![]() | This article is rated Start-class on Wikipedia's
content assessment scale. It is of interest to the following WikiProjects: | ||||||||||
|
![]() | This article links to one or more target anchors that no longer exist.
Please help fix the broken anchors. You can remove this template after fixing the problems. |
Reporting errors |
Given that the bit about the dead drop spike is EXACTLY the same as [1], should it really be here? -- 195.92.67.77 18:11, 25 Apr 2005 (UTC)
Doesn't it occasionally happen that an otherwise uninvolved third party stumbles upon the dead drop? Take the case of a library book; someone may check it out, request it sent to another branch, or open the book to the particular page. Or, if a sufficiently old and unpopular book is used, it may be discarded and given to someone. What is the term for this sort of thing, and what are the typical consequences to the finder? Neon Merlin 02:26, 27 July 2006 (UTC)
Might it be more useful to have a general discussion of clandestine communications, presumably non-electronic in this context? My experience is that a dead drop, for example, is not considered a cut-out in espionage tradecraft. A cut-out is a person, not a place, that adds security to a clandestine communication, by using an active technique such as a brush-pass to receive information from one person whose name is not known, to transfer the information either to another person, or to place it in a dead drop. Cut-outs interact, human-to-human, at least once. A dead drop may be filled by one person and emptied by another, with no direct human interaction.
In like manner, plausible deniability is a different concept than secure message transmission. If I can transfer a message securely, the fact of a transfer cannot be traced back to me in reality. If a message transfer is plausibly deniable, the matter is covert but not clandestine; the fact that a message exists is not being disputed. Howard C. Berkowitz ( talk) 07:55, 17 November 2007 (UTC)
A reference to al-Qaeda using email drafts is at schneier's blog, near the end. Is it a good enough reference? Family Guy Guy ( talk) 04:00, 14 February 2008 (UTC)
Also there are more references here: [2] —Preceding unsigned comment added by Family Guy Guy ( talk • contribs) 04:14, 14 February 2008 (UTC)
First of all, couldn't one party survey the dead drop site in hiding and determine the identity of the other? This gave me another question: What's the point of not meeting the other person in the first place?-- 98.210.101.240 ( talk) 05:08, 15 April 2009 (UTC)
If a Dead Drop Spike is opened incorrectly, is the trigger called a fail-deadly or a combination lock?? -- Arima ( talk) 22:06, 23 June 2010 (UTC)
Dead Drops: The New Peer-to-Peer File-Sharing Network http://www.aolnews.com/surge-desk/article/dead-drops-a-new-peer-to-peer-file-sharing-network/19698176 -- J. D. Redding 11:49, 2 November 2010 (UTC) http://deaddrops.com/ Does not really fit with this espionage topic, though clearly inspired by it. 'Dead Drops' redirects to the singular, maybe the plural can become a description of this new idea, or else it could be treated as an alternative form of geocaching. -- Sandvika 13:28, 10 November 2010 (UTC) The users of the technique "dead drop" should be irrelevant for the description of the technique. If one application of the technique is public, anonymous file-sharing, instead of anonymous personal communication, it is valid to at least start a "other uses" section. This would also help to clarify the difference between the concept and its applications. Using the plural as a distinction is wrong in my opinion, because the topic is not complicated enough to be featured on multiple pages. The terminology peer-to-peer might be misleading too. Those are deaddrops, not more or less public than others (knowledge of the spot suffices to be granted access) -- Take your time ( talk) 11:53, 26 January 2011 (UTC)
![]() | This article is rated Start-class on Wikipedia's
content assessment scale. It is of interest to the following WikiProjects: | ||||||||||
|
![]() | This article links to one or more target anchors that no longer exist.
Please help fix the broken anchors. You can remove this template after fixing the problems. |
Reporting errors |
Given that the bit about the dead drop spike is EXACTLY the same as [1], should it really be here? -- 195.92.67.77 18:11, 25 Apr 2005 (UTC)
Doesn't it occasionally happen that an otherwise uninvolved third party stumbles upon the dead drop? Take the case of a library book; someone may check it out, request it sent to another branch, or open the book to the particular page. Or, if a sufficiently old and unpopular book is used, it may be discarded and given to someone. What is the term for this sort of thing, and what are the typical consequences to the finder? Neon Merlin 02:26, 27 July 2006 (UTC)
Might it be more useful to have a general discussion of clandestine communications, presumably non-electronic in this context? My experience is that a dead drop, for example, is not considered a cut-out in espionage tradecraft. A cut-out is a person, not a place, that adds security to a clandestine communication, by using an active technique such as a brush-pass to receive information from one person whose name is not known, to transfer the information either to another person, or to place it in a dead drop. Cut-outs interact, human-to-human, at least once. A dead drop may be filled by one person and emptied by another, with no direct human interaction.
In like manner, plausible deniability is a different concept than secure message transmission. If I can transfer a message securely, the fact of a transfer cannot be traced back to me in reality. If a message transfer is plausibly deniable, the matter is covert but not clandestine; the fact that a message exists is not being disputed. Howard C. Berkowitz ( talk) 07:55, 17 November 2007 (UTC)
A reference to al-Qaeda using email drafts is at schneier's blog, near the end. Is it a good enough reference? Family Guy Guy ( talk) 04:00, 14 February 2008 (UTC)
Also there are more references here: [2] —Preceding unsigned comment added by Family Guy Guy ( talk • contribs) 04:14, 14 February 2008 (UTC)
First of all, couldn't one party survey the dead drop site in hiding and determine the identity of the other? This gave me another question: What's the point of not meeting the other person in the first place?-- 98.210.101.240 ( talk) 05:08, 15 April 2009 (UTC)
If a Dead Drop Spike is opened incorrectly, is the trigger called a fail-deadly or a combination lock?? -- Arima ( talk) 22:06, 23 June 2010 (UTC)
Dead Drops: The New Peer-to-Peer File-Sharing Network http://www.aolnews.com/surge-desk/article/dead-drops-a-new-peer-to-peer-file-sharing-network/19698176 -- J. D. Redding 11:49, 2 November 2010 (UTC) http://deaddrops.com/ Does not really fit with this espionage topic, though clearly inspired by it. 'Dead Drops' redirects to the singular, maybe the plural can become a description of this new idea, or else it could be treated as an alternative form of geocaching. -- Sandvika 13:28, 10 November 2010 (UTC) The users of the technique "dead drop" should be irrelevant for the description of the technique. If one application of the technique is public, anonymous file-sharing, instead of anonymous personal communication, it is valid to at least start a "other uses" section. This would also help to clarify the difference between the concept and its applications. Using the plural as a distinction is wrong in my opinion, because the topic is not complicated enough to be featured on multiple pages. The terminology peer-to-peer might be misleading too. Those are deaddrops, not more or less public than others (knowledge of the spot suffices to be granted access) -- Take your time ( talk) 11:53, 26 January 2011 (UTC)