Security Reports Download Button Bar

Download our Introductory Brochure

Technical Surveillance Countermeasures – TSCM

…..

Free Security Reports

The following TSCM security reports help organizations and individuals protect:

  • personal privacy,
  • secure intellectual property,
  • detect current and deter future electronic surveillance,
  • and harden their locations against future economic espionage attacks.

Please click on a link below to access our helpful information.

If you have a question about a particular subject give us a call, or use our Contact Form.

Free Security Reports


(upon request)

• Business – The Security Director’s Guide to Discussing TSCM with Management

• Business – Top 20 Information Security Tips for Business Travelers


(instant access)

• Business – A Guide to Off-Site Meeting Information Security

• Business – Duty of Care Information Security Laws May Directly Affect You

• Business – Home Office Security Tips for Business

• Business – Information Security v. Spies – Evolution & Solution

• Business – Economic Espionage – How to Fight Back

• Business – Economic Espionage Theory

• Business – Employee Competitors… and what to do about it

• Business – Executive Suite Operational Privacy Considerations

• Business – Extortionography

• Business – Confidential Paperwork Security

• Business – Corporate Counterespionage Strategy Basics

• Business – Shred Bin Security – Yours Stinks – Fix it for Free

• Business – The Boss Wants a TSCM Bug Sweep — What do I do?

• Business – Surreptitious Workplace Recording

• Business – Spycam Detection in Workplace Expectation of Privacy Areas

• Business – Spy Clues

• Business – Trade Secret Protection Best Practices

• Business – Top 10 Business Counterespionage Tips Competitors Don’t Want You to Know – Part I

• Business – Top 10 Business Counterespionage Tips Competitors Don’t Want You to Know – Part II

• Business – Top 10 Business Counterespionage Tips Competitors Don’t Want You to Know – Part III


• Cybersecurity – Hacked USB Charging Cables

• Cybersecurity – Requirements for Financial Services Companies in NY

• Cybersecurity – Security Message Screen Saver (Rotating Messages – FREE)

• Cybersecurity – The IT Tunnel Vision Mistake

• Cybersecurity – The 20-Point Wi-Fi Security Checklist

• Cybersecurity – The FBI’s Hotel Wi-Fi Security Checklist


• FutureWatch – Demise of the Old-Time Spies


• Personal – 19 Spyware Warning Signs & 15 Prevention Tips

• Personal – 41 Smartphone Security Tips

• Personal – Average Person’s Guide to Stopping Snoops

• Personal – “Is My Cell Phone Bugged?” (book update and bonus information)

• Personal – Lost Smartphone Recovery Tip

• Personal – Spy Camera Detectors – Do they work?

• Personal – Spycam Detection Training

• Personal – Smartphones Can Make Anyone Look Stupid (IAPSC presentation)


• TSCM – The TSCM Inspection Process

• TSCM – Best Practices for Enterprise Organizations

• TSCM – Bug Sweeps In-House vs. Outsourced TSCM Bug Sweeps

• TSCM – Corporate Bug Sweep Methodology

• TSCM – Covert Video Spy Camera Detection | Case History

• TSCM – During Construction Projects

• TSCM – How to Choose a Competent TSCM / Counterespionage Consultant

• TSCM – “How often do you find bugs?”

• TSCM – “I think I found a bug. What should I do?”

• TSCM – Real TSCM v. Polar Bears v. Infrared Cameras

• TSCM – TSCM Bug Sweeps… When and When Not To – Part I

• TSCM – TSCM Bug Sweeps… When and When Not To – Part II


• Tech – Laser Beam Eavesdropping — Sci-Fi bugs?

• Tech – GSM Bug? What’s That?

• Tech – Infrared Bug Detection

• Tech – Malicious USB Cables

• Tech – NSA Type USB Cable Bug – $6.74

• Tech – How to Stop Acoustical Leakage Eavesdropping

• Tech – Ultrasonic Microphones Jammers – Do They Work?

• Tech – USB Malicious Spy Cable Detector Instructions

• Tech – USB Stick Warning

• Tech – World’s Smallest GPS Tracker and More

• Tech – World’s Smallest Voice Recorder


• Weird Spy Stories

LET’S TALK