14421/jiska.2022.7.2.134-142
G. Fanani, I. Riadi, and A. Yudhana, "Analisis Forensik Aplikasi Michat Menggunakan Metode Digital Forensics Research Workshop," J. Media Inform. Budidarma, vol. 6, no. 2, p. 1263, 2022, doi: 10.30865/mib.v6i2.3946. https://doi.org/10.30865/mib.v6i2.3946
F. Dwi, R. Rini, R. Wilis, and R. A. Wildana, "Analisis Forensik Digital Aplikasi WhatsApp pada Smartphone Berbasis iOS Berdasarkan ACPO," vol. 1, no. 7, pp. 740-749, 2024.
M. Surya, J. Sidabutar, and N. Qomariasih, "Comparative Analysis of Recovery Tools For Digital Forensic Evidence Using NIST Framework 800-101 R1," Proc. - 2023 IEEE Int. Conf. Cryptogr. Informatics, Cybersecurity Cryptogr. Cybersecurity Roles, Prospect. Challenges, ICoCICs 2023, pp. 258-262, 2023, doi: 10.1109/ICoCICs58778.2023.10276447. https://doi.org/10.1109/ICoCICs58778.2023.10276447
M. E. Apriyani, R. A. Maskuri, and M. H. Ratsanjani, "Forensic Digital Analysis of Telegram Applications Using the National Institute of Justice and Naïve Bayes Methods," vol. 5, no. 2, pp. 21-30, 2023. https://doi.org/10.12928/mf.v5i2.7893
S. Soni, Y. Fatma, and R. Anwar, "Akuisisi Bukti Digital Aplikasi Pesan Instan 'Bip'Menggunakan Metode National Institute Of Justice (NIJ)," J. CoSciTech (Computer Sci. Inf. Technol., vol. 3, no. 1, pp. 34-42, 2022, doi: 10.37859/coscitech.v3i1.3694. https://doi.org/10.37859/coscitech.v3i1.3694
Y. Marumo, "Forensic Examination of Soil Evidence," Japanese J. Forensic Sci. Technol., vol. 7, no. 2, pp. 95-111, 2015, doi: 10.3408/jafst.7.95. https://doi.org/10.3408/jafst.7.95
J. Ropero-Miller, "NIJ's CJTEC: Enabling Informed Decisions About Technology-centric Procurement and Practices," Forensic Sci. Int. Synerg., vol. 4, p. 100260, 2022, doi: 10.1016/j.fsisyn.2022.100260. https://doi.org/10.1016/j.fsisyn.2022.100260
G. LaPorte and H. Waltke, "National Institute of Justice: An Update on Forensic Science Resources," Forensic Sci. Int. Synerg., vol. 1, no. 2019, p. S15, 2019, doi: 10.1016/j.fsisyn.2019.02.043. https://doi.org/10.1016/j.fsisyn.2019.02.043
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Muhammad Fahmi Mubarok Nahdli, Muhammad Kunta Biddinika, Imam Riadi
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.