Geocaching & Cybersecurity

Dead Drop location

Offbeat Public Network Could Be a Geocaching Tool

Apr 12, 2011

This article is from "The Joy of Geocaching".   Here is a variation on geocaching. 

Dead Drops is an anonymous story-sharing network that uses a simple approach to exchanging information. As the site explains, “USB flash drives are embedded into walls, buildings and curbs accessible to anybody. Everyone is invited to drop or find files. Plug your laptop into a wall, house or pole to share your favorite files and data.” In other words, plug in and share your story in any format – text, audio or video – and others may come along and retrieve it. 

We think this could have great application to geocaching. Many multi-stage caches use interim waypoints that feature coordinates written in marker. What if those waypoints could include stories or puzzles, too? You plug your laptop or tablet into an exposed USB port and get your information about the next coordinate that way.

UPDATE!!  Please be warned that with all things -- there is a good side and a dark side.  Unfortunately, the concept of USB dead drops has the potential to be a really bad idea as malicious actors can rig the USB drive to contain a malware payload and can render your computer inoperable or infected with malware.

USB Drop Attacks Continue to Cause Cybersecurity Incidents

USB drop attack definition: A USB drop attack is a type of cyber-attack where a USB drive, typically pre-loaded with malware, is physically left in a location with the intent that an unsuspecting individual will pick it up and plug it into a computer.

In other words, a USB drop attack is the digital equivalent of the well-known Trojan Horse story, in which a seemingly innocuous object harbors a hidden danger. Just like the wooden horse that the Greeks used to infiltrate Troy, the USB drive appears harmless, even useful. But once it’s plugged into a computer, the malicious software hidden inside springs into action, compromising your system and potentially even your entire network.

USB drop attacks can be subdivided into various categories, each with its own unique method of operation and end goal. Here are some examples of USB drop attack types to help you understand just how diverse and dangerous these attacks can be.