TSCM and Eavesdropping Detection Services
New York area headquarters
Services available worldwide


Information Protection and Privacy Assurance
for Business, Government
and at-risk Individuals



     • FAQs

     • Estimate Worksheet

     • Contact

About Us

     • Qualifications

     • Instrumentation

     • Subcontracting

     • Innovations

     • Staff

     • Client Reviews

     • Comparison Chart

     • Operating Policy

General Information

     • Downloads

     • Insider Tips

     • Ask questions

     • 100+ Spybuster Tips

     • One Minute TSCM Quiz

     • MoviesCartoons

     • Books

     • Eavesdropping History

Spy News from New York
Kevin's Security Scrapbook

This appears if user doesn't have JavaScript enabled, or doesn't have the required Flash Player version.

Eavesdropping Detection and Counterespionage Consulting enquiries are invited from corporate, government and professional security entities.

TSCM Eavesdropping Detection and TSCM Services US FlagFor federal procurement purposes, U.S. Government regulations classify Murray Associates Counterespionage as a Small Business, Professional Consulting Firm.

Registered Vendor:
• National Security Agency (NSA ARC)
• DoD - CCR
• Exostar SourcePass
• Jones Lang LaSalle
• ISNetworld
• Ariba

Spybusters, LLC dba
Murray Associates
PO Box 668
Oldwick, NJ 08858

Certified Protection Professional CPP TSCM

Certified Information Security Manager - CISM TSCM

Certified Fraud Examiner CFE TSCM

International Association of Professional Security Consultants - IAPSC TSCM

American Society for Industrial Security ASIS TSCM

HTCIA logo

InfraGard Logo

Use of this site indicates acceptance of Terms of Use, Linking, and Privacy Statements.

Copyright 1996-2014, Spybusters, LLC (140209)

(Almost) All You Need to Know About...
Communications Privacy

Encryption and scrambling are security techniques which make your electronic communications unintelligible to the uninvited. Several levels of protection are offered. With the exception of low-level speech inversion, most levels are acceptable for business purposes. Encryption is available for telephones, facsimile machines, computers, and video transmissions.

Another protection technique - the fax mailbox - stores incoming transmissions in a password-protected memory. Faxes don't print out until you enter a secret code. Great for faxes received at night or on weekends.

Is encryption absolute protection?

No. Encrypted transmissions can be decoded given enough time, effort and desire. Be sure the product you purchase matches your needs.

"What else I should know?"

Purchase privacy products which protect information just long enough. This may mean years to someone transmitting company formulae, weeks for merger discussions, or minutes when making a stock trade.

All levels of protection are offered, and are priced accordingly.

The product is usually needed at each end of the communications link.

Not all privacy products are compatible with one another. Check.

Communications privacy products will not protect you against room eavesdropping devices, or devices built into the phones, fax machines or computers being used. Inspections for eavesdropping devices must still be conducted.

Other espionage methods still exist. Do not be lulled into a false sense of security. These products are only a powerful supplement to your regular eavesdropping audits and other security measures

Encryption Products Search:


Hint: Prevent costly mistakes by hiring an independent technical security consultant before investing in encryption equipment.


Limited permission to reprint and distribute this briefing is available.

SSL Certificates