School administrator planted “spy pen” in a closed meeting.

Another episode of "Thinking of Eavesdropping? -- Don't Do It!" Throughout the TSCM industry, reports of eavesdropping devices being discovered are often found to have been placed by executives or other trusted individuals who feared that they may be fired or passed over for a promotion. They typically want to know what is going on behind the closed doors of a meeting they were not invited to. This case appears to fall into this category. 

2022-05-07T08:58:12-04:00May 6th, 2022|

Lawyer and client sued for eavesdropping.

Another episode of “Thinking of Eavesdropping? Don’t Do It!”

PIERRE, S.D. (KELO) — The South Dakota Supreme Court says an invasion of privacy claim shouldn’t have been dismissed in favor of the defendants involving recordings that a wife secretly made to use against her husband in a divorce case.

Justice Janine Kern wrote the unanimous […]

2022-04-30T10:09:11-04:00April 30th, 2022|

Are tech employees leaving and going to competitors?

Keeping loyalty among employees can be a difficult challenge, but may also be critical to survival of your business as well as stopping leaks, spying, and other forms of corporate espionage.  Often requests for our corporate TSCM service come when a well placed employee in a tech position has left the company. Even those without […]

2022-03-13T22:57:44-04:00March 13th, 2022|

Tech watch: New style “shotgun” mic

Microphones come in all shapes and sizes. Some may be very small and used in covert applications. Others may just take on unique designs. This mic clearly adds the humorous effect, but it does go to show that microphones can be designed in any shape or size.

2021-09-30T09:23:48-04:00September 30th, 2021|

When the insider becomes an outsider- Terminated employee destroys company data.

Insider threats are one of the most significant security concerns for all businesses. Many companies do not recognize the dangers that may exist within their own staff. This can quickly become apparent when an employee with a grudge is terminated.  This employee was with the company for just 6 months, but was able to cause over $100,000 in damage within two days of her termination.

2021-08-23T08:14:54-04:00August 23rd, 2021|

Threat watch: “Glowworm” attack using power LEDs

Researchers at Ben Gurion University have demonstrated a new class of TEMPEST attack for intercepting confidential information. Their technique involves recovering sound by analyzing optical emanations from a device’s power indicator LED, specifically in the circuits providing power to various speaker systems. Could your conversations be vulnerable?

2021-08-12T14:44:14-04:00August 12th, 2021|

Corporate Information Security and Privacy Challenges from Covid – 2021 update.

2021 update: originally posted in April of 2020, a year later this article is still very significant. Empty offices and increased work from home creates privacy and information security problems. Meetings once contained in a secure board room have now spread out to executive homes in multiple locations, each one with it's own inherent security vulnerabilities. The need for TSCM sweeps has moved to a new level.

2021-04-29T13:00:04-04:00April 29th, 2021|
Go to Top