Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
ManagementSecurity Enterprise ServicesSecurity Leadership and Management

Our Executive is Missing: Kidnap and Ransom Basics for Security Professionals, Part 3

This is the third of a three-part series to help enterprise protective professionals understand how K&R can be successfully resolved.

By Steve Romano, Frank Figliuzzi
SEC1118-kidnap-Feat-slide1_900px
SEC1118-kidnap-slide2_900px
SEC1118-kidnap-slide3_900px
SEC1118-kidnap-Feat-slide1_900px
SEC1118-kidnap-slide2_900px
SEC1118-kidnap-slide3_900px
November 14, 2018

It may happen when you are least able to prevent it – when your executive or his family are alone and most vulnerable. Learning what to expect in the hours and days after an abduction will help you avoid becoming a bystander at a time when your leadership is most needed. The first article of this series focused on the early hours, activating your plan, confirming a kidnapping, engaging an expert consultant, establishing a negotiation operations center and selecting a communicator to receive ransom calls. The second article dove deeper into negotiation techniques and financial criteria. In this last article of the series we address engagement with law enforcement, victim families and the media.

 

Law Enforcement

One of the early critical decisions needed during a kidnapping is the degree your company will engage with law enforcement in the likely foreign jurisdiction of the incident. Law enforcement’s priorities, including the identification, apprehension and prosecution of the kidnappers, may impede effective negotiations. Police pressure can have a significant and negative impact on the time/money correlation that is present during all kidnappings for ransom. Corporations should strongly consider obtaining the services of a security consultant with a proven track record in ransom negotiations. These consultants already have established liaison with law enforcement and military in the countries where kidnap is most prevalent. 

The taking of a U.S. citizen hostage or a ransom demand made against the U.S. Government, regardless of the victim’s citizenship, is a violation of U.S. federal law. The FBI, through their Crisis Negotiation Unit, is recognized as the official negotiation arm of the American government. Under the direction of the U.S. Ambassador, the FBI is the lead agency for development and implementation of negotiation strategies, conduct of investigations and collection of evidence. The FBI will coordinate the government’s response to a kidnap but will not take over decision making. Key decisions, such as whether to pay ransom, always remain the responsibility of the victim’s family and/or company. The FBI will not provide the funds nor make the delivery of any ransom payment outside the United States. Corporations and families still must make these tough calls while managing the incident.

 

Know the Law

Some countries require mandatory notification to authorities that a kidnap occurred. Some countries mandate that you obtain their permission to negotiate with captors. Learning in advance the legal requirements in the countries where you have a presence could save precious time. A robust exchange of information with country authorities can result in permission to make a ransom payment when there is no other recourse for the victim’s safe release. Strong liaison can also help authorities realize that kidnap negotiation is an investigative tool that provides intelligence and creates potentially exploitable options for law enforcement. An accommodation can be reached wherein authorities agree to wait until the victim is safely recovered before pursuing the abductors. In turn, a victim’s company may promise to provide all available evidence and make the victim available for debriefing.

In most cases, cooperation with authorities should be the preferred option of a
victim’s company.  Cooperation is a two-way street that can build trust. A strong liaison with authorities can increase the company’s ability to influence law enforcement actions. This is most critical when there is a need to restrain officials from attempting high-risk rescues. Continuous contact with high-level trusted officials can reap both short- and long-term benefits.

 

Families

A company should prepare to expend a considerable amount of time and resources supporting, advising and protecting the victim’s family. First impressions are critical, and a company should give serious consideration as to which executive level official will make the initial in-person notification, and who will be assigned as the full-time family liaison for the duration of the incident. The victim’s family will feel isolated, perceive that information is being filtered and that the company is not doing enough to obtain their loved one’s release. These sentiments are quite common and understandable. It is essential for the company to form a united front with the family and to provide them realistic assessments and genuine assurances that they are equal players at the table.

As soon as possible there are two areas to address with the family. The first area is how to handle contact with the captors. The second topic involves the best approach to media inquiries. Contact from the captors with the family is very common and should be expected. Captors realize the emotional impact they can have when they manipulate victim’s family against the victim’s company. They know the family can pressure the company to quickly acquiesce to the captor’s demands. A company that provides the victim’s family with concrete guidelines can minimize the likelihood of orchestrated manipulation. Additionally, the family’s confidence in the company’s knowledge and competence increases when they can anticipate the adversaries’ strategy.

The family will also need media guidance and someone to act as a buffer during the kidnapping. Educate the family on the potential damage to negotiations that can be done by a spontaneous statement to the media. It might even be necessary to relocate the family for the duration of the incident to isolate them from a media onslaught.

 

Media

A Crisis Communication Plan should be an annex of your Crisis Management Plan. The media will ask three basic questions: What happened? How did it happen? What are you going to do about it? It is in your company’s best interest to respond to media inquiries. Failure to respond or delaying response makes the company look irresponsible, unconcerned or incompetent. Again, an experienced negotiation consultant can assist you with the best responses to media inquiries.

Your company’s communication department should craft holding statements for various crises in advance. Innocuous holding statements can help a company buy time to gather critical information. Financial details, ransom policies, insurance coverage and negotiation status should never be discussed with the media. It is also good policy to not publicly criticize any government’s response efforts.

Always provide information to the victim’s family before providing it to the media. Also focus on internal messaging for the “corporate family” of colleagues and co-workers who will not appreciate learning information through the media. There should be only one authorized spokesperson, and statements should be cleared with key partners before release. Don’t lie to the media. Take control and portray a posture of calm and confidence. Proactively anticipate media events and stories rather than merely reacting to them.

Companies responding to an international kidnapping will face the challenge of dealing with multiple governments, interacting with law enforcement agencies, victim families and the media. The safety of your victim employee may depend on your ability to successfully navigate the internal and external complexities of the crisis. Will you be ready? 

 


 

About the Authors

Steve Romano and Frank Figliuzzi help lead ETS Risk Management, Inc. They offer Security magazine readers complimentary C-Suite orientations to Kidnap & Ransom. ETS consults with global clients on Crisis Negotiations, Kidnap, and Workplace Violence. Romano was the FBI’s Chief Hostage Negotiator and a Vice President of Control Risks. Figliuzzi was the FBI’s Assistant Director for Counterintelligence and a Fortune 100 corporate security executive.

KEYWORDS: C-suite security Emergency Preparedness hostage negotiation international security kidnap and ransom

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Steve romano

Steve Romano is a contributing writer and is one of the leads for ETS Risk Management, Inc. Steve consults with global clients on Crisis Negotiations, Kidnap and Workplace Violence. Romano was the FBI’s Chief Hostage Negotiator and a Vice President of Control Risks.

Frank figliuzzi security magazine

Frank Figliuzzi is a 25 year FBI veteran who served as the Bureau’s Assistant Director for Counterintelligence. As Assistant Chief Security Officer for five years at General Electric, he helped build programs in investigations, insider threat, workplace violence prevention, and special event security for GE’s 300,000 employees in 180 countries. As Chief Operating Officer for ETS Risk Management, Inc., he consults with global clients on insider threat, investigations, intelligence, special events, executive protection and travel security.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Enterprise Services
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cybersecurity
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    New Security Technology
    By: Charles Denyer
Subscribe For Free!
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

  • Duty of Care
    Sponsored byAMAROK

    Integrating Technology and Physical Security to Advance Duty of Care

Popular Stories

White post office truck

Department of Labor Sues USPS Over Texas Whistleblower Termination

Internal computer parts

Critical Software Vulnerabilities Rose 37% in 2024

Coding

AI Emerges as the Top Concern for Security Leaders

Person working on laptop

Governance in the Age of Citizen Developers and AI

patient at healthcare reception desk

Almost Half of Healthcare Breaches Involved Microsoft 365

2025 Security Benchmark banner

Events

June 24, 2025

Inside a Modern GSOC: How Anthropic Benchmarks Risk Detection Tools for Speed and Accuracy

For today's security teams, making informed decisions in the first moments of a crisis is critical.

September 29, 2025

Global Security Exchange (GSX)

 

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • SEC1018-kidnap-Feat-slide1_900px

    Our Executive is Missing: Kidnap and Ransom Basics for Security Professionals, Part 2

    See More
  • SEC0918-kidnap-feature-slide1_900px

    Our Executive is Missing: Kidnap and Ransom Basics for Security Professionals

    See More
  • meeting2-900px.jpg

    Never Let the Protest Become the Event

    See More
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!