Mobile Forensic for Body Shaming Investigation Using Association of Chief Police Officers Framework
Abstract
Body shaming is the act of making fun of or embarrassing someone because of their appearance, including the shape or form of their body. Body shaming can occur directly or indirectly. MOBILEdit Forensic Express and Forensic ToolKit (FTK) Imager are used to perform testing of evidence gathered through Chat, User ID, Data Deletion, and Groups based on digital data obtained on IMO Messenger tokens on Android smartphones. This study aimed to collect evidence of conversations in body shaming cases using the Association of Chiefs of Police (ACPO) framework with MOBILedit Forensic Express and FTK Imager as a tool for testing. Based on the research findings, MOBILedit Forensic Express got an extraction yield of 0.75%. In contrast, using the FTK Imager got an extraction yield of 0.25%. The ACPO framework can be used to investigate cases of body shaming using mobile forensics tools so that the extraction results can be found. The results of this study contributed to forensic mobile knowledge in cases of body shaming or cyberbullying ACPO framework as well as for the investigators.
Downloads
References
U. A. Dahlan, “Forensik Mobile pada Layanan Media Sosial LinkedIn,” vol. 6, no. 1, pp. 9–20, 2021.
[2] B. Fakiha, “Effectiveness of Forensic Firewall in Protection of Devices from Cyberattacks,” vol. 12, no. 1, pp. 77–82, 2022.
[3] A. Alanda, D. Satria, H. A. Mooduto, and B. Kurniawan, “Mobile Application Security Penetration Testing Based on OWASP,”
IOP Conference Series: Materials Science and Engineering, vol. 846, no. 1, pp. 1–13, 2020.
[4] N. Setyaningsih, “Metode NIJ Untuk Analisis Forensik Layanan Dropbox Pada Smartphone Android,” vol. 2, no. 6, pp. 1–10,
2022.
[5] I. Riadi, “Analisis Forensik Smartphone Android Menggunakan Metode NIST dan Tool MOBILedit Forensic Express,” vol. 5,
no. 1, pp. 89–94, 2020.
[6] R. Y. Patil and S. R. Devane, “Network Forensic Investigation Protocol to Identify True Origin of Cyber Crime,” Journal of
King Saud University - Computer and Information Sciences, vol. 34, no. 5, pp. 2031–2044, 2022.
[7] K. Gibson, “Bridging the digital divide: Reflections on using WhatsApp instant messenger interviews in youth research,”
Qualitative Research in Psychology, vol. 19, no. 3, pp. 611–631, 2022.
[8] R. Sistem, S. S. Informasi, U. A. Dahlan, S. T. Elektro, U. A. Dahlan, P. Studi, T. Informatika, and U. A. Dahlan, “Investigasi
Cyberbullying pada WhatsApp Menggunakan Digital Forensics,” vol. 1, no. 10, pp. 730–735, 2021.
[9] G. M. Abaido, “Cyberbullying on social media platforms among university students in the United Arab Emirates,” International
Journal of Adolescence and Youth, vol. 25, no. 1, pp. 407–420, 2020.
[10] S. R. Ardiningtias, “Forensik Digital Kasus Penyebaran Pornografi pada Aplikasi Facebook Messenger Berbasis Android Menggunakan
Kerangka Kerja National Institute of Justice,” vol. 7, no. 3, pp. 322–328, 2021.
[11] O. C. Hang and A. S. Media, “Cyberbullying Lexicon for Social Media,” 2019.
[12] I. Anshori, K. Eka, S. Putri, and U. Ghoni, “Analisis Barang Bukti Digital Aplikasi Facebook Messenger Pada Smartphone
Android Menggunakan Metode NIJ,” vol. 5, no. 2, pp. 118–134, 2021.
[13] S. Sotnik, T. Shakurova, and V. Lyashenko, “Development Features Web-Applications,” vol. 7, no. 1, pp. 79–85, 2023.
[14] S. Sunardi and I. Riadi, “Penerapan Metode Static Forensics untuk Ekstraksi File Steganografi,” no. June, 2020.
[15] A. K. Priyanka and S. S. Smruthi, “WebApplication Vulnerabilities:Exploitation and Prevention,” Proceedings of the 2nd International
Conference on Inventive Research in Computing Applications, ICIRCA 2020, pp. 729–734, 2020.
[16] R. N. Dasmen, F. Kurniawan, T. Komputer, U. B. Darma, S. Inggris, U. B. Darma, and D. Forensik, “Digital Forensik Deleted
Cyber Crime Evidence pada Pesan Instan Media Sosial,” vol. 20, no. 4, pp. 527–539, 2021.
[17] M. El-tayeb, A. Taha, and Z. Taha, “Ing´enierie des Syst`emes d ’ Information Streamed Video Reconstruction for Firefox
Browser Forensics,” vol. 26, no. 4, pp. 337–344, 2021.
[18] J. Son, Y. Woong, D. Bin, and K. Kim, “Forensic Science International : Digital Investigation Forensic analysis of instant
messengers : Decrypt Signal , Wickr , and Threema,” Forensic Science International: Digital Investigation, vol. 40, p. 301347,
2022.
[19] J. Mobile, “FORENSIK WEB LAYANAN INSTANT MESSAGING MENGGUNAKAN METODE ASSOCIATION OF
CHIEF,” vol. 1, no. 1, pp. 29–38, 2019.
[20] T. Hermawan and L. Roselina, “Android Forensic Tools Analysis for Unsend Chat on Social Media,” pp. 233–238, 2021.
[21] R. Y. Prasongko, A. Yudhana, and I. Riadi, “Analisis Penggunaan Metode ACPO (Association of Chief Police Officer) pada
Forensik WhatsApp,” Jurnal Sains Komputer & Informatika (J-SAKTI, vol. 6, no. 2, pp. 1112–1120, 2022.
[22] I. A. Plianda and R. Indrayani, “Analisa dan Perbandingan Performa Tools Forensik Digital pada Smartphone Android menggunakan
Instant Messaging Whatsapp,” Jurnal Media Informatika Budidarma, vol. 6, no. 1, p. 500, 2022.
[23] I. Riadi, H. Herman, and N. H. Siregar, “Mobile Forensic of Vaccine Hoaxes on Signal Messenger using DFRWS Framework,”
MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer, vol. 21, no. 3, pp. 489–502, 2022.
[24] G. Fanani, I. Riadi, and A. Yudhana, “Analisis Forensik Aplikasi Michat Menggunakan Metode Digital Forensics Research
Workshop,” vol. 6, no. April, pp. 1263–1271, 2022.
[25] K. A. Latif, R. Hammad, T. T. Sujaka, K. Marzuki, and A. S. Anas, “Forensic Whatsapp Investigation Analysis on Bluestack
Simulator Device Using Live Forensic Method With ACPO Standard,” International Journal of Information System &
Technology Akreditasi, vol. 5, no. 3, pp. 331–338, 2021.
[26] F. Anggraini, H. Herman, and A. Yudhana, “Analisis Forensik Aplikasi TikTok Pada Smartphone Android Menggunakan Framework
Association of Chief Police Officers,” JURIKOM (Jurnal Riset Komputer), vol. 9, no. 4, p. 1117, 2022.
[27] M. R. Setyawan and F. Tella, “Forensic Analysis Of Dana Applications Using The ACPO Framework,” vol. 8, pp. 1–8, 2023.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.