Dead drop

Last updated
This (replacement) mailbox is identical to the one, and in the same location that convicted spy Aldrich Ames used to signal his Russian counterparts. Ames would place a horizontal chalk mark about 3" long above the USPS logo. Aldrich Ames mailbox.jpg
This (replacement) mailbox is identical to the one, and in the same location that convicted spy Aldrich Ames used to signal his Russian counterparts. Ames would place a horizontal chalk mark about 3" long above the USPS logo.

A dead drop or dead letter box is a method of espionage tradecraft used to pass items or information between two individuals (e.g., a case officer and an agent, or two agents) using a secret location. By avoiding direct meetings, individuals can maintain operational security. This method stands in contrast to the live drop, so-called because two persons meet to exchange items or information.

Contents

Spies and their handlers have been known to perform dead drops using various techniques to hide items (such as money, secrets or instructions) and to signal that the drop has been made. Although the signal and location by necessity must be agreed upon in advance, the signal may or may not be located close to the dead drop itself. The operatives may not necessarily know one another or ever meet. [1] [2]

Considerations

The location and nature of the dead drop must enable retrieval of the hidden item without the operatives being spotted by a member of the public, the police, or other security forces—therefore, common everyday items and behavior are used to avoid arousing suspicion. Any hidden location could serve.

Dead drop spike "Dead" Drop Spike - Flickr - The Central Intelligence Agency.jpg
Dead drop spike

A dead drop spike is a concealment device similar to a microcache. It has been used since the late 1960s to hide money, maps, documents, microfilm, and other items. The spike is water- and mildew-proof and can be pushed into the ground or placed in a shallow stream to be retrieved at a later time.

Signaling devices can include a chalk mark on a wall, a piece of chewing gum on a lamppost, or a newspaper left on a park bench. Alternatively, the signal can be made from inside the agent's own home, by, for example, hanging a distinctively-colored towel from a balcony, or placing a potted plant on a window sill where it is visible to anyone on the street.

Drawbacks

While the dead drop method is useful in preventing the instantaneous capture of either an operative/handler pair or an entire espionage network, it is not without disadvantages. If one of the operatives is compromised, they may reveal the location and signal for that specific dead drop. Counterintelligence can then use the dead drop as a double agent for a variety of purposes, such as to feed misinformation to the enemy or to identify other operatives using it or ultimately to booby trap it. [3] There is also the risk that a third party may find the material deposited.

Modern techniques

On January 23, 2006, the Russian FSB accused Britain of using wireless dead drops concealed inside hollowed-out rocks ("spy rock") to collect espionage information from agents in Russia. According to the Russian authorities, the agent delivering information would approach the rock and transmit data wirelessly into it from a hand-held device, and later, his British handlers would pick up the stored data by similar means. [4]

SecureDrop, initially called DeadDrop, is a software suite for teams that allows them to create a digital dead drop location to receive tips from whistleblowers through the Internet. The team members and whistleblowers never communicate directly and never know each other's identity, thereby allowing whistleblowers to dead-drop information despite the mass surveillance and privacy violations which had become commonplace in the beginning of the twenty-first century.

See also

Related Research Articles

<span class="mw-page-title-main">Espionage</span> Clandestine acquisition of confidential information

Espionage, spying, or intelligence gathering is the act of obtaining secret or confidential information (intelligence). A person who commits espionage is called an espionage agent or spy. Any individual or spy ring, in the service of a government, company, criminal organization, or independent operation, can commit espionage. The practice is clandestine, as it is by definition unwelcome. In some circumstances, it may be a legal tool of law enforcement and in others, it may be illegal and punishable by law.

A numbers station is a shortwave radio station characterized by broadcasts of formatted numbers, which are believed to be addressed to intelligence officers operating in foreign countries. Most identified stations use speech synthesis to vocalize numbers, although digital modes such as phase-shift keying and frequency-shift keying, as well as Morse code transmissions, are not uncommon. Most stations have set time schedules, or schedule patterns; however, some appear to have no discernible pattern and broadcast at random times. Stations may have set frequencies in the high-frequency band.

<span class="mw-page-title-main">Robert Hanssen</span> American double agent spy (1944–2023)

Robert Philip Hanssen was an American Federal Bureau of Investigation (FBI) agent who spied for Soviet and Russian intelligence services against the United States from 1979 to 2001. His espionage was described by the Department of Justice as "possibly the worst intelligence disaster in U.S. history".

<span class="mw-page-title-main">GRU (Russian Federation)</span> Russian military intelligence agency

The Main Directorate of the General Staff of the Armed Forces of the Russian Federation, formerly the Main Intelligence Directorate, and still commonly known by its previous abbreviation GRU, is the foreign military intelligence agency of the General Staff of the Armed Forces of the Russian Federation. The GRU controls the military intelligence service and maintains its own special forces units.

<span class="mw-page-title-main">Directorate-General for External Security</span> Frances external intelligence agency

The Directorate-General for External Security is France's foreign intelligence agency, equivalent to the British MI6 and the American CIA, established on 2 April 1982. The DGSE safeguards French national security through intelligence gathering and conducting paramilitary and counterintelligence operations abroad, as well as economic espionage. It is headquartered in the 20th arrondissement of Paris.

A sleeper agent is a spy or operative who is placed in a target country or organization, not to undertake an immediate mission, but instead to act as a potential asset on short notice if activated. Even if not activated, the "sleeper agent" is still an asset and can still play an active role in sedition, espionage, or possibly treason by virtue of agreeing to act if activated. A team of sleeper agents may be referred to as a sleeper cell. A sleeper cell or agent may possibly be working with others in a clandestine cell system.

<span class="mw-page-title-main">Oleg Penkovsky</span> British spy in the USSR (1919–1963)

Oleg Vladimirovich Penkovsky, codenamed Hero and Yoga was a Soviet military intelligence (GRU) colonel during the late 1950s and early 1960s. Penkovsky informed the United States and the United Kingdom about Soviet military secrets, including the appearance and footprint of Soviet intermediate-range ballistic missile installations and the weakness of the Soviet intercontinental ballistic missile program. This information was decisive in allowing the US to recognize that the Soviets were placing missiles in Cuba before most of them were operational. It also gave US President John F. Kennedy, during the Cuban Missile Crisis that followed, valuable information about Soviet weakness that allowed him to face down Soviet leader Nikita Khrushchev and resolve the crisis without a nuclear war.

<span class="mw-page-title-main">International Spy Museum</span> Museum in Washington, D.C., United States

The International Spy Museum is an independent non-profit history museum which documents the tradecraft, history, and contemporary role of espionage. It holds the largest collection of international espionage artifacts on public display. The museum opened in 2002 in the Penn Quarter neighborhood of Washington, D.C., and relocated to L'Enfant Plaza in 2019.

<i>The Falcon and the Snowman</i> 1985 film by John Schlesinger

The Falcon and the Snowman is a 1985 American spy drama film directed by John Schlesinger. The screenplay by Steven Zaillian is based on the 1979 book The Falcon and the Snowman: A True Story of Friendship and Espionage by Robert Lindsey, and tells the true story of two young American men, Christopher Boyce and Andrew Daulton Lee, who sold US security secrets to the Soviet Union.

The Office of Technical Service is a component of the U.S. Central Intelligence Agency, responsible for supporting CIA's clandestine operations with gadgets, disguises, forgeries, secret writings, and weapons. The OTS traces its history to October 1942, when OSS director William J. Donovan created the OSS Research and Development Branch, a technical group tasked with creating "dirty tricks and deadly weapons" to combat the US's World War II enemies. Donovan named Cornell University-trained chemist and executive Stanley Platt Lovell as the branch's first head, a man whom the CIA remembers as the "founding father" of the OTS. In the 1950s and early 1960s it also researched, investigated, and experimented with the use of drugs, chemicals, hypnosis, and isolation to extract information during interrogation, as well as to make it easier for American captives to resist interrogation. OTS is part of CIA's Directorate of Science and Technology.

<span class="mw-page-title-main">Tradecraft</span> Espionage techniques

Tradecraft, within the intelligence community, refers to the techniques, methods, and technologies used in modern espionage (spying) and generally as part of the activity of intelligence assessment. This includes general topics or techniques, or the specific techniques of a nation or organization.

<span class="mw-page-title-main">Bill Weisband</span> American spy

William Weisband, Sr. was a Ukrainian-American cryptanalyst and NKVD agent, best known for his role in revealing U.S. decryptions of Soviet diplomatic and intelligence codes to Soviet intelligence.

H. Keith Melton is a graduate of the U.S. Naval Academy, an intelligence historian, and a specialist in clandestine technology and espionage tradecraft. Melton is the author of many spy books. He also is a founding member of the Board of Directors for the International Spy Museum in Washington, D.C.

Geoffrey Arthur Prime is a former British spy who worked for the Royal Air Force as well as the Government Communications Headquarters (GCHQ). While working for these organizations, Prime disclosed information to the Soviet Union. He was convicted in the early 1980s under charges of espionage and child sexual abuse. He was sentenced to a total of 38 years imprisonment, but was released from prison in 2001.

<span class="mw-page-title-main">Special Collection Service</span> Classified joint CIA–NSA program to insert eavesdropping equipment in difficult places

The Special Collection Service (SCS), codenamed F6, is a highly classified joint U.S. Central Intelligence Agency–National Security Agency program charged with inserting eavesdropping equipment in difficult-to-reach places, such as foreign embassies, communications centers, and foreign government installations. Established in the late 1970s and headquartered in Beltsville, Maryland, the SCS has been involved in operations ranging from the Cold War to the Global War on Terrorism.

The Clandestine HUMINT page adheres to the functions within the discipline, including espionage and active counterintelligence.

<span class="mw-page-title-main">John Kiriakou</span> American counter-terrorism consultant

John Chris Kiriakou is an American author, journalist and former intelligence officer. Kiriakou is a columnist with Reader Supported News and co-host of Political Misfits on Sputnik Radio.

<span class="mw-page-title-main">Central Intelligence Agency Directorate of Science & Technology</span>

The Directorate of Science & Technology (DS&T) is the branch of the United States Central Intelligence Agency (CIA) tasked with collecting and analyzing information through technological means and developing technical systems in order to advance the CIA’s intelligence gathering.

Cyber spying, cyber espionage, or cyber-collection is the act or practice of obtaining secrets and information without the permission and knowledge of the holder of the information using methods on the Internet, networks or individual computers through the use of proxy servers, cracking techniques and malicious software including Trojan horses and spyware. Cyber espionage can be used to target various actors- individuals, competitors, rivals, groups, governments, and others- in order to obtain personal, economic, political or military advantages. It may wholly be perpetrated online from computer desks of professionals on bases in far away countries or may involve infiltration at home by computer trained conventional spies and moles or in other cases may be the criminal handiwork of amateur malicious hackers and software programmers.

Short range agent communications (SRAC) are one-way or two-way short-range wireless communications used for intelligence purposes. This communications technology became possible with the arrival of the transistor and small scale integrated circuits. In the late 2000s computer WiFi technology and USB Flash Drives had evolved into technologies that ordinary people can buy – yet can be used in a similar way to SRAC systems.

References

  1. Robert Wallace and H. Keith Melton, with Henry R. Schlesinger, Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda, New York, Dutton, 2008. ISBN 0-525-94980-1. Pp. 43-44, 63, and 74-76.
  2. Jack Barth, International Spy Museum Handbook of Practical Spying, Washington DC, National Geographic, 2004. ISBN 978-0-7922-6795-9. Pp. 119-125.
  3. Wettering, Frederick L. (2001-07-01). "The Internet and the Spy Business". International Journal of Intelligence and CounterIntelligence. 14 (3): 342–365. doi:10.1080/08850600152386846. ISSN   0885-0607. S2CID   153870872.
  4. Nick Paton Walsh, The Guardian (23 January 2006). "Moscow names British 'spies' in NGO row". TheGuardian.com . Archived from the original on 29 August 2013. Retrieved 8 April 2012.

Bibliography

Further reading