TSCM and Eavesdropping Detection Services
New York area headquarters
Services available worldwide

800-635-0811
+1-908-832-7900


Information Protection and Privacy Assurance
for Business, Government
and at-risk Individuals


Home

     •
Introduction

     • FAQs

     • Estimate Worksheet

     • Contact

About Us

     • Qualifications

     • Instrumentation

     • Subcontracting

     • Innovations

     • Staff

     • Client Reviews

     • Comparison Chart

     • Operating Policy

General Information

     • Downloads

     • Insider Tips

     • Ask questions

     • 100+ Spybuster Tips

     • One Minute TSCM Quiz

     • MoviesCartoons

     • Books

     • Eavesdropping History

Spy News from New York
Kevin's Security Scrapbook


This appears if user doesn't have JavaScript enabled, or doesn't have the required Flash Player version.




Eavesdropping Detection and Counterespionage Consulting enquiries are invited from corporate, government and professional security entities.

TSCM Eavesdropping Detection and TSCM Services US FlagFor federal procurement purposes, U.S. Government regulations classify Murray Associates Counterespionage as a Small Business, Professional Consulting Firm.

Registered Vendor:
• National Security Agency (NSA ARC)
• DoD - CCR
• Exostar SourcePass
• Jones Lang LaSalle
• ISNetworld
• Ariba

Spybusters, LLC dba
Murray Associates
PO Box 668
Oldwick, NJ 08858
(USA)




Certified Protection Professional CPP TSCM


Certified Information Security Manager - CISM TSCM


Certified Fraud Examiner CFE TSCM


International Association of Professional Security Consultants - IAPSC TSCM


American Society for Industrial Security ASIS TSCM


HTCIA logo


InfraGard Logo


Use of this site indicates acceptance of Terms of Use, Linking, and Privacy Statements.

Copyright 1996-2014, Spybusters, LLC (140209)




How is a counterespionage strategy created?


Murray Associates counterespionage strategies are based on: evaluation, remediation and vigilance.

Evaluation
Our initial visit to your location includes: an interview to learn about your organization's culture and concerns; a technical evaluation to discover illegal electronic surveillance activities and potential vulnerabilities; and a pro-active information-security evaluation.

Remediation
Your receive written reports containing cost-effective recommendations based on our observations. Implementing our recommendations makes your organization a less attractive target. (You can trust our recommendations have your best interests in mind. We do not sell security products, nor do we accept any vendor benefits for mentioning them.)

Vigilance
The business landscape is ever-changing. Periodic return visits (usually quarterly) assure new attempts at electronic surveillance are caught quickly; before harm is done. New loopholes are discovered before advantage is taken of them. Security measures in place are tested to assure continued effectiveness, and/or to document corrective actions you take.



SSL Certificates