eVestigator® - Australia's Best Independent Forensic Cyber Security Expert and Cyber Crime Expert Witness, Private Investigator

SAMPLE CASES I HAVE BEEN INVOLVED WITH & BASIC BACKGROUND

I love my job - the best way to show competence is with Fact, so here is JUST A SAMPLE of de-identified cases SIMON SMITH, Australia's very own eVestigator® has been involved in.

1. I uncovered one of the largest denial of service cyber-attacks (with this case being a constant media attraction) involving defamation of a celebrity which involved uncovering and tracing an underground crime syndicate that was responsible for spamming over 24 million people at the request of a disgruntled person as an organised crime. I found the link to identify the accused on balance of probability. This was a massive find, with no leads, and with sheer investigative work a series of events have led to what could be considered extreme reasonable doubt against the accuser's story. The case is privileged and ongoing and no more generic information can be provided in this matter.

2. I was approached on behalf of one of the World’s largest Insurance companies to assist in the underwriting in conjunction with their solicitors of new Cyber-Security and Indemnity policies, the development of new risks for in this ever changing industry, requesting assistance in indemnity wording and risk, and creating PDS’s around new and innovative white collar fraud and cyber-attacks in the media at the moment.

3. I was requested to analyse voice biometrics to determine if a suspect had made a hoax bomb threat by telephone and was requested to advise the accused lawyer on what should technically be requested from the Police and gave intelligence as to the voice codec and causing reasonable doubt of biometric distortion in a compressive lossy voice algorithm. This was a very serious case with charges under the new Anti-Terrorism laws.

4. I was recently approached by an accused individual seeking help after being accused of several counts of here say sexual offences leading back to over 8 years, with the evidence reliant on MSN and Facebook data. This case is pending, however as the accused was pleading innocent, I was able to demonstrate beyond reasonable doubt the unreliability of supposed forensic data relied upon with old MSN messages.

5. I was approached, investigated and consequently compiled an expert report in conjunction with a solicitor’s privacy policy detailing the privacy implications, after inspection of the source code, and auditing of the non-identifiable hash algorithms that intercepted mobile WiFi beacon signals for the purpose of tracking of retail customers. I gave security and privacy protection recommendations based on my findings.

6. I worked with State Regulator’s providing intelligence and crucial evidence which lead to two convictions, stopping an unlicensed electrician performing further illegal, unsafe and non-compliant electrical work. He was convicted and fined.

7. I investigated and provided evidence to ASIC of the deceitful and misleading actions of a Director who allegedly breached the Corporations Act and committed an Act of Bankruptcy. He on behalf of his company allegedly applied for deregistration during court proceedings to avoid paying debts arising from judgment against him. I supplied a brief of evidence which is now with the CDPP for prosecution. I also achieved reinstatement of the closed company. The Company is now in liquidation.

8. I uncovered fraud and corrupt-conduct within a government department and provided a full investigative report to the Auditor-General and Ombudsman, proving a breach to the Ministers’ Gazetted pricing structures in the education regulation industry, unveiling over $7m of overcharging education stakeholders, as well as affirming in person with the Auditor-General and Minister identical evidence found in his Audit uncovering identical breaches to legislation.

9. I have since uncovered corrupt and improper conduct with the Independent Broad-Based Anti-Corruption Commission, and the Department of Justice of which will be subject to further legal action initiated by myself.

10. I have uncovered at least 5 dating scams involving the usual request for money to ‘come to Australia’ to meet their new love, but never having enough money. I was involved in working with Western Union to take this to the police as a crime to stop the conduct.

11. I have acted for a high profile corporate client who had been cyber-stalked for 5 yrs., living in terror, with the Police and the High-tech Crime division investigating without success. After just two weeks I found the accused (via social media and cyber methods amongst traditional investigative techniques), my evidence later helped prosecute and convict the stalker under the strict Victorian Anti-stalking laws.

12. As an expert in social media and cyber-stalking cases, I assisted the NSW police via Interpol in tracking down the stalker of a popular YouTuber to Scotland, also working with the Scottish police. The stalking was concluded.

13. I have assisted individuals extensively finding their cyber-stalkers via Facebook, dating websites and email scams, using email tracing and cyber-intelligence mechanisms, whereas in all situations, in the alternative, the customer was informed by police that nothing could be done.

14. In an impersonation case, a man purported to steal the identify of an individual and consequently put up a dating profile soliciting gay sex, sending interested parties to the victims address. The suspect had blocked his IP address and was difficult to track but using forensic tracking I was able to identify the address of the accused leading to his arrest.

15. 15 years ago I discovered a flaw in (one of the World’s largest Accounting Software Company’s) that revealed credit card details in the hexadecimal binary of the unencrypted data file, and alerted the producers of the software of the problem.

16. My mediation skills are often also used in conjunction with my forensic programming / reverse programming skills to determine fact to apply policy.

17. I am able to establish routines and phishing and/or programming interfaces and trace these back to a potential crime or breach of information.

18. I am considered an expert in the area of security and have built over seven commercial programs, worked for over 100 companies in creating solutions that are so important, that a breach of confidentiality or trust in information sources could lead to severe detriment to consumers and the company's future.

19. In order to understand and be a true expert in logic, one must be able to reverse that logic. In unraveling conduct, I have the ability to demonstrate in black and white English routine mechanism that an accused could have easily done to achieve a goal.

20. I can also write demonstrative routines. This is especially important in cases involving expert testimony as to White Collar Fraud, Stalking and breaches of confidence, Cyber-crime and denial of service attacks. A denial of service (often called a DOS attack) can cost a company millions of dollars. I am able to track its source, assist in prosecution or defense and provide genuine independent fact to the court - especially with my combined ability to investigate.
"If only you could see information as a jigsaw, releasing via Social Media and its risks could be the final piece". eVestigator® - Simon Smith
 


 
A Sample of some of my Qualifications (Excluding Case Studies/Experience/Appointments)

 Graduate Diploma of Family Dispute Resolution + (Assessor)
Family Dispute Resolution Practitioner
Graduate Diploma of Management (Learning) Graduate Certificate in Management (Learning) Diploma of Security and Risk Management Certificate IV in Government (Investigation) Certificate III in Investigative Services
Certificate IV in Intelligence Operation  Advanced Diploma of Computer Systems Technology Advanced Diploma of Computer Systems Engineering Diploma of Software Development  Advanced Diploma of Leadership and Management  Graduate Certificate in Digital Education
Graduate Certificate in Information Technology and Strategic Management   Certificate IV in Mediation, Nationally Accredited Mediator  Graduate Certificate in Information Technology and Strategic Management Diploma of Management
& Micro Business Skill Set
 Apply advanced programming skills in another language
 Advanced Diploma of Leadership and Management  Advanced Diploma of Management
 Advanced Diploma of Marketing  Advanced Diploma of Program Management  Diploma of Business  Certificate IV in Small Business Management  Diploma of Business Administration  Innovation Skill Set at Graduate Diploma Level
NMAS Accredited Nationally Accredited Mediator for the public and the courts  Certificate IV in Frontline Management  Diploma of Human Resources Management  Advanced Diploma of Management (Human Resources)  Certificate IV in Human Resources  Diploma of Leadership and Management
 Diploma of Quality Auditing  Diploma of Vocational Education and Training  Diploma of Training and Assessment  Diploma of Project Management  Diploma of Training Design and Development  Certificate IV in Training & Assessment
 Diploma of Counselling   Certificate IV in Marriage Celebrancy Diploma of Practice Management  Certificate IV in Health Supervision  Diploma of Disability Certificate III in Business Administration (Medical)



Some case studies are subject to Non-Disclosure agreements. Please contact me for a massive list of experience and real success stories. My work speaks for itself. Looking for a testimony from a real corporate client whom was cyber-stalked for 5 yrs, living in terror, not finding his stalker after five years of attempts with the Police and the High-tech Crime division without success? After just 2 weeks I found the accused (via social media and cyber methods amongst traditional investigative techniques) and later prosecuted and convicted under strict Victorian Anti stalking laws based on my work. Contact: LifeStyle Portraits, Darren Tilnak

Tips on Security and Technology

Be aware of just how much information you share online.
1 in 5 Australians have been victims of identity crime with computer hacking, online banking and shopping to blame SO you think you’re safe online and take all the necessary steps to protect your information? Think again — your details may not be as private as you think. More Australians than ever are falling victim to identity crime and the victims aren’t signing up to dodgy scams and being careless either.

Did you know that Australians lost $45 million to scams in 2015? The ACCC is urging the community not to send money or personal details to strangers after $45 million was reported lost to scams already this year and 45,000 complaints made.

 
Ten Top Rules to Limit Your Risk of Cyber Scams but first I want to stress 3
GOLDEN RULES:

 
1. DON'T OPEN ANY FILE OR LINK ATTACHED TO AN EMAIL. EMAIL IS HARMLESS, EXECUTABLE FILES OR LINKS TO CAUSE YOU TO RUN EXECUTABLE FILES ARE THE RISK. EMAIL IS FOR READING. IF THE DOCUMENT IS READABLE (PDF), OR (TEXT), GO FOR IT. VIRUS SCANNERS ARE VIRUS'S THEMSELVES. I WILL WRITE AN ARTICLE ON THIS.
 
2. CHECK THE SENDER AND RECEIVER EMAIL ADDRESS - BUT DON'T ASSUME THEY ARE WHO THEY SAY THEY ARE. SEE HOW THEY ADDRESS YOU, IS IT AN EMAIL CHAIN WITH A KNOWN COLLEAGUE? HOW DID THEY JUST PICK YOU? THE MOST SIMPLEST CHECK IS WHO EMAILED WHO AND WHY, AND HOW (OR IF) THEY KNOW YOU.
 
3. GET YOUR DETAILS OFF FACEBOOK! I HAVE FOUND PEOPLE WHO I'VE ASSISTED POLICE SEND TO JAIL FROM A PROFILE.

The eVestigator®, 07/08/2015
  1. In any situation, if you are being offered something for nothing (or very little), it is more often than not, not worth the price.
     
  2. Always check a sender’s email address, no matter how legitimate it seems. An active example is offers for free vouchers or co  
  3. Any kind of incorrect spelling or unusual grammar. Often bogus emails do come from places where English is not the first language so look out for the use of the wrong tense, pronoun and plural or singular noun.
     
  4. Disregard the email policies for any business/service you receive bills for via the internet. For example PayPal list this criteria on their website to check if an email is legitimate:

    "You see your name or your business name in the email. We always address you by your full name or your business name as registered on your PayPal account. We’ll never use generic greetings like "Dear user" or "Hello PayPal member". We’ll never ask you to include your financial information, your password, or the answer to your PayPal security questions in your emails to us. We’ll never attach any software updates in our emails and ask you to install it to your devices. Correspondence regarding transactions will also appear in your PayPal account, so if you still aren’t sure, log in to see if the email details are also there in your history."

    WRONG: Which company's security was breached sending millions of people's personal information out to the public? How did you get that message? Via email! How do you know it was PayPal? Go back to Golden Rule #1.
     
  5. Do not respond and report any email from people you did not initiate an email trail with. Provide as much detail as you can about the message.
     
  6. Compare suspicious emails with any legitimate ones you have received previously. If there are omitted details, such as logos, footers, disclaimers or images are different and/or look old delete or report it. I tend to report emails to the business if I am not sure but I have not been wrong yet.
     
  7. If anyone anywhere at any time asks for personal, or credit card/bank details via email or cold calling for that matter, no. Don’t do it. If they try to push you voice your privacy and security concerns. If they still don’t want to take no for an answer ignore and delete or in the case of cold calling, hang up. This is actually a crime and known as stalking. If you are personally apprehensive from this conduct and it is continues, then you should first contact the police, and secondly apply for an interim intervention order. If they are legitimate they can and will provide you with other payment options and not push you to use methods that are unsecure and unverifiable.
     
  8. No promise of large future returns for money now, no matter how convincing or legitimate they say they are, have proven to be true to the best of my knowledge. Tying into this is the online dating risks.
     
  9. Be wary of online dating websites who speak the word 'love' too quickly or seem very invested emotionally in a short amount of time without actually telling you much about themselves personally. It is easy to write or say lot without actually revealing anything. As you are getting to know someone it is a good idea save conversations to read back over them later. Consider the kind of information they want from you and look at how much they are telling you, if they are a bit evasive in some areas, just take note of it and what subjects they seem reluctant to talk about. There may be a genuine, reasonable explanation or they may not have fleshed out that part of their story yet also think about where there were lags or delays in responses. Keep the relationship at a pace you both are comfortable with. I strongly recommend not loaning money or giving financial support before your first face-to-face meeting. There is no easy step-by-step guide to spot an online dating scammer. The dynamics of every relationship is unique. Use your common sense; remember things that sound too good to be true usually are. Meet your date in person at a safe place as soon as you can, it is easier to get a real impression of someone in person and a lot harder to lie to or misunderstand one another. Has anyone met a beautiful girl who just doesn't have enough money to get out of their country to meet their soul mate? Every time they try, the consulate demands them to prove they have money to live, so they need more, and more and more... I will not delve too deep as I have conducted 3 cases in these situations.
     
  10. . Lastly, if you suspect something might be a scam, trust your instinct and steer clear, especially if they are offering something you have been looking for but unusable to find easily. Also remember the Golden Rules. Who contacted who and how do they know you? It is very tempting to click on something you want "just in case" only to find yourself host to one or more nasty viruses - Simon Smith.

Sign up to Our newsletter

Be the first to hear about the latest scams, cyber-risks and cyber security news straight from Simon, in his performance of real cases. By simply looking at the launch screen of this website on a desktop computer you will note how many cyber attacks are happening every second. There are a lot of stories to tell from free advice from an expert who has demonstrated competence above and beyond the Federal High Tech Police Division back in 2011.

FREE ADVICE & Appraisal WITH OUR NDA

I do not take on a job that I believe I cannot progress a positive fact that assists or concludes the case in the course of justice. That is why to date, in all my cases I have a 100% success ratio and am the best Cyber Expert Witness in Australia due to being born at just the right time and having the right combination of skills.

  • 7 Kenneth Road,
    Bayswater, Melbourne
    Australia, Victoria 3153
  • ......................>

    0410643121, IF I'M BUSY, LEAVE A MESSAGE
    FREE NDA, ADVICE & FULL CASE APPRAISAL
  • pi@evestigator.com.au

1IQ Pty. Ltd t/as eVestigator®.
ACN: 134 743 614, ABN: 80 134 743 614

I WILL PRE-INVESTIGATE YOUR CASE FOR FREE

Call me on 0410643121 or request your FREE Appraisal using the contact form below.

Send