Saturday, September 6, 2014

Tip of the Day: An Update on Electronic Eavesdropping

My colleague and friend, Kevin D. Murray, has released the below linked website at http://www.amazon.com, and urge our readers to "purchase this timely, pointed and solution-oriented 'quick-read,' that offers immediate solutions to information protection issues. I have personally read Kevin's 2011 book and frequently use it as a desk reference on eavesdropping issues.  Edward L. Lee, II."

http://www.amazon.com/Cell-Phone-Bugged-Everything-Conversations/dp/1934572888

Business executives must be aware that the magnitude of economic espionage in the global marketplace mandates that sensitive discussions concerning business strategies, new products, mergers and acquisitions, and new investment need to be safeguarded, particularly where proprietary trade secrets are exposed to compromise. 

It is vital that conference rooms, boardrooms, executive offices, aircraft, and executives’ vehicles undergo periodic technical security countermeasures (TSCM) inspections, which ensure that transmitters, “bugs,” and phone taps are not compromising sensitive discussions. 

Of course, this assumes that those responsible for the control of such spaces and vehicles are trusted. Additionally, a TSCM specialist may also recommend the installation of in-place monitoring systems (IPMS) in high-risk spaces, which permits monitoring of eavesdropping activity in the space while sensitive meetings are being conducted.

Business executives working abroad should be aware that eavesdropping devices can be purchased inexpensively and monitored and recorded from almost anywhere.

If sensitive areas have to be cleaned or maintained, a trusted staff member must personally observe visitors. Eavesdropping risks occur for the following reasons:

1. Aggressive competition, particularly among top companies;

2. Distrust of subordinates, cleaning crews, and repair technicians;

3. Lack of legal prohibitions against the use of electronic eavesdropping equipment;

4. Unchecked use of electronic eavesdropping by law enforcement;

5. Conduct eavesdropping inspections on a regular basis. Discovery of eavesdropping--during the information collection process--gives you time to neutralize an attack before harm can be done; and

6. Think of your eavesdropping detection program as being as being a very cheap insurance policy. If you have vital trade secrets that need to be protected on an on-going basis,  failure to have periodic technical inspections is tantamount to driving a new car without insurance. 

If you are a business executive operating anywhere in the world, my recommendation is that you contact Kevin unconditionally, as Kevin Murray is a true professional and one who can be trusted to adhere to ethical and discreet protocols.

Please review Kevin's website and blog: 

http://www.spybusters.com

To email Kevin, go to: 

murray@ spybusters.compage158image13848