• Digging for Dirt: Picking out some Weeds

    Inevitably, investigations will always come down to legal and regulatory violations or sanctions, whether a foreign government or a sex offender list. In this article, we examine the various investigative trails that develop because of involvement with, or violation of, government regulatory issues.
  • Social Media: How to Take Control

    At some point we’ll need to gain access to an abandoned social media account. Whether to gather photos of a lost beloved family member; or to view a final video that might shed light on an accident; or because we simply forgot which ex-girlfriend’s name was set as the password. Aine McCormack is HG’s in-house specialist on access-gaining requests. Her Data2Know.com article reports on how to get the recovery job done.
  • Due Diligence for Compliance

    This past year has brought about a great deal of change in due diligence requirements for compliance regulations. This article looks at the impact that the CFIUS and FIRRMA had on an investigator's practices and available tools.        
  • Business Intelligence for Open-Source Research

    Regardless of your investigative ability, learning the tactics to research and conduct due diligence analysis, with a critical thinking approach, will empower you with the information to make proactive decisions in life and business.
  • The Dark Web: Navigating the Ever-Changing Landscape

    The Dark Web is a platform of nefarious content: Entering with the right knowledge and skills is imperative, because much of what you see you’ll never be able to unsee, although you’ll wish you could.
  • Best of People Search and Company Search Engines

    Today’s commodity is data. Everyone is selling a specialized database in their particular arena. Our job as investigators is to find that database; doing so will greatly enhance our skills and give us the edge to set us apart from the rest.
  • Using Sayari Graph for Investigations

    This article examines the use of Sayari for intelligence analysts and corporate risk management professionals to collect, extract, and analyze data across borders and languages. Sayari can be used for due diligence to reduce risk or to enter a new market, to meet compliance or regulatory requirements, or to prevent fraud, financial crimes, and corruption.
  • DNA: The New Open Source

    This article examines how the growing trend of DNA testing can help the investigator, but also may be a damaging unwanted intrusion on personal privacy. We discuss how to protect yourself and how to remove any DNA you have left behind.
  • TikTok: An OSINT Tool of Today's Youth

    This article examines the quickly growing Chinese app and how from an open source intelligence perspective, this novelty app provides researchers and investigators with a plethora of knowledge and useful information.
  • Predictive Intelligence How-To's

    This article examines the step-by-step key methods for how to properly use social media platforms to monitor location-specific events.
  • What the APP?! Top Social Media APPS and the Lowdown on What Info They Collect

    Starting a new health and fitness routine? Need to get to the library, but your car is in the shop? Has your 12-year-old son been grounded from receiving photos from his friends on his smartphone but appears unaffected by it? Booking a trip to Bermuda? Or, are you stepping out of your single’s lifestyle and looking for love?

    All of these questions have one thing in common that a mere 10 years ago did not exist: There’s an app for that!

    This Hg FactSheet gives you a foundational understanding of what these APPS collect, better preparing you to protect yourself.
  • COVID Scams While billions of people are under stay-at-home and work from home orders, predators are taking advantage of people’s fears, anxiety, and losses at mind-numbing proportions. Children, who are now spending more time online for schooling, are targets for exploitation by pedophiles. Seniors are vulnerable from financial scams, and businesses are vulnerable from hacking, phishing, and cybercrimes. We are committed to serve the public by providing information on the latest scams, exploitation, and fraudulent activities as we are all in this together.

Title

Go to Top