GCHQ. Richard Aldrich

GCHQ - Richard Aldrich


Скачать книгу
attempts were made to match material from these ‘black bag jobs’ with Venona material, but sadly there were few connections. Nevertheless, Lamphere ensured a coordinated exploitation system with the code-breakers.[17]

      Meredith Gardner recalls that tight security for Venona only crept in slowly. In the beginning, everyone in the branch where it was being worked on was potentially privy to it, and ‘no special treatment was given’. This was partly because crypt-analysts had to support each other by discussing problems, since systems were often related to each other. There were people who genuinely needed to know, and there were also ‘mere busy-bodies who perhaps considered themselves consultants at large for all’. The Army intelligence liaison man, Howard Barkley, heard that ‘there was something interesting going on’ and came for a look, even though he had not been formally indoctrinated. Knowledge of Venona ‘might have been picked up almost anywhere’ in the branch at Arlington.[18]

      Yet Venona was ‘so sensational’ that eventually something unusual had to be done on the security front. The focus was less on restricting the knowledge that it existed than on tightly controlling the contents of the messages. However, counter-intelligence is a messy business. What the US Army code-breakers needed in order to identify the spies was background material from other government departments – so they were forced to work closely with a gradually expanding circle of people scattered across Washington. Typically, seven copies of one Venona message, issued on 30 August 1947 and entitled ‘Cover Names in Diplomatic Traffic’, were circulated. One went to GCHQ through its liaison, Colonel Patrick Marr-Johnson. The US Army code-breakers noted that the British surrounded the material with ‘rigid safeguards’. Two copies went to the heads of Army and Navy code-breaking. Four went to mainstream Army Intelligence, Naval Intelligence and FBI. The State Department was also an important collaborator. Given that informal secondary briefing must have taken place, this means that perhaps as many as thirty people may have been given information from one circulated Venona message.[19] By contrast, an understanding on Venona was only reached with the CIA in September 1948, and detailed cooperation on active cases did not occur until 1952. Remarkably, this was six years after the American code-breakers had fully indoctrinated the British at GCHQ.[20]

      It was the TICOM raids of early 1945 into Nazi Germany that had forced the British and the Americans to reveal their respective hands on the ‘Russian problem’. TICOM was an Anglo–American project, and no one could disguise the fact that material on German code-breaking successes against the Soviet Union was one of its top priorities. TICOM led to some of the greatest successes of the early Cold War. During the autumn of 1945 some of its best results were coming from a Soviet encyphered teleprinter system code-named ‘Caviar’ which was almost certainly being broken with the help of the German team recovered by Rushworth and Norland on their foray into Germany. No less important was the breaking of a number of Soviet military machine cyphers that were not dissimilar to the Enigma machine, or its widely used Swedish equivalent, the ‘Hagelin’ machine. GCHQ code-named these machines the ‘Poets Systems’. The first success was with an encoded Soviet teletype system code-named ‘Coleridge’ that gave great administrative detail relating to the Red Army in Eastern Europe. Carefully combined with material from more basic techniques such as radio direction-finding, it provided a superbly detailed picture of the Soviet Army in Europe. Thereafter, a team of GCHQ cryptanalysts led by Gerry Morgan working with an American naval team helped to decrypt another Soviet system called ‘Longfellow’. Some of the best successes against Soviet machines were the product of the brilliant mind of Hugh Alexander, combined with the enormous computer power provided by GCHQ’s American allies. In the Far East, Soviet naval codes were beginning to yield, but immediately after the war, ‘Coleridge’ and ‘Longfellow’ were the most important Soviet systems being exploited by the West.[21]

      Britain was told about the embryonic Venona project as early as August 1945, and thereafter John Tiltman, head of the Cryptographic Group at Eastcote, was kept informed of progress.[22] However, full cooperation came a little later. The young American code-breaker Cecil Phillips spent six months at GCHQ’s new location at Eastcote collaborating with Philip Howse. They focused on Soviet traffic that had been collected in Australia by monitoring Moscow’s Embassy in Canberra. More senior figures such as John Tiltman did not give them much attention, since Phillips and Howse initially thought much of the traffic to be low-level consular material. In 1947 GCHQ received a further briefing, this time from Meredith Gardner, the key American analyst of the Venona messages. However, GCHQ did not set up a proper Venona office at Eastcote until December 1947, sparked by the recognition that the Australian material was actually KGB traffic.[23] Eastcote was itself in a state of permanent revolution, with sections being constantly reformed and merged, to the extent that the ‘rumblings of reorganisation’ drew comment from figures like Joseph Wenger, Washington’s senior naval code-breaker.[24] The rumblings were the sounds of growth. From an establishment of just over a thousand in December 1945, GCHQ was nudging three thousand staff by 1948, and was already looking for new premises to accommodate its swelling numbers.[25]

      The British had also collected plenty of interesting wartime KGB traffic. As early as June 1943, Alastair Denniston had met Colonel Ted Maltby of the Radio Security Service, together with Roger Hollis and John Curry of MI5, to discuss ‘the interception of certain apparently illicit transmissions from this country which have been “DF-ed” to the Soviet Embassy’. (‘DF’ referred to the technique of radio direction-finding by triangulating between several aerials, sometimes mounted on detector vans.) These messages had attracted interest because they had nothing in common with the old Comintern style of transmissions, and it was noted that they might well be KGB traffic as they showed ‘great technical skill’. Collecting this material stretched Britain’s interceptor resources, since the traffic had lasted for eight hours solid in every twenty-four-hour period. Meanwhile, it was also searching for an illegal Comintern radio station in Wimbledon, using a disguised Ford Thames van with direction-finding equipment and security personnel in civilian clothes.[26]

      By 1948, the Venona teams at GCHQ and Arlington Hall were small but extremely integrated. Although the British employed a different code name for Venona, calling it ‘Bride’, they adopted a standard procedure for the translations. The British cell was superintended by William Bodsworth, one of the initial team that began studying Enigma in 1937.[27] Like so many interwar code-breakers, Bodsworth was a linguist, not a mathematician, having read Spanish at Cambridge. Cheerful and possessed of a gentle humour, he was dubbed ‘Snow White’ because of his mop of white hair. Bodsworth’s team undertook much of the laborious task of trying to reconstruct the Soviet codebooks. The seven dwarfs supplied almost enough nicknames for the Venona teams: by the end of 1950, the number of people at Eastcote working on ‘Bride’ remained at less than ten. For the Americans, British input was essential both to the efforts to track down the identity of figures like ‘Homer’ and to obtaining background material to allow the analysis of the KGB’s Canberra messages.[28]

      It is almost certain that the first person to alert the Soviets to the existence of the Venona project in any detail was a KGB agent named William Weisband. Born in the Soviet Union in 1908, Voldya Weisband had emigrated with his family to the United States in the 1920s. In 1940 he had changed his name to William, and had registered at the American University in Washington DC. By 1942 he was serving as a lieutenant in a US Army code-breaking unit in the Middle East. He was posted back to Arlington Hall in July 1944, and was soon working in the Soviet section. Weisband had in fact been a KGB agent since 1934, and he certainly displayed all the traits of a classic agent. Gregarious and popular, he had friends throughout what was now called the Army Security Agency, and charmed the senior officers. His reputation as a problem-solver allowed him wide access within the Soviet section, and Meredith Gardner actually recalls him looking at a list of names derived from Venona material in late 1946. Weisband was not himself identified by Venona, but seeing the messages decrypted must had made him feel queasy, since his name – or at least his code name ‘Zhora’ – was certainly buried in traffic somewhere. In 1948 the Soviets summarised Weisband’s reports that had been fed back to KGB headquarters in Moscow. They contained worrying news:

      For one year, a large amount of very valuable documentary material concerning the work of the Americans on deciphering Soviet cyphers, intercepting and analysing open-radio correspondence of Soviet Institutions was received


Скачать книгу