Issues in British and American Signals Intelligence, 1919-1932

Total Page:16

File Type:pdf, Size:1020Kb

Issues in British and American Signals Intelligence, 1919-1932 United States Cryptologic History Issues in British and American Signals Intelligence, 1919-1932 Special series | Volume 11 | 2015 Center for Cryptologic History This publication presents a historical perspective for informational and educational purposes, is the result of independent research, and does not necessarily reflect a position of NSA/CSS or any other U.S. government entity. This publication is distributed free by the National Security Agency. If you would like additional copies, please submit your request to: Center for Cryptologic History National Security Agency 9800 Savage Road, Suite 6886 Fort George G. Meade, MD 20755 Cover: The 1921 Washington Naval Conference Issues in British and American Signals Intelligence, 1919-1932 John Ferris SPECIAL SERIES | VOLUME 11 2016 Contents Introduction............................................................................ v Part 1: Reading the World’s Mail: British Censorship, Communications Intelligence, and Economic Warfare, 1914-1919 ............................. 1 Summary ............................................................................... 1 Background ............................................................................ 1 Economic Pressure .................................................................... 2 Blockade Evolution ................................................................... 3 Initial Attempt .................................................................... 3 Legal Basis ......................................................................... 3 Dealing with Neutrals ............................................................ 3 Evolving toward Interdepartmental Use of Intelligence ........................ 4 Enforcing Blockade ................................................................... 6 Evolving Enforcement ................................................................ 6 Intelligence: Evolving to Effectiveness ............................................ 7 Developments in Sources ............................................................ 8 Source I: Statistics ................................................................ 8 Source II: Signals/COMINT ....................................................... 8 Signals Read by Censorship ...................................................... 8 Resulting Data: 1914-1915 ....................................................... 9 Developments in Organization ..................................................... 10 The War Trade Intelligence Department ..................................... 10 WTID Organization ............................................................... 10 WTID Demographics ............................................................. 11 i Issues in British and American Signals Intelligence, 1919-1932 Developments in COMINT: 1914-1916 ............................................. 11 Early in the War .................................................................. 11 Main Source: 1914-1915 ........................................................ 12 Evolving: 1915-1916 ............................................................. 12 COMINT and WTID Information ..................................................... 13 COMINT and Enforcement ...................................................... 13 Intelligence Impacts ................................................................. 14 COMINT and Enforcement ...................................................... 15 Illustration ........................................................................ 15 Limited Impact: Finance ....................................................... 16 Finance: Limits Mitigated .......................................................... 17 Developments 1917-1918 ........................................................... 17 Enforcement Eased .............................................................. 18 Complications in Censorship ................................................... 18 Technical Peak ........................................................................ 19 Conclusions ........................................................................... 19 Notes ................................................................................... 20 Part 2: The Tale of the Trust: The Myth of Soviet Deception of British Intelligence in Russia, 1919-1927 ................................. 23 Summary .............................................................................. 23 The Trust .............................................................................. 23 Influential Idea ................................................................... 24 Cautious View vs. Sensational ................................................. 24 Similar Efforts .................................................................... 24 Known Successes ..................................................................... 24 Short-Lived Success ............................................................. 24 ii Issues in British and American Signals Intelligence, 1919-1932 Sidney Reilly: The Example of a Trust Success .............................. 25 Documentation ....................................................................... 26 UK, SIS Success vs. USSR ........................................................ 26 SIS Istanbul ....................................................................... 27 SIS Section V ...................................................................... 27 SIS Sources in USSR Government .............................................. 28 Agents in Moscow ................................................................ 28 1923-1934: Two Sources ........................................................ 29 Other Sources .................................................................... 30 1923-1930: Main Sources? ...................................................... 30 What Was Reported .............................................................. 30 UK COMINT ............................................................................ 31 Diplomatic COMINT .............................................................. 32 A Trust Attempt?...................................................................... 32 Results of the Attempt .......................................................... 33 SIS Assessment of the Attempt ................................................. 34 Assessment ............................................................................ 35 Riga Authenticity ................................................................ 35 Riga Authenticity: Significance ................................................ 36 Stolen Documents: Authenticity .................................................. 36 Riga: Apparently Authentic .................................................... 36 Self-Assessment of Threat .......................................................... 37 No Threat ......................................................................... 37 No Reflections of Success....................................................... 37 Final Assessment ................................................................. 38 Conclusion ............................................................................ 38 Notes ................................................................................... 39 iii Issues in British and American Signals Intelligence, 1919-1932 Part 3: Gentlemen’s Agreements and Gentlemen’s Mail: Communications Intelligence and The Diplomacy of Naval Disarmament, 1921-1930 ..... 42 Introduction........................................................................... 42 Three Conferences 1921-22 Washington Naval Conference ....................................... 43 Yardley’s Bureau ................................................................. 43 GC&CS ............................................................................. 43 Value in Context ................................................................. 44 1927 Geneva Conference ........................................................... 45 1930 London Naval Conference .................................................... 45 British Prime Minister MacDonald I ............................................ 46 GC&CS’s Opportunity ............................................................ 46 MacDonald II ...................................................................... 46 Two Complex Issues ............................................................. 47 Initial GC&CS Intelligence ...................................................... 48 1930 Conference: First Two Months ........................................... 49 Crisis in the 1930 Conference .................................................. 50 A Japanese Weakness ........................................................... 52 Effects of Communications Intelligence .......................................... 55 Communications Intelligence and Negotiations ............................. 56 Strategic Consequences: Assessment ............................................. 57 Notes ................................................................................... 59 iv Issues in British and American Signals Intelligence, 1919-1932 Introduction tive period, and, better still, with his wide-ranging knowledge about non-COMINT intelligence and The first third of the twentieth century saw the about diplomacy, he has placed this new material in development of modern communications intelli- the proper
Recommended publications
  • Yorktown Victory Center Replacement Will Be Named 'American Revolution Museum at Yorktown'
    DISPATCH A Newsletter of the Jamestown-Yorktown Foundation • Spring 2012 Yorktown Victory Center Replacement Will Be Named ‘American Revolution Museum at Yorktown’ Along with a physical transforma- bonds, is estimated at $46 tion of the Yorktown Victory Center will million. Private donations come a new name – “American Revolu- to the Jamestown-Yorktown tion Museum at Yorktown” – adopted Foundation, Inc., will sup- May 10 by the Jamestown-Yorktown port elements of gallery Foundation Board of Trustees and and outdoor exhibits and endorsed by the Jamestown-Yorktown educational resources. Foundation, Inc., Board of Directors. “The new name high- Recommended by a board naming lights the core offering of study task force, the new name will the museum, American be implemented upon completion of Revolution history,” said the museum replacement, and in the Frank B. Atkinson, who meantime the Yorktown Victory Center chaired the naming study will continue in operation as a museum task force comprised of 11 The distinctive two-story main entrance of the American of the American Revolution. members of the Jamestown- Revolution Museum at Yorktown will serve as a focal point Construction is expected to start Yorktown Foundation for arriving visitors. in the second half of 2012 on the proj- and Jamestown-Yorktown name were identified, and research ect, which includes an 80,000-square- Foundation, Inc., boards, “and the in- was undertaken on names currently in foot structure that will encompass ex- clusion of the word ‘Yorktown’ provides use. Selected names were tested with panded exhibition galleries, classrooms a geographical anchor. We arrived Yorktown Victory Center visitors and and support functions, and reorganiza- at this choice through a methodical reviewed by a trademark attorney and tion of the 22-acre site.
    [Show full text]
  • Chancellor's Speech to GCHQ on Cyber Security
    Speech Chancellor's speech to GCHQ on cyber security From: HM Treasury, Government Communications Headquarters and The Rt Hon George Osborne MP Delivered on: 17 November 2015 (Original script, may differ from delivered version) Location: GCHQ First published: 17 November 2015 Part of: Spending Review and Autumn Statement 2015 Chancellor lays out new plan for £1.9 billion cyber investment, and details seven more departments that have settled ahead of the Spending Review. Before I start my speech, I want to say a few words about the heart-breaking events that unfolded in Paris on Friday evening. This was an assault not just on the people of France, but on all of us who value freedom and democracy. We stand with the people of France. We know that we must act as one, just as our enemies see us as one. As David Cameron has said, we will do everything we possibly can to help the French at this moment of national trauma. That includes making available to them the sharpest of our own national capability, which includes the skills and capabilities of GCHQ. Before the dreadful events of the weekend we had already indicated that we would be increasing substantially the resources we dedicate to countering the terrorist threat posed by ISIL. The Prime Minister has made clear that across the agencies a further 1,900 staff will be recruited to keep Britain safe from terrorist attack. This was going to be an important outcome of the Spending Review. What has unfolded in Paris has reminded us all that it is a vital one too.
    [Show full text]
  • REVOLUTION GOES EAST Studies of the Weatherhead East Asian Institute, Columbia University
    REVOLUTION GOES EAST Studies of the Weatherhead East Asian Institute, Columbia University The Studies of the Weatherhead East Asian Institute of Columbia University were inaugu rated in 1962 to bring to a wider public the results of significant new research on modern and contemporary East Asia. REVOLUTION GOES EAST Imperial Japan and Soviet Communism Tatiana Linkhoeva CORNELL UNIVERSITY PRESS ITHACA AND LONDON This book is freely available in an open access edition thanks to TOME (Toward an Open Monograph Ecosystem)—a collaboration of the Association of American Universities, the Association of University Presses, and the Association of Research Libraries—and the generous support of New York University. Learn more at the TOME website, which can be found at the following web address: openmono graphs.org. The text of this book is licensed under a Creative Commons Attribution-Non Commercial-NoDerivatives 4.0 International: https://creativecommons.org/ licenses/by-nc-nd/4.0. To use this book, or parts of this book, in any way not covered by the license, please contact Cornell University Press, Sage House, 512 East State Street, Ithaca, New York 14850. Visit our website at cornellpress. cornell.edu. Copyright © 2020 by Cornell University First published 2020 by Cornell University Press Library of Congress Cataloging-in-Publication Data Names: Linkhoeva, Tatiana, 1979– author. Title: Revolution goes east : imperial Japan and Soviet communism / Tatiana Linkhoeva. Description: Ithaca [New York] : Cornell University Press, 2020. | Series: Studies of the Weatherhead East Asian Institute, Columbia University | Includes bibliographical references and index. Identifiers: LCCN 2019020874 (print) | LCCN 2019980700 (ebook) | ISBN 9781501748080 (pbk) | ISBN 9781501748097 (epub) | ISBN 9781501748103 (pdf) Subjects: LCSH: Communism—Japan—History—20th century.
    [Show full text]
  • The Attlee Governments
    Vic07 10/15/03 2:11 PM Page 159 Chapter 7 The Attlee governments The election of a majority Labour government in 1945 generated great excitement on the left. Hugh Dalton described how ‘That first sensa- tion, tingling and triumphant, was of a new society to be built. There was exhilaration among us, joy and hope, determination and confi- dence. We felt exalted, dedication, walking on air, walking with destiny.’1 Dalton followed this by aiding Herbert Morrison in an attempt to replace Attlee as leader of the PLP.2 This was foiled by the bulky protection of Bevin, outraged at their plotting and disloyalty. Bevin apparently hated Morrison, and thought of him as ‘a scheming little bastard’.3 Certainly he thought Morrison’s conduct in the past had been ‘devious and unreliable’.4 It was to be particularly irksome for Bevin that it was Morrison who eventually replaced him as Foreign Secretary in 1951. The Attlee government not only generated great excitement on the left at the time, but since has also attracted more attention from academics than any other period of Labour history. Foreign policy is a case in point. The foreign policy of the Attlee government is attractive to study because it spans so many politically and historically significant issues. To start with, this period was unique in that it was the first time that there was a majority Labour government in British political history, with a clear mandate and programme of reform. Whereas the two minority Labour governments of the inter-war period had had to rely on support from the Liberals to pass legislation, this time Labour had power as well as office.
    [Show full text]
  • 'The Left's Views on Israel: from the Establishment of the Jewish State To
    ‘The Left’s Views on Israel: From the establishment of the Jewish state to the intifada’ Thesis submitted by June Edmunds for PhD examination at the London School of Economics and Political Science 1 UMI Number: U615796 All rights reserved INFORMATION TO ALL USERS The quality of this reproduction is dependent upon the quality of the copy submitted. In the unlikely event that the author did not send a complete manuscript and there are missing pages, these will be noted. Also, if material had to be removed, a note will indicate the deletion. Dissertation Publishing UMI U615796 Published by ProQuest LLC 2014. Copyright in the Dissertation held by the Author. Microform Edition © ProQuest LLC. All rights reserved. This work is protected against unauthorized copying under Title 17, United States Code. ProQuest LLC 789 East Eisenhower Parkway P.O. Box 1346 Ann Arbor, Ml 48106-1346 F 7377 POLITI 58^S8i ABSTRACT The British left has confronted a dilemma in forming its attitude towards Israel in the postwar period. The establishment of the Jewish state seemed to force people on the left to choose between competing nationalisms - Israeli, Arab and later, Palestinian. Over time, a number of key developments sharpened the dilemma. My central focus is the evolution of thinking about Israel and the Middle East in the British Labour Party. I examine four critical periods: the creation of Israel in 1948; the Suez war in 1956; the Arab-Israeli war of 1967 and the 1980s, covering mainly the Israeli invasion of Lebanon but also the intifada. In each case, entrenched attitudes were called into question and longer-term shifts were triggered in the aftermath.
    [Show full text]
  • Swire. “The Declining Half-Life of Secrets”
    CYBERSECURITY INITIATIVE New America Cybersecurity Fellows Paper Series - Number 1 THE DECLINING HALF -LIFE OF SECRETS And the Future of Signals Intelligence By Peter Swire July 2015 © 2015 NEW AMERICA This report carries a Creative Commons license, which permits non-commercial re-use of New America content when proper attribution is provided. This means you are free to copy, display and distribute New America’s work, or in- clude our content in derivative works, under the following conditions: ATTRIBUTION. NONCOMMERCIAL. SHARE ALIKE. You must clearly attribute the work You may not use this work for If you alter, transform, or build to New America, and provide a link commercial purposes without upon this work, you may distribute back to www.newamerica.org. explicit prior permission from the resulting work only under a New America. license identical to this one. For the full legal code of this Creative Commons license, please visit creativecommons.org. If you have any questions about citing or reusing New America content, please contact us. ABOUT THE AUTHOR Peter Swire, Nancy J. and Lawrence P. Huang Professor of Law and Ethics, Scheller College of Business, Georgia Institute of Technology; Senior Counsel, Alston & Bird LLP; and New America Cybersecurity Fellow ABOUT THE CYBERSECURITY INITIATIVE ACKNOWLEDGEMENTS The Internet has connected us. Yet the policies and debates that sur- Many thanks to Ross Anderson, Ashkan round the security of our networks are too often disconnected, disjoint- Soltani and Lee Tien for assistance with ed, and stuck in an unsuccessful status quo. This is what New Ameri- this draft, and to the fellow members ca’s Cybersecurity Initiative is designed to address.
    [Show full text]
  • Offensive Capabilities
    GCHQ and UK Mass Surveillance Chapter 5 5 Beyond signals intelligence: Offensive capabilities 5.1 Introduction Documents released by German magazine Der Spiegel provide a much richer picture of the offensive activities of the NSA and its allies, including the UK’s GCHQ.i The global surveillance infrastructure and hacking tools described in the previous chapters are not only used for obtaining information to be fed into intelligence reports and tracking terrorists. The agencies are also developing cyber-warfare capabilities, with the NSA taking the lead within the US armed forces. This militarisation of the internet saw U.S. intelligence services carried out 231 offensive cyber-operations in 2011ii. The UK's National Strategic Defence and Security Review from 2010 made hostile attacks upon UK cyberspace a major priorityiii. It is fair to assume that many countries are following suit and building cyber-warfare capabilities. Der Spiegel terms the development of these aggressive hacking tools as Digital Weapons. In their view D weapons which should join the ABC (Atomic, Biological and Chemical) weapons of the 20th century because of their indiscriminate nature. Here lies a fundamental problem. The modern world with connected global communications networks means that non-state actors such as civilians and businesses are now affected by the agencies’ activities much more frequently than before. The internet is used by everyone – cyberspace is mainly a civilian space – and the opportunity for collateral damage is huge. The papers leaked to Der Spiegel appear to show that signal agencies have little regard for the security and wellbeing of anyone who gets caught in the path of their operations.
    [Show full text]
  • The Forgotten Fronts the First World War Battlefield Guide: World War Battlefield First the the Forgotten Fronts Forgotten The
    Ed 1 Nov 2016 1 Nov Ed The First World War Battlefield Guide: Volume 2 The Forgotten Fronts The First Battlefield War World Guide: The Forgotten Fronts Creative Media Design ADR005472 Edition 1 November 2016 THE FORGOTTEN FRONTS | i The First World War Battlefield Guide: Volume 2 The British Army Campaign Guide to the Forgotten Fronts of the First World War 1st Edition November 2016 Acknowledgement The publisher wishes to acknowledge the assistance of the following organisations in providing text, images, multimedia links and sketch maps for this volume: Defence Geographic Centre, Imperial War Museum, Army Historical Branch, Air Historical Branch, Army Records Society,National Portrait Gallery, Tank Museum, National Army Museum, Royal Green Jackets Museum,Shepard Trust, Royal Australian Navy, Australian Defence, Royal Artillery Historical Trust, National Archive, Canadian War Museum, National Archives of Canada, The Times, RAF Museum, Wikimedia Commons, USAF, US Library of Congress. The Cover Images Front Cover: (1) Wounded soldier of the 10th Battalion, Black Watch being carried out of a communication trench on the ‘Birdcage’ Line near Salonika, February 1916 © IWM; (2) The advance through Palestine and the Battle of Megiddo: A sergeant directs orders whilst standing on one of the wooden saddles of the Camel Transport Corps © IWM (3) Soldiers of the Royal Army Service Corps outside a Field Ambulance Station. © IWM Inside Front Cover: Helles Memorial, Gallipoli © Barbara Taylor Back Cover: ‘Blood Swept Lands and Seas of Red’ at the Tower of London © Julia Gavin ii | THE FORGOTTEN FRONTS THE FORGOTTEN FRONTS | iii ISBN: 978-1-874346-46-3 First published in November 2016 by Creative Media Designs, Army Headquarters, Andover.
    [Show full text]
  • How Early Post Office Policy Shaped Modern First Amendment Doctrine
    Hastings Law Journal Volume 58 | Issue 4 Article 1 1-2007 The rT ansformation of Statutes into Constitutional Law: How Early Post Officeolic P y Shaped Modern First Amendment Doctrine Anuj C. Desai Follow this and additional works at: https://repository.uchastings.edu/hastings_law_journal Part of the Law Commons Recommended Citation Anuj C. Desai, The Transformation of Statutes into Constitutional Law: How Early Post Officeo P licy Shaped Modern First Amendment Doctrine, 58 Hastings L.J. 671 (2007). Available at: https://repository.uchastings.edu/hastings_law_journal/vol58/iss4/1 This Article is brought to you for free and open access by the Law Journals at UC Hastings Scholarship Repository. It has been accepted for inclusion in Hastings Law Journal by an authorized editor of UC Hastings Scholarship Repository. For more information, please contact [email protected]. Articles The Transformation of Statutes into Constitutional Law: How Early Post Office Policy Shaped Modern First Amendment Doctrine ANUJ C. DESAI* INTRODUCTION One of the great urban legends on the Internet was "Bill 6o2P."' In the late 199OS it spread like wildfire, and it occasionally makes the rounds again like pleas from Nigerian officials seeking help with their Swiss bank accounts or the story of the $250 Neiman Marcus cookie recipe. The bill, supported by (no doubt soon-to-be-defeated) "Congressman Tony Schnell," would have imposed a five cent tax on each e-mail message. One would be hard put to imagine a more nefarious way for * Assistant Professor, University of Wisconsin Law School. Many people read all or large parts of this Article and provided helpful suggestions.
    [Show full text]
  • Reality Is Broken a Why Games Make Us Better and How They Can Change the World E JANE Mcgonigal
    Reality Is Broken a Why Games Make Us Better and How They Can Change the World E JANE McGONIGAL THE PENGUIN PRESS New York 2011 ADVANCE PRAISE FOR Reality Is Broken “Forget everything you know, or think you know, about online gaming. Like a blast of fresh air, Reality Is Broken blows away the tired stereotypes and reminds us that the human instinct to play can be harnessed for the greater good. With a stirring blend of energy, wisdom, and idealism, Jane McGonigal shows us how to start saving the world one game at a time.” —Carl Honoré, author of In Praise of Slowness and Under Pressure “Reality Is Broken is the most eye-opening book I read this year. With awe-inspiring ex­ pertise, clarity of thought, and engrossing writing style, Jane McGonigal cleanly exploded every misconception I’ve ever had about games and gaming. If you thought that games are for kids, that games are squandered time, or that games are dangerously isolating, addictive, unproductive, and escapist, you are in for a giant surprise!” —Sonja Lyubomirsky, Ph.D., professor of psychology at the University of California, Riverside, and author of The How of Happiness: A Scientific Approach to Getting the Life You Want “Reality Is Broken will both stimulate your brain and stir your soul. Once you read this remarkable book, you’ll never look at games—or yourself—quite the same way.” —Daniel H. Pink, author of Drive and A Whole New Mind “The path to becoming happier, improving your business, and saving the world might be one and the same: understanding how the world’s best games work.
    [Show full text]
  • Dungeon Solitaire LABYRINTH of SOULS
    Dungeon Solitaire LABYRINTH OF SOULS Designer’s Notebook by Matthew Lowes Illustrated with Original Notes Including a History and Commentary on the Design and Aesthetics of the Game. ML matthewlowes.com 2016 Copyright © 2016 Matthew Lowes All rights reserved, including the right to reproduce this book, or portions thereof, in any form. Interior design and illustrations by Matthew Lowes. Typeset in Minion Pro by Robert Slimbach and IM FELL English Pro by Igino Marini. The Fell Types are digitally reproduced by Igino Marini, www.iginomarini.com. Visit matthewlowes.com/games to download print-ready game materials, follow future developments, and explore more fiction & games. TABLE OF CONTENTS Introduction . 5 Origins . 5 Tomb of Four Kings . 7 Into the Labyrinth . 10 At the Limit . 13 Playing a Role . 15 The Ticking Clock . 16 Encountering the World . 17 Monsters of the Id . 18 Traps of the Mind . 18 Doors of Perception . 19 Mazes of the Intellect . 19 Illusions of the Psyche . 21 Alternate Rules . 22 Tag-Team Delving . 22 On Dragon Slaying . 23 Scourge of the Undead . 24 The Tenth Level . 25 A Life of Adventuring . 26 It’s in the Cards . 28 Extra Stuff . 30 The House Rules . 31 B/X & A . 31 Game Balance . 32 Chance vs Choice . 33 Play-Testing . 34 Writing Rules . 35 Final Remarks . 37 4 INTRODUCTION In the following pages I’ll be discussing candidly my thoughts on the creation of the Dungeon Solitaire game, including its origins, my rationale for the aesthetics and structure of the game, and for its various mechanics. Along the way I’ll be talking about some of my ideas about game design, and what I find fun and engaging about different types of games.
    [Show full text]
  • The Colonial Office Group of the Public Record Office, London with Particular Reference to Atlantic Canada
    THE COLONIAL OFFICE GROUP OF THE PUBLIC RECORD OFFICE, LONDON WITH PARTICULAR REFERENCE TO ATLANTIC CANADA PETER JOHN BOWER PUBLIC ARCHIVES OF CANADA rn~ILL= - importance of the Coioniai office1 records housed in the Public Record Office, London, to an under- standing of the Canadian experience has long been recog- nized by our archivists and scholars. In the past one hundred years, the Public Archives of Canada has acquired contemporary manuscript duplicates of documents no longer wanted or needed at Chancery Lane, but more importantly has utilized probably every copying technique known to improve its collection. Painfully slow and tedious hand- transcription was the dominant technique until roughly the time of the Second World War, supplemented periodi- cally by typescript and various photoduplication methods. The introduction of microfilming, which Dominion Archivist W. Kaye Lamb viewed as ushering in a new era of service to Canadian scholars2, and the installation of a P.A.C. directed camera crew in the P.R.O. initiated a duplica- tion programme which in the next decade and a half dwarfed the entire production of copies prepared in the preceding seventy years. It is probably true that no other former British possession or colony has undertaken so concerted an effort to collect copies of these records which touch upon almost every aspect of colonial history. While the significance of the British records for . 1 For the sake of convenience, the term "Colonial Office'' will be used rather loosely from time to time to include which might more properly be described as precur- sors of the department.
    [Show full text]