Corporate SecurityEspionagePersonal Privacy Spy Clues Spy Clues Are Important — Get to know the spy clues. Low-cost spy technology is…Kevin D. MurrayJuly 11, 2024
Corporate SecurityEspionagePersonal PrivacyTSCMWi-Fi 2.4 GHz Bug for Less Than $10 This 2.4 GHz bug is just one of many eavesdropping devices, GPS trackers and spy…Kevin D. MurrayJuly 11, 2024
Corporate Security TSCM During Construction Projects During business construction projects there is a window of opportunity for installing bugs, taps, and…Kevin D. MurrayJune 27, 2024
Corporate Security Corporate Counterespionage Strategy – The Basic Elements A basic Corporate Counterespionage Strategy is outlined here... Many companies are silently losing profits. This…Kevin D. MurrayJune 27, 2024
Corporate SecurityCybersecurityTSCM IT Data Center TSCM Inspections (PDF version) Typical IT Data Center Security Precautions Thick concrete walls. Data, comms, and power…Kevin D. MurrayJune 27, 2024
Corporate SecurityCybersecurityEspionage Holistic Information Security | Avoiding the IT Tunnel Vision Mistake IT vs. Security budget battle. Budget War: Holistic Information Security vs. IT Security Holistic information…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionage Economic Espionage Theory and Prevention via TSCM Economic espionage has been a part of your life for a long time. Do you…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionage Business Espionage: The Employee Competitor and What to Do About It Employee Competitors Stab Bosses in the Back Employee competitor stories begin like this: “I think…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionageTSCM Top 20 Corporate Espionage and Spy Techniques Protecting your business from corporate espionage spy techniques starts with knowing where to look. However,…Kevin D. MurrayJune 27, 2024
Corporate Security The $6.74 USB Cable Bug: An NSA-Style Device A USB cable bug for only $6.74... Amazing! A USB cable bug that costs less…Kevin D. MurrayJuly 11, 2024
Corporate Security Ten Business Counterespionage Tips Competitors Don’t Want You to Know (Part I) Business Counterespionage is built of the following premises: Business is competitive. Not everyone plays by…Kevin D. MurrayJune 27, 2024
Corporate Security Shred Bin Security – Yours Stinks – Fix It for Free Shred Bin Security — How to upgrade it... probably for free! If you have a…Kevin D. MurrayJune 27, 2024
Corporate Security Ten Business Counterespionage Tips Competitors Don’t Want You to Know (Part II) This is Part II of Ten Business Counterespionage Tips Competitors Don't Want You to Know.…Kevin D. MurrayJune 27, 2024
Corporate Security Ten Business Counterespionage Tips Competitors Don’t Want You to Know (Part III) This is Part III of Ten Business Counterespionage Tips Competitors Don't Want You to Know.…Kevin D. MurrayJune 27, 2024
Corporate SecurityGPS TrackingPersonal PrivacyTSCM Vehicle GPS Tracker Detection Corporations, high-profile individuals and government agencies routinely inspect their vehicles (limos, aircraft and yachts) for…Kevin D. MurrayJune 26, 2024
Corporate SecurityCybersecurityPersonal PrivacyTSCM Eavesdropping with Hearing Aids: How Grandma Hears Everything (PDF version) There is a new eavesdropping spy trick in town. Hearing aid eavesdropping. You…Kevin D. MurrayJune 27, 2024
Corporate SecurityCybersecurityInternet of ThingsWi-Fi The Knock-Out Punch Used to Disable WiFi Cameras This cheap "watch" is used by hackers and thieves to disable Wi-Fi cameras and other…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionageTSCM How to Prevent Wireless Microphone Eavesdropping Jack was concerned about his job, so he eavesdropped on the Board meetings. Joan made…Kevin D. MurrayJune 27, 2024
Corporate SecurityCybersecurityPersonal PrivacyWi-Fi The FBI Hotel Wi-Fi Security Checklist Increased Telework from Hotels Pose a Cyber Security Risk for Guests The Federal Bureau of…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionageHistoricalTSCM Laser Beam Spying: Sci-Fi Bugs? Back in 1988, newspaper reports about laser beam eavesdropping swept the country. Our clients were…Kevin D. MurrayJune 27, 2024
Corporate SecurityPersonal PrivacyTSCM How Much Do TSCM Bug Sweeps Cost? “How much do TSCM bug sweeps cost?” The cost of a Technical Surveillance Countermeasures (TSCM)…Kevin D. MurrayJune 3, 2024
Corporate SecurityPersonal Privacy How to Stop Acoustical Leakage Eavesdropping Acoustical Leakage: History It's the oldest form of eavesdropping. Defined as: “a back-formation from eavesdropper,…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionagePersonal PrivacyRecordingVideo Voyeurism Surreptitious Workplace Recording — and what to do about it Spy pen commonly used for surreptitious workplace recording. pdf download version Workplace recording threats: •…Kevin D. MurrayJune 26, 2024
Corporate SecurityTSCM TSCM Inspection Process You may already know that a thorough examination is necessary. You may suspect that there…Kevin D. MurrayJune 27, 2024
Corporate SecurityTSCM Continuous TSCM Monitoring vs. On-Site TSCM Audits Executive Summary 24/7 Radio Transmission Monitoring (RTM) systems are being marketed as a “Continuous TSCM”…Kevin D. MurrayJanuary 15, 2024