Eugenia Bahit

Software Architect

LinkedIn logo Amazon logo Google Play logo Email logo

Digital Intelligence & Cybersecurity Support for Private Investigators and Freelance Detectives

Nowadays, almost everything we do leaves a digital footprint that can be traced and interpreted if we have the right knowledge. Sometimes, that footprint leads us to follow specific evidence and might even help us find definitive proof.

My work consists of helping private detectives uncover, protect, and interpret those footprints and evidence through advanced cybersecurity expertise, providing support in digital investigations.

Digital Intelligence & Cybersecurity Services

The following services are only available in the UK. All my work adheres to professional ethics, GDPR, and digital privacy standards. ICO registered number: ZA935373.

  • Digital Footprint Tracing:
    Tracking, collecting, and analysing online identities, behavioural patterns, and hidden links across social networks, databases, and the deep web.
     
  • Cyber Profiling:
    Profile construction can be a powerful asset in cases involving cyber harassment or cyberstalking and cyberbullying, fraud or impersonation, missing persons, and background or due diligence checks.
     
  • Digital Evidence Protection:
    Securing and verifying digital data through cryptographic methods, it ensures that every byte of information remains authentic, verifiable, and secure from collection to conclusion.
     
  • OSINT & Data Mining Reports:
    Gathering and correlating open-source information to support investigations, due diligence, or background checks.
     
  • Technical Counter-Surveillance:
    Preventing digital leaks, hidden monitoring, or unauthorised data access.
     
  • Specialised Training:
    Tailored online sessions on cybersecurity fundamentals, ethical hacking, and secure data handling for investigators.

Let’s talk

Work Remotely & Securely

All services are provided remotely, with full confidentiality and secure communication protocols. All my work adheres to professional ethics, GDPR, and digital privacy standards. Each procedure is documented, verifiable, and conducted with complete confidentiality.

Whether you are pursuing a complex cybercrime or simply need expert backup for your digital research, I can help you strengthen your investigations from behind the scene.

Let’s talk

Professional background

Over the last 28 years I’ve worked as a grey, red and white-hat hacker.

Between 1999 and 2007, as a grey-hat hacker, I performed some work in the areas of social engineering (for password cracking), backdoor design, logic bombs and SQL injection.

From 2013 to 2017, as a red-hat hacker, I worked as a reverse code engineering specialist and developed JackTheStripper (JTS)—a software to deploy a secure web server and hardening a Debian GNU/Linux system.

In 2016, I earned a certificate in Criminal Profiling, and in 2017 two certificates in Ethical Hacking and Social Psychology.

After that, I worked as an ethical hacker, performing data analysis to support people tracking and profiling across social media and public data sources.

At the end of 2018, I was invited by the United Nations to participate as a keynote speaker—alongside members of the OAS (Organization of American States) and international cybersecurity specialists—at the first Latin American Cybersecurity Conference, held at the UNASUR parliament.

Proposed by Inspector Silvia Barrera—Head of Technological Crimes at the Judicial Police of La Rioja, Spain—I also had a special role as a Cyberwall Academy lecturer—the training programme of the Spanish National Police, in collaboration with the University of Salamanca—delivering keynote seminars on cryptology and cryptography.

Between 2011 and 2023, I wrote for several prestigious software security magazines, including Hackers & Developers Magazine, The Original Hacker (an independent publication), Debian Hackers, and ADMIN Network & Security. As an OWASP member, I also contributed to the security standards document concerning the design and development of user sessions.

From 2020 to 2025, I focused on designing a security protocol to isolate database servers (MySQL/MariaDB) in distributed systems, developing a mathematical model to validate software components, and creating a strong cryptographic credential system for web platforms.