Spycam Detection in Workplace Expectation of Privacy Areas

Conduct professional forensic investigations to detect covert spy cameras and create a Recording in the Workplace policy
4.8 (25 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
67 students enrolled
$35
Take This Course
  • Lectures 21
  • Length 1.5 hours
  • Skill Level Beginner Level
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 7/2015 English

Course Description

SPYCAM DETECTION teaches the basic investigative skills necessary to identify and detect covert spy cameras. It also provides a complete due diligence strategy to help organizations protect their employees, customers and visitors against this privacy invasion. By taking a pro-active approach to “the video voyeur in the workplace problem" the organization also mitigates the risk of expensive lawsuits, damaging publicity and loss of good will.

In addition to the forensic training, the student receives a 25-page course text which includes a strong Recording in the Workplace policy template, a simple Inspection Log form and links to additional information.

Upon completing the course, the student will be able to conduct a professional inspection without the need for expensive instrumentation. Should an organization want to invest in instrumentation (useful for large scale inspections) links to these items are provided in the course text.

SPYCAM DETECTION is primarily useful for:

  • security managers,
  • facilities managers,
  • store managers,
  • security officers,
  • private investigators,
  • landlords,
  • real estate management companies,
  • targets of activist groups,
  • and businesses which invite the public into their locations.

~

Recognizing and detecting spy cameras is also a valuable skill for:

  • law enforcement personnel,
  • security management students,
  • and the general public wishing to protect themselves against video voyeurism.

~

The course is structured to give the student:

  • a full understanding of the video voyeur problem,
  • a written policy which provides deterrence, leverage, and shows due diligence in court,
  • an understanding of the different types of spy cameras and how to identify them,
  • instruction on how to plan and execute a proper inspection,
  • and instruction on what to do if a camera is found and how to handle the evidence.

The course takes about an hour to complete.

Spy cameras are inexpensive and readily available via the Internet and local spy shops. Every child and adult is a potential target. Business especially have a duty to protect the people using their expectation of privacy areas.

Although SPYCAM DETECTION focuses heavily on protecting workplace environments there is a greater good. By taking this course you will be able to use what you have learned to protect yourself and your family during your everyday travels. The effect is cumulative. As more people take this course, opportunities for video voyeurs decreases.

What are the requirements?

  • No previous knowledge is required to complete this course. Spy camera inspections do not require special tools.
  • The basic items the student will eventually need include: an inspection log book or inspection log worksheet (provided in the course text); a flashlight and camera (most smartphones will do); simple hand tools if an item needs to be opened (screwdrivers, etc.). In anticipation of finding a spycam in the workplace, the student will want to have an evidence collection kit (latex gloves and evidence collection bags) available before the inspection begins.
  • If inspecting a large number of areas, some technical instrumentation can speed the search process. Sources for all these items are listed in the course text.

What am I going to get from this course?

  • Conduct professional level inspections: for spy cameras secreted in the workplace; hotel rooms; and other areas where there is an expectation of privacy.
  • Corporations who train their security and facility personnel to conduct in-house security inspections benefit by reducing their risk of an incident, and the inevitable damaging publicity. Implementing a written recording policy (template provided) and documented (log provided) inspection schedule shows due diligence; very helpful for defending against lawsuits. Knowing the company actively takes steps to assure privacy is also morale boosting for employees.
  • Security service providers who train their security officers and investigators gain a competitive advantage by providing this value-added service.
  • Benefits to private investigators include: certification of professional training and adding another revenue stream to their menu of services.
  • Students can also use this knowledge personally to protect themselves and their families during their travels.

What is the target audience?

  • SPYCAM DETECTION is primarily useful for: security managers, facilities managers, store managers, security officers, private investigators, landlords, real estate management companies, targets of activist groups, and businesses which invite the public into their locations.
  • Recognizing and detecting spy cameras is also a valuable skill for: law enforcement personnel, security management students, and the general public wishing to protect themselves against video voyeurism.
  • This course was not designed to be useful for people interested in learning how to plant spy cameras, or build spy camera enclosures.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

20 questions

Don't worry. This is just so you can compare your score from this quiz with your final quiz score. You will be amazed at how much you learned.

8 pages

Download this FREE preview of the course text. Doing so will give you good insites about the course quality.

25 pages

In addition to the information presented in the videos, the course text contains additional important information and graphics. It is also where the student finds links to outside information and sources for the investigative items mentioned.

Section 1: INTRODUCTION
01:05

An overview of the course, a mention of its development for a Fortune 50 company for their security and facilities personnel, and what the student can expect to learn.

01:34

What is an "Expectation of Privacy" area, and how the law defines "expectation of privacy."The defination is broader than you might think.

01:30

An effective workplace anti-video voyeurism strategy has two parts; professionally executed inspections, backed up with strong written policies detailing recording in the workplace rules, and what constitutes harassment.

Section 2: Spycam Identification
00:44

The first step in learning how to conduct a spy camera inspection is being able to identify them. This brief introduction explains next few lectures focus on the various categories of spycams that may be encountered.

02:26

A review of spy camera components before they are secreted in other objects.

02:43

Bathroom cameras are disguised as shower radios and even soap dishes.

03:39

Some spycams are hidden within vanity mirrors and room lamps. These are among the most difficult to identify. One reason is that some lamps are made of infrared transparent black plastic, thus there is no visible lens hole.

03:42

Wall warts refers to anything that hangs on a wall, or plugs into a wall outlet.

01:22

This category of spycams takes advantage of the ubiquity of fire related items stuck on the ceiling and walls to avoid attention. Not to mention a natural reluctance to question these "official" items.

03:33

The danger of key fob spycams is that they can be carried while filming as well as being left on a table (or peering out of a locker vent) unattended. Close inspection makes them easy to identify, however.

02:07

Containers for products we see and/or use every day are a popular category for spycam secretion. Not allowing personal containers in Expectation of Privacy areas is one easy precaution an organization can employ to reduce risk.

02:37

Like key fobs, wristwatches video while on the person, or left propped up in a locker. Chances are very slim of being able to identify one which is being worn. Close inspection is required.

04:53

You know you have found a spycam if you see these things...

04:06

The idea spycams are being planted is not theoritical. Here we take a look at some case histories from the Murray Associates files.

Section 3: THE INSPECTION PROCESS
01:27

Preparation before launching a spy camera detection inspection is critical to a successful outcome. Do these things first...

03:12

This lecture explains the steps required to conduct a professional inspection for spy cameras.

01:25

Spycams hidden behind black plastic front panels or enclosures require a special detection technique. Here the student learns how to "see" through black plastic. Superman, anyone?

01:03

A rapid-fire review of all the spycam types seen in the course. This helps reinforce the mindset that all objects in an Expectation of Privacy must be viewed with suspicion during an inspection.

03:59

"Hey, I found something. Now what?" This is the make or break point in the inspection process. A successful outcome depends on taking the proper steps.

Spycam Detection
20 questions

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

Kevin D. Murray, Technical Surveillance Countermeasures Specialist

Kevin D. Murray, is the Director of Murray Associates, an independent security consulting firm (they don't sell the security products they recommend), founded in 1978. He and his team conduct Technical Information Security Surveys, also called Technical Surveillance Countermeasures (TSCM, or bug sweeps) for businesses, governments and at-risk individuals. His work is exclusively TSCM oriented, and has taken him to many countries around the world.

Murray Associates inspections solve workplace security problems, such as:

• business espionage;

• illegal eavesdropping, voyeurism and tracking;

• information security / intellectual property loss loopholes;

• spying at off-site meetings, and compliance with privacy laws.

~

PREVIOUS EXPERIENCE

Pinkerton's Inc.

• International – Director of Electronic Countermeasures

• New Jersey – Director of Investigations

• Investigator – Grades I, II & III

~

CREATIONS

Book - "Is My Cell Phone Bugged? Everything you need to know to keep your mobile communications secure." ISBN-13: 9781934572887

iPhone App - Kevin's Security Scrapbook - Spy News from New York

Android App - SpyWarn™ 2.0 - Evaluate your smartphone for spyware infections.

SpyWarn™ Anti-Spyware Kit for Smartphones (patent pending) (for clients only)

~

PROFESSIONAL CERTIFICATIONS & LICENSES

Mr. Murray holds the following professional certifications:

CISM - Certified Information Security Manager — Information Systems Audit & Control Association (ISACA)

CPP - Certified Protection Professional — American Society for Industrial Security (ASIS) The American National Standards Institute (ANSI) has accredited the CISM and CPP certification programs under ISO/IEC 17024:2003

CFE - Certified Fraud Examiner — Association of Certified Fraud Examiners (ACFE)

MPSC - Mobile Phone Seizure Certification — BK Forensics

Licensed Private Investigator - NJ

Amateur Radio Operator - Extra Class

~

INDUSTRY ORGANIZATIONS

Mr. Murray is involved with these security industry organizations:

IAPSC - International Association of Professional Security Consultants Periodic Board & Ethics Committee member. Meritorious Life Membership

HTCIA - High Technology Crime Investigation Association

ISACA - Information Systems Audit & Control Association (CISM)

ASIS - American Society for Industrial Security (CPP)

ACFE - Association of Certified Fraud Examiners (CFE)

InfraGard (An FBI partnership with private sector security professionals.)

ERII - Espionage Research Institute International

~

PRIOR TEACHING EXPERIENCE

• John Jay College of Criminal Justice, New York, NY, Course author & instructor: Electronic Eavesdropping & Business Espionage Countermeasures

• ASIS - Chapter Meetings - multiple presentations

• National Association of Legal Investigators - TSCM seminar

• New Jersey Licensed Private Investigator's Association - multiple presentations

• Espionage Research Institute, Washington, DC – Thermal Emissions Spectrum Analysis for TSCM and multiple other presentations

• FBI / InfraGard - Three TSCM Seminars

• United Nations - New York Landmark's Security Task Force - TSCM seminar

• World Investigator Conference - TSCM seminar

• Joint Certified Fraud Examiners / ASIS - TSCM & Cell Phone Espionage seminar

~

PUBLISHED

Kevin D. Murray is the author of textbook chapters, magazine articles, and his own book.

Murray, Kevin D. Is My Cell Phone Bugged? Everything you need to know to keep your mobile communications private. Austin, TX: Emerald Book Company, 2011 (ISBN: 978-1-934572-88-7)

Murray, Kevin D. Business Spies . . . and the Top 10 Spybusting Tips They Don't Want You to Know! Oldwick, NJ: Spybusters, LLC, 2010. (ISBN B003VYCDRK)

Murray, Kevin D. Electronic Eavesdropping & Industrial Espionage: The Missing Business School Courses. Oldwick, NJ: Spybusters, LLC, 1992–2010.

Arrington, Winston. Now Hear This! Electronic Eavesdropping Equipment Designs. Chicago, IL: Sheffield Electronics Co., 1997. Electronic Countermeasures sections. (ISBN B0012K8WKW)

Bottom, N. R., and R. R. J. Gallati. Industrial Espionage: Intelligence Techniques & Countermeasures. Boston: Butterworth-Heinemann Ltd., 1984. Electronic Counterintelligence section. (ISBN 0409951080)

Guindon, Kathleen M. A.M. Best's Safety & Security Directory. Oldwick, NJ: A.M. Best & Co., 2001. Chapter 15, “Spy vs. Spy: Everything You Need To Know About Corporate Counterespionage." (LoC Catalog Card Number 74-618599, ISBN B000VU9PI2)

Johnson, William M. 101 Questions & Answers About Business Espionage. N.p., Shoreline, Washington: The Questor Group, 2003. Questions and Answers section. (ISBN 1591096227)

Krieger, Gary R. Accident Prevention Manual: Security Management. N.p., Itasca, Illinois: National Safety Council, 1997. Chapter 20, “Communications Security." (ISBN 087912198X)

Lee, Edward L. II. Staying Safe Abroad: Traveling, Working & Living in a Post-9/11 World. Williamsburg, MI: Sleeping Bear Risk Solutions LLC, 2008. Eavesdropping Detection section. (ISBN 0981560504)

Mars-Proietti, Laura. The Grey House Safety & Security Directory. Amenia, NY: Grey House Publishing, 2004. Chapter 16, “Eavesdropping Detection." (ISBN 1592370675)

Montgomery, Reginald J., and William J. Majeski, eds. Corporate Investigation - First and Second Editions. Tucson, AZ: Lawyers & Judges Publishing, 2001 & 2005. Chapter 5, Electronic Eavesdropping & Corporate Counterespionage. (ISBN 0913875635)

Reid, Robert N. Facility Manager's Guide To Security: Protecting Your Assets. Lilburn, GA: Fairmont Press, 2005. Chapter 12. (ISBN 0881734799)

Rothfeder, Jeffrey. Privacy for Sale: How Computerization Has Made Everyone's Private Life an Open Secret. New York: Simon & Schuster, 1992. Chapter 9, “Shadow of Technology." (ISBN 067173492X)

Schnabolk, Charles. Physical Security: Practices & Technology. Boston: Butterworth-Heinemann, 1983. Eavesdropping & Countermeasures chapter. (ISBN 040995067X)

Security Management magazine articles. The journal of the American Society for Industrial Security.

Sennewald, Charles A. CPP. Security Consulting - Third & Fourth Editions. Boston: Butterworth-Heinemann, 2004. Chapter 15, “A Successful Security Consulting Business Stands on a Tripod." (ISBN 0750677945)

Shannon, M. L. The Phone Book: The Latest High-Tech Techniques and Equipment for Preventing Electronic Eavesdropping, Recording Phone Calls, Ending Harassing Calls, and Stopping Toll Fraud. Boulder, CO: Paladin Press, 1998. Sidebars and illustrations. (ISBN 0873649729)

Shannon, M. L. The Bug Book: Wireless Microphones & Surveillance Transmitters. Boulder, CO: Paladin Press, 2000. (ISBN 1581600658)

Swift, Theodore N. Wiretap Detection Techniques: A Guide To Checking Telephone Lines For Wiretaps. Austin, TX: Thomas Investigative Publications, Inc., 2005. (ISBN 0918487056)

Walsh, Timothy J., and Richard J. Healy. The Protection of Assets Manual. Aberdeen, WA: Silver Lake, 1987. Section 15, “Electronic Eavesdropping Detection." (ISBN 0930868048)

Periodicals: The Legal Investigator, PI Journal (cover story), Full Disclosure, World Association of Detectives News... and many more.

Technical Advisor to:

HBO, George Clooney, Steven Soderbergh, NYT/Discovery Channel, Discovery Channel, ABC News 20/20, FOX News, CNN, CBS News, NBC Dateline, Orion Pictures, New York Times best selling author, Joe Finder... and others.

Ready to start learning?
Take This Course