Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM Information Security v. Spies – How We Got This Way Information Security v. Spies Evolution & Solution Evolution of the Spy Generation Spying as a…Kevin D. MurrayJanuary 5, 2019
Corporate SecurityEspionageHistoricalTSCM Laser Beam Eavesdropping – Sci-Fi Bugs? Laser Beam Eavesdropping – Si-Fi Bugs? (pdf version) Back in 1988, newspaper reports about laser…Kevin D. MurrayJanuary 4, 2019
Corporate SecurityTSCM TSCM Inspection Process The TSCM Inspection Process (.pdf version) TSCM Inspection Process — Summary Pre-inspection discussion, evaluation and…Kevin D. MurrayJanuary 3, 2019
CybersecuritySmartphone Security Lost Smartphone Recovery Tip Chances are, your lost smartphone screen will look like this to whoever finds it. (If…Kevin D. MurraySeptember 12, 2018
Corporate Security TSCM During Construction Projects In the world of business espionage there is a golden time to install bugs, taps,…Kevin D. MurrayJuly 7, 2018
Corporate SecurityEspionagePersonal Privacy Spy Clues Spy Clues are Important —Get to know the spy clues. From businesses to governments, and…Kevin D. MurrayJune 4, 2018
Corporate SecurityCybersecurityEspionage USB Stick Warnings Before we jump into the USB memory security recommendations, a little background is in order...…Kevin D. MurrayMay 16, 2018
Corporate Security Confidential Paperwork Security Read the unsecured confidential paperwork to know what’s happening in an organization. Confidential Paperwork Security…Kevin D. MurrayApril 19, 2018
Corporate SecurityCybersecurityEspionageTSCM Economic Espionage | How to Fight Back Economic Espionage is no secret. Corporations are having their pockets picked, big time. Economic espionage,…Kevin D. MurrayMarch 13, 2018
TSCM GSM Bug? What’s That? GSM bug. Sounds a bit scary doesn’t it? Is it detrimental to your personal health?…Kevin D. MurrayMarch 13, 2018
Corporate SecurityCybersecurityEspionage Extortionography What is Extortionography? Extortionography: Using audio / video / photographic evidence for personal or monetary…Kevin D. MurrayMarch 13, 2018
Corporate Security The $6.74 NSA Type USB Cable Bug A USB cable bug for only $6.74... Amazing. A USB cable bug for less than…Kevin D. MurrayMarch 13, 2018
Corporate SecurityEspionageTSCM Best TSCM Practices for Enterprise Organizations TSCM best practices for enterprise organizations are different than those for single locations. They have…Kevin D. MurrayMarch 13, 2018
Corporate Security Ten Business Counterespionage Tips Competitors Don’t Want You to Know – Part I Business Counterespionage Tip List - Part I Business Counterespionage Premises Business is competitive. Not everyone…Kevin D. MurrayMarch 13, 2018
Corporate Security Ten Business Counterespionage Tips Competitors Don’t Want You to Know – Part II This is Part II of Ten Business Counterespionage Tips Competitors Don't Want You to Know.…Kevin D. MurrayMarch 13, 2018
Corporate Security Ten Business Counterespionage Tips Competitors Don’t Want You to Know – Part III This is Part III of Ten Business Counterespionage Tips Competitors Don't Want You to Know.…Kevin D. MurrayMarch 13, 2018
Corporate SecurityCybersecurityTSCM Cybersecurity Requirements for Financial Services Companies Cybersecurity Requirements for Financial Services Companies 23 NYCRR 500 This is the title of a…Kevin D. MurrayFebruary 7, 2018
DroneTSCMVideo Voyeurism Covert Video Spy Camera Detection | Murray Associates Case History Covert Video Spy Camera Detection Murray Associates Case History Detecting spy cameras is part of…Kevin D. MurrayFebruary 6, 2018
Smartphone Security 41 Smartphone Security Tips 41 Smartphone Security Tips The Basics The Number One smartphone security tip. Lock your phone…Kevin D. MurrayDecember 17, 2017
TSCM Infrared Bug Detection | TSCM Technique | Pioneered by Murray Associates Infrared Bug Detection Thermal Emissions Spectrum Analysis as a Detection Technique for Finding Covert Electronic…Kevin D. MurrayNovember 15, 2017
Corporate SecurityCybersecurityEspionage Holistic Information Security | Avoiding the IT Tunnel Vision Mistake IT v Security budget battle. Budget War: Holistic Information Security v. IT Security Holistic information…Kevin D. MurrayNovember 15, 2017
Corporate SecurityEspionage Economic Espionage Theory and Prevention via TSCM Economic espionage has been in your life forever. Remember your very first real economic espionage…Kevin D. MurrayOctober 15, 2017
Corporate Security Executive Suite Security Considerations for Information Security and Operational Privacy Executive Suite Security Considerations Boardroom — Executive suite security protects confidential information and conversations, the…Kevin D. MurraySeptember 15, 2017
Corporate SecurityTSCM Corporate Bug Sweep | TSCM Methodology Basic bug sweep methodology in business and government. It reflects the most commonly-used bug sweep…Kevin D. MurrayAugust 15, 2017
TSCM “How often do you find bugs or other electronic surveillance devices?” Q. How often do you find bugs or other surveillance devices? Typical microphone found in…Kevin D. MurrayJuly 15, 2017