Premium Only Content
CIA Archives: Cutout Devices - Espionage (1953)
The dark side of history: https://thememoryhole.substack.com/
In espionage parlance, a cutout is a mutually trusted intermediary, method or channel of communication that facilitates the exchange of information between agents. Cutouts usually know only the source and destination of the information to be transmitted, not the identities of any other persons involved in the espionage process (need to know basis). Thus, a captured cutout cannot be used to identify members of an espionage cell. The cutout also isolates the source from the destination, so neither necessarily knows the other.
Outside espionage
Some computer protocols, like Tor, use the equivalent of cutout nodes in their communications networks. The use of multiple layers of encryption usually stops nodes on such networks from knowing the ultimate sender or receiver of the data.
In computer networking, darknets have some cutout functionality. Darknets are distinct from other distributed peer-to-peer (P2P) networks, as sharing is anonymous, i.e., IP addresses are not publicly shared and nodes often forward traffic to other nodes. Thus, with a darknet, users can communicate with little fear of governmental or corporate interference.[1] Darknets are thus often associated with dissident political communications as well as various illegal activities.
A dead drop or dead letter box is a method of espionage tradecraft used to pass items or information between two individuals (e.g., a case officer and an agent, or two agents) using a secret location. By avoiding direct meetings, individuals can maintain operational security. This method stands in contrast to the live drop, so-called because two persons meet to exchange items or information.
Spies and their handlers have been known to perform dead drops using various techniques to hide items (such as money, secrets or instructions) and to signal that the drop has been made. Although the signal and location by necessity must be agreed upon in advance, the signal may or may not be located close to the dead drop itself. The operatives may not necessarily know one another or ever meet.[1][2]
Considerations
The location and nature of the dead drop must enable retrieval of the hidden item without the operatives being spotted by a member of the public, the police, or other security forces—therefore, common everyday items and behavior are used to avoid arousing suspicion. Any hidden location could serve, although often a cut-out device is used, such as a loose brick in a wall, a (cut-out) library book, or a hole in a tree.
Dead drop spike
A dead drop spike is a concealment device similar to a microcache. It has been used since the late 1960s to hide money, maps, documents, microfilm, and other items. The spike is water- and mildew-proof and can be pushed into the ground or placed in a shallow stream to be retrieved at a later time.
Signaling devices can include a chalk mark on a wall, a piece of chewing gum on a lamppost, or a newspaper left on a park bench. Alternatively, the signal can be made from inside the agent's own home, by, for example, hanging a distinctively-colored towel from a balcony, or placing a potted plant on a window sill where it is visible to anyone on the street.
Drawbacks
While the dead drop method is useful in preventing the instantaneous capture of either an operative/handler pair or an entire espionage network, it is not without disadvantages. If one of the operatives is compromised, they may reveal the location and signal for that specific dead drop. Counterintelligence can then use the dead drop as a double agent for a variety of purposes, such as to feed misinformation to the enemy or to identify other operatives using it or ultimately to booby trap it.[3] There is also the risk that a third party may find the material deposited.
Modern techniques
See also: Short-range agent communications
On January 23, 2006, the Russian FSB accused Britain of using wireless dead drops concealed inside hollowed-out rocks ("spy rock") to collect espionage information from agents in Russia. According to the Russian authorities, the agent delivering information would approach the rock and transmit data wirelessly into it from a hand-held device, and later, his British handlers would pick up the stored data by similar means.[4]
SecureDrop, initially called DeadDrop, is a software suite for teams that allows them to create a digital dead drop location to receive tips from whistleblowers through the Internet. The team members and whistleblowers never communicate directly and never know each other's identity, therefore allowing whistleblowers to dead-drop information despite the mass surveillance and privacy violations which had become commonplace in the beginning of the twenty-first century.
See also
Espionage
Foldering
PirateBox
USB dead drop
References
Robert Wallace and H. Keith Melton, with Henry R. Schlesinger, Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda, New York, Dutton, 2008. ISBN 0-525-94980-1. Pp. 43-44, 63, and 74-76.
Jack Barth, International Spy Museum Handbook of Practical Spying, Washington DC, National Geographic, 2004. ISBN 978-0-7922-6795-9. Pp. 119-125.
Wettering, Frederick L. (2001-07-01). "The Internet and the Spy Business". International Journal of Intelligence and CounterIntelligence. 14 (3): 342–365. doi:10.1080/08850600152386846. ISSN 0885-0607. S2CID 153870872.
Nick Paton Walsh, The Guardian (23 January 2006). "Moscow names British 'spies' in NGO row". TheGuardian.com. Archived from the original on 29 August 2013. Retrieved 8 April 2012.
Bibliography
"Russians accuse 4 Britons of spying".International Herald Tribune. January 24, 2006. News report on Russian discovery of British "wireless dead drop".
"Old spying lives on in new ways". BBC. 23 January 2006.
Madrid suspects tied to e-mail ruse. International Herald Tribune. April 28, 2006.
Military secrets missing on Ministry of Defence computer files
Robert Burnson, "Accused Chinese spy pleads guilty in U.S. 'dead-drop' sting", Bloomberg, 25 novembre 2019[1].
Robert Wallace and H. Keith Melton, with Henry R. Schlesinger, Spycraft: The Secret History of the CIA's Spytechs, from Communism to al-Qaeda, New York, Dutton, 2008. ISBN 0-525-94980-1.
-
4:26:48
The Memory Hole
1 month agoThe Life and Times of Klaus Barbie
702 -
14:33
IsaacButterfield
11 hours ago $1.99 earnedINSANE WOKE MEN OF TIKTOK!
19.7K12 -
1:58:16
The Charlie Kirk Show
3 hours agoAmericaFest: Day 2 | Beck, McKoon, Steele, Nagao, Galaszewski, Bowyer, Brown, Amanchukwu | 12.20.24
77.9K5 -
54:15
The Dan Bongino Show
6 hours agoSaving The U.S. Military w/ SEAL Andy Stumpf (Ep. 2392) - 12/20/2024
529K793 -
2:53:55
The Dana Show with Dana Loesch
3 hours agoGOVERNMENT SPENDING BILL FAILS | The Dana Show LIVE On Rumble!
15.8K7 -
1:01:34
Dr. Eric Berg
3 days agoThe Dr. Berg Show LIVE December 20, 2024
42.6K6 -
1:01:03
The Rubin Report
5 hours agoTech Legend Gives the Real Odds of Elon Musk Successfully Cutting Gov’t | Joe Lonsdale
57.6K9 -
1:33:00
The Shannon Joy Show
6 hours ago🔥🔥Chip Roy's Fabulous Christmas Shutdown - Mr. Scrooge Or Miracle On K-Street? 🔥🔥
19.4K5 -
53:31
Dave Portnoy
7 hours agoThe Unnamed Show With Dave Portnoy, Kirk Minihane, Ryan Whitney - Episode 40
62.2K1 -
35:55
Tudor Dixon
3 hours agoCorruption and Influence: The Biden Family Saga | The Tudor Dixon Podcast
22.7K3