Simon Smith has over 23 years experience in multiple IT Programming, Security, Disciplines including System Deployment, Testing, Lifecycle, Cybercrime, Cybersecurity, Investigations, Mediation, Justice & C-Level industries that, combined gives a proven track record of excellence and suitability in Cyber Security unmatched and in its true form. Trading as Simon Smith he defines Cyber Security
A new crime is in town, and Simon Smith is fully equipped to deal with it, bust the cybercriminals and help identify who took your valuable digital assets.
Mobile phone forensics and smartphone, wearable or other devices. Smartphones and other digital devices.
the Dark Web, complex High-Tech compuer hacking, AML/CTF money and document fraud and much more. Simon Smith attains results and has succeeded in stopping court cases before they have begun based on his expert reports.
With additional skillsets in Behavioural Analytics, Cybercrime, Technical disputes, Family AVO's, Independent Court Expert Appointment, Simon keeps an informed but independent real life approach to solving all issues and keeping costs down, and actions out of court.
Risk Reduction is the best form of defence. Imposter 'researchers' or 'penetration testers' think they can protect your Company
Simon Smith has the evidence and experience to demonstrate solving major cases where 100% demonstrate insider fraud
Ask Simon about how he identified seven stalkers in one case. In a breakthrough case, the one person who nobody would believe to be the stalker, ended up having seven identities
Whenever there is a Cyber Attack, or vulnerability - it is Simon who the industry turns to as credibility is trusted
Over 27 yrs of software engineering, 23 yrs industry, 18 yrs mentoring, R&D, CEO, CTO, CISO positions & cases to back it up. His first priority is always today's news, ''
Ask Simon how he managed to gain crucial Computer Forensic evidence in a case to prove document forgery of an employee
A complete showstopper to the conduct of this employee who thought his crime worked, Simon Smith solved that
Ask Simon how he exposed a fake infosec and cybersec community without relying on ignorant police faced with uneducated jealous criminal 'unethical hackers' poisoning the industry, their childish games, how they cry like a baby when singled out by a court.
Mobile phone forensics and smartphone, wearable or other devices. Smartphones and other digital devices.
You need a Forensic Expert Witness and Forensic Investigator to handle your case, it saves you money
Results come faster from a professional instead of poorly trained imposters charging for more hours, who would you choose?
Also visit: Official Intelligence Pty. Ltd - SCAMAssist - Australian Institute of Cyber Security (AICS)
Simon is capable of providing expert testimony in IT-related matters including social media investigations, cyberstalking, cybercrime, white-collar crime, and dark web activity. He also examines the authenticity of digital evidence and can assess and explain records in relation to their origin and handling.
Serious access and menace charges, unauthorised access:
s.478.1(1) Criminal Code - unauthorised access to, or modification of,
restricted data
s.477.3(1) Criminal Code - unauthorised impairment of electronic
communication;
s.474.17 Criminal Code - Using a
carriage service to menace, harass or cause offence
s 474.24E Criminal Code - Using a
carriage service to transmit material and the material is an intimate image
s 474.24F Criminal Code - Using a
carriage service to make a threat about an intimate image
s 474.15(1) Criminal Code - Using a
carriage service to make a threat to kill
s 474.15(2) Criminal Code - Using a
carriage service to make a threat to cause serious harm
s 471.12 Criminal Code - Using a
postal service to menace, harass or cause offence
s 474.15(1) Criminal Code - Using a
postal service to make a threat to kill
s 474.15(2) Criminal Code - Using a
postal service to make a threat to cause serious harm.
s.233BAB(5) Customs Act 1901 - importation of tier 2 goods
Offences pursuant to the Crimes Legislation Amendment (Sexual Offences
Against Children) Act 2010
Computer intrusions, Unauthorised modification of data, including
destruction of data
Unauthorised impairment of electronic communications, including denial of
service attacks
The creation and distribution of malicious software (for example, malware,
viruses, ransomware)
Dishonestly obtaining or dealing in personal financial information.
Internet/Digital Forensic Investigations that
Simon Smith is able to undertake (sample):
Identify suspect behind cryptocurrency transaction
Identify suspect behind stolen NFT's
Identify suspect behind false email address
Identify suspect behind fake Facebook account
Identify suspect behind fake WhatsApp account
Identify suspect behind fake SnapChat
account
Identify suspect behind fake Instagram account
Identify suspect behind fake Twitter account;
Mobile Forensics; encrypted communications and many more.