12802
256mphoto

eVestigator Simon Smith – Cyber Forensic IT & Expert Witness Services

Added by evestigator

0 reviews

Listed in Accounting, Advertising, Appraisal, Banking, Bankruptcy, Business, Economics and Accounting, Computer Forensics, Computers, Consumer Surveys, Copy Services, Corporate Governance, Credit Damage, Criminal Justice, Disability Evaluation, Dispute Resolution, Education, Electronics, Employment & Labor Economics, Finance, Fingerprints, Fraud, Handwriting Analysis, Human Factors, Industry, Information Technology, Insurance, Intellectual Property, Investigation, Legal Support Services, Mobile Device Analysis, Photo Analysis, Police Practices & Procedures, Risk Management, Safety, Safety and Liability, Security, Social Sciences and Humanities, Software Engineering, Statistics, Structural Engineering, Structured Settlements, Support Services, Telecommunications, Video Analysis

Company Name: eVestigator Simon Smith - Cyber Forensic IT & Expert Witness Services
Blog Address: http://www.cyberblog.com.au
Education and Credentials:
Since I was just an 11yr boy I have been programming in almost every language on every platform available. My brothers played games, I made them! Aside from the 25+ years of HANDS ON major computer programming and cyber security experience, I developed many applications. From web servers, mail servers, my own protocols, all low level, design - pixel by pixel, code line by line, nothing like the 'wizard' and 'open source' attempts of lazy coder attempts today. At 19, whilst employed as an Analyst Programmer and working on integration with a VERY WELL KNOWN commercial accounting package for our CRM software, I found a major security flaw in the raw binary of their database exposing credit card numbers, that's where my interest for cyber security investigative 'programming' developed. Having already becoming a growing expert my commercial experience was like facing a truck head on. As at the same time, after VCE I was in the top 3% in Australia in my VCE (Common Assessment Tasks) for Information Systems and Technology (4 A+++), then after a short stint flying through High Distinctions at first year Uni, I was hand picked and employed immediately to work for real projects as an Analyst Programmer, then Senior Analyst Programmer, and later became a CEO, Assessor, CIO and CSIO, PI, and CHFI and Forensic Investigator/Expert Witness. In those earlier days in addition to working as an Analyst Programmer I was in demand by Swinburne University as one of the very few who could teach the all new .NET advanced programming suite sessionally and did so for a period of about 4 years after hours. I shortly opened my own international businesses in the Voice Analysis/VOIP medico-legal industries. I programmed handheld devices, multi-million dollar corporate software and systems widely used by physicians overseas to dictate via Windows CE Pocket PC's (way before the iPhone and Android existed) that interacted with custom typist equipment for dictation and transcription.

Since then I built some of Australia's largest IT companies and educational institutes and gained recognition of my expertise both before, during and after my practical experience - calling from the golden principles of expertise from what you cannot learn at school - but what was embedded in me since 11 years old - first programming on an Amstrad CPC 464 64kb tape deck machine. I have seen the entire life cycle of today's computer systems file systems and further, from the perspective of the consumer birth of the internet and have shared this knowledge and lead teams of up to 50 people, developed major commercial applications, built 2 of Australia's largest training institutes, a Computer Implemented Software Patent, and am considered a master in programming principles and reverse ethical hacking. From understanding the roots of programming, something that is not taught these days, I understand client needs, and can understand the full dynamics of source code layers (as they have evolved), enabling me to have an investigative advantage in any matter relating to computer crime or computer related fraud.

I am especially useful in white collar crimes, cyber stalking, cyber harassment, and reverse IP tracing. Much of the API programming tools I have created over the years are used by millions of people all over the world by 'other programmers' as software plug-ins for Microsoft (IE/Spartan/Edge/Surface Pro/Windows Phone), Apple (iPhone/iPad/iTunes), VLC, RealOne, and other major vendors. I have always been the programmer for programmers. I have been asked to give expert opinion in cases involving IP theft and high-tech crime requiring analysis code line by line and contracts involving disputes over source code theft and disputes, and I that is one of the reasons why I can attain forensic data that many cannot when it comes to situations where most people give up when they cannot get an IP address on a silver platter. I have succeeded in many cases, because there are many more ways to locate a person who wishes to remain anonymous who is damaging a reputation or company.

ITU (CHFI) Computer Hacking Forensic Investigator (Interntationally Accredited) - US Dept. Education Accreditation
WASC Accredited: WASC accreditation also places ITU among the recognized list of institutions on the U.S. Department of Education's database of recognized institutions of higher learning and the Council for Higher Education Accreditation's Listing of Accredited and Candidate Institutions (CHEA). ITU is also recognized as an approved institution by California's Bureau of Private Postsecondary Education (BPPE). Subjects: Computer Forensics Introduction, Forensics Investigation Process, Searching and Seizing, Digital Evidence, First Responder Procedures, Forensics Lab, Hard Disks and File Systems, Windows Forensics, Data Acquisition and Duplication, Recovering Deleted Files and Partitions, Using Access Data FTK, Using EnCase, Steganography, Password Crackers, Log Correlation, Network Forensics, Wireless Attacks, Web Attacks, Email Crimes, Mobile Investigation, Investigative Reports, Expert Witness

UNSW Global Pty. Ltd - Expert Witness Training Certificate
Mr. Hugh Selby is an expert Barrister who also specialises for Unisearch at UNSW Global Pty. Ltd, interstate and overseas as an Expert (Expert Witness Trainer)! Hugh Selby is a very experienced Barrister and co-author of the multi-volume and online publication "Expert Evidence". Hugh teaches "courtcraft", both in Australia and overseas, to prosecutors and advocates, police and experts across many disciplines. His publications range across trial and appellate advocacy, coronial practice, civil pleadings, policing, former Justice Kirby, and industrial law.

Master of Information Management
Master of Computer Forensics
Master of Cyber Security
Graduate Certificate in Digital Education
Graduate Diploma in Management (Learning)
Graduate Diploma of Strategic Leadership
Graduate Diploma of Family Dispute Resolution (Commonwealth Appointed FDRP)
Diploma of Security and Risk Management (Cyber Security Analyst)
Certificate III in Investigative Services (Simon Smith is a Licensed Private Investigator)
Diploma in Information Technology (Management) - Advanced Level Programming, Systems, Databases, Security, Machine Code, Viruses, Risk Mitigation
Advanced Diploma of Program Management
Advanced Diploma of Project Management
Certificate IV in Government Investigations (Government Investigator)
Certificate IV in Security and Risk Management (VIC PI Electives)
Victoria University Bail Justice Training Course Certificate 2009
SANS Cyber Aces Certification
PD: Hacking Academy: Monitoring Transmitted Data
IT Security Academy (Associates IT Security Professionals. Certified experts (MCSE:MS, CISSP, CEH) have created courses from Beginner to Advanced level. They provide high quality materials to prepare you not only for passing certification exams, but teach you practical skills.) & The Hacking School (The Hacking School courses are prepared by people who are professionals in what they do. Authors of their courses are well known in the world of computer systems' security. They provide up-to-date knowledge on IT security and ethical hacking.)
Author of VET Accredited Course Material 'Dealing with Grief and Trauma'
Advanced Diploma of Network Security
Advanced Diploma of Computer Systems Technology
Advanced Diploma of Network Security
Graduate Diploma of Telecommunications and Strategic Management
Graduate Certificate in Information Technology Sustainability
Certificate IV in Intelligence Operations
Graduate Certificate in Information Technology and Strategic Management (Expert Programmer/IT industry)
Graduate Diploma of Anti-Money Laundering and Counter Terrorism Financing
Diploma of Government (Fraud Control)
Diploma of Government (Security)
Certificate IV in Programming
PD: Social Media for Business
Diploma of Information Technology
Diploma of Digital Media Technologies
Diploma of Government (Investigation)
Certificate IV in Government (Security)
Graduate Certificate in International Education Services
Graduate Certificate in Statutory Child Protection
Graduate Diploma of Relationship Counselling
Certificate IV in Mediation (Also a Nationally Accredited Mediator - LEADR Member)
Diploma of Government (Workplace Relations)
Certificate IV in Web-Based Technologies
Certificate III in Intelligence Operations
Graduate Certificate in Career Development Practice
Graduate Diploma of Adult Language, Literacy and Numeracy Leadership
Advanced Diploma of Network Security
Diploma of Leadership and Management
Comply with organisational requirements for protection and use of intellectual property
Contribute to intellectual property management
Develop and implement strategies for intellectual property management
Manage intellectual property to protect and grow business
Graduate Certificate in Management (Learning)
PD: Cyberbullying - as taught by Andres Saravia
Diploma of Counselling
PD: CCNA Security 2015 Video Boot Camp: CCP and More
PD: Investigator Ethics for the PI, Consumer and Client
Advanced Diploma of Leadership and Management
PD: Maintaining Cyber Security
Certified iOS (Apple), Android (Google), Amazon, Windows and Mac App Developer
PD: BrainBenchâ„¢ Certificate in 'Amazon Web Services (AWS)'
(A private research university in Stanford, California, and one of the world's most prestigious institutions, with the top position in numerous rankings and measures in the United States.)
Certified Android, iOS, Amazon Device App/Play-Store Developer
Andres Saravia (Andres earned a Doctorate (Ph.D.) in Philosophy of Law, Data Protection mention at the University of Zaragoza, Spain with Magna Cum Laude. He has also completed the Course on Personal Data Protection by AECID and Communication Science Foundation and the Graduate Course of the School of Graduate Studies, Faculty of Law on "Updates of Information Law" Module I. Uruguay. Andres has specialized in Germany, Chile and Spain, in the areas of e-Government and Data Protection latter including in computer and cyberbullying crimes. He is a Fellow of the Institute of Information Law Uruguay).
Professor Robert Bunge (An information security educator for the past eight years. He is an active coach and organizer in the Cybersecurity Competition Federation, Collegiate Cyber Defense Competition, National Cyber League, and CyberPatriot.) & DeVry University ( a regionally accredited institution.) Rosa Augostino (An author, consultant and entrepreneur she has written extensively about the subjects of marketing and business-building. Her background includes advertising, marketing, business growth and customer growth.)
PD: Introduction to Artificial Intelligence
Jeffrey Lau (A data engineer who constructs operational reporting, dashboards, and other visualizations. He has experience with object oriented programming, scripting automation, digital VLSI, and infrastructure performance management. He has a B.S. Electrical Engineering.)
Advanced Diploma of Management
Dean A. Beers, CLI, CCDI (Dean began his investigative career in 1987. He is a Certified Legal Investigator and Certified Criminal Defense Investigator, and expert consultant / witness in criminal defense homicide and civil equivocal death investigations. He is certified in Medico legal Death Investigations and is a POST certified instructor, and experienced forensic autopsy assistant.) & Karen S. Beers, BSW, CCDI (Karen began her investigative career in 1996, also earning her Bachelor's in Social Work (Magna Cum Laude). She is also a Certified Criminal Defense Investigator (CCDI) and certified in Medico legal Death Investigations.)
PD: IP Addressing and Sub-netting
Sikandar Shaik, CCIE (RS/SP# 35012) (A senior technical instructor and network consultant. He has been training networking courses for more than 10 years. Sikandar Shaik has delivered instructor led trainings in several states in India as well as in abroad in countries like China, Kenya and UAE. He has also worked as a Freelance Cisco Certified Instructor globally for Corporate Major Clients.)
Advanced Diploma of Management
Diploma of Quality Auditing
PD: Cyber Criminals Want Your Information: Stop Them Cold
(Jeremy O'Connell ... He holds some industry certifications via CompTIA (A+, Net+, iNet+) and received training from Oracle University's OCP DBA program.)
PD: Ethical Hacking and Penetration Testing
(Jerry Banfield (Jerry has a Masters degree from the University of South Florida and is certified as a state law enforcement officer in South Carolina. He also has a Bachelors degree earned from the University of South Carolina. He teaches 38 courses on Udemy.) & Ermin Kreponic (Ermin is an IT expert, Linux enthusiast with a passion for troubleshooting network related problems. Advanced knowledge of Linux command line. Installation, configuration and maintenance of servers that run under Unix/Linux type. operating systems: DNS, TFTP, FTP, SSH, APACHE, SMTP, VSFTP and some others.)
Certified Apple Watch App-Store Developer
PD: Trademark Law for Entrepreneurs
Dana Robinson (A founding partner of TechLaw, LLP, where his practice focuses on trademark prosecution, trademark licensing, copyrights, and business transactions. Dana is adjunct professor of law at the University of San Diego School of law, where he is involved in the law school's new IP Law Clinic. Dana has taught a variety of seminars and moderated panels on intellectual property and technology law since 1999. Dana received his bachelor's degree from Life Pacific College and went to earn an M.A. at Azusa Pacific University and his J.D., from the University of San Diego School of Law. He served as Editor-in-Chief of the law school's faculty journal, the Journal of Contemporary Legal Issues. He is admitted to practice in Nevada and California, and before the Federal District Courts for the Central District of California, the Southern District of California, and the District of Nevada. Dana was the Co-chair of the first Nevada State Bar Committee on Intellectual Property (2002-2003). He is a member of the IP law section of the State Bar of California, and is a member of the San Diego Intellectual Property Law Association. Dana has spent 20 years as an active entrepreneur and investor and continues to advise his portfolio investments.)
PD: Authenticity on Twitter
Rebecca Clark (Training & Development professional anxious to nudge students in the areas of program management, entrepreneurship, accountability, and in pursuing their life goals.)
Diploma of Training Design and Development
Certificate IV in Training & Assessment
PD: Innovation and Technology in Accounting
PD: The Bitcoin Basics
PD: Draper University/Udemy platform (Silicon Valley's top entrepreneurship program for builders and innovators from around the world. Cutting-edge, hands on curriculum taught by the most successful entrepreneurs in the Valley. Learn how to launch a business in this unique start-up boot camp for entrepreneurs.)
Advanced Diploma of Marketing
PD: Mastering iPhone programming - Lite
EDUmobile Academy (Founder Vishal Lamba has a mathematics and computer science degree. Vishal works closely with content creators and teachers to ensure that every course released meets the internal rigorous quality standards.)
PD: Mastering Android programming - Lite
EDUmobile Academy (Founder Vishal Lamba has a mathematics and computer science degree. Vishal works closely with content creators and teachers to ensure that every course released meets the internal rigorous quality standards.)
PD: Social Entrepreneurship: An Introduction
Greg Werkheiser (Greg is a Social Entrepreneur, Leadership Educator and Attorney with over 20 years experience. He has held public service roles at the White House, U.S. Embassy in Paris, U.S. Information Agency, and Congressional Management Foundation.) & David J. Miller (David is the Director of Entrepreneurship at the Mason Center for Social Entrepreneurship (MCSE). Miller is also a supporting faculty member at George Mason University's School of Management (SOM) teaching New Venture Creation and a PhD Candidate at Mason's School of Public Policy working with Dr. Zoltan J. Acs. Miller holds an MBA from the University of Chicago's Booth School of Business (Entrepreneurship, Finance, & Strategic Management), an MSc in the International Politics of Asia from the University of London's School of Oriental and African Studies and a BA in International Relations from the University of Michigan.)
PD: Decoding AP Computer Science A
Moksh Jawa (Though just a sophomore at Washington High School in Fremont, CA. He self-studied for and performed well on the AP Computer Science test as a freshman. He teaches AP Computer Science to students at his high school.)
PD: Professional Communication Essentials
Rasmussen College/Udemy platform (A regionally accredited private college and Public Benefit Corporation that is dedicated to changing lives through high-demand educational programs and public service.) & Brooks Doherty (Brooks is Rasmussen College's Dean of General Education. He is completing a doctorate in Education at St. Mary's University, earned an MA in literature from University College London, and graduated Phi Beta Kappa from the University of Minnesota with degrees in Political Science and English.)
Diploma of Project Management
Advanced Diploma of Management (Human Resources)
Diploma of Practice Management
Diploma of Vocational Education and Training
Diploma of Training, Design & Development
Diploma of Business
Advanced Diploma of Business
Diploma of Management
Diploma of Human Resources Management
Certificate IV in Marriage Celebrancy
Certificate IV in Small Business Management
Diploma of Business Administration
Certificate IV in Business Administration
Certificate III in Business Administration (Medical)
Certificate IV in Frontline Management
Diploma of Counselling
PD: Financial Analysis: A Recipe for Success
Professor and CPA Ellen Jakovich (Has experience in IT, communications, finance, electronic engineering, project management, and accounting. Holds a Bachelor's in Electronic Engineering Technology, a Master of Science in Finance and a Masters of Accounting & Financial Management.) & DeVry University
Certificate IV in Human Resources
Diploma of Training and Assessment
Project Management For Entrepreneurs: 10X Results Today Rico Rodriguez (Entrepreneur, Python Expert, Word and Windows Trainer. He has started numerous businesses and both failed and exceeded. He uses Python and JavaScript and C# in daily life to both make a living and to gather data online. He also helps small businesses streamline their business to reduce cost and increase productivity.)
Diploma of Community Services Coordination
Diploma of Disability
Certificate IV in Disability
Certificate III in Disability
Vocational Education and Training in Schools Certificate in Information Technology
Specialties:
Australian Simon Smith - aka eVestigator has over 20 years experience as a Master Computer Programmer and
University lecturer in multiple languages, is certified as a CHFI (Computer Hacking Forensic Investigator), Licensed Private Investigator and Expert Witness, and is a Computer Forensics Expert. He provides cyber-legal investigations and expert reports. He is also an App-Store Developer and trainer of programmers. He has appeared on Channel 7 & Channel 9 on Cyber-bullying, Cyber-crime, Cyber-stalking and is expert in Loss Adjustment, Mitigation, High-Tech Crime, IP theft, Packet Sniffing, RFID, WiFi, Hacking, and Social Media abuse.

He offers fast and cost effective services and has solved many domestic and international SCAMS. He specialises in Cyber-Stalking, High-Tech Cyber-Legal, Family, Insurance, Corporate Fraud and Custody cases. He invented a computer patent and trained Barristers and Psychologists in Family Dispute Resolution. He holds several Post-graduate Qualifications from IT, Security, Investigative and Counter-Terrorism tactics & more. He is considered a master in his field, and is Australia's most elite Computer Expert Forensics Investigator & Expert Witness in any Court.
Experience:
Skill, Experience & Speed equals low cost service! The higher the Skill, Experience and Speed, the lower the cost. That is what our customers have found out, sadly often too late. My main experience comes from 25 years of the majority of my child, teen and adult life consisting of extensive Commercial Computer Programming and interest in innovation and creation.

It all started when I was 11 years old initially programming from a tape deck green screen AMSTRAD CPC464, growing up programming continuously before the birth of the consumer Internet, then programming throughout high school during the birth of the consumer internet with every main language that existed, designing my own mail and internet servers, continuing to this day with knowledge of all frameworks including now as an App Store accredited mobile developer to patentee and Master Programmer (from ground up - not like the template ones they teach today).

When I was 19, I was literally handpicked and employed as an Analyst Programmer and taken straight out of year 1 University and offered a full time job as an Analyst Programmer leading to a Senior Analyst Programmer position after being recognised as one of a small group of 3% of Australians who received Quadruple A++ in Information Systems and Processing and Management CATs.

In that role the mix between my IT expertise and investigative expertise began to show. I was investigating the binary of a QuickBooks QIF file one day for a corporate client and came across a RAW credit card number. I immediately called QuickBooks who took no interest. Since then I have worked at multiple workplaces and created from ground up several multimillion dollar enterprises all in relation to IP, web, cyber security, reporting, educational, project management, corporate application, mobile, data and voice analysis applications and enterprises from scratch.

When I say from scratch, I fundamentally mean from scratch. There is an article I wrote about 'template' programmers you might find interesting on this site. Computer forensics begin with the necessity of being computer programming master. Gone of the days where people say, "I have this Company certificate from this famous networking firm who happen to develop a widely used product. Developers make products - from scratch, and makers of products are able to understand the engineering underneath.

A true expert computer programmer holds the skills and abilities of every other IT discipline, because through the Software Development Life Cycle (SDLC) they have had to conduct the equivalent work and ensure that ultimately their software works with Database X on Server Y or Conditions Z. In the past, I have used my programming abilities within investigations and forensics 'on the job'.

If I need the job done, I programmed it myself. A true computer forensics expert is no expert unless they understand the raw essentials of the inner operations of programming from machine code to today's language layers - that way you understand the vulnerabilities from the lowest end. That is what you call a real computer forensics expert. I have often resulted back to source code to help solve cases. I do not rely on other people's tools.

The fundamental learning comes from knowing the very backbone of computer programming, its history, (over 25 years- the birth of the consumer internet) its protocols from start to end, its languages from "IMM R0, 0x80" to what they call programming today and beyond. Take a look at the periodic elements of programming languages. I found this interesting. At this point, I knew that I was more than a master programmer from knowing the complete roots of programming (now at 21 teaching advanced computer programming sessionally), having an advantage over everyone as I don't rely on software, even in investigations, I invent it.

I am considered an expert in my field by way of experience and recognition of that experience, complimented by many side fields, especially catching cyber stalkers, succeeding in family intervention and relationship battles and my nationally accredited mediator status and it shows in the cases I succeed in. I have solved multimillion dollar fraud SCAM’s (including the fake Microsoft tech-support SCAM and fake ATO telephone SCAM), resolved reverse cyber-stalking cases, family law cases, plenty of IP tracing and identity theft cases, and corporate crime and insurance fraud cases.

I also work and train as a Cth. FDRP (Professional Family Court Mediator), and have trained many Barristers at law to become Family Dispute Resolution Practitioners' appointed now by the Commonwealth. I am a Nationally Accredited Mediator (NAM) and hold a Certificate of Bail Justice from Victoria University. I am considered a Master in Digital Computer Forensics and Online Education and have developed patents in the subject matter. I have appeared on Today Tonight (7), the Today Show (9) and other media and to the courts as a Cyber Forensic Expert/Witness.

I am independent and will act for and/or against the police/government or body corporate without fear or favour as my duty is to the law and the courts. I have succeeded in every case I have taken on. I have had parties including government department, police prosecutors, and civil litigators withdraw once knowing I have the evidence to stand up against them.
Years in Practice: 7
Number of Times Deposed/Testified in Last 4 Yrs: 20
Contact Listing Owner

Contact the Listing Owner

To inquire about this listing, complete the form below to send a message to the listing owner.


This is only a very early stage layout of some successes. There has been many more over the years and many more happening almost daily. They tend to now appear either anonymously or via way of comment, updated regularly as time permits in both the blog or evident in the numerous testimonials. Please make sure you check them out. I love my job – the best way to show competence is with fact, so here is just a sample of de-identified cases Simon Smith, Australia’s very own eVestigator has been involved in. I found the IP identity of the fake Microsoft Tech Support Scammer (or one of them – and gave it to ACORN).

Now this was interesting. More than 90% of my clients come to me frustrated after not having any luck with the police or ability to make a statement. This one particular client (a very smart man) received a call one day and being the trusting person he is, he was strongly led to believe his computer was infected with a virus and Microsoft have detected it and are calling him to fix the problem. Everyone has different thresholds and trust levels but I can understand how an older gentleman would believe this could be the case. To cut a long story short the person with an Indian accent got him to install remote control software on his machine, allowing the ‘hacker’ to install malware, giving full access to his computer when connected and online at anytime. Plus, he thought he would throw in a low level password and bribe the gentleman to pay money in order for Microsoft to remove the password from his computer. The gentleman spent $1500 (it could have been more) to this ‘entity’ and nothing happened. They still however said they needed more money. The gentleman then reported the crime to the police who did not take a statement despite it being a crime under the Crimes Act 1958, and sent him to ACORN.

ACORN (people believe) is a division of the police force to report and act on cyber-crime. The gentleman swiftly received notification from ACORN with a fact sheet and some general advice and said nothing could be done. This is when I got involved. When he presented his laptop to me I was able to take off the important data and remove the entire malware/virus, and even further since they were still trying to get money out of him, I decided to locate them. Via proprietary techniques, I attained the criminals IP Address, IP, Mobile device make, firmware which was in India. As it turns out, ACORN ended up making a complaint about me for not telling them what I found out – saying I had a duty to report it. I did tell my client to report it but must admit was taken back from that approach and was insulted.

Nevertheless I got over it, and sent ACORN the identifying details so they ‘might’ take action. What happened to Interpol? The police have always had the ability to report international crimes. I have seen letters from customers where ACORN have said “we cannot investigate international crimes” or words to that effect. So, I solved perhaps one of Australia’s biggest SCAM’s that ever existed. My client thanked me profusely and that was relieving. I ended up taking it further with ACORN but at the end of the day it is a small world and a lot of crime and this was something that they may have been too busy for. Nevertheless I continue to help people get real justice. I uncovered one of the largest DDOS cyber-attacks (with this case being followed closely in the media) involving defamation of a celebrity.

I uncovered and traced an underground crime syndicate that was responsible for spamming over 24 million people at the request of a disgruntled ex-business partner. I found the link to identify the accused on the balance of probability. This was a massive find, with no leads, and with sheer investigative work, a series of events have led to what could be considered extreme reasonable doubt against the accuser’s story. The case is privileged and ongoing, no more generic information can be provided in this matter.

I was approached on behalf of one of the world’s largest insurance companies to assist in the underwriting, in conjunction with their solicitors, of new Cyber-Security and Indemnity policies, the development of new risks in this ever changing industry, requesting assistance in indemnity wording and risk and creating PDS’s around new and innovative white collar fraud and cyber-attacks in the media at the moment. I was requested to analyse voice biometrics to determine if a suspect had made a hoax bomb threat by telephone and was requested to advise the lawyer of the accused on what should technically be requested from the police and gave intelligence as to the voice codec and causing reasonable doubt of biometric distortion in a compressive lossy voice algorithm. This was a very serious case with charges under the new Anti-Terrorism laws.

I was recently approached by an individual seeking help after being accused of several counts of hearsay sexual offenses leading back over eight years, with the evidence reliant on MSN and Facebook data. This case is pending; however as the accused was pleading innocent, I was able to demonstrate beyond reasonable doubt the unreliability of supposed forensic data relying on old MSN messages. I was approached and subsequently investigated and compiled an expert report in conjunction with a solicitor’s privacy policy detailing the privacy implications, after inspection of the source code and auditing of the non-identifiable hash algorithms that intercepted mobile Wi-Fi beacon signals for the purpose of tracking retail customers, I gave security and privacy protection recommendations based on my findings.

I worked with State Regulators, providing intelligence which led to two convictions, stopping an unqualified electrician performing further illegal, unsafe and non-compliant electrical work. He was convicted and fined. I investigated and provided evidence to ASIC of the deceitful and misleading actions of a Director who allegedly breached the Corporations Act and committed an act of Bankruptcy. He on behalf of his company allegedly applied for deregistration during court proceedings to avoid paying debts arising from judgment against him. I supplied a brief of evidence which is now with the CDPP for prosecution. I also achieved reinstatement of the closed company. The company is now in liquidation.

I uncovered fraud and corrupt conduct within a government department and provided a full investigative report to the Auditor-General and Ombudsman, proving a breach to the Minister’s Gazette pricing structures in the education regulatory instrument unveiling over $7m of overcharging of education stakeholders, as well as affirming in person with the Auditor-General and Minister identical evidence found in his audit, uncovering identical breaches to legislation. I have since uncovered corrupt and improper conduct on the part of the Independent Broad-based Anti-Corruption Commission and the Department of Justice, which will be subject to further legal action initiated by myself. I have uncovered at least five dating scams involving the usual request for money to ‘come to Australia’ to meet their new love but never having enough money.

I was involved in working with Western Union to take this to the police as a crime to stop the conduct. I have acted for a high profile corporate client who had been cyber-stalked for five years, living in terror, with the police and their High-tech Crime division investigating without success. After just two weeks I found the accused (via social media, cyber methods and traditional investigative techniques) and my evidence later helped prosecute and convict the stalker under the strict Victorian Anti-stalking laws. As an expert in social media and cyber-stalking cases, I assisted the NSW police via Interpol in tracking down the stalker of a popular YouTuber to Scotland. And so working with the Scottish police the stalking was concluded.

I have assisted individuals extensively in finding their cyber-stalkers via Facebook, dating websites and email scams, using email tracing and cyber intelligence mechanisms. When in all situations the customer was informed by police that nothing could be done. In an impersonation case, a man purported to steal the identity of an individual and consequently put up a dating profile soliciting gay sex and sending interested parties to the victim’s address. The suspect had blocked his IP address and was difficult to track but using forensic tracking I was able to identify the address of the accused, leading to his arrest. 15 years ago I discovered a flaw in (one of the world’s largest accounting software companies) that revealed credit card details in the hexadecimal binary of the unencrypted data file and alerted the producers of the software to the problem. My mediation skills are often also used in conjunction with my forensic programming/reverse programming skills to determine fact to apply policy. -“If only you could see information as a jigsaw, releasing via Social Media and its risks could be the final piece”. eVestigator – Simon Smith Some case studies are subject to Non-Disclosure agreements. Please contact me for a massive list of experience and real Success

My work speaks for itself. Looking for a testimony from a real corporate client who was stalked for five years, living in terror, with the police and their High-tech Crime division investigating without success? After just two weeks I found the accused (via social media, cyber methods and traditional investigative techniques) and my evidence later helped prosecute and convict the stalker under the strict Victorian Anti-stalking laws. Contact: Lifestyle Portraits, Darren Tilnak .

Add Your Review

Please login or register to add your review.

Vantage Theme – Powered by WordPress.
Skip to toolbar