Corporate Security Confidential Paperwork Security PDF version Confidential Paperwork Spills the Secrets Want to know what's happening? Read the…Kevin D. MurrayAugust 3, 2021
Corporate SecurityCybersecurityEspionageTSCM Economic Espionage | How to Fight Back Economic Espionage is no secret. Corporations are having their pockets picked, big time. Corporate espionage,…Kevin D. MurrayFebruary 24, 2022
TSCM GSM Audio Bug? What’s That? GSM Bug. Sounds A Bit Scary, Doesn't It? Is it detrimental to your personal health?…Kevin D. MurrayFebruary 14, 2022
Corporate SecurityCybersecurityEspionage Extortionography What is Extortionography? Extortionography: Using audio / video / photographic evidence for personal or monetary…Kevin D. MurrayAugust 3, 2021
Corporate Security The $6.74 NSA Type USB Cable Bug A USB cable bug for only $6.74... Amazing. A USB cable bug for less than…Kevin D. MurrayAugust 3, 2021
Corporate SecurityEspionageTSCM Best TSCM Practices for Enterprise Organizations TSCM best practices for enterprise organizations are different than those for single locations. They have…Kevin D. MurrayMay 4, 2022
Corporate Security Ten Business Counterespionage Tips Competitors Don’t Want You to Know – Part I Business Counterespionage Tip List - Part I Business Counterespionage Premises Business is competitive. Not everyone…Kevin D. MurrayAugust 3, 2021
Corporate Security Ten Business Counterespionage Tips Competitors Don’t Want You to Know – Part II This is Part II of Ten Business Counterespionage Tips Competitors Don't Want You to Know.…Kevin D. MurrayAugust 3, 2021
Corporate Security Ten Business Counterespionage Tips Competitors Don’t Want You to Know – Part III This is Part III of Ten Business Counterespionage Tips Competitors Don't Want You to Know.…Kevin D. MurrayAugust 3, 2021
Corporate SecurityCybersecurityTSCM Cybersecurity Requirements for Financial Services Companies Cybersecurity Requirements for Financial Services Companies 23 NYCRR 500 This is the title of a…Kevin D. MurrayAugust 3, 2021
DroneTSCMVideo Voyeurism Covert Video Spy Camera Detection | Murray Associates Case History Murray Associates Case History Detecting spy cameras is part of our normal TSCM service. However,…Kevin D. MurrayJanuary 19, 2022
Smartphone Security 41 Smartphone Security Tips The Basics The Number One smartphone security tip. Lock your phone with a password. Keep…Kevin D. MurrayAugust 3, 2021
TSCM Infrared Bug Detection | TSCM Technique | Pioneered by Murray Associates Thermal Emissions Spectrum Analysis as a Detection Technique for Finding Covert Electronic Surveillance Devices Infrared…Kevin D. MurrayAugust 3, 2021
Corporate SecurityCybersecurityEspionage Holistic Information Security | Avoiding the IT Tunnel Vision Mistake IT v Security budget battle. Budget War: Holistic Information Security v. IT Security Holistic information…Kevin D. MurrayAugust 3, 2021
Corporate SecurityEspionage Economic Espionage Theory and Prevention via TSCM Economic espionage has been in your life forever. Remember your very first real economic espionage…Kevin D. MurrayAugust 3, 2021
Corporate Security Executive Suite Security Considerations for Information Security and Operational Privacy Executive Suite Security Considerations Boardroom — Executive suite security protects confidential information and conversations, the…Kevin D. MurrayAugust 3, 2021
Corporate SecurityTSCM Corporate Bug Sweep | TSCM Methodology Basic bug sweep methodology in business and government. It reflects the most commonly-used bug sweep…Kevin D. MurrayAugust 3, 2021
TSCM “How often do you find bugs or other electronic surveillance devices?” Q. How often do you find bugs or other surveillance devices? A. There are two…Kevin D. MurrayMay 4, 2022
Corporate Security Corporate Counterespionage Strategy – The Basic Elements A basic Corporate Counterespionage Strategy is outlined here... Many companies are bleeding profits for lack…Kevin D. MurrayAugust 3, 2021
TSCM In-House TSCM Bug Sweeps vs. Outsourced TSCM Bug Sweeps The in-house TSCM bug sweep vs. outsourced TSCM bug sweep debate... Once in a while,…Kevin D. MurrayAugust 18, 2021
Corporate SecurityEspionage Business Espionage: The Employee Competitor… and what to do about it Employee Competitors Stab Bosses in the Back Employee competitor stories begin like this... “I think…Kevin D. MurrayAugust 3, 2021
Personal PrivacySmartphone Security Eavesdropping Snoops – The Average Person’s Guide to Stopping Them Become the Ultimate Eavesdrop Detector The average person’s guide to stopping eavesdropping snoops. Your eavesdropping…Kevin D. MurraySeptember 14, 2021
TSCM How to Choose a Competent TSCM Consultant How to Choose a Competent TSCM / Counterespionage Consultant Corporate espionage is a fact of…Kevin D. MurrayMay 4, 2022
Personal PrivacySmartphone Security Is My Cell Phone Bugged – Bonus Information Is My Cell Phone Bugged? "Everything you need to know to know to keep your…Kevin D. MurrayAugust 3, 2021