Home

Special Technology Services – ACN 23 261 865 109

Cybersecurity and investigative services

Based in Wollongong, NSW, Australia formally established in 2017

STS Director: Michael Anthony Ralph

  • Secure and private setup of Mac/iOS/Android devices
  • Data recovery & drive cloning
  • Penetration testing & security audits of devices, networks, and websites
  • Investigation of threats, scammers, anomalies, and other targets
  • Scammer identification and elimination (includes Facebook scammers)
  • Server operation and security
  • Offensive security operations
  • Anonymity & privacy services and system setups
  • Analysis & forensics
  • Darknet research

From the Services page:

Secure and Private Setup of Mac/iOS Devices

Apple does not sell devices that are particularly secure, and they definitely do not keep your information private. We offer full system setups from a fresh install to offer the maximum safety and privacy while causing minimum inconvenience. Keep in mind that security and convenience are on opposite ends of a spectrum. This can also be performed on systems that are already in use.

We also perform audits to show you how much private data is being leaked, which apps you have installed that are secretly “phoning home” to their maker (or quite often, Google for their analytics/tracking and similar services.) We can block these services and set up firewalls (the complexity of which depends on the individual case.)

Web browsers and system settings require optimisation, the recommended browser to use is Firefox, and we have over a decade of experience tweaking it for maximum privacy or security, while maintaining a smooth experience browsing websites.

Data Recovery

Recovery of data that has been lost of rendered inaccessible. This includes recovery of accidentally deleted files, accidentally (or intentionally) formatted drives, failing hard drives and other damaged media (down to floppy discs and scratched optical discs like CDs), drives that have had attempts at “secure” overwrites performed on them, and we have the ability and technology to recover fragments of files that otherwise would not be able to be retrieved with a simple piece of software. We also perform the cloning of systems, drives, other storage devices, damaged mechanical drives, memory cards – most forms of storage. This is useful to create an identical and (often) bootable copy of the system, as well as being an important step in saving data from a hard drive that is about to fail catastrophically.

Investigation (covering scams, scammers, extortion, blackmail, revenge porn, slander, and cyberbullying and more)

Investigation of online threats such as scammers, blackmailers, extortionists, slander, and collection of evidence of a standard of being used in a court of law. Liaison with agencies such as the Australian Cyber Security Centre and the Australian Signals Directorate, plus others as needed.

Identification of offenders and cyber criminals and proceeding as needed to eliminate threats.

Penetration testing & security audits

Penetration testing and security audits of networks (from small home networks to corporate networks), not limited to cybersecurity but also including human elements such as social engineering and spear-phishing. Testing also performed on computers, any other electronic devices (phones, tablets, specialised hardware and systems), and websites (from small web servers to blogs to large corporate sites and organisations.

All audit and penetration work includes a report of vulnerabilities and rectification of security issues or recommendations as how to mitigate them.

Server operations & security

Secure setup or configuration of small-scale web servers and blogs/websites. This includes firewalling, encryption, and forensic analysis of systems for intrusion and investigation of attempted breaches.

Cryptography

PGP key setup and verification services, SSH keys and access control, as well as X.509 SSL/TLS certificate creation, verification, and analysis. Secure protection of files and ability to act as a third party escrow for cryptographic keys.

Anonymity

Anonymous system installations (Mac OS, Windows, Linux/UNIX, iOS, Android), and locking down of such systems. Setup of privacy-centric systems or browser configurations including Tor, live operating systems, and hidden systems. Personal SOCKS5 proxies and VPNs.

Darknet & blockchain research

Analysis and research of darknet sites and activities. Analysis of blockchains for Bitcoin (and some other cryptocurrencies) and tracing of transfers.

Leave a Reply

Your email address will not be published. Required fields are marked *