Digital Vulnerability is Not Siloed: OSINT has Entered a New Phase
OSINT, Knowledge Ecology, and the Myth of the Quick Fix Open-source intelligence is entering…
Read NowBackground Investigations
Background investigations and screenings for sound business decisions
Cyber Investigations
Uncover digital incidents that impact individuals and organizations
Due Diligence
Gain clarity and confidence in every business relationship
Intellectual Property
Safeguard intellectual property through investigations and intelligence
Consulting Services
Expert investigations and intelligence consulting services
Digital Vulnerability
Analyst-driven digital footprint removal for peace of mind and security
Risk Monitoring
Monitor online digital channels for brand and personal protection
Webinars
Training in OSINT tradecraft and digital investigative best practices
Online Courses
Online courses in open-source intelligence and digital investigations
Customized Training
Online Courses
Research on the backgrounds and credentials of foreign and domestic org.
Hetherington Group serves as a trusted intelligence and investigations partner to family offices, high-net-worth individuals and VIPs. We specialize in digital vulnerability intelligence, cyber investigations, and intellectual property protection, all designed specifically for the unique needs of affluent families and their private enterprises.
When privacy is paramount and reputation is non-negotiable, Hetherington Group delivers.
Family offices manage far more than wealth. They oversee generational legacies, private business interests, philanthropy, lifestyle logistics, and global assets. But with visibility comes risk. Unfortunately, family office executives, family members, and trusted employees are all potential targets for fraud, impersonation and worse – physical harm.
Hg’s experts operate quietly and effectively behind the scenes to reduce their digital footprint, identify threats, and mitigate online risk before it becomes a crisis.
Personally identifiable information (PII) is more accessible than ever due to data breaches and online data brokers. For VIPs and their families, this visibility can lead to harassment, doxxing, stalking, and other forms of targeted harm. But the risk is far more than PII exposure – its social media posts revealing locations, voter registration information and even political contributions.
Hg’s Digital Vulnerability Program goes beyond basic PII removal. It’s an analyst-driven service, designed for those who demand discretion and control of their full digital footprint:
Comprehensive PII Exposure Assessments
Custom Privacy Risk Reports
Continuous Monitoring and Online Information Removal
Customized Digital Hygiene Protocols and Training for Staff & Family
Hg provides intelligence and investigative services to reduce Family Office exposure, keeping their inner circle secure.
From financial fraud to harassment to reputational threats, Hg’s cyber investigations team supports family offices with precise intelligence when digital incidents occur.
Digital Attribution of Threats or Harassment
Social Media & Online Persona Tracking
Insider Risk & Leak Investigations
Forensic Asset Tracing & Fraud Investigations
Our investigations are conducted discreetly by highly skilled analysts, and in full compliance with applicable laws, ensuring the family office maintains control while we uncover the truth.
Family-owned brands, trademarks, or luxury product lines are often targets for counterfeiters and imposters. Our Intellectual Property Investigations team specializes in safeguarding the Family Office name, image, and enterprises.
Trademark Use Verification & Monitoring
Counterfeit & Lookalike Product Tracking
Unauthorized Domain & Social Profile Detection
Investigations for Cease & Desist or Legal Action
Whether protecting a brand or personal image, we work together with legal counsel or family office advisors to investigate, document, and act.
Hg protects what matters most – your people, your assets and your family.
Business
Due Diligence
Develop investigative due diligence skills using
Open-Source Intelligence (OSINT) & the CRAWL framework.
Foundations
of OSINT
Take your investigative and intelligence skills to the next level through Open-Source Intelligence (OSINT) training
Applied
Data Analytics in OSINT
Learn & master programming & non-programming techniques to collect, analyze & interpret open-source data.
OSINT, Knowledge Ecology, and the Myth of the Quick Fix Open-source intelligence is entering…
Read Now
At Hetherington Group, we not only pride ourselves on the work that we do…
Read Now
In January 2026, Business Insider published an investigation detailing how a viral Reddit post alleging systemic…
Read Now
As 2025 draws to a close, one truth has become clear over the last…
Read NowBackground Investigations
Background investigations and screenings for sound business decisions
Cyber Investigations
Uncover digital incidents that impact individuals and organizations
Due Diligence
Gain clarity and confidence in every business relationship
Intellectual Property
Safeguard intellectual property through investigations and intelligence
Consulting Services
Expert investigations and intelligence consulting services
Digital Vulnerability
Analyst-driven digital footprint removal for peace of mind and security
Risk Monitoring
Monitor online digital channels for brand and personal protection
Webinars
Training in OSINT tradecraft and digital investigative best practices
Online Courses
Online courses in open-source intelligence and digital investigations
Customized Training
Online Courses
Research on the backgrounds and credentials of foreign and domestic org.