• Google & Friends for Locating Public Information

    This article examines the creative searching features and offerings provided by search engines. Using these advanced techniques greatly enhances the searching of public information. Learn how to get the most out of Google; it's preferred results, operators, symbol functions, proximity searching and more.  
  • Searching For Videos & Images On The Internet

    In this issue of Data2Know.com, we have guest contributing author and OsInt officer Janiece Mondale providing us with two articles of her Open source news content. Of the many articles Ms. Mondale has authored, these pieces collate best practices for online intelligence professionals to conquer the overwhelming amount of content on the internet.

  • Best of People Search and Company Search Engines

    Today’s commodity is data. Everyone is selling a specialized database in their particular arena. Our job as investigators is to find that database; doing so will greatly enhance our skills and give us the edge to set us apart from the rest.
  • In Hg’s Spring FactSheet, Manager of Intelligence Dennis Maida and Analyst Thomas Fogle explore and analyze significant threat and risk concerns for the next 6-12 months; Ukraine/Russian War; U.S. midterm elections; the Great Resignation; supply chain; and COVID-19. Each one is unique, yet there is a connection between them all.
  • On Your Trademark, Get Set, Go! In Hg’s Fall FactSheet, Senior Analyst and Trademark Expert Jake Pennington explores Trademark use and Hg's Trademark Investigations service further in depth. He covers first use, continuous use, and last use, identifying use in commerce, and types of trademarks.
  • From bad weather to travel disruptions, parties to raves, active shooters to civil unrest, risk  monitoring is the gold standard for watching and responding to potential crises. Hg’s new webinar includes a live fire exercise to help field investigators understand how to balance the intensity of these types of OSINT investigations with the stresses of risk monitoring. Hg’s expert trainer provides in-depth training on how to prepare for and conduct event monitoring in a straightforward approach. Upon completion of the course, field investigators will be able to
    • Onboard an event, identify collection requirements, and establish the distribution of tasks.
    • Select services, resources, and tools to meet monitoring protocols.
    • Adhere to legal and ethical boundaries related to overseeing open communications in sensitive environments.
    • Establish and maintain reporting and structure protocols to account for all data collection.
    All participants receive handouts on concepts and investigative techniques. About Hg’s Webinars This webinar was recorded in 2023 or earlier. Hg makes these webinars available for purchase after the live event; however, they are not approved for CPE credits with some associations(specifically NASBA).

Title

Go to Top