Corporate SecurityEspionageTSCM How to Prevent Wireless Microphone Eavesdropping Jack was concerned about his job so he eavesdropped on the Board meetings. Joan makes…Kevin D. MurrayApril 14, 2022
Corporate SecurityGPS TrackingPersonal PrivacyTSCM Vehicle GPS Tracker Detection Corporations, high-profile individuals and government agencies routinely inspect their vehicles (limos, aircraft and yachts) for…Kevin D. MurrayApril 11, 2022
Corporate SecurityTSCM What are the benefits of a TSCM bug sweep? “What are the benefits of a TSCM bug sweep?” It is a common question people…Kevin D. MurrayMay 4, 2022
Corporate SecurityTSCM How Can You Tell if You are Being Bugged? “How Can You Tell if You, or a Room, is Bugged?” (pdf version) How can…Kevin D. MurrayAugust 23, 2021
Corporate SecurityTSCM How is a TSCM Bug Sweep Conducted? “How is a TSCM Bug Sweep Conducted?” (pdf version) Technical Surveillance Countermeasures (TSCM) is a…Kevin D. MurrayApril 12, 2022
Corporate SecurityPersonal PrivacyTSCM How Much Do TSCM Bug Sweeps Cost? “How much do TSCM bug sweeps cost?” (pdf version) The cost of a Technical Surveillance…Kevin D. MurrayNovember 15, 2021
Corporate SecurityPersonal PrivacyTSCM TSCM X-Ray Inspection (PDF version) Planting bugs, spy cameras, and other illegal surveillance devices is easy. Most come…Kevin D. MurrayAugust 3, 2021
Corporate SecurityEspionagePersonal PrivacyRecordingVideo Voyeurism Surreptitious Workplace Recording — and what to do about it Spy pen commonly used for surreptitious workplace recording. pdf download version Workplace recording threats: •…Kevin D. MurrayOctober 30, 2021
Corporate SecurityTSCM TSCM Inspection Process (.pdf version) You may already know that you need to conduct a thorough examination of…Kevin D. MurrayMay 4, 2022
Corporate SecurityCybersecurityEspionageTSCM Securing Cryptocurrency Offices from Eavesdropping and Espionage (PDF version) Securing cryptocurrency offices is a hot topic. Electronic surveillance (the spying kind) has…Kevin D. MurrayJanuary 19, 2022
Corporate SecurityCybersecurityPersonal PrivacyTSCM Hearing Aid Eavesdropping – How Grandma Hears Everything (PDF version) There is a new eavesdropping spy trick in town. Hearing aid eavesdropping. You…Kevin D. MurrayAugust 3, 2021
Corporate SecurityEspionageHistoricalTSCM Corporate Espionage – The Missing Business School Courses This article was written around 1990. Now it is a nostalgic look at how some…Kevin D. MurrayApril 12, 2022
Corporate SecurityFutureWatch Information Security as a Service (ISaaS) (PDF version) Why have ISaaS Free-world businesses know they have a problem. They are bleeding…Kevin D. MurrayAugust 3, 2021
Corporate SecurityCybersecurityEspionageTSCM TSCM – The Other Covid Deep Clean The Other Covid Deep Clean is TSCM (.pdf version) Deep Clean sanitizing of offices and…Kevin D. MurrayAugust 3, 2021
Corporate SecurityEspionage Quiz – Would You Make a Good Spy? Find out if you could be a good spy. Test yourself for fun. Learn what…Kevin D. MurrayAugust 3, 2021
Corporate SecurityCybersecurityTSCM IT Data Center TSCM Inspections (PDF version) The Average IT Data Center Security Precautions Thick concrete walls. Data, comms, and…Kevin D. MurrayAugust 3, 2021
Corporate SecurityCybersecurityPersonal PrivacyWi-Fi The FBI Hotel Wi-Fi Security Checklist A COVID 19-Driven Increase in Telework from Hotels Could Pose a Cyber Security Risk for…Kevin D. MurrayAugust 3, 2021
Corporate SecurityCybersecurityPersonal PrivacyWi-Fi Wi-Fi Security Checklist (PDF version) Wi-Fi is the worst leaker since the Titanic. I have a saying, “Raise…Kevin D. MurrayAugust 18, 2021
Corporate SecurityCybersecurityEspionageTSCM Malicious USB Cables (PDF version) The Background of Malicious USB Cables A malicious cable is any cable (electrical…Kevin D. MurrayMarch 11, 2022
Corporate SecurityPersonal PrivacyRecordingTSCM World’s Smallest Voice Recorder? (PDF version) Is this The World’s Smallest Voice Recorder? Specifications TileRec by ATTO Digital Ultra-small:…Kevin D. MurrayAugust 31, 2021
Corporate SecurityCybersecurityTSCM Hacked USB Charging Cables (pdf version) What are hacked USB cables? They Appear Normal They Blend In They Suck…Kevin D. MurrayFebruary 18, 2022
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM USB Spy Cable Detector (PDF version) These are the key measurements for identifying malicious spy cables. Measurements for a…Kevin D. MurrayNovember 5, 2021
Corporate SecurityPersonal PrivacyTSCM Home Office Security Tips for Business (PDF version) Home office security vulnerabilities… Home offices lack the considerable security protections afforded by…Kevin D. MurraySeptember 20, 2021
Corporate SecurityTSCM TSCM Bug Sweeps… When and When Not To – Part I The following TSCM bug sweep advice is specifically meant for: Private Investigators, Security Directors, Security…Kevin D. MurrayAugust 3, 2021
Corporate SecurityTSCM TSCM Bug Sweeps… When and When Not To – Part II The following TSCM inspection advice is specifically meant for: Private Investigators, Security Directors, Security Consultants,…Kevin D. MurrayAugust 3, 2021