Murray Associates TSCM - Electronic surveillance detection and counterespionage consulting for business, government and at-risk individuals.

Technical Information Security Surveys (TSCM) Counterespionage Consulting Services
for business & government, since 1978.



New York area headquarters.

Services available worldwide.




TSCM, Debugging, Bug Sweeps, Electronic Countermeasures


Debugging offices and conference rooms also includes an information security survey, and personal counterespionage consulting.

Workplace Inspections

• Law offices

• Boardrooms

• Trading floors

• Executive suites

• Conference rooms

• Board meeting inspections

• Info-loss vulnerability surveys



Debugging sweeps on all types of vehicles, including: cars, boats and aircraft (limousines, planes, autos, yachts, automobiles, airplanes)

Vehicle Inspections

• Eavesdropping Detection

• GPS Tracking Detection

• Limousines

• Aircraft

• Yachts



Wirelesss LAN TSCM inspections locate illegal rogue access points, Wi-Fi bugs, transmission and legal compliance issues.


Wi-Fi Cyber Espionage

• Wi-Fi Security & Compliance Audits

• Whole building / floor security audits

• Compliance surveys (HIPAA, GLBA,

  Sarbanes-Oxley, PCI-DSS, FISMA,

  DoD 8100.2, ISO 27001, Basel II)



TSCM is only part of a Murray Associates debugging sweep. We also conduct an information security survey for you.

Intellectual Property Protection Information Security Audits

• Information security surveys

• Business espionage prevention

• Information security




Inspecting for spycams and video recorders in restrooms, shower and locker areas, and any place where there is an expectation of privacy.

Optical Surveillance Detection

• Spycams, Covert Video

• Privacy due diligence for hotels, country clubs, resorts, community pools, schools and high profile individuals.



Bug sweeps are essential to protecting personal privacy in: homes, residences, corporate apartments, hotel rooms and off-site meeting locations.

Residential Surveillance Detection

• Corporate apartments

• Executive homes & offices

• Off-site business meetings

• Hotel room & resort conference areas

Why do organizations conduct Business Espionage Security Surveys / TSCM inspections?

• Sensitive information is vulnerable long before it is computerized.

• Ideas and strategies are discussions, not data.

• To detect unauthorized intelligence gathering before the loss.

• Detection allows time to stop the loss.

• To solve current information loss problems.

• To limit windows-of-vulnerability.

• To help satisfy due diligence requirements.

• To help satisfy legal and regulatory requirements.

• To avoid non-compliance penalties and fines.

• To help establish the legal status for 'business secrets' in court.

• To help protect employee privacy and personal safety.

• To identify new information loss vulnerabilities before they are used against you.

Murray Associates TSCM debugging sweeps is the best first step you can take to keep your secrets from hitting the street, or worse.

How do we go about using your services?

It's easy...


1. Contact us from a “safe” area. Tell us about your concerns and security

    goals. We will provide suggestions and guidance about the best course

    of action to take.


2. Let us know some information about your security concerns, goals, and the areas you consider sensitive. You may also email us a floor map to help explain.


3. We promptly prepare a written Proposal. It contains competitive pricing

    (with expenses closely estimated), a suggested inspection strategy, and a

    Letter of Engagement.


    There are never any cost surprises when working with Murray Associates.

    We help you plan your inspection so it stays within your budget.


4. Upon acceptance, we schedule a mutually convenient inspection date.

    We are available 24/7, at no additional charge.


5. Our team (2-4 people) will arrive at your location, dressed to blend in,

    with a few nondescript equipment cases stacked on a small luggage cart.


6. You are welcome to be with us, and ask questions, throughout the

    inspection. We enjoy explaining the methodology and equipment.


7. Upon completion, we conduct a verbal debriefing.


8. A full written report is usually delivered within a week. It includes: an

    executive summary, findings, explanation of instrumentation and

    methodology, an inventory of areas inspected, serial numbers of security

    seals used, information security vulnerabilities discovered, and cost-

    effective recommendations for remediation. We are always available to

    review your report with you.


    With Murray Associates, your due diligence is documented in writing

    by an independent and certified, professional security consultant.


9. Once you are a member of our client family, we remain available as your

    security resource. Call here first whenever you have a security-related

    question, or need to locate a security resource.


Do you need to see our location before you give us an estimate?

    It is rarely necessary to inconvenience you – or tip your hand – with a preliminary visit. Just let us know your security concerns and goals. If your assignment is extensive a floor plan is helpful.

Can you give me a rough idea of the price?

    Inspection costs are based on square footage, communications equipment, and travel time. The minimum assignment charge is $4,600.00 unless we are already in your area on other assignments.

    The following is a rough guide for initial inspections. Re-inspections are discounted, as are multiple and extensive operations. Economical daily flat-rates are available with a purchase of 10 or more days per year.


Small (includes most residences)

    • Five small offices (≈1250 s/f).

    • Five telephones or speakerphones.

    • Location: New York City.

    • Includes: Final written report, all expenses.

    Minimum assignment charge - $4,600.00 per inspection.



    • Ten small offices (≈2500 s/f).

    • One medium sized office / conference room (≈550s/f).

    • Eleven telephones or speakerphones.

    • One fax machine.

    • Location: New York City.

    • Includes: Final written report, all expenses.

    Less than $6,750.00 per inspection.



    • Seven small offices (≈1400 s/f).

    • Three medium sized offices / conference room (≈ 1500 s/f).

    • One large office / Boardroom (≈1000 s/f)

    • Fifteen telephones or speakerphones.

    • One audio-visual equipment rack.

    • One video teleconferencing system.

    • Two fax machines.

    • Location: New York City.

    • Includes: Final written report, all expenses.

    Less than $10,000.00 per inspection.


• Based on offices being within the same general area of each other.


Do you have references?


    After four decades of consulting on eavesdropping and espionage, we have some very impressive references.

    • 375+ of the Fortune 1000 companies.

    • 800+ others from every imaginable corner of business.

    • Located in 38 states, and several foreign countries.

    • Many North American government agencies.

    Visit our Client Testimonials page. Ask your associates and colleagues about us. Chances are very good we have already helped a security director, or an investigator you know personally. They are our very best references. We can also arrange for you to speak directly with our clients.


What is included in an inspection?

RF &


Total Information



Radio Frequency Spectrum Examination

    Radio transmitters are the most common eavesdropping devices in use today. Room and telephone bugs transmit audio; spycams may transmit both audio and video. Computer data and keystrokes may also be transmitted out of the area, wirelessly. The Radio Frequency Spectrum Examination is a core component of the eavesdropping detection sweep.

    When budgets do not allow full inspections as frequently as you would like, a Radio Emissions exam economically provides an interim level of security.


Wireless LAN Security Audit & Compliance Examination

    This exam determines if your system is open and easily available to hackers, intruders and eavesdroppers. It also detects rogue Access Points, innocently placed by employees, or on purpose by an outsider.

    Compliance issues under these laws are also discovered:

• Sarbanes-Oxley Act – U.S. Public Companies                                       • EU - CRD (Cad 3) – EU - Capital Requirements Directive

• HIPAA – Health Insurance Portability and Accountability Act              • ISO 27001 – Information Security Management

• GLBA – Gramm-Leach-Bliley Financial Services Modernization Act   • Basel II Accord – Banking

• PCI-DSS – Payment Card Industry Data Security Standard                 • FISMA – Federal Information Security Management Act

 • DoD 8100.2 – Use of Commercial Wireless Devices, Services, and Technologies in the Dept. of Defense Global Information Grid

TSCM is only part of our service to you.

We consider all aspects

of information security.

Full Area Inspection

    Key areas, such as the Board Room, executive offices, and conference rooms, receive a full physical and electronic inspection.All Murray TSCM physical inspections are augmented by the latest technology: hi-res CCTV, lab quality thermal imaging, advanced NLJD, and more.

    Non-transmitting attacks such as: miniature voice recorders; sound extraction via wire, carrier current, infrared, ultrasonic or laser microphones; covert video (spycams); and keystroke loggers are found this way. These devices may be secreted in hollow walls, false ceilings, furniture, fixtures and other common items which have a legitimate place in the room, such as power strips, radios and clocks.

    This part of the inspection is conducted with the aid of Non-Linear Junction detection, Thermal Emissions Spectrum Analysis, additional tools, and manual inspection techniques.

Communications Examination

    Every communications device is a potential eavesdropping tool. We fully inspect each one. This includes: phones, speakerphones, fax machines, print centers, video-teleconferencing equipment, and their associated wiring / equipment racks.

    Our communications examination is a battery of tests, including: electrical measurements; radio-frequency emissions and audio leakage detection; an equipment room security check; inspection of wiring; non-linear junction and frequency domain reflectometry; inspection of feature settings; and an internal physical inspection to locate foreign devices and circuit modifications.

    Upon completion of our exams, instruments are sealed with serial numbered government-level security tape. You may periodically inspect these seals yourself to detect tampering, or an unauthorized swap of equipment.


We think there is a problem. What should we do until you get here?

Until we arrive...

    • Conduct your affairs normally.

    • Do not reveal your suspicions to others.

    • Limit confidential conversations.

    • Keep detailed notes on anything you feel is suspicious.

    • Plan a logical next step if an eavesdropping device is found.

How quickly can you respond?

Very quickly.

    Emergencies for client family members are handled immediately.


How do you accomplish this?

    Companies who have an ongoing relationship with us unofficially agree to be flexible with their regular scheduling when a fellow family member has an emergency. They know that they will receive the same courtesy in return.

    Regular inspections can be scheduled promptly as well.

Why trust Murray Associates?

What areas of the world do you cover?

    Murray Associates travels internationally for their clients on a regular basis. Headquartered in the New York City metropolitan area, travel is quick and easy for us.


Do you have associates in other locations?

    Yes. Being in the security industry for four decades, we have trusted colleagues in several countries. Bonus... These colleagues are not plucked from a directory. In almost every case, we know these people on a personal basis and have visited their offices.

    We often manage assignments for our clients with multinational locations, supervising our local contacts during inspections. By doing so, we solve many logistics and availability problems - especially true when several locations worldwide require a unified electronic eavesdropping audit program, or simultaneous inspections. More details here.


Simple solution...

    Have us manage your multinational electronic eavesdropping audit program. Our experience and contacts will save you time, effort, money and frustration.


Client Locations

Local: Connecticut: CT, Delaware: DE, Maine: ME, Maryland: MD, Massachusetts: MA, New Hampshire: NH, New Jersey: NJ, New York: NY, Vermont: VT, District of Columbia: DC, Virginia: VA National: Alabama: AL, Alaska: AK, Arizona: AZ, Arkansas: AR, California: CA, Colorado: CO, Florida: FL, Georgia: GA, Idaho: ID, Illinois: IL, Indiana: IN, Iowa: IA, Kansas: KS, Kentucky: KY, Louisiana: LA, Michigan: MI, Minnesota: MN, Mississippi: MS, Missouri: MO, Montana: MT, Nebraska: NE, Nevada: NV, New Mexico: NM, North Carolina: NC, Ohio: OH, Oklahoma: OK, Oregon: OR, Pennsylvania: PA, Rhode Island: RI, South Carolina: SC, South Dakota: SD, Tennessee: TN, Texas: TX, Utah: UT, Washington: WA, West Virginia: WV, Wisconsin: WI, Wyoming: WY, Puerto Rico: PR, Virgin Islands: VI

International: Bermuda: BM, Brazil, BR; Mexico: MX, Bahamas: BS, Canada: CA, United Kingdom: UK, Portugal: PT, France: FR, Netherlands: NL, Switzerland: CH, Monaco: MC, Germany: DE, Turkey: TR, Uruguay: UY, Singapore: SG, People's Republic of China: CN

Based in the New York City area, Murray Associates TSCM responds quickly, locally and globally. We are experienced world travelers.

Do you install eavesdropping equipment?

No, our practice is limited to pro-privacy services.

Do you sell any equipment, eavesdropping or otherwise?


    We stick to our specialty; securing our clients' information and privacy.

    We do not sell equipment, endorse products, accept secret commissions, gifts or favors from recommended companies or products. Our income comes from clients who pay us for our experience and unbiased knowledge.

Do you offer eavesdropping detection training?

    We do not publicly offer a school or seminars for training technical investigators.

    We do provide training to our clients who require a secondary, in-house TSCM capability.

    Mr. Murray and his staff's training experience includes an introductory seminar entitled Electronic Eavesdropping & Industrial Espionage at the John Jay School of Criminal Justice in New York City.


Can you help me with other security matters?


    Our background in general corporate security is extensive. We understand the issues, and we are very good at devising solutions.

     Working closely with many forensic specialists, professional investigators and security agencies lets us know "who’s good."

     We maintain extensive files on security products. We buy and test many products (with our own money). We know who makes what well, what it does and doesn’t do, and where to buy it at a fair price.

     You will appreciate the all the free extras we provide, like our "call-here-first" policy. We save our clients from expensive mistakes, wasted effort, and most importantly - time.

    If you want one point of contact for your tough security questions, you will love us.

Book: Is My Cell Phone Bugged? by Kevin D. Murray

Is my cell phone bugged? comes with a FREE electronic detector to help you determined if spyware is on your phone and a special Web page filled

Concerned about smartphone eavesdropping, hacking, and spyware?

You've come to the right place. Our clients receive this book (complimentary) as part of our services.


Is My Cell Phone Bugged? Everything you need to know to keep your mobile conversations private — is a new book which explains, in clear language:

  • How to tell if your phone has been hacked or bugged.

  • How to prevent spyware from infecting your


  • What to do if your mobile phone is bugged.

    (And, what not to do.)

  • How to catch your spy, and much more.

    This is a do-it-yourself smartphone security handbook for the average  person.


How often are TSCM re-inspections conducted?

• Quarterly is the generally accepted business practice.

• Semiannual and bimonthly schedules are the next most common.

• Occasionally people have requirements for monthly audits.


* Eavesdropping Detection and Wireless LAN Security Audits which are not

   renewed periodically may be interpreted in court as an admission that

   previously protected information is no longer important.


What should be inspected?

    Any place where sensitive information can be heard, seen, or intercepted.


Additional advice...

    There is usually no need to "check every last inch.” Although normal and instinctive, "check everything" does not use our talents efficiently, and is not cost-effective. Have us start with the most sensitive areas.

    There is a point where you will say, “If they have not attacked these areas, then the rest of the areas are probably safe.” With this approach, you will not overspend, and you can move quickly to address any other possible reasons for your concern.


Include the following locations when constructing your list...

    • Sensitive areas.

    • Adjacent areas, if sounds from sensitive areas can be heard there too.

    • All communications equipment within both types of areas.

      (phones, speakerphones, video teleconferencing, faxes, modems, LANs, etc.)

    • Devices used for sensitive matters but located elsewhere (mobile teleconferencing, etc.)

    • Equipment which handles sensitive printed materials.

       (photocopiers, scanners, A/V equipment, etc.)

    • Telephone rooms, wire closets, and junction boxes.

    • Transportation vehicles. (cars, planes, boats)

    • Off-site meeting locations.

    • Corporate apartments or suites.

    • Executives' home offices.

    • Company field locations, subsidiaries, etc.

    • Other items or areas unique to your organization.


Rules of thumb...

    • In sensitive areas, both the room and all communications equipment

      should be inspected.

    • In adjacent areas, both the area and all communications equipment

      should be inspected if audio from the sensitive area can be heard there.

    • Upon rare occasion, communications items may be inspected without

      inspecting the areas they are in. The reverse is never true.

The benefits of having an effective counterespionage strategy.

• Increased profitability.

• Intellectual property protection.

• An environment secure from electronic surveillance invasions.

• Advance warning of intelligence collection activities (spying).

• Double check the effectiveness of current security measures and practices.

• Document compliance with many privacy law requirements.

• Discovery of new information loopholes before they can be used.

• Help fulfill legal the requirement for "Business Secret" status in court.

• Enhanced personal privacy and security.

• Improved employee moral.

• Reduction of consequential losses, e.g. information leak sparks a stockholder's lawsuit,

   or activist wiretaps damage good will and sales.


I think I found a bug! What should I do?

    Recently, one of our clients found a bug.  (in-between our regular inspections)

    The device was a small digital voice recorder, with voice activation capability, taped to a wastepaper can in the Boardroom. The Board Meeting was scheduled for the following morning. We responded on an emergency basis, but the eavesdropping device was removed upon discovery. Their case was blown.

    This brings up an important point. If you find a bug, what should you do?


These are your First Responder obligations...

    1. Do not to disturb the device. It's evidence.

    2. Do not alert the eavesdropper by talking.

    3. Secure the area. It's a crime scene.

         (Use a non-alerting excuse.)

    4. Call us quickly from a 'safe' area, using a 'safe' phone.

    5. Document. Write notes. Take photos. Keep a log of events.

    6. Notify only people who have a real 'need to know.'

    7. Observe and note unusual behavior by others.

    8. Tell all persons involved to keep it confidential.


    We will be there to help you as soon as possible to:

        • complete the documentation process;

        • inspect for additional / supplementary devices;

        • evaluate the situation;

        • answer questions;

        • and recommend how to identify the eavesdropper.

    Murray Associates can also be your expert witness should your case go to court.

May I call you with additional questions?

    Whatever your security question, our policy is, "Call here first!"

    If we can't answer it, chances are excellent we know the best person who can answer it for you, and we will point you in the right direction.

E-mail or phone us +1-908-832-7900

    Note: Do not, call from, or discuss your concerns within areas which might be under electronic surveillance.

May I use Murray Associates as a Sub-Contractor?

We prefer the term adjunct technical consultant, but yes,

many people sub-contract our services.

      • Private Detectives

      • Attorneys

      • Security Firms

      • Business Consultants

      • Meeting Planners


We have a three decade track record of making our business colleagues look like heroes to their clients. We will do the same for you.


Just introduce yourself and we will send you our free white paper...

"The Security Provider's Guide to Discussing TSCM with business, government and at-risk individuals" (17 Pages)


It will help you explain our TSCM services to your clients, and details why it is smart and profitable for you to partner with a TSCM specialist...


Whether you are technically inclined or not, after reading this, you will be able to intelligently discuss these important services with anyone who seeks your advice.


SPECIAL SERVICES — for Aircraft Charter Companies & Executive Protection Professionals