Corporate Security TSCM During Construction Projects During business construction projects there is a window of opportunity for installing bugs, taps, and…Kevin D. MurrayJune 27, 2024
TSCM Infrared Bug Detection | TSCM Technique | Pioneered by Murray Associates Thermal Emissions Spectrum Analysis as a Detection Technique for Finding Covert Electronic Surveillance Devices Infrared…Kevin D. MurrayJune 27, 2024
Corporate Security Corporate Counterespionage Strategy – The Basic Elements A basic Corporate Counterespionage Strategy is outlined here... Many companies are silently losing profits. This…Kevin D. MurrayJune 27, 2024
Corporate SecurityCybersecurityTSCM IT Data Center TSCM Inspections (PDF version) Typical IT Data Center Security Precautions Thick concrete walls. Data, comms, and power…Kevin D. MurrayJune 27, 2024
Corporate SecurityCybersecurityEspionage Holistic Information Security | Avoiding the IT Tunnel Vision Mistake IT vs. Security budget battle. Budget War: Holistic Information Security vs. IT Security Holistic information…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionage Economic Espionage Theory and Prevention via TSCM Economic espionage has been a part of your life for a long time. Do you…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionage Business Espionage: The Employee Competitor and What to Do About It Employee Competitors Stab Bosses in the Back Employee competitor stories begin like this: “I think…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionageTSCM Top 20 Corporate Espionage and Spy Techniques Protecting your business from corporate espionage spy techniques starts with knowing where to look. However,…Kevin D. MurrayJune 27, 2024
Corporate Security The $6.74 USB Cable Bug: An NSA-Style Device A USB cable bug for only $6.74... Amazing! A USB cable bug that costs less…Kevin D. MurrayJuly 11, 2024
Corporate Security Ten Business Counterespionage Tips Competitors Don’t Want You to Know (Part I) Business Counterespionage is built of the following premises: Business is competitive. Not everyone plays by…Kevin D. MurrayJune 27, 2024
Corporate Security Shred Bin Security – Yours Stinks – Fix It for Free Shred Bin Security — How to upgrade it... probably for free! If you have a…Kevin D. MurrayJune 27, 2024
Corporate Security Ten Business Counterespionage Tips Competitors Don’t Want You to Know (Part II) This is Part II of Ten Business Counterespionage Tips Competitors Don't Want You to Know.…Kevin D. MurrayJune 27, 2024
Corporate Security Ten Business Counterespionage Tips Competitors Don’t Want You to Know (Part III) This is Part III of Ten Business Counterespionage Tips Competitors Don't Want You to Know.…Kevin D. MurrayJune 27, 2024
Corporate SecurityGPS TrackingPersonal PrivacyTSCM Vehicle GPS Tracker Detection Corporations, high-profile individuals and government agencies routinely inspect their vehicles (limos, aircraft and yachts) for…Kevin D. MurrayJune 26, 2024
Corporate SecurityCybersecurityPersonal PrivacyTSCM Eavesdropping with Hearing Aids: How Grandma Hears Everything (PDF version) There is a new eavesdropping spy trick in town. Hearing aid eavesdropping. You…Kevin D. MurrayJune 27, 2024
BluetoothCybersecurityPersonal PrivacyTSCM Detecting Stalking Tags Detecting Apple AirTags, Tile Tags, and More Location tags, products like Apple AirTags and Tile…Kevin D. MurrayJune 27, 2024
Corporate SecurityCybersecurityInternet of ThingsWi-Fi The Knock-Out Punch Used to Disable WiFi Cameras This cheap "watch" is used by hackers and thieves to disable Wi-Fi cameras and other…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionageTSCM How to Prevent Wireless Microphone Eavesdropping Jack was concerned about his job, so he eavesdropped on the Board meetings. Joan made…Kevin D. MurrayJune 27, 2024
Corporate SecurityCybersecurityPersonal PrivacyWi-Fi The FBI Hotel Wi-Fi Security Checklist Increased Telework from Hotels Pose a Cyber Security Risk for Guests The Federal Bureau of…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionageHistoricalTSCM Laser Beam Spying: Sci-Fi Bugs? Back in 1988, newspaper reports about laser beam eavesdropping swept the country. Our clients were…Kevin D. MurrayJune 27, 2024
Corporate SecurityPersonal PrivacyTSCM How Much Do TSCM Bug Sweeps Cost? “How much do TSCM bug sweeps cost?” The cost of a Technical Surveillance Countermeasures (TSCM)…Kevin D. MurrayJune 3, 2024
Corporate SecurityPersonal Privacy How to Stop Acoustical Leakage Eavesdropping Acoustical Leakage: History It's the oldest form of eavesdropping. Defined as: “a back-formation from eavesdropper,…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionagePersonal PrivacyRecordingVideo Voyeurism Surreptitious Workplace Recording — and what to do about it Spy pen commonly used for surreptitious workplace recording. pdf download version Workplace recording threats: •…Kevin D. MurrayJune 26, 2024
Corporate SecurityTSCM TSCM Inspection Process You may already know that a thorough examination is necessary. You may suspect that there…Kevin D. MurrayJune 27, 2024