Experts share their knowledge. Develop your inner spy.


ARTICLES
Sharpen your skills with insider intel from top hackers & spies

INTEL

Your Profile Explained

How can exploring your own spy skills at SPYSCAPE inspire you to do extraordinary things?

Operation Mincemeat

Fake war plans. Double bluffs. Operation Mincemeat combined espionage, social engineering, and sophisticated deception.

The Man Who Forged Ancient Artifacts

In the 1970s, Fujimura Shinichi faked the discovery of a large number of artifacts from the Japanese Paleolithic Era.

Secrets buried in the ground

How to hide items and messages in a secret container in your garden.

Covert Ballpoint Pen

Turn a ballpoint pen into a covert hiding place for secret messages.

Saddam Hussein's Fake Uranium

During the Iraq disarmament crisis, documents claimed that Saddam Hussein attempted to buy 500 tonnes of uranium powder.

Hacked Fortune Cookie

Hacking a fortune cookie with your own secret message.

Peter Gutman: Computer Scientist

Peter Gutmann is a renowned computer scientist who has authored pioneering papers on encryption and data destruction.

Patrick Gray: Security Podcast Host

We interview Patrick Gray, host of Risky Business, a security podcast all about the latest hacker news and opinions.

Sicario

We rate Sicario on how accurately it represents the world of intelligence.

The Bourne Identity

We rate The Bourne Identity on how accurately it represents the world of intelligence.

The Lives of Others

We rate the the legendary The Lives of Others on how accurately it represents the world of intelligence.

Eye In The Sky

We rate Eye In The Sky on how accurately it represents the world of intelligence.

Mission: Impossible – Ghost Protocol

We rate Mission: Impossible – Ghost Protocol on how accurately it represents the world of intelligence.

How Retailers Exploit Your Data

Tracking shopping habits

Tinker Tailor Soldier Spy

We rate Tinker Tailor Soldier Spy on how accurately it represents the world of intelligence.

Snowden

We rate Oliver Stone's Snowden biopic on how accurately it represents world of intelligence.

Sneakers

We rate 90s classic Sneakers on how accurately it represents the world of hacking.

How to Tell if You’ve Been Hacked

Worried your data is included in the next big hack? Use our favorite tool to find out immediately.

How To Plan and Perform a Lightning Contact

How to sneakily exchange items with another party without being noticed.

Concealing Objects in a Hard Drive

How to convert your old computer drives into covert hiding places for physical items.

Destroying Your Files Properly

Sending your files to the “trash” doesn’t actually get rid of them. Learn how to completely dispose of unwanted data.

The Real News About Fake News: It’s Old News

Fake news is not new. It’s been going on for decades. Centuries, even.

Hackers

We rate 90s classic Hackers on how accurately it represents the world of hacking.

Bridge of Spies

We rate Stephen Spielberg's Bridge of Spies on how accurately it represents world of intelligence.

Hiding Intelligence in a Food Can

Turn unwanted food cans into convenient secret storage units.

Enjoy a teaser chapter from our first ever Spy Book Club selection.

Thomas Maier: Author of "Mafia Spies"

Explore a world of lies, deceit, and mafia intrigue with the author of our first Spy Book Club selection.

Ransomware 101

Ransomware has quickly become the computer virus of choice for criminals looking for quick cash. How can we stop it?

Penetration Testing 101

Penetration testing is a method used by skilled ethical hackers to test the security measures of computer systems.

How to Manage Your Passwords

Computers are better at breaking passwords. They're also better at making them. How to secure yourself properly.

Our Glossary of Spy Terms

Discover the difference between blowback and playback, dead drop and dangle, mole and microdot.

Our Top 10 Online Safety Tips

We asked top hackers and spymasters to reveal the inside scoop on how they protect themselves online.

Our Glossary of Hacking Terms

Cut through all the jargon and get to the heart of what’s really going on in the murky world of hacking.

Holly Graceful: Penetration Tester

Holly is a skilled penetration tester who breaks into computers for a living. Find out what she does and why she loves it.

Rubik's Cube Secret Storage

Jake hacked the CIA's website - here he explains how to hack a Rubik's cube to create a secret compartment.

How To Find and Use a Dead Letter Box

How spies use unsuspecting public locations to leave valuable items to be picked up by a trusted contact.