Blog

 

Expert blogs and articles to keep you on the leading edge of investigations and intelligence work.

Browse by:
4 Feb 2026

Digital Vulnerability is Not Siloed: OSINT has Entered a New Phase

Author: Cynthia Hetherington, MLS, MSM, CFE
OSINT, Knowledge Ecology, and the Myth of the Quick Fix Open-source intelligence is entering a new phase. The discipline is no longer defined primarily by collection or access, but by interpretation, amplification, and consequence. That shift reflects a deeper reality. OSINT now operates inside a...
Continue Reading
21 Jan 2026

Privacy Awareness Week: Limit Your Digital Exposure

Author: Brian Napierala
At Hetherington Group, we not only pride ourselves on the work that we do to help people regain their digital privacy, but we also educate people on things they can do going forward to limit their digital exposure. In honor of digital privacy week, we wanted to share some of our knowledge and...
Continue Reading
9 Jan 2026

Weaponized Open Sources: AI Viral Hoax with Real Consequences

Author: Cynthia Hetherington, MLS, MSM, CFE
In January 2026, Business Insider published an investigation detailing how a viral Reddit post alleging systemic exploitation inside a major food delivery platform was, in fact, an AI-driven hoax (Parmar, 2026). The anonymous poster claimed to be a whistleblower bound by a non-disclosure...
Continue Reading
5 Dec 2025

Looking Back: Hetherington Group’s Focus on Training and Digital Executive Protection

Author: Cynthia Hetherington, MLS, MSM, CFE
As 2025 draws to a close, one truth has become clear over the last 12 months: the need for open-source intelligence (OSINT) expertise and tradecraft only continues to grow. This year, Hetherington Group’s HG Training saw a record number of professionals trained in open-source...
Continue Reading
19 Nov 2025

Executive Risk: How Digital Executive Protection Mitigates Exposure

Author: Brian Napierala
The fear of physical violence is the main reason Executive Protection (EP) teams and Physical Security specialists reach out to Hg. As referenced in my previous two blogs, most people use our Digital Vulnerability Program because of fear of physical harm to themselves or their family....
Continue Reading