Former CIA Intelligence Officer John Sipher shares his views on our Museum and Experience in New York City.
Tricky spy-themed crosswords will test your wits weekly.
Your Profile Explained
How can exploring your own spy skills at SPYSCAPE inspire you to do extraordinary things?
Tap Into Your Inner Spy with Spy Museum Tickets
Each spy has their own modus operandi. It's time to find yours. When you visit SPYSCAPE, you'll learn which spy role fits you best.
Rubik's Cube Secret Storage
Jake hacked the CIA's website - here he explains how to hack a Rubik's cube to create a secret compartment.
Fake war plans. Double bluffs. Operation Mincemeat combined espionage, social engineering, and sophisticated deception.
The Man Who Forged Ancient Artifacts
In the 1970s, Fujimura Shinichi faked the discovery of a large number of artifacts from the Japanese Paleolithic Era.
Secrets buried in the ground
How to hide items and messages in a secret container in your garden.
Covert Ballpoint Pen
Turn a ballpoint pen into a covert hiding place for secret messages.
Saddam Hussein's Fake Uranium
During the Iraq disarmament crisis, documents claimed that Saddam Hussein attempted to buy 500 tonnes of uranium powder.
Hacked Fortune Cookie
Hacking a fortune cookie with your own secret message.
Peter Gutman: Computer Scientist
Peter Gutmann is a renowned computer scientist who has authored pioneering papers on encryption and data destruction.
Patrick Gray: Security Podcast Host
We interview Patrick Gray, host of Risky Business, a security podcast all about the latest hacker news and opinions.
We rate Sicario on how accurately it represents the world of intelligence.
The Bourne Identity
We rate The Bourne Identity on how accurately it represents the world of intelligence.
The Lives of Others
We rate the the legendary The Lives of Others on how accurately it represents the world of intelligence.
Eye In The Sky
We rate Eye In The Sky on how accurately it represents the world of intelligence.
Mission: Impossible – Ghost Protocol
We rate Mission: Impossible – Ghost Protocol on how accurately it represents the world of intelligence.
How Retailers Exploit Your Data
Tracking shopping habits
Tinker Tailor Soldier Spy
We rate Tinker Tailor Soldier Spy on how accurately it represents the world of intelligence.
We rate Oliver Stone's Snowden biopic on how accurately it represents world of intelligence.
We rate 90s classic Sneakers on how accurately it represents the world of hacking.
How To Find and Use a Dead Letter Box
How spies use unsuspecting public locations to leave valuable items to be picked up by a trusted contact.
How to Tell if You’ve Been Hacked
Worried your data is included in the next big hack? Use our favorite tool to find out immediately.
How To Plan and Perform a Lightning Contact
How to sneakily exchange items with another party without being noticed.
Concealing Objects in a Hard Drive
How to convert your old computer drives into covert hiding places for physical items.
Destroying Your Files Properly
Sending your files to the “trash” doesn’t actually get rid of them. Learn how to completely dispose of unwanted data.
The Real News About Fake News: It’s Old News
Fake news is not new. It’s been going on for decades. Centuries, even.
We rate 90s classic Hackers on how accurately it represents the world of hacking.
Bridge of Spies
We rate Stephen Spielberg's Bridge of Spies on how accurately it represents world of intelligence.
Hiding Intelligence in a Food Can
Turn unwanted food cans into convenient secret storage units.
Enjoy a teaser chapter from our first ever Spy Book Club selection.
Thomas Maier: Author of "Mafia Spies"
Explore a world of lies, deceit, and mafia intrigue with the author of our first Spy Book Club selection.
Ransomware has quickly become the computer virus of choice for criminals looking for quick cash. How can we stop it?
Penetration Testing 101
Penetration testing is a method used by skilled ethical hackers to test the security measures of computer systems.
How to Manage Your Passwords
Computers are better at breaking passwords. They're also better at making them. How to secure yourself properly.
Our Glossary of Spy Terms
Discover the difference between blowback and playback, dead drop and dangle, mole and microdot.
Our Top 10 Online Safety Tips
We asked top hackers and spymasters to reveal the inside scoop on how they protect themselves online.
Our Glossary of Hacking Terms
Cut through all the jargon and get to the heart of what’s really going on in the murky world of hacking.
Holly Graceful: Penetration Tester
Holly is a skilled penetration tester who breaks into computers for a living. Find out what she does and why she loves it.