Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Dead drop
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{short description|Method of espionage tradecraft}} {{for|a USB device used as a public dead drop|USB dead drop}} [[File:Aldrich Ames mailbox.jpg|thumb|This (replacement) mailbox is identical to, and in the same location of, one that convicted spy [[Aldrich Ames]] used to signal his Russian counterparts. Ames would place a horizontal chalk mark about {{convert|3|in|cm|abbr=on}} long above the [[USPS]] logo.]] A '''dead drop''' or '''dead letter box''' is a method of [[espionage]] [[tradecraft]] used to pass items or information between two individuals (e.g., a [[Agent handling#Case officer|case officer]] and an [[Espionage#Agents in espionage|agent]], or two agents) via a secret location.<ref>{{Cite web |last= |first= |title=New Dead drop techniques used by Security Agencies |url=https://thehackernews.com/2012/11/new-dead-drop-techniques-used-by.html |access-date=2025-04-08 |website=The Hacker News |language=en}}</ref> By avoiding direct meetings, individuals can maintain [[operational security]]. This method stands in contrast to the '''live drop''', which involves a face-to-face exchange.<ref>{{Cite web |last=Black |first=Bryan |date=2011-03-17 |title=DIY Dead Drop Devices to Hide and Pass Messages like a Spy |url=https://www.itstactical.com/intellicom/tradecraft/diy-dead-drop-devices-to-hide-and-pass-messages-like-a-spy/ |access-date=2025-04-08 |website=ITS Tactical |language=en-US}}</ref> [[Espionage|Spies]] and their handlers have been known to perform dead drops using various techniques to hide items (such as money, secrets or instructions) and to signal that the drop has been made. Although the signal and location by necessity must be agreed upon in advance, the signal may or may not be located close to the dead drop itself. The operatives may not necessarily know or meet each other.<ref>Robert Wallace and H. Keith Melton, with Henry R. Schlesinger, ''Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda'', New York, Dutton, 2008. ISBN 0-525-94980-1. Pp. 43-44, 63, and 74-76.</ref><ref>Jack Barth, ''International Spy Museum Handbook of Practical Spying'', Washington DC, National Geographic, 2004. ISBN 978-0-7922-6795-9. Pp. 119-125.</ref> ==Methods== The success of a dead drop depends on the location and method of concealment, ensuring retrieval without the operatives being spotted by the public, law enforcement, or other security forces. Common everyday items and behaviors are used to avoid suspicion.<ref>https://www.fbi.gov/history/famous-cases/hollow-nickel-rudolph-abel</ref> Any hidden location is used.<ref>The Ultimate Spy Book, H. Keith Melton, page 131</ref> [[File:βDeadβ Drop Spike - Flickr - The Central Intelligence Agency.jpg|thumb|right|Dead drop spike<ref>https://www.cia.gov/legacy/museum/artifact/dead-drop-spike/</ref>]] A ''dead drop spike'' is a [[concealment device]] similar to a [[geocaching#Size classifications|microcache]]. It has been used since the late 1960s to hide money, maps, documents, [[microfilm]], and other items. The spike is resistant to water and [[mildew]] and can be placed in the ground or submerged in a shallow stream for later retrieval. Another example was used by the KGB from a hollowed out [[Bolt (fastener)|industrial bolt]] with reverse threading of the cap to prevent accidental opening.<ref>https://www.buzzfeednews.com/article/copyranter/20-cool-kgb-cold-war-devices</ref><ref>https://www.offgridweb.com/preparation/dead-drops-cold-war-spycraft-for-secure-communications/</ref> Various signaling methods are employed to indicate that a dead drop has been made. These include [[chalk]] marks on a wall, a piece of [[chewing gum]] on a [[Street light|lamppost]] or a [[newspaper]] placed on a [[Bench (furniture)|park bench]]. In some cases, signals are made from an agent's residence, visible from the outside, such as distinctively coloured towel hung from a balcony or a potted plant positioned on a windowsill. ==Drawbacks== While the dead drop method is useful in preventing the instantaneous capture of either an operative/[[Handler (spying)|handler]] pair or an entire espionage network, it is not without disadvantages. If one of the operatives is compromised, they may reveal the location and signal for that specific dead drop. [[Counterintelligence]] can then use the dead drop as a [[double agent]] for a variety of purposes, such as to feed [[misinformation]] to the enemy or to identify other operatives using it or ultimately to [[booby trap]] it.<ref>{{Cite journal|last=Wettering|first=Frederick L.|date=2001-07-01|title=The Internet and the Spy Business|url=https://doi.org/10.1080/08850600152386846|journal=International Journal of Intelligence and CounterIntelligence|volume=14|issue=3|pages=342β365|doi=10.1080/08850600152386846|s2cid=153870872|issn=0885-0607|url-access=subscription}}</ref> There is also the risk that a third party may find the deposited material. ==Modern techniques== {{See also|Short-range agent communications}} On January 23, 2006, the Russian [[Federal Security Service (Russia)|FSB]] accused [[foreign relations of the United Kingdom|Britain]] of using [[wireless communication|wireless]] dead drops concealed inside hollowed-out rocks ("spy rock") to collect espionage information from agents in Russia. According to the Russian authorities, the agent delivering information would approach the rock and transmit data wirelessly into it from a hand-held device, and later, his British handlers would pick up the stored data by similar means.<ref name="Guardian spies">{{cite web|first=The Guardian|title=Moscow names British 'spies' in NGO row|url=https://www.theguardian.com/world/2006/jan/23/russia.politics|access-date=8 April 2012|author=Nick Paton Walsh|website=[[TheGuardian.com]]|date=23 January 2006|archive-date=29 August 2013|archive-url=https://web.archive.org/web/20130829223313/http://www.theguardian.com/world/2006/jan/23/russia.politics|url-status=live}}</ref> ==See also== * [[Foldering]] * [[PirateBox]] * [[USB dead drop]] ==References== {{Reflist}} ==Bibliography== * [http://www.iht.com/articles/2006/01/23/news/spy.php "Russians accuse 4 Britons of spying"].International Herald Tribune. January 24, 2006. News report on Russian discovery of British "wireless dead drop". * [http://news.bbc.co.uk/2/hi/europe/4639758.stm "Old spying lives on in new ways"]. [[BBC]]. 23 January 2006. * [http://www.iht.com/articles/2006/04/27/news/spain.php Madrid suspects tied to e-mail ruse]. International Herald Tribune. April 28, 2006. * [https://archive.today/20130505091421/http://www.telegraph.co.uk/news/newstopics/politics/2307673/Military-secrets-missing-on-Ministry-of-Defence-computer-files.html?DCMP=EMC-new_19072008 Military secrets missing on Ministry of Defence computer files] * Robert Burnson, "Accused Chinese spy pleads guilty in U.S. 'dead-drop' sting", Bloomberg, 25 novembre 2019[https://www.bloomberg.com%2Fnews%2Farticles%2F2019-11-25%2Faccused-chinese-spy-in-california-pleads-not-guilty-for-now&usg=AOvVaw0rJ1T1_Fn5LK1honkMYkT5]. * [https://www.itstactical.com/gear/pass-information-like-a-spy-with-dead-drops/] * [https://www.youtube.com/watch?v=1ojcqukBfAs] * [https://www.selfdefenseproducts.com/spy-bolt/] ==Further reading== {{Wiktionary|dead drop}} * Robert Wallace and H. Keith Melton, with Henry R. Schlesinger, ''Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda'', New York, [[Dutton Penguin|Dutton]], 2008. {{ISBN|0-525-94980-1}}. {{espionage}} {{intelligence cycle management}} [[Category:Containers]] [[Category:Espionage devices]] [[Category:Espionage techniques]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:Cite journal
(
edit
)
Template:Cite web
(
edit
)
Template:Convert
(
edit
)
Template:Espionage
(
edit
)
Template:For
(
edit
)
Template:ISBN
(
edit
)
Template:Intelligence cycle management
(
edit
)
Template:Reflist
(
edit
)
Template:See also
(
edit
)
Template:Short description
(
edit
)
Template:Wiktionary
(
edit
)