BluetoothCybersecurityPersonal PrivacyTSCM Detect Stalking Tags Detecting Apple AirTags, Tile Tags, and More Location tags, products like Apple AirTags and Tile…Kevin D. MurrayAugust 17, 2023
Corporate SecurityEspionagePersonal PrivacyTSCM TSCM Security Inspections – Myths, Excuses & Reality Some myths and excuses really need to be debunked. Let's start with a really important…Kevin D. MurrayJuly 3, 2023
Corporate SecurityCybersecurityPersonal Privacy Spybuster Tip #823 – Wireless Key Fob Security Never let your wireless key fob out of your control. Wireless key fobs are useful.…Kevin D. MurrayJanuary 17, 2023
Corporate SecurityEspionagePersonal PrivacyTSCMWi-Fi 2.4 GHz Bug for Under $10 This 2.4 GHz bug is just one of many eavesdropping devices, GPS trackers and spy…Kevin D. MurrayAugust 4, 2023
Personal PrivacyTSCM Is This a Bug? Updated September 2023 "Is this a bug?" is a question we are often asked. Usually…Kevin D. MurraySeptember 19, 2023
Corporate SecurityGPS TrackingPersonal PrivacyTSCM Vehicle GPS Tracker Detection Corporations, high-profile individuals and government agencies routinely inspect their vehicles (limos, aircraft and yachts) for…Kevin D. MurrayNovember 13, 2022
Corporate SecurityPersonal PrivacyTSCM How Much Do TSCM Bug Sweeps Cost? “How much do TSCM bug sweeps cost?” (pdf version) The cost of a Technical Surveillance…Kevin D. MurrayNovember 13, 2022
Corporate SecurityPersonal PrivacyTSCM TSCM X-Ray Inspection (PDF version) Planting bugs, spy cameras, and other illegal surveillance devices is easy. Most come…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionagePersonal PrivacyRecordingVideo Voyeurism Surreptitious Workplace Recording — and what to do about it Spy pen commonly used for surreptitious workplace recording. pdf download version Workplace recording threats: •…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityPersonal PrivacyTSCM Hearing Aid Eavesdropping – How Grandma Hears Everything (PDF version) There is a new eavesdropping spy trick in town. Hearing aid eavesdropping. You…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityPersonal PrivacyWi-Fi The FBI Hotel Wi-Fi Security Checklist A COVID 19-Driven Increase in Telework from Hotels Could Pose a Cyber Security Risk for…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityPersonal PrivacyWi-Fi Wi-Fi Security Checklist (PDF version) Wi-Fi is the worst leaker since the Titanic. I have a saying, “Raise…Kevin D. MurrayNovember 13, 2022
EspionagePersonal PrivacyRecordingVideo VoyeurismWeird Spy Stories Weird Spy Stories Who doesn’t like a good spy story? (The audience remains silent.) They come in all…Kevin D. MurrayNovember 13, 2022
GPS TrackingPersonal PrivacyTSCM World’s Smallest GPS Tracker Updated on 11/01/2022 (PDF version) The world’s smallest GPS trackers can be incredibly small. Once…Kevin D. MurrayNovember 13, 2022
Corporate SecurityPersonal PrivacyRecordingTSCM World’s Smallest Voice Recorder? (PDF version) Is this The World’s Smallest Voice Recorder? Specifications TileRec by ATTO Digital Ultra-small:…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM USB Spy Cable Detector (PDF version) (VIDEO) These are the key measurements for identifying malicious spy cables. Measurements for…Kevin D. MurrayNovember 15, 2022
Corporate SecurityPersonal PrivacyTSCM Home Office Security Tips for Business (PDF version) Home office security vulnerabilities… Home offices lack the considerable security protections afforded by…Kevin D. MurrayNovember 13, 2022
Personal PrivacyTSCMVideo Voyeurism Hidden Camera Detectors – Do They Work? Spy Camera Detector History updated 7/1/2022 How can I find hidden cameras? (Click above to…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityPersonal Privacy Off-Site Meeting Information Security (PDF version) Corporate off-site meetings are prime targets for infiltration and information theft. Resorts and…Kevin D. MurrayNovember 13, 2022
CybersecurityPersonal PrivacySmartphone Security 19 Clues Your Smartphone is Infected with Spyware and 15 Prevention Tips Spyware Detection Tips (.pdf version) Cell phones have secret lives. When we are not using…Kevin D. MurrayNovember 13, 2022
Corporate SecurityPersonal Privacy How to Stop Acoustical Leakage Eavesdropping Acoustical Leakage History It's the oldest form of eavesdropping. Defined as: “a back-formation from eavesdropper,…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM Information Security v. Spies – How We Got This Way Evolution of the Spy Generation Spying as a method of getting ahead in business, was…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionagePersonal Privacy Spy Clues Spy Clues are Important — Get to know the spy clues. From businesses to governments,…Kevin D. MurrayNovember 13, 2022
Personal PrivacySmartphone Security Eavesdropping Snoops – The Average Person’s Guide to Stopping Them Updated March 2023 Become the Ultimate Eavesdrop Detector The average person’s guide to stopping eavesdropping…Kevin D. MurrayMarch 30, 2023
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM How to Choose a Competent TSCM Consultant How to Choose a Competent TSCM / Counterespionage Consultant Organizations need competent Technical Security Consultants…Kevin D. MurrayMay 3, 2023