Confidential Stock Footage: Royalty-Free Video Clips

Royalty-free Stock Footage Clips

777 results found for confidential

Clear Filters

Media Type

Resolution

Frame Rate

Duration

0:001:00+

Media Details

Usage Rights

Categories

"confidential"
Footage

Closeup sign top secret on private paper document. Macro view of red prohibition stamp on text information signing contract. Confidential classified important data on printed list letter report.

Confidential stamp on documents

Federal investigator reading confidential report in arhive room, working on crime case. Private officer analyzing forensic evidence, doing research to catch suspect. Handheld shot.

A folder containing a United States Top Secret document gets taken.

Abstract animation of digital data protection theme.

Classified important document stamped seal top secret close up. Printed confidential english text on white paper with red prohibition sign. Private letter security report spy documentation concept.

Top secret sign stamping on important official document close up. Unknown person hand holding seal verifying confidential papers indoors. Confirmation classified documentation. Paperwork concept.

African American man in black outfit hacking servers of data center launching DDoS attack

Woman with dyed hair whispering a secret

Spy on the phone taking pictures of secret files in the office

Special forces professional in military HQ base gathering information on enemy troops. Officer using monitoring equipment in base of

Silence gesture close up. Asian businessman putting finger to his mouth showing secret expression

Man explores vault with flashlight, searching for valuable and financial secrets

NEW

Hacker in cap and coding on computer for cyber crime

Concept shot of cyber criminal taking seat at table and starting to write malicious program on computer, in dark room for massive attack of corporate big data servers

Weapons on table in secure room in army governmental facility operating as military command post and surveillance monitoring center. Extreme

NEW

Mother and teenage daughter participate in psychotherapy, receiving counseling on emotional regulation and personal challenges. Therapist

NEW

Troubled teen suffers from loss of contact and disorientation, desperate mother coming to a psychotherapy session. Adolescent dealing with

Advanced technology in army command center housing operational missile defense system. Armed forces headquarters used for tracking enemy

NEW

Worried adolescent with low self esteem and depression opening up in counseling session, feeling stressed with internal frustration and low

Private investigator comparing sources to confirm case details or cross check confidential information, compiling statistical data on crime

Secret intelligence agent doing saluting hand gesture towards North Korea flag in war room, showing respect. Special operations spy with

Investigators research backgrounds of suspects involved in archived old cases, looking for similarities to connect the dots. Team having

NEW

Adolescent undergoing behavioral therapy to address anxiety and social issues. Session with an expert focuses on emotional management while

NEW

Adolescent girl in therapy discussing behavioral issues and personal challenges. Counseling session with psychologist to help with intrusive

NEW

Therapist uses green screen display in a counseling session with an adolescent dealing with low confidence. Psychotherapist supports her in

Army specialist working in war room operating surveillance tech, evaluating target data. Close up on dispatcher doing job in HQ base of

NEW

Therapy session where a teenager discusses her struggles with anxiety and social issues. Psychotherapist listening to young girl with

businessman show a padlock in safe sign with futuristic holographic about services and safety.concept of:password,Protection system files from technological hacker internet or banking system

Clouse-up male spy sends secret documents to the woman, instead of receiving the envelope with money. Industrial espionage. The work of foreign agents.

Private agents reading records to uncover new case clues, team strategizes next steps working in archive room. Detectives brainstorm

Female Business Person Inside Vault Safe Strongroom Using Deposit Box

Woman zipping lips with fingers

Cutting edge gear in army command center housing operational missile defense system. Armed forces headquarters used for tracking enemy

woman's hand with pen signing document, close up

Private investigator reading legal documents and federal notes in archive room, working on criminal case. Law enforcement agent opening

Investigation partners archived autopsy reports and medical records for forensic insights, working in evidence room to gather clues. Law

NEW

Stern Caucasian Woman Showing Hush Gesture On White Background

Close up view of person removing cash from a safety deposit box in dark bank vault room

ZAPOROZHYE, UKRAINE - JANUARY 28, 2022: A masked hacker weared black hoodie uses a computer to stage a massive data attack on big data corporate servers, while sitting at desk in dark room and hacking

NEW

Young girl dealing with derealization and dissociation from reality, mother bringing her to counseling. Adolescent zoned out and struggling

Lights switched on in Strongroom of bank with deposit boxes Protecting Secure Savings

NEW

Hooded spy managing to steal military secrets on SSD, proudly looking at it. Hacker group hired by government to do international espionage

NEW

Teenager at therapy session struggling with emotional issues. Counseling meeting focuses on adolescence, mental health and social media

NEW

Troubled teen expressing anxiety and mental health issues during therapy session with psychologist, low confidence and internal frustration

Teamworking military agents look at intel folder files on enemy battle formation. Intelligence corps coworkers read mission case documents

NEW

Troubled teen suffers from loss of contact and disorientation, desperate mother coming to a psychotherapy session. Adolescent dealing with

NEW

Hacker arriving with tablet in hidden base, deploying viruses on unaware victims computers, stealing sensitive and private information