-
Business Continuity Concerns Amidst Taiwan-U.S. Meeting Part 1
Taiwanese President Tsai Ing-wen is set to meet with the US Speaker of the House, Kevin McCarthy, during a stopover…
-
Russia Conflict Part 1: Global and Regional Threats
Russia continues to pose a threat of an expanded military conflict beyond Ukraine, with provocative intrusions and exercises against NATO…
-
Busting Myths Surrounding Joaquin “El Chapo” Guzmán Loera
There are many myths surrounding Mexico's cartels—Joaquín Guzmán Loera, known as “El Chapo” in particular. The article debunks the myth…
-
Mail-Based Threats: Analysis and Management
Mail-based threats can come in many forms, such as explosive devices or lethal substances, and are often sent through parcel…
-
The TorchStone Watch in 2022
Whether in person or over social media, we’ve been overwhelmed by the amount of positive feedback we’ve received for the…
-
What Technology Can (and Can’t) Do for Hostile Surveillance
Criminals have always used technologies to help them commit their crimes. The internet has been especially accommodating in providing information…
-
Kidnapping Part 6: Crypto Kidnapping
The sixth in a series that focuses on kidnapping, crypto kidnappers are able to identify targets who hold large amounts…
-
Kidnapping Part 5: Tiger Kidnapping
The fifth in a series that focuses on kidnapping, tiger kidnappers use their victim to commit a second crime. Generally,…
-
Understanding Protest Movements
Understanding protest movements can give insight as to whether change will be successful. Crowd size, composition, and how protests are…