Skip to content

Espionage Stock Photos & Royalty-Free Images

All the stock photos you need and more from our global creative community.

Price is in US dollars and excludes tax and handling fees

1,009 stock photos

Clear all
Find a business spy on staff. Industrial espionage. Data theft, corporate intelligence

Find a business spy on staff. Industrial espionage. Data theft, corporate intelligence

by iLixe48
$5
Drone unmanned autonomous technology of espionage and strikes. Drones as the basis of defense

Drone unmanned autonomous technology of espionage and strikes. Drones as the basis of defense

$5
Drone unmanned autonomous technology of espionage and strikes. Drones as the basis of defense

Drone unmanned autonomous technology of espionage and strikes. Drones as the basis of defense

$5
Drone unmanned autonomous technology of espionage and strikes. Drones as the basis of defense

Drone unmanned autonomous technology of espionage and strikes. Drones as the basis of defense

$5
Ex KGB Russian espionage division spy using reconnaissance software

Ex KGB Russian espionage division spy using reconnaissance software

$10
Drone unmanned autonomous technology of espionage and strikes. Drones as the basis of defense

Drone unmanned autonomous technology of espionage and strikes. Drones as the basis of defense

$5
Japanese drone unmanned autonomous technology of espionage and strikes. Japan defense

Japanese drone unmanned autonomous technology of espionage and strikes. Japan defense

$5
Drone unmanned autonomous technology of espionage and strikes. Drones as the basis of defense

Drone unmanned autonomous technology of espionage and strikes. Drones as the basis of defense

$5
Japanese drone unmanned autonomous technology of espionage and strikes. Japan defense

Japanese drone unmanned autonomous technology of espionage and strikes. Japan defense

$5
Drone unmanned autonomous technology of espionage and strikes. Drones as the basis of defense

Drone unmanned autonomous technology of espionage and strikes. Drones as the basis of defense

$5
The detective is investigating from the car.

The detective is investigating from the car.

$5
Spying on a government or a bank.

Spying on a government or a bank.

by iLixe48
$5
Group of people planning on robbing criminal

Group of people planning on robbing criminal

$5
Group of people planning on robbing criminal

Group of people planning on robbing criminal

$5
Military IT experts working on cyber security in a high tech government office

Military IT experts working on cyber security in a high tech government office

$10
A spy among workers. Subversion, sabotage. Violation of the work process.

A spy among workers. Subversion, sabotage. Violation of the work process.

by iLixe48
$5
Secret agent listens on the reel tape recorder. Officer wiretapping in headphones

Secret agent listens on the reel tape recorder. Officer wiretapping in headphones

$5
Illegal interception of data and secret documents.

Illegal interception of data and secret documents.

by iLixe48
$5
Unauthorized access to information.

Unauthorized access to information.

by iLixe48
$5
Monitoring and testing of new employees.

Monitoring and testing of new employees.

by iLixe48
$5
Intruder gains access to secrets. Hacker hacking into the security system.

Intruder gains access to secrets. Hacker hacking into the security system.

by iLixe48
$5
Secret agent listens on the reel tape recorder. Officer wiretapping in headphones

Secret agent listens on the reel tape recorder. Officer wiretapping in headphones

$5
Secret agent listens on the reel tape recorder. Officer wiretapping in headphones.

Secret agent listens on the reel tape recorder. Officer wiretapping in headphones.

$5
A defective batch of microchips at the factory. A critical electronics error led to expenses

A defective batch of microchips at the factory. A critical electronics error led to expenses

by iLixe48
$5
Viruses and email. Malicious programs.

Viruses and email. Malicious programs.

by iLixe48
$5
A hostile agent spreads its influence. Draining data by an insider.

A hostile agent spreads its influence. Draining data by an insider.

by iLixe48
$5
Secret agent listens on the reel tape recorder. Officer wiretapping in headphones

Secret agent listens on the reel tape recorder. Officer wiretapping in headphones

$5
Cyber security experts team working on encryption and IT security

Cyber security experts team working on encryption and IT security

$10
Find and detain the suspect.

Find and detain the suspect.

by iLixe48
$5
Anonymous hacker with mask using hologram to hack computer server

Anonymous hacker with mask using hologram to hack computer server

$10