RMS International’s 2026 Threat Forecast

As 2026 approaches, public and private sector global security teams will operate under mounting stress originating from a hybrid of geopolitical tensions, infrastructure vulnerabilities, and emerging technologies that essentially collapse the boundary and threaten public and private sector verticals between digital and physical domains. The current security environment and potential 2026 technological and physical security disruptors will require senior leadership or board-level engagement, cross-functional coordination, and faster recovery cycles.

As 2026 unfolds, public and private sector global security teams will operate under mounting stress originating from a hybrid of geopolitical tensions, infrastructure vulnerabilities, and emerging technologies that essentially collapse the boundary and threaten public and private sector verticals between digital and physical domains. The current security environment and potential 2026 technological and physical security disruptors will require senior leadership or board-level engagement, cross-functional coordination, and faster recovery cycles.

Unsecure Supply Chains: Between the Dock and the Aisle

A $400,000 shipment of live lobsters stolen while in transit from Massachusetts to Midwest Costco stores highlights the growing scale, sophistication, and economic impact of organized cargo theft in the United States. Investigators believe the theft was deliberate and informed by inside knowledge of shipping schedules, reflecting a broader national trend in which criminal networks systematically target high-value goods moving through vulnerable points in the supply chain.

A $400,000 shipment of live lobsters stolen while in transit from Massachusetts to Midwest Costco stores highlights the growing scale, sophistication, and economic impact of organized cargo theft in the United States. Investigators believe the theft was deliberate and informed by inside knowledge of shipping schedules, reflecting a broader national trend in which criminal networks systematically target high-value goods moving through vulnerable points in the supply chain.