RecordingTSCM Do Ultrasonic Microphone Jammers Work? Ultrasonic microphone jammers, do they really work? It's a question we get asked occasionally when…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionageHistorical A Cunning Plan to Protect the U.S. from Business Espionage Business Espionage: Headline news for decades now. We are bombarded with news stories and court…Kevin D. MurrayNovember 13, 2022
Corporate Security Shred Bin Security – Yours Stinks – Fix it for Free Shred Bin Security — How to upgrade it... probably for free! If you have a…Kevin D. MurraySeptember 28, 2023
Corporate Security Duty of Care Information Security Laws (pdf version) Duty of Care Information Security Laws May Directly Affect You All these things…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionagePersonal PrivacyTSCM Information Security v. Spies – How We Got This Way Evolution of the Spy Generation Spying as a method of getting ahead in business, was…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionageHistoricalTSCM Laser Beam Spying – Sci-Fi Bugs? (pdf version) Back in 1988, newspaper reports about laser beam eavesdropping swept the country. Our…Kevin D. MurrayNovember 13, 2022
CybersecuritySmartphone Security Lost Smartphone Recovery Tip What happens when you lose your smartphone? Chances are, your lost smartphone screen will look…Kevin D. MurrayNovember 13, 2022
Corporate Security TSCM During Construction Projects In the world of business espionage there is a golden time to install bugs, taps,…Kevin D. MurraySeptember 21, 2023
Corporate SecurityEspionagePersonal Privacy Spy Clues Spy Clues are Important — Get to know the spy clues. From businesses to governments,…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionage USB Stick Warnings USB Memory Stick News Reports Before we jump into the USB memory security recommendations, a…Kevin D. MurrayNovember 13, 2022
Corporate Security Confidential Paperwork Security PDF version Confidential Paperwork Spills the Secrets Want to know what's happening? Read the…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionageTSCM Economic Espionage | How to Fight Back Economic Espionage is no secret. Corporations are having their pockets picked, big time. Corporate espionage,…Kevin D. MurrayNovember 13, 2022
TSCM GSM Audio Bug? What’s That? GSM Bug. Sounds A Bit Scary, Doesn't It? Is it detrimental to your personal health?…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionage Extortionography What is Extortionography? Extortionography: Using audio / video / photographic evidence for personal or monetary…Kevin D. MurrayNovember 13, 2022
Corporate Security The $6.74 NSA Type USB Cable Bug A USB cable bug for only $6.74... Amazing. A USB cable bug that costs less…Kevin D. MurrayNovember 15, 2022
Corporate SecurityEspionageTSCM Best TSCM Practices for Enterprise Organizations TSCM best practices for enterprise organizations are different than those for single locations. They have…Kevin D. MurrayJuly 2, 2023
Corporate Security Ten Business Counterespionage Tips Competitors Don’t Want You to Know – Part II This is Part II of Ten Business Counterespionage Tips Competitors Don't Want You to Know.…Kevin D. MurrayNovember 13, 2022
Corporate Security Ten Business Counterespionage Tips Competitors Don’t Want You to Know – Part III This is Part III of Ten Business Counterespionage Tips Competitors Don't Want You to Know.…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityTSCM Cybersecurity Requirements for Financial Services Companies Cybersecurity Requirements for Financial Services Companies 23 NYCRR 500 This is the title of a…Kevin D. MurrayNovember 13, 2022
DroneTSCMVideo Voyeurism Covert Video Spy Camera Detection | Murray Associates Case History Murray Associates Case History Detecting spy cameras is part of our normal TSCM service. However,…Kevin D. MurrayNovember 13, 2022
Smartphone Security 41 Smartphone Security Tips The Basics The Number One smartphone security tip. Lock your phone with a password. Keep…Kevin D. MurrayNovember 13, 2022
TSCM Infrared Bug Detection | TSCM Technique | Pioneered by Murray Associates Thermal Emissions Spectrum Analysis as a Detection Technique for Finding Covert Electronic Surveillance Devices Infrared…Kevin D. MurrayNovember 13, 2022
Corporate SecurityCybersecurityEspionage Holistic Information Security | Avoiding the IT Tunnel Vision Mistake IT v Security budget battle. Budget War: Holistic Information Security v. IT Security Holistic information…Kevin D. MurrayNovember 13, 2022
Corporate SecurityEspionage Economic Espionage Theory and Prevention via TSCM Economic espionage has been in your life forever. Remember your very first real economic espionage…Kevin D. MurrayNovember 13, 2022
Corporate Security Executive Suite Security Considerations for Information Security and Operational Privacy Executive Suite Security Considerations Boardroom — Executive suite security protects confidential information and conversations, the…Kevin D. MurrayNovember 13, 2022