-
Data2Know Vol. 19 No. 3
$15.00Using Sayari Graph for Investigations
This article examines the use of Sayari for intelligence analysts and corporate risk management professionals to collect, extract, and analyze data across borders and languages. Sayari can be used for due diligence to reduce risk or to enter a new market, to meet compliance or regulatory requirements, or to prevent fraud, financial crimes, and corruption. -
Data2Know Vol. 19 No. 4
$15.00DNA: The New Open Source
This article examines how the growing trend of DNA testing can help the investigator, but also may be a damaging unwanted intrusion on personal privacy. We discuss how to protect yourself and how to remove any DNA you have left behind. -
Data2Know Vol. 19 No. 5
$15.00TikTok: An OSINT Tool of Today's Youth
This article examines the quickly growing Chinese app and how from an open source intelligence perspective, this novelty app provides researchers and investigators with a plethora of knowledge and useful information. -
Data2Know Vol. 19 No. 6
$15.00Predictive Intelligence How-To's
This article examines the step-by-step key methods for how to properly use social media platforms to monitor location-specific events. -
What the APP?! Top Social Media APPS and the Lowdown on What Info They Collect
Starting a new health and fitness routine? Need to get to the library, but your car is in the shop? Has your 12-year-old son been grounded from receiving photos from his friends on his smartphone but appears unaffected by it? Booking a trip to Bermuda? Or, are you stepping out of your single’s lifestyle and looking for love?
All of these questions have one thing in common that a mere 10 years ago did not exist: There’s an app for that!
This Hg FactSheet gives you a foundational understanding of what these APPS collect, better preparing you to protect yourself. -
COVID Scams While billions of people are under stay-at-home and work from home orders, predators are taking advantage of people’s fears, anxiety, and losses at mind-numbing proportions. Children, who are now spending more time online for schooling, are targets for exploitation by pedophiles. Seniors are vulnerable from financial scams, and businesses are vulnerable from hacking, phishing, and cybercrimes. We are committed to serve the public by providing information on the latest scams, exploitation, and fraudulent activities as we are all in this together.
-
Data2Know Vol. 20 No. 1
$15.00OSINT for the Coming Year
This article examines the tools we're looking at for 2021 to further improve our investigative skills and to keep our OSINT community current on the latest resources. -
Data2Know Vol. 20 No. 2
$15.00Social Media Investigations: Documenting and Reporting
If you or your team is conducting social media investigations, you’ve likely spent an exhaustive amount of time learning how to search for, collect, and analyze information from social media profiles. In this article learn how to carefully and accurately document those findings for comprehensive report writing. -
Data2Know Vol. 20 No. 3
$15.00Your Online Digital Footprint -- How it Makes You Vulnerable
In this issue, Hg's Aine McCormack discusses our online digital footprint, and how to keep our cyber hygiene pristine. Exploring different social engineering tactics and social media best practices are amongst other things you'll find in the latest edition of Hetherington Group's Data2Know Newsletter! -
Data2Know Vol. 20 No. 4
$15.00Some of My Favorite Fraud Schemes
In this issue of Data2Know Newsletter, Hg's Cynthia dives into her favorite fraud schemes while the Hg team contributes to a new round of Industry Undercover tips. -
Online Intelligence Tips for Forensic Accounting Investigations This past year Cynthia Hetherington had the privilege to address The Canadian Institute of Chartered Business Valuators (https://cbvinstitute.com) on the topic of online and cyber investigation applications. CBV is intensely interested in work efficiency, excellent content, and the resources that can support those endeavors. Our session was a great success and was included in the CBV Journal of Business Valuation 2020 Edition. The following is an adaptation of the session and article, in hopes of providing beneficial knowledge to information professionals, accountants, researchers, and those cyber-curious truth seekers who, like CBV, value efficiency in their productivity.