Corporate SecurityEspionagePersonal PrivacyRecordingVideo Voyeurism Surreptitious Workplace Recording — and what to do about it Spy pen commonly used for surreptitious workplace recording. pdf download version Workplace recording threats: •…Kevin D. MurrayJune 26, 2024
Corporate SecurityTSCM TSCM Inspection Process You may already know that a thorough examination is necessary. You may suspect that there…Kevin D. MurrayJune 27, 2024
Corporate SecurityTSCM Continuous TSCM Monitoring vs. On-Site TSCM Audits Executive Summary 24/7 Radio Transmission Monitoring (RTM) systems are being marketed as a “Continuous TSCM”…Kevin D. MurrayJanuary 15, 2024
BluetoothCorporate SecurityCybersecurityEspionage Eavesdropping and Super Hearing Pucks Guess what all these superheroes have in common. Superman Wolverine Supergirl Power Girl Green Lantern…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionageTSCM Trade Secrets v. Confidential Information The non-existence of a trade secret asset: ‘confidential’ information by R. Mark Halligan, FisherBroyles LLP…Kevin D. MurrayNovember 16, 2023
Corporate SecurityCybersecurityDroneEspionageHistorical High-Stakes Corporate Espionage A $200 million deal turned into a tale of hidden microphones, drone encounters and covert…Kevin D. MurrayJune 17, 2023
Corporate SecurityEspionagePersonal PrivacyTSCM TSCM Security Inspections – Myths, Excuses & Reality Some myths and excuses really need to be debunked. Let's start with a really important…Kevin D. MurrayJuly 3, 2023
Corporate SecurityCybersecurityTSCM Flipper Zero – Corporate Security Threat What is Flipper Zero? Flipper Zero is a pocket-sized, open-source hardware security device designed for…Kevin D. MurrayMarch 15, 2023
Corporate SecurityCybersecurity How to Spot Counterfeit IT Gear When inspecting IT / MDF / IDF rooms for unauthorized equipment and connections be sure…Kevin D. MurrayJanuary 18, 2023
Corporate SecurityCybersecurityPersonal Privacy Spybuster Tip #823 – Wireless Key Fob Security Never let your wireless key fob out of your control. Wireless key fobs are useful.…Kevin D. MurrayJanuary 17, 2023
Corporate SecurityTSCM What are the benefits of a TSCM bug sweep? “What are the benefits of a TSCM bug sweep?” (pdf version) It is a common…Kevin D. MurrayNovember 13, 2022
Corporate SecurityTSCM How Can You Tell if You are Being Bugged? “How Can You Tell if You, or a Room, is Bugged?” (pdf version) How can…Kevin D. MurrayNovember 13, 2022
Corporate SecurityTSCM How is a TSCM Bug Sweep Conducted? How is a TSCM Bug Sweep Conducted? Are you being spied on? Do you need…Kevin D. MurrayNovember 12, 2023
Corporate SecurityCybersecurityEspionageTSCM Securing Cryptocurrency Offices from Eavesdropping and Espionage (PDF version) Securing cryptocurrency offices is a hot topic. Electronic surveillance (the spying kind) has…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionageHistoricalTSCM Corporate Espionage – The Missing Business School Courses This article was written around 1990. Now it is a nostalgic look at how some…Kevin D. MurrayNovember 13, 2022
Corporate SecurityFutureWatch Information Security as a Service (ISaaS) (PDF version) Why have ISaaS Free-world businesses know they have a problem. They are bleeding…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionageTSCM TSCM – The Other Covid Deep Clean The Other Covid Deep Clean is TSCM (.pdf version) Deep Clean sanitizing of offices and…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionage Quiz – Would You Make a Good Spy? Find out if you could be a good spy. Test yourself for fun. Learn what…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityPersonal PrivacyWi-Fi Wi-Fi Security Checklist (PDF version) Wi-Fi is the worst leaker since the Titanic. I have a saying, “Raise…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionageTSCM Malicious USB Cables (VIDEO) (Detection Instructions) The Background of Malicious USB Cables A malicious cable is any cable…Kevin D. MurraySeptember 26, 2024
Corporate SecurityPersonal PrivacyRecordingTSCM World’s Smallest Voice Recorder? (PDF version) Is this The World’s Smallest Voice Recorder? Specifications TileRec by ATTO Digital Ultra-small:…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityTSCM Hacked USB Charging Cables (pdf version) (VIDEO) What are hacked USB cables? They Appear Normal They Blend In They…Kevin D. MurrayNovember 15, 2022
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM USB Spy Cable Detector (PDF version) (VIDEO) These are the key measurements for identifying malicious spy cables. Measurements for…Kevin D. MurrayNovember 15, 2022
Corporate SecurityPersonal PrivacyTSCM Home Office Security Tips for Business (PDF version) Home office security vulnerabilities… Home offices lack the considerable security protections afforded by…Kevin D. MurrayNovember 13, 2022
Corporate SecurityTSCM TSCM Bug Sweeps… When and When Not To – Part I The following TSCM bug sweep advice is specifically meant for: Private Investigators, Security Directors, Security…Kevin D. MurrayAugust 17, 2024