Dead Letter Box
   HOME

TheInfoList



OR:

A dead drop or dead letter box is a method of
espionage Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tangib ...
tradecraft Tradecraft, within the intelligence community, refers to the techniques, methods and technologies used in modern espionage (spying) and generally, as part of the activity of intelligence assessment. This includes general topics or techniques ( ...
used to pass items or information between two individuals (e.g., a
case officer In intelligence organizations, agent handling is the management of so-called agents (called secret agents or spies in common parlance), principal agents, and agent networks (called "assets") by intelligence officers typically known as case o ...
and an
agent Agent may refer to: Espionage, investigation, and law *, spies or intelligence officers * Law of agency, laws involving a person authorized to act on behalf of another ** Agent of record, a person with a contractual agreement with an insuranc ...
, or two agents) using a secret location. By avoiding direct meetings, individuals can maintain
operational security Operations security (OPSEC) is a process that identifies critical information to determine if friendly actions can be observed by enemy intelligence, determines if information obtained by adversaries could be interpreted to be useful to them, a ...
. This method stands in contrast to the live drop, so-called because two persons meet to exchange items or information.
Spies Spies most commonly refers to people who engage in spying, espionage or clandestine operations. Spies or The Spies may also refer to: * Spies (surname), a German surname * Spies (band), a jazz fusion band * Spies (song), "Spies" (song), a song by ...
and their handlers have been known to perform dead drops using various techniques to hide items (such as money, secrets or instructions) and to signal that the drop has been made. Although the signal and location by necessity must be agreed upon in advance, the signal may or may not be located close to the dead drop itself. The operatives may not necessarily know one another or ever meet.


Considerations

The location and nature of the dead drop must enable retrieval of the hidden item without the operatives being spotted by a member of the public, the police, or other security forces—therefore, common everyday items and behavior are used to avoid arousing suspicion. Any hidden location could serve, although often a
cut-out Cut-out, cutout, or cut out may refer to: * Cutout animation * Cutout (electric power distribution), a combination fuse and knife switch used on power poles * Cutout (espionage), a mechanism used to pass information * Cut-out (philately), an impr ...
device is used, such as a loose brick in a wall, a (cut-out) library book, or a hole in a tree. A ''dead drop spike'' is a
concealment device Concealment devices or diversion safes are used to hide things for the purpose of secrecy or security. They are made from an ordinary household object such as a book, a soda can, a candle, a can, or something as small as a coin. The idea is tha ...
similar to a microcache. It has been used since the late 1960s to hide money, maps, documents,
microfilm Microforms are scaled-down reproductions of documents, typically either photographic film, films or paper, made for the purposes of transmission, storage, reading, and printing. Microform images are commonly reduced to about 4% or of the origin ...
, and other items. The spike is water- and
mildew Mildew is a form of fungus. It is distinguished from its closely related counterpart, mould, largely by its colour: moulds appear in shades of black, blue, red, and green, whereas mildew is white. It appears as a thin, superficial growth consi ...
-proof and can be pushed into the ground or placed in a shallow stream to be retrieved at a later time. Signaling devices can include a
chalk Chalk is a soft, white, porous, sedimentary carbonate rock. It is a form of limestone composed of the mineral calcite and originally formed deep under the sea by the compression of microscopic plankton that had settled to the sea floor. Ch ...
mark on a wall, a piece of
chewing gum Chewing gum is a soft, cohesive substance designed to be chewed without being swallowed. Modern chewing gum is composed of gum base, sweeteners, softeners/ plasticizers, flavors, colors, and, typically, a hard or powdered polyol coating. Its t ...
on a
lamppost A street light, light pole, lamp pole, lamppost, street lamp, light standard, or lamp standard is a raised source of light on the edge of a road or path. Similar lights may be found on a railway platform. When urban electric power distribution ...
, or a
newspaper A newspaper is a Periodical literature, periodical publication containing written News, information about current events and is often typed in black ink with a white or gray background. Newspapers can cover a wide variety of fields such as p ...
left on a park bench. Alternatively, the signal can be made from inside the agent's own home, by, for example, hanging a distinctively-colored towel from a balcony, or placing a potted plant on a window sill where it is visible to anyone on the street.


Drawbacks

While the dead drop method is useful in preventing the instantaneous capture of either an operative/ handler pair or an entire espionage network, it is not without disadvantages. If one of the operatives is compromised, they may reveal the location and signal for that specific dead drop.
Counterintelligence Counterintelligence is an activity aimed at protecting an agency's intelligence program from an opposition's intelligence service. It includes gathering information and conducting activities to prevent espionage, sabotage, assassinations or ...
can then use the dead drop as a
double agent In the field of counterintelligence, a double agent is an employee of a secret intelligence service for one country, whose primary purpose is to spy on a target organization of another country, but who is now spying on their own country's organ ...
for a variety of purposes, such as to feed
misinformation Misinformation is incorrect or misleading information. It differs from disinformation, which is ''deliberately'' deceptive. Rumors are information not attributed to any particular source, and so are unreliable and often unverified, but can turn ...
to the enemy or to identify other operatives using it or ultimately to booby trap it. There is also the risk that a third party may find the material deposited.


Modern techniques

On January 23, 2006, the Russian FSB accused
Britain Britain most often refers to: * The United Kingdom, a sovereign state in Europe comprising the island of Great Britain, the north-eastern part of the island of Ireland and many smaller islands * Great Britain, the largest island in the United King ...
of using
wireless Wireless communication (or just wireless, when the context allows) is the transfer of information between two or more points without the use of an electrical conductor, optical fiber or other continuous guided medium for the transfer. The most ...
dead drops concealed inside hollowed-out rocks ("spy rock") to collect espionage information from agents in Russia. According to the Russian authorities, the agent delivering information would approach the rock and transmit data wirelessly into it from a hand-held device, and later, his British handlers would pick up the stored data by similar means.
SecureDrop SecureDrop is a free software platform for secure communication between journalists and sources (whistleblowers). It was originally designed and developed by Aaron Swartz and Kevin Poulsen under the name ''DeadDrop''. James Dolan also co-create ...
, initially called DeadDrop, is a software suite for teams that allows them to create a digital dead drop location to receive tips from whistleblowers through the Internet. The team members and whistleblowers never communicate directly and never know each other's identity, therefore allowing whistleblowers to dead-drop information despite the mass surveillance and privacy violations which had become commonplace in the beginning of the twenty-first century.


See also

*
Espionage Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tangib ...
*
Foldering Foldering is the practice of communicating via messages saved to the "drafts" folder of an email or other electronic messaging account that is accessible by multiple people. The messages are never actually sent. Foldering has been described as a di ...
*
PirateBox A PirateBox is a portable electronic device, often consisting of a Wi-Fi router and a device for storing information, creating a wireless network that allows users who are connected to share files anonymously and locally. By design, this devic ...
*
USB dead drop A USB dead drop is a USB mass storage device installed in a public space. For example, a USB flash drive might be mounted in an outdoor brick wall and fixed in place with fast concrete. Members of the public are implicitly invited to find files, ...


References


Bibliography


"Russians accuse 4 Britons of spying"
International Herald Tribune. January 24, 2006. News report on Russian discovery of British "wireless dead drop".
"Old spying lives on in new ways"
BBC #REDIRECT BBC #REDIRECT BBC Here i going to introduce about the best teacher of my life b BALAJI sir. He is the precious gift that I got befor 2yrs . How has helped and thought all the concept and made my success in the 10th board exam. ...
...
. 23 January 2006.
Madrid suspects tied to e-mail ruse
International Herald Tribune. April 28, 2006.

* Robert Burnson, "Accused Chinese spy pleads guilty in U.S. 'dead-drop' sting", Bloomberg, 25 novembre 20


Further reading

* Robert Wallace and H. Keith Melton, with Henry R. Schlesinger, ''Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda'', New York, Dutton Penguin, Dutton, 2008. . {{intelligence cycle management Espionage devices Espionage techniques