GCHQ: The Uncensored Story of Britain’s Most Secret Intelligence Agency

Richard Aldrich’s excellent GCHQ: The Uncensored Story of Britain’s Most Secret Intelligence Agency contributes significantly to the public understanding of the role secret intelligence agencies have played in world affairs and the domestic politics of Britain and elsewhere. From the codebreaking of the second world war to the frightening mass surveillance and data mining of the modern era, Aldrich provides a consistently interesting and informative account. Technical details on signals intelligence (SIGINT) techniques are relatively few, but the book contains a lot of new and interesting information running quite close to the present day.

GCHQ’s history

The Government Communication Headquarters (GCHQ) is Britain’s version of America’s National Security Agency (NSA) or Canada’s Communication Security Establishment (CSE). They are primarily the governments interceptors and decrypters of communications: from the telemetry data from the missile tests of foreign powers to (increasingly) the electronic records tracking the communication and behaviour of all ordinary citizens. Aldrich covers the history of GCHQ from the second world war virtually up to the present day: with long sections on the U.S.-U.K. intelligence alliance; the Cold War; progressing intelligence technologies; overseas listening stations and decolonization; terrorism; secrecy, the media, and oversight by politicians and the public; the post-Cold War era; and the modern day.

Aldrich describes an extraordinary number of cases of allies spying on one another: from the United States and United Kingdom during the interwar and WWII periods to India bugging Tony Blair’s hotel room during a Prime Ministerial visit to the considerable espionage conducted by the U.S. and U.K. against the United Nations Security Council and Secretariat in the lead-up to the 2003 Iraq War. It is safe to assume that everybody is spying on everybody all the time. Indeed, in the later chapters, GCHQ describes how private organizations and organized crime groups are increasingly getting into the game. For instance, he alleges that British banks have paid out billions of Pounds to hackers who have gotten into their systems and blackmailed them.

GCHQ also documents the collusion between private companies and espionage organizations, going back at least to the telegraph and earliest submarine cables. Right from the beginning, the owners and operators of these communication links secretly passed along data to intelligence organizations, which was used for purposes of diplomatic and military espionage, as well as to gain economic advantage through industrial espionage. Aldrich also describes how private companies have been made to build back doors into their products so that organizations like GCHQ and the NSA can crack the communications of people using them. This applied to manufacturers of cryptographic equipment in neutral countries like Switzerland during the Cold War.

Aldrich also argues that the Data Encryption Standard (DES) was intentionally weakened to allow NSA snooping, though I have read elsewhere that the NSA actually used its expertise to strengthen the algorithm. Aldrich does a good job of describing one deep tension in the current mandate of GCHQ: on one hand, it is increasingly encouraged to help private British companies like banks secure their computer and communication systems. At the same time, it tries to preserve back doors and insecure communication methods in products used by others, so as not to undermine its own espionage mandate. Similarly, Aldrich talks on a number of occasions about the tension between using intelligence information and protecting the sources and methods used to acquire it. While it may be especially damning to condemn the dubious actions of a foreign power using their own intercepted and decrypted communication, doing so inevitably informs them that you are reading their traffic. Something similar is true when it comes to using surreptitiously acquired information to prosecute criminal trials.

GCHQ contains lots of information on the spotty record of the world’s intelligence services, when it comes to predicting major events. He describes many situations where policy-makers were caught by surprise, because their spy services didn’t pass along warning. These include the Yom Kippur War, the overthrow of the Shah of Iran, the Soviet invasion of Czechoslovakia, the fall of the Berlin Wall, and others. Aldrich also describes the Iraq-WMD fiasco, what it shows about the analysis of intelligence services, and what some of its broader political ramifications were.

At many points, Aldrich identifies how GCHQ and the NSA are by far the most costly intelligence services of the U.K. and U.S. respectively. The NSA dwarfs the CIA, just as GCHQ dwarfs MI5 and MI6 in staffing and resources. This is reflective of the special importance placed on intercepted communications by policy-makers. It is arguably also demonstrative of how GCHQ has been able to use the deep secrecy of its work to evade government scrutiny and secure considerable material support.

GCHQ’s present

The last section of Aldrich’s book is positively frightening. He describes how the fear of terrorism has driven a massive increase in technical surveillance – certainly within the U.K. but very likely elsewhere as well. He describes how a 2006 European law requires telephone and internet companies to retain comprehensive records of the communications of their customers for ten years, and how the government is planning to store their own copy of the information for data mining purposes. Aldrich explains:

The answer [to why the government wants its own copy of the data] is ‘data mining’, the use of computers to comb through unimaginable amounts of information looking for patterns and statistical relationships. This practice now constitutes the most insidious threat to personal liberty. What makes surveillance different in the age of ubiquitous computer and the mobile phone is that our data is never thrown away. Machines routinely store millions of details about our everyday lives, and at some point in the future it will be possible to bring these all together and search them.

Aldrich quotes a disturbing warning from the retiring Director of Public Prosecutions, Sir Ken Macdonald GC. Macdonald warns that powers are being irreversibly granted to the state, and that “we may end up living with something we can’t bear.”

Personally, I think all this is much more dangerous than terrorism. If the choice is between tolerating a few terrorist attacks per year and building up a gigantic secret alliance between government and private companies, designed to track all the details of the lives of individuals, I would prefer the terrorism. After all, terrorist groups are weak outlaw organizations with limited resources. The state, by contrast, is massive, potent, permanent, and not always subject to effective oversight. Our fear of a few bands of fanatics (collectively far less dangerous than smoking or car crashes) is driving us into giving the state unparalleled ability to monitor everybody.

The book is similar in purpose to Matthew Aid’s The Secret Sentry: The Untold History of the National Security Agency, though I think Aldrich’s book is significantly better. I recommend the entire book to history buffs and those with an interest in intelligence or the Anglo-American alliance. The last section – on the growing power of the state in response to terrorism – I recommend to everybody.

Author: Milan

In the spring of 2005, I graduated from the University of British Columbia with a degree in International Relations and a general focus in the area of environmental politics. In the fall of 2005, I began reading for an M.Phil in IR at Wadham College, Oxford. Outside school, I am very interested in photography, writing, and the outdoors. I am writing this blog to keep in touch with friends and family around the world, provide a more personal view of graduate student life in Oxford, and pass on some lessons I've learned here.

9 thoughts on “GCHQ: The Uncensored Story of Britain’s Most Secret Intelligence Agency

  1. One quibble about Aldrich’s book is that it isn’t too appropriately
    bound, given its thickness. A form of binding better suited to such a
    thick book would have made it easier to read, since it would not have
    snapped shut so readily when left sitting open.

  2. Sharing intelligence
    A curious trade
    An Anglo-American story

    Jul 8th 2010

    GCHQ: The Uncensored Story of Britain’s Most Secret Intelligence Agency. By Richard Aldrich. Harper Press; 666 pages; £30. Buy from Amazon.co.uk

    WHAT is the essence of Britain’s “special relationship” with America? Shared history, perhaps, or a common language, a military alliance? No less significant is the extensive exchange of intelligence between the two countries’ spies. The cold-war games of Britain’s MI6 and America’s CIA are reasonably familiar. But the British outfit that is most tightly bound to America is GCHQ, the Government Communications Headquarters, whose job is to break codes and process electronic-signals intelligence, known in the trade as “sigint”. It is also the biggest and most secretive of British agencies, so Richard Aldrich’s book is a welcome account of the body that inhabits a mysterious doughnut-shaped building outside Cheltenham.

    The web of secret treaties in the 1940s which laid the foundation of intelligence co-operation between America and Britain—and by extension with Canada, Australia and New Zealand—had at its heart the pooling of sigint on the Soviet Union. Early in the second world war, Britain took its time to let America into the secrets of Ultra, the decryption of German secret communications by code-breakers at Bletchley Park. By the end of the war, however, sigint—particularly Venona, the system for breaking Soviet codes—had become an American-led effort. Venona revealed the vast extent of Soviet espionage in the West. Indeed, America and Britain were so deeply penetrated that the Russians soon found out about Venona, changing their codes and cipher machines on October 29th 1948—“Black Friday” for code-breakers.

    Proud of their privileged partnership with America’s National Security Agency (NSA), the men and women at GCHQ are torn between worry that America will tire of the liaison and bouts of anxiety at being too dependent. For America, the payoff has been access to listening posts in Britain’s residual imperial outposts and the chance to share the labour- and computer-intensive job of reading the messages of enemy and friend alike—particularly after American spy satellites started beaming back a wealth of intercepts.

  3. ‘Eavesdropper’ satellite rides huge rocket from Florida

    The US National Reconnaissance Office has launched what is reputed to be the largest satellite ever sent into space.

    The spacecraft was put into orbit on a Delta-4 Heavy rocket from Cape Canaveral Air Force station on Sunday.

    The NRO gave no details about the payload but it is understood the satellite will be used to eavesdrop on enemy communications.

    For comparison, the largest commercial satellite ever launched was the seven-tonne Terrestar-1 telecoms spacecraft.

    It had an 18m antenna-reflector to relay phone and data traffic.

    US websites have speculated that the mesh antenna on the new NROL-32 satellite would exceed this, and could even be substantially bigger than the 22m-diamater structure orbited last week on another commercial platform called Skyterra-1.

    The Delta-4 Heavy rocket, the largest unmanned American launch vehicle, lifted off at 1758 local time (2258 GMT).

  4. Pingback: Spying on the U.N.
  5. GCHQ technology ‘could be sold’

    The government’s secret listening post GCHQ could sell its technical expertise to the private sector under plans being considered by the government.

    Security minister Dame Pauline Neville Jones said ministers were “thinking about” ways in which GCHQ could supply services to private firms.

    “It’s a live issue,” she told the Commons science committee.

    Scientists and cyber-security experts are employed at GCHQ, in Cheltenham, to monitor e-mail and phone traffic.

    Their work has always been considered top secret, but committee chairman, Labour MP Andrew Miller, asked whether the government was considering the “radical” step of the commercialisation of products, working in partnership with the the private sector.

    “You are taking me on to ground, chairman, that we are thinking about,” Baroness Neville Jones told the MPs, adding that there were “many ways Cheltenham could supply a service to the private sector”.

    But she said the government was still considering how that might be funded and what the relationship between private firms and this branch of the security services might be and she could not comment further at this stage.

  6. Friday, May 13, 2011
    CANUSA confirmation

    Intelligence historian Matthew Aid has already confirmed that the CANUSA agreement was concluded in 1949 and that (as I had speculated earlier) this letter marked the formal conclusion of the agreement. (See also this post.)

    But now we can see it in black and white in an official, declassified document. Pages 32 and 33 of A Reference Guide to Selected Historical Documents Relating to the National Security Agency/Central Security Service 1931-1985, originally classified Top Secret Umbra but declassified in slightly redacted form in 2010, reports the following about the agreement

  7. On the eve of the G8 summit (taking place in a specially prepared Potemkin village in N. Ireland), the Guardian has published another Edward Snowden leak, this one describing how the UK spying agency GCHQ aggressively spied upon delegates to the G20 summit in 2009. According to the documents, UK spies attacked foreign delegates by “reading their email before they do” intercepting their BlackBerry messages and calls in real-time; capturing logins at special Internet cafes so as to spy on delegations after the event; getting NSA reports on attempts to crack Russian PM Dmitry Medvedev’s satellite calls; and continuously logging and analyzing who was calling whom.

Leave a Reply

Your email address will not be published. Required fields are marked *