Experts share their knowledge. Develop your inner spy.


ARTICLES
Sharpen your skills with insider intel from top hackers & spies

INTEL

Your Profile Explained

How can exploring your own spy skills at SPYSCAPE inspire you to do extraordinary things?

Operation Mincemeat

Fake war plans. Double bluffs. Operation Mincemeat combined espionage, social engineering, and sophisticated deception.

The Man Who Forged Ancient Artifacts

In the 1970s, Fujimura Shinichi faked the discovery of a large number of artifacts from the Japanese Paleolithic Era.

Secrets buried in the ground

How to hide items and messages in a secret container in your garden.

Covert Ballpoint Pen

Turn a ballpoint pen into a covert hiding place for secret messages.

Saddam Hussein's Fake Uranium

During the Iraq disarmament crisis, documents claimed that Saddam Hussein attempted to buy 500 tonnes of uranium powder.

Hacked Fortune Cookie

Hacking a fortune cookie with your own secret message.

Peter Gutman: Computer Scientist

Peter Gutmann is a renowned computer scientist who has authored pioneering papers on encryption and data destruction.

Patrick Gray: Security Podcast Host

We interview Patrick Gray, host of Risky Business, a security podcast all about the latest hacker news and opinions.

Sicario

We rate Sicario on how accurately it represents the world of intelligence.

The Bourne Identity

We rate The Bourne Identity on how accurately it represents the world of intelligence.

The Lives of Others

We rate the the legendary The Lives of Others on how accurately it represents the world of intelligence.

Eye In The Sky

We rate Eye In The Sky on how accurately it represents the world of intelligence.

Mission: Impossible – Ghost Protocol

We rate Mission: Impossible – Ghost Protocol on how accurately it represents the world of intelligence.

How Retailers Exploit Your Data

Tracking shopping habits

Tinker Tailor Soldier Spy

We rate Tinker Tailor Soldier Spy on how accurately it represents the world of intelligence.

Snowden

We rate Oliver Stone's Snowden biopic on how accurately it represents world of intelligence.

Sneakers

We rate 90s classic Sneakers on how accurately it represents the world of hacking.

How to Tell if You’ve Been Hacked

Worried your data is included in the next big hack? Use our favorite tool to find out immediately.

How To Plan and Perform a Lightning Contact

How to sneakily exchange items with another party without being noticed.

Concealing Objects in a Hard Drive

How to convert your old computer drives into covert hiding places for physical items.

Destroying Your Files Properly

Sending your files to the “trash” doesn’t actually get rid of them. Learn how to completely dispose of unwanted data.

The Real News About Fake News: It’s Old News

Fake news is not new. It’s been going on for decades. Centuries, even.

Hackers

We rate 90s classic Hackers on how accurately it represents the world of hacking.

Bridge of Spies

We rate Stephen Spielberg's Bridge of Spies on how accurately it represents world of intelligence.

Hiding Intelligence in a Food Can

Turn unwanted food cans into convenient secret storage units.

Enjoy a teaser chapter from our first ever Spy Book Club selection.

Thomas Maier: Author of "Mafia Spies"

Explore a world of lies, deceit, and mafia intrigue with the author of our first Spy Book Club selection.

Ransomware 101

Ransomware has quickly become the computer virus of choice for criminals looking for quick cash. How can we stop it?

Penetration Testing 101

Penetration testing is a method used by skilled ethical hackers to test the security measures of computer systems.

How to Manage Your Passwords

Computers are better at breaking passwords. They're also better at making them. How to secure yourself properly.

Our Glossary of Spy Terms

Discover the difference between blowback and playback, dead drop and dangle, mole and microdot.

Our Top 10 Online Safety Tips

We asked top hackers and spymasters to reveal the inside scoop on how they protect themselves online.

Our Glossary of Hacking Terms

Cut through all the jargon and get to the heart of what’s really going on in the murky world of hacking.

Holly Graceful: Penetration Tester

Holly is a skilled penetration tester who breaks into computers for a living. Find out what she does and why she loves it.

Rubik's Cube Secret Storage

Jake hacked the CIA's website - here he explains how to hack a Rubik's cube to create a secret compartment.

How To Find and Use a Dead Letter Box

How spies use unsuspecting public locations to leave valuable items to be picked up by a trusted contact.

A bridge too far for Tom Cruise and MI:7?

Building sets is an expensive business, so the production team on Mission: Impossible 7 has set its sights on something a bit easier to work with

The TENET Conundrum

Explore the secrets and ancient puzzles behind the title of Christopher Nolan's blockbuster film, "TENET"

Sean Connery - the best 007?

He may have lost out on the 1950 Mr Universe title, but Sean Connery tops the polls for the best ever silver screen Bond

Live in M's Bombproof Secret Lair!

If you've ever dreamt of living in your own Spy HQ, the perfect home has just come on the market - provided you have a cool £5.5million to spare

The Ultimate Secret Panic Room

If you’re into serious social distancing, we have the perfect destination...

The Secret History of Hiroshima's Uranium

On 6 August 1945, bells tolled across Hiroshima to mark 75 years since the atomic bomb ripped apart their city and the world changed forever. 

The CIA’s ‘Secret’ Art Collection

For decades, it has been rumoured that the CIA’s art collection has hidden meaning

Your mission, should you choose to accept it…

Back in 2001, a young engineer at Apple received a mysterious brief to help the US Department of Energy develop a secret iPod

Blue Plaque for ‘A Call to Spy’ hero

If you were to walk around central London, one thing you would almost certainly spot is a blue circular plaque on buildings (some impressive, some humble)