Former CIA Intelligence Officer John Sipher shares his views on our Museum and Experience in New York City.
Tricky spy-themed crosswords will test your wits weekly.
Your SPY role Explained
How can exploring your own spy skills at SPYSCAPE inspire you to do extraordinary things?
Discover the difference between blowback and playback, dead drop and dangle, mole and microdot.
Cut through all the jargon and get to the heart of what’s really going on in the murky world of hacking.
Holly Graceful - Ethical hacker
Holly is a skilled penetration tester who breaks into computers for a living. Find out what she does and why she loves it.
Rubik's cube secret storage
Jake hacked the CIA's website - here he explains how to hack a Rubik's cube to create a secret compartment.
SPYSCAPE On Passwords
Computers are better at breaking passwords. They're also better at making them. How to secure yourself properly.
Penetration Testing 101
Penetration testing is a method used by skilled ethical hackers to test the security measures of computer systems.
Tap Into Your Inner Spy with Spy Museum Tickets
Each spy has their own modus operandi. It's time to find yours. When you visit SPYSCAPE, you'll learn which spy role fits you best.
Ransomware has quickly become the computer virus of choice for criminals looking for quick cash. How can we stop it?
Thomas Maier -- Author of "Mafia Spies"
Explore a world of lies, deceit, and mafia intrigue with the author of our first Spy Book Club selection.
Enjoy a teaser chapter from our first ever Spy Book Club selection.
Tinker Tailor Soldier Spy
We rate Tinker Tailor Soldier Spy on how accurately it represents the worlds of intelligence and/or hacking.
The Real News About Fake News: It’s Old News
Fake news is not new. It’s been going on for decades. Centuries, even.
Find out if your data has been compromised
Worried your data is included in the next big hack? Use our favorite tool to find out immediately.
We rate 90s classic Hackers on how accurately it represents the worlds of intelligence and/or hacking.
Fake war plans. Double bluffs. Operation Mincemeat combined espionage, social engineering, and sophisticated deception.
Eye in the Sky
We rate Eye in The Sky on how accurately it represents the worlds of intelligence and/or hacking.
Destroying your files properly
Sending your files to the “trash” doesn’t actually get rid of them. Learn how to completely dispose of unwanted data.
We interview Patrick Gray, host of Risky Business, a security podcast all about the latest hacker news and opinions.
We rate Oliver Stone's Snowden biopic on how accurately it represents worlds of intelligence and/or hacking.
The man who forged ancient artifacts
In the 1970s, Fujimura Shinichi faked the discovery of a large number of artifacts from the Japanese Paleolithic Era.
Peter Gutman - COMPUTER SCIENTIST
Peter Gutmann is a renowned computer scientist who has authored pioneering papers on encryption and data destruction.
We rate 90s classic Sneakers on how accurately it represents the worlds of intelligence and/or hacking.
Secrets buried in the ground
How to hide items and messages in a secret container in your garden.
The Bourne Identity
We rate The Bourne Identity on how accurately it represents the worlds of intelligence and/or hacking.
Covert ballpoint pen
Turn a ballpoint pen into a covert hiding place for secret messages.
How stores spy on you
Tracking shopping habits
We rate Sicario on how accurately it represents the worlds of intelligence and/or hacking.
How To: Plan and Perform a Lightning Contact
How to sneakily exchange items with another party without being noticed.
Saddam Hussein's Fake Uranium
During the Iraq disarmament crisis, documents claimed that Saddam Hussein attempted to buy 500 tonnes of uranium powder.
Hacked fortune cookie
Hacking a fortune cookie with your own secret message.
Bridge of Spies
We rate Stephen Spielberg's Bridge of Spies on how accurately it represents worlds of intelligence and/or hacking.
How To: Find and Use a Dead Letter Box
How spies use unsuspecting public locations to leave valuable items to be picked up by a trusted contact.
Concealing objects in a hard drive
How to convert your old computer drives into covert hiding places for physical items.
Mission: Impossible – Ghost Protocol
We rate Mission: Impossible – Ghost Protocol on how accurately it represents the worlds of intelligence and/or hacking.
Hiding intelligence in a food can
Turn unwanted food cans into convenient secret storage units.
The Lives of Others
We rate the the legendary The Lives of Others on how accurately it represents the worlds of intelligence and/or hacking.
Top 10 Online Safety Tips
We asked top hackers and spymasters to reveal the inside scoop on how they protect themselves online.