• Sock puppet accounts are mainly known to those outside the information security field as accounts used for disinformation purposes, such as swaying your opinion about a topic or a product. However, this is not the only way to use a sock puppet account. In Hg’s Summer FactSheet, up-and-coming cybersecurity researcher Dakota State University Junior, Mariel Klosterman, describes how sock puppets are used by malicious actors and OSINT investigators, types of sock puppet accounts, and how to create a sock puppet for information collection.
  • Social Network Searching Summer Update

    There are always new Web sites to visit and use for our investigative work. In this article, we focus on social network investigations and the latest sites - or updates to those you are already familiar with.  
  • Across the Ocean - Business Due Diligence in the Republic of China

    How does the well-informed investigator determine if a company located in the Republic of China is reputable and free from encumbrances? In this article you will be given a systematic account of the due diligence steps necessary to answer the above question. This article examines the steps, thought processes, and online resources necessary to achieve success with business due diligence in China. The objective of our investigation is to minimize monetary and reputational risks involved with a foreign business.
  • Due Diligence with LexisNexis and WestLaw

    The value of combining traditional media (e.g., news, journals, and the written word vs. social media) with online litigation searches is immeasurable. Case after case has been made thanks to finding articles with a mere mention of our subject referenced. Old court cases, no longer accessible from county Web sites—if ever they were available—can also be located.
  • Building Social Media Investigations

    Building Social Media Investigations will explore the alternatives in other countries that exist aside from Facebook. It will explore the preferred social media sites, online communication methods, and popular focus of investigation for both a country and it's culture.
  • Opt-Out Online: Part 1

    This article will help you understand the dark side of information. Data, at its most annoying, is a commodity with social media sites selling your Likes to data providers. Data, at its most dangerous, allows someone from overseas to obtain personal addresses and threaten families.  
  • Opt-Out Online: Part 3

    Despite the overabundance of information shared and sold on the Web today, a number of measures for protecting your information are available to you. Learn about these important protections and how to exercise the options they offer to you.
  • Keeping Current with the Latest Investigative Tools

    A good investigator must stay abreast of current investigative industry tools. Snaptrends and CyberTOOLBELT, two tools reviewed in the Spring 2015 issue of data2know.com have, in the six months since, significantly increased their investigative capacity—enough to warrant a review update. This article will discuss the Snaptrends and CyberTOOLBELT updates and will introduce a third investigative tool, Geofeedia.
  • Not-so private egos: Emojis to Instagram

    An overwhelming majority of online posters are now writing with imagery. They are no longer limited to words alone but can convey a thousand words with one photo. With this article, we will both use and make use of that overabundance of communication.  
  • Protecting Your Image Online

    With a good Google search, somebody can find where you live, discover your likes and dislikes, learn what you do with your free time, or what others might think of you. Perhaps even habits you would likely not want known, particularly by coworkers. It is a serious matter for anyone, professional or otherwise, concerned with their own personal security. Have you Googled yourself lately? https://www.hetheringtongroup.com/product/data2know-vol-15-no-8/
  • Best of People Search and Company Search Engines

    Today’s commodity is data. Everyone is selling a specialized database in their particular arena. Our job as investigators is to find that database; doing so will greatly enhance our skills and give us the edge to set us apart from the rest.
  • Predictive Intelligence How-To's

    This article examines the step-by-step key methods for how to properly use social media platforms to monitor location-specific events.

Title

Go to Top