Find online courses made by experts from around the world.
Take your courses with you and learn anywhere, anytime.
Learn and practice real-world skills and achieve your goals.
SPYCAM DETECTION teaches the basic investigative skills necessary to identify and detect covert spy cameras. It also provides a complete due diligence strategy to help organizations protect their employees, customers and visitors against this privacy invasion. By taking a pro-active approach to “the video voyeur in the workplace problem" the organization also mitigates the risk of expensive lawsuits, damaging publicity and loss of good will.
In addition to the forensic training, the student receives a 25-page course text which includes a strong Recording in the Workplace policy template, a simple Inspection Log form and links to additional information.
Upon completing the course, the student will be able to conduct a professional inspection without the need for expensive instrumentation. Should an organization want to invest in instrumentation (useful for large scale inspections) links to these items are provided in the course text.
SPYCAM DETECTION is primarily useful for:
Recognizing and detecting spy cameras is also a valuable skill for:
The course is structured to give the student:
The course takes about an hour to complete.
Spy cameras are inexpensive and readily available via the Internet and local spy shops. Every child and adult is a potential target. Business especially have a duty to protect the people using their expectation of privacy areas.
Although SPYCAM DETECTION focuses heavily on protecting workplace environments there is a greater good. By taking this course you will be able to use what you have learned to protect yourself and your family during your everyday travels. The effect is cumulative. As more people take this course, opportunities for video voyeurs decreases.
Not for you? No problem.
30 day money back guarantee.
Learn on the go.
Desktop, iOS and Android.
Certificate of completion.
|Quiz 1||20 questions|
Don't worry. This is just so you can compare your score from this quiz with your final quiz score. You will be amazed at how much you learned.
|Lecture 1||8 pages|
Download this FREE preview of the course text. Doing so will give you good insites about the course quality.
In addition to the information presented in the videos, the course text contains additional important information and graphics. It is also where the student finds links to outside information and sources for the investigative items mentioned.
|Section 1: INTRODUCTION|
An overview of the course, a mention of its development for a Fortune 50 company for their security and facilities personnel, and what the student can expect to learn.
What is an "Expectation of Privacy" area, and how the law defines "expectation of privacy."The defination is broader than you might think.
An effective workplace anti-video voyeurism strategy has two parts; professionally executed inspections, backed up with strong written policies detailing recording in the workplace rules, and what constitutes harassment.
|Section 2: Spycam Identification|
The first step in learning how to conduct a spy camera inspection is being able to identify them. This brief introduction explains next few lectures focus on the various categories of spycams that may be encountered.
A review of spy camera components before they are secreted in other objects.
Bathroom cameras are disguised as shower radios and even soap dishes.
Some spycams are hidden within vanity mirrors and room lamps. These are among the most difficult to identify. One reason is that some lamps are made of infrared transparent black plastic, thus there is no visible lens hole.
Wall warts refers to anything that hangs on a wall, or plugs into a wall outlet.
This category of spycams takes advantage of the ubiquity of fire related items stuck on the ceiling and walls to avoid attention. Not to mention a natural reluctance to question these "official" items.
The danger of key fob spycams is that they can be carried while filming as well as being left on a table (or peering out of a locker vent) unattended. Close inspection makes them easy to identify, however.
Containers for products we see and/or use every day are a popular category for spycam secretion. Not allowing personal containers in Expectation of Privacy areas is one easy precaution an organization can employ to reduce risk.
Like key fobs, wristwatches video while on the person, or left propped up in a locker. Chances are very slim of being able to identify one which is being worn. Close inspection is required.
You know you have found a spycam if you see these things...
The idea spycams are being planted is not theoritical. Here we take a look at some case histories from the Murray Associates files.
|Section 3: THE INSPECTION PROCESS|
Preparation before launching a spy camera detection inspection is critical to a successful outcome. Do these things first...
This lecture explains the steps required to conduct a professional inspection for spy cameras.
Spycams hidden behind black plastic front panels or enclosures require a special detection technique. Here the student learns how to "see" through black plastic. Superman, anyone?
A rapid-fire review of all the spycam types seen in the course. This helps reinforce the mindset that all objects in an Expectation of Privacy must be viewed with suspicion during an inspection.
"Hey, I found something. Now what?" This is the make or break point in the inspection process. A successful outcome depends on taking the proper steps.
Kevin D. Murray, is the Director of Murray Associates, an independent security consulting firm (they don't sell the security products they recommend), founded in 1978. He and his team conduct Technical Information Security Surveys, also called Technical Surveillance Countermeasures (TSCM, or bug sweeps) for businesses, governments and at-risk individuals. His work is exclusively TSCM oriented, and has taken him to many countries around the world.
Murray Associates inspections solve workplace security problems, such as:
• business espionage;
• illegal eavesdropping, voyeurism and tracking;
• information security / intellectual property loss loopholes;
• spying at off-site meetings, and compliance with privacy laws.
• International – Director of Electronic Countermeasures
• New Jersey – Director of Investigations
• Investigator – Grades I, II & III
Book - "Is My Cell Phone Bugged? Everything you need to know to keep your mobile communications secure." ISBN-13: 9781934572887
iPhone App - Kevin's Security Scrapbook - Spy News from New York
Android App - SpyWarn™ 2.0 - Evaluate your smartphone for spyware infections.
SpyWarn™ Anti-Spyware Kit for Smartphones (patent pending) (for clients only)
PROFESSIONAL CERTIFICATIONS & LICENSES
Mr. Murray holds the following professional certifications:
CISM - Certified Information Security Manager — Information Systems Audit & Control Association (ISACA)
CPP - Certified Protection Professional — American Society for Industrial Security (ASIS) The American National Standards Institute (ANSI) has accredited the CISM and CPP certification programs under ISO/IEC 17024:2003
CFE - Certified Fraud Examiner — Association of Certified Fraud Examiners (ACFE)
MPSC - Mobile Phone Seizure Certification — BK Forensics
Licensed Private Investigator - NJ
Amateur Radio Operator - Extra Class
Mr. Murray is involved with these security industry organizations:
IAPSC - International Association of Professional Security Consultants Periodic Board & Ethics Committee member. Meritorious Life Membership
HTCIA - High Technology Crime Investigation Association
ISACA - Information Systems Audit & Control Association (CISM)
ASIS - American Society for Industrial Security (CPP)
ACFE - Association of Certified Fraud Examiners (CFE)
InfraGard (An FBI partnership with private sector security professionals.)
ERII - Espionage Research Institute International
PRIOR TEACHING EXPERIENCE
• John Jay College of Criminal Justice, New York, NY, Course author & instructor: Electronic Eavesdropping & Business Espionage Countermeasures
• ASIS - Chapter Meetings - multiple presentations
• National Association of Legal Investigators - TSCM seminar
• New Jersey Licensed Private Investigator's Association - multiple presentations
• Espionage Research Institute, Washington, DC – Thermal Emissions Spectrum Analysis for TSCM and multiple other presentations
• FBI / InfraGard - Three TSCM Seminars
• United Nations - New York Landmark's Security Task Force - TSCM seminar
• World Investigator Conference - TSCM seminar
• Joint Certified Fraud Examiners / ASIS - TSCM & Cell Phone Espionage seminar
Kevin D. Murray is the author of textbook chapters, magazine articles, and his own book.
Murray, Kevin D. Is My Cell Phone Bugged? Everything you need to know to keep your mobile communications private. Austin, TX: Emerald Book Company, 2011 (ISBN: 978-1-934572-88-7)
Murray, Kevin D. Business Spies . . . and the Top 10 Spybusting Tips They Don't Want You to Know! Oldwick, NJ: Spybusters, LLC, 2010. (ISBN B003VYCDRK)
Murray, Kevin D. Electronic Eavesdropping & Industrial Espionage: The Missing Business School Courses. Oldwick, NJ: Spybusters, LLC, 1992–2010.
Arrington, Winston. Now Hear This! Electronic Eavesdropping Equipment Designs. Chicago, IL: Sheffield Electronics Co., 1997. Electronic Countermeasures sections. (ISBN B0012K8WKW)
Bottom, N. R., and R. R. J. Gallati. Industrial Espionage: Intelligence Techniques & Countermeasures. Boston: Butterworth-Heinemann Ltd., 1984. Electronic Counterintelligence section. (ISBN 0409951080)
Guindon, Kathleen M. A.M. Best's Safety & Security Directory. Oldwick, NJ: A.M. Best & Co., 2001. Chapter 15, “Spy vs. Spy: Everything You Need To Know About Corporate Counterespionage." (LoC Catalog Card Number 74-618599, ISBN B000VU9PI2)
Johnson, William M. 101 Questions & Answers About Business Espionage. N.p., Shoreline, Washington: The Questor Group, 2003. Questions and Answers section. (ISBN 1591096227)
Krieger, Gary R. Accident Prevention Manual: Security Management. N.p., Itasca, Illinois: National Safety Council, 1997. Chapter 20, “Communications Security." (ISBN 087912198X)
Lee, Edward L. II. Staying Safe Abroad: Traveling, Working & Living in a Post-9/11 World. Williamsburg, MI: Sleeping Bear Risk Solutions LLC, 2008. Eavesdropping Detection section. (ISBN 0981560504)
Mars-Proietti, Laura. The Grey House Safety & Security Directory. Amenia, NY: Grey House Publishing, 2004. Chapter 16, “Eavesdropping Detection." (ISBN 1592370675)
Montgomery, Reginald J., and William J. Majeski, eds. Corporate Investigation - First and Second Editions. Tucson, AZ: Lawyers & Judges Publishing, 2001 & 2005. Chapter 5, Electronic Eavesdropping & Corporate Counterespionage. (ISBN 0913875635)
Reid, Robert N. Facility Manager's Guide To Security: Protecting Your Assets. Lilburn, GA: Fairmont Press, 2005. Chapter 12. (ISBN 0881734799)
Rothfeder, Jeffrey. Privacy for Sale: How Computerization Has Made Everyone's Private Life an Open Secret. New York: Simon & Schuster, 1992. Chapter 9, “Shadow of Technology." (ISBN 067173492X)
Schnabolk, Charles. Physical Security: Practices & Technology. Boston: Butterworth-Heinemann, 1983. Eavesdropping & Countermeasures chapter. (ISBN 040995067X)
Security Management magazine articles. The journal of the American Society for Industrial Security.
Sennewald, Charles A. CPP. Security Consulting - Third & Fourth Editions. Boston: Butterworth-Heinemann, 2004. Chapter 15, “A Successful Security Consulting Business Stands on a Tripod." (ISBN 0750677945)
Shannon, M. L. The Phone Book: The Latest High-Tech Techniques and Equipment for Preventing Electronic Eavesdropping, Recording Phone Calls, Ending Harassing Calls, and Stopping Toll Fraud. Boulder, CO: Paladin Press, 1998. Sidebars and illustrations. (ISBN 0873649729)
Shannon, M. L. The Bug Book: Wireless Microphones & Surveillance Transmitters. Boulder, CO: Paladin Press, 2000. (ISBN 1581600658)
Swift, Theodore N. Wiretap Detection Techniques: A Guide To Checking Telephone Lines For Wiretaps. Austin, TX: Thomas Investigative Publications, Inc., 2005. (ISBN 0918487056)
Walsh, Timothy J., and Richard J. Healy. The Protection of Assets Manual. Aberdeen, WA: Silver Lake, 1987. Section 15, “Electronic Eavesdropping Detection." (ISBN 0930868048)
Periodicals: The Legal Investigator, PI Journal (cover story), Full Disclosure, World Association of Detectives News... and many more.
Technical Advisor to:
HBO, George Clooney, Steven Soderbergh, NYT/Discovery Channel, Discovery Channel, ABC News 20/20, FOX News, CNN, CBS News, NBC Dateline, Orion Pictures, New York Times best selling author, Joe Finder... and others.