Guile & Deception as Kidnapping Tools

Most people when they think of a kidnapping think of a violent, dramatic event. The victim is ambushed, dragged from his car, threatened with weapons and restrained before being moved to a location where he is isolated. Many kidnappings do follow this model or something very similar. Speed, violence, “shock and awe” are effective tools…

3 Neglected Skillsets for Security

Today we are going to venture a little bit into the realm of corporate security.  I realize that many readers may not be as interested in this area and are focused more on individual protection.  No need to worry as two of the skillsets we are going to discuss are also very applicable to personal…

When 419 Fraud Gets Dangerous

Advanced fee fraud – commonly known as 419 fraud has been going on for years.  Most commonly manifested in the emails – and in the past faxes and letters – that the potential victims receive offering them an opportunity to get a large sum of money to facilitate the transfer of funds or provide some…

Loose Lips: Recognizing and Avoiding Elicitation

In discussing social engineering and threats to your personal security we mentioned elicitation.  Elicitation is a technique that is used by an adversary to get a person to unintentionally divulge more information about a particular subject than they normally would.  Its used to gather confidential or proprietary information and in the realm of personal security…