- +61410643121

Brief Simon - you won't look back!
Did you know, there were 27 fraud attacks for every 1,000 transactions in Q4 2015, an increase of 215% over 12 months. Fraud attacks have increased by 11% since 2015 according to the Global Fraud Attack Index. Ask for a complimentary external penetration test today.

View Simon Smith's profile on LinkedIn
Blog updates coming up - there is no better, faster alternative to end litigation than with eVestigator®. Major success stories. See blog section shortly for updates:  

eVestigator® launches a new Android App that is capable of penetration testing 65,535 ports - leaving no chance for risk - as freeware running on more than 40 devices - including most Android and Amazon capable hardware.
eVestigator® is invited to Channel 9's "Today Show" to help demonstrate a major security flaw in the Worldwide Credit Card systems called EMV, demonstrating how easy it is for hackers to electronically pickpocket your credit card details through the air via simple NFC technology available on Android 4.4 devices and above, which bypasses the RFID security and utilises the Contactless credit card technology to get the credit card number and expiry date. You can protect yourself by buying a simple credit card sleeve for 99c off eBay or most wallets these days come with a metallic coating that holds cards. As long as there is metal surrounding the chip - the signal cannot be detected.
eVestigator® Identifies an unprecedented Criminal Reverse Cyber-Stalker behind 7 fake IP entities impersonating others.
eVestigator® prepares to issue a major public cyber-security warning to the entire country by releasing intelligence to the media that will likely influence the country's criminal cyber-laws forever.

Simon Smith is Australia's most elite Computer Digital Forensics Private Investigator, expert witness for the courts, auditor of computer industry expert work, and master programmer and reverse engineering analyst (white hat hacker). An expert witness is a person who has specialised knowledge based on that person's training, study or experience. There are many factors' that distinguish opinions and facts, and in my life, I have been lucky enough to have over 21 years+ of industry experience from the very bottom upwards - not just some limited outdated paper from a jump in the middle of the supercharged industry (without a lifetime of background), although, eVestigator® has lots of formal paper to add to his collection too. His name is Simon Smith (FPI, GDipFDR, Investigator, CEW). He occasionally offers a Direct Briefing service with an NDA. eVestigator® has over 21 years+ experience as an master Computer Programmer, former sessional University lecturer for Swinburne 17 years ago in advanced programming, and an extreme business and IT portfolio in between. For the last six years he has been utilised as a Digital Forensic Expert and Court Witness and Private/Factual Investigator, as well as an Expert Cyber Security Investigator and Auditor and Data Recovery Expert. He is also a Digital Forensics Expert Court Witness for rt, Mobile Cyber Security Analyst, Patentee, Mobile Device Author and a Computer Systems Source Code Auditor. He is able to offer a vast range of Specialist Investigative services. He is renowned in Australia as "Today Tonight's" Cyber-bullying Expert, Digital Forensic Expert Court Witness, Cyber Security / Cyber Crime Investigator, Insurance Risk Analyst, Data Loss/Prevention, Online/Offline Fraud, Intellectual Property eDiscovery / Due Diligence Expert, Education Expert, iPhone, iPad, Android, Windows, Linux, Unix, Mac, Windows CE, Nokia Computer Forensics Data Recovery Expert, Windows Certified Programmer, Family/Dispute Resolution Practitioner, Nationally Accredited Mediator, Source Code Inspection, Ethical Hacking/Reverse Engineering Expert, Corruption Investigator, Surveillance/Bug Detection & Litigation Support. He is highly qualified, experienced and has proven to attain fast and cost effective factual outcomes, complimented by his Commonwealth Graduate Diploma in Family Law Disputes Resolution, Counselling & Grief and Trauma Author.

Simply call 0410643121 (Direct) to book in a time where he will provide you with an opportunity to sign a NDA and receive evidence from you and give you a definitive answer as to the direction he would give to add actual positive value to your situation. You may email or SMS. The email is He only works on successful cases and offers an initial FREE service to assist in ensuring the client has travelled down the right path. Complimenting this, he is also a Nationally Accredited Mediator and Family Dispute Resolution Practitioner, and General Factual Investigator. It costs you nothing. Give him a call on 0410643121 (Direct) and you are welcome to fill in the Non Disclosure Agreement.

An expert that goes above and beyond and aims straight for the point
I am known Nationally as eVestigator® and in the media for my specialist cyber expertise. I am a licensed Private Investigator, holding several Qualifications, being a Practicing Forensic Private Investigator, Trained Cyber Security and Social Engineer Expert, Expert Witness taught by Hugh Selby of Unisearch, holder of several Graduate Diploma's, Graduate Certificates, Diploma’s in Security and Risk Management, Government Investigations, Information Technology and Strategic Management, Cyber Security, Government (Fraud Control), Government (Security) and so much more (see below for so much more).

Skill, Experience & Speed equals low cost service! The higher the Skill, Experience and Speed, the lower the cost. That is what our customers have found out, sadly often too late
My main experience comes from 25 years of the majority of my child, teen and adult life consisting of extensive Commercial Computer Programming and interest in innovation and creation. It all started when I was 11 years old initially programming from a tape deck green screen AMSTRAD CPC464, growing up programming continuously before the birth of the consumer Internet, then programming throughout high school during the birth of the consumer internet with every main language that existed, designing my own mail and internet servers, continuing to this day with knowledge of all frameworks including now as an App Store accredited mobile developer to patentee and Master Programmer (from ground up - not like the template ones they teach today). When I was 19, I was literally handpicked and employed as an Analyst Programmer and taken straight out of year 1 University and offered a full time job as an Analyst Programmer leading to a Senior Analyst Programmer position after being recognised as one of a small group of 3% of Australians who received Quadruple A++ in Information Systems and Processing and Management CATs. In that role the mix between my IT expertise and investigative expertise began to show. I was investigating the binary of a QuickBooks QIF file one day for a corporate client and came across a RAW credit card number. I immediately called QuickBooks who took no interest. Since then I have worked at multiple workplaces and created from ground up several multimillion dollar enterprises all in relation to IP, web, cyber security, reporting, educational, project management, corporate application, mobile, data and voice analysis applications and enterprises from scratch. When I say from scratch, I fundamentally mean from scratch. There is an article I wrote about 'template' programmers you might find interesting on this site.
Computer forensics begin with the necessity of being computer programming master. Gone of the days where people say, "I have this Company certificate from this famous networking firm who happen to develop a widely used product. Developers make products - from scratch, and makers of products are able to understand the engineering underneath. A true expert computer programmer holds the skills and abilities of every other IT discipline, because through the Software Development Life Cycle (SDLC) they have had to conduct the equivalent work and ensure that ultimately their software works with Database X on Server Y or Conditions Z. In the past, I have used my programming abilities within investigations and forensics 'on the job'. If I need the job done, I programmed it myself. A true computer forensics expert is no expert unless they understand the raw essentials of the inner operations of programming from machine code to today's language layers - that way you understand the vulnerabilities from the lowest end. That is what you call a real computer forensics expert. I have often resulted back to source code to help solve cases. I don't rely on other people's tools. The fundamental learning comes from knowing the very backbone of computer programming, its history, (over 25m years- the birth of the consumer internet) its protocols from start to end, its languages from "IMM R0, 0x80" to what they call programming today and beyond. At this point, I knew that I was more than a Senior Analyst Programmer from knowing the complete roots of programming (now at 21 teaching advanced computer programming seasonally), having an advantage over everyone as I don't rely on software, even in investigations, I invent it. I am considered an expert in my field by way of experience and recognition of that experience, complimented by many side fields, especially knowledge of cyber stalking, family intervention and relationship battles and nationally accredited mediator status and it shows in the cases I succeed in. I have solved multimillion dollar fraud SCAM’s (including the fake Microsoft tech-support SCAM and dating SCAMS), resolved reverse cyber-stalking cases, family law cases, plenty of IP tracing and identity theft cases, and corporate crime and insurance fraud cases. I also work and train as a Cth. FDRP (Professional Family Court Mediator), and have trained many Barristers at law to become Family Dispute Resolution Practitioners’ appointed now by the Commonwealth. I am a Nationally Accredited Mediator (NAM) and hold a Certificate of Bail Justice from Victoria University. I am considered a Master in Digital Computer Forensics and Online Education and have developed patents in the subject matter. I have appeared on Today Tonight (7), the Today Show (9) and other media and to the courts as a Cyber Forensic Expert/Witness. I am independent and will act for and/or against the police/government or body corporate without fear or favour as my duty is to the law and the courts.
I have succeeded in every case I have taken on. I have had parties including government department, police prosecutors, and civil litigators withdraw once knowing I have the evidence to stand up against them.

I am a Computer Forensics Expert specialising in Cyber eDiscovery and Expert Evidence and Expert Witness Services for the Court. I have extensive Investigation, Government, Risk and Fraud Management Skills and am a Private Investigator. I have performed hundreds of successful high-tech-crime cases and appeared in court to give expert evidence. I have uncovered many high profile scams and given federal police crucial cyber intelligence in many cases. I specialise in online cyber stalking and cyber bullying cases, and also workplace investigations and family and personal intervention order and court strategic evidence related cases. I am a Nationally Accredited Mediator and Commonwealth Appointed Family Dispute Resolution Practitioner. I have taught Psychologists and Barristers to become FDRP mediator's also under the Family Law Act and have built Australia's largest Marriage Celebrant Academy and software, making over 5,000 celebrants, naturally being Commonwealth appointed myself. I have over 21 years as an expert computer programmer and have created my own commercial full desktop software packages and mobile software packages and was training advanced computer programming 16 years ago for Swinburne University at the tender age of 20. I have built computer based patents and ran large educational institutions. I have built Australia's largest training multi-million dollar non-funded private training organisations, software companies and mobile applications. I now dedicate my advanced programming knowledge to cyber security and ethical hacking and combined with my other credentials have found an extreme niche to help people in this area which one could describe as the step between litigation and crime/civil disputes and the police, that is a mixture of investigation, strategy and forensic evidence and intelligence gathering with advocacy, mediation and knowledge to attain an outcome.

eVestigator completes the Stanford University Cryptology Certification.

Simon Smith is proud to announce he has completed one of the industry's most challenging Cryptology Certifications. Created by Professor Dan Boneh of Stanford University, Stanford have produced an extremely thorough online certification well respected by the industry. Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course heads straight into detailed mathematics of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems. The second half of the course discusses public-key techniques that let two parties generate a shared secret key.
The Certification covers some of the following:
Stream ciphers, cryptography, pseudo-randomness, encryption, secure encryption.
Block Ciphers, more powerful forms of encryption, AES/3DES, using block ciphers to provide data integrity, build an encryption/decryption system using AES. Message Integrity and classic constructions for MAC systems that are used to ensure data integrity, how to prevent modification of non-secret data, encryption confidentiality and integrity, authenticating large video files, hash chains.
Authenticated encryption, encryption methods for confidentiality and integrity, search encrypted data, studying symmetric encryption, key management and public-key cryptography networking a ciphertext attack on a sample website.
Basic key exchange, setting a secret key between two parties, consider protocols secure against eavesdropping, the main concepts of public key cryptography computational number theory and algorithms dating back to antiquity (Euclid) working up to Fermat, Euler, and Legendre. Also covering concepts from 20th century math and constructing several public key encryption systems.
Public key encryption, deep learning on how to encrypt using a public key and decrypt using a secret key. Public key encryption used for key management in encrypted file systems, messaging systems, and devices.
The two families of public key encryption systems, one based on trapdoor functions (RSA in particular) and the other based on the Diffie-Hellman protocol. Constructing systems that are secure against tampering, otherwise known as chosen ciphertext security (CCA security) and CCA secure public-key systems. Cryptographics mathematics for public-key advanced encryption techniques."


eVestigator® appears on the 7:30 report (ABC) discussing Cyberscammers.

eVestigator® Simon Smith has for a long time raised issues with ACORN and LRD (without or with adverse response) about the ineffectiveness of ACORN and especially the inadequacy of their services when it comes to blame shifting and police refusal to accept that cybercrime is a crime. Today, 1st December 2016, for a very interesting case that was first brought to the attention of ACORN, and left as a cold ignored case, then came to me, then identified by me, this is an interesting story to tell. Despite ACORN failing to do anything here for Gerard, outlined in the below story, the LRD police falsely accused that this incident was not reported to ACORN when it already was! It was not only reported to ACORN originally when they did nothing, it was rereported to ACORN by me, evident by the ABC 7.30 report. A copy of the 7:30 report footage is below. The PR from ABC in relation to ACORN's constant failure to act on cyber reports is also available below:
7:30 Report Video.

eVestigator® appears on Channel 9, the Today Show Extra Program to discuss Dating Scam policing concerns.

Simon Smith of eVestigator, went to Channel 9 with his client Christine for a chat with Sonia Kruger and David Campbell about the devastating effect dating fraud victims face when they merely entrust the wrong people looking for love on 'dating sites'. It is an absolute pity that people are victims to these crimes. Some notes for everyone out there, some of which we did not have time to say live this morning 5/2/2016:
1. Look local. Ensure you call the person on a real mobile number and they call you back from that same mobile number.
2. Ensure you meet the person in a reasonable time frame somewhere public.
3. An online dating site is not for dating. It is to simply introduce you to a real person.
4. If a chatter does not want to be a real person within a reasonable timeframe, say bye bye!
Today Show Extra Interview

eVestigator® issues Cyber-Security warning regarding 'Electronic Pickpocketing' with RFID to EMV via NFC.

There are no major surprises in this story except one. Approximately 65% of Australian and International consumers are carrying a 'Smartphone' that is capable of skimming the numbers electronically from an unsuspecting persons' credit card, right from their pocket. First we should start by saying right out that you can purchase for about $2 on eBay a little sleeve that you should put over any card you wish to protect that uses either Pay pass or Pay wave. Seriously, now! The every day mobile phone with some technical software modifications not so far out of reach of the every day person could be used to swipe someone's digits right from their pocket. Let's first begin with some definitions. Firstly, RFID stands for "Radio frequency identification" and it is a wireless technology incorporates the use of electromagnetic as well as electrostatic coupling in the radio frequency (RF) to give a object a digital identity. This is not new to us, and certainly if one had to crack the algorithm of RFID they would be quite stuck. Now, mobile phones do not have RFID.

Introducing, 'NFC'. NFC is Near Field Communication (NFC) is a short range wireless standard (Ecma-340, ISO/IEC 18092) that similarly uses magnetic field induction to enable communication between two devices as they pair, but only within a few centimetres. It is a shortcut if you like for a digital handshake that can emulate an RFID transaction by learning from another. It can also, on its own act in a capacity to uniquely identify an object but used for much smaller distances like key tags, or elevators etc. Then we introduce 'EMV'. EMV stands for Europay, MasterCard and Visa. It is a combined initiative and worldwide standard for cooperation of integrated circuit cards and IC card capable POS or 'Point of Sale' terminals and ATM's or 'Automated Teller Machines'. It is used quite frequently for authenticating credit and debit card transactions for small amounts under $100 here in Australia, and typically is dependent on the locality. It is limited because it contactless, and therefore vulnerable, but apparently not so much for the three key credit card companies to see as a threat for taking or virtualising a pretend transaction using a simple phone. So, to cut it short, an NFC enabled phone with the right configured firmware with programattical changes (easily demonstratable but not for sale gladly) can technically read and both write the transaction from its memory purporting to mirror the cards first signal. This is the technology already in use but controlled in Google Wallet, Samsung Pay, PayPal Cardless payments, etc. It uses NFC and Android Beam. eVestigator® warns consumers of the absolute possibility that this could be used to fake a transaction, as well as steal the credit card number and expiry date from somebody's pocket. Without going into detail, eVestigator® has recreated the technology already known to be a flaw in the system in the US and in Australia but not to the extent people should wonder if it could be used by anyone.

In my opinion, based on the fact that now Smart Phones are easily accessible with NFC and Android Beam, the technique opens the door to non hackers, and broadens the reach of Cyber-Crime. To protect yourself, you just need to make sure that your chipped cards are covered in foil, metal or some sought of pouch with metal inside as mentioned earlier. Are RFID or contactless credit cards more trouble than they are worth? How much more effort is it to swipe a card and enter a PIN? When did our time get so limited that taking no more than a second to pay for a purchase is worth more than financial security? Sure you can buy a little pocket or sleeve to protect your card from skimming and cloning that takes seconds, with little to no initial risk to the perpetrator as they never touch your wallet and costs them very little to get what they need to steal your credit card information and as little as $35 to create a fake card using the stolen information. The time it takes to remove and replace your card in the sleeve negates the time saved using 'tap and go'. I remember one of the benefits of the added chip being touted as 'extra security'; now people are seeing demonstrated what many of us warned - in front of my own eyes and in a controlled testing environment - IT IS POSSIBLE!

There is virtually no security, on these kinds of payments, but the worse part to this is that it gives you the raw digits, so potentially you could purchase online. It is even possible to generate a Random CVV with the technology. The $100 limit limits the damage of one transaction, but you only need the number once - as people still rely on MOTO (Mail Order Telephone Order). Specifically just limiting ourselves to this technology and forgetting about knowing the card number, we can reproduce a real-time transaction in quick succession, and they can add up before the theft is discovered and the banks have detected any suspicious activity. RFID is easily hackable, by using a 'back-door' style approach via NFC which kind of does away with the encryption of the RFID! All that is needed to make a purchase, particularly online or over the phone is usually the credit card number and expiry date and as a merchant myself eVestigator® can safely say that the card companies do not require a CVV for MOTO transactions, hence the risk has heightened due to the availability of the technology being conveniently packed into an Android Smart Phone which has all the bits and pieces (without software intervention) to replay or copy a card transaction. The name on the card being incorrect is a human fraud check that can be made after the fact but to actually make a purchase it is unnecessary. You don't even need the three or four digit CVV number on the back of the card for most purchases. In any case social media makes identity theft even easier.

The technology in your phone now may be able to take a persons' credit card number and expiry in certain circumstances of which we shall not outlay, but it is not replayable to the average person. Be mindful that even if you have your card packed in your pocket or wallet, a skilled indiscreet passer can brush past you and take what they need. This leads to even further privacy concerns. Birthday messages on Facebook for example, make it pointless to hide your birthdate. So it just might be worth disabling RFID and sticking to swipe and PIN, as credit card numbers are used to sometimes authenticate passwords or gain access to internet banking. eVestigator® will assist the various companies in their cyber-security issues if needed. How it got this far, who knows. Until a revelation or specific information becomes available eVestigator® is happy to keep people safe, and even though this possibly may be another risk or exploit, he sees thousands every year that don't even require technology. He has solved over 15 major scams, and sometimes people don't realise how trusting they are. There is a consumer and criminal disconnection, and whether it is blamed on the computer or not, it still follows traditional methods, so beware!

Cybercrime Expert Witness Simon Smith discusses the 'hidden defendant' appearing in almost every case.

Well, in my words it is "CYBERGEDDON". Not to be dramatic but I have now experienced an element of cybercrime in every single case that I have had to deal with in every jurisdiction including employee fraud, stalking, computer crime, theft (including identity theft), international crimes, police prosecution, civil disputes and extremely aggressive family law cases. As a Family Dispute Resolution Practitioner also, I can appreciate the enormity of mudslinging that goes on in such cases that depend heavily on the credibility or lack thereof, and have reversed many cases by an interesting element of cyber-fraud where the Internet has reversed cases showing fake email evidence admitted into evidence, almost causing loss of custody and destroying families. This is real!

I would like to introduce two short stories of fact anonymised for the benefit of counsel and readers of this newsletter to explain that from conducting a slight investigation and thinking outside the square, almost all cases are resolvable in such a way that they can be mediated or favourable to one side through computer forensics; as despite people thinking they are smart in sending anonymous emails or purporting to be someone else through TOR networks (of which I happen to own ‘Orion Elite Hidden IP Browser Pro++', the largest iOS software but it is supposed to be for the purposes of protecting the users privacy) they are not immune. I have saved many cases where justice has almost been destroyed because sadly in some situations the Magistrate, Justice, Judge or Member do not understand the complexity or the relationship between the technological credentials and reliability of the human and sometimes neither can the client explain it properly to their counsel or lawyer. This is detrimental because if nobody understands how to properly construct pleadings then they are likely to be struck out.

In my first case scenario, a person from India came to Australia to work for a company and provide Search Engine Optimisation (SEO) services. In other words, they simply came down and suggested that they would take over the company's Google marketing. This company was spending about $4000 a month on AdWords marketing. This new "employee" happened to own a SEO company in India, so he contracted himself to perform the work in conjunction with himself as an employee of this Australian company. He also set up various servers and operated several businesses from within this organisation—unbeknownst to the employers—through the company's network. From Google's perspective, all operations were performed by the employer. However, at least seven servers were set up, racking up a bill of $500 000 of debt without permission of the business owner; fraudulently, to the benefit of this employee who later was sacked and then demanded the employer pay more money as an alleged debt with the SEO company, money he claimed to be owed based on the trading relationship. What an ironic situation. I was called in to a very frantic company to determine how to get Google off their back for a half-a-million-dollar debt racked up by this ex-employee. The Google user account and IP address (internet location) pointed naturally to my client because the ex-employee had opened up several ports where he could dial in from home and pretend to be on my client's network in performing his illegal activities, then he left the country. I took a very strong lead in finding negligence on Google's side and technicalities in policy in attaining credit where credit was not authorised in order to defend my client's liability and explain from a cyber legal perspective, before it even got to the point of litigation, that the company was not responsible for this debt. In normal law, most of you would agree that the liability, despite the crime, would still fall on my client. This was an enormous success. This is what I would call a ‘hidden defendant'. You cannot always trust that the defendant is actually visible to you. This is also the case in many jurisdictions; one of which I would like to share with you that is quite extreme and how I completely overturned a massive case.

Most people would like to think that people tell the truth in family law cases, especially doctors. I had a case where I was called in to validate the characteristics of who may be telling the truth based on some SMS's and forensic iPhone discovery. However, I found much more than that. As it happens in this Family Law case, the mother had taken the child and as possession, as they say, is 9/10ths of the law it was up to the father (who had nothing wrong with him) to seek psychiatrist reports, counseling, visitation rights, initiate family law proceedings and go through an enormous amount of trauma to prove that there was nothing wrong with him to still potentially be on the losing side as he didn't have possession. An enormous amount of Affidavits were exchanged with the Family Court. Most Judges do not like to discuss perjury but I am a stickler for evidence and fact and I say it how it is; I did not intend on coming up with what I came up with. What I found was the last Affidavit of the mother, which was all allegations and no witnesses (and most allegations were in regards to forgery, rape, violence and no evidence other than her word as well as no police reports) and were very serious allegations. All of these accusations were of a man who seemed like a normal father, that due to this, limited him to three hours visitation, every three weeks to see his daughter of four months old with no notice. I do not take sides in cases however, I do take fact.

I, in my investigations, usually look at what comes to me rather than what the client asks as my first duty is to the court. In what I found by perusing through what we like to call "big brother" Google records is that a strange IP address appeared that had hacked into his Gmail account. However, what this person did not realise was that this IP address, once in Gmail is also recorded to have searched Google for methods of fabricating evidence in Family Law Courts against ex-husbands, planning methods of suicide and/or faking suicide and cutting brake wires of the same model car as my client. Subpoena evidence showed that the IP address that conducted these searches and hacked into my clients Gmail account, came from the credible doctor who had submitted over 40 Affidavits alleging the opposite to the Court of Law. It also shows that the searcher was looking for fake emailers and on the header of the emails that were submitted as evidence to the court, I note that the exact emailers that she was searching for sent those emails purporting to be somebody else. This is also a crime as we know it of impersonation. Needless to say, I stumbled on something quite large here. My advice to the client was to start talking closely with the other side.

My final words are that I can make a big difference to any case in relation to cyber intelligence. It is part of every case at the moment. Everybody uses their mobile phone, I can find out what they have done, what they have searched for, what their intentions are and what their personality really is. Everybody has a record that is usually uploaded to iCloud in the case of iPhones or the Cloud if they are using Android. Everybody uses some form of security-based email like Gmail or Hotmail that tracks you. There is always a record. I would advise everybody to test the evidence before accepting the inevitable because sometimes, on a simple technicality of fact at a very low cost, an entire case can be destroyed and these are where my successes lie. These are just two examples of some very successful cases. I am currently working on an enormous case which is very similar and involves an accused that is facing a jail term of at least seven years who, based on current evidence, did not do the crime and the withholding of that evidence seems to be an abuse of his rights. I always give counsel, lawyers or clients a free pre-investigation on any case to determine whether I can help to ensure that I can maintain my 100% success rate. I will only assist in cases that I know will produce an outcome.

You are an expert in litigation and cyber elements have unfortunately always existed but people have never realised how serious and how present they are in proceedings, now and in the past. Expert opinions and facts make a difference. Call me anytime on 0410 643 121 or visit and I'm happy to talk, anywhere in Australia. Simon Smith is a Cyber Forensics and Cyber Security Expert Private Investigator, Certified Ethical Hacker, Technologist and Computer Forensics Expert Witness. He has over 21 years+' computer programming experience and has appeared in various news publications regarding smart phone technology and on Channel 7's Today Tonight in relation to Cyber bullying and recently the Today show on Channel 9, discussing credit card security. Simon has a strong persistence in finding a very fast and cost-effective approach to assist cases with evidence that can be detrimental to one side based on his extensive knowledge of programming. An example of this is just in knowing that he has prepared to stand behind somebody in support of two convictions from a legal services commissioner in a state of Australia, based on a technical inaccuracy on their part, they dropped all charges. Being a Nationally Accredited Mediator, although in the court room, Simon works for the court, ultimately his goals is to help produce an outcome that joins all the dots and perhaps resolve a situation in or out of court without compromising fact.

eVestigator® predicts census cybercrime three days before warning Australia

10 August 2016 - eVestigator® - "Only 3 days after releasing the blog entry entitled below, 'Cybergeddon is here - eVestigator® Simon Smith announces the inevitable', comes the news of the 'Website for Australian census 2016 attacked' by a DoS (Denial of Service) attack. The best way to define a Denial of Service attack is for an attacker who attempts to prevent proper and legitimate users from accessing the normal use of a website by overwhelming it with requests, data, sessions, etc."

"Ethical hackers (and those unethical ones) know the limits of TCP/IP connections that are allowed on various servers - and if not protected can cause a exhaustion of the resources of the server, by flooding it with fake connections. Such attacks stop real people from getting onto the server to do what it was intended to do. This is why Cybersecurity is so important."

"I myself have written my own Denial of Service and even Distributed Denial of Service detection and blocking software that others pay tens to hundreds of thousands of dollars for. It really is quite simple. People often test websites to see if they have the proper infrastructure in place to 'put up' with such an attack. If I was investigating this, the first thing I would do would look for traces of mini tests before the incident, and that is often the way you would catch the Cyber criminal."

"I have reported on this issue officially in 'The New Daily' magazine - and as I predicted in my earlier blog Australia just is not ready. This is not a different world to what it was 10 years ago. People have chosen to ignore the same crimes being adapted differently. My view is strong. WAKE UP AUSTRALIA!"

"The published article is here and below (credited).

"It's the most simple attack": How the ABS bungled the 2016 Census
The Australian Bureau of Statistics was unprepared for the "simple" and "obvious" cyber attack that apparently shut down the Census, an internet security expert has said.
On Tuesday evening, the Census website crashed thanks to repeated "Denial of Service" (DoS) attacks, according to the ABS. A DoS attack is designed to make a network unusable by flooding it with millions of fake users.
At 7:45pm - as millions of Australians went online to complete their Census - the ABS chose to shut down the system, for fear of further DoS attacks (see a timeline of the Census night drama below).
The site remained offline all Wednesday and an update posted at 9.15pm was pessimistic about its chances of getting up and running that day.
"We continue to work with Australian Signals Directorate and our providers to get our secure online Census form back up as soon as possible," the ABS said in a statement. "A further update will be provided tomorrow [Thursday]."
It's still unclear what caused the website failure.
Cyber experts have questioned whether a DoS attack caused the online Census to shut down.
Online security researcher Dr Mike Johnstone wrote in Computerworld that it was more likely the failure was caused by too many Australians logging on to do their Census at once, rather than a DoS attack.
He conceded it may have been possible that a combination of a DoS attack and the system buckling under the weight of traffic caused the website shutdown.
But Dr Johnstone concluded: "If it's probable the Census servers simply failed under the weight of their task, then that's the most likely explanation, rather than a deliberate DDoS attack".

Australian government 'cyber security novices'
Computer forensics expert and cyber intelligence investigator Simon Smith told The New Daily that the government's lack of preparation and expertise on cyber security was proved on Census night.
"Wake up Australia, 'Cybergeddon' is here," Mr Smith said. "Australia is probably one of the weakest places in the world (cyber security-wise).
"I'm very afraid to say that we are extremely crap at protecting ourselves. It's not as if the government really put much effort into security, is my first reaction to the Census crash.

"Denial of services attacks are the most obvious attacks, they happen every day."

The ABS and minister responsible for the Census, Michael McCormack, said the attack likely came from overseas.
By Wednesday afternoon, Mr McCormack appeared to have been the subject of hacking on his own website, as News Ltd political editor Samantha Maiden confirmed to Channel Ten's The Project.
'It was a successful attack, not a hack'
Special advisor to the PM on cyber security, Alistair MacGibbon, told Sky News he did not know if the attack intended to steal information, or just to make a point about the hackers' abilities.
"It was successful because the ABS made the decision to take the website offline, because they wanted to make sure the worst case scenario [loss of data] didn't occur," Mr MacGibbon said.
He said the government believed no sensitive data was stolen.
Mr MacGibbon continually referred to the DoS as an "attack", but not a "hack", even though earlier in the day Mr McCormack refused to use the word "attack".

© The New Daily - Credit: URL

eVestigator® shows the public how they are broadcasting their identity without knowing it

A mobile phone finds and connects to Wi-Fi networks by periodically sending out "probe requests". In simple terms these are "Hello, remember me, I connected to these Wi-Fi stations previously? Anyone out there? Here is my Unique mobile phone address to check (MAC Address)". These requests includes a unique identifier called a MAC address, which while making it faster and more convenient to connect to a network, it also makes it possible to collect this information and use it to track people. Knowing your MAC address goes a long way to track your phone if it is ever lost or stolen. While not impossible to change, it is a very difficult process and probably not worth a thief's time. Turning off your Wi-Fi when you are not actively using your phone and/or have no need to access a network, stops this method of tracking while Wi-Fi is not enabled.

A second of inconvenience for a little extra security might just be worth the twinge of annoyance. There are Android apps available that automatically switch your Wi-Fi off once your leave the range of trusted networks, though I personally can handle swiping down the top menu and pressing the Wi-Fi icon myself so I haven't looked into these and prefer not to place control of my privacy into someone else's hands. For iOS apps are limited without jail-breaking your phone, though iOS 7 introduced a swipe menu with quick access to certain settings including Wi-Fi. I won't go into the technical steps of how to create a Wi-Fi monitoring system to track people as is used in some stores for marketing and research purposes but I will say it is a fairly straight forward process and needs a router or a single board computer like a Raspberry Pi with a Wi-Fi adapter. It is not just possible tracking that you should be wary of but also "free Wi-Fi" or open networks.

These networks tend to have little or no security. It gives potential attackers a way in and makes any information sent over them visible. It is why you should never log into your internet banking or secure account using McDonalds Wi-Fi, as an example. A faked or compromised access point to a network, is called a Rogue Access Point (Rogue AP). Using such a network, essentially sends any information you enter to the access point's creator giving them access to email, Facebook and whatever else you might access while online on an insecure network. It can be just to monitor or a backdoor into an otherwise secure system, even if it is a soft AP set up by an employee of a business with or without permission for easier mobile access to the business network to work off premises it behaves as a Rogue AP (Access Point).

eVestigator® draws the line between a phone and smart phone

24 April 2016 - eVestigator® - "While Apple hardware may be well-built and likely to last for years, the software is another story as Simon Smith of eVestigator® discussed with Jackson Stiles of New Daily earlier this week. Read the article here. (link on the 'The New Daily' website at the time of placing this blog - dated April 18 2016)

'A phone is a phone but a smart phone is not just a phone,' says Simon Smith. 'it is fair to say that the majority of phone users these days are smart phone users' therefore this must be considered when discussing phone in general and this is what came up recently."

"With every iOS update consistently, and so it would seem intentionally, aspects of previous coding becomes obsolete, different or removed altogether forcing iOS programmers to update their apps or risk incompatibility with new devices and operating systems. Effectively limiting the usability and life of a smart phone."

"An example of this is the iOS 9 implemented an update which restricted access to insecure websites on older phones. Although this is great for developers like myself who already use an encrypted system internally, such encryption should be part of the operating system and such encryption is welcome. However, with little to no notice to developers such an implementation caused havoc to software and their developers. 'The life expectancy of a phone is three years, in a way. It would probably hold up in a court of law (misquoted as 'life') if something went out of warranty.' you can have a phone, but you’re not going to get the most advantage and functionality out of a smart phone as technology grows because the phone is only as good as the hardware and the software they allow you to use. And sometimes you can actually get more out of the phone with the software, but they don’t let you.”

"A phone is a phone and will last as long as the hardware does but the other functionalities of a smart phone decrease and become obsolete over a far shorter period of time."

Expert samples of how he can help

Cyber Security, Cyber Bullying, Workplace Issues, Criminal Success, Civil Success, Digital Forensic Expert Evidence and so much more..

His successes - not even a fraction, check testimonials and request advice

He has saved people hundreds of thousands of dollars in establishing hard facts prior to and in avoidance of litigation. Such facts are unknown to the general community and the investment in his services has proven this over and over again. Human testimonials are available.

The Industry

As a successful Expert Programmer and former Lecturer of Advanced Programming and Entrepreneur at a very young age, he grew up with the birth of the internet and knows the skeleton foundations of where to look, making this statement fact, proving successful outcomes in many cases.

Cyber Crime

Statute and treaty law both refer to cybercrime. In Australia, cybercrime has a narrow statutory meaning as used in the Cybercrime Act 2001 (Cwlth), which details offences against computer data and systems. However, a broad meaning is given to cybercrime at an international level. In the Council of Europe's Cybercrime Treaty (EST no. 185), cybercrime is used as an umbrella term to refer to an array of criminal activity including offences against computer data and systems, computer-related offences, content offences, and copyright offences. This wide definition of cybercrime overlaps in part with general offence categories that need not be ICT dependent, such as white-collar crime and economic crime as described in Grabosky P & Sutton A 1989, Stains on a white collar. Sydney: Federation Press.

High tech crime

High tech crime is a common label used by both the Australian High Tech Crime Centre and by the National High Tech Crime Unit in the United Kingdom. These agencies deal with crimes that rely on the use of ICT, or which target ICT equipment, data and services. Their focus is on the complex networking capacity of ICT, which creates a previously unimaginable platform for committing and investigating criminal activity. High tech emphasises the role of ICT in the commission of the offence. Different practical considerations arise according to whether ICT equipment, services or data are the object of the offence, or whether ICT is the tool for the commission of a 'material component of the offence'.

©Commonwealth of Australia - Australia Cyber Crime & Security Survey Report 2015

eVestigator® (a 100% positive result success rate to date)

Civil, Criminal, Corporate Factual & Digital Forensic Investigations, Fact Finding, Data Recovery, Bug Detection (iPhone, Android, Surveillance & Computer Forensic Expert), Litigation Support, Corporate Security Penetration Testing, Intelligence

Hi I'm Simon Smith, Cyber Forensics Expert Court Witness, Expert Investigator and the eVestigator®. I have worked on too many high, middle and low profile cases to count. This page only lists very few. It is amazing to see how much difference fact makes and how much money it can save a client. I often see clients who have wasted $100,000+ on litigation and got nowhere, and then I have a result for them (in one particular case) in just 2 weeks. That is how I work. I am just the person, with the independence, skills, knowledge and background, equipped as a specialist forensic, qualified Private Investigator to trace conduct back to its source, to affirm, expand on or re-create a scenario of alleged conduct for you.

I was born in an era of technology and rapid advancement, I manage and have managed enormous enterprises for over 21 years+ - programming in every language combined with strong and proven civil, criminal, factual and government investigation skills and credibility, having given intelligence to Ombudsman, Ministers and the Auditor-General. My knowledge and unique experience gives me that competitive edge to give independent, expertly obtained fact.

When I was 20, I started a three-year stint as a lecturer in Advanced Computer Programming at Swinburne University of Technology. I was also employed as an Analyst Programmer at the time, I already had about 10 years (mostly childhood) experience of programming in earlier languages and programming a server capable of handling the very first real commercial internet traffic. eCrime and White Collar Fraud, eFraud, Cyber-Squatting, Cyber-Legal assistance, Cyber-Stalking, Cyber Attacks (denial of service and more), Intellectual Property Breaches and so much more have grown from systemic mistakes made in the growth of the public internet/intranets over the years, and *will* continue. As the inventor of computer-reliant patents, I am making history and was praised by three Federal Court Judges in the full Federal Court of Australia in a case related to defeating the Commissioner of Patents attempt to revoke a patent.

I am an expert in software related IP marks. I am in a position to demonstrate algorithms that can assist a Court or jury with understanding a crime or offence in simple terms. With experience, credibility (Commonwealth FDRP, NMAS Mediator, CMC, Forensic Investigator and more) alongside commercial experience programming and investigating software engineering holes, and expert programming on all platforms spanning 21 years+, I can help illustrate to the court, justice and/or jury, beyond reasonable doubt, how, when and why events occur in simple terms to affirm intent and conduct.

Corporate & Government Forensic Investigations (Any kind of investigation or SCAM discovery including corruption, fraud and more)

I am independent and provide a completely impartial service. I can and have used my abilities to assist the government in many ways by providing external investigations and forensic dispute resolution. I specialise in high-tech white collar fraud and can and have identified system issues of corruption in government departments, be it influenced internally or externally. Rightly so, the public expect the government act in a way consistent with their charters and legislation and the guidance of their Ministers.

I have had exclusive experience in unveiling fraud in government departments and providing intelligence to senior independent officers like the Auditor-General and the Ombudsman. My Mediation skills are often used in conjunction with my forensic programming/reverse programming skills to determine fact to apply policy.------- In the corporate world Cyber-crime, Cyber-stalking, Cyber-bullying, Facebook abuse, email abuse, YouTube abuse and cyber-related staff harassment/stalking has become a systemically increasing problem for internal personnel as well as the corporation.

I have assisted in cases by gathering intelligence via the new world of social media, I assisted in jailing a person in Victoria for the serious offence of stalking. It is important to trust your employees and a breach of that trust must not go unnoticed. There are three main qualities that when combined, produce absolutely super cost effective output. See below.
"We do not have to all be experts, sometimes common sense is enough". eVestigator® - Simon Smith

Keep Reading...

Why Me? - I'm not just a Forensic Cyber Expert

I am also a Nationally Accredited Mediator, Family Dispute Resolution Practitioner, Reverse Engineering Expert and Cyber Security / Cyber-Legal Expert. I also have Graduate Diploma level skills Digital Education and Management and have a strong business understanding, as well as businesses experience when it comes to disputes and how to save money and not fall into a loop where you spend money and get nowhere. I have had significant experience in IP disputes, Patents and Trademarks and I am an expert in the Education Industry, as well as a commercial authorised Apple, Android and Certified Windows Developer, having made several commercial applications and having built several multi-million dollar enterprises. I understand, which is where my advocacy service assist greatly, and saves you or your client money.

I am a Forensic Private Investigator qualified under the Victoria Police Private Investigator Licencing Regulation Department - Simon Smith t/as eVestigator

This gives me the skills to see through the lines, get fact, without fear or favour, whether its for or against the government or for or against a civil entity, I find fact.

I am a Nationally Accredited Mediator accredited by the MSB under the NMAS and Commonwealth Appointed Family Dispute Resolution Practitioner

These skills are an absolute necessity and are often what is missing with other professionals. It enables me to determine the suitable jurisdiction and to better understand the dispute and resolutions, which saves you or your client money, and my client's praise this ability. Especially with family situations, as in many cases an FDRP, in normal circumstances, is the only person that can sign a s60(i) under the Family Law Act granting permission to enter proceedings involving children after mediation.

I am a Professional Advocate

This is the most important part. I am happy to say that by joining all my skills together, and gaining permission from my clients to work with others like Lawyers, Barristers, Government Authorities, the Police, I can guide them through to an actual total outcome. Many people deliver services in pieces, and you either end up wasting your money with nothing, or having to re-explain everything again multiple times costing you more money. I like to see them through. My clients have told me I have saved them hundreds of thousands of dollars, and come to an expedited outcome after years of fighting.

Success (Samples have been de-Identified)

Note: This is only a very early stage layout of some successes. There has been many more over the years and many more happening almost daily. They tend to now appear either anonymously or via way of comment, updated regularly as time permits in both the blog or evident in the numerous testimonials. Please make sure you check them out.

I love my job - the best way to show competence is with fact, so here is just a sample of de-identified cases Simon Smith, Australia's very own eVestigator® has been involved in.

I found the IP identity of the fake Microsoft Tech Support Scammer (or one of them - and gave it to ACORN). Now this was interesting. More than 90% of my clients come to me frustrated after not having any luck with the police or ability to make a statement. This one particular client (a very smart man) received a call one day and being the trusting person he is, he was strongly led to believe his computer was infected with a virus and Microsoft have detected it and are calling him to fix the problem. Everyone has different thresholds and trust levels but I can understand how an older gentleman would believe this could be the case. To cut a long story short the person with an Indian accent got him to install remote control software on his machine, allowing the 'hacker' to install malware, giving full access to his computer when connected and online at anytime. Plus, he thought he would throw in a low level password and bribe the gentleman to pay money in order for Microsoft to remove the password from his computer.

The gentleman spent $1500 (it could have been more) to this 'entity' and nothing happened. They still however said they needed more money. The gentleman then reported the crime to the police who did not take a statement despite it being a crime under the Crimes Act 1958, and sent him to ACORN. ACORN (people believe) is a division of the police force to report and act on cyber-crime. The gentleman swiftly received notification from ACORN with a fact sheet and some general advice and said nothing could be done.

This is when I got involved. When he presented his laptop to me I was able to take off the important data and remove the entire malware/virus, and even further since they were still trying to get money out of him, I decided to locate them. Via proprietary techniques, I attained the criminals IP Address, IP, Mobile device make, firmware which was in India. As it turns out, ACORN ended up making a complaint about me for not telling them what I found out - saying I had a duty to report it. I did tell my client to report it but must admit was taken back from that approach and was insulted. Nevertheless I got over it, and sent ACORN the identifying details so they 'might' take action. What happened to Interpol? The police have always had the ability to report international crimes. I have seen letters from customers where ACORN have said "we cannot investigate international crimes" or words to that effect. So, I solved perhaps one of Australia's biggest SCAM's that ever existed. My client thanked me profusely and that was relieving. I ended up taking it further with ACORN but at the end of the day it is a small world and a lot of crime and this was something that they may have been too busy for. Nevertheless I continue to help people get real justice.

I uncovered one of the largest DDOS cyber-attacks (with this case being followed closely in the media) involving defamation of a celebrity. I uncovered and traced an underground crime syndicate that was responsible for spamming over 24 million people at the request of a disgruntled ex-business partner. I found the link to identify the accused on the balance of probability. This was a massive find, with no leads, and with sheer investigative work, a series of events have led to what could be considered extreme reasonable doubt against the accuser's story. The case is privileged and ongoing, no more generic information can be provided in this matter.

I was approached on behalf of one of the world's largest insurance companies to assist in the underwriting, in conjunction with their solicitors, of new Cyber-Security and Indemnity policies, the development of new risks in this ever changing industry, requesting assistance in indemnity wording and risk and creating PDS's around new and innovative white collar fraud and cyber-attacks in the media at the moment.

I was requested to analyse voice biometrics to determine if a suspect had made a hoax bomb threat by telephone and was requested to advise the lawyer of the accused on what should technically be requested from the police and gave intelligence as to the voice codec and causing reasonable doubt of biometric distortion in a compressive lossy voice algorithm. This was a very serious case with charges under the new Anti-Terrorism laws.

I was recently approached by an individual seeking help after being accused of several counts of hearsay sexual offenses leading back over eight years, with the evidence reliant on MSN and Facebook data. This case is pending; however as the accused was pleading innocent, I was able to demonstrate beyond reasonable doubt the unreliability of supposed forensic data relying on old MSN messages.

I was approached and subsequently investigated and compiled an expert report in conjunction with a solicitor's privacy policy detailing the privacy implications, after inspection of the source code and auditing of the non-identifiable hash algorithms that intercepted mobile Wi-Fi beacon signals for the purpose of tracking retail customers, I gave security and privacy protection recommendations based on my findings.

I worked with State Regulators, providing intelligence which led to two convictions, stopping an unqualified electrician performing further illegal, unsafe and non-compliant electrical work. He was convicted and fined.

I investigated and provided evidence to ASIC of the deceitful and misleading actions of a Director who allegedly breached the Corporations Act and committed an act of Bankruptcy. He on behalf of his company allegedly applied for deregistration during court proceedings to avoid paying debts arising from judgment against him. I supplied a brief of evidence which is now with the CDPP for prosecution. I also achieved reinstatement of the closed company. The company is now in liquidation.

I uncovered fraud and corrupt conduct within a government department and provided a full investigative report to the Auditor-General and Ombudsman, proving a breach to the Minister's Gazette pricing structures in the education regulatory instrument unveiling over $7m of overcharging of education stakeholders, as well as affirming in person with the Auditor-General and Minister identical evidence found in his audit, uncovering identical breaches to legislation.

I have since uncovered corrupt and improper conduct on the part of the Independent Broad-based Anti-Corruption Commission and the Department of Justice, which will be subject to further legal action initiated by myself.

I have uncovered at least five dating scams involving the usual request for money to 'come to Australia' to meet their new love but never having enough money. I was involved in working with Western Union to take this to the police as a crime to stop the conduct.

I have acted for a high profile corporate client who had been cyber-stalked for five years, living in terror, with the police and their High-tech Crime division investigating without success. After just two weeks I found the accused (via social media, cyber methods and traditional investigative techniques) and my evidence later helped prosecute and convict the stalker under the strict Victorian Anti-stalking laws.

As an expert in social media and cyber-stalking cases, I assisted the NSW police via Interpol in tracking down the stalker of a popular YouTuber to Scotland. And so working with the Scottish police the stalking was concluded.

I have assisted individuals extensively in finding their cyber-stalkers via Facebook, dating websites and email scams, using email tracing and cyber intelligence mechanisms. When in all situations the customer was informed by police that nothing could be done.

In an impersonation case, a man purported to steal the identity of an individual and consequently put up a dating profile soliciting gay sex and sending interested parties to the victim's address. The suspect had blocked his IP address and was difficult to track but using forensic tracking I was able to identify the address of the accused, leading to his arrest.

15 years ago I discovered a flaw in (one of the world's largest accounting software companies) that revealed credit card details in the hexadecimal binary of the unencrypted data file and alerted the producers of the software to the problem.

My mediation skills are often also used in conjunction with my forensic programming/reverse programming skills to determine fact to apply policy.
-"If only you could see information as a jigsaw, releasing via Social Media and its risks could be the final piece". eVestigator® - Simon Smith

Some case studies are subject to Non-Disclosure agreements. Please contact me for a massive list of experience and real Success. My work speaks for itself. Looking for a testimony from a real corporate client who was stalked for five years, living in terror, with the police and their High-tech Crime division investigating without success? After just two weeks I found the accused (via social media, cyber methods and traditional investigative techniques) and my evidence later helped prosecute and convict the stalker under the strict Victorian Anti-stalking laws. Contact: Lifestyle Portraits, Darren Tilnak

Real Life Practical Experience and Qualifications

Below is a subset SAMPLE of some of my Qualifications/PD (Excluding Life Experience/Case Studies/Government Appointments). It is relevant to note that Cyber-Threats in my view is the new world war. New hacking methods are created, and smarter e-Crime is committed day by day. There is not one degree one could do without the knowledge of such degree being expired at conclusion. eVestigator® has a magnitude of Nationally Accredited and Professional Development (Some endorsed by Charles Sturt University) to maintain currency. I grew up with the birth of the internet and every day cases bring new threats that may not have existed yesterday. My work and customer feedback speaks for itself. Please find below a sample of some of the official Qualifications and PD I have undertaken. Mostly, I teach others Cyber-Security trends, and this is something that is popular in America but lacking in Australia's training system. Children should be taught about current cyber risks in primary school as (from experience) the exposure with social networking is so open, people do not realise how much intelligence someone like myself could gain from merely a Facebook profile. This is something we are working on, in educating Australia. There will be more on this shortly.

Professional development is often maintained via world renowned Udemy, Cybrary platform and attending and the giving of speeches at conferences worldwide. Udemy has been discussed in The New York Times, The China Post, Fast Company, the BBC and TechCrunch, with much of its coursework originating from Stanford University Expert material noting "Udemy offers an experience that rivals the real classroom, and should prove to be a useful utility for teachers and students of all subject matters.

Since I was just an 11yr boy I have been programming in almost every language on every platform available. My brothers played games, I made them! Aside from the 25+ years of HANDS ON major computer programming and cyber security experience, I developed many applications. From web servers, mail servers, my own protocols, all low level, design - pixel by pixel, code line by line, nothing like the 'wizard' and 'open source' attempts of lazy coder attempts today. At 19, whilst employed as an Analyst Programmer and working on integration with a VERY WELL KNOWN commercial accounting package for our CRM software, I found a major security flaw in the raw binary of their database exposing credit card numbers, that's where my interest for cyber security investigative 'programming' developed. Having already becoming a growing expert my commercial experience was like facing a truck head on. As at the same time, after VCE I was in the top 3% in Australia in my VCE (Common Assessment Tasks) for Information Systems and Technology (4 A+++), then after a short stint flying through High Distinctions at first year Uni, I was hand picked and employed immediately to work for real projects as an Analyst Programmer, then Senior Analyst Programmer, and later became a CEO, Assessor, CIO and CSIO, PI, and Forensic Investigator/Expert Witness. In those earlier days in addition to working as an Analyst Programmer I was in demand by Swinburne University as one of the very few who could teach the all new .NET advanced programming suite sessionally and did so for a period of about 4 years after hours. I shortly opened my own international businesses in the Voice Analysis/VOIP medico-legal industries. I programmed handheld devices, multi-million dollar corporate software and systems widely used by physicians overseas to dictate via Windows CE Pocket PC's (way before the iPhone and Android existed) that interacted with custom typist equipment for dictation and transcription.

Since then I built some of Australia's largest IT companies and educational institutes and gained recognition of my expertise both before, during and after my practical experience - calling from the golden principles of expertise from what you cannot learn at school - but what was embedded in me since 11 years old - first programming on an Amstrad CPC 464 64kb tape deck machine. I have seen the entire life cycle of today's computer systems file systems and further, from the perspective of the consumer birth of the internet and have shared this knowledge and lead teams of up to 50 people, developed major commercial applications, built 2 of Australia's largest training institutes, a Computer Implemented Software Patent, and am considered a master in programming principles and reverse ethical hacking. From understanding the roots of programming, something that is not taught these days, I understand client needs, and can understand the full dynamics of source code layers (as they have evolved), enabling me to have an investigative advantage in any matter relating to computer crime or computer related fraud.

I am especially useful in white collar crimes, cyber stalking, cyber harassment, and reverse IP tracing. Much of the API programming tools I have created over the years are used by millions of people all over the world by 'other programmers' as software plug-ins for Microsoft (IE/Spartan/Edge/Surface Pro/Windows Phone), Apple (iPhone/iPad/iTunes), VLC, Real One, and other major vendors. I have always been the programmer for programmers. I have been asked to give expert opinion in cases involving IP theft and high-tech crime requiring analysis code line by line and contracts involving disputes over source code theft and disputes, and I that is one of the reasons why I can attain forensic data that many cannot when it comes to situations where most people give up when they cannot get an IP address on a silver platter. I have succeeded in many cases, because there are many more ways to locate a person who wishes to remain anonymous who is damaging a reputation or company.

Memberships, Affiliations & Appointments...

Victoria Police Licensed Individual Private Investigator (PI) - Simon Joseph Smith
Nationally Accredited Mediator (NAM)
Commonwealth Appointed Family Dispute Resolution Practitioner (FDRP) and Assessor of Grad.Dip FDRP - Family Court Mediations
Victoria Society for Computers and Law (VSCL)
Information Systems Security Association, Inc (ISSA)
DEFCON® member and cyber intelligence supplier and contributor
International Association of Software Architects (IASA) - Member
Commonwealth Appointed Marriage Celebrant, Family Law Division - Attorney-General's Department

20 years+ hands on industry experience as a Master Computer Programmer and full SDLC exposure covering all roles plus...

Certified White Hat Hacker (CWHH), Clickjacking, Cross Site Request Forgery, Cross-Site Request Forgery (CSRF), Cross-site Scripting (XSS), CSRF, Documentation - Oracle VM VirtualBox, File Inclusion, Google Hacking, Google Hacking Database, GHDB, Google Dorks, How to do Cookie Stealing with Cross site Scripting Vulnerability : XSS Tutorials| Learn How to Hack| Ethical Hacking, Information Gathering, Intro To Web Apps, Kali Basics, Kali Linux | Rebirth of BackTrack, the Penetration Testing Distribution., Offline Windows pw & reg-editor, bootdisk, Onionland, Password crackers - SecTools Top Network Security Tools, Password Cracking, Phishing, Remote File Inclusion, Sandbox (computer security) - Wikipedia, the free encyclopedia, Sandboxie, Session Hijacking, Session hijacking attack, SHODAN - Computer Search Engine, Social Engineering, Social Engineering: What It Is and How to Help Protect Yourself, SQL Injection, SQLI, Step-by-step tutorial to install Kon-Boot on USB, Virtual machine, Web App Pentesting, What Are Web Applications?, What is Phishing | Phishing Scams | Report Phishing Scams, WHOIS Search, Domain Name, Website, and IP Tools -, Wifi Packet Capturing / Session Hijacking Using Wireshark Packet Storm, Windows Hacking, Introduction, Google Hacking Theory, Google Hacking Practical, Shodan, Shodan Practical, Deep Dark Web, Sandboxing and Virtual Machines PDF, Sandboxing, Sandboxing Practical, Sandboxie - Part 2, Virtual Machines, Information Gathering Theory, Virtual Machines Practical, Virtual Box - Introduction, Virtual Box - Part 2, What is a Web Application, Web Application Pentesting, Sql Injection Theory, Sql Injection Practical, CSRF Theory, CSRF Practical, Click Jacking Theory, Information Gathering Practical, Click Jacking Practical, File Inclusion Theory, File Inclusion Practical (LFI), File Inclusion Practical (RFI), XSS Theory, XSS Practical (Reflected), XSS Practical (Stored), Kali Basics Theory, Kali Basics Practical, Social Engineering, Password Cracking Theory, Phishing Theory, Phishing Practical Part 1, Phishing Practical Part 2, Windows Hacking Theory, Windows Hacking Practical (Konboot), Windows Hacking Practical (Offline Windows Password & Registry Editor), Intercepting WIFI, Defending against ARP Poisoning(Wifi) on Windows Machine, Defending against ARP Poisoning attack on Win Machine(XARP Tool), Defending against ARP poisoning-WIFI attack(on Android Mobile), Password Cracking Practical, Linux passwd cracking - John the ripper, Session Hijacking Theory, Session Hijacking Using XSS, Session Hijacking Using Wireshark, Deep Dark Web, Information Gathering., Intercepting Wifi with Mobile/Computer - ARP Poisoining, Introduction, Kali Basics, Password Cracking Techniques, Sandboxing and Virtual Machines.

International Industry Specific Recognised Qualifications by the US Department of Homeland Security and (NIST) Framework...

Certified Forensic Hi-Tech Investigator (CFHI) - McAfee Institute - Expert Level
McAfee Institute Inc. provides certification of the Most Elite Computer and Mobile Forensic Investigators that are trained in advanced and state of the art methodologies designed to help identify, investigate and prosecute the most sophisticated types of computer crimes known to man. This Certification program focuses on enhancing skill sets as a "Hi-Tech Forensic Expert" which takes a blended learning approach of self-study, live interactions, and instructor led labs that will help you to learn how to conduct successful computer forensic investigations with powerful new concepts to prosecute the guilty. Taking over 25 years of hands-on experience of conducting forensic investigations, cyber-investigations from the private, public, and government sectors around the world and sharing insights into what contributes to success and failures. The CFHI Supports the National Cyber-Security Workforce Framework (Homeland Security). The National Cybersecurity Workforce Framework supports the nation's cybersecurity workforce development efforts. The National Cybersecurity Workforce Framework provides a simple, standardized way to define cybersecurity work across multiple sectors. The National Cybersecurity Workforce Framework provides detailed descriptions of types of cybersecurity work, the knowledge, skills, and abilities required for each area, and descriptions of common specialties.

Certified Cyber Investigative Expert (CCIE) - McAfee Institute - Expert Level
McAfee Institute Inc. provides certification in the areas of cyber investigations, law enforcement, loss prevention, fraud investigations, deception detection, and leadership. The McAfee Institute has partnered with the Dept of Homeland Securities National Initiative for Cybersecurity Careers and Studies (NICCS) and is listed on their site as a provider of professional certifications in this space. The company was one of the 101 Chicago’s Best & Brightest companies to work for in 2014.[8] On the list of Inc. 500 Fastest Growing Companies, McAfee Institute was ranked 34th overall – 1st in education and 1st in Illinois – in the year 2013 and was ranked 213th overall, 5th in education, and 10th in Illinois in the year 2014. Certified Cyber Investigations Expert's (CCIE's) are the industry’s Most Elite Cyber Investigators that are trained in advanced and state of the art methodologies to identify, investigate and resolve the most complex cyber crimes known to man. They are Simply the Best of the Best! Let me tell you about the program and how to earn your credential and board certification! This is an exciting online Professional Board Certification focused on enhancing your skill sets as a "Cyber Investigations Expert" which takes a blended learning approach of self-study, live interactions, and instructor lead investigative exercises that will help you to learn how to conduct successful cyber investigations with effective new concepts to prosecute the guilty. We are taking over 25 years of hands-on experience of conducting cyber-investigations from the private, public, and government sectors around the world and sharing with you, our insights into what contributes to success and failures. This program contains hundreds of hours of online video based training; online prep review quizzes to prepare you for the final exam, and, of course, the necessary study manuals as well to help you along the way. It does not matter if you are Law Enforcement, Loss Prevention, Fraud, Intelligence, Cyber Security, I.T Security or Private Investigation you will learn a ton of new concepts and investigative methodologies that you can apply immediately to your role and come out on top.

Certified e-Commerce Fraud Investigator (CEFI) - McAfee Institute - Expert Level
The CEFI® credential is tough and demanding. CEFI’s are skilled in eCommerce fraud investigation management, online fraud identification, auction & classified investigations, digital evidence collection, developing reports, prosecution and testimony to validate findings in a global environment. They are the very people that mentor you along the way. They have the skills in eCommerce Fraud Investigation Management, Online Fraud Identification, Auction & Classified Investigations, Digital Evidence Collection, Developing Reports, Prosecution and Testimony to Validate Findings. They are typically useful for Loss Prevention Professionals, Law Enforcement, Private Investigators, Human Resources Professionals, Intelligence Professionals and Financial Institute Fraud Investigators.

Certified Workplace Threat Specialist (CWTS) - McAfee Institute - Expert Level
A forensic certification covering the psychology and very real world of workplace violence, harassment, and behavioural issues from a law enforcement perspective. Comprensively covering Workplace Violence & Harassment, Program Design and Implementation, Prevention Program Design & Implementation, WPV Policy, Threat Assessment Plan, Workplace Violence Policy, Threat Assessment Program, Elements of an Effective Threat, Investigative Methodologies, How to Conduct WPV Investigations, Investigative Interviews, Investigative Methods, Interviewing Techniques, Organizational Objectives, Behavioral Analysis, Myths and Misconceptions, Human Lie Detectors, Introduction to Biases, Nonverbal Cues, Verbal Cues - A Look at the Verbal Cues of Liars, Verbal Cues, Theoretically Sound Approaches, Management and Response, Employment, Legal & Reporting, The Legal Obligations of Employers, State Laws for Workplace Violence, Law Enforcement Partnerships, Established Guidelines, Audit and Analysis, Legal Fundamentals, Legal Obligations and Duties, Research Your State Laws, Emergency Actions, Crisis Communication Plan.

Certified Social Media Intelligence Expert (CSMIE) - McAfee Institute - Expert Level
With over 65% of all U.S. adults actively using social media accounts as of October 2016, it's no surprise that law enforcement is leveraging popular social media platforms to collect valuable intelligence, conduct efficient investigations, and eliminate local as well as national security threats. Some individuals have gone down in history for confessing to their crimes on their social media profiles, while others have given away incriminating clues via Tweets, Facebook posts, Instagram images, and more. As the world continues to become more digitized and the Internet grows as a hub of activity, both legal and illegal, it's more important now than ever to be able to effectively utilize cyber intelligence and investigations to properly address our nation's threats and vulnerabilities. But for many loss prevention, law enforcement, private investigation, and other investigative professionals, social media isn't the goldmine of intelligence they had hoped it would be. For Investigation Professionals like You, the Demand for Cyber and Social Media Investigation Expertise Has Never Been Higher. The lack of proper training, skills, and knowledge can keep you stuck in a stagnant position permanently. Without the right training in social media platforms, mobile applications, chat tools, networking sites, and more, conducting quick and effective online investigations is nearly impossible!

Certified Cyber Threat Analyst (CCTA) - McAfee Institute - Expert Level
A Cyber Counterintelligence Analyst works at all levels of the federal government which include FBI, NSA, CIA, USS, DOD, and DEA. CCTA's also work at large multi-national corporations as well protecting organisatons from the theft of proprietary information, trade secrets, assets, merchandise, customer information and more. Those completing this certification will not only have the ability to track down cyber criminals and glean intelligence from the cyber landscape but they will also become known as an industry expert in conducting quick and effective cyber counterintelligence investigations.

Australian Qualifications Framework Vocational and Post-Graduate Higher Education Recognised Certificates, Diploma's, Graduate Certificate's and Graduate Diploma's...

Graduate Certificate in Information Technology and Strategic Management
Graduate Certificate in Information Technology and Sustainability
Graduate Certificate in Digital Education
Graduate Diploma of Management (Learning)
Graduate Certificate of Management (Learning)
Graduate Diploma of Strategic Leadership
Graduate Diploma of Portfolio Management
Graduate Diploma of Family Dispute Resolution – Cth FDRP and NAM
Advanced Diploma of Government (Workplace inspection/Investigations/Fraud control)
Advanced Diploma of Integrated Risk Management
Diploma of Database Design and Development
Advanced Diploma of Public Safety (Community Safety)
UNSW Global Pty. Ltd - Expert Witness Training Certificate
Diploma of Website Development
Master of Information Management spanning 20+ years
Master of Computer Forensics spanning 20+ years
Master of Cyber Security spanning 20+years
Certificate III in Investigative Services (Simon Smith is a Licenced Private Investigator)
Certificate IV in Government Investigations (Government Investigator)
Diploma of Government (Investigation)
Diploma of Security and Risk Management (Cyber Security Analyst)
Diploma of Legal Services
Diploma of Court Operations
Diploma of Software Development
Diploma of Information Technology
Diploma of Information Technology Networking
Certificate IV in Mediation (Also a Nationally Accredited Mediator - LEADR Member)
Advanced Diploma of Marketing and Communication
Advanced Diploma of Program Management
Advanced Diploma of Project Management
Diploma of Leadership and Management
Certificate IV in Security and Risk Management (VIC PI Electives)
Victoria University Bail Justice Training Course Certificate 2009
Advanced Diploma of Network Security
Advanced Diploma of Computer Systems Technology
Advanced Diploma of Network Security
Graduate Diploma of Telecommunications and Strategic Management
Certificate IV in Intelligence Operations
Graduate Diploma of Anti-Money Laundering and Counter Terrorism Financing
Diploma of Government (Fraud Control)
Diploma of Government (Security)
Certificate IV in Programming
Diploma of Information Technology
Diploma of Digital Media Technologies
Certificate IV in Government (Security)
Diploma of Government (Workplace Relations)
Certificate IV in Web-Based Technologies
Certificate III in Intelligence Operations
Advanced Diploma of Network Security
Comply with organisational requirements for protection and use of intellectual property
Contribute to intellectual property management
Develop and implement strategies for intellectual property management
Manage intellectual property to protect and grow business
Copyright Skill Set
Innovation Leadership Skill Set
Intellectual Property Strategic Management Skill Set
Patent Skill Set
Small Business Contracting Skill Set
Trade Mark Skill Set
Digital Applications Skill Set
Media Engagement Skill Set
Application Development Specialist Skill Set
Certified IT Network Enterprise, Security or Server Administrator Skill Set
Certified Security and Architect Specialist Skill Set
Certified Technician or Technology Specialist - Infrastructure Configuration Skill Set
Certified Technology Specialist - Graphical User Interfaces Skill Set
Certified Web Design Specialist Skill Set
Enterprise Server Virtualisation Specialist Skill Set
Diploma of Counselling
Advanced Diploma of Leadership and Management
Advanced Diploma of Management
Diploma of Quality Auditing
Diploma of Training Design and Development
Certificate IV in Training & Assessment
Advanced Diploma of Marketing
Diploma of Project Management
Advanced Diploma of Management (Human Resources)
Advanced Diploma of Event Management
Diploma of Practice Management
Diploma of Vocational Education and Training
Diploma of Training, Design & Development
Diploma of Business
Advanced Diploma of Business
Diploma of Management
Diploma of Human Resources Management
Certificate IV in Marriage Celebrancy
Certificate IV in Small Business Management
Diploma of Business Administration
Certificate IV in Business Administration
Certificate III in Business Administration (Medical)
Certificate IV in Frontline Management
Diploma of Counselling
Certificate IV in Human Resources
Diploma of Training and Assessment
Diploma of Community Services Coordination
Diploma of Disability
Certificate IV in Disability
Certificate III in Disability
Vocational Education and Training in Schools Certificate in Information Technology
Certified Android, iOS, Amazon Device App/Play-Store Developer
Certified Apple Watch App-Store Developer

Constant Professional Development (Check LinkedIn for an up to date list...

PD: Social Media for Business
Project Management For Entrepreneurs: 10X Results Today Rico Rodriguez (Entrepreneur, Python Expert, Word and Windows Trainer. He has started numerous businesses and both failed and exceeded. He uses Python and JavaScript and C# in daily life to both make a living and to gather data online. He also helps small businesses streamline their business to reduce cost and increase productivity.)
PD: CCNA Security 2015 Video Boot Camp: CCP and More
PD: Investigator Ethics for the PI, Consumer and Client
PD: Cyber bullying - as taught by Andres Saravia
SANS Cyber Aces Certification
PD: Cyber Criminals Want Your Information: Stop Them Cold
(Jeremy O'Connell ... He holds some industry certifications via CompTIA (A+, Net+, iNet+) and received training from Oracle University's OCP DBA program.)
PD: Ethical Hacking and Penetration Testing
(Jerry Banfield (Jerry has a Masters degree from the University of South Florida and is certified as a state law enforcement officer in South Carolina. He also has a Bachelors degree earned from the University of South Carolina. He teaches 38 courses on Udemy.) & Ermin Kreponic (Ermin is an IT expert, Linux enthusiast with a passion for troubleshooting network related problems. Advanced knowledge of Linux command line. Installation, configuration and maintenance of servers that run under Unix/Linux type. operating systems: DNS, TFTP, FTP, SSH, APACHE, SMTP, VSFTP and some others.)
PD: Trademark Law for Entrepreneurs
Dana Robinson (A founding partner of TechLaw, LLP, where his practice focuses on trademark prosecution, trademark licensing, copyrights, and business transactions. Dana is adjunct professor of law at the University of San Diego School of law, where he is involved in the law school's new IP Law Clinic. Dana has taught a variety of seminars and moderated panels on intellectual property and technology law since 1999. Dana received his bachelor's degree from Life Pacific College and went to earn an M.A. at Azusa Pacific University and his J.D., from the University of San Diego School of Law. He served as Editor-in-Chief of the law school's faculty journal, the Journal of Contemporary Legal Issues. He is admitted to practice in Nevada and California, and before the Federal District Courts for the Central District of California, the Southern District of California, and the District of Nevada. Dana was the Co-chair of the first Nevada State Bar Committee on Intellectual Property (2002-2003). He is a member of the IP law section of the State Bar of California, and is a member of the San Diego Intellectual Property Law Association. Dana has spent 21 years+ as an active entrepreneur and investor and continues to advise his portfolio investments.)
PD: Authenticity on Twitter
Rebecca Clark (Training & Development professional anxious to nudge students in the areas of program management, entrepreneurship, accountability, and in pursuing their life goals.)
Stanford University Cryptology Certification. Created by Professor Dan Boneh of Stanford University, Stanford have produced an extremely thorough online certification well respected by the industry. Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course heads straight into detailed mathematics of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems. The second half of the course discusses public-key techniques that let two parties generate a shared secret key. The Certification covers some of the following:

* Stream ciphers, cryptography, pseudo-randomness, encryption, secure encryption.
* Block Ciphers, more powerful forms of encryption, AES/3DES, using block ciphers to provide data integrity, build an encryption/decryption system using AES. * Message Integrity and classic constructions for MAC systems that are used to ensure data integrity, how to prevent modification of non-secret data, encryption confidentiality and integrity, authenticating large video files, hash chains.
* Authenticated encryption, encryption methods for confidentiality and integrity, search encrypted data, studying symmetric encryption, key management and public-key cryptography networking a ciphertext attack on a sample website.
* Basic key exchange, setting a secret key between two parties, consider protocols secure against eavesdropping, the main concepts of public key cryptography computational number theory and algorithms dating back to antiquity (Euclid) working up to Fermat, Euler, and Legendre. Also covering concepts from 20th century math and constructing several public key encryption systems.
* Public key encryption, deep learning on how to encrypt using a public key and decrypt using a secret key. Public key encryption used for key management in encrypted file systems, messaging systems, and devices.
* The two families of public key encryption systems, one based on trapdoor functions (RSA in particular) and the other based on the Diffie-Hellman protocol. Constructing systems that are secure against tampering, otherwise known as chosen ciphertext security (CCA security) and CCA secure public-key systems. Cryptographics mathematics for public-key advanced encryption techniques.

PD: Mastering iPhone programming - Lite
EDUmobile Academy (Founder Vishal Lamba has a mathematics and computer science degree. Vishal works closely with content creators and teachers to ensure that every course released meets the internal rigorous quality standards.)
PD: Mastering Android programming - Lite
EDUmobile Academy (Founder Vishal Lamba has a mathematics and computer science degree. Vishal works closely with content creators and teachers to ensure that every course released meets the internal rigorous quality standards.)
PD: Social Entrepreneurship: An Introduction
Greg Werkheiser (Greg is a Social Entrepreneur, Leadership Educator and Attorney with over 21 years+ experience. He has held public service roles at the White House, U.S. Embassy in Paris, U.S. Information Agency, and Congressional Management Foundation.) & David J. Miller (David is the Director of Entrepreneurship at the Mason Center for Social Entrepreneurship (MCSE). Miller is also a supporting faculty member at George Mason University's School of Management (SOM) teaching New Venture Creation and a PhD Candidate at Mason's School of Public Policy working with Dr. Zoltan J. Acs. Miller holds an MBA from the University of Chicago's Booth School of Business (Entrepreneurship, Finance, & Strategic Management), an MSc in the International Politics of Asia from the University of London's School of Oriental and African Studies and a BA in International Relations from the University of Michigan.)
PD: Decoding AP Computer Science A
Moksh Jawa (Though just a sophomore at Washington High School in Fremont, CA. He self-studied for and performed well on the AP Computer Science test as a freshman. He teaches AP Computer Science to students at his high school.)
PD: Professional Communication Essentials
Rasmussen College/Udemy platform (A regionally accredited private college and Public Benefit Corporation that is dedicated to changing lives through high-demand educational programs and public service.) & Brooks Doherty (Brooks is Rasmussen College's Dean of General Education. He is completing a doctorate in Education at St. Mary's University, earned an MA in literature from University College London, and graduated Phi Beta Kappa from the University of Minnesota with degrees in Political Science and English.)
PD: Financial Analysis: A Recipe for Success
Professor and CPA Ellen Jakovich (Has experience in IT, communications, finance, electronic engineering, project management, and accounting. Holds a Bachelor's in Electronic Engineering Technology, a Master of Science in Finance and a Masters of Accounting & Financial Management.) & DeVry University
PD: Innovation and Technology in Accounting
PD: The Bitcoin Basics
PD: Draper University/Udemy platform (Silicon Valley's top entrepreneurship program for builders and innovators from around the world. Cutting-edge, hands on curriculum taught by the most successful entrepreneurs in the Valley. Learn how to launch a business in this unique start-up boot camp for entrepreneurs.)
PD: Maintaining Cyber Security
Certified iOS (Apple), Android (Google), Amazon, Windows and Mac App Developer
PD: Hacking Academy: Monitoring Transmitted Data
IT Security Academy (Associates IT Security Professionals. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. They provide high quality materials to prepare you not only for passing certification exams, but teach you practical skills.) & The Hacking School (The Hacking School courses are prepared by people who are professionals in what they do. Authors of their courses are well known in the world of computer systems' security. They provide up-to-date knowledge on IT security and ethical hacking.)
Author of VET Accredited Course Material 'Dealing with Grief and Trauma'
Internationally recognised Diploma in Information Technology (Management) - Advanced Level Programming, Systems, Databases, Security, Machine Code, Viruses, Risk Mitigation
PD: BrainBench™ Certificate in 'Amazon Web Services (AWS)'
(A private research university in Stanford, California, and one of the world's most prestigious institutions, with the top position in numerous rankings and measures in the United States.)
Andres Saravia (Andres earned a Doctorate (Ph.D.) in Philosophy of Law, Data Protection mention at the University of Zaragoza, Spain with Magna Cum Laude. He has also completed the Course on Personal Data Protection by AECID and Communication Science Foundation and the Graduate Course of the School of Graduate Studies, Faculty of Law on "Updates of Information Law" Module I. Uruguay. Andres has specialized in Germany, Chile and Spain, in the areas of e-Government and Data Protection latter including in computer and cyber bullying crimes. He is a Fellow of the Institute of Information Law Uruguay).
Professor Robert Bunge (An information security educator for the past eight years. He is an active coach and organizer in the Cyber security Competition Federation, Collegiate Cyber Defense Competition, National Cyber League, and Cyber Patriot.) & DeVry University ( a regionally accredited institution.) Rosa Augostino (An author, consultant and entrepreneur she has written extensively about the subjects of marketing and business-building. Her background includes advertising, marketing, business growth and customer growth.)
PD: Introduction to Artificial Intelligence
Jeffrey Lau (A data engineer who constructs operational reporting, dashboards, and other visualizations. He has experience with object oriented programming, scripting automation, digital VLSI, and infrastructure performance management. He has a B.S. Electrical Engineering.)
Dean A. Beers, CLI, CCDI (Dean began his investigative career in 1987. He is a Certified Legal Investigator and Certified Criminal Defense Investigator, and is a POST certified instructor, and experienced forensic autopsy assistant.) & Karen S. Beers, BSW, CCDI (Karen began her investigative career in 1996, also earning her Bachelor's in Social Work (Magna Cum Laude). She is also a Certified Criminal Defense Investigator (CCDI) and certified in Medico legal Death Investigations.)
PD: IP Addressing and Sub-netting
Sikandar Shaik, CCIE (RS/SP# 35012) (A senior technical instructor and network consultant. He has been training networking courses for more than 10 years. Sikandar Shaik has delivered instructor led trainings in several states in India as well as in abroad in countries like China, Kenya and UAE. He has also worked as a Freelance Cisco Certified Instructor globally for Corporate Major Clients.)

Tips from Australia's #1 Cyber Forensics Expert

Private Investigator (Simon Smith), Dispute Resolution, Advocacy, Forensic Expert Court Witness, Digital Forensics, Forensic Data Recovery, Social Media Investigation, Workplace Relations & More (See Above)

We rely on computers to eat, breathe and live in today's society. Since a young child I always had an interest in forensic programming. My brothers used to play games, I used to make them. This was back with the old Amstrad tape deck CPC-464. Since then, I have programmed with every language that has ever been built. The job of a forensic programmer is not as the stereo-type predicts. To be a forensic programmer you have to be a DBA, Project Manager, Analyst, Consultant, IT Hardware/software expert, Problem Solver, Support Engineer, Security Expert and much more.

Being an expert witness to the court, I am able to establish routines and phishing and/or programming interfaces and trace these back to a potential crime or breach of information. I am considered an expert in the area of digital forensics, and computer programming and innovation, and have built over seven commercial programs and worked for over 100 companies in creating solutions that are so important that a breach of confidentiality or trust in information sources could cause severe detriment to consumers and the company's future. In order to understand and be a true expert in logic, one must be able to reverse that logic.

In unraveling conduct that the court needs, I have the ability to demonstrate in black and white English routine mechanisms that an accused could have easily used to achieve a goal. I can also write demonstrative routines. This is especially important in cases involving expert testimony on White Collar Fraud, Stalking and breaches of confidence, Cyber-crime and denial of service attacks. A denial of service (often called a DOS attack) can cost a company millions of dollars. I am able to track its source, assist in prosecution or defend and provide genuine independent fact to court - especially with my combined ability to investigate.

A careful word and some human testimony

Looking for a testimony from a real Corporate client whom was cyber-stalked for 5 yrs, living in terror, not finding his stalker after five years of attempts with the Police and the High-tech Crime division without success? After just 2 weeks I found the accused (via social media and cyber methods amongst traditional investigative techniques) and later prosecuted and convicted under strict Victorian Anti-stalking laws based on my work. Contact: LifeStyle Portraits, Darren Tilnak Tips on Security and Technology Be aware of just how much information you share online. 1 in 5 Australians have been victims of identity crime with computer hacking, online banking and shopping to blame SO you think you're safe online and take all the necessary steps to protect your information? Think again - your details may not be as private as you think. More Australians than ever are falling victim to identity crime and the victims aren't signing up to dodgy scams and being careless either. More Australian's than ever are falling victim to identity crime and the victims aren't signing up to dodgy scams and being careless either. Did you know that Australians have lost over $45 million to scams in 2015 already? The ACCC is urging the community not to send money or personal details to strangers after $45 million was reported lost to scams already this year and 45,000 complaints made.

Ten Top Rules to Limit your risk of being a Cyber Scam victim, but first I want to stress three golden rules....

1. Don't open any file or link attached to an email. Email is harmless, executable files or links to cause you to run executable files are the risk. Email is for reading. If the document is readable (pdf), or (text), go for it. Virus scanners are virus's themselves. I will write an article on this.

2. Check the sender and receiver email address that you actually would be replying to or the headers it actually was sent from - but don't assume they are who they say they are. See how they address you, is it an email chain with a known colleague? How did they just pick you? The simplest check is who emailed who and why, and how (or if) they know you.

3. Get your details off Facebook! I have found people who I've assisted police send to jail from a profile.
©The eVestigator®, 07/08/2015

In any situation, if you are being offered something for nothing (or very little), it is more often than not, not worth the price.

1. Always check a sender's email address (where you would be replying too - the exact .com), no matter how legitimate it seems. An active example is offers for free vouchers or free money.

2. Look out for any kind of incorrect spelling or unusual grammar. Often bogus emails do come from places where English is not the first language so look out for the use of the wrong tense, pronoun and plural or singular noun.

3. Completely disregard the email policies for any business/service you receive bills or correspondence from via the internet. They probably came in an email!
4. A real-life example is that PayPal® list the following criteria on their website to check if an email is legitimate, and I quote:

 "You see your name or your business name in the email. We always address you by your full name or your business name as registered on your PayPal account. We'll never use generic greetings like "Dear user" or "Hello PayPal member". We'll never ask you to include your financial information, your password, or the answer to your PayPal security questions in your emails to us. We'll never attach any software updates in our emails and ask you to install it to your devices. Correspondence regarding transactions will also appear in your PayPal account, so if you still aren't sure, log in to see if the email details are also there in your history."

: Does anybody remember which goliath company's security was breached sending millions of people's personal information out to the public? How did you get that message? Via email? How do you know it was PayPal? Go back to Golden Rule #1.
5. Do not respond and report any email from people you did not initiate an email trail with. Report and provide as much detail as you can about the message. Compare suspicious emails with any legitimate ones you have received previously. If there are omitted details, such as logos, footers, disclaimers or images are different and/or look old delete and report it.
6. You didn't win anything via email, nor does anyone who 'found' you that you did not initiate a conversation with 'loves' you!
7. If anyone anywhere at any time asks for personal, or credit card/bank details via email or cold calling for that matter, NO. Don't do it. If they try to push you, voice your privacy and security concerns. If they still don't want to take no for an answer ignore and delete or in the case of cold calling, hang up. Always report to the police. If the police don't help you, report it to me. This is actually a crime and known as stalking, of which I am an expert (not stalking itself!). If you are personally apprehensive from this conduct and it continues, then you should first contact the police, and secondly apply for an interim intervention order. If the person seeking details is legitimate they can and will provide you with other payment options and remember they are paying you (well not really - it doesn't happen).
8. There is no "Get rich quick scheme". Ask any millionaire, and they will say 'hard work'. No promise of large future returns for money now, no matter how convincing or legitimate they say they are, have proven to be true otherwise why aren't they holidaying on the Bahamas?
9. Tying into this is the online dating risks. First, do you even remember the person, keep a log. Nobody is magically found. Be wary of online dating contacts who speak the word 'love' too quickly or seem very invested emotionally in a short amount of time without actually telling you much about themselves personally. It is easy to write or say lot without actually revealing anything. As you are getting to know someone it is a good idea to save conversations to read back over them later (and quiz them). Consider the kind of information they want from you and look at how much they are telling you, if they are a bit evasive in some areas, just take note of it and what subjects they seem reluctant to talk about. There may be a genuine, reasonable explanation or they may not have fleshed out that part of their story yet also think about where there were lags or delays in responses. Keep the relationship at a pace you both are comfortable with. I strongly recommend not loaning money or giving financial support before your first face-to-face meeting. There is no easy step-by-step guide to spot an online dating scammer (apart from those that are obvious to the normal human). The dynamics of every relationship is unique. Use your common sense; remember things that sound too good to be true usually are. Meet your date in person at a safe place as soon as you can, it is easier to get a real impression of someone in person and a lot harder to lie to or misunderstand one another. Has anyone met a beautiful girl who just doesn't have enough money to get out of their country to meet their soul mate? Every time they try, the consulate demands them to prove they have money to live, so they need more, and more and more... I will not delve too deep as I have conducted three cases in these situations.
10. If you suspect something might be a scam, trust your instinct and steer clear, it's a scam, especially if they are offering something you have been looking for but unusable to find easily - and don't know initially much about you. Also remember the Golden Rules. Who contacted who and when you reply where does it go? It is very tempting to click on something you want "just in case" only to find yourself host to one or more nasty viruses or scammers. In line with my recommendations, I also point out what the Australian Bureau of Statistics said about personal fraud and the various types, that don't necessarily have to be of a 'cyber' nature. The following information and data is produced under the ABS Attribution 2.5 Australia license and is unmodified.

Victims of Personal Fraud By Fraud Type, 2007 and 2010-11

It is estimated that a total of 1.2 million Australians aged 15 years and over were a victim of at least one incident of personal fraud in the 12 months prior to interview in 2010-11. This equates to a national victimisation rate for personal fraud of 6.7% of the population aged 15 years and over. This is an increase from the 806,000 victims of personal fraud in 2007 (5.0%).
Victims of Personal Fraud by Fraud Type, 2007 and 2010-11: Persons may have been a victim of more than one fraud type so components may not add to total. Australians lost $1.4 billion in 2010-11 due to personal fraud. Three in five victims of personal fraud (60% or 713,600 persons) lost money, an average of $2,000 per victim who incurred a financial loss. The median loss for personal fraud was $300. This means that half the number of people who lost money due to personal fraud lost less than $300 and half lost more than $300.

Identity Fraud: In the 12 months prior to the survey, an estimated 702,100 Australians were victims of identity fraud, or 4.0% of the population aged 15 years and over. This is an increase from the 499,500 victims of identity fraud in 2007 (3.1%).

Credit Card Fraud: An estimated 662,300 Australians aged 15 years and over were victims of credit card fraud in the 12 months prior to interview, or 3.7% of the population aged 15 years and over. This is an increase from the 383,300 victims of credit card fraud in 2007 (2.4%).

Identity Theft: In the 12 months prior to survey in 2010-11, an estimated 44,700 Australians were victims of identity theft, or 0.3% of the population aged 15 years and over. This is a decrease from the 124,000 victims of identity theft in 2007 (0.8%).

Scams: According to the survey results, an estimated 6.4 million Australians were exposed to a scam in the 12 months prior to interview. This equated to just over a third (35.8%) of the Australian population aged 15 years and over - the same proportion as in 2007. An estimated 514,500 Australians aged 15 years and over (2.9%) responded to a scam in the 12 months prior to survey. This is an increase from the 329,000 victims (2.0%) that responded to a scam in 2007.

Comparison of Fraud Types: Australians were more likely to fall victim to credit card fraud (3.7%) than experience identity theft (0.3%) or a scam (2.9%), and more likely to become a victim of a scam (2.9%) than identity theft (0.3%).

Victimisation Rates by Fraud Type: (a) Persons may have been a victim of more than one fraud type so components may not add to total. Reporting rates were higher for credit card fraud (49.9%) and identity theft (65.5%) than a scam (31.2%).

Reviews (Identity available only with permission)

"Well you Sir are the first honest, genuine INTELLECTUAL, that I have now had the distinct pleasure of meeting. In a world of flippant 10 second empty vines and mindless meme's it's refreshing to meet actual thinkers. I look forward to learning more about your thoughts on the direction things are moving towards and possible further collaboration. Thank you again for the sentiments. Highest [surprisingly the 1st time I've actually had a reason to mean it] Regards, Jeremy Steinman"

 "Well you Sir are the first honest, genuine INTELLECTUAL, that I have now had the distinct pleasure of meeting. In a world of flippant 10 second empty vines and mindless meme's it's refreshing to meet actual thinkers. I look forward to learning more about your thoughts on the direction things are moving towards and possible further collaboration. Thank you again for the sentiments. Highest [surprisingly the 1st time I've actually had a reason to mean it] Regards, Jeremy Steinman"

 "Simon, thank you very much for helping my case. I am glad that I found you by chance. I am very impressed with your great work. Your impeccable knowledge of programming and technology found so many shocking facts which made me realise that I've got involved with an international social scam for the first time in my life. The facts you found blew my mind away indeed. Thank you for your genuine care. You called me straight away after I sent you a message the other day. You gave me clear suggestions for my problem. I was really upset and did not know how to handle the situation I have. I reported ACORN twice however I had not received any response from them. I did the third report with very specific information which I got from Mr. Smith, they finally contacted me and they are working on my case now. I highly recommend Mr. Smith to anyone who requires his services. Please do not hesitate to contact him. He will give you a great job with integrity and justice. You will get the result you need very quickly."::: -International social media Cyberscamming case - Multiple 8yr+ Scammer $30m+.

 "If you want the truth and the facts, don't hesitate to call Simon. He goes above and beyond for his clients, he does not rest until the truth is exposed and will fight tooth and nail for justice. He may ruffle feathers along the way ,that's because people who have done the wrong thing ,like to stay hidden. I have used Simon on very sensitive family matters and each time has come up with the FACTS, I need .He is methodical, brave and I have never met anyone as knowledgeable as he.So if you want the truth , this is the man to call. SIR S, as i fondly like to call him."::: - Strategic DVO/Family Law/Business Assets Case

 "Simon knows the real issue and know exactly how to fix it. He helps me to recover my gmail and facebook account. It was a success. I recommend other online victims to choose Simon Smith."::: - Nai.

 "eVestigator Simon Smith helped me in so many ways. Not only did he find the evidence I needed and gave me guidance in what to do with it, he was also able to get me in touch with a good lawyer when it came time to go to court. I may not have gotten the perfect results that I wanted but I was a whole lot better off and Simon did urge me to have more realistic expectations of what could happen."::: - Jodie W.

 "Simon Smith is an expert in his field. I first saw him appear on TV, and immediately contacted him by phone and he has spent tireless hours assisting with my personal issue and always went out of his way to achieve the desired result. He was always punctual contacting me back by phone, email or text as he understood the situation I was in. I appreciate the expert work that Simon did and would highly recommend him to anyone that requires his services. He's professional and definitely understanding as my issue was very sensitive and stressful. He put my mind at ease knowing full well that I was in good hands. Simon goes above and beyond with dealing with the police, the courts and other relevant Government authorities. If you are thinking of contacting a Private Investigator, Simon is your man. Thank you Simon for everything you have done for me, I greatly appreciate it."

 "Good morning, I still cannot believe that you actually exist! This is like a dream come true- I actually accepted that this was my life and it could never get better. Thank you so much for chatting with me yesterday i will be in touch either during or after the xmas break. Merry Xmas to you and your family.":::Family Violence - Serious stalking case

 "Firstly let me congratulate Simon 'Well done Young Man!'. Great work you certainly have proved you can make things happen, and believe you me for these guys that is the most important thing and I now have no doubts that the outcome will be most rewarding and in some case lesson the pain felt by all these lovely people.":::Major online dating scam case - 3 senior police 'exhaustive and extensive' investigation by Senior Detectives/Sergeant's, 6 years - Scammer found in 1 day by eVestigator, Simon Smith.

 "Child:Pro-bono case - Dear Simon thank you for helping my mum and I with this horrible situation your time and help has made my mum feel so much better thank you again your awesome":::Online Scam Victim Child - Deprived of freedom to see his mother, 5/12/2016

 "Pro-bono case - Please accept this nice red as a thank you and the appreciation for everything you have done for us.":::Online/Physical Dating Scam Victim - Deprived of liberty, 5/12/2016

 "Thankyou Simon! A really big thankyou for all your work and time put in to help me mate! I'm glad I chose to do it with you and not the law firm....(Workplace General Protections Claim Conciliation Conference) You really had my back through it all and I'm glad it paid off and they settled. Once again thankyou dude I really appreciate you helping me!"

 "I wanted to tell you over the phone. Wish I could change the court system it is a terrible one with abuse from the judge and lawyers. I am really blessed to still be here I have had so many health problems from the traumas I suffered from the court system. Finally a lawyer that got his just deserve. All the other lawyers were totally incompetent and never used the evidence or affidavits. Charged a lot also. Thank you for all your help.

I am still in shock and lost for words from what you achieved. Thanks, another two life's saved. Time for a fresh start."

 "Hi Simon, not sure if you remember helping me with a case in July/August this year where my partners ex was withholding their child and I had received threatening messages from a fake FB account? When we last spoke mediation had been done and the consent orders were in the works, I just wanted to let you know that you were right- she then refused to sign the orders, began withholding the child and took an Interim Order out on me. Going through court ATM but due to her games it's not looking good. Help!"

 "Simon has a unique gift to identify the root cause of the problem and develop a strategy to break through the opposition. He is very thorough and skilful in his approach,willing to alter the strategy as the need arises until he reaches a favourable outcome - It is obvious that Simon has obtained many skills in a variety of different areas that have given him the resources and the application to get the desired results for us the client. - Simon is extremely thorough,straight to the point and passionate to see all all his clients free from injustice.While being very considerate of people's needs to reach a speedy and powerful outcome.":::Serious Family Court Matter - a push in the right direction and crucial evidence, 28/10/2016

 "You have saved my son's life, Kate.":::Domestic Violence, AVO, FDRP, Very sensitive misguided case needing clarity and direction, 21/10/2016

 "Hi Simon, Thankyou for all your help. As i said your a Legend. Cheers, Kylie.":::Domestic Violence, AVO, Police Advocacy Assistance, Forensic Data Acquisition, Assistance with getting through red tape, 13/10/2016

 "Thank you for the link. I was so excited, I had to check it out right away. Yes the interface is very intuitive and I believe it is very compelling to submit a request for estimate. So exciting - what a business transformation for you!! Congratulations to Simon too - great work!! It is challenging taking business requirements and translating that into a really interactive technology solution. Wow - this is a wonderful use of spatial technology for you and your team. I can't wait to hear the statistics on usage once you start to promote it out widely.":::Small Online Geolocation Programming Job - National Geolocation Letterbox Delivery Service, 03-06-2016

 "I highly recommend Simon of eVestigator and encourage anyone to use his investigative and forensic services. Simon is the utmost professional that is transparent in all that he will be doing for your case. He genuinely cares about your well being and you achieving your goals. He is not only focused on getting you through your mess but he is there to also separate you from the emotions. He is not motivated by money yet his work is SO valuable. He is motivated by the injustices people face and doing what is right by them.

The fact is Simon is not emotionally involved, shows in that he keeps with the facts. Unlike us victims who are stuck on "why did this happen to me". As Simon said, "you focus on you and your future and let me and the lawyers sort out your past"::: Civil Judgement case - intelligence and discovery in attaining an outcome.

 "My name is Tony, retired, who recently found myself the victim of a worldwide credit card SCAM. After all attempts with the bank and the police failed I approached Simon. From the outset, Simon was very strategic and helpful. I simply followed Simon's suggestions exactly. He totally walked through any opposition that stood in his way for me. ANZ mucked me around for a month or so, presumably to test how fairdinkum I was about them honouring their Credit Card guarantee, then after Simon's intervention and a period of 'nothing' all of a sudden they paid the full amount into my account. I would have no hesitation in recommending Simon. Simon absolutely knows how to get results - he's right on the money! - His clarity principled approach explained my position well and strengths was very prompt. He was one step ahead on the banks likely attitude and behaviour; I felt guided by his expertise. Success!":::Happy Customer with results from my intervention with the bank. This case will become precedent in other cases shortly, 04-05-2016

 "Simon is intuative and flexible. His experience means that he can predict possible and real roadblocks and opportunes Plan B's. His skill set is absolutely useful and he knows how to get results. Simon is able to speak with clients in such a way as to put them at ease prior to, during and after his investigations. His strengths are his assuredness, confidence, patience, flexability, intuition that underpins his professionalism and skills. He showed no weaknesses. I have absolutely no hesitation in recommending Simon's services and would be very happy to work with him again. I was blown away at how quickly Simon was able to bring resolution to our case and how he was available at all hours of the day and night which with the time distance made it possible to 'catchup' at times suitable to me.":::Sensitive Reverse Complex Cyber Stalking Matter, 27-05-2016

 "From the bottom of my heart, I'll say again you have gone above and beyond for me and your partner is very patient and understanding. Thanks for your effort, thanks for your patience and for not giving up on me. This has been a very long journey for me and for a complete stranger to help me like you have, well I consider you a good friend now, someone who doesn't want to see a family torn apart and really find the truth as do I. Thanks Simon, it really means a lot , it really does":::Sensitive Family Law Matter, 12-05-2016

 "Thank you so much. You don't know how much of a difference you've made over the last 24 hours to a very, very tired person initially and now a little bit more saner one. You've made a massive, massive difference so thank you.":::Family Law Custody Parent."::: 28-04-2016

 "You just put a smile on my face Simon. Like you, I'm a straight talker, and can't abide liars nor injustice. I have been accused of being brutally honest on many occasions in my life!":::Self Represented Litigant. 26-04-2016

 "YOU ARE THE MASTER!!! Sent email to my older kids as YOU SUGGESTED, re no contact with their Dad OR at least not PASSING ON ANY MESSAGES to me or XXX and it stopped!":::Extremely highly rescued family cyber-stalking matter. 20-03-2016

 "Thank you so much it was helpful. I will suggest your company as i know of at least 1 person who is interested. Thanx again Simon....":::Android Forensics Matter. 30-01-2015

 "I have been fortunate enough to obtain advice and witness Simon providing support to other professionals during our 8 year relationship. I have always found Simon to be a highly motivated, intelligent and capable person." :::Name protected, 01-02-2014

 "Simon, THANK YOU!!! Not only for what work you put in but just for being so positive and believing me and in me. You know, it's amazing the power of a persons words. In this case, it's the words of a person that should have no say or ability to have a say that see's me to be in the position I'm in today. 'No fact. No evidence.' And similarly, I was having a very hard day today. I had got my hopes up that that scumbag was going to let the kids be home for the weekend for my birthday.. But of course, I found out this morning that was not the case. But for some reason I have connected to a person, the person I have needed and searched for for almost a year now. And today you lifted my spirits more than I can ever express." :::Name protected, intervention reversal matter. 03-01-2015

 "Simon, I found your help in reporting and remedying my situation post a fraud on my computer to be Professional, Clear eyed & Modest charged where I had no clue as to what to do to protect myself. I would have no hesitation in recommending you" :::Name protected, another ACORN failed case, Massive Australian Dating Scam - lost over $250,000. 28-02-2015

 "I am very impressed with your work. Submitted another report to ACORN re the CBA XXXXX account, and complained about the lack of action. Thanks for your great work and your interest in my case. I am going to make a complaint to the AFP through a website I have found.":::Name protected, another ACORN failed case. 28-02-2015

 "Thx Simon. Through all this as much as I have learnt about how nasty and shady people are, I have met a lot of good honest ones! Youre at the top of the list." :::WA Victim of long term mental abuse. 02-12-2015

 "Simon had no issues in finding valuable data that was deleted from my iPad. Not only did he find what I was looking for, he found too much information I had to say stop!! He was smart enough to get the actual evidence from the cloud and the iPad at the end of the day didn't even make much difference! He is superb." :::Family violence victim in Queensland. 15-09-2015

 "Simon did a tremendous job in assisting my counsel in finding the Defendant of a massive cyber-attack and defamation against my business. He actually uncovered an international major scam network in the process and not only solved my case but solved so many others. He knows the workings of the internet, that's a fact." :::Protected name celebrity in Sydney. 20-09-2015

 "I wish to congratulate Simon on his absolute expertise in finding my online scammer. Everybody said it was impossible, but he did it. His method was mostly common sense. His skills are varied and I believe that anybody that utilises eVestigator® gets so much more" :::Dating chat scam victim. 20-09-2015

 "Simon's findings from forensically examining both an iPhone and an iPad gave me almost too much information than I was prepared for. He is very accurate and factual and knows the ins and outs of the technologoes, not from a useability level but from a ground up level - and it shows. I've worked in IT for 20 years and he blew my mind away with his findings and logical way of solving my defamation case. I think his skills as a mediator seriously complement his work and it shows." :::Protected identity undisclosed 12-08-2015

 "Simon was able to forensically examine another expert's report and politely speaking 'teared it to shreds'. Simon uses a factual approach to his investigations and his knowledge seems to be more than just a expert programmer, more than an expert investigator, but a real person who can understand your problem and come to a solution. He makes things happen, and saved me thousands in lawyers fees when I was at the brink of being summoned to the county court on a report that otherwise would have destroyed my case." :::Protected identity undisclosed 21-08-2