Simon Smith, Computer Crime Defence Expert Witness - Forensic
Investigator
Simon Smith is Australia's most specialised Cybercrime and Cybersecurity
Computer Forensic Investigator and Independent Expert Witness. He is
well known for his special abilities as a "Covert Internet Investigator"
or CII, dark web, child exploitation material (CEM) and cyberstalking
expert witness. He has given evidence in complex social media, software,
cyberstalking, online defamation as well as eCrime, CEM, fraud &
software fit for purpose disputes. Simon specialises in cyber litigation
support. If this screen remains active for more than ten seconds, simply
refresh the website. 0410
643 121, (03) 9720 4907 [email protected]
eVestigator® - Simon Smith is a real Cyber Security First Responder, Practitioner, and Cybercrime Expert
Simon Smith of eVestigator, has over 22 years of industry experience in IT Systems Management, Cyber Security Forensic Investigations, Expert Witness & Dispute Resolution, Criminology, Fraud, Mediation, Management, training and C-Level skills.
eVestigator® Investigates Cryptocurrency Phishing
Simon Smith is a Certified Bitcoin Expert, Blockchain Developer, Ethereum Expert, Blockchain Expert and a Certified Fraud Examiner and Internationally Accredited Forensic Investigator.
A new crime is in town, and eVestigator® is fully equipped to deal with it, bust the cybercriminals and help identify who took your valuable digital assets.
eVestigator® exposes Government and Police Corruption
Simon Smith investigates Government and Police Corruption
Nobody is above the law, although some think they are. Simon has had Sergeant's disciplined for for not doing their job properly and has exposed far larger cases of misfeasance.
Ask Simon Smith for info on a case he solved for a $14m company with a $1 billion dollar investor
A true Cyber Security expert masters more than IT networking, it takes many years to understand the discipline and psychology of Cybersecurity.
Simplifyiing Mediation and Family Dispute Resolution
As a NMAS Mediator and Cth. Appointed Family Resolution Dispute Practitioner with Specialist Accreditations in many areas.
With additional skillsets in Behavioural Analytics, Cybercrime, Technical disputes, Family AVO's, Independent Court Expert Appointment, Simon keeps an informed and unique real life approach to solving all issues and keeping costs down, and actions out of court.
Real Cyber Crime Cases
Real Cyber Resilience Testing
Risk Reduction is the best form of defence. Imposter 'researchers' or 'penetration testers' pretend to protect your Company Simon Smith has the evidence and experience to demonstrate solving major cases where 100% demonstrate insider fraud.
You cannot hide behind fake accounts
Master in exposing who is behind fake accounts
Ask Simon about how he identified seven stalkers in one case. In a breakthrough case, the one person who nobody would believe to be the stalker, ended up having seven identities.
A Cyber Security Attack is a Cyber Crime
The world turns to Simon Smith for advice
Whenever there is a Cyber Attack, or vulnerability - it is Simon who the industry turns to as credibility is trusted Over 27 yrs of software engineering, 21 yrs industry, 18 yrs mentoring, R&D, CEO, CTO, CISO positions & cases to back it up. His first priority is always today's news, ''.
Insider Fraud
Can you trust your employees?
Ask Simon how he managed to gain crucial Computer Forensic evidence in a case to prove document forgery of an employee A complete showstopper to the conduct of this employee who thought his crime worked, eVestigator® solved.
Unethical hackers are criminals
eVestigator is not afraid to expose lying criminal, unethical Hackers and bring them to justice
Ask Simon how he exposed a fake infosec and cybersec community without relying on ignorant police faced with uneducated jealous criminal 'unethical hackers' poisining the industry, their childish games, how they cry like a baby when singled out by a court.
eVestigator® exposes Government and Police Corruption
Simon Smith investigates Government and Police Corruption
Nobody is above the law, although some think they are. Simon has had Sergeant's disciplined for for not doing their job properly and has exposed far larger cases of misfeasance.
eVestigator® defines Cyber Security to Industry
Cyber Security is so much more than Information Security
You need a Forensic Expert Witness and Forensic Investigator to handle your case, it saves you money Results come faster from a professional instead of poorly trained imposters charging for more hours, who would you choose?
SIMON SMITH 0410643121
- Have you or your client been charged with a serious cybercrime? Contact
me for a free preliminary factual assessment.
[email protected]
Simon Smith, Australia's most talented Cyber Forensic Expert Witness & Investigator
Simon Smith is an independent cyber expert witness who has successfully appeared in most major courts both hired in defence of police prosecution as well as all civil matters involving software, social media, e-defamation, cyberstalking, cybercrime, catfishing, Deepfaking, the Dark Web, complex High-Tech computer hacking,
software supplier and customer disputes, fraudulent documents, family disputes, mobile and computer forensics (including iOS, Android, Mac, PC) and much more. He has the industry experience to backup his expertise. He has been programming
commercially and in the IT Security field for over 22 years. He informs Courts whether software is 'fit for purpose', and advises on his comprehensive expert social media
background, exposing fake Facebook, Instagram, Social Media Cyberstalking accounts, giving evidence and valuation as to loss in e-defamation cases, Harassment, AVO's, Personal Safety Orders and identifying the owner of fake accounts, phishing, investment and cryptocurrency scam cases, AML/CTF money laundering and document fraud disputes and much more. eVestigator® attains results and has succeeded in stopping court cases before they have begun based on his expert reports.
Simon Smith is recognised
internationally for his expert witness experience in High-tech cybercrime &
computer child abuse cases, CEM, CAM, dark web
Simon
Smith of eVestigator has now participated in both AU and NZ District
Court proceedings to assist the court greatly in high-tech cybercrime cases
based on his experience and expertise. He has successfully given evidence
relating to serious charges of child abuse possession, access, production
and solicitation, quite often leading to the case being thrown out, or in
other cases, change of plea and sentence negotiations. He has assisted
defendant's from being wrongfully accused, and has assisted the Court's in
coming to a fair and reasonable technically informed outcome. This
specialist area sees Mr. Smith communicating with, and working as a Covert
Internet Investigator. Many of these cases require a great deal of
sensitivity and are resultant of evidence and intelligence passed down
through the FBI, AFP, DIA and local law enforcement. As a specialist in this
area, Mr. Smith will ensure that the Court hears the correct evidence. Simon
Smith has also worked on many cases alleging serious access to dark web
resources, such as silk road, TorChat, mail2tor and more. As an expert
software engineer, he has recently assisted a district court in New Zealand
to come to the correct and preferable decision by utilising his reverse
engineering and memory analysis skills to clarify an exhibit which led to
facts that would otherwise have been missed.
Simon Smith is simply the best cybercrime, online fraud, dark web, AML/CTF, CEM, CAM
and child exploitation expert witness, period.CEM defence lawyer / complex dark
web covert investigation charges:
"You did a professional job!
The evidence of Mr. Smith an expert with experience and knowledge greater
than [DIA Covert Internet Investigator 1] or [DIA Covert Internet
Investigator 2] should be accepted that there is no evidence that TorChat
had been used on the computer seized from the defendant. [DIA Covert
Internet Investigator 1] points to a page file he located. He provides no
context in which the string of characters was found. Mr. Smith in his
evidence cast sufficient doubt on the inference drawn that the test of
beyond reasonable doubt could be satisfied. [DIA Covert Internet
Investigator 1] conceded that he had no evidence of context . Mr. Smith as
an expert software engineer further [on inspection of the source code]
confirmed that the string required context."CEM defence / complex mobile
forensics expert witness matter, serious charges: "Firstly, thank you
for your amazing dedication to my case, and the extraordinary quality of
your Reporting and Findings! I cannot commend you enough. You really are the
best - your ability to work out the forensic facts - and to prove
incompetence - is just amazing! Thank you for the amazing effort and
dedication, which you continue to display on my behalf. You never cease to
amaze me! Please have no doubt that your work genuinely surprised my legal
team. They were not expecting it. I will forever be indebted to you."
Serious offences that Simon Smith has been able to defend if you have been wrongfully accused: s 272.8 and s 272.9 Criminal Code Sexual intercourse/ sexual activity with child outside Australia s 474.25A Criminal Code Using carriage service for sexual activity with a person under 16 years of age
s.474.19(1) Criminal Code—use carriage service for child pornography material (material regarding child under 18 years of age)
s.474.26(1) Criminal Code—use carriage service to procure person under 16 years of age
s.474.27A(1) Criminal Code—use carriage service to transmit indecent communication to person under 16 years of age
s.478.1(1) Criminal Code—unauthorised access to, or modification of,
restricted data
s.477.3(1) Criminal Code—unauthorised impairment of electronic
communication;
s.474.17 Criminal Code—Using a
carriage service to menace, harass or cause offence
s 474.24E Criminal Code—Using a
carriage service to transmit (make available, publish, distribute,
advertise, promote) material and the material is an intimate image, without
the consent of the subject and reckless as to subject’s lack of consent
s 474.24F Criminal Code—Using a
carriage service to make a threat about an intimate image
s 474.15(1) Criminal Code—Using a
carriage service to make a threat to kill
s 474.15(2) Criminal Code—Using a
carriage service to make a threat to cause serious harm
s 471.12 Criminal Code—Using a
postal service to menace, harass or cause offence
s 474.15(1) Criminal Code—Using a
postal service to make a threat to kill
s 474.15(2) Criminal Code—Using a
postal service to make a threat to cause serious harm.
s.233BAB(5) Customs Act 1901—importation of tier 2 goods
Offences pursuant to the Crimes Legislation Amendment (Sexual Offences
Against Children) Act 2010
Computer intrusions, Unauthorised modification of data, including
destruction of data
Unauthorised impairment of electronic communications, including denial of
service attacks
The creation and distribution of malicious software (for example, malware,
viruses, ransomware)
Dishonestly obtaining or dealing in personal financial information.
Covert Internet Investigations that
Simon Smith is able to undertake (sample): Identify suspect behind cryptocurrency address
Identify suspect behind false email address
Identify suspect behind fake Facebook account
Identify suspect behind fake WhatsApp account
Identify suspect behind fake SnapChat
account
Identify suspect behind fake Instagram account
Identify suspect behind fake Twitter account; and many more.
Simon Smith - best Criminal & Civil
Cyber Forensics Expert Witness in Australia
Simon Smith has
made a real difference to today's justice system. He has been the expert
witness in major high profile criminal and civil trials, some under
suppression orders which because of his good work cannot be named (other
than via referral). He has been complimented
by Magistrates and Judges for the good work he has done to assist the Courts
and he is the best cyber defence criminal expert witness in Australia, and
is well sought. He has an international and a national presence and almost
100% of his work comes from word of mouth due to the life changing successes
he has made to other cases. He is one of the rare few skilled individual experts with the know-how and
strength to stand against the state or the Commonwealth when they charge
before investigating in a prosecution. He is a great believer in human rights and
has succeeded in Supreme Court AFP cases that have resulted in the AFP
embarrassingly viewing his expert report, sending the jury home, and
severely downgrading a life sentence, all because of findings of fact Simon
has made, which has demonstrated the lack of capacity of cyber skills in the
police force.
One of the most recent high profile expert witness case that Simon assisted
the Court solely on the grounds of backing up digital evidence, where only
circumstantial evidence existed is located below. He currently has succeeded
in giving valuable evidence in Magistrates, Supreme, Federal, County, District
and Tribunal cases. Those are only the cases he has needed to
give evidence in person for. He has given expert opinions in almost 100 cases across
Australia in many areas and is always on the radio, news, or online
publications with free advice from cases he has completed.
Sample recent high profile cases and resolutions - for direct barrister/client testimonials please contact
me. Mr. Smith specialises in Criminal Defence Cybercrime cases for the
accused in Criminal Trials and has achieved major success in this area.
Sample cases...
Serious child sex trafficking
allegation- Expert Witness Testimony
and Opinion. Deep source code investigation into the memory forensics of
TorChat and remnant artifacts.
Civil Construction Company vs. Former Employee - Serious online
social media injurious falsehood injunction - Expert Witness Testimony. Fake
account intelligence - District Court of Queensland.
Victoria Police vs. Individual - Melbourne Magistrates Court -
SOKET - Mobile phone forensics CEM expert opinion matter. Case settled
due to Expert Evidence.
NSW Police vs.
Singh -
Serious Child Grooming via
Social Media Case -
Up to 25 years jail at stake - Expert Opinion - Confidential.
Victoria
Police vs. Abdelmalek - Heidelberg Magistrates Court -
Expert Witness,
Link 1,
Link 2
Overall story related to the stalking case of Lincoln Lewis (former Home &
Away star) and Abdelmalek - Expert witness Simon Smith. Ask for testimonial. A Melbourne woman who made strangers believe she was Aussie soap
star Lincoln Lewis has been jailed for two years and eight months after
one of her victims took her own life. She was bailed almost immediately
after her defence indicated Abdelmalek would appeal the guilty verdict.
Lewis was first alerted to the catfishing scam when one of the two
victims, a woman he had gone to primary school with, got in touch.
This matter is being appealed in the County Court of Victoria.
R
vs. Nozhat - Canberra Supreme Court
- CDPP/AFP
- Expert Witness - Landmark Case -Did not proceed to trial due to
my Expert Witness Report success. Jury sent home. Suppression order on case
negotiations. Life
sentence withdrawn. Plea bargain entered with completely different level of
allegation on accused. Due to my expert evidence in
regards to data encryption it was said at 141. Secretive communications:
(Ruled Out) - Counsel for the Crown pointed to the conversation
on 20 May 2017 indicative of an intention to communicate over an
encrypted messaging app rather than on the telephone. He also pointed to
the answers to questions 161, 162, 172 and 173 in the interview with
police (see [77] and [118] above). He submitted that the evidence given
to police was false. Counsel for the accused contended that the answers
were not in fact false at the time, they were given because Mr Nozhat
did not in fact have those apps on his phone at the time of the
interview as they had been deleted. In any event, he submits that this
evidence and any evidence of the use of these apps postdates the 18 May
2017 conversation which Mr Nozhat admits led to him being aware of a
substantial risk that what was being imported was a border controlled
drug and hence the evidence is of little significance to the present
issue. Ask for testimonial.
Plumbing Business vs Consumer whose
story ran on 'A Current Affair' - County Court of Victoria - Online Defamation brought on by
broadcast of 'A Current Affair' story. Successful outcome due to
Expert Report. Ask for testimonial.
Consumer vs. Plumbing Business - Victorian
Civil and Administrative Tribunal - Civil Claim involving alleged digital
fraud. Successful outcome due to Expert Report. Ask for testimonial.
Manufacturing Company vs. Magento/SEO/PRINCE2® Web Development Company:
Victorian Civil and Administrative Tribunal - Civil Claim
involving e-commerce website software
dispute. Software Development SDLC/Negligence case. Successful outcome due to Expert Report. Ask for
testimonial.
Counterclaim in the above matter:
Victorian Civil and Administrative Tribunal - Civil Claim
involving e-commerce website software
dispute, Software Development SDLC/Negligence
case.
Successful outcome due to Expert Report. Ask for
testimonial.
R vs. Bethel:
Queensland District Court - Child
Abduction/Deportation case - Sworn evidence for the Prosecution -
Confidential.
Energy Safe Victoria vs Nicholson
- Unlicensed Practitioner Case - Sworn evidence for the Prosecution
- Confidential
R vs Hutton (District Court of Aukland) via VMR
-
Auckland man jailed after trying to buy a girl on the dark web under the
username kiwipedo Expert witness for the defence following on from a High Court decision. Serious CEM/CAM dark web, TOR, TORChat, mail2Tor matter. Pursuant to Schedule 4 - Code of conduct for expert witnesses – High Court Rules 2016 gave expert evidence to counsel and prepared to give expert evidence and be cross examined at trial. During
the trial I found evidence in the source code relevant to the defence, and in accordance with the rules, notified Counsel, causing a plea bargain to be entered.
This was a very high profile case with a history in the High Court of
New Zealand. I was the defence expert witness. I cannot reveal the facts
I determined on my own accord (due to a suppression order linking to the
method they used to get the IP) which caused me to alter my expert
opinion. I can say, the DIA did not have the factual linking evidence I
stumbled across. An expert witness truly is an "officer of the Court"
and it frightens me to know that I almost cleared this person due to a
lack of prosecution evidence - until I was asked to look deeper. To find
out that there was an admission thereafter is mind-blowing! Many people
stand falsely accused but in this case, circumstantial evidence was not
enough until half way through the proceeding, I linked forensic remnants
making it factually obvious to me proving the ownership of the "kiwipedo"
account belonging to the accused, something which was not established by
fact.
Corporation vs. Bitcoin Cryptocurrency Scammer
Expert Opinion: Direct
Engagement - Confidential.
Childhood Education Provider vs. Mobile Platform Development Company Expert
Opinion: Direct Engagement - Confidential.
Education Provider vs. Mobile
Platform Development Company Expert Witness: Lack of SDLC, SRS or PM
Methodology. Software Developer Negligence & Damages Matter, Expert
Report - Supreme Court - Confidential.
Energy Safe Victoria vs Nicholson
- Unlicensed Practitioner Case - Sworn evidence for the Prosecution
- Confidential
Consumers
vs Travelalot Pty. Ltd - Media Requested Investigation Investigated for "A Current Affair" -
Nine Network - Referred to ACCC for Prosecution. Travelalot is an online booking site to book holidays at a very cheap
rate, including in most cases, accommodation and airfares. After being
advised by ACA that there is a very large amount of customers
complaining about this business (and its other similar business) I
opened up communication with the owner to validate the facts. As a
result of my investigation and report to the ACCC, I am happy to see
that action was taken. See
here.
The
man who hacked his neighbours and put them through seven years of hell Investigated in 2017 and provided
useful evidence relevant for the police to further narrow in on this
cyberstalker. An innocent family has broken their silence
after a seven-year fight to see a Telstra worker put behind bars after
he waged a disturbing campaign of terror against them over a tree
dispute. See
here
for full article.
Facebook evidence requiring injunction in the QLD District Court:
Case - Sworn evidence
for the Plaintiff to assist in attaining substituted service by electronic means -
Confidential
Legal Services Board & Commissioner
vs. Mortgage Broker Case - Sworn evidence
for the Prosecution - Confidential
Victoria Police vs. Individual(Organisation Employee, alleged computer crime):
Expert Opinion - Magistrates Court of
Victoria - Confidential.
IDG Australia -
Deepfakes in Marketing
- Expert Opinion
FDR Dispute involving kidnapping in breach of Family Court Order -
Successful Expert Opinion resulting in
a Recovery Order within 24 hours
FDR Dispute involving child access -
Within 15 minutes avoided entire
Family Law claim for client
- Expert Opinion
Sensitive CEM Police Accusation (Technical Factual Defence) -
Ongoing expert opinion, expert evidence, and expert witness services correcting misleading and unfounded allegations in a defunct police brief. Involving the use of XRY, Magnum Forensics and Cellebrite.
Sensitive Major CEM NZ Federal Police Accusation (Technical Factual Defence) -
Ongoing expert opinion, expert evidence, and expert witness services in relation to the Dark Web, Child Exploitation Material allegations, and digital forensics services.
Social media online and physical extortion and blackmail scam. I helped detect who was behind the internet account of a highly sophisticated criminal - and referred the matter to the police.
Stolen identity case which involved over 10 devices and an entire family. I helped end years of stalking and identity theft covering an entire family in the midst of a large family law dispute, bringing some normality back to their lives.
International AML/CTF Money Laundering case ($2M +) -
Computer forensic investigation and expert witness ediscovery services in relation to a Vietnamese money laundering matter.
Corporation vs. Search Engine
Optimisation Company - Allegation of misappropriation of spending
and negligence of services - Expert Opinion -
Confidential
Famous Athlete vs.
Sporting Tribunal - Confidential Allegation involving technology -
Expert Report -
Supreme Court of ACT - Confidential
Consumers
vs Walid El Haouli and Samira El Haouli - Consumer Requested Fraud
Assistance Assisted
victims for "A Current Affair" -
Nine Network - Referred material fact to various departments. Walid El Haouli has ripped off several hardworking Australian
families, including one woman suffering cancer. He claimed to be a
renovator, but instead of doing the work, he did a runner. Cyber-crime
expert Simon Smith has been assisting some of El Haouli's alleged
victims to untangle the fraud.See
here.
Police
Cybercrime negligence - Simon Smith brings deficiencies of
Australia's Cybercrime Policing to "A Current Affair"
Large Solar Corporation vs. Overseas VOIP Call Centre Provider Expert Report, Expert Evidence - County Court of Victoria - Breach of
Contract Expert evidence by way of packet-based voice-over-internet (VOiP)
Telecommunications service.
AFCA Advocate for victims of bank/insurance/superannuation cybercrime and fraud Expert advocacy, strategic expert advice, mediation and forensic investigation services for those affected by bank negligence, fraud, and inability to fulfill consumer guarantee promises.
In one instance, Simon was able to assist as an advocate to his client
in recovering 100% of losses due to internet fraud (>$50,000) where the
bank refused to refund any money or take any liability.
International
Los Angeles Screenwriter social media e-defamation case Expert social engineering to determine the IP addresses of fake
accounts for the purposes of ediscovery in an online social media
defamation case for the international film screenwriting industry.
Pharming
- Fake forex & bitcoin trading platform SCAM - Consumer scammed into
giving away over $140,000 to internet scammer Expert social engineering to determine the IP addresses and
identifying details of the origin of the scammers, recovery of funds,
assist in reporting the matter via Interpol through the AFP.
Employee abusing the self-isolation guidelines Full workplace computer forensic investigation resulting in termination of an employee for misusing the pandemic situation for self gain - financial fraud.
Runaway
scammer of over $650,000 - Melbourne Australia / Philippines AML/CTF
matter Expert social engineering to determine the
IP addresses and identifying details of the origin of the scammer,
recovery of funds mediation and advocacy, assist in reporting the matter
to the relevant authorities.
Catching the trolling "Cookie Monster" - obtaining the IP address of a trolling instagram stalker This was an interesting case. I used special covert internet techniques to identify the person behind a trolling instagram account for the very popular 'Sweet Mickie' cookie company - as was featured in the following Australian Shark Tank episode. For months the stalker had been harassing the CEO and violating the terms of service for the social media giant. I was able to capture the person known as the 'Cookie Monster', attained the relevant identifying details and passed them onto the Police.
Complex insurance fraud matter - cyber forensic analysis cracks the case I was referred a case that was being challenged in the NZ courts with a large insurance company. The claimant stated that she had lost her wedding ring in a robbery and provided the insurer with a photo of it on her finger said to be taken on her wedding date. Despite other investigators almost giving in, I was able to determine that not only was that photo taken after she had reported the loss to her insurer, it was taken with a mobile phone device which had firmware that was only released in the last month, almost two years after the alleged photo was said to be taken.
Hon. Karen Andrews - Minister for Industry, Science and Technology "We do recognise the importance of the work you are doing to assist Australian industry and individuals affected by Cybercrime".
Customer Testimony:
"Thank you again for
what you continue to do for me. I will never be able to fully show my
appreciation! Your reports are first-classed, I'm very proud of your
efforts"
- Serious Police Prosecution Defence (Accused)
Simon Smith joins Global
COVID-19 CTI League and COVID-19 Cyber Threat Coalition
The
COVID-19 Cyber Threat Coalition (CTC) is a global volunteer community
focused on stopping these actors. We're united in our feeling that
extraordinary times call for bridging traditional boundaries to operate
with unity and purpose.
Simon Smith is glad to be one of the few recognised international
cyber experts to be accepted in the COVID-19 CTI League. According to
Reuters, the Cyber Threat Intelligence League was founded by
security decision-makers Ohad Zaidenberg, Nate Warfield, Chris Mills,
and Marc Rogers. Primarily, the group is aimed at preventing
cyberattacks against health care facilities and providers. The group is
defending health care organizations from cyberattacks and is also using
its contacts in internet infrastructure providers to avert phishing
attacks and other financially motivated cybercrimes that are using the
fear of this pandemic to lure internet users. According to Marc Rogers,
VP of cybersecurity strategy at Okta and DEF CON’s head of security, the
COVID-19 CTI League has already traced and dismantled a hacking campaign
that used a software vulnerability to distribute malware. Commenting on
how the Coronavirus outbreak led to a huge surge in phishing attacks,
Rogers said, "I've never seen this volume of phishing. I'm literally
seeing phishing messages in every language known to man."
What makes up the skills of an eVestigator®
SIMON
SMITH has been engineering and innovating software and systems since the age of 11 years old.
Throughout his young professional life, he had a expedited start and
achieved what many people may call impossible. He has over 21 commercial years of IT Systems and commercial programming experience. He also is an ACFE Certified Fraud Examiner (CFE®),
Certified Chief Information Security Officer (CCISO®), Computer Hacking Forensic Investigator (CHFI®),
AWS-CAA, Prince2/P, ISO27001 LA, Certified Ethical Hacker (CEH®), Certified Network Defence Architect (CNDA®),
Microsoft Certified Solutions Developer (MCSD® - App Builder), Microsoft
Certified Solutions Associate (MCSA®), Microsoft Certified Solutions Expert (MCSE®), Microsoft Innovation Expert (MIE®),
Master Project Manager (MPM®), Certified Access Management Specialist (CAMS®), Microsoft OSP®,
Certified Blockchain Professional (by IC Council®) (C|BP®), Certified Blockchain Developer (CBD®), Certified Bitcoin Professional (CBP®), Certified Cryptocurrency Expert (CCE®), (ITIL®) Practitioner,
Cyber Forensic Renown Detective, Certified Expert Witness, Professional Scrum Master (PSM®)
and a well-known experienced Software Engineer. His combination of skill
sets arise from over 21 years of industry experience on top of a
youthful array of teenage achievements including being placed at the top
of the country in his IT certification results and straight into
industry as an Analyst Programmer.
Simon has is a true frontline Cyber
Security Expert, Expert Witness, Government Investigator, Crisis
Responder, Auditor, Fraud Examiner, ACE, and holds a C|BP from IIB (Certified Blockchain
Professional - IIB is a division of IC Council®). He is a World Renown Detective, CECI, CIRS® - Certified Internet Research
Specialist, and CSSBB. He is also IBM Blockchain and Splunk Certified
and well versed in all scope surrounding R&D and IoT best practice.
Simon has also recently attained his CCSM® and as a Checkpoint Certified
Security Master. He specialises in Cyber Forensics, Cyber Security,
High-Tech Cybercrimes, Digital Forensics, and Expert Witness Services
for Public, Family, Corporate and Government. He does not conduct
missing person searches or surveillance. Simon Smith is also an member
of the Australian Information Security Association (MAISA) and the IEEE, as well
as an Honorary Advisory Board Member of IIB Council for their "Certified
Blockchain Professional. IIB Council is a subsidiary of IC Council, a leader in
Cybersecurity certifications internationally.
https://www.iibcouncil.org/advisory-board-2/
Customer Testimony:
"Thankyou so much
Simon, you are so good & have helped me so much. I appreciate all your
time & effort so Far, you have been able to achieve what we haven’t been
able to. Thankyou again, Regards, Well known Corporate Dealership in
Melbourne" vCISO client...moreInsurance Fraud Expert: Simon Smith is featured as an insurance fraud expert in his contribution to the Insurance Fraud Blueprint 2020 recognised by ANZIIF, authored by John Borland.
"Simon is regarded as a
prominent figure in all
aspects of cyber fraud.
With 20+ years experience,
he has aided all stages
of the insurance journey
from policy wording to
claims investigations. His
credentials and reputation are
rarely surpassed in the cyber
world."...moreCustomer Testimony:"The report is excellent as far as it reports on the failures of the services we expected to receive." Expert Witness client (sensitive).Customer Testimony:"As I mentioned yesterday we are wrapped we brought you on board - you have saved so much stress and hassle for our family and we would be more than happy to sing your praises. We will forever be grateful for your involvement." Expert Witness client (sensitive).Customer Testimony:"Thank you for your progress report and I’m very grateful that you will meet the deadline. But then again, I’m not at all surprised, as you have answered every
"call to duty", since the day we met last December!
" Expert Witness client (sensitive).
Simon Smith labeled "Australia's DIY Jack
Ryan" Tom Clancy's Fictional CIA Analyst
Mr. Simon Smith was selected as a
‘real life’ subject matter expert by the producers of the new
Amazon
Prime series based on Tom Clancy’s Jack Ryan to discuss some of his
work. Jack Ryan is a fictional CIA analyst who gets caught up in an
investigation of a terrorist plot when he creates breaks in the case by
“following the money”. Released on August 31st 2018, Amazon Prime will
be unveiling their new series starring
John Krasinski
as the well known fictional CIA agent, Jack Ryan. The series is based on
Tom Clancy’s series of books on the character from 1984 to date.
The purpose of the interview/shoot was to assist in the marketing of the
series due to his real-life experience in cyber intelligence and online
fraud, especially in relation to locating cyber criminals who have
stolen money and the unique techniques and psychology involved in
‘chasing that money’. See alongside video.Customer Testimony:"Hello again Simon. Firstly I'd like to give you my utmost gratitude for your professional assistance with this messy situation. We have come this far only because of your guidance. Exactly as you predicted the magistrate asked if she had an order against him and intimated that it would only be a matter of time before she attempted to do that. Thanks again for your fantastic work with this. I can't thank you enough! I believe she will have the order delivered tomorrow. I'll let you know as soon as we hear any updates. Thanks again. Dave" Stalking client of two years wanting a swift end...moreExpert Witness Testimony:"
Simon is a very impressive individual with a brilliant mind, and the exact type of person you want on your team. He is a problem solver that thinks outside the box, and is focused on solutions.
A huge weight lifted off our shoulders from the time we engaged Simon's expert help, and our situation quickly and dramatically improved thanks to his guidance, tireless passion and commitment.
We credit Simon for resolving a very emotional and stressful time for our family, and couldn’t recommend Simon more highly. Our only regret was not getting him on board earlier....moreSimon Smith becomes Digium (VOIP) dCAA® Certified:"After 20 years of developing custom VOIP solutions using the popular open source Linux PBX solution, Simon Smith completed the Digium Certified Asterisk Administrator exam which tests knowledge of Asterisk, VoIP, and telephony. To pass the dCAA exam, it is required that a candidate has experience in administering an Asterisk system, and are comfortable installing, configuring, and maintaining an Asterisk server using Linux and Asterisk CLI commands. Naturally, Simon can programme the system further than this, but this was a good industry certification to have to compliment his Graduate Diploma's relating to Telecommunications."Simon Smith becomes CAMS® accredited by the Identity Management Institute:"Access management also known as rights management is the execution of policies and procedures for granting authorized individuals the right to access services, functions, data, and physical locations while preventing non-authorized individuals from accessing systems, assets, and other services. Access management is one of the information security disciplines which interacts with users and their management the most and is critical to the implementation of policies and procedures to support the security goals of the organization, mitigate access risks, maintain access controls, and comply with contractual and legal requirements. Identity Management Institute® (IMI) developed the Certified Access Management Specialist® (CAMS) training program for testing, analysis, and evaluation of the knowledge, skills and abilities of professionals for the purpose of certification and re-certification in the field of access management. CAMS® is a registered trademark of IMI."Simon Smith becomes EC-Council® (CNDA®) Certified:"The Certified Network Defence Architect (CNDA) certification, which has been designed specially government/military agencies, certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The CNDA certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Network Defence Architect is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities."eVestigator®
becomes an AWS Certified Technology Partner "Technology Partners
provide software solutions that are either hosted on, or integrated with,
the AWS platform. Technology Partners include Independent Software Vendors
(ISVs), SaaS, PaaS, developer tools, management and security vendors.". eVestigator®
becomes a Microsoft Certified Partner as well as joining the Azure Partner
Network Now eVestigator can assist its clients, whether in the position of
"crisis consultant", "expert witness to the Court", or "expert consultant"
to utilise and demonstrate new hybrid capabilities and innovations anywhere.
Azure data services can benefit from cloud innovation and always up-to-date
data capabilities on any hardware. Extended management capabilities can be
demonstrated with Azure Arc to Linux and Windows servers as well as
Kubernetes clusters on any infrastructure across datacenter, multi-cloud,
and edge.
Since 11yo, Simon began programming leading to a score in VCE in the top
2% in Australia in IT Systems Management. Shortly after, he was offered
an Analyst Programmer role, and grew very fast into a young
entrepreneur, CEO, founder & educator. He was an expert Programming
Analyst (which included the full SDLC) and learnt many disciplines non
stop as he was running his businesses, leading now to a clear path in
Computer Forensics, Criminology, IT Process & Program Management,
Mediation and combined Business success.
Simon attained success in businesses early and continues this path and
also investigates online cases, cybercrime, cyberstalkers and fraud as
an expert witness and/or consultant/adviser. The UK Police Force even
sought out his skills in 2017. SecurityNow's Ken Hess has referred to
Simon as "Perhaps the World's Best Investigator".
At 21, Simon was engaged to lecture advanced programming at Swinburne
Uni after work, which was very successful. He also founded US/AU niche
medico-legal firms. He built training Academy's and later become a
Renown Detective. He has now appeared on Sky News, SBS World News
(30), The Project (10), Today (9), ABC (2) and A Current Affair (9), and
radio as an IT, Cyber, Fraud and Investigative Expert, has reviewed
Cyber terrorism books, authored training material and has been asked to
guest speak at many events.
Simon recently became a member of the Institute of iBusiness (IIB), a
division of EC-Council®. He also completed the master certification in
detecting deception, body language & conducting behavioral interviews
by Steve Van Aperan, an expert criminal profiler known internationally
for assisting police in over 68 homicides and two serial killer cases.
Simon
Smith is also a master at domain based investigations, following the trail
of any cyber scam or unlawful activity and is very much in touch with auDA
policy and intellectual property disputes. He has successfully mediated
several B2B disputes and continues to have a strong interest in this area.
Having been programming (commercially and non-commercially) for over 28
years now Simon Smith knows the internet backwards. He has a full
understanding of domain based hijacking, domain masking, and a full
understanding of domain based phishing and pharming attacks. He is also an
associate member of auDA with voting rights.
Counter-Intelligence, Advancement & More
on the Psychology of Cybercrime
Not many people understand the psychology of Cybersecurity and Cybercrime as Mr. Smith does. He recently had the benefit of being trained by the world renown Steve Van Aperan, as a Master in Detecting Deception, the reading of body language, and conducting effective behavioural interviews to complement his training in criminology, expert interview techniques and social media / mediation and interrogation intuitive skills. Mr. Van Aperan is one of the world's most advanced criminal profiler's. After he assisted police in 68 homicide investigations and two serial killer cases, the media gave Steven Van Aperen the moniker 'The Human Lie Detector'. To help police read people, Steve developed a successful profiling technique. He has trained intelligence agencies, homicide detectives, the Defence Security Authority and Department of Defence personnel in how to read people and detect deception by analysing verbal, non-verbal and paralinguistic behaviours. When combined with the art of cyber intelligence detection, insider fraud, and human reasoning behaviour we see in the workplace, many techniques give Mr. Smith an utmost competitive edge in determining both intent and motive in forensic investigations.
The enterprise software Mr. Smith creates for large corporations is always 'the first' of its kind, or on the cutting edge
of new technologies. This software was one of the first, if not the
first that interfaced with digital dictation devices natively, writing
drivers for physical foot pedals, and software for complete Hospital
Management Systems. The digital transcription industry was just taking
off and he found himself writing API and SDKs for digital transcription
devices and vendors making plug-ins to popular software such as Windows
Media Player, Real One, VLC, Internet Explorer, Chrome, and other
popular internet web browsers, then interfacing direct via an inventive
unique way through the Win32 API to trigger JavaScript connectivity,
(essentially API for programmers) COM interfaces, iTunes and more. His
digital dictation software also led him into the realm of VOIP and
streaming audio capture and workflow management. The system then grew to
an entire hospital automated digital dictation and transcription
reliable setup which processed over a million minutes of medical
dictation. Further, he developed a Pocket PC Windows CE based digital
dictation proprietary voice recording and workflow system that the
physicians would take with them whilst reviewing x-rays or will use to
dictate after an appointment or during/after surgery.
Whilst enterprise programming he created digital voice systems
He then
created an ISDN customised Perl based PBX system which he wrote software
to directly interact via a management interface that also integrated into his
Enterprise Windows Server Service and Pocket PC workflow system that
allowed the recording, rewinding, inserting, overwriting and addition of
voice and patient metadata via DTMF that would be another method for
physicians to record. It was fully HIPAA compliant and was an entire
business carried out solely by Mr. Smith through all phases of the SDLC,
as was his next booming business. As innovation was on the forefront of
Simon's mind, he created one of the world's first remote printing
applications allowing almost instant workflow from dictation, to
transcriptionist back to the surgery as a printed document, all in one.
This was at the time when physicians were converting from tape to
digital. Then after performing work on that business during the night he
woke up to start his professional job and do it all over again from 9
am. In the period of eight years in working for an employer whilst
keeping up this fast pace, he created systems that automated business
CRM processes and reporting, mastered all areas of the SDLC especially
computer programming.
Simon Smith is a Cryptocurrency and Blockchain Investigator, Developer and IIB Council Board Member
Simon is a fully certified Blockchain, Bitcoin, Ethereum Professional, Developer and Expert (by C4® and Blockchain Council™) and is an honorary Board Member of the IIB Council Blockchain Board. His role with the Advisory Board is for reviewing and evaluating the quality of the program by being an independent industry voice that along with the other members of the board will set the global standards for the program (Body of Knowledge). Further, He investigates cybercrime that involves crypto-currency fraud and phishing, and is always on the cutting edge of technology. He is soon to release his new coin, ICO and trading platform. In the fast paced moving world of Blockchain, Simon is also set to chair an Australian Industry Group that will set and
govern industry standards across this industry in an effort to combat mining and social engineering fraud in this area.
He worked for
Major Corporate Companies
In those roles, he worked on many large
corporate companies including major pharmaceutical companies, interrogated
geo-data that spanned terabytes of information via SQL and assisted in
integrating legacy systems into
a new era of programming. At this point, Visual Studio, all versions of
Visual Basic, and C++ were his main tools until he decided to branch out
and open up his own empire. All throughout those years he had a special
interest in the lack of security all software that he came across
suffered and was able to find flaws in almost any software he found. In
the companies he worked for, he developed innovative software that saw
the hands of tens of thousands of users so he knows what it means to
make quality software. These were Corporate companies that were in the
Consumer Relations Management industry and could not afford downtime.
Some of the Company's clients were Arnott's, GlaxoSmithKline
Pharmaceuticals, Kellogg, Goodman-Fielder, Reckitt Benckiser, Coles,
Crown, Dulux, George Western Foods, Schweppes, McDonalds, Sanitarium,
Australia Post, the Australian Government and so many more. He also
worked as a data scientist lead programmer in his mid-twenties using
extensive SQL Server skills, data analytics, big data and predictive
analysis for a worldwide company headquartered in Michigan in its
Australian office. This corporate today serves nearly every automotive
OEM in over 70 countries, throughout their 15 global offices.
After mastering programming, he turns to software
development methodologies, and is an expert witness in all models / disputes. He is certified and skilled in SCRUM,
MPM, CIPM, SSBB, Prince2/P, ITIL, SDLC Waterfall, V model, ISO27001,and
holds real life experience.
In one instance, almost thirteen years
ago he reported to QuickBooks that credit card numbers were visible via a
simple method of manipulating the binary of the data file. He was bemused to
find that the never responded. Similarly, a flaw in a major household name
manufacturer's digital door lock system where he was able to duplicate the
tags of at least three stocked models on the shelves in Australia that
contained what he found to be flaws in the implementation of RFID and
Bluetooth, this enabled him to unlock any door essentially within five
seconds. Being of good character he contacted the manufacturer immediately,
they took six months to get back to him, receive his information and never
contacted him again. Cyber security is a very mixed basket of skills.
When it comes to software disputes, Simon has lost no cases. He has over
22 years of industry experience to back him up and real live projects that
have stood the test of time. Apart from succeeding as an expert witness, he
is also an avid dispute resolution practitioner. He has mastered the SDLC
and all agile variations that have been employed over the years. He holds a
SSBB, SCRUM.org PSM, ITIL, Prince2 Practitioner, MPM, and Post Graduate
Diploma's in Software related Project Management with over 21 years of
industry experience. He truly is an expert in software related expert cases,
and has actually written high profile software development, project
management quoting, task and resource related IT project management software
for the benefit of software development enterprises.
He dominates a market and creates a $10m empire, following a $50m empire, running a massive business with few people via automation
It was at this time that Simon opened up a
highly successful vertical market enterprise training organisation as
CEO and shortly worth millions, and then did it again on a scale 1,000
times larger. After that, he became a licensed investigator, mediator
and FDRP. During that period, whilst he was waiting for the Government
to catch up to him with his training organisation status which was
finally granted both at the start and on appeal with the delay being Mr.
Smith's first direct glimpse at Government corruption which sparked
another interest and specialty.
Simon combines his vast array of skill sets and falls into a niche that happens to define Cybersecurity
He invested greatly in his
education which almost started in reverse making him a very decorated
young man with both Australian qualifications at post-graduate level and
Department of Homeland Security NICCS recognised certifications in areas
related to Cyber, fraud, workplace threats, social media, corruption,
criminal investigations, high-tech forensics and forensic
investigations. However, it was not the training that gave Simon his
abilities, it was his inherent underlining skill of two simple things;
logic and common sense.
Simon enjoys extreme success with his talents
All skills combined have been applied to
business, forensic investigations, Cyberstalking cases, his professional
mediation and dispute resolution credentials, his high technical ability
and understanding of human behaviour to solve problems. There is not an
IT/Cyber/Security job that he has not mastered. He is an Expert
Entrepreneur, Counter Intelligence Social Engineer, and Internationally Accredited Forensic Investigator. He is known
for his skills solving real High-tech cases and has been asked to assist
international Police. He is a cybercrime expert witness and uses
techniques he creates on a case-by-case basis to track IP addresses with
little to no clues very successfully via methodical methods of social
engineering he specialises in. In a complex case of cyber stalking, cyber harassment and cyber bullying, where both parties are in a contentious situation, Simon Smith (eVestigator) has been appointed by the parties to an intriguing legal battle between 3 parties to where there has been a case of stalking and mental harm as defined in the Personal Safety Intervention Orders Act 2010 but by whom? He is completely independent in all cases and only report on facts so provided parties cooperate, it will be one of my many interesting cases. Simon has succeeded in many of areas of cyberstalking investigations assisting victims. In one such case he was tasked with finding a 7-in-1 reverse stalking criminal ending up in seven identities relating back to the one sole entity with no IP address whatsoever, just investigative work. Cyber email skip-tracing is something that is an eVestigator specialty and it is not easy without the ability to perform a summons or have police help when stalking is performed by means of a 'FREE' webmail or Facebook account in an overseas jurisdiction with hidden IP headers and absolutely no technical or legal means of getting those details from the source. However interestingly not a day goes past that is not challenging. Mr. Smith was independently appointed by parties to a dispute in a Magistrates Court technical IVO matter as an independent expert tasked with the full powers of the court to determine material evidence in question without bias. The reason for his appointment demonstrates a rather large hole in the system. To be fair, Cyber Forensic Investigators are not Lawyers and Lawyers are not Cyber Forensic Investigators. In some ways this action may be at the wrong time in the proceedings. It is not a question of law, rather, it is a question of investigation.
There could have been several outcomes. Both parties could have nothing to do with the conduct. Either party may know they have something to do with the conduct and not want it revealed. My obligations are always to the court and I have to do whatever I need to do to ensure my findings are independent and in my training of lawyers as mediators - this is not something that lawyers typically do 'independently' in an adversarial system.
However at the end of the day I look for the quickest path to get to the best solution for a result as long as those paths are not distorted or tampered with. He always finds alternative methods and it relies on working cooperatively with all the parties, because the best litigator combined with 'guess-work' is not justice, I work on fact. Update: As it turned out - as I was restricted to one chance at gaining evidence, I asked for a very high threshold of evidence under summons as he leaves no stone unturned and had an instinct on the very nature of evidence that would uncover fact. He was shortly notified by the acting lawyers that the parties had agreed to settle after being made aware of my request by voluntary undertaking which I found interesting, but a result, either way.
He is a certified Expert Witness and Fraud Examiner (CFE®)
He has given expert opinion, reports and evidence on topics
such as Cyber Terror, Cyber Stalking, Cyber Espionage, the Dark Web,
Blockchain, Social Media Tracing and Cryptography. He has also given evidence that has appeared before the Queensland District Court, the Magistrates Courts in three states, Federal Circuit Court, VCAT, QCAT, County Court of Victoria, Supreme Court of Victoria, in support of the Police in the District Court on the Gold Coast, in support of the Insured in support of Insurance Company claims, in support of the Legal Services Commission and Board in Victoria and further, in several forensic reports where discovery has shown
anomalies in the authenticity and/or alleged criminal activities by workplaces affected by cyber-attacks in employee fraud cases.
He is a leading Cyber Security Forensic Investigator practicing in CyberSecurity and Cybercrime cases
He has been labeled by Security
Now's Ken Hess as perhaps the "World's Best Investigator". He has
identified Cyber Criminals by direct unfiltered IP addresses and even
had a friendly conversation with them whilst attaining the necessary
details to give police for crimes that add up to approximately $80m. He
has also helped to identify over 200 Cyber Stalkers by using the same
techniques and helping the Australian Community in a subject area they
otherwise would be left abandoned. In Australia, the police do not
actively pursue or investigate Cyber Crime, they only allow you to
report it which can be very frustrating for the public.
Australia has serious issues in understanding or policing cybercrime
Simon has a
variety of skills covering mediation, conciliation, alternate dispute
resolution, computer forensics, acting as expert witness, evidence preservation
and has been appointed an independent expert in complex technical cases
by the court. To that end, here is a recent article that was published about what Australia's efforts with ACORN have been so far to deceptively report, protect, and prevent. What does Simon say in regards to APAC Regulators Set to Up Cyber-scrutiny in the Asia Pacific? "Too late. The Government apparently thinks they are doing a wonderful job now", Mr. Smith said.
"What can I say, or should I even say anything at all? Australia - you are about 10 years too late. He, again is of sheer disbelief. On a daily basis, catching cyber-scammers and cyber-stalkers, fraudsters and being at the forefront of white collar crime, having seen all the representations that the Australian Government make, I'd like to set some home truths", is what Mr. Smith said earlier today.
"I came into a situation recently where I found key information in a multi-million dollar SCAM and at the speed of lightning gave this information through ACORN and then it was one of the lucky ones that actually made it to the police. The next minute some untrained, borderline primary school IT level police 'detective' assigned by ACORN rings me up and refuses to look at my factual findings. The reasons given were egotistical. After a report to the relevant authorities, and then the Ombudsman as it turns out he was wrong at fact and had no idea what he was talking about", Mr. Smith stated. Mr. Smith likes to help out his clients' through the entire process and when resistance is seen by the police it is often frustrating for the victim. He is also a Family Dispute Resolution Practitioner and has written textbook material on Grief and Trauma and knows the aftermath of such a crisis. He understands the impact victims have in these situations, such empathy, he states, police and authorities lack.
"My client lost all his money and ended up in a mental institution. Every single day he is advised by clients that they continue to be turned away from the police with a variety of excuses. There is clearly an inability even to refer correctly, which shows a real systemic problem. When it comes to Financial crimes, this is something I have had a lot of experience with. The regulator's can pretend to take action and make changes but at the end of the day it comes down to sheer scapegoating and liability shifting", said Mr. Smith.
When Mr. Smith was asked if there were enough police resources to combat Cybercrime he said, "Yes, they have access to free training via the FBI but choose not to use it". When Mr. Smith was asked if the banks have genuine and reliable software solutions to detect Fraud he stated, "In my opinion as a professional in this industry for over 20 years, they most certainly don't. Not only do they not have good enough software, the weakest link is in any information system is the people. Their fraud department is a big team of legal counsel trying to pass liability somewhere else. They have guarantees they have to abide by - and I know what they are."
He went on to say, "The average consumer doesn't realise this and they play on that. I've seen it happen. That's going to change. With respect to the police training, others like me have to pay and attain the best Australia has and/or grow up at the exact right time at the dawning of the birth of the internet and further go elsewhere to get Department of Homeland Security recognised Certifications." ACORN has failed.
Simon helps keep Australia informed
He is well-known in the Australian media and has been
featured on SBS (30), Sky News (Cable), Today (9), ABC (2), A Current
Affair (9), The Project (10), radio, print, online and abroad many
times. Keynote Accomplishments Mr. Smith is an upfront, say it how it
is, very informed cyber investigative expert, hands on practitioner and
speaker/trainer.
There are many online frauds that Simon has solved, come across and given intelligence towards. This has most certainly been an eye opener, as Simon has seen all facets of life and the way people react to different situations. One of the most common types of online fraud is where fraudsters actually pay you first! This builds a sense of trust and also tricks the bank to think that there is an ongoing trading relationship there when there is not (as far as you know yet). While many people and businesses who trade online we like to think are legit, unfortunately fraudsters do take advantage of the "behind a keyboard" syndrome and feel that they are untouchable. To many extents they are in Australia as Cybercrime is not properly policed, and that's where Simon comes in to help the public at the moment.
Simon assists the media with many technology based issues, including the dangers of smart toys when not used checked for cybersecurity risks. He also consults on major cryptocurrency fraud investigation and is often asked to give expert opinions and expert reports for the purpose of various courts in Australia. Phishing and Pharming are very common. The cybercriminal fakes the look and feel of a common retailer or banking website or email that looks genuinely like the original.
The simplest way to know a retail website is not genuine is to not do business online in any unusual way. Fraudsters will often ask you to pay using a MoneyGram or Western Union to strange countries and this is a major warning bell! It is most definitely not normal, and if it is best to keep bills for the letterbox.
Strange wire transfers are not usual and would be cause for concern, because if you do send your money like this, it would be unlikely you will see it again.
Then there are online auction sites who attempt to combat fraud, but are far from perfect. People still circumvent the Auction site and try to do deals outside the site 'offering a slightly cheaper deal'. Again, alarm bells. Online classifieds do promote products and services, but allow sellers and buyers to negotiate out of the website. This is the worst type.
Fraudsters may pretend to be genuine sellers, post false ads - yet repost them over and over. Sometimes the price is too good to be true and that is of course another indication.
There are so many more types of online fraud and social engineering tricks that will be posted here to keep you aware. For now, Simon makes sure he posts all his findings to SCAMWatch.gov.au which takes a little time for them to update, but they have some basic tips. For the more serious
cybercrimes make sure you contact Simon to ensue something might actually be done about it.
Finally, be vigilant, and spread the word out about what you see in your inbox, and warn others if you spot something. He often informs people on LinkedIn and posts to his blog whenever he finds something, and will always be updating it as cases evolve.
When there is a Cyberattack Simon is the first responder
Simon is a master in tracing IP addresses for fake or harmful accounts, and can perform extensive social engineering resilience tests for your Organisation as well as for the use in solving Cybercrime. He has attended hundreds of sites during a Cyber
crisis and mitigated such crises in record time. The only way he has
done this is by understanding the full systems development lifecycle but
most importantly by keeping communications open and strong with C level
staff. He is very much a people person and can identify that people are
very much a part of the process. He has three upcoming conferences, in his
previous conference with Secure Utilities he presented to a group of
high level CISO's openly and honestly about what he has seen as a
forensic investigator on the frontline and what really matters.
When Simon presents he talks real life cases (Cybercrime)
He
pointed out the difference between information security and cyber security. He was
featured as an expert in the Secure Utilities magazine line-up
specifically focusing on how a utilities personnel are its biggest risk
when it comes to keeping data secure. He outlined steps that utilities
need to take to protect their data and the techniques available to
achieve this. He gave them a shocking demonstration of how easy it is
for somebody to socially engineer a staff member. He gave a real, honest, evidence-based presentation which was not
selling any services or textbook style presented but was factual and
backed up by actual real-life experience. He has since spoken at several
events, including performing in a live Cyber Virtual 3D summit on the
topic of Cyber Crime. He is well sought after based on his case
experience and success in the real world, and ability to reverse trace
IP addresses and intelligence aiding in the unique area of investigation
involving verification of online identification. He is also speaking at the CeBIT Conference in 2018 and in the process of writing a book and proper high level training materials.
He has solved cyberattacks for billion dollar funded companies. His clients love his real experience
Simon has a unique gift to identify the root cause of the problem and develop a strategy to break through the opposition. He is very thorough and skilful in his approach, willing to alter the strategy as the need arises until he reaches a favourable outcome - It is obvious that Simon has obtained many skills in a variety of different areas that have given him the resources and the application to get the desired results for us the client. - Simon is extremely
thorough, straight to the point and passionate to see all all his clients free from injustice. While being very considerate of people's needs to reach a speedy and powerful outcome. Family law stalking matter 2016-10
Simon was extremely
Intuitive and flexible. Simon's experience means that he can predict possible and real roadblocks and henceforth opportunes Plan B's. - When you add to his skill set his ability to speak with clients in such a way as to put them at ease prior to, during and after his investigations, it shows an added ability of assuredness, confidence, patience,
flexibility, intuition that underpin Simon's professionalism and skill set. I would most definitely recommend him to anyone for what he uncovered for us. I was blown away at how quickly Simon was able to bring resolution to our case - he was available at all hours of the day and night which with the time
distance between my state and his made it possible to 'catch-up' at times suitable to me. Warwick & Liz - 7 in 1 landmark stalking case 2015-06 - Find more on the Reviews site.
Simon is a Real Cyber CSI
Simon has also been asked by International police for assistance in teaching his social engineering methods, presented at virtual summits and been asked to speak at
prestigious well known events. Simon also updates a case blog to give people an understanding of real life cases and furthermore, keeps everybody in touch with the eVestigator® Media Site. This site is updated regularly and articles will shortly be attached from the site just mentioned. If you want the job done properly, choose the expert - there is no such thing as a Cybersecurity
practitioner that is not a Licensed Investigator, Mediator, Certified Expert Witness with a full series of years in all IT, IT Security, Business at C-Level, People, Process and Project Management Skills, as well as knowledge and experience in Cybercrime, evidence preservation and Criminology, the understanding of the criminal mind which is almost impossible to achieve in less than twenty years. There is only one success - there is no point doing 1/8th of the job whilst your company is under crisis and losing hundreds of thousands of dollars, if not millions ever week. Contact Simon for a free review of your case.
Global Information Security Officer
Simon
Smith is the Global Security Information Officer and head of R&D, in
charge securing the new Cyber Smart world. He has been labeled by
SecurityNow's Ken Hess as perhaps the "World's Best Investigator". He is
a proud member of the Association of Certified Fraud Examiners,
Victorian Society for Computers and the Law, IASA - An Association for
all IT Architects, Institute of Electrical and Electronics Engineers (IEEE) and
the Australian Information Security Association. He is known as the "Programmer's Programmer" - making API's for other programmer's, writing very easy to use, robust, source code at low level, ensuring it is error free for enterprise applications. He is an experienced Cybersecurity/Cybercrime frontline Crisis Mitigator and Offensive and Defensive first responder.
Simon utilises many complementary skills he has attained over his 21 years of industry experience in his capacity
more so in R&D and as a Forensic Investigative
Expert and master Software Engineer. He also provides
Expert Witness Services, Cybersecurity training, Frontline Crisis
Response, Mediation, Dispute Resolution, Conciliation and Digital Forensics Services. He is known for his strategic skills solving complex High-tech cases. He has also been asked to assist international Police Forces.
Cybercrime is the major component of Cybersecurity
To begin with, he is a natural born innovator, programming expert, sound Investigator, Certified by AXELOS in ITIL® and Prince2® Practitioner;, Qualified in 4 Cryptocurrency Certifications (CBP®, CBE®, CEE®, CBD®) a Certified Fraud Examiner (CFE®),
Certified Chief Information Security Officer (CCISO®), ITIL®, Computer Hacking Forensic Investigator CHFI®, Certified Ethical Hacker CEH®, Certified Network Defence Architect CNDA® MCSD®, MCSE®, MCSA®, MCP® and a Certified Professional Scrum Master®. He uses instinct, education, experience and logic - a Cybercrime expert with practical and theoretical experience in finding cyber criminals behind fake accounts. Cybercrime has evolved from just being a computer crime. The use of a computer being used in an offence, or the target of an offence is now
inclusive. Computer crime has been acknowledged for decades, and it is astonishing to see various Government's act surprised when events occur. An offence committed against a natural person or multiple people with an intention to cause physical or mental harm to the
victims), or a loss, or or loss, in the commission of an offence by way of
misusing a carriage service to cause harm, menace or commit an offence, being any network, like the
internet, phone network, radio waves to effect 'harm' on another person.
Cybercrime has multiple victims. It could be motivated by hate, race, politics, jealousy, or
competitive advantage. Of recent times, infrastructure, utilities and financial health services have been targeted. Ransomware, hacking, trademark and copyright infringement, employee extortion, computer surveillance, sexting, child porn, grooming has been apparent in cases that have come by eVestigator®. Privacy data leaks of personal information cause major concern and cannot be blamed on hackers as they have no talent, yet spawn off the mistake of others. Cybercrime is inherent in politics, especially in recent elections with widespread allegations. Government and non-state actors are suspected to have engaged in cybercrimes, including cyber-espionage, and data theft. A new war has therefore been created known as 'cyberwarfare'. Mr. Smith was invited to review a book on
Cyber terrorism and Cyber warfare by Daniel Wagner, which was a good read. Further, he has had great success in cracking cases relating to online defamation, cyberstalking, cyberbullying, white collar fraud, dark web cases, AML/CTF money laundering crimes, High-Tech Investigations, Criminology, Dark Web, Blockchain, Cryptography, Cryptocurrency, Blockchain, and any kind of Programming, and is an
innovator of Automated Intelligence/CRM/GEO-IP/IoT and enterprise training software. When not in R&D, he may consult in Cybersecurity, Expert
Evidence Services, Forensic Investigations & more. He holds over 12 Post Graduate
Qualifications, and has great 'EXPERIENCE'.
Certifications, Accredited Qualifications, Associations and Affiliations
Industry, Department of Homeland Security Recognised Certifications & more:
CFE® ACFE™ Certified Fraud Examiner (CFE®)
CITP® Certified Information Technology Professional (CITP®)
CCISO® Certified Chief Information Security Officer (CCISO®)
CHFI® Computer Hacking Forensic Investigator (CHFI®)v9
CEH® Certified Ethical Hacker (CEH®)v10
CPT® Certified Penetration Tester (CPT®)
CNDA® Certified Network Defence Architect (CNDA®)
CII® Covert Internet Investigator/CEM and social engineering expert
OSFTC® OsForensics Triage Certification Courts
ACE® Palo Alto Accredited Configuration Engineer (ACE)
Certified Access Management Specialist (CAMS®)
MCP® Microsoft Certified Professional™ (in the current leading MCSD® stream)
MCSA® Microsoft Certified Solutions Architect™ (Universal Windows Platform)
MCSD® Microsoft Certified Solutions Developer™ (App Builder MCSD®)
MCSE® Microsoft Certified Solutions Expert™ (Mobility)
MCSE® Microsoft Certified Solutions Expert™ (Analytics)
MPM® Master Project Manager™ (AAPM)
CCSE® CheckPoint Certified Security
Expert (CCSE®)
CCSM® CheckPoint Certified Security
Master (CCSM®)
GAIQ® Google Analytics Individual Qualification
MTA® Microsoft Technology Associate™ (Software Development®)
W3Schools® Certified JavaScript Developer - with Excellence Grade (W3CJD™)
dCAA® Digium Certified Asterisk Administrator
MIE® Microsoft Innovative Educator™
PSM® SCRUM.ORG Professional Scrum Master
ISO 27001 - Lead Auditor (ISMS)
Axelos ITIL® 2017 Current Certification - (ITIL®)
Axelos Prince2® Practitioner Certification
IBM Blockchain Essentials Certification
IBM Blockchain Developer Certification
IBM Cloud App Developer Certification
IBM Watson - Discover your inner Chat-bot Certification
Certified Ethereum Expert™ - Blockchain Council™ (CEE®)
Certified Blockchain Developer™ - Blockchain Council™ (CBD®)
Certified Blockchain Expert™ - Blockchain Council™ (CBE®)
Certified Bitcoin Professional™ - Crytocurrency Certification Consortium C4™ (CBP®)
Certified Blockchain Professional (C|BP®) - IIB, a division of EC-Council®
Charles Sturt University, IT Masters, Computer Forensics
Newcastle University, Certificate in Cybersecurity
Certified Cyber Threat Analyst (CCTA)
Certified Expert in Cyber Investigations (CECI)
Certified Forensic Hi-Tech Investigator (CFHI)
Certified Professional Criminal Investigator (CPCI)
Certified Social Media Intelligence Expert (CSMIE)
Certified e-Commerce Fraud Investigator (CEFI)
Certified Workplace Violence and Threat Specialist (WVTS)
Microsoft, Security for the Chief Security Officer Certificate
Microsoft, Security for IT Pro's Certificate
Certified Microsoft Innovative Educator (CMIE)
Criminology and Profiling Certification Accredited by ICOES
Forensic Science Certification Accredited by ICOES
Expert Witness Training Certificate (as taught by Hugh Selby)
Google Analytics Individual
Qualification (GAIQ®)
Certified Six Sigma Black Belt (CSSBB™)
Bail Justice Training Course Certificate (2009 - Vic Uni)
Nationally Accredited Mediator Certificate (NMAS)
Family Dispute Resolution Practitioner & Graduate Diploma (Commonwealth)
Nationally
Accredited Qualifications
Post Graduate Diploma of Management
Post Graduate Diploma of Strategic Leadership
Post Graduate Diploma of Portfolio Management
Post Graduate Diploma of Family Dispute Resolution
Post Graduate Certificate in Information Technology & Strategic Management
Post Graduate Certificate in Information Technology & Sustainability
Post Graduate Certificate in Digital Education
Post Graduate Certificate in Telecommunications
Post Graduate Certificate in Management
Post Graduate Certificate in Leadership Diversity
Advanced Diploma of Integrated Risk Management
Advanced Diploma of Cyber Security (AQF L6 - and Trainer / Assessor)
Advanced Diploma of Program Management
Advanced Diploma of Leadership and Management
Advanced Diploma of Management
Advanced Diploma of Management (Human Resources)
Advanced Diploma of Marketing
Diploma of Project Management
Diploma of Quality Auditing (Lead Auditor)
Diploma of Security & Risk Management
Diploma of Counselling
Diploma of Human Resources Management
Diploma of Business Administration
Diploma of Business
Diploma of Management
Diploma of Training, Design & Development
Diploma of Vocational Education & Training
Certificate IV in Government (Investigations)
Certificate IV in Security & Risk Management
Certificate IV in Mediation
Certificate IV in Training & Assessment (TAE40116)
Certificate IV in Celebrancy
Certificate IV in Cyber Security
Certificate IV in Business Administration
Certificate IV in Frontline Management
Certificate IV in Marriage Celebrancy
Certificate III Investigative Services (Licensed Rqmt)
Memberships and
Appointments
Honorary Board Member of IIB Council Advisory Board (EC-Council®)
Member of the High Technology Crime Investigation Association - HTCIA®
Hon. Global & Presidential Board & Advisory Council role for the AAPM®
EthiXBase Certified Member of the Ethical Alliance
Association of Certified Fraud Examiners (ACFE)
Cryptocurrency Certification Consortium (C4)
Victoria Society for Computers and Law (VSCL)
Certified Access Management Specialist Member (CAMS®)
Microsoft® Innovative
Educator (MIE®)
Microsoft Partner Network (MPN™) and OSP®
Institute of Electrical and Electronics Engineers (IEEE)
Australian Information Security Association (AISA)
International Association of Software Architects (IASA)
NMAS Accredited Mediator
Cth. Appointed FDRP & Assessor of GradDip FDR
Australian and New Zealand Society of Criminology (ANZSOC)
OVER 500+ CASES SOLVED
AUSTRALIA'S #1
INDEPENDENT REAL CYBERCRIME EXPERT WITNESSS
eVestigator looks after his clients and request peer review regularly. Here are just a few reviews.
Testimonial: International social media Cyberscamming case - Multiple 8yr+ Scammer $30m+
Details: "Simon, thank you very much for helping my case. I am glad that I found you by chance. I am very impressed with your great work. Your impeccable knowledge of programming and technology found so many shocking facts which made me realise that I've got involved with an international social scam for the first time in my life. The facts you found blew my mind away indeed. Thank you for your genuine care. You called me straight away after I sent you a message the other day. You gave me clear suggestions for my problem. I was really upset and did not know how to handle the situation I have. I reported ACORN twice however I had not received any response from them. I did the third report with very specific information which I got from Mr. Smith, they finally contacted me and they are working on my case now. I highly recommend Mr. Smith to anyone who requires his services. Please do not hesitate to contact him. He will give you a great job with integrity and justice. You will get the result you need very quickly."
Testimonial: Jeremy Steinman - Cyber technology colleague
Details: "Well you Sir are the first honest, genuine INTELLECTUAL, that I have now had the distinct pleasure of meeting. In a world of flippant 10 second empty vines and mindless meme's it's refreshing to meet actual thinkers. I look forward to learning more about your thoughts on the direction things are moving towards and possible further collaboration. Thank you again for the sentiments. Highest [surprisingly the 1st time I've actually had a reason to mean it] Regards, Jeremy Steinman"
Testimonial: Joshua Harr - Cyber-security colleague
Details: "Mr. Smith, You do not know me, but I'm a big fan of your work and passion ever since starting to follow you on LinkedIn. After this article, I'm an even bigger fan. I have been in cyber security for about a year now and have grown to know that we are a select few. I don't have experience in cyber security like you have (nowhere close, to be honest), but I do have a lot of experience in the realm of encouragement. Your expertise has motivated me to be more technical than I am. And I will continue to learn from your articles and experience. I thank you for your work and dedication. The one thing you've heard before, I am sure of, is that there is two types of businesses in the world: those who've been hacked and know it and those who have been hacked and don't. These CEO's you discussed and experienced are the latter, I'm sure. Thanks again, Mr. Smith. --Joshua Harr"
Testimonial: Serious Cyberstalking case
Details: "Please know how grateful I am that you have gone to such effort to help me with this. I think it's disgusting that it takes so much work to get someone to stop breaking the law and harassing someone but I am glad you are one person who fights against it."
Testimonial: Parent of a predatorial cyberstalker that needed intervention
Details: "Good Morning Mr Simon Smith,
I am writing to you today to thank you sincerely from the bottom of my heart..
As the father of this beautiful & innocent daughter of mine *J*, being concerned is an absolute understatement so knowing that there are wonderful people like yourself being.
Informed of this criminal & lewd act I commend your good self on you stance for
Justice & protection of those who are obviously extremely vulnerable.
It never ceases to amaze me the extremes & persistence of these cyber bullies
who as you have rightly pointed out have nothing better to do.
Hopefully this menace to society will heed your warning & will in fact cease & desist.
Again Simon I cannot emphasis enough how very grateful I am for your sincere & noble
stand on the vulnerable as you are obviously an advocate of the people who should,
but does not get enough recognition for the tireless & critical work that you do on a constant basis.
My heartiest of appreciation go out to you unconditionally.
Please Simon call me anytime!"