The history of the organisations dates back to the 19th century. The decryption of the Zimmermann Telegram in 1917 was described as the most significant intelligence triumph for Britain during World War I,[1] and one of the earliest occasions on which a piece of signals intelligence influenced world events.[2] During the Second World War and afterwards, many observers regarded Ultra signals intelligence as immensely valuable to the Allies of World War II. In 1962, during the Cuban Missile Crisis, GCHQ interceptions of Soviet ship positions were sent directly to the White House.[3] Intelligence cooperation in the post-war period between the United Kingdom and the United States became the cornerstone of Western intelligence gathering and the "Special Relationship" between the United Kingdom and the United States.[4]
The Secret Service Bureau was founded in 1909 as a joint initiative of the Admiralty and the War Office to control secret intelligence operations in the UK and overseas, particularly concentrating on the activities of the Imperial German government. The Bureau was split into naval and army sections which, over time, specialised in foreign espionage and internal counter-espionage activities respectively. This specialisation, formalised prior to 1914, was a result of the Admiralty intelligence requirements related to the maritime strength of the Imperial German Navy. In 1916, during the First World War, the two sections underwent administrative changes so that the internal counter-espionage section became the Directorate of Military Intelligence Section 5 (MI5) and the foreign section became the Directorate of Military Intelligence Section 6 (MI6), names by which the Security Service and Secret Intelligence Service are commonly known today.
The Naval Intelligence Division led the Royal Navy's highly successful cryptographic efforts, Room 40 (later known as NID25). The decryption of the Zimmermann Telegram was described as the most significant intelligence triumph for Britain during World War I,[1] and one of the earliest occasions on which a piece of signals intelligence influenced world events.[2]
In 1919, the Cabinet's Secret Service Committee, recommended that a peacetime codebreaking agency should be created.[23] Staff were merged from NID25 and MI1b into the new organisation,[24] which was given the cover-name the "Government Code and Cypher School" (GC&CS).[25]
Following the outbreak of the Second World War in 1939, the JIC became the senior intelligence assessment body for the United Kingdom government.
During the War, the RAF Intelligence Branch was established, although personnel had been employed in intelligence duties in the RAF since its formation in 1918.
The 1943 British–US Communication Intelligence Agreement, BRUSA, connected the signal intercept networks of the GC&CS and the US National Security Agency (NSA).[27] The GC&CS was based largely at Bletchley Park. Its staff, including Alan Turing, worked on cryptanalysis of the Enigma (codenamed Ultra) and Lorenz cipher,[28] and also a large number of other enemy systems. Winston Churchill was reported to have told King George VI, when presenting to him Stewart Menzies (head of the Secret Intelligence Service and the person who controlled distribution of Ultra decrypts to the government): "It is thanks to the secret weapon of General Menzies, put into use on all the fronts, that we won the war!"[29]F. W. Winterbotham quoted the western Supreme Allied Commander, Dwight D. Eisenhower, at war's end describing Ultra as having been "decisive" to Allied victory.[30]Sir Harry Hinsley, Bletchley Park veteran and official historian of British Intelligence in World War II, made a similar assessment about Ultra, saying that it shortened the war "by not less than two years and probably by four years"; and that, in the absence of Ultra, it is uncertain how the war would have ended.[31]
Cold War
The Government Code and Cypher School was renamed the "Government Communications Headquarters" (GCHQ) in 1946.[32] The Joint Intelligence Bureau (JIB) was established the same year.[33] It was structured into a series of divisions: procurement (JIB 1), geographic (JIB 2 and JIB 3), defences, ports and beaches (JIB 4), airfields (JIB 5), key points (JIB 6), oil (JIB 7) and telecommunications (JIB 8).[34]
Wartime signals intelligence cooperation between the United Kingdom and the United States continued in the post-war period.[35] The two countries signed the bilateral UKUSA Agreement in 1948.[36] Later broadened to include Canada, Australia and New Zealand, known as the Five Eyes, as well as cooperation with several "third-party" nations, this became the cornerstone of Western intelligence gathering and the "Special Relationship" between the UK and the USA.[4] Since World War II, the chief of the London station of the U.S. Central Intelligence Agency has attended the Joint Intelligence Committee's weekly meetings. One former US intelligence officer has described this as the "highlight of the job" for the London CIA chief.[37] Resident intelligence chiefs from Australia, Canada, and New Zealand may attend when certain issues are discussed.[citation needed]
The Joint Intelligence Committee moved to the Cabinet Office in 1957 with its assessments staff who prepared intelligence assessments for the committee to consider.
During the Cuban Missile Crisis, GCHQ Scarborough intercepted radio communications from Soviet ships reporting their positions and used that to establish where they were heading. A copy of the report was sent directly to the White House Situation Room, providing initial indications of Soviet intentions with regards the US naval blockade of Cuba.[3]
When the Ministry of Defence was formed in 1964, the Joint Intelligence Bureau, Naval Intelligence, Military Intelligence and Air Intelligence were combined to form the Defence Intelligence Staff (DIS).[38] The DIS focussed initially on Cold War issues.[39]
As well as a mission to gather intelligence, GCHQ has for a long time had a corresponding mission to assist in the protection of the British government's own communications. Building on the work of James H. Ellis in the late 1960s, Clifford Cocks invented a public-key cryptography algorithm in 1973 (equivalent to what would become, in 1978, the RSA algorithm), which was shared with the NSA in the United States.[40]
The Defence Intelligence Staff changed its name to Defence Intelligence (DI) in 2009.[39] Defence Intelligence has a unique position within the UK intelligence community as an 'all-source' intelligence function. The National Security Council (NSC) was established in 2010, reestablishing the central coordination of national security issues seen in the Committee of Imperial Defence.[42] The Joint Intelligence Organisation was formalised to provide intelligence assessment and advice on development of the UK intelligence community's analytical capability for the Joint Intelligence Committee and NSC.[43]
The Centre for the Protection of National Infrastructure (CPNI) was formed as a child agency of MI5 in 2007, merging the NISCC and NSAC.[44] CPNI provided integrated (combining information, personnel, and physical) security advice to the businesses and organisations which made up the critical national infrastructure.[45] In 2016, the cybersecurity-related aspects of the CPNI's role were taken over by the newly-formed National Cyber Security Centre (NCSC), itself a child agency of GCHQ.[46] The CPNI evolved into the National Protective Security Authority (NPSA) in 2023, taking on a remit beyond critical national infrastructure.[47]
^The original source for this quote is Gustave Bertrand, Enigma, p. 256, at the end of a short passage asserting the importance of Enigma-derived intelligence for Allied victory.
^"British Document Outlines Early Encryption Discovery". archive.nytimes.com. Retrieved 2021-05-12. The set of algorithms, equations and arcane mathematics that make up public key cryptography are a crucial technology for preserving computer privacy in and making commerce possible on the Internet. Some hail its discovery as one of the most important accomplishments of 20th-century mathematics because it allows two people to set up a secure phone call without meeting beforehand. Without it, there would be no privacy in cyberspace.
Johnson, John (1997). The Evolution of British Sigint: 1653–1939. HMSO. ASINB002ALSXTC.
Winterbotham, F. W. (1974), The Ultra Secret, New York: Harper & Row, ISBN978-0-06-014678-8 The first published account of the previously secret wartime operation, concentrating mainly on distribution of intelligence. It was written from memory and has been shown by subsequent authors, who had access to official records, to contain some inaccuracies.