A USB dead drop is a
USB
Universal Serial Bus (USB) is an industry standard, developed by USB Implementers Forum (USB-IF), for digital data transmission and power delivery between many types of electronics. It specifies the architecture, in particular the physical ...
mass storage device installed in a
public space
A public space is a place that is open and accessible to the general public. Roads, pavements, public squares, parks, and beaches are typically considered public space. To a limited extent, government buildings which are open to the public, su ...
. For example, a
USB flash drive
A flash drive (also thumb drive, memory stick, and pen drive/pendrive) is a data storage device that includes flash memory with an integrated USB interface. A typical USB drive is removable, rewritable, and smaller than an optical disc, and u ...
might be mounted in an outdoor brick wall and fixed in place with fast
concrete
Concrete is a composite material composed of aggregate bound together with a fluid cement that cures to a solid over time. It is the second-most-used substance (after water), the most–widely used building material, and the most-manufactur ...
. Members of the public are implicitly invited to find files, or leave files, on a dead drop by directly plugging their
laptop
A laptop computer or notebook computer, also known as a laptop or notebook, is a small, portable personal computer (PC). Laptops typically have a Clamshell design, clamshell form factor (design), form factor with a flat-panel computer scree ...
into the wall-mounted
USB stick in order to transfer data. (It is also possible to use
smartphone
A smartphone is a mobile phone with advanced computing capabilities. It typically has a touchscreen interface, allowing users to access a wide range of applications and services, such as web browsing, email, and social media, as well as multi ...
s and
tablets for this purpose, by utilizing a
USB on-the-go cable.) The dead drops can therefore be regarded as an anonymous, offline,
peer-to-peer file sharing
Peer-to-peer file sharing is the distribution and sharing of digital media using peer-to-peer (P2P) networking technology. P2P file sharing allows users to access media files such as books, music, movies, and games using a P2P software program th ...
network. In practice, USB dead drops are more often used for social or artistic reasons, rather than practical ones.
Background and history
The Dead Drops project was conceived by
Berlin
Berlin ( ; ) is the Capital of Germany, capital and largest city of Germany, by both area and List of cities in Germany by population, population. With 3.7 million inhabitants, it has the List of cities in the European Union by population withi ...
-based conceptual artist
Aram Bartholl, a member of New York's
F.A.T. Lab art and technology collective. The first USB dead drop network of five devices was installed by Bartholl in October 2010 in
Brooklyn
Brooklyn is a Boroughs of New York City, borough of New York City located at the westernmost end of Long Island in the New York (state), State of New York. Formerly an independent city, the borough is coextensive with Kings County, one of twelv ...
,
New York City
New York, often called New York City (NYC), is the most populous city in the United States, located at the southern tip of New York State on one of the world's largest natural harbors. The city comprises five boroughs, each coextensive w ...
. The name comes from the
dead drop method of communication used in
espionage
Espionage, spying, or intelligence gathering, as a subfield of the intelligence field, is the act of obtaining secret or confidential information ( intelligence). A person who commits espionage on a mission-specific contract is called an ...
. An unrelated system called "deadSwap", in which participants use an
SMS gateway
An SMS gateway or MMS gateway allows a computer (also known as a Server) to send or receive text messages in the form of Short Message Service (SMS) or Multimedia Messaging Service (MMS) transmissions between local and/or international telecom ...
to coordinate passing USB memory sticks on to one another, was begun in
Germany
Germany, officially the Federal Republic of Germany, is a country in Central Europe. It lies between the Baltic Sea and the North Sea to the north and the Alps to the south. Its sixteen States of Germany, constituent states have a total popu ...
in 2009.
Each dead drop is typically installed without any data except two files: deaddrops-manifesto.txt, and a
readme.txt file explaining the project.
Although typically found in urban areas embedded in concrete or brick, installation of USB dead drops in trees
and other organic structures in natural settings have also been observed.
Wireless
Wireless communication (or just wireless, when the context allows) is the transfer of information (''telecommunication'') between two or more points without the use of an electrical conductor, optical fiber or other continuous guided transm ...
dead drops such as the 2011
PirateBox, where the user connects to a
Wi-Fi hotspot with
network attached storage rather than physically connecting to a USB device, have also been created.
Comparison to other types of data transfer
Some reasons to use USB dead drops are practical. They permit
P2P file sharing without needing any internet or cellular connection, sharing files with another person secretly/anonymously, and they do not track any
IP address
An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
or similar
personally identifying information. Other benefits are more social or artistic in nature: USB dead drops are an opportunity to practice what
Telecomix describes as datalove and can be seen as a way to promote
off-grid data networks. Motivation for using USB dead drops has been likened to what drives people involved in
geocaching
Geocaching (, ) is an outdoor recreational activity, in which participants use a Global Positioning System (GPS) receiver or mobile device and other navigational techniques to hide and seek containers, called ''geocaches'' or ''caches'', at sp ...
, which has existed for longer and is somewhat similar in that often a set of GPS coordinates is used to locate a particular USB dead drop.
Specifically, USB dead drops give the user "the thrill of discovery"
in seeking out the location of the dead drop and when examining the data it contains. A
QR-Code dead drop including the data in the QR code image or pointing to a
decentralized storage repository would be an alternative and less risky option compared to a physical USB dead drop as long as users avoid
IP address
An Internet Protocol address (IP address) is a numerical label such as that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface i ...
disclosure.
Potential drawbacks
Dead drops are USB-based devices, which must be connected to an upstream computer system, e.g. laptop or smartphone or similar. The act of making such a connection, to a device which is not necessarily trusted, inherently poses certain threats:
*
Malware
Malware (a portmanteau of ''malicious software'')Tahir, R. (2018)A study on malware and malware detection techniques . ''International Journal of Education and Management Engineering'', ''8''(2), 20. is any software intentionally designed to caus ...
: anyone can intentionally or unintentionally infect an attached computer with malware such as a
trojan horse
In Greek mythology, the Trojan Horse () was a wooden horse said to have been used by the Greeks during the Trojan War to enter the city of Troy and win the war. The Trojan Horse is not mentioned in Homer, Homer's ''Iliad'', with the poem ending ...
,
keylogger, or unwanted firmware . This risk can be mitigated by using
antivirus software
Antivirus software (abbreviated to AV software), also known as anti-malware, is a computer program used to prevent, detect, and remove malware.
Antivirus software was originally developed to detect and remove computer viruses, hence the name ...
, or by using a
throwaway device for the act of data transfer.
*
Booby trap: a fake dead drop or
USB Killer might be rigged to electrically damage any equipment connected to it, and/or constitute a health and safety hazard for users. This risk can be mitigated by using a USB
galvanic isolation adapter, which allows data exchange while physically decoupling the two circuits. Wi-Fi-based dead drops are not vulnerable to this threat.
*
Mugging
Mugging (sometimes called personal robbery or street robbery) is a form of robbery and street crime that occurs in public places, often urban areas at night. It involves a confrontation with a threat of violence. Muggers steal money or person ...
: because a USB dead drop is normally in a public or quasi-public location, users may be physically attacked when they attempt to use the system, for a variety of reasons including theft of the user's
devices.
Drawbacks to system infrastructure
Publicly and privately available USB dead drops give anyone (with physical access) the ability to save and transfer data anonymously and free of charge. These features are an advantages over
the internet and the
cellular network
A cellular network or mobile network is a telecommunications network where the link to and from end nodes is wireless network, wireless and the network is distributed over land areas called ''cells'', each served by at least one fixed-locatio ...
, which are at best quasi-anonymous and low-cost (there is always some fee associated although in certain scenarios such as government-subsidized or employer-subsidized or public-library-subsidized network access the end user may experience
no direct costs). However, offline networks are vulnerable to various types of threats and disadvantages, relative to online ones:
* One device at a time: Users cannot plug in to a USB dead drop if someone else is already plugged in
* Removal of stored data: anyone with physical access can erase all of the data held within the USB dead drop (via
file deletion or
disk formatting
Disk formatting is the process of preparing a data storage device such as a hard disk drive, solid-state drive, floppy disk, memory card or USB flash drive for initial use. In some cases, the formatting operation may also create one or more new f ...
), or make it unusable by encrypting the data of the whole drive and hiding the key (see also the related topic of
ransomware
Ransomware is a type of malware that Encryption, encrypts the victim's personal data until a ransom is paid. Difficult-to-trace Digital currency, digital currencies such as paysafecard or Bitcoin and other cryptocurrency, cryptocurrencies are com ...
).
* Removal of the entire device: thieves can steal the USB drive itself.
* Disclosure: anyone can disclose the location of a (formerly) private dead drop, by shadowing people that use it, and publishing coordinates in a public fashion. This impacts the anonymous nature of USB dead drops, since known drops can be
filmed or otherwise observed.
*
Vandalism
Vandalism is the action involving deliberate destruction of or damage to public or private property.
The term includes property damage, such as graffiti and defacement directed towards any property without permission of the owner. The t ...
of the dead drop by physical destruction: anyone with physical access can destroy the dead drop, e.g. with
pliers, a
hammer
A hammer is a tool, most often a hand tool, consisting of a weighted "head" fixed to a long handle that is swung to deliver an impact to a small area of an object. This can be, for example, to drive nail (fastener), nails into wood, to sh ...
, high voltage from a static field, high temperature from a blowtorch, or other physical force. Likelihood of vandalism or extraction is reduced by sealing the USB dead drop in a hole deeper than its length but this requires legitimate users to connect with a USB
extender cable. Sometimes the installation of the dead-drop can itself be vandalism of the building; i.e. when a building owner destroys a dead drop placed without permission.
*
Exposure to the elements: dead drops tend to be exposed to
rain and snow, which will presumably reduce their
service lifetime.
*
Demolition
Demolition (also known as razing and wrecking) is the science and engineering in safely and efficiently tearing down buildings and other artificial structures. Demolition contrasts with deconstruction (building), deconstruction, which inv ...
or damage during maintenance: certain dead drop locations are limited to the lifespan of public structures. When a dead drop is embedded in a brick wall, the drop can be destroyed when the wall is destroyed. When a drop is embedded in a concrete sidewalk, the drop can be destroyed by sidewalk-related construction and maintenance. Sometimes dead drops are damaged when walls are repainted.
Prevalence
As of 2013, there were approximately 1000 USB dead drops (plus six known wifi-based dead drops).
Most known USB dead drops are in the
United States
The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 U.S. state, states and a federal capital district, Washington, D.C. The 48 ...
and
Europe
Europe is a continent located entirely in the Northern Hemisphere and mostly in the Eastern Hemisphere. It is bordered by the Arctic Ocean to the north, the Atlantic Ocean to the west, the Mediterranean Sea to the south, and Asia to the east ...
.
As of 2016, overall dead drop infrastructure was estimated as being more than 10
terabyte
The byte is a unit of digital information that most commonly consists of eight bits. Historically, the byte was the number of bits used to encode a single character of text in a computer and for this reason it is the smallest addressable un ...
s of storage capacity, with the majority still located in the United States and Europe, but with growing numbers installed in the
Asia
Asia ( , ) is the largest continent in the world by both land area and population. It covers an area of more than 44 million square kilometres, about 30% of Earth's total land area and 8% of Earth's total surface area. The continent, which ...
-
Pacific
The Pacific Ocean is the largest and deepest of Earth's five oceanic divisions. It extends from the Arctic Ocean in the north to the Southern Ocean, or, depending on the definition, to Antarctica in the south, and is bounded by the cont ...
region,
South America
South America is a continent entirely in the Western Hemisphere and mostly in the Southern Hemisphere, with a considerably smaller portion in the Northern Hemisphere. It can also be described as the southern Subregion#Americas, subregion o ...
, and
Africa
Africa is the world's second-largest and second-most populous continent after Asia. At about 30.3 million km2 (11.7 million square miles) including adjacent islands, it covers 20% of Earth's land area and 6% of its total surfac ...
.
See also
*
Dead drop
*
Sneakernet
*
Geocache
*
File sharing
File sharing is the practice of distributing or providing access to digital media, such as computer programs, multimedia (audio, images and video), documents or electronic books. Common methods of storage, transmission and dispersion include ...
*
Technological utopianism
References
External links
*
{{Internet censorship circumvention technologies
File sharing
USB
Computer art
Repurposing
Conceptual art