Technical Information Security Surveys (TSCM) Counterespionage Consulting Services
for business & government, since 1978.
Kevin D. Murray
CPP, CISM, CFE, MPSC
Director - Murray Associates
"Eavesdroppers, snoops and spies
don't want you to trust your instincts.
And... they really don't want you talking to us."
Technical Information Security Surveys are our specialty. We can...
• Resolve your, illegal electronic surveillance in the workplace suspicions.
• Discover other espionage weaknesses contributing to your information losses.
• Increase your resistance to business espionage with cost-effective recommendations.
What does it take to solve your information security / privacy concerns?
It takes experienced specialists, solid resumes, and a track record of success.
Thank you for taking your valuable time to get to know us.
Education & Training
Advanced Radio-Reconnaissance Spectrum Analysis™
TSCM and eavesdropping detection real-time spectrum analysis. Many eavesdropping devices transmit audio, video and data information via radio waves.
Our refined search protocol is used to discover these emissions. We comb the radio-frequency spectrum with custom designed, government-level surveillance receivers, and process these signals in real-time. Final result... even the most sophisticated audio / data / video bugs are revealed.
This level of testing is extremely effective, but very rare outside official circles. This is due to high cost of the instrumentation and the technical skills required to use it. (Case History)
Portable Radio-Reconnaissance Spectrum Analysis™
We are ready for the demands of travel with several portable spectrum analyzers as well.
NLJD – Non-Linear Junction Detection
This TSCM instrument locates spycams and other bugging devices even when they are on standby, turned off or out of battery power.
This detection technique is non-destructive. It can see into and through solid objects, and eliminates the intrusiveness associated with old-school physical searches.
Bonus... less chance for breakage.
Thermal Emissions Spectrum Analysis™ (TESA™)
Minute amounts of heat are generated as electricity moves through a surveillance device's circuitry.
Our laboratory grade TESA™ instrumentation senses and displays these temperature differentials.
This multi-spectral overlay of a clock radio clearly
reveals the spycam hidden in the right corner.
Using this advanced technology allows us to find surveillance cameras hidden in false ceilings and walls and bugs hidden in antique furniture - without damaging these items during the inspection process.
Digital Surveillance Location Analysis™
Some devices are difficult to impossible to locate without the proper instrumentation.
GSM bugs, essentially striped down, mini cell phones remotely controlled by the eavesdropper, only transmit brief radio handshakes when on standby. In between, there are long periods of radio silence.
Rogue Wi-Fi Access Points (APs) pose a similar detection challenge.
Murray Associates researched and developed a custom solution, Digital Surveillance Location Analysis™. It is especially effective for inspecting aircraft
Wireless LAN Security Audits with Compliance Reporting™
A Murray Associates Independent Wireless LAN (WLAN) Audit inexpensively helps guard against eavesdropping, data disasters and government penalties. It is part of our TSCM service, but may be ordered separately when compliance is the main issue.
• Audits are unobtrusive.
• Audits are inexpensive.
• Audit scheduling is easy.
Just one loophole...
Hackers are in.
Data is out.
"You are out of compliance."
Some of the privacy laws and directives which may impact your Wi-Fi usage.
• Sarbanes-Oxley Act – U.S. Public Companies
• HIPAA – Health Insurance Portability and Accountability Act
• GLBA – Gramm-Leach-Bliley Financial Services Modernization Act
• PCI-DSS – Payment Card Industry Data Security Standard
• FISMA – Federal Information Security Management Act
• DoD 8100.2 – Use of Commercial Wireless Devices, Services,
and Technologies in the Department of Defense Global Information Grid
• ISO 27001 – Information Security Management
• Basel II Accord – Banking
• EU - CRD (Cad 3) – EU - Capital Requirements Directive - Banking
Communications Systems Analysis
We use specialized communications inspection instrumentation - capable of testing all types of business digital, VoIP and POTS telephone systems.
Unlike previous generations of test equipment, which can harm digital circuitry, our instrumentation is safe.
The importance of this is immense when one considers the consequential damages of a communications system being blown off-line by old test gear in inexperienced hands.
Murray Associates — Career Technical Specialists.
Prior to forming Murray Associates in 1978, Kevin D. Murray was:
• International – Director of Electronic Countermeasures
• New Jersey – Director of Investigations
• Investigator – Grades I, II & III
for Pinkerton's Inc., the world's oldest and largest private detective agency at the time.
Four decades of investigative and technical field experience come to you with our consulting services.
• Private Detective License #8521 - New Jersey State Police
• Amateur Radio - Extra Class - FCC
• LTA Aircraft - Pilot & Instructor Rated - FAA
• National Security Agency (NSA ARC)
• DoD - CCR
• Exostar SourcePass
• Jones Lang LaSalle
CISM - Certified Information Security Manager
— Information Systems Audit & Control Association (ISACA)
CPP - Certified Protection Professional
CFE - Certified Fraud Examiner
— Association of Certified Fraud Examiners (ACFE)
MPSC - Mobile Phone Seizure Certification (no recertification process required)
About Professional Certifications
• The American National Standards Institute (ANSI) has accredited the
CISM and CPP certification programs under ISO/IEC 17024:2003
• Real professional certifications are not permanently awarded.
• They usually lapse after 2-3 years and must be renewed.
• Re-certification requires proof of continuing education, professional
achievements and active participation in the field. Simply paying a
renewal fee does not count.
• Information Systems Audit & Control Association (ISACA / CISM)
• American Society for Industrial Security (ASIS / CPP)
• High Technology Crime Investigation Association (HTCIA)
• Association of Certified Fraud Examiners (ACFE / CFE)
• InfraGard (A partnership of the FBI and the private sector.)
• Espionage Research Institute International (ERII)
• International Association of Professional Security Consultants (IAPSC)
Know who you are trusting,
before you let them in your door.
When you engage Murray Associates, you know our backgrounds.
• Kevin - My curriculum vitae.
• Andrew - Joined us 17 years ago from Hewlett-Packard. Trained by Glenn Whidden (CIA)
and REI. Has current U.S. Secret level security background check.
• Len - Formerly with the New Jersey State Police Electronic Surveillance Bureau. Has
current U.S. Secret level security background check.
• Adam - An NJIT graduate with Computer Security degree. REI trained. Has current U.S.
Secret level security background check.
• Louie - Formerly with the FBI. Technically trained agent (TTA). Interagency Training Center
We believe you should also understand our procedures and instrumentation. Our friendly technical investigators invite you to ask questions and watch them as they work. Once an area is cleared, they will show you the instrumentation and clearly explain their search procedures.
In addition to electronic eavesdropping, they consider all espionage methods. Advanced Murray Associates TSCM methodology is more than just a debugging sweep.
Our technicians care about your case; they:
• find answers;
• develop practical, cost-effective solutions;
• and resolves your concerns.
They are also genuinely nice people.
Know who you are trusting.
We have put years into earning your trust today.
Others may try to do the same with a few minutes of fast talk.
• Are Business Espionage Security Surveys the company’s only business?
• How many years have they been in practice?
• How many years under their current company name?
• How many debugging sweeps have they conducted?
• Are their recommendations independent and unbiased?
(If they profit from their recommendations in any way, their answer is no.)
• Can you obtain copies of their Certificates of Insurance?
• Are their "technical specialists" full-time, and on the books?
• Are resumes available for every employee who will be on your premises?
• Do they have extensive security and investigatory experience?
• Is the principal professionally certified (CPP, CISM, CFE, etc.)?
• Are the certifications real and current?
• Have they taught Counterespionage on a university level?
• Can you obtain meaningful references – in your industry, in your area?
• Are they certified as independent consultants? (members of IAPSC.org)
• Will they allow their findings to be verified via polygraph testing?
• Are they qualified to assist you with other security matters, too?
• Will their “expert witness” status stand up under courtroom scrutiny?
Check for proper instrumentation and the latest procedures.
• Do they own their own equipment? (Or is it borrowed from their day job.)
• Did they purchase their equipment new? (Not old ebay, used, or surplus.)
• Is the majority of their instruments laboratory or government versions?
• Do they use Radio-Reconnaissance Spectrum Analysis?
• Do they use Non Linear Junction Detection (NLJD)?
• Do they use Frequency Domain Reflectometry to check wiring?
• Can their instrumentation NLJD test your phone lines?
• Will their instrumentation decode digital and VoIP phones?
• Is Wi-Fi security & compliance included in the inspection process?
• Is Thermal Imaging Spectrum Analysis® part of the inspection?
• Can they detect GSM bugs?
• Do they inspect for infrared emissions, fiber optic devices, etc.?
• Do they custom tailor their methodology based on your needs?
And most importantly...
• Are they sincerely interested in solving your problem?
• Are they really capable of solving your problem?
Murray Associates is an independent security consulting firm which limits its services to the: prevention of unauthorized, unlawful electronic surveillance; protection of privacy; and the prevention of information theft. Assignments are conducted on a fixed-fee basis.
We will not accept assignments:
• Without a clearly stated purpose.
• To obtain privileged information.
• Which are against the best interests of the
United States government or its citizens.
We will endeavor to:
• Assure absolute confidentiality.
• Remain unbiased in our efforts and
• Provide the most knowledgeable and
effective service at a fair cost.
— Kevin D. Murray - 1978
William Paterson University
Bachelor of Science (Magna Cum Laude / National Dean's List)
• Criminal Justice / Communications
NRI Technical School
• Communications Electronics
• Assistant to Director of Electronic Countermeasures
(a former CIA Technical Operations Officer)
• Corporate management training programs.
• Investigations training programs.
Dektor Counterintelligence & Security Corporation
• Electronic Countermeasures
Research Electronics International (REI)
• Electronic Countermeasures (multiple courses)
• Cell Phone Forensics / Mobile Phone Seizure
Micro Systemation Inc (XRY)
• Cell Phone Forensics
Mobile Dev Threats and Security Challenges (ISACA)
Wireless Security Seminar (ISACA)
Computer Forensics for "High-Tech Crimes" (ISACA)
Mitigate Risk of Spear Phishing (Aujas Information Risk Services)
Security Clearance Webinar (University of Fairfax)
WLS Webinar (AirPatrol)
XRY Cell Phone & GPS Forensics (Lockheed Martin Training Facility)
IAPSC (Annual security seminars - 3-days every year, 1990-Present)
NJLPIA - Investigator's Seminar (Raritan Valley Community College)
Tektronix Spectrum Analysis Training (multiple times)
Apple Seminar - Mobile Device Management & Security
Rohde & Schwarz / AOC - Signal Analysis in Congested Environments
Police Technical / Rutgers University - Cell Phone Investigations
• John Jay College of Criminal Justice, New York, NY, Course author & instructor:
Electronic Eavesdropping & Business Espionage Countermeasures
• ASIS - Chapter Meetings - multiple presentations
• National Association of Legal Investigators - TSCM seminar
• New Jersey Licensed Private Investigator’s Association - multiple presentations
• Espionage Research Institute, Washington, DC – Thermal Emissions Spectrum
Analysis for TSCM
• FBI / InfraGard - Three TSCM Seminars
• United Nations - New York Landmark’s Security Task Force - TSCM seminar
• World Investigator Conference - TSCM seminar
• Joint Certified Fraud Examiners / ASIS - TSCM & Cell Phone Espionage seminar
Referenced & Quoted by:
Fortune Magazine, The New York Times, USA Today, NPR, International Security News, Corporate Security, Security Management, Congressional Quarterly, Security Letter, Time, American Public Radio, Boardroom Reports, The Washington Post, Business Finance, and several Internet security sites.
Technical Advisors to:
HBO, George Clooney, Steven Soderbergh, NYT/Discovery Channel, Discovery Channel, ABC News 20/20, FOX News, CNN, CBS News, NBC Dateline, Orion Pictures, New York Times best selling author, Joe Finder... and others.
Selected media coverage:
ABC News 20/20
"Our privacy can be invaded, and our conversations bugged, in unexpected ways, in unlikely places, by people we least suspect. There are a number of devices you can buy that say they can detect bugs, and we bought them, and tried them, and they didn't work.
We hired a private detective. (Murray Associates) We found: he could find bugs - the equipment we tried didn't."
Segment: "Is Someone Listening?"
John Stossel, with Hugh Downs
Sole Technical Consultant: Kevin D. Murray
"Unless you've done a thorough electronic sweep recently, assume anything you communicate by telex, electronic mail, fax, or phone is up for grabs."
Article: "CORPORATE SPIES SNOOP TO CONQUER"
By: Brian Dumaine
"What is being reported in the business press," Murray notes, "are only the espionage attempts that have failed. That's probably a very small percentage of what is actually taking place." One study presented to Congress last year found that American companies lose $250 billion each year because competitors get hold of key business information."
Article: Spotting Corporate Spies
By: Eric Krell
"Proper spy busting instrumentation is important, but a successful sweep ultimately depends on the technician's knowledge. For example, if a technician doesn't know fiber optic microphones exist - it may look like fishing line stitched into a carpet or drape - it will be overlooked. The espionage world is full of these surprises.'"
Quoting: Kevin D. Murray
Article: Is Wiretapping Under Way? Listening to Your Intuition
By: Chris Baum
Gus Benquai, an attorney and author on corporate espionage, says, ‘If you're willing to spend the money and criminality doesn't bother you, you can pretty much buy anything you want.'… Others (industrial sleuths) plant wiretaps or advertise fake job openings..."
Article: "George Smiley Joins the Firm"
By: Dody Tsiantar, John Schwartz,
Bob Cohn, and Lynda Wright
"When a company gets hit by a spy, it's like it suddenly has a sexually transmitted disease. Everyone wants something done to prevent it from spreading, but no one wants to talk about it, even though talking about it, sharing the experience, is the only way to make it safer for everyone to do business."
Quoting: Kevin D. Murray
Article: China's Spies Target Corporate America
By: Edward A. Robinson
New Jersey Monthly
"Kevin D. Murray... is one of the world's leading experts in tracing and destroying electronic listening devices. He was the man the Canadian government called in, during the height of a scandal several years ago, when some Members of Parliament charged that the Royal Canadian Mounted Police had bugged their offices.
He found that the office of one M.P. had indeed been bugged, but the bug had been planted by a Canadian detective agency which previously had been contracted to sweep the premises. Murray's counterespionage services are most often requested, however, by American corporations, many of which are increasingly fearful of being infiltrated by industrial spies."
Article: "Private Eyes"
By: Phillip Longman
SKY Magazine (Delta Airlines)
Protecting phones, faxes, and wires first requires having them examined by an independent eavesdropping detection specialist. This is not a job for a company security director, a private investigator, or security-equipment salespeople calling themselves consultants.
The single bug missed by the person who doesn't know exactly what to look and listen for – a process requiring years of full-time experience – defeats the purpose of any subsequent security measures taken. All that's left is a very dangerous degree of false security.
For the same reasons, you shouldn't do this yourself – nor should you rely on any of the bug-detecting equipment currently on the market. Although some of this equipment is quite good, no single detection device can locate every type of bug that may be in a room, regardless of some manufacturers claims.
...Telephone-Listening Devices: A resistor chip, which is only slightly larger that the eagle's beak on a US quarter, can be installed inside a telephone and pick up all phone, and room, conversations. …one of the nation's top private-sector eavesdropping detection specialists stresses that this is no longer just the dirty work of the professional techno-spy. Murray, who heads the (Oldwick), New Jersey based counterespionage firm of Murray Associates, emphasizes that chips like these "can be purchased by electronic hobbyists at any electronics specialty store for pennies, as can components for more elaborate listening devices."
Article: "Thwarting the Techno-Spy"
By: Marc Tanzer
Kevin D. Murray is the author of textbook chapters, magazine articles, and his own book.
Arrington, Winston. Now Hear This! Electronic Eavesdropping Equipment Designs. Chicago, IL: Sheffield Electronics Co., 1997. Electronic Countermeasures sections. (ISBN B0012K8WKW)
Bottom, N. R., and R. R. J. Gallati. Industrial Espionage: Intelligence Techniques & Countermeasures. Boston: Butterworth-Heinemann Ltd., 1984. Electronic Counterintelligence section. (ISBN 0409951080)
Guindon, Kathleen M. A.M. Best’s Safety & Security Directory. Oldwick, NJ: A.M. Best & Co., 2001. Chapter 15, “Spy vs. Spy: Everything You Need To Know About Corporate Counterespionage.” (LoC Catalog Card Number 74-618599, ISBN B000VU9PI2)
Johnson, William M. 101 Questions & Answers About Business Espionage. N.p., Shoreline, Washington: The Questor Group, 2003. Questions and Answers section. (ISBN 1591096227)
Krieger, Gary R. Accident Prevention Manual: Security Management. N.p., Itasca, Illinois: National Safety Council, 1997. Chapter 20, “Communications Security.” (ISBN 087912198X)
Lee, Edward L. II. Staying Safe Abroad: Traveling, Working & Living in a Post-9/11 World. Williamsburg, MI: Sleeping Bear Risk Solutions LLC, 2008. Eavesdropping Detection section. (ISBN 0981560504)
Mars-Proietti, Laura. The Grey House Safety & Security Directory. Amenia, NY: Grey House Publishing, 2004. Chapter 16, “Eavesdropping Detection.” (ISBN 1592370675)
Montgomery, Reginald J., and William J. Majeski, eds. Corporate Investigation - First and Second Editions. Tucson, AZ: Lawyers & Judges Publishing, 2001 & 2005. Chapter 5, Electronic Eavesdropping & Corporate Counterespionage. (ISBN 0913875635)
Murray, Kevin D. Is My Cell Phone Bugged? Everything you need to know to keep your mobile communications private. Austin, TX: Emerald Book Company, 2011 (ISBN: 978-1-934572-88-7)
Murray, Kevin D. Business Spies . . . and the Top 10 Spybusting Tips They Don’t Want You to Know! Oldwick, NJ: Spybusters, LLC, 2010. (ISBN B003VYCDRK)
Kevin D. Murray is the author of textbook chapters, magazine articles, and his own book.
Murray, Kevin D. Electronic Eavesdropping & Industrial Espionage: The Missing Business School Courses. Oldwick, NJ: Spybusters, LLC, 1992–2010.
Reid, Robert N. Facility Manager’s Guide To Security: Protecting Your Assets. Lilburn, GA: Fairmont Press, 2005. Chapter 12. (ISBN 0881734799)
Rothfeder, Jeffrey. Privacy for Sale: How Computerization Has Made Everyone’s Private Life an Open Secret. New York: Simon & Schuster, 1992. Chapter 9, “Shadow of Technology.” (ISBN 067173492X)
Schnabolk, Charles. Physical Security: Practices & Technology. Boston: Butterworth-Heinemann, 1983. Eavesdropping & Countermeasures chapter. (ISBN 040995067X)
Security Management magazine articles. The journal of the American Society for Industrial Security.
Sennewald, Charles A. CPP. Security Consulting - Third & Fourth Editions. Boston: Butterworth-Heinemann, 2004. Chapter 15, “A Successful Security Consulting Business Stands on a Tripod.” (ISBN 0750677945)
Shannon, M. L. The Phone Book: The Latest High-Tech Techniques and Equipment for Preventing Electronic Eavesdropping, Recording Phone Calls, Ending Harassing Calls, and Stopping Toll Fraud. Boulder, CO: Paladin Press, 1998. Sidebars and illustrations. (ISBN 0873649729)
Shannon, M. L. The Bug Book: Wireless Microphones & Surveillance Transmitters. Boulder, CO: Paladin Press, 2000. (ISBN 1581600658)
Swift, Theodore N. Wiretap Detection Techniques: A Guide To Checking Telephone Lines For Wiretaps. Austin, TX: Thomas Investigative Publications, Inc., 2005. (ISBN 0918487056)
Walsh, Timothy J., and Richard J. Healy. The Protection of Assets Manual. Aberdeen, WA: Silver Lake, 1987. Section 15, “Electronic Eavesdropping Detection.” (ISBN 0930868048)
Periodicals: The Legal Investigator, PI Journal (cover story), Full Disclosure, World Association of Detectives News... and many more.
1978 - Murray Associates - the first TSCM firm with a published Operating Policy, and fixed Fee and Expense Schedule. Before this, practitioners either charged using unpredictable hourly fees, or flat-rates based on how much they thought they could charge. Some still do.
1978 - Murray Associates was the first TSCM firm with a polygraph policy. Upon discovery of bugging, wiretapping, or other forms of eavesdropping, clients have always had the right to verify our findings. Back in those days, the “plant a bug, grow more work” mentality was rampant. Our policy successfully countered that. We think there are fewer “planters” in the field these days. However, the policy we started never gained widespread acceptance among our competitors. So, over the years, we became the firm people called for a second opinion.
1980 - The US Government lifted secrecy and sales restrictions on the MicroLab/FXR Non Linear Junction Detector. This unusual instrument detected bugs even if they were “off” or had dead batteries! Very advanced - and expensive - technology. Murray Associates was the first private sector service to purchase one.
1987 - Miniature television cameras with AM micro-transmitters (900 MHz frequency range) became a major threat. Murray Associates was the first countermeasures firm to purchase a spectrum analyzer (Tektronix 2710) capable of receiving and viewing these TV signals.
1988 - Laser beam eavesdropping captures the media’s attention. Our clients became concerned. Murray Associates researched the threat and found much of the information being circulated was either misleading or undocumented. To obtain accurate, first-hand information for our clients, we build a laser beam eavesdropper. Our findings were very informative and put the threat into realistic perspective.
1989 - We established a client feedback system. From this date on, every assignment included a Quality Assurance Report card for the client. Our average Feedback Score is 9.4 out of a possible 10.
1992 - We discover a small company selling 10 GHz transmitter kits for $29. Incredibly, the plans for adding audio capabilities and turning it into a bug cost only $2 more. In 1992, an inspection of radio frequencies above 1.8 GHz was rare. We immediately boosted our audit capabilities to 30+ GHz. Interestingly, many TSCM'ers remain blind in the 10 GHz area to this day!
1997 - Miniature television cameras with FM microtransmitters (2.4 GHz frequency range) become a major threat. Most “countermeasures” equipment couldn’t even see these signals. Some spectrum analyzers could receive the signals, but couldn’t decode them for viewing.
Murray Associates researched and solved the problem. Drawing together various technologies, we created a system that is the next step in the evolution of spectrum analysis... Radio-Reconnaissance Spectrum Analysis™. We now easily receive, view and capture wireless surveillance video signals... and immediately record them for evidentiary purposes.
1999 - New digital telephone systems are vulnerable to digital wiretaps and feature manipulation. Murray Associates develops a FFT technique to help detect these problems.
Also in 1999, Spybusters.com becomes the first Internet site to honor eavesdropping history makers. From inventors to artists to practitioners to law makers - we felt they all played important historical roles. They were not being memorialized anywhere else, so we documented their contributions - pro bono (with the assistance and blessings of family members in many cases).
2000 - We begin experimenting with infrared thermal imaging technology in April, and discovered the new lab-quality imagers can ‘see’ microminiature eavesdropping devices and video cameras hidden in ceiling tiles and behind walls. After a year of research, we purchased a $60,000. thermal imager. The Thermal Emissions Spectrum Analysis™ (TESA™) inspection technique is born. After presenting our findings at the Espionage Research Institute (ERI) annual meeting in Washington, DC, imitators quickly began using inexpensive and eBayed imagers in a effort to appear technically current.
2001 - Wireless Local Area Networks become popular in many corporations and executive homes. So does inserting rogue wireless nodes into supposedly secure hard-wired systems. The threat... wireless wiretapping. Appropriate detection instrumentation is brought on board.
2002 - VoIP telephony becomes the rage. Low cost of calls makes it irresistible to clients. Nobody told them all this comes at a price... easy wiretapping, easy denial of service attacks, and easy theft of services. We were the first in our field to research this communications “advancement,” and provide our clients with a safe migration strategy.
2003 - At our clients' request, Murray Associates established a local presence in the European Union.
2005 - A major technical advancement is made by Sony. They release the first price-practical ($6,000.) UV digital television camera. We experiment with bringing it into it to our field. Evidence of electronic eavesdropping installations are viewed and documented with reflected and absorbed ultra-violet light. R&D benefits our clients... again.
2006 - Continuing research into new sensing instrumentation, we invested approximately $40,000.00 in government-level new NLJD instrumentation for our clients. One of the most exciting capabilities of the new equipment is their ability to "hear" video cameras hidden within objects like clocks, radios, furniture, ceilings, etc.
2007 - We are the first in the private sector to invest ($109,000.00) in a Real-Time Spectrum Analysis with DPX technology for our clients. DPX makes formerly invisible bug signals visible.
2008 - A new Multifunction Digital Telephone Analyzer was released this year. We upgraded our capabilities immediately, at a cost of $19,000.00. Doing so, combined many separate instruments into one unit, thus making room for additional instrumentation in our kit. It also allows detection of digital voice leaks on phone lines; a major accomplishment.
2009 - GSM bugs (tiny eavesdropping devices which can be called via a cell phone) began flooding the Internet 'spy shops' and eBay. Very difficult to locate as they are dormant when not actively being listened to. Sales appear to be brisk, with some models selling for as little as $25.00. Concerned clients asked for a solution. We developed the Digital Surveillance Location Analyzer™ (DSLA™). It pinpoints the location of GSM bugs on a computer map – a first-of-its-kind instrument.
2010 - Spyware on "smart" cell phones hit critical mass this year. Clients and website visitors asked for a solution. What began as an executive briefing turned into a book (complete with customized SpyWarn Mobile™ transmission alert button). IS MY CELL PHONE BUGGED? Everything you need to know to keep your mobile communications private will be released in early 2011.
2010 - Our staff completed – law enforcement oriented – cell phone forensics training, taught by the Chief Detective currently in charge of the Pennsylvania State Police Digital Forensics Lab.
We also upgraded our travel kit capabilities with the acquisition of a 50 kHz to 24 GHz (in one second!) spectrum analyzer. Unfortunately, after we bought it the U.S. Government thought it was so advanced they put it on their list of items which are not allowed to leave the country. Our U.S. clients will benefit greatly, however.
2011 - Is My Cell Phone Bugged?: Everything You Need to Know to Keep Your Mobile Conversations Private was officially released June 1st., it received excellent reviews at amazon.com, and now has its own web site.
Development of a Closed Country Protocol – At the request of several clients we researched and developed a viable inspection protocol for conducting business counterespionage audits in China and Singapore. Our initial visits proved that by carefully following the laws and customs of these countries businesses can protect their intellectual property.
2012 - Is My Cell Phone Bugged?: Everything You Need to Know to Keep Your Mobile Conversations Private - becomes an app for Android operating system mobile smartphones. The free version of SpyWarn is available at Google Play.
2013 - With the continued shrinkage in size of electronic components, we noted standard non-linear junction detection was not keeping pace. New technology became available and we were the first to offer its use to the private sector in the U.S.
2014 - SpyWarn™ 2.0 the forensic spyware evaluation app for Android is publicly launched on Google Play. This is quickly followed by the SpyWarn™ Anti-Spyware Kit for Smartphones. This security hardware is exclusively available to Murray Associates clients, free of charge. It is not available elsewhere, at any price.
2015 - Video voyeurism using covert spycams is a serious problem affecting individuals and organizations alike. Murray Associates creates Spycam Detection, an on-line training program. The course provides organizations with the basic security training necessary to mitigate video voyeurism risk for their employees and visitors.
2016 - We introduced virtual reality into our electronic surveillance detection (TSCM) protocol. 360º degree photographic documentation of the sensitive areas we inspect assures we will detect subtle environmental changes during re-inspections.
The Future - We are working on it now.
1992 - 1999
Click any button to stop rotation.
"Statistically, 75 percent of proprietary information
is lost from physical actions, rather than hacking."
GLOBAL E2C PTE LTD - Corporate Security Economic Espionage Course