Spycam Detection in Workplace Expectation of Privacy Areas
What you'll learn
- Conduct professional level inspections: for spy cameras secreted in the workplace; hotel rooms; and other areas where there is an expectation of privacy.
- Corporations can train their security and facility personnel to conduct in-house security inspections.
- Security service providers who train their security officers and investigators gain a competitive advantage by providing this value-added service.
- Benefits to private investigators include: certification of professional training and adding another revenue stream to their menu of services.
- Students can also use this knowledge personally to protect themselves and their families during their travels.
- No previous knowledge is required to complete this course. Spy camera inspections do not require special tools.
- The basic items the student will eventually need include: an inspection log book or inspection log worksheet (provided in the course text); a flashlight and camera (most smartphones will do); simple hand tools if an item needs to be opened (screwdrivers, etc.). In anticipation of finding a spycam in the workplace, the student will want to have an evidence collection kit (latex gloves and evidence collection bags) available before the inspection begins.
- If inspecting a large number of areas, some technical instrumentation can speed the search process. Sources for all these items are listed in the course text.
SPYCAM DETECTION teaches the basic investigative skills necessary to identify and detect covert spy cameras. It also provides a complete due diligence strategy to help organizations protect their employees, customers and visitors against this privacy invasion. By taking a pro-active approach to “the video voyeur in the workplace problem" the organization also mitigates the risk of expensive lawsuits, damaging publicity and loss of good will.
In addition to the forensic training, the student receives a 25-page course text which includes a strong Recording in the Workplace policy template, a simple Inspection Log form and links to additional information.
Upon completing the course, the student will be able to conduct a professional inspection without the need for expensive instrumentation. Should an organization want to invest in instrumentation (useful for large scale inspections) links to these items are provided in the course text.
SPYCAM DETECTION is primarily useful for:
- security managers,
- facilities managers,
- store managers,
- security officers,
- private investigators,
- real estate management companies,
- targets of activist groups,
- and businesses which invite the public into their locations.
Recognizing and detecting spy cameras is also a valuable skill for:
- law enforcement personnel,
- security management students,
- and the general public wishing to protect themselves against video voyeurism.
The course is structured to give the student:
- a full understanding of the video voyeur problem,
- a written policy which provides deterrence, leverage, and shows due diligence in court,
- an understanding of the different types of spy cameras and how to identify them,
- instruction on how to plan and execute a proper inspection,
- and instruction on what to do if a camera is found and how to handle the evidence.
The course takes about an hour to complete.
Spy cameras are inexpensive and readily available via the Internet and local spy shops. Every child and adult is a potential target. Business especially have a duty to protect the people using their expectation of privacy areas.
Although SPYCAM DETECTION focuses heavily on protecting workplace environments there is a greater good. By taking this course you will be able to use what you have learned to protect yourself and your family during your everyday travels. The effect is cumulative. As more people take this course, opportunities for video voyeurs decreases.
Who this course is for:
- SPYCAM DETECTION is primarily useful for: security managers, facilities managers, store managers, security officers, private investigators, landlords, real estate management companies, targets of activist groups, and businesses which invite the public into their locations.
- Recognizing and detecting spy cameras is also a valuable skill for: law enforcement personnel, security management students, and the general public wishing to protect themselves against video voyeurism.
- This course was not designed to be useful for people interested in learning how to plant spy cameras, or build spy camera enclosures.
Kevin D. Murray, is the Director of Murray Associates, an independent counterespionage consulting firm founded in 1978. He and his team conduct Technical Surveillance Countermeasures inspections (aka TSCM, or bug sweeps) for business, government and the at-risk individual. His work is exclusively TSCM oriented, and has taken him to many countries around the world.
Murray Associates inspections solve workplace security problems, such as:
• business espionage;
• illegal eavesdropping, voyeurism and tracking;
• information security / intellectual property loss loopholes;
• spying at off-site meetings, and compliance with privacy laws.
• International – Director of Electronic Countermeasures
• New Jersey – Director of Investigations
• Investigator – Grades I, II & III
Book - "Is My Cell Phone Bugged? Everything you need to know to keep your mobile communications secure." ISBN-13: 9781934572887
iPhone App - Kevin's Security Scrapbook - Spy News from New York
Android App - SpyWarn™ 2.0 - Evaluate your smartphone for spyware infections.
SpyWarn™ Anti-Spyware Kit for Smartphones (patent pending) (for clients only)
PROFESSIONAL CERTIFICATIONS & LICENSES
Mr. Murray holds the following professional certifications:
CISM - Certified Information Security Manager — Information Systems Audit & Control Association (ISACA)
CPP - Certified Protection Professional — American Society for Industrial Security (ASIS) The American National Standards Institute (ANSI) has accredited the CISM and CPP certification programs under ISO/IEC 17024:2003
CFE - Certified Fraud Examiner — Association of Certified Fraud Examiners (ACFE)
MPSC - Mobile Phone Seizure Certification — BK Forensics
Licensed Private Investigator - NJ
Amateur Radio Operator - Extra Class
Mr. Murray is involved with these security industry organizations:
IAPSC - International Association of Professional Security Consultants Periodic Board & Ethics Committee member. Meritorious Life Membership
HTCIA - High Technology Crime Investigation Association
ISACA - Information Systems Audit & Control Association (CISM)
ASIS - American Society for Industrial Security (CPP)
ACFE - Association of Certified Fraud Examiners (CFE)
InfraGard (An FBI partnership with private sector security professionals.)
ERII - Espionage Research Institute International
PRIOR TEACHING EXPERIENCE
• John Jay College of Criminal Justice, New York, NY, Course author & instructor: Electronic Eavesdropping & Business Espionage Countermeasures
• ASIS - Chapter Meetings - multiple presentations
• National Association of Legal Investigators - TSCM seminar
• New Jersey Licensed Private Investigator's Association - multiple presentations
• Espionage Research Institute, Washington, DC – Thermal Emissions Spectrum Analysis for TSCM and multiple other presentations
• FBI / InfraGard - Three TSCM Seminars
• United Nations - New York Landmark's Security Task Force - TSCM seminar
• World Investigator Conference - TSCM seminar
• Joint Certified Fraud Examiners / ASIS - TSCM & Cell Phone Espionage seminar
Kevin D. Murray is the author of textbook chapters, magazine articles, and his own book.
Murray, Kevin D. Is My Cell Phone Bugged? Everything you need to know to keep your mobile communications private. Austin, TX: Emerald Book Company, 2011 (ISBN: 978-1-934572-88-7)
Murray, Kevin D. Business Spies . . . and the Top 10 Spybusting Tips They Don't Want You to Know! Oldwick, NJ: Spybusters, LLC, 2010. (ISBN B003VYCDRK)
Murray, Kevin D. Electronic Eavesdropping & Industrial Espionage: The Missing Business School Courses. Oldwick, NJ: Spybusters, LLC, 1992–2010.
Arrington, Winston. Now Hear This! Electronic Eavesdropping Equipment Designs. Chicago, IL: Sheffield Electronics Co., 1997. Electronic Countermeasures sections. (ISBN B0012K8WKW)
Bottom, N. R., and R. R. J. Gallati. Industrial Espionage: Intelligence Techniques & Countermeasures. Boston: Butterworth-Heinemann Ltd., 1984. Electronic Counterintelligence section. (ISBN 0409951080)
Guindon, Kathleen M. A.M. Best's Safety & Security Directory. Oldwick, NJ: A.M. Best & Co., 2001. Chapter 15, “Spy vs. Spy: Everything You Need To Know About Corporate Counterespionage." (LoC Catalog Card Number 74-618599, ISBN B000VU9PI2)
Johnson, William M. 101 Questions & Answers About Business Espionage. N.p., Shoreline, Washington: The Questor Group, 2003. Questions and Answers section. (ISBN 1591096227)
Krieger, Gary R. Accident Prevention Manual: Security Management. N.p., Itasca, Illinois: National Safety Council, 1997. Chapter 20, “Communications Security." (ISBN 087912198X)
Lee, Edward L. II. Staying Safe Abroad: Traveling, Working & Living in a Post-9/11 World. Williamsburg, MI: Sleeping Bear Risk Solutions LLC, 2008. Eavesdropping Detection section. (ISBN 0981560504)
Mars-Proietti, Laura. The Grey House Safety & Security Directory. Amenia, NY: Grey House Publishing, 2004. Chapter 16, “Eavesdropping Detection." (ISBN 1592370675)
Montgomery, Reginald J., and William J. Majeski, eds. Corporate Investigation - First and Second Editions. Tucson, AZ: Lawyers & Judges Publishing, 2001 & 2005. Chapter 5, Electronic Eavesdropping & Corporate Counterespionage. (ISBN 0913875635)
Reid, Robert N. Facility Manager's Guide To Security: Protecting Your Assets. Lilburn, GA: Fairmont Press, 2005. Chapter 12. (ISBN 0881734799)
Rothfeder, Jeffrey. Privacy for Sale: How Computerization Has Made Everyone's Private Life an Open Secret. New York: Simon & Schuster, 1992. Chapter 9, “Shadow of Technology." (ISBN 067173492X)
Schnabolk, Charles. Physical Security: Practices & Technology. Boston: Butterworth-Heinemann, 1983. Eavesdropping & Countermeasures chapter. (ISBN 040995067X)
Security Management magazine articles. The journal of the American Society for Industrial Security.
Sennewald, Charles A. CPP. Security Consulting - Third & Fourth Editions. Boston: Butterworth-Heinemann, 2004. Chapter 15, “A Successful Security Consulting Business Stands on a Tripod." (ISBN 0750677945)
Shannon, M. L. The Phone Book: The Latest High-Tech Techniques and Equipment for Preventing Electronic Eavesdropping, Recording Phone Calls, Ending Harassing Calls, and Stopping Toll Fraud. Boulder, CO: Paladin Press, 1998. Sidebars and illustrations. (ISBN 0873649729)
Shannon, M. L. The Bug Book: Wireless Microphones & Surveillance Transmitters. Boulder, CO: Paladin Press, 2000. (ISBN 1581600658)
Swift, Theodore N. Wiretap Detection Techniques: A Guide To Checking Telephone Lines For Wiretaps. Austin, TX: Thomas Investigative Publications, Inc., 2005. (ISBN 0918487056)
Walsh, Timothy J., and Richard J. Healy. The Protection of Assets Manual. Aberdeen, WA: Silver Lake, 1987. Section 15, “Electronic Eavesdropping Detection." (ISBN 0930868048)
Periodicals: The Legal Investigator, PI Journal (cover story), Full Disclosure, World Association of Detectives News... and many more.
Technical Advisor to:
HBO, George Clooney, Steven Soderbergh, NYT/Discovery Channel, Discovery Channel, ABC News 20/20, FOX News, CNN, CBS News, NBC Dateline, Orion Pictures, New York Times best selling author, Joe Finder... and others.