Welcome!

News Feed Item

Hazelwood Street Consultants - Kidnap for Ransom and Extortion: Better Organized - More Dangerous Places

Semi-Annual World Assessment and Rankings

MIAMI, July 30, 2014 /PRNewswire/ -- Hazelwood Street Consultants, LLC, a global specialist in resolving kidnap-for-ransom and extortion cases for members of Lloyd's of London, multi-national corporations and private families, has released its Semi-Annual Kidnap for Ransom and Extortion Assessment of 229 countries – HIGHLIGHTING THE 24 MOST DANGEROUS COUNTRIES IN THE WORLD FOR Kidnapping for Ransom and Extortion.

Photo - http://photos.prnewswire.com/prnh/20140730/131921

"In closely analyzing intelligence relating to an estimated thirty thousand Kidnap for Ransom and Extortion incidents, twenty-four (24) countries have now been placed in the most dangerous category where the threat of Kidnapping for Ransom and Extortion is considered very high. Daily or nearly daily kidnappings and extortions are being recorded, and all but essential travel there is ill-advised," is the principal conclusion of the Assessment.

The list has expanded as criminal groups have begun to share victims with ideological actors in order to finance global terror as well as organized crime. The Assessment concludes that "The increasing fusion of ideological actors with common criminals, both seeking and dividing money for their activities, is producing marked spikes in Kidnapping for Ransom and Extortion in areas formerly though to be immune from such events. Indeed, the ideologues are training criminal organizations; refining their Kidnapping for Ransom and Extortion skills." Click here for full report.

Ambassador Cresencio Arcos, Chairman of Hazelwood Street and former acting United States Assistant Secretary of both Departments of Homeland Security and State said: "Kidnapping is like a cancer - it appears suppressed in one location, only to crop up in another. No part of the world can be declared definitively safe from the threat. Our mission is to secure the safe release of victims. Our Assessment will hopefully help keep people from harm's way."

We have also identified the growing relationship between terrorist organizations and the criminal organizations who traditionally finance their drug, human trafficking and weapons smuggling operations with KRE.

Twenty-five (25) countries fall into a category just below the worst, wherein the threat of Kidnap for Ransom and Extortion is high. The situation there is approaching alarming levels, and Kidnap for Ransom and Extortion events occur frequently (weekly or several times a week) and are an acknowledged concern for the local government.

The Assessment concludes that "The countries where Kidnap for Ransom and Extortion is the most endemic and occurs in the highest volumes are typically those in which wealthy locals are the primary victims. But, VISITORS BEWARE. Common factors include widespread police or government actor corruption and involvement in the event, as well as sheer incompetence in reporting; let alone adequately managing the problem as we often see in countries like Mexico and Nigeria."

"There is a statistically significant correlation between high incidences of Kidnap for Ransom and Extortion and law enforcement or government corruption, with the participation or some form of complicity by these same groups."

View full report at:  http://inform.hazelwoodstreet.com/semi-annual-world-kidnap-for-ransom-and-extortion-assessment-july-30-2014/

Multi-lingual (English, Spanish, Portuguese) interviews available.

CONTACT: Bruce Kaplan
Hazelwood Street Consultants
Phone +1-305-321-0021
[email protected]

SOURCE Hazelwood Street Consultants, LLC

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
In his session at Cloud Expo, Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, provideed economic scenarios that describe how the rapid adoption of software-defined everything including cloud services, SDDC and open networking will change GDP, industry growth, productivity and jobs. This session also included a drill down for several industries such as finance, social media, cloud service providers and pharmaceuticals.
In IT, we sometimes coin terms for things before we know exactly what they are and how they’ll be used. The resulting terms may capture a common set of aspirations and goals – as “cloud” did broadly for on-demand, self-service, and flexible computing. But such a term can also lump together diverse and even competing practices, technologies, and priorities to the point where important distinctions are glossed over and lost.
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
SYS-CON Events announced today that Dataloop.IO, an innovator in cloud IT-monitoring whose products help organizations save time and money, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Dataloop.IO is an emerging software company on the cutting edge of major IT-infrastructure trends including cloud computing and microservices. The company, founded in the UK but now based in San Fran...
Join Impiger for their featured webinar: ‘Cloud Computing: A Roadmap to Modern Software Delivery’ on November 10, 2016, at 12:00 pm CST. Very few companies have not experienced some impact to their IT delivery due to the evolution of cloud computing. This webinar is not about deciding whether you should entertain moving some or all of your IT to the cloud, but rather, a detailed look under the hood to help IT professionals understand how cloud adoption has evolved and what trends will impact th...
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, contrasted how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He showed how the immutable patterns helps developers do away with most of the complexity of config as code-enabling scenarios such as rollback, zero downtime upgrades with far greater simplicity. He also demoed building immutable pipelines in the cloud ...
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.