FutureWatchTSCM Visualize Radio Waves to Detect Eavesdropping Bugs Imagine being able to visualize radio waves. It would make finding your misplaced mobile phone…Kevin D. MurrayOctober 3, 2024
AICorporate SecurityCybersecurityEspionage AI Lip Reading: Eavesdropping Without a Microphone or Laser Eavesdropping via lip reading has been around a long time, probably since Og saw Charlie…Kevin D. MurrayOctober 2, 2024
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM How to Choose a Competent TSCM Consultant: A Checklist & Tips How to Choose a Competent TSCM / Counterespionage Consultant Organizations need competent Technical Security Consultants…Kevin D. MurrayAugust 6, 2024
Corporate SecurityPersonal PrivacyTSCM TSCM Wiki TSCM Wiki (AI powered) The TSCM Wiki is the most comprehensive Technical Surveillance Countermeasures knowledge…Kevin D. MurrayAugust 5, 2024
Internet of ThingsTSCM How to Block Out Listening Devices Updated July 2024 ( .pdf version ) So you want to block out listening devices.…Kevin D. MurrayJuly 9, 2024
Personal Privacy Clients Get Mugged – Now You Can Too We have a long history of presenting special spy-themed mugs to our clients. Each limited-edition…Kevin D. MurrayJuly 19, 2024
TSCMWeird Spy Stories Real TSCM vs. Polar Bears vs. Infrared Cameras I had a Snapple tea the other day and found this "Real Fact" #726 under…Kevin D. MurrayJuly 8, 2024
TSCM “I think I found a bug. What should I do?” Found a bug? Now what should you do? Common Voice Recorder This week, one of…Kevin D. MurrayJuly 8, 2024
TSCM “How often do you find bugs or other electronic surveillance devices?” Q. How often do you find bugs or other surveillance devices? A. There are two…Kevin D. MurrayAugust 1, 2024
Personal PrivacySmartphone Security Is My Cell Phone Bugged? Bonus Information Is My Cell Phone Bugged? Everything you need to know to keep your mobile communications…Kevin D. MurrayOctober 6, 2024
Corporate SecurityEspionagePersonal Privacy Spy Clues Spy Clues Are Important — Get to know the spy clues. Low-cost spy technology is…Kevin D. MurrayJuly 11, 2024
Corporate SecurityEspionagePersonal PrivacyTSCMWi-Fi 2.4 GHz Bug for Less Than $10 This 2.4 GHz bug is just one of many eavesdropping devices, GPS trackers and spy…Kevin D. MurrayJuly 11, 2024
EspionagePersonal PrivacyRecordingVideo VoyeurismWeird Spy Stories Weird Spy Stories Who doesn’t like a good spy story? They come in all types: action, true, fiction,…Kevin D. MurrayJuly 2, 2024
Corporate Security TSCM During Construction Projects During business construction projects there is a window of opportunity for installing bugs, taps, and…Kevin D. MurrayJune 27, 2024
TSCM Infrared Bug Detection | TSCM Technique | Pioneered by Murray Associates Thermal Emissions Spectrum Analysis as a Detection Technique for Finding Covert Electronic Surveillance Devices Infrared…Kevin D. MurrayJune 27, 2024
Corporate Security Corporate Counterespionage Strategy – The Basic Elements A basic Corporate Counterespionage Strategy is outlined here... Many companies are silently losing profits. This…Kevin D. MurrayJune 27, 2024
Corporate SecurityCybersecurityTSCM IT Data Center TSCM Inspections (PDF version) Typical IT Data Center Security Precautions Thick concrete walls. Data, comms, and power…Kevin D. MurrayJune 27, 2024
Corporate SecurityCybersecurityEspionage Holistic Information Security | Avoiding the IT Tunnel Vision Mistake IT vs. Security budget battle. Budget War: Holistic Information Security vs. IT Security Holistic information…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionage Economic Espionage Theory and Prevention via TSCM Economic espionage has been a part of your life for a long time. Do you…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionage Business Espionage: The Employee Competitor and What to Do About It Employee Competitors Stab Bosses in the Back Employee competitor stories begin like this: “I think…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionageTSCM Top 20 Corporate Espionage and Spy Techniques Protecting your business from corporate espionage spy techniques starts with knowing where to look. However,…Kevin D. MurrayJune 27, 2024
Corporate Security The $6.74 USB Cable Bug: An NSA-Style Device A USB cable bug for only $6.74... Amazing! A USB cable bug that costs less…Kevin D. MurrayJuly 11, 2024
Corporate Security Ten Business Counterespionage Tips Competitors Don’t Want You to Know (Part I) Business Counterespionage is built of the following premises: Business is competitive. Not everyone plays by…Kevin D. MurrayJune 27, 2024
Corporate Security Shred Bin Security – Yours Stinks – Fix It for Free Shred Bin Security — How to upgrade it... probably for free! If you have a…Kevin D. MurrayJune 27, 2024
Corporate Security Ten Business Counterespionage Tips Competitors Don’t Want You to Know (Part II) This is Part II of Ten Business Counterespionage Tips Competitors Don't Want You to Know.…Kevin D. MurrayJune 27, 2024