Knowledge (XXG)

Dead drop

Source đź“ť

166: 38: 101: 277:, initially called DeadDrop, is a software suite for teams that allows them to create a digital dead drop location to receive tips from whistleblowers through the Internet. The team members and whistleblowers never communicate directly and never know each other's identity, thereby allowing whistleblowers to dead-drop information despite the 161:
The location and nature of the dead drop must enable retrieval of the hidden item without the operatives being spotted by a member of the public, the police, or other security forces—therefore, common everyday items and behavior are used to avoid arousing suspicion. Any hidden location could serve.
86:
and their handlers have been known to perform dead drops using various techniques to hide items (such as money, secrets or instructions) and to signal that the drop has been made. Although the signal and location by necessity must be agreed upon in advance, the signal may or may not be located close
270:
dead drops concealed inside hollowed-out rocks ("spy rock") to collect espionage information from agents in Russia. According to the Russian authorities, the agent delivering information would approach the rock and transmit data wirelessly into it from a hand-held device, and later, his British
216:. Alternatively, the signal can be made from inside the agent's own home, by, for example, hanging a distinctively-colored towel from a balcony, or placing a potted plant on a window sill where it is visible to anyone on the street. 451: 457: 1159: 1372: 923: 228:
pair or an entire espionage network, it is not without disadvantages. If one of the operatives is compromised, they may reveal the location and signal for that specific dead drop.
1169: 165: 1302: 966: 949: 916: 821: 1365: 1006: 263: 1194: 1164: 909: 804: 760: 1347: 996: 755: 404: 510: 940: 656: 482: 259: 148: 1297: 1289: 691: 616: 253: 1307: 1238: 1063: 978: 558: 126: 1398: 932: 1355: 111: 45:
used to signal his Russian counterparts. Ames would place a horizontal chalk mark about 3" long above the USPS logo.
1393: 122: 432:.International Herald Tribune. January 24, 2006. News report on Russian discovery of British "wireless dead drop". 130: 115: 1270: 1001: 1322: 1312: 1260: 991: 641: 611: 503: 1337: 1275: 1255: 1204: 961: 456:
Robert Burnson, "Accused Chinese spy pleads guilty in U.S. 'dead-drop' sting", Bloomberg, 25 novembre 2019
267: 1224: 890: 193:-proof and can be pushed into the ground or placed in a shallow stream to be retrieved at a later time. 1327: 1265: 1151: 1107: 1092: 1041: 986: 816: 799: 772: 535: 73: 224:
While the dead drop method is useful in preventing the instantaneous capture of either an operative/
1360: 1234: 1051: 878: 782: 229: 281:
and privacy violations which had become commonplace in the beginning of the twenty-first century.
1332: 1317: 1209: 1184: 1122: 1073: 1058: 767: 734: 708: 686: 681: 651: 636: 496: 375: 178: 394: 72:, or two agents) using a secret location. By avoiding direct meetings, individuals can maintain 41:
This (replacement) mailbox is identical to the one, and in the same location that convicted spy
1174: 883: 552: 478: 367: 278: 213: 1229: 1179: 848: 580: 359: 225: 87:
to the dead drop itself. The operatives may not necessarily know one another or ever meet.
1117: 1046: 868: 843: 777: 739: 676: 399: 445: 1214: 1034: 546: 474: 237: 65: 429: 1387: 1132: 1112: 1097: 826: 794: 696: 671: 590: 379: 300: 31: 37: 1219: 1137: 1127: 1068: 873: 661: 646: 585: 570: 563: 233: 205: 42: 1029: 863: 729: 575: 435: 336:, Washington DC, National Geographic, 2004. ISBN 978-0-7922-6795-9. Pp. 119-125. 201: 100: 244:
it. There is also the risk that a third party may find the material deposited.
17: 1102: 858: 838: 831: 811: 718: 471:
Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda
363: 321:
Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda
274: 241: 182: 61: 371: 1083: 1024: 1016: 853: 595: 530: 519: 347: 295: 290: 209: 186: 83: 69: 58: 901: 1087: 701: 323:, New York, Dutton, 2008. ISBN 0-525-94980-1. Pp. 43-44, 63, and 74-76. 185:. It has been used since the late 1960s to hide money, maps, documents, 787: 240:
to the enemy or to identify other operatives using it or ultimately to
80:, so-called because two persons meet to exchange items or information. 190: 64:
used to pass items or information between two individuals (e.g., a
197: 164: 36: 905: 492: 469:
Robert Wallace and H. Keith Melton, with Henry R. Schlesinger,
319:
Robert Wallace and H. Keith Melton, with Henry R. Schlesinger,
452:
Military secrets missing on Ministry of Defence computer files
439: 94: 352:
International Journal of Intelligence and CounterIntelligence
488: 271:
handlers would pick up the stored data by similar means.
1373:
Counterintelligence and counter-terrorism organizations
334:
International Spy Museum Handbook of Practical Spying
1346: 1288: 1248: 1193: 1150: 1015: 977: 948: 939: 748: 717: 627: 604: 526: 393:Nick Paton Walsh, The Guardian (23 January 2006). 30:For a USB device used as a public dead drop, see 448:. International Herald Tribune. April 28, 2006. 917: 504: 8: 236:for a variety of purposes, such as to feed 189:, and other items. The spike is water- and 129:. Unsourced material may be challenged and 954: 945: 924: 910: 902: 511: 497: 489: 395:"Moscow names British 'spies' in NGO row" 149:Learn how and when to remove this message 76:. This method stands in contrast to the 1338:Scientific & Technical intelligence 312: 761:Chinese espionage in the United States 346:Wettering, Frederick L. (2001-07-01). 430:"Russians accuse 4 Britons of spying" 7: 1160:By alliances, nations and industries 756:Chinese intelligence activity abroad 127:adding citations to reliable sources 822:Interpersonal (HUMINT) intelligence 446:Madrid suspects tied to e-mail ruse 407:from the original on 29 August 2013 348:"The Internet and the Spy Business" 25: 657:Computer and network surveillance 436:"Old spying lives on in new ways" 258:On January 23, 2006, the Russian 692:Short-range agent communications 254:Short-range agent communications 232:can then use the dead drop as a 196:Signaling devices can include a 99: 1308:Words of estimative probability 1170:Operational platforms by nation 27:Method of espionage tradecraft 1: 1356:Intelligence cycle security 200:mark on a wall, a piece of 1415: 251: 29: 957: 364:10.1080/08850600152386846 1323:Intelligence assessment 1313:All-source intelligence 933:Intelligence management 642:Covert listening device 612:Intelligence assessment 1007:Operational techniques 962:Special reconnaissance 170: 46: 891:Targeted surveillance 168: 40: 1399:Espionage techniques 1328:Medical intelligence 1298:Competing hypotheses 1108:Industrial espionage 1093:Denial and deception 817:Industrial espionage 617:competing hypotheses 123:improve this section 74:operational security 1361:Counterintelligence 1276:Technical (TECHINT) 1271:Open-source (OSINT) 1261:Geospatial (GEOINT) 1235:Casualty estimation 230:Counterintelligence 1333:Military geography 1318:Basic intelligence 1256:Financial (FININT) 1197:signature (MASINT) 1123:One-way voice link 1059:Concealment device 768:Cold War espionage 735:Front organization 709:Surveillance tools 687:Phone surveillance 682:One-way voice link 637:Concealment device 442:. 23 January 2006. 179:concealment device 171: 47: 1394:Espionage devices 1381: 1380: 1284: 1283: 1175:Direction finding 1165:In modern history 1146: 1145: 899: 898: 553:Agent provocateur 279:mass surveillance 248:Modern techniques 159: 158: 151: 16:(Redirected from 1406: 1180:Traffic analysis 1152:Signals (SIGINT) 987:Asset recruiting 955: 946: 926: 919: 912: 903: 513: 506: 499: 490: 417: 416: 414: 412: 390: 384: 383: 343: 337: 330: 324: 317: 154: 147: 143: 140: 134: 103: 95: 21: 1414: 1413: 1409: 1408: 1407: 1405: 1404: 1403: 1384: 1383: 1382: 1377: 1342: 1280: 1266:Imagery (IMINT) 1244: 1205:Electro-optical 1196: 1195:Measurement and 1189: 1142: 1118:Numbers station 1047:Black operation 1011: 973: 935: 930: 900: 895: 869:Sting operation 778:Black operation 744: 740:Limited hangout 722: 713: 677:Numbers station 629: 623: 600: 540: 522: 517: 466: 464:Further reading 426: 421: 420: 410: 408: 400:TheGuardian.com 392: 391: 387: 345: 344: 340: 331: 327: 318: 314: 309: 287: 256: 250: 222: 175:dead drop spike 169:Dead drop spike 155: 144: 138: 135: 120: 104: 93: 57:is a method of 55:dead letter box 35: 28: 23: 22: 18:Dead letter box 15: 12: 11: 5: 1412: 1410: 1402: 1401: 1396: 1386: 1385: 1379: 1378: 1376: 1375: 1370: 1369: 1368: 1358: 1352: 1350: 1344: 1343: 1341: 1340: 1335: 1330: 1325: 1320: 1315: 1310: 1305: 1303:Target-centric 1300: 1294: 1292: 1286: 1285: 1282: 1281: 1279: 1278: 1273: 1268: 1263: 1258: 1252: 1250: 1246: 1245: 1243: 1242: 1232: 1227: 1225:Radiofrequency 1222: 1217: 1212: 1207: 1201: 1199: 1191: 1190: 1188: 1187: 1182: 1177: 1172: 1167: 1162: 1156: 1154: 1148: 1147: 1144: 1143: 1141: 1140: 1135: 1130: 1125: 1120: 1115: 1110: 1105: 1100: 1095: 1090: 1081: 1076: 1071: 1066: 1061: 1056: 1055: 1054: 1044: 1039: 1038: 1037: 1032: 1021: 1019: 1013: 1012: 1010: 1009: 1004: 999: 994: 989: 983: 981: 975: 974: 972: 971: 970: 969: 958: 952: 950:Human (HUMINT) 943: 937: 936: 931: 929: 928: 921: 914: 906: 897: 896: 894: 893: 888: 887: 886: 881: 871: 866: 861: 856: 851: 846: 841: 836: 835: 834: 829: 819: 814: 809: 808: 807: 802: 792: 791: 790: 785: 775: 770: 765: 764: 763: 752: 750: 746: 745: 743: 742: 737: 732: 726: 724: 715: 714: 712: 711: 706: 705: 704: 694: 689: 684: 679: 674: 669: 664: 659: 654: 649: 644: 639: 633: 631: 630:communications 625: 624: 622: 621: 620: 619: 608: 606: 602: 601: 599: 598: 593: 588: 583: 578: 573: 568: 567: 566: 556: 549: 547:Agent handling 543: 541: 539: 538: 533: 527: 524: 523: 518: 516: 515: 508: 501: 493: 487: 486: 465: 462: 461: 460: 454: 449: 443: 433: 425: 422: 419: 418: 385: 358:(3): 342–365. 338: 325: 311: 310: 308: 305: 304: 303: 298: 293: 286: 283: 249: 246: 238:misinformation 221: 218: 157: 156: 107: 105: 98: 92: 91:Considerations 89: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 1411: 1400: 1397: 1395: 1392: 1391: 1389: 1374: 1371: 1367: 1366:organizations 1364: 1363: 1362: 1359: 1357: 1354: 1353: 1351: 1349: 1348:Dissemination 1345: 1339: 1336: 1334: 1331: 1329: 1326: 1324: 1321: 1319: 1316: 1314: 1311: 1309: 1306: 1304: 1301: 1299: 1296: 1295: 1293: 1291: 1287: 1277: 1274: 1272: 1269: 1267: 1264: 1262: 1259: 1257: 1254: 1253: 1251: 1247: 1240: 1236: 1233: 1231: 1228: 1226: 1223: 1221: 1218: 1216: 1213: 1211: 1208: 1206: 1203: 1202: 1200: 1198: 1192: 1186: 1183: 1181: 1178: 1176: 1173: 1171: 1168: 1166: 1163: 1161: 1158: 1157: 1155: 1153: 1149: 1139: 1136: 1134: 1133:Steganography 1131: 1129: 1126: 1124: 1121: 1119: 1116: 1114: 1113:Interrogation 1111: 1109: 1106: 1104: 1101: 1099: 1098:Eavesdropping 1096: 1094: 1091: 1089: 1085: 1082: 1080: 1077: 1075: 1072: 1070: 1067: 1065: 1062: 1060: 1057: 1053: 1050: 1049: 1048: 1045: 1043: 1040: 1036: 1033: 1031: 1028: 1027: 1026: 1023: 1022: 1020: 1018: 1014: 1008: 1005: 1003: 1002:Direct action 1000: 998: 997:Covert action 995: 993: 990: 988: 985: 984: 982: 980: 976: 968: 967:organizations 965: 964: 963: 960: 959: 956: 953: 951: 947: 944: 942: 938: 934: 927: 922: 920: 915: 913: 908: 907: 904: 892: 889: 885: 882: 880: 877: 876: 875: 872: 870: 867: 865: 862: 860: 857: 855: 852: 850: 847: 845: 842: 840: 837: 833: 830: 828: 827:interrogation 825: 824: 823: 820: 818: 815: 813: 810: 806: 803: 801: 798: 797: 796: 795:Eavesdropping 793: 789: 786: 784: 781: 780: 779: 776: 774: 771: 769: 766: 762: 759: 758: 757: 754: 753: 751: 747: 741: 738: 736: 733: 731: 728: 727: 725: 720: 716: 710: 707: 703: 700: 699: 698: 697:Steganography 695: 693: 690: 688: 685: 683: 680: 678: 675: 673: 672:Invisible ink 670: 668: 665: 663: 660: 658: 655: 653: 650: 648: 645: 643: 640: 638: 635: 634: 632: 626: 618: 615: 614: 613: 610: 609: 607: 603: 597: 594: 592: 591:Sleeper agent 589: 587: 584: 582: 579: 577: 574: 572: 569: 565: 562: 561: 560: 557: 555: 554: 550: 548: 545: 544: 542: 537: 534: 532: 529: 528: 525: 521: 514: 509: 507: 502: 500: 495: 494: 491: 484: 483:0-525-94980-1 480: 476: 472: 468: 467: 463: 458: 455: 453: 450: 447: 444: 441: 437: 434: 431: 428: 427: 423: 406: 402: 401: 396: 389: 386: 381: 377: 373: 369: 365: 361: 357: 353: 349: 342: 339: 335: 329: 326: 322: 316: 313: 306: 302: 301:USB dead drop 299: 297: 294: 292: 289: 288: 284: 282: 280: 276: 272: 269: 265: 261: 255: 247: 245: 243: 239: 235: 231: 227: 219: 217: 215: 211: 207: 203: 199: 194: 192: 188: 184: 181:similar to a 180: 176: 167: 163: 153: 150: 142: 139:February 2024 132: 128: 124: 118: 117: 113: 108:This section 106: 102: 97: 96: 90: 88: 85: 81: 79: 75: 71: 67: 63: 60: 56: 52: 44: 39: 33: 32:USB dead drop 19: 1138:Surveillance 1128:Resident spy 1078: 1069:Cryptography 874:Surveillance 666: 662:Cyber spying 647:Cryptography 586:Resident spy 571:Double agent 551: 473:, New York, 470: 424:Bibliography 409:. Retrieved 398: 388: 355: 351: 341: 333: 332:Jack Barth, 328: 320: 315: 273: 257: 234:double agent 223: 195: 174: 172: 160: 145: 136: 121:Please help 109: 82: 77: 66:case officer 54: 50: 48: 43:Aldrich Ames 1210:Geophysical 992:Cell system 979:Clandestine 864:Stay-behind 773:Recruitment 730:Canary trap 628:Devices and 576:Field agent 202:chewing gum 1388:Categories 1239:earthquake 1103:False flag 941:Collection 859:Sexpionage 839:COINTELPRO 832:safe house 812:False flag 749:Operations 723:techniques 719:Tradecraft 307:References 275:SecureDrop 252:See also: 242:booby trap 214:park bench 212:left on a 183:microcache 62:tradecraft 1230:Materials 1084:Defection 1079:Dead drop 1052:black bag 1017:Espionage 783:black bag 667:Dead drop 596:Spymaster 520:Espionage 380:153870872 372:0885-0607 296:PirateBox 291:Foldering 266:of using 220:Drawbacks 210:newspaper 187:microfilm 110:does not 78:live drop 59:espionage 51:dead drop 1290:Analysis 1088:Turncoat 1035:handling 849:SHAMROCK 702:microdot 605:Analysis 477:, 2008. 405:Archived 285:See also 268:wireless 262:accused 206:lamppost 1237: ( 1215:Nuclear 1185:TEMPEST 844:MINARET 788:wetwork 411:8 April 264:Britain 226:handler 208:, or a 131:removed 116:sources 68:and an 1074:Cutout 1025:Agents 879:Global 805:MASINT 800:SIGINT 652:Cutout 536:Assets 531:Agents 481:  475:Dutton 378:  370:  191:mildew 1249:Other 1220:Radar 1064:Cover 1042:Asset 1030:field 564:Agent 559:Cover 376:S2CID 204:on a 198:chalk 177:is a 84:Spies 70:agent 884:Mass 854:FVEY 581:Mole 479:ISBN 413:2012 368:ISSN 114:any 112:cite 721:and 440:BBC 360:doi 260:FSB 125:by 53:or 1390:: 1086:/ 438:. 403:. 397:. 374:. 366:. 356:14 354:. 350:. 173:A 49:A 1241:) 925:e 918:t 911:v 512:e 505:t 498:v 485:. 459:. 415:. 382:. 362:: 152:) 146:( 141:) 137:( 133:. 119:. 34:. 20:)

Index

Dead letter box
USB dead drop

Aldrich Ames
espionage
tradecraft
case officer
agent
operational security
Spies

cite
sources
improve this section
adding citations to reliable sources
removed
Learn how and when to remove this message

concealment device
microcache
microfilm
mildew
chalk
chewing gum
lamppost
newspaper
park bench
handler
Counterintelligence
double agent

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑