Return to Article Details Strategies for disguise in written threatening communications and ransom demands: an analysis of English and German texts Download Download PDF