• Look up: Cell Phone Number

    Social security numbers have been the mainstay of investigators since Hank Asher, the legendary father of data fusion, gave us the investigative data tool DBTxp. The social security number is the personal indicator that helps us identify one individual among millions. The cellular phone number, another one-out-of-a million identifying number, is likewise useful for locating a person, however, the cell number is not protected—and, should you dial that cell number, there’s far greater chance your intended subject will answer it.
  • Public Records Search Pitfalls

    This article focuses on some of the pitfalls that the modern investigator needs to be wary of when it comes to public record searching. Learn some of the issues you may come across and how to avoid them. Additional commentary from experts in the public records fields gives further insight into the public records industry.  
  • The Business of Finding Business Assets Business assets can be held in many ways—and buried in even more ways. Among the many creative money management methods available, business assets can be legally held in a foreign country, as a corporate shell, or a personal trust. Assets can be liquid (cash or easily converted to cash), intangible (hard to find or evaluate), or hidden (tucked way not to be found). Typical assets controlled by a business include: Real Property; Personal Property; Investments and Trusts (Financial Assets); Intellectual Property; and Subsidiaries/Spin-offs. For those assets that can be located, a discussion of some practical search procedures follows. Each asset type is examined, with examples of how to search for and investigate them. what you pay for.  
  • Locate Bank Accounts Legally

    Bank accounts for sale? Every day we receive advertising that offers to find someone’s bank account information—completely legally and FCRA compliant. It's still hard to figured out how this is possible to accomplish. Because it isn't. So what ways are legal, ethical and will get results?    
  • Professional's Review of Public Record Aggregators

    The collection of available public record aggregators span a range—from quick, no-nonsense, pay-as-you-go websites to high-end subscription services (that require compliance with Federal laws). The services reviewed here are useful for the investigative industry, including private investigators, bounty hunters, collection agents, law enforcement, fraud, and compliance research. For any of these specialists, choosing where to invest your database budget is a serious consideration: the results of these services have a direct impact on your cases—and you get what you pay for.    
  • Searching For Videos & Images On The Internet

    In this issue of Data2Know.com, we have guest contributing author and OsInt officer Janiece Mondale providing us with two articles of her Open source news content. Of the many articles Ms. Mondale has authored, these pieces collate best practices for online intelligence professionals to conquer the overwhelming amount of content on the internet.

  • Best of People Search and Company Search Engines

    Today’s commodity is data. Everyone is selling a specialized database in their particular arena. Our job as investigators is to find that database; doing so will greatly enhance our skills and give us the edge to set us apart from the rest.
  • Using Sayari Graph for Investigations

    This article examines the use of Sayari for intelligence analysts and corporate risk management professionals to collect, extract, and analyze data across borders and languages. Sayari can be used for due diligence to reduce risk or to enter a new market, to meet compliance or regulatory requirements, or to prevent fraud, financial crimes, and corruption.
  • DNA: The New Open Source

    This article examines how the growing trend of DNA testing can help the investigator, but also may be a damaging unwanted intrusion on personal privacy. We discuss how to protect yourself and how to remove any DNA you have left behind.
  • TikTok: An OSINT Tool of Today's Youth

    This article examines the quickly growing Chinese app and how from an open source intelligence perspective, this novelty app provides researchers and investigators with a plethora of knowledge and useful information.
  • Predictive Intelligence How-To's

    This article examines the step-by-step key methods for how to properly use social media platforms to monitor location-specific events.
  • What the APP?! Top Social Media APPS and the Lowdown on What Info They Collect

    Starting a new health and fitness routine? Need to get to the library, but your car is in the shop? Has your 12-year-old son been grounded from receiving photos from his friends on his smartphone but appears unaffected by it? Booking a trip to Bermuda? Or, are you stepping out of your single’s lifestyle and looking for love?

    All of these questions have one thing in common that a mere 10 years ago did not exist: There’s an app for that!

    This Hg FactSheet gives you a foundational understanding of what these APPS collect, better preparing you to protect yourself.

Title

Go to Top