ANALISIS FORENSIK BUKTI DIGITAL PADA KEJAHATAN PEMBUNUHAN BERENCANA MENGGUNAKAN METODE NATIONAL INSTITUTE OF JUSTICE

Ageng Restu Triyanto
Fahmi Fachri


DOI: https://doi.org/10.29100/jipi.v9i2.5558

Abstract


Flashdisks and SSDs are storage devices that are widely used, because even flashdisks have various capacities but still have a minimalist shape making it easy to carry anywhere. Apart from the large number of flashdisk users, SSDs are also widely used because most laptops now use SSDs as storage media, because SSDs can be said to be much better storage compared to laptops which still use HDDs for storage media, because SSDs use NAND Flash chips which are used for storage. save data. As storage media continues to develop, it is possible that it will be used in negative ways or for criminal acts, such as storing crime data and then deleting it permanently in an effort to eliminate traces of crimes that have been committed. This research uses a scenario where evidence data is then permanently deleted, with the aim of restoring data that has been deleted, including deleting data on Flashdisks and SSDs. In an effort to recover data, researchers use the FTK Imager and Autopsy tools. The data found will be analyzed using the National Institute of Justice (NIJ) method to find the percentage results of whether the data items obtained are valid with the authenticity of the evidence sought. The conclusion of this research is the use of the National Institute of Justice (NIJ) method, namely sequencing the stages of digital forensics starting from identification, collection, examination, analysis and reporting in the analysis to determine the percentage of authenticity of evidence.

Keywords


Digital Forensics, SSD, Flashdisk, FTK Im-ager, Autopsy

Full Text:

PDF

Article Metrics :

References


I. Riadi, R. Umar, and I. M. Nasrulloh, “Analisis Forensik Digital Pada Frozen Solid State Drive Dengan Metode National Institute of Justice (Nij),” Elinvo (Electronics, Informatics, Vocat. Educ., vol. 3, no. 1, pp. 70–82, 2018, doi: 10.21831/elinvo.v3i1.19308.

G. Mishardila, “Analisa dan pencarian bukti forensik digital pada aplikasi media sosial facebook dan twitter menggunakan metode statik forensik skripsi,” 2020.

M. Riskiyadi, “Investigasi Forensik Terhadap Bukti Digital Dalam Mengungkap Cybercrime,” Cyber Secur. dan Forensik Digit., vol. 3, no. 2, pp. 12–21, 2020, doi: 10.14421/csecurity.2020.3.2.2144.

M. H. Akbar and I. Riadi, “ANALISIS BUKTI DIGITAL PADA FLASH DISK DRIVE MENGGUNAKAN METODE GENERIC COMPUTER FORENSIC INVESTIGATION MODEL ( GCFIM ),” pp. 715–723, 2019.

I. Riadi, “Analisis Forensik Recovery pada Smartphone Android Menggunakan Metode National Institute Of Justice ( NIJ ),” vol. 3, no. 1, 2019.

N. Fatmah and R. Indrayani, “Jurnal Teknologi Sistem Informasi dan Sistem Komputer TGD Analisis Forensik Digital pada Solid State Drive Fungsi TRIM Menggunakan Tools Autopsy dan OSForensics Jurnal Teknologi Sistem Informasi dan Sistem Komputer TGD,” vol. 5, pp. 185–192, 2022.

I. Riadi, S. Sunardi, and A. Hadi, “Analisis Bukti Digital SSD NVMe pada Sistem Operasi Proprietary Analisis Bukti Digital SSD NVMe pada Sistem Operasi Proprietary Menggunakan Metode Static Forensics,” no. February 2020, 2019.

R. A. Ramadhan and D. Mualfah, “Implementasi Metode National Institute of Justice (NIJ) Pada Fitur TRIM SOLID STATE DRIVE (SSD) Dengan Objek Eksperimental Sistem Operasi Windows, Linux dan Macintosh,” IT J. Res. Dev., vol. 5, no. 2, pp. 183–192, 2020, doi: 10.25299/itjrd.2021.vol5(2).5750.

I. Riadi, A. Fadlil, and M. I. Aulia, “Review Proses Forensik Optical Drive Menggunakan Metode National Institute of Justice (NIJ),” J. Ilm. Tek. Inform. dan Sist. Inf., vol. 8, pp. 107–118, 2019.

R. Inggi, H. P. Alam, P. Studi, and S. Informasi, “ANALISIS FORENSIK WEB BROWSER,” vol. 8, no. 1, pp. 215–220, 2023.

A. Yudhana, R. Umar, and A. Ahmadi, “Akuisisi Data Forensik Google Drive Pada Android Dengan Metode National Institute of Justice ( NIJ ),” vol. X, no. X, pp. 8–13.

F. N. Pabokory, I. F. Astuti, and A. H. Kridalaksana, “Implementasi Kriptografi Pengamanan Data Pada Pesan Teks, Isi File Dokumen, Dan File Dokumen Menggunakan Algoritma Advanced Encryption Standard,” Inform. Mulawarman J. Ilm. Ilmu Komput., vol. 10, no. 1, p. 20, 2016, doi: 10.30872/jim.v10i1.23.

D. Julian, A. Wijaya, and T. Sutabri, “Perbandingan Kinerja Aplikasi Pengembalian Data Untuk Digital Forensik Dengan Metode National Institute of Standards and Technology,” vol. 3, no. 1, pp. 210–218, 2023.

Imam Riadi, Abdul Fadlil, and Muhammad Immawan Aulia, “Investigasi Bukti Digital Optical Drive Menggunakan Metode National Institute of Standard and Technology (NIST),” J. RESTI (Rekayasa Sist. dan Teknol. Informasi), vol. 4, no. 5, pp. 820–828, 2020, doi: 10.29207/resti.v4i5.2224.

D. Mualfah, Muhammad Iqbal Syam, and Baidarus, “Analisis perbandingan tools mobile forensic menggunakan metode national institute of justice (NIJ),” J. CoSciTech (Computer Sci. Inf. Technol., vol. 4, no. 1, pp. 283–292, 2023, doi: 10.37859/coscitech.v4i1.4767.

I. Wahyudi, A. Muntasa, M. Yusuf, and A. Hamzah, “Mengungkap Dan Menguji Keaslian Bukti Digital Pada Kejahatan Cybercrime Dengan Metode Digital Forensic Research Workshop,” J. Apl. Teknol. Inf. dan Manaj., vol. 2, no. 2, pp. 120–127, 2021, doi: 10.31102/jatim.v2i2.1068.

S. Keputusan Dirjen Penguatan Riset dan Pengembangan Ristek Dikti, I. Riadi, and J. Triyanto, “Terakreditasi SINTA Peringkat 4 Forensics Mobile Layanan WhatsApp pada Smartwatch Menggunakan Metode National Institute of Justice,” vol. 3, no. 1, pp. 63–70, 2018.