Corporate SecurityEspionageHistoricalTSCM Corporate Espionage – The Missing Business School Courses This article was written around 1990. Now it is a nostalgic look at how some…Kevin D. MurrayNovember 13, 2022
Corporate SecurityFutureWatch Information Security as a Service (ISaaS) (PDF version) Why have ISaaS Free-world businesses know they have a problem. They are bleeding…Kevin D. MurrayNovember 13, 2022
RecordingTSCM AudioWow Wireless Microphone TSCM Detection Evaluation (PDF version) The AudioWow Advertising is Enticing - Wireless Audio Studio Microphone in A Matchbox…Kevin D. MurrayNovember 13, 2022
HistoricalTSCM A Guidebook for the Beginning Sweeper A Guidebook for the Beginning Sweeper, by Glenn H. Whidden, 1994 A Guidebook for the…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionageTSCM TSCM – The Other Covid Deep Clean The Other Covid Deep Clean is TSCM (.pdf version) Deep Clean sanitizing of offices and…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionage Quiz – Would You Make a Good Spy? Find out if you could be a good spy. Test yourself for fun. Learn what…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityTSCM IT Data Center TSCM Inspections (PDF version) The Average IT Data Center Security Precautions Thick concrete walls. Data, comms, and…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityPersonal PrivacyWi-Fi The FBI Hotel Wi-Fi Security Checklist A COVID 19-Driven Increase in Telework from Hotels Could Pose a Cyber Security Risk for…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityPersonal PrivacyWi-Fi Wi-Fi Security Checklist (PDF version) Wi-Fi is the worst leaker since the Titanic. I have a saying, “Raise…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionageTSCM Malicious USB Cables (PDF version) (VIDEO) (Detection Instructions) The Background of Malicious USB Cables A malicious cable is…Kevin D. MurrayNovember 15, 2022
EspionagePersonal PrivacyRecordingVideo VoyeurismWeird Spy Stories Weird Spy Stories Who doesn’t like a good spy story? (The audience remains silent.) They come in all…Kevin D. MurrayNovember 13, 2022
GPS TrackingPersonal PrivacyTSCM World’s Smallest GPS Tracker Updated on 11/01/2022 (PDF version) The world’s smallest GPS trackers can be incredibly small. Once…Kevin D. MurrayNovember 13, 2022
Corporate SecurityPersonal PrivacyRecordingTSCM World’s Smallest Voice Recorder? (PDF version) Is this The World’s Smallest Voice Recorder? Specifications TileRec by ATTO Digital Ultra-small:…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityTSCM Hacked USB Charging Cables (pdf version) (VIDEO) What are hacked USB cables? They Appear Normal They Blend In They…Kevin D. MurrayNovember 15, 2022
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM USB Spy Cable Detector (PDF version) (VIDEO) These are the key measurements for identifying malicious spy cables. Measurements for…Kevin D. MurrayNovember 15, 2022
Corporate SecurityPersonal PrivacyTSCM Home Office Security Tips for Business (PDF version) Home office security vulnerabilities… Home offices lack the considerable security protections afforded by…Kevin D. MurrayNovember 13, 2022
EspionageFutureWatchHistorical FutureWatch: Demise of the Old-Time Spies Old-Time Spies Not so long ago, old-time spy Secret Agent Man could globe-hop with impunity…Kevin D. MurrayNovember 13, 2022
Corporate SecurityTSCM TSCM Bug Sweeps… When and When Not To – Part I The following TSCM bug sweep advice is specifically meant for: Private Investigators, Security Directors, Security…Kevin D. MurrayNovember 13, 2022
Corporate SecurityTSCM TSCM Bug Sweeps… When and When Not To – Part II The following TSCM inspection advice is specifically meant for: Private Investigators, Security Directors, Security Consultants,…Kevin D. MurrayNovember 13, 2022
Personal PrivacyTSCMVideo Voyeurism Hidden Camera Detectors – Do They Work? Spy Camera Detector History updated 7/1/2022 How can I find hidden cameras? (Click above to…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityPersonal Privacy Off-Site Meeting Information Security (PDF version) Corporate off-site meetings are prime targets for infiltration and information theft. Resorts and…Kevin D. MurrayNovember 13, 2022
TSCMWeird Spy Stories Real TSCM v. Polar Bears v. Infrared Cameras I had a Snapple tea the other day and found this "Real Fact" #726 under…Kevin D. MurrayNovember 13, 2022
CybersecurityPersonal PrivacySmartphone Security 19 Clues Your Smartphone is Infected with Spyware and 15 Prevention Tips Spyware Detection Tips (.pdf version) Cell phones have secret lives. When we are not using…Kevin D. MurrayNovember 13, 2022
Corporate SecurityPersonal Privacy How to Stop Acoustical Leakage Eavesdropping Acoustical Leakage History It's the oldest form of eavesdropping. Defined as: “a back-formation from eavesdropper,…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionage Trade Secret Protection Best Practices Trade secret protection is essential for two reasons. Instituting trade secret protection best practices reduces…Kevin D. MurrayNovember 13, 2022