...the Ferretti Group filed its own complaint... “Ferretti SpA considers itself an aggrieved party, having been wronged by the unlawful and improper installation of surveillance devices within its offices,” the statement said. more
Wednesday, June 11, 2025
Bugging Devices Found at Italian Yacht Builder Ferretti
...the Ferretti Group filed its own complaint... “Ferretti SpA considers itself an aggrieved party, having been wronged by the unlawful and improper installation of surveillance devices within its offices,” the statement said. more
Friday, May 23, 2025
AI Can't Protect It's IP Alone - It Needs TSCM
Altman himself was paranoid about people leaking information. He privately worried about Neuralink staff, with whom OpenAI continued to share an office, now with more unease after Elon Musk’s departure. Altman worried, too, about Musk, who wielded an extensive security apparatus including personal drivers and bodyguards.
Friday, April 4, 2025
Thursday, March 20, 2025
Former Council Candidate Bugs Town Hall
John Garate, 50, was arrested by Davie police on Dec. 19 after they caught him leaving Town Hall with a recording device he secretly placed in a conference room the day before, according to an arrest report.
...the recording shows Garate entering the conference two hours before the Dec. 18 meeting. After he left Town Hall, but before the meeting, police checked the conference room and “verified that a device was placed on the bookshelf.”
The next morning, after the meeting, Garate returned to Town Hall, entered the conference room, picked up the device and was stopped by police as he was leaving. “During the search incident to arrest, in the defendant’s pocket was a black device with a USB attachment,” the police report states.
John Garate, 50, was arrested by Davie police on Dec. 19 after they caught him leaving Town Hall with a recording device he secretly placed in a conference room the day before, according to an arrest report. more
Tuesday, March 11, 2025
Hackers are Taking Aim at Board Directors
“Often times they’re targets, especially for public companies, where their profiles are out there,” he said during a virtual conversation on Thursday hosted by Fortune in partnership with Diligent for The Modern Board series.
Lish added that he’s even seen an increase in the mailing of physical ransom letters to board directors and company executives. “How do they stay protected in their personal lives?” he said. “Because threat actors will try to do reconnaissance.” more
2025 Canadian Technical Security Conference (CTSC)
Tuesday May 06, 2025 to Thursday May 08, 2025
Arrival Monday May 05, 2025
Conference Venue
Banff Centre for Professional Development
Kinnear Centre for Innovation
107 Tunnel Mountain Drive, Banff, Alberta Canada T1L 1H5
Conference Theme:
The Future of Technical Security: Adapting to a Changing Threat Landscape
Defensive resources, tools, countermeasures, and technologies are available. That is why, you need to attend the Canadian Technical Security Conference to hone an up-to-date awareness of the threat environment, countermeasures, tools and a better understanding how to make the best use of them. Moreover, not only will you learn from experts but you can become part of a community that pulls together against the threat operators to share information and best practices.
Wednesday, December 11, 2024
TSCM Tech: Another Step Closer to the Holy Grail - Visualizing RF
The Holo-Scan is a 3D electromagnetic field mapping system in augmented reality (AR) compatible with various laboratory equipment such as spectrum analyzers, vector network analyzers (VNA) or specific probes (Narda, Wavecontrol…). Unlimited frequency band depending on the instruments used. The data is then exported in .lxd format and directly analyzed in the online viewer. more
Tuesday, December 3, 2024
TSCM Tech - Coating Hides Temp Changes from IR Cameras
The new coating — engineered from samarium nickel oxide, a unique tunable material — employs a bit of temperature trickery.
“This is the first time temperature and thermal light emission have been decoupled in a solid object. We built a coating that ‘breaks’ the relationship between temperature and thermal radiation in a very particular way,” says Mikhail Kats, a UW–Madison professor of electrical and computer engineering. more
Thursday, November 14, 2024
Thursday, October 3, 2024
FutureWatch: Visualizing Radio Waves to Detect Eavesdropping Bugs
We are not quite there yet, but progress is being made. A French company, Luxondes, is working on this now. Their focus, however, is not consumer or TSCM oriented. The immediate profit market is product testing.
Being able to visualize radio waves is necessary for many reasons. As TSCM practitioners, we want this technology to evolve.
- Initially, by developing a hand-held screen which can be moved around a room or vehicle.
- Eventually, by developing a device—maybe a spatial headset—that displays radio-frequency energy as a 3-D fog, lidar-map the room, and document both for review and as evidence.
- And, whenever possible, add AI capabilities. Determine the frequency. List what is legally allowed to use that frequency. Analyze and identify the waveform. Display the results, and highlight any anomalies.
Friday, August 2, 2024
Free TSCM AI Knowledge Wiki
The website, counterespionage.net, provides a comprehensive range of resources related to Technical Surveillance Countermeasures (TSCM), which can be considered as a knowledge wiki for several reasons:
- Informative Articles: It features detailed articles explaining what TSCM is and its importance in protecting corporate privacy and intellectual property. For example, the article on What Is TSCM? outlines the holistic approach needed for effective TSCM evaluations.
Free Resources: The site offers free TSCM security reports, publications, and videos that educate users about various aspects of surveillance and counter-surveillance techniques. You can find these resources in the TSCM Information section.
Guides and Tips: It includes practical guides such as the Security Director’s Guide to Discussing TSCM with Management and tips for businesses on counterespionage, which serve as valuable educational tools.
Case Studies and Testimonials: The website also shares case studies and client testimonials that provide real-world examples of TSCM applications, enhancing the learning experience for users.
FAQs and Expert Insights: The presence of a FAQ section allows users to get quick answers to common questions about TSCM, further contributing to its role as a knowledge base.
Thursday, March 21, 2024
Trade Secret Cases On the Rise
In recent years, there has been a noticeable uptick in trade secret litigation, signaling a shift in how businesses safeguard their valuable intellectual property...
Tuesday, March 12, 2024
2024 TSCM Trend Analysis
TSCM Equipment Market Size, Share, Competitive Landscape and Trend Analysis Report by Type, by Product and by Industry Vertical: Global Opportunity Analysis and Industry Forecast, 2023-2032
These factors result in innovation of highly discreet and capable modern surveillance technologies that are able to evade methods of traditional TSCM to meet new, emerging technical threats. The advanced TSCM equipment market is expected to grow at the highest CAGR." more
Monday, January 1, 2024
A Corporate New Year's Resolution - Detect Espionage Easily
• Electronic Surveillance is not the goal. It is a means to an end.
• Electronic Surveillance is a key component of intelligence gathering.
• Electronic Surveillance is the one spy trick which is easily detectable, if you look for it.
Protection Requires Detection
Technical Surveillance Countermeasures (TSCM) audits exploit weaknesses inherent in electronic surveillance. Knowing you are being targeted provides you with time to counter - before your information is used against you; before harm is done.
All businesses need TSCM as their canary in the mine shaft.
Wednesday, November 15, 2023
Why You Really Need a Technical Information Security Consultant
by R. Mark Halligan
For years, there has been a debate whether “confidential” information is analogous to a “trade secret.” It is not. Information is either protected as a “trade secret” or not protected as a “trade secret.” Any other characterization of “confidential” information undermines the protection of trade secret assets and interferes with lawful and fair business competition.
There is no such thing as non-trade secret “confidential” information.
There is no such thing as “confidential” information that does not rise to the level of a trade secret.
There is no middle ground: Either the information is a “trade secret” (and protectable) or not a trade secret (and not protectable).
A “trade secret” is an intellectual property asset that requires reasonable measures to protect the information as a “trade secret” and proof that such information derives an actual or potential economic advantage from the secrecy of the information. more
Thursday, June 1, 2023
Corporate TSCM Information Security Inspections - Myths, Excuses & Reality
TSCM SECURITY INSPECTION MYTHS and EXCUSES
Excuse: “I don’t see that we have a problem. No one is bugging our offices and boardroom.”
Reality: The first rule of espionage is, “Be invisible.” You won’t know if you are being eavesdropped on if you never check.
Fear of being Labeled Paranoid
Myth: Peer pressure from upper management.
Reality: Most top management appreciate proactive security thinking from their staff.
Lack of Awareness
Excuse: Yes.
Reality: A lack of awareness of the risks associated with electronic eavesdropping, or the need for TSCM security inspections is common. Management may be unaware of TSCM as an available countermeasure.
Cost
Myth: TSCM inspections can be expensive. The costs involved in hiring a professional TSCM specialist, or purchasing specialized equipment, and conducting regular inspections can be a deterrent to scheduling TSCM inspections.
Reality: Espionage losses are more expensive, much more. Hiring a TSCM specialist is very cost-effective, if you hire a competent firm. TSCM inspections are cheap insurance. Actually, better than insurance; TSCM can prevent the loss in the first place.
Perception of Low Risk
Excuse: Some businesses may believe that the risk of electronic eavesdropping is low in their industry or specific workplace. They might assume that their organization does not hold valuable or sensitive information that would attract eavesdroppers.
Reality: Being “in business” means having a competitive advantage, and others do want it.
Excuse: Conducting TSCM inspections requires specialized knowledge and equipment. If a business does not have the expertise in-house they may choose not to pursue these inspections.
Reality: Hiring an information security consultant–who has TSCM as their speciality–is the solution.
More TSCM Security Inspection Myths & Excuses
Myth: TSCM security inspections can temporarily disrupt normal business operations. The process involves sweeping the premises, potentially causing interruptions or inconveniences to employees or ongoing activities. Some businesses might be reluctant to undergo such disruptions.
Reality: Most inspections are conducted after business hours. When necessary, a TSCM team will assume the same dress and demeanor as employees, have a plausible reason for being in the area, and will work around employees so as not to disturb them.
Trust in Existing Security Measures
Excuse: Businesses may have confidence in their existing security measures, such as physical security, cybersecurity, or access controls. They might believe that these measures are sufficient to protect against eavesdropping and thus forego TSCM security inspections.
Reality: Experience has shown that do-it-yourself security measures are never sufficient to protect against eavesdropping and other forms of information loss. TSCM inspections always identify vulnerabilities and provide recommendations for improvement.
Lack of Legal or Regulatory Requirements
Excuse: Depending on the industry or geographical location, there may be no legal or regulatory obligations that mandate TSCM inspections. In the absence of such requirements, businesses may choose not to prioritize these inspections.
Reality: The financial success of a business should be a more effective motivator than a legal requirement.
Perception of Invasion of Privacy
Myth: TSCM security inspections are invasive or a breach of employee privacy. They might fear that conducting such inspections could harm employee morale or create an atmosphere of distrust.
Reality: Employees appreciate security measures which protect their livelihood and personal privacy. When an employer demonstrates care for information security, employees will act more carefully too.
Limited Resources
Excuse: Small businesses or those with resource constraints may prioritize other operational needs over TSCM security inspections. They might allocate their limited resources to other critical areas or invest in measures they perceive as more immediate concerns.
Reality: Defense is mandatory for survival. Budget waste and misallocation can usually fund TSCM security inspections without added expense, once corrected.
Overconfidence
Excuse: Some businesses might have a sense of overconfidence in their security measures, believing that they are already adequately protected against electronic eavesdropping. This false sense of security can lead to complacency and a disregard for TSCM inspections.
Reality: These businesses are at-risk.
Carefully assess the risks in your workplace. Schedule TSCM security inspections, because… corporate espionage is not a myth.
Murray Associates is an independent technical information security consulting firm. They provide electronic surveillance detection and counterespionage services to business, government and at-risk individuals.
Headquartered in the New York metropolitan area, a Murray Associates team can assist you quickly, anywhere in the United States, and internationally.