-
Kidnapping Part 2: High-Value Kidnapping for Ransom
The second in a series that focuses on kidnapping, high-value kidnappings for ransom are complex crimes that are both high…
-
Kidnapping Part 1: Understanding Kidnapping Threats
Kidnapping is a global phenomenon and one that has many motivations. In this first installment, I discuss the different types…
-
Building Redundancies in Communications Amidst Growing Threat to Telecoms
There are elevated concerns over potential attacks on critical telecommunications infrastructure following suspected Russian sabotage of NordStream pipeline in late…
-
BBC Sounds: Burn Wild Podcast – The Line
In Blog onThere is a school of thought in activism—all movements need a radical flank to succeed. In the podcast, Burn Wild…
-
How to Get on a Watchlist Episode 5: How to Kidnap an Executive
In Blog, Corporate Security on“How to get on a Watchlist” is a new podcast from the team at Encyclopedia Geopolitica. In this installment, How…
-
With drug cartel violence, is it safe to travel to Mexico? Security experts weigh in
In Blog onUS tourism is ramping up again in Mexico, but so are the headlines regarding drug cartel violence. TorchStone Vice President…
-
Perspectives on the Shinzo Abe Assassination
In Blog onPerspectives on the Shinzo Abe Assassination whitepaper from AT-RISK International, Emergent Risk International, Ontic and Torchstone Global analyzes the July…
-
Residential Security: A Layered Approach
Before beginning to design and implement any security program, it is important to first conduct a thorough baseline threat assessment.…
-
Countering Insider Threats and the “Little Hook”
One of the most effective techniques used by intelligence officers to recruit insiders as spies is known as the “little…
-
Messing With Their Heads: Manipulating and Detecting Hostile Surveillance
Security members and teams can employ aspects of the same tools professional intelligence officers use to identify hostile surveillants. Nearly…
TorchStone Global > Search results for ''