TSCM and Eavesdropping Detection Services
New York area headquarters
Services available worldwide

800-635-0811
+1-908-832-7900


Information Protection and Privacy Assurance
for Business, Government
and at-risk Individuals


Home

     •
Introduction

     • FAQs

     • Estimate Worksheet

     • Contact

About Us

     • Qualifications

     • Instrumentation

     • Subcontracting

     • Innovations

     • Staff

     • Client Reviews

     • Comparison Chart

     • Operating Policy

General Information

     • Downloads

     • Insider Tips

     • Ask questions

     • 100+ Spybuster Tips

     • One Minute TSCM Quiz

     • MoviesCartoons

     • Books

     • Eavesdropping History

Spy News from New York
Kevin's Security Scrapbook


This appears if user doesn't have JavaScript enabled, or doesn't have the required Flash Player version.




Eavesdropping Detection and Counterespionage Consulting enquiries are invited from corporate, government and professional security entities.

TSCM Eavesdropping Detection and TSCM Services US FlagFor federal procurement purposes, U.S. Government regulations classify Murray Associates Counterespionage as a Small Business, Professional Consulting Firm.

Registered Vendor:
• National Security Agency (NSA ARC)
• DoD - CCR
• Exostar SourcePass
• Jones Lang LaSalle
• ISNetworld
• Ariba

Spybusters, LLC dba
Murray Associates
PO Box 668
Oldwick, NJ 08858
(USA)




Certified Protection Professional CPP TSCM


Certified Information Security Manager - CISM TSCM


Certified Fraud Examiner CFE TSCM


International Association of Professional Security Consultants - IAPSC TSCM


American Society for Industrial Security ASIS TSCM


HTCIA logo


InfraGard Logo


Use of this site indicates acceptance of Terms of Use, Linking, and Privacy Statements.

Copyright 1996-2014, Spybusters, LLC (140209)



Espionage Related Books
Government, Global...


Books which are out of print may still be available via the Amazon book search service. Most of them are still very worthwhile to own. For this reason - and their historical significance - we maintain them on our list.
• Suggestions for appropriate additional books are welcome. Write to us with your suggestions.
Important note. A majority of these books live up to their titles and provide accurate information. A few do not. Please purchase carefully. A listing on this page does not necessarily constitute an endorsement from Murray Associates (disclaimer).



A Handbook for Spies
Wolfgang Lotz, 1980

Aerial Surveillance Sensing Including Obscured and Underground Object Detection: 4, 6 April 1994 Orlando, Florida (Spie, Vol 2217)
Ivan Cindrich, Nancy K. Del Grande

The Axnan Attack - A detailed composite case history (true story) about how electronic eavesdropping is accomplished on a global corporation level.
Glenn H. Whidden, 2000

Big Brother Is Listening: Phone Tappers & State Security
Duncan Campbell, 1981

Canada's Enemies: Spies and Spying in the Peaceable Kingdom
Graeme S. Mount, 1993

Cheesebox - Being the life and times of Cheesebox Callahan, King of the underworld’s wiremen.
Paul S. Meskil with Gerard M. Callahan, 1974

The Codebreakers; The Comprehensive History of Secret Communication from Ancient Times to the Internet
David A. Kahn, 1996

The Culture of Surveillance: Discipline and Social Control in the United States
William G. Staples, 1997

Books
Videos
DVD
Search by keywords:
In Association with Amazon.com

The Eavesdroppers
S. Dash, R.F. Schwartz, R.E. Knowlton, 1959 & reprinted 1971

Economic Espionage: joint hearing before the Select Committee on Intelligence, United States Senate, and the Subcommittee on Terrorism, Technology, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Fourth Congress, second session, February 28, 1996

The threat of foreign Economic Espionage to U.S. corporations: hearings before the Subcommittee on Economic and Commercial Law of the Committee on the Judiciary, House of Representatives, One Hundred Second Congress, second session, April 29 and May 7, 1992

Electronic Communication Interception Operations: Selected Examples of Possible Approaches
U. S. Office of Telecommunications Policy, 52p., 1985, ISBN 0-87364-114-0, Paladin Press

Electronic Eavesdropping Techniques and Equipment
Raymond N. Jones, 1975, US Department of Justice, Law Enforcement Standards Program, Report-0207.00, Supt. of Documents #J 1.41/2: 0207.0

Electronic Monitoring Guide: A Guide On The Monitoring And Recording Of Communications By Utility Company Personnel
The Utilities Telecommunications Council (now UTC), Washington, DC 1996

Electronic Surveillance and Civil Liberties
US Congress, Office of Technology Assessment, 1985, LOC# 85-600609

Electronic Surveillance: Report of the National Commission for the Review of Federal and State Laws Relating to Wiretapping and Electronic Surveillance (5 volumes)
National Wiretap Commission, Washington, 1976, LOC# 75-619445, GPO# 053-003-00121-7

Employee Duty of Loyalty: A State-By-State Survey
Brian M. Malsberger (Editor), David J. Carr (Editor), Arnold H. Pedowitz, 1999

The Encyclopedia of American Intelligence and Espionage: From the Revolutionary War to the Present
George J. A. O'Toole, 1988

Friendly Spies - How America's allies are using economic espionage to steal our secrets.
Peter Schweizer, 1993

Global Perspectives on Competitive Intelligence
John E. Prescott, Patrick T. Gibbons, 1994

Guide to Embassy & Espionage Communications
Tom Kneitel

The Guinness Book of Espionage
Mark Lloyd, 1994

High-Tech Espionage/How the KGB Smuggles Nato's Strategic Secrets to Moscow
Jay Tuck, 1986

Illegal police surveillance
George Roberts

Industrial Security Manual for Safeguarding Classified Information
Department of Defense 5220.22-M, 1991, $17.00, US Government Printing Office, Washington, DC 20402-9329, ISBN 008-007-03291-7

Inside the Company: CIA Diary
Philip Agee, 1975

Intellectual Property : Patents, Trademarks, Copyright, Trade Secrets, Undeveloped Ideas, Unfair Competition, Semiconductor Chip Protection, Right Of...
Margreth Barrett, 1998

The Intruders: The Invasion Of Privacy By Government And Industry
Senator Edward V. Long, Fredrick A. Praeger Publishers, 1967, 230 pp., $5.95, LOCCCN: 66-18907

Invading the Private: State Accountability and New Investigative Methods in Europe
Stewart Field (Editor), Caroline Pelser (Editor), 1998

Invasion of privacy: police and electronic surveillance in Canada
Stanley A. Cohen

Is My Cell Phone Bugged? Everything you need to know to keep your mobile conversations private. Smartphones are mini computers. Spyware can turn your phone into a bugging, tracking and snitching device. This book shows you: how you can determine yourself if you have spyware on your phone, what to do about it, and what not to do. Additional chapters explain other mobile communications vulnerabilities. Comes with a SpyWarn Mobile™ transmission detector which shows you when your phone is transmitting, a private web page for further information, and an opt-in newsletter for late breaking updates. Kevin D. Murray – CPP, CISM, 2011

Law of electronic surveillance in Canada
David Watt

The Literary Spy: The ultimate source for quotations on espionage and intelligence.
Charles E. Lathrop, Yale University Press, 2004

Making Spies: A Talent Spotter’s Handbook
H. H. Cooper, 1986

Methods of Electronic Audio Surveillance
Dr. David A. Pollock, 1973

Privacy in America: Is your life in the public eye?
David F. Linowes, University of Illinois Press, 1989

Protecting Corporate America’s Secrets in the Global Economy
David A. Marston, 1992

Protecting Privacy in Surveillance Societies: The Fed. Rep. of Germany, Sweden, France, Canada, and the U. S.
David H. Flaherty - The University of North Carolina Press, 1989

Protecting Trade Secrets Under the Uniform Trade Secrets Act
Michael Craig Budden, 1996

The Puzzle Palace: Inside The National Security Agency, America’s Most Secret Intelligence Organization
James Bamford, 1983

Raising and Litigating Electronic Surveillance Claims in Criminal Cases
National Lawyers Guild - Lake Law Books, San Francisco, CA. - 1977

Running A Ring Of Spies - Spycraft and black operations in the real world of espionage.
Jefferson Mack, 1996

The Russian Eavesdropping Threat - Late 1993
Glenn H. Whidden, Technical Services Agency

Secret Power - The International Spying Networks UKUSA and ECHELON
Nicki Hagar, Interpact, Inc., 813-518-0600, 301pp, ISBN: 0-908802-35-8

The Sigint Secrets: The Signals Intelligence War, 1900 to Today
Nigel West

Soviet SIGINT: Hawaii operation
Desmond Ball

Spycatcher: The Candid Autobiography of a Senior Intelligence Officer
Peter Wright (Former Assistant Director of MI5), 1987

The Spycatcher’s Encyclopedia of Espionage
Peter Wright, 1987

Spy-Tech
Graham Yost - Facts on File, New York - 1985 - ISBN 0-8160-1115-X

They're Watching You: The Age of Surveillance
Tony Lesce

Surveillance and Assessment Technologies for Law Enforcement: 19-20 November 1996, Boston, MA (SPIE Proceedings Series, Vol. 2935)
A. Trent DePersia, Suzan Yeager, Steve Ortiz - ISBN 0-8194-2337-8

Technical Surveillance and Countermeasures (TS/CM) Equipment in Russia: A Strategic Entry Report
The Manufacturing Research Group, 1998

Techno-Bandits - How the Soviet's are Stealing America's High-Tech Future
Linda Melvern, Nick Anning, David Hebditch, 1984

The Ultimate Spy Book
H. Keith Melton, 1996

US Attorney's Manual on Electronic Surveillance
Paladin Press - 1988 - ISBN 0-87364-457-3

Who's bugging you?: Inside Ireland's secret world of electronic surveillance.
Brendan Munnelly

Wiretap: Listening In On America’s Mafia
James Goode, 1988

Wiretapping and Electronic Eavesdropping: The Law and Its Implications: A Comparative Study
Juris Cederbaums, 1969

Wiretapping In New York City
Robert M. Fogelson, 1974

Books
Videos
DVD
Search by keywords:
In Association with Amazon.com


Return to Murray's
Eavesdropping History
Emporium


SSL Certificates