Design of Digital Evidence Collection Framework in Social Media Using SNI 27037: 2014
Abstract
Social media is a place that people use to socialize. In addition to socializing, social media is also often used as a crime medium by certain people. In the evidentiary process, law enforcers have the duty to present the evidence used by the suspect in committing his crime. The method used in collecting digital evidence from social media must have a clear scientific basis and guidelines. If the method used is not known as a theory or method in digital forensics, this will undermine all expert testimony and evidence presented in the court. Making a framework that can be recognized by all judicial administrators (judges, public prosecutors, attorneys for defendants, witnesses and defendants) is a solution that can be used as a standard so that the evidence process runs well. The framework that has been created by the researcher is an update from the previous framework. The framework design is made using the Composite Logic method. The composite logic method will collaborate with the Digital Forensics Investigation Models framework to produce a new framework. Based on existing data and facts, this research has produced a framework with better performance than the previous framework.
Keywords
References
[1] R. Setiawan, “Perancangan Arsitektur Enterprise Untuk Perguruan Tinggi Swasta Menggunakan Togaf Adm,” J. Algoritm., vol. 12, no. 2, pp. 548–561, 2016.
[2] Lontar.id, “Ahli Digital Forensik Pertanyakan Kekuatan Alat Bukti Rekaman KPK - Lontar.id,” 2019. https://lontar.id/ahli-digital-forensik-pertanyakan-kekuatan-alat-bukti-rekaman-kpk/ [accessed Oct. 10, 2020].
[3] D. Sudyana, B. Sugiantoro, and A. Luthfi, “Instrumen Evaluasi Framework Investigasi Forensika Digital Menggunakan SNI 27037:2014,” J. Inform. Sunan Kalijaga, vol. 1, no. 2, pp. 75–83, 2016.
[4] M. N. Al Jumah, B. Sugiantoro, and Y. Prayudi, “Penerapan Metode Composite Logic Untuk Perancangan Framework Pengumpulan Bukti Digital Pada Media Sosial,” Ilk. J. Ilm., vol. 11, no. 2, pp. 135–142, 2019.
[5] M. Nardo, M. Saisana, A. Saltelli, Handbook of Contructing Compsoite Indicators: Methodology and user guide. 2008.
[6] P. F. McCawley, “The Logic Model for program planning and evaluation,” Univ. Idaho, pp. 1–5, 2002.
[7] N. Lizarti, B. Sugiantoro, and Y. Prayudi, “Penerapan Composite Logic Dalam Mengkolaborasikan Framework Terkait Multimedia Forensik,” JISKa, vol. 2, no. 1, pp. 26–33, 2017.
[8] M. T. Anwar, “Analisis Pola Persebaran Pornografi pada Media Sosial dengan Social Network Analysis,” J. Buana Inform., vol. 9, no. 1, pp. 43–52, 2018.
[9] S. Perumal and N. Norwawi, “Integrated computer forensic investigation model based on Malaysian standards,” Int. J. Electron. Secur. Digit. Forensics, vol. 3, no. 2, pp. 108–119, 2010.
[10] F. Cohen, “An Examination of Digital Forensic Models,” 4th Int. Work. Syst. Approaches to Digit. Forensic Eng. SADFE 2009, vol. 1, no. 3, pp. 42–53, 2009.
[11] R. Rizal, “Network Forensics Untuk Mendeteksi Serangan Flooding Pada Perangkat Internet Of Things ( IoT ),” J. Teknol. dan Sist. Komput., p. 67, 2018.
[12] M. K. Rogers et al., “Journal of Digital Forensics , Security and Law Computer Forensics Field Triage Process Model Computer Forensics Field Triage Process Model,” J. Digit. Forensics, Secur. Law, vol. 1, no. 2, pp. 1–21, 2006.
[13] KUHAP, “Undang-Undang Republik Indonesia Nomor 8 Tahun 1981 Tentang Kitab Undang Undang Hukum Acara Pidana (KUHAP),” Kpk, vol. 1951, no. 8, 1981.
[14] “Oxygen Forensics - Mobile forensic solutions: software and hardware.” https://www.oxygen-forensic.com/en/products/oxygen-forensic-detective [accessed Aug. 17, 2021].
[15] “Cellebrite UFED CLOUD | Access Cloud-Based Evidence.” https://www.cellebrite.com/en/ufed-cloud/ [accessed Aug. 17, 2021].
[16] Sunardi, I. Riadi, and M. H. Akbar, “Penerapan Metode Static Forensics untuk Ekstraksi File Steganografi pada Bukti Digital Menggunakan Framework DFRWS,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 4, no. 3, pp. 576–583, 2020.
[17] Y. Bin Pairin, “Kode Autentikasi Hash pada Pesan Teks Berbasis Android,” Eksplora Inform., vol. 8, no. 1, p. 6, 2018.
[18] Y. Prayudi and A. SN, “Digital Chain of Custody: State of The Art,” Int. J. Comput. Appl., vol. 114, no. 5, pp. 1–9, 2015.
[19] Ilham, “Ketertelusuran Metrologi atau Pengukuran dalam ISO IEC 17025 versi 2017 - LABMUTU,” 2020. https://www.labmutu.com/2020/04/ketertelusuran-metrologi.html [accessed Jul. 21, 2021].
[20] M. S. Hartawan, A. Damuri, and A. S. Putra, “Pengolahan Data Untuk Menemukan Bukti Pada Mobile Forensik,” 2020.
[21] U. M. Aruan, “Tata Cara Penyitaan Barang Bukti Tindak Pidana Menurut Kuhap,” Lex Crim., vol. 3, no. 2, pp. 77–85, 2014.
[22] S. Stieglitz, M. Mirbabaie, B. Ross, and C. Neuberger, “Social media analytics – Challenges in topic discovery, data collection, and data preparation,” Int. J. Inf. Manage., vol. 39, no. October 2017, pp. 156–168, 2018.
[23] G. Palmer, “A road map for digital forensic research,” Proc. Digit. Forensic Res. Conf. DFRWS 2001 USA, pp. iii–42, 2001.
[24] M. Y. F. N. HERIANI, “Kedudukan Ahli dan Pendapatnya dalam Perkara Pidana - Hukumonline.com.” https://www.hukumonline.com/berita/baca/lt57bc379b6a154/kedudukan-ahli-dan-pendapatnya-dalam-perkara-pidana/ [accessed Jul. 28, 2021].
DOI: 10.30595/juita.v10i1.13149
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 4.0 International License.
ISSN: 2579-8901
- Visitor Stats
View JUITA Stats