Talk:Dead drop

From Wikipedia, the free encyclopedia

Given that the bit about the dead drop spike is EXACTLY the same as [1], should it really be here? --195.92.67.77 18:11, 25 Apr 2005 (UTC)

No joke. I don't have the time to copyvio it right now, but sorting the stub should at least bring it to people's attention. I'll mark it as a major edit, too, so that it's not filtered by people hiding the minor edits. --Jemiller226 06:20, 3 May 2005 (UTC)

Contents

[edit] Accidental discovery

Doesn't it occasionally happen that an otherwise uninvolved third party stumbles upon the dead drop? Take the case of a library book; someone may check it out, request it sent to another branch, or open the book to the particular page. Or, if a sufficiently old and unpopular book is used, it may be discarded and given to someone. What is the term for this sort of thing, and what are the typical consequences to the finder? NeonMerlin 02:26, 27 July 2006 (UTC)

[edit] Copyright Violation

Possible copyright infringement

If you have just labeled this page as a possible copyright infringement, please add the following to the bottom of Wikipedia:Copyright_problems/2008_June_9/Articles
* {{subst:article-cv|:Talk:Dead drop}} from [http://www.cnn.com/SPECIALS/cold.war/experience/spies/spy.gadgets/espionage/dead-drop.spike.html]. ~~~~

The previous content of this page appears to infringe on the copyright of the text from the source(s) below and is now listed on Wikipedia:Copyright problems:

http://www.cnn.com/SPECIALS/cold.war/experience/spies/spy.gadgets/espionage/dead-drop.spike.html

Do not edit this page until an administrator has resolved this issue.

  • To write a new article without infringing material, follow this link to a temporary subpage.
State that you have done so on this article's discussion page.
Note that simply modifying copyrighted text is not sufficient to avoid copyright infringement—if the original copyright violation cannot be clearly identified and the article reverted to a prior version, it is best to write the article from scratch. An administrator will move the new article into place once the issue is resolved.
Explain this on this article's discussion page, then either display a notice to this effect at the site of original publication or send an e-mail from an address associated with the original publication to permissions-en at wikimedia dot org or a postal letter to the Wikimedia Foundation. These messages must explicitly permit use under the GFDL.
Note: Articles on Wikipedia must be written from a neutral point of view and must be verifiable in published third-party sources; copyright issues aside, your text may not be appropriate for inclusion in Wikipedia.
  • If this text is in the public domain, or is already under a license suitable for Wikipedia:
Explain this on this article's discussion page, with reference to evidence.

Unless the copyright status of the text on this page is clarified, it will be deleted one week after the time of its listing.

  • Posting copyrighted material without the express permission of the copyright holder is a violation of applicable law and of Wikipedia policy.
  • If you have questions about copyright, see Copyright FAQ.
  • Those who repeatedly post copyrighted material will be blocked from further editing.
  • Temporarily, the original posting is still accessible for viewing in the page history.
  • You are welcome to submit original contributions.
Maintenance use only: {{subst:Nothanks-web|pg=Dead drop|url=http://www.cnn.com/SPECIALS/cold.war/experience/spies/spy.gadgets/espionage/dead-drop.spike.html}} ~~~~



http://www.cnn.com/SPECIALS/cold.war/experience/spies/spy.gadgets/espionage/dead-drop.spike.html

[edit] Overall focus of article

Might it be more useful to have a general discussion of clandestine communications, presumably non-electronic in this context? My experience is that a dead drop, for example, is not considered a cut-out in espionage tradecraft. A cut-out is a person, not a place, that adds security to a clandestine communication, by using an active technique such as a brush-pass to receive information from one person whose name is not known, to transfer the information either to another person, or to place it in a dead drop. Cut-outs interact, human-to-human, at least once. A dead drop may be filled by one person and emptied by another, with no direct human interaction.

In like manner, plausible deniability is a different concept than secure message transmission. If I can transfer a message securely, the fact of a transfer cannot be traced back to me in reality. If a message transfer is plausibly deniable, the matter is covert but not clandestine; the fact that a message exists is not being disputed. Howard C. Berkowitz (talk) 07:55, 17 November 2007 (UTC)

[edit] 9/11 al-Qaeda dead drops

A reference to al-Qaeda using email drafts is at schneier's blog, near the end. Is it a good enough reference? Family Guy Guy (talk) 04:00, 14 February 2008 (UTC)

Also there are more references here: [2] —Preceding unsigned comment added by Family Guy Guy (talkcontribs) 04:14, 14 February 2008 (UTC)