Espionage Stock Footage: Royalty-Free Video Clips

Royalty-free Stock Footage Clips

612 results found for espionage

Clear Filters

Media Type

Resolution

Frame Rate

Duration

0:001:00+

Media Details

Usage Rights

Categories

"espionage"
Footage

Hands of unrecognizable man hacker typing a laptop in futuristic modern office with animated world map on background

Noir spy film character smoking a cigarette

spy on the phone taking pictures of secret files in the office

Medium shot of a hacker watching hacked security camera footage

Spy on the phone taking pictures of secret files in the office

Clouse-up male spy sends secret documents to the woman, instead of receiving the envelope with money. Industrial espionage. The work of foreign agents.

Male hacker sits in front of virtual screen in monitor room and do IP tracing via satellite uplink. Dark night low key film look.

NEW

Hacker uses PC to target vulnerable unpatched connections, seeking to compromise digital devices and steal valuable sensitive data. Rogue

Cyber investigation team working in a governmental hacking room, working on computer security and phishing detection. Emphasizing online

cybercrime, hacking and technology concept - asian male hacker in headphones with coding on laptop computer screen wiretapping or making cyber attack and drinking coffee in dark room at night

High tech surveillance room featuring a Chinese flag on big screen, concept of cyber security and brainwashing. China hybrid warfare

NEW

Hacker hiding in underground bunker, chatting with friend in telephone call, anxious after stealing data from victims using computer virus

Cyber operations center with governmental hackers working on digital security activities during hybrid war. Specialists team ensuring

A special forces surveillance team in a futuristic office with large live screens

Man in the hood from his back sitting and working at laptop as hacker, with world map on wall in background. Then he take off usb flash disk and run away. Perhaps he has stolen information or has

cybercrime, hacking and technology concept - asian male hacker putting headphones on and using computer virus program for cyber attack in dark room at night

Successful hacker planning data breach to take sensitive information without authorization. Male thief doing espionage and breaking into computer system with dark web malware.

Team of hackers using trojan virus to exploit computer server, hacking network system late at night. Cyber spies working with encryption to hack software and break security firewall.

Hacker writing code cracking computer. Programming code in the background. Hacker attack, cybercrime, virus software, dark web, cyber security concept.

Spy taking photographs cold war era

Cybersecurity expert in a governmental IT environment with the American flag. Monitoring cybersecurity, encryption and data security on a

Male Hacker Back View

Noir film detective standing in the dark and smoking a cigarette wearing trench coat

Governmental hackers exploiting network systems in high tech office, executing cyber operations for national server security. Focus on data

NEW

Macro shooting of blue eye looking at Cyber attack in real-time on world map

Man in Dark Room With Red Lights

Cybersecurity: Preventing Network Intrusions and Malware Attacks

Professional IT expert working in a governmental security operations center, data on a big screen. Highlighting the importance of cyber

Multiple screen wide CCTV footage of corporate employees walking on stairways to work, meeting, talking, shaking hands, filmed with surveillance cameras in spacious office building with glass walls

Data Collection Surveillance Technologies Digital Information Gathering Privacy

Surveillance camera shot of multiracial businesspeople gathering around table in office to discuss documents at meeting

Combat aerial drone flying at high altitude, 30 FPS.

Closeup shot of black FBI agent listening to wiretapping on headphones in car

NEW

Hacker leaving secret base with SSD in briefcase containing data obtained from victim after tricking it into installing ransomware program

High tech governmental cyber security room without staff at work. Preventing cyber threats, phishing attacks and data breaches with advanced

Empty governmental cyber defense and surveillance room equipped with cutting edge advanced technology. Ensuring safety from cyber attacks

Surveillance high angle shot of group of diverse young entrepreneurs with laptop sitting at table in stylish cafe or coworking, with carpet and potted plants, discussing new project or venture

Empty high tech office with a big screen showing an American flag, representing cybersecurity operations. Encryption, malware detection and

Governmental hackers cyber threats on big screens, managing important database hacking activity in high tech agency office. Work on cyber

NEW

Hacker devising plan, coding malware designed to exploit network backdoors, security measures such as logins and protections in graffiti

Cyber security specialist conducting cyber surveillance and threat detection in a governmental agency. Professional hackers team managing

NEW

Hacker in dark neon lit underground HQ coding malware designed to exploit network backdoors, using tools to security measures such as logins

Empty governmental hacking room with chinese flag on a big screen, cyberwarfare and misinformation. Chinese propaganda, fake news and the

Male informant attaches hidden microphone to chest with duct tape in brown shirt. Special services or police, law enforcement agencies

Hacking criminals using dark web to steal government data late at night, breaking firewall encryption. Hackers using trojan virus to create computer malware or security breach. Tripod shot.

Closeup shot of an FBI agent conducting surveillance secretly taking pictures from the car

Hacker group member wearing anonymous mask filming video threatening another country government to steal military secrets, doing

Cyber security monitoring room with high tech equipment. Governmental focus on cyber operations, cyber surveillance, and digital threats