scholarly journals Digital Forensic Analysis on Android Smartphones for Handling Cybercrime Cases

Author(s):  
Firmansyah Gustav Hikmatyar ◽  
Bambang Sugiantoro

As the times progressed, forensic science has developed rapidly. The science of forensics extends to new areas of technology ranging from digital forensics, computer forensics and mobile forensics. Mobile forensics in analyzing and collecting data is obtained from various resources, such as operating systems, communication lines and also various storage media. The most popular mobile operating system of the day is a smartphone based on android operating system. With android technology, criminals can use that technology as a crime medium ranging from overriding crime ideas, crime targets and crime scenarios. In this Final Project use forensic mobile application to get data residing in cell phone actors, in the form of text, sound, picture and video that have or not yet deleted in smartphone. In this study, a model for investigating the crime scene is the author using the Generic Computer Forensic Investigation Model (GCFIM). On the GCFIM model the investigator may be able to return to the previous stage because of the possibility of a changeable situation (both physical and digital), the investigation tools used, the crime tools used, and the level of investigative expertise. In this research also added weighting method of word TF-IDF, where this method can help to find keyword in digital evidence in the form of word / text.

2012 ◽  
pp. 1221-1236
Author(s):  
Gregory H. Carlton ◽  
Hill Zhou

Computing and communication technologies have merged to produce an environment where many applications and their associated data reside in remote locations, often unknown to the users. The adoption of cloud computing promises many benefits to users and service providers, as it shifts users’ concerns away from the physical location of system components and toward the accessibility of the system’s services. While this adoption of cloud computing may be beneficial to users and service providers, it increases areas of concern for computer forensic examiners that need to obtain data from cloud computing environments for evidence in legal matters. The authors present an overview of cloud computing, discuss the challenges it raises from a digital forensics perspective, describe suitable tools for forensic analysis of cloud computing environments, and consider the future of cloud computing.


2020 ◽  
Vol 10 (12) ◽  
pp. 4231
Author(s):  
Claudinei Morin da Silveira ◽  
Rafael T. de Sousa Jr ◽  
Robson de Oliveira Albuquerque ◽  
Georges D. Amvame Nze ◽  
Gildásio Antonio de Oliveira Júnior ◽  
...  

This paper proposes a new forensic analysis methodology that combines processes, techniques, and tools for physical and logical data acquisition from mobile devices. The proposed methodology allows an overview of the use of the In-System Programming (ISP) technique with the usage of Combination Firmware, aligned with specific collection and analysis processes. The carried out experiments show that the proposed methodology is convenient and practical and provides new possibilities for data acquisition on devices that run the Android Operating System with advanced protection mechanisms. The methodology is also feasible in devices compatible with the usage of Joint Test Action Group (JTAG) techniques and which use Embedded Multimedia Card (eMMC) or Embedded Multi-Chip Package (eMCP) as main memory. The techniques included in the methodology are effective on encrypted devices, in which the JTAG and Chip-Off techniques prove to be ineffective, especially on those that have an unauthorized access protection mechanism enabled, such as lock screen password, blocked bootloader, and Factory Reset Protection (FRP) active. Studies also demonstrate that data preservation and integrity are maintained, which is critical to a digital forensic process.


2016 ◽  
Vol 4 (1) ◽  
pp. 50
Author(s):  
Rizaldi Habibie ◽  
R. Rizal Isnanto ◽  
Rinta Kridalukmana

In modern times, like today, the role of software or applications that run on top of the platform is very important. This is because almost all of the work done by the people, made by the software or application. Applications can be used to assist in the processing of data and upload the final report. Data recorded previously processed by the paper can be recorded and processed by the application so that more efficiently. PT. PLN (Persero) Semarang District State electricity company has many customers in the city of Semarang. Customer data belonging to this company has not been processed in digital form. This causes the data of regular visits undertaken are not directly connected with customer data, owned so inefficient and requires a long process in the course of the report. Thus, it takes an application that can help in the treatment of customer data, data of visited consumer, and generate reports . Customer data Java-based and mobile applications for PLN (Persero) Semarang District State intended for the treatment of customer data, data of visited connsumer and generate reports. The application consists of two application. The first applications developed using the programming language Java, which can run on the operating system Windows. The second application was designed and implemented using the framework ionic, which can run on the Android operating system. This application uses MySQL as a database management system, which is used for data storage media.


2021 ◽  
Vol 2 (4) ◽  
pp. 1189-1196
Author(s):  
I Putu Agus Eka Pratama

Data plays the important role, so that data recovery and data security be prioritized. Computer users often lose their data due to personal errors or by attacks. Digital forensics has one sub-field called computer forensic, which has an important role in the process of secure data recovery. USB Flashdisk as the most widely used storage media has a probability of data loss. It is necessary to do computer forensic actions, especially secure data recovery, on it so that it can restore data securely to other media while protecting it by giving privilege root. In this research, computer forensic testing the 2781 files of various data formats that were erased on a 32 GB USB flash drive using Photorec. The media for collecting data recovery results using an Intel computer, 2 GB RAM, 1.8 GHz processor, the Linux operating system Xubuntu 20.04. Testing is carried out following the test scenarios that have been designed, then observed, recorded, and analyzed. Photorec places recovery data in 6 recup_dir subdirectories. Test results and analysis of the test results show that Photorec is a reliable tool for computer forensic, especially secure data recovery because it can restore 100% of data, accompanied by privilege root for all data recovery results, so they cannot be changed and deleted by an end-user without granted access.


Compiler ◽  
2018 ◽  
Vol 7 (1) ◽  
Author(s):  
Moh Risaldi ◽  
Astika Ayuningtyas

Userman is a tool in mikrotic that serves as a network user. Userman's tools are only accessible by admin and can only be accessed via a computer device. Utilization of handheld or mobile phone device at this time the usual thing because cellular phone or handphone is as companion in carrying out everyday activities. That's what makes Hanphone is very commonplace for some people. This is because some Mobile already has the function and ability more than just the basic function. Android as an operating system that can be embedded in mobile devices have the ability to be installed applications required by the user. In this final project, the mikrotik application can be used to manage the admin that has been in the menu of user management and mikrotik application can also be successful to monitor network traffic and limit the bandwidth to the connected user.


2018 ◽  
Author(s):  
Howard Brand ◽  
Max Diekel ◽  
Yuhao Liu ◽  
Mayukh Sattiraju ◽  
Ramraj Segur-Mahadevaraja

With the increase in automation and the advancement of robotic technologies, comes an increasingpush to incorporate automation into the development of self-driving vehicles. Many companies havedeveloped initiatives devoting resources to increasing the application of automation sciences to automotive technologies. The Autonomy Sciences and Systems course was offered on the Spring of 2017. This course engagedstudents into a survey of state-of-the art robotics algorithms found in research while introducing toolsused to develop these technologies. The robotic operating system (ROS) was the main programming environment used to perform many of the course activities as well as the final project. This is a report documenting Team A's implementation of the final project with associated instructions and tutorials.


Sign in / Sign up

Export Citation Format

Share Document