• On Your Trademark, Get Set, Go!

    When it comes to trademark investigations, there’s one word that sticks out: use. Identifying first use, last use, and/or continuous use are the single most important factors in determining trademark rights. Hg's Senior Analyst Jake Pennington highlights the need-to-knows of Trademark use in this issue of Hg's Data2Know newsletter.
  • Public Records vs. Public Information

    In this issue of Data2Know, we discuss the difference between public records and public information. This article deals with the mistrust of the database services available and the need to get as close as possible to the individual subject and their paperwork.  
  • Connecting The Dots

    In this issue of Data2Know, our main article is "Connecting the Dots," an activity that transcends all of the investigative fields. This article focuses on the methods and tools available to investigators when it comes to being thorough and "connecting the dots" in their investigations.
  • Real Time Searches

    In this issue of Data2Know, the focus is on real time searches and how to track a spy online. Learn about all of the sites that are extremely useful in real time searches and how they operate, along with their strengths and weaknesses.  
  • Fraudulent E-mail

    In this issue of Data2Know, our main article is entitled, "Winning at the Shell Game." This issue focuses on fraudulent e-mails, or "phish." Here, we discuss how to detect a phish and how to protect yourself from falling victim to these fraudulent people or groups.
  • Public Record Searches

    In this issue of Data2Know, the reader can expect to find a details article on public record searches and computer databases. Here, we take you through all the most commonly-used online sources, explaining each source, including its strengths and weaknesses.
  • Trackle.com

    Get an in-depth look at Trackle and its capabilities when it comes to monitoring a person, a topic of interest, and other specifics all over the Web.  
  • Investigating with Facebook

    In this issue of Data2Know, the method of investigating within Facebook—along with some other interesting tricks—is revealed. Learn specific techniques for the investigator using Facebook as a viable source, along with common sense, cautions, and caveats.
  • Social Networking

    In this issue of Data2Know, we focus on the world of social networks and the best, most strategic ways to gather the most intelligence from them.
  • Facebook Confessions, Part 1

    In this issue of Data2Know we begin our two-part article on "Facebook Confessions." This initial Facebook issue deals with the history of the social network and social networking user caveats.  
  • Facebook Confessions, Part 2

    In this issue of Data2Know, we continue our article on "Facebook Confessions" and this time deal with cyber bullying and identity theft. Learn the steps to protecting your identity from being stolen online, as well as how to see the signs of and ward off online stalking and harassment.

Title

Go to Top