TSCM and Eavesdropping Detection Services
New York area headquarters
Services available worldwide


Information Protection and Privacy Assurance
for Business, Government
and at-risk Individuals



     • FAQs

     • Estimate Worksheet

     • Contact

About Us

     • Qualifications

     • Instrumentation

     • Subcontracting

     • Innovations

     • Staff

     • Client Reviews

     • Comparison Chart

     • Operating Policy

General Information

     • Downloads

     • Insider Tips

     • Ask questions

     • 100+ Spybuster Tips

     • One Minute TSCM Quiz

     • MoviesCartoons

     • Books

     • Eavesdropping History

Spy News from New York
Kevin's Security Scrapbook

This appears if user doesn't have JavaScript enabled, or doesn't have the required Flash Player version.

Eavesdropping Detection and Counterespionage Consulting enquiries are invited from corporate, government and professional security entities.

TSCM Eavesdropping Detection and TSCM Services US FlagFor federal procurement purposes, U.S. Government regulations classify Murray Associates Counterespionage as a Small Business, Professional Consulting Firm.

Registered Vendor:
• National Security Agency (NSA ARC)
• DoD - CCR
• Exostar SourcePass
• Jones Lang LaSalle
• ISNetworld
• Ariba

Spybusters, LLC dba
Murray Associates
PO Box 668
Oldwick, NJ 08858

Certified Protection Professional CPP TSCM

Certified Information Security Manager - CISM TSCM

Certified Fraud Examiner CFE TSCM

International Association of Professional Security Consultants - IAPSC TSCM

American Society for Industrial Security ASIS TSCM

HTCIA logo

InfraGard Logo

Use of this site indicates acceptance of Terms of Use, Linking, and Privacy Statements.

Copyright 1996-2014, Spybusters, LLC (140209)

Legal and Social Issues
Eavesdropping, Espionage, Privacy...

Books which are out of print may still be available via the Amazon book search service. Most of them are still very worthwhile to own. For this reason - and their historical significance - we maintain them on our list.
• Suggestions for appropriate additional books are welcome. Write to us with your suggestions.
Important note. A majority of these books live up to their titles and provide accurate information. A few do not. Please purchase carefully. A listing on this page does not necessarily constitute an endorsement from Murray Associates (disclaimer).

U.S. Electronic Surveillance Laws - by state (free)

U.S. Electronic Surveillance Laws - "Can We Tape" (free)

U.S. Electronic Surveillance Laws - "Taping Official's Secrets" (free)

A Handbook for Spies
Wolfgang Lotz, 1980

Big Brother Is Listening: Phone Tappers & State Security
Duncan Campbell, 1981

Bugging - A Complete Survey Of Electronic Surveillance Today
John Wingfield, R. Hale, 1984

Citizen Espionage - Studies in Trust and Betrayal
Theodore R. Sarbin, Ralph M. Carney, Carson Eoyang (Editor), 1994

Search by keywords:
In Association with Amazon.com

Compendium of State Privacy and Security Legislation
US Department of Justice, 1990-94, NCJ-121157

Competitive Intelligence: From Black Ops to Boardrooms - How Businesses Gather, Analyze, and Use Information to Succeed in the Global Marketplace
Larry Kahaner, 1996

Computers, Surveillance, and Privacy
David Lyon (Editor), Elia Zureik (Editor), 1996

The Culture of Surveillance: Discipline and Social Control in the United States
William G. Staples, 1997

The Eavesdroppers
S. Dash, R.F. Schwartz, R.E. Knowlton, 1959 & reprinted 1971

Eavesdropping on Trial
Edith J. Lapidus, LL.B., Ph.D. - Hayden Book Co. - 1974 - KF9670.L37

Economic Espionage: joint hearing before the Select Committee on Intelligence, United States Senate, and the Subcommittee on Terrorism, Technology, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Fourth Congress, second session, February 28, 1996

The threat of foreign Economic Espionage to U.S. corporations: hearings before the Subcommittee on Economic and Commercial Law of the Committee on the Judiciary, House of Representatives, One Hundred Second Congress, second session, April 29 and May 7, 1992

The Electronic Eye: The Rise of Surveillance Society
David Lyon, 1994

The Electronic Invasion
Robert Michael Brown, 1967, 1975

Electronic Monitoring in the Workplace : A Selected Bibliography
Carla M. Weiss

Electronic Nightmare: The Home Communications Set And Your Freedom
John Wicklein, 1979-82

Electronic Surveillance and Civil Liberties
US Congress, Office of Technology Assessment, 1985, LOC# 85-600609

Electronic Surveillance: Report of the National Commission for the Review of Federal and State Laws Relating to Wiretapping and Electronic Surveillance (5 volumes)
National Wiretap Commission, Washington, 1976, LOC# 75-619445, GPO# 053-003-00121-7

Employee Duty of Loyalty: A State-By-State Survey
Brian M. Malsberger (Editor), David J. Carr (Editor), Arnold H. Pedowitz, 1999

Employee Privacy Law
L. Camille Hebert, 1993

The End of Privacy
Charles J. Sykes, 1999

The End of Privacy: How Total Surveillance Is Becoming a Reality
Reginald Whitaker, 1999

Global Perspectives on Competitive Intelligence
John E. Prescott, Patrick T. Gibbons, 1994

The Guide to Background Investigations
A comprehensive source directory for employee screening and background investigations

Handbook on State Laws Regarding Secretly Recording Your Own Conversations
Barbara Ann Rowan, Attorney, 1990

Industrial Espionage and Technology Transfer: Britain and France in the Eighteenth Century
J. R. Harris, 1997
Intellectual Property : Patents, Trademarks, Copyright, Trade Secrets, Undeveloped Ideas, Unfair Competition, Semiconductor Chip Protection, Right Of...
Margreth Barrett, 1998

The International Handbook on Computer Crime: Computer-Related Economic Crime and the Infringements of Privacy
Dr. Sieber Ulrich, 1987

The Internet Age of Competitive Intelligence
John J. McGonagle, Carolyn M. Vella, 1999

The Intruders: The Invasion Of Privacy By Government And Industry
Senator Edward V. Long, Fredrick A. Praeger Publishers, 1967, 230 pp., $5.95, LOCCCN: 66-18907

Invading the Private: State Accountability and New Investigative Methods in Europe
Stewart Field (Editor), Caroline Pelser (Editor), 1998

Invasion of privacy: police and electronic surveillance in Canada
Stanley A. Cohen

Is My Cell Phone Bugged? Everything you need to know to keep your mobile conversations private. Smartphones are mini computers. Spyware can turn your phone into a bugging, tracking and snitching device. This book shows you: how you can determine yourself if you have spyware on your phone, what to do about it, and what not to do. Additional chapters explain other mobile communications vulnerabilities. Comes with a SpyWarn Mobile™ transmission detector which shows you when your phone is transmitting, a private web page for further information, and an opt-in newsletter for late breaking updates. Kevin D. Murray – CPP, CISM, 2011

It's None of Your Business, A Complete Guide to Protecting Your Privacy, Identity, and Assets
Larry Sontag, 1999

The Law of Electronic Surveillance
James G. Carr

Law of electronic surveillance in Canada
David Watt

The Law of Privacy
David A. Elder, 1991, with supplements to date.

Law of Unfair Trade : Including Trade-Marks, Trade Secrets, and Good-Will
James Love Hopkins, 1997

Legal Guidelines for Covert Surveillance Operations in the Private Sector
John D. Hartman, 1993

Nail 'em! - Confronting High-Profile Attacks on Celebrities and Businesses
Eric Dezenhall, 1999

The Ominous Ear
Bernard B. Spindel, Award House, 1968

A Practical Guide to Taping Conversations in the 50 States and D.C.
The Reporter's Committee for Freedom of the Press, Fall 1996

Privacy Laws & Business (Newsletter - UK and International versions)

Problems of Electronic Eavesdropping
Monrad G. Paulsen

Protecting Trade Secrets Under the Uniform Trade Secrets Act
Michael Craig Budden, 1996

The Puzzle Palace: Inside The National Security Agency, America’s Most Secret Intelligence Organization
James Bamford, 1983

Raising and Litigating Electronic Surveillance Claims in Criminal Cases
National Lawyers Guild - Lake Law Books, San Francisco, CA. - 1977

The Right to Privacy
Ellen Alderman, Caroline Kennedy (Contributor), 1997

Secret Armies: the growth of corporate and industrial espionage
Jacques Bergier

Spooks: The Haunting of America: The Private Use of Secret Agents
Jim Hougan , 1978

They're Watching You: The Age of Surveillance
Tony Lesce

Stranger On The Line - The Secret History of Phone Tapping
Patrick Fitzgerald & Mark Leopold, £7.95, ISBN 0-370-31086-1

Terminal Compromise - Computer Terrorism: When Privacy and Freedom are Victims (Novel)
Winn Schwartau, Inter.Pact Press, 813-393-6600

The Third Listener - Personal Electronic Espionage
John M. Carroll, Dutton, 1969

Trade Secrets (Intellectual Property Series (Law Journal Seminars-Press))
James H.A. Pooley, 1997

Trade Secrets
Maynard F. Thomson, 1994

Trade Secrets: A Pratitioner's Guide
Henry H. Perrit, 1994

Trade Secrets: A State-By-State Survey
Arnold H. Pedowitz (Editor), Robert W. Sikkel (Editor), 1997

Trade Secrets Law
Melvin F. Jager, 1991

Trade Secrets Protection and Exploitation
Jerry Cohen, Alan S. Gutterman, 1998

The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom?
David Brin, 1998

US Attorney's Manual on Electronic Surveillance
Paladin Press - 1988 - ISBN 0-87364-457-3

War By Other Means: Economic Espionage in America
John J. Fialka, 1997

Wiretap: Listening In On America’s Mafia
James Goode, 1988

Wiretapping & Eavesdropping (law book)
Clifford Fishman, 1978 with annual updates.

Wiretapping and Electronic Eavesdropping: The Law and Its Implications: A Comparative Study
Juris Cederbaums, 1969

Wiretapping In New York City
Robert M. Fogelson, 1974

Search by keywords:
In Association with Amazon.com

Return to Murray's
Eavesdropping History

SSL Certificates