Simon Smith has a track record of excellence that none can match in Cyber Security with over 23 years experience in Security, Programming, System Deployment, Testing, Lifecycle, & C-Level industries, as well as in Investigating Cybercrime & Cybersecurity, and providing Mediation
A new crime is in town, and Simon Smith is fully equipped to deal with it, bust the cybercriminals and help identify who took your valuable digital assets.
Mobile phone forensics and smartphone, wearable or other devices. Smartphones and other digital devices.
If you are an insurer or a broker performing preliminary assessment of a potential or alleged cyber based attack it is vital that you call an expert, as many attacks may not be as they seem, or may even be worse. Simon Smith attains facts.
Simon takes on Cybercrime, Technical disputes and Behavioural Analytics using the most effective methods available to keep costs down and actions out of court by utilising his skillset with a real-life approach to Family AVO's and Independent Court Expert Appointment.
Do your research before buying in to Anti-Fraud Software, often it is simply penetration testing; testing for external threats only. Simon Smith has the evidence and experience to demonstrate 100% of his company fraud cases have been insider fraud.
The identity of stalkers is sometimes who you least suspect. Ask Simon how he exposed the one behind seven different identities.
Investigation is an important step in mitigating a Cyber Attack or identifying a vulnerability � with over 23 years industry experience Simon is the one the industry turns to for advice and answers
In a busy workplace, employees can be tempted to think a deception or small theft may go unnoticed. Ask Simon about steps you can take to minimise risk and mitigate damage
Simon was able to expose a fake infosec and cybersec faction without relying on police help, ask him how.
Mobile phone forensics and smartphone, wearable or other devices. Smartphones and other digital devices.
Get the expert you deserve and need to handle your case. Save money and get results faster from a professional instead of poorly trained imposters charging for more hours.
Also visit: Official Intelligence Pty. Ltd - SCAMAssist - Australian Institute of Cyber Security (AICS)
Simon is capable of providing expert testimony in IT-related matters including social media investigations, cyberstalking, cybercrime, white-collar crime, and dark web activity. He also examines the authenticity of digital evidence and can assess and explain records in relation to their origin and handling.
ACSC
organisation partnership: Simon Smith's organisation 'Official Intelligence Pty. Ltd' is an ACSC
organisation partner and provides valuable intelligence to the Australian
Government on cyber threats that may be of interest. The ACSC Partnership
Program enables a wide range of organisations to engage with the ACSC and
fellow partners, drawing on collective understanding, experience, skills and
capability to lift cyber resilience across the Australian economy. The
community of ACSC partners includes cyber security professionals across
government, industry, academia and the research sector. Bringing together
the situational awareness, technical expertise and experience of this
community allows the public and private sectors to support and learn from
each other, sharing insights and collaborating on shared threats and
opportunities.
Forensic
Expert Panellist for UTS FSS (Forensic Science Society), "Following the
Leads: Forensic Science Careers" helping students navigate their way
to a career in forensics as a panel speaker for the networking and panel
session. Thinking about a career in forensics but still a little unsure
what's out there? Then come along to our Forensic Networking Panel to hear
from a wide range of different professionals within the forensic science
industry! From crime scene operations and odontology, to fingerprints,
digital forensics, and research; we have a panellist ready for all your
burning career questions!
FaceSweep™ Simon Smith
presents at AVSEC 2021 in Dubai with Steven Van Aperen. As the Senior
Analyst Programmer and CEO, Simon presented on the world's first proprietary algorithm and machine learning program that identifies and analyses up to 1500 facial data points per second in real time and records a facial profile of every tiny micro-expression unique to that person as they answer a series of screening/vetting questions. Serious access and menace charges, unauthorised access:
s.478.1(1) Criminal Code - unauthorised access to, or modification of,
restricted data
s.477.3(1) Criminal Code - unauthorised impairment of electronic
communication;
s.474.17 Criminal Code - Using a
carriage service to menace, harass or cause offence
s 474.24E Criminal Code - Using a
carriage service to transmit material and the material is an intimate image
s 474.24F Criminal Code - Using a
carriage service to make a threat about an intimate image
s 474.15(1) Criminal Code - Using a
carriage service to make a threat to kill
s 474.15(2) Criminal Code - Using a
carriage service to make a threat to cause serious harm
s 471.12 Criminal Code - Using a
postal service to menace, harass or cause offence
s 474.15(1) Criminal Code - Using a
postal service to make a threat to kill
s 474.15(2) Criminal Code - Using a
postal service to make a threat to cause serious harm.
s.233BAB(5) Customs Act 1901 - importation of tier 2 goods
Offences pursuant to the Crimes Legislation Amendment (Sexual Offences
Against Children) Act 2010
Computer intrusions, Unauthorised modification of data, including
destruction of data
Unauthorised impairment of electronic communications, including denial of
service attacks
The creation and distribution of malicious software (for example, malware,
viruses, ransomware)
Dishonestly obtaining or dealing in personal financial information.
Internet/Digital Forensic Investigations that
Simon Smith is able to undertake (sample):
Identify suspect behind cryptocurrency transaction
Identify suspect behind stolen NFT's
Identify suspect behind false email address
Identify suspect behind fake Facebook account
Identify suspect behind fake WhatsApp account
Identify suspect behind fake SnapChat
account
Identify suspect behind fake Instagram account
Identify suspect behind fake Twitter account;
Mobile Forensics; encrypted communications and many more.