Blog updates coming up - there is no better, faster alternative to end litigation than with eVestigator®. Major success stories. See blog section shortly for updates:
eVestigator® Cracks Family Law Case in an unbelievable overturn of events via cyber methodology unforseen by the legal team
eVestigator® cracks an entire Cyber Insurance Federal Court Case deeming the Insurance Company's entire legal team negligent in minutes citing a cyber flaw everybody missed when asked by the Defendant for an opinion on a denial letter
eVestigator® Identifies an unprecedented Criminal Reverse Cyber-Stalker behind 6 entities impersonating others
eVestigator® asked to help validate evidence that the Victoria police intend to rely on in an alleged child pornography matter and finds breaches to the rules of evidence and holes in data integrity
Cyber facts brought to the attention of the Legal Services Commissioner who was prosecuting, causes them to drop all charges against the accused once they knew eVestigator® was ready to fight (and they were wrong)
Democracy and the Australian judicial system end at the High Court with negligent Judges who simply decide not to be bothered to follow the law, to hide from their fear of lack of knowledge of subject matter
eVestigator® comments on the abuse of process hole in the Magistrate's ex-parte intervention order system and how it breaches the Charter of Human Rights and Responsibilities Act, as well as allowing people to commit perjury with no repercussion

FREE Pre-Review - you won't look back, just read our testimonials:

Simon Smith (CHFI) eVestigator® offers a Free Pre-Review service with an NDA. eVestigator® has over 20 years experience as an expert Computer Programmer and University lecturer in multiple languages and for the last six years has been utilised as a Digital Forensic Expert Court Witness and Private/Factual Investigator, as well as an Expert Cyber Security Investigator and Auditor and Data Recovery Expert. He is also a Digital Forensics Expert Court Witness for any court, Mobile Cyber Security Analyst, Patentee, Mobile Device Author and a Computer Systems Source Code Auditor. He is able to offer a vast range of Specialist Investigative services. He is renowned in Australia as "Today Tonight's" Cyber-bullying Expert, Digital Forensic Expert Court Witness, Cyber Security / Cyber Crime Investigator, Insurance Risk Analyst, Data Loss/Prevention, Online/Offline Fraud, Intellectual Property eDiscovery / Due Diligence Expert, Education Expert, iPhone, iPad, Android, Windows, Linux, Unix, Mac, Windows CE, Nokia Computer Forensics Data Recovery Expert, Windows Certified Programmer, Family/Dispute Resolution Practitioner, Nationally Accredited Mediator, Source Code Inspection, Ethical Hacking/Reverse Engineering Expert, Corruption Investigator, Surveillance/Bug Detection & Litigation Support. He is highly qualified, experienced and has proven to attain fast and cost effective factual outcomes, complimented by his Commonwealth Graduate Diploma in Family Law Disputes Resolution, Counselling & Grief and Trauma Author.

Simply call 0410643121 (Direct) to book in a time where he will provide you with an opportunity to sign a NDA and receive evidence from you and give you a definitive answer as to the direction he would give to add actual positive value to your situation. You may email or SMS. The email is He only works on successful cases and offers an initial FREE service to assist in ensuring the client has travelled down the right path. Complimenting this, he is also a Nationally Accredited Mediator and Family Dispute Resolution Practitioner, and General Factual Investigator. It costs you nothing. Give him a call on 0410643121 (Direct) and you are welcome to fill in the Non Disclosure Agreement.

An expert that goes above and beyond and aims straight for the point
I am known Nationally as eVestigator® and in the media for my specialist cyber expertise. I am a licensed Private Investigator, holding several Qualifications, being a Practicing Forensic Private Investigator, Computer Hacking Forensic Investigator (CHFI), UNSW Certified Court Expert Witness taught by Hugh Selby of UniSearch, holder of several Graduate Diploma’s, Graduate Certificates, Diploma’s in Security and Risk Management, Government Investigations, Information Technology and Strategic Management, Cyber Security, Government (Fraud Control), Government (Security) and so much more (see below for so much more).

However, my main experience comes from 25 years of the majority consisting of extensive Commercial Computer Programming and Innovation Management. It all started when I was 11 years old initially programming from a tape deck green screen AMSTRAD CPC464, growing up programming continuously before the birth of the consumer Internet, then programming throughout high school during the birth of the consumer internet with every main language that existed, designing my own mail and internet servers, continuing to this day with knowledge of all frameworks including now as an App Store accredited mobile developer to patentee and Master Programmer (from ground up - not like the template ones they teach today). When I was 19, I was literally handpicked and employed as an Analyst Programmer and taken straight out of year 1 University and offered a full time job as an Analyst Programmer leading to a Senior Analyst Programmer position after being recognised as one of a small group of 3% of Australians who received Quadruple A++ in Information Systems and Processing and Management CATs. In that role the mix between my IT expertise and investigative expertise began to show. I was investigating the binary of a QuickBooks QIF file one day for a corporate client and came across a RAW credit card number. I immediately called QuickBooks who took no interest. Since then I have worked at multiple workplaces and created from ground up several multimillion dollar enterprises all in relation to IP, web, cyber seurity, reporting, educational, project management, corporate application, mobile, data and voice analysis applications and enterprises from scratch. When I say from scratch, I fundamentally mean from scratch. There is an article I wrote about 'template' programmers you might find interesting on this site.

At this point, I knew that I was more than a master programmer from knowing the complete roots of programming (now at 21 teaching advanced computer programming sessionaly), having an advantage over everyone as I don't rely on software, even in investigations, I invent it. I am considered an expert in my field by way of experience and recognition of that experience, complimented by many side fields, especialy cyber stalking, family intervention and relationship battles and nationally accredited mediator status and it shows in the cases I succeed in. I have solved multimillion dollar fraud SCAM’s (including the fake Microsoft tech-support SCAM and fake ATO telephone SCAM), resolved reverse cyber-stalking cases, family law cases, plenty of IP tracing and identity theft cases, and corporate crime and insurance fraud cases. I also work and train as a Cth. FDRP (Professional Family Court Mediator), and have trained many Barristers at law to become Family Dispute Resolution Practitioners’ appointed now by the Commonwealth. I am a Nationally Accredited Mediator (NAM) and hold a Certificate of Bail Justice from Victoria University. I am considered a Master in Digital Computer Forensics and Online Education and have developed patents in the subject matter. I have appeared on Today Tonight (7), the Today Show (9) and other media and to the courts as a Cyber Forensic Expert/Witness. I am independent and will act for and/or against the police/government or body corporate without fear or favour as my duty is to the law and the courts. I have succeeded in every case I have taken on.I have had parties including government department, police prosecutors, and civil litigators withdraw once knowing I have the evidence to stand up against them.

eVestigator® issues Cyber-Security warning regarding 'Electronic Pickpocketing' with RFID to EMV via NFC.

There are no major surprises in this story except one. Approximately 65% of Australian and International consumers are carrying a 'SmartPhone' that is capable of skimming the numbers electronically from an unsuspecting persons' credit card, right from their pocket. First we should start by saying right out that you can purchase for about $2 on eBay a little sleeve that you should put over any card you wish to protect that uses either Paypass or Paywave. Seriously, now! The every day mobile phone with some technical software modifications not so far out of reach of the every day person could be used to swipe someone's digits right from their pocket. Let's first begin with some definitions. Firstly, RFID stands for "Radio frequency identification" and it is a wireless technology incorporates the use of electromagnetic as well as electrostatic coupling in the radio frequency (RF) to give a object a digital identity. This is not new to us, and certainly if one had to crack the algorithm of RFID they would be quite stuck. Now, mobile phones do not have RFID.

Introducing, 'NFC'. NFC is Near Field Communication (NFC) is a short range wireless standard (Ecma-340, ISO/IEC 18092) that similarly uses magnetic field induction to enable communication between two devices as they pair, but only within a few centimetres. It is a shortcut if you like for a digital handshake that can emulate an RFID transaction by learning from another. It can also, on its own act in a capacity to uniquely identify an object but used for much smaller distances like key tags, or elevators etc. Then we introduce 'EMV'. EMV stands for Europay, MasterCard and Visa. It is a combinedinitiative and worldwide standard for cooperation of integrated circuit cards and IC card capable POS or 'Point of Sale' terminals and ATM's or 'Automated Teller Machines'. It is used quite frequently for authenticating credit and debit card transactions for small amounts under $100 here in Australia, and typically is dependent on the locality. It is limited because it contactless, and therefore vulnerable, but apparently not so much for the three key credit card companies to see as a threat for taking or virtualising a pretend transaction using a simple phone. So, to cut it short, an NFC enabled phone with the right configured firmware with programattical changes (easily demonstratable but not for sale gladly) can technically read and both write the transaction from its memory purporting to mirror the cards first signal. This is the technology already in use but controlled in Google Wallet, Samsung Pay, PayPal Cardless payments, etc. It uses NFC and Android Beam. eVestigator® warns consumers of the absolute possibility that this could be used to fake a transaction, as well as steal the credit card number and expiry date from somebody's pocket. Without going into detail, eVestigator® has recreated the technology already known to be a flaw in the system in the US and in Australia but not to the extent people should wonder if it could be used by anyone.

In my opinion, based on the fact that now Smart Phones are easily accessible with NFC and Android Beam, the technique opens the door to non hackers, and broadens the reach of Cyber-Crime. To protect yourself, you just need to make sure that your chipped cards are covered in foil, metal or some sought of pouch with metal inside as mentioned earlier. Are RFID or contactless credit cards more trouble than they are worth? How much more effort is it to swipe a card and enter a PIN? When did our time get so limited that taking no more than a second to pay for a purchase is worth more than financial security? Sure you can buy a little pocket or sleeve to protect your card from skimming and cloning that takes seconds, with little to no initial risk to the perpetrator as they never touch your wallet and costs them very little to get what they need to steal your credit card information and as little as $35 to create a fake card using the stolen information. The time it takes to remove and replace your card in the sleeve negates the time saved using 'tap and go'. I remember one of the benefits of the added chip being touted as 'extra security'; now people are seeing demonstrated what many of us warned - in front of my own eyes and in a controlled testing environment - IT IS POSSIBLE!

There is virtually no security, on these kinds of payments, but the worse part to this is that it gives you the raw digits, so potentially you could purchase online. It is even possible to generate a Random CVV with the technology. The $100 limit limits the damage of one transaction, but you only need the number once - as people still rely on MOTO (Mail Order Telephone Order). Specifically just limiting ourselves to this technology and forgetting about knowing the card number, we can reproduce a real-time transaction in quick succession, and they can add up before the theft is discovered and the banks have detected any suspicious activity. RFID is easily hackable, by using a 'back-door' style approach via NFC which kind of does away with the encryption of the RFID! All that is needed to make a purchase, particularly online or over the phone is usually the credit card number and expiry date and as a merchant myself eVestigator® can safely say that the card companies do not require a CVV for MOTO transactions, hence the risk has heightened due to the availability of the technology being conveniently packed into an Android Smart Phone which has all the bits and pieces (without software intervention) to replay or copy a card transaction. The name on the card being incorrect is a human fraud check that can be made after the fact but to actually make a purchase it is unnecessary. You don't even need the three or four digit CCV number on the back of the card for most purchases. In any case social media makes identity theft even easier.

The technology in your phone now may be able to take a persons' credit card number and expiry in certain circumstances of which we shall not outlay, but it is not replayable to the average person. Be mindful that even if you have your card packed in your pocket or wallet, a skilled indiscreet passer can brush past you and take what they need. This leads to even further privacy concerns. Birthday messages on Facebook for example, make it pointless to hide your birthdate. So it just might be worth disabling RFID and sticking to swipe and PIN, as credit card numbers are used to sometimes authenticate passwords or gain access to internet banking. eVestigator® will assist the various companies in their cyber-security issues if needed. How it got this far, who knows. Until a revelation or specific information becomes available eVestigator® is happy to keep people safe, and even though this possibly may be another risk or exploit, he sees thousands every year that don't even require technology. He has solved over 15 major scams, and sometimes people don't realise how trusting they are. There is a consumer and criminal disconnection, and whether it is blamed on the computer or not, it still follows traditional methods, so beware!

Cybercrime Expert Witness Simon Smith discusses the 'hidden defendant' appearing in almost every case.

Well, in my words it is "CYBERGEDDON". Not to be dramatic but I have now experienced an element of cybercrime in every single case that I have had to deal with in every jurisdiction including employee fraud, stalking, computer crime, theft (including identity theft), international crimes, police prosecution, civil disputes and extremely aggressive family law cases. As a Family Dispute Resolution Practitioner also, I can appreciate the enormity of mudslinging that goes on in such cases that depend heavily on the credibility or lack thereof, and have reversed many cases by an interesting element of cyber-fraud where the Internet has reversed cases showing fake email evidence admitted into evidence, almost causing loss of custody and destroying families. This is real!

I would like to introduce two short stories of fact anonymised for the benefit of counsel and readers of this newsletter to explain that from conducting a slight investigation and thinking outside the square, almost all cases are resolvable in such a way that they can be mediated or favourable to one side through computer forensics; as despite people thinking they are smart in sending anonymous emails or purporting to be someone else through TOR networks (of which I happen to own ‘Orion Elite Hidden IP Browser Pro++', the largest iOS software but it is supposed to be for the purposes of protecting the users privacy) they are not immune. I have saved many cases where justice has almost been destroyed because sadly in some situations the Magistrate, Justice, Judge or Member do not understand the complexity or the relationship between the technological credentials and reliability of the human and sometimes neither can the client explain it properly to their counsel or lawyer. This is detrimental because if nobody understands how to properly construct pleadings then they are likely to be struck out.

In my first case scenario, a person from India came to Australia to work for a company and provide Search Engine Optimisation (SEO) services. In other words, they simply came down and suggested that they would take over the company's Google marketing. This company was spending about $4000 a month on AdWords marketing. This new "employee" happened to own a SEO company in India, so he contracted himself to perform the work in conjunction with himself as an employee of this Australian company. He also set up various servers and operated several businesses from within this organisation—unbeknownst to the employers—through the company's network. From Google's perspective, all operations were performed by the employer. However, at least seven servers were set up, racking up a bill of $500 000 of debt without permission of the business owner; fraudulently, to the benefit of this employee who later was sacked and then demanded the employer pay more money as an alleged debt with the SEO company, money he claimed to be owed based on the trading relationship. What an ironic situation. I was called in to a very frantic company to determine how to get Google off their back for a half-a-million-dollar debt racked up by this ex-employee. The Google user account and IP address (internet location) pointed naturally to my client because the ex-employee had opened up several ports where he could dial in from home and pretend to be on my client's network in performing his illegal activities, then he left the country. I took a very strong lead in finding negligence on Google's side and technicalities in policy in attaining credit where credit was not authorised in order to defend my client's liability and explain from a cyber legal perspective, before it even got to the point of litigation, that the company was not responsible for this debt. In normal law, most of you would agree that the liability, despite the crime, would still fall on my client. This was an enormous success. This is what I would call a ‘hidden defendant'. You cannot always trust that the defendant is actually visible to you. This is also the case in many jurisdictions; one of which I would like to share with you that is quite extreme and how I completely overturned a massive case.

Most people would like to think that people tell the truth in family law cases, especially doctors. I had a case where I was called in to validate the characteristics of who may be telling the truth based on some SMS's and forensic iPhone discovery. However, I found much more than that. As it happens in this Family Law case, the mother had taken the child and as possession, as they say, is 9/10ths of the law it was up to the father (who had nothing wrong with him) to seek psychiatrist reports, counselling, visitation rights, initiate family law proceedings and go through an enormous amount of trauma to prove that there was nothing wrong with him to still potentially be on the losing side as he didn't have possession. An enormous amount of Affidavits were exchanged with the Family Court. Most Judges do not like to discuss perjury but I am a stickler for evidence and fact and I say it how it is; I did not intend on coming up with what I came up with. What I found was the last Affidavit of the mother, which was all allegations and no witnesses (and most allegations were in regards to forgery, rape, violence and no evidence other than her word as well as no police reports) and were very serious allegations. All of these accusations were of a man who seemed like a normal father, that due to this, limited him to three hours visitation, every three weeks to see his daughter of four months old with no notice. I do not take sides in cases however, I do take fact.

I, in my investigations, usually look at what comes to me rather than what the client asks as my first duty is to the court. In what I found by perusing through what we like to call "big brother" Google records is that a strange IP address appeared that had hacked into his Gmail account. However, what this person did not realise was that this IP address, once in Gmail is also recorded to have searched Google for methods of fabricating evidence in Family Law Courts against ex-husbands, planning methods of suicide and/or faking suicide and cutting brake wires of the same model car as my client. Subpoena evidence showed that the IP address that conducted these searches and hacked into my clients Gmail account, came from the credible doctor who had submitted over 40 Affidavits alleging the opposite to the Court of Law. It also shows that the searcher was looking for fake emailers and on the header of the emails that were submitted as evidence to the court, I note that the exact emailers that she was searching for sent those emails purporting to be somebody else. This is also a crime as we know it of impersonation. Needless to say, I stumbled on something quite large here. My advice to the client was to start talking closely with the other side

My final words are that I can make a big difference to any case in relation to cyber intelligence. It is part of every case at the moment. Everybody uses their mobile phone, I can find out what they have done, what they have searched for, what their intentions are and what their personality really is. Everybody has a record that is usually uploaded to iCloud in the case of iPhones or the Cloud if they are using Android. Everybody uses some form of security-based email like Gmail or Hotmail that tracks you. There is always a record. I would advise everybody to test the evidence before accepting the inevitable because sometimes, on a simple technicality of fact at a very low cost, an entire case can be destroyed and these are where my successes lie. These are just two examples of some very successful cases. I am currently working on an enormous case which is very similar and involves an accused that is facing a jail term of at least seven years who, based on current evidence, did not do the crime and the withholding of that evidence seems to be an abuse of his rights. I always give counsel, lawyers or clients a free pre-investigation on any case to determine whether I can help to ensure that I can maintain my 100% success rate. I will only assist in cases that I know will produce an outcome.

You are an expert in litigation and cyber elements have unfortunately always existed but people have never realised how serious and how present they are in proceedings, now and in the past. Expert opinions and facts make a difference. Call me anytime on 0410 643 121 or visit and I'm happy to talk, anywhere in Australia. Simon Smith is a Cyber Forensics and Cyber Security Expert Private Investigator, Certified Ethical Hacker, Technologist and Computer Forensics Expert Witness. He has over 20 years' computer programming experience and has appeared in various news publications regarding smart phone technology and on Channel 7's Today Tonight in relation to Cyberbullying and recently the Today show on Channel 9, discussing credit card security. Simon has a strong persistence in finding a very fast and cost-effective approach to assist cases with evidence that can be detrimental to one side based on his extensive knowledge of programming. An example of this is just in knowing that he has prepared to stand behind somebody in support of two convictions from a legal services commissioner in a state of Australia, based on a technical inaccuracy on their part, they dropped all charges. Being a Nationally Accredited Mediator, although in the court room, Sim works for the court, ultimately his goals is to help produce an outcome that joins all the dots and perhaps resolve a situation in or out of court without compromising fact.

eVestigator® shows the public how they are broadcasting their identity without knowing it

A mobile phone finds and connects to Wi-Fi networks by periodically sending out "probe requests". In simple terms these are "Hello, remember me, I connected to these Wi-Fi stations previously? Anyone out there? Here is my Unique mobile phone address to check (MAC Address)". These requests includes a unique identifier called a MAC address, which while making it faster and more convenient to connect to a network, it also makes it possible to collect this information and use it to track people. Knowing your MAC address goes a long way to track your phone if it is ever lost or stolen. While not impossible to change, it is a very difficult process and probably not worth a thief's time. Turning off your Wi-Fi when you are not actively using your phone and/or have no need to access a network, stops this method of tracking while Wi-Fi is not enabled.

A second of inconvenience for a little extra security might just be worth the twinge of annoyance. There are Android apps available that automatically switch your Wi-Fi off once your leave the range of trusted networks, though I personally can handle swiping down the top menu and pressing the Wi-Fi icon myself so I haven't looked into these and prefer not to place control of my privacy into someone else's hands. For iOS apps are limited without jail-breaking your phone, though iOS 7 introduced a swipe menu with quick access to certain settings including Wi-Fi. I won't go into the technical steps of how to create a Wi-Fi monitoring system to track people as is used in some stores for marketing and research purposes but I will say it is a fairly straight forward process and needs a router or a single board computer like a Raspberry Pi with a Wi-Fi adapter. It is not just possible tracking that you should be wary of but also "free Wi-Fi" or open networks.

These networks tend to have little or no security. It gives potential attackers a way in and makes any information sent over them visible. It is why you should never log into your internet banking or secure account using McDonalds Wi-Fi, as an example. A faked or compromised access point to a network, is called a Rogue Access Point (Rogue AP). Using such a network, essentially sends any information you enter to the access point's creator giving them access to email, Facebook and whatever else you might access while online on an insecure network. It can be just to monitor or a backdoor into an otherwise secure system, even if it is a soft AP set up by an employee of a business with or without permission for easier mobile access to the business network to work off premises it behaves as a Rogue AP (Access Point).

eVestigator® draws the line between a phone and smart phone

24 April 2016 - eVestigator® - "While Apple hardware may be well-built and likely to last for years, the software is another story as Simon Smith of eVestigator® discussed with Jackson Stiles of New Daily earlier this week. Read the article here. (link on the 'The New Daily' website at the time of placing this blog - dated April 18 2016)

'A phone is a phone but a smart phone is not just a phone,' says Simon Smith. 'it is fair to say that the majority of phone users these days are smart phone users' therefore this must be considered when discussing phone in general and this is what came up recently."

"With every iOS update consistently, and so it would seem intentionally, aspects of previous coding becomes obsolete, different or removed altogether forcing iOS programmers to update their apps or risk incompatibility with new devices and operating systems. Effectively limiting the usability and life of a smart phone."

"An example of this is the iOs 9 implemented an update which restricted access to insecure websites on older phones. Although this is great for developers like myself who already use an encrypted system internally, such encryption should be part of the operating system and such encryption is welcome. However, with little to no notice to developers such an implementation caused havoc to software and their developers. 'The life expectancy of a phone is three years, in a way. It would probably hold up in a court of law(misquoted as 'life') if something went out of warranty.' you can have a phone, but you’re not going to get the most advantage and functionality out of a smart phone as technology grows because the phone is only as good as the hardware and the software they allow you to use. And sometimes you can actually get more out of the phone with the software, but they don’t let you.”

"A phone is a phone and will last as long as the hardware does but the other functionalities of a smart phone decrease and become obsolete over a far shorter period of time."

eVestigator® writes to ACORN with concerns

eVestigator® felt that this deserves a little more than just a blog mention. eVestigator® has successfully dealt with 4 ACORN cases that have either gone cold (gathering dust for a year with no communication) or enormous delays with refusal to investigate. For eVestigator® the case was solved almost instantly, however there seems to be a systemic problem in the system. ACORN stands for "Australian Cybercrime Online Reporting Network". There website clearly represents to the public "The ACORN allows you to securely report cybercrime incidents which may be in breach of Australian law." It also states that, "The ACORN is a national policing initiative of the Commonwealth, State and Territory governments". The website invites the public to report Cyber-Crime and further attempts to educate Cyber-Crime awareness to the community stating that "Cyber-Crime is an issue which impacts the lives of many Australians. Cybercrimes are crimes which are directed at computers or other devices (for example, hacking), and where computers or other devices are integral to the offence (for example, online fraud, identity theft and the distribution of child exploitation material). It encourages the reporting of Cyber-Crime inviting the public to report such crime, stating that by protecting yourself online, you can help make Australia a harder target for cyber criminals stating that this will help our law enforcement agencies to better combat the growing threat of Cyber-Crime in Australia.

However, although eVestigator® congratulates the Government for recognising it, as an expert in the industry was shocked to see after several months of no communication, a letter in response to a client who is in distress with real hacking issues with contents similar to the following:

Good afternoon XXXXXXX,

Your ACORN report has been received and assessed by WA Police. We received many allegations of computer hacking. We are not in a position to interrogate individual computers to confirm that a PC has in fact been hacked.

WA Police require a report from a qualified computer technician outlining the following before an investigation can be commenced:

* How the computer was remotely accessed
* Relevant IP address from the offending computer
* Confirmation that files have been remotely deleted and not inadvertently deleted at source
* Presence of any malware

Once we have received this report we can progress an investigation. What you describe is becoming more common every day with the offenders being based overseas which leaves little avenue for investigation or result. As I am sure you are aware, if hackers have remotely accessed your computer they may have access to secure data and passwords.

I would strongly suggest that you contact your bank via phone or a different computer and change your passwords and security questions. This also applies to all other accounts (email / eBay etc.) you have that are accessed by that particular computer. We have recorded your information as a local task but due to the nature of the offence and overseas links the report will be filed for intelligence purposes pending receipt of the above mentioned report."

eVestigator® makes no comment as to the result of this outcome from ACORN, however has made some suggestions to assist consumer confidence. We shall keep you posted.

CyberBlog™ eVestigator® provides anonymised case stories and experience
(not legal advice)

eVestigator® provides QLD District Court Cyber-Crime Social Media evidence - 27 May 2016 - eVestigator® - "In an emergency interim application eVestigator®, Simon Smith flew to Queensland yesterday for an urgent application to provide cyber-crime evidence in relation to social media evidence." "Such evidence was tendered for the benefit of the Plaintiff in a civil/criminal QLD District Court interim matter heard yesterday. As the case is still ongoing no further comment can be made at this stage, only to suggest such evidence will be valuable in identifying the Defendant in this matter." "As always eVestigator® warns the public that the internet is not as invisible as some may think, and leaves it there."

eVestigator® draws the line between a phone and smart phone - 24 April 2016 - eVestigator® - "While Apple hardware may be well-built and likely to last for years, the software is another story as Simon Smith of eVestigator® discussed with Jackson Stiles of New Daily earlier this week. Read the article here. (link on the 'The New Daily' website at the time of placing this blog - dated April 18 2016)

'A phone is a phone but a smart phone is not just a phone,' says Simon Smith. 'it is fair to say that the majority of phone users these days are smart phone users' therefore this must be considered when discussing phones in this day and time and this is what came up recently. With every iOS update consistently, and so it would seem intentionally, aspects of previous coding becomes obsolete, different or removed altogether forcing iOS programmers to update their apps or risk incompatibility with new devices and operating systems. Effectively limiting the usability and life of a smart phone. An example of this is the iOS 9 implemented an update which restricted access to insecure websites on older phones. Although this is great for developers like myself who already use an encrypted system internally, such encryption should be part of the operating system and such encryption is welcome. However, with little to no notice to developers such an implementation caused havoc to software and their developers. 'The life expectancy of a phone is three years, in a way. It would probably hold up in a court of law(misquoted as 'life') if something went out of warranty.' you can have a phone, but you’re not going to get the most advantage and functionality out of a smart phone as technology grows because the phone is only as good as the hardware and the software they allow you to use. And sometimes you can actually get more out of the phone with the software, but they don’t let you.”

"A phone is a phone and will last as long as the hardware does but the other functionalities of a smart phone decrease and become obsolete over a far shorter period of time."

The Government has announced a new Cyber Security Initative - 24 April 2016 - eVestigator® - "Turnbull cyber security policy tipped to 'safeguard legal profession' , an interesting article worth reading. The government recently announced new funding for a cyber security initiative which sounds very good if it is properly managed and implemented. It aims to establish public-private intelligence sharing centres, bolster the government’s enforcement agencies, and create a Cyber Security Growth Centre led by the industry."

"15 million of the money pledged is to be set aside for grants for small businesses to have their systems tested and improved by accredited experts, which is something they most likely would be unable to afford as it can take days or even weeks to do a thorough analysis and make recommendations and though an expert's time is not cheap, investing in such a test can save you a whole lot more in the long run."

"It is a step in the right direction in boosting the country's defences against online assaults and good news for our businesses that deal locally and overseas. In response to this, the Law Council is working on the development of a cyber security information initiative for Australian legal practitioners. Knowledge and awareness is lacking in many industries when it comes to cyber security and system vulnerabilities. This imitative will hopefully help raise awareness and wake up Australia about just how easy it is to fall prey to a hacker and lose hundreds, thousands even millions of dollars to scammers."

eVestigator featured on the Today show talking electronic pickpocketing - 13 April 2016 - eVestigator® - "Around 7:30 am this morning a story ran on Channel 9's Today show about the security of contact-less credit cards. It was a good balanced story howeverI am not of the opinion that criminals can generate the CVV or a derivative of it via a mathematical algorithm and magstrip data. Needless to say, the number and expiry date could book you a nice week at the Hilton Hotel or anywhere MOTO (Mail Order Telephone Order) is accepted, as it is not a merchant requirement to request the CVV for non contact sales."

"And of course it featured the eVestigator® himself, Simon Smith!! I was happy to help with the story and taping went well. It was really good to see the finished story and somewhat ironic and funny in a way with the placement of the MasterCard statement! I would have liked to have seen it live but television scheduling can be hectic and the decision to use it was probably last minute, so there was no warning to anyone involved with the story. I am just happy to help shed some light on the possible risks of using this technology. It is an interesting subject and worth looking into further."

"The fact that 'Mythbusters' were banned from investigating and/or doing a story related to this technology is disturbing but also understandable to an extent. Methods of stealing and copying credit card information shouldn't be advertised and made publicly available without proper countermeasures as readily available."

"However, if the technology is as secure and unhackable as they say, why wouldn't they be confident enough to allow people to publicly test it? It would reassure the public if all attempts are unsuccessful. A copy of the exclusive is available here."

The public is crying out to find their cyber-stalkers. We need a better system for the abusers. - 10 April 2016 - eVestigator® - "Already we have an abused flawed system where anybody can go in front of a Magistrate without a Defendant and make up anything they want and gain a interim personal safety / stalking or family violence intervention order. What is worse, is the courts do not punish liars for abusing the system with either made up evidence or none at all." "People are tending to take basic investigation work into their own hands now. One would expect you need evidence to even get a hearing of who you Defendant is? Not so. There are some people out there that trick the Magistrates', and likewise Magistrates' that hand them out to compulsive liars like lollipops."

"This is an interesting article about people who need to ordinarily (apart from the above mentioned loophole) need to know who their stalker actually is. It is nothing special - it is merely a user driven database of phone numbers. It just shows what people will do to know what they need to know, before wasting court time. In any event it is a common trend that more and more people are using social networking and cannot make that exact connection to the Defendant." "I have been very successful in this difficult task and help allow real victims to gain justice."

Legal counsel seminar a good day for all. Glad to hear the feedback! - 09 April 2016 - eVestigator® - "I would like to thank Legalwise for their invitation and the opportunity I had last month to talk to in-house counsel about cyber security. I just wish I had had a little more time to go into some activities I had planned to illustrate the dangers I was talking about. Maybe next time!"

"Feedback I received was very positive averaging at 4 out of 5, 1 being poor and 5 being excellent, I would say that is a good outcome and I'm glad people found what I had to say interesting and enjoyed my presentation, still I barely scratched the surface of the issues and risks businesses face today from not just without but within. It can be as simple as allowing an employee to use a personal device on the business network. This creates a vulnerable and possible point of entry if the device is compromised or if the employee is less than trustworthy and missuses or abuses the privileges afforded him or her. Being slack in deactivating former employees accounts and passwords also creates vulnerabilities."

"All the comments on my presentation were positive; 'presented well', 'interesting information' and ' it would be great to receive more practical tips' to list a few. The whole day was good for all attendees and the other presenters were interesting and engaging as well with 'high quality presentations', 'presentations were informative' and was 'one of the better seminars' I was a slide or two away from my conclusion when I had to wrap things up but I could have filled a whole day with the amount of information I could share, there are so many dangers and risks, one absent-minded acceptance of a seemingly harmless application can open up your whole network to a competent hacker. Always be mindful of what you are downloaded and accept the risks of what you are agreeing to when you chose to install that app. That is one of the most important things to keep in mind when it comes to cyber security."

New Cyber Threats Predicted this year. Is Australia equipped to handle them? - 07 April 2016 - eVestigator® - "Well I hope you have your cyber-plans ready. According to WIRED, these are the most predominant threats we can expect this year. I also would like to add that another major threat is the non-acceptance of cyber-crime being a crime like any other. Too many people shift the liability when at the end of the day, a crime is a crime. In my experience, there is just too much misinformation and lack of consumer awareness out there, partially given by insurance companies, banks and the like. Not even the courts seem to understand the technology that faces the crimes or judgments they have to deliver. I have had first hand experience in educating a court on what is essentially - yesterday's news. One step closer to Cybergeddon™. That is for a another day! For now, let's take a look at the expected cyber threats of 2016 and turn to our international colleagues."

"Extortion Hacks - Following the Sony hack in late 2014, we predicted that hacker shakedowns would increase in 2015. By shakedown, we were referring not to standard ransom-ware attacks, whereby malware encrypts or otherwise locks access to a victim's computer until the victim pays a ransom. We meant extortion hacks where attackers threaten to release sensitive company or customer data if the victim doesn't pay up or meet some other demand. With these attacks, even if you have backed up your data and don't care that hackers have locked you out of your system, public release of the data could ruin you and your customers."

"There's just one problem with tracking such attacks. If the victim caves and does pay, the public may not know extortion occurred. We do, however, have at least two extortion hacks on record for 2015: the Ashley Madison hack, which took down a CEO and exposed possibly millions of would-be cheaters to public ridicule and worse; and the hack of InvestBank in the United Arab Emirates, which resulted in the exposure of customer account information. Extortion hacks play to the deepest fears of companies and executives—if not handled well, company secrets are exposed, customers file lawsuits, and executives lose their jobs. Expect such attacks to become more prevalent in 2016."

"Attacks That Change or Manipulate Data - In testimony this year, James Clapper, the director of national intelligence, told Congress that cyber operations that change or manipulate digital data in order to compromise its integrity—instead of deleting or releasing stolen data-is our next nightmare. Mike Rogers, head of the NSA and US Cyber Command said the same thing. "At the moment, most [of the serious hacks] has been theft," Rogers said. "But what if someone gets in the system and starts manipulating and changing data, to the point where now as an operator, you no longer believe what you're seeing in your system?"

"Data sabotage can be much more difficult to detect than the kind of physical destruction caused by Stuxnet. That's because data alterations can be so slight yet have enormous consequences and implications. Anyone remember the Lotus 1-2-3 bug back in the 90s that would produce accounting miscalculations in spreadsheets under certain conditions? That was an unintentional error. But attackers could get into financial and stock-trading systems to alter data and force stock prices to rise or fall, depending on their aim."

"Certain types of data manipulation could even result in deaths. In 1991 a Patriot missile in Saudi Arabia during the first Gulf War failed to intercept an incoming Scud missile due to a software glitch in the weapon's control computer, allowing the Scud to hit an Army barracks and kill 28 soldiers. Again, this was an unintentional bug. But Chinese spies have invaded numerous US defense contractor networks in the last decade, raising concern among US military officials that they're not just stealing blueprints to copy weapons, but might also alter or insert code to sabotage the integrity of weapons systems and change how they operate."

"Chip-and-PIN Innovations - Any time the security community closes one avenue of attack, hackers adapt and find another. When retailers stopped storing customer credit card numbers and transactions in databases, hackers sniffed their networks to grab the unencrypted data live as it was sent to banks for authentication. When retailers encrypted that live data in transit to prevent sniffing, attackers installed malware on point-of-sale readers to grab data as the card got swiped and before the system encrypted the numbers. Now banks and retailers have begun rolling out new chip-and-PIN cards to thwart hackers once again."

"The cards contain a chip that authenticates it as a legitimate bank card and also generates a one-time transaction code with each purchase, preventing hackers from embossing stolen data onto fake cloned cards to use for fraudulent purchases in stores. But this won't stop fraud altogether; it will simply shift from brick-and-mortar stores to online retailers. In the UK, where chip-and-PIN cards have been used since 2003, card-present fraud—transactions done in person—has dropped. But fraud for card-not-present transactions-those completed over the phone or online-increased from 30 percent to 69 percent of total card fraud between 2004 and 2014, according to the UK Payments Administration. Neither a PIN nor a signature is required when customers use their cards online, so simply stealing card numbers is sufficient for this kind of fraud. Expect those online fraud numbers to rise in the US as well."

"The Rise of the IoT Zombie Botnet - There are many who say that 2015 was the year of the Internet of Things; but it was also the year the Internet of Things got hacked. Connected cars, medical devices, skateboards, and Barbie dolls, were just a few items shown to be vulnerable to hackers this year."

"If 2015 was the year of proof-of-concept attacks against IoT devices, 2016 will be the year we see many of these concept attacks move to reality. One trend we've already spotted is the commandeering of IoT devices for botnets. Instead of hackers hijacking your laptop for their zombie army, they will commandeer large networks of IoT devices—like CCTV surveillance cameras, smart TVs, and home automation systems. We've already seen CCTV cameras turned into botnet armies to launch DDoS attacks against banks and other targets. Unlike a desktop computer or laptop, it can be harder to know when your connected toaster has been enlisted in a bot army."

More Backdoors - The year ended with a startling revelation from Juniper Networks that firmware on some of its firewalls contained two backdoors installed by sophisticated hackers. The nature of one of the backdoors—which gives an attacker the ability to decrypt protected traffic running through the VPN on Juniper firewalls—suggested a nation-state attacker was the culprit, since only a government intelligence agency would have the resources to intercept large amounts of VPN traffic in order to benefit from the backdoor. Even more startling was news that the backdoor was based on one attributed to the NSA."

"There's no evidence yet that the Juniper backdoor was installed by the NSA; it's more likely that an NSA spying partner—possibly the UK or Israel-or a US adversary installed it. But now that companies and researchers know for certain what such a backdoor would look like in their system and how it would operate, expect more backdoors to be uncovered in 2016 as companies closely scrutinize their systems and products. And despite the fact that the Juniper incident shows that backdoors intended for US law enforcement and intelligence agencies can be subverted by others for their own malicious use, don't expect the FBI and NSA to give up on their quest for encryption backdoors in 2016."

AFP Subpoena email is a scam - 29 March 2016 - eVestigator® - "The latest version of this email apparently issuing a subpoena I have received, the AFP logo looks like it is a missing picture, this in itself doesn't prove anything as it could just be human error. It is the content and reason for the email that is suspicious."

"A little bit of fact checking, as simple as a Google search, will bring you to a link on the AFP website stating they do not send subpoenas by email and not to click any links in an email purporting to do so. If it had been genuine, the link would at least look like it directed to the AFP website but the link to the site to learn more and the link to download the supposed subpoena is exactly the same '' I have changed it only to exclude my email address."

"The link obviously does not go to the AFP website. is an automated invoicing service. It is doubtful they are actively involved in the scam but their services may be implemented by the scammers in some way. However, all you need to know is that if you receive this email you are not in trouble and you should just delete and forget it."

Fake love costs money - $22.7 million lost to dating scams in 2015 - 29 March 2016 - eVestigator® - "Having solved many of these myself last year I must say, I'm not surprised. This is the official figure now reported by the ACCC. It is reported that last year, 2,620 Australians reported losing almost $23 million to dating and romance scams to the ACCC. One of my clients' make up $500,000 of that!"

"Remember that it is eVestigator's advice that you need to check the source and destination of all correspondence. Love can be 'in the air', but if you have a look at our website there are ten golden rules you should read before making any decisions. This is all of what I call the makings of Cybergeddon™. It is the fake world. Believe in what you can see, feel and touch and if you can't, there is a reason."

"My client was dating on a Christian dating site. In this case, the scammer felt that religion was a vulnerability. It worked for them. I have recently had the opportunity to hear from a scammer's mouth the here lack of care and dignity as to the damage and affect this has on others. To them, it is a way of life. There will be more on this shortly. Remember also to check out my blog entry containing bank guarantees. I have something to say about the banks you might want to know."

By spying on your partner, did you know you may be committing an offence? - 26 March 2016 - eVestigator® - "It might be time to seriously evaluate your relationship when spying on your significant other becomes a viable option in you mind. You must get professional advice and support and not take matters into your own hands. There are things you can do but many things you can't do without a security licence and things that are plain illegal and unethical."

"Last year, a man was arrested in Spain for installing spyware on his girlfriends' phone, which was a gift from him with the monitoring software installed before he even gave her the phone. He was monitoring her messages, accessing her Whatsapp messages and her social media posts as well and could also activate the camera and microphone."

"Talk to eVestigator today about your concerns, options and actions you can take."

Fake Mobile Apps - A new medium for phishing - 25 March 2016 - eVestigator® - "As an avid developer of successful Android and iPhone Apps myself, its sad to see it come to this, but its not the technology, its the criminal. There's now malware out there targeting major Android apps including Google, Paypal, Banking, eBay and Skype among others. It is designed to mimic the login screen of 20 different banking apps from Australia, New Zealand and Turkey as well as the above. It overlays itself over the login screen inorder to capture your usernames and passwords and bypasses two factor authentication by intercepting authentication codes sent by SMS, forwarding it to the hackers and hiding it from the user. It gets onto phones by imitating Adobe Flash Player, which many websites require. Avoid this by only downloading apps from trusted sources like Google Play."

"If you are worried that your phone may be infected, check the list of device administrators found under the Settings > Security > Device Administrators menu. If infected, 'Flash Player' will be incluede on the list. Ignore warnings about data loss and remove 'Flash Player' from this list. Now it is possible to uninstall the malware via Settings > Apps/Application manager > Flash Player > Uninstall."

"If you can not access the Device Administration list for whatever reason it means there is malware trying to protect itself and prevent deactivation. Restart the Android device in Safe Mode, which disabled installed apps, preventing the malware from blocking access to the Device Administration list. Check your device manual or support website if you don't know how to access Safe Mode."

"Again NEVER download files or apps from unknown sources."

Australia Post 'Locky' scam emails - 25 March 2016 - eVestigator® - "The latest Australia Post email scam is very elaborate. Using advance scraping software, they scan social media to glean personal details like your name, address and occupation to make the email seem legitimate. The emails refer to an undeliverable item with a link or download with more details. The attachment or link it asks you to click looks safe to a lot of antivirus software as it is a small file or a Word document. However it actually contains malware called 'Locky', which runs a java script code that locks your computer files, demanding a bitcoin ransom worth hundreds of dollars. If you are unsure about the legitimacy of an email Australia Post will never: Ask you to click on an email link to print off a label to redeem your package. Email or call you to ask for personal or financial information including password, credit card details or account information. Send you an email asking you to click on an attachment. Email you to reconfirm your physical mailing address by clicking on a link. Call or email you out of the blue to request payment. The above was taken directly from Australia Post's website. Most businesses that have been victims of these kinds of scams will have such a checklist to advise of email/telephone contact legitimacy."

eVestigator® presents at Legalwise CPD in-house Counsel conference on Cyber-Security - 20 March 2016 - eVestigator® - "If only there were more hours in the day. So much I had planned, I was expecting to hopefully find some time at the end to do some demonstrations at let people know where they have been (according to their mobile phone WiFi beacons) as well as giving them a surprise or two when they mysteriously email each other from one side of the room to another" "The core topics were essentially based around how to mitigate a Cyber Attack once it has been established, and how to prevent such attacks from occurring. There was also some general discussion on liability. Interestingly we got to get through the content that needed to be shown and we can save the extra fun stuff for another time." "A question was asked of me, and I had to be honest. I say it how it is. That question was somewhat like, 'What do we do with regards to this new Cyber-Insurance'? I asked, 'Do you want my honest answer?'. The crowd said yes - and I gave it to them! It is merely a new name for existing liabilities that are otherwise easy to label outside of a policy for the benefit of the insurer to remove liability and/or a new idea to make money for the same insurance the customer already held.' Essentially, I see it as a way of 'handballing'." "I state, with all my experience, Cyber-Crime and Cyber-Security threats have always existed. A computer is like a watermelon. Where do you store that watermelon, how do you protect it, who uses it, does anyone take it home, can anyone put there hands over the window and pinch a bit to eat? The answer is yes, and it always will be. Computers don't do anything, people do!" "Employee fraud is employee fraud in any case that I have done and should be treated by the police and the courts accordingly, regardless of how they committed that fraud!"

eVestigator® acquires and discusses Cryptology - 10 March 2016 - eVestigator® - "In celebration of this, Simon Smith (eVestigator®) is planning to use this site in the nearby future to enhance Cryptology Training and Online Safety. Simon has just finished a PD from the popular Cybrary series, entitled "The History of Cyber Security Intelligence S3SS10N - Presented by George Schu." "This short PD offers a background to the history of cryptology; which is the making and breaking of code. In this lesson, the instructor offers a brief background to cryptology dating 4,000 years ago with the ancient Egyptians and then goes onto the discuss the birth of modern cryptology. It describes that, Cybersecurity can be seen as a descendent of Cryptology. The making and breaking of codes dating back to biblical times and beyond."

"It is very useful to understand the history of Cryptology. The knowledge known to eVestigator® and repeated in this PD demonstrate a background to the history of cryptology; which is the making and breaking of code. In this PD, the instructor offers a brief background to cryptology dating 4,000 years ago with the ancient Egyptians and then goes onto discuss the birth of modern cryptology, and best Cyber Security Practices and Solutions." "eVestigator® agrees with the genius Herbert Yardley (who is considered the Father of Modern Cryptology) and he dates back to World War I as he began his efforts after realising the United States did not have a focused cryptologic effort. He stated this would surely effect their ability to fight well in the war and persuaded the Army to set up an effort and as such, was hired by the Army to make this effort permanent and eventually gave way to the 'Black Chamber', which was credited in 1921 with cracking Japanese code, which was critical for the USA with negotiation with Japan at the end of WWI."

"Cryptology considered to be used and resulted in tremendous strides in World War II. Cryptology continues to grow and help the world keep an advantage on the forefront stage today and is one of the most important aspects of cyber security." "eVestigator® will be introducing some new initiatives around this area shortly."

eVestigator® Invited to Channel 9 to demonstrate a new type of SCAM - 10 March 2016 - eVestigator® - "Cyber Forensic Expert Simon Smith (eVestigator®) is soon to appear on Channel 9 exposing a major new style of SCAM for consumer awareness sweeping the country. More shall be revealed after it is aired."

eVestigator® finds a peak in domain hijacking and registration SCAMS. - 10 March 2016 - eVestigator® - "Well it is obvious to say that we already knew we cannot trust a domain name. According to Google, a domain name 'User' is the legal entity they are dealing with, not the holder, not the company, nobody. So beware if you have Google Apps for business and one of your staff members changes the authentications settings and or assigns it to a Master Account outside your company. It's theirs! I have now more than 2 major Google related SCAMS and Frauds I am working on, and please take my advice above seriously as imagine what it feels like when you are told, "you have no proof of ownership of that 'account' despite owning the domain!"

"As an online expert and due to my own experience, and many of my investigations involving domain hijacking, it's safe to say I know the Worldwide Domain Name system backwards. Personally, I register a LOT of domain names. Another thing to look for is the now manipulated fake domain registration SCAM. You register a domain name (and of course you have probably seen similar SCAMS with Trademark Applications) and then you are bombarded with services emailing you from overseas claiming to 'finish off the registration' or 'properly register it or later renew it'. Again you have never dealt with this company before. Today I received an email entitled, 'Domain Registration Incomplete'. Note the word 'Registration'. Inside that email up comes 3 bright and beautiful trademarked logo's (obviously without permission) of the 3 potentially largest search engine logos in Australia. Google, Yahoo and Bing. The email was did not even go to the effort of informing me of my recently registered domain (note the word 'registered') - and note that is even if it knows I did, or it is a cold SPAM email."

"It was NOT picked up from Google SPAM and was sent from ''. Note: Always check who is sending you an email - no matter what it says, then check the reply-to address. This is what it said.

(Now that you've bought your domain, it's time to register it.

By registering and listing your website with the major search engines you are allowing your website to be searched by the entire online community.

You can verify and submit your website with Google, Bing, Yahoo and 20 other top search engines by clicking the button below.)

It is sent with a nice badge showing quality endorsement from 'Copyright © *2016 Official Domain Directory*, All rights reserved. PO BOX 12114 San Francisco, CA 94112."

"Now note that it says (Now that you've bought your domain, it's time to register it.) Not buying is registering. They are trying to confuse you into thinking that SEO work on the domain name is registering. Also note, that you are dealing with complete fraudulent SPAM with a reply-to address of ''. The bottom line, the word SPAM has changed into more the word Impersonation. Always be in control or have someone in control of your IT. I am auditing a company at the moment who has no idea how their $500,000 online business works. My first advice was more of a question. Please, get me the source code!"

eVestigator® takes on 600K SCAM. An email address does not identify an entity! - 05 March 2016 - eVestigator® - "Well what a week it has been. It seems that CyberCrime is getting worse and worse everyday. Someone behind a computer screen has a virtual concept that their actions and consequences are also virtual. This is not true."

"As this is a current investigation I cannot talk much about this case, save for the fact that a Goliath Corporation is involved, seeking to rely on what seems like just an email address. As you know it is very easy to compromise an identity and I will be presenting at the Legalwise CPD seminar exactly on this concept."

"Solving major cases of fact is what I do best, especially in the new war, the war of CyberCrime. There are not too many people who understand the potential of a hacker and what can be done. Needless to say I shall keep you up to date as to what the law considers a binding contract, as if it is relying on a representation via email, then the liability of due diligence on one or both of the parties must be resolved. Who's responsibility is it to ensure they are not compromised, and if so, is the civil repercussion a duty of negligence in not detecting by the other side? These are hot topics at the moment. As a Cyber Technologist, I plan to present case studies on both sides."

eVestigator® invited to speak at Legalwise CPD Counsel Conference - 23 February 2016 - eVestigator® - "On Friday, 18 March 2016, at the Intercontinental in Melbourne, Simon Smith will be teaming up with Melissa Kirby from Sharpe and Abel for the Legalwise CPD. He will be appearing as a Forensic Cyber Expert Witness and presenting useful advice and anonymised case studies designed especially for in-house Counsel when dealing with Cyber attacks."

"He is proud to be invited to speak at the 9th Annual In-House Counsel Conference seminar, focussing on the very challenging and new specialised area of CyberCrime Loss Mitigation. It looks like it is going to be a great event. In-house counsel can be asked for all kinds of advice-some legal, some business and some off the record personal questions from co-workers. This blending of roles and responsibilities creates a very challenging legal and ethical landscape for which there is a dearth of clear guidance."

"The seminar addresses several issues facing in-house counsel today, and my topics discuss case studies of 'When Your Organisation Faces a Cyber Attack' and 'How to mitigate a typical cyber attack of Denial of Service (DDoS), or potential theft of trade secrets and IP after the event?"

"It also addresses the very important issue of 'What steps should be taken to establish quantum of damage to the organisation?' and 'How to best implement lock down and typical methods used to locate the offender.'"

"I have the pleasure of presenting with Melissa Kirby, Founder of Sharpe who specialises in working with engineering and technical professionals, supporting clients and keeping their businesses safe through difficult times during the Asian Financial Crisis, the Global Financial Crisis and all the times between. Ms. Kirby is the Legal Director of Sharpe & Abel and I will be discussing real life scenarios that as a Forensic Cyber Expert Witness/ Private Investigator - eVestigator to provide valuable intelligence in this area."

"I look forward to seeing all attendees there and am grateful to be part of a well structured, and well organised event."

For the second time eVestigator succeeds on second opinion - 19 February 2016 - eVestigator® - "In no way does this blog entry take away from the good work that my colleagues do as I believe that everybody has unique skills in various areas and deserve equal recognition for those skills. In choosing a forensic investigator it is often difficult to determine whether you will get the outcome you want, the outcome you don't want or any outcome at all. I have completed two cases recently where I was able to successfully satisfy the customer by achieving a result that another respected high profile Forensic Investigator could not achieve at almost half the cost.

My main philosophy in investigations is to deal with facts only. Especially in cyber-crime, it is safe to say I've had extensive experience in IT and security, most acclaimed via actual practical work as I just happened to have grown up at the right time when the little baby we call the "consumer internet" was born. The point of this entry is to state that knowledge and skill is relevant not to someone's age or potential doctoral degree in an ever-changing industry, but to the actual hands-on physical experience (in my case 20 years) of software engineering at a master level and teaching others to do similar.

If you are looking for a true forensic cyber expert who actually has won cases, has the knowledge of not only the entire programming language of the internet but the backbone of the very beginnings, which is lacking in every university degree today, then look no further than eVestigator. Sometimes innovation and thinking outside the square can provide an outcome that nobody else can provide. To understand the depth of knowledge that eVestigator brings into an investigation, it is wise to look at the broad range of qualifications on this website combined with the broad range of actual outcomes. The reason why I have a 100% success rate to date, is because I am adaptable to change my methodology, writing my own code and not relying on a piece of software to conduct my investigation. eVestigator in fact writes the software most often if necessary because no two cases are the same.

So it pays to get a second opinion and evestigator does have a 100% success rate because he will only complete a job with the understanding and co-operation of the client that the strategies that can start off and change is led by him and not interfered with. It is only when a strategy is interfered with that eVestigator chooses to not participate in an investigation. It is otherwise his nature to complete in full, from scratch every task he starts to obtain a factual result for the client. Opinion is secondary."

eVestigator® attains UNSW Expert Witness Training Certificate (UniSearch) - 13 February 2016 - eVestigator® - "What a marvellous and fact-filled event with a great deal of wonderful professionals all around. Starting with the Trainer, Mr. Hugh Selby. I'm utterly impressed, he says it how it is! He is unbelievably honest and truly is passionate about the profession, and is an expert Barrister who also specialises for UniSearch at the University of NSW, interstate and overseas as an Expert Witness Expert!"

"Hugh Selby is a very experienced Barrister and co-author of the multi-volume and online publication "Expert Evidence". Hugh teaches "courtcraft", both in Australia and overseas, to prosecutors and advocates, police and experts across many disciplines."

"His publications range across trial and appellate advocacy, coronial practice, civil pleadings, policing, former Justice Kirby, and industrial law. UniSearch is a division of the University of New South Wales and I have every intention in offering my expert services to clients of theirs, especially as the cyber-crime rates are everso increasing and becoming part of everyday society."

"Giving Expert Evidence is quite a craft, and I commend Professor Hugh Selby for his absolutely inspiring teaching abilities and knowledge of first hand subject matter, and FRANKNESS! UniSearch are a great service for all kinds of Forensic Experts. I was able to meet Forensic Accountants, Forensic Psychologists, Forensic Criminologists and it was very rewarding."

"I am very honoured to have done the training and will be very happy to becoming a member of this prestigious organisation who naturally is a very professional well knowledged Expert Witness Company that manages the procedure from lawyer/client-expert-lawyer/client-court and the millions of possible events along the way!"

eVestigator®'s Gains WASC Accredited IT University USA (CHFI) Accreditation - 13 February 2016 - eVestigator® - "CHFI stands for 'Computer Hacking Forensic Investigator' and was awarded on the 10th February 2016 by IT University based in California. The University is WASC Accredited. WASC accreditation also places ITU among the recognised list of institutions on the U.S. Department of Education's database of recognized institutions of higher learning and the Council for Higher Education Accreditation's Listing of Accredited and Candidate Institutions (CHEA)."

"ITU is also recognized as an approved institution by California's Bureau of Private Postsecondary Education (BPPE)."

The Subjects covered with depth included Computer Forensics, Forensics Investigation Process, Searching and Seizing, Digital Evidence, First Responder Procedures, Forensics Lab, Hard Disks and File Systems, Windows Forensics, Data Acquisition and Duplication, Recovering Deleted Files and Partition, Using Access Data FTK, Using EnCase, Steganography, Password Crackers, Log Correlation, Network Forensics, Wireless Attacks, Web Attacks, Email Crimes, Mobile Investigation, Investigative Reports, Expert Witness and more."

eVestigator® provides forensic evidence in 4 of Australia's largest SCAMS! - 09 February 2016 - eVestigator® - "Well there was such thing as justice, or was there? I have cooperated with ACORN and given them intelligence that lead to some of the most major discoveries of direct hit IP addresses behind some of Australia's largest SCAMS. One being a major dating SCAM, now claimed over $510,000 and being misled by banks to place the onus away from the consumer guarantees under the Australian Consumer Law, and the other being the fake Microsoft 'tech support' SCAM which is well known - where somebody purporting to be Microsoft calls an unsuspecting user and is told their computer is infected."

"They then get them to download a Trojan Horse that purports to be merely remote control software, and in fact is, with a little bit more. They then use it to lock the person's computer at a very high OS level demanding payment to fix the problem. This was reported to my client, and then by me to ACORN. ACORN accused me of not reporting the data I found, when this is how they treat their customers. I inform my clients that they are a reporting network, but still via the AFP and Interpol they could make an arrest with my data, but not so."

"Here is a letter given with permission from the original client that 'got their backs up' just because I was doing my job. I have anonymised the letter for the client and have full permission from him to publish it. I make no comment as to its contents or otherwise. The customer and I have the right to freedom of expression and speech. Here is his most recent letter. I can unfortunately do no more for him, as mentioned on my website I contacted ACORN with consumer concerns and it was not well received, in fact, it resulted in what will most likely be contested legal action for alleged false statements and misleading statements and ethical standards complaints to the police. It is actually my belief that the banks are answerable to this and are shifting liability setting people up for failure when their own website is supposed to protect them and even guarantees this under various circumstances. It is important to note, that a bank is neither legally able to Investigate nor purport to be an authority making a decision without Police intervention. The letter he permits goes as follows"

"Dear Sir / Madam

On XXth Nov last year, the Bank External Investigations contacted me to advise that I had been scammed after an online romance. I will not go into details as the details are irrelevant. I was told they (XXXX Bank) could not do anything more and to submit a report on the ACORN website, which I did the following day.

Subsequently, I have submitted a further 23 reports as it is the only means of actually reporting any suspects, including phone numbers in Australia and Malaysia, bank account details in Australia and even beneficiary addresses overseas. I have submitted a substantial amount of evidence to enable Authorities in Australia and Malaysia to act on seeking the perpetrators and in fact all the possible money mules or persons colluding with the perpetrators.

I have had to play money launderer as a last resort to try to bribe the XXXX Bank to take some action to involve the AFP which to some degree may have worked.

As a last resort, as my own finances are completely negligible now, I informed XXXX Bank External Investigations that a deposit of $XX,000 in my account from an unknown sender would remain frozen until it was was investigated by the AFP. I received a call from the XXXX CID . According to XXXXXXX, the call was in in relation to my last ACORN report. To my knowledge XXXX CID may not have received the report as a result of the ACORN report, and may have been a result of XXXX Bank's report to Vic Police.

I used $XXX of the unknown deposit to hire a very efficient and ethical Forensic Investigator to trace the IP addresses of the two perpetrators successfully and without any doubt, and his report was submitted on the ACORN.

To date and after three months without any communication from the AFP, other than an email from the XXX Police stating that the case was in the the hands of the AFP on 4th Dec 2015, I have had no communication.

My concern is that: The ACORN really doesn't care
The ACORN is too slow to respond, given real time information

And as a result- the evidence is no longer useful.

To cap off there are another 5 victims of this scam known by the XXXX Bank in Australia who have full knowledge and all the details and in some way they can be considered accountable in the loss of possibly $1.5M.

The prime suspects can be located in South Africa and Nigeria. Found by eVestigator®.

I request a reference to report this to the AFP Ombudsman.

eVestigator® Customer"

What happens when a victim self sabotages their own case? - 04 February 2016 - eVestigator® - "If you were to visit a Doctor, and engage a Specialist, you would do so because of their experience. Sometimes I have seen the victim without realising it, introduce self harm into their own case."

"They say you can lead a horse to water, but you cannot make it drink. This is very true. Sometimes in cases, the victim actually is so entangled in the emotional trauma that they play 'investigator' and lose sight of the massive amounts of obviousness small pieces of advice from an external expert point of view can make. It ends up turning into a sheer path for self destruction. My policy is, that I will not work with anybody who does not take my suggestions - because the hard work in setting up all the layers for an outcome is interfered with if it is not isolated to 1 person who can and will make a change for the better."

"I think a priority list is vital for clients so that an Investigator can understand the exact facts which are required first, prior to seeing the 'Goliath' of information. Things are actually pretty simple and easy if you take a systematic approach. I have had great success with every single client, and in speaking to others in the industry - it is a common trend that you need to set a plan and stick to it." "Results and facts come from research. I am a factual investigator, I don't give 'opinions'. I leave no door open. The key to a good outcome in an investigation is communication and understanding of overall value and accomplishments one wishes to achieve, and as with all others in the industry - it is clean sailing from there."

"I am happy to say my strategy is succeeding and by having some common rules in place it is possible to avoid situations that displease customers. You only have to look at my testimonials. All of these people followed my advice and received an 'outcome' after research without interference. When I send an invoice I don't see money, I see outcomes and injustices, and think of ways from the information I've given to correct such injustices." "It is also important to help your client not become misinformed, as sometimes they get the wrong advice, even when you know the outcome. Sometimes, however this is out of your control. It is fantastic to see positive results and I continue to see them. I just wish to advise any potential customers to allow yourself help, and help will come to you."

"I often go out of my way and use other contacts and expertise that compliment services. This has and can end up saving customers hundreds of thousands of dollars. eVestigator® is like the lollipop (man). I help direct, and strategy is so important in this area. When you are at the investigative stage, after initial research, you start to see extreme value for money."

"Being a Family Dispute Resolution Practitioner, Marriage Celebrant and author of books on Grief and Trauma I can see the signs of 'self sabotage'. Depending on the case, it is good to choose an investigator that has a cross range of abilities in all areas, still performing a sole service, but at least there is an awareness."

"I say it how it is, and don't tell somebody what it is that they want to hear, I speak the truth and I speak based on experience and fact gained from cases I have been involved in and resolved. The level of communication is required on both sides to come to a fruitful outcome. Here are just some of the comments I have received in the course of helping people."

"It takes 2 to tango they say! These clients are gold and I want to applaud them on their trust and belief to get them successful results. I ultimately take your instruction, but be prepared for honesty. If I recommend something I am happy to explain why - and how later it can save you. All these sample customers I applaud for showing strength in their traumatic times, yet maintaining themselves from the potential to 'self sabotage'." "Full cooperation and confidence that everybody is on the same team is a must to produce successful outcomes. Three cheers for these successful happy customer examples!"

Thank you customers!
* "Intellectually, he is clearly a star."
* "Brilliance is an understatement."
* "It took a long time for me to turn for help but turning to Simon was the best thing I could do."
* "Simon saved me 10's of thousands if not hundreds of thousands of dollars with the lawyers and he got me the results I needed."
* "Simon is also a genius computer programmer, who has helped find cyber stalkers, assisted ASIC find and prosecute unlicensed practitioners"
*"Hello Simon, I just wanted to let you know how encouraged I felt after speaking to you" "Simon's findings from forensically examining both an iPhone and an iPad gave me almost too much information than I was prepared for"
* "He knows the workings of the internet, that's a fact."
* "Thx Simon. Through all this as much as I have learnt about how nasty and shady people are, I have met a lot of good honest ones! You are at the top of the list."
* "I am very impressed with your work. Submitted another report to ACORN re the CBA XXXXX account, and complained about the lack of action."
* "Thanks for all your help, greatly appreciated."
* "Simon is the utmost professional that goes beyond what's on paper"
* ""He genuinely cares about your well-being and mental status"
* "It took a long time for me to turn for help but turning to Simon was the best thing I could do"
* "I am very impressed with your work. Submitted another report to ACORN re the CBA account, and complained about the lack of action."
* "Simon stood by me and saw the process through. He was not just a Forensic Investigator."
* "Simon was directly requested to volunteer some advice and put forward a willing participant on Channel 7's Today Tonight program"
* "I recommend Simon fully for any investigation as his programming and forensic investigation skills are outstanding"
* "Simon not only solved my case but from Today Tonight's expert request, he enabled me to explain some views on Cyber-Bullying"
* "I have gotten to know Mr. Smith over the past 10 years, both as a person and as a Computer Programmer. As a Computer Programmer, Mr. Smith stood out, from early in our relationship, as an articulate and perceptive programmer. He has shown a tenacity in dealings with several International Companies and Governmental Departments"
* "Simon saved me 10's of thousands if not hundreds of thousands of dollars with the lawyers and he got me the results I needed"
* "Simon was onto the lawyers and made sure things were done!"
* "I highly HIGHLY recommend Simon and eVestigator® especially to sort out the lawyers and give amazing factual results."
* "He was smart enough to get the actual evidence from the cloud and the iPad at the end of the day didn't even make much difference! He is superb."
* "I am a great judge of character and you, especially you, have given me strength to go on. Thankyou so so much, you are a gem.

The Banks and the Increase in Cyber Crime in Australia - 03 February 2016 - eVestigator® - "It is evident in cases that I'm currently performing that cyber crime has increased dramatically over the last three years. There are now smarter ways for criminals masking their identity that contributes to the typical attribute of misinformation that is used to target vulnerable people. I have noticed an increase in dating cyber crime especially in the Christian sector as there is a higher level of trust among Christian dating site users and it appears that one may come to the conclusion that a particular religion seems to be an innocent victim. I say that this is not so. It is a guess that potentially in the past has worked but anybody is a victim in these strategic cyber crimes that I am witnessing. Mostly what I'm seeing is a co-operative team of individuals that work both nationally and overseas. Nationally they are able to open up Australian bank accounts and overseas they are able to concoct stories as to the transition from the Australian bank account to a Malaysian, Nigerian or South African bank account. There is however one major flaw in this whole system. I question the banks and I put them on notice that they themselves are negligent in the way they handle or attempt to handle what they consider to be cyber crime."

"The lay customer is the victim and the bank is the commercial entity that is ultimately performing the transaction. Take this analogy; imagine you are buying a fridge from your local retailer. If you experience problems with the fridge within seven days of your purchase and your retailer tells you to call the manufacturer then your retailer would technically be (and this is not legal advice) in breach of the Australian Consumer Law being the Competitions and Consumer Act 2010. Ultimately the responsibility lies with who you pay or who commits the conduct. The banks have guarantees that are considered to be consumer guarantees and they protect customers against fraud. However, I find it ironic that the banks themselves will not communicate with police or to higher authorities to report such fraud, I wonder why this is the case. I believe that the banks would ultimately be reporting themselves because the result of the banks reporting that they have given money to a criminal would ultimately give responsibility back to the bank and their consumer guarantees when it comes to online safety and digital fraud."

"There are three massive cases at the moment I am dealing with where I am going to be recommending legal action against the banks in addition to cyber forensic data that identifies the criminals internationally that was obtained through propriety cyber forensic methods as it is obvious that the IP address of such criminals isn't forthcoming. My understanding is that the banks have an obligation that, again without indicating any kind of legal advice, could possible put them into a position called 'Unconscionable Conduct'. I suggest anybody who has any issues with digital fraud to contact a forensic investigator like myself if they get nowhere with the bank or the police."

"There is another angle to this that everybody is missing. Ultimately at the end of the day, the banks may very well be contributing to the fraud by rewarding those who are actually engaging in fraud. Without getting into specific conduct of a particular case that I am currently working on, I would like to state that this is most likely the case and I will be making reports to the Australian Federal Police of this nature. I strongly advise every person to read their guarantees that the bank give them and the Terms & Conditions that they rely on when they conduct internet banking and/or permit others to conduct internet banking on their behalf and the way that the conduct is intentionally hand-passed to multiple liability and discovery sources like ACORN, the banks fraud team, the local police, INTERPOL and the Australian Federal Police."

"As a forensic investigator, I can tell you now that the banks have a lot to answer to and any person who is experiencing such problems should contact me immediately."

$200,000 dating scam BUSTED by SCAM expert Simon Smith! - 21 January 2016 - eVestigator® - "I had the pleasure today of using special forensic techniques to attain the exact IP address and location details of a massive dating scam that involves potentially hundreds of people in a pyramid style dating arrangement. I have requested my client report the details which nobody has (specific IP/Device/UA String) to ACORN, and really hope for the benefit of all victims ACORN will use the AFP to make Federal arrests."

"This involved Australian bank accounts and a series of people both in Australia, in Singapore and wait for it, Nigeria. I must say that this is not the only case that involves this kind of money. I am just about to release a press release in this matter as I have grave concerns that the banks are involved. At least in this one case I have evidence that suggests that the bank are not cooperating with their Fraud guarantees. This is a major issue for Australian consumers and must be reported to the public."

"There is more than one SCAM like this I'm working on. People forget the part the bank plays in this, and the level of protection and security they are entitled to. I will be advising in my report to my client that he provides ACORN with specific information that in this case implicates the bank, at least allegedly by way of conduct and advise that the ACCC must be involved. So far I have solved over $750,000 worth of SCAM's."

"The proof is evident, the scammers are exposed and I shall update you if the police update my client. For once we hope the countries can work together. The details (all except my incriminating findings) have been reported to ACORN. My findings are the "Golden Bullet" that will enable an exact location and arrest. I not only found out the true IP of the SCAMMER's, but the method and scheme they use. Innocent people are setup as part of the scheme in a massive money laundering exercise. Sadly the banks take the so called unproven "victims" word for it, however I shall be reporting to the AFP this conduct as the banks are neither investigators nor are they the police. They have however frozen money in my victim's account due to unproven information and they will have to answer to the ACCC and the Banking Ombudsman as well as the AFP, because not only did they witness the victim being used in the SCAM, they are rewarding an alleged "victim" by freezing his account."

"Nevertheless you cannot get a better result than the source, and that is what shall be passed on to ACORN. I will also be making my own recommendations to the AFP on this matter."

Ending a Relationship? Make sure you know what you are entitled to! - 18 January 2016 - eVestigator® - "Story of the week is more some useful advice. As a Commonwealth Family Dispute Resolution Practitioner (and trainer thereof) and Forensic Investigator that deals with extensive Personal Safety Intervention orders, I see a lot of 'hiding' of assets."

"One such example is, that if in the event you are going through a divorce (ironic that I'm also a Commonwealth Marriage Celebrant) but life is very unpredictable to say the least, you need to know your rights. Usually you see the typical behaviour that is similar to that of what I call a "pre-stalker". You see some niceness, then some dictatorship and a bit of control and maybe more niceness and what looks to be open attempts to 'help' the other party."

"I have done many cases like this where help=hide information. If it happens, and if it must happen, then remember that nothing is black and white in the Family Court but don't be bluffed by what people 'say' the judge is likely to do and get scared off during mediation. At least do your research. $1 spent on my forensic services could not only get results but save $5 spent on lawyers writing unnecessary discovery letters."

"One such case presented and I am happy to say that due to my services she is at least $200-300k better off than what she was 'told' she was getting. Much of what I do is facilitate the 'Project'. I don't see an investigation as one simple fact. I see it as a project. A project that I can coordinate all parties, save you money and get you results. The only time this is affected is when you are presented with a brick wall, then we need to knock it down!"

"The moral of this story is when it comes to divorce and money, trust nobody, get facts, then get lawyers for the important parts. Don't waste all money contesting wills, or assets in churning letters up and down. You may be missing a $200k term deposit sitting in one parties name that is half yours!"

Computers vs Humans, Processes -> Models -> Outcomes. Biometrics and voice example - 08 January 2016 - eVestigator® - "Many people can recognise a person straight away by their face and also sometimes by their voice. But how do computers recreate or examine a face or voice for what a human brain would assume is equivalent."

"Firstly as a master programmer and lecturer for over 25 years, a developer of innovations, I will be the first to admit that the 'computer' is not at all the only tool in my toolkit for forensic IT services, however it is a necessary tool though as it forms part of a process which leads to a method and produces an outcome, with the addition of many other sub-components, all of which rely on each other. Imagine a computer is just a giant calculator that can do nothing until you press the buttons. Well that is true. However, can you press the buttons 240,000,000 times a second? I draw similarity to today's programmers who make 'websites' and work as I used to as Senior Anlayst Programmer with popular tools. People think that a template or software is the be all and end all and nothing else matters. They invent many words and accreditations for nothing more than a heavyweight unreliable set of locked down (or even worse not locked down your way) code. When I first started programming I literally had to draw every pixel on the screen. If I wanted to do something intelligent I would have to do it low level. Nothing has changed for forensics, but for programmers it has."

"What is it that has changed? Programmers have got lazy and trained to use pre-built templates. The issue with this is you lose all the control in between (and you inherit their bugs). I have written many API/SDK/plug-ins as a programmer FOR programmers because nowadays there is not one method to use some magic software the way you want you to use it 'exactly' for. So, you lose creative control, increase security risks not knowing all the code and/or everybody knowing the open source code and risk your entire business or assets on someone's "playground". You can see my certificates and credentials below and yes they are a token but how do you do cyber forensics if you're a template trained expert or trainer?"

"My answer is you simply can't. Imagine a painting hand painted half way; you can't touch the first half. The point I am making is that a good expert does not have to mention software packages (and all the jobs on job sites are direct evidence of people wanting to employ puppets of these products) they should be able to do ANYTHING AT ALL. Notice in that statement there was no mention of a computer?"

"Recently I was asked to both forensically analyse a voice and reconstruct a face. The first thing that came into my mind was OF COURSE, THAT'S EASY AND I'VE DONE THIS MANY TIMES. The first thing that would come into perhaps another mind is hmmm I'll try to go to Google and look for free software that does that. So because I understand the raw mechanics of any sound file I don't need fancy named software. I just write my own! Take that logic and look at the human face, facial reconstruction and recognition, or any biometrics for that. At the very basic level an expert should remove the computer from the question and ask themselves how I as a human could do this (understanding that the computer has an incomprehensible advantage over a human in consistency and is necessarily sometimes an absolute must to form a method as a process, with its speed and other advantages). Without getting into artificial intelligence concepts which I actually call Official Intelligence, I am happy to report a successful outcome."

"If someone says can this be done and a human can do it, the invention and intelligence lies in what you can do with that computer that makes a difference to the outcome to form that piece of the puzzle, not what the computer is going to do for you. There are plenty of parts to a method and system even in everyday life, but they should be treated as one element to complete what would be necessary to complete the next element, and so on. Such a process creates a method, which creates an outcome. It is no indifferent to any other necessary piece of the project, for example investigative ability or data extraction. Computer Forensics and implementation is necessary to do things that are still logical but out of absolute reach of the normal way of thinking, it is strategy. It is the strategy that forms the process which creates the method which produces the outcome - it really is that simple but not many people understand this (not even some Government departments). The use of a computer in forensic investigation is a necessary component as a whole and does nothing not as the sole attribute. It is also the same for the reverse. Without a computer, computer forensics (in the nature of this article) would not form the process that creates the method. Computers are necessary for their speed and collective use to deliver a logical outcome. If you take one piece of the puzzle out that is the heart of the puzzle in any process then there is no process. So in reverse if someone claims to be an expert in XYZ named software, what they are really saying is 'I am an expert in using somebody else's restrictive set of rules'."

"The moral of this blog it to give an expert's point of view to distinguish fact from fiction in how a process that uses a computer is required but not the magic tool or sole tool people thinks it is. We tell computers what to do. They do it faster and either make a workable process or make an impossible process! To understand the backbone and the place of the computer in any process, it is necessity to value the hardware contribution and not the software, and that contribution may be utmost necessary to create a real process or strategy. In my eyes that is what defines innovation."

If a pineapple was able to give mechanical benefit of the raw unparalleled computer (just being one necessary component to the entire system) then you would use the pineapple, and it would be mandatory! In Forensic Investigations as we are doing facial reconstructions and voice analysis, to attain a match you need speed but you are still relying on what you first opened your eyes to as a baby. It is the mechanics of the human mind in picking the tools necessary to create the method and process that attains a result in both innovation and investigations, and this requires strategy."

I caught the stalker stalking the stalk-ee yet I uncovered the stalk-ee as the stalker - 05 January 2016 - eVestigator® - "Well it did not take long for the stalkers to come out. Well this was an interesting case that I'd like to share with you. Imagine finding a stalker that is the victim to stalking and being presented with the person being charged for stalking, and turning the tables?"

"Well it happened. I managed to completely reverse justice in this instance. Firstly, stalking is a crime and should be reported to the police but cyber-stalking is something new to this country. This is something I am an expert in as I grew up through the birth of all versions of the consumer internet and saw where things went wrong as a programmer from the age of 11."

"So, I was approached by a guy who was accused of stalking and had a LOT to lose. Despite stalking usually being treated civilly, it is dangerous, because if you get an AVO, IVO or PSIO against you it has criminal repercussions. I should know - I've got someone put to jail on a suspended sentence on this very subject. But what I did for this client was not only cost effective but well worth it. I performed some IT forensic work on his computer and found that the very person that attained a 'ex-parte' application for an intervention order was monitoring him before, during and after they sought that order."

"I'll say that again. The actual 'victim' was monitoring every email of the alleged 'stalker' whom she had forced out of the house by perjuring herself in the Magistrates court and not telling the full story. It was in fact her that was stalking him. After some simple evidence on paper (as I always report only fact) - and a mention, things reversed quite rapidly for the Applicant. So let us just say at the mention things reversed pretty quickly. It was a small but ironic success."

"It just goes to show, you can't hide behind a masked IP address from eVestigator®"

Happy New Year Everybody - and on comes identity fraud! - 01 January 2016 - eVestigator® - "First of all Happy New Year, and we do hope that you take this year to look at your cyber security techniques and learn ways to prepare for what I call CW3, Cyber War 3. Essentially, it is already happening in front of our eyes."

"This year started off with a client being the victim of Identity fraud, which branched out into credit card fraud, and very rapidly became an international fraud syndicate."

"Simon Smith (eVestigator®) is currently working on this case and cannot reveal anything until data is confirmed but it is safe to say that due to the rapid discovery of information, the pieces of the puzzle are all fitting together nicely, waiting to be finalised and validated, then reported to the AFP or ACORN."

eVestigator® solves the Fake Microsoft Support Scam (gives ACORN IP info) - 26 December 2015 - eVestigator® - "Well, this particular customer only lost $1500, but as an ex-ACORN unhappy client, he was very happy to see that I was able to identify a unique IP Address and Date/Time of the attacker. This was reported to both the ACORN and the client."

"Now, with our support hopefully an arrest can be made. We were able to find all the Australian details that our client tells us ACORN dismissed, but went one step further and via strategic Digital Forensic Programming, captured the scammer red handed - with all his/her IP details, including browser, language, origin - essentially enough information to put them away for a long long time."

"If you want your Cyber-Crime or forensic crime solved in any jurisdiction, there is only one person that can get you there. Give Simon Smith a call on 0410 643 121, and at such a minimal cost, this client is now happy that their scammer is caught. Naturally we are working on some large scale cases - but this SCAM revealed an "Indian" operation that we probably never will know the outcome of - and of course, as ACORN told the customer they could not do anything about it the first time, now hopefully with the help of eVestigator® they can. That's another success story to end the year with!"

eVestigator wishes everybody out there who is a victim of Cybercrime hope - 25 December 2015 - eVestigator® - "I wish to let you all know that no matter how hard or how big your matter is, it is recommended to take these couple of days and get some clarity and know that I will help you with your issues when you need. I am not planning a major break but there are some times I will not be available. If you are the victim of cyber-crimes or cyber related activities, know that you can still attempt to contact with me during this period."

eVestigator refunds customer a portion of invoice for doing too good a job! - 21 December 2015 - eVestigator® - "Well, we have a new win - and a victory for the client in 2 ways! For the first time in history within less than 24 hours I had achieved an outcome for my client from what seemed a massive cyber-stalking case involving an unknown stalker - with 3 Facebook profiles."

"Ironically, my first set of intelligence hit the nail on the head. Within a bit more than half the time quoted, I had actually identified the stalker of multiple forms of media - attained for my client a full 1 year intervention order default judgment and the stalking stopped."

"So in this case it took me less time and I returned the outstanding funds to my client! This is why people trust me because I do the right thing. Even though giving money back is essentially unheard off (say if it was another profession for a fixed price job) - with me, it's fair and it makes the client happy."

Sample dating scam - that just came my way - 19 December 2015 - eVestigator® - "It's almost a daily exercise for me deleting thousands of SPAM (as I don't trust SPAM filters) and of course amongst all this SPAM is the human check of reality which I can detect in about half a second."

"Here is today's dating scam that happened to make its way to my inbox. As I always say, how do they know me, where are the purportedly writing from and where am I purportedly responding to and do I even know this person and if so, why would a non-identifiable random email just pop into my door. So welcome to Svetlana."

"Hi,Im Svetlana. Are you for real?! Im interested in knowing you better but Im not sure what are you looking for? Send me your reply directly and I will send my pic."

"Now this came from - va at I don't recall having anything to do with this surprisingly. Most importantly (and not that it matters to me) but we have a reply address of """"It's important to realise that Russian girls called Svetlana don't just randomly email you when you have not visited to a chat site, and even if you did it would be a giveaway because they don't even know your name!"

WARNING: New Scam Email purporting to be National Australia Bank - 19 December 2015 - eVestigator® - "Dear customer,

"In our precautions against internet fraud, our bank comes up with a new policy to prevent costumers from being victims of illegal transactions."

"There are 2 steps required in this procedure, in order to avoid problems with your account."

"What should i do ?

The email is as follows : 1. Download the attached file and open it on your internet browser. 2. Confirm that you are the owner and follow the instructions carefully! Thank you for the cooperation and once again thank you for choosing our bank. © National Australia Bank Limited. Use of the information contained on this page is governed by Australian law and is subject to the disclaimers which can be read on the disclaimer page. View the NAB Privacy Policy."

"Naturally this is obvious - always look at the reply to address and the sent from address. Further check to see if it was actually sent to YOU and whether or not it even mentions you. Of course you should report this to the police/ACORN."

"Another obviousness is the spelling and grammar mistakes in the bank email. We all make mistakes, but you would think that a multi-million dollar institution would have a spell checking system!"

Corruption does exist people - yes - even in the Police force - 19 December 2015 - eVestigator® - "Well this week was interesting. Full of police deceit, lies, and refusal to take statements which is unlawful especially as it is actually a human right. The definition of statement is that a written document to the police. It is your version of events. It is not their version of events or whether they have the energy to type on a computer. It is important you beware of the Notebook trick. If the Notebook comes out and you are given no paperwork, you have NOT made a statement, which means there is no official record of you doing anything that is later found to be a crime."

"If you are not giving evidence on tape or in front of an officer of whom provides you with a copy of the statement, the officer has allegedly broken the law and not taken your statement, your version of events. Every Australian has a right to make a genuine statement."

"In the past Simon Smith has had Sergeant's put through training as well as being investigated and disciplined for refusing to take a statement. If you ever come across a situation where an officer refuses to give you a copy of an official statement and you think you are marking a statement, then you should seek legal advice as allegedly the Officer has perverted the course of justice and should be Convicted for this offence and stripped of their badge as they have not acted as a 'police officer'."

"Everyone is equal before the law. There are some excellent police out there, some are my good friends, some friends are prosecutors, however sadly every week I also here stories and witness events showing an enormous trend of non-complying officers. One specific example of which I was witness to, a young boy of 18 years old, a stalking victim, was under surveillance and the car had fled three times on three occasions one of which the victim got the number plate placing his full trust in the law and the police. I did what any normal person should do and said you must go to the police and report this. He did attempt to do this. Upon arrival after about 69 seconds, he was told to go home and see if it happens again, and if so, call 000."

"Sorry police, but that is unacceptable. The minister has to do something about this as this is a serious problem. We all pay taxes. We are all entitled to protection of the law. No police officer is above the law. A police officer should protect citizens of the public. If anyone has any issue with an officer either in or not in uniform which they believe have not performed their statutory functions, for example, allowing you to make a statement on a genuine serious crime, you may report it to me and I will report it to the appropriate authority. This information comes from actual statements made to me by the public, even today."

Apparently ACORN cannot take the heat - so they shoot the messenger - 19 December 2015 - eVestigator® - "Well, after ACORN dismally failed yet on another case I resolved, they thought instead of getting on with their job and appreciating the work of Simon Smith (A licensed Private Investigator), they would kick up a storm and cry like a baby to the LRD."

"My statements are factual. I report fact for the customer and the State. This case was already a 'too bad so sad' ACORN case as it turned out. It is fact that I have had many customers come from ACORN with serious Cyber-Crimes only to be told to just 'stop paying' or to 'read a fact sheet', and even to my surprise a statement saying they don't actually investigate the Crime but it is the citizens responsibility to hire an expert to give it to them on a silver platter. Another excuse is sorry, we don't investigate international crimes that affect Australian's but originate overseas." So one must ask, what does ACORN do? . It certainly is not what they have misled the public to believe they do, and this is based on FACT from people who have come to me."

"Since ACORN took it amongst themselves to not take a complaint against themselves, I will be quite happy to tell them fact from customers whom I have dealt with. We are supposed to be on the same team. We certainly are not. In my own personal opinion and using my right of freedom of expression, and informed by my clients, I Simon Smith state that based on the evidence, ACORN is a failure and a waste of tax payer money."

"They clearly are incompetent and misleading to the public. In my opinion ACORN have breached the Australian Consumer Law and have misled the public. Everyone I speak to 'think' they will find and fix. The evidence shows otherwise. If you have a spare couple of years, then send off your data to ACORN." "One unnamed Senior Constable is going to be reported to be charged under the Crimes Act 1958 for defending (in my opinion) a completely technically incompetent department that has deceived the public and attacking people who actually do things to help the public"

"Everybody should be treated equally before the law. One unnamed SC at the LRD will be most definitely reported to have committed a crime under the Crimes Act 1958 (Vic) for allegedly using bullying and scare tactics and harassing people who actually fix mistakes of both the police and ACORN. It is not good enough, and I will ensure he is taken to task. There are fantastic police officers out there, but there are some that make it bad for everyone else."

"No police officer is above the law. I will be recommending to the Chief Commissioner of Police and the Minister action against ACORN and alleged bullying police officers who defend a (in my opinion) useless and corrupt department that has failed."

Phishing scams are all over the place, look out for the latest one - 16 December 2015 - eVestigator® - "A new email purporting to be from PayPal is lazy and one of the easier to spot scams. The subject line is 'Limited Account Please Update'. The logo looks to be the right colours otherwise it looks completely different, it starts with 'Hello Dear Customer', there are grammar errors and the sent address is"

"If you are still not sure and they did actually guess or have your full email address correct, not just the domain, from a new browser window login to your PayPal account. If your account really has been limited there will be a very prominent message on your account to tell you so. Some scams can be hard to spot, with great attention to detail. This isn't one of them."

Sony Corporation wishes to inform you that your Identity/Location has been endorsed as the winner of $1million - 12 December 2015 - eVestigator® - "Well today I'm feeling lucky. I woke up to this:"

"Please send Ur Name address age Tel for More Info. Your Sincerely, Mrs. Barbara Deemer [Your Sony Key Code: SYUK0303#]"

"I WON! It's amazing. Firstly let us take a look at the email domain it comes from: Sony iPrize ( seems interesting, but I want to know how it got to me. It is sent to: winner (, with a reply to address of:"

"Well, so a) they didn't know who I was, b) they are not Sony and 3) what has Yale got to do with Sony? In this instance I deem it obviously as fake and unless someone at Yale is fraudulent, then I would count this as SPAM."

"The moral of this story is 'phishing' is the art of purporting to be someone or some entity you are not. This could probably be just someone trying to bring down Yale's servers in a DDOS attack. Either way the first thing to look for is 'Why me, and is it really me they are sending to or is it generic?' The second thing to look at is at 'what domain does it actually come from and is it the domain of the real company?' Then you need to look at any reply-to addresses, as people might use a legitimate spoofed sending name and address and beautiful graphics to fool you, but if they want your details, unless they are Sony, the reply to address will tell you really where you are sending your personal information to."

"Typically, a scammer would make a domain or add a sub-domain to an existing domain like or"

"Finally as Judge Judy says, if it doesn't make sense, it's not true! She's very right"

Grief and Trauma and how an Investigator needs to understand - 08 December 2015 - eVestigator® - "I am the former CEO of Australia's largest marriage celebrancy Academy. I authored and taught thousands of students via my own written course materials in grief and trauma, conducting funerals and the like. I also draw upon my Graduate Diploma in Family Dispute Resolution, Nationally Accredited Mediator status and Bail Justice Training Course as well as relationship education experience as a marriage celebrant and counseling qualifications."

"This week has started off with some pretty serious cases m An Investigator by all means should not claim to be an expert in this area but at minimum I believe must have some training to enable them to determine whether a case is needing to be paused pending more important health reasons. At least having a toolkit of referral information and some training to determine whether or not you can rely on instruction from your client is mandatory."

"I have often had to suspend the case asking my client to consider first attaining outside help. I sometimes must rely on such expert medical opinion to ensure I am doing the best job for my client. Investigators have to have empathy and know where they stand and clarify instructions carefully as for both parties it is not conducive to the case, if the client is unwell. I have direct experience in handling such cases and especially knowing how to detect and refer."

A simple fast victory stopping 1 year of trauma - 05 December 2015 - eVestigator® - "When somebody knows your every move you have to wonder how? Most importantly it is best to get onto it straight away and not put up with threats or extortion as it is a crime and potentially the longer you leave it, the higher probability of data loss and more emotional trauma."

"I succeeded today in an extortion case where people may think they are safe behind a email, a fake Facebook account or a prepaid mobile, but think again! Whilst sometimes there are technical restraints, a good investigator has to use logic and simply strangely enough common sense. An arrest will be made and justice will be served in this case for only 2 hours cost to the client of my time and I get to enjoy the weekend too."

An investigator does more than just the job at task - 05 December 2015 - eVestigator® - "In a current case I am working on I noticed on the side a discrepancy in the billing and conduct of previous dealings in the case. Completely voluntarily I offered my client to look at the legitimacy of those charges and do a little bit of forensically informed conciliation. Bang. 13,000k given back to my client they never would have had. I give my all to every customer so when looking at an investigator you need to look at the proactive capacity and passion they have for their work. They were over the moon and never would have known about this." "Having built some of Australia's largest educational institutions valued at over $26m as well as being an expert auditor I had no trouble in just 3 discussions and 4 emails attaining in a separate capacity $13,000 worth of credit for my client of which I sought no benefit rom. I just like people not getting taken to the cleaners! $13,000 was welcomed, believe me."

"In a similar unrelated case I anticipate just through my mediation and conciliation add on skills, I may have spotted an opportunity for my client to recover up to $40,000 for unlawful charges. In no way am I a debt collector and in no way do I want to be one :), I am just making this statement to show my intuition and problem solving skills out of court. I am not a lawyer and do not ever claim to be one, but I am certainly equipped to understand what is right and what is wrong, both ethically and in common sense human behavior."

"There are lots of good lawyers out there and I rely on them sometimes to present my expert evidence. The point of this blog is with me, you don't just get a phone call or suspicion without supporting evidence, you get fact (and fact only - good or bad) and action if there is action to be taken on any angle. That is why people choose me. Please feel free at any time to view my Vocational and Higher Education level Qualifications above."

eVestigator succeeds again. Finds a criminal stalker forensically in 4 minutes - 05 December 2015 - eVestigator® - "Yes you heard correctly. Never before has it been this easy. Investigations are not just about expert computer forensic knowledge. They are about strategy. People often ask how much to find this person? How long is a piece of string that has cuts and twists and tangles all the way through? Strategy and direction and the complementary knowledge of having grief and trauma qualifications and teaching this discipline, a counseling diploma, combined with being a Nationally Recognised Mediator as well as a Family Dispute Resolution Practitioner, Marriage Celebrant and having a qualification from Victoria University in the 2011 Bail Justice Training course lets me have some level of directional intuition. Hence, 4 minutes :) The customer is very happy and that is the main thing! "

Just a quick note to keep your eyes open wide on the media as eVestigator has busted potentially Australia' Biggest Scam - 05 December 2015 - eVestigator® - "Well I must not say too much until it is charged but I uncovered one of Australia's if not Australia's biggest scams and forensically identified the offender. Keep an eye on the media."

ACORN - I must say I'm shocked - 02 December 2015 - eVestigator® - "May I direct you to the section of the website dedicated to what I have achieved and discovered from some disgruntled ACORN customers of which many cases I have solved. Please read the article which will be updated regularly near the top of this site. "

Timing of police serving intervention orders - 01 December 2015 - eVestigator® - "Well you have a victory, you do the hard work and attain an intervention order on behalf of your client and over 24 hours later the cyber stalker strikes again. In this instance with the excellent assistance from the police it is not served yet but may be in a day or two. It is fair to give everyone an opportunity to be served but it is a hit and miss on the timing opportunity. A breach and arrest would have been made but there is always next time!"

What happens when a client doesn't take your advice? - 01 December 2015 - eVestigator® - "This is often a sticking point for most Investigators/Mediators. You may have seen the text book scenario unfolding so many times and yet if somebody believes they cannot do something they cannot do something."

"Similarly if someone believes they can do something they can do anything! I wish to report another success story today. A dangerous stalking/harassment case turned nasty where I saw the alleged 'victim' almost having conversations with himself setting up a plan for an intervention order"

"I predicted this action in the words spoken and am very proud to say that this person who was alleging they were the victim and constantly harassing my clients, building a story ready to get an ex-parte 'lollipop' injunction. I therefore instructed my clients 2 sets of important advice. One - go to the police but 'in a certain way to a certain officer' and Two - go ask for a statement to be made again 'in a certain way in a certain manner' and Three - ask for the police to take out a Personal Safety Intervention Order as this man is likely to breach it as it was getting so obsessive and dangerous to the point of physical danger to my clients lives - and guess what - they got it!"

"A good investigator doesn't sit there and watch people they know 'human nature', 'process' and 'procedure' and naturally, areas of failure and potential human barricades. This advice worked perfectly and now they can concentrate on living safely after years of harassment, bullying, false accusations and stalking. That was a good result."

"Those that don't listen to advice or believe in an outcome will get that outcome, there has to be a point where trust is earned and respected, and then justice can prevail!"

The line between Defamation, Stalking and Imagination - 30 November 2015 - eVestigator® - "Well another successful week has passed. I have solved 4 cases this week. People often don't realise the crimes they may be committing. This week we have seen people lie and caught out by me in court, false imaginative creations of stories of which they may have lied to a Magistrate but don't realise my evidence won't only overturn their allegations, but potentially get them in jail!"

"No matter how it is framed, if you lie you may leave a digital fingerprint that gives you much more than you ever bargained for. Let's just say that if you think you are anonymous behind six Facebook accounts, think again. Upcoming will be a rather large blog entry relating to how the Internet and social media will destroy our privacy and show what I already see now as the new war so many are untrained to understand. The Cyber War!"

eVestigator® annihilates an intervention order action with a forensic defense - Who really is the stalker? - 28 November 2015 - eVestigator® - "This is a story that I'd like to share with you, anonymously of course. It is a well-known fact that people can lie in court and in Victoria (the Acts change but represent similar systems in other states) the Personal Safety Intervention Orders Act allows a person to enter the stand ex-parte and allege an incident and occurrence, and likely achieve an interim intervention order potentially destroying someone's life for the next 2 months before they get a contested hearing."

"This is an area that I forensically specialise in and would like to share the story of how useful a Forensic Factual Investigator can be in these instances. Understanding that there is a serious risk of an order being placed on a person (if it was not a correct series of events), the bigger risk is the breach. I have done over 50 cases but none like this. A breach could potentially give someone jail time and a fine depending on the complexity of the breach and the police's willingness to follow through with it. Remember, all this can be initiated civilly with a lie."

"One such case occurred where my client was alleged to have been stalking a person and keeping him under surveillance. After only 2 hours of forensic investigation of her iPhone, social media links and internet behaviour, I found concrete black and white evidence that his exact iPhone was logging her under surveillance before during and after the interim intervention order was granted!"

"Even further I found it had been going on far before and way after. The evidence I committed was compelling. It happened to coincide with what people don't realise could be a digital fingerprint. I suppose, if a person who accuses they are being stalked, and goes on the stand under oath, and then my client comes up with the name of his iPhone literally stating say "James's iPhone" has logged in every day to her account before during and after he placed an intervention order, then that is somewhat strong. More so, it was found coincidental to be happening after the order was granted with the release date of the iPhone, and forensically the phone was proven to have had its password physically changed and tampered with during these events, and synced to his iPhone."

"Not only for my client did this mean that they are actually the ones being stalked, a crime of surveillance has been committed, and the use of her mobile phone was intentionally tampered with to set the new password as my client could always login via the phone but not the computer. The tracking and forensic data further proves that my client was potentially the subject of GPS surveillance. So it looks like someone is up for charges. My client for just a couple of hours has probably saved thousands of dollars in unrecoverable legal fees in a no cost jurisdiction and has evidence to charge him with perjury, stalking, and using an electronic device to track a person."

"So I'm guessing that the gentleman that attained the intervention order without truth is going to regret ever getting on that stand. eVestigator® gets results."

Best Outcomes Advice - 02 November 2015 - eVestigator® - "Although it can be hard to know where to start, to take full advantage of any investigation time it is important to be clear in your brief to us so we can focus our attention in the area you need. Carefully consider the worth of new information compared to what you know and take a 'needle in a haystack approach'. These messages relates to successful iPhone, iPad and Android investigations, and believe me when I say if you think you have deleted something, think again! Sometimes not even the device is needed to attain intelligence. We have succeeded in this area and have many happy customers attaining answers that are crucial to them. Some criminal, some civil, however all equally promoting the same message."

The 'Cloud' (a friend or foe) - 09 November 2015 - eVestigator® - "The lesson for this week is to be careful what you put on your iPhone or Android device. Regularly backing up your devices is prudent, but pay particular attention to where you are backing anything up to and also how they protect the transmission and redundancy of the data."

"A lot of people find value in open source 'solutions' and 'plugins' like Word press and all these magical instant websites and themes (I call it a lazy man's programming- sorry but I'm just being honest). Not that there is anything wrong with a template but that is not logic. From what I've seen in relation to hacking, you want to say thank you for the visual and goodbye to the 'supposed' programming. Real programming (in my opinion) is to control and write my own code, I'm sure you can appreciate if someone knows the exact code behind your entire website, they clearly can read backwards and reverse engineer such 'common' open source. This could cause criminal or civil repercussions or identity theft."

"eVestigator® can forensically search and locate any remnants and security holes of corporate networks to properly and securely backup (or perform an emergency forensic data restoration) efficiently with both redundancy and security, keeping in mind (in the case of individuals) privacy. Imagine a non-programmer running your entire income stream of which you have no access to the code behind it. Then one day, all your income stops and an error pops up. What would that do to your business?"

"We have extensive experience in larger cases and have had quite a few wins. One such client won an uncontested hearing and is now gratefully seeing the end of a tormenting period of time and benefiting from the complimentary and combined skillset of eVestigator®, plus the $200k default judgment we helped control and coordinate with handpicked lawyers might have put a smile on her dial!"

Android Devices - "Apparently the FBI has fined you - 11 November 2015 - eVestigator® - "The latest amazement of the week was the famous modal screen bypassing all your Tablet or Phone with a message stating that you have been caught by the FBI watching porn and must pay a fine. 3 minutes and it has gone, but people these days create scams and viruses in a new way. Think of the psychology behind it. Everyone probably has an eBay account. An email purporting to be eBay can be made up by someone in about 5 minutes, leading to a $1 domain called for example.

"Amazingly it looks exactly like eBay - because its merely a capture of the screen. The lesson here is in one of my golden rules (check the reply email address) - although even that with a virus affecting your local DNS could spoof that. However the point of the message is about the psychology. Who doesn't have an eBay account? The lesson here is to look at the start and the end (not what you think is the middle). Did you make such a transaction or debt, and who are you communicating with. eBay is the trick. It diverts your attention away from the real method of the SCAM which is so obvious, but by then you've already seen the colour logo's, clicked the links and sharing your identity with someone in a foreign country."

eVestigator® gets IP Address to solve cold Acorn and High Tech Police Cases in Record Time, attaining a Suspended Jail Sentence as against the Defendant. "In 2 separate cases, eVestigator was approached as a last resort by some very unhappy victims. One had been waiting 5 years, the other 1 year. It is good to see the government is doing a great job in 'determining' there is a problem - with this new 'war' - the 'Cyber War'. It is fair to say it is also ever-changing and new technologies and ways of security breaches and exposure to identity via social media is expanding at an enormous rate. The cases are naturally very complex and can lead to both criminal and civil liability. However, there was a case that sat with the Victorian High Tech Police Unit for over 5 years (one of eVestigator's cases many years ago) which was solved in just 2 weeks from Cyber Investigation, leading to a possible sentence to jail or suspended sentence."

"How? Facebook, intelligence, common sense and other mechanisms. Further, he has also just solved a case that was delivered to Acorn gathering dust for over 1 year, in 1 day. Further, he has personally seen factual wrongdoings from IBAC. This is just Victoria!" "The message is, that clearly there needs to be more emphasis or resources on education at a young age because people simply don't know where to go, and in both instances, the delay was potentially more damaging than the conduct found in the investigation. It still is no doubt a good thing for Parliament to have mechanisms in place but are they working? Also the crime itself is half the story. The trauma and grief that follows the victim from being held waiting can lead (and has lead) to people having to get themselves onto mental health plans merely due to the injustice and time delay."

eVestigator attains a massive victory and solely defeats the entire WA Government Training Accreditation Council board's erred decision worth proving the government does not even understand their own regulatory definitions. "Well everybody said it could not be done. eVestiator® Simon Smith invented, successfully passed at audit and created a massive private accredited training college like as big as a Private TAFE.

The Training Accreditation Council however refused to a) make a decision in breach of legislation (despite 3 of their chosen auditor's declaring a pass on the audit) and b) refused to register the RTO (Registered Training Organisation).

A skills recognition initiative (the largest private institute in the southern hemisphere)."

"After 3 years of demands against the board who had no lawful excuse 'not to grant it' to make their decision so it could be appealed, so they did, on baseless grounds.Almost 2 years later, evidence from eVestigator® Simon Smith (of which Slater & Gordon could not achieve) given on appeal to the State Training Board deemed the Training Accreditation Council to have erred several times in breach of the standards not once, but twice, and reversed the decision around 5 years later.

The damages are expected to be at minimum $20m. It is noted though, that the WA Ombudsman was completely wrong and justice sometimes does exist. This cost WA thousands of jobs and skills upgrades and deteriorated market growth from Mr. Smith's creation. The State Training Board were undermined and forced to reconvene twice and found in Mr. Smith's favor twice - and later stated words to the effect of, "Never before have we seen anything like this", and have requested the Minister make changes to the system. Mr. Smith is unable to make any comment as to this matter.

Expert samples of how he can help

Cyber Security, Cyber Bullying, Workplace Issues, Criminal Success, Civil Success, Digital Forensic Expert Evidence and so much more..

His successes - not even a fraction, check testimonials and request advice

He has saved people hundreds of thousands of dollars in establishing hard facts prior to and in avoidance of litigation. Such facts are unknown to the general community and the investment in his services has proven this over and over again. Human testimonials are available.

The Industry

As a successful Expert Programmer and Lecturer of Advanced Programming and Entrepreneur at a very young age, he grew up with the birth of the internet and knows the skeleton foundations of where to look, making this statement fact, proving successful outcomes in many cases.

Cyber Crime

Statute and treaty law both refer to cybercrime. In Australia, cybercrime has a narrow statutory meaning as used in the Cybercrime Act 2001 (Cwlth), which details offences against computer data and systems. However, a broad meaning is given to cybercrime at an international level. In the Council of Europe's Cybercrime Treaty (EST no. 185), cybercrime is used as an umbrella term to refer to an array of criminal activity including offences against computer data and systems, computer-related offences, content offences, and copyright offences. This wide definition of cybercrime overlaps in part with general offence categories that need not be ICT dependent, such as white-collar crime and economic crime as described in Grabosky P & Sutton A 1989, Stains on a white collar. Sydney: Federation Press.

High tech crime

High tech crime is a common label used by both the Australian High Tech Crime Centre and by the National High Tech Crime Unit in the United Kingdom. These agencies deal with crimes that rely on the use of ICT, or which target ICT equipment, data and services. Their focus is on the complex networking capacity of ICT, which creates a previously unimaginable platform for committing and investigating criminal activity. High tech emphasises the role of ICT in the commission of the offence. Different practical considerations arise according to whether ICT equipment, services or data are the object of the offence, or whether ICT is the tool for the commission of a 'material component of the offence'.

eVestigator® (a 100% positive result success rate to date)

Civil, Criminal, Corporate Factual & Digital Forensic Investigations, Fact Finding, Data Recovery, Bug Detection (iPhone, Android, Surveillance & Computer Forensic Expert), Litigation Support, Corporate Security Penetration Testing, Intelligence

Hi I'm Simon Smith, Cyber Forensics Expert Court Witness, Expert Investigator and the eVestigator®. I have worked on too many high, middle and low profile cases to count. This page only lists very few. It is amazing to see how much difference fact makes and how much money it can save a client. I often see clients who have wasted $100,000+ on litigation and got nowhere, and then I have a result for them (in one particular case) in just 2 weeks. That is how I work. I am just the person, with the independence, skills, knowledge and background, equipped as a specialist forensic, qualified Private Investigator to trace conduct back to its source, to affirm, expand on or re-create a scenario of alleged conduct for you.

I was born in an era of technology and rapid advancement, I manage and have managed enormous enterprises for over 20 years - programming in every language combined with strong and proven civil, criminal, factual and government investigation skills and credibility, having given intelligence to Ombudsman, Ministers and the Auditor-General. My knowledge and unique experience gives me that competitive edge to give independent, expertly obtained fact.

When I was 20, I started a three-year stint as a lecturer in Advanced Computer Programming at Swinburne University of Technology. I was also employed as an Analyst Programmer at the time, I already had about 10 years (mostly childhood) experience of programming in earlier languages and programming a server capable of handling the very first real commercial internet traffic. eCrime and White Collar Fraud, eFraud, Cyber-Squatting, Cyber-Legal assistance, Cyber-Stalking, Cyber Attacks (denial of service and more), Intellectual Property Breaches and so much more have grown from systemic mistakes made in the growth of the public internet/intranets over the years, and *will* continue. As the inventor of computer-reliant patents, I am making history and was praised by three Federal Court Judges in the full Federal Court of Australia in a case related to defeating the Commissioner of Patents attempt to revoke a patent.

I am an expert in software related IP marks. I am in a position to demonstrate algorithms that can assist a Court or jury with understanding a crime or offence in simple terms. With experience, credibility (Commonwealth FDRP, NMAS Mediator, CMC, Forensic Investigator and more) alongside commercial experience programming and investigating software engineering holes, and expert programming on all platforms spanning 20 years, I can help illustrate to the court, justice and/or jury, beyond reasonable doubt, how, when and why events occur in simple terms to affirm intent and conduct.

Corporate & Government Forensic Investigations (Any kind of investigation or SCAM discovery including corruption, fraud and more)

I am independent and provide a completely impartial service. I can and have used my abilities to assist the government in many ways by providing external investigations and forensic dispute resolution. I specialise in high-tech white collar fraud and can and have identified system issues of corruption in government departments, be it influenced internally or externally. Rightly so, the public expect the government act in a way consistent with their charters and legislation and the guidance of their Ministers.

I have had exclusive experience in unveiling fraud in government departments and providing intelligence to senior independent officers like the Auditor-General and the Ombudsman. My Mediation skills are often used in conjunction with my forensic programming/reverse programming skills to determine fact to apply policy.------- In the corporate world Cyber-crime, Cyber-stalking, Cyber-bullying, Facebook abuse, email abuse, YouTube abuse and cyber-related staff harassment/stalking has become a systemically increasing problem for internal personnel as well as the corporation.

I have assisted in cases by gathering intelligence via the new world of social media, I assisted in jailing a person in Victoria for the serious offence of stalking. It is important to trust your employees and a breach of that trust must not go unnoticed. There are three main qualities that when combined, produce absolutely super cost effective output. See below.
"We do not have to all be experts, sometimes common sense is enough". eVestigator® - Simon Smith

Keep Reading...

Why Me? - I'm not just a Forensic Cyber Expert

I am also a Nationally Accredited Mediator, Family Dispute Resolution Practitioner, Reverse Engineering Expert and Cyber Security / Cyber-Legal Expert. I also have Graduate Diploma level skills Digital Education and Management and have a strong business understanding, as well as businesses experience when it comes to disputes and how to save money and not fall into a loop where you spend money and get nowhere. I have had significant experience in IP disputes, Patents and Trademarks and I am an expert in the Education Industry, as well as a commercial authorised Apple, Android and Certified Windows Developer, having made several commercial applications and having built several multi-million dollar enterprises. I understand, which is where my advocacy service assist greatly, and saves you or your client money.

I am a Forensic Private Investigator qualified under the Victoria Police Private Investigator Licencing Regulation Department - Simon Smith (CHFI) t/as eVestigator

This gives me the skills to see through the lines, get fact, without fear or favour, whether its for or against the government or for or against a civil entity, I find fact.

I am a Nationally Accredited Mediator accredited by the MSB under the NMAS and Commonwealth Appointed Family Dispute Resolution Practitioner

These skills are an absolute necessity and are often what is missing with other professionals. It enables me to determine the suitable jurisdiction and to better understand the dispute and resolutions, which saves you or your client money, and my client's praise this ability. Especially with family situations, as in many cases an FDRP, in normal circumstances, is the only person that can sign a s60(i) under the Family Law Act granting permission to enter proceedings involving children after mediation.

I am a Professional Advocate

This is the most important part. I am happy to say that by joining all my skills together, and gaining permission from my clients to work with others like Lawyers, Barristers, Government Authorities, the Police, I can guide them through to an actual total outcome. Many people deliver services in pieces, and you either end up wasting your money with nothing, or having to re-explain everything again multiple times costing you more money. I like to see them through. My clients have told me I have saved them hundreds of thousands of dollars, and come to an expedited outcome after years of fighting.

Success (Samples have been de-Identified)

Note: This is only a very early stage layout of some successes. There has been many more over the years and many more happening almost daily. They tend to now appear either anonymously or via way of comment, updated regularly as time permits in both the blog or evident in the numerous testimonials. Please make sure you check them out.

I love my job - the best way to show competence is with fact, so here is just a sample of de-identified cases Simon Smith, Australia's very own eVestigator® has been involved in.

I found the IP identity of the fake Microsoft Tech Support Scammer (or one of them - and gave it to ACORN). Now this was interesting. More than 90% of my clients come to me frustrated after not having any luck with the police or ability to make a statement. This one particular client (a very smart man) received a call one day and being the trusting person he is, he was strongly led to believe his computer was infected with a virus and Microsoft have detected it and are calling him to fix the problem. Everyone has different thresholds and trust levels but I can understand how an older gentleman would believe this could be the case. To cut a long story short the person with an Indian accent got him to install remote control software on his machine, allowing the 'hacker' to install malware, giving full access to his computer when connected and online at anytime. Plus, he thought he would throw in a low level password and bribe the gentleman to pay money in order for Microsoft to remove the password from his computer.

The gentleman spent $1500 (it could have been more) to this 'entity' and nothing happened. They still however said they needed more money. The gentleman then reported the crime to the police who did not take a statement despite it being a crime under the Crimes Act 1958, and sent him to ACORN. ACORN (people believe) is a division of the police force to report and act on cyber-crime. The gentleman swiftly received notification from ACORN with a fact sheet and some general advice and said nothing could be done.

This is when I got involved. When he presented his laptop to me I was able to take off the important data and remove the entire malware/virus, and even further since they were still trying to get money out of him, I decided to locate them. Via proprietary techniques, I attained the criminals IP Address, IP, Mobile device make, firmware which was in India. As it turns out, ACORN ended up making a complaint about me for not telling them what I found out - saying I had a duty to report it. I did tell my client to report it but must admit was taken back from that approach and was insulted. Nevertheless I got over it, and sent ACORN the identifying details so they 'might' take action. What happened to Interpol? The police have always had the ability to report international crimes. I have seen letters from customers where ACORN have said "we cannot investigate international crimes" or words to that effect. So, I solved perhaps one of Australia's biggest SCAM's that ever existed. My client thanked me profusely and that was relieving. I ended up taking it further with ACORN but at the end of the day it is a small world and a lot of crime and this was something that they may have been too busy for. Nevertheless I continue to help people get real justice.

I uncovered one of the largest DDOS cyber-attacks (with this case being followed closely in the media) involving defamation of a celebrity. I uncovered and traced an underground crime syndicate that was responsible for spamming over 24 million people at the request of a disgruntled ex-business partner. I found the link to identify the accused on the balance of probability. This was a massive find, with no leads, and with sheer investigative work, a series of events have led to what could be considered extreme reasonable doubt against the accuser's story. The case is privileged and ongoing, no more generic information can be provided in this matter.

I was approached on behalf of one of the world's largest insurance companies to assist in the underwriting, in conjunction with their solicitors, of new Cyber-Security and Indemnity policies, the development of new risks in this ever changing industry, requesting assistance in indemnity wording and risk and creating PDS's around new and innovative white collar fraud and cyber-attacks in the media at the moment.

I was requested to analyse voice biometrics to determine if a suspect had made a hoax bomb threat by telephone and was requested to advise the lawyer of the accused on what should technically be requested from the police and gave intelligence as to the voice codec and causing reasonable doubt of biometric distortion in a compressive lossy voice algorithm. This was a very serious case with charges under the new Anti-Terrorism laws.

I was recently approached by an individual seeking help after being accused of several counts of hearsay sexual offenses leading back over eight years, with the evidence reliant on MSN and Facebook data. This case is pending; however as the accused was pleading innocent, I was able to demonstrate beyond reasonable doubt the unreliability of supposed forensic data relying on old MSN messages.

I was approached and subsequently investigated and compiled an expert report in conjunction with a solicitor's privacy policy detailing the privacy implications, after inspection of the source code and auditing of the non-identifiable hash algorithms that intercepted mobile Wi-Fi beacon signals for the purpose of tracking retail customers, I gave security and privacy protection recommendations based on my findings.

I worked with State Regulators, providing intelligence which led to two convictions, stopping an unqualified electrician performing further illegal, unsafe and non-compliant electrical work. He was convicted and fined.

I investigated and provided evidence to ASIC of the deceitful and misleading actions of a Director who allegedly breached the Corporations Act and committed an act of Bankruptcy. He on behalf of his company allegedly applied for deregistration during court proceedings to avoid paying debts arising from judgment against him. I supplied a brief of evidence which is now with the CDPP for prosecution. I also achieved reinstatement of the closed company. The company is now in liquidation.

I uncovered fraud and corrupt conduct within a government department and provided a full investigative report to the Auditor-General and Ombudsman, proving a breach to the Minister's Gazette pricing structures in the education regulatory instrument unveiling over $7m of overcharging of education stakeholders, as well as affirming in person with the Auditor-General and Minister identical evidence found in his audit, uncovering identical breaches to legislation.

I have since uncovered corrupt and improper conduct on the part of the Independent Broad-based Anti-Corruption Commission and the Department of Justice, which will be subject to further legal action initiated by myself.

I have uncovered at least five dating scams involving the usual request for money to 'come to Australia' to meet their new love but never having enough money. I was involved in working with Western Union to take this to the police as a crime to stop the conduct.

I have acted for a high profile corporate client who had been cyber-stalked for five years, living in terror, with the police and their High-tech Crime division investigating without success. After just two weeks I found the accused (via social media, cyber methods and traditional investigative techniques) and my evidence later helped prosecute and convict the stalker under the strict Victorian Anti-stalking laws.

As an expert in social media and cyber-stalking cases, I assisted the NSW police via Interpol in tracking down the stalker of a popular YouTuber to Scotland. And so working with the Scottish police the stalking was concluded.

I have assisted individuals extensively in finding their cyber-stalkers via Facebook, dating websites and email scams, using email tracing and cyber intelligence mechanisms. When in all situations the customer was informed by police that nothing could be done.

In an impersonation case, a man purported to steal the identity of an individual and consequently put up a dating profile soliciting gay sex and sending interested parties to the victim's address. The suspect had blocked his IP address and was difficult to track but using forensic tracking I was able to identify the address of the accused, leading to his arrest.

15 years ago I discovered a flaw in (one of the world's largest accounting software companies) that revealed credit card details in the hexadecimal binary of the unencrypted data file and alerted the producers of the software to the problem.

My mediation skills are often also used in conjunction with my forensic programming/reverse programming skills to determine fact to apply policy.
-"If only you could see information as a jigsaw, releasing via Social Media and its risks could be the final piece". eVestigator® - Simon Smith

Some case studies are subject to Non-Disclosure agreements. Please contact me for a massive list of experience and real Success. My work speaks for itself. Looking for a testimony from a real corporate client who was stalked for five years, living in terror, with the police and their High-tech Crime division investigating without success? After just two weeks I found the accused (via social media, cyber methods and traditional investigative techniques) and my evidence later helped prosecute and convict the stalker under the strict Victorian Anti-stalking laws. Contact: Lifestyle Portraits, Darren Tilnak


Below is a sample of some of my Qualifications/PD (Excluding Case Studies/Experience/Appointments). It is relevant to note that Cyber-Threats in my view is the new world war. New hacking methods are created, and smarter e-Crime is committed day by day. There is not one degree one could do without the knowledge of such degree being expired at conclusion. eVestigator® has a magnitude of Nationally Accredited and Professional Development (Some endorsed by Charles Sturt University) to maintain currency. I grew up with the birth of the internet and every day cases bring new threats that may not have existed yesterday. My work and customer feedback speaks for itself. Please find below a sample of some of the official Qualifications and PD I have undertaken. Mostly, I teach others Cyber-Security trends, and this is something that is popular in America but lacking in Australia's training system. Children should be taught about current cyber risks in primary school as (from experience) the exposure with social networking is so open, people do not realise how much intelligence someone like myself could gain from merely a Facebook profile. This is something we are working on, in educating Australia. There will be more on this shortly.

Professional development is often maintained via world renowned Udemy platform. Udemy has been discussed in The New York Times, The China Post, Fast Company, the BBC and TechCrunch, with much of its coursework originating from Stanford University Expert material noting "Udemy offers an experience that rivals the real classroom, and should prove to be a useful utility for teachers and students of all subject matters.

IT University (CHFI) Computer Hacking Forensic Investigator Accreditation
WASC Accredited WASC accreditation also places ITU among the recognized list of institutions on the U.S. Department of Education's database of recognized institutions of higher learning and the Council for Higher Education Accreditation's Listing of Accredited and Candidate Institutions (CHEA). ITU is also recognized as an approved institution by California's Bureau of Private Postsecondary Education (BPPE).
Subjects: Computer Forensics Introduction, Forensics Investigation Process, Searching and Seizing, Digital Evidence, First Responder Procedures, Forensics Lab, Hard Disks and File Systems, Windows Forensics, Data Acquisition and Duplication, Recovering Deleted Files and Partitions, Using Access Data FTK, Using EnCase, Steganography, Password Crackers, Log Correlation, Network Forensics, Wireless Attacks, Web Attacks, Email Crimes, Mobile Investigation, Investigative Reports, Expert Witness
University of NSW - Expert Witness Training Certificate
Mr. Hugh Selby is an expert Barrister who also specialises for UniSearch at the University of NSW, interstate and overseas as an Expert (Expert Witness Trainer)! Hugh Selby is a very experienced Barrister and co-author of the multi-volume and online publication "Expert Evidence". Hugh teaches "courtcraft", both in Australia and overseas, to prosecutors and advocates, police and experts across many disciplines. His publications range across trial and appellate advocacy, coronial practice, civil pleadings, policing, former Justice Kirby, and industrial law.
Graduate Certificate in Digital Education
Advanced Diploma of Computer Systems Technology
Advanced Diploma of Network Security
Graduate Diploma of Telecommunications and Strategic Management
Graduate Certificate in Information Technology Sustainability
Certificate IV in Intelligence Operations
Certificate III in Investigative Services
Certificate IV in Government Investigations (Government Investigator)
Certificate IV in Security and Risk Management (VIC PI Electives)
Diploma of Security and Risk Management (Cyber Security Analyst)

Graduate Certificate in Information Technology and Strategic Management (Expert Programmer/IT industry)
Graduate Diploma of Anti-Money Laundering and Counter Terrorism Financing
Diploma of Government (Fraud Control)
Diploma of Government (Security)
Certificate IV in Programming
PD: Social Media for Business
Diploma of Information Technology
Advanced Diploma of Program Management
Advanced Diploma of Project Management
Diploma of Digital Media Technologies
Diploma of Government (Investigation)
Certificate IV in Government (Security)
Graduate Certificate in International Education Services
Graduate Certificate in Statutory Child Protection
Graduate Diploma of Relationship Counselling
Graduate Diploma of Strategic Leadership
Graduate Diploma of Family Dispute Resolution (Commonwealth Appointed FDRP)
Certificate IV in Mediation (Also a Nationally Accredited Mediator - LEADR Member)
Diploma of Government (Workplace Relations)
Graduate Diploma in Management (Learning)
Certificate IV in Web-Based Technologies
Victoria University Bail Justice Training Course Certificate 2009
Certificate III in Intelligence Operations
Graduate Certificate in Career Development Practice
Graduate Diploma of Adult Language, Literacy and Numeracy Leadership
Advanced Diploma of Network Security
Diploma of Leadership and Management
PD: Hacking Academy: Monitoring Transmitted Data
IT Security Academy (Associates IT Security Professionals. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. They provide high quality materials to prepare you not only for passing certification exams, but teach you practical skills.) & The Hacking School (The Hacking School courses are prepared by people who are professionals in what they do. Authors of their courses are well known in the world of computer systems' security. They provide up-to-date knowledge on IT security and ethical hacking.)
Author of VET Accredited Course Material 'Dealing with Grief and Trauma'
Advanced Diploma of Network Security
Comply with organisational requirements for protection and use of intellectual property
Contribute to intellectual property management
Develop and implement strategies for intellectual property management
Manage intellectual property to protect and grow business
Graduate Certificate in Management (Learning)
PD: Cyberbullying - as taught by Andres Saravia
Diploma of Counselling
PD: CCNA Security 2015 Video Boot Camp: CCP and More
PD: Investigator Ethics for the PI, Consumer and Client
Advanced Diploma of Leadership and Management
PD: Maintaining Cyber Security
Certified iOS (Apple), Android (Google), Amazon, Windows and Mac App Developer
PD: BrainBench™ Certificate in 'Amazon Web Services (AWS)'
(A private research university in Stanford, California, and one of the world's most prestigious institutions, with the top position in numerous rankings and measures in the United States.)
Certified Android, iOS, Amazon Device App/Play-Store Developer
Andres Saravia (Andres earned a Doctorate (Ph.D.) in Philosophy of Law, Data Protection mention at the University of Zaragoza, Spain with Magna Cum Laude. He has also completed the Course on Personal Data Protection by AECID and Communication Science Foundation and the Graduate Course of the School of Graduate Studies, Faculty of Law on "Updates of Information Law" Module I. Uruguay. Andres has specialized in Germany, Chile and Spain, in the areas of e-Government and Data Protection latter including in computer and cyberbullying crimes. He is a Fellow of the Institute of Information Law Uruguay).
Professor Robert Bunge (An information security educator for the past eight years. He is an active coach and organizer in the Cybersecurity Competition Federation, Collegiate Cyber Defense Competition, National Cyber League, and CyberPatriot.) & DeVry University ( a regionally accredited institution.) Rosa Augostino (An author, consultant and entrepreneur she has written extensively about the subjects of marketing and business-building. Her background includes advertising, marketing, business growth and customer growth.)
PD: Introduction to Artificial Intelligence
Jeffrey Lau (A data engineer who constructs operational reporting, dashboards, and other visualizations. He has experience with object oriented programming, scripting automation, digital VLSI, and infrastructure performance management. He has a B.S. Electrical Engineering.)
Advanced Diploma of Management
Dean A. Beers, CLI, CCDI (Dean began his investigative career in 1987. He is a Certified Legal Investigator and Certified Criminal Defense Investigator, and expert consultant / witness in criminal defense homicide and civil equivocal death investigations. He is certified in Medico legal Death Investigations and is a POST certified instructor, and experienced forensic autopsy assistant.) & Karen S. Beers, BSW, CCDI (Karen began her investigative career in 1996, also earning her Bachelor's in Social Work (Magna Cum Laude). She is also a Certified Criminal Defense Investigator (CCDI) and certified in Medico legal Death Investigations.)
PD: IP Addressing and Sub-netting
Sikandar Shaik, CCIE (RS/SP# 35012) (A senior technical instructor and network consultant. He has been training networking courses for more than 10 years. Sikandar Shaik has delivered instructor led trainings in several states in India as well as in abroad in countries like China, Kenya and UAE. He has also worked as a Freelance Cisco Certified Instructor globally for Corporate Major Clients.)
Advanced Diploma of Management
Diploma of Quality Auditing
PD: Cyber Criminals Want Your Information: Stop Them Cold
(Jeremy O'Connell ... He holds some industry certifications via CompTIA (A+, Net+, iNet+) and received training from Oracle University's OCP DBA program.)
PD: Ethical Hacking and Penetration Testing
(Jerry Banfield (Jerry has a Masters degree from the University of South Florida and is certified as a state law enforcement officer in South Carolina. He also has a Bachelors degree earned from the University of South Carolina. He teaches 38 courses on Udemy.) & Ermin Kreponic (Ermin is an IT expert, Linux enthusiast with a passion for troubleshooting network related problems. Advanced knowledge of Linux command line. Installation, configuration and maintenance of servers that run under Unix/Linux type. operating systems: DNS, TFTP, FTP, SSH, APACHE, SMTP, VSFTP and some others.)
Certified Apple Watch App-Store Developer
PD: Trademark Law for Entrepreneurs
Dana Robinson (A founding partner of TechLaw, LLP, where his practice focuses on trademark prosecution, trademark licensing, copyrights, and business transactions. Dana is adjunct professor of law at the University of San Diego School of law, where he is involved in the law school's new IP Law Clinic. Dana has taught a variety of seminars and moderated panels on intellectual property and technology law since 1999. Dana received his bachelor's degree from Life Pacific College and went to earn an M.A. at Azusa Pacific University and his J.D., from the University of San Diego School of Law. He served as Editor-in-Chief of the law school's faculty journal, the Journal of Contemporary Legal Issues. He is admitted to practice in Nevada and California, and before the Federal District Courts for the Central District of California, the Southern District of California, and the District of Nevada. Dana was the Co-chair of the first Nevada State Bar Committee on Intellectual Property (2002-2003). He is a member of the IP law section of the State Bar of California, and is a member of the San Diego Intellectual Property Law Association. Dana has spent 20 years as an active entrepreneur and investor and continues to advise his portfolio investments.)
PD: Authenticity on Twitter
Rebecca Clark (Training & Development professional anxious to nudge students in the areas of program management, entrepreneurship, accountability, and in pursuing their life goals.)
Diploma of Training Design and Development
Certificate IV in Training & Assessment
PD: Innovation and Technology in Accounting
PD: The Bitcoin Basics
PD: Draper University/Udemy platform (Silicon Valley's top entrepreneurship program for builders and innovators from around the world. Cutting-edge, hands on curriculum taught by the most successful entrepreneurs in the Valley. Learn how to launch a business in this unique start-up boot camp for entrepreneurs.)
Advanced Diploma of Marketing
PD: Mastering iPhone programming - Lite
EDUmobile Academy (Founder Vishal Lamba has a mathematics and computer science degree. Vishal works closely with content creators and teachers to ensure that every course released meets the internal rigorous quality standards.)
PD: Mastering Android programming - Lite
EDUmobile Academy (Founder Vishal Lamba has a mathematics and computer science degree. Vishal works closely with content creators and teachers to ensure that every course released meets the internal rigorous quality standards.)
PD: Social Entrepreneurship: An Introduction
Greg Werkheiser (Greg is a Social Entrepreneur, Leadership Educator and Attorney with over 20 years experience. He has held public service roles at the White House, U.S. Embassy in Paris, U.S. Information Agency, and Congressional Management Foundation.) & David J. Miller (David is the Director of Entrepreneurship at the Mason Center for Social Entrepreneurship (MCSE). Miller is also a supporting faculty member at George Mason University's School of Management (SOM) teaching New Venture Creation and a PhD Candidate at Mason's School of Public Policy working with Dr. Zoltan J. Acs. Miller holds an MBA from the University of Chicago's Booth School of Business (Entrepreneurship, Finance, & Strategic Management), an MSc in the International Politics of Asia from the University of London's School of Oriental and African Studies and a BA in International Relations from the University of Michigan.)
PD: Decoding AP Computer Science A
Moksh Jawa (Though just a sophomore at Washington High School in Fremont, CA. He self-studied for and performed well on the AP Computer Science test as a freshman. He teaches AP Computer Science to students at his high school.)
PD: Professional Communication Essentials
Rasmussen College/Udemy platform (A regionally accredited private college and Public Benefit Corporation that is dedicated to changing lives through high-demand educational programs and public service.) & Brooks Doherty (Brooks is Rasmussen College's Dean of General Education. He is completing a doctorate in Education at St. Mary's University, earned an MA in literature from University College London, and graduated Phi Beta Kappa from the University of Minnesota with degrees in Political Science and English.)
Diploma of Project Management
Advanced Diploma of Management (Human Resources)
Diploma of Practice Management
Diploma of Vocational Education and Training
Diploma of Training, Design & Development
Diploma of Business
Advanced Diploma of Business
Diploma of Management
Diploma of Human Resources Management
Certificate IV in Marriage Celebrancy
Certificate IV in Small Business Management
Diploma of Business Administration
Certificate IV in Business Administration
Certificate III in Business Administration (Medical)
Certificate IV in Frontline Management
Diploma of Counselling
PD: Financial Analysis: A Recipe for Success
Professor and CPA Ellen Jakovich (Has experience in IT, communications, finance, electronic engineering, project management, and accounting. Holds a Bachelor's in Electronic Engineering Technology, a Master of Science in Finance and a Masters of Accounting & Financial Management.) & DeVry University
Certificate IV in Human Resources
Diploma of Training and Assessment
Project Management For Entrepreneurs: 10X Results Today Rico Rodriguez (Entrepreneur, Python Expert, Word and Windows Trainer. He has started numerous businesses and both failed and exceeded. He uses Python and JavaScript and C# in daily life to both make a living and to gather data online. He also helps small businesses streamline their business to reduce cost and increase productivity.)
Diploma of Community Services Coordination
Diploma of Disability
Certificate IV in Disability
Certificate III in Disability
Vocational Education and Training in Schools Certificate in Information Technology

Tips from Australia's #1 Cyber Forensics Expert

Private Investigator (Simon Smith), Dispute Resolution, Advocacy, Forensic Expert Court Witness, Digital Forensics, Forensic Data Recovery, Social Media Investigation, Workplace Relations & More (See Above)

We rely on computers to eat, breathe and live in today's society. Since a young child I always had an interest in forensic programming. My brothers used to play games, I used to make them. This was back with the old Amstrad tape deck CPC-464. Since then, I have programmed with every language that has ever been built. The job of a forensic programmer is not as the stereo-type predicts. To be a forensic programmer you have to be a DBA, Project Manager, Analyst, Consultant, IT Hardware/software expert, Problem Solver, Support Engineer, Security Expert and much more.

Being an expert witness to the court, I am able to establish routines and phishing and/or programming interfaces and trace these back to a potential crime or breach of information. I am considered an expert in the area of digital forensics, and computer programming and innovation, and have built over seven commercial programs and worked for over 100 companies in creating solutions that are so important that a breach of confidentiality or trust in information sources could cause severe detriment to consumers and the company's future. In order to understand and be a true expert in logic, one must be able to reverse that logic.

In unravelling conduct that the court needs, I have the ability to demonstrate in black and white English routine mechanisms that an accused could have easily used to achieve a goal. I can also write demonstrative routines. This is especially important in cases involving expert testimony on White Collar Fraud, Stalking and breaches of confidence, Cyber-crime and denial of service attacks. A denial of service (often called a DOS attack) can cost a company millions of dollars. I am able to track its source, assist in prosecution or defend and provide genuine independent fact to court - especially with my combined ability to investigate.

A careful word and some human testimony

Looking for a testimony from a real Corporate client whom was cyber-stalked for 5 yrs, living in terror, not finding his stalker after five years of attempts with the Police and the High-tech Crime division without success? After just 2 weeks I found the accused (via social media and cyber methods amongst traditional investigative techniques) and later prosecuted and convicted under strict Victorian Anti-stalking laws based on my work. Contact: LifeStyle Portraits, Darren Tilnak Tips on Security and Technology Be aware of just how much information you share online. 1 in 5 Australians have been victims of identity crime with computer hacking, online banking and shopping to blame SO you think you're safe online and take all the necessary steps to protect your information? Think again - your details may not be as private as you think. More Australians than ever are falling victim to identity crime and the victims aren't signing up to dodgy scams and being careless either. More Australian's than ever are falling victim to identity crime and the victims aren't signing up to dodgy scams and being careless either. Did you know that Australians have lost over $45 million to scams in 2015 already? The ACCC is urging the community not to send money or personal details to strangers after $45 million was reported lost to scams already this year and 45,000 complaints made.

Ten Top Rules to Limit your risk of being a Cyber Scam victim, but first I want to stress three golden rules....

1. Don't open any file or link attached to an email. Email is harmless, executable files or links to cause you to run executable files are the risk. Email is for reading. If the document is readable (pdf), or (text), go for it. Virus scanners are virus's themselves. I will write an article on this.

2. Check the sender and receiver email address that you actually would be replying to or the headers it actually was sent from - but don't assume they are who they say they are. See how they address you, is it an email chain with a known colleague? How did they just pick you? The simplest check is who emailed who and why, and how (or if) they know you.

3. Get your details off Facebook! I have found people who I've assisted police send to jail from a profile.
©The eVestigator®, 07/08/2015

In any situation, if you are being offered something for nothing (or very little), it is more often than not, not worth the price.

1. Always check a sender's email address (where you would be replying too - the exact .com), no matter how legitimate it seems. An active example is offers for free vouchers or free money.

2. Look out for any kind of incorrect spelling or unusual grammar. Often bogus emails do come from places where English is not the first language so look out for the use of the wrong tense, pronoun and plural or singular noun.

3. Completely disregard the email policies for any business/service you receive bills or correspondence from via the internet. They probably came in an email!
4. A real-life example is that PayPal® list the following criteria on their website to check if an email is legitimate, and I quote:

 "You see your name or your business name in the email. We always address you by your full name or your business name as registered on your PayPal account. We'll never use generic greetings like "Dear user" or "Hello PayPal member". We'll never ask you to include your financial information, your password, or the answer to your PayPal security questions in your emails to us. We'll never attach any software updates in our emails and ask you to install it to your devices. Correspondence regarding transactions will also appear in your PayPal account, so if you still aren't sure, log in to see if the email details are also there in your history."

: Does anybody remember which goliath company's security was breached sending millions of people's personal information out to the public? How did you get that message? Via email? How do you know it was PayPal? Go back to Golden Rule #1.
5. Do not respond and report any email from people you did not initiate an email trail with. Report and provide as much detail as you can about the message. Compare suspicious emails with any legitimate ones you have received previously. If there are omitted details, such as logos, footers, disclaimers or images are different and/or look old delete and report it.
6. You didn't win anything via email, nor does anyone who 'found' you that you did not initiate a conversation with 'loves' you!
7. If anyone anywhere at any time asks for personal, or credit card/bank details via email or cold calling for that matter, NO. Don't do it. If they try to push you, voice your privacy and security concerns. If they still don't want to take no for an answer ignore and delete or in the case of cold calling, hang up. Always report to the police. If the police don't help you, report it to me. This is actually a crime and known as stalking, of which I am an expert (not stalking itself!). If you are personally apprehensive from this conduct and it continues, then you should first contact the police, and secondly apply for an interim intervention order. If the person seeking details is legitimate they can and will provide you with other payment options and remember they are paying you (well not really - it doesn't happen).
8. There is no "Get rich quick scheme". Ask any millionaire, and they will say 'hard work'. No promise of large future returns for money now, no matter how convincing or legitimate they say they are, have proven to be true otherwise why aren't they holidaying on the Bahamas?
9. Tying into this is the online dating risks. First, do you even remember the person, keep a log. Nobody is magically found. Be wary of online dating contacts who speak the word 'love' too quickly or seem very invested emotionally in a short amount of time without actually telling you much about themselves personally. It is easy to write or say lot without actually revealing anything. As you are getting to know someone it is a good idea to save conversations to read back over them later (and quiz them). Consider the kind of information they want from you and look at how much they are telling you, if they are a bit evasive in some areas, just take note of it and what subjects they seem reluctant to talk about. There may be a genuine, reasonable explanation or they may not have fleshed out that part of their story yet also think about where there were lags or delays in responses. Keep the relationship at a pace you both are comfortable with. I strongly recommend not loaning money or giving financial support before your first face-to-face meeting. There is no easy step-by-step guide to spot an online dating scammer (apart from those that are obvious to the normal human). The dynamics of every relationship is unique. Use your common sense; remember things that sound too good to be true usually are. Meet your date in person at a safe place as soon as you can, it is easier to get a real impression of someone in person and a lot harder to lie to or misunderstand one another. Has anyone met a beautiful girl who just doesn't have enough money to get out of their country to meet their soul mate? Every time they try, the consulate demands them to prove they have money to live, so they need more, and more and more... I will not delve too deep as I have conducted three cases in these situations.
10. If you suspect something might be a scam, trust your instinct and steer clear, it's a scam, especially if they are offering something you have been looking for but unusable to find easily - and don't know initially much about you. Also remember the Golden Rules. Who contacted who and when you reply where does it go? It is very tempting to click on something you want "just in case" only to find yourself host to one or more nasty viruses or scammers. In line with my recommendations, I also point out what the Australian Bureau of Statistics said about personal fraud and the various types, that don't necessarily have to be of a 'cyber' nature. The following information and data is produced under the ABS Attribution 2.5 Australia licence and is unmodified.

Victims of Personal Fraud By Fraud Type, 2007 and 2010-11

It is estimated that a total of 1.2 million Australians aged 15 years and over were a victim of at least one incident of personal fraud in the 12 months prior to interview in 2010-11. This equates to a national victimisation rate for personal fraud of 6.7% of the population aged 15 years and over. This is an increase from the 806,000 victims of personal fraud in 2007 (5.0%).
Victims of Personal Fraud by Fraud Type, 2007 and 2010-11: Persons may have been a victim of more than one fraud type so components may not add to total. Australians lost $1.4 billion in 2010-11 due to personal fraud. Three in five victims of personal fraud (60% or 713,600 persons) lost money, an average of $2,000 per victim who incurred a financial loss. The median loss for personal fraud was $300. This means that half the number of people who lost money due to personal fraud lost less than $300 and half lost more than $300.

Identity Fraud: In the 12 months prior to the survey, an estimated 702,100 Australians were victims of identity fraud, or 4.0% of the population aged 15 years and over. This is an increase from the 499,500 victims of identity fraud in 2007 (3.1%).

Credit Card Fraud: An estimated 662,300 Australians aged 15 years and over were victims of credit card fraud in the 12 months prior to interview, or 3.7% of the population aged 15 years and over. This is an increase from the 383,300 victims of credit card fraud in 2007 (2.4%).

Identity Theft: In the 12 months prior to survey in 2010-11, an estimated 44,700 Australians were victims of identity theft, or 0.3% of the population aged 15 years and over. This is a decrease from the 124,000 victims of identity theft in 2007 (0.8%).

Scams: According to the survey results, an estimated 6.4 million Australians were exposed to a scam in the 12 months prior to interview. This equated to just over a third (35.8%) of the Australian population aged 15 years and over - the same proportion as in 2007. An estimated 514,500 Australians aged 15 years and over (2.9%) responded to a scam in the 12 months prior to survey. This is an increase from the 329,000 victims (2.0%) that responded to a scam in 2007.

Comparison of Fraud Types: Australians were more likely to fall victim to credit card fraud (3.7%) than experience identity theft (0.3%) or a scam (2.9%), and more likely to become a victim of a scam (2.9%) than identity theft (0.3%).

Victimisation Rates by Fraud Type: (a) Persons may have been a victim of more than one fraud type so components may not add to total. Reporting rates were higher for credit card fraud (49.9%) and identity theft (65.5%) than a scam (31.2%).

Reviews (Identity available only with permission)

"From the bottom of my heart, I'll say again you have gone above and beyond for me and your partner is very patient and understanding. Thanks for your effort, thanks for your patience and for not giving up on me. This has been a very long journey for me and for a complete stranger to help me like you have, well I consider you a good friend now, someone who doesn't want to see a family torn apart and really find the truth as do I. Thanks Simon, it really means a lot , it really does":::Sensitive Family Law Matter, 12-05-2015

 "From the bottom of my heart, I'll say again you have gone above and beyond for me and your partner is very patient and understanding. Thanks for your effort, thanks for your patience and for not giving up on me. This has been a very long journey for me and for a complete stranger to help me like you have, well I consider you a good friend now, someone who doesn't want to see a family torn apart and really find the truth as do I. Thanks Simon, it really means a lot , it really does":::Sensitive Family Law Matter, 12-05-2015

 "Thank you so much. You don't know how much of a difference you've made over the last 24 hours to a very, very tired person initially and now a little bit more saner one. You've made a massive, massive difference so thank you.":::Family Law Custody Parent."::: 28-04-2016

 "You just put a smile on my face Simon. Like you, I'm a straight talker, and can't abide liars nor injustice. I have been accused of being brutally honest on many occasions in my life!":::Self Represented Litigant. 26-04-2016

 "YOU ARE THE MASTER!!! Sent email to my older kids as YOU SUGGESTED, re no contact with their Dad OR at least not PASSING ON ANY MESSAGES to me or XXX and it stopped!":::Extremely highly rescued family cyber-stalking matter. 20-03-2016

 "Thank you so much it was helpful. I will suggest your company as i know of at least 1 person who is interested. Thanx again Simon....":::Android Forensics Matter. 30-01-2015

 "I have been fortunate enough to obtain advice and witness Simon providing support to other professionals during our 8 year relationship. I have always found Simon to be a highly motivated, intelligent and capable person." :::Name protected, 01-02-2014

 "Simon, THANK YOU!!! Not only for what work you put in but just for being so positive and believing me and in me. You know, it's amazing the power of a persons words. In this case, it's the words of a person that should have no say or ability to have a say that see's me to be in the position I'm in today. 'No fact. No evidence.' And similarly, I was having a very hard day today. I had got my hopes up that that scumbag was going to let the kids be home for the weekend for my birthday.. But of course, I found out this morning that was not the case. But for some reason I have connected to a person, the person I have needed and searched for for almost a year now. And today you lifted my spirits more than I can ever express." :::Name protected, intervention reversal matter. 03-01-2015

 "Simon, I found your help in reporting and remedying my situation post a fraud on my computer to be Professional, Clear eyed & Modest charged where I had no clue as to what to do to protect myself. I would have no hesitation in recommending you" :::Name protected, another ACORN failed case, Massive Australian Dating Scam - lost over $250,000. 28-02-2015

 "I am very impressed with your work. Submitted another report to ACORN re the CBA XXXXX account, and complained about the lack of action. Thanks for your great work and your interest in my case. I am going to make a complaint to the AFP through a website I have found.":::Name protected, another ACORN failed case. 28-02-2015

 "Thx Simon. Through all this as much as I have learnt about how nasty and shady people are, I have met a lot of good honest ones! Youre at the top of the list." :::WA Victim of long term mental abuse. 02-12-2015

 "Simon had no issues in finding valuable data that was deleted from my iPad. Not only did he find what I was looking for, he found too much information I had to say stop!! He was smart enough to get the actual evidence from the cloud and the iPad at the end of the day didn't even make much difference! He is superb." :::Family violence victim in Queensland. 15-09-2015

 "Simon did a tremendous job in assisting my counsel in finding the Defendant of a massive cyber-attack and defamation against my business. He actually uncovered an international major scam network in the process and not only solved my case but solved so many others. He knows the workings of the internet, that's a fact." :::Protected name celebrity in Sydney. 20-09-2015

 "I wish to congratulate Simon on his absolute expertise in finding my online scammer. Everybody said it was impossible, but he did it. His method was mostly common sense. His skills are varied and I believe that anybody that utilises eVestigator® gets so much more" :::Dating chat scam victim. 20-09-2015

 "Simon's findings from forensically examining both an iPhone and an iPad gave me almost too much information than I was prepared for. He is very accurate and factual and knows the ins and outs of the technologoes, not from a useability level but from a ground up level - and it shows. I've worked in IT for 20 years and he blew my mind away with his findings and logical way of solving my defamation case. I think his skills as a mediator seriously complement his work and it shows." :::Protected identity undisclosed 12-08-2015

 "Simon was able to forensically examine another expert's report and politely speaking 'teared it to shreds'. Simon uses a factual approach to his investigations and his knowledge seems to be more than just a expert programmer, more than an expert investigator, but a real person who can understand your problem and come to a solution. He makes things happen, and saved me thousands in lawyers fees when I was at the brink of being summoned to the county court on a report that otherwise would have destroyed my case." :::Protected identity undisclosed 21-08-2015

 "eVestigator's knowledge of the government policy, experience and Qualification as a Government Investigator, as well as first-hand experience in government corruption helped our team uncover a major injustice and unlawful decision of an asset properly created but stopped from bureaucrats worth over 20 million dollars. Through persistence and fact, eVestigator (despite barristers saying after $40,000 there was no chance of success) persisted on the facts in review and after 5 years won not once but twice and had the decision overturned."

 "Thanks Simon, you're a life saver !" :::Protected identify undisclosed - found FaceBook Cyber-Stalking Defendant after ACORN had not succeeded, enabling the customer to attain a Personal Safety Intervention Order 26-11-2015

 "Hello Simon, I just wanted to let you know how encouraged I felt after speaking to you. You have no idea how much pain and suffering I have had to endure over last few years,so I hope you can sort this out because there have been so many twists and turns over this whole affair, that really sometimes I thought I was going cuckoo. As it happened all my hunches and my 'WOMENS INTUITION" really have been right and really I dont want to waste another year of my life , excuse my french, on a a couple of ********** who are hiding in the shadows.Thankfully my husband has come on board ,especially the last 6 mths ,to not only help me but also do some serious work on himself.As you will gather from the information I send ,I have had to do this all on my own with little computer skills ,working part time looking after 3 boys and generally trying to keep my **** together.I know that i am not wrong with the things ive found and generally i am a peace loving and kind person but i am also thankful to this sociopath for re awakening the fighter that lay dormant in me for years. Thankyou!" ::: Another cyber-legal case with forensic analysis of iPhones, Hard Drives & Computers.

 "My name is Mark Franchi and I am a decorated, retired Police Officer of 33 Years who worked as a Patrolman, Supervisor, and Specialist Squad Team Leader and worked who also worked as a Federal Officer within the ATO for 6 years. I worked with Simon Smith for almost 3 years from 2006-2009 and have kept in contact with him as a friend since then."

"Simon is an Entrepreneur, innovator, designer and is the most ethical person I know who is very honest in everything that he does. He is the person who changes the course of an industry because of the ingenious ways he turns ideas into inventions. I have seen him in business do the right thing when he could have turned his back and kept people’s money. Without a hesitation he refunded people who never knew they were overcharged in the first place."

"Simon is also a genius computer programmer, who has helped find cyber stalkers, assisted ASIC find and prosecute unlicensed practitioners, helped ASIC find and prosecute people who have performed Acts of Bankruptcy. Through his inventions and clever designs Simon has accumulated quite allot of wealth and never has had the need to chase money, but always helps people who have been wronged or have had had an injustice done against them."

"Simon has been helping people for as long as I have known him and has not got one malicious bone in his body. He has had in the last few years quite allot of injustices done against him, especially with people stealing his inventions and Government bodies giving him a hard time because he had taken them to task over corruption issues. Simon is a great believer in restorative justice."

"If you wish to discuss Simon Smith with me in any way please don't hesitate to call me on 0468 522 700." ::: Mark Franchi, very senior respected person of authority and colleague."

 "I highly HIGHLY recommend Simon and eVestigator® for any investigative, mediation, or advocacy needs especially to sort out the lawyers and give amazing factual results from investigation to in my case personal service to see the job through, after many had tried and failed."

"He will take you through to the other side. You will get results. And PLEASE don't think he will be expensive, cause that is not the case. His work is SO valuable. He will save you money by simply being your voice. I did not realize that lawyers will charge for a simple email. The fact that Simon is not emotionally involved, he only talks fact. Unlike us victims who are still stuck on "why did this happen to me?"

"Whatever your problem is, yes you need to go to a lawyer for the official lodgement of litigation complaints but Simon is the one who truly gets the job done with you the right way! I can't stress enough how important he will be to your case simply because his factualness and understanding of the legal language and system and experience in getting results the quickest most cost effective way. Brilliance is an understatement."

:::Kind Regards, Emotionally Traumatised Victim of Crime/Trauma/Deceit/Injustice, Attained direction and default judgement > 190k, Jurisdiction: County Court of Victoria, Result: 4 weeks after 3 years of emotional distress and misguidance. 25-10-2015.

 "I have never given a testimonial before but felt the need to say a massive THANK YOU to Simon of eVestigator® and to encourage anyone that may need his services. It's one thing to be a victim to crimes or attacks against us but then there is the different form of attack that comes from the legal team. A financial attack."

"Simon is the utmost professional that goes beyond what's on paper. He genuinely cares about your well being and mental status. He sympathises and understands your fears but most importantly he understands the "lawyer language". It took a long time for me to turn for help but turning to Simon was the best thing I could do."

"Simon saved me 10's of thousands if not hundreds of thousands of dollars with the lawyers and he got me the results I needed. From assisting me in advice presenting fact, and gaining fact in my paperwork, to getting a court order, it all happened in 1 month."

"Simon was onto the lawyers and made sure things were done! He corrected the lawyers Letter of Demand and made sure all the information was there on the 1 letter. Even though I gave the lawyers 300 pages of evidence. That letter basically was the only thing needed to get the court order stamp."

"Simon looks after you like a friend and is not only focused on getting you through your mess but he is there to also separate you from the emotional attachment that got you into this mess. My favourite thing he said to me, and this often crosses my mind, 'you focus on you and your future and me and the lawyers will sort out your past'"

 "There was a reason when i was searching that your name came up and i picked you.Ive had many moments of aha!!! over last 4 yrs.You are one of them."::: Very strong lady who wanted to know once and for all the truth after over 10 years of mysery. Truth was delivered enabling her to get on with her life.

 For Legal Counsel: From Senior Court Consultant, "I am writing this letter in support of Simon Smith. I have gotten to know Mr. Smith over the past 10 years, both as a person and as a Computer Programmer. In both capacities, I have been most impressed with Mr. Smith's talents, and I am confident that he will be an exceptional asset to aid any Attorney."

"As a Computer Programmer, Mr. Smith stood out, from early in our relationship, as an articulate and perceptive programmer. Simon repeatedly, showed me he was able to provide solutions to my company that we were able to use unaltered for over 10 years, that in the computing world is no small feat. It shows that the solutions he provided were designed by someone who took the "long view" in application design. Intellectually, he is clearly a star."

"His talents, however, do not end there. Mr. Smith is also a person of unusual energy, maturity, and skill. He has shown a tenacity in dealings with several International Companies and Governmental Departments, he tackled these responsibilities with spirit and sophistication, interacting in an effective, responsible manner. He is evidently a person with substantial experience functioning in the professional world, and it has been a pleasure working with him."

"In short, I recommend Mr. Smith to you strongly and without reservation He will be a wonderful addition to your team. If I can be of any further assistance in your review of his application, please feel free to contact me." :::Sincerely yours, Evan Kelly CEO vPedal

 "A man of integrity expects to be believed and if not he lets time prove him right.":::Successful Voiceover Artist directed to eVestigator®

  "I appeared on Today Tonight's request made to Simon Smith (eVestigator®), where Simon was asked to choose a willing former client discuss the impact of Cyber-Awareness, Cyber-Stalking and Cyber-Bullying. They were conducting an investigation and asked him if he would be willing to ask a former client pertaining to Cyber-Bully's and Cyber-Stalker's in his capacity as an Expert Forensic Private Investigator for the story which aired over 4 years ago."

"I used to run a YouTube channel which attracted people from all over the world as I aspire to be a character actress one day. I have built up a portfolio and had a successful YouTube channel. Not long after I continued to receive inappropriate emails and posts, which turned into serious Cyber-Stalking and Cyber-Bullying. Simon (eVestigator) helped me not only find my CyberStalker and CyberBully - which in itself was a challenge as he ended up being in another country, he also helped me get attention. It is so hard to be treated seriously with the police and almost an impossibility to get something reported outside the country."

"Simon stood by me and saw the process through. He was not just a Forensic Investigator. At each step he explained the most efficient process and through his strategy managed to get the complaint followed through the process to ensure an outcome. He was very thorough on mostly his own initiative with the Scottish Police. He is very talented with any online tracng, especially due to the fact we had no evidence where this person was - but with Facebook, and Simon's abilities he brought justice to my Cyber Stalker/Cyber Bully."

"Simon was directly requested to volunteer some advice and put forward a willing participant on Channel 7's Today Tonight program on behalf of his Cyber Stalking/Cyber Bullying experiences. I had the film crew come to me and the story was aired. Cyber-Bullying was the primary focus and I am really passionate on stopping this and helping others and perhaps working with Simon later, and thanks to Simon and Today Tonight, it was brought to the public."

"This was a good experience allowing me to give my opinion on what I think is a national issue, so Simon not only solved my case but from Today Tonight's expert request, he enabled me to explain some views on Cyber-Bullying which i feel strongly about. I recommend Simon fully for any investigation as his programming and forensic investigation skills are outstanding.":::Jasmine



As a certified iOS, Windows, Amazon and Android Programmer eVestigator® will shortly be releasing CyberApp™. Including tips, warnings, and advice on cyber presence (and social networking).


Creative Design, Informative and a must have for everybody

The App has been designed to be both educational and fun. Something missing in society is cyber awareness training with children at a young age. There have been so many cases that eVestigator® has concluded all relating to mistakes or not knowing just who is watching you. This App addresses it. eVestigator has also released an iOS app already which is called Torion Secure Browser Pro++, the best on the AppStore. We recommend all browsing should be done with this level of strength as not even a VPN is safe from various recent cases exposed.

eVestigator® Cyber Intelligence Reverse Mobile Phone Database

Mobile phone forensics - Database Lookup/Enquiry

Num: *
04022200 04022201 04022202 04022203 04022204 04022205 04022206 04022207 04022208 04022209
04022210 04022211 04022212 04022213 04022214 04022215 04022216 04022217 04022218 04022219
04022220 04022221 04022222 04022223 04022224 04022225 04022226 04022227 04022228 04022229
04022230 04022231 04022232 04022233 04022234 04022235 04022236 04022237 04022238 04022239
04022240 04022241 04022242 04022243 04022244 04022245 04022246 04022247 04022248 04022249
04022250 04022251 04022252 04022253 04022254 04022255 04022256 04022257 04022258 04022259
04022260 04022261 04022262 04022263 04022264 04022265 04022266 04022267 04022268 04022269
04022270 04022271 04022272 04022273 04022274 04022275 04022276 04022277 04022278 04022279
04022280 04022281 04022282 04022283 04022284 04022285 04022286 04022287 04022288 04022289
04022290 04022291 04022292 04022293 04022294 04022295 04022296 04022297 04022298 04022299

Have you been scammed by anyone whose number looks like this? Attain your FREE Consultation below.

Enter your name: Enter your contact details and mobile number you would like more details on:
Telecommunication Authorities for Mobiles in Australia
Telstra Corporation Limited, Optus Mobile Pty Limited, Vodafone Australia Pty Limited, Rail Corporation New South Wales, Dialogue Communications Pty Limited, Symbio Networks Pty Ltd, Clx Networks Australia Pty Limited, Ivotel Satellite Pty Limited, Compatel Limited, Mblox Pty Ltd, Lycamobile Pty Ltd, Novatel Telephony Pty Ltd, Victorian Rail Track, Australian Communications and Media Authority

CyberBuy™ online Cyber-Security useful purchases.

Brief me as a Cyber Forensic Expert Witness

As a certified Expert Witness, I am able to provide credible facts and opinions in expert witness format for any Australian Court or Tribunal. An expert witness, commonly known, is a person whose opinion by virtue of education, training, credential, skill or practical experience, is accepted by the Judge, Magistrate or Member as an expert. In Australia, the courts and trbunals have specific rules for experts. The decision maker(s) consider the witness's specialised (scientific, technical or forensic) factually informed opinion about an article of evidence or in many cases, prior to a hearing, facts before the court within the expert's area of expertise.

I have provided many "expert opinions" and "factual explanations". I personally prefer to provide factual explanations to avoid doubt. My duty is to the court to deliver "expert evidence" within the area of my expertise. My testimony is open for rebuttal by testimony from other experts or by other evidence or facts. Please see below on some tips of formally starting the briefing process of an expert witness:

When instructing the expert, you should explain the way the fact or opinion will be used and where. You should explain the experts' obligations and the limit and scope of the brief. It is important to also both verbally and in writing cover the specific elements of the case and the specific issues that the expert is asked to clarify or answer. This is vital as it forms part of your written 'Letter of Instruction'. This sets out the scope and expectations of the expert, and is used as the main referencing point. It is vital that the wording is clearand concise. Ensure that the exact elements of fact or key issues and any assumptions are identified, along with the specifc questions for the expert. Note that it is typically not an expert witness's job to 'Investigate'.

If it your intention to receive a draft report, it is prudent to set this requirement out in your Letter of Instruction. It is vital to also