166:
38:
101:
277:, initially called DeadDrop, is a software suite for teams that allows them to create a digital dead drop location to receive tips from whistleblowers through the Internet. The team members and whistleblowers never communicate directly and never know each other's identity, thereby allowing whistleblowers to dead-drop information despite the
161:
The location and nature of the dead drop must enable retrieval of the hidden item without the operatives being spotted by a member of the public, the police, or other security forces—therefore, common everyday items and behavior are used to avoid arousing suspicion. Any hidden location could serve.
86:
and their handlers have been known to perform dead drops using various techniques to hide items (such as money, secrets or instructions) and to signal that the drop has been made. Although the signal and location by necessity must be agreed upon in advance, the signal may or may not be located close
270:
dead drops concealed inside hollowed-out rocks ("spy rock") to collect espionage information from agents in Russia. According to the
Russian authorities, the agent delivering information would approach the rock and transmit data wirelessly into it from a hand-held device, and later, his British
216:. Alternatively, the signal can be made from inside the agent's own home, by, for example, hanging a distinctively-colored towel from a balcony, or placing a potted plant on a window sill where it is visible to anyone on the street.
451:
457:
1159:
1372:
923:
228:
pair or an entire espionage network, it is not without disadvantages. If one of the operatives is compromised, they may reveal the location and signal for that specific dead drop.
1169:
165:
1302:
966:
949:
916:
821:
1365:
1006:
263:
1194:
1164:
909:
804:
760:
1347:
996:
755:
404:
510:
940:
656:
482:
259:
148:
1297:
1289:
691:
616:
253:
1307:
1238:
1063:
978:
558:
126:
1398:
932:
1355:
111:
45:
used to signal his
Russian counterparts. Ames would place a horizontal chalk mark about 3" long above the USPS logo.
1393:
122:
432:.International Herald Tribune. January 24, 2006. News report on Russian discovery of British "wireless dead drop".
130:
115:
1270:
1001:
1322:
1312:
1260:
991:
641:
611:
503:
1337:
1275:
1255:
1204:
961:
456:
Robert
Burnson, "Accused Chinese spy pleads guilty in U.S. 'dead-drop' sting", Bloomberg, 25 novembre 2019
267:
1224:
890:
193:-proof and can be pushed into the ground or placed in a shallow stream to be retrieved at a later time.
1327:
1265:
1151:
1107:
1092:
1041:
986:
816:
799:
772:
535:
73:
224:
While the dead drop method is useful in preventing the instantaneous capture of either an operative/
1360:
1234:
1051:
878:
782:
229:
281:
and privacy violations which had become commonplace in the beginning of the twenty-first century.
1332:
1317:
1209:
1184:
1122:
1073:
1058:
767:
734:
708:
686:
681:
651:
636:
496:
375:
178:
394:
72:, or two agents) using a secret location. By avoiding direct meetings, individuals can maintain
41:
This (replacement) mailbox is identical to the one, and in the same location that convicted spy
1174:
883:
552:
478:
367:
278:
213:
1229:
1179:
848:
580:
359:
225:
87:
to the dead drop itself. The operatives may not necessarily know one another or ever meet.
1117:
1046:
868:
843:
777:
739:
676:
399:
445:
1214:
1034:
546:
474:
237:
65:
429:
1387:
1132:
1112:
1097:
826:
794:
696:
671:
590:
379:
300:
31:
37:
1219:
1137:
1127:
1068:
873:
661:
646:
585:
570:
563:
233:
205:
42:
1029:
863:
729:
575:
435:
336:, Washington DC, National Geographic, 2004. ISBN 978-0-7922-6795-9. Pp. 119-125.
201:
100:
244:
it. There is also the risk that a third party may find the material deposited.
17:
1102:
858:
838:
831:
811:
718:
471:
Spycraft: The Secret
History of the CIA's Spytechs, from Communism to al-Qaeda
363:
321:
Spycraft: The Secret
History of the CIA's Spytechs, from Communism to al-Qaeda
274:
241:
182:
61:
371:
1083:
1024:
1016:
853:
595:
530:
519:
347:
295:
290:
209:
186:
83:
69:
58:
901:
1087:
701:
323:, New York, Dutton, 2008. ISBN 0-525-94980-1. Pp. 43-44, 63, and 74-76.
185:. It has been used since the late 1960s to hide money, maps, documents,
787:
240:
to the enemy or to identify other operatives using it or ultimately to
80:, so-called because two persons meet to exchange items or information.
190:
64:
used to pass items or information between two individuals (e.g., a
197:
164:
36:
905:
492:
469:
Robert
Wallace and H. Keith Melton, with Henry R. Schlesinger,
319:
Robert
Wallace and H. Keith Melton, with Henry R. Schlesinger,
452:
Military secrets missing on
Ministry of Defence computer files
439:
94:
352:
International
Journal of Intelligence and CounterIntelligence
488:
271:
handlers would pick up the stored data by similar means.
1373:
Counterintelligence and counter-terrorism organizations
334:
International Spy Museum
Handbook of Practical Spying
1346:
1288:
1248:
1193:
1150:
1015:
977:
948:
939:
748:
717:
627:
604:
526:
393:Nick Paton Walsh, The Guardian (23 January 2006).
30:For a USB device used as a public dead drop, see
448:. International Herald Tribune. April 28, 2006.
917:
504:
8:
236:for a variety of purposes, such as to feed
189:, and other items. The spike is water- and
129:. Unsourced material may be challenged and
954:
945:
924:
910:
902:
511:
497:
489:
395:"Moscow names British 'spies' in NGO row"
149:Learn how and when to remove this message
76:. This method stands in contrast to the
1338:Scientific & Technical intelligence
312:
761:Chinese espionage in the United States
346:Wettering, Frederick L. (2001-07-01).
430:"Russians accuse 4 Britons of spying"
7:
1160:By alliances, nations and industries
756:Chinese intelligence activity abroad
127:adding citations to reliable sources
822:Interpersonal (HUMINT) intelligence
446:Madrid suspects tied to e-mail ruse
407:from the original on 29 August 2013
348:"The Internet and the Spy Business"
25:
657:Computer and network surveillance
436:"Old spying lives on in new ways"
258:On January 23, 2006, the Russian
692:Short-range agent communications
254:Short-range agent communications
232:can then use the dead drop as a
196:Signaling devices can include a
99:
1308:Words of estimative probability
1170:Operational platforms by nation
27:Method of espionage tradecraft
1:
1356:Intelligence cycle security
200:mark on a wall, a piece of
1415:
251:
29:
957:
364:10.1080/08850600152386846
1323:Intelligence assessment
1313:All-source intelligence
933:Intelligence management
642:Covert listening device
612:Intelligence assessment
1007:Operational techniques
962:Special reconnaissance
170:
46:
891:Targeted surveillance
168:
40:
1399:Espionage techniques
1328:Medical intelligence
1298:Competing hypotheses
1108:Industrial espionage
1093:Denial and deception
817:Industrial espionage
617:competing hypotheses
123:improve this section
74:operational security
1361:Counterintelligence
1276:Technical (TECHINT)
1271:Open-source (OSINT)
1261:Geospatial (GEOINT)
1235:Casualty estimation
230:Counterintelligence
1333:Military geography
1318:Basic intelligence
1256:Financial (FININT)
1197:signature (MASINT)
1123:One-way voice link
1059:Concealment device
768:Cold War espionage
735:Front organization
709:Surveillance tools
687:Phone surveillance
682:One-way voice link
637:Concealment device
442:. 23 January 2006.
179:concealment device
171:
47:
1394:Espionage devices
1381:
1380:
1284:
1283:
1175:Direction finding
1165:In modern history
1146:
1145:
899:
898:
553:Agent provocateur
279:mass surveillance
248:Modern techniques
159:
158:
151:
16:(Redirected from
1406:
1180:Traffic analysis
1152:Signals (SIGINT)
987:Asset recruiting
955:
946:
926:
919:
912:
903:
513:
506:
499:
490:
417:
416:
414:
412:
390:
384:
383:
343:
337:
330:
324:
317:
154:
147:
143:
140:
134:
103:
95:
21:
1414:
1413:
1409:
1408:
1407:
1405:
1404:
1403:
1384:
1383:
1382:
1377:
1342:
1280:
1266:Imagery (IMINT)
1244:
1205:Electro-optical
1196:
1195:Measurement and
1189:
1142:
1118:Numbers station
1047:Black operation
1011:
973:
935:
930:
900:
895:
869:Sting operation
778:Black operation
744:
740:Limited hangout
722:
713:
677:Numbers station
629:
623:
600:
540:
522:
517:
466:
464:Further reading
426:
421:
420:
410:
408:
400:TheGuardian.com
392:
391:
387:
345:
344:
340:
331:
327:
318:
314:
309:
287:
256:
250:
222:
175:dead drop spike
169:Dead drop spike
155:
144:
138:
135:
120:
104:
93:
57:is a method of
55:dead letter box
35:
28:
23:
22:
18:Dead letter box
15:
12:
11:
5:
1412:
1410:
1402:
1401:
1396:
1386:
1385:
1379:
1378:
1376:
1375:
1370:
1369:
1368:
1358:
1352:
1350:
1344:
1343:
1341:
1340:
1335:
1330:
1325:
1320:
1315:
1310:
1305:
1303:Target-centric
1300:
1294:
1292:
1286:
1285:
1282:
1281:
1279:
1278:
1273:
1268:
1263:
1258:
1252:
1250:
1246:
1245:
1243:
1242:
1232:
1227:
1225:Radiofrequency
1222:
1217:
1212:
1207:
1201:
1199:
1191:
1190:
1188:
1187:
1182:
1177:
1172:
1167:
1162:
1156:
1154:
1148:
1147:
1144:
1143:
1141:
1140:
1135:
1130:
1125:
1120:
1115:
1110:
1105:
1100:
1095:
1090:
1081:
1076:
1071:
1066:
1061:
1056:
1055:
1054:
1044:
1039:
1038:
1037:
1032:
1021:
1019:
1013:
1012:
1010:
1009:
1004:
999:
994:
989:
983:
981:
975:
974:
972:
971:
970:
969:
958:
952:
950:Human (HUMINT)
943:
937:
936:
931:
929:
928:
921:
914:
906:
897:
896:
894:
893:
888:
887:
886:
881:
871:
866:
861:
856:
851:
846:
841:
836:
835:
834:
829:
819:
814:
809:
808:
807:
802:
792:
791:
790:
785:
775:
770:
765:
764:
763:
752:
750:
746:
745:
743:
742:
737:
732:
726:
724:
715:
714:
712:
711:
706:
705:
704:
694:
689:
684:
679:
674:
669:
664:
659:
654:
649:
644:
639:
633:
631:
630:communications
625:
624:
622:
621:
620:
619:
608:
606:
602:
601:
599:
598:
593:
588:
583:
578:
573:
568:
567:
566:
556:
549:
547:Agent handling
543:
541:
539:
538:
533:
527:
524:
523:
518:
516:
515:
508:
501:
493:
487:
486:
465:
462:
461:
460:
454:
449:
443:
433:
425:
422:
419:
418:
385:
358:(3): 342–365.
338:
325:
311:
310:
308:
305:
304:
303:
298:
293:
286:
283:
249:
246:
238:misinformation
221:
218:
157:
156:
107:
105:
98:
92:
91:Considerations
89:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
1411:
1400:
1397:
1395:
1392:
1391:
1389:
1374:
1371:
1367:
1366:organizations
1364:
1363:
1362:
1359:
1357:
1354:
1353:
1351:
1349:
1348:Dissemination
1345:
1339:
1336:
1334:
1331:
1329:
1326:
1324:
1321:
1319:
1316:
1314:
1311:
1309:
1306:
1304:
1301:
1299:
1296:
1295:
1293:
1291:
1287:
1277:
1274:
1272:
1269:
1267:
1264:
1262:
1259:
1257:
1254:
1253:
1251:
1247:
1240:
1236:
1233:
1231:
1228:
1226:
1223:
1221:
1218:
1216:
1213:
1211:
1208:
1206:
1203:
1202:
1200:
1198:
1192:
1186:
1183:
1181:
1178:
1176:
1173:
1171:
1168:
1166:
1163:
1161:
1158:
1157:
1155:
1153:
1149:
1139:
1136:
1134:
1133:Steganography
1131:
1129:
1126:
1124:
1121:
1119:
1116:
1114:
1113:Interrogation
1111:
1109:
1106:
1104:
1101:
1099:
1098:Eavesdropping
1096:
1094:
1091:
1089:
1085:
1082:
1080:
1077:
1075:
1072:
1070:
1067:
1065:
1062:
1060:
1057:
1053:
1050:
1049:
1048:
1045:
1043:
1040:
1036:
1033:
1031:
1028:
1027:
1026:
1023:
1022:
1020:
1018:
1014:
1008:
1005:
1003:
1002:Direct action
1000:
998:
997:Covert action
995:
993:
990:
988:
985:
984:
982:
980:
976:
968:
967:organizations
965:
964:
963:
960:
959:
956:
953:
951:
947:
944:
942:
938:
934:
927:
922:
920:
915:
913:
908:
907:
904:
892:
889:
885:
882:
880:
877:
876:
875:
872:
870:
867:
865:
862:
860:
857:
855:
852:
850:
847:
845:
842:
840:
837:
833:
830:
828:
827:interrogation
825:
824:
823:
820:
818:
815:
813:
810:
806:
803:
801:
798:
797:
796:
795:Eavesdropping
793:
789:
786:
784:
781:
780:
779:
776:
774:
771:
769:
766:
762:
759:
758:
757:
754:
753:
751:
747:
741:
738:
736:
733:
731:
728:
727:
725:
720:
716:
710:
707:
703:
700:
699:
698:
697:Steganography
695:
693:
690:
688:
685:
683:
680:
678:
675:
673:
672:Invisible ink
670:
668:
665:
663:
660:
658:
655:
653:
650:
648:
645:
643:
640:
638:
635:
634:
632:
626:
618:
615:
614:
613:
610:
609:
607:
603:
597:
594:
592:
591:Sleeper agent
589:
587:
584:
582:
579:
577:
574:
572:
569:
565:
562:
561:
560:
557:
555:
554:
550:
548:
545:
544:
542:
537:
534:
532:
529:
528:
525:
521:
514:
509:
507:
502:
500:
495:
494:
491:
484:
483:0-525-94980-1
480:
476:
472:
468:
467:
463:
458:
455:
453:
450:
447:
444:
441:
437:
434:
431:
428:
427:
423:
406:
402:
401:
396:
389:
386:
381:
377:
373:
369:
365:
361:
357:
353:
349:
342:
339:
335:
329:
326:
322:
316:
313:
306:
302:
301:USB dead drop
299:
297:
294:
292:
289:
288:
284:
282:
280:
276:
272:
269:
265:
261:
255:
247:
245:
243:
239:
235:
231:
227:
219:
217:
215:
211:
207:
203:
199:
194:
192:
188:
184:
181:similar to a
180:
176:
167:
163:
153:
150:
142:
139:February 2024
132:
128:
124:
118:
117:
113:
108:This section
106:
102:
97:
96:
90:
88:
85:
81:
79:
75:
71:
67:
63:
60:
56:
52:
44:
39:
33:
32:USB dead drop
19:
1138:Surveillance
1128:Resident spy
1078:
1069:Cryptography
874:Surveillance
666:
662:Cyber spying
647:Cryptography
586:Resident spy
571:Double agent
551:
473:, New York,
470:
424:Bibliography
409:. Retrieved
398:
388:
355:
351:
341:
333:
332:Jack Barth,
328:
320:
315:
273:
257:
234:double agent
223:
195:
174:
172:
160:
145:
136:
121:Please help
109:
82:
77:
66:case officer
54:
50:
48:
43:Aldrich Ames
1210:Geophysical
992:Cell system
979:Clandestine
864:Stay-behind
773:Recruitment
730:Canary trap
628:Devices and
576:Field agent
202:chewing gum
1388:Categories
1239:earthquake
1103:False flag
941:Collection
859:Sexpionage
839:COINTELPRO
832:safe house
812:False flag
749:Operations
723:techniques
719:Tradecraft
307:References
275:SecureDrop
252:See also:
242:booby trap
214:park bench
212:left on a
183:microcache
62:tradecraft
1230:Materials
1084:Defection
1079:Dead drop
1052:black bag
1017:Espionage
783:black bag
667:Dead drop
596:Spymaster
520:Espionage
380:153870872
372:0885-0607
296:PirateBox
291:Foldering
266:of using
220:Drawbacks
210:newspaper
187:microfilm
110:does not
78:live drop
59:espionage
51:dead drop
1290:Analysis
1088:Turncoat
1035:handling
849:SHAMROCK
702:microdot
605:Analysis
477:, 2008.
405:Archived
285:See also
268:wireless
262:accused
206:lamppost
1237: (
1215:Nuclear
1185:TEMPEST
844:MINARET
788:wetwork
411:8 April
264:Britain
226:handler
208:, or a
131:removed
116:sources
68:and an
1074:Cutout
1025:Agents
879:Global
805:MASINT
800:SIGINT
652:Cutout
536:Assets
531:Agents
481:
475:Dutton
378:
370:
191:mildew
1249:Other
1220:Radar
1064:Cover
1042:Asset
1030:field
564:Agent
559:Cover
376:S2CID
204:on a
198:chalk
177:is a
84:Spies
70:agent
884:Mass
854:FVEY
581:Mole
479:ISBN
413:2012
368:ISSN
114:any
112:cite
721:and
440:BBC
360:doi
260:FSB
125:by
53:or
1390::
1086:/
438:.
403:.
397:.
374:.
366:.
356:14
354:.
350:.
173:A
49:A
1241:)
925:e
918:t
911:v
512:e
505:t
498:v
485:.
459:.
415:.
382:.
362::
152:)
146:(
141:)
137:(
133:.
119:.
34:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.