AICorporate SecurityCybersecurityEspionage AI Lip Reading: Eavesdropping Without a Microphone or Laser Eavesdropping via lip reading has been around a long time, probably since Og saw Charlie…Kevin D. MurrayOctober 2, 2024
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM How to Choose a Competent TSCM Consultant: A Checklist & Tips How to Choose a Competent TSCM / Counterespionage Consultant Organizations need competent Technical Security Consultants…Kevin D. MurrayAugust 6, 2024
Corporate SecurityPersonal PrivacyTSCM TSCM Wiki TSCM Wiki (AI powered) The TSCM Wiki is the most comprehensive Technical Surveillance Countermeasures knowledge…Kevin D. MurrayAugust 5, 2024
Corporate SecurityEspionagePersonal Privacy Spy Clues Spy Clues Are Important — Get to know the spy clues. Low-cost spy technology is…Kevin D. MurrayJuly 11, 2024
Corporate SecurityEspionagePersonal PrivacyTSCMWi-Fi 2.4 GHz Bug for Less Than $10 This 2.4 GHz bug is just one of many eavesdropping devices, GPS trackers and spy…Kevin D. MurrayJuly 11, 2024
Corporate Security TSCM During Construction Projects During business construction projects there is a window of opportunity for installing bugs, taps, and…Kevin D. MurrayJune 27, 2024
Corporate Security Corporate Counterespionage Strategy – The Basic Elements A basic Corporate Counterespionage Strategy is outlined here... Many companies are silently losing profits. This…Kevin D. MurrayJune 27, 2024
Corporate SecurityCybersecurityTSCM IT Data Center TSCM Inspections (PDF version) Typical IT Data Center Security Precautions Thick concrete walls. Data, comms, and power…Kevin D. MurrayJune 27, 2024
Corporate SecurityCybersecurityEspionage Holistic Information Security | Avoiding the IT Tunnel Vision Mistake IT vs. Security budget battle. Budget War: Holistic Information Security vs. IT Security Holistic information…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionage Economic Espionage Theory and Prevention via TSCM Economic espionage has been a part of your life for a long time. Do you…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionage Business Espionage: The Employee Competitor and What to Do About It Employee Competitors Stab Bosses in the Back Employee competitor stories begin like this: “I think…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionageTSCM Top 20 Corporate Espionage and Spy Techniques Protecting your business from corporate espionage spy techniques starts with knowing where to look. However,…Kevin D. MurrayJune 27, 2024
Corporate Security The $6.74 USB Cable Bug: An NSA-Style Device A USB cable bug for only $6.74... Amazing! A USB cable bug that costs less…Kevin D. MurrayJuly 11, 2024
Corporate Security Ten Business Counterespionage Tips Competitors Don’t Want You to Know (Part I) Business Counterespionage is built of the following premises: Business is competitive. Not everyone plays by…Kevin D. MurrayJune 27, 2024
Corporate Security Shred Bin Security – Yours Stinks – Fix It for Free Shred Bin Security — How to upgrade it... probably for free! If you have a…Kevin D. MurrayJune 27, 2024
Corporate Security Ten Business Counterespionage Tips Competitors Don’t Want You to Know (Part II) This is Part II of Ten Business Counterespionage Tips Competitors Don't Want You to Know.…Kevin D. MurrayJune 27, 2024
Corporate Security Ten Business Counterespionage Tips Competitors Don’t Want You to Know (Part III) This is Part III of Ten Business Counterespionage Tips Competitors Don't Want You to Know.…Kevin D. MurrayJune 27, 2024
Corporate SecurityGPS TrackingPersonal PrivacyTSCM Vehicle GPS Tracker Detection Corporations, high-profile individuals and government agencies routinely inspect their vehicles (limos, aircraft and yachts) for…Kevin D. MurrayJune 26, 2024
Corporate SecurityCybersecurityPersonal PrivacyTSCM Eavesdropping with Hearing Aids: How Grandma Hears Everything (PDF version) There is a new eavesdropping spy trick in town. Hearing aid eavesdropping. You…Kevin D. MurrayJune 27, 2024
Corporate SecurityCybersecurityInternet of ThingsWi-Fi The Knock-Out Punch Used to Disable WiFi Cameras This cheap "watch" is used by hackers and thieves to disable Wi-Fi cameras and other…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionageTSCM How to Prevent Wireless Microphone Eavesdropping Jack was concerned about his job, so he eavesdropped on the Board meetings. Joan made…Kevin D. MurrayJune 27, 2024
Corporate SecurityCybersecurityPersonal PrivacyWi-Fi The FBI Hotel Wi-Fi Security Checklist Increased Telework from Hotels Pose a Cyber Security Risk for Guests The Federal Bureau of…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionageHistoricalTSCM Laser Beam Spying: Sci-Fi Bugs? Back in 1988, newspaper reports about laser beam eavesdropping swept the country. Our clients were…Kevin D. MurrayJune 27, 2024
Corporate SecurityPersonal PrivacyTSCM How Much Do TSCM Bug Sweeps Cost? “How much do TSCM bug sweeps cost?” The cost of a Technical Surveillance Countermeasures (TSCM)…Kevin D. MurrayJune 3, 2024
Corporate SecurityPersonal Privacy How to Stop Acoustical Leakage Eavesdropping Acoustical Leakage: History It's the oldest form of eavesdropping. Defined as: “a back-formation from eavesdropper,…Kevin D. MurrayJune 27, 2024