TSCM and Eavesdropping Detection Services
New York area headquarters
Services available worldwide


Information Protection and Privacy Assurance
for Business, Government
and at-risk Individuals



     • FAQs

     • Estimate Worksheet

     • Contact

About Us

     • Qualifications

     • Instrumentation

     • Subcontracting

     • Innovations

     • Staff

     • Client Reviews

     • Comparison Chart

     • Operating Policy

General Information

     • Downloads

     • Insider Tips

     • Ask questions

     • 100+ Spybuster Tips

     • One Minute TSCM Quiz

     • MoviesCartoons

     • Books

     • Eavesdropping History

Spy News from New York
Kevin's Security Scrapbook

This appears if user doesn't have JavaScript enabled, or doesn't have the required Flash Player version.

Eavesdropping Detection and Counterespionage Consulting enquiries are invited from corporate, government and professional security entities.

TSCM Eavesdropping Detection and TSCM Services US FlagFor federal procurement purposes, U.S. Government regulations classify Murray Associates Counterespionage as a Small Business, Professional Consulting Firm.

Registered Vendor:
• National Security Agency (NSA ARC)
• DoD - CCR
• Exostar SourcePass
• Jones Lang LaSalle
• ISNetworld
• Ariba

Spybusters, LLC dba
Murray Associates
PO Box 668
Oldwick, NJ 08858

Certified Protection Professional CPP TSCM

Certified Information Security Manager - CISM TSCM

Certified Fraud Examiner CFE TSCM

International Association of Professional Security Consultants - IAPSC TSCM

American Society for Industrial Security ASIS TSCM

HTCIA logo

InfraGard Logo

Use of this site indicates acceptance of Terms of Use, Linking, and Privacy Statements.

Copyright 1996-2014, Spybusters, LLC (140209)

What is Extortionography?

Using audio / video / photographic evidence for personal or monetary gain, or to force a desired result or outcome.

Why is
Corporate Extortionography important to me?

It is the legal use of illegally gathered information (as from a wiretap, covert camera, room bug, and other electronic surveillance / espionage method)... when used by the news media. As decided by the US Supreme Court. (BARTNICKI v. VOPPER (99-1687) 200 F.3d 109)

The media can legally use information that someone else
illegally obtains for them.

The implications of Extortionography are far reaching.
From disgruntled employees to social activists... All can now leverage illegal snooping to champion their cause, extort or blackmail.

Further... "the media" can be anyone... from newspaper, radio, and television... to a public access cable TV show or home-brew Internet "news" site.

First post-ruling instance of Corporate Extortionography...
Surveillance team targets Gay Days at Disney World. ... self-described "Christian guerrillas" aimed hidden video cameras ... Their mission, to record any homoerotic displays to show at Disney’s next shareholders’ meeting.
(May 31, 2001)

• Have a counterespionage strategy in place.
Conduct eavesdropping prevention inspections.
In the meantime, learn...
-- How bugs are found.
-- How spycams are found

Search for 'Extortionography' in the news.

SSL Certificates