-
Kidnapping Part 3: Express Kidnapping
Read moreThe third in a series that focuses on kidnapping, express kidnappings do not follow the typical attack cycle. Carried out…
-
Pelosi Home Invasion: Security Take-Aways
Read moreEffective residential security planning utilizes a layered approach that begins on the outside and works in. When assessing a property,…
-
Kidnapping Part 2: High-Value Kidnapping for Ransom
Read moreThe second in a series that focuses on kidnapping, high-value kidnappings for ransom are complex crimes that are both high…
-
Kidnapping Part 1: Understanding Kidnapping Threats
Read moreKidnapping is a global phenomenon and one that has many motivations. In this first installment, I discuss the different types…
-
Building Redundancies in Communications Amidst Growing Threat to Telecoms
Read moreThere are elevated concerns over potential attacks on critical telecommunications infrastructure following suspected Russian sabotage of NordStream pipeline in late…
-
Residential Security: A Layered Approach
Read moreBefore beginning to design and implement any security program, it is important to first conduct a thorough baseline threat assessment.…
-
Countering Insider Threats and the “Little Hook”
Read moreOne of the most effective techniques used by intelligence officers to recruit insiders as spies is known as the “little…
-
Messing With Their Heads: Manipulating and Detecting Hostile Surveillance
Read moreSecurity members and teams can employ aspects of the same tools professional intelligence officers use to identify hostile surveillants. Nearly…
-
Cyber Security and Human Vulnerability
Read moreKeeping a company safe from cyber attacks often only includes technical security such as properly installed hardware with up-to-date firmware,…
-
Propaganda of the Deed: Contextualizing the Buffalo Attack
Read moreThe shooting in Buffalo, NY exemplifies how white supremacists use the internet to broadcast their attacks to spotlight their radicalized…