
Security Intelligence
Kidnap Prevention for Executives: Personal Security That Reduces Risk | CloseProtectionHire
Practical kidnap prevention guide for executives in Mexico, Colombia, Nigeria, and other high-risk markets. Covers express kidnapping, virtual kidnapping, the surveillance-to-snatch pipeline, and the behaviour changes that reduce personal targeting risk.
Written by James Whitfield, Senior Security Consultant
Kidnapping is a business risk in a specific set of markets, not a remote possibility. Mexico, Venezuela, Colombia, Nigeria, and parts of Central America and West Africa have documented, structured kidnap industries targeting business travellers, executives, and expatriate workers. In some of these markets the criminal infrastructure is sophisticated: surveillance operations, dedicated holding facilities, financial extraction teams, and payment processing.
Prevention is the only reliable strategy. Kidnap-for-ransom response – K&R insurance, negotiators, crisis management – is the contingency when prevention fails. The prevention programme is operational security applied to personal movement.
Country Risk Context
Mexico records the highest documented kidnapping count globally (Control Risks Global Kidnap Report 2024). SESNSP 2024 statistics confirm Jalisco, Guanajuato, and Mexico City as the highest-incidence states. Kidnapping is not exclusively opportunistic – organised criminal groups affiliated with cartel structures conduct structured targeting operations. Business travellers are targeted for perceived wealth and reduced likelihood of police involvement.
Colombia has seen significant reduction since the 2016 FARC peace agreement, but the Policía Nacional de Colombia 2024 statistics confirm the ELN and AGC (FARC dissident groups) remain active in specific regions. Bogota and Medellin are substantially lower risk than rural and peri-urban areas, but express kidnapping in urban environments remains documented.
Nigeria is rated high-risk by OSAC’s Nigeria Country Security Report 2024, with Northwest and Northeast states particularly hazardous. Oil and gas sector employees are the primary target profile, but professional business travellers in Lagos face urban criminal targeting.
Venezuela has endemic kidnapping documented by InSight Crime’s Organised Crime in Venezuela 2023, with multiple actor types including organised criminal groups, security forces, and opportunistic criminals. FCDO travel advice recommends against all but essential travel to most of Venezuela.
The Targeting Cycle
Classical kidnap for ransom requires surveillance before the snatch – typically 48 to 72 hours of pattern-of-life collection. Surveillance collectors observe regular locations, timing patterns, vehicle, and protective arrangements. The implication is straightforward: an executive with a predictable schedule is easier and cheaper to target than one who varies it.
The prevention measures address each point in the targeting cycle:
- Route and timing variation. Leave the hotel at different times. Use different entry and exit points. Do not have the same vehicle and driver every day unless the driver and vehicle have been vetted and the route is actively changed.
- Accommodation security. Hotel name and room number should not appear in unencrypted communications. Check-in should not be conspicuous. Paying by corporate card rather than cash reduces the signal of available funds.
- Schedule information discipline. Meeting schedules should be communicated on a need-to-know basis. Detailed itineraries sent by unencrypted email create targeting data before the executive arrives.
- Driver and vehicle vetting. Vetted, security-approved transport providers are the single most important protective resource for business travellers in high-risk markets. Unvetted taxis and ride-hailing apps expose location data and create the pickup scenario most associated with express kidnapping.
Express Kidnapping
Express kidnapping is short-duration and financially driven – hours to a day, calibrated to ATM withdrawal limits rather than ransom negotiation. The pattern: the target is grabbed or coerced at a high-risk location (airport arrivals, hotel entrance, nightlife venue), driven to ATMs, forced to withdraw multiple times.
Prevention is behavioural. Vetted private transport from airport to hotel eliminates the highest-risk pickup location. Avoiding isolated cash machine withdrawals eliminates the funding mechanism. Not displaying high-value watches, jewellery, or phones reduces the initial targeting signal.
Virtual Kidnapping
Virtual kidnapping requires no physical control of the victim. The caller claims to hold a family member hostage and demands immediate payment – while the supposed hostage is unaware of the call and is elsewhere. The FBI documented this fraud pattern in June 2017, with the scheme active across the US-Mexico border and subsequently spreading to other markets.
The fraud mechanism is urgency: the caller insists the recipient stay on the line and not contact anyone. The correct response is to put the call on hold and immediately dial the supposed hostage’s confirmed number. If the hostage answers, the call is fraud. Family members of executives in high-risk posting countries should receive this briefing before the posting begins.
For the protective intelligence programme underpinning travel threat assessment, see our protective intelligence guide. For crisis management when a security incident requires corporate-level response, see our corporate crisis management guide.
For the upstream oil and gas operating environment – Niger Delta and Gulf of Guinea kidnap patterns, Iraq convoy security, ASIS 2012 armed security contractor management guidelines, PFEER Regulations, the UN Voluntary Principles, and K&R insurance retainer arrangements for long-duration postings – see our oil and gas upstream security guide.
James Whitfield is a Senior Security Consultant with 20 years of experience in executive protection, travel security, and kidnap risk management.
Key takeaways
Mexico records the highest documented kidnapping count globally -- Control Risks 2024 -- with organised criminal groups operating structured targeting operations
SESNSP 2024 statistics confirm Jalisco, Guanajuato, and Mexico City among the highest-incidence states. Kidnapping in Mexico is not exclusively opportunistic -- organised criminal groups including cartel affiliates conduct structured targeting operations that include surveillance, target selection based on perceived wealth, and logistics for holding and extraction. Business travellers are targeted because they are perceived as wealthier than local residents, less likely to involve the police, and more likely to have employer-funded payment capability. The threat profile requires specific pre-travel preparation, not just awareness.
The surveillance-to-snatch pipeline typically requires 48-72 hours of pattern-of-life collection -- disrupting routine is the most effective single control
Classical kidnap for ransom operations require surveillance of the target before the snatch. Surveillance collectors observe the target's regular locations, timing patterns, vehicle, and protective arrangements over multiple days. Varying arrival and departure times and routes, using different vehicles and entry/exit points, and avoiding predictable venues removes the predictability that surveillance relies on. An executive who leaves the hotel at the same time every morning in the same vehicle to the same destination provides a surveillance collector with a confirmed opportunity within 24 hours. An executive who varies all of these is significantly more difficult and expensive to target.
Express kidnapping is prevented by specific behaviours, not security guards -- vetted transport and avoided ATM exposure are the primary controls
Express kidnapping targets of opportunity at specific locations and times: unvetted taxis from airports and hotels, exposed ATM withdrawals in unfamiliar areas, late-night movement without confirmed transport, and isolated cash withdrawals following visible displays of jewellery or high-end phones. The prevention is behavioural. Vetted private transport from airport to hotel eliminates the highest-risk pickup scenario. Not using visible cash-dispensing machines in public areas eliminates the funding mechanism. The security programme for an executive in an express kidnapping environment prioritises these two controls above all others.
Virtual kidnapping exploits emotional response to bypass verification -- the correct response is to hang up and call the supposed hostage directly
A virtual kidnapping call creates extreme urgency and insists the recipient stay on the line and not contact anyone else. This is the fraud mechanism: verification collapses the scam. The correct response to any kidnap demand call is to immediately attempt to reach the supposed hostage by their confirmed number while the demand call is on hold or after disconnection. If the hostage answers, the call was a fraud. Family members of executives in high-risk markets should be briefed on this verification protocol before the posting begins -- the emotional urgency of a kidnap demand call makes it extremely difficult to think clearly in the moment without prior briefing.
Pre-departure OSINT reduction is as important as in-country behaviour -- hotel names and schedule data in unencrypted messages create targeting risk
An executive whose hotel name appears in a WhatsApp message to a client, whose LinkedIn profile shows a business trip to Lagos, and whose assistant sends a detailed arrival schedule by email has provided targeting information to anyone with access to those channels before the trip begins. Pre-departure OSINT reduction means: not posting destination information on social media, not including hotel names and flight details in unencrypted communications, briefing the executive's assistant on information security for travel scheduling, and reviewing any publicly visible itinerary information. The targeting may begin before the executive boards the plane.
Frequently Asked Questions
Request a Consultation
Describe your security requirements below. All enquiries are confidential and handled by licensed consultants.
Your enquiry has been received. A security consultant will contact you within 24 hours to discuss your requirements.
