Skip to main content

Free TSCM Security Reports & Brochure


Additional Free TSCM Security Reports

The following TSCM security reports help organizations and individuals protect:

  • personal privacy,
  • secure information,
  • detect electronic surveillance,
  • and harden locations against future economic espionage attacks.

TSCM Security Reports: BUSINESS

• Tips – Top 20 Corporate Espionage Spy Techniques

• Tips – How to Choose a Competent TSCM / Counterespionage Consultant

• Tips – Top 20+ Information Security Tips for Business Travelers

• Tips – Off-Site Meeting Information Security Guide & Checklist

• Tips – Home Office Security Tips for Business

• Tips – How to Prevent Wireless Microphone Eavesdropping

• Tips – Confidential Paperwork Security

• Tips – Shred Bin Security – Yours Stinks – Fix it for Free

• Tips – Spy Clues

• Top 10 Business Counterespionage Tips Competitors Don’t Want You to Know – Part I

• Top 10 Business Counterespionage Tips Competitors Don’t Want You to Know – Part II

• Top 10 Business Counterespionage Tips Competitors Don’t Want You to Know – Part III

• Corporate Espionage – A Cunning Plan to Protect U.S. from Business Espionage

• Corporate Espionage – The Missing Business School Courses

• Advice – “Continious TSCM” Monitoring vs. On-Site TSCM Audits

• Advice – Trade Secrets v. Confidential Information

• Advice – Best Practices for Enterprise Organizations

• Advice – The Boss Wants a TSCM Bug Sweep — What do I do?

• Advice – Extortionography

• Advice – Surreptitious Recording in the Workplace Policy

• Advice – Duty of Care Information Security Laws May Directly Affect You

• Advice – How Grandma Hears Everything, and why your business should care

• Advice – Information Security v. Spies – How We Got This Way

• Advice – Employee Competitors… and what to do about it

• Advice – Executive Suite Operational Privacy Considerations

• Advice – Corporate Counterespionage Strategy Basics

• Advice – Requirements for Financial Services Companies in NY

• Advice – Trade Secret Protection Best Practices

• TSCM Inspections – The TSCM Inspection Process

• TSCM Inspections – Myths, Excuses & Reality

• TSCM Inspections – Spycam Detection in Workplace Expectation of Privacy Areas

• TSCM Inspections – Securing Cryptocurrency Offices from Eavesdropping and Espionage

• TSCM Inspections – During Construction Projects

• TSCM Inspections – IT Data Centers

• TSCM Inspections – TSCM, The Other Covid Deep Clean

• Economic Espionage – How to Fight Back

• Economic Espionage – Theory


TSCM Security Reports: CYBERSECURITY

• Security Message Screen Saver (Rotating Messages – FREE)

• Flipper Zero – Corporate Security Threat

• How to Spot Counterfeit IT Gear

• The IT Tunnel Vision Mistake

• USB – Hacked Charging Cables

• USB – Malicious Spy Cable Detector Instructions

• USB – General Memory Stick Warning

• USB – Malicious Cables

• USB – NSA Type Cable Bug – $6.74

• Wi-Fi Security – 20 Point Checklist

• Wi-Fi Security Checklist – Hotel Recommendations from the FBI

• Wi-Fi: The Knock-Out Punch Used to Disable WiFi Cameras


TSCM Security Reports: FutureWatch

• The Eyes Have IT (Smart Contact Lenses)

• Demise of the Old-Time Spies

• Information Security as a Service (ISaaS)


TSCM Security Reports: PERSONAL SECURITY

• The Average Person’s Guide to Stopping Snoops

• Bluetooth – Detect Stalking Tags –  Apple AirTags, Tile Tags and more

• GPS – Do-it-Yourself Vehicle GPS Tracker Detection

• How Can You Tell if You, or a Room, 
is Bugged?

• How to Block Out Listening Devices

• “Is This a Bug?”

• “I think I found a bug. What should I do?”

• Spycam – Spy Camera Detection

• Spycam – Spy Camera Detectors – Do they work?

• Cellphone – 19 Spyware Warning Signs & 15 Prevention Tips

• Cellphone – 41 Security Tips

• Cellphone – Lost Smartphone Recovery Tip

• Cellphone – “Is My Cell Phone Bugged?” (book update and bonus information)

• Cellphone – Smartphones Can Make Anyone Look Stupid (IAPSC presentation)

• Quiz – Would You Make a Good Spy?

• Tip – Wireless Key Fob Security


TSCM Security Reports: TSCM

• “What are the benefits of a TSCM bug sweep?”

• “How is a TSCM Bug Sweep Conducted?”

• “How much do TSCM bug sweeps cost?”

• AudioWow TSCM Detection Evaluation (wireless microphone)

• 2.4GHz Bug for Under $10 Evaluation

• The TSCM Inspection Process

• Best Practices for Enterprise Organizations

• Corporate Bug Sweep Methodology

• Covert Video Spy Camera Detection | Case History

• TSCM – During Construction Projects

• A Guidebook for the Beginning Sweeper

• “How often do you find bugs?”

• “Is This a Bug?”

• “I think I found a bug. What should I do?”

• Real TSCM v. Polar Bears v. Infrared Cameras

• Tektronix Case History – Spectrum Analyzer RSA6114A

• TSCM – Bug Sweeps… When and When Not To – Part I

• TSCM – Bug Sweeps… When and When Not To – Part II


TSCM Security Reports: Reports: TECHNOLOGY

• Laser – Laser Beam Eavesdropping — Sci-Fi bugs?

• Cellphone – GSM Bug? What’s That?

• Flipper Zero – Corporate Security Threat

• Thermal Imaging – Infrared Bug Detection

• The Eavesdropping Super Hearing Puck

• Acoustics – How to Stop Acoustical Leakage Eavesdropping

• Ultrasonic – Microphones Jammers – Do They Work?

• World’s Smallest – GPS Tracker and More

• World’s Smallest – Voice Recorder


TSCM Security Reports: Odd-Balls

• Weird Spy Stories

Submit your topic ideas for additional Free TSCM Security Reports