Lapel Daggers and Other Covert Blades of World War II

Updated on November 18, 2019
Mamerto profile image

Mamerto Adan is a feature writer back in college for a school paper. Science is one of his many interests, and his favorite topic.

This article will discuss small, stealthy daggers that were used in World War II.
This article will discuss small, stealthy daggers that were used in World War II.

When people say that blades lost its place in the modern warfare, they are mistaking. It’s true that we won’t be seeing sword-wielding soldiers in the battlefield (swords nowadays are for ceremonial purpose), yet an edged implement is still an important part of their everyday equipment. Knives, machetes, and axes are the favorites here. Outside the front lines, they are great utility and survival tools. They came in handy when a soldier needed to chop wood, open ration cans, clean game, and anything that else that required cutting. And we all know that soldiers need their blades when they must stab someone.

World War I, the start of the modern battle showed the potentials of knives and other bladed melee weapons in closed quarters. They complemented a soldier’s firearms, and were useful for silently killing. During the Second Word War, new sets of somewhat exotic battle blades emerged. They were weapons of last resort, meant to be carried in secret. They were the ultimate concealed weapons for SOE and OSS operatives. We often associate the World War II battle blades with Commando Knives in the West and the Bolos in the Pacific, but these clandestine weapons are the stuff of James Bond movies, and, ironically, saw actual use in James Bond style exploits.

Use of Covert Blades in War

Again, when we say WWII blades, the first thing that swims in our minds is the famous Fairbairn-Sykes fighting knife, also known as the “Commando Knife.” These blades were issued to British Commandos and other specialized units for use in surprise attacks and close combat. Basically, it’s a modern-day version of the medieval dagger, with its double-edged stabbing blade meant for penetration as well as slashing.

In the Pacific, Filipino guerillas sported their local machetes, known as Bolo, to lay waste to the Japanese units. Though ill-equipped, Bolo wielding soldiers staged asymmetric raids, which helped American forces end the Japanese occupation.

Overall, we could say that these are the blades that won the Second World War. Although Operatives of Special Operations Executive (SOE), trained for espionage, sabotage, reconnaissance and silent killing carried a different set of bladed weapons. The same can be said to their American counterpart, the predecessor of CIA the Office of Strategic Defense (OSS).

Since they operate in secrecy, undercover agents required easily concealed weapons. They are also issued with the Fairbairn-Sykes fighting knife, as well as firearms. For specialized operations, they needed small fighting knives that could be concealed in their clothing.

Necessity is the mother of invention. The need for small, but effective battle blades resulted in some of the most ingenious concealed weapons ever.

Lapel Daggers

A collection of Lapel and Thumb Daggers.
A collection of Lapel and Thumb Daggers.

Stealthy is Healthy

One way to hide your blades is to keep them in your clothes, and this is exactly where Lapel Daggers were held. These blades are small enough to be stitched in jacket lapels for quick deployment, though they could be concealed as well in various strategic locations, like pockets, boots or waistbands. They are basically miniature daggers, with double-edged blades made for slashing and stabbing. They have tiny handles, though they could also be secured to the fingers with twines.

Because of the secretive nature of SOE operations, the origins of these weapons are shady. Yet they are designed for SOE Agents and other units who are prone to capture. In instances when an agent was likely to be arrested, they are trained to surreptitiously access the blade, loop the twine cord in their index finger and pinch their weapons with their thumb and index finger. When they are seized by the enemy policemen, say a Gestapo, they would slash either the hand, neck or face before making an escape. These could also be used for silent killing by stabbing the area under the jaw or the back of the head. It could even grant an agent honorable death, by using it as a suicide weapon when they are captured.

These blades could be handled either by the pinch hold (between the index finger and thumb), or with a push dagger hold, where the blade will stick out between the index and middle finger.

Lapel Dagger

Instructions on Lapel Dagger handling.
Instructions on Lapel Dagger handling.

The image above shows a variation of the Lapel Dagger, the Thumb Dagger. It has a slightly larger and wider blade, but with smaller handle (in fact as others pointed out, it had no handle). Usage and concealment are the same as the Lapel Dagger. An agent will employ the same hold as with Lapel Daggers when doing slashes and stabs.

Sleeve Daggers

A selection of Sleeve Daggers.
A selection of Sleeve Daggers.

This weapon is the SOE version of the medieval stiletto. With a blade length of 3.5 inches long, it’s larger than Lapel or Thumb daggers (the overall length is 7 inches). And indeed, its stiletto blade features a triangular cross section and ideal for stabbing. The weapon is kept in a sheath made to be strapped in the arm. And yes, you might have guessed, since it is strapped in the arm, it is obviously hidden in the sleeve which explains the name. Sleeve Daggers are also known by its colorful nickname “Commando Nail.”

Insole Dagger and “Tine” Daggers

An agent's Insole Dagger.
An agent's Insole Dagger.

One advantage of bladed weapons over firearms is the fact that you could hide it almost anywhere. Prison staffs and law enforcers know this perfectly well. This was exploited by agents in WWII with the creation of various daggers that could slip in your clothing, as what was mentioned above.

We heard of the Lapel Daggers, then Thumb Daggers. We also have the Sleeve Dagger, but did you know that SOE and OSS agents also hid their knives in their shoes? We know how boot knives work. In fact, I have one. But SOE upped the ante by coming up with weapons that could slip into the insoles of the shoe.

The Insole Daggers, also known as Shoe Daggers, are made to fit the arch of an agent’s foot. It is concealed in a pocket inside the leather insoles of shoes. Like the Lapel Dagger, it had a string lanyard for quick deployment. And sometimes, covert weapons are made from farming tools.

The Tine Dagger

A Tine Dagger (right) side by side with another covert blade (left).
A Tine Dagger (right) side by side with another covert blade (left).

Tines of pitchforks were broken off and fashioned into a form of WWII shank. The result is a stabbing weapon, with an 8-inch blade. They are crude, primitive, but effective. A twine wrapping provides the grip, while thumb notches are carved to help orient the weapon during handling.


1. Seman, Mark (2001). "Secret Agent's Handbook". Lyons Press.

2. Windrum, William (2001). "Clandestine Edged Weapon," Amazon Books.

3. "Thumb & Lapel Daggers, Nails, Brochettes, Etc."

4. Thompson, Leroy (March 1997). "Tiny Terrors, WW2 Lapel, and Thumb Daggers" Tactical Knives Magazine.

Questions & Answers


      0 of 8192 characters used
      Post Comment

      No comments yet.


      This website uses cookies

      As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

      For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

      Show Details
      HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
      LoginThis is necessary to sign in to the HubPages Service.
      Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
      AkismetThis is used to detect comment spam. (Privacy Policy)
      HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
      HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
      Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
      CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
      Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
      Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
      Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
      Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
      Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
      Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
      VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
      PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
      Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
      MavenThis supports the Maven widget and search functionality. (Privacy Policy)
      Google AdSenseThis is an ad network. (Privacy Policy)
      Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
      Index ExchangeThis is an ad network. (Privacy Policy)
      SovrnThis is an ad network. (Privacy Policy)
      Facebook AdsThis is an ad network. (Privacy Policy)
      Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
      AppNexusThis is an ad network. (Privacy Policy)
      OpenxThis is an ad network. (Privacy Policy)
      Rubicon ProjectThis is an ad network. (Privacy Policy)
      TripleLiftThis is an ad network. (Privacy Policy)
      Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
      Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
      Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
      Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
      ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
      Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
      ClickscoThis is a data management platform studying reader behavior (Privacy Policy)