Tag Archives: Cyber Security

Timely Tips for the OSINT Pro

By Hetherington Group The ability to uncover information on the internet is the primary skill of an online investigator. There are hundreds of thousands of surface, deep, and dark websites, but which are most pertinent to your unique case? Do you know how to utilize Google to its full potential? With new social media platforms […]

Killer Spittle: How DNA Testing Puts You at Risk

 By Cynthia Hetherington, MLS, MSM, CFE Online DNA and genealogy databases are multi-billion dollar industries offering a glimpse into one’s ancestry and heritage. GEDmatch, for example, provides search capabilities for ancestry, lost family members, and cold cases. It’s little wonder that armchair detectives eagerly attempt to solve crimes with open source DNA. GEDmatch is owned […]

Risk Monitoring: Twitter & Predictive Intelligence

by Matthew Golabek Today’s world has people afraid, angry, and traumatized by both COVID-19 and global events. It makes our jobs as investigators difficult. Fear of offending someone or being characterized as falsely reporting something has started to affect security—in and out of uniform. If a protest group is terrorizing the neighborhood or burning down […]

Risk Monitoring: Instagram & Predictive Intelligence

by Matthew Golabek Today’s world has people afraid, angry, and traumatized by both COVID-19 and global events. It makes our jobs as investigators difficult. Fear of offending someone or being characterized as falsely reporting something has started to affect security—in and out of uniform. If a protest group is terrorizing the neighborhood or burning down […]

Risk Monitoring: Facebook & Predictive Intelligence

by Matthew Golabek Today’s world has people afraid, angry, and traumatized by both COVID-19 and global events. It makes our jobs as investigators difficult. Fear of offending someone or being characterized as falsely reporting something has started to affect security—in and out of uniform. If a protest group is terrorizing the neighborhood or burning down […]

Info Exposed: Social Media–The Enemy in Your Home?

By Cynthia Hetherington Data, at its most annoying, is a commodity with social media sites selling your Likes to data providers. Data, at its most dangerous, allows terrorists and scammers—as near as your neighbor or from faraway lands—to farm from open sources the personal addresses of our military personnel to threaten them and their families. […]

Info Exposed: Identity Theft

By Cynthia Hetherington Data, at its most annoying, is a commodity with social media sites selling your Likes to data providers. Data, at its most dangerous, allows terrorists and scammers—as near as your neighbor or from faraway lands—to farm from open sources the personal addresses of our military personnel to threaten them and their families. […]

TikTok & Privacy: It’s Not Just About Mewing Kittens

By Trevor Morgan Designed for short video clips of content, TikTok is a new form of social media consumption that has taken the world by storm. This quickly growing China-based app has been at the forefront of smart-phone entertainment as of late, specifically during quarantine. If you’re a regular Hg follower on social media, you’re […]

Fraud in Mortgage Lending

By Trevor Morgan At the height of the housing crash and years to follow, the news was filled with horror stories about people trying to track down what company actually held their mortgage, banks overreporting stated income to bump up interest rates, and fraudulent “financial” companies scamming desperate homeowners facing foreclosure. Many lessons were learned, but that […]

Thursday Quick-hit Podcast: Chris Poulter

Introducing OSMOSIS Speaker Chris Poulter Get a sneak peak at the upcoming OSMOSIScon Globalcast session with Chris Poulter, whose expansive career has delivered OSINT training to multi-national teams that service strategic, operational, and tactical objectives. This week, Chris sits down with PI Perspectives’ podcast host Matthew Spaier to discuss his upcoming conference session, Using Social […]