HOME

TheInfoList



OR:

A USB dead drop is a
USB Universal Serial Bus (USB) is an industry standard that establishes specifications for cables, connectors and protocols for connection, communication and power supply (interfacing) between computers, peripherals and other computers. A broad v ...
mass storage device installed in a
public space A public space is a place that is open and accessible to the general public. Roads (including the pavement), public squares, parks, and beaches are typically considered public space. To a limited extent, government buildings which are open to ...
. For example, a
USB flash drive A USB flash drive (also called a thumb drive) is a data storage device that includes flash memory with an integrated USB interface. It is typically removable, rewritable and much smaller than an optical disc. Most weigh less than . Since firs ...
might be mounted in an outdoor brick wall and fixed in place with fast concrete. Members of the public are implicitly invited to find files, or leave files, on a dead drop by directly plugging their
laptop A laptop, laptop computer, or notebook computer is a small, portable personal computer (PC) with a screen and alphanumeric keyboard. Laptops typically have a clam shell form factor with the screen mounted on the inside of the upper li ...
into the wall-mounted
USB stick A USB flash drive (also called a thumb drive) is a data storage device that includes flash memory with an integrated USB interface. It is typically removable, rewritable and much smaller than an optical disc. Most weigh less than . Since first ...
in order to transfer data. (It is also possible to use
smartphone A smartphone is a portable computer device that combines mobile telephone and computing functions into one unit. They are distinguished from feature phones by their stronger hardware capabilities and extensive mobile operating systems, whic ...
s and
tablet Tablet may refer to: Medicine * Tablet (pharmacy), a mixture of pharmacological substances pressed into a small cake or bar, colloquially called a "pill" Computing * Tablet computer, a mobile computer that is primarily operated by touching the s ...
s for this purpose, by utilizing a
USB on-the-go USB On-The-Go (USB OTG or just OTG) is a specification first used in late 2001 that allows USB devices, such as Tablet computer, tablets or smartphones, to act as a host, allowing other USB devices, such as USB flash drives, digital cameras, co ...
cable.) The dead drops can therefore be regarded as an anonymous, offline,
peer-to-peer file sharing Peer-to-peer file sharing is the distribution and sharing of digital media using peer-to-peer (P2P) networking technology. P2P file sharing allows users to access media files such as books, music, movies, and games using a P2P software program tha ...
network. However, in practice USB dead drops are often used for social or artistic reasons, rather than for practical ones.


Background and history

The Dead Drops project was conceived by
Berlin Berlin ( , ) is the capital and largest city of Germany by both area and population. Its 3.7 million inhabitants make it the European Union's most populous city, according to population within city limits. One of Germany's sixteen constitue ...
-based conceptual artist
Aram Bartholl Aram Bartholl (born December 27, 1972 in Bremen, Germany) is a Berlin-based conceptual artist known for his examination of the relationship between the digital and physical world. His works often deal with anonymity and privacy. Aram Bartholl is ...
, a member of New York's F.A.T. Lab art and technology collective. The first USB dead drop network of five devices was started by Bartholl in October 2010 in
Brooklyn Brooklyn () is a borough of New York City, coextensive with Kings County, in the U.S. state of New York. Kings County is the most populous county in the State of New York, and the second-most densely populated county in the United States, be ...
,
New York City New York, often called New York City or NYC, is the List of United States cities by population, most populous city in the United States. With a 2020 population of 8,804,190 distributed over , New York City is also the L ...
. The name comes from the
dead drop A dead drop or dead letter box is a method of espionage tradecraft used to pass items or information between two individuals (e.g., a case officer and an agent, or two agents) using a secret location. By avoiding direct meetings, individuals ca ...
method of
espionage Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence) from non-disclosed sources or divulging of the same without the permission of the holder of the information for a tangibl ...
communication. An unrelated system called "deadSwap", in which participants use an SMS gateway to coordinate passing USB memory sticks on to one another, was begun in
Germany Germany,, officially the Federal Republic of Germany, is a country in Central Europe. It is the second most populous country in Europe after Russia, and the most populous member state of the European Union. Germany is situated betwe ...
in 2009. Each dead drop is typically installed without any data on the drive, except two files: deaddrops-manifesto.txt, and a
readme.txt ''README.txt: A Memoir'' is a 2022 memoir by Chelsea Manning. It covers her early life, experience as a soldier in the U.S. Army, and life and imprisonment after she Chelsea Manning#Publication of leaked material, leaked classified information ...
file explaining the project. Although typically found in urban areas embedded in concrete or brick since 2010, installation of USB dead drop into trees and other types of bodies in natural settings has also been mentioned since at least 2013.
Wireless Wireless communication (or just wireless, when the context allows) is the transfer of information between two or more points without the use of an electrical conductor, optical fiber or other continuous guided medium for the transfer. The most ...
dead drops such as the 2011
PirateBox A PirateBox is a portable electronic device, often consisting of a Wi-Fi router and a device for storing information, creating a wireless network that allows users who are connected to share files anonymously and locally. By design, this devic ...
, where the user connects to a
Wi-Fi hotspot A hotspot is a physical location where people can obtain Internet access, typically using Wi-Fi technology, via a wireless local-area network (WLAN) using a router connected to an Internet service provider. Public hotspots may be created by ...
with local storage rather than physically connects to a USB device, have also been created.


Comparison to other types of data transfer

Some of the advantages of utilizing USB dead drops are practical in nature: they permit
P2P P2P may refer to: * Pay to play, where money is exchanged for services * Peer-to-peer, a distributed application architecture in computing or networking ** List of P2P protocols * Phenylacetone, an organic compound commonly known as P2P * Poin ...
file sharing without needing any internet or cellular connection, sharing files with another person secretly/anonymously, and they record no
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
or similar
personally identifying information Personal data, also known as personal information or personally identifiable information (PII), is any information related to an identifiable person. The abbreviation PII is widely accepted in the United States, but the phrase it abbreviates ha ...
. Other benefits are more social or artistic in nature: USB dead drops are an opportunity to practice " datalove" and can be seen as a way to promote
off-grid Off-the-grid or off-grid is a characteristic of buildings and a lifestyle designed in an independent manner without reliance on one or more public utilities. The term "off-the-grid" traditionally refers to not being connected to the electrical gr ...
data networks. The motive to utilize USB dead drops has been compared to what drives people involved in
geocaching Geocaching is an outdoor recreational activity, in which participants use a Global Positioning System (GPS) receiver or mobile device and other navigational techniques to hide and seek containers, called "geocaches" or "caches", at specific l ...
, which has been around for much longer and is somewhat similar in that often a set of GPS coordinates is used to locate a particular USB dead drop, in particular that USB dead drops give the user "the thrill of discovery" both in seeking out the location of the dead drop, and then also in addition when examining the data it contains. A
QR-Code A QR code (an initialism for quick response code) is a type of matrix barcode (or two-dimensional barcode) invented in 1994 by the Japanese company Denso Wave. A barcode is a machine-readable optical label that can contain information about th ...
dead drop including the data in the QR Code image or pointing to a decentral storage is an alternative and less risky option to a physical USB dead drop as long as people cover their
IP address An Internet Protocol address (IP address) is a numerical label such as that is connected to a computer network that uses the Internet Protocol for communication.. Updated by . An IP address serves two main functions: network interface ident ...
.


Potential drawbacks to users

Dead drops are USB-based devices, which must be connected to an upstream computer system (laptop or smartphone or similar). The act of making such a connection, to a device which is not necessarily trusted, inherently poses certain threats: *
Malware Malware (a portmanteau for ''malicious software'') is any software intentionally designed to cause disruption to a computer, server, client, or computer network, leak private information, gain unauthorized access to information or systems, depri ...
: anyone can intentionally or unintentionally store malware on it that can infect an attached computer with malware such as a
trojan horse The Trojan Horse was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer's ''Iliad'', with the poem ending before the war is concluded, ...
,
keylogger Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that a person using the keyboard is unaware that their actions are being monitored ...
or
proprietary firmware Proprietary firmware is any firmware on which is not free (libre). Examples of proprietary works include ones upon which the author has placed restrictions on use, private modification, copying, or republishing. Proprietors may enforce restrict ...
. This risk can be mitigated by using
antivirus software Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware. Antivirus software was originally developed to detect and remove computer viruses, hence the nam ...
, or by using a throwaway device for the act of data-transfer. *
Booby trap A booby trap is a device or setup that is intended to kill, harm or surprise a human or another animal. It is triggered by the presence or actions of the victim and sometimes has some form of bait designed to lure the victim towards it. The trap m ...
: a fake dead drop or USB Killer might be rigged up to electrically damage any equipment connected to it, and/or constitute a health and safety hazard for potential users. This risk can be mitigated by using a USB
galvanic isolation Galvanic isolation is a principle of isolating functional sections of electrical systems to prevent current flow; no direct conduction path is permitted.John Huntington ''Show Networks and Control Systems: Formerly Control Systems for Live E ...
adapter, which allows data exchange while physically decoupling the two circuits. Wifi-based dead drops do not suffer from this threat. * Mugging: because a USB dead drop is normally in a public or quasi-public location, it is possible for the location itself to be watched, and users of the dead drop to be physically attacked when they attempt to use the system. (Compare with the risk of being mugged at night near an ATM outside a bank which is higher than the risk of being mugged during the day at the teller window inside the bank. Thieves target ATM users because they know most people are withdrawing money, which can then be stolen; thieves can also target USB dead drops, because they know that using one requires a laptop or similar
consumer electronics Consumer electronics or home electronics are electronic (analog or digital) equipment intended for everyday use, typically in private homes. Consumer electronics include devices used for entertainment, communications and recreation. Usually r ...
device.)


Drawbacks to the system infrastructure

Publicly and privately available USB dead drops give anyone (with physical access) the ability to save and transfer data anonymously and free of charge. These features are advantages over
the internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
and the
cellular network A cellular network or mobile network is a communication network where the link to and from end nodes is wireless. The network is distributed over land areas called "cells", each served by at least one fixed-location transceiver (typically thre ...
, which are at best quasi-anonymous and low-cost (there is always some fee associated although in certain scenarios such as government-subsidized or employer-subsidized or public-library-subsidized network access the end user may experience no direct costs). However, offline networks are vulnerable to various types of threats and disadvantages, relative to online ones: * One device at a time: Users cannot plug in to a USB dead drop if someone else is already plugged in * Removal of stored data: anyone with physical access can erase all of the data held within the USB dead drop (via
file deletion File deletion is the removal of a computer file, file from a computer's file system. All operating systems include commands for deleting files (rm (Unix), rm on Unix, del (command), era in CP/M and DR-DOS, del (command), del/del (command), eras ...
or
disk formatting Disk formatting is the process of preparing a data storage device such as a hard disk drive, solid-state drive, floppy disk, memory card or USB flash drive for initial use. In some cases, the formatting operation may also create one or more new fil ...
), or make it unusable by encrypting the data of the whole drive and hiding the key (see also the related topic of
ransomware Ransomware is a type of malware from cryptovirology that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid off. While some simple ransomware may lock the system without damaging any files, ...
). * Removal of the entire device: thieves can steal the USB drive itself. * Disclosure: anyone can disclose the location of a (formerly) private dead drop, by shadowing people that use it, and publishing coordinates in a public fashion. This impacts the anonymous nature of USB dead drops, since known drops can be filmed or otherwise observed. *
Vandalism Vandalism is the action involving deliberate destruction of or damage to public or private property. The term includes property damage, such as graffiti and defacement directed towards any property without permission of the owner. The term f ...
of the dead drop by physical destruction: anyone with physical access can destroy the dead drop by using for instance
pliers Pliers are a hand tool used to hold objects firmly, possibly developed from tongs used to handle hot metal in Bronze Age Europe. They are also useful for bending and physically compressing a wide range of materials. Generally, pliers consist ...
or a
hammer A hammer is a tool, most often a hand tool, consisting of a weighted "head" fixed to a long handle that is swung to deliver an impact to a small area of an object. This can be, for example, to drive nails into wood, to shape metal (as w ...
, by high voltage from a static field, with high temperature from a blowtorch, or other methods of physical force. It is possible to make the USB key more difficult to vandalize or to extract, by sealing it in a hole deeper than the length of the USB key (at least 2 cm more), but this requires legitimate users to connect with a USB extender cable. For clarity, sometimes the installation of the dead-drop can itself be vandalism of the building; when a building owner destroys a dead drop placed without permission, they are not vandalizing the dead drop, but removing a device placed without their leave. Even when a device is placed legally, the device itself is vulnerable to third-party vandalism. * Exposure to the elements: dead drops tend to be exposed to rain and snow, which will presumably reduce their service lifetime. *
Demolition Demolition (also known as razing, cartage, and wrecking) is the science and engineering in safely and efficiently tearing down of buildings and other artificial structures. Demolition contrasts with deconstruction, which involves taking a ...
or damage during maintenance: certain dead drop locations are limited to the lifespan of public structures. When a dead drop is embedded in a brick wall, the drop can be destroyed when the wall is destroyed. When a drop is embedded in a concrete sidewalk, the drop can be destroyed by sidewalk-related construction and maintenance. Sometimes dead drops are damaged when walls are repainted.


Prevalence

As of 2013, there were more than one thousand known USB dead drops (plus six known wifi-based dead drops). Countries which have large numbers of USB dead drops include the
United States The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 states, a federal district, five major unincorporated territorie ...
and several in
Europe Europe is a large peninsula conventionally considered a continent in its own right because of its great physical size and the weight of its history and traditions. Europe is also considered a Continent#Subcontinents, subcontinent of Eurasia ...
. As of 2016, it was estimated that the overall dead drop infrastructure contained more than ten
terabyte The byte is a units of information, unit of digital information that most commonly consists of eight bits. Historically, the byte was the number of bits used to encode a single character (computing), character of text in a computer and for this ...
s of storage capacity, with the majority still in the United States and Europe, but also with significant numbers of devices reportedly installed in the
Asia Asia (, ) is one of the world's most notable geographical regions, which is either considered a continent in its own right or a subcontinent of Eurasia, which shares the continental landmass of Afro-Eurasia with Africa. Asia covers an area ...
/
Pacific The Pacific Ocean is the largest and deepest of Earth's five oceanic divisions. It extends from the Arctic Ocean in the north to the Southern Ocean (or, depending on definition, to Antarctica) in the south, and is bounded by the continen ...
region,
South America South America is a continent entirely in the Western Hemisphere and mostly in the Southern Hemisphere, with a relatively small portion in the Northern Hemisphere at the northern tip of the continent. It can also be described as the southe ...
, and
Africa Africa is the world's second-largest and second-most populous continent, after Asia in both cases. At about 30.3 million km2 (11.7 million square miles) including adjacent islands, it covers 6% of Earth's total surface area ...
.


See also

*
Dead drop A dead drop or dead letter box is a method of espionage tradecraft used to pass items or information between two individuals (e.g., a case officer and an agent, or two agents) using a secret location. By avoiding direct meetings, individuals ca ...
*
Sneakernet Sneakernet, also called sneaker net, is an informal term for the transfer of electronic information by physically moving media such as magnetic tape, floppy disks, optical discs, USB flash drives or external hard drives between computers, rather ...
*
Geocache Geocaching is an outdoor recreational activity, in which participants use a Global Positioning System (GPS) receiver or mobile device and other navigational techniques to hide and seek containers, called "geocaches" or "caches", at specific l ...
*
File sharing File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Common methods of storage, transmission and dispersion include r ...
*
Technological utopianism Technological utopianism (often called techno-utopianism or technoutopianism) is any ideology based on the premise that advances in science and technology could and should bring about a utopia, or at least help to fulfill one or another utopian i ...


References


External links

* {{Internet censorship circumvention technologies File sharing USB Computer art Repurposing Conceptual art