Выбрать главу

I had the germ of an idea. Any cipher machine, no matter how sophisticated, has to encipher the clear text of the message into a stream of random letters. In the 1950s, most advanced ciphers were produced by typing the clear text into a teleprinter, which connected into a separate cipher machine, and the enciphered text clattered out on the other side. The security of the whole system depended on thorough screening. If the cipher machine was not electromagnetically screened from the input machine carrying the clear text, echoes of the uncoded message might be carried along the output cables along with the enciphered message. With the right kind of amplifiers it was theoretically possible to separate the "ghosting" text out and read it off.

Of course, we had no way of knowing which countries screened their cipher rooms thoroughly, and which did not, and any operation along the lines I suggested would take up to two years to reach fruition. There was little point expending vast effort trying to break the Russian cipher, when we knew it was almost certain to be well protected. It was a question of picking targets which were important, and against which we stood some chance of success.

The French cipher stood out from all the rest as the most suitable target for further ENGULF experiments. Both MI6 and GCHQ were under pressure from the Foreign Office to provide intelligence about French intentions with regard to the pending British application to the European Economic Community. Moreover, GCHQ had studied the French system in London. They used two ciphers - a low-grade one which sent traffic along a telex line to the Quai d'Orsay, and a high-grade cipher for Ambassadorial communications which was generated independently of the cipher machine for additional security. Hugh Alexander's view was that the high-grade cipher was unbreakable, but that the low-grade one might be vulnerable to the type of attack I had outlined. Cooper gave his approval, and Operation STOCKADE began.

The first task in this joint MI5/GCHQ operation was to make a detailed technical reconnaissance of the layout of the French Embassy and, in particular, locate the area of the cipher room. I arranged to have the rating drawings sent over from the local council, and contacted the Post Office Research Unit. John Taylor had retired by this time, and had been replaced by H.T. Mitchell. Mitchell was paralyzed down one side as a result of a stroke, but although his speech was poor, his mind remained crystal clear. Mitchell gave me full diagrams of all telex and telephone cables going into and out of the Embassy, and by comparing these with the rating drawings we were able to establish the likely location of the cipher room.

We asked the Post Office to fault the telephones, and went in to make a visual inspection of the cipher room area. Unlike the Egyptians, the French security staff watched our every move, but we got the information we required. There was no telephone in the cipher room. It was tucked away down a corridor. The cipher and telex machines were in adjoining rooms, separated only by a plasterboard partition.

Using the Post Office charts, we traced the output cables back to the street, and into the footway box at the end of Albert Gate entrance to Hyde Park. I arranged with Mitchell to place a reasonably broad band radio frequency tap on the cable inside the footway box, and the captured signal was relayed into a special operations room we had taken in the Hyde Park Hotel. The hotel telephone system was faulted to give us cover while the cables were laid up through the hotel to the fourth-floor room we had commandeered. Special blocking condensers were placed on the circuit to ensure it was one-directional, and nothing could leak back into the Embassy to give away the operation. GCHQ routinely intercept radio and telex traffic coming in and out of every London embassy, from their premises in Palmer Street. We arranged for a line containing the French Embassy traffic to be fed from Palmer Street to our operations room in the Hyde Park Hotel. Using that line as a guide, we could check whether the signal we were getting on our radio frequency tap was the correct one.

The first morning we found the low-grade cipher and matched it with the Palmer Street traffic. The tap was connected to our own teleprinter, and the intercepted French cipher began to clatter out in front of us. It was clear straightaway that more than one signal was traveling down the cable we were tapping. It was just a matter of sitting down with a pencil and marking off the EN CLAIR text from the coded message, and the cipher could be read straight off.

I began to pick out a translation, and found traces of another signal on the teleprinter. I checked on the sonargram to make sure I was not mistaken, and called over the GCHQ technicians.

The steady peaks and troughs of the signal blipped across the screen silently. The line from the low-grade cipher was strong, and its ghost was easily identifiable. But at each pinnacle there was a murmur as another signal crossed.

"Good God," the GCHQ man murmured, "that's the high-grade cipher as well'. We must be picking it up through the partition wall."

I hastily contacted Palmer Street and got them to relay the high grade cipher down the line so that we could compare the signals. The GCHQ technicians reset the amplifiers so that the traffic was sufficiently strong to print out, and using the Palmer Street feed as a guide, I marked off the EN CLAIR text. Within ten minutes I had a rough translation of a cable from the French Ambassador in London to President De Gaulle's private office.

For nearly three years, between 1960 and 1963, MI5 and GCHQ read the French high grade cipher coming in and out of the French Embassy in London. Every move made by the French during our abortive attempt to enter the Common Market was monitored. The intelligence was avidly devoured by the Foreign Office, and verbatim copies of De Gaulle's cables were regularly passed to the Foreign Secretary in his red box.

In fact, STOCKADE was a graphic illustration of the limitations of intelligence. De Gaulle was determined to thwart our application, and no amount of high-grade intelligence could change that fact. We did pass on to the Americans details of French deliberation over their independent nuclear "FORCE DE FRAPPE." It helped encourage American suspicions about De Gaulle, but the advantage we gained as a result was slight.

Nevertheless, STOCKADE was considered a major triumph inside the Foreign Office. I was sent for by the Permanent Secretary, who congratulated me on the ingenuity of the operation.

"Priceless material," he said, beaming, "simply priceless," leaving me in no doubt that "reading the Frog's traffic" was a worthy successor to Agincourt, the burning of Calais, and other ancient blows against the perfidious French.

- 9 -

Throughout the late 1950s and early 1960s, British Intelligence built on the success of the ENGULF (Egyptian) and STOCKADE (French) operations. GCHQ produced a mammoth list of all their targets, divided into domestic and overseas priorities. MI5 gathered intelligence about each domestic embassy, including information about the location of the cipher room, and details of all input and output cables, as well as an assessment of the feasibility of ENGULF or STOCKADE operations against that particular target. MI6 did the same thing overseas. They made detailed technical reconnaissance of GCHQ's targets although without the invaluable assistance of the Post Office they were forced to rely much more on traditional agent running.

After STOCKADE, plans were laid to attack most European ciphers, starting with the Germans. But after much effort, we aborted the operation, because their machines were too well screened. But we successfully placed a probe microphone behind the cipher machine in the Greek Embassy in London. This was a particularly valuable target, since the Greeks were giving considerable support to Colonel Grivas, the Cypriot guerrilla leader, during the Cyprus Emergency. We operated in the same way against the Indonesian Embassy at the time of the Indonesian/Malaysian confrontation, and read the cipher continuously through the conflict.