WRAP Theses Shah 2016.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

WRAP Theses Shah 2016.Pdf A Thesis Submitted for the Degree of PhD at the University of Warwick Permanent WRAP URL: http://wrap.warwick.ac.uk/81565 Copyright and reuse: This thesis is made available online and is protected by original copyright. Please scroll down to view the document itself. Please refer to the repository record for this item for information to help you to cite it. Our policy information is available from the repository home page. For more information, please contact the WRAP Team at: [email protected] warwick.ac.uk/lib-publications 1 2 ‘Secret Towns’: British Intelligence in Asia during the Cold War Nikita Shah A thesis submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Politics and International Studies Submitted March 2016 Department of Politics and International Studies University of Warwick 3 Table of Contents List of Abbreviations 1. Introduction 1 1.1 Chapter Outline 21 2. Methodology 25 2.1 Reading the Archive 25 2.2 A Lesson in Empire 31 2.3 Overcoming Archival Obstacles 38 3. Literature Review 49 3.1 Introduction 49 3.2 Definitional Debate – What is Intelligence? 51 3.3 The Special Relationship 63 3.4 The Special Intelligence Relationship in Asia 71 4. Historical Overview 80 4.1 The Special Intelligence Relationship in Asia 80 4.2 The Remnants of Empire 81 4.3 China, Hong Kong, and Taiwan 84 4.4 Burma 87 4.5 India 88 4.6 Indonesia 91 5. The Watchtower: British Intelligence in Hong Kong 95 5.1 Intelligence and Chaos in Hong Kong 101 5.2 Failed Networks and Blind Spots 106 5.3 British Intelligence and the Residue of Empire 112 4 5.4 Sino-Soviet Tensions and Espionage 128 5.5 The Special Intelligence Relationship in Hong Kong 132 6. Beijing: An Embassy in Flames 138 6.1 Diplomatic Encounters in the Forbidden City 147 6.2 Spy Phobia 152 6.3 Information Insecurity 156 6.4 The American Intelligence Appetite 163 6.5 Intelligence Gathering in Beijing 168 6.6 The Dynamics of Intelligence Exchange 180 6.7 The Special Intelligence Relationship 182 7. ‘This Secret Town’: Hanoi 192 7.1 Britain’s Precarious Outpost in Hanoi 196 7.2 Collecting Intelligence on the Ground 200 7.3 Cypher Wars 205 7.4 Blurring Boundaries 212 7.5 The Despatches 218 7.6 Anglo-American Divergence 225 7.7 The Value of Secret Intelligence 235 7.8 A Voice from the Dark Side of the Moon 238 8. Conclusion 243 Bibliography 5 Acknowledgements First thing’s first, I’m the realist.1 Just as the international system is governed by a constant state of anarchy, so too has my life been characterised by utter chaos since mid-way through the PhD. This has been, without doubt, the most testing process I have thusfar endured, and, as such, I would like to express my sincere gratitude to those who have aided my pursuit of self-interest – or rather, survival – as I have sought to navigate my way through the disorder. The two people most crucial to my arrival at this point are without doubt are my supervisors, Richard Aldrich, and Chris Moran. They have had to endure my stubbornness, my fluster – and my gin – for the best part of four years. They were there not only to guide me through writing the thesis, but through professional development, career choices, and, ultimately, personal crises. The various opportunities and achievements that the PhD has brought would not have been realised were it not for their support. More importantly, their influence has ultimately shaped my mentality; they have inspired me to be assertive and ambitious, and have engrained in me a fearless mentality that is no longer worries about delving into the unknown. Given the manner in which this has shaped my general outlook, I am immensely grateful - they are not only mentors, but close friends, whose influence I value the most. I have been fortunate enough to undertake extensive periods of travel to the US for research, which was perhaps one of the most enriching parts of the PhD. I am grateful to the following funders, whose research grants were crucial to enabling my archival research abroad: the Warwick Humanities Research Centre, the British Association for American Studies, the Economic and Social Research Council, and the United States Army Military History Institute. I must also thank the Department of Politics and International Studies, without whose scholarship I would not have been able to undertake the PhD in the first place. 1 Adapted from Iggy Azalea and Charlie XCX, ‘Fancy’. Available at https://www.youtube.com/watch?v=O- zpOMYRi0w. Last accessed, 3rd March 2016. 6 And where would I be without B1.15? My office has been my biggest anchor – Ilke Dagli, Rogan Collins, Bahadir Celiktemur, Clare Burgum, Lucy Hatton, and Harry, were a huge part of the PhD process, without whom I would almost certainly have floundered more so than usual. The banter, the swearing, mornings in the pub, and afternoons on fantasy football/roulette, and emergency gin were a rare source of sanity. Moreover, the solidarity from going through this tumultuous process together was what gave me a bit of an anchor in the harder periods. Thanks must also go to my fellow coursemates, including Lisa Tilley, Roberta Mulas, Ali Saqer, Daniela Richterova, and Roberta Mulas – all utter legends in their own right. Thank you all for putting up with my tornado, and being part of this journey. As for my two biggest partners in crime, I cannot express my gratitude enough. Zakia Shiraz and Davinia Hoggarth – you guys are the Kourtney and Khloe to my Kim. You have both been there through some of the utterly best moments, and helped me get through the lows, but it’s the times in between that I value the most – casual dinners, 11am gins, Daily Mail pages, and, of course, career killers. You’ve both taught me a lot about resilience and growth, and I am most grateful. I also wish to thank Bernadette McEvoy and Tim Kaufmann – two trailblazers whose advice got me through the hardest of times. Talking to them was the only real source of comfort when the process hit its lowest points; they gave me an underlying hope to cling to, having been through their PhDs, experiencing the darker points it can take you to, and coming out of it – thank you both so much. Thanks must also go to Mark Stout, Aaron Bowater, Conor Durham, Alex Sweet, Hiran Adhia, Ollie Dean, Tim Bradley, and Jessica Man, who have either been incredibly supportive throughout the latter phases of the process, or have provided a source of sheer normality when all else was spinning around me (maybe except you, Bowater). Mark was most supportive of the final stages of writing, and an excellent writing companion, Alex has been the most loyal drinking partner one could ask for, and Conor has patiently put up with my general mess as he has carved out his own PhD path. My fellow Huskies - Hanna Etim-Gorst, Maria Soricelli, and Simon Haley - have also been rocks at some of the 7 lowest points, and I am eternally grateful for the calm they have brought to my moments of flurry. I also wish to thank Owen Rye for his support – whilst the path has been rocky at best, he supported my decision to apply for the PhD at the very outset of the process, and I can only hope to be as encouraging and supportive as he experiences the struggle through his own doctorate. I would also like to thank my new colleagues for their support. Juggling both the thesis and a new career has been simply the latest test in this marathon, yet their patience and understanding has certainly relieved some of the burden, as have the various drinking sessions with my newest partner in crime. The job has also been more grounding than they will realise, and I am grateful for all the opportunities that have already come my way. I must also thank my family for their support, particularly for what must have seemed an obscure process at the best of times. In particular, I would like to thank Shanil for his attentiveness and diligence in proofreading over various chapters – especially Hanoi. His fresh pair of eyes lent a valued sense of perspective to the writing-up process, and helped to avoid the easy pitfalls of overcomplicating the use of language, or tangling myself up in nonsensical issues. I only hope to be able to repay the debt in advising with his own academic experience in the near future. His zeal for his own degree, particularly Columbus, is admirable, and something I can only hope to equal in future projects. Thank you all. 8 Declaration I declare that this is my own work and that it has not been submitted for a degree at another university. The following section has been submitted for publication: Chapter Six - ‘’This Secret Town’: MI6 in Hanoi’, in the International History Review, (2016), pp. 1-30. Available at http://www.tandfonline.com/doi/pdf/10.1080/07075332.2016.1166445. Word Count: 84,919. 9 Abstract The British Secret Intelligence Service (SIS) remains one of the most obscure and elusive government agencies. Despite its rich and often tangled past, the SIS withstood various challenges in the twentieth century to become a vital instrument in Britain’s foreign policy, offering both traditional intelligence gathering, and a covert action capability. Despite recent revelations about its Cold War history, knowledge about this organisation is uneven at best, and this is particularly so in Asia.
Recommended publications
  • SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM
    SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM HEINEMANN: AUSTRALIA First published in 1987 by HEINEMANN PUBLISHERS AUSTRALIA (A division of Octopus Publishing Group/Australia Pty Ltd) 85 Abinger Street, Richmond, Victoria, 3121. Copyright (c) 1987 by Peter Wright ISBN 0-85561-166-9 All Rights Reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. TO MY WIFE LOIS Prologue For years I had wondered what the last day would be like. In January 1976 after two decades in the top echelons of the British Security Service, MI5, it was time to rejoin the real world. I emerged for the final time from Euston Road tube station. The winter sun shone brightly as I made my way down Gower Street toward Trafalgar Square. Fifty yards on I turned into the unmarked entrance to an anonymous office block. Tucked between an art college and a hospital stood the unlikely headquarters of British Counterespionage. I showed my pass to the policeman standing discreetly in the reception alcove and took one of the specially programmed lifts which carry senior officers to the sixth-floor inner sanctum. I walked silently down the corridor to my room next to the Director-General's suite. The offices were quiet. Far below I could hear the rumble of tube trains carrying commuters to the West End. I unlocked my door. In front of me stood the essential tools of the intelligence officer’s trade - a desk, two telephones, one scrambled for outside calls, and to one side a large green metal safe with an oversized combination lock on the front.
    [Show full text]
  • How I Learned to Stop Worrying and Love the Bombe: Machine Research and Development and Bletchley Park
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CURVE/open How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park Smith, C Author post-print (accepted) deposited by Coventry University’s Repository Original citation & hyperlink: Smith, C 2014, 'How I learned to stop worrying and love the Bombe: Machine Research and Development and Bletchley Park' History of Science, vol 52, no. 2, pp. 200-222 https://dx.doi.org/10.1177/0073275314529861 DOI 10.1177/0073275314529861 ISSN 0073-2753 ESSN 1753-8564 Publisher: Sage Publications Copyright © and Moral Rights are retained by the author(s) and/ or other copyright owners. A copy can be downloaded for personal non-commercial research or study, without prior permission or charge. This item cannot be reproduced or quoted extensively from without first obtaining permission in writing from the copyright holder(s). The content must not be changed in any way or sold commercially in any format or medium without the formal permission of the copyright holders. This document is the author’s post-print version, incorporating any revisions agreed during the peer-review process. Some differences between the published version and this version may remain and you are advised to consult the published version if you wish to cite from it. Mechanising the Information War – Machine Research and Development and Bletchley Park Christopher Smith Abstract The Bombe machine was a key device in the cryptanalysis of the ciphers created by the machine system widely employed by the Axis powers during the Second World War – Enigma.
    [Show full text]
  • A Practical Implementation of a One-Time Pad Cryptosystem
    Jeff Connelly CPE 456 June 11, 2008 A Practical Implementation of a One-time Pad Cryptosystem 0.1 Abstract How to securely transmit messages between two people has been a problem for centuries. The first ciphers of antiquity used laughably short keys and insecure algorithms easily broken with today’s computational power. This pattern has repeated throughout history, until the invention of the one-time pad in 1917, the world’s first provably unbreakable cryptosystem. However, the public generally does not use the one-time pad for encrypting their communication, despite the assurance of confidentiality, because of practical reasons. This paper presents an implementation of a practical one-time pad cryptosystem for use between two trusted individuals, that have met previously but wish to securely communicate over email after their departure. The system includes the generation of a one-time pad using a custom-built hardware TRNG as well as software to easily send and receive encrypted messages over email. This implementation combines guaranteed confidentiality with practicality. All of the work discussed here is available at http://imotp.sourceforge.net/. 1 Contents 0.1 Abstract.......................................... 1 1 Introduction 3 2 Implementation 3 2.1 RelatedWork....................................... 3 2.2 Description ........................................ 3 3 Generating Randomness 4 3.1 Inadequacy of Pseudo-random Number Generation . 4 3.2 TrulyRandomData .................................... 5 4 Software 6 4.1 Acquiring Audio . 6 4.1.1 Interference..................................... 6 4.2 MeasuringEntropy................................... 6 4.3 EntropyExtraction................................ ..... 7 4.3.1 De-skewing ..................................... 7 4.3.2 Mixing........................................ 7 5 Exchanging Pads 8 5.1 Merkle Channels . 8 5.2 Local Pad Security .
    [Show full text]
  • Florida State University Libraries
    Florida State University Libraries Electronic Theses, Treatises and Dissertations The Graduate School 2018 Doing a Real Job: The Evolution in Women's Roles in British Society through the Lens of Female Spies, 1914-1945 Danielle Wirsansky Follow this and additional works at the DigiNole: FSU's Digital Repository. For more information, please contact [email protected] FLORIDA STATE UNIVERSITY COLLEGE OF ARTS AND SCIENCES “DOING A REAL JOB”: THE EVOLUTION IN WOMEN’S ROLES IN BRITISH SOCIETY THROUGH THE LENS OF FEMALE SPIES, 1914-1945 By DANIELLE WIRSANSKY A Thesis submitted to the Department of History in partial fulfillment of the requirements for the degree of Master of Arts 2018 Danielle Wirsansky defended this thesis on March 6, 2018. The members of the supervisory committee were: Nathan Stoltzfus Professor Directing Thesis Charles Upchurch Committee Member Diane Roberts Committee Member The Graduate School has verified and approved the above-named committee members, and certifies that the thesis has been approved in accordance with university requirements. ii After the dazzle of day is gone, Only the dark, dark night shows to my eyes the stars; After the clangor of organ majestic, or chorus, or perfect band, Silent, athwart my soul, moves the symphony true. ~Walt Whitman iii ACKNOWLEDGMENTS I am thankful to my major professor, Dr. Nathan Stoltzfus, for his guidance and mentorship the last five years throughout my undergraduate and graduate studies. Without his encouragement, I may never have discovered my passion for history and found myself on the path I am on today. His support has provided me with so many opportunities and the ability to express myself both artistically and academically.
    [Show full text]
  • Oxford Law News 2016
    2016 OXFORD LAW NEWS No20 50 years of the Centre for Criminology Anne Davies, our new Dean Bonavero Institute of Human Rights announced FACULTY OF L AW Contents Keep in touch Editorial Committee: Anne Davies, Dean’s Letter 4 Judith Freedman, Maureen O’Neill Bonavero Institute of Human Rights 5 Alumni enquiries Centre for Criminology: 50th Anniversary 6 Editor: Kate Blanshard For further information on Oxford Law alumni events Faculty Profiles 8 Blogging 10 and to discuss ways to support Oxford Law please Copy Editor: Sophie Elkan contact the Faculty of Law’s Director of Development, Access 12 Maureen O’Neill: [email protected] Designed and produced by: Internships 16 windrushgroup.co.uk Graduate Students 18 Do you know of a great venue for an alumni event? Or News and Events 20 have an idea for something new to add to our calendar? Editorial enquiries: [email protected] Spotlight on Research 24 Then please email us at [email protected] Forming a View: Visualisation in Research 26 Update your details The Oxford Law News is published Research and Grants 28 Do we have your correct name and address? If not, annually by the Faculty of Law Centre News please let us know by writing to: Centre for Criminology 32 Cover photo Oxford Law News Oxford Transitional Justice Research Network 34 © Steve Allen Faculty of Law Centre for Competition Law and Policy 35 St Cross Building Institute of European and Comparative Law 36 St Cross Road Opt-in to receiving Oxford Oxford Intellectual Property Research Centre 38 Oxford Law Communications Public International Law 39 OX1 3UL Recent legislative changes mean we will Centre for Socio-Legal Studies 40 soon be unable to send Faculty of Law Civil Justice Programme 42 Email: [email protected] communications to anyone who has not Programme in Comparative Media Law 43 formally opted to receive them.
    [Show full text]
  • Secure Communications One Time Pad Cipher
    Cipher Machines & Cryptology Ed. 7.4 – Jan 22, 2016 © 2009 - 2016 D. Rijmenants http://users.telenet.be/d.rijmenants THE COMPLETE GUIDE TO SECURE COMMUNICATIONS WITH THE ONE TIME PAD CIPHER DIRK RIJMENANTS Abstract : This paper provides standard instructions on how to protect short text messages with one-time pad encryption. The encryption is performed with nothing more than a pencil and paper, but provides absolute message security. If properly applied, it is mathematically impossible for any eavesdropper to decrypt or break the message without the proper key. Keywords : cryptography, one-time pad, encryption, message security, conversion table, steganography, codebook, covert communications, Morse cut numbers. 1 Contents 1. Introduction………………………………. 2 2. The One-time Pad………………………. 3 3. Message Preparation…………………… 4 4. Encryption………………………………... 5 5. Decryption………………………………... 6 6. The Optional Codebook………………… 7 7. Security Rules and Advice……………… 8 8. Is One-time Pad Really Unbreakable…. 16 9. Legal Issues and Personal Security…... 18 10. Appendices………………………………. 19 1. Introduction One-time pad encryption is a basic yet solid method to protect short text messages. This paper explains how to use one-time pads, how to set up secure one-time pad communications and how to deal with its various security issues. Working with one-time pads is easy to learn. The system is transparent and you do not need a computer, special equipment or any knowledge about cryptographic techniques or mathematics. One-time pad encryption is an equation with two unknowns, which is mathematically unsolvable. The system therefore provides truly unbreakable encryption when properly used. It will never be possible to decipher one-time pad encrypted data without having the proper key, regardless any existing or future cryptanalytic attack or technology, infinite computational power or infinite time.
    [Show full text]
  • Monday/Tuesday Playoff Schedule
    2013 TUC MONDAY/TUESDAY PLAYOFF MASTER FIELD SCHEDULE Start End Hockey1 Hockey2 Hockey3 Hockey4 Hockey5 Ulti A Soccer 3A Soccer 3B Cricket E1 Cricket E2 Cricket N1 Cricket N2 Field X 8:00 9:15 MI13 MI14 TI13 TI14 TI15 TI16 MI1 MI2 MI3 MI4 MI15 MI16 9:20 10:35 MI17 MI18 TI17 TI18 TI19 TI20 MI5 MI6 10:40 11:55 MI19 MI20 MC1 MC2 MC3 MI21 MI7 MI8 12:00 1:15 MI9* TI21* TI22 TI23 TI24 MI10 MI11 MI12 1:20 2:35 MI22 MC4 MC6 MC5 MI23 TC1 MI24 MI25 2:40 3:55 TI1 TI2 MC7 TI3 MI26 TC2 TR1 TR2 MI27 4:00 5:15 MC8* TC3 MC10 MC9 TI4 TC4 TR3 TR4 5:20 6:35 TC5* TI5 TI6 TI7 TI8 TC6 TR5 TR6 6:40 7:55 TI9* TC7 TI10 TI11 TI12 TC8 TR8 TR7 Games are to 15 points Half time at 8 points Games are 1 hour and 15 minutes long Soft cap is 10 minutes before the end of game, +1 to highest score 2 Timeouts per team, per game NO TIMEOUTS AFTER SOFT CAP Footblocks not allowed, unless captains agree otherwise 2013 TUC Monday Competitive Playoffs - 1st to 7th Place 3rd Place Bracket Loser of MC4 Competitive Teams Winner of MC9 MC9 Allth Darth (1) Allth Darth (1) 3rd Place Slam Dunks (2) Loser of MC5 The Ligers (3) Winner of MC4 MC4 Krash Kart (4) Krash Kart (4) The El Guapo Sausage Party (5) MC1 Wonky Pooh (6) Winner of MC1 Disc Horde (7) The El Guapo Sausage Winner of MC8 Party (5) MC8 Slam Dunks (2) Champions Winner of MC2 MC2 Disc Horde (7) MC5 The Ligers (3) Winner of MC5 MC3 Winner of MC3 Wonky Pooh (6) Time Hockey3 Score Spirit Hockey4 Score Spirit Hockey5 Score Spirit Score Spirit 10:40 Krash Kart (4) Slam Dunks (2) The Ligers (3) to vs.
    [Show full text]
  • Harrison Salisbury, the Vietnamese Enemy, and Wartime
    From Behind Enemy Lines: Harrison Salisbury, the Vietnamese Enemy, and Wartime Reporting During the Vietnam War A thesis presented to the faculty of the College of Arts and Sciences of Ohio University In partial fulfillment of the requirements for the degree Master of Arts Annessa C. Stagner June 2008 2 © 2008 Annessa C. Stagner All Rights Reserved 3 This thesis titled From Behind Enemy Lines: Harrison Salisbury, the Vietnamese Enemy, and Wartime Reporting During the Vietnam War by ANNESSA C. STAGNER has been approved for the Department of History and the College of Arts and Sciences by Chester J. Pach, Jr. Associate Professor of History Benjamin M. Ogles Dean, College of Arts and Sciences 4 ABSTRACT STAGNER, ANNESSA C., M.A., June 2008, History From Behind Enemy Lines: Harrison Salisbury, the Vietnamese Enemy, and Wartime Reporting During the Vietnam War (165 pp.) Director of Thesis: Chester J. Pach, Jr. On December 24, 1966, Harrison Salisbury became the first mainstream American journalist to report from North Vietnam during the Vietnam War. From his position behind enemy lines, the New York Times reporter revealed that America’s bombing campaign was causing many more civilian casualties than the Johnson administration had acknowledged. Additionally, he challenged how Americans perceived their enemy by portraying North Vietnam’s culture and political ideology as legitimate. Evaluation of governmental and public responses to his stories reveals the significance of these reports. They sparked controversy that undermined American and international confidence in the Johnson administration’s credibility, decreased support for U.S. policies towards North Vietnam, and put increased pressure on the Johnson administration to increase efforts towards peace.
    [Show full text]
  • Lucy Morgan Edwards to the University of Exeter As a Thesis for the Degree of Doctor of Philosophy in Politics by Publication, in March 2015
    Western support to warlords in Afghanistan from 2001 - 2014 and its effect on Political Legitimacy Submitted by Lucy Morgan Edwards to the University of Exeter as a thesis for the degree of Doctor of Philosophy in Politics by Publication, in March 2015 This thesis is available for Library use on the understanding that it is copyright material and that no quotation from the thesis may be published without proper acknowledgement. I certifythat all the material in this thesis which is not my own work has been identified and that no material has previously been submitted or approved for the award of a degree by this or any other University. !tu ?"\J�� Signature. ... .......................L�Uv) ......... ...!} (/......................., ................................................ 0 1 ABSTRACT This is an integrative paper aiming to encapsulate the themes of my previously published work upon which this PhD is being assessed. This work; encompassing several papers and various chapters of my book are attached behind this essay. The research question, examines the effect of Western support to warlords on political legitimacy in the post 9/11 Afghan war. I contextualise the research question in terms of my critical engagement with the literature of strategists in Afghanistan during this time. Subsequently, I draw out themes in relation to the available literature on warlords, politics and security in Afghanistan. I highlight the value of thinking about these questions conceptually in terms of legitimacy. I then introduce the published work, summarising the focus of each paper or book chapter. Later, a ‘findings’ section addresses how the policy of supporting warlords has affected legitimacy through its impact on security and stability, the political settlement and ultimately whether Afghans choose to accept the Western-backed project in Afghanistan, or not.
    [Show full text]
  • The Development of the British Conspiracy Thriller 1980-1990
    The Development of the British Conspiracy Thriller 1980-1990 Paul S. Lynch This thesis is submitted to the University of Hertfordshire in partial fulfilment of the requirements of the degree of Doctor of Philosophy. January 2017 Abstract This thesis adopts a cross-disciplinary approach to explore the development of the conspiracy thriller genre in British cinema during the 1980s. There is considerable academic interest in the Hollywood conspiracy cycle that emerged in America during the 1970s. Films such as The Parallax View (Pakula, 1975) and All the President’s Men (Pakula, 1976) are indicative of the genre, and sought to reflect public anxieties about perceived government misdeeds and misconduct within the security services. In Europe during the same period, directors Costa-Gavras and Francesco Rosi were exploring similar themes of state corruption and conspiracy in films such as State of Siege (1972) and Illustrious Corpses (1976). This thesis provides a comprehensive account of how a similar conspiracy cycle emerged in Britain in the following decade. We will examine the ways in which British film-makers used the conspiracy form to reflect public concerns about issues of defence and national security, and questioned the measures adopted by the British government and the intelligence community to combat Soviet subversion during the last decade of the Cold War. Unlike other research exploring espionage in British film and television, this research is concerned exclusively with the development of the conspiracy thriller genre in mainstream cinema. This has been achieved using three case studies: Defence of the Realm (Drury, 1986), The Whistle Blower (Langton, 1987) and The Fourth Protocol (MacKenzie, 1987).
    [Show full text]
  • Jock Kane's Story Into the Hands Pf Businessmen Who Have Established Corrupt Relationships with GCHQ
    Fiddles and fraud Large sums of money disappear annually Jock Kane's story into the hands pf businessmen who have established corrupt relationships with GCHQ. Its operations are secret and un-supervised, I LEFT GCHQ sixteen months ago. I was then documents. My life in the Service was made and some of its officials have been long ac- in the £7,000-a-year Supervisory Radio Of- impossible because as soon as I became aware customed to the abuse of public trust in service ficer grade at an intelligence-gathering station of the losses In 1973 I insisted on reporting of their own financial advancement. Routine in Scotland. them - and on reporting other losses which corrupt practices involve false subsistence and Much of GCHQ's work could be important have occurred since then. travel claims, false overtime payments, false/ and worthwhile. But it is conducted behind a The material went missing, at times accommodation and furniture allowances a( wall of artificial secrecy, which protects a unknown but certainly over a lengthy period, overseas stations - together with oversized disgusting network of corruption, inefficiency from the Little Sai Wan station in Hong Kong, payments for transport of property and in- and security betrayal. which is one of GCHQ's most important surance, and much unnecessary travelling. I When I joined GCHQ in 1946, our 'indoc- operations. estimate that such pilfering from the public trination' prescribed that the name of the When I arrived there in January 1973 my purse exceeded at least £1 million during 1976. organisation, and the nature of its work - 'interference' in reporting that many The fiddles are practised everywhere.
    [Show full text]
  • Headmark 076 20-2 May-July 1994
    V.^f r^ aval Institute AUSTRALIAN NAVAL INSTITUTE INC The Australian Naval Institute was formed and incorporated in the Australian Capital Territory in 1975. The main objects of the Institute are: • To encourage and promote the advancement of knowledge related to the Navy and the maritime profession, • to provide a forum for the exchange of ideas concerning subjects related to the Navy and the maritime profession, and • to publish a journal. The Institute is self-supporting and non-profit-making. All publications of the Institute will stress that the authors express their own views and opinions are not necessarily those of the Department of Defence, the Chief of Naval Staff or the Institute. The aim is to encourage discussion, dissemi- nation of information, comment and opinion and the advancement of professional knowledge con- cerning naval and maritime matters. The membership of the Institute is open to: • Regular Members. Regular membership is open to members of the RAN, RANR. RNZN or RN/NVR and persons who having qualified for regular membership, subsequently leave the service. • Associate Members. Associate membership is open to all other persons not qualified to be Regu- lar Members, who profess an interest in the aims of the Institute. • Honorary Members. Honorary membership is open to persons who have made a distinguished contribution to the Navy or the maritime profession, or by past service to the institute. ACKNOWLEDGEMENTS The Australian Naval Institute is grateful for the assistance provided by the corporations listed below. They are demonstrating their support for the aim of the Institute by being members of the "Friends of the Australian Naval Institute" coterie.
    [Show full text]