Corporate Security Ten Business Counterespionage Tips Competitors Don’t Want You to Know (Part III) This is Part III of Ten Business Counterespionage Tips Competitors Don't Want You to Know.…Kevin D. MurrayJune 27, 2024
Corporate SecurityGPS TrackingPersonal PrivacyTSCM Vehicle GPS Tracker Detection Corporations, high-profile individuals and government agencies routinely inspect their vehicles (limos, aircraft and yachts) for…Kevin D. MurrayJune 26, 2024
Corporate SecurityCybersecurityPersonal PrivacyTSCM Eavesdropping with Hearing Aids: How Grandma Hears Everything (PDF version) There is a new eavesdropping spy trick in town. Hearing aid eavesdropping. You…Kevin D. MurrayJune 27, 2024
BluetoothCybersecurityPersonal PrivacyTSCM Detecting Stalking Tags Detecting Apple AirTags, Tile Tags, and More Location tags, products like Apple AirTags and Tile…Kevin D. MurrayJune 27, 2024
Corporate SecurityCybersecurityInternet of ThingsWi-Fi The Knock-Out Punch Used to Disable WiFi Cameras This cheap "watch" is used by hackers and thieves to disable Wi-Fi cameras and other…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionageTSCM How to Prevent Wireless Microphone Eavesdropping Jack was concerned about his job, so he eavesdropped on the Board meetings. Joan made…Kevin D. MurrayJune 27, 2024
Corporate SecurityCybersecurityPersonal PrivacyWi-Fi The FBI Hotel Wi-Fi Security Checklist Increased Telework from Hotels Pose a Cyber Security Risk for Guests The Federal Bureau of…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionageHistoricalTSCM Laser Beam Spying: Sci-Fi Bugs? Back in 1988, newspaper reports about laser beam eavesdropping swept the country. Our clients were…Kevin D. MurrayJune 27, 2024
Corporate SecurityPersonal PrivacyTSCM How Much Do TSCM Bug Sweeps Cost? “How much do TSCM bug sweeps cost?” The cost of a Technical Surveillance Countermeasures (TSCM)…Kevin D. MurrayJune 3, 2024
Corporate SecurityPersonal Privacy How to Stop Acoustical Leakage Eavesdropping Acoustical Leakage: History It's the oldest form of eavesdropping. Defined as: “a back-formation from eavesdropper,…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionagePersonal PrivacyRecordingVideo Voyeurism Surreptitious Workplace Recording — and what to do about it Spy pen commonly used for surreptitious workplace recording. pdf download version Workplace recording threats: •…Kevin D. MurrayJune 26, 2024
Corporate SecurityTSCM TSCM Inspection Process You may already know that a thorough examination is necessary. You may suspect that there…Kevin D. MurrayJune 27, 2024
Personal PrivacySmartphone Security Eavesdropping Snoops: The Average Person’s Guide to Stopping Them Updated March 2024 Become the Ultimate Eavesdrop Detector The average person’s guide to stopping eavesdropping…Kevin D. MurrayJune 27, 2024
Personal PrivacyTSCMVideo Voyeurism Hidden Camera Detectors – Do They Work? Spy Camera Detector History updated 1/22/2024 How can I find hidden cameras? (Click above to…Kevin D. MurrayJanuary 22, 2024
Corporate SecurityTSCM Continuous TSCM Monitoring vs. On-Site TSCM Audits Executive Summary 24/7 Radio Transmission Monitoring (RTM) systems are being marketed as a “Continuous TSCM”…Kevin D. MurrayJanuary 15, 2024
BluetoothCorporate SecurityCybersecurityEspionage Eavesdropping and Super Hearing Pucks Guess what all these superheroes have in common. Superman Wolverine Supergirl Power Girl Green Lantern…Kevin D. MurrayJune 27, 2024
Corporate SecurityEspionageTSCM Trade Secrets v. Confidential Information The non-existence of a trade secret asset: ‘confidential’ information by R. Mark Halligan, FisherBroyles LLP…Kevin D. MurrayNovember 16, 2023
Corporate SecurityCybersecurityDroneEspionageHistorical High-Stakes Corporate Espionage A $200 million deal turned into a tale of hidden microphones, drone encounters and covert…Kevin D. MurrayJune 17, 2023
Corporate SecurityEspionagePersonal PrivacyTSCM TSCM Security Inspections – Myths, Excuses & Reality Some myths and excuses really need to be debunked. Let's start with a really important…Kevin D. MurrayJuly 3, 2023
Corporate SecurityCybersecurityTSCM Flipper Zero – Corporate Security Threat What is Flipper Zero? Flipper Zero is a pocket-sized, open-source hardware security device designed for…Kevin D. MurrayMarch 15, 2023
Corporate SecurityCybersecurity How to Spot Counterfeit IT Gear When inspecting IT / MDF / IDF rooms for unauthorized equipment and connections be sure…Kevin D. MurrayJanuary 18, 2023
Corporate SecurityCybersecurityPersonal Privacy Spybuster Tip #823 – Wireless Key Fob Security Never let your wireless key fob out of your control. Wireless key fobs are useful.…Kevin D. MurrayJanuary 17, 2023
Personal PrivacyTSCM Is This a Bugging Device? Updated December 2023 "Is this a bugging device?" is a question we are often asked.…Kevin D. MurrayAugust 17, 2024
Corporate SecurityTSCM What are the benefits of a TSCM bug sweep? “What are the benefits of a TSCM bug sweep?” (pdf version) It is a common…Kevin D. MurrayNovember 13, 2022
Corporate SecurityTSCM How Can You Tell if You are Being Bugged? “How Can You Tell if You, or a Room, is Bugged?” (pdf version) How can…Kevin D. MurrayNovember 13, 2022