TSCM and Eavesdropping Detection Services
New York area headquarters
Services available worldwide


Information Protection and Privacy Assurance
for Business, Government
and at-risk Individuals



     • FAQs

     • Estimate Worksheet

     • Contact

About Us

     • Qualifications

     • Instrumentation

     • Subcontracting

     • Innovations

     • Staff

     • Client Reviews

     • Comparison Chart

     • Operating Policy

General Information

     • Downloads

     • Insider Tips

     • Ask questions

     • 100+ Spybuster Tips

     • One Minute TSCM Quiz

     • MoviesCartoons

     • Books

     • Eavesdropping History

Spy News from New York
Kevin's Security Scrapbook

This appears if user doesn't have JavaScript enabled, or doesn't have the required Flash Player version.

Eavesdropping Detection and Counterespionage Consulting enquiries are invited from corporate, government and professional security entities.

TSCM Eavesdropping Detection and TSCM Services US FlagFor federal procurement purposes, U.S. Government regulations classify Murray Associates Counterespionage as a Small Business, Professional Consulting Firm.

Registered Vendor:
• National Security Agency (NSA ARC)
• DoD - CCR
• Exostar SourcePass
• Jones Lang LaSalle
• ISNetworld
• Ariba

Spybusters, LLC dba
Murray Associates
PO Box 668
Oldwick, NJ 08858

Certified Protection Professional CPP TSCM

Certified Information Security Manager - CISM TSCM

Certified Fraud Examiner CFE TSCM

International Association of Professional Security Consultants - IAPSC TSCM

American Society for Industrial Security ASIS TSCM

HTCIA logo

InfraGard Logo

Use of this site indicates acceptance of Terms of Use, Linking, and Privacy Statements.

Copyright 1996-2014, Spybusters, LLC (140209)

Privacy Related Books...

Books which are out of print may still be available via the Amazon book search service. Most of them are still very worthwhile to own. For this reason - and their historical significance - we maintain them on our list.
• Suggestions for appropriate additional books are welcome. Write to us with your suggestions.
Important note. A majority of these books live up to their titles and provide accurate information. A few do not. Please purchase carefully. A listing on this page does not necessarily constitute an endorsement from Murray Associates (disclaimer).

A National ID Card: A License to Live
Robert Ellis Smith, 2005 www.privacyjournal.net

The Art & Science of Dumpster Diving
John Hoffman, Jim Broadstreet, 1993, 1999

The Big Brother Book of Lists
Robert Ellis Smith, 1984 www.privacyjournal.net

Big Brother Is Listening: Phone Tappers & State Security
Duncan Campbell, 1981

Ben Franklin's Web Site : Privacy and Curiosity from Plymouth Rock to the Internet
Robert Ellis Smith, 2000 www.privacyjournal.net

Bugging - A Complete Survey Of Electronic Surveillance Today
John Wingfield, R. Hale, 1984

Bugs Amongst Us (out of print, German and English in one book)
Peter A. Klüver - Druckerei Kampen Publishing, Hamburg 1, Germany - 1980

Celebrities and Privacy
Robert Ellis Smith, 1985 www.privacyjournal.net

Compendium of State Privacy and Security Legislation
US Department of Justice, 1990-94, NCJ-121157

Search by keywords:
In Association with Amazon.com

Compilation of State & Federal Privacy Laws
Robert Ellis Smith, 2000 & 2005 supplement www.privacyjournal.net

Computers, Surveillance, and Privacy
David Lyon (Editor), Elia Zureik (Editor), 1996

The Computer Privacy Handbook: A Practical Guide to E-Mail Encryption, Data Protection, and PGP Privacy Software
André Bacard, 1995

Data Transmission and Privacy
Dennis Campbell, Joy Fisher (Editor), 1994

The Death of a Thousand Cuts: Corporate Campaigns and the Attack on the Corporation
Jarol B. Manheim, 2000

Digital Privacy
M. L. Shannon, 1993

Directory of Privacy Professionals
Robert Ellis Smith, www.privacyjournal.net

The Eavesdroppers
S. Dash, R.F. Schwartz, R.E. Knowlton, 1959 & reprinted 1971

Electronic Monitoring in the Workplace : A Selected Bibliography
Carla M. Weiss

Electronic Nightmare: The Home Communications Set And Your Freedom
John Wicklein, 1979-82

Electronic Surveillance and Civil Liberties
US Congress, Office of Technology Assessment, 1985, LOC# 85-600609

Employee Privacy Law
L. Camille Hebert, 1993

The End of Privacy
Charles J. Sykes, 1999

The End of Privacy: How Total Surveillance Is Becoming a Reality
Reginald Whitaker, 1999

The Enormous Radio (fiction, young adult)
John Cheever, 1983

The Extreme Covert Catalog: The world's most complete guide to electronic surveillance, covert and exotic equipment supplies and suppliers.
Lee Lapin, 2001

How to Be Invisible : A Step-By-Step Guide to Protecting Your Assets, Your Identity, and Your Life
J. J. Luna, 2000

How To Build A Bugproof Room
Angus Glas, 1990

The Intruders: The Invasion Of Privacy By Government And Industry
Senator Edward V. Long, Fredrick A. Praeger Publishers, 1967, 230 pp., $5.95, LOCCCN: 66-18907

Invading the Private: State Accountability and New Investigative Methods in Europe
Stewart Field (Editor), Caroline Pelser (Editor), 1998

Invasion of privacy: police and electronic surveillance in Canada
Stanley A. Cohen

Is My Cell Phone Bugged? Everything you need to know to keep your mobile conversations private. Smartphones are mini computers. Spyware can turn your phone into a bugging, tracking and snitching device. This book shows you: how you can determine yourself if you have spyware on your phone, what to do about it, and what not to do. Additional chapters explain other mobile communications vulnerabilities. Comes with a SpyWarn Mobile™ transmission detector which shows you when your phone is transmitting, a private web page for further information, and an opt-in newsletter for late breaking updates. Kevin D. Murray – CPP, CISM, 2011

It's None of Your Business, A Complete Guide to Protecting Your Privacy, Identity, and Assets
Larry Sontag, 1999

The Law of Privacy
David A. Elder, 1991, with supplements to date.

The Law of Privacy Explained
Robert Ellis Smith, 2004 www.privacyjournal.net

Legal Guidelines for Covert Surveillance Operations in the Private Sector
John D. Hartman, 1993

Nail 'em! - Confronting High-Profile Attacks on Celebrities and Businesses
Eric Dezenhall, 1999

Our Vanishing Privacy – And What You Can Do To Protect Yours
Robert Ellis Smith - Privacy Journal, 1999 www.privacyjournal.net

The Phone Book: The Latest High-Tech Techniques and Equipment for Preventing Electronic Eavesdropping, Recording Phone Calls, Ending Harassing Calls
(Sidebars and illustrations by Kevin D. Murray)
M.L. Shannon

Privacy for Sale: How computerization has made everyone's life an open secret.
(Chapter 9 - privacy protection - is about Murray Associates.)
Jeffrey Rothfeder, 1992

Privacy in America: Is your life in the public eye?
David F. Linowes, University of Illinois Press, 1989

Privacy: How to protect what’s left of it. (Still in demand)
Robert Ellis Smith, 1980 www.privacyjournal.net

The Privacy Law Sourcebook 1999: United States Law, International Law, and Recent Developments
Marc Rotenberg, 1999

Privacy Laws & Business (Newsletter - UK and International versions)

Privacy on the Line: The Politics of Wiretapping and Encryption
Whitfield Diffie, Susan Eva Landau, 1998

The Privacy Plan: How to Keep What You Own Secret From High-Tech Snoops, Lawyers and Con Men
Robert J. Mintz, Peter S. Doft, 1999

The Professional Paranoid - How to fight back when investigated, stalked, harassed, or targeted by any agency, organization or individual.
H. Michael Sweeney, 1999

Protecting Privacy in Surveillance Societies: The Fed. Rep. of Germany, Sweden, France, Canada, and the U. S.
David H. Flaherty - The University of North Carolina Press, 1989

Protect Your Privacy on the Internet
Bryan Pfaffenberger, 1997

The Right to Privacy
Ellen Alderman, Caroline Kennedy (Contributor), 1997

Searches and Surveillance in the Workplace – A brief report on current law.
Robert Ellis Smith, 1993 www.privacyjournal.net

Secret Armies: the growth of corporate and industrial espionage
Jacques Bergier

Secret Power - The International Spying Networks UKUSA and ECHELON
Nicki Hagar, Interpact, Inc., 813-518-0600, 301pp, ISBN: 0-908802-35-8

They're Watching You: The Age of Surveillance
Tony Lesce

Snitch Culture: How Citizens are Turned into the Eyes and Ears of the State
Jim Redden, 2000

Social Security Numbers: Uses and Abuses
Robert Ellis Smith, 2005 www.privacyjournal.net

Spying on Your Spouse : A Guide for Anyone Who Suspects a Partner Is Cheating
Kelly Squires, 1996

Stranger On The Line - The Secret History of Phone Tapping
Patrick Fitzgerald & Mark Leopold, £7.95, ISBN 0-370-31086-1

Surveillance Countermeasures: A Serious Guide to Detecting, Evading, and Eluding Threats to Personal Privacy

Technology and Privacy: The New Landscape
Philip Agre, Marc Rotenberg, 1997

The Third Listener - Personal Electronic Espionage
John M. Carroll, Dutton, 1969

The Transparent Society: Will Technology Force Us to Choose Between Privacy and Freedom?
David Brin, 1998

War Stories – Accounts of persons victimized by invasion of privacy.
Robert Ellis Smith, 2004, www.privacyjournal.net

Wiretapping and Electronic Eavesdropping: The Law and Its Implications: A Comparative Study
Juris Cederbaums, 1969

Workrights – Pensions, job security, privacy, free speech, and other rights you thought you had.
Robert Ellis Smith, 1984 www.privacyjournal.net

Search by keywords:
In Association with Amazon.com

Return to Murray's
Eavesdropping History

SSL Certificates