Sunday, March 30, 2025

Austerity in Post-War GCHQ - and Help from Friends

Austerity, belt-tightening, peace dividend: at various points during my career HMG found ways to make my life less simple, either by cutting GCHQ’s budget and therefore the resource we had available to put against a particular issue; or, more simply, by making sure I had a pay rise of less than the rate of inflation (as happened for each of the last ten years before I retired).

But much as I might have grumbled at the time (and since) I have to say that I never faced the conditions that GCHQ staff faced in the first few years after they left Bletchley Park in April 1946 to return to London: in fact to a former Bombe outstation at Eastcote, between Harrow and Ruislip in NE London.

Bletchley Park was too big for the much reduced Sigint organisation, and staff who had been with the organisation before the outbreak of war had been promised a return to London when peace came. However, not only was the London location not civil service premises in Broadway, nor anywhere else in SW1 (as returnees might have expected) for that matter, but the premises they were to occupy in Eastcote were just the same wartime TOBs – Temporary Office Buildings – many of them had spent years working in during the war.

The country was broke: there was no money for infrastructure other than to make do, and mend what could be repaired. Much of the damage caused by the 1940-42 blitz and the V-weapon attacks of 1944-45 remained unrepaired. The housing stock, which was already substandard in the 1930s, was in a much worse state after a decade of neglect. Not only that, but food rationing was still in place – in fact was even more severe than in wartime.

The winter of 1947/48 was exceptionally cold, so cold that transport was sufficiently disrupted to cause the breakdown of the national distribution network. And this caused more problems in the cities than in more rural areas, as food could not be brought from the areas in which it was produced to the areas in which it could not be produced. Rationing of potatoes — something that hadn't happened during the war — was introduced.

So I think of my predecessors in Eastcote in December 1949. It was more than ten years since the beginning of the war, and yet heating was limited, public transport was the only way to and from work, and salaries were low and highly taxed. (Income tax was 45%, while for those on salaries above £2000 (there were very few at GCHQ) the higher level of tax was 55%.) The 56 conditioned weekly working hours of wartime had been moved back to 42.5 (exceptionally: the rest of the Civil Service was on 45), but it had already been announced that these 42.5 hours would rise to 45.5 hours the following year, with Saturday morning working reintroduced. In short, things were bleak.

As I said at the beginning, this was austerity with a vengeance, but in December 1949, as had been the case in December 1947 and December 1948, there was a tiny challenge to the austerity in GCHQ. Not a staff rebellion, not some outrageous act of theft, but the action of a large number of unknown friends. On 22 December 1949 staff received a message from AD(P) (Assistant Director Personnel. responsible for HR, Finance and Personnel Security). This post was held by Eric Jones, who would later become GCHQ Director. He came from a family of textile manufacturers based in Manchester who had been commissioned into the RAF as a Group Captain and had been posted to Bletchley Park specifically to make Hut 3 (German Army and Air Force analysis and reporting) work efficiently and productively. For the time, his approach was singular: he dealt with all of his subordinates with courtesy and tact, treating them all, from the most junior, as individuals. This brought out the best in his staff and as a result Hut 3 tended to be a happy place to work. (Some of his Directorate colleagues referred to him, somewhat sniffily, as 'the Manchester Businessman': it was not meant to be complimentary.)

AD(P)'s message informed staff of the Christmas signal that the Director had sent to the Coordinator, the head of the (US) Armed Forces Security Agency (AFSA), the predecessor of NSA.

The Notice reads as follows

‘Signal to Coordinator

The distribution of gifts so kindly sent by staff of AFSA has just taken place. This wonderful generosity, and the friendship of which it is the token, is warmly appreciated by all, whether lucky or unlucky in the draw. By it, over the past three years, about a thousand of GCHQ staff, covering the lower salary scales, have shared the parcels.

Please be good enough to convey this message to the staff of AFSA, with the thanks and best wishes for Christmas and the New Year of the whole staff at GCHQ.’






What had happened was that the staff at AFSA, who had heard through US liaison staff in London of the hardships facing their UK opposite numbers, had decided in 1947 to send Christmas parcels to GCHQ. At GCHQ, it was agreed that only clerical staff, the people who couldn’t easily afford to supplement their rations on the black market, should enter a draw for the parcels. And the clerical staff quickly worked out that by pooling their tickets and sharing the results of the draw for the parcels, the chances of some supplement to the Christmas ration was more likely. In this context, ‘about a thousand of GCHQ staff, covering the lower salary scales’ meant just about everybody in clerical positions. It's hard to imagine nowadays, but each of those food parcels made a difference between an austerity Christmas and an old-fashioned "eat, drink and be merry" Christmas.

This is also a demonstration of the fact that UKUSA has always been something more than an arrangement of expedience. The relationship with partners has an added dimension because of the continual contact between individuals from each of the agencies. At this level, the relationship isn’t between allies so much as friends, and friends look out for each other. (And it shows the boundless generosity that characterises so many Americans. In November 1948 the organising committee at AFSA was quoted $1000 for the thousand eight ounce packages of tea and the thousand one pound packets of sugar it sent alongside the CARE packages.)

I wonder what the Ghost of Christmas Yet To Come would have had to show all those people: their dreams might not have gone much beyond the basics: enough to eat; a warm house; nice clothes; but imagine how pleased they would be if they could look into the future and see that as the world changed, and the country managed to sort itself out, the need for the food parcels went away.

One or two old lags might recognise this as a reworked version of something I posted internally in GCHQ when I was still ‘inside the wire’. My thanks to my successor for letting me retell the story and for letting me use the photographs.

Saturday, February 8, 2025

Sigint in Fiction

I had an articled published last month in the John Buchan Journal (unsurprisingly, the journal of the John Buchan Society). It is about the way that John Buchan drew on his First World War experience as a customer of Sigint to use cryptanalysis in one of his books and in a short story to advance the narrative, and to develop characters.

A key point, I feel, is that it is impossible to describe the process of cryptanalysis in a work of fiction and make it interesting for the general reader. Buchan’s answer was to give a vague idea of an encryption system: Playfair in one, double transposition in the other; make the reader understand that this is something really difficult, and that therefore the practitioners have to be intelligent, and not just lucky; and move on, making the story (or the relevant part of the story) about people who break codes or ciphers, not about the process of breaking them.

Two of the novels of Dorothy L Sayers have cryptanalytic sub-plots. Lord Peter Wimsey certainly shows himself to be intelligent in breaking the messages concerned, but the eight or nine pages in Chapter 28 of Have His Carcase, in which he goes step by step through the process of breaking a message enciphered with Playfair, and takes no prisoners while doing so. (She doesn’t try quite as hard in The Nine Tailors, in which she describes in just two or three pages an encryption method which uses as its key the course of the treble bell in a peal of Kent Treble Bob Major.)

Perhaps the process of cryptanalysis is of limited interest to the reader of a novel because the process of Sigint – interception, analysis, cryptanalysis – is analogous (though less interesting) to having somebody physically steal a copy of the message. The point the author is aiming at is that somebody who shouldn’t have had access to the message now has it, so the story can move on. There are more and less interesting ways of doing this, and pausing the story so that Lord Peter can show off is at the ‘less’ end of the scale.

I’m not aware, and I think the reason why is clear, that there is that much at all about Sigint in literature. I’ve dealt with Buchan; From Russia With Love is the only Bond story which touches on it (the attempt to steal a Soviet encryption device draws from British plans to steal Enigmas during the Second World War that Ian Fleming was closely involved with); John Hale’s The Whistle Blower is about cryptologists, but not cryptology; are there any more?  (I'm speaking of British novels.)

There is one candidate for a novel about GCHQ, though: The Tin Men by Michael Frayn. His National Service was spent being trained in Russian so that he could be a Sigint linguist. The novel is about a research organisation: The William Morris Institute of Automation Research. The institute is at the forefront of automation: computers are being programmed to write newspaper articles, produce popular TV shows and say prayers. But problems begin when programmers begin to program computers to welcome HM The Queen on a royal visit to the Institute. No spoilers, but it is as funny a book as you would expect the author of Noises Off to have written, and could probably claim the title of the first satirical novel about AI.

The novel was published in 1965, at a time when any mention of GCHQ and the work it carried out would have brought an author to charges under the Official Secrets Act. But in the succeeding fifty years the story has been passed down in GCHQ that The Tin Men was Frayn’s attempt to make sense of the UK’s national Sigint organisation.

Do read it!

 


Monday, January 20, 2025

More Detail on Cairncross at Bletchley Park

Last week saw a major release to The National Archives of MI5 files, mainly concerning ‘The Cambridge Five’ or at least the three of them, Philby, Blunt and Cairncross, whom MI5 had the opportunity to investigate (Burgess and Maclean having skipped the jurisdiction).

I’ve obviously not been able to go through this new material in any detail, but I have looked at the parts of the Cairncross files which shed light on his time at Bletchley Park.

I covered some of this three years ago in Sigint Historian: Personnel Security at Bletchley Park - Part Two

There is some interesting new (to me) detail. Cairncross had been encouraged by his controller to join GC&S or SIS. When he first identified to MI5 the battle in which the Ultra material he had passed to his controller had given the Red Army a decisive advantage over the Germans he claimed it was the Battle of Kharkov (Kharkiv, of course, today), not Kursk. Interviewed in 1967, Peter Wright asked him whether he could remember anybody at Bletchley who might have been pro-Russian: his answer was that everybody at BP was pro-Russian because of the events of the war, but he named three people Hugo Gatti, Philip Pounsey and Douglas Parmier, but these are likely simply to be three names plucked out of the air. (None appear on the Bletchley Park Roll of Honour.)

Edit: I stand corrected. Hugh GattyPhilip Pouncey and Douglas Parmeé are all on the BP Roll of Honour.

More insidiously, he said that his Soviet controller had once asked him why a former FO colleague, Roddy Greiffenhagen, had transferred to GC&CS, and whether this move would hit Greiffenhagen financially. After some investigation, MI5 discovered that Greiffenhagen was eased out of the FO ‘because of his total inability to do the work required’, and concluded that Cairncross was likely to have passed biographical details of other FO colleagues to the Soviets as well. He admitted to having passed a couple of pen pictures of GC&CS colleagues to his controller, but couldn’t remember who they were. This part of the release leaves a question mark over Greiffenhagen’s reputation: it’s a bit unfair, as there was no doubt an investigation subsequently: one, potentially, for a future release.

Cairncross said that his controller was annoyed when he engineered a transfer for himself from BP to SIS Section V at Ryder St to work on counter espionage (a section to which GC&CS deployed several members of staff as it began to resume its work on Soviet targets), the annoyance, he claimed, being because of the quality of the material he was passing from Hut 3. I wonder whether the presence there already of Kim Philby might have been a better reason for the controller’s annoyance.

There is a curious tale of Cairncross at Ryder St pestering somebody (whose name is redacted) at Berkeley St (where GC&CS diplomatic traffic was worked) to get information about a breakthrough made by Berkeley St. The unnamed person said that he had probably been indiscreet at the time, but reflecting on matters in 1967, thought that as Philby was handling this material, his indiscretions were probably not that relevant.

There is an amusing 1955 account by Henry Dryden (a Second World War Siginter who stayed on after the war). In the spring of 1949 Cairncross phoned Dryden at GCHQ, then at Eastcote, inviting him to lunch, and over the soup course asked whether GCHQ was a successful with Soviet encryption as it had been with German. Dryden ‘mumbled some sort of non-committal reply, bringing in the phrase “one-time pad” and tried to give the impression that one could not do anything to make progress’. This story, at least, is already in the public domain, having been told by Dryden in 1993, in a postscript to his contribution to Hinsley and Stripp’s Codebreakers.

There may well be more details in these files, and I’m sure there will certainly be in other files in the release, but three things stand out to me. The first is something I have mentioned before: how little the MI5 investigators knew of (never mind understood) how Sigint worked and their consequently appearing to deal with it as not as key an issue as were some others. The second, is that my judgement of three years ago, that of course it was likely there were other Soviet sympathisers at Bletchley, but that they were unlikely to have been able to pass on many great secrets, hasn’t changed, not least because of the third: that only if somebody had access to Bletchley’s serialised reported intelligence would it be possible to pass intelligible information to a hostile intelligence service.

Monday, December 30, 2024

Preparing the Ground for Room 40

There was nothing recognisable as Sigint in the UK before the First World War started, but we know a fair amount about interception before the war started and can make reasonable assumptions about why there was no permanent organisation created to monitor the wireless traffic of foreign armed forces. The idea that there was no serious thinking about the value of interception, and, its corollary, that there was no thinking about how an enemy might exploit UK communications, is not tenable. What follows is about the Admiralty – I’ll perhaps look at the War Office in another post.

The earliest indication I have seen so far of somebody thinking about a potential downside to the wireless telegraphy (WT) systems first being trialled by RN ships at the start of the last century comes from a 1900 report. Between March and May 1900 four ships on the Cape of Good Hope Station, HMS Forte, HMS Magicienne, HMS Raccoon and HMS Thetis, were equipped with Marconi WT equipment and carried out trials. Their reports, forwarded to the Admiralty by the Senior Naval Officer on the Delagoa Bay and Natal Division, concentrated on the performance of the equipment and its potential, but the report from the Captain of HMS Raccoon added:

‘I am strongly in favour of its suitability for communications between Her Majesty’s ships especially during patrolling operations of a similar character as those existing here. Had the presence of an enemy’s fleet to be considered, it would be a question if the possession of this instrument would not tend to disclose the proximity of your presence to the enemy.’

At its most basic, those thinking about foreign communication usage thought at the message level, rather than at the carrier level, and saw any potential value as deriving from messages transmitted during actions. Thus, in the 1902 Royal Navy fleet exercises, the Admiralty issued an instruction forbidding either fleet from acting on information derived from intercepted messages alone, because ‘in a real action, the signals would probably be unintelligible to the other side’; and in 1904, the British squadron in Chinese waters intercepted messages being passed between a Russian Admiral and his staff. The RN Commander reported to the Admiralty that ‘the character of the messages was not important, but the fact of interception showed possibilities that a belligerent's messages could be and probably would be intercepted’.

Radio procedures of foreign navies (French, German, Japanese, American and Italian) were studied to provide recognition: in 1904 British warships were instructed to transmit to the Admiralty copies of all foreign radio messages which they intercepted and in 1904 and 1905 the NID was informed of Intercept of Russian naval traffic by ships at Suez, the intercept of German naval traffic by ships at Corfu; and of Dutch stations by ships in the Baltic. Furthermore, the RN had acquired the French Naval Wireless Telegraphy Handbook of 1904; and by 1906, procedures used by the American and Japanese Navies had been added to the list.

The accepted view was that though wireless messages might be intercepted, encryption would render any intercepted message unreadable. In 1906 the commander of the Home Fleet (and later First Sea Lord) Arthur Wilson, stated that even if ‘the enemy has our signal books’, all messages in this compromised codebook would remain entirely secret so long as they were superenciphered by means of an elementary transposition cipher. In 1907 the head of the navy’s radio service and the Director of Naval Intelligence (DNI) both doubted that encoded radio traffic could ever be broken, since ‘under most circumstances it will only be necessary to cypher a few words in each message to render it quite unintelligible’.

The belief that encryption would render any message unreadable led to thinking in another direction: how to deny an enemy the possibility of wireless communication. Again, this thinking was not developed: jamming was not a possibility because it would mean jamming of own comms as well as of the enemy's. There was little thinking beyond the destruction from the sea of enemy coastal wireless stations and the cutting of enemy telegraphic cables.

Counter-jamming was studied: already by 1909 the first experiments in directional wireless telegraphy were being carried out by the Admiralty, at both shore stations and in ships at sea.

There had been no cryptanalytic organisation in the UK since 1844 but crucially, the pre-1844 Secret Offices looked only at civil and diplomatic material, not military. The Indian Army, following its experiences in South Africa, had set up a two man cryptanalytic bureau in India, but its function was to look at diplomatic and attaché traffic acquired from telegraph companies, something that, while legal in India, was illegal in the UK, and the product of which was of no interest to the British government.

In 1908 Fleet Paymaster Charles Rotter of the Naval Intelligence Division asked that any German Naval messages intercepted should be logged and forwarded to the NID. This work had certainly begun by 1909 and a file of this material certainly existed in 1973 in GCHQ though it was probably subsequently returned to the MOD and is now waiting to be discovered in an ADM piece in The National Archives.

The file contained raw traffic and work-sheets. Some of the raw traffic was recorded on specially printed forms headed ‘Return of Intercepted Wireless Telegraph Messages for the month of ...’ These returns were prepared at the point of interception, presumably by transcription from the actual logs, and sent to ‘Admiral Commanding Reserves’ by the ‘Chief Officer’.

The worksheets showed successful decryption of one encryption system, and work on callsigns and the collation of versions received from the different interception points. These interception points were: Whitehall (presumably the Admiralty), Aberdeen, Ipswich, Dover, Rosyth, Port Patrick, Pembroke Dock, St. Helier, Essex Hill, Hunstanton, and, at least from 1912, Scarborough. At the Admiralty end, monthly batches of returns as received from the stations were ‘referred for information’ to DID in person. What the latter made of the raw intercepts is not clear.

Callsigns were two-, three-, or four-letter. It was easy to identify many: for example RO, NA, AKO and AHO stood respectively for the ships ROON, NAUEN, KOENIGSBERG and HOHENZOLLERN. Frequencies were reported as ‘Wavelengths in feet’. They included 5000, 6000 and 6500 (the roundness of the figures suggests strongly that the measurements were pretty rough).

The monthly return forms had a column for ‘Remarks, Strength of Signals; If musical, etc.’ It was not much used, but some transmissions were described as ‘musical’ or ‘high musical’; others were described as ‘whistling note’ and ‘quenched spark’. Strengths were given in a scale up to 10 and ‘rates’ – presumably words-per-minute – were of the order of 12 to 15.

The traffic that was read at the time was a 10-letter code; each group consisted of two more or less pronounceable 5-letter ‘words’. There were clear indications that a German codebook had been acquired physically by some means, rather than that it had been reconstructed cryptanalytically. All the messages were originated by ‘Admiralstab’, callsign KMD (probably Kriegsmarinedienststelle – Naval HQ), using the main German naval transmitter at Norddeich. The messages refer to movements of German ships or to the deployment of British and other warships in the Mediterranean and home waters – and on one occasion to an eruption of Mount Etna! The readable sequence started in March 1910 and finished with the following message dated 11 July 1910: ‘This is the last telegram from the Admiralstab’. (Or might this have been a comment?)

There is no evidence that any other cypher was read at the time. Most of the unread traffic is in 5-letter transposition systems.

Conventional wisdom is that the Naval Intelligence Division had arranged for the Secret Service to purchase a copy of a German Naval codebook from an agent. £600 went into this venture but the codebook which eventually turned up was a forgery. I wonder, however, whether it isn’t just as likely that the codebook was used until 11 July 1910 at which point it was superseded.

Though this activity by Rotter was tolerated, he was acting in isolation. At his request, during the naval manoeuvres of 1912 and 1913 a separate division of the Admiralty War Room, known as Section C, had been assigned to work on intercepted wireless traffic, but nevertheless when the War Room was mobilised on 30 July 1914 it was simply decided that such a unit was unnecessary, and Section C was dropped.

Just before the advent of war, Cdr Frederick Loring RN, probably the Navy's expert in wireless telegraphy at the time, summed up why interception would not prove a serious threat to naval wireless in wartime.

‘... the more skilled the organisation, the more difficult it is for a strange operator to take down with the necessary accuracy the groups of a code message: he cannot ask for the repetition of doubtful groups, and he has no intimate and daily familiarity with the methods of his opponent to assist him in his task. And, after all, giving the enemy every advantage, giving him a perfect record of the signals, the key of the code to his hand and equal facility of skill and language to translate it for use—a most improbable combination, it must be admitted—he has still failed to prevent the all-important information reaching its destination.’

That Loring was wrong in 1914, just as the FSL and the DNI had been wrong in 1906 and 1907, shows how different Sigint is from any other sort of intelligence that existed in 1914 and how difficult it was to imagine it. A combination of the traffic analysis carried out in the War Office by Room 40 staff in September and October 1914, the capture of the Magdeburg Codebook and its arrival in London at the end of October, Rotter’s working out the superencryption system used by the German High Seas Fleet, and Winston Churchill’s imaginative insight into this totally new source meant that by 8 November Room 40 had been established as the first cryptanalytic bureau in the UK since 1844 and was ready to become the UK’s first Sigint organisation.

Wednesday, December 4, 2024

Collection Management

Collection Management evolved during the Second World War and was honed to a precision instrument during the Cold War. What I describe belongs to the HF era (and I’m only looking in detail at the Second World War here). The same principles apply today, but the way in which they are exercised is as totally different as are the comms in use in the twenty-first century. 

Even within the bounds of the laws of physics and the permissions a Sigint agency has, it can’t collect everything it would like to or even everything its customers say they would like to see; even so, it will always collect more than can be processed; what filters through the processing won’t all be intelligible to its analysts; and a significant amount of what is intelligible won’t actually be relevant.

The city on the hill towards which the collection management system is aiming is one in which the messages which are intercepted and processed are those which will allow the agency to produce the most important intelligence for the most relevant customers; and the smallest number of signals are intercepted which, because of irrelevance or unprocessability, won’t produce wanted intelligence.

The need for a Collection Management organisation arose because of what was at the time referred to as the ‘Enigma Complex’. The value of Enigma decrypts meant that the GC&CS view, that Enigma cryptanalysis was a single problem that needed to be managed centrally, won out over the service view that their collection facilities were theirs to control.

The basic problem for collection management was that at any time there might be ten or twenty enemy transmitters operating for every interception set, and that there weren’t enough intercept operators to operate each interception set 24 hours a day. Overcoming this issue meant the development of an understanding of how the Germans organised their communications networks, how within that organisational structure the individual networks operated, and an assessment of the value of intercepting some or all of the communications passed on that network.

To achieve this, the collection management system had to look two ways: towards the intercept stations to understand what they could collect given both their location and the limitations of their infrastructure; and towards the analysts to understand what was the minimum of allocation of resources that would provide them with enough (sometimes just enough) information.

Some examples: there was little interest in the content of German weather messages, but sent out at the start of the day, and repeated through various networks which used different crypto key settings, it meant that certain weather messages could be decisive for recovering the daily key for a number of networks, and in order to have the cleanest possible version of the message that had been sent, three or even four intercept stations would have a set and an operator copying it. Conversely, a garrison located in the Baltic where there was little or no operational activity might simply be sampled once a week or month, simply to maintain continuity and confirm that the garrison hadn’t moved or changed its comms procedures. During operations, Direction Finding might be the key contributor in the Sigint system, able to say exactly where a unit or formation was (as happened with the Bismarck on 25 May 1941), but was of limited use, and in fact a waste of time and resource, against permanent locations such as those serving Hitler’s Headquarters in the Wolfsschanze.

These examples are extremes. Collection management normally depended on a group of people who understood and trusted each other to manage allocation of receivers according to current operational requirements, the technical sophistication of the transmission, the need for continuity and the laws of physics. Collection would normally be carried out in military stations, and as a rule each service collected the traffic of its counterpart, but this was not a hard and fast rule. Diplomatic and Commercial Sigint, based, of course, in London rather than at Bletchley Park had dedicated civilian-staffed intercept sites, but its collection management staff were at Bletchley to ensure that the entirety of collection resources could be placed against all of Sigint’s targets – two extra brownie points for knowing that this is what Mary and Valerie Glassberrow, the grandmother and great-aunt of the Princess of Wales, were doing at Bletchley Park.

The key takeaway from this isn’t its size, or its complexity, or its flexibility, or that everybody involved in it had to take on trust the relative importance of a target at any time, or that application of the ‘need-to-know’ principle would have stymied this progress from the start: it is the fact that this process was invisible to everybody outside the Sigint organisation. Any bean counter observing the organisational structure might simply ask if all those posts (perhaps a hundred all told) might be abolished and a system set up in which analysts would simply task stations themselves. Well, they could be abolished, and the analysts’ tasking would be productive for a day or two, but with no-one to adjudicate between competing demands for receiver time (never mind the absence of a sophisticated process which worked across all targets and all stations) the value and quality of intercept, and of the intelligence produced from it, would decline rapidly.

We often describe Sigint production as a chain: stations intercept messages and send them to HQ where the intercept is processed before being presented to cryptanalysts and/or traffic analysts whose output goes (through linguists if the resultant text is in a foreign language) to intelligence analysts who issue a report to customers saying what the originator of the message said, but it is a satisfactory as an analogy only in the broadest sense. Collection management isn’t alone in being an internal function which is invisible to those who simply see the chain. Nigel de Grey includes, in what he calls the ‘Ancillary Sections’: the Machine Tabulating Section, Communications, the Central Signals Registry, the Signals Office, Personnel, Recruitment, Administration, Works and Buildings, and, of course, Security.

I blogged the first part of what I thought would be a two parter on Sigint Communications a while back. I got stuck on Part 2 trying to work out how to summarise it in fewer that five or six thousand words. These ancillary sections are key to the success of Bletchley Park during the war and for GCHQ’s success subsequently, and their story is as complex as those of the well known Huts. Sadly, these stories are seldom told.

Wednesday, November 20, 2024

The Bletchley Chapter of 'People Against Uncongenial Work'

Much of the success of Bletchley Park during the Second World War is owed to the combination of great talent and an atmosphere in which it could flourish: a combination of the Common Room of a college, the managed anarchy of the tiny pre-war GC&CS, and the respect for – or at least the toleration of – people who didn’t conform to the societal norms and expectations of mid-twentieth century Britain.

But that isn’t the whole story. Nigel de Grey, in his Organisation and Evolution of British Sigint (TNA HW 75-78) refers at times to the unwillingness of some of the people who benefited from BP’s toleration of individualism to take their share of necessary chores, the necessity of which was not obvious to them. Here are two examples.

‘The Tube Central

The Pneumatic Tube System was installed in order to overcome the delay in distribution attendant upon the use of messengers, the only labour available for which were girls from local primary schools on leaving, whose hours of work were strictly controlled by Civil Service regulations and whose enthusiasm and discipline was not noticeably high, and to take the place of the belt conveyors which had been in operation to adjacent sections. The principle adopted was to have four main trunk double lines to the four requisite office blocks terminating at a point where a single line internal system conveyed the traffic to the several requisite points within the office block. The "cross country" tubes were laid underground and the distances were in some cases the maximum possible, hence the necessity for relaying within the blocks. The system suffered from two main troubles, firstly that the bore of the tubes and hence of the containers was not large enough to cope with the documents to be distributed or indeed to carry the overall volume; secondly that owing to indifferent manning of the local stations by the user sections the maximum was never got from the system. Communications Section was forced eventually to man both ends of the trunk lines but the interior terminals were as a rule manned by casual, not to say extremely casual, labour and Communications Section received very little cooperation from the Sections, some of which seemed to find any routine beyond their capabilities or infra dig.

Time stamping Machines

Analogous to this laxity was the difficulty experienced by Communications Section over the Stromberg time-stamping machinery. The regular and rapid flow of papers (decrypts, signals and so forth) was an essential to the main function of GC&CS, namely decrypting and reporting to the combat commands. To achieve this it was essential to time the arrival and departure of documents at each stage of the handling so that any bottle neck should at once be revealed and steps taken to relax it. In order to make this easy electric time-stamps were introduced in May 1943 (when, it will be remembered, GC&CS was "working-up" for the Second Front) and installed at strategic points in the Cypher Office, the Main Teleprinter Room, the Auto Room, the Tube Central, Huts 3, 6 and 8, Naval Section and Air Section. To avoid all discrepancies the clocks in these machines had to be synchronised daily, a routine for which was laid down on the principle of dialling TIM in London. The minutes of the Communications Committee show the struggle that Communications Section had to get the Sections to conform to this very simple routine. All sections were careless but Hut 6, a key point, consistently ignored not only the synchronisation of their clocks for weeks at a time but the use of the stamp at all. Thus when in the autumn of 1943 Communications Section were straining every nerve to increase the rapidity of their service to Hut 6 and asked for the cooperation of Hut 6 in testing the results of their experiments in handling, the tests broke down three times because Hut 6 would not use the time stamps properly. Hut 8, another key point, two months after the institution of the time stamps was found to have locked its Stromberg up in a cupboard and left it there. Another section's clock had stopped and never been used again. Thus the two worst offenders were the two sections which employed the highest grades of labour, both being manned principally by university trained personnel who had no doubt been taught to think for themselves. The instances quoted, perhaps trivial in a sense, were none the less symptomatic of the difficulty of getting any businesslike routine carried out, any suggestion of mechanisation in an organisation manned by untrained labour and with whom no disciplinary action could be taken except that of dismissal should they prove insensible to an ordinary reprimand.’

The voices of the educated – ‘university trained personnel who had no doubt been taught to think for themselves’ – tend to predominate in the story of Second World War British Sigint, and it’s too late to gather the memories of those trying to improve the information flow using Time and Motion methods such as the use of Stromberg time stamping machines; and, anyway, the value of the results of the graduates’ work in cryptanalysis and machine-based solutions on any day probably outweighed any benefit potentially lost. But nevertheless qualified people with skills which might have improved the way that BP worked were being ignored.

And this wasn’t the worst thing that was happening. As de Grey hints in telling the story of 14 year old ‘girl’ messengers, and as is clear from any telling of the stories of (for example) cipher operators, not all jobs at BP were stimulating or interesting; not all needed great minds; and many were as dreary as might have been found in any factory job to which labour had been directed, but with the additional pressure that those working (mainly women) on these tasks could say next to nothing outside work about the dreary, mundane nature of their working lives.

A necessary consequence of the industrialisation of UK Sigint during the Second World War was the creation of production line jobs which, like those in contemporary factories, were not stimulating. Add to that a need-to-know system, in which the people doing the most menial jobs knew the least about the way in which their work contributed to the organisation as a whole, and it is not hard to see that without wartime regulations on directed labour, Bletchley Park might have found it difficult to achieve the success it did.

 

 

 

Saturday, August 24, 2024

Enigma and the Poles

Chris Smith (@spy_historian) tweeted a series of tweets about the Polish contribution to Enigma cryptanalysis this morning. I copy them here, adding some comments, and then write a bit more broadly about the issue. 

CS: Polish work on Enigma was truly impressive. They broke it while the British basically ignored it because they deemed it insoluble. A waste of time.

TC: The British had broken the commercial variant of Enigma early in 1927, and an improved solution was developed in time to exploit its use by the Spanish and Italian Navies during the Spanish Civil War and subsequently. I don't think it's fair to say that they thought the military variants insoluble, but up to 1939 they had no idea how to approach the problem. Put crudely, people who broke book-based codes, and simple electromechanical ciphers couldn't break more complex machine-based ciphers.

CS: They recognised the value of machine-based approaches. Though the Bomba was rapidly rendered obsolete by upgrades to Enigma systems, the Bomba was proof of concept. Use machines to break machines. I've argued elsewhere that Enigma and Bombas were an industrial revolution.

TC: Mechanical support to cryptanalysis wasn't new: Hollerith machines had been used in Room 40 during the First World War and other machines were being proposed in the second half of 1939 as GC&CS recruited from a deeper pool. The specific Polish breakthrough was to design, build and deploy a machine that mimicked Enigma. Following Turing's meeting in Parish with Rejewski he adopted the same concept for his (otherwise very different) Bombe.

CS: The contribution of the Poles, who shared their successes with the British, paved the way for upscaling that culminated in the SIGINT phenomenon that was #BletchleyPark. The BP Trust were right to create a Polish memorial, Prince Andrew was right to gift Poland an Enigma.

TC: Although the BP Trust were wrong to give one of the Enigmas GCHQ had loaned to them to Prince Andrew to gift to the Poles … !

CS: However, it has become a trope that this Polish contribution has been largely unrecognised in Britain and the US. My argument is that this is simply untrue. In fact, from the early days of Ultra becoming public knowledge - 1974 - the Poles were recognised.

CS: It is almost impossible to find a book that doesn't recognise their *massive* contribution. Yet these same texts often state that they have been under-recognised while recognising them. It is a weird, self-replicating myth. 

TC: The problem is that the nature, and particularly the source, of the Polish contribution was either ignored or grossly oversimplified (as largely was the case with the UK's own cryptanalytic work): so little was released by GCHQ in the first twenty years after the 1974 revelation that mythology filled the gaps. 

CS: So powerful is the myth, it has caused minor international spats. The Polish ambassador to the UK complained about Polish elision and misrepresentation (arguably rightly) in the 2001 film Enigma. In 2016, the Polish state commissioned a touring exhibition to correct the record.

TC: Both Enigma and The Irritation Game played their part in reinforcing the mythology (just as U-571 ignored the UK) but Hollywood blockbusters aren't documentaries.

CS: But the record didn't actually need correcting. The early British lit on BP/Ultra was clear that Poles did the lion share of early work. See: Lewin (1978), Calvocoressi (1979), Hinsley et al (1979), Collier (1982), etc.

------------------------------

Actually, Hinsley et al were wrong and their record did actually need correcting. Vol 3 pt 2 (1988), Appendix 30 (pp 945-939) was written by Joan Murray (née Clarke) and Henry Dryden, both wartime Siginters who had stayed on to work at GCHQ, and who were retained after retirement to update the version of the Polish contribution recounted in Appendix 1 of Vol 1 which was written on the basis of records and knowledge which was later proved – for example by the publication of Rejewski’s memoirs – to be incomplete. At best, I don't think it's unreasonable to have expected Hinsley et al to have done rather better first time.

CS: So where does this all come from? As ever Group Captain F.W. Winterbotham. His big splash book, The Ultra Secret (1974), which (sort of) revealed Ultra totally got the Polish work wrong. He was writing from memory and, besides, didn't know everything. Loads of that book is wrong.

CS: Yet as soon as it was published, key people in the know, not least Tadeus Lisicki, a wartime Polish intelligence officer and cryptanalyst, wrote to the papers, in 1974, to point out the Polish work. Lisicki compiled a dossier that formed the basis of important books by Poles.

TC: By Poles, in Polish, and while some were later translated, their impact was limited, not least because the authors weren't appearing at book festivals, on Radio 4 or in broadsheet review pages.

CS: Examples include Garlinski (1979), Woytak (1979) and Kozaczuk (1984). All of which have appeared in English. Newspapers, TV shows, radio comedies and even movies have made the point - though poorly in the case of Enigma. So why does this myth of anglo 'chauvinism' persist?

CS: None of this is to dispute the role Poles such as Marian Rejewski, Jerzy Różycki and Henryk Zygalski played. Quite the reverse. What fascinates me is the endurance of a myth that these pioneers have been elided from English language historiography. They haven't.

I remember telling a friend, when I became GCHQ's Historian-designate in 2008, that the two things I didn't see myself getting involved in were Enigma and VENONA. How wrong I was! Enigma remains a live issue for many – perhaps most – people outside the academic Intelligence Studies community who were interested in Intelligence history.

In the British public imagination the Bletchley Park story was the acme of the Boffinry: the British had been successful in the Second World War because they had out-thought their enemies. To the list of back-room boys coming up with Spitfire, Radar and bouncing bombs, was added the super-smart mathematicians who in complete secret helped win the war by breaking all German cryptographic systems. As with the Battle of Britain, Bletchley Park became part of a mythology of plucky little Britain fighting on alone and prevailing against all the odds, in spite of the evidence. The Polish contribution became merely transactional: a Pole handing over to the British an Enigma machine which was reverse engineered.

This popular narrative would not survive unchallenged the changes in Poland after 1989: the return to democracy, Poland joining NATO and the EU, and the move to the UK of younger Poles who had learned at least some of the story of Poland's contribution to the Enigma story. A Polish/UK Historical Commission reported in the first decade of the twenty-first century and described in English for the first time the breadth and depth of the Polish contribution to intelligence across the board, while GCHQ's massive 1994-2004 release of Second World War records had been absorbed and it was possible to begin to approach the question of Anglo-Franco-Polish cooperation on Enigma rather more reasonably than had been the case previously. Pioneering work by Dermot Turing and Marek Grajek also produced new accessible historical information that could be shared in English and Polish.

The problem I found as GCHQ Historian was that while 'the record' was becoming clearer, the Polish sense of their contribution having been slighted for so long had allowed a mythological counter-narrative to develop in which the UK and France would never have come near to solving Enigma without the Polish contribution. It was for that reason that I coined the term 'Enigma Relay' to try to make two points: first, that the credit of solving Enigma belonged to the allied team, the Poles, French, British and Americans each running separate laps and passing the baton; and second, that solving Enigma wasn't something worth 100 brownie points and that each of the four nations should scrabble to establish how many of the 100 they could each claim. International Intelligence cooperation doesn't work like that; solving Sigint problems doesn't work like that. I tried the 'Enigma Relay' out on a few people and then, when Polish, UK and French Sigint representatives agreed to meet in Warsaw in 2014 to celebrate the seventy-fifth anniversary of the tripartite meeting at which the three countries agreed to share all they knew, put the 'Enigma Relay' concept into the speech given there by Iain Lobban, Director GCHQ (https://www.gchq.gov.uk/news/director-gchq-commemorates-crucial-pre-war-enigma-information-sharing-meeting-poland).

Did this resolve all of the issues? No, of course not. Narratives and counter-narratives, and mythologies, have a life of their own and accurate history will always find it hard to compete against what non-historians would like a two dimensional 'truth' to look like. But reinforcing on every possible occasion the fact that success against Enigma took a lot more than a couple of very bright mathematicians thinking great thoughts, however crucial those great thoughts were, is part of the job. And making British audiences realise that most Sigint successes since 1939 are due to GCHQ's partnerships with Sigint agencies in other countries goes beyond mere intelligence history, and, hopefully, leads people to reflect that intelligence doesn't happen in a vacuum.