World Library  
Flag as Inappropriate
Email this Article

Dead drop

Article Id: WHEBN0000655639
Reproduction Date:

Title: Dead drop  
Author: World Heritage Encyclopedia
Language: English
Subject: Espionage, Concealment device, Cut-out (espionage), Clandestine HUMINT operational techniques, USB dead drop
Collection: Espionage Devices, Espionage Techniques
Publisher: World Heritage Encyclopedia

Dead drop

A dead drop or dead letter box is a method of espionage tradecraft used to pass items or information between two individuals (e.g., a case officer and agent, or two agents) using a secret location, thus not requiring them to meet directly and thereby maintaining operational security. The method stands in contrast to the live drop, so called because two persons meet to exchange items or information.


  • Overview 1
  • Considerations 2
  • Drawbacks 3
  • Modern techniques 4
  • See also 5
  • References 6
  • Bibliography 7
  • Further reading 8


Spies (covert intelligence agents) and their handlers have been known to perform dead drops using various techniques to hide items (such as money, secrets or instructions), and to signal that the drop has been made. Although the signal and location by necessity must be agreed upon in advance, the signal may or may not be located close to the dead drop itself, and the operatives may not necessarily know one another or ever meet.


The location and nature of the dead drop must enable retrieval of the hidden item without the operatives being spotted by a member of the public, the police, or other security forces—therefore, common everyday items and behavior are used to avoid arousing suspicion. Any hidden location could serve, although often a cut-out device is used, such as a loose brick in a wall, a (cut-out) library book, or a hole in a tree.

Dead drop spike

The dead drop spike is a concealment device similar to a microcache. It has been used since the late 1960s to hide money, maps, documents, microfilm, and other items. The spike is water- and mildew-proof and can be pushed into the ground or placed in a shallow stream to be retrieved at a later time.

Signaling devices can include a chalk mark on a wall, a piece of chewing-gum on a lamppost, or a newspaper left on a park bench. Alternately, the signal can be made from inside the agent's own home, by, for example, hanging a distinctively-colored towel from a balcony, or placing a potted plant on a window sill where it is visible to anyone on the street. Convicted CIA mole and Soviet spy Aldrich Ames left chalk marks on a mail box in Washington, D.C. to signal his Russian handlers that he had made a dead drop.


While the dead drop method is useful in preventing the instantaneous capture of either an operative/handler pair or an entire espionage network, it is not foolproof. If one of the operatives is compromised, they may reveal the location and signal for that specific dead drop. Counterintelligence can then use the signal while keeping the location under surveillance, and may capture the other operative.

Modern techniques

On January 23, 2006, the Russian FSB accused Britain of using wireless dead drops concealed inside hollowed-out rocks to collect espionage information from agents in Russia. According to the Russian authorities, the agent delivering information would approach the rock and transmit data wirelessly into it from a hand-held device, and later his British handlers would pick up the stored data by similar means.[1]

See also


  1. ^ Nick Paton Walsh, The Guardian (23 January 2006). "Moscow names British 'spies' in NGO row". Retrieved 8 April 2012. 


  • "Russians accuse 4 Britons of spying".International Herald Tribune. January 24, 2006. News report on Russian discovery of British "wireless dead drop".
  • "Old spying lives on in new ways". BBC. 23 January 2006.
  • Madrid suspects tied to e-mail ruse. International Herald Tribune. April 28, 2006.
  • Military secrets missing on Ministry of Defence computer files

Further reading

  • Robert Wallace and H. Keith Melton, with Henry R. Schlesinger, Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda, New York, Dutton, 2008. ISBN 0-525-94980-1.
This article was sourced from Creative Commons Attribution-ShareAlike License; additional terms may apply. World Heritage Encyclopedia content is assembled from numerous content providers, Open Access Publishing, and in compliance with The Fair Access to Science and Technology Research Act (FASTR), Wikimedia Foundation, Inc., Public Library of Science, The Encyclopedia of Life, Open Book Publishers (OBP), PubMed, U.S. National Library of Medicine, National Center for Biotechnology Information, U.S. National Library of Medicine, National Institutes of Health (NIH), U.S. Department of Health & Human Services, and, which sources content from all federal, state, local, tribal, and territorial government publication portals (.gov, .mil, .edu). Funding for and content contributors is made possible from the U.S. Congress, E-Government Act of 2002.
Crowd sourced content that is contributed to World Heritage Encyclopedia is peer reviewed and edited by our editorial staff to ensure quality scholarly research articles.
By using this site, you agree to the Terms of Use and Privacy Policy. World Heritage Encyclopedia™ is a registered trademark of the World Public Library Association, a non-profit organization.

Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.