AICorporate SecurityCybersecurityEspionage AI Lip Reading: Eavesdropping Without a Microphone or Laser Eavesdropping via lip reading has been around a long time, probably since Og saw Charlie…Kevin D. MurrayOctober 2, 2024
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM How to Choose a Competent TSCM Consultant: A Checklist & Tips How to Choose a Competent TSCM / Counterespionage Consultant Organizations need competent Technical Security Consultants…Kevin D. MurrayAugust 6, 2024
Corporate SecurityEspionagePersonal Privacy Spy Clues Spy Clues Are Important — Get to know the spy clues. Low-cost spy technology is…Kevin D. MurrayJuly 11, 2024
Corporate SecurityEspionagePersonal PrivacyTSCMWi-Fi 2.4 GHz Bug for Less Than $10 This 2.4 GHz bug is just one of many eavesdropping devices, GPS trackers and spy…Kevin D. MurrayJuly 11, 2024
EspionagePersonal PrivacyRecordingVideo VoyeurismWeird Spy Stories Weird Spy Stories Who doesn’t like a good spy story? They come in all types: action, true, fiction,…Kevin D. MurrayJuly 2, 2024
Corporate SecurityCybersecurityEspionage Holistic Information Security | Avoiding the IT Tunnel Vision Mistake IT vs. Security budget battle. Budget War: Holistic Information Security vs. IT Security Holistic information…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionage Economic Espionage Theory and Prevention via TSCM Economic espionage has been a part of your life for a long time. Do you…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionage Business Espionage: The Employee Competitor and What to Do About It Employee Competitors Stab Bosses in the Back Employee competitor stories begin like this: “I think…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionageTSCM Top 20 Corporate Espionage and Spy Techniques Protecting your business from corporate espionage spy techniques starts with knowing where to look. However,…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionageTSCM How to Prevent Wireless Microphone Eavesdropping Jack was concerned about his job, so he eavesdropped on the Board meetings. Joan made…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionageHistoricalTSCM Laser Beam Spying: Sci-Fi Bugs? Back in 1988, newspaper reports about laser beam eavesdropping swept the country. Our clients were…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionagePersonal PrivacyRecordingVideo Voyeurism Surreptitious Workplace Recording — and what to do about it Spy pen commonly used for surreptitious workplace recording. pdf download version Workplace recording threats: •…Kevin D. MurrayJune 26, 2024
BluetoothCorporate SecurityCybersecurityEspionage Eavesdropping and Super Hearing Pucks Guess what all these superheroes have in common. Superman Wolverine Supergirl Power Girl Green Lantern…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionageTSCM Trade Secrets v. Confidential Information The non-existence of a trade secret asset: ‘confidential’ information by R. Mark Halligan, FisherBroyles LLP…Kevin D. MurrayNovember 16, 2023
Corporate SecurityCybersecurityDroneEspionageHistorical High-Stakes Corporate Espionage A $200 million deal turned into a tale of hidden microphones, drone encounters and covert…Kevin D. MurrayJune 17, 2023
Corporate SecurityEspionagePersonal PrivacyTSCM TSCM Security Inspections – Myths, Excuses & Reality Some myths and excuses really need to be debunked. Let's start with a really important…Kevin D. MurrayJuly 3, 2023
Corporate SecurityCybersecurityEspionageTSCM Securing Cryptocurrency Offices from Eavesdropping and Espionage (PDF version) Securing cryptocurrency offices is a hot topic. Electronic surveillance (the spying kind) has…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionageHistoricalTSCM Corporate Espionage – The Missing Business School Courses This article was written around 1990. Now it is a nostalgic look at how some…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionageTSCM TSCM – The Other Covid Deep Clean The Other Covid Deep Clean is TSCM (.pdf version) Deep Clean sanitizing of offices and…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionage Quiz – Would You Make a Good Spy? Find out if you could be a good spy. Test yourself for fun. Learn what…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionageTSCM Malicious USB Cables (VIDEO) (Detection Instructions) The Background of Malicious USB Cables A malicious cable is any cable…Kevin D. MurraySeptember 26, 2024
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM USB Spy Cable Detector (PDF version) (VIDEO) These are the key measurements for identifying malicious spy cables. Measurements for…Kevin D. MurrayNovember 15, 2022
EspionageFutureWatchHistorical FutureWatch: Demise of the Old-Time Spies Old-Time Spies Not so long ago, old-time spy Secret Agent Man could globe-hop with impunity…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionage Trade Secret Protection Best Practices Trade secret protection is essential for two reasons. Instituting trade secret protection best practices reduces…Kevin D. MurrayAugust 1, 2024
Corporate SecurityEspionageHistorical A Cunning Plan to Protect the U.S. from Business Espionage Business Espionage: Headline news for decades now. We are bombarded with news stories and court…Kevin D. MurrayNovember 13, 2022