GCHQ and UK Computer Policy

Teddy Poulden, ICL and IBM
  • Richard J. Aldrich
Part of the Security, Conflict and Cooperation in the Contemporary World book series (SCCCW)

Abstract

Government Communications Headquarters or ‘GCHQ’ is Britain’s largest intelligence agency. Currently commanding some 6,000 employees, it moved to new premises in Cheltenham in 2003 which for the previous few years constituted the largest building project in Europe and which is known locally as the ‘Doughnut’, GCHQ together with its defensive arm, the Communications-Electronics Security Group and their various historical predecessors have presided over the complex matter of gathering intelligence from the ether and also attempting to protect the security of British codes and ciphers for more than a century.1 In GCHQ’s distinctive new building international relations meets big science. Deep below the offices of the linguists and the analysts are vast computer halls. The exact size and type of these computers are secret but GCHQ is rumoured to have several machines each with a storage capacity of 25 petabytes (25,000 terabytes) equipped with over 20,000 cores to provide rapid parallel processing. Such computers are required for only a few specialist scientific tasks: simulating complex weather systems, mapping the human genome, designing nuclear weapons and of course cryptography — the science of making and breaking ciphers.2

Keywords

Nuclear Weapon Computer Industry Intelligence Community National Security Agency Automatic Data Processing 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Notes

  1. 1.
    The history of British communications security is an especially important area that has long been neglected. For a path-breaking essay on cipher and document security see, D. Dilks, ‘Flashes of Intelligence: The Foreign Office, The SIS and Security Before the Second World War’, in C. Andrew and D. Dilks (eds), The Missing Dimension: Governments and Intelligence Communities in the Twentieth Century (London: Macmillan, 1982), pp. 101–25.Google Scholar
  2. More recently see J. Ferris, ‘The British “Enigma”: Britain, Signals Security and Cipher Machines, 1906–1946’, Defense Analysis, 3, 2 (1987), pp. 153–63 and also CrossRefGoogle Scholar
  3. R.A Ratcliff, Delusions of Intelligence: Enigma, Ultra, and the End of Secure Ciphers (Cambridge, Cambridge University Press, 2006).Google Scholar
  4. 2.
    R.J. Aldrich, ‘The Ultimate Spy: Why the Real James Bond is a Supercomputer’, BBC Science Magazine, 248 (November 2012), pp. 55–9.Google Scholar
  5. 3.
    See for example Matthew Aid, Secret Sentry: The Top Secret History of the National Security Agency (New York: Bloomsbury 2009);Google Scholar
  6. Matthew Aid and Cees Wiebes (eds), Secrets of Signals Intelligence During the Cold War and Beyond (London: Frank Cass, 2001);Google Scholar
  7. D. Ball and D. Homer, Breaking the Code: Australia’s KGB Network (Sydney: Allen and Unwin, 1988);Google Scholar
  8. J. Bamford, The Puzzle Palace: America’s National Security Agency and Its Special Relationship with GCHQ (London: Sidgwick & Jackson, 1983);Google Scholar
  9. J. Bamford, Body of Secrets: How NSA and Britain’s GCHQ Eavesdrop on the World (London: Doubleday, 2001).Google Scholar
  10. 4.
    However see S. Lavington, ‘In the Footsteps of Colossus: A Description of Oedipus’, IEEE Annals of Computing, (2006), pp. 44–55. On wartime and the emergence of computers there is a vast literature. See especially B.J. Copeland, Colossus: The Secrets of Bletchley Park’s Codebreaking Computers (Oxford: Oxford University Press, 2006);Google Scholar
  11. P. Gannon, Colossus: Bletchley Park’s Greatest Secret (London: Atlantic Books, 2006);Google Scholar
  12. A. Hodges, Alan Turing: The Enigma (London: Burnett Books, 1992);Google Scholar
  13. W.W. Chandler, ‘The Installation and Maintenance of Colossus’, IEEE Annals of the History of Computing, 5, 3 (1983), pp. 260–2;CrossRefGoogle Scholar
  14. A.W. Coombs, ‘The Making of Colossus’, IEEE Annals of the History of Cornputing, 5, 3 (1983), pp. 253–9;CrossRefGoogle Scholar
  15. T. Sale, ‘The Colossus of Bletchley Park — The German Cipher System’, in R.H. Rojas (ed.), The First Computers: History and Architecture (Cambridge, MA: The MIT Press 2000) pp. 351–64.Google Scholar
  16. 5.
    Correspondence in the papers of Arthur Cooper (presently in private hands). On Josh Cooper, see A. Bonsall, ‘Bletchley Park and the RAF Y Service: Some Recollections’, Intelligence and National Security, 23, 6 (2008), pp. 827–41.CrossRefGoogle Scholar
  17. 8.
    Barrie H. Kent, Signal! A History of Signalling in the Royal Navy (East Meon: Hyden, 2004) pp. 140–2.Google Scholar
  18. 9.
    R.J. Aldrich, Intelligence and the War Against Japan: The Politics of Secret Service (Cambridge: Cambridge University Press, 2000) p. 236.Google Scholar
  19. See also D. Ford, Britain’s Secret War Against Japan, 1937–1945 (London: Routledge, 2006) p. 210;Google Scholar
  20. P. Elphick, Far Eastern File: The Intelligence War in the Far East 1930–1945 (London: Hodder & Stoughton, 1998) pp. 94–105;Google Scholar
  21. M. Smith, The Emperor’s Codes: Bletchley Park and the Breaking of Japan’s Secret Ciphers (London: Bantam, 2000) pp. 207–16;Google Scholar
  22. M. Smith, ‘An Undervalued Effort: How the British Broke Japan’s Codes’, in M. Smith and R. Erskine (eds), Action this Day (London: Bantam, 2001) pp. 127–51;Google Scholar
  23. A. Stripp, Codebreaker in the Far East (London: Frank Cass, 1989).Google Scholar
  24. 11.
    C.M. Andrew, ‘The Growth of the Australian Intelligence Community and the Anglo-American Connection’, Intelligence and National Security, 4, 2 (1989), pp. 213–57.CrossRefGoogle Scholar
  25. 12.
    N. Hager, Secret Power: New Zealand’s Role in the International Spy Network (Nelson: Craig Potton, 1996), pp. 61–3.Google Scholar
  26. 14.
    J.W. Young, ‘The Wilson Government’s Reform of Intelligence Co-ordination, 1967–68’, Intelligence and National Security, 16, 1 (2001) pp. 133–51. The Trend reforms echoed a wider review of government under Fulton.CrossRefGoogle Scholar
  27. 15.
    R.J. Aldrich, ‘Counting the Cost of Intelligence: The Treasury, National Service and GCHQ’, English Historical Review, 128, 532 (2013), pp. 596–627.CrossRefGoogle Scholar
  28. 24.
    The definitive history of ICL is Martin Campbell-Kelly, ICL: A Business and Technical History (Oxford: Clarendon Press, 1989).Google Scholar
  29. 26.
    Glen O’Hara, ‘Attempts to Modernize: Nationalization and the Nationalized Industries in Post-War Britain’, in Franco Amatori, Robert Millward and Pier Angelo Toninelli (eds), Reappraising State-Owned Enterprise: A Comparison of the UK and Italy (London: Routledge, 2011) pp. 50–67.Google Scholar
  30. 27.
    ‘Uncle Sam’s Nyet to ICL Deal’, 6 January 2000, Computing.co.uk, online at: http://www.computing.co.uk/ctg/news/ 1853985/uncle-sams-nyet-icl-deal [accessed 8 april 2014] On the wider effects of Cocom see, M. Mastanduno, Economic Containment: CoCom and the Politics of East-West Trade (Ithaca: Cornell University Press, 1992).Google Scholar
  31. 29.
    Campbell-Kelly, ICL, pp 284–6. On CPRS see Christopher Pollitt, ‘The Central Policy Review Staff 1970–1974’, Public Administration, 52, 4 (1974), pp. 375–92 and also CrossRefGoogle Scholar
  32. Rodney Lowe, The Official History of the British Civil Service: Reforming the Civil Service, Vol. 1: The Fulton Years, 1966–81 (London: Routledge, 2011) pp. 155–90. The functions of the CPRS were mostly transferred to the Downing Street Policy Unit in the 1980s.Google Scholar
  33. 52.
    Martin Campbell-Kelly, ‘The ACE and the Shaping of British Computing’, in B. Jack Copeland (ed.), Alan Turing’s Electronic Brain: The Struggle to Build the ACE, the World’s First Computer (Oxford: Oxford University Press, 2005) pp. 149–72.Google Scholar

Copyright information

© Richard J. Aldrich 2014

Authors and Affiliations

  • Richard J. Aldrich

There are no affiliations available

Personalised recommendations