-
Mail-Based Threats: Analysis and Management
Mail-based threats can come in many forms, such as explosive devices or lethal substances, and are often sent through parcel…
-
The TorchStone Watch in 2022
Whether in person or over social media, we’ve been overwhelmed by the amount of positive feedback we’ve received for the…
-
What Technology Can (and Can’t) Do for Hostile Surveillance
Criminals have always used technologies to help them commit their crimes. The internet has been especially accommodating in providing information…
-
Understanding Protest Movements
Understanding protest movements can give insight as to whether change will be successful. Crowd size, composition, and how protests are…
-
Kidnapping Part 4: Virtual Kidnapping
The fourth in a series that focuses on kidnapping, abductions do not actually occur in a virtual kidnapping. Instead, the…
-
Kidnapping Part 3: Express Kidnapping
The third in a series that focuses on kidnapping, express kidnappings do not follow the typical attack cycle. Carried out…
-
Kidnapping Part 1: Understanding Kidnapping Threats
Kidnapping is a global phenomenon and one that has many motivations. In this first installment, I discuss the different types…
-
Building Redundancies in Communications Amidst Growing Threat to Telecoms
There are elevated concerns over potential attacks on critical telecommunications infrastructure following suspected Russian sabotage of NordStream pipeline in late…
-
How to Get on a Watchlist Episode 5: How to Kidnap an Executive
In Blog, Corporate Security on“How to get on a Watchlist” is a new podcast from the team at Encyclopedia Geopolitica. In this installment, How…
-
Countering Insider Threats and the “Little Hook”
One of the most effective techniques used by intelligence officers to recruit insiders as spies is known as the “little…