TSCM and Eavesdropping Detection Services
New York area headquarters
Services available worldwide


Information Protection and Privacy Assurance
for Business, Government
and at-risk Individuals



     • FAQs

     • Estimate Worksheet

     • Contact

About Us

     • Qualifications

     • Instrumentation

     • Subcontracting

     • Innovations

     • Staff

     • Client Reviews

     • Comparison Chart

     • Operating Policy

General Information

     • Downloads

     • Insider Tips

     • Ask questions

     • 100+ Spybuster Tips

     • One Minute TSCM Quiz

     • MoviesCartoons

     • Books

     • Eavesdropping History

Spy News from New York
Kevin's Security Scrapbook

This appears if user doesn't have JavaScript enabled, or doesn't have the required Flash Player version.

Eavesdropping Detection and Counterespionage Consulting enquiries are invited from corporate, government and professional security entities.

TSCM Eavesdropping Detection and TSCM Services US FlagFor federal procurement purposes, U.S. Government regulations classify Murray Associates Counterespionage as a Small Business, Professional Consulting Firm.

Registered Vendor:
• National Security Agency (NSA ARC)
• DoD - CCR
• Exostar SourcePass
• Jones Lang LaSalle
• ISNetworld
• Ariba

Spybusters, LLC dba
Murray Associates
PO Box 668
Oldwick, NJ 08858

Certified Protection Professional CPP TSCM

Certified Information Security Manager - CISM TSCM

Certified Fraud Examiner CFE TSCM

International Association of Professional Security Consultants - IAPSC TSCM

American Society for Industrial Security ASIS TSCM

HTCIA logo

InfraGard Logo

Use of this site indicates acceptance of Terms of Use, Linking, and Privacy Statements.

Copyright 1996-2014, Spybusters, LLC (140209)

Espionage Related Books
Industrial Espionage, Business Espionage, Competitive Intelligence...

Books which are out of print may still be available via the Amazon book search service. Most of them are still very worthwhile to own. For this reason - and their historical significance - we maintain them on our list.
• Suggestions for appropriate additional books are welcome. Write to us with your suggestions.
Important note. A majority of these books live up to their titles and provide accurate information. A few do not. Please purchase carefully. A listing on this page does not necessarily constitute an endorsement from Murray Associates (disclaimer).

101 Questions & Answers About Business Espionage
The ultimate FAQ about business espionage; prevention and prevention.
(with contributions by Kevin D. Murray)
William M. Johnson, Ph.D., 2001

Aerial Surveillance Sensing Including Obscured and Underground Object Detection: 4, 6 April 1994 Orlando, Florida (Spie, Vol 2217)
Ivan Cindrich, Nancy K. Del Grande

Advances in Competitive Intelligence
John E. Prescott - Society of Competitor Intelligence Professionals, 1989

Architectural Electromagnetic Shielding Handbook
Leland H. Hemming, Hugh Denny, 1992

The Art & Science of Dumpster Diving
John Hoffman, Jim Broadstreet, 1993, 1999

The Axnan Attack - A detailed composite case history (true story) about how electronic eavesdropping is accomplished on a global corporation level.
Glenn H. Whidden, 2000

Search by keywords:
In Association with Amazon.com

Business Competitor Intelligence: Methods for Collecting, Organizing, and Using Information
William L. Sammon, Mark A. Kurland, Robert Spitalnic

Business Intelligence & Espionage
Richard M. Greene, 1996

Business Intelligence System : A New Tool for Competitive Advantage
Benjamin Gilad, Tamar Gilad, 1988

Canada's Enemies: Spies and Spying in the Peaceable Kingdom
Graeme S. Mount, 1993

Citizen Espionage - Studies in Trust and Betrayal
Theodore R. Sarbin, Ralph M. Carney, Carson Eoyang (Editor), 1994

Commercial Espionage: 79 Ways Competitors Can Get Any Business Secrets
Boris Parad, Mark T. Banner, 1997

The Complete Guide to Competitive Intelligence
Kirk W.M. Tyson, 1998

Competitor Intelligence Manual & Guide: Gathering, Analyzing, and Using Business Intelligence
Kirk W. M. Tyson, 1990

Competitive Intelligence for the Competitive Edge
Alan Dutka, 1999

Competitive Intelligence : How to Gather, Analyse, and Use Information to Move Your Business to the Top
Larry Kahaner, 1998

Competitor Intelligence: How to Get It, How to Use It.
Leonard M. Fuld, 1985

book coverCompetitor Intelligence - Strategy, Tools and Techniques for Competitive Advantage
Andrew Pollard, 1999

Competitive Intelligence: From Black Ops to Boardrooms - How Businesses Gather, Analyze, and Use Information to Succeed in the Global Marketplace
Larry Kahaner, 1996

Competitor Intelligence: Turning Analysis into Success
(Wiley Series in Practical Strategy), D. E. Hussey, Per V. Jenster, Perv Jenster, 1999

Confidential : Uncover Your Competition's Top Business Secrets Legally and Quickly - And Protect Your Own
John A. Nolan, III, 1999

Corporate Espionage: What It Is, Why It Is Happening in Your Company, What You Must Do About It
Ira Winkler, 1997

Corporate Intelligence & Espionage: A blueprint for executive decision making.
Richard Fells & Peter Nehemkis, 1984

Counterespionage for American Business
Peter Pitorri, 1998

Countering Industrial Espionage
Peter Heims - 20th Century Security Education Ltd., 293 Kingston Road, Leatherhead, Surrey, England - 1982 - ISBN 0 905961 03 X

The Cuckoo's Egg: Taking the spy through the maze of computer espionage.
Clifford Stall, 1989

The Culture of Surveillance: Discipline and Social Control in the United States
William G. Staples, 1997

Cyberpunk: Outlaws and hackers on the computer frontier.
Katie Hafner & John Markoff, 1991

The Death of a Thousand Cuts: Corporate Campaigns and the Attack on the Corporation
Jarol B. Manheim, 2000

Defeating Industrial Spies
Duncan Long, 1991

Directory of Privacy Professionals
Robert Ellis Smith, www.privacyjournal.net www.infopost.com

Don't Hire A Crook!: How To Avoid Common Hiring (And Firing) Mistakes
Dennis L. Demey, James R. Flowers (Editor)

The Eavesdroppers
S. Dash, R.F. Schwartz, R.E. Knowlton, 1959 & reprinted 1971

Economic Espionage: joint hearing before the Select Committee on Intelligence, United States Senate, and the Subcommittee on Terrorism, Technology, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Fourth Congress, second session, February 28, 1996

The Extreme Covert Catalog: The world's most complete guide to electronic surveillance, covert and exotic equipment supplies and suppliers.
Lee Lapin, 2001

The threat of foreign Economic Espionage to U.S. corporations: hearings before the Subcommittee on Economic and Commercial Law of the Committee on the Judiciary, House of Representatives, One Hundred Second Congress, second session, April 29 and May 7, 1992

Effective Security Management
Charles A. Sennewald, 1998

The Electronic Eye: The Rise of Surveillance Society
David Lyon, 1994

Electronic Monitoring Guide: A Guide On The Monitoring And Recording Of Communications By Utility Company Personnel
The Utilities Telecommunications Council (now UTC), Washington, DC 1996

Electronic Monitoring in the Workplace : A Selected Bibliography
Carla M. Weiss

Electronic Spies - The New Face of War
Time-Life Books, 1991

Employee Duty of Loyalty: A State-By-State Survey
Brian M. Malsberger (Editor), David J. Carr (Editor), Arnold H. Pedowitz, 1999

Employee Privacy Law
L. Camille Hebert, 1993

Espionage in the Silicon Valley
John D. Halamka

Search by keywords:
In Association with Amazon.com

Espionage, terrorism and subversion: an examination and a philosophy of defence for management
Peter Hamilton

The Executive's Guide to Protecting Proprietary Business Information & Trade Secrets
James H.A. Pooley, 1987

Friendly Spies - How America's allies are using economic espionage to steal our secrets.
Peter Schweizer, 1993

Global Perspectives on Competitive Intelligence
John E. Prescott, Patrick T. Gibbons, 1994

The Guide to Background Investigations
A comprehensive source directory for employee screening and background investigations

The Guinness Book of Espionage
Mark Lloyd, 1994

Handbook of Information Security Management, 1999 Edition
Micki Krause (Editor), Harold F. Tipton (Editor)

Handbook on State Laws Regarding Secretly Recording Your Own Conversations
Barbara Ann Rowan, Attorney, 1990

Hands-on Countermeasures
("Murray Associates...one of the best ECM firms in the country.")
Lee Lapin, 1993, ISBN 1-880231-15-8

How To Build A Bugproof Room
Angus Glas, 1990

How to Find Information About Companies, Part 1
Washington Researchers, 1998

How to Find Information About Companies, Part 2
Washington Researchers, 1999

How to Find Information About Companies, Part 3
Washington Researchers, 1999

How to Get Anything On Anybody: Book I
Lee Lapin, 1987

How to Get Anything on Anybody: The Encyclopedia of Personal Surveillance, Book II
Lee Lapin, 1992

How to Get Anything on Anybody: The Encyclopedia of Personal Surveillance, Book III
Lee Lapin, 2003

How Competitors Learn Your Company's Secrets
Washington Researchers, 1998

How to Succeed at Spying by Trying (a novel about industrial espionage)
Shepherd Mead, 1968, Simon & Schuster, LOC# 68-14841

Improvised Technology In Counter-Intelligence Applications
Robert S. Ing

Industrial Intelligence and Espionage
Paul Ignatius Slee Smith

Industrial Espionage & Trade Secrets: An International Bibliography
Martin H. Sable, 1985

Industrial Espionage and Trade Secrets: A Bibliography
John Leslie Atkins

Industrial Espionage: Intelligence Techniques and Countermeasures
(Electronic Counterintelligence section by Kevin D. Murray)
N. R. Bottom & R. R. J. Gallati, 1984

Industrial Espionage and Technology Transfer: Britain and France in the Eighteenth Century
J. R. Harris, 1997

Industrial Security Manual for Safeguarding Classified Information
Department of Defense 5220.22-M, 1991, $17.00, US Government Printing Office, Washington, DC 20402-9329, ISBN 008-007-03291-7

Industrial Spying and Espionage (Public Administration Series, No. 1707)
Joseph Lee Cook, Earleen H. Cook, 1985

Information Security: A Practical Handbook on Business Counterintelligence
Henry W. Prunckun, Jr. - Charles C. Thomas Publisher, Springfield, IL - 1989 -78pp. $29.50

Information Security Handbook
William Caelli, 1991

Information Security for Managers
William Caelli, Dennis Longley, Michael Shain, 1989

Information Security Policies Made Easy
Baseline Software, 1999

The Information Systems Security Officer's Guide : Establishing and Managing an Information Protection Program
Gerald Kovacich, 1998

Inside Job : Deep Undercover As a Corporate Spy
Kenneth C. Bucchi, 1999

Intellectual Property : Patents, Trademarks, Copyright, Trade Secrets, Undeveloped Ideas, Unfair Competition, Semiconductor Chip Protection, Right Of...
Margreth Barrett, 1998

The International Handbook on Computer Crime: Computer-Related Economic Crime and the Infringements of Privacy
Dr. Sieber Ulrich, 1987

The Internet Age of Competitive Intelligence
John J. McGonagle, Carolyn M. Vella, 1999

Is My Cell Phone Bugged? Everything you need to know to keep your mobile conversations private. Smartphones are mini computers. Spyware can turn your phone into a bugging, tracking and snitching device. This book shows you: how you can determine yourself if you have spyware on your phone, what to do about it, and what not to do. Additional chapters explain other mobile communications vulnerabilities. Comes with a SpyWarn Mobile™ transmission detector which shows you when your phone is transmitting, a private web page for further information, and an opt-in newsletter for late breaking updates. Kevin D. Murray – CPP, CISM, 2011

The Intruders: The Invasion Of Privacy By Government And Industry
Senator Edward V. Long, Fredrick A. Praeger Publishers, 1967, 230 pp., $5.95, LOCCCN: 66-18907

Invading the Private: State Accountability and New Investigative Methods in Europe
Stewart Field (Editor), Caroline Pelser (Editor), 1998

It's None of Your Business, A Complete Guide to Protecting Your Privacy, Identity, and Assets
Larry Sontag, 1999

Law of Unfair Trade : Including Trade-Marks, Trade Secrets, and Good-Will
James Love Hopkins, 1997

Legal Guidelines for Covert Surveillance Operations in the Private Sector
John D. Hartman, 1993

The Literary Spy: The ultimate source for quotations on espionage and intelligence.
Charles E. Lathrop, Yale University Press, 2004

Managing Competitive Intelligence Knowledge in a Global Economy
American Productivity & Quality Center, 1998

Managing Information Security: Administrative, Electronic & Legal Measures to Protect Business Information
James A. Schweitzer, 1989

Measuring the Effectiveness of Competitive Intelligence: Assessing & Communicating CI's Value to Your Organization
Jan P. Herring, 1996

Monitoring the Competition: Find Out What’s Really Going On Over There
Leonard M. Fuld, 1988

Nail 'em! - Confronting High-Profile Attacks on Celebrities and Businesses
Eric Dezenhall, 1999

The New Competitor Intelligence: The Complete Resource for Finding, Analyzing, and Using Information About Your Competitors
Leonard M. Fuld, 1994 & 1995

The NCSA Guide to Enterprise Security: Protecting Information Assets
Michel E. Kabay, 1996

Odyssey of an Eavesdropper : My Life in Electronic Countermeasures and My Battle Against the FBI, Martin L. Kaiser III, 2005

Perfectly Legal Competitor Intelligence : How to Get It, Use It and Profit from It
Douglas Bernhardt

Physical Security: Practices & Technology
(Electronic Eavesdropping Detection chapter by Kevin D. Murray)
Charles Schnabolk - Butterworth Publishers, 1983

A Practical Guide to Taping Conversations in the 50 States and D.C.
The Reporter's Committee for Freedom of the Press, Fall 1996

Principles of Secure Communications – 2nd edition
Don J. Torrieri, 1992

Protecting Corporate America’s Secrets in the Global Economy
David A. Marston, 1992

Protecting Trade Secrets Under the Uniform Trade Secrets Act
Michael Craig Budden, 1996

Protecting Your Business Secrets
Michael K. Saunders, 1985

The Protection of Assets Manual
(Electronic Eavesdropping Detection chapter by Kevin D. Murray)

A 4-volume reference set, with monthly updates. Timothy Walsh, CPP (Editor)

Raising and Litigating Electronic Surveillance Claims in Criminal Cases
National Lawyers Guild - Lake Law Books, San Francisco, CA. - 1977

Running A Ring Of Spies - Spycraft and black operations in the real world of espionage.
Jefferson Mack, 1996

Searches and Surveillance in the Workplace – A brief report on current law.
Robert Ellis Smith, 1993 www.privacyjournal.net

Secret Armies: the growth of corporate and industrial espionage
Jacques Bergier

Security Consulting - Second Edition - 1996
Charles A. Sennewald, 1996
Chapter 12 - Computer as an Aid to Consulting, chapter contribution by Kevin D. Murray

Security Consulting - Third Edition - 2004
Charles A. Sennewald, 1996
Chapter 15 - Security Consulting Business, by Kevin D. Murray

Security Letter Source Book
Robert D. McCrie, 1993

Shhh.: How to Keep Trade Secrets... Secret
Philip L. Williams, 1993

Silicon Spies: the implications of Soviet acquisition of Western technology
Lauran Paine

So You Want to be an Industrial Spy
Louis Moreau - Gozo Press, Malta - 1977

Spooked: Espionage in corporate America.
Adam L. Penenberg, Marc Barry, 2000

Spooks: The Haunting of America: The Private Use of Secret Agents
Jim Hougan , 1978

Spy Overhead: The Story of Industrial Espionage
Clinch Calkins,

The Steal: counterfeiting and industrial espionage
Brian Freemantle

They're Watching You: The Age of Surveillance
Tony Lesce

Techno-Bandits - How the Soviet's are Stealing America's High-Tech Future
Linda Melvern, Nick Anning, David Hebditch, 1984

Trade Secrets (Intellectual Property Series (Law Journal Seminars-Press))
James H.A. Pooley, 1997

Trade Secrets
Maynard F. Thomson, 1994

Trade Secrets: A Pratitioner's Guide
Henry H. Perrit, 1994

Trade Secrets: A State-By-State Survey
Arnold H. Pedowitz (Editor), Robert W. Sikkel (Editor), 1997

Trade Secrets Law
Melvin F. Jager, 1991

Trade Secrets Protection and Exploitation
Jerry Cohen, Alan S. Gutterman, 1998

The TSCM Threat Book: Volumes I & II
Glenn H. Whidden, Technical Services Agency

The Ultimate Telecommunications Security Survey
James L. Schaub and Toni Ames, 1995

Voice Processing System Security: Misuse, Abuse, and Fraud Detection and Prevention
Tom Fermazin and Marc Robins; Robins Press, 212-614-9842; 120 pp.

War By Other Means: Economic Espionage in America
John J. Fialka, 1997

Who's Stealing Your Business: How to Identify & Prevent Business Espionage
William M. Johnson, Jack Maguire, 1988

Wiretap Detection Techniques: A Guide To Checking Telephone Lines For Wiretaps.
(with contributions by Kevin D. Murray)
Theodore N. Swift, 1997

Search by keywords:
In Association with Amazon.com

Return to Murray's
Eavesdropping History

SSL Certificates