report into the workings of the secret agencies was unprecedented in its depth and detail. However, GCHQ is mentioned only once, in the list of abbreviations, where we are told that the acronym stands for ‘Government Communications Headquarters’.6 This is all we learn, for in the subsequent 260 pages the term GCHQ is in fact never used, and the organisation is never discussed. The subject is simply too secret.
Sigint was not simply a Second World War phenomenon. Throughout the twentieth century, Britain’s code-breakers continually supplied Downing Street with the most precious jewels of British intelligence, discreetly delivered in what became known as the ‘Blue Book’. Nicholas Henderson, formerly Britain’s Ambassador to Washington, explains: ‘All Prime Ministers love intelligence, because it’s a sort of weapon…The intelligence reports used to arrive in special little boxes, and it gave them a belief that they had a direct line to something that no other ordinary departments have.’ It was partly for this reason that British Prime Ministers ‘never minded spending money on intelligence’. Signals intelligence also matters to political leaders because it allows them to hear the authentic voices of their enemies. Although Winston Churchill was the most famous recipient of such material, his predecessor, Neville Chamberlain, was also offered some remarkable insights into the mind of Adolf Hitler. In 1939, shortly after the Munich appeasement, Chamberlain was given an intelligence report which showed that Hitler habitually referred to him in private as ‘der alter Arschloch’, or ‘the old arsehole’. Understandably, this revelation ‘had a profound effect on Chamberlain’.7
However, constant exposure to secrets derived from the world of code-breaking, bugging and other kinds of secret listening has the capacity to induce paranoia. Harold Wilson regularly dragged his Private Secretary, Bernard Donoughue, into the bathrooms and toilets of Downing Street. Only there, with the taps turned on full and water sloshing noisily in the basins, did he feel immune to the threat of bugs.8 A top priority for Britain’s technical security specialists during the Wilson years was the installation of the latest scrambler phones at the Prime Minister’s holiday home in the Scilly Isles, so he could speak to Whitehall without fear of interception. Doubtless, Wilson would have been delighted to learn that some of his opponents felt equally oppressed by electronic surveillance. When Ian Smith, the Rhodesian leader, visited London in late 1965 he insisted on having some of the more sensitive conversations with his delegation in the ladies’ lavatory, convinced that this was the one location where British intelligence would not have dared to plant microphones.9
Secret listening terrified friend and foe alike. Harold Macmillan recalled the almost unbearable sense of oppression he felt on his visit to Moscow to see the Soviet leader, Nikita Khrushchev, in 1959. His delegation feared that British codes were compromised, and they were unable to talk freely, even outside in the open air, because of constant technical surveillance. He would have been fascinated to learn that, at the very same moment, Khrushchev and his immediate circle also felt increasingly anxious about KGB microphones, to the extent that they dared not speak freely, even amongst themselves in their own capital.10 In June 1966, to his immense fury, President Tito of Yugoslavia discovered that he was being bugged by his own security chief. ‘Concealed microphones have been installed everywhere,’ he exclaimed angrily to a friend: ‘Even my bedroom!’11
The supreme example of the way in which eavesdropping could have political consequences was the Watergate scandal, which gradually brought about the downfall of President Richard Nixon between April 1973 and July 1974. Nixon had used a team of former CIA operatives known as ‘The Plumbers’ to burgle and bug premises used by the Democratic Party. Not everyone was shocked. In 1973, Britain’s Prime Minister, Edward Heath, made a visit to China. Mao Tse-tung asked him, ‘What is all this Nixon nonsense about?’ Heath asked what he meant by ‘nonsense’. Mao replied: ‘Well, they say he bugged his opponents, don’t they? But we all bug our opponents, don’t we, and everybody knows it? So what is all this fuss about?’12 Others took bugging in their stride. When Tony Blair visited India in October 2001, his security team found two bugs in his bedroom, and reported that ‘they wouldn’t be able to remove them without drilling the wall’. Blair ‘decided against making a fuss’, and quietly moved to another room.13
Eavesdropping and code-breaking are certainly nothing new. Even in medieval times the crowned heads of Europe had recourse to secretive ‘black chambers’ where encyphered letters from diplomats were intercepted, opened and decoded in order to produce intelligence. However, the modern-day GCHQ owes its origins to the arrival of the radio and the enormous impact of science upon methods of fighting during the Second World War. It was the struggle against Hitler that revolutionised the importance of intelligence from encyphered radio messages. Blitzkrieg and surprise attack were the hallmarks of a new style of warfare that arrived in the late 1930s. The sheer speed of war now meant that secrets smuggled under the coat collar of a traditional human spy were no longer of much use to commanders. The code-breakers of Bletchley Park were the perfect answer, offering intelligence in ‘real time’ from intercepted enemy signals. In some cases, messages sent from Hitler to Rommel in the Western Desert were decoded and arrived on Churchill’s desk before they were read by their intended recipient. Soon, Bletchley Park presided over machine-based espionage on an industrial scale.
With the onset of the Cold War, ‘sigint’, as it had become known, seemed equally important for a dangerous new era of nuclear confrontation. Atomic weapons and equivalent breakthroughs in biological and chemical warfare, together with ballistic rockets such as the V2, against which there was no defence, were the new currency of conflict. World leaders were required to comprehend strange new threats and the accompanying possibility of devastating surprise attack – which Lord Tedder, the British Chief of the Air Staff, called a potential ‘nuclear Pearl Harbor’. The precarious world of early warning, deterrence and ‘targeting’ had arrived. Military chiefs demanded better intelligence, and concluded that global sigint coverage was indispensable to the Western allies. By the mid-1950s, Britain’s code-breakers had abandoned their nissen huts at Bletchley Park for new accommodation in Cheltenham, the distinctive radomes and satellite dishes of which became an integral part of the Cold War landscape.14
Ironically, the story of GCHQ after it entered ‘peacetime’ in 1945 is very much about military operations, and even war. Britain’s vast sigint programme was managed by GCHQ, but run in cooperation with the armed services, which used their bases, ships and aircraft to collect the raw enemy signals. As this book reveals, GCHQ sat at the centre of a spider’s web that consisted of many other hidden organisations, both civil and military, which helped it collect signals intelligence. Many of its stories intertwine closely with Britain’s long legacy of small wars and guerrilla conflicts in locations such as Korea, Malaya, Borneo, Aden and the Falklands. GCHQ’s operations also involved hair-raising confrontations with the Russians. Britain ran secret submarine spy missions designed to gather signals intelligence from the Russian fleet. Specially converted submarines entered the protected harbours of the Russian Navy and rose precariously beneath cruisers to within six feet of their electronic quarry. Submarines that were sent on sigint missions – known to their anxious crews as ‘Dodgies’ or ‘Mystery Trips’ – were detected off Murmansk and pursued by Russian destroyers with depth charges. GCHQ’s ocean-going activities have been a well-kept secret, but some British submariners still bear the scars of this secret signals war in the far north.
Code-breaking is sometimes depicted as highly technical – more ‘Billion Dollar Brain’ than James Bond – and therefore perhaps a little dull. But much of the GCHQ story involves dramatic incidents experienced by individual sigint operators in forward locations, including in submarines and aircraft. However it was done, gathering sigint almost always involved a three-stage process. First, someone had