Corporate SecurityCybersecurityTSCM IT Data Center TSCM Inspections (PDF version) The Average IT Data Center Security Precautions Thick concrete walls. Data, comms, and…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionageTSCM Malicious USB Cables (PDF version) (VIDEO) (Detection Instructions) The Background of Malicious USB Cables A malicious cable is…Kevin D. MurrayNovember 15, 2022
GPS TrackingPersonal PrivacyTSCM World’s Smallest GPS Tracker Updated on 1/15/2024 (PDF version) The world’s smallest GPS trackers can be incredibly small. Once…Kevin D. MurrayJanuary 15, 2024
Corporate SecurityPersonal PrivacyRecordingTSCM World’s Smallest Voice Recorder? (PDF version) Is this The World’s Smallest Voice Recorder? Specifications TileRec by ATTO Digital Ultra-small:…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityTSCM Hacked USB Charging Cables (pdf version) (VIDEO) What are hacked USB cables? They Appear Normal They Blend In They…Kevin D. MurrayNovember 15, 2022
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM USB Spy Cable Detector (PDF version) (VIDEO) These are the key measurements for identifying malicious spy cables. Measurements for…Kevin D. MurrayNovember 15, 2022
Corporate SecurityPersonal PrivacyTSCM Home Office Security Tips for Business (PDF version) Home office security vulnerabilities… Home offices lack the considerable security protections afforded by…Kevin D. MurrayNovember 13, 2022
Corporate SecurityTSCM TSCM Bug Sweeps… When and When Not To – Part I The following TSCM bug sweep advice is specifically meant for: Private Investigators, Security Directors, Security…Kevin D. MurrayNovember 13, 2022
Corporate SecurityTSCM TSCM Bug Sweeps… When and When Not To – Part II The following TSCM inspection advice is specifically meant for: Private Investigators, Security Directors, Security Consultants,…Kevin D. MurrayNovember 13, 2022
TSCMWeird Spy Stories Real TSCM v. Polar Bears v. Infrared Cameras I had a Snapple tea the other day and found this "Real Fact" #726 under…Kevin D. MurrayNovember 13, 2022
RecordingTSCM Do Ultrasonic Microphone Jammers Work? Ultrasonic microphone jammers, do they really work? It's a question we get asked occasionally when…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM Information Security v. Spies – How We Got This Way Evolution of the Spy Generation Spying as a method of getting ahead in business, was…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionageHistoricalTSCM Laser Beam Spying – Sci-Fi Bugs? (pdf version) Back in 1988, newspaper reports about laser beam eavesdropping swept the country. Our…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionageTSCM Economic Espionage | How to Fight Back Economic Espionage is no secret. Corporations are having their pockets picked, big time. Corporate espionage,…Kevin D. MurrayNovember 13, 2022
TSCM GSM Audio Bug? What’s That? GSM Bug. Sounds A Bit Scary, Doesn't It? Is it detrimental to your personal health?…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionageTSCM Best TSCM Practices for Enterprise Organizations TSCM best practices for enterprise organizations are different than those for single locations. They have…Kevin D. MurrayJuly 2, 2023
Corporate SecurityCybersecurityTSCM Cybersecurity Requirements for Financial Services Companies Cybersecurity Requirements for Financial Services Companies 23 NYCRR 500 This is the title of a…Kevin D. MurrayNovember 13, 2022
DroneTSCMVideo Voyeurism Covert Video Spy Camera Detection | Murray Associates Case History Murray Associates Case History Detecting spy cameras is part of our normal TSCM service. However,…Kevin D. MurrayNovember 13, 2022
TSCM Infrared Bug Detection | TSCM Technique | Pioneered by Murray Associates Thermal Emissions Spectrum Analysis as a Detection Technique for Finding Covert Electronic Surveillance Devices Infrared…Kevin D. MurrayNovember 13, 2022
Corporate SecurityTSCM Corporate Bug Sweep | TSCM Methodology Basic bug sweep methodology in business and government. It reflects the most commonly-used bug sweep…Kevin D. MurraySeptember 21, 2023
TSCM “How often do you find bugs or other electronic surveillance devices?” Q. How often do you find bugs or other surveillance devices? A. There are two…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM How to Choose a Competent TSCM Consultant How to Choose a Competent TSCM / Counterespionage Consultant Organizations need competent Technical Security Consultants…Kevin D. MurrayMay 3, 2023