Corporate SecurityEspionagePersonal PrivacyTSCM TSCM Security Inspections – Myths, Excuses & Reality Some myths and excuses really need to be debunked. Let's start with a really important…Kevin D. MurrayJune 1, 2023
Corporate SecurityEspionageTSCM Top 20 Corporate Espionage Spy Techniques Protecting your business from corporate espionage spy techniques starts with knowing where to look. However,…Kevin D. MurrayApril 14, 2023
Corporate SecurityCybersecurityInternet of ThingsWi-Fi The Knock-Out Punch Used to Disable WiFi Cameras This cheap "watch" is used by hackers and thieves to disable Wi-Fi cameras, and other…Kevin D. MurrayMarch 16, 2023
Corporate SecurityCybersecurityTSCM Flipper Zero – Corporate Security Threat What is Flipper Zero? Flipper Zero is a pocket-sized, open-source hardware security device designed for…Kevin D. MurrayMarch 15, 2023
Corporate SecurityCybersecurity How to Spot Counterfeit IT Gear When inspecting IT / MDF / IDF rooms for unauthorized equipment and connections be sure…Kevin D. MurrayJanuary 18, 2023
Corporate SecurityCybersecurityPersonal Privacy Spybuster Tip #823 – Wireless Key Fob Security Never let your wireless key fob out of your control. Wireless key fobs are useful.…Kevin D. MurrayJanuary 17, 2023
Corporate SecurityEspionagePersonal PrivacyTSCMWi-Fi 2.4 GHz Bug for Under $10 This 2.4 GHz bug is just one of many eavesdropping devices, GPS trackers and spy…Kevin D. MurrayMay 5, 2023
Personal PrivacyTSCM Is This a Bug? Updated April 2023 "Is this a bug?" is a question we are often asked. Usually…Kevin D. MurrayMarch 30, 2023
Corporate Security Ten Business Counterespionage Tips Competitors Don’t Want You to Know – Part I Updated Aug. 2022 Business Counterespionage is built of the following premises: Business is competitive. Not…Kevin D. MurrayNovember 13, 2022
Internet of ThingsTSCM How to Block Out Listening Devices Updated March 2023 ( .pdf version ) So you want to block out listening devices.…Kevin D. MurrayMarch 30, 2023
Corporate SecurityEspionageTSCM How to Prevent Wireless Microphone Eavesdropping Jack was concerned about his job so he eavesdropped on the Board meetings. Joan makes…Kevin D. MurrayNovember 13, 2022
Corporate SecurityGPS TrackingPersonal PrivacyTSCM Vehicle GPS Tracker Detection Corporations, high-profile individuals and government agencies routinely inspect their vehicles (limos, aircraft and yachts) for…Kevin D. MurrayNovember 13, 2022
Corporate SecurityTSCM What are the benefits of a TSCM bug sweep? “What are the benefits of a TSCM bug sweep?” (pdf version) It is a common…Kevin D. MurrayNovember 13, 2022
Corporate SecurityTSCM How Can You Tell if You are Being Bugged? “How Can You Tell if You, or a Room, is Bugged?” (pdf version) How can…Kevin D. MurrayNovember 13, 2022
Corporate SecurityTSCM How is a TSCM Bug Sweep Conducted? How is a TSCM Bug Sweep Conducted? (pdf version) Are you being spied on? Do…Kevin D. MurrayNovember 13, 2022
Corporate SecurityPersonal PrivacyTSCM How Much Do TSCM Bug Sweeps Cost? “How much do TSCM bug sweeps cost?” (pdf version) The cost of a Technical Surveillance…Kevin D. MurrayNovember 13, 2022
TSCM “I think I found a bug. What should I do?” Found a bug? Now what should you do? Common Voice Recorder This week one of…Kevin D. MurrayNovember 13, 2022
Corporate SecurityPersonal PrivacyTSCM TSCM X-Ray Inspection (PDF version) Planting bugs, spy cameras, and other illegal surveillance devices is easy. Most come…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionagePersonal PrivacyRecordingVideo Voyeurism Surreptitious Workplace Recording — and what to do about it Spy pen commonly used for surreptitious workplace recording. pdf download version Workplace recording threats: •…Kevin D. MurrayNovember 13, 2022
Corporate SecurityTSCM TSCM Inspection Process (.pdf version) You may already know that you need to conduct a thorough examination of…Kevin D. MurrayNovember 13, 2022
FutureWatchTSCM Smart Contact Lenses FutureWatch - The Eyes Have IT (PDF version) One of the more interesting aspects of…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionageTSCM Securing Cryptocurrency Offices from Eavesdropping and Espionage (PDF version) Securing cryptocurrency offices is a hot topic. Electronic surveillance (the spying kind) has…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityPersonal PrivacyTSCM Hearing Aid Eavesdropping – How Grandma Hears Everything (PDF version) There is a new eavesdropping spy trick in town. Hearing aid eavesdropping. You…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionageHistoricalTSCM Corporate Espionage – The Missing Business School Courses This article was written around 1990. Now it is a nostalgic look at how some…Kevin D. MurrayNovember 13, 2022
Corporate SecurityFutureWatch Information Security as a Service (ISaaS) (PDF version) Why have ISaaS Free-world businesses know they have a problem. They are bleeding…Kevin D. MurrayNovember 13, 2022