Skip to main content

Free TSCM Security Reports & Brochure

Free TSCM Security Reports Download Button

Most Requested Downloads

MURRAY ASSOCIATES INTRODUCTORY BROCHURE

THE SECURITY DIRECTOR’S GUIDE to DISCUSSING TSCM WITH MANAGEMENT

THE TSCM INSPECTION PROCESS

…..

Have a question? Need a quick answer?

Ask our AI chatbot (lower right corner).
It will comb the site and find an answer for you, fast.
Need real intelligence? We are here for you, too.


Additional Free TSCM Security Reports

The following TSCM security reports help organizations and individuals protect:

  • personal privacy,
  • secure information,
  • detect electronic surveillance,
  • and harden locations against future economic espionage attacks.

TSCM Security Reports: BUSINESS

• Tips – Top 20 Corporate Espionage Spy Techniques

• Tips – How to Choose a Competent TSCM / Counterespionage Consultant

• Tips – Top 20+ Information Security Tips for Business Travelers

• Tips – Off-Site Meeting Information Security Guide & Checklist

• Tips – Home Office Security Tips for Business

• Tips – How to Prevent Wireless Microphone Eavesdropping

• Tips – Confidential Paperwork Security

• Tips – Shred Bin Security – Yours Stinks – Fix it for Free

• Tips – Spy Clues

• Top 10 Business Counterespionage Tips Competitors Don’t Want You to Know – Part I

• Top 10 Business Counterespionage Tips Competitors Don’t Want You to Know – Part II

• Top 10 Business Counterespionage Tips Competitors Don’t Want You to Know – Part III

• Corporate Espionage – A Cunning Plan to Protect U.S. from Business Espionage

• Corporate Espionage – The Missing Business School Courses

• Advice – “Continious TSCM” Monitoring vs. On-Site TSCM Audits

• Advice – Trade Secrets v. Confidential Information

• Advice – Best Practices for Enterprise Organizations

• Advice – The Boss Wants a TSCM Bug Sweep — What do I do?

• Advice – Extortionography

• Advice – Surreptitious Recording in the Workplace Policy

• Advice – Duty of Care Information Security Laws May Directly Affect You

• Advice – How Grandma Hears Everything, and why your business should care

• Advice – Information Security v. Spies – How We Got This Way

• Advice – Employee Competitors… and what to do about it

• Advice – Executive Suite Operational Privacy Considerations

• Advice – Corporate Counterespionage Strategy Basics

• Advice – Requirements for Financial Services Companies in NY

• Advice – Trade Secret Protection Best Practices

• TSCM Inspections – The TSCM Inspection Process

• TSCM Inspections – Myths, Excuses & Reality

• TSCM Inspections – Spycam Detection in Workplace Expectation of Privacy Areas

• TSCM Inspections – Securing Cryptocurrency Offices from Eavesdropping and Espionage

• TSCM Inspections – During Construction Projects

• TSCM Inspections – IT Data Centers

• TSCM Inspections – TSCM, The Other Covid Deep Clean

• Economic Espionage – How to Fight Back

• Economic Espionage – Theory


TSCM Security Reports: CYBERSECURITY

• Security Message Screen Saver (Rotating Messages – FREE)

• Flipper Zero – Corporate Security Threat

• How to Spot Counterfeit IT Gear

• The IT Tunnel Vision Mistake

• USB – Hacked Charging Cables

• USB – Malicious Spy Cable Detector Instructions

• USB – General Memory Stick Warning

• USB – Malicious Cables

• USB – NSA Type Cable Bug – $6.74

• Wi-Fi Security – 20 Point Checklist

• Wi-Fi Security Checklist – Hotel Recommendations from the FBI

• Wi-Fi: The Knock-Out Punch Used to Disable WiFi Cameras


TSCM Security Reports: FutureWatch

• The Eyes Have IT (Smart Contact Lenses)

• Demise of the Old-Time Spies

• Information Security as a Service (ISaaS)


TSCM Security Reports: PERSONAL SECURITY

• The Average Person’s Guide to Stopping Snoops

• Bluetooth – Detect Stalking Tags –  Apple AirTags, Tile Tags and more

• GPS – Do-it-Yourself Vehicle GPS Tracker Detection

• How Can You Tell if You, or a Room, 
is Bugged?

• How to Block Out Listening Devices

• “Is This a Bug?”

• “I think I found a bug. What should I do?”

• Spycam – Spy Camera Detection

• Spycam – Spy Camera Detectors – Do they work?

• Cellphone – 19 Spyware Warning Signs & 15 Prevention Tips

• Cellphone – 41 Security Tips

• Cellphone – Lost Smartphone Recovery Tip

• Cellphone – “Is My Cell Phone Bugged?” (book update and bonus information)

• Cellphone – Smartphones Can Make Anyone Look Stupid (IAPSC presentation)

• Quiz – Would You Make a Good Spy?

• Tip – Wireless Key Fob Security


TSCM Security Reports: TSCM

• “What are the benefits of a TSCM bug sweep?”

• “How is a TSCM Bug Sweep Conducted?”

• “How much do TSCM bug sweeps cost?”

• AudioWow TSCM Detection Evaluation (wireless microphone)

• 2.4GHz Bug for Under $10 Evaluation

• The TSCM Inspection Process

• Best Practices for Enterprise Organizations

• Corporate Bug Sweep Methodology

• Covert Video Spy Camera Detection | Case History

• TSCM – During Construction Projects

• A Guidebook for the Beginning Sweeper

• “How often do you find bugs?”

• “Is This a Bug?”

• “I think I found a bug. What should I do?”

• Real TSCM v. Polar Bears v. Infrared Cameras

• Tektronix Case History – Spectrum Analyzer RSA6114A

• TSCM – Bug Sweeps… When and When Not To – Part I

• TSCM – Bug Sweeps… When and When Not To – Part II


TSCM Security Reports: Reports: TECHNOLOGY

• Laser – Laser Beam Eavesdropping — Sci-Fi bugs?

• Cellphone – GSM Bug? What’s That?

• Flipper Zero – Corporate Security Threat

• Thermal Imaging – Infrared Bug Detection

• The Eavesdropping Super Hearing Puck

• Acoustics – How to Stop Acoustical Leakage Eavesdropping

• Ultrasonic – Microphones Jammers – Do They Work?

• World’s Smallest – GPS Tracker and More

• World’s Smallest – Voice Recorder


TSCM Security Reports: Odd-Balls

• Weird Spy Stories

Submit your topic ideas for additional Free TSCM Security Reports

close

Helpful? Please let others know.

RSS
Follow by Email
YouTube
YouTube
LinkedIn
LinkedIn
Share