Simon Smith is often asked if he can "hack" into a person’s private social
media accounts. He describes this is a Hollywood-style perception of hacking
but there are some truths. He puts forward two answers, both "Yes" and "No."
He states that "a person can control what they have possession of, however
are oblivious to what they don’t."
forums, and in criticisms directed towards many victims, he often reads
members of the public being very critical about others that may have
been scammed on dating sites, or email phishing campaigns. He recognises
that sometimes people call them "stupid" and knows the psychology of
both the scammer and the victim and is capable of making a fair comment.
Mr. Smith knows a secret he can share that only the highest level
Forensic Investigators and Cyber Security experts know and he is
prepared to share it. He is quick to point out that victims are most
definitely not "stupid." He refers to his clients as typically very
smart people who have been deceived.
Secondly, the secret that he holds would make those who criticise think
twice before making such a statement. "The human mind is a complex form
of art," he often likes to say. He refers to the term "social
engineering" and has in fact been able to manipulate information out of
scammers and cyber stalkers using very sophisticated human manipulation
and counter intelligence techniques that do not ever involve the use of
a computer. He encourages those people who criticise to spend a day with
him and they may be of a different view at the end of the day. He is of
the strong view that some external research on "social engineering" may
show those who criticise victims exactly how everyone is already
essentially tricked every day of their lives.
Smith is a recognised expert witness for the courts in Cyber Security,
Information Technology Systems, Reverse Engineering and any technical
expert dispute. He has extreme industry experience and has caught over
200 stalkers and over $10 million dollars of international scammers, a
job which would ordinarily be for the Police and AFP/Interpol, which is
prevalent in the Australian media at the moment.
Smith is of the view that today’s methods in dealing with Cyber Security
are taught incorrectly and now needs to adapt with legislative change.
He believes companies everywhere have to drop their current structures
and adapt to new regulatory data-breach reporting requirements, or face
getting serious fines, penalties or even worse, loss of business.
Smith says, "You cannot do a course to become a Cyber Security Expert
and companies need to know that if you do not spend the money in risk
mitigation, you will spend one hundred times more in losses." Mr. Smith
is a strong follower of the media and contributes to exposing
cyber-attacks and the best methods of avoiding them for the everyday
Protect your personal identity on the Internet
Change your password and security questions regularly and have a
different password for all accounts. (It’s annoying but necessary.)
Always enable two-factor authentication to a physical device.
Never enable the default "Family Sharing" – "Locate my Friends" or
other default sharing applications placed on iPhones and Androids.
Get off iCloud – Use encrypted backups more.
Disable Android Device Manager on your phone.
Forever keep checking for security alerts by your email provider.
Never join a free Wi-Fi hotspot even if it is password protected,
and only trust your home if setup correctly.
Logout of your email immediately from any browser if using webmail.
Google does not care that you stop reading email. Google continues
to check out everything else you are up to.
Install TOR Browser and surf the internet anonymously. Mr. Smith
wrote Orion Hidden IP Browser++ for iOS but generally any TOR
browser is worth looking into.
Never use passwords that aren’t crazily cryptic.
Always logout of Facebook or any social network session you log in
eVestigator® – Expert Witness, Computer Forensic Private and
Government/Cybercrime Investigator, CEO, CTO, CSIO, CEFI, CWTS,
PI, FDRP, CFHI, CCIE, CCTA, CSMIE, MCSD, MCP, GDipAMLCTF,
GDipStrLdr, GCertITStrMan, GCertITSus, GCertDigEd,GDipMan,
GDipPortMan, GDipFDR, AdvDipGov (Fraud/Investigation/Workplace),
AdvDipRiskMan, Computer Digital Forensic Investigator and
Certified Expert Witness, Cyber-Stalking, Online Harassment
Expert, Hi-Tech Crime Investigator, Family Dispute Resolution
Practitioner and Nationally Accredited Mediator, Government,
Workplace / Private Investigator (Licensed under Victoria Police
LRD), Master Programmer – 20+ yrs com-exp, Auditor, Ethical
Hacker, Recognised Dept. Homeland Security Certifications below.
Member ISSA, VSCL, IASA, MCSD, MCP, CCP, Stanford University
Cryptology Certified, SANS Cyber Aces Certified, Certified
Forensic Hi-Tech Investigator (CFHI), Certified Cyber
Investigative Expert (CCIE), Certified e-Commerce Fraud
Investigator (CEFI), Certified Workplace Threat Specialist
(CWTS), Certified Social Media Intelligence Expert (CSMIE),
Certified Cyber Threat Analyst (CCTA)
Simon Smith's Recent Media Coverage
About Simon Smith
He is known Nationally as
eVestigator and is in the media for his specialist cyber
expertise. He is a licensed Private Investigator, holding
several Qualifications, being a Practicing Forensic Private
Investigator, Trained Computer Hacking Forensic Investigator,
Expert Witness, holder of several Graduate Diploma's, Graduate
Certificates, Diploma's in Security and Risk Management,
Government Investigations, Information Technology and Strategic
Management, Cyber Security, Government (Fraud Control),
Government (Security) and so much more. Skill, Experience Speed
equals low cost service! The higher the Skill, Experience and
Speed, the lower the cost. That is what his customers have found
His main experience comes from 27 years consisting from him
being a child genius at 11, teen and adult life consisting of
extensive Commercial Computer Programming and interest in
innovation and creation. It all started when programming from a
tape deck green screen AMSTRAD CPC464, growing up programming
continuously before the birth of the consumer Internet, then
programming throughout high school with every main language that
existed, designing his own mail and internet servers, continuing
to this day with knowledge of all frameworks including now as an
App Store accredited mobile developer to patentee and Master
Programmer (from ground up - not like the template programmers'
they create today).
When he was 19, he was literally handpicked and employed as an
Analyst Programmer and taken straight out of year 1 University
and offered a full time job as an Analyst Programmer leading to
a Senior Analyst Programmer position after being recognised as
one of a small group of 3% of Australians who received Quadruple
A++ in Information Systems and Processing and Management CATs at
VCE. In that role, the mix between his IT expertise and
investigative expertise began to show.
He was not just a programmer. He was in charge of the entire
SDLC. He one day was investigating the binary of a QuickBooks
QIF file for a corporate client and came across a RAW credit
card number. He immediately called QuickBooks who took no
interest. Since then he has worked at multiple workplaces and
created from ground up several multimillion dollar enterprises
all in relation to IP, web, cyber security, reporting,
educational, project management, enterprise application
development, SAAS, mobile, data, VOIP, automated intelligence
programming, API's and SDK's, and voice analysis applications
and enterprises from scratch. When I say from scratch, I
fundamentally mean from scratch.
A true expert computer programmer holds the skills and abilities
of every other IT discipline, because through the Software
Development Life Cycle (SDLC) they have had to conduct the
equivalent work and ensure that ultimately their software works
with Database X on Server Y with Conditions Z. In the past, he
has used his abilities within investigations and forensics 'on
the job'. If he needs unique jobs done, he simply programmed
them himself. A true computer forensics expert is no expert
unless they understand the raw essentials of the inner
operations of programming from machine code to today's language
layers - that way they truly understand the vulnerabilities from
the highest end in reverse. That is what you call a real
computer forensics expert.
He has solved multimillion dollar fraud SCAM's (including the
fake Microsoft tech-support SCAM and dating SCAMS), resolved
cyber-stalking cases, family law cases, plenty of IP tracing and
identity theft cases, and corporate crime, online defamation and
insurance fraud cases. He also works and trains as a Cth. FDRP
(Professional Family Court Mediator), and has trained many
Barristers at law to become Family Dispute Resolution
Practitioners' and is appointed by the Commonwealth. He is a
Nationally Accredited Mediator (NAM) and holds a Certificate of
Bail Justice from Victoria University.
Perhaps the Best Investigator in
He has built some of Australia's
largest multi-million-dollar non-funded private training
organisations, software companies and innovative enterprises. He
now dedicates his advanced knowledge to cyber security and
ethical hacking and Cybercrime, combined with his other
credentials has found an extreme niche to help people in this
area which one could describe as the step between litigation and
crime/civil disputes and the police, combining investigation,
strategy and forensic evidence and intelligence gathering with
advocacy, mediation and knowledge to attain an outcome.
eVestigator completed the Stanford University Cryptology
Certification. Cryptography is an indispensable tool for
protecting information in computer systems, and holds several
Qualifications and over 20+ years of real industry work
experience to back up his trusted expertise. He has been labeled
"perhaps the best Investigator in the world", but is happy to
just do the best and ensure that people are educated on good
practice and do not get into the mistake that causes issue that
create Cybercrime unknowingly. He sees a new landscape for
companies and times has to change. He is pioneering a new era
for companies to comply with regulations in Cyber Security
amongst all domains.
Simon Smith eVestigator, a Social
eVestigator explains that no matter
how smart you are you, you are susceptible to human error and
deception known by a process called 'social engineering'. This
concept he describes is a form of human deception in Cyber
Security that most readers are likely to be a victim of at some
stage in their lives. He makes it clear that one cannot control
what one does not know.