Simon Smith has many years experience in Investigating Cybercrime & technology related crimes, with expertise in Security, Programming, System Deployment, Testing, Lifecycle, & C-Level industries that, combined gives a proven track record of excellence and suitability in Cyber Security that none can match.
A new crime is in town, and Simon Smith is fully equipped to deal with it, bust the cybercriminals and help identify who took your valuable digital assets.
Mobile phone forensics and smartphone, wearable or other devices. Smartphones and other digital devices.
the Dark Web, complex High-Tech compuer hacking, AML/CTF money and document fraud and much more. Simon Smith attains results and has succeeded in stopping court cases before they have begun based on his expert reports.
Simon always follows the most effective methods available to keep costs down and actions out of court by utilising his skillset with a real-life independent and informed approach to Family AVO's, Independent Court Expert Appointment to handle Cybercrime, Technical disputes and Behavioural Analytics.
Imposter 'researchers' or 'penetration testers' may pick up only 5% of cyber-attacks perpetrated if that. Risk Reduction is the best strategy as 95% of cyber-attacks are perpetrated by those given access for a legitimate purpose.
Ask Simon about how he identified seven stalkers in one case. In a breakthrough case, the one person who nobody would believe to be the stalker, ended up having seven identities
Simon's experience, skills and knowledge are the reason the industry turns to him in a crisis
Trust is important but blind faith can be damaging, which is why monitoring of employee activity is good practice. Ask Simon about the cases of insider fraud he has solved
Simon is not afraid to stand up to cyber criminals and bullies or their childish games. Ask him how he exposed them without relying on police help.
Mobile phone forensics and smartphone, wearable or other devices. Smartphones and other digital devices.
Often it seems Information Security is mistaken for Cyber Security but Cyber Security is so much more. It requires intimate knowledge of how a business works and what and where vulnerable points are to reduce and mitigate risk.
Also visit: Official Intelligence Pty. Ltd - SCAMAssist - Australian Institute of Cyber Security (AICS)
Simon is capable of providing expert testimony in IT-related matters including social media investigations, cyberstalking, cybercrime, white-collar crime, and dark web activity. He also examines the authenticity of digital evidence and can assess and explain records in relation to their origin and handling.
ACSC
organisation partnership: Simon Smith's organisation 'Official Intelligence Pty. Ltd' is an ACSC
organisation partner and provides valuable intelligence to the Australian
Government on cyber threats that may be of interest. The ACSC Partnership
Program enables a wide range of organisations to engage with the ACSC and
fellow partners, drawing on collective understanding, experience, skills and
capability to lift cyber resilience across the Australian economy. The
community of ACSC partners includes cyber security professionals across
government, industry, academia and the research sector. Bringing together
the situational awareness, technical expertise and experience of this
community allows the public and private sectors to support and learn from
each other, sharing insights and collaborating on shared threats and
opportunities.
Forensic
Expert Panellist for UTS FSS (Forensic Science Society), "Following the
Leads: Forensic Science Careers" helping students navigate their way
to a career in forensics as a panel speaker for the networking and panel
session. Thinking about a career in forensics but still a little unsure
what's out there? Then come along to our Forensic Networking Panel to hear
from a wide range of different professionals within the forensic science
industry! From crime scene operations and odontology, to fingerprints,
digital forensics, and research; we have a panellist ready for all your
burning career questions!
FaceSweep™ Simon Smith
presents at AVSEC 2021 in Dubai with Steven Van Aperen. As the Senior
Analyst Programmer and CEO, Simon presented on the world's first proprietary algorithm and machine learning program that identifies and analyses up to 1500 facial data points per second in real time and records a facial profile of every tiny micro-expression unique to that person as they answer a series of screening/vetting questions. Serious access and menace charges, unauthorised access:
s.478.1(1) Criminal Code - unauthorised access to, or modification of,
restricted data
s.477.3(1) Criminal Code - unauthorised impairment of electronic
communication;
s.474.17 Criminal Code - Using a
carriage service to menace, harass or cause offence
s 474.24E Criminal Code - Using a
carriage service to transmit material and the material is an intimate image
s 474.24F Criminal Code - Using a
carriage service to make a threat about an intimate image
s 474.15(1) Criminal Code - Using a
carriage service to make a threat to kill
s 474.15(2) Criminal Code - Using a
carriage service to make a threat to cause serious harm
s 471.12 Criminal Code - Using a
postal service to menace, harass or cause offence
s 474.15(1) Criminal Code - Using a
postal service to make a threat to kill
s 474.15(2) Criminal Code - Using a
postal service to make a threat to cause serious harm.
s.233BAB(5) Customs Act 1901 - importation of tier 2 goods
Offences pursuant to the Crimes Legislation Amendment (Sexual Offences
Against Children) Act 2010
Computer intrusions, Unauthorised modification of data, including
destruction of data
Unauthorised impairment of electronic communications, including denial of
service attacks
The creation and distribution of malicious software (for example, malware,
viruses, ransomware)
Dishonestly obtaining or dealing in personal financial information.
Internet/Digital Forensic Investigations that
Simon Smith is able to undertake (sample):
Identify suspect behind cryptocurrency transaction
Identify suspect behind stolen NFT's
Identify suspect behind false email address
Identify suspect behind fake Facebook account
Identify suspect behind fake WhatsApp account
Identify suspect behind fake SnapChat
account
Identify suspect behind fake Instagram account
Identify suspect behind fake Twitter account;
Mobile Forensics; encrypted communications and many more.