Udemy
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Development
Web Development Data Science Mobile Development Programming Languages Game Development Database Design & Development Software Testing Software Engineering Development Tools No-Code Development
Business
Entrepreneurship Communications Management Sales Business Strategy Operations Project Management Business Law Business Analytics & Intelligence Human Resources Industry E-Commerce Media Real Estate Other Business
Finance & Accounting
Accounting & Bookkeeping Compliance Cryptocurrency & Blockchain Economics Finance Finance Cert & Exam Prep Financial Modeling & Analysis Investing & Trading Money Management Tools Taxes Other Finance & Accounting
IT & Software
IT Certification Network & Security Hardware Operating Systems Other IT & Software
Office Productivity
Microsoft Apple Google SAP Oracle Other Office Productivity
Personal Development
Personal Transformation Personal Productivity Leadership Career Development Parenting & Relationships Happiness Esoteric Practices Religion & Spirituality Personal Brand Building Creativity Influence Self Esteem & Confidence Stress Management Memory & Study Skills Motivation Other Personal Development
Design
Web Design Graphic Design & Illustration Design Tools User Experience Design Game Design Design Thinking 3D & Animation Fashion Design Architectural Design Interior Design Other Design
Marketing
Digital Marketing Search Engine Optimization Social Media Marketing Branding Marketing Fundamentals Marketing Analytics & Automation Public Relations Advertising Video & Mobile Marketing Content Marketing Growth Hacking Affiliate Marketing Product Marketing Other Marketing
Lifestyle
Arts & Crafts Beauty & Makeup Esoteric Practices Food & Beverage Gaming Home Improvement Pet Care & Training Travel Other Lifestyle
Photography & Video
Digital Photography Photography Portrait Photography Photography Tools Commercial Photography Video Design Other Photography & Video
Health & Fitness
Fitness General Health Sports Nutrition Yoga Mental Health Dieting Self Defense Safety & First Aid Dance Meditation Other Health & Fitness
Music
Instruments Music Production Music Fundamentals Vocal Music Techniques Music Software Other Music
Teaching & Academics
Engineering Humanities Math Science Online Education Social Science Language Teacher Training Test Prep Other Teaching & Academics
AWS Certification Microsoft Certification AWS Certified Solutions Architect - Associate AWS Certified Cloud Practitioner CompTIA A+ Cisco CCNA Amazon AWS CompTIA Security+ AWS Certified Developer - Associate
Graphic Design Photoshop Adobe Illustrator Drawing Digital Painting InDesign Character Design Canva Figure Drawing
Life Coach Training Neuro-Linguistic Programming Personal Development Mindfulness Personal Transformation Meditation Life Purpose Coaching Emotional Intelligence
Web Development JavaScript React CSS Angular PHP WordPress Node.Js Python
Google Flutter Android Development iOS Development Swift React Native Dart Programming Language Mobile Development Kotlin SwiftUI
Digital Marketing Google Ads (Adwords) Social Media Marketing Google Ads (AdWords) Certification Marketing Strategy Internet Marketing YouTube Marketing Email Marketing Retargeting
SQL Microsoft Power BI Tableau Business Analysis Business Intelligence MySQL Data Analysis Data Modeling Data Cleaning
Business Fundamentals Entrepreneurship Fundamentals Business Strategy Online Business Business Plan Startup Freelancing Blogging Home Business
Unity Game Development Fundamentals Unreal Engine C# 3D Game Development C++ 2D Game Development Unreal Engine Blueprints Blender
30-Day Money-Back Guarantee

This course includes:

  • 1 hour on-demand video
  • 1 article
  • 4 downloadable resources
  • Full lifetime access
  • Access on mobile and TV
Business Management Investigation

Spycam Detection in Workplace Expectation of Privacy Areas

Conduct professional forensic investigations to detect covert spy cameras - Captions in English | Korean | Spanish
Highest Rated
Rating: 4.6 out of 54.6 (91 ratings)
246 students
Created by Kevin D. Murray
Last updated 7/2020
English
English, Korean, 
30-Day Money-Back Guarantee

What you'll learn

  • Conduct professional level inspections: for spy cameras secreted in the workplace; hotel rooms; and other areas where there is an expectation of privacy.
  • Corporations who train their security and facility personnel to conduct in-house security inspections benefit by reducing their risk of an incident, and the inevitable damaging publicity. Implementing a written recording policy (template provided) and documented (log provided) inspection schedule shows due diligence; very helpful for defending against lawsuits. Knowing the company actively takes steps to assure privacy is also morale boosting for employees.
  • Security service providers who train their security officers and investigators gain a competitive advantage by providing this value-added service.
  • Benefits to private investigators include: certification of professional training and adding another revenue stream to their menu of services.
  • Students can also use this knowledge personally to protect themselves and their families during their travels.

Requirements

  • No previous knowledge is required to complete this course. Spy camera inspections do not require special tools.
  • The basic items the student will eventually need include: an inspection log book or inspection log worksheet (provided in the course text); a flashlight and camera (most smartphones will do); simple hand tools if an item needs to be opened (screwdrivers, etc.). In anticipation of finding a spycam in the workplace, the student will want to have an evidence collection kit (latex gloves and evidence collection bags) available before the inspection begins.
  • If inspecting a large number of areas, some technical instrumentation can speed the search process. Sources for all these items are listed in the course text.

Description

SPYCAM DETECTION teaches the basic investigative skills necessary to identify and detect covert spy cameras. It also provides a complete due diligence strategy to help organizations protect their employees, customers and visitors against this privacy invasion. By taking a pro-active approach to “the video voyeur in the workplace problem" the organization also mitigates the risk of expensive lawsuits, damaging publicity and loss of good will.

In addition to the forensic training, the student receives a 25-page course text which includes a strong Recording in the Workplace policy template, a simple Inspection Log form and links to additional information.

Upon completing the course, the student will be able to conduct a professional inspection without the need for expensive instrumentation. Should an organization want to invest in instrumentation (useful for large scale inspections) links to these items are provided in the course text.

SPYCAM DETECTION is primarily useful for:

  • security managers,
  • facilities managers,
  • store managers,
  • security officers,
  • private investigators,
  • landlords,
  • real estate management companies,
  • targets of activist groups,
  • and businesses which invite the public into their locations.

~

Recognizing and detecting spy cameras is also a valuable skill for:

  • law enforcement personnel,
  • security management students,
  • and the general public wishing to protect themselves against video voyeurism.

~

The course is structured to give the student:

  • a full understanding of the video voyeur problem,
  • a written policy which provides deterrence, leverage, and shows due diligence in court,
  • an understanding of the different types of spy cameras and how to identify them,
  • instruction on how to plan and execute a proper inspection,
  • and instruction on what to do if a camera is found and how to handle the evidence.

The course takes about an hour to complete.

Spy cameras are inexpensive and readily available via the Internet and local spy shops. Every child and adult is a potential target. Business especially have a duty to protect the people using their expectation of privacy areas.

Although SPYCAM DETECTION focuses heavily on protecting workplace environments there is a greater good. By taking this course you will be able to use what you have learned to protect yourself and your family during your everyday travels. The effect is cumulative. As more people take this course, opportunities for video voyeurs decreases.

Who this course is for:

  • SPYCAM DETECTION is primarily useful for: security managers, facilities managers, store managers, security officers, private investigators, landlords, real estate management companies, targets of activist groups, and businesses which invite the public into their locations.
  • Recognizing and detecting spy cameras is also a valuable skill for: law enforcement personnel, security management students, and the general public wishing to protect themselves against video voyeurism.
  • This course was not designed to be useful for people interested in learning how to plant spy cameras, or build spy camera enclosures.

Course content

4 sections • 22 lectures • 57m total length

  • What Do You Know About Spycams?
    20 questions
  • Preview8 pages
  • Spycam Detection Training – Course Text (200730).pdf
    00:00

  • Preview01:05
  • Preview01:34
  • Preview01:30

  • Spycam Identification
    00:44
  • Preview02:26
  • Bathroom Items
    02:43
  • Lamps & Mirrors
    03:39
  • Wall Warts
    03:42
  • Smoke & Fire
    01:22
  • Key Fobs
    03:33
  • Containers
    02:07
  • Wristwatches
    02:37
  • Clues You Have Found a Spycam
    04:53
  • Preview04:06
  • The Oddballs
    02:31

  • Inspection Preparation
    01:27
  • Search Procedures
    03:12
  • How to See Through Black Plastic
    01:25
  • Recap
    01:03
  • How to Handle a Find
    03:59
  • Spycam Detection
    20 questions

Instructor

Kevin D. Murray
Technical Surveillance Countermeasures Specialist
Kevin D. Murray
  • 4.6 Instructor Rating
  • 91 Reviews
  • 246 Students
  • 1 Course

Kevin D. Murray, is the Director of Murray Associates, an independent counterespionage consulting firm founded in 1978. He and his team conduct Technical Surveillance Countermeasures inspections (aka TSCM, or bug sweeps) for business, government and the at-risk individual. His work is exclusively TSCM oriented, and has taken him to many countries around the world.

Murray Associates inspections solve workplace security problems, such as:

• business espionage;

• illegal eavesdropping, voyeurism and tracking;

• information security / intellectual property loss loopholes;

• spying at off-site meetings, and compliance with privacy laws.

~

PREVIOUS EXPERIENCE

Pinkerton's Inc.

• International – Director of Electronic Countermeasures

• New Jersey – Director of Investigations

• Investigator – Grades I, II & III

~

CREATIONS

Book - "Is My Cell Phone Bugged? Everything you need to know              to keep your mobile communications secure." ISBN-13: 9781934572887

iPhone App - Kevin's Security Scrapbook - Spy News from New York

Android App - SpyWarn™ 2.0 - Evaluate your smartphone for spyware infections.

SpyWarn™ Anti-Spyware Kit for Smartphones (patent pending) (for clients only)

~

PROFESSIONAL CERTIFICATIONS & LICENSES

Mr. Murray holds the following professional certifications:       

CISM - Certified Information Security Manager             — Information Systems Audit & Control Association (ISACA)

CPP - Certified Protection Professional                   — American Society for Industrial Security (ASIS)                           The American National Standards Institute (ANSI) has accredited the               CISM and            CPP certification programs under ISO/IEC 17024:2003     

CFE - Certified Fraud Examiner      — Association of Certified Fraud Examiners (ACFE)

MPSC - Mobile Phone Seizure Certification      — BK Forensics

Licensed Private Investigator - NJ

Amateur Radio Operator - Extra Class

~

INDUSTRY ORGANIZATIONS

Mr. Murray is involved with these security industry organizations:

IAPSC - International Association of Professional Security Consultants   Periodic Board &               Ethics Committee member. Meritorious Life Membership

HTCIA - High Technology Crime Investigation Association

ISACA - Information Systems Audit & Control Association (CISM)

ASIS - American Society for Industrial Security (CPP)

ACFE - Association of Certified Fraud Examiners (CFE)

InfraGard (An FBI partnership with private sector security professionals.)

ERII - Espionage Research Institute International

~

PRIOR TEACHING EXPERIENCE

• John Jay College of Criminal Justice, New York, NY, Course author & instructor:      Electronic Eavesdropping & Business Espionage Countermeasures

• ASIS - Chapter Meetings - multiple presentations

• National Association of Legal Investigators - TSCM seminar

• New Jersey Licensed Private Investigator's Association - multiple presentations

• Espionage Research Institute, Washington, DC – Thermal Emissions Spectrum      Analysis     for TSCM and multiple other presentations

• FBI / InfraGard - Three TSCM Seminars

• United Nations - New York Landmark's Security Task Force - TSCM seminar

• World Investigator Conference - TSCM seminar

• Joint Certified Fraud Examiners / ASIS - TSCM & Cell Phone Espionage seminar

~

PUBLISHED

Kevin D. Murray is the author of textbook chapters, magazine articles, and his own book.

Murray, Kevin D. Is My Cell Phone Bugged? Everything you need to know to keep your mobile communications private. Austin, TX: Emerald Book Company, 2011 (ISBN: 978-1-934572-88-7)

Murray, Kevin D. Business Spies . . . and the Top 10 Spybusting Tips They Don't Want You to Know! Oldwick, NJ: Spybusters, LLC, 2010. (ISBN B003VYCDRK)

Murray, Kevin D. Electronic Eavesdropping & Industrial Espionage: The Missing Business School Courses. Oldwick, NJ: Spybusters, LLC, 1992–2010.

Arrington, Winston. Now Hear This! Electronic Eavesdropping Equipment Designs. Chicago, IL: Sheffield Electronics Co., 1997. Electronic Countermeasures sections. (ISBN B0012K8WKW)

Bottom, N. R., and R. R. J. Gallati. Industrial Espionage: Intelligence Techniques & Countermeasures. Boston: Butterworth-Heinemann Ltd., 1984. Electronic Counterintelligence section. (ISBN 0409951080)

Guindon, Kathleen M. A.M. Best's Safety & Security Directory. Oldwick, NJ: A.M. Best & Co., 2001. Chapter 15, “Spy vs. Spy: Everything You Need To Know About Corporate Counterespionage." (LoC Catalog Card Number 74-618599, ISBN B000VU9PI2)

Johnson, William M. 101 Questions & Answers About Business Espionage. N.p., Shoreline, Washington: The Questor Group, 2003. Questions and Answers section. (ISBN 1591096227)

Krieger, Gary R. Accident Prevention Manual: Security Management. N.p., Itasca, Illinois: National Safety Council, 1997. Chapter 20, “Communications Security." (ISBN 087912198X)

Lee, Edward L. II. Staying Safe Abroad: Traveling, Working & Living in a Post-9/11 World. Williamsburg, MI: Sleeping Bear Risk Solutions LLC, 2008. Eavesdropping Detection section. (ISBN 0981560504)

Mars-Proietti, Laura. The Grey House Safety & Security Directory. Amenia, NY: Grey House Publishing, 2004. Chapter 16, “Eavesdropping Detection." (ISBN 1592370675)

Montgomery, Reginald J., and William J. Majeski, eds. Corporate Investigation - First and Second Editions. Tucson, AZ: Lawyers & Judges Publishing, 2001 & 2005. Chapter 5, Electronic Eavesdropping & Corporate Counterespionage. (ISBN 0913875635)

Reid, Robert N. Facility Manager's Guide To Security: Protecting Your Assets. Lilburn, GA: Fairmont Press, 2005. Chapter 12. (ISBN 0881734799)

Rothfeder, Jeffrey. Privacy for Sale: How Computerization Has Made Everyone's Private Life an Open Secret. New York: Simon & Schuster, 1992. Chapter 9, “Shadow of Technology." (ISBN 067173492X)

Schnabolk, Charles. Physical Security: Practices & Technology. Boston: Butterworth-Heinemann, 1983. Eavesdropping & Countermeasures chapter. (ISBN 040995067X)

Security Management magazine articles. The journal of the American Society for Industrial Security.

Sennewald, Charles A. CPP. Security Consulting - Third & Fourth Editions. Boston: Butterworth-Heinemann, 2004. Chapter 15, “A Successful Security Consulting Business Stands on a Tripod." (ISBN 0750677945)

Shannon, M. L. The Phone Book: The Latest High-Tech Techniques and Equipment for Preventing Electronic Eavesdropping, Recording Phone Calls, Ending Harassing Calls, and Stopping Toll Fraud. Boulder, CO: Paladin Press, 1998. Sidebars and illustrations. (ISBN 0873649729)

Shannon, M. L. The Bug Book: Wireless Microphones & Surveillance Transmitters. Boulder, CO: Paladin Press, 2000. (ISBN 1581600658)

Swift, Theodore N. Wiretap Detection Techniques: A Guide To Checking Telephone Lines For Wiretaps. Austin, TX: Thomas Investigative Publications, Inc., 2005. (ISBN 0918487056)

Walsh, Timothy J., and Richard J. Healy. The Protection of Assets Manual. Aberdeen, WA: Silver Lake, 1987. Section 15, “Electronic Eavesdropping Detection." (ISBN 0930868048)

Periodicals: The Legal Investigator, PI Journal (cover story), Full Disclosure, World Association of Detectives News... and many more.

Technical Advisor to:

HBO, George Clooney, Steven Soderbergh, NYT/Discovery Channel, Discovery Channel, ABC News 20/20, FOX News, CNN, CBS News, NBC Dateline, Orion Pictures, New York Times best selling author, Joe Finder... and others.

  • Udemy for Business
  • Teach on Udemy
  • Get the app
  • About us
  • Contact us
  • Careers
  • Blog
  • Help and Support
  • Affiliate
  • Terms
  • Privacy policy
  • Cookie settings
  • Sitemap
  • Featured courses
Udemy
© 2021 Udemy, Inc.