• Barbarians @ The Gate

    This article’s title, Barbarians @ The Gate, refers to the threats that any security officer responsible for the safety of people, property, and reputation faces. Are you ignoring social media because it’s bad, it is too much information, or you feel you are smarter than that to use it?  
  • Know Your Candidate

    Discretion is imperative in investigative work. Locating any and all information on opposing parties is viewed as clandestine and made for TV espionage, no matter how open source and obvious the investigating may be. Kim’s accounting of her case and the client’s behavior—and most importantly, the research tactics she used—should serve as a primer for your future candidate investigation cases.
  •  

    Due Diligence Investigations: A Primer

    Due diligence investigations give a thorough reporting about a subject, based on the client’s needs. Truthfully, an investigator is hired to bring a sense of both resolution and comfort to the client. Prior to an investigation, the client is in a state of flux; unsure, the client does not fully know or understand the circumstances around a person, an event, or a company. An investigator is hired to conduct an investigation, producing information that will help the client be comfortable with the decisions he or she must make. It is the client’s desire to learn more that drives them to our office.
  • Google & Friends for Locating Public Information

    This article examines the creative searching features and offerings provided by search engines. Using these advanced techniques greatly enhances the searching of public information. Learn how to get the most out of Google; it's preferred results, operators, symbol functions, proximity searching and more.  
  • Finding Assets Online Some of the hardest work an investigator can do is asset searches. With bank accounts and trust funds protected by federal law, finding creative and legal methods for locating leads is definitely the way to go. This is not a comprehensive article on all the ways to search for assets. It is a primer on how to use well known OSINT and social media resources for finding money.  
  • Protecting Your Image Online

    With a good Google search, somebody can find where you live, discover your likes and dislikes, learn what you do with your free time, or what others might think of you. Perhaps even habits you would likely not want known, particularly by coworkers. It is a serious matter for anyone, professional or otherwise, concerned with their own personal security. Have you Googled yourself lately? https://www.hetheringtongroup.com/product/data2know-vol-15-no-8/
  • Twitter Bots & Stolen Identities

    Every day, thousands of real identities are stolen and sold as reconstructed trolls that like and retweet content daily—for the cost of a few pennies. This special issue explores how online bots are used to steal identities and examines the impact of social media bots in politics, celebrity lives, and commerce.    
  • Best of People Search and Company Search Engines

    Today’s commodity is data. Everyone is selling a specialized database in their particular arena. Our job as investigators is to find that database; doing so will greatly enhance our skills and give us the edge to set us apart from the rest.
  • What the APP?! Top Social Media APPS and the Lowdown on What Info They Collect

    Starting a new health and fitness routine? Need to get to the library, but your car is in the shop? Has your 12-year-old son been grounded from receiving photos from his friends on his smartphone but appears unaffected by it? Booking a trip to Bermuda? Or, are you stepping out of your single’s lifestyle and looking for love?

    All of these questions have one thing in common that a mere 10 years ago did not exist: There’s an app for that!

    This Hg FactSheet gives you a foundational understanding of what these APPS collect, better preparing you to protect yourself.
  • COVID Scams While billions of people are under stay-at-home and work from home orders, predators are taking advantage of people’s fears, anxiety, and losses at mind-numbing proportions. Children, who are now spending more time online for schooling, are targets for exploitation by pedophiles. Seniors are vulnerable from financial scams, and businesses are vulnerable from hacking, phishing, and cybercrimes. We are committed to serve the public by providing information on the latest scams, exploitation, and fraudulent activities as we are all in this together.
  • Social Media and Employees

    When it comes to social media, are our work lives and our personal lives one and the same? Would we feel comfortable having our potential – or even current – employer perusing our social media posts? Hg's Manager of Investigations Rachel Kronenfeld and team highlight the legal possibilities and limitations of a social media review of an employee in this issue of Hg's Data2Know newsletter.
  • On Your Trademark, Get Set, Go!

    When it comes to trademark investigations, there’s one word that sticks out: use. Identifying first use, last use, and/or continuous use are the single most important factors in determining trademark rights. Hg's Senior Analyst Jake Pennington highlights the need-to-knows of Trademark use in this issue of Hg's Data2Know newsletter.

Title

Go to Top