Chain of custody is the procedure to do a chronological documentation of evidence, and it is an important procedure in the investigation process. Both physical and digital evidence is an important part in the process of investigation and courtroom. However, handling the chain of custody for digital evidence is more difficult than the handling of physical evidence. Nevertheless, the handling of digital evidence should still have the same procedure with the handling of physical evidence. Until now handling the chain of custody for digital evidence is still an open problem with a number of challenges, including the business model of the interaction of the parties that deal with digital evidence, recording of metadata information as well as issues of access control and security for all the handling digital chain of custody. The solution offered in this research is to build a model of Digital Evidence Cabinets as a new approach in implementing the digital evidence handling and chain of custody. The model is constructed through three approaches: Digital Evidence Management Frameworks, Digital Evidence Bags with Tag Cabinets as well as access control and secure communication. The proposed framework is expected to be a solution for the availability of an environment handling of digital evidence and to improve the integrity and credibility of digital evidence.
Digital forensics starts to show its role and contribution in the society as a solution in disclosure of cybercrime. The essential in digital forensics is chain of custody, which is an attempt to preserve the integrity of digital evidence as well as a procedure for performing documentation chronologically toward evidence. The characteristics of digital evidence have caused the handling chain of custody is becoming more complicated and complex. A number of researchers have contributed to provide solutions for the digital chain custody through a different point of views. This paper gives an overview of the extent to which the problem and challenges are faced in the digital chain of custody issue as well as the scope of researches that can be done to contribute in the issue of the digital chain of custody. General TermsDigital Forensics
The handling of digital evidence can become an evidence of a determination that crimes have been committed or may give links between crime and its victims or crime and the culprit. Soft System Methodology (SSM) is a method of evaluation to compare a conceptual model with a process in the real world, so deficiencies of the conceptual model can be revealed thus it can perform corrective action against the conceptual model, thus there is no difference between the conceptual model and the real activity. Evaluation on the IDFIF stage is only done on a reactive and proactive process stages in the process so that the IDFIF model can be more flexible and can be applied on the investigation process of a smartphone.
Abstract-The Activities of Internet users are increasing from year to year and has had an impact on the behavior of the users themselves. Assessment of user behavior is often only based on interaction across the Internet without knowing any others activities. The log activity can be used as another way to study the behavior of the user. The Log Internet activity is one of the types of big data so that the use of data mining with K-Means technique can be used as a solution for the analysis of user behavior. This study has been carried out the process of clustering using K-Means algorithm is divided into three clusters, namely high, medium, and low. The results of the higher education institution show that each of these clusters produces websites that are frequented by the sequence: website search engine, social media, news, and information. This study also showed that the cyber profiling had been done strongly influenced by environmental factors and daily activities.
Almost all aspects of life already use the internet, to be able to access the Internet one of them using a web browser. For security, some web browser features to develop private mode. Unfortunately, from this feature, by some unscrupulous used for criminal activities by the anti-forensics. An anti-forensics process such as by using a portable web browser and delete registry. Motivation use of anti-forensics is to minimize or inhibit the discovery of digital evidence in criminal cases. So that, be an obstacle for investigators to uncover internet crimes that have been carried out. This paper proposes a framework for analysis phases of the web browser in private mode and anti-forensics. The purpose of this study is to provide solutions in forensic investigations effectively and efficiently using live forensics. This study uses a live forensics to get more detailed 3 evidence information on the computer with the condition is still on. So this method is suitable to be applied to the handling of incidents more quickly and allows getting the data in RAM. General TermsBrowser Security, Digital Forensic.
Security and confidentiality of data or information at the present time has become an important concern. Advanced methods for secure transmission, storage, and retrieval of digital images are increasingly needed for a number of military, medical, homeland security, and other applications. Various kinds of techniques for increase security data or information already is developed, one common way is by cryptographic techniques. Cryptography is science to maintain the security of the message by changing data or information into a different form, so the message cannot be recognized.To compensate for increasing computing speeds increases, it takes more than one encryption algorithm to improve security of digital images. One way is by using algorithms to double cryptography do encryption and decryption. Cryptographic algorithm often used today and the proven strength specially the digital image is Algorithm with Chaos system. To improve security at the image then we use Additional algorithms namely Rivers algorithm Shamir Adleman (RSA) which known as the standard of cryptography algorithms.This research aims to optimize security bitmap image format by combining the two algorithms namely Chaos-based algorithms and RSA algorithm into one application. Experiments conducted show that the proposed algorithm possesses robust security features such as fairly uniform distribution, high sensitivity to both keys and plain images, almost ideal entropy, and the ability to highly de-correlate adjacent pixels in the cipher images. Furthermore, it has a large key space, and transform image to pure text file which greatly increases its security for image encryption applications. General TermsSecurity
Perkembangan teknologi yang semakin pesat, dapat menimbulkan permasalahan bagi pengguna teknologi itu sendiri, semakin maju kehidupan masyarakat, maka kejahatan juga ikut semakin maju. Smartphone merupakan salah satu bentuk teknologi yang digunakan untuk melakukan penipuan melalui fasilitas Short Message Service (SMS). Pada saat smartphone yang digunakan untuk melakukan kejahatan maka smartphone tersebut dapat disita oleh aparat penegak hukum sebagai salah satu barang bukti. Cara pembuktian untuk mendapatkan bukti yang valid adalah dengan melakukan investigasi menggunakan pendekatan penanganan bukti digital yang dikenal dengan istilah Framework. Integrated Digital Forensics Investigation Framework versi 2 (IDFIF v2) merupakan framework terbaru yang telah dikembangkan sehingga dapat digunakan untuk proses investigasi smartphone.Kata kunci— Barang Bukti, Framework, IDFIF v2, Smartphone
<strong>Abstrak</strong><br />Audio forensik merupakan salah satu ilmu yang mnyandingkan antara ilmu pengetahuan dan metode ilmiah dalam proses analisis rekaman suara untuk membantu dan mendukung pengungkapan suatu tindak kejahatan yang diperlukan dalam proses persidangan. Undang-undang ITE No.19 Tahun 2016 menyebutkan bahwa rekaman suara merupakan salah satu alat bukti digital yang sah dan dapat digunakan sebagai penguat dakwaan. Rekaman suara yang merupakan barang bukti digital sangatlah mudah dan rentan dimanipulasi, baik secara sengaja maupun tidak disengaja. Pada penelitian ini dilakukan analisis terkait tingkat kemiripan antara rekaman suara voice changer dengan rekaman suara asli menggunakan analisis pitch, formant dan spectogram, rekaman suara yang dianalisis ada dua jenis rekaman suara yaitu suara laki-laki dan suara perempuan. Rekaman suara voice changer dan rekaman suara asli, diekstrak menggunakan tools praat kemudian informasi yang diperoleh dianalisis dengan analisis statistik pitch, formant dan spectrogrammenggunakan tools gnumeric. Penelitian ini menghasilkan bahwa analisis rekaman suara voice changer dengan rekaman suara asli dapat menggunakan analisis statistik pitch, formant dan spectrogram, rekaman suara voice changer A memiliki tingkat kemiripan yang paling tinggi dengan rekaman suara asli pada posisi low pitch, sedangkan voice changer yang lain lebih sulit untuk diidentifikasi.<br />Kata Kunci: Audio Forensik, Voice Changer, Rekaman Suara, Pitch, Formant, Spectogram<br /><br /><strong>Abstract</strong><br />Audio forensics is one of the sciences that mnyandingkan between science and scientific methods in the process of sound recording analysis to assist and support the disclosure of a crime required in the trial process. The ITE Act No.19 of 2016 states that voice recording is one of the most valid digital instruments and can be used as an indictment. Voice recordings that are digital evidence are extremely easy and prone to be manipulated, either intentionally or unintentionally. In this research, there is an analysis related to the similarity level between the voice changer voice recording with the original sound recordings using pitch, formant and spectogram analysis. The sound recording that is analyzed are two types of sound recording, namely male voice and female voice. Voice recording of voice changer and original sound recording, extracted using praat tools then the information obtained is analyzed by pitch, formant and spectrogram analysis using gnumeric tools. This study resulted in the analysis of voice changer voice recording with original sound recording using pitch, formant and spectrogram statistical analysis, voice changer A voice recording has the highest level of resemblance with original sound recording in low pitch position, while other voice changer more difficult to be identified<br />Keywords: Audio forensics, Voice Changer, Sound Recording, Pitch, Formant, Spectogram
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
334 Leonard St
Brooklyn, NY 11211
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.