Simon Smith has many years experience in Investigating Cybercrime & technology related crimes, with expertise in Security, Programming, System Deployment, Testing, Lifecycle, & C-Level industries that, combined gives a proven track record of excellence and suitability in Cyber Security that none can match.
A new crime is in town, and Simon Smith is fully equipped to deal with it, bust the cybercriminals and help identify who took your valuable digital assets.
Mobile phone forensics and smartphone, wearable or other devices. Smartphones and other digital devices.
the Dark Web, complex High-Tech compuer hacking, AML/CTF money and document fraud and much more. Simon Smith attains results and has succeeded in stopping court cases before they have begun based on his expert reports.
Simon always follows the most effective methods available to keep costs down and actions out of court by utilising his skillset with a real-life independent and informed approach to Family AVO's, Independent Court Expert Appointment to handle Cybercrime, Technical disputes and Behavioural Analytics.
Imposter 'researchers' or 'penetration testers' may pick up only 5% of cyber-attacks perpetrated if that. Risk Reduction is the best strategy as 95% of cyber-attacks are perpetrated by those given access for a legitimate purpose.
Ask Simon about how he identified seven stalkers in one case. In a breakthrough case, the one person who nobody would believe to be the stalker, ended up having seven identities
Simon's experience, skills and knowledge are the reason the industry turns to him in a crisis
Trust is important but blind faith can be damaging, which is why monitoring of employee activity is good practice. Ask Simon about the cases of insider fraud he has solved
Simon is not afraid to stand up to cyber criminals and bullies or their childish games. Ask him how he exposed them without relying on police help.
Mobile phone forensics and smartphone, wearable or other devices. Smartphones and other digital devices.
Often it seems Information Security is mistaken for Cyber Security but Cyber Security is so much more. It requires intimate knowledge of how a business works and what and where vulnerable points are to reduce and mitigate risk.
Also visit: Official Intelligence Pty. Ltd - SCAMAssist - Australian Institute of Cyber Security (AICS)
Simon is capable of providing expert testimony in IT-related matters including social media investigations, cyberstalking, cybercrime, white-collar crime, and dark web activity. He also examines the authenticity of digital evidence and can assess and explain records in relation to their origin and handling.
Serious access and menace charges, unauthorised access:
s.478.1(1) Criminal Code - unauthorised access to, or modification of,
restricted data
s.477.3(1) Criminal Code - unauthorised impairment of electronic
communication;
s.474.17 Criminal Code - Using a
carriage service to menace, harass or cause offence
s 474.24E Criminal Code - Using a
carriage service to transmit material and the material is an intimate image
s 474.24F Criminal Code - Using a
carriage service to make a threat about an intimate image
s 474.15(1) Criminal Code - Using a
carriage service to make a threat to kill
s 474.15(2) Criminal Code - Using a
carriage service to make a threat to cause serious harm
s 471.12 Criminal Code - Using a
postal service to menace, harass or cause offence
s 474.15(1) Criminal Code - Using a
postal service to make a threat to kill
s 474.15(2) Criminal Code - Using a
postal service to make a threat to cause serious harm.
s.233BAB(5) Customs Act 1901 - importation of tier 2 goods
Offences pursuant to the Crimes Legislation Amendment (Sexual Offences
Against Children) Act 2010
Computer intrusions, Unauthorised modification of data, including
destruction of data
Unauthorised impairment of electronic communications, including denial of
service attacks
The creation and distribution of malicious software (for example, malware,
viruses, ransomware)
Dishonestly obtaining or dealing in personal financial information.
Internet/Digital Forensic Investigations that
Simon Smith is able to undertake (sample):
Identify suspect behind cryptocurrency transaction
Identify suspect behind stolen NFT's
Identify suspect behind false email address
Identify suspect behind fake Facebook account
Identify suspect behind fake WhatsApp account
Identify suspect behind fake SnapChat
account
Identify suspect behind fake Instagram account
Identify suspect behind fake Twitter account;
Mobile Forensics; encrypted communications and many more.