Technical Information Security Surveys (TSCM) Counterespionage Consulting Services
for business & government, since 1978.
Kevin D. Murray
CPP, CISM, CFE, MPSC
Director - Murray Associates
"Eavesdroppers, snoops and spies
don't want you to trust your instincts.
And... they really don't want you talking to us."
Technical Information Security Surveys are our specialty. We can...
• Resolve your, illegal electronic surveillance in the workplace suspicions.
• Discover other espionage weaknesses contributing to your information losses.
• Increase your resistance to business espionage with cost-effective recommendations.
What does it take to solve your information security / privacy concerns?
It takes experienced specialists, solid resumes, and a track record of success.
Thank you for taking your valuable time to get to know us.
Education & Training
Our most unusual...
Most unusual assignment locations.
The middle of the North Atlantic aboard the Queen Elizabeth II.
Most unusual client.
A secret facility that creates serious spy gadgets for the government.
Most unusual circumstances.
An ousted televangelist is publicly accused by his successors of eavesdropping on them. The truth, they were eavesdropping on him.
Most unusual and successful counterespionage assignments.
We caught a group of foreign nationals actively engaged in a spy mission in our client's headquarters. Our client was a Fortune 100 company. They had been diligent over the years in conducting proactive inspections. This day it paid off.
What else should I know about Murray Associates?
Scary is not professional. We don't have spy vans, mirrored sunglasses or hokey doctor smocks. We arrive at your location as simply ordinary visitors with a few plain cases.
As invited guests to your premises, we always act accordingly. Low key in demeanor, dressed to blend in. We do not disrupt the normal flow of business, or appear out of place after-hours.
We work at your convenience. This means evenings, weekends and even most holidays... at no extra charge.
You can trust our estimates. No nebulous guesses. No surprises.
Our findings can be entered as evidence in legal proceedings. We will also act as your expert witness.
The Secret to Successful Corporate Counterespionage
Look for the major warning sign - electronic surveillance.
Intelligence collection is a leisurely process. Your conversations and information are collected – in many ways – long before they are used against you. Until this intelligence is used, no harm is done.
During the intelligence collection stage you still have time to protect yourself... if, you look for the warning signs:
• GPS tracking,
• micro voice recorders,
• GSM cell phone bugs,
• Wi-Fi network intrusions,
• computer keystroke loggers,
and the traditional espionage techniques.
Do other companies sweep for bugs?
Yes. Most organizations integrate TSCM debugging into their overall security program. They protect themselves because...
1. Information theft is considered acceptable in other parts of the world, and is becoming acceptable here as well.
2. Eavesdropping technology is inexpensive. Anybody can do it, and the chances of getting caught are very slim.
3. Many of our communications technologies contain features which allow eavesdropping.
4. General Counsels are concerned that not addressing this security issue would be viewed as negligence by stockholders.
My company wants me to explore in-house TSCM.
Please visit this page for our best advice.
How often are Eavesdropping Detection & Wireless LAN Audits conducted?
• Quarterly is the generally accepted business practice.
• Semiannual and bimonthly schedules are the next most common.
• Occasionally people have requirements for monthly audits.
Note: TSCM inspections which are not renewed periodically may be interpreted in court as an admission that previously protected information is no longer a business secret.
Will you help us create a counterespionage strategy?
Yes, in three easy steps.
Our initial inspection of your location includes: an interview to learn about your organization's culture and concerns; a technical evaluation to discover illegal electronic surveillance activities; and a pro-active information-security evaluation.
We will make cost-effective recommendations to make your organization a less attractive target.
Periodic re-inspections: assure new attempts at electronic surveillance are caught quickly, before harm is done; new loopholes are discovered before advantage is taken of them; security measures in place are tested to assure continued effectiveness.
In between inspections, we are here as your security counselor.
Can I add TSCM protection without increasing my security budget?
Sure. The money is probably there; it's just mis-allocated.
Many security budgets are lopsided. They morph out of shape over time. Common causes include pressure to protect the easily seen physical assets, and over-spending on IT security.
You want to avoid a situation where 80% of your budget protects only 20% of your assets. Keep in mind, intellectual assets are far more valuable than physical assets. Evaluate what makes your organization valuable. Then adjust.
Should I worry about Laser Beam Eavesdropping?
No. Click here to learn why.
How much business espionage is really going on?
No one really knows. Eavesdropping, wiretapping, snooping, voyeurism, and espionage are covert activities. When done correctly, there is no awareness.
We do know that these activities take place. Stories about spying appear every week in the news media. But, consider this... These stories are actually the spying failures! The successes escape notice.
Even though no one really knows how much bugging is going on, we can logically say, "What we know is just the tip of the iceberg."
What does a spy look like?
While there is no exact answer, a composite picture was developed by the Business Espionage Controls and Countermeasures Association...
• 21-35 years old. Female as often as male.
• College graduate with a low-value degree.
• Broad, short-term employment background.
• Money problems - low pay, poor self management.
• Military intelligence experience.
• Acquaintances with law enforcement backgrounds.
• Considered an outsider or loner.
• Disability precluding a law enforcement career.
• No police record prohibiting sensitive employment.
• Has driver's license, possibly a poor driving record.
• Romantic hobby / interests ...writer, photographer, sky diver, scuba, etc.
• Collects underground & paramilitary literature.
• An active interest in firearms, often with training.
• Recruited from a want ad for Investigative Trainee.
• Often just a drone of a professional handler.
• Skills associated with code breaking and espionage. (music, chess, math, etc.)
Keep this list in mind, but remember...
Your snoop could be anybody.
What are some of the other odd names for bug sweeps?
Many monikers are used to describe TSCM and the people involved.
• TSCM - Technical Surveillance Countermeasures, Technical Surveillance
Counter-measures, Technical Surveillance Counter Measures.
• EECS - Executive Electronic Countermeasures Services,
Electronic Eavesdropping Countermeasures Services.
• ECM - Electronic Countermeasures, Electronic Counter Measures.
• EDA - Eavesdropping Detection Audit.
• Anti-bugging - Commonly used in advertising by equipment sellers.
• Bugger - Buggist (UK)
• Bug Sweep - Bug Sweeper, Bug Sweeping, Sweep.
• Countermeasures - Espionage / Electronic Countermeasures.
• Detection - Electronic Eavesdropping Detection, Electronic Surveillance
Detection, Bug Detection, Bug Detecting, Wiretap Detection.
• Electronic Exterminator - Exterminator, Extermination.
• Espionage - Counter Espionage, Espionage Countermeasures,
Industrial Espionage, Business Espionage.
• Spy Busting - Spy Busters, Spybusters.
• Surveillance - Counter-Surveillance, Surveillance Countermeasures,
Electronic Surveillance Detection.
• Technician - Technical Investigator, Sweeper, De-bugger,
De-buggist (UK), Exterminator, Electronic Countermeasures
Professional, Counter-surveillance Technician.
Why eavesdropping, espionage and snooping flourish.
• Risk level: Low.
• Reward level: High.
• Eavesdropping Tools:
- Readily available in spy shops and on the Internet.
- Untraceable when purchased from foreign countries.
Other Contributing Factors...
• Eavesdropping and espionage are morally acceptable in some cultures.
• Increased competitive pressures placed on employees, consultants and
businesses force ethics bending.
• Media glorification presents spying as sexy and justifiable.
• Since the 60's, spy toys and games have been actively promoted to
children as being fun and acceptable. Children grow up.
Why will the spying problem worsen?
Because we glorify spying to our children.
"In becoming accustomed to such toys and the pleasures they bring,
the seeds of an amoral and suspicious adulthood
are unwittingly being cultivated." — Gary T. Marx
(From The Los Angeles Times, December 25, 1988. As valid today as it was then.)
Another insightful article...
Our Snoopy Pups — Charles McGrath, The New York Times
"Which comes first, our passion for surveillance or all the spy toys
American kids learn to love? ... Far and away the creepiest new toy
theme, though, is snooping...
I think the government is tapping my phone. What can I do?
and we can't help you.
But you might want to read...
Written in 1993, it is still a good primer.
Advanced Radio-Reconnaissance Spectrum Analysis™
TSCM and eavesdropping detection real-time spectrum analysis. Many eavesdropping devices transmit audio, video and data information via radio waves.
Our refined search protocol is used to discover these emissions. We comb the radio-frequency spectrum with custom designed, government-level surveillance receivers, and process these signals in real-time. Final result... even the most sophisticated audio / data / video bugs are revealed.
This level of testing is extremely effective, but very rare outside official circles. This is due to high cost of the instrumentation and the technical skills required to use it. (Case History)
Portable Radio-Reconnaissance Spectrum Analysis™
We are ready for the demands of travel with several portable spectrum analyzers as well.
NLJD – Non-Linear Junction Detection
This TSCM instrument locates spycams and other bugging devices even when they are on standby, turned off or out of battery power.
This detection technique is non-destructive. It can see into and through solid objects, and eliminates the intrusiveness associated with old-school physical searches.
Bonus... less chance for breakage.
Thermal Emissions Spectrum Analysis™ (TESA™)
Minute amounts of heat are generated as electricity moves through a surveillance device's circuitry.
Our laboratory grade TESA™ instrumentation senses and displays these temperature differentials.
This multi-spectral overlay of a clock radio clearly
reveals the spycam hidden in the right corner.
Using this advanced technology allows us to find surveillance cameras hidden in false ceilings and walls and bugs hidden in antique furniture - without damaging these items during the inspection process.
Digital Surveillance Location Analysis™
Some devices are difficult to impossible to locate without the proper instrumentation.
GSM bugs, essentially striped down, mini cell phones remotely controlled by the eavesdropper, only transmit brief radio handshakes when on standby. In between, there are long periods of radio silence.
Rogue Wi-Fi Access Points (APs) pose a similar detection challenge.
Murray Associates researched and developed a custom solution, Digital Surveillance Location Analysis™. It is especially effective for inspecting aircraft
Wireless LAN Security Audits with Compliance Reporting™
A Murray Associates Independent Wireless LAN (WLAN) Audit inexpensively helps guard against eavesdropping, data disasters and government penalties. It is part of our TSCM service, but may be ordered separately when compliance is the main issue.
• Audits are unobtrusive.
• Audits are inexpensive.
• Audit scheduling is easy.
Just one loophole...
Hackers are in.
Data is out.
"You are out of compliance."
Some of the privacy laws and directives which may impact your Wi-Fi usage.
• Sarbanes-Oxley Act – U.S. Public Companies
• HIPAA – Health Insurance Portability and Accountability Act
• GLBA – Gramm-Leach-Bliley Financial Services Modernization Act
• PCI-DSS – Payment Card Industry Data Security Standard
• FISMA – Federal Information Security Management Act
• DoD 8100.2 – Use of Commercial Wireless Devices, Services,
and Technologies in the Department of Defense Global Information Grid
• ISO 27001 – Information Security Management
• Basel II Accord – Banking
• EU - CRD (Cad 3) – EU - Capital Requirements Directive - Banking
Communications Systems Analysis
We use specialized communications inspection instrumentation - capable of testing all types of business digital, VoIP and POTS telephone systems.
Unlike previous generations of test equipment, which can harm digital circuitry, our instrumentation is safe.
The importance of this is immense when one considers the consequential damages of a communications system being blown off-line by old test gear in inexperienced hands.
Murray Associates — Career Technical Specialists.
Prior to forming Murray Associates in 1978, Kevin D. Murray was:
• International – Director of Electronic Countermeasures
• New Jersey – Director of Investigations
• Investigator – Grades I, II & III
for Pinkerton's Inc., the world's oldest and largest private detective agency at the time.
Four decades of investigative and technical field experience come to you with our consulting services.
• Private Detective License #8521 - New Jersey State Police
• Amateur Radio - Extra Class - FCC
• LTA Aircraft - Pilot & Instructor Rated - FAA
• National Security Agency (NSA ARC)
• DoD - CCR
• Exostar SourcePass
• Jones Lang LaSalle
CISM - Certified Information Security Manager
— Information Systems Audit & Control Association (ISACA)
CPP - Certified Protection Professional
CFE - Certified Fraud Examiner
— Association of Certified Fraud Examiners (ACFE)
MPSC - Mobile Phone Seizure Certification (no recertification process required)
About Professional Certifications
• The American National Standards Institute (ANSI) has accredited the
CISM and CPP certification programs under ISO/IEC 17024:2003
• Real professional certifications are not permanently awarded.
• They usually lapse after 2-3 years and must be renewed.
• Re-certification requires proof of continuing education, professional
achievements and active participation in the field. Simply paying a
renewal fee does not count.
• Information Systems Audit & Control Association (ISACA / CISM)
• American Society for Industrial Security (ASIS / CPP)
• High Technology Crime Investigation Association (HTCIA)
• Association of Certified Fraud Examiners (ACFE / CFE)
• InfraGard (A partnership of the FBI and the private sector.)
• Espionage Research Institute International (ERII)
• International Association of Professional Security Consultants (IAPSC)
Know who you are trusting,
before you let them in your door.
When you engage Murray Associates, you know our backgrounds.
• Kevin - My curriculum vitae.
• Andrew - Joined us 17 years ago from Hewlett-Packard. Trained by Glenn Whidden (CIA)
and REI. Has current U.S. Secret level security background check.
• Len - Formerly with the New Jersey State Police Electronic Surveillance Bureau. Has
current U.S. Secret level security background check.
• Adam - An NJIT graduate with Computer Security degree. REI trained. Has current U.S.
Secret level security background check.
• Louie - Formerly with the FBI. Technically trained agent (TTA). Interagency Training Center
We believe you should also understand our procedures and instrumentation. Our friendly technical investigators invite you to ask questions and watch them as they work. Once an area is cleared, they will show you the instrumentation and clearly explain their search procedures.
In addition to electronic eavesdropping, they consider all espionage methods. Advanced Murray Associates TSCM methodology is more than just a debugging sweep.
Our technicians care about your case; they:
• find answers;
• develop practical, cost-effective solutions;
• and resolves your concerns.
They are also genuinely nice people.
Know who you are trusting.
We have put years into earning your trust today.
Others may try to do the same with a few minutes of fast talk.
• Are Business Espionage Security Surveys the company’s only business?
• How many years have they been in practice?
• How many years under their current company name?
• How many debugging sweeps have they conducted?
• Are their recommendations independent and unbiased?
(If they profit from their recommendations in any way, their answer is no.)
• Can you obtain copies of their Certificates of Insurance?
• Are their "technical specialists" full-time, and on the books?
• Are resumes available for every employee who will be on your premises?
• Do they have extensive security and investigatory experience?
• Is the principal professionally certified (CPP, CISM, CFE, etc.)?
• Are the certifications real and current?
• Have they taught Counterespionage on a university level?
• Can you obtain meaningful references – in your industry, in your area?
• Are they certified as independent consultants? (members of IAPSC.org)
• Will they allow their findings to be verified via polygraph testing?
• Are they qualified to assist you with other security matters, too?
• Will their “expert witness” status stand up under courtroom scrutiny?
Check for proper instrumentation and the latest procedures.
• Do they own their own equipment? (Or is it borrowed from their day job.)
• Did they purchase their equipment new? (Not old ebay, used, or surplus.)
• Is the majority of their instruments laboratory or government versions?
• Do they use Radio-Reconnaissance Spectrum Analysis?
• Do they use Non Linear Junction Detection (NLJD)?
• Do they use Frequency Domain Reflectometry to check wiring?
• Can their instrumentation NLJD test your phone lines?
• Will their instrumentation decode digital and VoIP phones?
• Is Wi-Fi security & compliance included in the inspection process?
• Is Thermal Imaging Spectrum Analysis® part of the inspection?
• Can they detect GSM bugs?
• Do they inspect for infrared emissions, fiber optic devices, etc.?
• Do they custom tailor their methodology based on your needs?
And most importantly...
• Are they sincerely interested in solving your problem?
• Are they really capable of solving your problem?
Murray Associates is an independent security consulting firm which limits its services to the: prevention of unauthorized, unlawful electronic surveillance; protection of privacy; and the prevention of information theft. Assignments are conducted on a fixed-fee basis.
We will not accept assignments:
• Without a clearly stated purpose.
• To obtain privileged information.
• Which are against the best interests of the
United States government or its citizens.
We will endeavor to:
• Assure absolute confidentiality.
• Remain unbiased in our efforts and
• Provide the most knowledgeable and
effective service at a fair cost.
— Kevin D. Murray - 1978
William Paterson University
Bachelor of Science (Magna Cum Laude / National Dean's List)
• Criminal Justice / Communications
NRI Technical School
• Communications Electronics
• Assistant to Director of Electronic Countermeasures
(a former CIA Technical Operations Officer)
• Corporate management training programs.
• Investigations training programs.
Dektor Counterintelligence & Security Corporation
• Electronic Countermeasures
Research Electronics International (REI)
• Electronic Countermeasures (multiple courses)
• Cell Phone Forensics / Mobile Phone Seizure
Micro Systemation Inc (XRY)
• Cell Phone Forensics
Mobile Dev Threats and Security Challenges (ISACA)
Wireless Security Seminar (ISACA)
Computer Forensics for "High-Tech Crimes" (ISACA)
Mitigate Risk of Spear Phishing (Aujas Information Risk Services)
Security Clearance Webinar (University of Fairfax)
WLS Webinar (AirPatrol)
XRY Cell Phone & GPS Forensics (Lockheed Martin Training Facility)
IAPSC (Annual security seminars - 3-days every year, 1990-Present)
NJLPIA - Investigator's Seminar (Raritan Valley Community College)
Tektronix Spectrum Analysis Training (multiple times)
Apple Seminar - Mobile Device Management & Security
Rohde & Schwarz / AOC - Signal Analysis in Congested Environments
Police Technical / Rutgers University - Cell Phone Investigations
• John Jay College of Criminal Justice, New York, NY, Course author & instructor:
Electronic Eavesdropping & Business Espionage Countermeasures
• ASIS - Chapter Meetings - multiple presentations
• National Association of Legal Investigators - TSCM seminar
• New Jersey Licensed Private Investigator’s Association - multiple presentations
• Espionage Research Institute, Washington, DC – Thermal Emissions Spectrum
Analysis for TSCM
• FBI / InfraGard - Three TSCM Seminars
• United Nations - New York Landmark’s Security Task Force - TSCM seminar
• World Investigator Conference - TSCM seminar
• Joint Certified Fraud Examiners / ASIS - TSCM & Cell Phone Espionage seminar
Referenced & Quoted by:
Fortune Magazine, The New York Times, USA Today, NPR, International Security News, Corporate Security, Security Management, Congressional Quarterly, Security Letter, Time, American Public Radio, Boardroom Reports, The Washington Post, Business Finance, and several Internet security sites.
Technical Advisors to:
HBO, George Clooney, Steven Soderbergh, NYT/Discovery Channel, Discovery Channel, ABC News 20/20, FOX News, CNN, CBS News, NBC Dateline, Orion Pictures, New York Times best selling author, Joe Finder... and others.
Selected media coverage:
ABC News 20/20
"Our privacy can be invaded, and our conversations bugged, in unexpected ways, in unlikely places, by people we least suspect. There are a number of devices you can buy that say they can detect bugs, and we bought them, and tried them, and they didn't work.
We hired a private detective. (Murray Associates) We found: he could find bugs - the equipment we tried didn't."
Segment: "Is Someone Listening?"
John Stossel, with Hugh Downs
Sole Technical Consultant: Kevin D. Murray
"Unless you've done a thorough electronic sweep recently, assume anything you communicate by telex, electronic mail, fax, or phone is up for grabs."
Article: "CORPORATE SPIES SNOOP TO CONQUER"
By: Brian Dumaine
"What is being reported in the business press," Murray notes, "are only the espionage attempts that have failed. That's probably a very small percentage of what is actually taking place." One study presented to Congress last year found that American companies lose $250 billion each year because competitors get hold of key business information."
Article: Spotting Corporate Spies
By: Eric Krell
"Proper spy busting instrumentation is important, but a successful sweep ultimately depends on the technician's knowledge. For example, if a technician doesn't know fiber optic microphones exist - it may look like fishing line stitched into a carpet or drape - it will be overlooked. The espionage world is full of these surprises.'"
Quoting: Kevin D. Murray
Article: Is Wiretapping Under Way? Listening to Your Intuition
By: Chris Baum
Gus Benquai, an attorney and author on corporate espionage, says, ‘If you're willing to spend the money and criminality doesn't bother you, you can pretty much buy anything you want.'… Others (industrial sleuths) plant wiretaps or advertise fake job openings..."
Article: "George Smiley Joins the Firm"
By: Dody Tsiantar, John Schwartz,
Bob Cohn, and Lynda Wright
"When a company gets hit by a spy, it's like it suddenly has a sexually transmitted disease. Everyone wants something done to prevent it from spreading, but no one wants to talk about it, even though talking about it, sharing the experience, is the only way to make it safer for everyone to do business."
Quoting: Kevin D. Murray
Article: China's Spies Target Corporate America
By: Edward A. Robinson
New Jersey Monthly
"Kevin D. Murray... is one of the world's leading experts in tracing and destroying electronic listening devices. He was the man the Canadian government called in, during the height of a scandal several years ago, when some Members of Parliament charged that the Royal Canadian Mounted Police had bugged their offices.
He found that the office of one M.P. had indeed been bugged, but the bug had been planted by a Canadian detective agency which previously had been contracted to sweep the premises. Murray's counterespionage services are most often requested, however, by American corporations, many of which are increasingly fearful of being infiltrated by industrial spies."
Article: "Private Eyes"
By: Phillip Longman
SKY Magazine (Delta Airlines)
Protecting phones, faxes, and wires first requires having them examined by an independent eavesdropping detection specialist. This is not a job for a company security director, a private investigator, or security-equipment salespeople calling themselves consultants.
The single bug missed by the person who doesn't know exactly what to look and listen for – a process requiring years of full-time experience – defeats the purpose of any subsequent security measures taken. All that's left is a very dangerous degree of false security.
For the same reasons, you shouldn't do this yourself – nor should you rely on any of the bug-detecting equipment currently on the market. Although some of this equipment is quite good, no single detection device can locate every type of bug that may be in a room, regardless of some manufacturers claims.
...Telephone-Listening Devices: A resistor chip, which is only slightly larger that the eagle's beak on a US quarter, can be installed inside a telephone and pick up all phone, and room, conversations. …one of the nation's top private-sector eavesdropping detection specialists stresses that this is no longer just the dirty work of the professional techno-spy. Murray, who heads the (Oldwick), New Jersey based counterespionage firm of Murray Associates, emphasizes that chips like these "can be purchased by electronic hobbyists at any electronics specialty store for pennies, as can components for more elaborate listening devices."
Article: "Thwarting the Techno-Spy"
By: Marc Tanzer
Kevin D. Murray is the author of textbook chapters, magazine articles, and his own book.
Arrington, Winston. Now Hear This! Electronic Eavesdropping Equipment Designs. Chicago, IL: Sheffield Electronics Co., 1997. Electronic Countermeasures sections. (ISBN B0012K8WKW)
Bottom, N. R., and R. R. J. Gallati. Industrial Espionage: Intelligence Techniques & Countermeasures. Boston: Butterworth-Heinemann Ltd., 1984. Electronic Counterintelligence section. (ISBN 0409951080)
Guindon, Kathleen M. A.M. Best’s Safety & Security Directory. Oldwick, NJ: A.M. Best & Co., 2001. Chapter 15, “Spy vs. Spy: Everything You Need To Know About Corporate Counterespionage.” (LoC Catalog Card Number 74-618599, ISBN B000VU9PI2)
Johnson, William M. 101 Questions & Answers About Business Espionage. N.p., Shoreline, Washington: The Questor Group, 2003. Questions and Answers section. (ISBN 1591096227)
Krieger, Gary R. Accident Prevention Manual: Security Management. N.p., Itasca, Illinois: National Safety Council, 1997. Chapter 20, “Communications Security.” (ISBN 087912198X)
Lee, Edward L. II. Staying Safe Abroad: Traveling, Working & Living in a Post-9/11 World. Williamsburg, MI: Sleeping Bear Risk Solutions LLC, 2008. Eavesdropping Detection section. (ISBN 0981560504)
Mars-Proietti, Laura. The Grey House Safety & Security Directory. Amenia, NY: Grey House Publishing, 2004. Chapter 16, “Eavesdropping Detection.” (ISBN 1592370675)
Montgomery, Reginald J., and William J. Majeski, eds. Corporate Investigation - First and Second Editions. Tucson, AZ: Lawyers & Judges Publishing, 2001 & 2005. Chapter 5, Electronic Eavesdropping & Corporate Counterespionage. (ISBN 0913875635)
Murray, Kevin D. Is My Cell Phone Bugged? Everything you need to know to keep your mobile communications private. Austin, TX: Emerald Book Company, 2011 (ISBN: 978-1-934572-88-7)
Murray, Kevin D. Business Spies . . . and the Top 10 Spybusting Tips They Don’t Want You to Know! Oldwick, NJ: Spybusters, LLC, 2010. (ISBN B003VYCDRK)
Kevin D. Murray is the author of textbook chapters, magazine articles, and his own book.
Murray, Kevin D. Electronic Eavesdropping & Industrial Espionage: The Missing Business School Courses. Oldwick, NJ: Spybusters, LLC, 1992–2010.
Reid, Robert N. Facility Manager’s Guide To Security: Protecting Your Assets. Lilburn, GA: Fairmont Press, 2005. Chapter 12. (ISBN 0881734799)
Rothfeder, Jeffrey. Privacy for Sale: How Computerization Has Made Everyone’s Private Life an Open Secret. New York: Simon & Schuster, 1992. Chapter 9, “Shadow of Technology.” (ISBN 067173492X)
Schnabolk, Charles. Physical Security: Practices & Technology. Boston: Butterworth-Heinemann, 1983. Eavesdropping & Countermeasures chapter. (ISBN 040995067X)
Security Management magazine articles. The journal of the American Society for Industrial Security.
Sennewald, Charles A. CPP. Security Consulting - Third & Fourth Editions. Boston: Butterworth-Heinemann, 2004. Chapter 15, “A Successful Security Consulting Business Stands on a Tripod.” (ISBN 0750677945)
Shannon, M. L. The Phone Book: The Latest High-Tech Techniques and Equipment for Preventing Electronic Eavesdropping, Recording Phone Calls, Ending Harassing Calls, and Stopping Toll Fraud. Boulder, CO: Paladin Press, 1998. Sidebars and illustrations. (ISBN 0873649729)
Shannon, M. L. The Bug Book: Wireless Microphones & Surveillance Transmitters. Boulder, CO: Paladin Press, 2000. (ISBN 1581600658)
Swift, Theodore N. Wiretap Detection Techniques: A Guide To Checking Telephone Lines For Wiretaps. Austin, TX: Thomas Investigative Publications, Inc., 2005. (ISBN 0918487056)
Walsh, Timothy J., and Richard J. Healy. The Protection of Assets Manual. Aberdeen, WA: Silver Lake, 1987. Section 15, “Electronic Eavesdropping Detection.” (ISBN 0930868048)
Periodicals: The Legal Investigator, PI Journal (cover story), Full Disclosure, World Association of Detectives News... and many more.
Unsolicited compliments, and general comments.
“You exceeded my expectations from my first phone call to the report! Great job.”
V.P. Human Resources, A National Security Company
“As usual, a highly professional job that leaves me with a comfortable feeling about the privacy of our meetings.”
Director, Corporate Security, Health Care Products Manufacturer
“The nature of our business dictated we take necessary security precautions. Little did we know how really unsafe a workplace can be. Murray Assoc’s made (deleted) aware of all aspects of security.”
Vice President - Security, Environmental Remediation Company
“Kevin, I forwarded your name to ____ at ____. Informed him that they should consider using your services rather than retired FBI agents.”
VP - Dir. Corp. Security, Wall Street Area Financial Firm
“This is my 2nd experience using your services. I found your co. prompt and professional. I also appreciated the extra time spent explaining what was being done.”
Vice President - Communications, Financial Services Firm
“Very pleased with the ability to meet our time schedule. Appreciated demonstration of equipment / technology."
Security Director, Technology Services Company
"Overall pleased with service received and confident of findings.”
Security Director, Pharmaceutical Supply Chain Organization
"Kevin and his team are the best at what they do. We were very happy with them."
Chief Technology Officer, Financial Institution
Unsolicited compliments, and general comments.
"The report was extremely well done and, as always, the quality, service and added extras (advice) were superior.”
Director Corporate Affairs, Aviation Industry
"Thank you for explaining how your equipment worked and taking the time to demonstrate. Your written report is very helpful. I almost wish we found a bug -- but now know where to concentrate our efforts, and what to look for.”
DCM, Pharmaceuticals Manufacturer
“Very professional, informative. Report is very usable and easy to understand. Enjoyed meeting “crew”. Do not hesitate to use us for reference.”
Corp. Mg. of Security, “one of the oldest and largest flavour and fragrance houses in the world.”
“By using Murray Associates for counterespionage measures and by making good use of the professional counseling you provided in your report we now have greater confidence in our firm’s security.”
Manager Technology Operations, Financial Investment Firm
“Concise, well written report. One of the most professional companies I have worked with.”
Manager of Security, Communications Equipment Manufacturer
“Exceeded expectations! ‘Great Job’ was the comment from senior management! Thanks.”
V.P. Security, Regional Bank
“Your prompt and courteous service was much appreciated! The detailed report will prove to be an excellent resource for our firm. We truly appreciate the quick response to our needs!!”
HR Generalist, Brokerage / Investment Banking Firm
Unsolicited compliments, and general comments.
“As always, Kevin & his team were thorough and professional.”
General Counsel, Hazmat and High-Value Transportation Company
“I have never been more satisfied with a contractor than I am with Murray Associates. They are very professional.”
Corp. VP Security, Agricultural Processor
“Loved the whole approach and low-key attitude conveyed during the evaluation. This went far with explaining things to ‘the boss,’ who was on-hand during the review. The quality of the report is excellent and I love all the references. Great job and keep up the good work.”
Information Services Manager, Communications Tech Corporation
“We are very pleased with the exceptional response time & professionalism displayed by your firm. We will not hesitate to utilize your services in the future. Kevin was fantastic.”
Case Manager, Executive Protection Company
"Thanks for everything Kevin - great working with you and your crew. Good guys."
Security Director, International Luxury Goods Holding Company
"I’d like to take this opportunity to sincerely thank you for all the years of your support to us and me. You and your team are the consummate professionals in the field and you have never once failed to provide the ultimate in service with your inspections, inspection reports and continued updates on the state of the industry. It has been an honor to be associated with you all these years and thanks again for all you’ve done."
Retiring Security Director, Global Military Security and Aeronautics Company
1978 - Murray Associates - the first TSCM firm with a published Operating Policy, and fixed Fee and Expense Schedule. Before this, practitioners either charged using unpredictable hourly fees, or flat-rates based on how much they thought they could charge. Some still do.
1978 - Murray Associates was the first TSCM firm with a polygraph policy. Upon discovery of bugging, wiretapping, or other forms of eavesdropping, clients have always had the right to verify our findings. Back in those days, the “plant a bug, grow more work” mentality was rampant. Our policy successfully countered that. We think there are fewer “planters” in the field these days. However, the policy we started never gained widespread acceptance among our competitors. So, over the years, we became the firm people called for a second opinion.
1980 - The US Government lifted secrecy and sales restrictions on the MicroLab/FXR Non Linear Junction Detector. This unusual instrument detected bugs even if they were “off” or had dead batteries! Very advanced - and expensive - technology. Murray Associates was the first private sector service to purchase one.
1987 - Miniature television cameras with AM micro-transmitters (900 MHz frequency range) became a major threat. Murray Associates was the first countermeasures firm to purchase a spectrum analyzer (Tektronix 2710) capable of receiving and viewing these TV signals.
1988 - Laser beam eavesdropping captures the media’s attention. Our clients became concerned. Murray Associates researched the threat and found much of the information being circulated was either misleading or undocumented. To obtain accurate, first-hand information for our clients, we build a laser beam eavesdropper. Our findings were very informative and put the threat into realistic perspective.
1989 - We established a client feedback system. From this date on, every assignment included a Quality Assurance Report card for the client. Our average Feedback Score is 9.4 out of a possible 10.
1992 - We discover a small company selling 10 GHz transmitter kits for $29. Incredibly, the plans for adding audio capabilities and turning it into a bug cost only $2 more. In 1992, an inspection of radio frequencies above 1.8 GHz was rare. We immediately boosted our audit capabilities to 30+ GHz. Interestingly, many TSCM'ers remain blind in the 10 GHz area to this day!
1997 - Miniature television cameras with FM microtransmitters (2.4 GHz frequency range) become a major threat. Most “countermeasures” equipment couldn’t even see these signals. Some spectrum analyzers could receive the signals, but couldn’t decode them for viewing.
Murray Associates researched and solved the problem. Drawing together various technologies, we created a system that is the next step in the evolution of spectrum analysis... Radio-Reconnaissance Spectrum Analysis™. We now easily receive, view and capture wireless surveillance video signals... and immediately record them for evidentiary purposes.
1999 - New digital telephone systems are vulnerable to digital wiretaps and feature manipulation. Murray Associates develops a FFT technique to help detect these problems.
Also in 1999, Spybusters.com becomes the first Internet site to honor eavesdropping history makers. From inventors to artists to practitioners to law makers - we felt they all played important historical roles. They were not being memorialized anywhere else, so we documented their contributions - pro bono (with the assistance and blessings of family members in many cases).
2000 - We begin experimenting with infrared thermal imaging technology in April, and discovered the new lab-quality imagers can ‘see’ microminiature eavesdropping devices and video cameras hidden in ceiling tiles and behind walls. After a year of research, we purchased a $60,000. thermal imager. The Thermal Emissions Spectrum Analysis™ (TESA™) inspection technique is born. After presenting our findings at the Espionage Research Institute (ERI) annual meeting in Washington, DC, imitators quickly began using inexpensive and eBayed imagers in a effort to appear technically current.
2001 - Wireless Local Area Networks become popular in many corporations and executive homes. So does inserting rogue wireless nodes into supposedly secure hard-wired systems. The threat... wireless wiretapping. Appropriate detection instrumentation is brought on board.
2002 - VoIP telephony becomes the rage. Low cost of calls makes it irresistible to clients. Nobody told them all this comes at a price... easy wiretapping, easy denial of service attacks, and easy theft of services. We were the first in our field to research this communications “advancement,” and provide our clients with a safe migration strategy.
2003 - At our clients' request, Murray Associates established a local presence in the European Union.
2005 - A major technical advancement is made by Sony. They release the first price-practical ($6,000.) UV digital television camera. We experiment with bringing it into it to our field. Evidence of electronic eavesdropping installations are viewed and documented with reflected and absorbed ultra-violet light. R&D benefits our clients... again.
2006 - Continuing research into new sensing instrumentation, we invested approximately $40,000.00 in government-level new NLJD instrumentation for our clients. One of the most exciting capabilities of the new equipment is their ability to "hear" video cameras hidden within objects like clocks, radios, furniture, ceilings, etc.
2007 - We are the first in the private sector to invest ($109,000.00) in a Real-Time Spectrum Analysis with DPX technology for our clients. DPX makes formerly invisible bug signals visible.
2008 - A new Multifunction Digital Telephone Analyzer was released this year. We upgraded our capabilities immediately, at a cost of $19,000.00. Doing so, combined many separate instruments into one unit, thus making room for additional instrumentation in our kit. It also allows detection of digital voice leaks on phone lines; a major accomplishment.
2009 - GSM bugs (tiny eavesdropping devices which can be called via a cell phone) began flooding the Internet 'spy shops' and eBay. Very difficult to locate as they are dormant when not actively being listened to. Sales appear to be brisk, with some models selling for as little as $25.00. Concerned clients asked for a solution. We developed the Digital Surveillance Location Analyzer™ (DSLA™). It pinpoints the location of GSM bugs on a computer map – a first-of-its-kind instrument.
2010 - Spyware on "smart" cell phones hit critical mass this year. Clients and website visitors asked for a solution. What began as an executive briefing turned into a book (complete with customized SpyWarn Mobile™ transmission alert button). IS MY CELL PHONE BUGGED? Everything you need to know to keep your mobile communications private will be released in early 2011.
2010 - Our staff completed – law enforcement oriented – cell phone forensics training, taught by the Chief Detective currently in charge of the Pennsylvania State Police Digital Forensics Lab.
We also upgraded our travel kit capabilities with the acquisition of a 50 kHz to 24 GHz (in one second!) spectrum analyzer. Unfortunately, after we bought it the U.S. Government thought it was so advanced they put it on their list of items which are not allowed to leave the country. Our U.S. clients will benefit greatly, however.
2011 - Is My Cell Phone Bugged?: Everything You Need to Know to Keep Your Mobile Conversations Private was officially released June 1st., it received excellent reviews at amazon.com, and now has its own web site.
Development of a Closed Country Protocol – At the request of several clients we researched and developed a viable inspection protocol for conducting business counterespionage audits in China and Singapore. Our initial visits proved that by carefully following the laws and customs of these countries businesses can protect their intellectual property.
2012 - Is My Cell Phone Bugged?: Everything You Need to Know to Keep Your Mobile Conversations Private - becomes an app for Android operating system mobile smartphones. The free version of SpyWarn is available at Google Play.
2013 - With the continued shrinkage in size of electronic components, we noted standard non-linear junction detection was not keeping pace. New technology became available and we were the first to offer its use to the private sector in the U.S.
2014 - SpyWarn™ 2.0 the forensic spyware evaluation app for Android is publicly launched on Google Play. This is quickly followed by the SpyWarn™ Anti-Spyware Kit for Smartphones. This security hardware is exclusively available to Murray Associates clients, free of charge. It is not available elsewhere, at any price.
2015 - Video voyeurism using covert spycams is a serious problem affecting individuals and organizations alike. Murray Associates creates Spycam Detection, an on-line training program. The course provides organizations with the basic security training necessary to mitigate video voyeurism risk for their employees and visitors.
2016 - We introduced virtual reality into our electronic surveillance detection (TSCM) protocol. 360º degree photographic documentation of the sensitive areas we inspect assures we will detect subtle environmental changes during re-inspections.
The Future - We are working on it now.
1992 - 1999
Click to stop rotation.
"Statistically, 75 percent of proprietary information
is lost from physical actions, rather than hacking."
GLOBAL E2C PTE LTD - Corporate Security Economic Espionage Course