Kevin D. Murray

Technical Surveillance Countermeasures Specialist

Kevin D. Murray, is the Director of Murray Associates, an independent security consulting firm (they don't sell the security products they recommend), founded in 1978. He and his team conduct Technical Information Security Surveys, also called Technical Surveillance Countermeasures (TSCM, or bug sweeps) for businesses, governments and at-risk individuals. His work is exclusively TSCM oriented, and has taken him to many countries around the world.

Murray Associates inspections solve workplace security problems, such as:

• business espionage;

• illegal eavesdropping, voyeurism and tracking;

• information security / intellectual property loss loopholes;

• spying at off-site meetings, and compliance with privacy laws.



Pinkerton's Inc.

• International – Director of Electronic Countermeasures

• New Jersey – Director of Investigations

• Investigator – Grades I, II & III



Book - "Is My Cell Phone Bugged? Everything you need to know to keep your mobile communications secure." ISBN-13: 9781934572887

iPhone App - Kevin's Security Scrapbook - Spy News from New York

Android App - SpyWarn™ 2.0 - Evaluate your smartphone for spyware infections.

SpyWarn™ Anti-Spyware Kit for Smartphones (patent pending) (for clients only)



Mr. Murray holds the following professional certifications:

CISM - Certified Information Security Manager — Information Systems Audit & Control Association (ISACA)

CPP - Certified Protection Professional — American Society for Industrial Security (ASIS) The American National Standards Institute (ANSI) has accredited the CISM and CPP certification programs under ISO/IEC 17024:2003

CFE - Certified Fraud Examiner — Association of Certified Fraud Examiners (ACFE)

MPSC - Mobile Phone Seizure Certification — BK Forensics

Licensed Private Investigator - NJ

Amateur Radio Operator - Extra Class



Mr. Murray is involved with these security industry organizations:

IAPSC - International Association of Professional Security Consultants Periodic Board & Ethics Committee member. Meritorious Life Membership

HTCIA - High Technology Crime Investigation Association

ISACA - Information Systems Audit & Control Association (CISM)

ASIS - American Society for Industrial Security (CPP)

ACFE - Association of Certified Fraud Examiners (CFE)

InfraGard (An FBI partnership with private sector security professionals.)

ERII - Espionage Research Institute International



• John Jay College of Criminal Justice, New York, NY, Course author & instructor: Electronic Eavesdropping & Business Espionage Countermeasures

• ASIS - Chapter Meetings - multiple presentations

• National Association of Legal Investigators - TSCM seminar

• New Jersey Licensed Private Investigator's Association - multiple presentations

• Espionage Research Institute, Washington, DC – Thermal Emissions Spectrum Analysis for TSCM and multiple other presentations

• FBI / InfraGard - Three TSCM Seminars

• United Nations - New York Landmark's Security Task Force - TSCM seminar

• World Investigator Conference - TSCM seminar

• Joint Certified Fraud Examiners / ASIS - TSCM & Cell Phone Espionage seminar



Kevin D. Murray is the author of textbook chapters, magazine articles, and his own book.

Murray, Kevin D. Is My Cell Phone Bugged? Everything you need to know to keep your mobile communications private. Austin, TX: Emerald Book Company, 2011 (ISBN: 978-1-934572-88-7)

Murray, Kevin D. Business Spies . . . and the Top 10 Spybusting Tips They Don't Want You to Know! Oldwick, NJ: Spybusters, LLC, 2010. (ISBN B003VYCDRK)

Murray, Kevin D. Electronic Eavesdropping & Industrial Espionage: The Missing Business School Courses. Oldwick, NJ: Spybusters, LLC, 1992–2010.

Arrington, Winston. Now Hear This! Electronic Eavesdropping Equipment Designs. Chicago, IL: Sheffield Electronics Co., 1997. Electronic Countermeasures sections. (ISBN B0012K8WKW)

Bottom, N. R., and R. R. J. Gallati. Industrial Espionage: Intelligence Techniques & Countermeasures. Boston: Butterworth-Heinemann Ltd., 1984. Electronic Counterintelligence section. (ISBN 0409951080)

Guindon, Kathleen M. A.M. Best's Safety & Security Directory. Oldwick, NJ: A.M. Best & Co., 2001. Chapter 15, “Spy vs. Spy: Everything You Need To Know About Corporate Counterespionage." (LoC Catalog Card Number 74-618599, ISBN B000VU9PI2)

Johnson, William M. 101 Questions & Answers About Business Espionage. N.p., Shoreline, Washington: The Questor Group, 2003. Questions and Answers section. (ISBN 1591096227)

Krieger, Gary R. Accident Prevention Manual: Security Management. N.p., Itasca, Illinois: National Safety Council, 1997. Chapter 20, “Communications Security." (ISBN 087912198X)

Lee, Edward L. II. Staying Safe Abroad: Traveling, Working & Living in a Post-9/11 World. Williamsburg, MI: Sleeping Bear Risk Solutions LLC, 2008. Eavesdropping Detection section. (ISBN 0981560504)

Mars-Proietti, Laura. The Grey House Safety & Security Directory. Amenia, NY: Grey House Publishing, 2004. Chapter 16, “Eavesdropping Detection." (ISBN 1592370675)

Montgomery, Reginald J., and William J. Majeski, eds. Corporate Investigation - First and Second Editions. Tucson, AZ: Lawyers & Judges Publishing, 2001 & 2005. Chapter 5, Electronic Eavesdropping & Corporate Counterespionage. (ISBN 0913875635)

Reid, Robert N. Facility Manager's Guide To Security: Protecting Your Assets. Lilburn, GA: Fairmont Press, 2005. Chapter 12. (ISBN 0881734799)

Rothfeder, Jeffrey. Privacy for Sale: How Computerization Has Made Everyone's Private Life an Open Secret. New York: Simon & Schuster, 1992. Chapter 9, “Shadow of Technology." (ISBN 067173492X)

Schnabolk, Charles. Physical Security: Practices & Technology. Boston: Butterworth-Heinemann, 1983. Eavesdropping & Countermeasures chapter. (ISBN 040995067X)

Security Management magazine articles. The journal of the American Society for Industrial Security.

Sennewald, Charles A. CPP. Security Consulting - Third & Fourth Editions. Boston: Butterworth-Heinemann, 2004. Chapter 15, “A Successful Security Consulting Business Stands on a Tripod." (ISBN 0750677945)

Shannon, M. L. The Phone Book: The Latest High-Tech Techniques and Equipment for Preventing Electronic Eavesdropping, Recording Phone Calls, Ending Harassing Calls, and Stopping Toll Fraud. Boulder, CO: Paladin Press, 1998. Sidebars and illustrations. (ISBN 0873649729)

Shannon, M. L. The Bug Book: Wireless Microphones & Surveillance Transmitters. Boulder, CO: Paladin Press, 2000. (ISBN 1581600658)

Swift, Theodore N. Wiretap Detection Techniques: A Guide To Checking Telephone Lines For Wiretaps. Austin, TX: Thomas Investigative Publications, Inc., 2005. (ISBN 0918487056)

Walsh, Timothy J., and Richard J. Healy. The Protection of Assets Manual. Aberdeen, WA: Silver Lake, 1987. Section 15, “Electronic Eavesdropping Detection." (ISBN 0930868048)

Periodicals: The Legal Investigator, PI Journal (cover story), Full Disclosure, World Association of Detectives News... and many more.

Technical Advisor to:

HBO, George Clooney, Steven Soderbergh, NYT/Discovery Channel, Discovery Channel, ABC News 20/20, FOX News, CNN, CBS News, NBC Dateline, Orion Pictures, New York Times best selling author, Joe Finder... and others.

  • Students
  • Courses
  • Reviews