-
Pelosi Home Invasion: Security Take-Aways
Effective residential security planning utilizes a layered approach that begins on the outside and works in. When assessing a property,…
-
Kidnapping Part 2: High-Value Kidnapping for Ransom
The second in a series that focuses on kidnapping, high-value kidnappings for ransom are complex crimes that are both high…
-
Kidnapping Part 1: Understanding Kidnapping Threats
Kidnapping is a global phenomenon and one that has many motivations. In this first installment, I discuss the different types…
-
Building Redundancies in Communications Amidst Growing Threat to Telecoms
There are elevated concerns over potential attacks on critical telecommunications infrastructure following suspected Russian sabotage of NordStream pipeline in late…
-
Residential Security: A Layered Approach
Before beginning to design and implement any security program, it is important to first conduct a thorough baseline threat assessment.…
-
Countering Insider Threats and the “Little Hook”
One of the most effective techniques used by intelligence officers to recruit insiders as spies is known as the “little…
-
Messing With Their Heads: Manipulating and Detecting Hostile Surveillance
Security members and teams can employ aspects of the same tools professional intelligence officers use to identify hostile surveillants. Nearly…
-
The Global Food Crisis and Political Risk in Private Sector Risk Assessments
The possible resumption of Ukrainian grain exports will only moderate the global food crisis, not resolve it. Weather and other…
-
Cyber Threats Part 5: Supply Chain Attacks
The fifth in a five-part cyber threat series focuses on supply chain attacks. This indirect approach will exploit a weakness…
-
Why is Protective Intelligence Effective?
Action is always faster than reaction. Therefore, the advantage will be with the security team who can prevent an incident…
TorchStone Global > Articles