Online Investigator Simon Smith, a Cyber Security Expert Gives Tips to Protect Yourself from Identity Theft

  • Home
  • Profile
  • eVestigator explains that no matter how smart you are you, you are susceptible to human error and deception known by a process called "social engineering." This concept he describes is a form of human deception in Cyber Security that most readers are likely to be a victim of at some stage in their lives. He makes it clear that one cannot control what one does not know.

    Simon Smith of eVestigator presenting at a conferenceeVestigator Simon Smith is often asked if he can "hack" into a person’s private social media accounts. He describes this is a Hollywood-style perception of hacking but there are some truths. He puts forward two answers, both "Yes" and "No." He states that "a person can control what they have possession of, however are oblivious to what they don’t."

    In forums, and in criticisms directed towards many victims, he often reads members of the public being very critical about others that may have been scammed on dating sites, or email phishing campaigns. He recognises that sometimes people call them "stupid" and knows the psychology of both the scammer and the victim and is capable of making a fair comment. Mr. Smith knows a secret he can share that only the highest level Forensic Investigators and Cyber Security experts know and he is prepared to share it. He is quick to point out that victims are most definitely not "stupid." He refers to his clients as typically very smart people who have been deceived.

    Secondly, the secret that he holds would make those who criticise think twice before making such a statement. "The human mind is a complex form of art," he often likes to say. He refers to the term "social engineering" and has in fact been able to manipulate information out of scammers and cyber stalkers using very sophisticated human manipulation and counter intelligence techniques that do not ever involve the use of a computer. He encourages those people who criticise to spend a day with him and they may be of a different view at the end of the day. He is of the strong view that some external research on "social engineering" may show those who criticise victims exactly how everyone is already essentially tricked every day of their lives.

    Mr. Smith is a recognised expert witness for the courts in Cyber Security, Information Technology Systems, Reverse Engineering and any technical expert dispute. He has extreme industry experience and has caught over 200 stalkers and over $10 million dollars of international scammers, a job which would ordinarily be for the Police and AFP/Interpol, which is prevalent in the Australian media at the moment.

    Mr. Smith is of the view that today’s methods in dealing with Cyber Security are taught incorrectly and now needs to adapt with legislative change. He believes companies everywhere have to drop their current structures and adapt to new regulatory data-breach reporting requirements, or face getting serious fines, penalties or even worse, loss of business.

    Mr. Smith says, "You cannot do a course to become a Cyber Security Expert and companies need to know that if you do not spend the money in risk mitigation, you will spend one hundred times more in losses." Mr. Smith is a strong follower of the media and contributes to exposing cyber-attacks and the best methods of avoiding them for the everyday citizen.

    Protect your personal identity on the Internet

    1. Change your password and security questions regularly and have a different password for all accounts. (It’s annoying but necessary.)

    2. Always enable two-factor authentication to a physical device.

    3. Never enable the default "Family Sharing" – "Locate my Friends" or other default sharing applications placed on iPhones and Androids.

    4. Get off iCloud – Use encrypted backups more.

    5. Disable Android Device Manager on your phone.

    6. Forever keep checking for security alerts by your email provider.

    7. Never join a free Wi-Fi hotspot even if it is password protected, and only trust your home if setup correctly.

    8. Logout of your email immediately from any browser if using webmail. Google does not care that you stop reading email. Google continues to check out everything else you are up to.

    9. Install TOR Browser and surf the internet anonymously. Mr. Smith wrote Orion Hidden IP Browser++ for iOS but generally any TOR browser is worth looking into.

    10. Never use passwords that aren’t crazily cryptic.

    11. Always logout of Facebook or any social network session you log in to.

    Mr. Simon Smith can be contacted at the contact information below. He is best utilised as a Cyber Forensic Investigator, Counter Intelligence Expert and Court Expert Witness and Dark Web Expert.

    Credentials at a glance

    eVestigator® – Expert Witness, Computer Forensic and Government/Cybercrime Investigator, CHFI, CEH, CISO, CFE, CEFI, CWTS, FI, FDRP, CFHI, CCIE, CCTA, CSMIE, MCSD, MCP, GDipAMLCTF, GDipStrLdr, GCertITStrMan, GCertITSus, GCertDigEd,GDipMan, GDipPortMan, GDipFDR, AdvDipGov (Fraud/Investigation/Workplace), AdvDipRiskMan, Computer Digital Forensic Investigator and Certified Expert Witness, Cyber-Stalking, Online Harassment Expert, Hi-Tech Crime Investigator, Family Dispute Resolution Practitioner and Nationally Accredited Mediator, Government, Workplace / International Forensic Investigator, Master Programmer – 20+ yrs com-exp, Auditor, Ethical Hacker, Recognised Dept. Homeland Security Certifications below. Member ISSA, VSCL, IASA, MCSD, MCP, CCP, Stanford University Cryptology Certified, SANS Cyber Aces Certified, Certified Forensic Hi-Tech Investigator (CFHI), Certified Cyber Investigative Expert (CCIE), Certified e-Commerce Fraud Investigator (CEFI), Certified Workplace Threat Specialist (CWTS), Certified Social Media Intelligence Expert (CSMIE), Certified Cyber Threat Analyst (CCTA)

    Simon Smith's Recent Media Coverage

    About Simon Smith

    He is known Nationally as eVestigator and is in the media for his specialist cyber expertise. He is a world renown Forensic Investigator, holding several Qualifications, being a Practicing Forensic Detective & Investigator, Trained Computer Hacking Forensic Investigator, Expert Witness, holder of several Graduate Diploma's, Graduate Certificates, Diploma's in Security and Risk Management, Government Investigations, Information Technology and Strategic Management, Cyber Security, Government (Fraud Control), Government (Security) and so much more. Skill, Experience Speed equals low cost service! The higher the Skill, Experience and Speed, the lower the cost. That is what his customers have found out.

    His main experience comes from 27 years consisting from him being a child genius at 11, teen and adult life consisting of extensive Commercial Computer Programming and interest in innovation and creation. It all started when programming from a tape deck green screen AMSTRAD CPC464, growing up programming continuously before the birth of the consumer Internet, then programming throughout high school with every main language that existed, designing his own mail and internet servers, continuing to this day with knowledge of all frameworks including now as an App Store accredited mobile developer to patentee and Master Programmer (from ground up - not like the template programmers' they create today).

    When he was 19, he was literally handpicked and employed as an Analyst Programmer and taken straight out of year 1 University and offered a full time job as an Analyst Programmer leading to a Senior Analyst Programmer position after being recognised as one of a small group of 3% of Australians who received Quadruple A++ in Information Systems and Processing and Management CATs at VCE. In that role, the mix between his IT expertise and investigative expertise began to show.
    He was not just a programmer. He was in charge of the entire SDLC. He one day was investigating the binary of a QuickBooks QIF file for a corporate client and came across a RAW credit card number. He immediately called QuickBooks who took no interest. Since then he has worked at multiple workplaces and created from ground up several multimillion dollar enterprises all in relation to IP, web, cyber security, reporting, educational, project management, enterprise application development, SAAS, mobile, data, VOIP, automated intelligence programming, API's and SDK's, and voice analysis applications and enterprises from scratch. When I say from scratch, I fundamentally mean from scratch.

    A true expert computer programmer holds the skills and abilities of every other IT discipline, because through the Software Development Life Cycle (SDLC) they have had to conduct the equivalent work and ensure that ultimately their software works with Database X on Server Y with Conditions Z. In the past, he has used his abilities within investigations and forensics 'on the job'. If he needs unique jobs done, he simply programmed them himself. A true computer forensics expert is no expert unless they understand the raw essentials of the inner operations of programming from machine code to today's language layers - that way they truly understand the vulnerabilities from the highest end in reverse. That is what you call a real computer forensics expert.
    He has solved multimillion dollar fraud SCAM's (including the fake Microsoft tech-support SCAM and dating SCAMS), resolved cyber-stalking cases, family law cases, plenty of IP tracing and identity theft cases, and corporate crime, online defamation and insurance fraud cases. He also works and trains as a Cth. FDRP (Professional Family Court Mediator), and has trained many Barristers at law to become Family Dispute Resolution Practitioners' and is appointed by the Commonwealth. He is a Nationally Accredited Mediator (NAM) and holds a Certificate of Bail Justice from Victoria University.

    Perhaps the Best Investigator in the World

    He has built some of Australia's largest multi-million-dollar non-funded private training organisations, software companies and innovative enterprises. He now dedicates his advanced knowledge to cyber security and ethical hacking and Cybercrime, combined with his other credentials has found an extreme niche to help people in this area which one could describe as the step between litigation and crime/civil disputes and the police, combining investigation, strategy and forensic evidence and intelligence gathering with advocacy, mediation and knowledge to attain an outcome. eVestigator completed the Stanford University Cryptology Certification. Cryptography is an indispensable tool for protecting information in computer systems, and holds several Qualifications and over 20+ years of real industry work experience to back up his trusted expertise. He has been labeled "perhaps the best Investigator in the world", but is happy to just do the best and ensure that people are educated on good practice and do not get into the mistake that causes issue that create Cybercrime unknowingly. He sees a new landscape for companies and times has to change. He is pioneering a new era for companies to comply with regulations in Cyber Security amongst all domains.

    Simon Smith eVestigator, a Social Engineer Expert

    eVestigator explains that no matter how smart you are you, you are susceptible to human error and deception known by a process called 'social engineering'. This concept he describes is a form of human deception in Cyber Security that most readers are likely to be a victim of at some stage in their lives. He makes it clear that one cannot control what one does not know.