Simon Smith of Official Intelligence, has over 23 years of industry experience in IT Systems Management, Cyber Security Forensic Investigations, Expert Witness & Dispute Resolution, IT, Fraud, Mediation, Management, training and C-Level skills.
A new crime is in town, and Simon Smith is fully equipped to deal with it, bust the cybercriminals and help identify who took your valuable digital assets.
Ask Simon about how he identified seven stalkers in one case. In a breakthrough case, the one person who nobody would believe to be the stalker, ended up having seven identities.
A true Cyber Security expert masters more than IT networking, it takes many years to understand the discipline and psychology of Cybersecurity.
With additional skillsets in Behavioural Analytics, Cybercrime, Technical disputes, Family AVO's, Independent Court Expert Appointment, Simon keeps an informed and unique real life approach to solving all issues and keeping costs down, and actions out of court.
Risk Reduction is the best form of defence. Imposter 'researchers' or 'penetration testers' pretend to protect your Company
Simon Smith has the evidence and experience to demonstrate solving major cases where 100% demonstrate insider fraud.
Ask Simon about how he identified seven stalkers in one case. In a breakthrough case, the one person who nobody would believe to be the stalker, ended up having seven identities.
Whenever there is a Cyber Attack, or vulnerability - it is Simon who the industry turns to as credibility is trusted
Over 27 yrs of software engineering, 21 yrs industry, 18 yrs mentoring, R&D, CEO, CTO, CISO positions & cases to back it up. His first priority is always today's news, ''.
Ask Simon how he managed to gain crucial Computer Forensic evidence in a case to prove document forgery of an employee
A complete showstopper to the conduct of this employee who thought his crime worked, Simon Smith solved.
Ask Simon how he investigated a serious data breach matter and assisted in bringing the criminals to justice.
Ask Simon about how he identified seven stalkers in one case. In a breakthrough case, the one person who nobody would believe to be the stalker, ended up having seven identities.
You need a Forensic Expert Witness and Forensic Investigator to handle your case, it saves you money
Results come faster from a professional instead of poorly trained imposters charging for more hours, who would you choose?
Also visit: Official Intelligence Pty. Ltd - SCAMAssist - Australian Institute of Cyber Security (AICS)
Simon is capable of providing expert testimony in IT-related matters including social media investigations, cyberstalking, cybercrime, white-collar crime, and dark web activity. He also examines the authenticity of digital evidence and can assess and explain records in relation to their origin and handling.
Serious access and menace charges, unauthorised access:
s.478.1(1) Criminal Code - unauthorised access to, or modification of,
restricted data
s.477.3(1) Criminal Code - unauthorised impairment of electronic
communication;
s.474.17 Criminal Code - Using a
carriage service to menace, harass or cause offence
s 474.24E Criminal Code - Using a
carriage service to transmit material and the material is an intimate image
s 474.24F Criminal Code - Using a
carriage service to make a threat about an intimate image
s 474.15(1) Criminal Code - Using a
carriage service to make a threat to kill
s 474.15(2) Criminal Code - Using a
carriage service to make a threat to cause serious harm
s 471.12 Criminal Code - Using a
postal service to menace, harass or cause offence
s 474.15(1) Criminal Code - Using a
postal service to make a threat to kill
s 474.15(2) Criminal Code - Using a
postal service to make a threat to cause serious harm.
s.233BAB(5) Customs Act 1901 - importation of tier 2 goods
Offences pursuant to the Crimes Legislation Amendment (Sexual Offences
Against Children) Act 2010
Computer intrusions, Unauthorised modification of data, including
destruction of data
Unauthorised impairment of electronic communications, including denial of
service attacks
The creation and distribution of malicious software (for example, malware,
viruses, ransomware)
Dishonestly obtaining or dealing in personal financial information.
Internet/Digital Forensic Investigations that
Simon Smith is able to undertake (sample):
Identify suspect behind cryptocurrency transaction
Identify suspect behind stolen NFT's
Identify suspect behind false email address
Identify suspect behind fake Facebook account
Identify suspect behind fake WhatsApp account
Identify suspect behind fake SnapChat
account
Identify suspect behind fake Instagram account
Identify suspect behind fake Twitter account;
Mobile Forensics; encrypted communications and many more.