- Dead drop
-
A dead drop or dead letter box is a method of espionage tradecraft used to pass items between two individuals by using a secret location and thus does not require them to meet directly. Using a dead drop permits a Case Officer and his Agent to exchange objects and information while maintaining operational security. The method stands in contrast to the live drop, so called because two persons meet to exchange items or information.
Contents
Overview
Spies have been known to use dead drops, using various techniques to hide items (such as money, secrets or instructions) and to signal that the drop has been made.
The system involves using signals and locations which have been agreed upon in advance. These signals and locations must be common everyday things to which most people would not give a second glance. The signal may or may not be located close to the dead drop itself.
The location of the dead drop could be a loose brick in a wall, a library book, a hole in a tree, or under a boulder etc. It should be something common and from which the items can be 'picked up' without the operatives being seen by a member of the public or the security forces who may be watching.
The signaling devices can include a chalk mark on a wall, a piece of chewing-gum on a lamppost, a newspaper left on a park bench etc. Alternatively, the signal can be made from inside the agent's own home e.g. hanging a distinctively colored towel from a balcony, or placing a potted plant on a window sill where it is visible to anyone on the street.
Aldrich Ames left chalk marks on a mail box located at 37th and R Streets NW in Washington, D.C. to signal his Russian handlers that he had made a dead drop. The number of marks on the box prompted some local residents to speculate, somewhat jokingly, that it was used by spies.[citation needed]
The dead drop is often used as a cut-out device. In this use the operatives who use the device to communicate or exchange materials or information do not know one another and should never see one another. While this type of device is useful in preventing the capture of an entire espionage network it is not foolproof. If the lower level operative is compromised he or she may reveal the location and signal for the use of the dead drop. Then the counter espionage agents simply use the signal to indicate that the dead drop is ready for pickup. They then keep the spot under continuous surveillance until it is picked up. They can then capture the operative who picked up the material from the dead drop.
The dead drop spike is a concealment device similar to a microcache which has been used since the late 1960s to hide money, maps, documents, microfilm, and other items. The spike is waterproof and mildew-proof and can be shoved into the ground or placed in a shallow stream to be retrieved at a later time.
Modern dead drop techniques
On January 23, 2006, the Russian FSB accused Britain of using wireless dead drops concealed inside hollowed-out rocks to collect espionage information from agents in Russia. According to the Russian authorities, the agent delivering information would approach the rock and transmit data wirelessly into it from a hand-held device, and later his British handlers would pick up the stored data by similar means.
See also
- Espionage
- Dead Drop (USB)
References
- "Russians accuse 4 Britons of spying".International Herald Tribune. January 24, 2006. News report on Russian discovery of British "wireless dead drop".
- "Old spying lives on in new ways". BBC. 23 January 2006.
- Madrid suspects tied to e-mail ruse. International Herald Tribune. April 28, 2006.
- Military secrets missing on Ministry of Defence computer files
Further reading
- Robert Wallace and H. Keith Melton, with Henry R. Schlesinger, Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda, New York, Dutton, 2008. ISBN 0525949801.
Espionage Agent handling · Asset · Black operation · Black bag operation · Concealment device · Cryptography · Cut-out · Dead drop · Eavesdropping · False flag · Industrial espionage · Intelligence assessment · Interrogation · Numbers station · One-way voice link · Official cover · Non-official cover · Resident spy · Steganography · SurveillanceIntelligence cycle management Intelligence
collection
managementHuman
Intelligence
(HUMINT)Clandestine HUMINT (recruiting · operational techniques · Covert action · Direct action · Clandestine cell system)
Special reconnaissance (organizations)
Espionage (Agent handling · Asset · Black operation · Black bag operation · Concealment device · Cryptography · Cut-out · Dead drop · Eavesdropping · False flag · Industrial espionage · Intelligence assessment · Interrogation · Numbers station · One-way voice link · Official cover · Non-official cover · Resident spy · Steganography · Surveillance)Signals
Intelligence
(SIGINT)Measurement
and Signature
Intelligence
(MASINT)Others Open source intelligence (OSINT) · Imagery intelligence (IMINT) · Geospatial intelligence (GEOINT) · /Financial intelligence (FININT) · Technical intelligence (TECHINT) · Market Intelligence (MARKINT)Intelligence
analysis
managementIntelligence
dissemination
managementCategories:- Automatic identification and data capture
- Espionage devices
- Espionage techniques
- Espionage terminology
- Radio-frequency identification
Wikimedia Foundation. 2010.