Corporate SecurityCybersecurityDroneEspionageHistorical High-Stakes Corporate Espionage A $200 million deal turned into a tale of hidden microphones, drone encounters and covert…Kevin D. MurrayJune 17, 2023
Corporate SecurityEspionagePersonal PrivacyTSCM TSCM Security Inspections – Myths, Excuses & Reality Some myths and excuses really need to be debunked. Let's start with a really important…Kevin D. MurrayJuly 3, 2023
Corporate SecurityEspionageTSCM Top 20 Corporate Espionage Spy Techniques Protecting your business from corporate espionage spy techniques starts with knowing where to look. However,…Kevin D. MurrayApril 14, 2023
Corporate SecurityEspionagePersonal PrivacyTSCMWi-Fi 2.4 GHz Bug for Under $10 This 2.4 GHz bug is just one of many eavesdropping devices, GPS trackers and spy…Kevin D. MurrayAugust 4, 2023
Corporate SecurityEspionageTSCM How to Prevent Wireless Microphone Eavesdropping Jack was concerned about his job so he eavesdropped on the Board meetings. Joan makes…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionagePersonal PrivacyRecordingVideo Voyeurism Surreptitious Workplace Recording — and what to do about it Spy pen commonly used for surreptitious workplace recording. pdf download version Workplace recording threats: •…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionageTSCM Securing Cryptocurrency Offices from Eavesdropping and Espionage (PDF version) Securing cryptocurrency offices is a hot topic. Electronic surveillance (the spying kind) has…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionageHistoricalTSCM Corporate Espionage – The Missing Business School Courses This article was written around 1990. Now it is a nostalgic look at how some…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionageTSCM TSCM – The Other Covid Deep Clean The Other Covid Deep Clean is TSCM (.pdf version) Deep Clean sanitizing of offices and…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionage Quiz – Would You Make a Good Spy? Find out if you could be a good spy. Test yourself for fun. Learn what…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionageTSCM Malicious USB Cables (PDF version) (VIDEO) (Detection Instructions) The Background of Malicious USB Cables A malicious cable is…Kevin D. MurrayNovember 15, 2022
EspionagePersonal PrivacyRecordingVideo VoyeurismWeird Spy Stories Weird Spy Stories Who doesn’t like a good spy story? (The audience remains silent.) They come in all…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM USB Spy Cable Detector (PDF version) (VIDEO) These are the key measurements for identifying malicious spy cables. Measurements for…Kevin D. MurrayNovember 15, 2022
EspionageFutureWatchHistorical FutureWatch: Demise of the Old-Time Spies Old-Time Spies Not so long ago, old-time spy Secret Agent Man could globe-hop with impunity…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionage Trade Secret Protection Best Practices Trade secret protection is essential for two reasons. Instituting trade secret protection best practices reduces…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionageHistorical A Cunning Plan to Protect the U.S. from Business Espionage Business Espionage: Headline news for decades now. We are bombarded with news stories and court…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM Information Security v. Spies – How We Got This Way Evolution of the Spy Generation Spying as a method of getting ahead in business, was…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionageHistoricalTSCM Laser Beam Spying – Sci-Fi Bugs? (pdf version) Back in 1988, newspaper reports about laser beam eavesdropping swept the country. Our…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionagePersonal Privacy Spy Clues Spy Clues are Important — Get to know the spy clues. From businesses to governments,…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionage USB Stick Warnings USB Memory Stick News Reports Before we jump into the USB memory security recommendations, a…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionageTSCM Economic Espionage | How to Fight Back Economic Espionage is no secret. Corporations are having their pockets picked, big time. Corporate espionage,…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionage Extortionography What is Extortionography? Extortionography: Using audio / video / photographic evidence for personal or monetary…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionageTSCM Best TSCM Practices for Enterprise Organizations TSCM best practices for enterprise organizations are different than those for single locations. They have…Kevin D. MurrayJuly 2, 2023
Corporate SecurityCybersecurityEspionage Holistic Information Security | Avoiding the IT Tunnel Vision Mistake IT v Security budget battle. Budget War: Holistic Information Security v. IT Security Holistic information…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionage Economic Espionage Theory and Prevention via TSCM Economic espionage has been in your life forever. Remember your very first real economic espionage…Kevin D. MurrayNovember 13, 2022