-
Kidnapping Part 5: Tiger Kidnapping
The fifth in a series that focuses on kidnapping, tiger kidnappers use their victim to commit a second crime. Generally,…
-
Understanding Protest Movements
Understanding protest movements can give insight as to whether change will be successful. Crowd size, composition, and how protests are…
-
Kidnapping Part 4: Virtual Kidnapping
The fourth in a series that focuses on kidnapping, abductions do not actually occur in a virtual kidnapping. Instead, the…
-
Kidnapping Part 3: Express Kidnapping
The third in a series that focuses on kidnapping, express kidnappings do not follow the typical attack cycle. Carried out…
-
Pelosi Home Invasion: Security Take-Aways
Effective residential security planning utilizes a layered approach that begins on the outside and works in. When assessing a property,…
-
Kidnapping Part 2: High-Value Kidnapping for Ransom
The second in a series that focuses on kidnapping, high-value kidnappings for ransom are complex crimes that are both high…
-
Kidnapping Part 1: Understanding Kidnapping Threats
Kidnapping is a global phenomenon and one that has many motivations. In this first installment, I discuss the different types…
-
Building Redundancies in Communications Amidst Growing Threat to Telecoms
There are elevated concerns over potential attacks on critical telecommunications infrastructure following suspected Russian sabotage of NordStream pipeline in late…
-
Residential Security: A Layered Approach
Before beginning to design and implement any security program, it is important to first conduct a thorough baseline threat assessment.…
-
Countering Insider Threats and the “Little Hook”
One of the most effective techniques used by intelligence officers to recruit insiders as spies is known as the “little…
TorchStone Global > Articles