Analysis and Retrieval of Digital Forensic Evidence on the X Social Media Application Using the Static Forensic Method

Authors

  • Destyfaini Paisal Universitas Negeri Makassar
  • Udin Sidik Sidin Universitas Negeri Makassar
  • Muhammad Fajar B Universitas Negeri Makassar

Keywords:

digital forensics, static forensics, social media X, FTK imager, autopsy

Abstract

This study discusses the application of static digital forensic methods to analyze evidence of cybercrime on the social media platform X. The research is based on a simulated case involving violations of Indonesia’s Electronic Information and Transactions Law (UU ITE), specifically concerning the distribution of pornographic content, hate speech, cyberbullying, and the spread of hoax X. The investigation was conducted by seizing the suspect’s devices, including a laptop and a 15GB flash drive, which were then xamined using FTK Imager and Autopsy forensic tools. The acquisition process was carried out using FTK Imager to create a digital image while maintaining data integrity through MD5 and SHA-1 hash verification. The subsequent analysis was conducted using Autopsy to identify hidden files, deleted files, file system structures, and relevant metadata. The investigation uncovered various types of digital evidence such as illicit images, social media activity logs, SQLite database files, email artifacts, and user activity data directly linked to the suspect’s X  account. The findings indicate that static forensic methods are effective in preserving original data during investigation. Furthermore, the forensic tools used in this study proved capable of systematically identifying, extracting, and processing digital evidence accurately. This research contributes to the field of cybercrime law enforcement, particularly in supporting the process of proving digital-based crimes committed through social media platforms.

Abstract views: 14 , PDF downloads: 7

Downloads

Download data is not yet available.

References

Bagyaratnam, A. 2025. Kapan twitter diciptakan? melihat kembali masa lalu x yang kaya. Diakses pada 23 Januari 2025, dari https://tweetdelete.net/id/resources/when-was-twitter-invented/.

Caesar, C. R., Servanda, Y., & Atma, Y. D. 2024. Analisis forensik digital pada aplikasi media sosial facebook menggunakan metode statik forensik. Forbis: Journal Forensic Business Information Systems, 1(1), 20-26.

Dewi, N. K. T. C. 2024. Waspada Kejahatan Siber di Media Sosial, Ikuti Langkah Preventif Ini Agar Tak Jadi Korban. Diakses pada 22 Januari 2025 dari https://www.tempo.co/digital/waspada-kejahatan-siber-di-media-sosial-ikuti-langkah-preventif-ini-agar-tak-jadi-korban-50477

Faiz, M. N., Prabowo, W. A., & Sidiq, M. F. 2018. Studi Komparasi Investigasi Digital Forensik pada Tindak Kriminal. Journal of Informatics Information System Software Engineering and Applications (INISTA), 1(1). Retrieved from https://journal.ittelkom-pwt.ac.id/index.php/inista/article/view/12.

Garfinkel, A. L. 2010. Digital forensics research: The next 10 years. Diambil 30 Mei 2025, dari 10.1016/j.diin.2010.05.009

Gunawan, I., & Grasia, O. G. 2023. Analisis digital forensic aplikasi pelacak nomor handphone android pihak ketiga menggunakan metode statis dan dinamis. Seminar Nasional Hasil Penelitian & Pengabdian Masyarakat Bidang Ilmu Komputer (SENDIKO 2023), 97-108.

Habibi, M. R., & Liviani, I. 2020. Kejahatan teknologi informasi (cyber crime) dan penanggulangannya dalam sistem hukum indonesia. Al-Qānūn: Jurnal Pemikiran dan Pembaharuan Hukum Islam, 23(2), 2088-2688, https://jurnalfsh.uinsa.ac.id/index.php/qanun/article/view/1132

Huda, S., Dasmen, R. N., Ardiansyah, A., Pranata, V., & Januarta, A. 2024. Digital analysis of forensic data recovery on flash drive using national institute of justice (nij) method. Jurnal ilmiah informatika, 12(01),2337-8379.

Isnaeni, F., & Fachri, F. 2025. Analisis forensik smarphone android pada aplikasi tiktok menggunakan metode nist. JATI (Jurnal Mahasiswa Teknik Informatika), 9(1), 1404-1410.

Panggabean, A. D. 2024. Ini Data Statistik Penggunaan Media Sosial Masyarakat Indonesia Tahun 2024. Diakses pada 24 Januari 2025 dari https://www.rri.co.id/iptek/721570/ini-data-statistik-penggunaan-media-sosial-masyarakat-indonesia-tahun-2024.

Pratama, S. P. F. W., Putra, I. G. N. A. C., Hamid, M. A., Christian, C., & Merdana, I. K. K. 2022. Analisis forensik digital pada aplikasi twitter di android sebagai bukti digital dalam penanganan kasus prostitusi online. Jurnal Elektronik Ilmu Komputer Udayana, 10(3), 271–278. https://ejournal.uin-suska.ac.id/index.php/jtfi/article/view/5678.

Putra, M. A. D., Muhammad, A. W., Zen, B. P., Kisworini, R. Y., & Rohayati, T. 2024. Analisis forensik pada instagram dan tik tok dalam mendapatkan bukti digital dengan menggunakan metode nist 800-86. Jurnal Teknik Informatika, 11(1), 50–65. https://tif.uad.ac.id/pdf-analisis-forensik-pada-instagram-dan-tik-tok-dalam-mendapatkan-bukti-digital-dengan-menggunakan-metode-nist-800-86/.

Ramadhan, R. A., Zaini, A. K., & Mardafora, J. 2022. Pelatihan investigasi digital forensik. Jurnal Pengabdian Masyarakatakat dan Penelitian Inovasi Pendidikan (JPMPIP), 1(2), 45-56. https://journal.uir.ac.id/index.php/jpmpip/ article/download/11003/4717/38631.

Riadi, I., Umar, R., & Bernadisman, D. 2019. Analisis forensik database menggunakan metode forensik statis. Jurnal Sistem Informasi Bisnis, 9(1), 12–25. https://doi.org/10.21456/jsinbis.v9i1.21010.

Syahputri, K. 2022. Jenis digital forensic berdasarkan bukti digital. Folarium. Diakses 30 Mei 2025, dari https://www.folarium.co.id/id/blogs/jenis-digital-forensic-berdasarkan-bukti-digital.

Wardani, A. S. 2023. Kasus kebocoran data, 235 juta informasi pengguna twitter terekspos di internet. Diakses pada 22 Januari 2025, dari https://www.liputan6.com/tekno/read/5172277/kasus-kebocoran-data-235-juta-informasi-pengguna-twitter-terekspos-di-internet?page=2.

Downloads

Published

2025-09-02

How to Cite

Paisal, D., Sidin, U. S., & Fajar B, M. (2025). Analysis and Retrieval of Digital Forensic Evidence on the X Social Media Application Using the Static Forensic Method. Progressive Information, Security, Computer, and Embedded System, 3(2), 67–79. Retrieved from https://journal.diginus.id/PISCES/article/view/725

Issue

Section

Articles