Murray Associates – TSCM / Debugging Sweeps » Locate an Investigator
New! Locate and Investigator by County click here
Kevin D. Murray, CPP, CISM is an independent security consultant specializing in surveillance detection services (TSCM) and business counterespionage consulting.
He is the author of “Is My Cell Phone Bugged? Everything you need to know to keep your mobile communications private“, “Kevin’s Security Scrapbook – Spy news from New York“, the Android smartphone anti-spyware app “SpyWarn“, and Spycam Detection Training. Additional information available on LinkedIn.
Murray Associates is an independent security consulting firm providing electronic / optical surveillance detection and counterespionage services to business, government and at-risk individuals.
They solve security and privacy problems:
• business espionage; workplace privacy, snooping and spying issues;
• illegal eavesdropping, wiretapping, voyeurism and GPS tracking;
• information security and intellectual property loss loopholes;
• spying at off-site meetings; compliance with privacy laws; and more.
From Boardrooms to “expectation of privacy” areas (looking for spycams), their inspections reduce opportunities for competitive intelligence spying and help assure personal privacy.
Headquartered in the New York metropolitan area, a Murray Associates team can assist you quickly, anywhere in the United States, and internationally.
Client locations include:
Local: Connecticut: CT, Delaware: DE, Maine: ME, Maryland: MD, Massachusetts: MA, New Hampshire: NH, New Jersey: NJ (Sussex, Passaic, Bergen, Hudson, Essex, Union, Morris, Warren, Hunterdon, Somerset, Middlesex, Mercer, Monmouth, Ocean, Burlington, Atlantic, Camden, Gloucester, Cape May, Cumberland, Salem counties), New York: NY (Manhattan and state), Vermont: VT, District of Columbia: DC, Virginia: VA
National: Alabama: AL, Alaska: AK, Arizona: AZ, Arkansas: AR, California: CA, Colorado: CO, Florida: FL, Georgia: GA, Idaho: ID, Illinois: IL, Indiana: IN, Iowa: IA, Kansas: KS, Kentucky: KY, Louisiana: LA, Michigan: MI, Minnesota: MN, Mississippi: MS, Missouri: MO, Montana: MT, Nebraska: NE, Nevada: NV, New Mexico: NM, North Carolina: NC, Ohio: OH, Oklahoma: OK, Oregon: OR, Pennsylvania: PA, Rhode Island: RI, South Carolina: SC, South Dakota: SD, Tennessee: TN, Texas: TX, Utah: UT, Washington: WA, West Virginia: WV, Wisconsin: WI, Wyoming: WY, Puerto Rico: PR, Virgin Islands: VI
International: Bermuda: BM, Mexico: MX, Bahamas: BS, Canada: CA, United Kingdom: UK, Portugal: PT, France: FR, Netherlands: NL, Switzerland: CH, Monaco: MC, Germany: DE, Turkey: TR, Uruguay: UY, Singapore: SG, People’s Republic of China: CN
• Private Detectives
• Security Firms
• Business Consultants
• Meeting Planners
Subcontract our forensic services, or simply refer your inquiries to us.
We have a three decade track record of making our partners look like heroes to their clients. We can do the same for you. Just introduce yourself and I will explain how easy it is for us to partner on electronic surveillance detection cases.
Benefits of partnering with Murray Associates
• Fee Sharing – You retain a percentage of our fee for developing the assignment.
• Your client receives the best possible services and value.
• Zero Investment – No instrumentation, training, insurance, repairs, or payroll overhead.
P.S. We also have this helpful information available for our security colleagues. (Not available to the general public.)
“Introduction to Murray Associates“ – A booklet for your clients. Let them know we are your adjunct technical consultant, and why they are the best qualified to provide these services.
Contact us directly for any of the following white papers.
“The Security Provider’s Guide to Discussing TSCM with business, government and at-risk individuals” – Everything you need to know to intelligently discuss this aspect of security with clients. Develop new work. Never pass up a TSCM request again.
“When clients ask, ‘Is my cell phone bugged?’” – Learn how you can help them solve their problem, all by yourself, without our help.
“TSCM – When and when not to” – How to handle TSCM requests from business / government and private individuals. Each group requires a different answer.
“Off-site Meeting Security” – If you handle corporate off-site meetings, use this information security checklist early in the planning process.
“Information Security Tips for Travelers to Closed Society Countries” – A good hand-out to corporate clients who travel to China and other closed societies.
“Countering Electronic Espionage” – A short how and why for business clients to introduce them to TSCM services.