TSCM and Eavesdropping Detection Services
New York area headquarters
Services available worldwide

800-635-0811
+1-908-832-7900


Information Protection and Privacy Assurance
for Business, Government
and at-risk Individuals


Home

     •
Introduction

     • FAQs

     • Estimate Worksheet

     • Contact

About Us

     • Qualifications

     • Instrumentation

     • Subcontracting

     • Innovations

     • Staff

     • Client Reviews

     • Comparison Chart

     • Operating Policy

General Information

     • Downloads

     • Insider Tips

     • Ask questions

     • 100+ Spybuster Tips

     • One Minute TSCM Quiz

     • MoviesCartoons

     • Books

     • Eavesdropping History

Spy News from New York
Kevin's Security Scrapbook


This appears if user doesn't have JavaScript enabled, or doesn't have the required Flash Player version.




Eavesdropping Detection and Counterespionage Consulting enquiries are invited from corporate, government and professional security entities.

TSCM Eavesdropping Detection and TSCM Services US FlagFor federal procurement purposes, U.S. Government regulations classify Murray Associates Counterespionage as a Small Business, Professional Consulting Firm.

Registered Vendor:
• National Security Agency (NSA ARC)
• DoD - CCR
• Exostar SourcePass
• Jones Lang LaSalle
• ISNetworld
• Ariba

Spybusters, LLC dba
Murray Associates
PO Box 668
Oldwick, NJ 08858
(USA)




Certified Protection Professional CPP TSCM


Certified Information Security Manager - CISM TSCM


Certified Fraud Examiner CFE TSCM


International Association of Professional Security Consultants - IAPSC TSCM


American Society for Industrial Security ASIS TSCM


HTCIA logo


InfraGard Logo


Use of this site indicates acceptance of Terms of Use, Linking, and Privacy Statements.

Copyright 1996-2014, Spybusters, LLC (140209)




What should be inspected?


Simple answer...
Any place where sensitive information can be heard, seen, or intercepted.


Our additional advice...
Resist the following thought, “The place is bugged; check every last inch.”

Although normal and instinctive, this approach does not use our talents efficiently, is not cost-effective, and is usually not necessary.


Create a priority list.
Let us start with the most sensitive areas.

There is a point where you will say, “If they have not attacked these areas, then the rest of the areas are probably safe.”With this approach, you will not overspend, and you can move quickly to address any other possible reasons for your concern.

Include the following items when constructing your list...

Sensitive areas.

Adjacent areas, if sounds from sensitive areas can be heard there too.

All communications equipment within both types of areas.
(phones, speakerphones, video teleconferencing, faxes, modems, LANs, etc.)

Communications equipment used for sensitive matters but located elsewhere.

Other equipment which handles sensitive printed materials.
(photocopiers, scanners, A/V equipment, etc.)

Telephone rooms, wire closets, and junction boxes.

Transportation vehicles. (cars, planes, boats)

Off-site meeting locations.

Corporate apartments or suites.

Executives' home offices.

Other items or areas unique to your business or agency.

Rules of thumb...

In a sensitive area, both the room and all communications equipment must be inspected.

In an adjacent area, both the area and all communications equipment should be inspected.

Upon rare occasion, communications items can be inspected without inspecting the areas. The reverse is never true.

Stop by the next logical questions...

"How does the inspection process work?"
"What is the cost?"



SSL Certificates