-
The TorchStone Watch in 2022
Whether in person or over social media, we’ve been overwhelmed by the amount of positive feedback we’ve received for the…
-
What Technology Can (and Can’t) Do for Hostile Surveillance
Criminals have always used technologies to help them commit their crimes. The internet has been especially accommodating in providing information…
-
Understanding Protest Movements
Understanding protest movements can give insight as to whether change will be successful. Crowd size, composition, and how protests are…
-
Kidnapping Part 4: Virtual Kidnapping
The fourth in a series that focuses on kidnapping, abductions do not actually occur in a virtual kidnapping. Instead, the…
-
Kidnapping Part 3: Express Kidnapping
The third in a series that focuses on kidnapping, express kidnappings do not follow the typical attack cycle. Carried out…
-
Kidnapping Part 1: Understanding Kidnapping Threats
Kidnapping is a global phenomenon and one that has many motivations. In this first installment, I discuss the different types…
-
Building Redundancies in Communications Amidst Growing Threat to Telecoms
There are elevated concerns over potential attacks on critical telecommunications infrastructure following suspected Russian sabotage of NordStream pipeline in late…
-
BBC Sounds: Burn Wild Podcast – The Line
In Blog onThere is a school of thought in activism—all movements need a radical flank to succeed. In the podcast, Burn Wild…
-
How to Get on a Watchlist Episode 5: How to Kidnap an Executive
In Blog, Corporate Security on“How to get on a Watchlist” is a new podcast from the team at Encyclopedia Geopolitica. In this installment, How…
-
With drug cartel violence, is it safe to travel to Mexico? Security experts weigh in
In Blog onUS tourism is ramping up again in Mexico, but so are the headlines regarding drug cartel violence. TorchStone Vice President…
TorchStone Global > Blog