TSCM and Eavesdropping Detection Services
New York area headquarters
Services available worldwide


Information Protection and Privacy Assurance
for Business, Government
and at-risk Individuals



     • FAQs

     • Estimate Worksheet

     • Contact

About Us

     • Qualifications

     • Instrumentation

     • Subcontracting

     • Innovations

     • Staff

     • Client Reviews

     • Comparison Chart

     • Operating Policy

General Information

     • Downloads

     • Insider Tips

     • Ask questions

     • 100+ Spybuster Tips

     • One Minute TSCM Quiz

     • MoviesCartoons

     • Books

     • Eavesdropping History

Spy News from New York
Kevin's Security Scrapbook

This appears if user doesn't have JavaScript enabled, or doesn't have the required Flash Player version.

Eavesdropping Detection and Counterespionage Consulting enquiries are invited from corporate, government and professional security entities.

TSCM Eavesdropping Detection and TSCM Services US FlagFor federal procurement purposes, U.S. Government regulations classify Murray Associates Counterespionage as a Small Business, Professional Consulting Firm.

Registered Vendor:
• National Security Agency (NSA ARC)
• DoD - CCR
• Exostar SourcePass
• Jones Lang LaSalle
• ISNetworld
• Ariba

Spybusters, LLC dba
Murray Associates
PO Box 668
Oldwick, NJ 08858

Certified Protection Professional CPP TSCM

Certified Information Security Manager - CISM TSCM

Certified Fraud Examiner CFE TSCM

International Association of Professional Security Consultants - IAPSC TSCM

American Society for Industrial Security ASIS TSCM

HTCIA logo

InfraGard Logo

Use of this site indicates acceptance of Terms of Use, Linking, and Privacy Statements.

Copyright 1996-2014, Spybusters, LLC (140209)

Do other companies sweep for bugs?

Yes, and for some chilling reasons too.

A majority of our clients integrate electronic eavesdropping detection audits into their overall security program. They do this for three interesting reasons...

1. Information theft is considered acceptable in other parts of the world, and is becoming "acceptable" here as well.

2. Eavesdropping technology is now inexpensive. Micro video spy cameras which transmit picture and sound wirelessly, and can fit on your thumb, cost less than $100. !!! (See for yourself.)

3. Many of our communications technologies contain features which allow any user to eavesdrop. Examples... hands-free intercom, auto-answer, barge-in / executive override, microphone mute buttons, silent ringers, cell phone spyware etc.

4. Instituting a "sweep" schedule is often done at the behest of General Counsels. They are concerned that not addressing this portion of the information security issue would be viewed as negligence by stockholders.

These days, it is rare to find a company which does not have some type of program for defense against electronic spying. This trend is reflected in business journal feature stories, and news reports, about increased spying. We post many of these stories in Kevin's Security Scrapbook.

Interestingly, quite a few of the eavesdropping problems we solve involve employees spying on their employers.

SSL Certificates