-
Russia Conflict Part 1: Global and Regional Threats
Russia continues to pose a threat of an expanded military conflict beyond Ukraine, with provocative intrusions and exercises against NATO…
-
Mail-Based Threats: Analysis and Management
Mail-based threats can come in many forms, such as explosive devices or lethal substances, and are often sent through parcel…
-
The TorchStone Watch in 2022
Whether in person or over social media, we’ve been overwhelmed by the amount of positive feedback we’ve received for the…
-
What Technology Can (and Can’t) Do for Hostile Surveillance
Criminals have always used technologies to help them commit their crimes. The internet has been especially accommodating in providing information…
-
Understanding Protest Movements
Understanding protest movements can give insight as to whether change will be successful. Crowd size, composition, and how protests are…
-
Kidnapping Part 4: Virtual Kidnapping
The fourth in a series that focuses on kidnapping, abductions do not actually occur in a virtual kidnapping. Instead, the…
-
Kidnapping Part 3: Express Kidnapping
The third in a series that focuses on kidnapping, express kidnappings do not follow the typical attack cycle. Carried out…
-
Kidnapping Part 1: Understanding Kidnapping Threats
Kidnapping is a global phenomenon and one that has many motivations. In this first installment, I discuss the different types…
-
Building Redundancies in Communications Amidst Growing Threat to Telecoms
There are elevated concerns over potential attacks on critical telecommunications infrastructure following suspected Russian sabotage of NordStream pipeline in late…
-
BBC Sounds: Burn Wild Podcast – The Line
In Blog onThere is a school of thought in activism—all movements need a radical flank to succeed. In the podcast, Burn Wild…
TorchStone Global > Blog