Skip to content

Espionage Stock Photos & Royalty-Free Images

All the stock photos you need and more from our global creative community.

Price is in US dollars and excludes tax and handling fees

1,009 stock photos

Clear all
Spies threaten to intercept the flow of correspondence. Encryption and blockchain. I

Spies threaten to intercept the flow of correspondence. Encryption and blockchain. I

by iLixe48
$5
The spy infiltrates the company through an insider.

The spy infiltrates the company through an insider.

by iLixe48
$5
People ignore the fraud. Forewarned is forearmed.

People ignore the fraud. Forewarned is forearmed.

by iLixe48
$5
Malware and spy chips. Problems of semiconductors and microprocessors.

Malware and spy chips. Problems of semiconductors and microprocessors.

by iLixe48
$5
The spy gets access to the data. Threat to personal data and secret documents.

The spy gets access to the data. Threat to personal data and secret documents.

by iLixe48
$5
Secret agent listens on the reel tape recorder. Officer wiretapping in headphones.

Secret agent listens on the reel tape recorder. Officer wiretapping in headphones.

$5
Black informer breaking important documents after reading the information

Black informer breaking important documents after reading the information

$10
Young cyber criminal breaking computer firewall to plant malware

Young cyber criminal breaking computer firewall to plant malware

$10
Secret agent listens on the reel tape recorder. Officer wiretapping in headphones.

Secret agent listens on the reel tape recorder. Officer wiretapping in headphones.

$5
Purging industrial spies and malicious hackers from a group of employees

Purging industrial spies and malicious hackers from a group of employees

by iLixe48
$5
Anonymous hackers trying to break into government server

Anonymous hackers trying to break into government server

$10
Spies in hideout steal valuable data

Spies in hideout steal valuable data

$10
Happy thief successfully breaking network system on computer

Happy thief successfully breaking network system on computer

$10
Skilled hacker successfully cracking security network on computer

Skilled hacker successfully cracking security network on computer

$10
Hacker specialist working on governmental cyber surveillance in agency center

Hacker specialist working on governmental cyber surveillance in agency center

$10
Cyber intelligence team using advanced technology to secure computer networks

Cyber intelligence team using advanced technology to secure computer networks

$10
Revealing shot of spy in underground space stealing governmental secrets

Revealing shot of spy in underground space stealing governmental secrets

$10
Male hacker using knowledge of computer science to access important data

Male hacker using knowledge of computer science to access important data

$10
Secret agent listens on the reel tape recorder. Officer wiretapping in headphones.

Secret agent listens on the reel tape recorder. Officer wiretapping in headphones.

$5
Security threat. Find and fix vulnerabilities in the system.

Security threat. Find and fix vulnerabilities in the system.

by iLixe48
$5
Detect a spy. Convict a corrupt official within the government or a business

Detect a spy. Convict a corrupt official within the government or a business

by iLixe48
$5
Governmental hackers working on computer with green screen to protect data

Governmental hackers working on computer with green screen to protect data

$10
Corporate spies evading law enforcement

Corporate spies evading law enforcement

$10
Young hacker enjoying cybercrime achievement at night

Young hacker enjoying cybercrime achievement at night

$10
Female spy breaking into computer firewall to hack system

Female spy breaking into computer firewall to hack system

$10
Cyber intelligence team using advanced technology to secure computer networks

Cyber intelligence team using advanced technology to secure computer networks

$10
Hackers team trying to steal government information at night

Hackers team trying to steal government information at night

$10
Corporate spies blocked by firewalls

Corporate spies blocked by firewalls

$10
Intelligence agent preparing to analyze top secret data storage on a hard disk

Intelligence agent preparing to analyze top secret data storage on a hard disk

$10
Hacker starts his day with cup of coffee

Hacker starts his day with cup of coffee

$10