Member Directory - Kevin Murray

null
First Name
Last Name
Certification
Street Address
City
Country
State
NJ
Consulting Experience
Kevin D. Murray, is a Technical Information Security Consultant who specializes in: workplace electronic surveillance detection and deterrence (Technical Surveillance Countermeasures / TSCM, aka debugging sweeps); information security security surveys, mobile device forensic evaluations (spyware detection and data extractions), and business counterespionage consulting services.

Murray Associates – Director
August 1978 – Present (40+ years)
Providing eavesdropping / optical detection and counterespionage consulting services to business, government and at-risk individuals. Over 4000+ successful assignments completed to date. Awarded IAPSC Meritorious Life Membership in 2015.

Pinkerton's Inc.
January 1971 – August 1978 (7 years 8 months)
• Investigator (Grade I, II & III) – Conducted corporate investigations.
• Investigations Manager (NJ) – Supervised the New Jersey Investigations department (8-14 investigators).
• Director of Electronic Countermeasures Services (global)

EDUCATION
William Paterson University of New Jersey – 1978–1981— BS, Criminal Justice. Magna Cum Laude

CERTIFICATIONS
• CISM – Certified Information Security Manager
Information Systems Audit & Control Association (ISACA)

• CPP – Certified Protection Professional
American Society for Industrial Security (ASIS)

• CFE – Certified Fraud Examiner
Association of Certified Fraud Examiners (ACFE)

• MPSC – Mobile Phone Seizure Certification
BK Forensics

INDEPENDENT COURSEWORK
• NRI Radio-Electronics Course
• 2-year apprenticeship with ex-CIA Technical Operations Director]
• Dektor Counterintelligence & Security School
• REI Technical Training School (multiple courses)
• Mobile Device: Threats and Security Challenges (ISACA)
• Wireless Security Seminar (ISACA)
• Computer Forensics for "High-Tech Crimes" (ISACA)
• Mobile Phone Seizure Certification Course (BKforensics)
• Cell Phone Forensics 101 (BKforensics)
• Mitigate Risk of Spear Phishing (Aujas Information Risk Services)
• Security Clearance Webinar (University of Fairfax)
• WLS Webinar (AirPatrol)
• XRY Cell Phone & GPS Forensics
• IAPSC (Annual Meeting seminars – 3-days, 1990-Present)
• NJLPIA – Investigator's Seminar
• Tektronix Spectrum Analysis Training
• Cell Phone Investigations - Rutgers University / Police Technical
• Apple Seminar - Mobile Device Management & Security
• AOC - Signal Analysis in Congested Environments

PROJECTS
• Author – "Is My Cell Phone Bugged? Everything you need to know to keep your mobile communications private."
Available at Amazon.com: https://amzn.to/2ZWLTQH

• Advanced Instrumentation
(https://counterespionage.com/about-murray-associates/innovations/)
Murray Associates has a long history of innovations and advancements in the field of electronic surveillance detection.

• Video Introduction to Counterespionage Services
(https://counterespionage.com/tscm-video/)
A short video introduction which answers the most often asked questions about Murray Associates eavesdropping detection and counterespionage consulting services.

• SpyWarn™
(http://www.spywarn.com)
An Android cell phone forensic examination app. Designed to be used by anyone to determine if a smartphone is infected with surveillance spyware.

• SpyWarn Anti-Spyware Kit for Smartphones™
(https://counterespionage.com/sw-html)
A unique physical security protocol to increase smartphone security & privacy.

• SPYCAM DETECTION TRAINING™
(https://counterespionage.com/sw-html))
On-line video, self-paced training for security and facilities managers to detect and deter video voyeurism in workplace Expectation of Privacy areas. The course has a two-part strategy; policy implementation, and professional detection training. The training is also beneficial for private investigators, and anyone who uses public areas where there is an expectation of privacy.

• Kevin's Security Scrapbook - Spy News from New York™
(https://spybusters.blogspot.com/)
An eclectic collection of advice, news and trends from the world of security and espionage. All posts from 2006 to the present are searchable, thus making it a valuable research tool. Also available via email; sign up at the above URL.