Talk:Dead drop
From Wikipedia, the free encyclopedia
Given that the bit about the dead drop spike is EXACTLY the same as [1], should it really be here? --195.92.67.77 18:11, 25 Apr 2005 (UTC)
- No joke. I don't have the time to copyvio it right now, but sorting the stub should at least bring it to people's attention. I'll mark it as a major edit, too, so that it's not filtered by people hiding the minor edits. --Jemiller226 06:20, 3 May 2005 (UTC)
Contents |
[edit] Accidental discovery
Doesn't it occasionally happen that an otherwise uninvolved third party stumbles upon the dead drop? Take the case of a library book; someone may check it out, request it sent to another branch, or open the book to the particular page. Or, if a sufficiently old and unpopular book is used, it may be discarded and given to someone. What is the term for this sort of thing, and what are the typical consequences to the finder? NeonMerlin 02:26, 27 July 2006 (UTC)
[edit] Copyright Violation
|
Possible copyright infringement |
| If you have just labeled this page as a possible copyright infringement, please add the following to the bottom of Wikipedia:Copyright_problems/2008_June_9/Articles * {{subst:article-cv|:Talk:Dead drop}} from [http://www.cnn.com/SPECIALS/cold.war/experience/spies/spy.gadgets/espionage/dead-drop.spike.html]. ~~~~ |
|
The previous content of this page appears to infringe on the copyright of the text from the source(s) below and is now listed on Wikipedia:Copyright problems: Do not edit this page until an administrator has resolved this issue.
Unless the copyright status of the text on this page is clarified, it will be deleted one week after the time of its listing. |
|
|
|
http://www.cnn.com/SPECIALS/cold.war/experience/spies/spy.gadgets/espionage/dead-drop.spike.html
[edit] Overall focus of article
Might it be more useful to have a general discussion of clandestine communications, presumably non-electronic in this context? My experience is that a dead drop, for example, is not considered a cut-out in espionage tradecraft. A cut-out is a person, not a place, that adds security to a clandestine communication, by using an active technique such as a brush-pass to receive information from one person whose name is not known, to transfer the information either to another person, or to place it in a dead drop. Cut-outs interact, human-to-human, at least once. A dead drop may be filled by one person and emptied by another, with no direct human interaction.
In like manner, plausible deniability is a different concept than secure message transmission. If I can transfer a message securely, the fact of a transfer cannot be traced back to me in reality. If a message transfer is plausibly deniable, the matter is covert but not clandestine; the fact that a message exists is not being disputed. Howard C. Berkowitz (talk) 07:55, 17 November 2007 (UTC)
[edit] 9/11 al-Qaeda dead drops
A reference to al-Qaeda using email drafts is at schneier's blog, near the end. Is it a good enough reference? Family Guy Guy (talk) 04:00, 14 February 2008 (UTC)
Also there are more references here: [2] —Preceding unsigned comment added by Family Guy Guy (talk • contribs) 04:14, 14 February 2008 (UTC)

