Video Icon

This TSCM video page will answer many of your questions about security, counterespionage measures and the different techniques and equipment involved in the worlds of espionage and counterespionage. We hope you find them informative. If you still have questions after viewing them, feel free to contact us.

Introduction to Murray Associates

Who we are. What we do. How we can help you.
(4:17 – TSCM video 1)

This American Life — “Spies Like Us”

An audio only interview with Kevin D. Murray about the professional TSCM inspections he conducts for business and government begins at 6:05.
Courtesy – PRI – Public Radio International (14:22)


Hotel / Conference Center Eavesdropping

Audio visual equipment supplied by hotel / conference centers often leave meetings vulnerable to eavesdroppers.
(1:59 – TSCM video 2)

USB Voice Recorder in the Boardroom

Bugging a boardroom is simple and it can be implemented in a matter of seconds. See how easily your privacy can compromised.
(1:59 – TSCM video 3)

How They Get in to Plant Bugs

There are many ways someone can enter your offices to plant bugs and other electronic surveillance devices. This is just one example. Alerting our clients to these vulnerabilities is just part of our counterespionage service.
(0:56 – TSCM video 4)

Bug in the Office

Bugging an office or a boardroom, there’s not much difference. See how easily your office could be bugged and your intellectual property put at risk.
(1:36 – TSCM video 5)

“Who is that man?”

An employee coming to work?
A vendor attending a proposal meeting?
Is he here to repair something?

To most people those questions don’t even come to mind. If he can produce credentials that seem appropriate for a legitimate visit – repair the copier, install a new phone, or delivering your new chair – he will never raise any suspicion.

Unfortunately, this now legitimate visitor, who is probably very nice too, will plant three electronic eavesdropping devices, in strategic areas, before he leaves. It will only take him seconds. You will never see it happen. You will never know – until it’s too late.

This is only one industrial espionage spy trick. There are hundreds more.

That’s why, savvy corporations, government agencies and organizations conduct periodic Technical Surveillance Countermeasures (TSCM) bug sweeps. Today’s electronic “bugs” are increasingly smaller and easier to drop into innocuous spaces to gather information – your sensitive information.

TSCM is used by hundreds of organizations to clear their sensitive areas of bugging, wiretapping and devices used to attack computers and networks . Your company should use TSCM too. At Murray Associates, electronic eavesdropping detection is our specialty. (TSCM video 6)


Discovery Channel – Daily Planet

If you ever wanted to look over the shoulder of a bug sweep team in action, this is your chance! The Daily Planet interviewed the Murray Associates technicians while they conducted an electronic eavesdropping detection audit. The video clip shows them conducting spectrum analysis, nonlinear junction detection, infrared detection, a Wi-Fi security and compliance audit and more.
(5:27 – TSCM video 7 – transcript below)

TSCM Video 7 – Discovery Channel – Daily Planet – Interview

Male host – But first. Speaking of technology, as we seem to be all the time, it seems getting to be harder and harder to keep electronic file safe. In fact the world of corporate secrets, protecting files is Big Business.

Female host – That’s right. Corporate espionage is alive and well, which is why there are companies coming out with some highly sophisticated technologies to help sniff out a spy. We hooked up with one to see what they can do.


Male host – An important meeting is about to take place in this New York hotel. But before it happens Kevin Murray’s team is going to shake down this room. It’s his job to make sure company secrets stay that way.

Kevin – You never know who you’re going to run into. Could be anybody from foreign government right on down to the secretary just wants to know what the boss is up to.

Male host – Kevin Murray is an expert in eavesdropping.

Kevin – The telephone is the most dangerous instrument in the office. Of course you can wire tap it. Everybody knows that. But they don’t realize is that the telephone itself as a couple of microphones in it and a couple speakers in it which can also be used as microphones. It also has plenty of open space inside, and it has power coming to it all the time. And, if that weren’t bad enough, it’s right on the desk in front of the person you want to listen to

Male host – Kevin’s been doing this for more than 30 years and he’s got some pretty sophisticated equipment that lets him see into unusual places.

Kevin – …and ceiling in this room probably about 12 to 15 feet up. So, we’re going to take our little eyeball… and just push up the ceiling tile. And, now we can poke around and see what’s going on upstairs.

Male host – Some things aren’t visible to the human eye which is why they have this.

Andrew – So, this is a thermal imaging camera, which we use to look for sources of heat in the room. Basically, anything that’s electronic, that has current running through it heats up, like your television at home.

Male host – It is super-sensitive to heat.

Kevin – Here is an example of just how little heat this camera sees. I’m going to take a look at my fingertip and the heat coming from off of that.
(music while drawing on the wall)
That’s amazing, it really is amazing. But, that’s worst case scenario. A bug would look a little bit more like this. (shows heat hand print on the wall)

Male host – So far, they haven’t found anything in the ceiling or the walls. Time to sweep the rest of the boardroom.

Kevin – Our next test involves an instrument called a Nonlinear Junction Detector. It’s one of the basic tests in electronic countermeasures. Very simply what it does is it sends out a radio signal. When the signal hits something like a transistor, or a diode, also called a nonlinear junction, it reflects back to us at twice the frequency.

Bill – Initially, when we come into a room object I try to tag every object in the room. And, as I sweep it over, I could actually go quite quickly, to accommodate the size of the room, but I do it carefully enough so every indication I get I can analyze and see what it’s giving me. As a case in point here, I’m getting an incredibly high reading for a nonlinear junction, so that forces me to go and resolve what that anomaly is. In this case, it’s our test strip, that we ultilize, literally, for testing.

Male host – Even if Kevin can’t find a bug he can tell if information is going to the wrong person. This state-of-the-art equipment tracks hidden radio signals.

Kevin – Our next instrument is a spectrum analyzer. This is a very special instrument. The thing that’s special about this is it allows us to see signals behind the signals. FM transmitters, like your FM broadcast FM radio stations, they transmit all the time, very strong signals, they make an ideal location for hiding your other signal. Normally you can’t see that. That’s very very difficult to discover. This is one of the few instruments that does that.

Male host – No bugs here but there are other ways to spy on a company.

Kevin – All it takes takes is somebody with a setup like this to be out in the parking lot, and hook onto one of the computers on the inside, and go all the way into the mainframe, if the security settings aren’t correct.

Male host – This machine looks unusual Wi-Fi transmissions.

Kevin – As we look as these transmissions, we can tell what they are associated with, wether it be a laptop or a handheld portable device like a tablet or telephone.

Male host – Although they have scanned the room completely and find no signs of espionage the job does not end here.

Kevin – The sweep of the room went well. We didn’t find any electronic eavesdropping devices, but this is a pre-meeting inspection. Normally it doesn’t end at this point. The meeting usually commences right after we’re finished and we go to another location and set up the radio receivers, and continue monitoring for things that might be brought into the room at the last minute, by somebody on the staff, or maybe by one of the meeting participants themselves.

Male host – By listening in, Kevin has found a way to keep company secrets.

HBO Logo  

HBO  – “K Street” – The TSCM Inspection

Kevin D. Murray of Murray Associates conducts an eavesdropping detection audit and provides a debriefing for James Carville and Mary Matalin.
(Executive Producers: George Clooney and Steven Soderbergh, 4:14 – TSCM video 8)

As the show opens, the offices of Bergstrom Lowell are being searched for listening devices.

James Carville and Mary Matalin talk to Kevin D. Murray, a consultant, about increasing their “perimeter security.” He points out that none of the offices have locks on the doors, and suggests shredding their garbage and installing a noise masking system to thwart eavesdroppers. When Matalin wonders if they’re just being paranoid, Murray tells them to trust their instincts if they feel something is wrong.

Apparently, all these precautions are in response to suspicions about the real-life leak to columnist Robert Novak of the name of a CIA operative.

TSCM Video 9 - CNBC Logo

Crime Inc. – Secrets for Sale

Discussion of business espionage, corporate-level debugging (TSCM) and the electronic countermeasures instrumentation involved. Especially important is the FBI’s warning. On cnbc.com (TSCM video 9)

TSCM Video 10 - Discovery Times Logo

“Someone’s Watching”

The New York Times / Discovery Channel documentary with Murray Associates explaining Advanced Eavesdropping Detection and TSCM instrumentation.
(2:42 – TSCM video 10)

TSCM Video 11 - Fox News Logo

212 – On Assignment – The TSCM Sweep

Fox news follows Murray Associates on an assignment.
(5:43 – TSCM video 11)

Have a Question About TSCM?

If you have any questions about the TSCM services provided by Murray Associates, simply fill out the form below, or call us from a safe area and phone.

If you think you are under active electronic surveillance, or believe you have discovered a bug or covert video camera, go to our Emergency TSCM page. The procedural checklist there will tell you exactly what you need to do next.