A real story with a real outcome
Looking for a testimony from a real
Corporate client whom was cyber-stalked
for 5 yrs, living in terror, not finding
his stalker after five years of attempts
with the Police and the High-tech Crime
division without success? After just 2
weeks I found the accused (via social
media and cyber methods amongst
traditional investigative techniques)
and later prosecuted and convicted under
strict Victorian Anti-stalking laws
based on my work. Contact: LifeStyle
Portraits, Darren Tilnak Tips on
Security and Technology Be aware of just
how much information you share online. 1
in 5 Australians have been victims of
identity crime with computer hacking,
online banking and shopping to blame SO
you think you're safe online and take
all the necessary steps to protect your
information? Think again - your details
may not be as private as you think. More
Australians than ever are falling victim
to identity crime and the victims aren't
signing up to dodgy scams and being
careless either. More Australian's than
ever are falling victim to identity
crime and the victims aren't signing up
to dodgy scams and being careless
either. Did you know that Australians have
lost over $45 million to scams in 2015 already? The
ACCC is urging the community not to send
money or personal details to strangers
after $45 million was reported lost to
scams already this year and 45,000
Academic PD and Qualifications. The real value is in the experience!
Below is a redacted SAMPLE of some of my Qualifications/PD (Excluding Case Studies/Experience/Appointments). It is relevant to note that Cyber-Threats in my view is the new world war. New hacking methods are created, and smarter e-Crime is committed day by day. There is not one degree one could do without the knowledge of such degree being expired at conclusion. eVestigator® has a magnitude of Nationally Accredited and Professional Development (Some endorsed by Charles Sturt University) to maintain currency. I grew up with the birth of the internet and every day cases bring new threats that may not have existed yesterday. My work and customer feedback speaks for itself. Please find below a sample of some of the official Qualifications and PD I have undertaken. Mostly, I teach others Cyber-Security trends, and this is something that is popular in America but lacking in Australia's training system. Children should be taught about current cyber risks in primary school as (from experience) the exposure with social networking is so open, people do not realise how much intelligence someone like myself could gain from merely a Facebook profile. This is something we are working on, in educating Australia. There will be more on this shortly.
Professional development is often maintained via world renowned Udemy platform. Udemy has been discussed in The New York Times, The China Post, Fast Company, the BBC and TechCrunch, with
much of its coursework originating from Stanford
University Expert material noting "Udemy offers an experience that rivals the real classroom, and should prove to be a useful utility for teachers and students of all subject matters.
Since I was just an 11yr boy I have been programming in almost every language on every platform available. My brothers played games, I made them! Aside from the 25+ years of HANDS ON major computer programming and cyber security experience, I developed many applications. From web servers, mail servers, my own protocols, all low level, design - pixel by pixel, code line by line, nothing like the 'wizard' and 'open source' attempts of lazy coder attempts today. At 19, whilst employed as an Analyst Programmer and working on integration with a VERY WELL KNOWN commercial accounting package for our CRM software, I found a major security flaw in the raw binary of their database exposing credit card numbers, that's where my interest for cyber security investigative 'programming' developed. Having already becoming a growing expert my commercial experience was like facing a truck head on. As at the same time, after VCE I was in the top 3% in Australia in my VCE (Common Assessment Tasks) for Information Systems and Technology (4 A+++), then after a short stint flying through High Distinctions at first year Uni, I was hand picked and employed immediately to work for real projects as an Analyst Programmer, then Senior Analyst Programmer, and later became a CEO, Assessor, CIO and CSIO, PI, and CHFI and Forensic Investigator/Expert Witness. In those earlier days in addition to working as an Analyst Programmer I was in demand by Swinburne University as one of the very few who could teach the all new .NET advanced programming suite sessionally and did so for a period of about 4 years after hours. I shortly opened my own international businesses in the Voice Analysis/VOIP medico-legal industries. I programmed handheld devices, multi-million dollar corporate software and
systems widely used by physicians overseas to dictate via Windows CE Pocket PC's (way before the iPhone and Android existed) that interacted with custom typist equipment for dictation and transcription.
Since then I built some of Australia's largest IT companies and educational institutes and gained
recognition of my expertise both before, during and after my practical experience - calling from the golden principles of expertise from what you cannot learn at school - but what was embedded in me since 11 years old - first programming on an Amstrad CPC 464 64kb tape deck machine. I have seen the entire life cycle of today's computer systems file systems and further, from the perspective of the consumer birth of the internet and have shared this knowledge and lead teams of up to 50 people, developed major commercial applications, built 2 of Australia's largest training institutes, a Computer Implemented Software Patent, and am considered a master in programming principles and reverse ethical hacking. From understanding the roots of programming, something that is not taught these days, I understand client needs, and can understand the full dynamics of source code layers (as they have evolved), enabling me to have an
investigative advantage in any matter relating to computer crime or computer related fraud.
especially useful in white collar crimes, cyber stalking, cyber
harassment, and reverse IP tracing. Much of the API programming tools I have created over the years are used by millions of people all over the world by 'other programmers' as software
plug-ins for Microsoft (IE/Spartan/Edge/Surface Pro/Windows Phone), Apple (iPhone/iPad/iTunes), VLC, RealOne, and other major vendors. I have always been the programmer for programmers. I have been asked to give expert opinion in cases involving IP theft and high-tech crime requiring analysis code line by line and contracts involving disputes over source code theft and disputes, and I that is one of the reasons why I can attain forensic data that many cannot when it comes to situations where most people give up when they cannot get an IP address on a silver platter. I have succeeded in many cases, because there are many more ways to locate a person who wishes to remain anonymous who is damaging a reputation or company.
ITU (CHFI) Computer Hacking Forensic Investigator (Interntationally Accredited) - US Dept. Education
WASC Accredited: WASC accreditation also places ITU among the recognized
list of institutions on the U.S. Department of
database of recognized institutions of
higher learning and the Council for Higher Education
Accreditation's Listing of Accredited and Candidate
Institutions (CHEA). ITU is also recognized as an
approved institution by California's Bureau of Private
Postsecondary Education (BPPE). Subjects: Computer Forensics Introduction, Forensics Investigation Process, Searching and Seizing, Digital Evidence, First Responder Procedures, Forensics Lab, Hard Disks and File Systems, Windows Forensics, Data Acquisition and Duplication, Recovering Deleted Files and Partitions, Using Access Data FTK, Using EnCase,
Steganography, Password Crackers, Log Correlation, Network Forensics, Wireless Attacks, Web Attacks, Email Crimes, Mobile Investigation, Investigative Reports, Expert Witness
UNSW Global Pty. Ltd - Expert Witness Training Certificate
Mr. Hugh Selby is an expert Barrister who also specialises for Unisearch at UNSW Global Pty. Ltd, interstate and overseas as an Expert (Expert Witness Trainer)! Hugh Selby is a very experienced Barrister and co-author of the multi-volume and online publication "Expert Evidence". Hugh teaches "courtcraft", both in Australia and overseas, to prosecutors and advocates, police and experts across many disciplines. His publications range across trial and appellate advocacy, coronial practice, civil pleadings, policing, former Justice Kirby, and industrial law.
Graduate Certificate in Digital Education
Graduate Diploma in Management (Learning)
Graduate Diploma of Strategic Leadership
Graduate Diploma of Family Dispute Resolution (Commonwealth Appointed FDRP)
Diploma of Security and Risk Management (Cyber Security Analyst)
Certificate III in Investigative Services (Simon Smith is a Licenced Private Investigator)
Diploma in Information Technology (Management) - Advanced Level Programming, Systems, Databases, Security, Machine Code, Viruses, Risk Mitigation
Advanced Diploma of Program Management
Advanced Diploma of Project Management
Certificate IV in Government Investigations (Government Investigator)
Certificate IV in Security and Risk Management (VIC PI Electives)
Victoria University Bail Justice Training Course Certificate 2009
SANS Cyber Aces Certification
PD: Hacking Academy: Monitoring Transmitted Data
IT Security Academy (Associates IT Security Professionals. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. They provide high quality materials to prepare you not only for passing certification exams, but teach you practical skills.) & The Hacking School (The Hacking School courses are prepared by people who are professionals in what they do. Authors of their courses are well known in the world of computer systems' security. They provide up-to-date knowledge on IT security and ethical hacking.)
Author of VET Accredited Course Material 'Dealing with Grief and Trauma'
PD: Social Media for Business
Diploma of Government (Investigation)
Certificate IV in Mediation (Also a Nationally Accredited Mediator - LEADR Member)
Graduate Diploma of Adult Language, Literacy and Numeracy Leadership
Diploma of Leadership and Management
Comply with organisational requirements for protection and use of intellectual property
Contribute to intellectual property management
Develop and implement strategies for intellectual property management
Manage intellectual property to protect and grow business
Graduate Certificate in Management (Learning)
PD: Cyberbullying - as taught by Andres Saravia
Diploma of Counselling
PD: CCNA Security 2015 Video Boot Camp: CCP and More
PD: Investigator Ethics for the PI, Consumer and Client
Advanced Diploma of Leadership and Management
PD: Maintaining Cyber Security
Certified iOS (Apple), Android (Google), Amazon, Windows and Mac App Developer
PD: BrainBench™ Certificate in 'Amazon Web Services (AWS)'
(A private research university in Stanford, California, and one of the world's most prestigious institutions, with the top position in numerous rankings and measures in the United States.)
Certified Android, iOS, Amazon Device App/Play-Store Developer
Andres Saravia (Andres earned a Doctorate (Ph.D.) in Philosophy of Law, Data Protection mention at the University of Zaragoza, Spain with Magna Cum Laude. He has also completed the Course on Personal Data Protection by AECID and Communication Science Foundation and the Graduate Course of the School of Graduate Studies, Faculty of Law on "Updates of Information Law" Module I. Uruguay. Andres has specialized in Germany, Chile and Spain, in the areas of e-Government and Data Protection latter including in computer and cyberbullying crimes. He is a Fellow of the Institute of Information Law Uruguay).
Professor Robert Bunge (An information security educator for the past eight years. He is an active coach and organizer in the Cybersecurity Competition Federation, Collegiate Cyber Defense Competition, National Cyber League, and CyberPatriot.) & DeVry University ( a regionally accredited institution.) Rosa Augostino (An author, consultant and entrepreneur she has written extensively about the subjects of marketing and business-building. Her background includes advertising, marketing, business growth and customer growth.)
PD: Introduction to Artificial Intelligence
Jeffrey Lau (A data engineer who constructs operational reporting, dashboards, and other visualizations. He has experience with object oriented programming, scripting automation, digital VLSI, and infrastructure performance management. He has a B.S. Electrical Engineering.)
Advanced Diploma of Management
Dean A. Beers, CLI, CCDI (Dean began his investigative career in 1987. He is a Certified Legal Investigator and Certified Criminal Defense Investigator, and expert consultant / witness in criminal defense homicide and civil equivocal death investigations. He is certified in Medico legal Death Investigations and is a POST certified instructor, and experienced forensic autopsy assistant.) & Karen S. Beers, BSW, CCDI (Karen began her investigative career in 1996, also earning her Bachelor's in Social Work (Magna Cum Laude). She is also a Certified Criminal Defense Investigator (CCDI) and certified in Medico legal Death Investigations.)
PD: IP Addressing and Sub-netting
Sikandar Shaik, CCIE (RS/SP# 35012) (A senior technical instructor and network consultant. He has been training networking courses for more than 10 years. Sikandar Shaik has delivered instructor led trainings in several states in India as well as in abroad in countries like China, Kenya and UAE. He has also worked as a Freelance Cisco Certified Instructor globally for Corporate Major Clients.)
Advanced Diploma of Management
Diploma of Quality Auditing
PD: Cyber Criminals Want Your Information: Stop Them Cold
(Jeremy O'Connell ... He holds some industry certifications via CompTIA (A+, Net+, iNet+) and received training from Oracle University's OCP DBA program.)
PD: Ethical Hacking and Penetration Testing
(Jerry Banfield (Jerry has a Masters degree from the University of South Florida and is certified as a state law enforcement officer in South Carolina. He also has a Bachelors degree earned from the University of South Carolina. He teaches 38 courses on Udemy.) & Ermin Kreponic (Ermin is an IT expert, Linux enthusiast with a passion for troubleshooting network related problems. Advanced knowledge of Linux command line. Installation, configuration and maintenance of servers that run under Unix/Linux type. operating systems: DNS, TFTP, FTP, SSH, APACHE, SMTP, VSFTP and some others.)
Certified Apple Watch App-Store Developer
PD: Trademark Law for Entrepreneurs
Dana Robinson (A founding partner of TechLaw, LLP, where his practice focuses on trademark prosecution, trademark licensing, copyrights, and business transactions. Dana is adjunct professor of law at the University of San Diego School of law, where he is involved in the law school's new IP Law Clinic. Dana has taught a variety of seminars and moderated panels on intellectual property and technology law since 1999. Dana received his bachelor's degree from Life Pacific College and went to earn an M.A. at Azusa Pacific University and his J.D., from the University of San Diego School of Law. He served as Editor-in-Chief of the law school's faculty journal, the Journal of Contemporary Legal Issues. He is admitted to practice in Nevada and California, and before the Federal District Courts for the Central District of California, the Southern District of California, and the District of Nevada. Dana was the Co-chair of the first Nevada State Bar Committee on Intellectual Property (2002-2003). He is a member of the IP law section of the State Bar of California, and is a member of the San Diego Intellectual Property Law Association. Dana has spent 20 years as an active entrepreneur and investor and continues to advise his portfolio investments.)
PD: Authenticity on Twitter
Rebecca Clark (Training & Development professional anxious to nudge students in the areas of program management, entrepreneurship, accountability, and in pursuing their life goals.)
Diploma of Training Design and Development
Certificate IV in Training & Assessment
PD: Innovation and Technology in Accounting
PD: The Bitcoin Basics
PD: Draper University/Udemy platform (Silicon Valley's top entrepreneurship program for builders and innovators from around the world. Cutting-edge, hands on curriculum taught by the most successful entrepreneurs in the Valley. Learn how to launch a business in this unique start-up boot camp for entrepreneurs.)
Advanced Diploma of Marketing
PD: Mastering iPhone programming - Lite
EDUmobile Academy (Founder Vishal Lamba has a mathematics and computer science degree. Vishal works closely with content creators and teachers to ensure that every course released meets the internal rigorous quality standards.)
PD: Mastering Android programming - Lite
EDUmobile Academy (Founder Vishal Lamba has a mathematics and computer science degree. Vishal works closely with content creators and teachers to ensure that every course released meets the internal rigorous quality standards.)
PD: Social Entrepreneurship: An Introduction
Greg Werkheiser (Greg is a Social Entrepreneur, Leadership Educator and Attorney with over 20 years experience. He has held public service roles at the White House, U.S. Embassy in Paris, U.S. Information Agency, and Congressional Management Foundation.) & David J. Miller (David is the Director of Entrepreneurship at the Mason Center for Social Entrepreneurship (MCSE). Miller is also a supporting faculty member at George Mason University's School of Management (SOM) teaching New Venture Creation and a PhD Candidate at Mason's School of Public Policy working with Dr. Zoltan J. Acs. Miller holds an MBA from the University of Chicago's Booth School of Business (Entrepreneurship, Finance, & Strategic Management), an MSc in the International Politics of Asia from the University of London's School of Oriental and African Studies and a BA in International Relations from the University of Michigan.)
PD: Decoding AP Computer Science A
Moksh Jawa (Though just a sophomore at Washington High School in Fremont, CA. He self-studied for and performed well on the AP Computer Science test as a freshman. He teaches AP Computer Science to students at his high school.)
PD: Professional Communication Essentials
Rasmussen College/Udemy platform (A regionally accredited private college and Public Benefit Corporation that is dedicated to changing lives through high-demand educational programs and public service.) & Brooks Doherty (Brooks is Rasmussen College's Dean of General Education. He is completing a doctorate in Education at St. Mary's University, earned an MA in literature from University College London, and graduated Phi Beta Kappa from the University of Minnesota with degrees in Political Science and English.)
Diploma of Project Management
Advanced Diploma of Management (Human Resources)
Diploma of Practice Management
Diploma of Vocational Education and Training
Diploma of Training, Design & Development
Diploma of Business
Advanced Diploma of Business
Diploma of Management
Diploma of Human Resources Management
Certificate IV in Marriage Celebrancy
Certificate IV in Small Business Management
Diploma of Business Administration
Certificate IV in Business Administration
Certificate III in Business Administration (Medical)
Certificate IV in Frontline Management
Diploma of Counselling
PD: Financial Analysis: A Recipe for Success
Professor and CPA Ellen Jakovich (Has experience in IT, communications, finance, electronic engineering, project management, and accounting. Holds a Bachelor's in Electronic Engineering Technology, a Master of Science in Finance and a Masters of Accounting & Financial Management.) & DeVry University
Certificate IV in Human Resources
Diploma of Training and Assessment
Diploma of Community Services Coordination
Diploma of Disability
Certificate IV in Disability
Certificate III in Disability
Vocational Education and Training in Schools Certificate in Information Technology
Real People, Real Stories, Real Success
"I highly recommend Simon of eVestigator and encourage anyone to use his investigative and forensic services. Simon is the utmost professional that is transparent in all that he will be doing for your case. He genuinely cares about your well being and you achieving your goals. He is not only focused on getting you through your mess but he is there to also separate you from the emotions. He is not motivated by money yet his work is SO valuable. He is motivated by the injustices people face and doing what is right by them.
The fact is Simon is not emotionally involved, shows in that he keeps with the facts. Unlike us victims who are stuck on "why did this happen to me". As Simon said, "you focus on you and your future and let me and the lawyers sort out your past": Civil Judgement case - intelligence and discovery in attaining an outcome.
"My name is Tony, retired, who recently found myself the victim of a worldwide credit card SCAM. After all attempts with the bank and the police failed I approached Simon. From the outset, Simon was very strategic and helpful. I simply followed Simon's suggestions exactly. He totally walked through any opposition that stood in his way for me. ANZ mucked me around for a month or so, presumably to test how fairdinkum I was about them honouring their Credit Card guarantee, then after Simon's intervention and a period of 'nothing' all of a sudden they paid the full amount into my account. I would have no hesitation in recommending Simon. Simon absolutely knows how to get results - he's right on the money! - His clarity principled approach explained my position well and strengths was very prompt. He was one step ahead on the banks likely attitude and behaviour; I felt guided by his expertise. Success!":::Happy Customer with results from my intervention with the bank. This case will become precedent in other cases shortly, 04-05-2016
"Simon is intuative and flexible. His experience means that he can predict possible and real roadblocks and opportunes Plan B's. His skill set is absolutely useful and he knows how to get results. Simon is able to speak with clients in such a way as to put them at ease prior to, during and after his investigations. His strengths are his assuredness, confidence, patience, flexability, intuition that underpins his professionalism and skills. He showed no weaknesses. I have absolutely no hesitation in recommending Simon's services and would be very happy to work with him again. I was blown away at how quickly Simon was able to bring resolution to our case and how he was available at all hours of the day and night which with the time distance made it possible to 'catchup' at times suitable to me.":::Sensitive Reverse Complex Cyber Stalking Matter, 27-05-2016
"From the bottom of my heart, I'll say again you have gone above and beyond for me and your partner is very patient and understanding. Thanks for your effort, thanks for your patience and for not giving up on me. This has been a very long journey for me and for a complete stranger to help me like you have, well I consider you a good friend now, someone who doesn't want to see a family torn apart and really find the truth as do I. Thanks Simon, it really means a lot , it really does":::Sensitive Family Law Matter, 12-05-2016
"Thank you so much. You don't know how much of a difference you've made over the last 24 hours to a very, very tired person initially and now a little bit more saner one. You've made a massive, massive difference so thank you.":::Family Law Custody Parent."::: 28-04-2016
"You just put a smile on my face Simon. Like you, I'm a straight talker, and can't abide liars nor injustice. I have been accused of being brutally honest on many occasions in my life!":::Self Represented Litigant. 26-04-2016
"YOU ARE THE MASTER!!! Sent email to my older kids as YOU SUGGESTED, re no contact with their Dad OR at least not PASSING ON ANY MESSAGES to me or XXX and it stopped!":::Extremely highly rescued family cyber-stalking matter. 20-03-2016
"Thank you so much it was helpful. I will suggest your company as i know of at least 1 person who is interested. Thanx again Simon....":::Android Forensics Matter. 30-01-2015
"I have been fortunate enough to obtain advice and witness Simon providing support to other professionals during our 8 year relationship. I have always found Simon to be a highly motivated, intelligent and capable person." :::Name protected, 01-02-2014
"Simon, THANK YOU!!! Not only for what work you put in but just for being so positive and believing me and in me. You know, it's amazing the power of a persons words. In this case, it's the words of a person that should have no say or ability to have a say that see's me to be in the position I'm in today. 'No fact. No evidence.' And similarly, I was having a very hard day today. I had got my hopes up that that scumbag was going to let the kids be home for the weekend for my birthday.. But of course, I found out this morning that was not the case. But for some reason I have connected to a person, the person I have needed and searched for for almost a year now. And today you lifted my spirits more than I can ever express." :::Name protected, intervention reversal matter. 03-01-2015
"Simon, I found your help in reporting and remedying my situation post a fraud on my computer to be Professional, Clear eyed & Modest charged where I had no clue as to what to do to protect myself. I would have no hesitation in recommending you" :::Name protected, another ACORN failed case, Massive Australian Dating Scam - lost over $250,000. 28-02-2015
"I am very impressed with your work. Submitted another report to ACORN re the CBA XXXXX account, and complained about the lack of action. Thanks for your great work and your interest in my case. I am going to make a complaint to the AFP through a website I have found.":::Name protected, another ACORN failed case. 28-02-2015
"Thx Simon. Through all this as much as I have learnt about how nasty and shady people are, I have met a lot of good honest ones! Youre at the top of the list." :::WA Victim of long term mental abuse. 02-12-2015
"Simon had no issues in finding valuable data that was deleted from my iPad. Not only did he find what I was looking for, he found too much information I had to say stop!! He was smart enough to get the actual evidence from the cloud and the iPad at the end of the day didn't even make much difference! He is superb." :::Family violence victim in Queensland. 15-09-2015
"Simon did a tremendous job in assisting my counsel in finding the Defendant of a massive cyber-attack and defamation against my business. He actually uncovered an international major scam network in the process and not only solved my case but solved so many others. He knows the workings of the internet, that's a fact." :::Protected name celebrity in Sydney. 20-09-2015
"I wish to congratulate Simon on his absolute expertise in finding my online scammer. Everybody said it was impossible, but he did it. His method was mostly common sense. His skills are varied and I believe that anybody that utilises eVestigator® gets so much more" :::Dating chat scam victim. 20-09-2015
"Simon's findings from forensically examining both an iPhone and an iPad gave me almost too much information than I was prepared for. He is very accurate and factual and knows the ins and outs of the technologoes, not from a useability level but from a ground up level - and it shows. I've worked in IT for 20 years and he blew my mind away with his findings and logical way of solving my defamation case. I think his skills as a mediator seriously complement his work and it shows." :::Protected identity undisclosed 12-08-2015
"Simon was able to forensically examine another expert's report and politely speaking 'teared it to shreds'. Simon uses a factual approach to his investigations and his knowledge seems to be more than just a expert programmer, more than an expert investigator, but a real person who can understand your problem and come to a solution. He makes things happen, and saved me thousands in lawyers fees when I was at the brink of being summoned to the county court on a report that otherwise would have destroyed my case." :::Protected identity undisclosed 21-08-2015
"eVestigator's knowledge of the government policy, experience and Qualification as a Government Investigator, as well as first-hand experience in government corruption helped our team uncover a major injustice and unlawful decision of an asset properly created but stopped from bureaucrats worth over 20 million dollars. Through persistence and fact, eVestigator (despite barristers saying after $40,000 there was no chance of success) persisted on the facts in review and after 5 years won not once but twice and had the decision overturned."
"Thanks Simon, you're a life saver !" :::Protected identify undisclosed - found FaceBook Cyber-Stalking Defendant after ACORN had not succeeded, enabling the customer to attain a Personal Safety Intervention Order 26-11-2015
"Hello Simon, I just wanted to let you know how encouraged I felt after speaking to you. You have no idea how much pain and suffering I have had to endure over last few years,so I hope you can sort this out because there have been so many twists and turns over this whole affair, that really sometimes I thought I was going cuckoo. As it happened all my hunches and my 'WOMENS INTUITION" really have been right and really I dont want to waste another year of my life , excuse my french, on a a couple of ********** who are hiding in the shadows.Thankfully my husband has come on board ,especially the last 6 mths ,to not only help me but also do some serious work on himself.As you will gather from the information I send ,I have had to do this all on my own with little computer skills ,working part time looking after 3 boys and generally trying to keep my **** together.I know that i am not wrong with the things ive found and generally i am a peace loving and kind person but i am also thankful to this sociopath for re awakening the fighter that lay dormant in me for years. Thankyou!" ::: Another cyber-legal case with forensic analysis of iPhones, Hard Drives & Computers.
"My name is Mark Franchi and I am a decorated, retired Police Officer of 33 Years who worked as a Patrolman, Supervisor, and Specialist Squad Team Leader and worked who also worked as a Federal Officer within the ATO for 6 years. I worked with Simon Smith for almost 3 years from 2006-2009 and have kept in contact with him as a friend since then."
"Simon is an Entrepreneur, innovator, designer and is the most ethical person I know who is very honest in everything that he does. He is the person who changes the course of an industry because of the ingenious ways he turns ideas into inventions. I have seen him in business do the right thing when he could have turned his back and kept people's money. Without a hesitation he refunded people who never knew they were overcharged in the first place."
"Simon is also a genius computer programmer, who has helped find cyber stalkers, assisted ASIC find and prosecute unlicensed practitioners, helped ASIC find and prosecute people who have performed Acts of Bankruptcy. Through his inventions and clever designs Simon has accumulated quite allot of wealth and never has had the need to chase money, but always helps people who have been wronged or have had had an injustice done against them."
"Simon has been helping people for as long as I have known him and has not got one malicious bone in his body. He has had in the last few years quite allot of injustices done against him, especially with people stealing his inventions and Government bodies giving him a hard time because he had taken them to task over corruption issues. Simon is a great believer in restorative justice."
"If you wish to discuss Simon Smith with me in any way please don't hesitate to call me on 0468 522 700." ::: Mark Franchi, very senior respected person of authority and colleague."
"I highly HIGHLY recommend Simon and eVestigator® for any investigative, mediation, or advocacy needs especially to sort out the lawyers and give amazing factual results from investigation to in my case personal service to see the job through, after many had tried and failed."
"He will take you through to the other side. You will get results. And PLEASE don't think he will be expensive, cause that is not the case. His work is SO valuable. He will save you money by simply being your voice. I did not realize that lawyers will charge for a simple email. The fact that Simon is not emotionally involved, he only talks fact. Unlike us victims who are still stuck on "why did this happen to me?"
"Whatever your problem is, yes you need to go to a lawyer for the official lodgement of litigation complaints but Simon is the one who truly gets the job done with you the right way! I can't stress enough how important he will be to your case simply because his factualness and understanding of the legal language and system and experience in getting results the quickest most cost effective way. Brilliance is an understatement."
:::Kind Regards, Emotionally Traumatised Victim of Crime/Trauma/Deceit/Injustice, Attained direction and default judgement > 190k, Jurisdiction: County Court of Victoria, Result: 4 weeks after 3 years of emotional distress and misguidance. 25-10-2015.
"I have never given a testimonial before but felt the need to say a massive THANK YOU to Simon of eVestigator® and to encourage anyone that may need his services. It's one thing to be a victim to crimes or attacks against us but then there is the different form of attack that comes from the legal team. A financial attack."
"Simon is the utmost professional that goes beyond what's on paper. He genuinely cares about your well being and mental status. He sympathises and understands your fears but most importantly he understands the "lawyer language". It took a long time for me to turn for help but turning to Simon was the best thing I could do."
"Simon saved me 10's of thousands if not hundreds of thousands of dollars with the lawyers and he got me the results I needed. From assisting me in advice presenting fact, and gaining fact in my paperwork, to getting a court order, it all happened in 1 month."
"Simon was onto the lawyers and made sure things were done! He corrected the lawyers Letter of Demand and made sure all the information was there on the 1 letter. Even though I gave the lawyers 300 pages of evidence. That letter basically was the only thing needed to get the court order stamp."
"Simon looks after you like a friend and is not only focused on getting you through your mess but he is there to also separate you from the emotional attachment that got you into this mess. My favourite thing he said to me, and this often crosses my mind, 'you focus on you and your future and me and the lawyers will sort out your past'"
"There was a reason when i was searching that your name came up and i picked you.Ive had many moments of aha!!! over last 4 yrs.You are one of them."::: Very strong lady who wanted to know once and for all the truth after over 10 years of mysery. Truth was delivered enabling her to get on with her life.
For Legal Counsel: From Senior Court Consultant, "I am writing this letter in support of Simon Smith. I have gotten to know Mr. Smith over the past 10 years, both as a person and as a Computer Programmer. In both capacities, I have been most impressed with Mr. Smith's talents, and I am confident that he will be an exceptional asset to aid any Attorney."
"As a Computer Programmer, Mr. Smith stood out, from early in our relationship, as an articulate and perceptive programmer. Simon repeatedly, showed me he was able to provide solutions to my company that we were able to use unaltered for over 10 years, that in the computing world is no small feat. It shows that the solutions he provided were designed by someone who took the "long view" in application design. Intellectually, he is clearly a star."
"His talents, however, do not end there. Mr. Smith is also a person of unusual energy, maturity, and skill. He has shown a tenacity in dealings with several International Companies and Governmental Departments, he tackled these responsibilities with spirit and sophistication, interacting in an effective, responsible manner. He is evidently a person with substantial experience functioning in the professional world, and it has been a pleasure working with him."
"In short, I recommend Mr. Smith to you strongly and without reservation He will be a wonderful addition to your team. If I can be of any further assistance in your review of his application, please feel free to contact me." :::Sincerely yours, Evan Kelly CEO vPedal
"A man of integrity expects to be believed and if not he lets time prove him right.":::Successful Voiceover Artist directed to eVestigator®
"I appeared on Today Tonight's request made to Simon Smith (eVestigator®), where Simon was asked to choose a willing former client discuss the impact of Cyber-Awareness, Cyber-Stalking and Cyber-Bullying. They were conducting an investigation and asked him if he would be willing to ask a former client pertaining to Cyber-Bully's and Cyber-Stalker's in his capacity as an Expert Forensic Private Investigator for the story which aired over 4 years ago."
"I used to run a YouTube channel which attracted people from all over the world as I aspire to be a character actress one day. I have built up a portfolio and had a successful YouTube channel. Not long after I continued to receive inappropriate emails and posts, which turned into serious Cyber-Stalking and Cyber-Bullying. Simon (eVestigator) helped me not only find my CyberStalker and CyberBully - which in itself was a challenge as he ended up being in another country, he also helped me get attention. It is so hard to be treated seriously with the police and almost an impossibility to get something reported outside the country."
"Simon stood by me and saw the process through. He was not just a Forensic Investigator. At each step he explained the most efficient process and through his strategy managed to get the complaint followed through the process to ensure an outcome. He was very thorough on mostly his own initiative with the Scottish Police. He is very talented with any online tracng, especially due to the fact we had no evidence where this person was - but with Facebook, and Simon's abilities he brought justice to my Cyber Stalker/Cyber Bully."
"Simon was directly requested to volunteer some advice and put forward a willing participant on Channel 7's Today Tonight program on behalf of his Cyber Stalking/Cyber Bullying experiences. I had the film crew come to me and the story was aired. Cyber-Bullying was the primary focus and I am really passionate on stopping this and helping others and perhaps working with Simon later, and thanks to Simon and Today Tonight, it was brought to the public."
"This was a good experience allowing me to give my opinion on what I think is a national issue, so Simon not only solved my case but from Today Tonight's expert request, he enabled me to explain some views on Cyber-Bullying which i feel strongly about. I recommend Simon fully for any investigation as his programming and forensic investigation skills are outstanding.":::Jasmine
CyberBlog™ This is where you find eVestigator's view on hot topics
eVestigator invited by (ISC)2 to IISSCC as a recognised information security professional - 19 July 2016 - eVestigator® - "(ISC)2 is the International Information Systems Security Certification Consortium. A non-profit organisation which specialises in information security education and certifications. eVestigator was contacted and personally invited to participate in the Global Information Security Workforce Project. It is the largest study of its kind designed to provide analysis of important trends and opportunities within the information security profession. The aims are to provide a clear understanding of pay scales, skills gaps, training requirements, corporate hiring practices, security budgets, career progression and corporate attitude toward information security for the benefit of companies, hiring managers and information security professionals."
"It is an important study to keep track of and examine the growing importance, interest and need for information security and how the profession is growing to be a more and more integral and necessary part of every business, no matter what industry it operates in."
eVestigator® launches his powerful Penetration Tester Smart App to Kindle Devices as well as Android - 15 July 2016 - eVestigator® - "Just a quick note to let you know that now the App is live on Amazon, and all Amazon device users including but not limited to: Kindle Fire HDX (2013), Kindle Fire HDX 8.9 WAN (2013), Fire HD 8 (2015), Kindle Fire HDX 8.9 (2013), Fire HDX 8.9 (2014), Fire Phone, Kindle Fire (2011), Kindle Fire HD (2012), Fire HD 6 (2014), Kindle Fire (2012), Fire (2015), Fire HD 7 (2014), Kindle Fire HD 8.9 (2012), Kindle Fire HD 8.9 WAN (2012), Fire HD 10 (2015), Fire HDX 8.9 WAN (2014), Kindle Fire HD (2013), Kindle Fire HDX WAN (2013), BlackBerry Leap, BlackBerry Z10, BlackBerry Passport, BlackBerry Z3, BlackBerry Z30, BlackBerry P'9982. Now all can benefit from the FREE eVestigator PenTester App on their device. To download, simply click here or click here."
Is it a virus, spyware or just simply a mistake you may be making when installing software? - 14 July 2016 - eVestigator® - "The newest trend everyone is going crazy for mostly due to scare tactics in the media - there has to be some logic applied to security warnings - the media will just grab a maybe and scare everyone! For example, just last week a man in America caused a highway accident when he parked on the road to catch a pikachu. Yes, that's right I'm talking about Pokemon Go, the app newly released in Australia that let's you become a "real life" pokemon catcher and trainer. So while this is not a hacking issue and not as bad as the hype makes it out to be, it is worth looking at as a simple act of stupidity - not a security or cyber lesson. I personally, don't install one piece of software to block viruses or spyware because I never let them get installed in the first place."
People are throwing caution to the wind to "catch 'em all'."
It is not just physical safety however but personal security. Logging in was reported as granting the app full access to the Google accounts of iPhone users. A Google account is required to log in and start using the app for Android and iPhone users. Now this is a case for checking just what you are agreeing to and an extremely good example of why. The true full account access status may not have actually been full and total access to the users Google account and is now irrelevant as an update released just yesterday now includes a pop up on install allowing the user to choose how much permission to allow. The extent of account information is essentially limited to your email address and name. This is important - it is not a hack, a security issue, it is what YOU are granting the App to do - so it is important to read what it is requesting."
Still it is a good lesson to consider just how much trust you put into any apps and the unknown developers that create them without even thinking. Poor programmers just add library after library to do the least amount of coding as possible and bloat your phone with as much unnecessary bloatware as possible. You must understand and be aware of just what you are agreeing to when you grant apps and programs permissions because most of all you should understand that in this technology-driven world you are the master of your device, and by saying yes, the deed is done. You could be giving information and privacy of all your contacts unless you cut yourself off from the digital world entirely.
Whether this security scare was legitimate or not, it highlights a problem and attitude or perhaps desperate ignorance of just how pervasive technology has become but apart from lazy programming it is not all poor technology. The user is the one that says yes. Not just phone apps but software, hardware, browsers, social media and other online accounts that all track your search history, browsing habits, location, purchase history, the videos you watch, the things you download and upload, emails - who, when, what and where and more, you would have noticed secret little tick boxes in their installation packages to install toolbars etc."
The problem is to use the technology, program or app, you 'think' you have to accept these things. The only way to truly protect your personal information and privacy is to just say no. Stop installing more bloatware in virus scanners and device cleanup scanners which only make the problem worse and just say 'NO'. Partially this mentality comes from the industry expecting Apps to be free and speaking from a developers' perspetive they see this as a way to make money by totally inundating you with intrusive spyware popups to make a few cents during their App. I'd rather pay 99c and have a clean phone. However, I don't see this getting any better - certainly not the practice of developers using these tactics on mobiles and as a professional desktop developer - I've seen the major shift in the Application installation phase - with sites like download.com. If you don't press custom and look for that check box youre guaranteed to get a toolbar! These things are not going to change as long as people are willing to sacrifice their security and privacy for a few cents or seconds of their time. If people only accessed, bought or download things with little to no permission requirements and boycott the products of companies that track everything it might be a different future. I have had first hand experience at what you are giving for those few cents. Has anybody watched the Ghostrider movies? In a ironic way its like selling your soul to the devil. You are selling your privacy and human rights to the Golliath companies for next to nothing - and now you must wonder how every website seems to know what you are interested in buying from a completely different shop you looked at last week or talked about on Facebook or in an email recently. It is getting very bad people, you need a security cleanup from top to bottom or identity fraud that I deal with daily almost will be hourly."
All you can do is be smart about what you access, what devices you use and what permission you allow. Any semblance of privacy is long gone but the illusion will forever cover the eyes of the consumer. Take my first hand free advice."
eVestigator® launches a powerful Android App his customers can use for PenTesting - 12 Jul 2016 - eVestigator® - "Well it did not take long. One of the biggest cyber-crimes that people forget about is the ex-employee logging into the work systems from home - sabotaging the entire network - or perhaps its that SEO guy that I caught who caused a debt of $500,000 to my client and remotely setup a chain of incoming servers conveniently hosted at my clients premises unknown to him."
"In the Cyber world, the art of finding holes that can be hacked in from the outside in is called 'Penetration Testing'. I don't just do the basics. My App goes all the way. As a Certified Hacking Forensic Investigator (CHFI) - this is almost a reverse attack on yourself to determine just 1 aspect at first. If one of your 65535 ports are open to the world that should not be on your public IP address."
"To put it extremely simply Penetration Testing or a 'pen test' is an attempt to scrutinise the security of an IT infrastructure by intentionally trying to exploit vulnerabilities. These vulnerabilities may exist in operating systems, routers, services and application flaws, with improper configurations, forwarding or risky end-user behavior."
"The App is with the Android App Store ready for publishing and should be out shortly. For now, check out this YouTube video of the App in action - with a mini demo by clicking here, or better still download the App by clicking here."
eVestigator® solves case via IP Tracing a twisted 7 in 1 reverse cyber harassment case - 25 June 2016 - eVestigator® - "In an utmost unbelievable series of non-traceable emails, of a harrassive serious nature - to the point of potentially one of the worst cases of impersonation and fraud I have seen to date, eVestigator® has succeeded in catching 7 stalkers in 1."
"Although in instinct, it was known in 5 minutes, in evidence it took about 8-10 hours to get the evidence. IP Tracing as you know from Hotmail or Gmail is not possible. eVestigator® has to use other techniques in order to get a positive match on both the stalker, combined with investigative techniques to match it to a suspect."
"It was determined that this particular stalker was sending emails to himself in the third person and then forwarding them to his ex, purporting that they were received from the partner of his ex in an attempt to defame the partner of his ex, along with 6 other identities aimed at the workplace of the partner of the ex, false testimonies from both sides and it was a major case."
"The results of this case are still pending as the remedies are multi-jurisdictional. It is unknown what the victim will do in this situation. He and his partner both were surprised of the outcome. To me, it seemed to fit like a jigsaw - yet it is something beyond somebody's normal conscious understanding to comprehend. Since catching many cyber-stalkers it surprises me with the blanket of strength the internet places over them. People have to understand - it is still a very serious crime."
eVestigator® prepares to go corporate with a new Cyber-Legal direction - 25 June 2016 - eVestigator® - "As eVestigator®'s focus expands more into the Expert Witness, high-tech cyber-harassment, cyber-crime, cyber-stalking, cyber-defamation and cyber-legal arena's - it has considered a Corporation structure to host its main investigation activities, not just its forensic activities."
"As the class of work is more in demand for Simon's expert witness and opinion services, the Corporation is also able to provide both the IT and Investigative services combined instead of individually."
"Most of Simon's services are in forensic cyber-legal discovery now, but in the event that full scale investigations are needed this is seen as a positive move into the future, as eVestigator through its Corporate structure seeks to expand its range of software, services and e-learning activities as well as its expert witness services to Australia and beyond in the near future."
Simon Smith asked to act as single Expert Witness in an IVO Melbourne Magistrates Court case - 20 June 2016 - eVestigator® - "In a complex case of cyber stalking, cyber harassment and cyber bullying, where both parties are in a contentious situation, Simon Smith (eVestigator) has been appointed by the parties to an intriguing legal battle between 3 parties to where there has been a case of stalking and mental harm as defined in the Personal Safety Intervention Orders Act 2010 but by whom? I am completely independent in all cases and only report on facts so provided parties cooperate, it will be one of my many interesting cases."
"Simon has succeeded in many of these, including recently a reverse stalking case that ended up in finding 7 identities relating back to the one sole entity with no IP address whatsoever. Cyber email skip-tracing is something that is eVestigator's specialty and it is not easy without the ability to perform a summons or have police help when stalking is performed by means of a 'FREE' webmail account in an overseas jurisdiction with hidden IP headers and absolutely no technical or legal means of getting those details from the source."
Having succeeded in other cases, this case poses a very different perspective. The reason for his appointment demonstrates a rather large whole in the system. To be fair, Cyber Forensic Investigators are not Lawyers and Lawyers' are not Cyber Forensic Investigators. In some ways this action may be at the wrong time in the proceedings. It is not a question of law, rather, it is a question of investigation."
"There could be several outcomes. Both parties could have nothing to do with the conduct. Either party may. My findings are to the court and I have to do whatever I need to do to ensure my findings are independent and in my training of lawyers as mediators - this is not something that lawyers typically like doing!"
"However at the end of the day I look for the quickest path to get to the best solution for a result as long as those paths are not distorted or tampered with. I always find alternative methods and it relies on working cooperatively with all the parties, because litigation and wondering is worse than knowing both for the victim and the stalker (whoever that may be). Update: As it turned out - as I was restricted to one chance at gaining evidence, I asked for a very high threshold of evidence under summons as I leave no stone unturned. I was shortly notified that the parties settled by voluntary undertaking."
eVestigator® draws the line between a phone and smart phone - 24 April 2016 - eVestigator® - "While Apple hardware may be well-built and likely to last for years, the software is another story as Simon Smith of eVestigator® discussed with Jackson Stiles of New Daily earlier this week. Read the article here. (link on the 'The New Daily' website at the time of placing this blog - dated April 18 2016)
'A phone is a phone but a smart phone is not just a phone,' says Simon Smith. 'it is fair to say that the majority of phone users these days are smart phone users' therefore this must be considered when discussing phones in this day and time and this is what came up recently. With every iOS update consistently, and so it would seem intentionally, aspects of previous coding becomes obsolete, different or removed altogether forcing iOS programmers to update their apps or risk incompatibility with new devices and operating systems. Effectively limiting the usability and life of a smart phone. An example of this is the iOS 9 implemented an update which restricted access to insecure websites on older phones. Although this is great for developers like myself who already use an encrypted system internally, such encryption should be part of the operating system and such encryption is welcome. However, with little to no notice to developers such an implementation caused havoc to software and their developers. 'The life expectancy of a phone is three years, in a way. It would probably hold up in a court of law(misquoted as 'life') if something went out of warranty.' you can have a phone, but you're not going to get the most advantage and functionality out of a smart phone as technology grows because the phone is only as good as the hardware and the software they allow you to use. And sometimes you can actually get more out of the phone with the software, but they don't let you."
"A phone is a phone and will last as long as the hardware does but the other functionalities of a smart phone decrease and become obsolete over a far shorter period of time."
The Government has announced a new Cyber Security Initative - 24 April 2016 - eVestigator® - "Turnbull cyber security policy tipped to 'safeguard legal profession'
, an interesting article worth reading. The government recently announced new funding for a cyber security initiative which sounds very good if it is properly managed and implemented. It aims to establish public-private intelligence sharing centres, bolster the government's enforcement agencies, and create a Cyber Security Growth Centre led by the industry."
"15 million of the money pledged is to be set aside for grants for small businesses to have their systems tested and improved by accredited experts, which is something they most likely would be unable to afford as it can take days or even weeks to do a thorough analysis and make recommendations and though an expert's time is not cheap, investing in such a test can save you a whole lot more in the long run."
"It is a step in the right direction in boosting the country's defences against online assaults and good news for our businesses that deal locally and overseas. In response to this, the Law Council is working on the development of a cyber security information initiative for Australian legal practitioners. Knowledge and awareness is lacking in many industries when it comes to cyber security and system vulnerabilities. This imitative will hopefully help raise awareness and wake up Australia about just how easy it is to fall prey to a hacker and lose hundreds, thousands even millions of dollars to scammers."
eVestigator featured on the Today show talking electronic pickpocketing - 13 April 2016 - eVestigator® - "Around 7:30 am this morning a story ran on Channel 9's Today show about the security of contact-less credit cards. It was a good balanced story howeverI am not of the opinion that criminals can generate the CVV or a derivative of it via a mathematical algorithm and magstrip data. Needless to say, the number and expiry date could book you a nice week at the Hilton Hotel or anywhere MOTO (Mail Order Telephone Order) is accepted, as it is not a merchant requirement to request the CVV for non contact sales."
"And of course it featured the eVestigator® himself, Simon Smith!! I was happy to help with the story and taping went well. It was really good to see the finished story and somewhat ironic and funny in a way with the placement of the MasterCard statement! I would have liked to have seen it live but television scheduling can be hectic and the decision to use it was probably last minute, so there was no warning to anyone involved with the story. I am just happy to help shed some light on the possible risks of using this technology. It is an interesting subject and worth looking into further."
"The fact that 'Mythbusters' were banned from investigating and/or doing a story related to this technology is disturbing but also understandable to an extent. Methods of stealing and copying credit card information shouldn't be advertised and made publicly available without proper countermeasures as readily available."
"However, if the technology is as secure and unhackable as they say, why wouldn't they be confident enough to allow people to publicly test it? It would reassure the public if all attempts are unsuccessful. A copy of the exclusive is available here."
The public is crying out to find their cyber-stalkers. We need a better system for the abusers. - 10 April 2016 - eVestigator® - "Already we have an abused flawed system where anybody can go in front of a Magistrate without a Defendant and make up anything they want and gain a interim personal safety / stalking or family violence intervention order. What is worse, is the courts do not punish liars for abusing the system with either made up evidence or none at all."
"People are tending to take basic investigation work into their own hands now. One would expect you need evidence to even get a hearing of who you Defendant is? Not so. There are some people out there that trick the Magistrates', and likewise Magistrates' that hand them out to compulsive liars like lollipops."
"This is an interesting article about people who need to ordinarily (apart from the above mentioned loophole) need to know who their stalker actually is. It is nothing special - it is merely a user driven database of phone numbers. It just shows what people will do to know what they need to know, before wasting court time. In any event it is a common trend that more and more people are using social networking and cannot make that exact connection to the Defendant."
"I have been very successful in this difficult task and help allow real victims to gain justice."
Legal counsel seminar a good day for all. Glad to hear the feedback! - 09 April 2016 - eVestigator® - "I would like to thank Legalwise for their invitation and the opportunity I had last month to talk to in-house counsel about cyber security. I just wish I had had a little more time to go into some activities I had planned to illustrate the dangers I was talking about. Maybe next time!"
"Feedback I received was very positive averaging at 4 out of 5, 1 being poor and 5 being excellent, I would say that is a good outcome and I'm glad people found what I had to say interesting and enjoyed my presentation, still I barely scratched the surface of the issues and risks businesses face today from not just without but within. It can be as simple as allowing an employee to use a personal device on the business network. This creates a vulnerable and possible point of entry if the device is compromised or if the employee is less than trustworthy and missuses or abuses the privileges afforded him or her. Being slack in deactivating former employees accounts and passwords also creates vulnerabilities."
"All the comments on my presentation were positive; 'presented well', 'interesting information' and ' it would be great to receive more practical tips' to list a few. The whole day was good for all attendees and the other presenters were interesting and engaging as well with 'high quality presentations', 'presentations were informative' and was 'one of the better seminars' I was a slide or two away from my conclusion when I had to wrap things up but I could have filled a whole day with the amount of information I could share, there are so many dangers and risks, one absent-minded acceptance of a seemingly harmless application can open up your whole network to a competent hacker. Always be mindful of what you are downloaded and accept the risks of what you are agreeing to when you chose to install that app. That is one of the most important things to keep in mind when it comes to cyber security."
New Cyber Threats Predicted this year. Is Australia equipped to handle them? - 07 April 2016 - eVestigator® - "Well I hope you have your cyber-plans ready. According to WIRED, these are the most predominant threats we can expect this year. I also would like to add that another major threat is the non-acceptance of cyber-crime being a crime like any other. Too many people shift the liability when at the end of the day, a crime is a crime. In my experience, there is just too much misinformation and lack of consumer awareness out there, partially given by insurance companies, banks and the like. Not even the courts seem to understand the technology that faces the crimes or judgments they have to deliver. I have had first hand experience in educating a court on what is essentially - yesterday's news. One step closer to Cybergeddon™. That is for a another day! For now, let's take a look at the expected cyber threats of 2016 and turn to our international colleagues."
"Extortion Hacks - Following the Sony hack in late 2014, we predicted that hacker shakedowns would increase in 2015. By shakedown, we were referring not to standard ransom-ware attacks, whereby malware encrypts or otherwise locks access to a victim's computer until the victim pays a ransom. We meant extortion hacks where attackers threaten to release sensitive company or customer data if the victim doesn't pay up or meet some other demand. With these attacks, even if you have backed up your data and don't care that hackers have locked you out of your system, public release of the data could ruin you and your customers."
"There's just one problem with tracking such attacks. If the victim caves and does pay, the public may not know extortion occurred. We do, however, have at least two extortion hacks on record for 2015: the Ashley Madison hack, which took down a CEO and exposed possibly millions of would-be cheaters to public ridicule and worse; and the hack of InvestBank in the United Arab Emirates, which resulted in the exposure of customer account information. Extortion hacks play to the deepest fears of companies and executives-if not handled well, company secrets are exposed, customers file lawsuits, and executives lose their jobs. Expect such attacks to become more prevalent in 2016."
"Attacks That Change or Manipulate Data - In testimony this year, James Clapper, the director of national intelligence, told Congress that cyber operations that change or manipulate digital data in order to compromise its integrity-instead of deleting or releasing stolen data-is our next nightmare. Mike Rogers, head of the NSA and US Cyber Command said the same thing. "At the moment, most [of the serious hacks] has been theft," Rogers said. "But what if someone gets in the system and starts manipulating and changing data, to the point where now as an operator, you no longer believe what you're seeing in your system?"
"Data sabotage can be much more difficult to detect than the kind of physical destruction caused by Stuxnet. That's because data alterations can be so slight yet have enormous consequences and implications. Anyone remember the Lotus 1-2-3 bug back in the 90s that would produce accounting miscalculations in spreadsheets under certain conditions? That was an unintentional error. But attackers could get into financial and stock-trading systems to alter data and force stock prices to rise or fall, depending on their aim."
"Certain types of data manipulation could even result in deaths. In 1991 a Patriot missile in Saudi Arabia during the first Gulf War failed to intercept an incoming Scud missile due to a software glitch in the weapon's control computer, allowing the Scud to hit an Army barracks and kill 28 soldiers. Again, this was an unintentional bug. But Chinese spies have invaded numerous US defense contractor networks in the last decade, raising concern among US military officials that they're not just stealing blueprints to copy weapons, but might also alter or insert code to sabotage the integrity of weapons systems and change how they operate."
"Chip-and-PIN Innovations - Any time the security community closes one avenue of attack, hackers adapt and find another. When retailers stopped storing customer credit card numbers and transactions in databases, hackers sniffed their networks to grab the unencrypted data live as it was sent to banks for authentication. When retailers encrypted that live data in transit to prevent sniffing, attackers installed malware on point-of-sale readers to grab data as the card got swiped and before the system encrypted the numbers. Now banks and retailers have begun rolling out new chip-and-PIN cards to thwart hackers once again."
"The cards contain a chip that authenticates it as a legitimate bank card and also generates a one-time transaction code with each purchase, preventing hackers from embossing stolen data onto fake cloned cards to use for fraudulent purchases in stores. But this won't stop fraud altogether; it will simply shift from brick-and-mortar stores to online retailers. In the UK, where chip-and-PIN cards have been used since 2003, card-present fraud-transactions done in person-has dropped. But fraud for card-not-present transactions-those completed over the phone or online-increased from 30 percent to 69 percent of total card fraud between 2004 and 2014, according to the UK Payments Administration. Neither a PIN nor a signature is required when customers use their cards online, so simply stealing card numbers is sufficient for this kind of fraud. Expect those online fraud numbers to rise in the US as well."
"The Rise of the IoT Zombie Botnet - There are many who say that 2015 was the year of the Internet of Things; but it was also the year the Internet of Things got hacked. Connected cars, medical devices, skateboards, and Barbie dolls, were just a few items shown to be vulnerable to hackers this year."
"If 2015 was the year of proof-of-concept attacks against IoT devices, 2016 will be the year we see many of these concept attacks move to reality. One trend we've already spotted is the commandeering of IoT devices for botnets. Instead of hackers hijacking your laptop for their zombie army, they will commandeer large networks of IoT devices-like CCTV surveillance cameras, smart TVs, and home automation systems. We've already seen CCTV cameras turned into botnet armies to launch DDoS attacks against banks and other targets. Unlike a desktop computer or laptop, it can be harder to know when your connected toaster has been enlisted in a bot army."
More Backdoors - The year ended with a startling revelation from Juniper Networks that firmware on some of its firewalls contained two backdoors installed by sophisticated hackers. The nature of one of the backdoors-which gives an attacker the ability to decrypt protected traffic running through the VPN on Juniper firewalls-suggested a nation-state attacker was the culprit, since only a government intelligence agency would have the resources to intercept large amounts of VPN traffic in order to benefit from the backdoor. Even more startling was news that the backdoor was based on one attributed to the NSA."
"There's no evidence yet that the Juniper backdoor was installed by the NSA; it's more likely that an NSA spying partner-possibly the UK or Israel-or a US adversary installed it. But now that companies and researchers know for certain what such a backdoor would look like in their system and how it would operate, expect more backdoors to be uncovered in 2016 as companies closely scrutinize their systems and products. And despite the fact that the Juniper incident shows that backdoors intended for US law enforcement and intelligence agencies can be subverted by others for their own malicious use, don't expect the FBI and NSA to give up on their quest for encryption backdoors in 2016."
AFP Subpoena email is a scam - 29 March 2016 - eVestigator® - "The latest version of this email apparently issuing a subpoena I have received, the AFP logo looks like it is a missing picture, this in itself doesn't prove anything as it could just be human error. It is the content and reason for the email that is suspicious."
"A little bit of fact checking, as simple as a Google search, will bring you to a link on the AFP website stating they do not send subpoenas by email and not to click any links in an email purporting to do so. If it had been genuine, the link would at least look like it directed to the AFP website but the link to the site to learn more and the link to download the supposed subpoena is exactly the same 'http://a-ip.com/H1fOYVRBS/Art0jP74.firstname.lastname@example.org' I have changed it only to exclude my email address."
"The link obviously does not go to the AFP website. a-ip.com is an automated invoicing service. It is doubtful they are actively involved in the scam but their services may be implemented by the scammers in some way. However, all you need to know is that if you receive this email you are not in trouble and you should just delete and forget it."
Fake love costs money - $22.7 million lost to dating scams in 2015 - 29 March 2016 - eVestigator® - "Having solved many of these myself last year I must say, I'm not surprised. This is the official figure now reported by the ACCC. It is reported that last year, 2,620 Australians reported losing almost $23 million to dating and romance scams to the ACCC. One of my clients' make up $500,000 of that!"
"Remember that it is eVestigator's advice that you need to check the source and destination of all correspondence. Love can be 'in the air', but if you have a look at our website there are ten golden rules you should read before making any decisions. This is all of what I call the makings of Cybergeddon™. It is the fake world. Believe in what you can see, feel and touch and if you can't, there is a reason."
"My client was dating on a Christian dating site. In this case, the scammer felt that religion was a vulnerability. It worked for them. I have recently had the opportunity to hear from a scammer's mouth the here lack of care and dignity as to the damage and affect this has on others. To them, it is a way of life. There will be more on this shortly. Remember also to check out my blog entry containing bank guarantees. I have something to say about the banks you might want to know."
By spying on your partner, did you know you may be committing an offence? - 26 March 2016 - eVestigator® - "It might be time to seriously evaluate your relationship when spying on your significant other becomes a viable option in you mind. You must get professional advice and support and not take matters into your own hands. There are things you can do but many things you can't do without a security licence and things that are plain illegal and unethical."
"Last year, a man was arrested in Spain for installing spyware on his girlfriends' phone, which was a gift from him with the monitoring software installed before he even gave her the phone. He was monitoring her messages, accessing her Whatsapp messages and her social media posts as well and could also activate the camera and microphone."
"Talk to eVestigator today about your concerns, options and actions you can take."
Fake Mobile Apps - A new medium for phishing - 25 March 2016 - eVestigator® - "As an avid developer of successful Android and iPhone Apps myself, its sad to see it come to this, but its not the technology, its the criminal. There's now malware out there targeting major Android apps including Google, Paypal, Banking, eBay and Skype among others. It is designed to mimic the login screen of 20 different banking apps from Australia, New Zealand and Turkey as well as the above. It overlays itself over the login screen inorder to capture your usernames and passwords and bypasses two factor authentication by intercepting authentication codes sent by SMS, forwarding it to the hackers and hiding it from the user. It gets onto phones by imitating Adobe Flash Player, which many websites require. Avoid this by only downloading apps from trusted sources like Google Play."
"If you are worried that your phone may be infected, check the list of device administrators found under the Settings > Security > Device Administrators menu. If infected, 'Flash Player' will be incluede on the list. Ignore warnings about data loss and remove 'Flash Player' from this list. Now it is possible to uninstall the malware via Settings > Apps/Application manager > Flash Player > Uninstall."
"If you can not access the Device Administration list for whatever reason it means there is malware trying to protect itself and prevent deactivation. Restart the Android device in Safe Mode, which disabled installed apps, preventing the malware from blocking access to the Device Administration list. Check your device manual or support website if you don't know how to access Safe Mode."
"Again NEVER download files or apps from unknown sources."
Australia Post 'Locky' scam emails - 25 March 2016 - eVestigator® - "The latest Australia Post email scam is very elaborate. Using advance scraping software, they scan social media to glean personal details like your name, address and occupation to make the email seem legitimate.
The emails refer to an undeliverable item with a link or download with more details.
The attachment or link it asks you to click looks safe to a lot of antivirus software as it is a small file or a Word document. However it actually contains malware called 'Locky', which runs a java script code that locks your computer files, demanding a bitcoin ransom worth hundreds of dollars.
If you are unsure about the legitimacy of an email Australia Post will never:
Ask you to click on an email link to print off a label to redeem your package.
Email or call you to ask for personal or financial information including password, credit card details or account information.
Send you an email asking you to click on an attachment.
Email you to reconfirm your physical mailing address by clicking on a link.
Call or email you out of the blue to request payment.
The above was taken directly from Australia Post's website. Most businesses that have been victims of these kinds of scams will have such a checklist to advise of email/telephone contact legitimacy."
eVestigator® presents at Legalwise CPD in-house Counsel conference on Cyber-Security - 20 March 2016 - eVestigator® - "If only there were more hours in the day. So much I had planned, I was expecting to hopefully find some time at the end to do some demonstrations at let people know where they have been (according to their mobile phone WiFi beacons) as well as giving them a surprise or two when they mysteriously email each other from one side of the room to another"
"The core topics were essentially based around how to mitigate a Cyber Attack once it has been established, and how to prevent such attacks from occurring. There was also some general discussion on liability. Interestingly we got to get through the content that needed to be shown and we can save the extra fun stuff for another time."
"A question was asked of me, and I had to be honest. I say it how it is. That question was somewhat like, 'What do we do with regards to this new Cyber-Insurance'? I asked, 'Do you want my honest answer?'. The crowd said yes - and I gave it to them! It is merely a new name for existing liabilities that are otherwise easy to label outside of a policy for the benefit of the insurer to remove liability and/or a new idea to make money for the same insurance the customer already held.' Essentially, I see it as a way of 'handballing'."
"I state, with all my experience, Cyber-Crime and Cyber-Security threats have always existed. A computer is like a watermelon. Where do you store that watermelon, how do you protect it, who uses it, does anyone take it home, can anyone put there hands over the window and pinch a bit to eat? The answer is yes, and it always will be. Computers don't do anything, people do!"
"Employee fraud is employee fraud in any case that I have done and should be treated by the police and the courts accordingly, regardless of how they committed that fraud!"
eVestigator® acquires cybersecurity.com.au and discusses Cryptology - 10 March 2016 - eVestigator® - "In celebration of this, Simon Smith (eVestigator®) is planning to use this site in the nearby future to enhance Cryptology Training and Online Safety. Simon has just finished a PD from the popular Cybrary series, entitled "The History of Cyber Security Intelligence
S3SS10N - Presented by George Schu."
"This short PD offers a background to the history of cryptology; which is the making and breaking of code. In this lesson, the instructor offers a brief background to cryptology dating 4,000 years ago with the ancient Egyptians and then goes onto the discuss the birth of modern cryptology. It describes that, Cybersecurity can be seen as a descendent of Cryptology. The making and breaking of codes dating back to biblical times and beyond."
"It is very useful to understand the history of Cryptology. The knowledge known to eVestigator® and repeated in this PD demonstrate a background to the history of cryptology; which is the making and breaking of code. In this PD, the instructor offers a brief background to cryptology dating 4,000 years ago with the ancient Egyptians and then goes onto discuss the birth of modern cryptology, and best Cyber Security Practices and Solutions."
"eVestigator® agrees with the genius Herbert Yardley (who is considered the Father of Modern Cryptology) and he dates back to World War I as he began his efforts after realising the United States did not have a focused cryptologic effort. He stated this would surely effect their ability to fight well in the war and persuaded the Army to set up an effort and as such, was hired by the Army to make this effort permanent and eventually gave way to the 'Black Chamber', which was credited in 1921 with cracking Japanese code, which was critical for the USA with negotiation with Japan at the end of WWI."
"Cryptology considered to be used and resulted in tremendous strides in World War II. Cryptology continues to grow and help the world keep an advantage on the forefront stage today and is one of the most important aspects of cyber security."
"eVestigator® will be introducing some new initiatives around this area shortly."
eVestigator® Invited to Channel 9 to demonstrate a new type of SCAM - 10 March 2016 - eVestigator® - "Cyber Forensic Expert Simon Smith (eVestigator®) is soon to appear on Channel 9 exposing a major new style of SCAM for consumer awareness sweeping the country. More shall be revealed after it is aired."
eVestigator® finds a peak in domain hijacking and registration SCAMS. - 10 March 2016 - eVestigator® - "Well it is obvious to say that we already knew we cannot trust a domain name. According to Google, a domain name 'User' is the legal entity they are dealing with, not the holder, not the company, nobody. So beware if you have Google Apps for business and one of your staff members changes the authentications settings and or assigns it to a Master Account outside your company. It's theirs! I have now more than 2 major Google related SCAMS and Frauds I am working on, and please take my advice above seriously as imagine what it feels like when you are told, "you have no proof of ownership of that 'account' despite owning the domain!"
"As an online expert and due to my own experience, and many of my investigations involving domain hijacking, it's safe to say I know the Worldwide Domain Name system backwards. Personally, I register a LOT of domain names. Another thing to look for is the now manipulated fake domain registration SCAM. You register a domain name (and of course you have probably seen similar SCAMS with Trademark Applications) and then you are bombarded with services emailing you from overseas claiming to 'finish off the registration' or 'properly register it or later renew it'. Again you have never dealt with this company before. Today I received an email entitled, 'Domain Registration Incomplete'. Note the word 'Registration'. Inside that email up comes 3 bright and beautiful trademarked logo's (obviously without permission) of the 3 potentially largest search engine logos in Australia. Google, Yahoo and Bing. The email was did not even go to the effort of informing me of my recently registered domain (note the word 'registered') - and note that is even if it knows I did, or it is a cold SPAM email."
"It was NOT picked up from Google SPAM and was sent from 'email@example.com'. Note: Always check who is sending you an email - no matter what it says, then check the reply-to address. This is what it said.
(Now that you've bought your domain, it's time to register it.
By registering and listing your website with the major search engines you are allowing your website to be searched by the entire online community.
You can verify and submit your website with Google, Bing, Yahoo and 20 other top search engines by clicking the button below.)
It is sent with a nice badge showing quality endorsement from 'Copyright © *2016 Official Domain Directory*, All rights reserved. PO BOX 12114 San Francisco, CA 94112."
"Now note that it says (Now that you've bought your domain, it's time to register it.) Not buying is registering. They are trying to confuse you into thinking that SEO work on the domain name is registering. Also note, that you are dealing with complete fraudulent SPAM with a reply-to address of 'firstname.lastname@example.org'. The bottom line, the word SPAM has changed into more the word Impersonation. Always be in control or have someone in control of your IT. I am auditing a company at the moment who has no idea how their $500,000 online business works. My first advice was more of a question. Please, get me the source code!"
eVestigator® takes on 600K SCAM. An email address does not identify an entity! - 05 March 2016 - eVestigator® - "Well what a week it has been. It seems that CyberCrime is getting worse and worse everyday. Someone behind a computer screen has a virtual concept that their actions and consequences are also virtual. This is not true."
"As this is a current investigation I cannot talk much about this case, save for the fact that a Goliath Corporation is involved, seeking to rely on what seems like just an email address. As you know it is very easy to compromise an identity and I will be presenting at the Legalwise CPD seminar exactly on this concept."
"Solving major cases of fact is what I do best, especially in the new war, the war of CyberCrime. There are not too many people who understand the potential of a hacker and what can be done. Needless to say I shall keep you up to date as to what the law considers a binding contract, as if it is relying on a representation via email, then the liability of due diligence on one or both of the parties must be resolved. Who's responsibility is it to ensure they are not compromised, and if so, is the civil repercussion a duty of negligence in not detecting by the other side? These are hot topics at the moment. As a Cyber Technologist, I plan to present case studies on both sides."
eVestigator® invited to speak at Legalwise CPD Counsel Conference - 23 February 2016 - eVestigator® - "On Friday, 18 March 2016, at the Intercontinental in Melbourne, Simon Smith will be teaming up with Melissa Kirby from Sharpe and Abel for the Legalwise CPD. He will be appearing as a Forensic Cyber Expert Witness and presenting useful advice and anonymised case studies designed especially for in-house Counsel when dealing with Cyber attacks."
"He is proud to be invited to speak at the 9th Annual In-House Counsel Conference seminar, focussing on the very challenging and new specialised area of CyberCrime Loss Mitigation. It looks like it is going to be a great event. In-house counsel can be asked for all kinds of advice-some legal, some business and some off the record personal questions from co-workers. This blending of roles and responsibilities creates a very challenging legal and ethical landscape for which there is a depth of clear guidance."
"The seminar addresses several issues facing in-house counsel today, and my topics discuss case studies of 'When Your Organisation Faces a Cyber Attack' and 'How to mitigate a typical cyber attack of Denial of Service (DDoS), or potential theft of trade secrets and IP after the event?"
"It also addresses the very important issue of 'What steps should be taken to establish quantum of damage to the organisation?' and 'How to best implement lock down and typical methods used to locate the offender.'"
"I have the pleasure of presenting with Melissa Kirby, Founder of Sharpe who specialises in working with engineering and technical professionals, supporting clients and keeping their businesses safe through difficult times during the Asian Financial Crisis, the Global Financial Crisis and all the times between. Ms. Kirby is the Legal Director of Sharpe & Abel and I will be discussing real life scenarios that as a Forensic Cyber Expert Witness/ Private Investigator - eVestigator to provide valuable intelligence in this area."
"I look forward to seeing all attendees there and am grateful to be part of a well structured, and well organised event."
For the second time eVestigator succeeds on second opinion - 19 February 2016 - eVestigator® - "In no way does this blog entry take away from the good work that my colleagues do as I believe that everybody has unique skills in various areas and deserve equal recognition for those skills. In choosing a forensic investigator it is often difficult to determine whether you will get the outcome you want, the outcome you don't want or any outcome at all. I have completed two cases recently where I was able to successfully satisfy the customer by achieving a result that another respected high profile Forensic Investigator could not achieve at almost half the cost.
My main philosophy in investigations is to deal with facts only. Especially in cyber-crime, it is safe to say I've had extensive experience in IT and security, most acclaimed via actual practical work as I just happened to have grown up at the right time when the little baby we call the "consumer internet" was born. The point of this entry is to state that knowledge and skill is relevant not to someone's age or potential doctoral degree in an ever-changing industry, but to the actual hands-on physical experience (in my case 20 years) of software engineering at a master level and teaching others to do similar.
If you are looking for a true forensic cyber expert who actually has won cases, has the knowledge of not only the entire programming language of the internet but the backbone of the very beginnings, which is lacking in every university degree today, then look no further than eVestigator. Sometimes innovation and thinking outside the square can provide an outcome that nobody else can provide. To understand the depth of knowledge that eVestigator brings into an investigation, it is wise to look at the broad range of qualifications on this website combined with the broad range of actual outcomes. The reason why I have a 100% success rate to date, is because I am adaptable to change my methodology, writing my own code and not relying on a piece of software to conduct my investigation. eVestigator in fact writes the software most often if necessary because no two cases are the same.
So it pays to get a second opinion and evestigator does have a 100% success rate because he will only complete a job with the understanding and co-operation of the client that the strategies that can start off and change is led by him and not interfered with. It is only when a strategy is interfered with that eVestigator chooses to not participate in an investigation. It is otherwise his nature to complete in full, from scratch every task he starts to obtain a factual result for the client. Opinion is secondary."
eVestigator® attains UNSW Global Pty. Ltd Expert Witness Training Certificate (Unisearch) - 13 February 2016 - eVestigator® - "What a marvellous and fact-filled event with a great deal of wonderful professionals all around. Starting with the Trainer, Mr. Hugh Selby. I'm utterly impressed, he says it how it is! He is unbelievably honest and truly is passionate about the profession, and is an expert Barrister who also specialises for Unisearch at UNSW Global Pty. Ltd, interstate and overseas as an Expert Witness Expert!"
"Hugh Selby is a very experienced Barrister and co-author of the multi-volume and online publication "Expert Evidence". Hugh teaches "courtcraft", both in Australia and overseas, to prosecutors and advocates, police and experts across many disciplines."
"Giving Expert Evidence is quite a craft, and I commend Professor Hugh Selby for his absolutely inspiring teaching abilities and knowledge of first hand subject matter, and FRANKNESS! Unisearch are a great service for all kinds of Forensic Experts. I was able to meet Forensic Accountants, Forensic Psychologists, Forensic Criminologists and it was very rewarding."
"I am very honoured to have done the training and will be very happy to becoming a member of this prestigious organisation who naturally is a very professional well knowledged Expert Witness Company that manages the procedure from lawyer/client-expert-lawyer/client-court and the millions of possible events along the way!"
eVestigator®'s Gains WASC Accredited IT University USA (CHFI) Accreditation - 13 February 2016 - eVestigator® - "CHFI stands for 'Computer Hacking Forensic Investigator' and was awarded on the 10th February 2016 by IT University based in California. The University is WASC Accredited. WASC accreditation also places ITU among the recognised list of institutions on the U.S. Department of Education's database of recognized institutions of higher learning and the Council for Higher Education Accreditation's Listing of Accredited and Candidate Institutions (CHEA)."
"ITU is also recognized as an approved institution by California's Bureau of Private Postsecondary Education (BPPE)."
The Subjects covered with depth included Computer Forensics, Forensics Investigation Process, Searching and Seizing, Digital Evidence, First Responder Procedures, Forensics Lab, Hard Disks and File Systems, Windows Forensics, Data Acquisition and Duplication, Recovering Deleted Files and Partition, Using Access Data FTK, Using EnCase, Steganography, Password Crackers, Log Correlation, Network Forensics, Wireless Attacks, Web Attacks, Email Crimes, Mobile Investigation, Investigative Reports, Expert Witness and more."
eVestigator® provides forensic evidence in 4 of Australia's largest SCAMS! - 09 February 2016 - eVestigator® - "Well there was such thing as justice, or was there? I have cooperated with ACORN and given them intelligence that lead to some of the most major discoveries of direct hit IP addresses behind some of Australia's largest SCAMS. One being a major dating SCAM, now claimed over $510,000 and being misled by banks to place the onus away from the consumer guarantees under the Australian Consumer Law, and the other being the fake Microsoft 'tech support' SCAM which is well known - where somebody purporting to be Microsoft calls an unsuspecting user and is told their computer is infected."
"They then get them to download a Trojan Horse that purports to be merely remote control software, and in fact is, with a little bit more. They then use it to lock the person's computer at a very high OS level demanding payment to fix the problem. This was reported to my client, and then by me to ACORN. ACORN accused me of not reporting the data I found, when this is how they treat their customers. I inform my clients that they are a reporting network, but still via the AFP and Interpol they could make an arrest with my data, but not so."
"Here is a letter given with permission from the original client that 'got their backs up' just because I was doing my job. I have anonymised the letter for the client and have full permission from him to publish it. I make no comment as to its contents or otherwise. The customer and I have the right to freedom of expression and speech. Here is his most recent letter. I can unfortunately do no more for him, as mentioned on my website I contacted ACORN with consumer concerns and it was not well received, in fact, it resulted in what will most likely be contested legal action for alleged false statements and misleading statements and ethical standards complaints to the police. It is actually my belief that the banks are answerable to this and are shifting liability setting people up for failure when their own website is supposed to protect them and even guarantees this under various circumstances. It is important to note, that a bank is neither legally able to Investigate nor purport to be an authority making a decision without Police intervention. The letter he permits goes as follows"
"Dear Sir / Madam
On XXth Nov last year, the Bank External Investigations contacted me to advise that I had been scammed after an online romance. I will not go into details as the details are irrelevant. I was told they (XXXX Bank) could not do anything more and to submit a report on the ACORN website, which I did the following day.
Subsequently, I have submitted a further 23 reports as it is the only means of actually reporting any suspects, including phone numbers in Australia and Malaysia, bank account details in Australia and even beneficiary addresses overseas. I have submitted a substantial amount of evidence to enable Authorities in Australia and Malaysia to act on seeking the perpetrators and in fact all the possible money mules or persons colluding with the perpetrators.
I have had to play money launderer as a last resort to try to bribe the XXXX Bank to take some action to involve the AFP which to some degree may have worked.
As a last resort, as my own finances are completely negligible now, I informed XXXX Bank External Investigations that a deposit of $XX,000 in my account from an unknown sender would remain frozen until it was was investigated by the AFP. I received a call from the XXXX CID . According to XXXXXXX, the call was in in relation to my last ACORN report. To my knowledge XXXX CID may not have received the report as a result of the ACORN report, and may have been a result of XXXX Bank's report to Vic Police.
I used $XXX of the unknown deposit to hire a very efficient and ethical Forensic Investigator to trace the IP addresses of the two perpetrators successfully and without any doubt, and his report was submitted on the ACORN.
To date and after three months without any communication from the AFP, other than an email from the XXX Police stating that the case was in the the hands of the AFP on 4th Dec 2015, I have had no communication.
My concern is that:
The ACORN really doesn't care
The ACORN is too slow to respond, given real time information
And as a result- the evidence is no longer useful.
To cap off there are another 5 victims of this scam known by the XXXX Bank in Australia who have full knowledge and all the details and in some way they can be considered accountable in the loss of possibly $1.5M.
The prime suspects can be located in South Africa and Nigeria. Found by eVestigator®.
I request a reference to report this to the AFP Ombudsman.
What happens when a victim self sabotages their own case? - 04 February 2016 - eVestigator® - "If you were to visit a Doctor, and engage a Specialist, you would do so because of their experience. Sometimes I have seen the victim without realising it, introduce self harm into their own case."
"They say you can lead a horse to water, but you cannot make it drink. This is very true. Sometimes in cases, the victim actually is so entangled in the emotional trauma that they play 'investigator' and lose sight of the massive amounts of obviousness small pieces of advice from an external expert point of view can make. It ends up turning into a sheer path for self destruction. My policy is, that I will not work with anybody who does not take my suggestions - because the hard work in setting up all the layers for an outcome is interfered with if it is not isolated to 1 person who can and will make a change for the better."
"I think a priority list is vital for clients so that an Investigator can understand the exact facts which are required first, prior to seeing the 'Goliath' of information. Things are actually pretty simple and easy if you take a systematic approach. I have had great success with every single client, and in speaking to others in the industry - it is a common trend that you need to set a plan and stick to it."
"Results and facts come from research. I am a factual investigator, I don't give 'opinions'. I leave no door open. The key to a good outcome in an investigation is communication and understanding of overall value and accomplishments one wishes to achieve, and as with all others in the industry - it is clean sailing from there."
"I am happy to say my strategy is succeeding and by having some common rules in place it is possible to avoid situations that displease customers. You only have to look at my testimonials. All of these people followed my advice and received an 'outcome' after research without interference. When I send an invoice I don't see money, I see outcomes and injustices, and think of ways from the information I've given to correct such injustices."
"It is also important to help your client not become misinformed, as sometimes they get the wrong advice, even when you know the outcome. Sometimes, however this is out of your control. It is fantastic to see positive results and I continue to see them. I just wish to advise any potential customers to allow yourself help, and help will come to you."
"I often go out of my way and use other contacts and expertise that compliment services. This has and can end up saving customers hundreds of thousands of dollars. eVestigator® is like the lollipop (man). I help direct, and strategy is so important in this area. When you are at the investigative stage, after initial research, you start to see extreme value for money."
"Being a Family Dispute Resolution Practitioner, Marriage Celebrant and author of books on Grief and Trauma I can see the signs of 'self sabotage'. Depending on the case, it is good to choose an investigator that has a cross range of abilities in all areas, still performing a sole service, but at least there is an awareness."
"I say it how it is, and don't tell somebody what it is that they want to hear, I speak the truth and I speak based on experience and fact gained from cases I have been involved in and resolved. The level of communication is required on both sides to come to a fruitful outcome. Here are just some of the comments I have received in the course of helping people."
"It takes 2 to tango they say! These clients are gold and I want to applaud them on their trust and belief to get them successful results. I ultimately take your instruction, but be prepared for honesty. If I recommend something I am happy to explain why - and how later it can save you. All these sample customers I applaud for showing strength in their traumatic times, yet maintaining themselves from the potential to 'self sabotage'."
"Full cooperation and confidence that everybody is on the same team is a must to produce successful outcomes. Three cheers for these successful happy customer examples!"
Thank you customers!
* "Intellectually, he is clearly a star."
* "Brilliance is an understatement."
* "It took a long time for me to turn for help but turning to Simon was the best thing I could do."
* "Simon saved me 10's of thousands if not hundreds of thousands of dollars with the lawyers and he got me the results I needed."
* "Simon is also a genius computer programmer, who has helped find cyber stalkers, assisted ASIC find and prosecute unlicensed practitioners"
*"Hello Simon, I just wanted to let you know how encouraged I felt after speaking to you"
"Simon's findings from forensically examining both an iPhone and an iPad gave me almost too much information than I was prepared for"
* "He knows the workings of the internet, that's a fact."
* "Thx Simon. Through all this as much as I have learnt about how nasty and shady people are, I have met a lot of good honest ones! You are at the top of the list."
* "I am very impressed with your work. Submitted another report to ACORN re the CBA XXXXX account, and complained about the lack of action."
* "Thanks for all your help, greatly appreciated."
* "Simon is the utmost professional that goes beyond what's on paper"
* ""He genuinely cares about your well-being and mental status"
* "It took a long time for me to turn for help but turning to Simon was the best thing I could do"
* "I am very impressed with your work. Submitted another report to ACORN re the CBA account, and complained about the lack of action."
* "Simon stood by me and saw the process through. He was not just a Forensic Investigator."
* "Simon was directly requested to volunteer some advice and put forward a willing participant on Channel 7's Today Tonight program"
* "I recommend Simon fully for any investigation as his programming and forensic investigation skills are outstanding"
* "Simon not only solved my case but from Today Tonight's expert request, he enabled me to explain some views on Cyber-Bullying"
* "I have gotten to know Mr. Smith over the past 10 years, both as a person and as a Computer Programmer. As a Computer Programmer, Mr. Smith stood out, from early in our relationship, as an articulate and perceptive programmer. He has shown a tenacity in dealings with several International Companies and Governmental Departments"
* "Simon saved me 10's of thousands if not hundreds of thousands of dollars with the lawyers and he got me the results I needed"
* "Simon was onto the lawyers and made sure things were done!"
* "I highly HIGHLY recommend Simon and eVestigator® especially to sort out the lawyers and give amazing factual results."
* "He was smart enough to get the actual evidence from the cloud and the iPad at the end of the day didn't even make much difference! He is superb."
* "I am a great judge of character and you, especially you, have given me strength to go on. Thankyou so so much, you are a gem.
The Banks and the Increase in Cyber Crime in Australia - 03 February 2016 - eVestigator® - "It is evident in cases that I'm currently performing that cyber crime has increased dramatically over the last three years. There are now smarter ways for criminals masking their identity that contributes to the typical attribute of misinformation that is used to target vulnerable people. I have noticed an increase in dating cyber crime especially in the Christian sector as there is a higher level of trust among Christian dating site users and it appears that one may come to the conclusion that a particular religion seems to be an innocent victim. I say that this is not so. It is a guess that potentially in the past has worked but anybody is a victim in these strategic cyber crimes that I am witnessing. Mostly what I'm seeing is a co-operative team of individuals that work both nationally and overseas. Nationally they are able to open up Australian bank accounts and overseas they are able to concoct stories as to the transition from the Australian bank account to a Malaysian, Nigerian or South African bank account. There is however one major flaw in this whole system. I question the banks and I put them on notice that they themselves are negligent in the way they handle or attempt to handle what they consider to be cyber crime."
"The lay customer is the victim and the bank is the commercial entity that is ultimately performing the transaction. Take this analogy; imagine you are buying a fridge from your local retailer. If you experience problems with the fridge within seven days of your purchase and your retailer tells you to call the manufacturer then your retailer would technically be (and this is not legal advice) in breach of the Australian Consumer Law being the Competitions and Consumer Act 2010. Ultimately the responsibility lies with who you pay or who commits the conduct. The banks have guarantees that are considered to be consumer guarantees and they protect customers against fraud. However, I find it ironic that the banks themselves will not communicate with police or to higher authorities to report such fraud, I wonder why this is the case. I believe that the banks would ultimately be reporting themselves because the result of the banks reporting that they have given money to a criminal would ultimately give responsibility back to the bank and their consumer guarantees when it comes to online safety and digital fraud."
"There are three massive cases at the moment I am dealing with where I am going to be recommending legal action against the banks in addition to cyber forensic data that identifies the criminals internationally that was obtained through propriety cyber forensic methods as it is obvious that the IP address of such criminals isn't forthcoming. My understanding is that the banks have an obligation that, again without indicating any kind of legal advice, could possible put them into a position called 'Unconscionable Conduct'. I suggest anybody who has any issues with digital fraud to contact a forensic investigator like myself if they get nowhere with the bank or the police."
"There is another angle to this that everybody is missing. Ultimately at the end of the day, the banks may very well be contributing to the fraud by rewarding those who are actually engaging in fraud. Without getting into specific conduct of a particular case that I am currently working on, I would like to state that this is most likely the case and I will be making reports to the Australian Federal Police of this nature. I strongly advise every person to read their guarantees that the bank give them and the Terms & Conditions that they rely on when they conduct internet banking and/or permit others to conduct internet banking on their behalf and the way that the conduct is intentionally hand-passed to multiple liability and discovery sources like ACORN, the banks fraud team, the local police, INTERPOL and the Australian Federal Police."
"As a forensic investigator, I can tell you now that the banks have a lot to answer to and any person who is experiencing such problems should contact me immediately."
$200,000 dating scam BUSTED by SCAM expert Simon Smith! - 21 January 2016 - eVestigator® - "I had the pleasure today of using special forensic techniques to attain the exact IP address and location details of a massive dating scam that involves potentially hundreds of people in a pyramid style dating arrangement. I have requested my client report the details which nobody has (specific IP/Device/UA String) to ACORN, and really hope for the benefit of all victims ACORN will use the AFP to make Federal arrests."
"This involved Australian bank accounts and a series of people both in Australia, in Singapore and wait for it, Nigeria. I must say that this is not the only case that involves this kind of money. I am just about to release a press release in this matter as I have grave concerns that the banks are involved. At least in this one case I have evidence that suggests that the bank are not cooperating with their Fraud guarantees. This is a major issue for Australian consumers and must be reported to the public."
"There is more than one SCAM like this I'm working on. People forget the part the bank plays in this, and the level of protection and security they are entitled to. I will be advising in my report to my client that he provides ACORN with specific information that in this case implicates the bank, at least allegedly by way of conduct and advise that the ACCC must be involved. So far I have solved over $750,000 worth of SCAM's."
"The proof is evident, the scammers are exposed and I shall update you if the police update my client. For once we hope the countries can work together. The details (all except my incriminating findings) have been reported to ACORN. My findings are the "Golden Bullet" that will enable an exact location and arrest. I not only found out the true IP of the SCAMMER's, but the method and scheme they use. Innocent people are setup as part of the scheme in a massive money laundering exercise. Sadly the banks take the so called unproven "victims" word for it, however I shall be reporting to the AFP this conduct as the banks are neither investigators nor are they the police. They have however frozen money in my victim's account due to unproven information and they will have to answer to the ACCC and the Banking Ombudsman as well as the AFP, because not only did they witness the victim being used in the SCAM, they are rewarding an alleged "victim" by freezing his account."
"Nevertheless you cannot get a better result than the source, and that is what shall be passed on to ACORN. I will also be making my own recommendations to the AFP on this matter."
Ending a Relationship? Make sure you know what you are entitled to! - 18 January 2016 - eVestigator® - "Story of the week is more some useful advice. As a Commonwealth Family Dispute Resolution Practitioner (and trainer thereof) and Forensic Investigator that deals with extensive Personal Safety Intervention orders, I see a lot of 'hiding' of assets."
"One such example is, that if in the event you are going through a divorce (ironic that I'm also a Commonwealth Marriage Celebrant) but life is very unpredictable to say the least, you need to know your rights. Usually you see the typical behaviour that is similar to that of what I call a "pre-stalker". You see some niceness, then some dictatorship and a bit of control and maybe more niceness and what looks to be open attempts to 'help' the other party."
"I have done many cases like this where help=hide information. If it happens, and if it must happen, then remember that nothing is black and white in the Family Court but don't be bluffed by what people 'say' the judge is likely to do and get scared off during mediation. At least do your research. $1 spent on my forensic services could not only get results but save $5 spent on lawyers writing unnecessary discovery letters."
"One such case presented and I am happy to say that due to my services she is at least $200-300k better off than what she was 'told' she was getting. Much of what I do is facilitate the 'Project'. I don't see an investigation as one simple fact. I see it as a project. A project that I can coordinate all parties, save you money and get you results. The only time this is affected is when you are presented with a brick wall, then we need to knock it down!"
"The moral of this story is when it comes to divorce and money, trust nobody, get facts, then get lawyers for the important parts. Don't waste all money contesting wills, or assets in churning letters up and down. You may be missing a $200k term deposit sitting in one parties name that is half yours!"
Computers vs Humans, Processes -> Models -> Outcomes. Biometrics and voice example - 08 January 2016 - eVestigator® - "Many people can recognise a person straight away by their face and also sometimes by their voice. But how do computers recreate or examine a face or voice for what a human brain would assume is equivalent."
"Firstly as a master programmer and lecturer for over 25 years, a developer of innovations, I will be the first to admit that the 'computer' is not at all the only tool in my toolkit for forensic IT services, however it is a necessary tool though as it forms part of a process which leads to a method and produces an outcome, with the addition of many other sub-components, all of which rely on each other. Imagine a computer is just a giant calculator that can do nothing until you press the buttons. Well that is true. However, can you press the buttons 240,000,000 times a second? I draw similarity to today's programmers who make 'websites' and work as I used to as Senior Anlayst Programmer with popular tools. People think that a template or software is the be all and end all and nothing else matters. They invent many words and accreditations for nothing more than a heavyweight unreliable set of locked down (or even worse not locked down your way) code. When I first started programming I literally had to draw every pixel on the screen. If I wanted to do something intelligent I would have to do it low level. Nothing has changed for forensics, but for programmers it has."
"What is it that has changed? Programmers have got lazy and trained to use pre-built templates. The issue with this is you lose all the control in between (and you inherit their bugs). I have written many API/SDK/plug-ins as a programmer FOR programmers because nowadays there is not one method to use some magic software the way you want you to use it 'exactly' for. So, you lose creative control, increase security risks not knowing all the code and/or everybody knowing the open source code and risk your entire business or assets on someone's "playground". You can see my certificates and credentials below and yes they are a token but how do you do cyber forensics if you're a template trained expert or trainer?"
"My answer is you simply can't. Imagine a painting hand painted half way; you can't touch the first half. The point I am making is that a good expert does not have to mention software packages (and all the jobs on job sites are direct evidence of people wanting to employ puppets of these products) they should be able to do ANYTHING AT ALL. Notice in that statement there was no mention of a computer?"
"Recently I was asked to both forensically analyse a voice and reconstruct a face. The first thing that came into my mind was OF COURSE, THAT'S EASY AND I'VE DONE THIS MANY TIMES. The first thing that would come into perhaps another mind is hmmm I'll try to go to Google and look for free software that does that. So because I understand the raw mechanics of any sound file I don't need fancy named software. I just write my own! Take that logic and look at the human face, facial reconstruction and recognition, or any biometrics for that. At the very basic level an expert should remove the computer from the question and ask themselves how I as a human could do this (understanding that the computer has an incomprehensible advantage over a human in consistency and is necessarily sometimes an absolute must to form a method as a process, with its speed and other advantages). Without getting into artificial intelligence concepts which I actually call Official Intelligence, I am happy to report a successful outcome."
"If someone says can this be done and a human can do it, the invention and intelligence lies in what you can do with that computer that makes a difference to the outcome to form that piece of the puzzle, not what the computer is going to do for you. There are plenty of parts to a method and system even in everyday life, but they should be treated as one element to complete what would be necessary to complete the next element, and so on. Such a process creates a method, which creates an outcome. It is no indifferent to any other necessary piece of the project, for example investigative ability or data extraction. Computer Forensics and implementation is necessary to do things that are still logical but out of absolute reach of the normal way of thinking, it is strategy. It is the strategy that forms the process which creates the method which produces the outcome - it really is that simple but not many people understand this (not even some Government departments). The use of a computer in forensic investigation is a necessary component as a whole and does nothing not as the sole attribute. It is also the same for the reverse. Without a computer, computer forensics (in the nature of this article) would not form the process that creates the method. Computers are necessary for their speed and collective use to deliver a logical outcome. If you take one piece of the puzzle out that is the heart of the puzzle in any process then there is no process. So in reverse if someone claims to be an expert in XYZ named software, what they are really saying is 'I am an expert in using somebody else's restrictive set of rules'."
"The moral of this blog it to give an expert's point of view to distinguish fact from fiction in how a process that uses a computer is required but not the magic tool or sole tool people thinks it is. We tell computers what to do. They do it faster and either make a workable process or make an impossible process! To understand the backbone and the place of the computer in any process, it is necessity to value the hardware contribution and not the software, and that contribution may be utmost necessary to create a real process or strategy. In my eyes that is what defines innovation."
If a pineapple was able to give mechanical benefit of the raw unparalleled computer (just being one necessary component to the entire system) then you would use the pineapple, and it would be mandatory! In Forensic Investigations as we are doing facial reconstructions and voice analysis, to attain a match you need speed but you are still relying on what you first opened your eyes to as a baby. It is the mechanics of the human mind in picking the tools necessary to create the method and process that attains a result in both innovation and investigations, and this requires strategy."
I caught the stalker stalking the stalk-ee yet I uncovered the stalk-ee as the stalker - 05 January 2016 - eVestigator® - "Well it did not take long for the stalkers to come out. Well this was an interesting case that I'd like to share with you. Imagine finding a stalker that is the victim to stalking and being presented with the person being charged for stalking, and turning the tables?"
"Well it happened. I managed to completely reverse justice in this instance. Firstly, stalking is a crime and should be reported to the police but cyber-stalking is something new to this country. This is something I am an expert in as I grew up through the birth of all versions of the consumer internet and saw where things went wrong as a programmer from the age of 11."
"So, I was approached by a guy who was accused of stalking and had a LOT to lose. Despite stalking usually being treated civilly, it is dangerous, because if you get an AVO, IVO or PSIO against you it has criminal repercussions. I should know - I've got someone put to jail on a suspended sentence on this very subject. But what I did for this client was not only cost effective but well worth it. I performed some IT forensic work on his computer and found that the very person that attained a 'ex-parte' application for an intervention order was monitoring him before, during and after they sought that order."
"I'll say that again. The actual 'victim' was monitoring every email of the alleged 'stalker' whom she had forced out of the house by perjuring herself in the Magistrates court and not telling the full story. It was in fact her that was stalking him. After some simple evidence on paper (as I always report only fact) - and a mention, things reversed quite rapidly for the Applicant. So let us just say at the mention things reversed pretty quickly. It was a small but ironic success."
"It just goes to show, you can't hide behind a masked IP address from eVestigator®"
Happy New Year Everybody - and on comes identity fraud! - 01 January 2016 - eVestigator® - "First of all Happy New Year, and we do hope that you take this year to look at your cyber security techniques and learn ways to prepare for what I call CW3, Cyber War 3. Essentially, it is already happening in front of our eyes."
"This year started off with a client being the victim of Identity fraud, which branched out into credit card fraud, and very rapidly became an international fraud syndicate."
"Simon Smith (eVestigator®) is currently working on this case and cannot reveal anything until data is confirmed but it is safe to say that due to the rapid discovery of information, the pieces of the puzzle are all fitting together nicely, waiting to be finalised and validated, then reported to the AFP or ACORN."
eVestigator® solves the Fake Microsoft Support Scam (gives ACORN IP info) - 26 December 2015 - eVestigator® - "Well, this particular customer only lost $1500, but as an ex-ACORN unhappy client, he was very happy to see that I was able to identify a unique IP Address and Date/Time of the attacker. This was reported to both the ACORN and the client."
"Now, with our support hopefully an arrest can be made. We were able to find all the Australian details that our client tells us ACORN dismissed, but went one step further and via strategic Digital Forensic Programming, captured the scammer red handed - with all his/her IP details, including browser, language, origin - essentially enough information to put them away for a long long time."
"If you want your Cyber-Crime or forensic crime solved in any jurisdiction, there is only one person that can get you there. Give Simon Smith a call on 0410 643 121, and at such a minimal cost, this client is now happy that their scammer is caught. Naturally we are working on some large scale cases - but this SCAM revealed an "Indian" operation that we probably never will know the outcome of - and of course, as ACORN told the customer they could not do anything about it the first time, now hopefully with the help of eVestigator® they can. That's another success story to end the year with!"
eVestigator wishes everybody out there who is a victim of Cybercrime hope - 25 December 2015 - eVestigator® - "I wish to let you all know that no matter how hard or how big your matter is, it is recommended to take these couple of days and get some clarity and know that I will help you with your issues when you need. I am not planning a major break but there are some times I will not be available. If you are the victim of cyber-crimes or cyber related activities, know that you can still attempt to contact with me during this period."
eVestigator refunds customer a portion of invoice for doing too good a job! - 21 December 2015 - eVestigator® - "Well, we have a new win - and a victory for the client in 2 ways! For the first time in history within less than 24 hours I had achieved an outcome for my client from what seemed a massive cyber-stalking case involving an unknown stalker - with 3 Facebook profiles."
"Ironically, my first set of intelligence hit the nail on the head. Within a bit more than half the time quoted, I had actually identified the stalker of multiple forms of media - attained for my client a full 1 year intervention order default judgment and the stalking stopped."
"So in this case it took me less time and I returned the outstanding funds to my client! This is why people trust me because I do the right thing. Even though giving money back is essentially unheard off (say if it was another profession for a fixed price job) - with me, it's fair and it makes the client happy."
Sample dating scam - that just came my way - 19 December 2015 - eVestigator® - "It's almost a daily exercise for me deleting thousands of SPAM (as I don't trust SPAM filters) and of course amongst all this SPAM is the human check of reality which I can detect in about half a second."
"Here is today's dating scam that happened to make its way to my inbox. As I always say, how do they know me, where are the purportedly writing from and where am I purportedly responding to and do I even know this person and if so, why would a non-identifiable random email just pop into my door. So welcome to Svetlana."
"Hi,Im Svetlana. Are you for real?!
Im interested in knowing you better but Im not sure what are you looking for?
Send me your reply directly and I will send my pic."
"Now this came from email@example.com - va at qatarairwaysvirtual.net. I don't recall having anything to do with this surprisingly. Most importantly (and not that it matters to me) but we have a reply address of "firstname.lastname@example.org" email@example.com.""It's important to realise that Russian girls called Svetlana don't just randomly email you when you have not visited to a chat site, and even if you did it would be a giveaway because they don't even know your name!"
WARNING: New Scam Email purporting to be National Australia Bank - 19 December 2015 - eVestigator® - "Dear customer,
"In our precautions against internet fraud, our bank comes up with a new policy to prevent costumers from being victims of illegal transactions."
"There are 2 steps required in this procedure, in order to avoid problems with your account."
"What should i do ?
The email is as follows :
1. Download the attached file and open it on your internet browser.
2. Confirm that you are the owner and follow the instructions carefully!
Thank you for the cooperation and once again thank you for choosing our bank.
"Naturally this is obvious - always look at the reply to address and the sent from address. Further check to see if it was actually sent to YOU and whether or not it even mentions you. Of course you should report this to the police/ACORN."
"Another obviousness is the spelling and grammar mistakes in the bank email. We all make mistakes, but you would think that a multi-million dollar institution would have a spell checking system!"
Phishing scams are all over the place, look out for the latest one - 16 December 2015 - eVestigator® - "A new email purporting to be from PayPal is lazy and one of the easier to spot scams. The subject line is 'Limited Account Please Update'. The logo looks to be the right colours otherwise it looks completely different, it starts with 'Hello Dear Customer', there are grammar errors and the sent address is firstname.lastname@example.org."
"If you are still not sure and they did actually guess or have your full email address correct, not just the domain, from a new browser window login to your PayPal account. If your account really has been limited there will be a very prominent message on your account to tell you so. Some scams can be hard to spot, with great attention to detail. This isn't one of them."
Sony Corporation wishes to inform you that your Identity/Location has been endorsed as the winner of $1million - 12 December 2015 - eVestigator® - "Well today I'm feeling lucky. I woke up to this:"
"Please send Ur Name address age Tel for More Info.
Mrs. Barbara Deemer
[Your Sony Key Code: SYUK0303#]"
"I WON! It's amazing. Firstly let us take a look at the email domain it comes from: Sony iPrize (email@example.com) seems interesting, but I want to know how it got to me. It is sent to: winner (firstname.lastname@example.org), with a reply to address of: email@example.com"
"Well, so a) they didn't know who I was, b) they are not Sony and 3) what has Yale got to do with Sony? In this instance I deem it obviously as fake and unless someone at Yale is fraudulent, then I would count this as SPAM."
"The moral of this story is 'phishing' is the art of purporting to be someone or some entity you are not. This could probably be just someone trying to bring down Yale's servers in a DDOS attack. Either way the first thing to look for is 'Why me, and is it really me they are sending to or is it generic?' The second thing to look at is at 'what domain does it actually come from and is it the domain of the real company?' Then you need to look at any reply-to addresses, as people might use a legitimate spoofed sending name and address and beautiful graphics to fool you, but if they want your details, unless they are Sony, the reply to address will tell you really where you are sending your personal information to."
"Typically, a scammer would make a domain or add a sub-domain to an existing domain like firstname.lastname@example.org or email@example.com."
"Finally as Judge Judy says, if it doesn't make sense, it's not true! She's very right"
Grief and Trauma and how an Investigator needs to understand - 08 December 2015 - eVestigator® - "I am the former CEO of Australia's largest marriage celebrancy Academy. I authored and taught thousands of students via my own written course materials in grief and trauma, conducting funerals and the like. I also draw upon my Graduate Diploma in Family Dispute Resolution, Nationally Accredited Mediator status and Bail Justice Training Course as well as relationship education experience as a marriage celebrant and counseling qualifications."
"This week has started off with some pretty serious cases m An Investigator by all means should not claim to be an expert in this area but at minimum I believe must have some training to enable them to determine whether a case is needing to be paused pending more important health reasons. At least having a toolkit of referral information and some training to determine whether or not you can rely on instruction from your client is mandatory."
"I have often had to suspend the case asking my client to consider first attaining outside help. I sometimes must rely on such expert medical opinion to ensure I am doing the best job for my client. Investigators have to have empathy and know where they stand and clarify instructions carefully as for both parties it is not conducive to the case, if the client is unwell. I have direct experience in handling such cases and especially knowing how to detect and refer."
A simple fast victory stopping 1 year of trauma - 05 December 2015 - eVestigator® - "When somebody knows your every move you have to wonder how? Most importantly it is best to get onto it straight away and not put up with threats or extortion as it is a crime and potentially the longer you leave it, the higher probability of data loss and more emotional trauma."
"I succeeded today in an extortion case where people may think they are safe behind a mail.com email, a fake Facebook account or a prepaid mobile, but think again! Whilst sometimes there are technical restraints, a good investigator has to use logic and simply strangely enough common sense. An arrest will be made and justice will be served in this case for only 2 hours cost to the client of my time and I get to enjoy the weekend too."
An investigator does more than just the job at task - 05 December 2015 - eVestigator® - "In a current case I am working on I noticed on the side a discrepancy in the billing and conduct of previous dealings in the case. Completely voluntarily I offered my client to look at the legitimacy of those charges and do a little bit of forensically informed conciliation. Bang. 13,000k given back to my client they never would have had. I give my all to every customer so when looking at an investigator you need to look at the proactive capacity and passion they have for their work. They were over the moon and never would have known about this."
"Having built some of Australia's largest educational institutions valued at over $26m as well as being an expert auditor I had no trouble in just 3 discussions and 4 emails attaining in a separate capacity $13,000 worth of credit for my client of which I sought no benefit rom. I just like people not getting taken to the cleaners! $13,000 was welcomed, believe me."
"In a similar unrelated case I anticipate just through my mediation and conciliation add on skills, I may have spotted an opportunity for my client to recover up to $40,000 for unlawful charges. In no way am I a debt collector and in no way do I want to be one :), I am just making this statement to show my intuition and problem solving skills out of court. I am not a lawyer and do not ever claim to be one, but I am certainly equipped to understand what is right and what is wrong, both ethically and in common sense human behavior."
"There are lots of good lawyers out there and I rely on them sometimes to present my expert evidence. The point of this blog is with me, you don't just get a phone call or suspicion without supporting evidence, you get fact (and fact only - good or bad) and action if there is action to be taken on any angle. That is why people choose me. Please feel free at any time to view my Vocational and Higher Education level Qualifications above."
eVestigator succeeds again. Finds a criminal stalker forensically in 4 minutes - 05 December 2015 - eVestigator® - "Yes you heard correctly. Never before has it been this easy. Investigations are not just about expert computer forensic knowledge. They are about strategy. People often ask how much to find this person? How long is a piece of string that has cuts and twists and tangles all the way through? Strategy and direction and the complementary knowledge of having grief and trauma qualifications and teaching this discipline, a counseling diploma, combined with being a Nationally Recognised Mediator as well as a Family Dispute Resolution Practitioner, Marriage Celebrant and having a qualification from Victoria University in the 2011 Bail Justice Training course lets me have some level of directional intuition. Hence, 4 minutes :) The customer is very happy and that is the main thing! "
Just a quick note to keep your eyes open wide on the media as eVestigator has busted potentially Australia' Biggest Scam - 05 December 2015 - eVestigator® - "Well I must not say too much until it is charged but I uncovered one of Australia's if not Australia's biggest scams and forensically identified the offender. Keep an eye on the media."
ACORN - I must say I'm shocked - 02 December 2015 - eVestigator® - "May I direct you to the section of the website dedicated to what I have achieved and discovered from some disgruntled ACORN customers of which many cases I have solved. Please read the article which will be updated regularly near the top of this site. "
Timing of police serving intervention orders - 01 December 2015 - eVestigator® - "Well you have a victory, you do the hard work and attain an intervention order on behalf of your client and over 24 hours later the cyber stalker strikes again. In this instance with the excellent assistance from the police it is not served yet but may be in a day or two. It is fair to give everyone an opportunity to be served but it is a hit and miss on the timing opportunity. A breach and arrest would have been made but there is always next time!"
What happens when a client doesn't take your advice? - 01 December 2015 - eVestigator® - "This is often a sticking point for most Investigators/Mediators. You may have seen the text book scenario unfolding so many times and yet if somebody believes they cannot do something they cannot do something."
"Similarly if someone believes they can do something they can do anything! I wish to report another success story today. A dangerous stalking/harassment case turned nasty where I saw the alleged 'victim' almost having conversations with himself setting up a plan for an intervention order"
"I predicted this action in the words spoken and am very proud to say that this person who was alleging they were the victim and constantly harassing my clients, building a story ready to get an ex-parte 'lollipop' injunction. I therefore instructed my clients 2 sets of important advice. One - go to the police but 'in a certain way to a certain officer' and Two - go ask for a statement to be made again 'in a certain way in a certain manner' and Three - ask for the police to take out a Personal Safety Intervention Order as this man is likely to breach it as it was getting so obsessive and dangerous to the point of physical danger to my clients lives - and guess what - they got it!"
"A good investigator doesn't sit there and watch people they know 'human nature', 'process' and 'procedure' and naturally, areas of failure and potential human barricades. This advice worked perfectly and now they can concentrate on living safely after years of harassment, bullying, false accusations and stalking. That was a good result."
"Those that don't listen to advice or believe in an outcome will get that outcome, there has to be a point where trust is earned and respected, and then justice can prevail!"
The line between Defamation, Stalking and Imagination - 30 November 2015 - eVestigator® - "Well another successful week has passed. I have solved 4 cases this week. People often don't realise the crimes they may be committing. This week we have seen people lie and caught out by me in court, false imaginative creations of stories of which they may have lied to a Magistrate but don't realise my evidence won't only overturn their allegations, but potentially get them in jail!"
"No matter how it is framed, if you lie you may leave a digital fingerprint that gives you much more than you ever bargained for. Let's just say that if you think you are anonymous behind six Facebook accounts, think again. Upcoming will be a rather large blog entry relating to how the Internet and social media will destroy our privacy and show what I already see now as the new war so many are untrained to understand. The Cyber War!"
eVestigator® annihilates an intervention order action with a forensic defense - Who really is the stalker? - 28 November 2015 - eVestigator® - "This is a story that I'd like to share with you, anonymously of course. It is a well-known fact that people can lie in court and in Victoria (the Acts change but represent similar systems in other states) the Personal Safety Intervention Orders Act allows a person to enter the stand ex-parte and allege an incident and occurrence, and likely achieve an interim intervention order potentially destroying someone's life for the next 2 months before they get a contested hearing."
"This is an area that I forensically specialise in and would like to share the story of how useful a Forensic Factual Investigator can be in these instances. Understanding that there is a serious risk of an order being placed on a person (if it was not a correct series of events), the bigger risk is the breach. I have done over 50 cases but none like this. A breach could potentially give someone jail time and a fine depending on the complexity of the breach and the police's willingness to follow through with it. Remember, all this can be initiated civilly with a lie."
"One such case occurred where my client was alleged to have been stalking a person and keeping him under surveillance. After only 2 hours of forensic investigation of her iPhone, social media links and internet behaviour, I found concrete black and white evidence that his exact iPhone was logging her under surveillance before during and after the interim intervention order was granted!"
"Even further I found it had been going on far before and way after. The evidence I committed was compelling. It happened to coincide with what people don't realise could be a digital fingerprint. I suppose, if a person who accuses they are being stalked, and goes on the stand under oath, and then my client comes up with the name of his iPhone literally stating say "James's iPhone" has logged in every day to her account before during and after he placed an intervention order, then that is somewhat strong. More so, it was found coincidental to be happening after the order was granted with the release date of the iPhone, and forensically the phone was proven to have had its password physically changed and tampered with during these events, and synced to his iPhone."
"Not only for my client did this mean that they are actually the ones being stalked, a crime of surveillance has been committed, and the use of her mobile phone was intentionally tampered with to set the new password as my client could always login via the phone but not the computer. The tracking and forensic data further proves that my client was potentially the subject of GPS surveillance. So it looks like someone is up for charges. My client for just a couple of hours has probably saved thousands of dollars in unrecoverable legal fees in a no cost jurisdiction and has evidence to charge him with perjury, stalking, and using an electronic device to track a person."
"So I'm guessing that the gentleman that attained the intervention order without truth is going to regret ever getting on that stand. eVestigator® gets results."
Best Outcomes Advice - 02 November 2015 - eVestigator® - "Although it can be hard to know where to start, to take full advantage of any investigation time it is important to be clear in your brief to us so we can focus our attention in the area you need. Carefully consider the worth of new information compared to what you know and take a 'needle in a haystack approach'. These messages relates to successful iPhone, iPad and Android investigations, and believe me when I say if you think you have deleted something, think again! Sometimes not even the device is needed to attain intelligence. We have succeeded in this area and have many happy customers attaining answers that are crucial to them. Some criminal, some civil, however all equally promoting the same message."
The 'Cloud' (a friend or foe) - 09 November 2015 - eVestigator® - "The lesson for this week is to be careful what you put on your iPhone or Android device. Regularly backing up your devices is prudent, but pay particular attention to where you are backing anything up to and also how they protect the transmission and redundancy of the data."
"A lot of people find value in open source 'solutions' and 'plugins' like Word press and all these magical instant websites and themes (I call it a lazy man's programming- sorry but I'm just being honest). Not that there is anything wrong with a template but that is not logic. From what I've seen in relation to hacking, you want to say thank you for the visual and goodbye to the 'supposed' programming. Real programming (in my opinion) is to control and write my own code, I'm sure you can appreciate if someone knows the exact code behind your entire website, they clearly can read backwards and reverse engineer such 'common' open source. This could cause criminal or civil repercussions or identity theft."
"eVestigator® can forensically search and locate any remnants and security holes of corporate networks to properly and securely backup (or perform an emergency forensic data restoration) efficiently with both redundancy and security, keeping in mind (in the case of individuals) privacy. Imagine a non-programmer running your entire income stream of which you have no access to the code behind it. Then one day, all your income stops and an error pops up. What would that do to your business?"
"We have extensive experience in larger cases and have had quite a few wins. One such client won an uncontested hearing and is now gratefully seeing the end of a tormenting period of time and benefiting from the complimentary and combined skillset of eVestigator®, plus the $200k default judgment we helped control and coordinate with handpicked lawyers might have put a smile on her dial!"
Android Devices - "Apparently the FBI has fined you - 11 November 2015 - eVestigator® - "The latest amazement of the week was the famous modal screen bypassing all your Tablet or Phone with a message stating that you have been caught by the FBI watching porn and must pay a fine. 3 minutes and it has gone, but people these days create scams and viruses in a new way. Think of the psychology behind it. Everyone probably has an eBay account. An email purporting to be eBay can be made up by someone in about 5 minutes, leading to a $1 domain called ebay123.com for example.
"Amazingly it looks exactly like eBay - because its merely a capture of the screen. The lesson here is in one of my golden rules (check the reply email address) - although even that with a virus affecting your local DNS could spoof that. However the point of the message is about the psychology. Who doesn't have an eBay account? The lesson here is to look at the start and the end (not what you think is the middle). Did you make such a transaction or debt, and who are you communicating with. eBay is the trick. It diverts your attention away from the real method of the SCAM which is so obvious, but by then you've already seen the colour logo's, clicked the links and sharing your identity with someone in a foreign country."
eVestigator® gets IP Address to solve cold Acorn and High Tech Police Cases in Record Time, attaining a Suspended Jail Sentence as against the Defendant. "In 2 separate cases, eVestigator was approached as a last resort by some very unhappy victims. One had been waiting 5 years, the other 1 year. It is good to see the government is doing a great job in 'determining' there is a problem - with this new 'war' - the 'Cyber War'. It is fair to say it is also ever-changing and new technologies and ways of security breaches and exposure to identity via social media is expanding at an enormous rate. The cases are naturally very complex and can lead to both criminal and civil liability. However, there was a case that sat with the Victorian High Tech Police Unit for over 5 years (one of eVestigator's cases many years ago) which was solved in just 2 weeks from Cyber Investigation, leading to a possible sentence to jail or suspended sentence."
"How? Facebook, intelligence, common sense and other mechanisms. Further, he has also just solved a case that was delivered to Acorn gathering dust for over 1 year, in 1 day. Further, he has personally seen factual wrongdoings from IBAC. This is just Victoria!"
"The message is, that clearly there needs to be more emphasis or resources on education at a young age because people simply don't know where to go, and in both instances, the delay was potentially more damaging than the conduct found in the investigation. It still is no doubt a good thing for Parliament to have mechanisms in place but are they working? Also the crime itself is half the story. The trauma and grief that follows the victim from being held waiting can lead (and has lead) to people having to get themselves onto mental health plans merely due to the injustice and time delay."
eVestigator attains a massive victory and solely defeats the entire WA Government Training Accreditation Council board's erred decision worth proving the government does not even understand their own regulatory definitions. "Well everybody said it could not be done. eVestiator® Simon Smith invented, successfully passed at audit and created a massive private accredited training college like as big as a Private TAFE.
The Training Accreditation Council however refused to a) make a decision in breach of legislation (despite 3 of their chosen auditor's declaring a pass on the audit) and b) refused to register the RTO (Registered Training Organisation).
A skills recognition initiative (the largest private institute in the southern hemisphere)."
"After 3 years of demands against the board who had no lawful excuse 'not to grant it' to make their decision so it could be appealed, so they did, on baseless grounds.Almost 2 years later, evidence from eVestigator® Simon Smith (of which Slater & Gordon could not achieve) given on appeal to the State Training Board deemed the Training Accreditation Council to have erred several times in breach of the standards not once, but twice, and reversed the decision around 5 years later.
The damages are expected to be at minimum $20m. It is noted though, that the WA Ombudsman was completely wrong and justice sometimes does exist. This cost WA thousands of jobs and skills upgrades and deteriorated market growth from Mr. Smith's creation. The State Training Board were undermined and forced to reconvene twice and found in Mr. Smith's favor twice - and later stated words to the effect of, "Never before have we seen anything like this", and have requested the Minister make changes to the system. Mr. Smith is unable to make any comment as to this matter.
In addition to our other feeds, we also provide this feed courtesy of the Australian Competition and Consumer Commission and SCAMWatch which show different kinds of trending scams. The most accurate place to look however, is my blog - as I report scams as I investigate them.
Sun Jul 24 13:39:50 UTC Splendour in the Grass: tens of thousands enjoy music festival as weekend wraps up - Tens of thousands of people have flocked to this year's Splendour in the Grass over the weekend as the music festival wrapped up on Sunday night....
Sun Jul 24 13:36:33 UTC LNP's Barrett Centre closure inquiry response was in bad taste - Which inquiry was a witch hunt? ...
Sun Jul 24 13:35:00 UTC Police searching bushland near Mitchell River National Park for missing Queensland teen - Police and SES are searching bushland at Cobbannah for a Queensland teen missing since Sunday morning....
Sun Jul 24 13:24:44 UTC Amber alert issued for 5-year-old girl missing from Nerang - Police, SES scour area near M1 searching for missing girl....
Sun Jul 24 13:22:36 UTC Mark Lanegan review: Showcase of evocative songwriting - Former Screaming Trees frontman back in the country as part of Splendour In the Grass....
Sun Jul 24 13:20:07 UTC 'She didn't ask for it': is this why women don't get the top job? - sfddsffsd...
Sun Jul 24 13:04:44 UTC Airbnb, TripAdvisor, ProductReview: We still trust strangers' recommendations - On a daily basis we trust strangers we connect with....
Sun Jul 24 12:46:30 UTC Player dies after tackle in masters football match - Player died after being tackled on Sunday afternoon....
Sun Jul 24 12:27:27 UTC 'Maybe two more murders': Roberta Williams - Letters taken from a prison computer used by underworld killer Carl Williams may implicate him in more murders, his ex-wife says....
Sun Jul 24 12:21:35 UTC Australian activist Sybelle Foxcroft faces charge over Thai 'tiger temple' closure - An Australian activist whose investigations led to the closure of a "tiger temple" in western Thailand faces a defamation charge brought by the temple....
Sun Jul 24 12:10:25 UTC 60 Minutes: Failed 'child recovery' reporter Tara Brown returns with Rozelle blast story - Controversial 60 Minutes presenter Tara Brown made her return to the program on Sunday night but there was no mention of the failed Lebanon child snatching that led to her absence. ...
Sun Jul 24 12:00:08 UTC Bomb scare at Queenstown Airport after note found on Qantas plane - A bomb scare triggered by a note found on a Qantas plane has caused an evacuation of Queenstown Airport in New Zealand on Sunday afternoon....
Sun Jul 24 11:45:10 UTC Wests Tigers coach Jason Taylor hails young halves Mitchell Moses and Luke Brooks - Jason Taylor wanted ownership from his halves. And he got it as he relishes the semi-final pressure in the final six weeks of the season....
Sun Jul 24 11:35:49 UTC Fraud crackdown gets software upgrade - Software for cracking down on shoplifters and "drive-offs" at service stations may be able to help banks fight fraud, Westpac's venture capital fund claims.
Sun Jul 24 11:32:58 UTC NRL season 2106: Wests Tigers attack too strong for St George Illawarra Dragons - The attacking abilities of the individual Wests Tigers players proved to be the difference between the two teams in their comfortable 25-12 victory over the St George-Illawarra Dragons....
Sun Jul 24 11:22:46 UTC Not all attacks are terrorism, says Attorney-General George Brandis - A senior government minister warns against the loose use of the word 'terrorism'....
Sun Jul 24 11:19:13 UTC Man arrested over Geelong stabbing - A man has been arrested and another is seriously injured after a stabbing in regional Victoria....
Sun Jul 24 11:15:44 UTC Hold parties to account - The presence of a businessman-come prime minister has raised recent discussion in the media on the parallels between running a business and running a government....
Sun Jul 24 11:05:54 UTC Melbourne City Council's $70,000 pigeon loft turned into scrap metal - It was meant to be a deluxe bird house to encourage the city's worst feathered pest - the pigeon - away from Melbourne's grand old buildings....
Sun Jul 24 10:59:29 UTC Rio Olympics 2016: athletes' village 'unliveable' - The troubled Rio de Janeiro Olympic Games have arrived at the first major crisis, two weeks before the opening ceremony. The Australian Olympic Committee confirmed on Sunday evening that the athletes' village has been deemed uninhabitable in the short term. It is unclear if and when competitors will be able to move in....
Sun Jul 24 10:56:48 UTC AFL season 2016: GWS Giants pull the plug on Port Adelaide Power finals - GWS Giants have virtually shut the finals door on Port Adelaide and secured their first finals appearance in their fifth year....
Sun Jul 24 10:56:16 UTC Funny Girl review: Production sure to keep you entertained - Funny Girl featured in The Production Company's debut season in 1999. Since then, the company Jeanne Pratt founded has flourished, which makes this revival an enticing prospect....
Sun Jul 24 10:50:52 UTC 'Anyone can build a future': private sector heeds the call to help refugees forge way in Australia - From a life spent dodging bullets in his war-torn village in Burma, refugee Htun Htun has found himself in a more welcoming place....
Sun Jul 24 10:43:30 UTC Brisbane's Writers in Residence program announced for 2016 - The Chaser and former Fairfax columnist Mike Carlton will headline program....
Sun Jul 24 10:39:35 UTC AFL 2016: Richmond coach Damien Hardwick slams 'shameful' Tigers - Coach disappointed by defensive efforts in last-quarter fade-out, Hawks' Clarkson hails Mitchell after 'sloppy' win....
Sun Jul 24 10:36:05 UTC AFL 2016: Hawks, Mitchell, keep on keeping on - Indomitable force Sam Mitchell shines in his 300th game, as the Hawks claim a resounding win over Richmond.
Sun Jul 24 10:08:11 UTC AFL season 2016: Western Bulldogs hardly done and dusted just yet - The Bulldogs have become very used to overcoming obstacles in season 2016. A good reason even their latest spate of injuries is unlikely to break them....
Sun Jul 24 10:07:19 UTC Wests Tigers boss Justin Pascoe says club will review Robbie Farah comments - Wests Tigers chief executive Justin Pascoe says the club will this week examine comments made by Robbie Farah in which he took aim at coach Jason Taylor for dumping him from the NRL side....
Sun Jul 24 10:07:13 UTC Premier Mike Baird's inner city indoor arena could be scrapped like Moore Park stadium - A second pillar of the Premier's $1.6 billion stadium plan is at risk of falling over....
Sun Jul 24 09:55:43 UTC The 1975 review: Boy band or rock band? It doesn't matter to the fans - If you have never heard of The 1975, don't be fooled by their name, or their look....
Sun Jul 24 09:47:34 UTC AFL 2016: Brisbane coach Leppitsch feels reborn, 'no inkling' on long-term doubts - Coach says list-stripping leaves him feeling like a rookie, looks to ongoing support from Brisbane Lions' board after win over Essendon....
Sun Jul 24 09:33:44 UTC 'They electrocuted me' says Indonesia's death-row prisoner nearing execution - A Nigerian man facing imminent execution in Indonesia tearfully told a court that police electrocuted his genitals to force him to confess to possessing heroin....
Sun Jul 24 09:27:37 UTC Munich shooting rattles German calm despite lack of Islamist threat - Terrorism's idiocy defies rational appraisal but Germany has been somewhat immune to radicalism of the Islamic variety....
Sun Jul 24 10:30:15 UTC Family hides in fear as gang of thieves robs Springvale house - A family of six hid in terror in a bedroom as a gang broke into their house and stole two cars. ...
Sun Jul 24 09:07:44 UTC NRL: Canberra Raiders firing on all cylinders as playmakers tweak game - Blake Austin wants to use Canberra's challenging end to the season to prove they're a top-four calibre team. ...
Sun Jul 24 09:05:37 UTC Canberra NPL: Cooma Tigers hit Monaro Panthers for six - Creative Cooma control Monaro, cold and wind to win 6-0....
Sun Jul 24 09:04:30 UTC Basketball: Canberra Gunners fall to Albury in SEABL despite late comeback - The injury-plagued Canberra Gunners have shown they're prepared to fight for a SEABL finals spot despite falling short 96-91 against Albury-Wodonga at Belconnen on Saturday night. ...
Sun Jul 24 09:19:12 UTC Professional bull rider Lachlan Richardson takes on US cowboys - Professional cowboy Lachie Richardson doesn't take any bull from the big boys in the US, writes Michael Evans...
Sun Jul 24 08:46:25 UTC Rio Olympics 2016: IOC meeting to make critical decision on blanket ban for Russia - As the clock ticks down to the opening ceremony in Rio, international Olympic leaders are facing a seminal moment....
Sun Jul 24 08:44:37 UTC Stephen Dank quiet on explosive claims against AFL after vowing he won't be silenced - Stephen Dank vowed he would not be silenced after a bullet grazed his face during a drive-by shooting in Ascot Vale, but the disgraced sports scientist was tight-lipped on Sunday and refused to elaborate on the "bombshell" he planned to deliver at an event in Bendigo....
Sun Jul 24 08:37:48 UTC LNP pledges to lift time limit on abuse claims - Survivors would be able to seek damages from abusers at any time....
Sun Jul 24 08:33:54 UTC VFL wrap: Western Bulldogs young guns in frame for senior call-up - The Western Bulldogs are likely to call upon youngsters such as Bailey Dale, Joel Hamling and Lukas Webb in their time of need against Geelong at Simonds Stadium on Friday night....
Sun Jul 24 11:44:15 UTC Fears for Melbourne's west as huge growth outpaces infrastructure - When John Gibbons arrived as a councillor at the then Shire of Werribee 20 years ago, it was growing - but not particularly quickly....
Sun Jul 24 08:30:47 UTC Brumbies to 'break even at best' from Super Rugby qualifying final against Highlanders - Small crowd due to the weather gives Brumbies a likely loss from Super Rugby final....
Sun Jul 24 08:27:54 UTC Trump, Hanson are on voters' wavelength - The editorial headline "Trump's extreme pitch aimed at scared, ignorant" (July 23-24) is misdirected: it's the political classes and their opinion minions that are ignorant of how to connect with a disenfranchised electorate and they're scared, really scared, because it would seem Donald Trump, Pauline Hanson and their ilk aren't.
Peter Fyfe Erskineville...
Sun Jul 24 09:35:03 UTC Wests Tigers topple St George Illawarra Dragons minus Robbie Farah - In his heart of hearts, Robbie Farah might have been hoping he would gain a whole lot from doing not much at ANZ Stadium....
Sun Jul 24 08:25:33 UTC NRL: Stats back Canberra coach Ricky Stuart's belief Jarrod Croker is unfairly criticised - Canberra Raider Jarrod Croker has heard it his entire career – "he's a point-scoring machine, but he can't tackle"....
Sun Jul 24 08:15:49 UTC Michael Moore announces Donald Trump will be president - Provocative documentary filmmaker Michael Moore has announced that 'this wretched, ignorant, dangerous part-time clown and full time sociopath is going to be our next president'....
Sun Jul 24 08:14:20 UTC Supercars Championship: Craig Lowndes boosts title hopes with Ipswich SuperSprint win - Just when it looked like Jamie Whincup and Shane van Gisbergen were taking hold of the Supercars championship, their veteran teammate Craig Lowndes has issued a timely reminder that he is far from out of the fight....
Sun Jul 24 08:07:17 UTC Kim Green wary of former Swifts coach and her Magic touch in semi stoush - The NSW Swifts will be aiming to thwart the golden touch of their former coach Julie Fitzgerald in Monday's trans-Tasman semi-final against the Magic in New Zealand.
Sun Jul 24 08:03:34 UTC Michael Cheika says Australian rugby players need to be more mentally resilient - Australian Super Rugby players need to be more mentally resilient if they are to beat New Zealand sides, according to Wallabies coach Michael Cheika. ...
Sun Jul 24 08:46:49 UTC More country rail crossings to get safety boost after V/Line smash - Fourteen more unprotected rail crossings in country Victoria will be fixed by April....
Sun Jul 24 08:00:07 UTC Queen's stayer set to race in Melbourne Cup - Some of Australia's most astute form analysts believe that the Queen Elizabeth-owned Dartmouth could well become outright favourite for the $6 million Melbourne Cup if the horse makes the trip this spring....
Sun Jul 24 07:59:24 UTC Set of Six: Cronulla Sharks to visit league HQ to lobby for home semi-final - A personal plea from Paul Gallen and Michael Ennis is behind Cronulla's plan to visit League Central on Monday morning to demand a home final in week one of the play-offs. ...
Sun Jul 24 07:57:29 UTC AFL season 2016: Collingwood out to break first-term curse - Collingwood need to find a way to break their string of dismal first quarters, but Steele Sidebottom admits he does not know how they will do it....
Sun Jul 24 07:55:56 UTC Pokemon Go players descend on Perth city for pub crawl - There has been a large turn out for Perth's Sunday afternoon Pokemon Go pub crawl, however numbers were significantly less than anticipated....
Sun Jul 24 07:54:57 UTC About Town: Christmas in July markets at Queanbeyan Showgrounds - Locals headed to the Queanbeyan Showgrounds on Sunday for a taste of Christmas in July....
Sun Jul 24 07:37:12 UTC Canberra Raiders Cup: Woden Valley Rams not sheepish about semi-finals hope after Tuggeranong win - Woden Valley Rams are confident they will be more than just nuisance value if they make the finals....
Sun Jul 24 07:35:13 UTC Brisbane Traffic: Motorcyclist injured in serious crash on Ipswich Motorway - Emergency services on the scene of serious crash....
Sun Jul 24 09:47:37 UTC Cabrini Hospital upgrades emergency-call system after mother's cry for help goes unheard - One of Melbourne's top private hospitals has upgraded its emergency nurse paging system after staff failed to respond to the screams of a bedridden mother whose newborn baby stopped breathing....
Sun Jul 24 07:32:57 UTC Sydney weather: Cold mornings ahead as wind chill bites - Sydney shivered through another chilly Sunday, as the mercury struggled to rise to the heights of Friday's near-record July temperatures. ...
Sun Jul 24 09:03:41 UTC NRL season 2016: Shane Flanagan says Cronulla Sharks deserve to play semi at home - Cronulla coach Shane Flanagan believes video referees are actively trying to find reasons not to give tries after the Sharks were controversially denied a four-pointer to Ben Barba in their big win over Newcastle yesterday.
Sun Jul 24 07:08:02 UTC Acland Street closure to bring the worst of both worlds, traders fear - In two weeks, just before 1am on August 8, the last car will drive along the southern end of Acland Street, then the traffic barriers will go up and Yarra Trams will begin to convert St Kilda's famous shopping strip into a plaza....
Sun Jul 24 07:04:37 UTC Stadium Stomp climbing to new heights at the Gabba - Stadium Stomp fundraiser helps Mater Hospital open pregnancy centre....
Sun Jul 24 07:03:01 UTC Craig Lowndes rockets back into Supercars title contention with Ipswich victory - Holden star Craig Lowndes has rocketed back into Supercars title contention with a dominant display on Sunday at Queensland Raceway....
Sun Jul 24 06:55:45 UTC Victorians' poker machine losses rise to $2.6 billion - Victorians have lost $2.6 billion on the state's poker machines in the past 12 months....
Sun Jul 24 06:47:32 UTC Man charged with murder over Lithgow stabbing - A man has been charged with murder for allegedly stabbing to death another man at Lithgow on the NSW Central Tablelands. ...
Sun Jul 24 06:36:59 UTC Investors watching inflation, central banks - All eyes will be on this week's inflation figures which might nudge the RBA towards another rate cut. ...
Sun Jul 24 09:31:53 UTC Bulls & Bears: PokémonGo and Nintendo - This weekend's release of PokémonGo in Japan saw shares rocket higher still, but analysts are divided over the future of Nintendo. ...
Sun Jul 24 06:27:51 UTC Live AFL: Port Adelaide Power v GWS Giants - Follow the action from the Adelaide Oval as the Giants look to climb up the ladder....
Sun Jul 24 07:30:20 UTC Cronulla Sharks rout Newcastle Knights to extend record winning streak to 15 - Another game, another win for the Cronulla Sharks, as they notched 15 straight with an easy win over the Knights....
Sun Jul 24 06:11:29 UTC Brisbane Lions ease the pressure, keep Essendon Bombers in last spot - There was no clear-cut draft prospect for these teams to try and play for. There was no Jacob Weitering Cup, no Lachie Whitfield Shield, no trophy named after Tom Boyd....
Sun Jul 24 06:07:34 UTC Time is now for synthetic track as NSW loses $2 million worth of races in winter - Yes, it's wet in winter. But has it been so wet that more than $2 million worth of races have been lost or repositioned through 18 meetings in less than two months?...
Sun Jul 24 06:06:06 UTC Tom Papley re-signs with Sydney Swans until 2018 - Tom Papley has re-signed with the Sydney Swans until the end of 2018. ...
Sun Jul 24 05:58:50 UTC G20 will use "all policy tools" to protect growth as Brexit looms - CHENGDU, China, July 24 (Reuters) - Leaders from the world's biggest economies are poised on Sunday to renew their commitments to support global growth and better coordinate actions in the face of uncertainty over Britain's decision to leave the European Union and growing protectionism....
Sun Jul 24 05:57:18 UTC North Melbourne should have been AFL powerhouse: Brent Harvey - North Melbourne could have been as big a club as Collingwood or Essendon had it capitalised on its success in the 1990s, veteran Brent "Boomer" Harvey says....
Sun Jul 24 08:36:38 UTC Australian first in-utero spina bifida surgery performed in Brisbane - Surgeons perform prenatal in-utero surgery to treat fetus with spina bifida....
Sun Jul 24 06:49:15 UTC ANZ Championship: Queensland Firebirds defeat Southern Steel to reach final - Defending champions Queensland Firebirds have booked a spot in the trans-Tasman netball league title decider with a thrilling 67-64 win over Southern Steel in their semi-final....
Sun Jul 24 05:55:51 UTC Super Rugby: There is a valid point amid ACT Brumbies coach Stephen Larkham's anger - There is a valid point amid Stephen Larkham's anger. The Brumbies don't get a lot of sympathy from punters. ...
Sun Jul 24 06:02:48 UTC ACT Brumbies coach Stephen Larkham getting closer to decision on Wallabies, Super Rugby future - ACT Brumbies leader Stephen Larkham will make a decision on his coaching future as early next week....
Sun Jul 24 05:53:42 UTC Back to back 5km wins for Mark See in the WAtoday Swan River Run - While most of us were still tucked up in bed on a chilly Sunday morning Scarborough physiotherapist Mark See was busy sprinting to the finish line and taking first place in the 5k race in this year's WAtoday Swan River Run....
Expert Witness Simon Smith
As a certified Expert Witness, I am able to provide credible facts and opinions in expert witness format for any Australian Court or Tribunal. An expert witness, commonly known, is a person whose opinion by virtue of education, training, credential, skill or practical experience, is accepted by the Judge, Magistrate or Member as an expert. In Australia, the courts and trbunals have specific rules for experts. The decision maker(s) consider the witness's specialised (scientific, technical or forensic) factually informed opinion about an article of evidence or in many cases, prior to a hearing, facts before the court within the expert's area of expertise.
I have provided many "expert opinions" and "factual explanations". I personally prefer to provide factual explanations to avoid doubt. My duty is to the court to deliver "expert evidence" within the area of my expertise. My testimony is open for rebuttal by testimony from other experts or by other evidence or facts. Please see below on some tips of formally starting the briefing process of an expert witness:
When instructing the expert, you should explain the way the fact or opinion will be used and where. You should explain the experts' obligations and the limit and scope of the brief. It is important to also both verbally and in writing cover the specific elements of the case and the specific issues that the expert is asked to clarify or answer. This is vital as it forms part of your written 'Letter of Instruction'. This sets out the scope and expectations of the expert, and is used as the main referencing point. It is vital that the wording is clearand concise. Ensure that the exact elements of fact or key issues and any assumptions are identified, along with the specifc questions for the expert. Note that it is typically not an expert witness's job to 'Investigate'.
If it your intention to receive a draft report, it is prudent to set this requirement out in your Letter of Instruction. It is vital to also cover hearing dates, timing schedules, and
preliminary evidence that needs to be attained and inspected prior to the making of an expert report.
Consisiveness is the key and there is no set format for an 'Expert Report'. The expert can only rely on what you instruct them as to prior facts and assumptions as listed in their 'Letter of Instruction'. I will typically help guide the process, and always provide you with the relevant expert witness code of conduct and my obligations to the court.
Cybercrime Expert Witness Simon Smith, from eVestigator.com.au discusses the 'hidden defendant’ appearing in almost every case.
Well, in my words it is "CYBERGEDDON". Not to be dramatic but I have now experienced an element of cybercrime in every single case that I have had to deal with in every jurisdiction including employee fraud, stalking, computer crime, theft (including identity theft), international crimes, police prosecution, civil disputes and extremely aggressive family law cases. As a Family Dispute Resolution Practitioner also, I can appreciate the enormity of mudslinging that goes on in such cases that depend heavily on the credibility or lack thereof, and have reversed many cases by an interesting element of cyber-fraud where the Internet has reversed cases showing fake email evidence admitted into evidence, almost causing loss of custody and destroying families. This is real!
I would like to introduce two short stories of fact anonymised for the benefit of counsel and readers of this newsletter to explain that from conducting a slight investigation and thinking outside the square, almost all cases are resolvable in such a way that they can be mediated or favourable to one side through computer forensics; as despite people thinking they are smart in sending anonymous emails or purporting to be someone else through TOR networks (of which I happen to own 'Orion Elite Hidden IP Browser Pro++’, the largest iOS software but it is supposed to be for the purposes of protecting the users privacy) they are not immune. I have saved many cases where justice has almost been destroyed because sadly in some situations the Magistrate, Justice, Judge or Member do not understand the complexity or the relationship between the technological credentials and reliability of the human and sometimes neither can the client explain it properly to their counsel or lawyer. This is detrimental because if nobody understands how to properly construct pleadings then they are likely to be struck out.
In my first case scenario, a person from India came to Australia to work for a company and provide Search Engine Optimisation (SEO) services. In other words, they simply came down and suggested that they would take over the company’s Google marketing. This company was spending about $4000 a month on AdWords marketing. This new “employee” happened to own a SEO company in India, so he contracted himself to perform the work in conjunction with himself as an employee of this Australian company. He also set up various servers and operated several businesses from within this organisation—unbeknownst to the employers—through the company’s network. From Google’s perspective, all operations were performed by the employer. However, at least seven servers were set up, racking up a bill of $500 000 of debt without permission of the business owner; fraudulently, to the benefit of this employee who later was sacked and then demanded the employer pay more money as an alleged debt with the SEO company, money he claimed to be owed based on the trading relationship. What an ironic situation. I was called in to a very frantic company to determine how to get Google off their back for a half-a-million-dollar debt racked up by this ex-employee. The Google user account and IP address (internet location) pointed naturally to my client because the ex-employee had opened up several ports where he could dial in from home and pretend to be on my client’s network in performing his illegal activities, then he left the country. I took a very strong lead in finding negligence on Google’s side and technicalities in policy in attaining credit where credit was not authorised in order to defend my client’s liability and explain from a cyber legal perspective, before it even got to the point of litigation, that the company was not responsible for this debt. In normal law, most of you would agree that the liability, despite the crime, would still fall on my client. This was an enormous success. This is what I would call a 'hidden defendant’. You cannot always trust that the defendant is actually visible to you. This is also the case in many jurisdictions; one of which I would like to share with you that is quite extreme and how I completely overturned a massive case.
Most people would like to think that people tell the truth in family law cases, especially doctors.I had a case where I was called in to validate the characteristics of who may be telling the truth based on some SMS’s and forensic iPhone discovery. However, I found much more than that. As it happens in this Family Law case, the mother had taken the child and as possession, as they say, is 9/10ths of the law it was up to the father (who had nothing wrong with him) to seek psychiatrist reports, counselling, visitation rights, initiate family law proceedings and go through an enormous amount of trauma to prove that there was nothing wrong with him to still potentially be on the losing side as he didn’t have possession. An enormous amount of Affidavits were exchanged with the Family Court. Most Judges do not like to discuss perjury but I am a stickler for evidence and fact and I say it how it is; I did not intend on coming up with what I came up with. What I found was the last Affidavit of the mother, which was all allegations and no witnesses (and most allegations were in regards to forgery, rape, violence and no evidence other than her word as well as no police reports) and were very serious allegations. All of these accusations were of a man who seemed like a normal father, that due to this, limited him to three hours visitation, every three weeks to see his daughter of four months old with no notice. I do not take sides in cases however, I do take fact. I, in my investigations, usually look at what comes to me rather than what the client asks as my first duty is to the court. In what I found by perusing through what we like to call “big brother” Google records is that a strange IP address appeared that had hacked into his Gmail account. However, what this person did not realise was that this IP address, once in Gmail is also recorded to have searched Google for methods of fabricating evidence in Family Law Courts against ex-husbands, planning methods of suicide and/or faking suicide and cutting brake wires of the same model car as my client. Subpoena evidence showed that the IP address that conducted these searches and hacked into my clients Gmail account, came from the credible doctor who had submitted over 40 Affidavits alleging the opposite to the Court of Law. It also shows that the searcher was looking for fake emailers and on the header of the emails that were submitted as evidence to the court, I note that the exact emailers that she was searching for sent those emails purporting to be somebody else. This is also a crime as we know it of impersonation. Needless to say, I stumbled on something quite large here. My advice to the client was to start talking closely with the other side.
My final words are that I can make a big difference to any case in relation to cyber intelligence. It is part of every case at the moment. Everybody uses their mobile phone, I can find out what they have done, what they have searched for, what their intentions are and what their personality really is. Everybody has a record that is usually uploaded to iCloud in the case of iPhones or the Cloud if they are using Android. Everybody uses some form of security-based email like Gmail or Hotmail that tracks you. There is always a record. I would advise everybody to test the evidence before accepting the inevitable because sometimes, on a simple technicality of fact at a very low cost, an entire case can be destroyed and these are where my successes lie. These are just two examples of some very successful cases. I am currently working on an enormous case which is very similar and involves an accused that is facing a jail term of at least seven years who, based on current evidence, did not do the crime and the withholding of that evidence seems to be an abuse of his rights. I always give counsel, lawyers or clients a free pre-investigation on any case to determine whether I can help to ensure that I can maintain my 100% success rate. I will only assist in cases that I know will produce an outcome.
You are an expert in litigation and cyber elements have unfortunately always existed but people have never realised how serious and how present they are in proceedings, now and in the past. Expert opinions and facts make a difference. Call me anytime on 0410 643 121 or visit www.evestigator.com.au and I’m happy to talk, anywhere in Australia.
Simon Smith is a Cyber Forensics and Cyber Security Expert Private Investigator, Certified Ethical Hacker, Technologist and Computer Forensics Expert Witness. He has over 20 years’ computer programming experience and has appeared in various news publications regarding smart phone technology and on Channel 7’s Today Tonight in relation to Cyberbullying and recently the Today show on Channel 9, discussing credit card security. Simon has a strong persistence in finding a very fast and cost-effective approach to assist cases with evidence that can be detrimental to one side based on his extensive knowledge of programming. An example of this is just in knowing that he has prepared to stand behind somebody in support of two convictions from a legal services commissioner in a state of Australia, based on a technical inaccuracy on their part, they dropped all charges. Being a Nationally Accredited Mediator, although in the court room, Simon works for the court, ultimately his goals is to help produce an outcome that joins all the dots and perhaps resolve a situation in or out of court without compromising fact.
Industry and content related links
We have created a series of useful links and tools for your perusal.
Expert Witnesses Online, Eyes on the Spies (the Australian), Today Show, Crime Stoppers, SCAMWatch, Private Investigator Licensing, Lawyer & Counsel CPD Seminars, What is an Expert Witness, Federal Court Expert Witness Practice Note, Australian Institute of Professional Investigators, eVestigator® on Channel 9 talking cyber-security, eVestigator® Simon Smith discusses iPhone obsollesence with 'The New Daily', http://www.flagstaffotos.com.au