-
Russia Conflict Part 1: Global and Regional Threats
Read moreRussia continues to pose a threat of an expanded military conflict beyond Ukraine, with provocative intrusions and exercises against NATO…
-
Kidnapping Part 6: Crypto Kidnapping
Read moreThe sixth in a series that focuses on kidnapping, crypto kidnappers are able to identify targets who hold large amounts…
-
Kidnapping Part 5: Tiger Kidnapping
Read moreThe fifth in a series that focuses on kidnapping, tiger kidnappers use their victim to commit a second crime. Generally,…
-
Understanding Protest Movements
Read moreUnderstanding protest movements can give insight as to whether change will be successful. Crowd size, composition, and how protests are…
-
Kidnapping Part 4: Virtual Kidnapping
Read moreThe fourth in a series that focuses on kidnapping, abductions do not actually occur in a virtual kidnapping. Instead, the…
-
Kidnapping Part 3: Express Kidnapping
Read moreThe third in a series that focuses on kidnapping, express kidnappings do not follow the typical attack cycle. Carried out…
-
Pelosi Home Invasion: Security Take-Aways
Read moreEffective residential security planning utilizes a layered approach that begins on the outside and works in. When assessing a property,…
-
Kidnapping Part 2: High-Value Kidnapping for Ransom
Read moreThe second in a series that focuses on kidnapping, high-value kidnappings for ransom are complex crimes that are both high…
-
Kidnapping Part 1: Understanding Kidnapping Threats
Read moreKidnapping is a global phenomenon and one that has many motivations. In this first installment, I discuss the different types…
-
Building Redundancies in Communications Amidst Growing Threat to Telecoms
Read moreThere are elevated concerns over potential attacks on critical telecommunications infrastructure following suspected Russian sabotage of NordStream pipeline in late…