Signal Forensics
Signal Forensics
Signal Forensics
https://doi.org/10.18280/isi.270606 ABSTRACT
Received: 10 November 2022 Cybercrime is a crime committed using equipment connected to the internet. One of the
Accepted: 20 December 2022 cybercrimes that occured during the COVID-19 pandemic was the spread hoaxes about the
Covid-19 vaccine which caused panic in society. Signal Messenger is one of the social
Keywords: media that has become a trending topic since the number of personal data security issues
android, COVID-19 vaccine, cybercrime, and the emergence of end-to-end encryption features. This research aims to find digital
DFRWS framework, hoax, mobile forensic, evidence on Signal Messenger application installed on the perpetrator's Android
signal messenger smartphone. This research uses Belkasoft, Magnet AXIOM, and MOBILedit Forensic
Express tools and implements the Digital Forensics Research Workshop (DFRWS)
framework in each stage of the research experiment. The research was carried out according
to the case scenario with 11 predetermined parameters. Digital evidence is found from the
Signal Messenger application: application information, account information, chat, pictures,
videos, contacts, and stickers. The results of this research indicate that Belkasoft Evidence
Center forensic tool is better, with an accuracy rate of 78.69%, while Magnet AXIOM is
26.23% and MOBILedit Forensic Express is 9.84%. The results of this research can be used
as a reference for other forensic researchers/experts in handling similar crime cases on the
Signal Messenger application to get better results.
1. INTRODUCTION they can do online. This activity makes people today prefer to
use smartphones to overcome monotony.
Pandemic comes from the Greek word consisting of the Technological developments are one of the reasons behind
words "pan" and "demos", which can be translated as "all the the increase in smartphone technology. Smartphones have
people." A pandemic is an illness that strikes and then leaves increased in terms of power, speed, and storage space, and
the human population [1]. The continuing coronavirus disease more features and applications are available so that most
2019 (COVID-19) pandemic is affecting people worldwide people use their smartphones for various activities such as bill
and has spread to Indonesia. On March 2, 2020, Indonesian payments, online shopping, chatting, making calls, email,
authorities discovered their first COVID-19 positive case. The sharing social media, and communication via instant message
discovery of this case was confirmed through reports of the [7-9]. Social media significantly influences people's lives
first two cases of COVID-19 infection in Indonesia by because social media is used to build wider connections [10].
President Joko Widodo that day, which until April 2 had Figure 1 shows data on the usage of smartphones (mobile
reached 1790 confirmed cases [2]. As of April 9, when the devices), the internet, and social media worldwide.
pandemic had spread to 34 provinces, DKI Jakarta, West Java,
and Central Java were the Indonesian provinces most exposed
to the coronavirus [3]. The government is attempting to
promptly handle the situation by creating a team to manage
COVID-19, directly directed by the President. At the same
time, the World Health Organization (WHO) declared the first
step in combating the pandemic is to hygiene measures, hand
washing, and people should respect social distancing rules by
at least one meter to stop the transmission of COVID-19
worldwide so that it can slow the spread of the virus pandemic
[4, 5]. The government also requires the public to use well-
fitting masks, always apply hand hygiene rules, and avoid
contact with others (physical distancing) [6]. Implementing
physical distancing rules makes people work at home, change
home activities such as shopping at the market into online
shopping, and change some activities into other activities that Figure 1. Global social media and internet users in 2022
903
Social media usage increased significantly by 10.1%, from and App Store, along with the change in WhatsApp's data
4.20 billion active users in 2021 to 4.62 billion active users in sharing policy in January 2021 [22]. Users (both employees
February 2022 [11]. Lastly, a report in April 2022 showed and the general public) of their own volition are starting to
active social media users approximately 4.65 billion [12]. switch to using Signal Messenger because the services of this
Social media has positive and negative impacts. The positive application are more reliable. This reason also allows
side is that it encourages economic growth in digitization, cybercriminals to use this application because it is more secure.
innovation, and information technology development. The Perpetrators usually delete messages after committing
negative side is social media facilitates the development of cybercrime to erase all traces of their activity. The increasing
serious malicious activity and cybercrime [13]. problem of cybercrime indirectly increases the necessity of
Cybercrime is a criminal act carried out using any mobile forensics [23]. Also, it creates opportunities for using
equipment as long as the equipment is connected to the techniques and forensic tools to investigate this cybercrime so
internet [14]. Cybercrimes tend to be more difficult to prove that the artifacts found can be used as digital evidence and
than real-world crimes. Cybercrime is often defined as "a accepted by the courts [24].
hidden crime [15]". One of the many examples of cybercrime Several previous studies that conducted forensic analysis
during the COVID-19 pandemic is the spread of false using the Digital Forensic Research Workshop (DFRWS)
information. False information is popularly and widely known framework showed different results. A research about mobile
as a hoax [16]. A hoax is an untrue information or fake news forensics on an Android-based IMO messenger application
that has no certainty, and the spread of hoaxes aims to cause using MOBILedit forensic express, DB Browser for SQLite,
panic or unrest in the community. Currently, there is a term AccessData FTK imager, and Belkasoft obtained evidence in
that is well known as "infodemic." Infodemic is a term for the the form of chat files, images, audio, video belonging to the
spread of hoaxes or rumors, and stigma during a pandemic [17]. perpetratos accounts, and chat times that have been deleted
Since the launch of the COVID-19 vaccine in Indonesia, from a smartphone device in root condition [25]. Meanwhile,
false information has emerged that has spread through the another research conducted on digital forensic investigation on
media. Mostly on social media. Some of the news circulating the Android-based instagram with the DFRWS using the
is: First, vaccine safety cases claim that many people died due Oxygen tool obtained chats and pictures/photos, while the Json
to vaccine injections. Second, the status of the COVID-19 viewer only obtained chats data [26]. The difference in the
vaccine, which contains pork oil, so it is not halal to use. Third, results of forensic evidences with the same framework from
the video cases show empty syringes without liquid vaccine these studies underlies the researcher to conduct further
content. Fourth, the conspiracy about the COVID-19 vaccine research on forensic analysis of the Signal messenger
is a product of propaganda. Social media users have been application on android using the DFRWS framework.
inundated with false information and left in fear. Information Based on the increasing use of social media phenomena,
of every type spreads more quickly than viruses do [18]. One problems of widespread COVID-19 vaccine hoaxes, and the
of the most widely spread types of vaccine hoaxes on social growing use of Signal Messenger application, and research
media today is a hoax that states the COVID-19 vaccine gaps, the researchers investigated the simulation of vaccine
contains a magnetic chip. Some people have even tried to hoax cases on Signal Messenger application. Forensic analysis
prove this theory by making videos showing a coin or spoon of a vaccine hoax case simulation was carried out using the
stuck to their arm [19]. Since the discovery of the first Digital Forensic Research Workshop (DFRWS) framework.
COVID-19 case in Indonesia, news about COVID-19 has This research used three forensic tools to get digital evidence
spread faster and created uncertainty due to limited knowledge from Signal Messenger application. The forensic tools used
and information about the pandemic situation [20]. Social are Belkasoft Evidence Center, Magnet AXIOM, and
media exacerbates the spread of hoaxes when all countries MOBILedit Forensic Express. This research aims to
worldwide are experiencing difficult times due to the COVID- demonstrate the ability of forensic tools to find digital
19 pandemic. Undeniably, the widespread hoaxes are caused evidence (artifacts) from the Signal Messenger application.
by the increased usage of social media applications. Social The main contributions of this paper are as follows: 1) In
media applications currently provide online-based short previous research, many papers have been published
messages or instant messaging (IM), which offers convenient discussing forensic analysis on WhatsApp, Twitter, Facebook,
communication. The features provided by various IM Instagram, Blackberry Messenger, and IMO Messenger. The
applications are the main attraction of this application. researcher analyzes the current popular Signal Messenger
Therefore, user policies when using IM applications are instant messenger application in this paper. 2) This paper
essential. While using IM applications, users share their demonstrates the effective framework used in mobile forensics
personal data without realizing it, leaving any personal data on for instant messenger applications to research and
their mobile devices [7]. Thus, the right solution is to choose investigation experts. 3) As a complement to previous research
an IM application that upholds personal data privacy to related to Signal Messenger, it can show the ability of forensic
prevent users from experiencing material or immaterial losses. tools to find digital evidence. The capabilities of the forensic
With concerns about users' personal data privacy, many tools used are compared in this paper. 4) This paper can be a
developers are competing to build and launch new IM reference for investigators and researchers when they see
applications that incorporate end-to-end encryption and add cybercrime cases on the Signal Messenger application.
encryption to their protocols to protect communications to This paper consists of five sections. The first section is the
servers that deliver messages [21]. Signal Messenger is one of introduction which describes the background of the problem,
the most popular end-to-end encrypted IM applications and is research gaps, research aims, and the contribution of this paper.
well-known for its privacy features. A new privacy feature The second section describes materials related to the research
introduced by Signal makes it more challenging to identify a and previous similar studies. The third section presents the
sender. The privacy feature is the reason for the spike in experiment research stages, the case scenario, and the research
downloads of the Signal application on the Google Play Store tools used. Section four is the results and discussion of the
904
section report preparation of case scenarios and the results conditions at that time. The stages of the DFRWS framework
obtained from the forensic analysis process. Meanwhile, the can be seen in Figure 2.
last section describes conclusions and suggestions for future
research .
2. LITERATURE REVIEW
2.1 Signal
905
perpetrator's account, chat files, chat time, pictures, audio, and Figure 3 shows how experiment research is conducted
deleted video from the perpetrator's smartphone device. The systematically so the stages can be used as guidelines to
index number for AccessData FTK Imager performance is overcome the problems in this research. Researchers divided
33.33%, Belkasoft is 83.33%, DB Browser for SQLite is the stages of this experimental research into two phases.
33.33%, and MOBILedit forensic express is 100% [25]. 1. Scenario Case Phase is where experiment research begins.
Previous research about mobile forensic analysis of Signal In this phase, researchers design case scenarios to serve as
services on smartphones is as follows. Azhar et al. attempted guidelines, so case simulations run better and are more
to perform a forensic analysis on Android and iOS focused. Researchers also prepare tools used for case
smartphones using NIST measurements. For iOS smartphones, simulation. Next, the Signal Messenger application is
the messaging applications investigated are Snapchat, downloaded and installed on the mobile device. Then
Cyberdust, and Confide. Meanwhile, for Android smartphones, proceed with carrying out a case simulation (conversation
the applications investigated are Facebook Messenger, Wire, between the perpetrator and the victim) according to the
Confide, and Signal. The Android smartphone is already designed case scenario and finally delete the conversation
rooted. Forensic analysis of the Signal application using on the signal messenger application on the perpetrator's
Oxygen Forensic tool. However, the analysis results did not android smartphone.
get any relevant data related to conversations and account 2. Forensic Analysis Phase is where the DFRWS framework
information [35]. is implemented, namely identification, preservation,
Riadi et al. explained mobile forensics on Signal Messenger collection, examination, analysis, and presentation.
application installed on the Samsung J1 Ace smartphone a. Identification, determining the objects, component
(rooted condition). Forensic analysis was carried out and information related to a crime.
according to the DFRWS stage and using the forensic tools b. Preservation, preventing the evidence obtained from
Magnet AXIOM and MOBILedit Forensic to obtain digital being contaminated and guaranteeing the authenticity
evidence (artifacts) from deleted messages on the perpetrator's and integrity of the evidence.
smartphone. MOBILedit Forensic gets any digital evidence c. Collection, acquiring and extracting data on the
(application information and contact) with a forensic tool perpetrator's smartphone to collect data that is
performance value of approximately 22.22%. Meanwhile, believed to be related to the crime.
AXIOM's Magnet tool revealed no digital evidence (artifacts) d. Examination
related to the deleted message [36]. The extraction process at the examination stage was
carried out using three forensic tools two times. The
forensic tools used were: Belkasoft Evidence, Magnet
3. THE PROPOSED APPROACH AXIOM, and MOBILedit Forensic Express.
e. Analysis
The research aimed to conduct mobile forensic experiments The repetition of the extraction process is intended to
to obtain digital evidence from cases of spreading COVID-19 confirm the validity of the forensic tool. The results
vaccine hoaxes on the Signal Messenger application. are analyzed to determine the advantages and
disadvantages of each forensic tool in finding digital
3.1 Experiment research stages evidence from the signal messenger application.
f. Presentation
The forensic process that was carried out in this research Presentation stage involves reporting the case analysis
adopted the DFRWS framework. The experimental workflow results, conducting discussions, and providing
of the research is shown in Figure 3. conclusions. The purpose of the presentation stage is
to communicate the process analysis results in a way
that the public can easily understand.
Figure 3. Flowchart of experiment research stages Figure 4. Case scenario of hoax vaccine simulation
906
The case scenario begins with the perpetrator chatting with The ability of the three forensic tools to find digital evidence
the victim. At first, the perpetrator asked whether the victim according to predetermined parameters is calculated using
had been vaccinated or not. Furthermore, a perpetrator scared index number calculations (weightless index). The results of
the victims by spreading hoaxes about the COVID-19 vaccine. this calculation validate the performance of forensic tools. The
A perpetrator not only sends images, videos, audio, and forensic tool index number is calculated using Eq. (1).
documents but also makes voice calls and video calls to
convince victims that vaccines are dangerous. The perpetrator ∑ 𝑁𝑟
also ordered the victim to spread the dangers of the vaccine to 𝑃= 𝑥 100 (1)
(𝑁𝑡 )
others. The scenario case ends with the perpetrator deleting all
the contents of the conversation between himself and the 𝑃 is the accuracy index number (%), 𝑁𝑟 is the number of
victim in the signal messenger application. After the found artifacts, and 𝑁𝑡 is the total number of artifacts.
researcher got a smartphone, a mobile forensic process was
conducted to obtain appropriate evidence of a crime. The
results of the evidence will be presented as additional evidence 4. RESULT AND DISCUSSION
at trial.
This research uses the DFRWS framework to organize the
3.3 Research tools research steps in order to obtain digital evidence from the
signal messenger application. Here is an analysis of the results
This research uses hardware and software tools to get signal of mobile forensics on the perpetrator's smartphone.
messenger artifacts. The tools used are shown in Table 1.
4.1 Preparing case scenario
Table 1. Research tools
In the first stage, case scenarios are prepared. Next, install
Tools Description the Signal Messenger application on the smartphone. After
Xiaomi Redmi 9T Research Object that, the chat activity starts with creating an account, then
Lenovo Workstation
sending messages (text/images/video/audio/documents), as
USB Connector Connector
Signal Messenger Instant Messaging Application well as audio calls and video calls. The perpetrators
Belkasoft Evidence Center Forensic Tool (Trial Version) implemented the spread of the COVID-19 hoax according to
Magnet AXIOM Forensic Tool (v5.4) the scenario shown in Figure 3. The perpetrator's smartphone
MOBILedit Forensic Express Forensic Tool (v7.4) was in root condition before the case simulation.
The process of "rooting" enables users of Android-powered
The datasets from the research tools used to perform a series smartphones, tablets, and other devices to take more control
of simulations are listed in Table 1. The tools consist of (sometimes referred to as "root access") over some Android
Xiaomi Redmi 9, Lenovo, and a USB connecter as hardware. subsystems. A system account called "root" has the authority
In contrast, the software includes Signal Messenger as the to access and run every command, every system, and every file
software to be tested. Meanwhile, Belkasoft Evidence Center, in a Linux-based operating system. In addition, users with root
Magnet AXIOM, and MOBILedit Forensic Express are access have the unrestricted ability to update, remove, add, or
mobile forensic software (forensic tools). Belkasoft Evidence modify any files or data on the Android operating system.
Center is a forensic software for acquiring, examining,
analyzing, and displaying digital evidence from cloud services 4.2 Forensic analysis
and primary sources such as computers, RAM, and mobile
devices in the proper way, from a forensic perspective [37]. 4.2.1 Identification
Magnet AXIOM is one of the most widely used forensic Identifying evidence begins with securing the crime scene,
tools by professionals in the digital forensics field to search for which aims to prevent entry access for people who do not have
evidence that other forensic applications cannot find. Deleted a permit at the location. Next, search for evidence by looking
data can be quickly recovered using Magnet AXIOM. Digital at the entire crime scene and everything at the crime scene that
forensic experts can also use this software to make reports, has the potential to be evidence. Electronic evidence (the
examine digital evidence, and distribute portable case files perpetrator's smartphone) was found based on the search
[38]. MOBILedit Forensic is a mobile forensic tool created by results, as shown in Figure 5. Furthermore, the evidence found
Compelson to search, evaluate, and report data in a single is identified in terms of type, brand, specifications, and other
solution [39]. MOBILedit Forensic is exceptional for supporting information to serve as authentic evidence during
advanced application analyzers, live updates, deleted data the investigation process. The researcher also prepares
recovery, concurrent phone processing, fine-tuned reports, a materials and tools for the forensic process at this stage, as
wide range of supported phones, including most feature seen in Table 1.
phones, and an easy-to-use user interface. Connecting the
software with the phone can be done through an infrared
connector, Bluetooth connection, Wi-Fi connection, or wired
interface. Usually, after the connection, the identified phone
model is a related device image, the manufacturer, serial
number (IMEI), model number, and phone status.
In facilitating the search for evidence, the focus is on search
variables (parameters) consisting of application information,
account information, chat, images, audio, video, documents,
voice call history, video call history, contacts, and stickers. Figure 5. Evidence of the perpetrator’s smartphone
907
4.2.2 Preservation
The preservation process is carried out to maintain and
secure the authenticity of the physical evidence obtained at the
identification stage so that data integrity is maintained until the
analysis process is carried out. The preservation process is
done by disabling the smartphone data channel (activating
airplane mode). Activating airplane mode aims to isolate the
device so it can not receive messages and calls from outside,
or in other words, to prevent incoming and outgoing data.
Digital evidence is volatile and has the risk of being lost or
damaged, so isolation is important to prevent damage and
maintain the authenticity of digital evidence. The activation of
airplane mode on physical evidence (the perpetrator's Figure 8. Acquisition process using Magnet AXIOM
smartphone) is shown in Figure 6.
The Magnet AXIOM acquisition process in Figure 8 uses
the ADB (Unlocked) acquisition method for smartphones with
root status. The acquisition process takes 5 minutes.
Information obtained from the acquisition process: the
smartphone is made by Xiaomi with the Redmi 9T model. It
has an OS version of 11 with the serial number 7163c97b0121.
Smartphones also have privileged access. Meanwhile, the
acquisition process using MOBILedit Forensic is shown in
Figure 9. With MOBILedit Forensic, get information about
smartphones: The Xiaomi 9T smartphone model has an IMEI
of 862965058072027, an IMSI of 510104662316464, and the
smartphone status is rooted. The acquisition process takes
approximately 6 minutes.
4.2.3 Collection
At the collection stage, the researcher collects data that is
believed to be related to the crime committed. The collection
process is done by acquiring and extracting data on the
perpetrator's smartphone to search for and obtain digital
evidence. The process of data acquisition and extraction of
physical evidence (the perpetrator's smartphone) was carried
out using Belkasoft Evidence Center, Magnet AXIOM, and
MOBILedit Forensic tools.
4.2.4 Examination
The results of the extraction that has been carried out will
appear in the form of a full report in .pdf format. The display
of the extracted data file is shown in Figure 10.
Figure 7. Acquisition process using Belkasoft Figure 10. Extraction result using MOBILedit Forensic
Figure 7 shows the acquisition process using Belkasoft The results of the Report.pdf report show that the
Evidence Center. The acquisition method used is ADB backup. smartphone used is the Xiaomi brand with detailed
The time required for data acquisition is 12 minutes and 06 specifications. Meanwhile, Figure 11 provides other
seconds.
908
information such as time zone, serial number, IMEI, IMSI, Meanwhile, Belkasoft could not find any information
storage, and others. regarding the data of documents, audio, voice calls, and video
calls in the backup file.
4.2.5 Analysis
This analysis stage describes and discusses the results of the
Signal Messenger application analysis using three different
forensic tools.
(b) Contact information display using Belkasoft Figure 13 (a) shows evidence of deleted chat data. Using
Belkasoft, chat data can be displayed again, making it easier
Figure 12. Display of account and contact information to find previously deleted evidence. The chat evidence found
on the Signal Messenger application shows 29 messages from
The Signal Messenger application has a backup feature. If the perpetrators. In addition to finding chat data, the analysis
this feature is enabled, this application will create a database results with this tool also found media in the form of images,
backup with a key that the researcher can use to open the videos, and stickers. The media evidence in the Signal
backup file. This backup file can be an alternative for Messenger application consists of six images, six videos, and
researchers to view the data contained in Signal Messenger if one sticker, as shown in Figures 13 (b), 13 (c), and 13 (d). The
the data from the Signal Messenger application database is not image artifact provides information about the file name, width,
readable. Belkasoft's latest edition (trial version) has a feature height, and file size. The size of the image artifact is the same
that can open backup files. However, only some data can be as the original image size and can be seen clearly and even
found, such as chat data, images, videos, and stickers. zoomed in if needed. Similar to image artifacts, video artifacts
909
provide information about file name, duration, width, height, Figure 15 shows information related to video artifacts such
and file size. The video artifact size is different from the as file name, file extension, last modified date and time, file
original video size but can be played clearly. Therefore, image size, original width, and original height. Information about
and video artifacts can be used as evidence in court. video artifacts is also the same as image artifact information;
it only differs in a statement: media duration (for video
2. Magnet AXIOM artifacts). The image and video artifacts are the same size as
Similar to the Belkasoft tool, Magnet AXIOM can also open the original image and video.
backup files. The result of the Signal application analysis that
can be obtained is Signal Messenger account information. 3. MOBILedit Forensic
Figure 14 shows information about the account, including the Unlike the two tools above, MOBILedit Forensic can only
username, package name, and last login. find signal application information and contact information.
The results of the Signal application analysis obtained from
report.pdf are information that shows the package, the
application version used is 5.34.10, and the application size is
49.8 Mb, as shown in Figure 16.
4.2.6 Presentation
Documentation about the results obtained from the
acquisition process using Belkasoft, Magnet AXIOM, and
MOBILedit Forensic tools is carried out at the presentation
stage. Data obtained from smartphones with an installed signal
messenger application becomes digital evidence for the crime
simulation of spreading COVID-19 vaccine hoaxes. Digital
evidence is obtained in various forms: chat data, images,
videos, and sticker. The finding results of evidence on
(b) Display of videos using Magnet AXIOM
Belkasoft Evidence Center, Magnet AXIOM, and MOBILedit
Forensic Express using predetermined parameters are shown
Figure 15. Display of image and video data
in Table 2.
910
Table 2. Comparison of extraction results Signal application database and file backups, can read
additional information, namely signal application information
Artifact
Amount
Belkasoft
Magnet MOBILedit
and contact information. With this information, at least there
Type
of Data
Evidence
AXIOM Forensic is evidence that the Signal Messenger application with the last
(Parameters) Center active time was installed on the perpetrator's smartphone. The
Application victim's number is also stored in the Signal application, which
1 - - 1
Infomation
means there is evidence of the possibility of the perpetrator
Account
Information
1 1 1 - spreading the COVID-19 vaccine hoax to the victim. The
Contact 5 5 - 5 Belkasoft application obtained a higher accuracy of 78.69%
Chat 29 29 - - with six parameter variables obtained from 11 variables;
Image 6 6 6 - Magnet AXIOM obtained an accuracy of 26.23% with three
Audio 4 - - - parameter variables obtained from 11 variables, and
Video 10 6 9 - MOBILedit Forensic Express got an accuracy of 9.84% with
Document 2 - - - two parameter variables obtained from 11 variables. The
Voice Call artifact evidence obtained from this research can be used as
1 - - -
History
evidence from the Signal Messenger application in court. In
Video Call
History
1 - - - addition, it can be used as a reference for investigators in
Sticker 1 1 - - finding evidence of the widespread COVID-19 hoax, so the
Total 61 48 16 6 handling of the criminal case goes well.
Accuracy (%) 78,69 26,23 9,84 From the results and conclusions presented, by conducting
this experiment, we can find out which forensic tools support
Based on Table 2, the results obtained are: Belkasoft was and are capable of finding digital evidence from the Signal
able to find six parameter variables, including account Messenger application. In addition to knowing the capabilities
information (1), contacts (5), chats (29), images (6), videos (6), of each forensic tool used. The benefit of this research is that
and stickers (1) with a total data of approximately 48. Magnet if one day in real life (real world), we experience a crime when
AXIOM found three parameter variables: account information running a business or in an industry that uses Signal
(1), images (6), and videos (6), with a total data of Messenger as a medium, then we know and can take the right
approximately 16. Meanwhile, MOBILedit Forensic only action/attitude in overcoming the problem. Selection and use
found two parameter variables: application information (1) of appropriate forensic tools to find digital evidence from the
and contacts (5), with a total data of approximately 6. Signal messenger application are very useful if you experience
Table 2 also shows there is an accuracy index calculation. legal problems that require evidence to be presented in court.
The accuracy index measures each detection tool's ability for This research's limitation is the lack of forensic tool
forensics. The calculation of the forensic tool accuracy index capabilities in conducting forensic analysis. Therefore, it is
in Table 2 is calculated using Eq. (1) as follows: recommended for future research to use methods, frameworks,
and other forensic tools with the latest versions to adapt to the
Belkasoft Evidence Center: 𝑃 =
48
𝑥 100 = 78,69% latest versions of the signal messenger application, so further
61 forensic researchers/experts get better and more complete
16 results.
Magnet AXIOM: 𝑃 = 𝑥 100 = 26,23%
61
911
https://doi.org/10.18280/isi.270213 di-
[5] Chakraoui, M., Mouhni, N., Elkalay, A., Nemiche, M. indonesia?gclid=Cj0KCQjwidSWBhDdARIsAIoTVb3F
(2022). Deep negative effects of misleading information 3m07VbjDWKOodHe7KeQ62RPcz8QE31Fhu0XY5s5
about COVID-19 on populations through Twitter. YCjIX8jLT1IcaArN6EALw_wcB, accessed on June 17,
Ingénierie des Systèmes d’Information, 27(2): 185-192. 2022.
https://doi.org/10.18280/isi.270202 [20] Rosemary, R., Rochimah, T.H.N., Susilawati, N. (2022).
[6] WHO. (2020). Coronavirus disease 2019 (COVID-19) Efficacy information in government’s initial responses to
situation report-91, World Health Organization, covid-19 pandemic: A content analysis of the media
Indonesia. coverage in Indonesia. International Journal of Disaster
[7] Umar, R., Riadi, I., Zamroni, G. M. (2018). Mobile Risk Reduction, 77: 1-7.
forensic tools evaluation for digital crime investigation. https://doi.org/10.1016/j.ijdrr.2022.103076
International Journal on Advanced Science Engineering [21] Rösler, P., Mainka, C., Schwenk, J. (2018). More is less:
Information Technology, 8(3): 949-955. on the end-to-end security of group chats in signal,
https://doi.org/10.18517/ijaseit.8.3.3591 whatsapp, and threema. 2018 IEEE European
[8] Eriş, F.G., Akbal, E. (2021). Forensic analysis of popular Symposium on Security and Privacy (EuroS&P), 2018:
social media applications on android smartphones. 415-429. https://doi.org/10.1109/EuroSP.2018.00036
Balkan Journal of Electrical and Computer Engineering, [22] Shu, C. (2021). Signal, the encrypted messaging app, is
9(4): 386-397. https://doi.org/10.17694/bajece.761271 currently down for many users (update: it’s back).
[9] Riadi, I., Umar, R., Firdonsyah, A. (2017). Identification https://techcrunch.com/2021/09/26/signal-the-
of digital evidence on android’s blackberry messenger encrypted-messaging-app-is-currently-down-for-many-
using NIST mobile forensic method. International users/.
Journal of Computer Science and Information Security, [23] Almehmadi, T., Batarfi, O. (2019). Impact of android
15(5): 155-160. phone rooting on user data integrity in mobile forensics.
[10] Sheikhi, S. (2020). An efficient method for detection of 2019 2nd International Conference on Computer
fake accounts on the Instagram platform. Revue Applications & Information Security (ICCAIS), 2019: 1-
d'Intelligence Artificielle, 34(4): 429-436. 6. https://doi.org/10.1109/CAIS.2019.8769520.
https://doi.org/10.18280/ria.340407 [24] Menahil, A., Iqbal, W., Iftikhar, M., Shahid, W. B.,
[11] Kemp, S. (2022). Digital 2022: Indonesia. Mansoor, K., Rubab, S. (2021). Forensic analysis of
https://datareportal.com/reports/digital-2022-indonesia social networking applications on an android smartphone.
[12] Statista. (2022). Global Digital Population as of April Wireless Communications and Mobile Computing,
2022. https://www.statista.com/statistics/617136/digital- 2021(4): 1-36. https://doi.org/10.1155/2021/5567592
population-worldwide/, accessed on June 18, 2022. [25] Ichsan, A.N., Riadi, I. (2021). Mobile forensic on
[13] Yas, H., Jusoh, A., Streimikiene, D., Mardani, A., Nor, android-based IMO messenger services using digital
K.M., Alatawi, A., Umarlebbe, J.H. (2021). The negative forensic research workshop (DFRWS) method.
role of social media during the COVID-19 outbreak. Scientific International Journal of Computer
International Journal of Sustainable Development and Applications, 174(18): 34-40.
Planning,16(2): 219-228. https://doi.org/10.5120/ijca2021921076
https://doi.org/10.18280/ijsdp.160202 [26] Pambanyun, S., Riadi, I. (2020). Investigation on
[14] Candiwan, C., Azmi, M., Alamsyah, A. (2022). Analysis instagram android-based using digital forensics research
of behavioral and information security awareness among workshop framework. International Journal of Computer
users of zoom application in COVID-19 era. Applications, 175(35): 15-21.
International Journal of Safety and Security Engineering, https://doi.org/10.5120/ijca2020920904
12(2): 229-237. https://doi.org/10.18280/ijsse.120212 [27] Son, J., Kim, Y.W., Oh, D.B., Kim, K. (2022). Forensic
[15] Li, X.G. (2018). Crucial elements in law enforcement analysis of insta nt messengers: decrypt signal, wickr,
against cybercrime. International Journal of Information and threema. Forensic Science International: Digital
Security Science, 7(3): 140-158. Investigation, 40: 1-12.
[16] Nadzir, I., Seftiani, S., Permana, Y.S. (2019). Hoax and https://doi.org/10.1016/j.fsidi.2022.301347.
misinformation in Indonesia: insights from a nationwide [28] Afzal, A., Hussain, M., Saleem, S., Shahzad, M.K., Ho,
survey. Researchers at Iseas, 2019(92): 1-12. A.T.S., Jung, K.H. (2021). Encrypted network traffic
[17] Islam, M.D., Sarkar, T., Khan, S.H., Kamal, A.H.M., analysis of secure instant messaging application: A case
Hasan, S.M.M., Kabir, A., Yeasmin, D., Islam, M.A., study of signal messenger app. Applied Sciences, 11(17):
Chowdhury, K.I.A., Anwar, K.S., Chughtai, A.A., Seale, 1-24. https://doi.org/10.3390/app11177789
H. (2020). Covid-19-related infodemic and its impact on [29] Kunle, A., Titilope, A.F. (2022). Technological
public health: a global social media analysis. Am J. Trop advancement and risk management in composite
Med Hyg, 103(4): 1621-1629. insurance companies in Nigeria. J. Corp. Risk Manag.,
https://doi.org/10.4269/ajtmh.20-0812 9(S1): 112-125. https://doi.org/10.51410/jcgirm.9.1.7
[18] Sirait, F.E.T., Sanjaya, R. (2021). Case study in Covid- [30] Judge, S.M. (2017). Mobile forensics: Analysis of the
19 infodemic in Indonesia. Nyimak Journal of messaging application signal. Master Thesis, Master of
Communication, 5(1): 1-14. Science in Forensic Science, University of Central
http://dx.doi.org/10.31000/nyimak.v5i1.2652 Oklahoma, Edmond, Oklahoma, USA Pawlaszczyk, D.
[19] Ravelo, J.L. (2021). A Hoax Killed My Father: (2022). Mobile forensics – the end of a golden age?.
Uncovering another pandemic in Indonesia. Journal of Forensic Sciences and Criminal Investigation,
https://www.unicef.org/indonesia/id/coronavirus/cerita/ 15(4): 555917.
hoaks-membunuh-ayahku-menyingkap-pandemi-lain- https://doi.org/10.19080/JFSCI.2022.15.555917.
912
[31] Barmpatsalou, K., Cruz, T.J., Monteiro, E., Simoes, P. applications on android and iOS platforms. International
(2018). Current and future trends in mobile device Journal on Advances in Security, 13(1&2): 41-53.
forensics: A survey. ACM Computing Surveys, 51(3): 1- http://www.iariajournals.org/security/sec_v13_n12_202
31. https://doi.org/10.1145/3177847 0_paged.pdf.
[32] Gde, A.A., Rahaditya, J., Sasmita, A., Made, G., Pratama, [36] Riadi, I., Herman, Siregar, N.H. (2022). Mobile forensic
E., Agus, I.P. (2016). Prototyping SMS forensic tool of vaccine hoaxes on signal messenger using DFRWS
application based on digital forensic research workshop framework. Matrik, 21(3): 489-502.
2001 (DFRWS) investigation model: Case study: SMS https://doi.org/10.3081/matrik.v21i3.1620
togel in indonesia. 2016 International Conference on [37] Belkasoft. Belkasoft Evidence Center X.
Information Technology Systems and Innovation https://belkasoft.com/x, accessed on June 12, 2022.
(ICITSI), PP.1-6. [38] Magnet Forensics. Magnet AXIOM Recover & Analyze
https://doi.org/10.1109/ICITSI.2016.7858226 Your Evidence in One Case.
[33] Tanner, A., Dampier, D. (2009). Concept mapping for https://www.magnetforensics.com/products/magnet-
digital forensic investigations. IFIP Advances in axiom/, accessed on June 12, 2022.
Information and Communication Technology, 306: 291- [39] Shukla, U., Mandal, B., Kiran, K.V.D. (2018).
300. https://doi.org/10.1007/978-3-642-04155-6_22 Perlustration on mobile forensics tools. In: Smys, S.,
[34] Riadi, I., Yudhana, A., Putra, M.C.F. (2018). Forensic Palanisamy, R., Rocha, Á., Beligiannis, G.N. (eds)
tool comparison on instagram digital evidence based on Computer Networks and Inventive Communication
android with the NIST method. Scientific Journal of Technologies. Lecture Notes on Data Engineering and
Informatics, 5(2): 235-247. Communications Technologies, 58: 1225-1231. Springer,
https://doi.org/10.15294/sji.v5i2.16545 Singapore. https://doi.org/10.1007/978-981-15-9647-
[35] Azhar, H., Cox, R, Chamberlain, A. (2020). Forensic 6_97
investigations of popular ephemeral messaging
913