ACADEMY

Experts share their knowledge. Develop your inner spy.

READ

Your SPY Profile Explained

How can exploring your own spy skills at SPYSCAPE inspire you to do extraordinary things?

Spy glossary

Discover the difference between blowback and playback, dead drop and dangle, mole and microdot.

Hacking glossary

Cut through all the jargon and get to the heart of what’s really going on in the murky world of hacking.

Holly Graceful - Ethical hacker

Holly is a skilled penetration tester who breaks into computers for a living. Find out what she does and why she loves it.

Rubik's cube secret storage

Jake hacked the CIA's website - here he explains how to hack a Rubik's cube to create a secret compartment.

SPYSCAPE On Passwords

Computers are better at breaking passwords. They're also better at making them. How to secure yourself properly.

Penetration Testing 101

Penetration testing is a method used by skilled ethical hackers to test the security measures of computer systems.

Tap Into Your Inner Spy with Spy Museum Tickets

Each spy has their own modus operandi. It's time to find yours. When you visit SPYSCAPE, you'll learn which spy role fits you best.

Ransomware 101

Ransomware has quickly become the computer virus of choice for criminals looking for quick cash. How can we stop it?

Thomas Maier -- Author of "Mafia Spies"

Explore a world of lies, deceit, and mafia intrigue with the author of our first Spy Book Club selection.

Enjoy a teaser chapter from our first ever Spy Book Club selection.

Tinker Tailor Soldier Spy

We rate Tinker Tailor Soldier Spy on how accurately it represents the worlds of intelligence and/or hacking.

The Real News About Fake News: It’s Old News

Fake news is not new. It’s been going on for decades. Centuries, even.

Find out if your data has been compromised

Worried your data is included in the next big hack? Use our favorite tool to find out immediately.

Hackers

We rate 90s classic Hackers on how accurately it represents the worlds of intelligence and/or hacking.

Operation Mincemeat

Fake war plans. Double bluffs. Operation Mincemeat combined espionage, social engineering, and sophisticated deception.

Eye in the Sky

We rate Eye in The Sky on how accurately it represents the worlds of intelligence and/or hacking.

Destroying your files properly

Sending your files to the “trash” doesn’t actually get rid of them. Learn how to completely dispose of unwanted data.

Patrick Gray

We interview Patrick Gray, host of Risky Business, a security podcast all about the latest hacker news and opinions.

Snowden

We rate Oliver Stone's Snowden biopic on how accurately it represents worlds of intelligence and/or hacking.

The man who forged ancient artifacts

In the 1970s, Fujimura Shinichi faked the discovery of a large number of artifacts from the Japanese Paleolithic Era.

Peter Gutman - COMPUTER SCIENTIST

Peter Gutmann is a renowned computer scientist who has authored pioneering papers on encryption and data destruction.

Sneakers

We rate 90s classic Sneakers on how accurately it represents the worlds of intelligence and/or hacking.

Secrets buried in the ground

How to hide items and messages in a secret container in your garden.

The Bourne Identity

We rate The Bourne Identity on how accurately it represents the worlds of intelligence and/or hacking.

Covert ballpoint pen

Turn a ballpoint pen into a covert hiding place for secret messages.

How stores spy on you

Tracking shopping habits

Sicario

We rate Sicario on how accurately it represents the worlds of intelligence and/or hacking.

How To: Plan and Perform a Lightning Contact

How to sneakily exchange items with another party without being noticed.

Saddam Hussein's Fake Uranium

During the Iraq disarmament crisis, documents claimed that Saddam Hussein attempted to buy 500 tonnes of uranium powder.

Hacked fortune cookie

Hacking a fortune cookie with your own secret message.

Bridge of Spies

We rate Stephen Spielberg's Bridge of Spies on how accurately it represents worlds of intelligence and/or hacking.

How To: Find and Use a Dead Letter Box

How spies use unsuspecting public locations to leave valuable items to be picked up by a trusted contact.

Concealing objects in a hard drive

How to convert your old computer drives into covert hiding places for physical items.

Mission: Impossible – Ghost Protocol

We rate Mission: Impossible – Ghost Protocol on how accurately it represents the worlds of intelligence and/or hacking.

Hiding intelligence in a food can

Turn unwanted food cans into convenient secret storage units.

The Lives of Others

We rate the the legendary The Lives of Others on how accurately it represents the worlds of intelligence and/or hacking.

Top 10 Online Safety Tips

We asked top hackers and spymasters to reveal the inside scoop on how they protect themselves online.