-
What Technology Can (and Can’t) Do for Hostile Surveillance
Criminals have always used technologies to help them commit their crimes. The internet has been especially accommodating in providing information…
-
Kidnapping Part 6: Crypto Kidnapping
The sixth in a series that focuses on kidnapping, crypto kidnappers are able to identify targets who hold large amounts…
-
Kidnapping Part 5: Tiger Kidnapping
The fifth in a series that focuses on kidnapping, tiger kidnappers use their victim to commit a second crime. Generally,…
-
Understanding Protest Movements
Understanding protest movements can give insight as to whether change will be successful. Crowd size, composition, and how protests are…
-
Kidnapping Part 4: Virtual Kidnapping
The fourth in a series that focuses on kidnapping, abductions do not actually occur in a virtual kidnapping. Instead, the…
-
Kidnapping Part 3: Express Kidnapping
The third in a series that focuses on kidnapping, express kidnappings do not follow the typical attack cycle. Carried out…
-
Pelosi Home Invasion: Security Take-Aways
Effective residential security planning utilizes a layered approach that begins on the outside and works in. When assessing a property,…
-
Kidnapping Part 2: High-Value Kidnapping for Ransom
The second in a series that focuses on kidnapping, high-value kidnappings for ransom are complex crimes that are both high…
-
Kidnapping Part 1: Understanding Kidnapping Threats
Kidnapping is a global phenomenon and one that has many motivations. In this first installment, I discuss the different types…
-
Building Redundancies in Communications Amidst Growing Threat to Telecoms
There are elevated concerns over potential attacks on critical telecommunications infrastructure following suspected Russian sabotage of NordStream pipeline in late…
TorchStone Global > Articles