Digital Vulnerability is Not Siloed: OSINT has Entered a New Phase
OSINT, Knowledge Ecology, and the Myth of the Quick Fix Open-source intelligence is entering…
Read NowBackground Investigations
Background investigations and screenings for sound business decisions
Cyber Investigations
Uncover digital incidents that impact individuals and organizations
Due Diligence
Gain clarity and confidence in every business relationship
Intellectual Property
Safeguard intellectual property through investigations and intelligence
Consulting Services
Expert investigations and intelligence consulting services
Digital Vulnerability
Analyst-driven digital footprint removal for peace of mind and security
Risk Monitoring
Monitor online digital channels for brand and personal protection
Webinars
Training in OSINT tradecraft and digital investigative best practices
Online Courses
Online courses in open-source intelligence and digital investigations
Customized Training
Online Courses
Research on the backgrounds and credentials of foreign and domestic org.
Personal digital exposure shouldn’t be the price of living in a connected world. Today, personal security risk goes beyond exposed addresses and phone numbers. It’s in metadata, geotags, and social connections. It’s in online behavior patterns, leaked credentials, forgotten accounts, and personal affiliations that can be traced, linked, or exploited. A photo can reveal location habits. A donation can disclose political leanings. A family member’s profile can open a backdoor.
Safeguarding principals and their families require vigilance that extends beyond physical security and protection. Online vulnerabilities can be used by people wanting to infringe upon an executive’s personal and private life.
Hetherington Group’s Digital Vulnerability Program (DVP) moves beyond personally identifiable information (PII) removal. While PII removal is the first step in the process, Hg’s Digital Vulnerability Program goes deeper, removing personal information from social media, government sites and other online platforms that may expose personal details. Our Digital Vulnerability Program is geared toward C-Suite executives, high net worth individuals and VIPs who want to keep their online presence private.
DVP is a hands-on, analyst-led service rooted in deep investigative expertise and open-source intelligence tradecraft. We work directly with security teams, high net worth individuals and VIPs to understand their concerns and needs related to privacy. Our team then conducts comprehensive digital assessments, removes sensitive data, and implements continuous monitoring across platforms.
Our approach removes the digital footprint of not only executives, but their immediate family members as well. This provides the executive with not only peace of mind, but the security team with the ability to operate proactively, not reactively. It helps return a sense of normalcy to the executive, giving them the confidence that new digital exposures will be found and removed quickly.
Executive & Family Digital Footprint Assessment
across surface, deep, and dark web sources
Information Removal
from PII aggregators, breached databases, public records, and social media
Continuous Monitoring & Takedown
of new exposures with monthly analyst- led briefings and reports
Digital Hygiene Training
for executive protection staff, corporate security, and family members
Dedicated Analyst Support
DVP is a critical extension of any executive protection or security strategy, providing an analyst-driven approach that complements physical security efforts. We don’t just monitor online data. We interpret the implications of its exposure, ensuring security teams have the context and intelligence needed to act. This means executives and their families are not left wondering what kind of risk a new exposure could cause to their safety and security.
Protecting privacy shouldn’t mean living in lockdown. With our Digital Vulnerability Program, executive, VIPs, high net worth individuals and their families can live normally, while continuous monitoring, removal and response are handled by experienced analysts. Their security detail is also empowered to operate from a position of strength, supported by continuous intelligence and trusted analysis.
Risk
Monitoring
Our Risk Monitoring service delivers persistent, online monitoring of digital channels to identify potential threats and exposures to executives, their families, and organization’s brand. Risk Monitoring provides persistent visibility into digital information exposures and risk across the platforms that matter most, backed by expert analysts who understand the needs of your principal and company.
Cyber
Investigations
Digital threats often carry real-world consequences. Our cyber investigations uncover the source of online harassment, impersonation, fraud, and data exposure. Rooted in the CRAWL™ method, our investigations deliver clear attribution and digital evidence. This empowers clients with the information needed to understand a threat, and take decisive action.
Consulting
Services
At Hetherington Group, our consulting services are built on more than two decades of trusted investigative experience. We partner with corporations, professional services firms, and government entities to advise on complex intelligence needs, build internal capabilities, and develop proactive risk mitigation strategies.
OSINT, Knowledge Ecology, and the Myth of the Quick Fix Open-source intelligence is entering…
Read Now
At Hetherington Group, we not only pride ourselves on the work that we do…
Read Now
In January 2026, Business Insider published an investigation detailing how a viral Reddit post alleging systemic…
Read Now
In my previous blog, we covered the importance of a comprehensive strategy for Digital Executive…
Read NowBackground Investigations
Background investigations and screenings for sound business decisions
Cyber Investigations
Uncover digital incidents that impact individuals and organizations
Due Diligence
Gain clarity and confidence in every business relationship
Intellectual Property
Safeguard intellectual property through investigations and intelligence
Consulting Services
Expert investigations and intelligence consulting services
Digital Vulnerability
Analyst-driven digital footprint removal for peace of mind and security
Risk Monitoring
Monitor online digital channels for brand and personal protection
Webinars
Training in OSINT tradecraft and digital investigative best practices
Online Courses
Online courses in open-source intelligence and digital investigations
Customized Training
Online Courses
Research on the backgrounds and credentials of foreign and domestic org.