Mobile Forensics in Human Trafficking Investigation Services Using Mobile Laboratory
DOI:
https://doi.org/10.30595/juita.v13i1.24060Keywords:
ACPO framework, digital forensics, human trafficking, mobile laboratory, whatsapp forensicsAbstract
This research examines the application of a mobile digital forensic laboratory developed by the Digital Forensics Center (DFC) at UMP to handle digital evidence directly at crime scenes, specifically in human trafficking cases. Integrating the Association of Chief Police Officers' (ACPO) methods, this mobile lab facilitates the investigative process, from planning to evidence collection and analysis, without delaying transport to a central lab, thereby speeding response times and minimizing evidence degradation. We employed Magnet Axiom and DF-Tools to analyze WhatsApp data. Each demonstrated varying performance in identifying key digital evidence such as text messages, media, and group chats. DF-Tools showed an advantage in identifying multimedia artifacts with a 69.48% data acquisition success rate, compared to Magnet Axiom at 68.57%. Additionally, police bolstered their efforts to uncover human trafficking networks by implementing Base Transceiver Station (BTS)-based location tracking techniques to pinpoint suspect and victim locations via phone data or identity numbers. The research findings demonstrate that mobile labs enable rapid on-site responses, offer flexibility in collecting and securing digital evidence, and enhance efficiency and effectiveness of digital forensic investigations.References
[1] I. Riadi, A. Yudhana, and M. Al Barra, “Forensik Mobile pada Layanan Media Sosial LinkedIn,” JISKA (Jurnal Inform. Sunan Kalijaga), vol. 6, no. 1, pp. 9–20, 2021, doi: 10.14421/jiska.2021.61-02.
[2] A. Alanda, D. Satria, H. A. Mooduto, and B. Kurniawan, “Mobile Application Security Penetration Testing Based on OWASP,” IOP Conf. Ser. Mater. Sci. Eng., vol. 846, no. 1, 2020, doi: 10.1088/1757-899X/846/1/012036.
[3] S. K. Saad, R. Umar, and A. Fadlil, “Analisis Forensik Aplikasi Dropbox pada Android menggunakan Metode NIJ pada Kasus Penyembunyian Berkas,” J. Sains Komput. Inform. (J-SAKTI, vol. 4, no. September, p. 293, 2020, [Online]. Available: https://tunasbangsa.ac.id/ejurnal/index.php/jsakti/article/view/221/203 (accessed Jul. 10, 2024).
[4] N. Saputri and R. Indrayani, “Analisis Data Forensik Investigasi Kasus Peredaran Narkoba Pada Smartphone Berbasis Android,” Djtechno J. Teknol. Inf., vol. 3, no. 2, pp. 156–166, 2022, doi: 10.46576/djtechno.v3i2.2597.
[5] K. A. Hogan and D. Roe-Sepowitz, “Providing Services to Victims of Human Trafficking During the COVID-19 Pandemic: A Social Service Agency State-Wide Survey,” J. Soc. Serv. Res., vol. 49, no. 3, pp. 357–376, 2023, doi: 10.1080/01488376.2023.2232827.
[6] C. M. Annur, “Ada 90 Ribu Korban Perdagangan Manusia di Seluruh Dunia pada 2021,” Katadata Media Network, 2021.
[7] I. Anshori, K. E. Setya Putri, and U. Ghoni, “Analisis Barang Bukti Digital Aplikasi Facebook Messenger Pada Smartphone Android Menggunakan Metode NIJ,” IT J. Res. Dev., vol. 5, no. 2, pp. 118–134, 2020, doi: 10.25299/itjrd.2021.vol5(2).4664.
[8] S. Sotnik, T. Shakurova, and V. Lyashenko, “Development Features Web-Applications,” Int. J. Acad. Appl. Res., vol. 7, no. 1, pp. 2643–9603, 2023, [Online]. Available: www.ijeais.org/ijaar (accessed Jul. 11, 2024).
[9] Sunardi, I. Riadi, and M. H. Akbar, “Application of Static Forensics Method for Extracting Steganographic Files on Digital Evidence Using the DFRWS Framework,” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 4, no. 3, pp. 576–583, 2020, doi: 10.29207/resti.v4i3.1906.
[10] I. Riadi, S. Sunardi, and A. Hadi, “Analisis Bukti Digital TRIM Enable SSD NVMe Menggunakan Metode Static Forensics,” JUITA J. Inform., vol. 8, no. 1, p. 65, 2020, doi: 10.30595/juita.v8i1.6584.
[11] R. N. Dasmen and F. Kurniawan, “Digital Forensik Deleted Cyber Crime Evidence pada Pesan Instan Media SosialDigital Forensik Deleted Cyber Crime Evidence pada Pesan Instan Media Sosial,” Techno.Com, vol. 20, no. 4, pp. 527–539, 2021, doi: 10.33633/tc.v20i4.5170.
[12] M. El-Tayeb, A. Taha, and Z. Taha, “Streamed Video Reconstruction for Firefox Browser Forensics,” Ing. des Syst. d’Information, vol. 26, no. 4, pp. 337–344, 2021, doi: 10.18280/ISI.260401.
[13] A. Setya and A. Suganda, “Design of Digital Evidence Collection Framework in Social Media Using SNI 27037: 2014,” JUITA J. Inform., vol. 10, no. 1, p. 127, 2022, doi: 10.30595/juita.v10i1.13149.
[14] J. Son, Y. W. Kim, D. Bin Oh, and K. Kim, “Forensic analysis of instant messengers: Decrypt Signal, Wickr, and Threema,” Forensic Sci. Int. Digit. Investig., vol. 40, p. 301347, 2022, doi: 10.1016/j.fsidi.2022.301347.
[15] B. Actoriano and I. Riadi, “Forensic Investigation on Whatsapp Web Using Framework Integrated Digital Forensic Investigation Framework Version 2,” Int. J. Cyber-Security Digit. Forensic, vol. 7, no. 4, pp. 410–419, 2018, [Online]. Available: https://www.researchgate.net/publication/327592240 (accessed Jul. 10, 2024).
[16] G. Fanani, I. Riadi, and A. Yudhana, “Analisis Forensik Aplikasi Michat Menggunakan Metode Digital Forensics Research Workshop,” J. Media Inform. Budidarma, vol. 6, no. 2, p. 1263, 2022, doi: 10.30865/mib.v6i2.3946.
[17] I. Riadi, H. Herman, and N. H. Siregar, “Mobile Forensic of Vaccine Hoaxes on Signal Messenger using DFRWS Framework,” MATRIK J. Manajemen, Tek. Inform. dan Rekayasa Komput., vol. 21, no. 3, pp. 489–502, 2022, doi: 10.30812/matrik.v21i3.1620.
[18] R. A. Bintang, R. Umar, and A. Yudhana, “Analisis Media Sosial Facebook Lite dengan tools Forensik menggunakan Metode NIST,” Techno (Jurnal Fak. Tek. Univ. Muhammadiyah Purwokerto), vol. 21, no. 2, p. 125, 2020, doi: 10.30595/techno.v21i2.8494.
[19] J. Williams, ACPO Good Practice Guide for Digital Evidence, 5.0., vol. 71, no. 10. England, Wales & Northern Ireland. It: Police Cenral e-Crime Unit, 2012.
[20] F. Anggraini, H. Herman, and A. Yudhana, “Analisis Forensik Aplikasi TikTok Pada Smartphone Android Menggunakan Framework Association of Chief Police Officers,” JURIKOM (Jurnal Ris. Komputer), vol. 9, no. 4, p. 1117, 2022, doi: 10.30865/jurikom.v9i4.4738.
[21] M. N. A. and S. D. Chapman, “SYSTEMAND METHOD FOR DETERMINING A BASE TRANSCEIVER STATION LOCATION,” US 7,751,833 B2, 2013.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 JUITA: Jurnal Informatika

This work is licensed under a Creative Commons Attribution 4.0 International License.

JUITA: Jurnal Informatika is licensed under a Creative Commons Attribution 4.0 International License.