Mobile Forensics in Human Trafficking Investigation Services Using Mobile Laboratory

Authors

  • Muammar Muammar Universitas Ahmad Dahlan, Indonesia
  • Imam Riadi Universitas Ahmad Dahlan, Indonesia
  • Rusydi Umar Universitas Ahmad Dahlan, Indonesia

DOI:

https://doi.org/10.30595/juita.v13i1.24060

Keywords:

ACPO framework, digital forensics, human trafficking, mobile laboratory, whatsapp forensics

Abstract

This research examines the application of a mobile digital forensic laboratory developed by the Digital Forensics Center (DFC) at UMP to handle digital evidence directly at crime scenes, specifically in human trafficking cases. Integrating the Association of Chief Police Officers' (ACPO) methods, this mobile lab facilitates the investigative process, from planning to evidence collection and analysis, without delaying transport to a central lab, thereby speeding response times and minimizing evidence degradation.  We employed Magnet Axiom and DF-Tools to analyze WhatsApp data. Each demonstrated varying performance in identifying key digital evidence such as text messages, media, and group chats. DF-Tools showed an advantage in identifying multimedia artifacts with a 69.48% data acquisition success rate, compared to Magnet Axiom at 68.57%. Additionally, police bolstered their efforts to uncover human trafficking networks by implementing Base Transceiver Station (BTS)-based location tracking techniques to pinpoint suspect and victim locations via phone data or identity numbers. The research findings demonstrate that mobile labs enable rapid on-site responses, offer flexibility in collecting and securing digital evidence, and enhance efficiency and effectiveness of digital forensic investigations.

Author Biographies

Muammar Muammar, Universitas Ahmad Dahlan, Indonesia

Master Program of Informatics

Imam Riadi, Universitas Ahmad Dahlan, Indonesia

Department of Information System

Rusydi Umar, Universitas Ahmad Dahlan, Indonesia

Master Program of Informatics

References

[1] I. Riadi, A. Yudhana, and M. Al Barra, “Forensik Mobile pada Layanan Media Sosial LinkedIn,” JISKA (Jurnal Inform. Sunan Kalijaga), vol. 6, no. 1, pp. 9–20, 2021, doi: 10.14421/jiska.2021.61-02.

[2] A. Alanda, D. Satria, H. A. Mooduto, and B. Kurniawan, “Mobile Application Security Penetration Testing Based on OWASP,” IOP Conf. Ser. Mater. Sci. Eng., vol. 846, no. 1, 2020, doi: 10.1088/1757-899X/846/1/012036.

[3] S. K. Saad, R. Umar, and A. Fadlil, “Analisis Forensik Aplikasi Dropbox pada Android menggunakan Metode NIJ pada Kasus Penyembunyian Berkas,” J. Sains Komput. Inform. (J-SAKTI, vol. 4, no. September, p. 293, 2020, [Online]. Available: https://tunasbangsa.ac.id/ejurnal/index.php/jsakti/article/view/221/203 (accessed Jul. 10, 2024).

[4] N. Saputri and R. Indrayani, “Analisis Data Forensik Investigasi Kasus Peredaran Narkoba Pada Smartphone Berbasis Android,” Djtechno J. Teknol. Inf., vol. 3, no. 2, pp. 156–166, 2022, doi: 10.46576/djtechno.v3i2.2597.

[5] K. A. Hogan and D. Roe-Sepowitz, “Providing Services to Victims of Human Trafficking During the COVID-19 Pandemic: A Social Service Agency State-Wide Survey,” J. Soc. Serv. Res., vol. 49, no. 3, pp. 357–376, 2023, doi: 10.1080/01488376.2023.2232827.

[6] C. M. Annur, “Ada 90 Ribu Korban Perdagangan Manusia di Seluruh Dunia pada 2021,” Katadata Media Network, 2021.

[7] I. Anshori, K. E. Setya Putri, and U. Ghoni, “Analisis Barang Bukti Digital Aplikasi Facebook Messenger Pada Smartphone Android Menggunakan Metode NIJ,” IT J. Res. Dev., vol. 5, no. 2, pp. 118–134, 2020, doi: 10.25299/itjrd.2021.vol5(2).4664.

[8] S. Sotnik, T. Shakurova, and V. Lyashenko, “Development Features Web-Applications,” Int. J. Acad. Appl. Res., vol. 7, no. 1, pp. 2643–9603, 2023, [Online]. Available: www.ijeais.org/ijaar (accessed Jul. 11, 2024).

[9] Sunardi, I. Riadi, and M. H. Akbar, “Application of Static Forensics Method for Extracting Steganographic Files on Digital Evidence Using the DFRWS Framework,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 4, no. 3, pp. 576–583, 2020, doi: 10.29207/resti.v4i3.1906.

[10] I. Riadi, S. Sunardi, and A. Hadi, “Analisis Bukti Digital TRIM Enable SSD NVMe Menggunakan Metode Static Forensics,” JUITA J. Inform., vol. 8, no. 1, p. 65, 2020, doi: 10.30595/juita.v8i1.6584.

[11] R. N. Dasmen and F. Kurniawan, “Digital Forensik Deleted Cyber Crime Evidence pada Pesan Instan Media SosialDigital Forensik Deleted Cyber Crime Evidence pada Pesan Instan Media Sosial,” Techno.Com, vol. 20, no. 4, pp. 527–539, 2021, doi: 10.33633/tc.v20i4.5170.

[12] M. El-Tayeb, A. Taha, and Z. Taha, “Streamed Video Reconstruction for Firefox Browser Forensics,” Ing. des Syst. d’Information, vol. 26, no. 4, pp. 337–344, 2021, doi: 10.18280/ISI.260401.

[13] A. Setya and A. Suganda, “Design of Digital Evidence Collection Framework in Social Media Using SNI 27037: 2014,” JUITA J. Inform., vol. 10, no. 1, p. 127, 2022, doi: 10.30595/juita.v10i1.13149.

[14] J. Son, Y. W. Kim, D. Bin Oh, and K. Kim, “Forensic analysis of instant messengers: Decrypt Signal, Wickr, and Threema,” Forensic Sci. Int. Digit. Investig., vol. 40, p. 301347, 2022, doi: 10.1016/j.fsidi.2022.301347.

[15] B. Actoriano and I. Riadi, “Forensic Investigation on Whatsapp Web Using Framework Integrated Digital Forensic Investigation Framework Version 2,” Int. J. Cyber-Security Digit. Forensic, vol. 7, no. 4, pp. 410–419, 2018, [Online]. Available: https://www.researchgate.net/publication/327592240 (accessed Jul. 10, 2024).

[16] G. Fanani, I. Riadi, and A. Yudhana, “Analisis Forensik Aplikasi Michat Menggunakan Metode Digital Forensics Research Workshop,” J. Media Inform. Budidarma, vol. 6, no. 2, p. 1263, 2022, doi: 10.30865/mib.v6i2.3946.

[17] I. Riadi, H. Herman, and N. H. Siregar, “Mobile Forensic of Vaccine Hoaxes on Signal Messenger using DFRWS Framework,” MATRIK J. Manajemen, Tek. Inform. dan Rekayasa Komput., vol. 21, no. 3, pp. 489–502, 2022, doi: 10.30812/matrik.v21i3.1620.

[18] R. A. Bintang, R. Umar, and A. Yudhana, “Analisis Media Sosial Facebook Lite dengan tools Forensik menggunakan Metode NIST,” Techno (Jurnal Fak. Tek. Univ. Muhammadiyah Purwokerto), vol. 21, no. 2, p. 125, 2020, doi: 10.30595/techno.v21i2.8494.

[19] J. Williams, ACPO Good Practice Guide for Digital Evidence, 5.0., vol. 71, no. 10. England, Wales & Northern Ireland. It: Police Cenral e-Crime Unit, 2012.

[20] F. Anggraini, H. Herman, and A. Yudhana, “Analisis Forensik Aplikasi TikTok Pada Smartphone Android Menggunakan Framework Association of Chief Police Officers,” JURIKOM (Jurnal Ris. Komputer), vol. 9, no. 4, p. 1117, 2022, doi: 10.30865/jurikom.v9i4.4738.

[21] M. N. A. and S. D. Chapman, “SYSTEMAND METHOD FOR DETERMINING A BASE TRANSCEIVER STATION LOCATION,” US 7,751,833 B2, 2013.

Downloads

Published

2025-03-18

How to Cite

Muammar, M., Riadi, I., & Umar, R. (2025). Mobile Forensics in Human Trafficking Investigation Services Using Mobile Laboratory. JUITA: Jurnal Informatika, 13(1), 1–10. https://doi.org/10.30595/juita.v13i1.24060

Most read articles by the same author(s)