Category Archives: Technology

Inkblots and Bullet Holes: VENONA Revisited

KOD POBEDA

[A warning. This is a very demanding report definitely ‘Advanced’. At almost 28,000 words it runs about twice the size of my regular bulletins. I believe it will be of interest only to dedicated intelligence aficionados and to readers who have been exposed to some degree to the VENONA project, and who may have been as puzzled as I was in trying to make sense of it all.]

Contents:

Introduction

The Organization of the Transcripts

Published Books

Academic Articles

Intermediate Summary

Factors in Decryption

Soviet Reactions

Why No Progress?

Conclusions

*          *          *          *          *          *          *          *          *          *          *          *          *         

Introduction:

The time dimensions, and major milestones, of the VENONA project are confusing, the official accounts are unreliable, and the archives – American, British and Russian – (mainly) unyielding. The project itself was a massive USA/UK undertaking to decrypt Soviet diplomatic traffic at the end of World War II, and it led to the unmasking of several Soviet spies. Yet the publications that describe the project are often misleading and contradictory, citing other works that do not offer adequate references. I detect a mixture of deliberate distortion of the facts by some insiders, in an attempt to confuse, and a tendency by some historians who have written about it to engage in bluff and guesswork. The lack of accuracy and precision evident in the various accounts is particularly distressing since they address a discipline that demands those qualities. The VENONA messages themselves are hopelessly scattered over a variety of different platforms, requiring herculean efforts by any analyst to weave them into a coherent shape. The overall picture is thus obscure. Even seventy-five years later, for some reason the methods used in decrypting KGB and GRU traffic between Western Embassies and Moscow remain highly confidential for GCHQ and for the NSA (the National Security Agency, which replaced the ASA in 1952). My frustration at not being able to find a comprehensive and coherent account of the whole VENONA project, complemented by the deterioration in the availability of on-line transcriptions, led me to undertake this study.

In this report, I set out to investigate the following questions:

  • How are the various transcripts of VENONA traffic organized? (or disorganized?)
  • How do the published accounts of the VENONA project contribute to an authentic story?
  • What special factors contributed to, or hindered, the decryption of Soviet traffic?
  • What were the Soviet reactions? Why were they so sluggish?
  • Why has no further progress on VENONA messages been made since 1980?
  • Why does there continue to be such secrecy over the programme?

I shall not pretend that I can provide answers to all these questions, as I do not have access to all the relevant research, and much of the evidence desired may not exist, or it may have been permanently buried.

First, a reminder of what VENONA was. (See also my report from December 2025, of which this paragraph is an excerpt.)

VENONA was the decryption project initiated by US Army Signal Security Agency and GC&CS analysts, starting in the nineteen-forties, and continuing occasionally until 1980. It exploited careless procedures by the management of the GRU and the KGB (a useful generic term for the various guises in which Soviet foreign counter-intelligence took shape from the nineteen-thirties until the nineteen-eighties *), notably the re-use of One-Time Pads (OTPs). Such devices, which translate already encoded messages into numeric strings practically impossible to decipher when used properly, by their definition should never be re-used if message security is to be maintained. Violations of procedure enabled the ASA and GC&CS, however, to break hundreds of messages, enabling the FBI and MI5 to identify many Soviet agents, including Klaus Fuchs and Donald Maclean. The coded names of that pair appeared in message traffic, and their identity was confirmed by factual details concerning their lives and movements.

[* In common with many other writers and historians, I have occasionally generalized here the multiple forms that Soviet foreign counterintelligence and espionage took from 1917 (Cheka, GPU, OGPU, NKVD, NKGB, GUGB, MGB, KI, MVD) to ‘KGB’, which was in fact founded only after Stalin’s death, in 1954. In quoting from other authors, and in direct analysis of what they wrote, I have left references as they stand.]

An important aspect of the project was the method of collection of Soviet messages. In many cases (e.g. in the United States and in Australia) where long-distance wireless communication was difficult or impossible, telegrams were written up and submitted to commercial cable companies for onward transmission. Legally, copies of all traffic were kept, and handed over to the local authorities, with the identical process occurring with incoming messages. The traffic might thereafter be routed at some stage through a wireless network, but the messages were still considered ‘cables’. In Europe (e.g. in the United Kingdom and in Sweden) wireless communications to and from the Soviet Embassy were intercepted and stored for possible later analysis. I thus refer to the generic sets of communication between stations as ‘traffic’, irrespective of the medium, to the logical connection between two stations as a ‘channel’, and to a synchronous communication by wireless as a ‘link’, indicating the direction by listing the initiating station first, as in (for example) ‘Canberra-Moscow’ or ‘Moscow-Canberra’. The term ‘channel’ is also frequently used to differentiate the systems, or lines of business, maintained by Soviet legations and embassies.

As I compiled this study, I maintained a particular interest in the Australia KGB traffic, i.e. that between Canberra and Moscow, for the following reasons:

  1. It is one of the most substantial sets, reputedly 329 pages reflecting traffic from 1943 to 1948.
  2. It was one of the last to be released, in Release 5.3 of 1996.
  3. It has attracted much less attention from the historians than the US and British traffic.
  4. It is unique in that it continued until 1948, as a result of the Soviets’ failure to replace their faulty one-time pads for this circuit.
  5. The incompetence of the Soviets ironically contributed to the mythology of ‘Black Friday’.
  6. It contains much important traffic, the decryption of which contributed to successes elsewhere.
  7. Its contents are scattered among various sources, and much seems to have been withheld.
  8. It has important connections to the defection of the Petrovs, and their knowledge of cipher techniques.
  1. How are the various transcripts of VENONA traffic organized? (or disorganized?)

The VENONA traffic has multiple dimensions, namely the line of business, the geography, and the chronology of its decryption. The cryptanalysts at Arlington Hall in Virginia, the former girls’ school where the ASA (Army Security Agency) was headquartered when it in 1945 replaced the SSA (Signal Security Agency), fairly quickly worked out that there were five distinct systems being deployed in the intercepted traffic: i) trade, ii) diplomatic, iii) KGB (generic for Soviet foreign intelligence), iv) GRU (Soviet military intelligence), and v) GRU naval. The bulk of the messages successfully analyzed were from system 3, with 4 falling some way behind. The countries involved ranged from the USA to Australia, from Canada to Colombia, from Great Britain to Sweden, and many more. Over 3000 individual messages were recorded as undergoing (at least partial) decryption – a small amount of the total traffic exchanged by Soviet stations. As Harvey Klehr writes: “The earliest cables dated from 1941 and the latest to 1950 [sic! – see below for contrary indications].  Most were from the period 1943 to 1945.  The project started in 1943, decoded its first cable in 1946, and continued until NSA shut down the project in 1980 when it judged the remaining cables vulnerable to decryption, almost all from the early 1940s, were too old to be of any current intelligence interest.  While cables from Soviet stations in sixteen nations were deciphered, the great majority were between Moscow and its stations in the United States.”

One would expect that a comprehensive register of all messages that had been decrypted to reveal something of use had been compiled, and that it would be easily available. The traditional repository has been owned and delivered by the NSA. It maintained what I remember as a very useful site, available on-line, but it is now defunct. Nevertheless, several other on-line organizations dedicated to VENONA (such as the Wilson Center at Stanford University) still maintain the obsolete NSA url, as, of course, do many publications that appeared up until a few years ago. Instead, the NSA now offers a reformatted guide and registry, at https://www.nsa.gov/Helpful-Links/NSA-FOIA/Declassification-Transparency-Initiatives/Historical-Releases/Venona/  that are, to all intents and purposes, useless. The site  introduces its Index to document images by stating: “The first of six public releases of translated VENONA messages was made in July 1995 and included 49 messages about the Soviets’ efforts to gain information on the U.S. atomic bomb research and the Manhattan Project. Over the course of five more releases, all of the approximately 3,000 VENONA translations were made public.”

The structure that follows indicates that 100 pages of items, with each page containing fifteen documents, are viewable, equating to 1,500 documents rather than the 3,000 advertised. Yet the documents have been sorted alphabetically from all sources, driven by the metadata describing what the relevant cable is about, with the character ‘”’ appearing first. Page 100 contains the metadata ‘Moscow’: thus the registry is missing half of the entries, with titles headed ‘N’ to ‘Z’ absent. The Search facility does not work. There is no ability to select a certain channel (e.g. New York-Moscow) from the listings. One can only plod through every individual item looking for pieces of relevance. In late December 2025 I submitted an on-line query to NSA requesting an explanation of why it has formatted the transcripts this way, and seeking advice on how to use the material more effectively. I never received an acknowledgment, let alone a reply.

The Wilson Center concentrates on KGB traffic, and enhances it offerings with extracts from the Vassiliev Notebooks, and the Concordance that accompanies them. (See https://www.wilsoncenter.org/article/venona-project-and-vassiliev-notebooks-index-and-concordance )  The site was developed by John Earl Haynes, and appears to have been last updated in 2013. Hence it also offers the obsolete NSA url when inviting readers to track down messages by date. It very sensibly organizes the traffic in separate PDFs that each represent a communication channel, and the line of business (e.g. New York KGB, London GRU). It thus offers a Canberra KGB PDF, but it is obviously incomplete, since the cables presented constitute only a fraction of the two hundred or so that other sources state exist. There are none from the critical year of 1948, for example: no explanation is offered, but it may simply be because the Students at the Mercyhurst College for Intelligence Studies (who transcribed them) ran out of time on their project. They are presented in rough chronological order. I have not counted the number of messages from other channels.

Through contacting Mr. Haynes, I was able to obtain a set of all the Canberra-Moscow traffic that he possessed (and I thank him for sending the files to me). It contains several items from 1948, but all are from Moscow to Canberra. I do not know why no cables in the other direction appear: were they not decryptable for some reason? Have they been censored? Unfortunately, the set has also been rather haphazardly assembled. Over two hundred messages are listed, but many are re-issues of earlier messages that have undergone further decryption. While numbered, they are not in chronological order. The dates on the cables produced are frequently wrong (primarily the year given).

My former on-line colleague, the late Denis Lenihan, produced a very useful catalogue and analysis of the Australian traffic, available at https://www.academia.edu/36543821/AUSTRALIAS_KGB_NETWORK_1944_1950_A_NOTE_ON_AUSTRALIAN_VENONA_pages_pdf?email_work_card=view-paper (probably requiring a subscription). Yet the messages he lists appear to be based on the defunct NSA site, and they do not correspond to the Haynes archive described above. Moreover, Lenihan’s listings are selective: he states that he has chosen them based on their relationship to espionage, but that means he overlooks some critical items, such as the June 2, 1948, cable about codes. He does offer, however, some very useful insights about the GCHQ records, having inspected them at Kew, and he makes a few sharp observations, such as pointing out that no Canberra to Moscow traffic after May 1946 was decrypted at all – a puzzling phenomenon that deserves some closer analysis.

The Internet Archive, at The VENONA Files : Free Texts : Free Download, Borrow and Streaming : Internet Archive boasts 3,262 results, and offers images of them all. (The higher number is due to the fact that the contents are not exclusively messages, but include various annotations and commentary.) It offers ‘Search’ capabilities through metadata, and through text, but the process is rather erratic, since it uses Optical Character Recognition (OCR) techniques. Thus one can search by ‘Canberra’, for example, but the results are inadequate.  The items can be sorted by year, and requesting ‘1948’ (when only Canberra was still open) shows all twenty-eight items (but only seven messages) summarized in the year-by-year totals on the left. Based on information from other sources, however, this set is obviously not complete.

Another site that contains millions of government documents released primarily by requests through the Freedom of Information Act (FOIA) is the Black Vault Archive. The VENONA documents are described at https://www.theblackvault.com/documents/nsa/venona/index.html, where William P. Crowell’s original proud announcement is reproduced. Yet the page that claims to guide viewers to the scanned images (https://www.theblackvault.com/documents/nsa/venona/venona_docs.html ) is restricted to Release Six of the documents, and contains only null pointers. Table 9 would in principle be very interesting, but it turns out to be valueless.

Britain’s GCHQ probably holds a considerable number of transcripts. In its introduction to the HW 15 series, it makes some confident and ambitious claims about the collection (see https://discovery.nationalarchives.gov.uk/details/r/C9294) Yet the follow-up is not very precise (and its authorized history, by John Ferris, almost completely ignores the topic of VENONA). The series is tantalizing, but it is undigitized, and it is not clear from the summary descriptions whether all the transcripts are contained in the archive. For example, HW 15/1 and 15/2 claim to describe at item level all the KGB traffic between Canberra and Moscow from 1943 to 1948.  Yet the description indicates that the last message in the traffic was from January 1948, while other sources show the June 1948 message from Moscow to Canberra. The items are not indexed, and it is impossible to verify anything without inspecting the records in person.  

Another valuable source can be books on the subject (see below), but they are not a failsafe guide to locating where the originals of messages can be found. For instance, Breaking The Codes (1998) by Desmond Hall and David Horner, describes an array of the Canberra-Moscow traffic, and includes two page-size reproductions of critical cables from 1946 and 1948, but their Notes and Sources do not provide any information on where they may be found, apart from a pointer to the (obsolete) NSA url. I suspect that secret Australian government archives contain the full couple of hundred items that are frequently mentioned here, and elsewhere.

Lastly, a few comments on classification of items. The conventional way for the records to be stored and identified was to use the serial numbers and dates provided by the Soviet representatives. At the start of each year, a fresh counter was set for each direction of traffic. For example, the Wilson Center shows twenty-one items for Canberra and Moscow from the years 1943 to 1947 (with only one being from Canberra to Moscow). In 1943, the first entry deciphered for Moscow to Canberra is numbered 124, dated August 21, and the latest, 233, is dated December 2. The first for 1944 is numbered 182, on July 27, and the latest 214, August 31. 1945 starts earlier, on February 16, with number 29, with the last, 253, appearing on November 6. The sole Canberra to Moscow cable is numbered 116, on March 16, 1946. Hall and Horner offer cable number 123 for March 19 of that year, and 324 from September 1.

Thus it is fairly straightforward to derive the probable volumes of traffic over a given channel, and thus to provide an estimate of what percentage of the total number of cables was decrypted, if only partially. It would be useful if commentators and writers provided both serial number and date for any message they refer to: Nigel West does not do so, while Haynes and Klehr are very methodical in their Notes, but, since no comprehensive archive appears to exit for researchers to follow up on, and the NSA repository is so flawed, it does not matter much.

  • How do the published accounts of the VENONA project contribute to an authentic story?
  1. Books:

I identify sixteen publications that are either dedicated to VENONA, allocate a chapter to it, or provide broad insights across their texts. I highlight Lamphere’s rather audacious contribution that antedated the formal VENONA announcements, as well as Peter Wright’s quite astonishing disclosure from 1987. Several other works refer to VENONA, and a few have valuable information on it: I shall cite them occasionally in later sections. I also analyze a few relevant articles that have appeared in the academic press. First of all, however, I list a few books published before the official VENONA announcement that gave broad hints about the project, and I summarize their contributions.

Wilderness of Mirrors by David C. Martin * (1980)

            Martin introduced the idea of a group of American cryptanalysts mounting an attack against the Russian cipher system ‘midway through World War II’, and ‘using as their basic weapon the charred remnants of a Soviet code book that had been salvaged from a battlefield in Finland’. Note the timing, and the reference to a battlefield, not a consulate at Petsamo, and the fact of the codebook’s being available during the war. Yet perhaps Martin confused two stories, since he mixes up ‘charred’ (Petsamo) with ‘bullet-holes’ (battlefield). Martin described how the cryptanalysts discovered the duplication of OTPs, but declared that, because of the partial nature of the codebook’s reassembly, the first big breakthrough did not occur until 1949.

David Martin

[* I have formerly criticized Wilderness of Mirrors for its incorrect representation of William Harvey’s sudden inspiration concerning Kim Philby, when the information had been planted on him by Dick White and Arthur Martin. I was gratified to make contact with Mr. Martin several weeks ago, and I pointed him to my research. He very graciously acknowledged what the archives have since shown, and he accepted my criticism with dignity. He was, after all, a pioneer working with sketchy information, and I now salute him.]

A Matter of Trust by Nigel West (1982)

            West presented the interception and decryption of Soviet wireless traffic (U-TRAFFIC) as primarily a British success, as early as 1945, with the Americans ‘duplicating’ that effort with Operation BRIDE at Fort Meade, in Maryland. Yet the account becomes more garbled: West suggested that the Americans made their first advances in the field in Australia, at the end of the war. “An American intercept station at Shoal Bay near Darwin”, he writes, “had by luck cut into some Soviet diplomatic wireless traffic.” The results were so promising that Courtney [sic] Young was sent out, and Australia subsequently set up ASIO. Of course, it was routine cable traffic had been picked up, and what West had been told was a romantic fiction.

The Shadow Warriors by Bradley F. Smith (1983)

            Smith’s contribution lay entirely in the matter of the purchase by Bill Donovan’s OSS (the Office of Strategic Services, the forerunner of the CIA) of the Soviets’ codebooks and other cipher material from the Finns in November 1945, and he gave a useful break-down of the events, ending up with the handover of the material to Foreign Minster Gromyko on February 15, 1945. Smith made no reference to the material’s being copied before return, but took a dovish approach, justifying the action in the context of US-Soviet relations at the time, even though it ‘virtually guaranteed that the Russians would change their codes’.  “The really irresponsible gamble had been taken by Donovan when he purchased the codes in the first place”, writes Smith.

Too Secret Too Long by Chapman Pincher (1984)

Pincher covered the evolution of Operation BRIDE/DRUG/VENONA in Chapter 18 of Too Secret Too Long, relying mostly on ‘confidential information’, while also crediting David Martin for the anecdote about the recovery of the Petsamo code-book.  He added that the codebreakers were ‘greatly assisted in this mammoth endeavour’ by that acquisition, and he provided a useful explanation of the Soviet mistake of re-using OTPs. He sprinkled references to BRIDE generously around his text, as he explained how the decryption effort led to the unmasking of Fuchs and Macean, and triggered further suspicions on characters such as Mitchell and Hollis.

Australia’s Spies and Their Secrets by David McKnight (1994)

McKnight’s book provided an excellent description of the fallout from the investigation into security leakages in Australia, but he was naturally hesitant and suspicious about the codebreaking exercise itself. He spoke to several retired ASIO officers, but they were reluctant to divulge anything more than sketchy details. McKnight gained access to an internal ASIO history that made reference to experiences gained from the ULTRA project. He had read Lamphere and Wright, but assessed that ‘these books give jumbled and contradictory accounts’ – very true. Thus he did not know whom to trust, and for some reason stated that it was the FBI who had been breaking the transmissions. He assumed that, when Gouzenko defected, all Russian ciphers and codes were changed, but that the 1945 window ‘provided the codebreakers with enough work to last at least two decades’.

Now I turn to the major works:

  1.  The FBI-KGB War by Robert Lamphere (1986)

The retired FBI agent, Robert Lamphere, was the first to break detailed news about VENONA, in 1986, when his book The FBI-KGB War was published. Lamphere was obviously not allowed to mention the word ‘VENONA’ (it does not appear in the index), despite the fact that Pincher had already revealed it, but Chapter Six, The Break, gives a good explanation of how he helped Meredith Gardner on the project. He admits to having been constrained in what he could write: “The National Security Agency  . . . does not want me to reveal certain aspects”. Yet he went on to say that he thought he could tell enough for anyone reading his account to comprehend the magnitude of the breakthrough.

‘The FBI-KGB War’ by Robert Lamphere

In 1947, when he was assigned to the project, Lamphere was given fragments of Moscow-New York messages from 1944-45 to inspect, and was reminded of what Gouzenko, the cipher-clerk who defected in Canada, had told his interrogators. His first important observation is that Gouzenko, even though he was employed by the GRU (military intelligence), knew enough of the KGB encipherment system to inform his interrogators that it was similar to the GRU’s OTP system. Lamphere then gives a clear description of how the encryption process worked, explaining the role of a codebook (or dictionary) to translate common terms into a numeric value (although he describes each codebook entry as having five-digit numbers, not four, as some other accounts declare). Lamphere was introduced to Gardner only in 1948, however, and he wondered how his colleague had managed to make any progress on the KGB codebook. He was shown the partially burned codebook that Gardner kept in his office, and, even though it was out of date, Lamphere stated that it had nevertheless been ‘immensely helpful’ in helping him slowly construct the current codebook. ‘Out of date’ is a characteristically imprecise phrase, however: was it obsolete because the current codebook (1948) had replaced it, or because it was a version that had been superseded by that used during the period under review (1943-1946), or was it obsolete because it derived from a period that antedated 1943?

Robert Lamphere

Here Lamphere reports the frequently mangled story about the Finns’ recovery of the charred codebook ‘during World War II’ (nothing more specific), and how William Donovan, the head of OSS, in November 1944 purchased 1500 pages of code and cipher material, a copy being provided ‘immediately’ to the ASA (the Army Security Agency, forerunner of the NSA). Secretary of State Stettinius insisted that the codebook be returned to the Russians, but not before Donovan had it copied. Of course, the Soviets knew what must have happened, and changed their codes in May 1945, thus putting a stop to any further decryption. Lamphere does not make any distinction between changes of codebooks and OTPs, however, and sadly mixes his terminology between ‘ciphers’ and ‘codebooks’. Yet he concludes this section with the statement: “ . . . in 1948 Gardner had a codebook that the KGB had used in Finland in 1944. It wasn’t the current codebook, but it was similar, and above all it provided him with a start.”

This is a contradiction, however, and Lamphere appears to be confusing the year in which the codebook was handed over (1944) with the year in which was retrieved (1941). If the codebook had been used in 1944, it was current for the purposes of the traffic that they were inspecting. It may have been replaced in 1945, alongside the provision of new OTPs, when Arlington Hall could not break into any fresh messages: we are not told. On the other hand, in 1945, the Soviets may have continued with the codebook in place, in the belief that its new OTPs would make the issue of exposed codebooks irrelevant. Thus the codebook in question may have beencurrent for 1948: by then, only Canberra-Moscow traffic was still being decrypted, and that success would suggest the codebook had endured. Lamphere was mightily confused. Yet what he writes constitutes a strong statement that Gardner indeed had access to an important tool for grappling with what turned out to be a more intransigent challenge.

Lamphere ascribes Gardner’s success in making a crack into the KGB system to the availability of all the wartime traffic (copied from the cable companies’ records) and the availability of a codebook, ‘although not the right one’. (Given that wartime traffic was split across two codebooks, this is not an authoritative statement.) He then helped his colleague by tracking down the plain text of some materials that the Soviets had transcribed and enciphered in 1944. How he knew that much is, however, not clear. Lamphere helps Gardner out, mainly through the efforts of a translator, Mr. Boguslav, who provided the FBI field office in New York with a host of material, mostly in Russian, except for a few translations into English. Rather provocatively and mysteriously, Lamphere writes: “This material had been photographed by New York agents in the course of an investigation into Soviet operations in New York in 1944.” He offers no other explanation: these must have been the night-time raids on the Soviet consulate that came to light later.

Meredith Gardner (on left)

This anecdote seems so utterly illogical that I attempt to parse it here:

  1. Gardner happened to ask Lamphere whether there was a possibility of obtaining the plain text of materials enciphered by the Soviets in 1944;
  2. Gardner presumably meant acquiring the original American texts, since he would have had no imaginings that secret Soviet sources would be available;
  3. Gardner had enough information on the materials to offer a description that made sense to Lamphere’s colleagues;
  4. Lamphere’s friend Boguslav came up with the exact texts required, having himself translated them from Russian into English;
  5. The material had been photographed by FBI agents while investigating Soviet operations in New York at the exact time of the transmissions in which Gardner had shown interest;
  6. The FBI, after this highly illegal and audacious raid, the authorization of which is obscure, then sat on the material for four years;
  7. When presented with the results, Gardner was excited, but apparently never showed any surprise at the coincidental nature of the recovery.

This seems to me like a very unconvincing cover story.

In any event, according to the author, these items contributed greatly to Gardner’s being able to fill out his codebook, and Lamphere gives examples of some other source documents that were able to help Gardner add further items to it: telegrams from Churchill to Truman, scientific reports on uranium 235, and other reports on the Manhattan project.  In summary Lamphere’s contribution was a breakthrough, but frequently elliptical, often wrong, sometimes confused, and occasionally brazenly phony. Maybe that misrepresentation was what the NSA wanted to encourage. I shall investigate such anomalies later.

2) Spycatcher by Peter Wright (1987)

Peter Wright quite blatantly outs VENONA and all its mysteries. (There is an irony in the publication of Spycatcher, since the book was originally banned in the UK, and copies frequently imported there from the USA, whose intelligence officers cannot have been delighted with what Wright revealed about their hitherto secret project.) The author lays out the project name, how the coding systems worked, and describes the stresses that led to the duplication of OTPs. Next he presents the shocking revelation that Gardner made use of the ‘charred remains of a Russian codebook found on a battlefield in Finland’, indicating that the remnants included the very valuable entries for ‘Spell’ and ‘Endspell’. He mistakenly attributes the discovery of repeated use of the same OTP page to Gardner, as well.

One of Wright’s groundbreaking pieces of analysis is the detail with which he covers how the British and Americans exploited the breaks they made with something called a ‘window index’ (see p 181). He also presents the issue of codebooks in a new light: “Sometimes [??] they changed, and whereas the Ambassadorial, GRU, and trade channels used a straightforward listed codebook, rather like a dictionary, so that the codebreakers could guess from the group where in the codebook it appeared, the KGB used a special multivolume random codebook which made decrypting matched KGB channels a mindbending task.” This observation anticipates what Budiansky later wrote [see below] concerning one-part and two-part codebooks, but I believe the way Wright presents it is unique, as opposed to the generic change that occurred when POBEDA was replaced across all channels, as other accounts describe. His comment suggesting that the GRU used a one-part codebook is provocative.

Wright has much more to say about VENONA, and the outcomes from the decryptions. Chapter 13 of Spycatcher is well worth reading again: the author was at the centre of the efforts to convert the fragments passed on by GCHQ into the identification of real Soviet spies. His text is mostly very accurate, although the chronology in his coverage of the Australian scene is awry. But he must have given the NSA a fright, and his comments about the codebook exploited by Gardner will have alarming consequences when I later analyze that issue in more depth.

3) Introductory History of VENONA and Guide to the Translations by Robert Louis Benson (1995)

‘Introductory History of VENONA’

The Americans set out to control the narrative when Robert Louis Benson, who had been a history professor at California University, in 1995 published an ‘official’ introduction to the saga under the auspices of the NSA. It is a very short pamphlet, of historical interest since it preceded the much more formal and bulky item that Benson authored with Michael Warner, issued the following year [see below], but one that has largely been overlooked. And I can understand why its existence may have been suppressed: within its ten thin pages exists an implicit rebuff to what Lamphere wrote, what I would call a counter-mythology based on very shaky ground. I cite a significant paragraph:

            In spite of what has been written in a number of books and articles, Arlington Hall made the VENONA breakthroughs purely through sweat-of-the-brow analysis. There was no cryptographic assistance for Lieutenant Richard Hallock, Cecil Phillips, or Meredith Gardner  and their colleagues from lost, discovered, or battlefield-recovered Soviet codebooks during the years in which the main analytic breakthroughs were made (through 1952). It was not until 1953 that a photocopy of a partially burned codebook (recovered by U.S. Military Intelligence in 1945) was discovered to be related to the VENONA cryptographic systems after another cryptanalytic breakthrough. The successful decryption of the VENONA messages was a triumph of analysis by a small group of intelligent and dedicated women and men working long hours in their cramped offices at Arlington Hall.

This seems to me an epic example of what I have called ‘Hinsleyesque denial’ after the celebrated British intelligence historian – attempting to deny the truth of previously asserted facts without identifying where they appeared, or providing evidence that would gainsay them, while at the same time piquing the reader’s interest into the source of such stories. ‘Sweat of the brow’ suggests no benefits of data processing equipment. The attempt is so clumsy, and so counter-intuitive, and flies in the face of so many facts, that I shall return to analyzing it later in this piece.

The pamphlet has many other weaknesses. It claims to be an Introductory History to Venona, but restricts itself to the USA, mentioning New York and Washington, and including a brief reference to San Francisco, while utterly ignoring the worldwide dimensions. It states that, by 1948 (that late!), the British had joined the project, yet other sources (e.g. Romerstein and Breindel, and even Benson and Warner in the volume below!) inform us that co-operation started in 1945. Benson attributes the ‘excellent cooperation’ to the efforts of Lamphere and Gardner, attempting to lock in the year as 1948 while also giving an inadvertent nod to the FBI man he wished to bring down a peg. He identifies Philby as a source of leakage (but not Currie or Weisband), dating his revelations to 1949-1951, when the notorious ‘Black Friday’ had already occurred. All in all, it is a careless and ill-designed tract that attempts to swell the skills and achievements of the Americans at Arlington Hall without giving any proper justice to the broader dimensions of the project.

4) History of Venona by Robert Louis Benson and Cecil James Phillips (1995)

I do not believe this volume has been published in the form given above. The first reference to it that I have found appears in Spying Through a Glass Darkly, by David Alvarez and Eduard Mark [see below]. In Footnote 30 to Chapter 2, the authors list it as being published by the NSA in 1995, but then ominously add: “The authors are indebted to Lou Benson for arranging the declassification of portions of this multivolume in-house history of the so-called Venona project.” That is all highly irregular, of course. The work was an in-house history, and still classified, yet one of its authors took it upon himself to arrange for some of its material to be released – presumably for general public consumption – but especially for a ‘trusted’ author. So where can the declassified sections be found?

I found another clue in the work of Matthew Aid. On a 2009 page of the US National Security Archives (see https://nsarchive2.gwu.edu/NSAEBB/NSAEBB278/index.htm) can be found a statement that Aid, on that day (June 19) ‘posted a collection of declassified documents obtained for his new book The Secret Sentry on the Archive’s Web site’. ‘Document 1’ consists of extracts from the same History of Venona, which Aid equates to another item titled Top Secret Umbra. And indeed, that link leads to a document familiar to me with that title – something that appears to be an early version of the History, heavily redacted (with obscured words that make the redactions look absurd, in 2025) for release in 2004. Does it comprise the whole work? I think not. Alvarez and Mark referred to a ‘multivolume ‘history’, and Top Secret Umbra stops with ‘Volume 3, The Bill Smith Era, November 1943-1946’. Moreover, if Alvarez and Mark had to arrange for a special declassification in preparing their 2016 publication, the result of their efforts would surely have been information not in the public domain. Yet their further references, e.g. Footnotes 51 and 52, point accurately at paragraphs in the UMBRA document. Had they overlooked, or misidentified UMBRA, and did Benson mislead them? But then why would Aid, while he claimed to have succeeded in having the History of Venona declassified, restrict his disclosure to an old and heavily redacted UMBRA document instead?  It does not make sense. In any event, I summarize the key points made in Top Secret Umbra. (The full text can be seen at https://archive.org/stream/history_of_venona-nsa/01_djvu.txt.)

The style of the work is informal and chatty. It covers a lot of detail on the decryption processes not found elsewhere, but there are few radically fresh insights. Benson (the primary author) early on makes the claim that ‘each Russian entity had its own codebook’, and he asserts that the process of identifying cipher pads shared between Trade and Diplomatic traffic was the best method of making progress, irrespective of codebook variants. He states that the so-called ‘Black Friday’ had nothing to do with VENONA (something with which I am in agreement). The second myth he wants to debunk is that the breakthrough came about because the OSS had obtained Russian codebooks. “The OSS did not in any way contribute to the Venona break;”, he writes, continuing:  “ . . . the fundamental cryptanalytical discoveries and the decryptions through 1952 were not aided by our side having any KGB or GRU code book from any source. It was an analytical success.” I believe that is a Jesuitical statement. While denying that the OSS did not contribute, it does not specifically exclude the fact that GCHQ supplied the material in question, and the second part of the sentence digs a hole from which Benson and Phillips could not easily escape, as I shall show later. Benson then reiterates the non-involvement of OSS in sharp terms, lest his readers miss the point.

There are other nuggets. Benson carefully points out that Captain Abraham Sinkov’s report [see below], after his February 1941 visit to GC&CS, specifically does not mention Soviet diplomatic or intelligence service systems, instead describing features of military systems. He does refer to Tiltman’s pre-Petsamo recoveries, describing them as ‘military codebooks and other cryptographic material’, and he carefully informs us that the codebooks Tiltman retrieved ‘represent a different trove than the so-called Petsamo material’. It would have been useful if he could have written more about that, since it would appear he has studied both. Yet in the same paragraph, he writes that the Petsamo material, ‘which included a KGB codebook, instructions for using additive, tables and an emergency cipher system . . . reached the UK-US in 1945-46’.

Benson states that, during the war, there was a strong resistance to sharing any aspects of the VENONA project with the British, but does not explain why. He presents a challenging anecdote (relying on what Lou Madison, GCHQ archivist told him in 1992!) about MI6’s and MI5’s cooperation in 1942 on ‘working Russian targets’, and that the exercise by RSS, the Radio Security Service, ‘discovered extensive Russian illicit radio links, apparently GRU, KGB and Comintern’. This is surely wrong: routine mop-up operations against unauthorized wireless transmissions were undertaken by RSS, but apart from the familiar output from the Soviet Embassy, little of a sinister nature was found.

The work presents some useful information on Lauchlin Currie, who probably exaggerated what he heard about work on Soviet ciphers to suggest to his handlers in 1944 that the US ‘had broken the diplomatic code’, something that another Soviet agent Elizabeth Bentley subsequently heard about. Currie slipperily tried to wriggle out of his betrayals when he was interviewed by the FBI in 1947. Benson speculates that the indicator changes that the Soviets implemented on May 1, 1944 (evidence of which comes from a famous VENONA message) may have been triggered by Currie’s action, but is not certain that it was so.

Benson’s last fling is to belittle the importance of the Petsamo material. It is worthwhile reproducing how he described the main treasures, including the ‘partially burned codebook of the First Chief Directorate of the KGB’:

This codebook (KOD POBJEDA), and its indicator system later came to be known as [redacted]. The Petsamo trove also included KOD 26, a true Dip (consular) codebook, and at least one GRU codebook, as well as rules for using one-time pads (the additive) to encipher groups from the codebooks, and instructions for using an emergency cipher system in case of compromise of the regular systems . . . . Some traffic, plaintext and cipher text was [sic] also taken at Petsamo.

He goes on to write: “When the British took over this source in 1946, they too got copies of the Petsamo material and passed more copied on to Arlington Hall.” Yet Benson continues: However, the real story is this: in 1945, TICOM had already obtained all of this and more in their sweep through the German Sigint centers, the team seizing German photocopies of the material originally taken by the Finns (or maybe the Germans themselves) at Petsamo.

Now all that may be fine. Disparage the resented OSS. Admit that the British were the suppliers of the Petsamo material. Yet claim it was all rather irrelevant. (How Benson knew enough about both troves is a bit of a stretch, but maybe he just trusted what he was told. There were 73 steel file cabinets shipped, enclosing 300,000 pages of material.) He next relates that some of the TICOM material, shipped to GC&CS for study, was microfilmed and sent on to Arlington Hall rather quickly. How generous of the Brits! Was that effort really necessary? Did they not trust the US Army to get it to the right place? Benson then offers some useful detail about some of the Petsamo documents, writes about Gouzenko and Bentley, but never mentions that the TICOM material did not become of use until 1952, a fact that he very clearly publicizes in his other works. Why is that, I wonder?

Moreover, there is one last coda. Benson needs to demolish one more legend – that of the charred codebook recovered on the battlefield, an event that never happened, in his estimation. So what about the codebook displayed by Gardner, which Lamphere remarked on? He brings in Meredith Gardner himself:

Meredith Gardner, who was the first person to recognize the KGB nature of [redacted] later told Bob Lamphere of the FBI that the codebook that he (Gardner) used to make the breakthrough had been found on a battlefield and had a bullethole in it. Meredith later told me that he was referring to a mark that looked like a bullethole but certainly wasn’t. We are getting ahead of the story, but the book that Meredith was using was the aforementioned KOD14, which he studied to learn KGB codebook vocabulary and just to see what a Russian codebook looked like. It was not a Venona system, and did not lead to the first Venona break, which was accomplished by bookbreaking without the benefit of the relevant book [redacted]. Pages 86 and 87 of the KOD 14 book (which I’ve only seen in photocopy) do indeed show a round, but irregular, black mark – probably an ink blot.

So that’s all right, then, is it? It sounds to me as if Gardner had to be trained to get his story right. Why did he simply not show Benson the codebook in question? I am sure he would have hung on to it as a souvenir. Yet Benson had informed us earlier in his history that KOD 14, part of the Petsamo haul, ‘was an important find, used by the NKVD rear service security troops’, and that it had also been seized by the Finns during military operations on the Karelian front. In what sense was KOD 14 not a ‘Venona system’? Why would Gardner have wanted to have selected this particular item, and why was he allowed to extract it and display it in his office, so soon after its delivery, I wonder? And confusing ink blots and bulletholes? How lacking in perceptiveness could these cryptanalysts be sometimes.

5) American Cryptology During the Cold War 1945-1989 by Thomas R. Johnson (1995)

‘American Cryptology’ by Thomas R Johnson

This ‘Official Four-Volume History of the NSA’ predictably foreshadows the NSA/CIA production of the following year. While omitting some important aspects it does add a few nuggets in Chapter 4, ‘The Soviet Problem’. It credits the Army’s successful attack on Japanese diplomatic communications for giving SIS (the Signals Intelligence Service, renamed the Signals Security Agency, or SSA, in 1943) ‘some handholds’ [unspecified] into Soviet systems’. On the BRUSA agreement, it generously acknowledges that ‘the British provided much of the cryptanalytic expertise, the Americans most of the processing capability’ and adds that ‘TICOM debriefings of German cryptologists also gave the partners useful information about Soviet systems’.

After giving a careful description of what Lieutenant Richard Hallock achieved with his ‘depth-testing’ exercises (i.e. looking for possible duplicated pages), with the first  reward coming in November 1944, after more than a year’s effort, Johnson relates how Gardner uncovered the ‘spell-endspell’ values that allowed the Soviet cryptographers to enter non-Russian words, or terms that did not appear in the codebooks. He records how the defecting cipher-clerk Gouzenko was able to explain how codebooks were put together, and how additives were used for final encryption. Next, he expands on Lamphere’s rather cautious remark concerning photographing Soviet material: “A second source of information was a 1944 FBI burglary of AMTORG, during which agents carried off stacks of unenciphered messages with their cipher text equivalents”, but Johnson declares that the FBI turned over ‘this bonanza’ to Gardner only in 1948. This is a reinforcement of the Lamphere message, and equally hard to believe. Why would the FBI engage in such a hazardous enterprise and then sit on the fruits of its labour for four years?

Johnson covers the STELLA POLARIS saga in some depth. His version of the story is that, in 1941 at Petsamo, the Finns, even though some of the material they recovered was burned beyond use, managed to recover ‘certain of the codebooks  . . . more or less intact’. (I do not understand how anything might be recovered ‘more intact’ than in its original state, but I’ll let that pass.) He then adds that these codebooks were the same ones which, ‘in the mid-1940s, Meredith Gardner was working on’. I shall have to revisit this claim later, as the evidence is contrary [see Lamphere above]. Rather enigmatically, he writes that ‘the charred codebook fragments’ were turned over to the Finnish COMINT service, headed by one Colonel Hallamaa. (Just the charred fragments, that were of no use, or the intact items as well? Again, it does not make sense.) Yet these remnants in 1944 found their way to Sweden, where they were copied, and such copies landed up in the hands of the Swedish, German and Japanese COMINT organizations. Eventually the British laid their hands on copies, and, at the same time, in 1945, the Americans’ OSS began working with Hallamaa, and received their quota, ‘although not, perhaps, a complete set’. (Who would know what a ‘complete set’ was?)

The book then explains that this OSS-Hallamaa set was not the same as the set that the TICOM team acquired shortly after the end of the war, the latter being that which made its way to Meredith Gardner. (Of course it may have been the same material, simply being the copy that landed up with the Germans. The point is not followed up.) And then the pot is further stirred: “Shortly thereafter AFSA began obtaining Petsamo materials from the British under the codename Source 267 and may, at some point, have received copies from OSS/CIG, but these were no more than duplicates of materials they already had,” he writes. How an official historian can be so vague about the first half of the equation, but so authoritative over the second, is a conundrum. In addition, AFSA (the Armed Forces Security Agency) was not created until May 1949: Johnson probably intended to write ‘ASA’ not ‘AFSA’ in this passage.

After a lengthy digression on the coverage of spies who were revealed by Venona, Johnson emphasizes that most of the decrypted traffic came from ASA’s 1944-45 files (without explaining why: that will become clear later), and that it was not decrypted until the late 1940s and early 1950s. The section tantalizingly ends with a paragraph headed by the title ‘Black Friday’ in bold. Unfortunately, this whole section has been censored, as have many other parts of this history. Why these matters were so sensitive in 1995 is also puzzling: my copy of the book is the original 1995 edition, and I do not believe it has been updated since.

6) VENONA: Soviet Espionage and the American Response 1939-1957 edited by Robert Benson and Michael Warner (1996)

The US agencies undertook a more serious and substantial initiative quickly thereafter, the next publication being VENONA: Soviet Espionage and the American Response 1939-1957, issued jointly by the CIA and the NSA in 1996. (It is available on-line at https://www.cia.gov/resources/csi/books-monographs/venona/). The year 1939 would appear to be premature for the starting-point of an history of VENONA, but the editors, Robert Louis Benson and Michael Warner, took as their impetus a conversation that Loy Henderson had with defector Walter Krivitsky in March 1939, an experience that highlighted the threats from Soviet espionage. 1957 seems to have been chosen as the terminus because of the imprisonment of the KGB illegal Rudolf Abel, and a Supreme Court decision that ruled that the US government had enforced the Smith act too broadly, thus making ‘the Act almost useless in prosecuting Communists’. A more imaginative approach would have been to explain what happened between 1957 and July 1995, when the CIA released the first group of the NSA’s translations to the public, as Deputy Director of the NSA, William P. Crowell announced in his Foreword.

‘VENONA’ by Benson and Warner

The thirty-page Preface is in indispensable guide to the evolution of the project, although it finesses some of the more sensitive aspects of the process by which the cryptanalysts achieved their successes, and tends to some self-aggrandizement about the skills and breakthroughs that they made. As its title suggests, it has a very American focus. It mentions British involvement, but the Preface says nothing about the multiple systems of traffic that were deployed between Moscow and other countries. It refers to the capture of scorched codebooks and cryptographic materials from the Soviet consulate in Petsamo in June 1941, but it interprets the episode only in terms of the Russians’ being alerted soon afterwards to the Germans’ trying to exploit the codebook. It records in a Footnote that it was the same as that which the US Army recovered in Germany in April 1945, but says nothing as to what assistance it gave to Arlington Hall. It does present the important fact that, on May 1, 1944, ‘KGB code clerks began using a new message starting-point indicator for telegrams’, and the book includes an image of the completely deciphered message (No. 26) that broadcast the change. Yet the reader is left stranded: when was this message decrypted, and what subsequent efforts did it facilitate?

Part 1 consists of 190 pages, titled The American Response to Soviet Espionage and contains a variety of documents and memoranda concerning that response. Part 2 presents 99 individual cables, almost all of which are taken from traffic between Moscow and the USA (New York, San Francisco and Washington). Two derive from Moscow to London, and one from Moscow to Mexico City. A few GRU (Army & Naval) messages are included among the dominant KGB traffic. They are properly introduced with dates. The last message listed is from September 17, 1945, from London to Moscow, describing Philby’s reaction to the Gouzenko case.

This is an obviously inadequate compilation. It makes no express statement as to why no US-based traffic was able to be decrypted after 1945 (with its selection of cables strongly hinting as much). It makes (on a page contributed by Cecil Phillips, headed What Made VENONA Possible?) an oblique hint that some messages were still being decrypted in June 1948, without identifying the channel and circumstances. Phillips must have been the source of Benson’s comment on ‘breakthroughs’ in the previous publication, since he writes here: “Arlington Hall’s Venona breakthrough in 1943-46 was a purely analytical accomplishment, achieved without benefit of either Soviet code-books or plain-text copies of original messages”, perhaps subtly signalling that later breakthroughs did take advantage of such devices, but again weakly discrediting evidence from elsewhere, and minimizing the assistance of IBM equipment.

Cecil Phillips

Phillips’s contribution is annoyingly elliptical. He writes: “The 1944-46 messages – which yielded the early translations and the bulk of all translations – were recovered over a period of years by Arlington Hall cryptanalysts and decoded from a ‘codebook’ that crypto-linguist Meredith Gardner reconstructed by using classic codebreaking techniques.” There is no explanation of what those techniques were: the assertion cries out for support and explanation. Yet on the same page Phillips writes: “Nevertheless, most of the duplicate pages were used between 1942 and 1944 – years of rapid expansion of Soviet diplomatic communications.” ‘Why was the majority of the traffic reconstructed from a period when the phenomenon of duplicate OTPs was quickly fading away?’, one might ask.

Overall this is a very parochial account, and designed not to give much away. Yet the Soviet threat was international, and the cross-country connections were profound. The Arlington Hall cryptanalysts were able to take advantage of the Canberra-Moscow traffic, for example, but, presumably out of a perverse notion of pride, the American authors were not able or willing to give full credit.

7) The Venona Story by Robert Benson (1996)

The NSA issued a useful handbook, written by Robert Benson, in 1996. It is available at https://www.nsa.gov/portals/75/documents/about/cryptologic-heritage/historical-figures-publications/publications/coldwar/venona_story.pdf.  As a summary of the project, and a description of its main deliverables, it is an excellent guide. Yet it is a sanitized version, makes no mention (for example) of FBI break-ins, and strongly affirms Benson’s previous message that no use of acquired codebooks was made until the 1950s, with the exploitation of the TICOM material, emphasizing the ‘sweat-and-brow’ nature of the achievements.

8) Breaking the Codes by Desmond Hall and David Horner (1998)

The next volume to appear arrived in 1998, Breaking the Codes, by Desmond Ball and David Horner, subtitled Australia’s KGB Network. It is a solid, resourceful work, but not properly discriminatory in its coverage of VENONA overall, those sections having been undertaken by Desmond Ball. Ball follows closely the sources above, quoting liberally, but he also cites as references Pincher, Wright, Borovik, Modin, West, Bower and Philby, without offering any explanation as to why they should be trusted. On the other hand, he does quote from some exclusive items of correspondence and interviews, such as that of Gardner with I. Livingstone in 1996, and the author with Renée Frank of the NSA a year later. Some of these may offer reliable insights. For instance, the exchange with Frank leads to a claim that “In June 1946, during a visit to GCHQ, Cecil Phillips gave his British counterparts a detailed briefing on the ‘techniques and progress’ of the Venona program”. Yet Ball does not comment on how that intelligence would tend to contradict what Benson claimed in his Introductory History, which Ball uses widely (and occasionally mis-cites).

Ball then moves briskly into the British side of the project, using some familiar sources (e.g. Benson/Warner, Aldrich) and his interviews, but also plucking from the Public Record Office some papers on VENONA from a 1996 release. Unfortunately, these are not identified precisely, and it is difficult to determine from the Discovery function at the National Archives what the correspondences are. Moreover, none of the VENONA files at HW/15 (the critical GCHQ material), or Meredith Gardner’s special reports at HW 15/58, have been digitized. This is a colossal disappointment, and makes it almost impossible for a remote researcher to investigate and verify Ball’s text properly.

The author makes some crisper claims about the level of collaboration. Writing of 1948, he declares:

The skills and techniques developed at Arlington Hall were passed to the British VENONA team, which in turn took over some of the VENONA activities, including further cryptanalytic work on the Moscow-Canberra traffic. A virtually complete set of the 1944-45 codebook and thousands [sic!] of duplicated OTP pages were soon collated.

And that is where his comment about ‘real-time’ appears. That might explain the Americans’ reluctance to say much about that circuit. Between 1948 and 1950 hundreds of KGB cables that had been encoded with the 1944-45 and 1945-48 codebooks * were decrypted by GCHQ and Arlington Hall, he adds, before lamenting the dual exposures that occurred by allowing Philby and Weisband access to what was going on. Philby’s briefing by Oldfield, before he left for Washington, happened after Black Friday, of course, but his knowledge thereafter alerted him to the search for HOMER (Maclean), REST (Fuchs) and eventually STANLEY (himself).

[* This statement implies that new codebooks were issued in 1945: I see no evidence for that assertion anywhere.]

One observation is puzzling. Ball writes that “A wholesale change in Soviet encryption systems was introduced by the KGB’s Central Cryptographic Service in 1950, including new codebooks, OTP books and encipherment practice.” He provides no source for this claim, and it would appear to have been redundant if Black Friday had in fact taken over a year beforehand.: I believe this assertion betrays a common confusion concerning a) the VENONA traffic, and b) internal Soviet police, army, industrial and prison camp systems, which had largely been conducted en clair up till then, and which the Americans had been closely monitoring. His final sentence in this section is to quote Andrew and Gordievsky for claiming that ‘the KGB cipher office responsible for the production and distribution of the duplicated OTP pages was reportedly later shot.’

Of course, the freshest insights come from a chapter dedicated to Soviet espionage in Australia. Ball relies on the details of the Fifth Venona Release, especially Gardner’s report on ‘Covernames in Diplomatic Traffic’, dated August 30, 1947, which appears on page 93 onwards in the Benson/Warner compilation. He makes the point that ‘despite its modest proportions, the Australian Venona operation was very lucrative for both cryptanalytic and counter-espionage points of view’ and gives as a prime example the British War Cabinet documents transmitted verbatim in March-April 1946. That discovery, and the tracing of the originals, allowed Gardner  and his team to recover a large proportion of the four-digit groups in the KI codebook (KI, the Committee of Information, then being the short-lived ‘KGB’ home.) That was something that the NSA has been reluctant to acknowledge.

Using some local evidence from Australia, to a small degree Evdokia Petrov’s testimony from 1954, and then through a broad sweep of the voluminous report identified as ‘Soviet State Security Service Foreign Intelligence Operational Techniques (‘Legal’ residency System)’, 18 May 1955, in CRS A6283/XR1’ in the government archives, Ball was able to provide a comprehensive analysis of the KLOD group working for the KGB. Of course, none of this would have been available if the flawed OTP pads had been replaced a couple of years earlier.

In summary, Ball was resourceful and inquisitive – up to a point. He was more of a chronicler than an investigative, analytical historian.

9) Venona by Nigel West (1999)

I have stated before that I believe Venona is one of Nigel West’s better books. Its main benefit is that it provides a very valuable analysis of traffic between London and Moscow, and it goes a long way in identifying the participants whose coded names appear in the transcripts. It also provides a broader perspective to the USA-dominated canon, recognizing that VENONA had important international aspects. While the author predictably has a British focus, and analyzes very carefully the London-Moscow channels of the GRU and KGB, he beneficially also tackles Australia, and Sweden, and brings more detail to the enticing story of STELLA POLARIS. For instance, he sheds more light on the Petsamo incident:

The four codebooks were a diplomatic codebook designated Kod-26; the NKVD Pobeda (Victory) code; one for use by the GRU; and one for use by the naval GRU. Studied in conjunction with medium-grade military crypto items recovered from the battlefield, which included at least one NKVD Border Guards’ codebook, the material allowed the Finnish analysts to understand how the Soviets adapted military terminology in their systems, built code-tables, and relied on a very straightforward mathematical formula to encode emergency signals.

This is a very challenging claim, since it points to two critical codebooks (GRU and Naval GRU) being part of the Petsamo haul, and it probably exaggerates what the Finns were able to accomplish. The sources of West’s intelligence are not stated.

The above passage, however, illustrates a chief defect of West’s work, namely a customary lack of identified sources – egregious in this case, as West offers only two pages of sketchy and barely relevant Endnotes. Thus one has to tread carefully through his introductory chapter, which is clearly dependent on what several intelligence professionals chose to tell him. Did he trust all he was told? Did they disagree on some points? One cannot tell: unfortunately it reads as if a series of contributors had offered chunks that have not been seamlessly rewoven.

That first chapter, titled ‘Breakthrough’, is remarkable since it constitutes the first attempt to cover the initial processes, and the extended cycle, of decryption, in detail. Yet I write ‘attempts’, since I found the overall story incoherent. (When I first read this book, many years ago, I assumed that my incomprehension was due to my slow-wittedness. I now include that the author is at fault.)  The text reads very glibly, the superficially smooth narrative flow dispensing with clarity and logic as if all were understood and obvious. The author is also lax in giving his readers a precise chronology. For example, West refers to the GCHQ liaison officer, John Tiltman, contributing to the discovery of, and investigation into, duplicate OTPs, probably in 1943, thus bringing forward the timing of GB-USA co-operation. No other source credits Tiltman with this discovery. Yet the primary topic of interest, the method by which the NSA team managed to re-create codebooks, is clumsily handled, and essential processes are finessed. For instance, West, suggesting how a breakthrough occurred, writes that the analysis of more mundane and predictable ‘trade’ messages (which tended to have formulaic preliminaries) led to steady construction of embryonic codebooks. “Hallock and his colleagues made good progress on the trade texts, to the point that they were able to predict opening phrases and acquire tentative codebooks which were stored in the indexed key banks of IBM punchcards”, writes West (p 17). But no date given, no quantification, no examples. It could be an important insight, pointing to how Gardner was able to make such progress on the codebook, but the evidence and explanation are thin.

And how did these discoveries relate to diplomatic and intelligence traffic? Were the same codebooks used? The same mangled OTPs? West is elliptical. He had written (p 14): “Following Hallock’s discovery, a prolonged study of JADE by Cecil Phillips and Genevieve Feinstein revealed an astonishing fact: the JADE material had been enciphered precisely using the same OTPs as the trade traffic.” Yet JADE has never been defined; the discovery is not dated, and he never follows up to explain. Phillips did not join Arlington Hall until June 1943, and then West rambles on to claim, first, that “there were too many sixes’” in the first group of ZDJ [?, but evidently part of the JADE system] messages, and that that phenomenon could not be accidental, and then:

Further analysis by the sector’s lead cryptographer, Genevieve Feinstein, led to a full-scale comparison between the first groups in the JADE traffic and the trade data. They were found to be identical, and when Burton Phillips [any relation?] and Katie McDonald delved further they found several hundred duplicate keys in the New York JADE traffic and the Washington trade messages.

He then writes that ‘it had been believed that JADE and its predecessors, DDE and JDF, were consular in nature ….’ Who believed it? When? What are DDE and JDF? Does this show bluffing, or simple clumsiness? And next: “This mistaken belief led to greater resources being devoted to the Soviet diplomatic system, JDA, but [but?] in 1945 Katie McDonald  . . . . identified the codegroups for months, punctuation and numbers from 1 to 1000.” For which codebook? Again, were there portions shared among the different systems? One cannot tell. According to West, Gardner then apparently concentrated on the Soviet spellcode employed to encipher English words, and was thus able to start creating a Soviet codebook through such analysis. Eventually (no date given), he found a message from New York in the JADE series dated 18 May 1944 which was entirely in English. The text, about Roosevelt’s chances of electoral victory was ‘proof that JADE was diplomatic in nature, and might be broken to reveal evidence of espionage’.

I do not follow the reasoning, or the processes. I do not like this casual impression of expertise that does not submit easily to close analysis. Cautiously, I have to suggest that West did not clearly understand what he was told by his interlocutors (who may have wanted to mislead him, anyway), and that he merely tried to put a smooth spin on a tangled tale. And the chapter continues in its random way, switching back and forth in time, introducing irrelevant information, digressing into too much detail, such as in the description of the retrieval of the Petsamo codebook in Germany by the TICOM expedition, but not explaining probably what its value was, referring briefly to the controversial break-ins by the FBI at the Soviet Consulate in Washington [Or was it in New York? Or were there multiple break-ins?], covering only summarily the implications of the Gouzenko and Petrov defections, and ending up with a summary of the harm that Leo Long, William Weisband and Kim Philby did. It is a muddle. The whole chapter should have been rewritten.

10) Venona: Decoding Soviet Espionage in America by John Earl Haynes & Harvey Klehr (1999)

    ‘VENONA’ by Haynes and Klehr

    This volume is a first-rate guide to the way that the Soviet Union infiltrated US government institutions, delivered by a fierce examination of the transcripts available, and a fortuitous inspection of records of the American Communist Party held by The Russian Centre for the Preservation and Study of Documents of Recent History (known affectionately as RTsKhIDNI) in Moscow before it was closed to foreigners. It offers copious notes, useful Appendices of persons referred to in the texts, and provides an excellent background historical framework.

    The authors offer a smoothly-written Chapter 2 (‘Breaking the Code’) to explain how VENONA messages were cracked. It relies on the traditional sources Benson & Warner (primarily), as well as the customary interviews with cryptanalysts. While more logical in their approach than West, however, Haynes and Klehr similarly finesse the difficult aspects of the investigation. For instance, they have Meredith Gardner being transferred to the project early in 1946, becoming the principal ‘book-breaker’. He also learned Russian that spring. And then the breakthrough work is collapsed into a few terse sentences:

                His linguistic work was helped by the now expanding body of plain code groups (what was left when the overlying one-time pad cipher was removed being extracted from Trade and KGB messages). By about mid-summer 1946, Gardner had recovered enough code groups and text to be sure that the messages involved Soviet espionage. By the end of 1946, he had broken out the text of a message that revealed Soviet spying. Eventually [when?] it would become clear [to whom?] that Gardner had reconstructed the codebook used by the KGB from November 1943 into early 1946. This work allowed [when?] the reading of hundreds of KGB messages from that period and provided some of the most complete text that the Venona Project produced.

    The vagueness of the chronology is frustrating. Again, I do not understand the process. The authors imply that the Trade and Diplomatic variants shared the same codebook, but never actually say so. This is a very important point: while the boilerplate structure of many commercial messages may have allowed gradual creation of a codebook, unless the lexicon of commercial and diplomatic texts greatly overlapped, and the two channels shared a codebook, the exercise would not have helped Gardner much in his book-making endeavours for diplomatic traffic. Probably, a few formulaic passages led to some initial entries in the trade codebook being made. But how did they start rescuing more significant terms for the diplomatic codebook – and all in a matter of months, no less? Yes, ‘eventually’ the codebook would be reconstructed, but the phrase ‘it would become clear that Gardner had reconstructed the codebook’ must be false. He may have reconstructed part of it by the end of 1946: as the authors write, only one incriminating message had been retrieved by then. Haynes and Klehr then inform us that the KGB had used a different codebook for 1942 and for most of 1943, and they admit that NSA analysts made little progress on those messages for several years – until some breakthrough in 1953 by one Samuel Chew.

    The authors then turn to the case of the 1941 charred codebooks retrieved from Petsamo. Their account has it that the Germans obtained the first copy from the Finns, and a US Army team salvaged it in May 1945. “The book assisted Gardner in reconstructing part of the codebook for the earlier years,” they write. But what does this mean? When did the Army hand it over? When did this further reconstruction occur? What ‘earlier years’ are these? Was the 1941 NKVD codebook exactly the same as that used in 1943, or did it simply have some common properties? The authors merely state that the reconstruction was not so complete as it was for the 1943-1946 period, which meant fewer decryptions were accomplished. ‘STELLA POLARIS’ does not appear in their Index.

    They next explain that this codebook was different from the one obtained by the OSS in late 1944, and that it was eventually handed back to the Soviets on the orders of State Secretary Stettinius. For some reason, Haynes and Klehr believe a copy was not made before the return, but they do point out in an Endnote that ‘before the NSA released Venona in 1995 and provided accurate information about the history of the project, one rumor (reported in several books, including one by these authors) erroneously conflated the 1944 OSS Finnish material with that obtained by Army intelligence in 1945.’ (They never mention Tiltman’s experience with the same Petsamo material.)

    And that is all. No mention of Canberra traffic, or cribs. Thus we are left with the paradoxical conclusion that the NSA was able to achieve far more decryption for the years 1943-1946, when they did not have access to a relevant codebook, than for the years 1942-1943, when they did. The authors summarize those facts as follows:

    Venona uncovered, in whole or in part, roughly half (49 percent) of the messages sent in 1944 between the KGB New York Office and its Moscow headquarters, but only 15 percent of the messages from 1943 and a mere 1.8 percent of messages from 1942 (only twenty-three out of nearly thirteen hundred). Only 1.5 percent of the 1945 traffic between the KGB Washington office and Moscow was deciphered.

    I believe these statistics cry out for some explanation. If the flawed OTPs were distributed in 1942, why was the success rate for 1943 so much lower than for 1944? Was the fall-off for the whole of 1945 due exclusively to new OTPs being distributed? When did the latter come into use? The process by which those valuable codegroups for the 1943-1946 traffic were resolved is left opaque. The authors’ focus is, admittedly, America, but it would have been useful for them to present the corresponding figures for other countries.

    11) The Haunted Wood by Allen Weinstein & Alexander Vassiliev (1999)

      Ther authors were able to exploit the thaw in relations between the United States and the Russian Federation to inspect, between 1994 and 1946, the archival records of the Foreign Intelligence Service (the SVR). Payments were made. While the book provides a rich confirmation of Soviet espionage from the Moscow side, one of its main contributions is to identify a memorandum describing Weisband’s work, and how the information he provided led the USSR’s ‘state security organs’ to carry out a number of defensive measures that frustrated the Americans’ ability to decipher and analyze its secret messages. The memorandum is not dated, but probably was written around August 1948.

      12) The Venona Secrets: The Definitive Exposé of Soviet Espionage in America by Herbert Romerstein and Eric Breindel (2000)

        This book has nothing to say about the mechanisms of decryption. It is a guide to the historical background, and an analysis of the spy-rings.

        13)  GCHQ by Richard Aldrich (2010)

          Aldrich dedicates his Chapter 4 to Venona. He relates the familiar background narrative in an engaging way, but has Gardner joining the project in 1944 – two years earlier than as advertised by Haynes and Klehr. Phillips joined him on Soviet traffic in May 1944, where he ‘quickly realised the scale of duplication, and made a number of progressions that led to wider breaks in the cypher system used by the KGB’. No useful insights there. The December 1946 message listing scientists on the Manhattan Project is featured. And then Aldrich turns mysterious: “Early accounts of Venona suggested that the first breaks were achieved as a result of the recovery of a partly burned Soviet codebook found in Finland and sold to America’s wartime intelligence agency. Stories have long circulated about how American diplomats insisted that protocol required that it be returned to the Soviets.”

          This is typical Aldrichian elision, and is not good historiography, with a surplus of rumours. What are those ‘early accounts’? He does not say: no Endnote explains. He provides no dating for the codebook ‘found in Finland’ (or discovered in Germany). ‘Stories have circulated’ – where? How does Aldrich treat them? It appears to be of no importance to him. He continues: “In fact, up until 1952, the progress made on Venona was probably driven by the pure sweat of mathematics, and represented a remarkable intellectual achievement.” Probably? No use of computers, or cribs? Where did those ‘early accounts’ come from, then, and since it would appear to offer a useful explanation as to how progress had been made so well? Without offering any evidence to the contrary, Aldrich just abandons those early stories. Yet he then introduces the second charred codebook, retrieved by TICOM, informing us that it was only in 1953 that the link was made between the KGB system they were working on and the codebook they had owned since 1945. It beggars belief. All these smart people, and they could not work out what was under their eyes? Aldrich offers no judgment.

          Aldrich reinforces the notion of earlier GB/USA co-operation, claiming that Britain learned of the project as early as August 1945, and that John Tiltman, head of the Cryptographic Group at Eastcote was kept informed of progress. Full cooperation came a little later, when Phillips spent six months at Eastcote, working with Philip Howse. Aldrich comes up with the useful insight that the recognition that the Australian traffic was KGB, rather than low-level consular material, did not occur until December 1947, following a visit from Gardner. He then moves on to Weisband’s role, attributing to him (quoting The Haunted Wood) the revelation that the Soviets changed all their systems on the ‘Black Friday’ of October 29, 1948. Not only were new security procedures implemented for the KGB; medium-grade communications between Army, Navy, Air Force and Police units were encrypted for the first time. But those systems were not VENONA.

          The author has more to say about the ramifications, especially for Australia, but the above is all he writes about decryption itself.

          14) Code Warriors by Stephen Budiansky (2016)

            ‘Code Warriors’ by Stephen Budiansky

            Budiansky, who is an expert in cryptology, dedicates two chapters of his book to what he calls ‘the Russia problem’. As a sample of how comfortable he is in describing precisely some of the technical processes, I present the following:

                        By October 1943 Arlington Hall had up and running a semi-automated decryption processing line for Japanese army traffic that punched incoming teleprinter messages onto paper tape, converted the paper tape to IBM cards, matched the resulting decks of punch cards with other sets of cards pinched with the corresponding sequence of cipher key, subtracted one from the other to reveal the underlying codegroups and punched those on a third set of cards, and then used a library of cards containing codegroups whose dictionary meanings had been recovered to print out the complete decoded message.

            The first conclusion from this assessment is that a sophisticated electromechanical system was at work, building on the experiences with bombes at Bletchley Park and in Washington. It was not all ‘intellectual sweat’. A system was in place to prepare for VENONA traffic.

            The author points to early cooperation with the British. William F. Friedman had recommended as early as July 29, 1943, that they be given the Soviet diplomatic traffic to handle, and a Captain Stevens, the British liaison officer at Arlington, had the previous year picked up hints that the Americans were keen to re-address the Russian problem. Budiansky points out that the Finns had made progress on Soviet OTP diplomatic ciphers, and that they were sharing these results with the Japanese. ‘A series of lengthy cables offered a wealth of basic technical details about the Russian systems’, he writes (perhaps not the most precise sentence in his book – no doubt Helsinki-Tokyo traffic was being intercepted, but it would have been useful to provide deeper information on what such messages revealed.) An important technique learned was the method by which encipherers informed their counterparts which OTP page they were using for a transmission. Rather clumsily, the ‘indicator group’ was taken from the first set of numbers of the deployed OTP: that helped Arlington Hall considerably after they discovered the duplicated pads.

            He also reveals that a direct radio teleprinter link was established between the Pentagon and Moscow, in order to improve quality transmission over the flimsier radio link that the cable companies operated across the North Pole. The Russians were not aware that the set-up allowed a teleprinter at Arlington to copy the Soviet traffic automatically. “For several years it would prove the most important source of enciphered Russian traffic available to the American codebreakers”, he writes. Regrettably he does not explain why that was so.

            Budiansky then explains how the inspection of the Japanese messages helped Arlington to deconstruct the codes. It led them to confirm the two-step process of a codebook that held values that were normally four digits long. “To each of the code groups in a message to be transmitted, a second set of digits, drawn in sequence from a book or pad [sic!] containing random numerical groups of ‘additive’ (or ‘additive key’) was then added,”, he writes. Yet even Budiansky, whose prose is normally crisp and clear, does not explicitly unravel in one place the mysteries behind the various systems, and how they were simplified by the Arlington cryptanalysts.

            I noted above the casual reference to a ‘book or pad’, which I believe is an important factor. One traditional method of performing encoding was for the transmitter and the receiver both to own an obscure book, the pages of which could be used to identify keywords to enable encipherment. (Foote used such a system in Switzerland, and the KGB/GRU used such a system as back-up, as Gouzenko revealed.) This was a low-maintenance system, as it required no updating or distribution of fresh materials. Yet it had exposures, as identical ‘additive key’ might well be used by chance in different encryption exercises, and the identity of the book might be betrayed somehow. Using a One-Time-Pad was a much tighter concept: indeed, when OTPs are used correctly, they are practically impossible to break. On the other hand, they require constant maintenance and refreshment. Proper random-number generation exercises have to be carried out. The Soviets were not alone. Randy Rezabek, exploiting TICOM archives, states that the US Army Signal Intelligence Service was able to exploit the Germans’ failure with OTPs when they used a machine that created repeating patterns after a long series. Then the pads have to be printed, bound, and distributed, a strenuous project, especially in time of war. The Soviet Union was very constrained in enabling ships to depart from Murmansk in 1942 and 1943 with that precious cargo. And that is where the KGB fell down.

            Another critical aspect is the shape of the codebook. I referred earlier to the paradox that Arlington Hall was able to make better progress on the 1943-45 traffic, when they had no codebook support, than it was ever able to on the 1939-43 transmissions, when they (eventually) did. In Appendix A, Budiansky explains that codebooks came in one of two forms – a one-part code, and a two-part code. This is a very important point. The first was simpler, allowing encipherer and decipherer to use the same document, which would consist of a list of words and their equivalent numerical values. Thus it might appear as follows:

            A                     0001

            Aardvark         0002

            Abacus            0003, etc.

            In other words, no randomization, with both lists sorted, and an easy look-up process at both ends. On the other hand, a two-part code would be more complicated, and look something like this:

            A                     5487

            Aardvark         1946

            Abacus            3305, etc., etc.

            with the corollary (say)

            0001                Embassy

            0002                Meeting

            0003                Tomorrow, etc., etc.

            Such a system requires two books to be created, so that the decipherer can look up from a less significant string of numbers what the term behind it is. Again, more work has to be done when creating a new codebook. But the vital aspect for the cryptanalyst was that, with a knowledge of the Russian source language, and using imagination over the context of the messages, it was easier for a book breaker to fill in missing entries in a one-part code, since they appeared in alphabetical order. The POBEDA codebook was much more intractable.

            As Budiansky informs us:

            The Jade codebook used with the 1944 and 1945 NKGB one-time-pad messages (also known as Code 2A by Arlington Hall) was a one-part code, and was recovered entirely through Meredith Gardner’s book breaking without ever seeing the original. Code 1B, the NKGB codebook that the Russians called Kod Pobeda and which was used from 1939 to November 1943, was a two-part code, and the recovery of a copy of most of the original book by TICOM Team 3 played a significant part in the effort at NSA beginning in the mid-1950s to break most of the 1943 messages.

            From this I deduce first, that the charred 1941 codebook retrieved was indeed valid for the whole period of the war up until 1943, when the new codebook was introduced. Under pressure, the Soviets introduced this weaker new codebook at a time when security should have been tightened – perhaps a counterintuitive measure when one considers how technology is supposed to improve with the next release. It perhaps serves to support Cecil Phillip’s renowned statement that the breakthrough of 1943 to 1946 was ‘a purely analytical accomplishment, achieved without the benefit of either Soviet codebooks or plaintext copies of original messages’. And Budiansky sheds much light on how that breakthrough was achieved. His reference to ‘1B’ suggests that an initial ‘1A’ system must have been deployed beforehand – presumably before 1939 – but he frustratingly writes nothing about it.

            Another conclusion that I think is implicitly rather than explicitly made is that the trade and diplomatic traffic shared both codebooks and OTPs, and that it was a critical factor in allowing Gardner to transfer knowledge gained from the inspection of more formulaic trade messages to the study of the diplomatic and intelligence messages, which had fewer standardized pointers. (Recall my sceptical comments above.) Arlington Hall also learned much from Gouzenko after his defection in September 1945. Unfortunately, Gouzenko had handled only GRU traffic, which used a different codebook from the ZET trade and ZDJ diplomatic systems, but, as Budiansky writes, ‘some of the details he was able to supply about the construction of the GRU codebook probably applied to those other systems as well’. Gouzenko told his inquisitors about the one-part code that the GRU used (thus confirming what West wrote), as well as the system used to translate non-Russian vocabulary by means of a special code group that would indicate a ‘begin spell’ routine. The repetition of such a stream was, in itself, another important aid.

            And that is how such rapid strides were able to be made by Gardner in 1946, all provoked by the chance discovery by Richard Hallock in 1943 that some OTP pages had been duplicated. There is more that could be said about the techniques used in establishing the existence of repetitions (‘depths’), and I recommend readers to go back to Code Warriors if they are interested in learning more. Budiansky’s book overall performs well the job that all previous attempts to explain VENONA have failed to do.

            15) Spying Through a Glass Darkly: American Espionage against the Soviet Union, 1945-1946 by David Alvarez and Eduard Mark (2016)

              I acquired this book because I imagined that the two serious historians might have been able to exploit recently released archival material to clarify the story. In Chapter 2 (‘A Mystery in an Enigma’) they carry out a careful inspection of the VENONA events, but it turns out that they rely almost exclusively on the familiar sources, namely Benson and Phillips, Aid (see below), Smith, Aldrich, Andrew (with Mitrokhin or Gordievsky), sprinkled with some correspondence between government officials that adds little to the grand picture. Indeed, the authors lament, several times, the fact that crucial records have not been released. As an example:

              Much about the STELLA POLARIS affair remains obscure, including the exact contents of the purchase, their distribution within the American intelligence community, and their contribution to developing an intelligence picture of the Soviet Union in 1945.

              Indeed. And maybe deliberately so.

              While Alvarez and Mark give a thorough account of the hesitations and deceptions that were embodied in the negotiations between OSS, the Finns, and the State Department, they appear somewhat confused over the contents and disposition of the STELLA POLARIS material. They report that the NSA’s records contain ‘a long list of Soviet codes, ciphers, and other cryptographic materials under the heading “STELLA POLARIS/Source 267”’, but they add that it may well represent copies of the OSS collection, even though the official historians denied receiving anything from the OSS. Yet they then explain that ‘Source 267’was in fact GCHQ, handing over in the spring of 1946 all that it had acquired from the Finns. They also note that the OSS station in Stockholm did indeed copy the materials before sending them to Washington. Their conclusion at this juncture, however, runs as follows: “If, as seems almost certain, Arlington Hall did not receive the STELLA POLARIS records until after the war, the acquisition would have largely duplicated material already in the code breakers’ hands”.

              I do not know what to make of this. The authors cannot be referring to Source 267, whose transfer occurred in 1946. It looks as if they are referring to the TICOM acquisition, since the raids of May and June 1945 just slipped in before the end of the war (although Victory in Europe had already been declared), and they cite Benson and Warner for asserting that the TICOM acquisition made the following STELLA POLARIS trove superfluous. Yet Benson himself stated that the TICOM material was not able to be exploited until the early 1950s. Alvarez and Mark again express their frustration, writing that ‘the continued classification of postwar American and British communications intelligence records makes it difficult to determine the impact of the foreign materials after the war’. Yet, while they provide a deep analysis of how the TICOM exercise helped with the decryption of Soviet domestic traffic (i.e. non-VENONA, such as in Operation CAVIAR), they never even register that the information on diplomatic codes was not exploited until the early 1950s. Thus they never pose the question: “Why, if the diplomatic codes were part of the package, and were of use in 1953, were they not taken advantage of in 1946?” It is all very bizarre.

              16) Agent Link: The Spy Erased From History, by Raymond J. Batvinis (2024)

                ‘Agent LINK’ (Weisband) by Raymond Batvinis

                This profile by Batvinis (a retired FBI agent, and notorious chairman of the FBI’s inquisition into Hollis as Soviet spy) is a discursive work that recapitulates stories of Soviet espionage that go far beyond Weisband himself. It contains some useful insights, but also much vague description that could surely have been tightened up by now. References to VENONA are scattered round the central chapters of the book, but they are frequently annoyingly imprecise. Moreover, his publication contains no Index, which is unpardonable, in my opinion.

                For example, he has a couple of pages on the STELLA POLARIS incident, but never describes whereof the purchased consignment of material consisted. He beguilingly reports an ‘unprecedented level of collaboration underway with Bletchley Park’ as early as 1943, but he does not spell out why he contradicts the official accounts. And then an important, but unsourced, observation appears, namely that the Japanese had picked clues from the externals of Soviet traffic: “The Russians used the first and second digit of the first cipher group of the text in a message to signal the length of the message while the fourth and fifth digit [sic] identified the specific additive page used to encrypt the message.” He adds some useful facts about the explosive growth of IBM equipment, including custom-built machinery, between 1943 and 1945. He rewrites extracts from Benson’s dossier of memoranda in a more natural English way (and, along the way, introduces new personalities, such as Genevieve Grotjan (presumably née Feinstein), although his references to page numbers of Benson’s work do not correspond to the published version.

                Batvinis spends several paragraphs on the TICOM windfall of the summer of 1945, but he never compares the source material to the STELLA POLARIS trove. He writes:

                What Allied troops found was the complete German foreign Ministry Service Signals Archive, which included a number of Russian codes and ciphers. There were important records that Russian consulate officials in Helsinki hastily attempted to burn as they were fleeing when the Finnish government sided with the Axis in 1941. The collection, turned over to the Germans, also produced a KGB codebook called Kod Pobeda, a one-time pad series scheduled for use between 1939 and 1943, replaced when a new system called JADE was introduced.

                This is just sloppy: ‘Kod Pobeda’ was a codebook, not ‘a one-time pad series’. Moreover, who turned it over to the Germans? When? And why Helsinki, not Petsamo? Was this material equivalent to the Hallamaa set? And ‘scheduled’ for use between 1939 and 1943? Why would an end-point have been decided in advance? One expects greater precision from a professional historian. He does, however, add some useful details about intelligence gained from interrogating German POWs.

                Oral histories are part of Batvinis’s sources. I had not noticed these being used much beforehand, but he provides some extracts from Frank Rowlett’s oral history (see https://www.governmentattic.org/50docs/NSA2ohiFrank_Rowlett1983_1985.pdf for the probable source). Rowlett was the post-war head of ASA’s Operations Division, and had been the lead officer who interrogated Gouzenko. Yet Batvinis’s choices are enigmatic: I sense that the following, said to describe the code clerk’s method of working (derived from Gouzenko) is important, but cannot work out exactly what it means:

                By examining the “external characteristics”, a trained eye could discern clue such as intentional scratching out of an indicator and replacing it with something else. Careful attention to columns of numbers and letters for even tiny alterations could signal important leads into the actual length of the column, or, more critically the length of the key, both of which would have significant implications for a code breaker’s chance of success. It would pay off handsomely, not at the time, but in the not-too-distant future.

                How these conclusions could be reached through the analysis of encoded messages is beyond me.

                Batvinis’s description of how Gardner made his breakthrough with the codebook in 1946 is not convincing. Using what Gardner later told an interviewer (but again unsourced), Batvinis reports that Gardner, having identified prepositions and conjunctions, was able through ‘basic instinct and informed guesses’ to determine what word would logically follow a certain word, and thereby slowly began building a vocabulary of Russian nouns and verbs. This is far too much of a leap in imagination for me to swallow. He then mentions Lamphere’s introduction to Gardner, and how the FBI agent was fortuitously able, in the autumn of 1947 [sic: not 1948], to have his FBI colleagues send stacks of the plaintext messages that had been photographed by the FBI in 1944 during a break-in of Amtorg. He takes this story directly from Lamphere.

                Lastly, I believe that Batvinis, as do others, mixes up the demise of VENONA with the Black Friday events. The Soviet systems that were suddenly made more secure and impenetrable were not VENONA, and were known by such names as Operation Taber and Operation Shamrock. Weisband had not passed on much of significance on VENONA but he had indeed been the source of intelligence to Moscow that the Americans were tracking and interpreting its domestic communications systems. The fact is that the new OTPs had already closed off all diplomatic traffic (with the exception of Australia) from Western eyes, and Australia was the last outlier to fall in August 1948.

                • Academic articles:

                A sprinkling of articles published between 1997 and 2002 provides a mixture of revelations – as much because of what they fail to say, as to what new insights they bring.

                1. ‘Venona and beyond: Thoughts on work undone’ by Michael Warner and Robert Louis Benson (Intelligence and National Security, Volume 12, Number 3, July 1997)

                This is a somewhat supererogatory offering by the authors of Book 5, above (with the names of the authors transposed). At the time of publication, Warner was Acting Chief of the CIA History Staff, while Benson merely ‘served with the Office of Security of the National Security Agency’. The article brings very little new to the table, but it does pose a lot of unanswered questions. Indeed, the point of it seems to be to urge researchers to apply close scrutiny to the many loose ends uncovered. In particular, they mention the desire to have the identities of far more covernames revealed. They also express bewilderment over the errors made by the Soviet cryptologists, but conclude their rhetoric merely by saying that ‘the answers presumably reside somewhere in the former Soviet Union’, an assertion at which anyone familiar with the events could have arrived.

                One fresh observation they make is to praise Lamphere’s book on the FBI response, without commenting on the more controversial of that author’s claims. They speculate whether Elizabeth Bentley’s revelations to the FBI in 1946 did more damage to Soviet counter-intelligence than did VENONA. Rather disturbingly, they attempt to debunk the theory that the acquisition of a KGB  codebook ‘captured in Finland and purchased in 1944 by the OSS’ has any merit, claiming (again) that the cryptanalytic breakthrough predated that acquisition (and thus implicitly rejecting what Lamphere and others wrote). Here they hedge a little: “General William J. Donovan surely [sic] copied the material of 1,500 pages before ‘returning’ them to Andrey Gromyko”. (The material was never ‘owned’ by the Soviet Union in that form.) They express ignorance as to what happened with those records thereafter. “It is entirely possible that the 1,500 pages that OSS reputedly gave American cryptanalysts contained significant information about Soviet codes and ciphers, but information that was not useful with the particular systems read by the Venona program”, they write. Yet they refer to a 1946 document recently released by the NSA that does claim that among the material handed over by the Finns was a four-digit system used by the NKVD between 1941 and 1943? Could it be the POBEDA codebook familiar to the Venona cryptologists? One might expect the pair to answer this question, but they leave it hanging there.

                They conclude by raising a number of historical questions concerning Stalin’s intentions and abilities if no successful decryption had taken place, and spies had not been unmasked. All very well, but hardly valuable fodder. “  . . . serious research with the Venona translations may take a generation to produce its deepest and most lasting insights”, they write. Yet, in truth, almost thirty years later, very little new has evolved – apart from those brief insights from the Soviet archives, which mainly served to confirm what figures like Klehr, Haynes and Weinstein had derived from their studies.

                • ‘Debris from Stella Polaris: A footnote to the CIA-NSA account of Venona’ by C. G. McKay (Intelligence and National Security, Volume 14, Number 2, Summer 1999)

                Two years later, C. G. McKay responded to the above article in a short piece. McKay is not described, but I know him as joint author of a work on Swedish Signals Intelligence, and he published a perceptive essay titled British Sigint and the Bear in 1997. His intention was to show how the recent declassification of some papers held by the NSA shed light on the STELLA  POLARIS operation. He highlights Major Hallamaa’s ingenuity in succeeding in selling his trove to the Japanese, the Americans, the British, and, later, the French. He refers to the material sold to the French (which he calls Document F) as that which Benson and Warner described, but he categorizes as the ‘star of the show’ a series of progress reports from Finnish Radio Intelligence dealing with several Soviet Union and NKVD codes (Document G). He claims that the original G was a part of the STELLA POLARIS archive – unlike F – but he puzzles over the relationship between G and the Finnish original, and when it came in the hands of the Americans. He wonders whether G was acquired in another later transaction, i.e. not the one where Stettinius intervened. For some reason, McKay seems to think that that distinction is very important, but I admit I failed to understand the significance.

                • From Petsamo to Venona Intelligence: Services in the Nordic Countries from Hot War to Cold War’ by Tore Pryser (Scandinavian Journal of History, Volume 24 (1), 1999)

                Pryser, having access to insider information, makes some startling statements. The three assailants at the Petsamo consulate, were in fact Norwegians working for the Abwehr, and were on a mission to retrieve Abwehr [sic] archival material stored there. (That enigma is not explored.) Thus the codebook they discovered, which the Soviets did not have time to burn, was immediately available to the Abwehr unit on the north front, and it used that codebook to crack Soviet messages. What is even more extraordinary, according to Pryser, is that Edmund Sala, who led the Abwehr unit, in 1944 retreated to Lillehammer and then traded with Swedish intelligence, the C- Bureau, giving them what he had obtained at Petsamo. The Swedes then added it to what Finnish intelligence had gathered to create the STELLA POLARIS material, and then horse-traded with the Germans behind the backs of the Norwegians and the British. The result of this was that German specialists on the Soviet Union were transferred to the OSS in Frankfurt. Of course, this account explains much more clearly how the Germans knew about the Soviet codes, and Pryser’s Footnotes indicate that Sala must have passed them on to Berlin, but it is a remarkably different tale, with its emphasis on the Swedes initiating the transactions, from the conventional one that highlights the achievements of the Finns.

                Pryser cites Pavel Sudoplatov (author of Special Tasks, the name of the unit the KGB officer headed during the war) as saying that the codebook was subsequently changed, writing: “He therefore claimed many years later that it would have been virtually impossible for the FBI to infiltrate the Soviet agent network in the United States with the aid of the codebook found in Petsamo.” Yet Pryser attempts to disprove that statement, writing that ‘the NSA confirmed that the Petsamo material was decisive for being able to decipher the coded telegrams sent to Soviet GRU and NKVD agents in the USA in the years 1943–1945.’ Nowhere does NSA state that: quite the contrary, in fact, since they dismiss the whole STELLA POLARIS trove as inconsequential in their efforts. Pryser misses the subtlety in the careful NSA statement: the NSA wanted to credit the TICOM expedition, rather than the OSS operation, for bringing in the Petsamo trove. In fact, Pryser cites Peter Wright in Spycatcher for this insight that the find had ’enormous significance’ for the identification of Soviet agents: while Wright referred to a codebook retrieved on the battlefield (a clear pointer to Tiltman’s loot), Pryser, who knew nothing about Tiltman, assumes that the battlefield codebook and the Petsamo codebook must be the same entity.

                Incidentally, I do not know why Pryser inserted ‘many years later’ into his text. Page 218 of Special Tasks lays out all of Sudoplatov’s thoughts on the matter, including his disbelief that codebreaking played any role in the unmasking of spies! Pryser does also remind his readers that the 1993 book, Deadly Illusions, by John Costello and Oleg Tsarev, disclosed that Arvid Harnack (CORSICAN) alerted his Moscow bosses that the codebooks had fallen into enemy hands, and he quotes a message from Anatoly Gurevich (KENT), received by the GRU in November 1941 that included the sentence: “The Germans possess the USSR’s diplomatic cypher, which was captured in Petsamo, however, the cypher has reportedly not yet yielded to the extent that there is an opportunity to decypher any large volume of Soviet documents.” Yet, if some messages had been deciphered, that should have caused a large dent in Sudoplatov’s confidence.

                • ‘Tore Pryser’s Article ‘From Petsamo to Venona’ by Olav Riste (Scandinavian Journal of History, Volume 24 (3-4), 1999)

                Olav Riste, in a short follow-up the same year, argues that Pryser overstates the importance of the Petsamo codebook to VENONA. He merely echoes the NSA official story, however, namely that Arlington Hall’s 1944-1946 achievement was a purely analytic accomplishment, and that the Petsamo codebook, although it came into American hands in 1945, was applied to the project not until 1953, after the VENONA project had unmasked so many atomic spies. Riste never mentions TICOM, or the extraordinary conundrum of the Americans’ sitting on such valuable material for eight years. Instead he points to the Soviets’ dilatoriness in not replacing the codebook until 1943, even though, in his short article, he had beforehand explained that access to a codebook would solve nothing if the OTPs were used properly. He does not seem to be aware of the duplicated pages problem the Soviets had. In other words, Riste merely stirs the soup. I do not know whether any correspondence was exchanged afterwards, but both Pryser and Riste were obviously much confused.

                • ‘“Venona” – what we really knew during the cold war’ by Nigel West (The RUSI Journal, 146:1, 2000)

                This article is based on a presentation that West made at RUSI (The Royal United Services Institute) in 2000. Again, it presents very little new information. Who ‘we’ were is not stated, nor is the precise time to which West is referring: the paper seems more designed to promote his book. What he does divulge is that MI5 required him never to mention VENONA, to which he replied that a retired officer ‘living in Tasmania’ would soon be writing a book about it. His interlocutor assured him that Peter Wright would be doing no such thing, and he then ordered West to remove Wright’s name from his book as well. So it is evident where much of West’s material came from. And that is why he had to refer to VENONA as ‘U Traffic’.

                There is little new in what follows. West does dedicate a long passage covering the Australian angle, and how the ‘contemporaneous’ decryption of the Canberra to Moscow traffic enabled ‘huge’ counter-intelligence operations disclosing the existence of ‘a gigantic Soviet espionage network’ in Australia. He misrepresents the failure of the cover story, however, claiming that the Australians accepted it, and that they did not discover until years later that the source was SIGINT. He does have some useful input on how VENONA was circulated, and how the decrypted texts gradually improved, and reminds us again that that process has made it impossible for historians to track the process of decryption of individual cables. He expresses surprise that the United States lost interest in the project in the 1950s, and states that it was British tenacity that pursued it, resulting in their successful decryption of some London to Moscow GRU traffic in the 1960s. He provides some evidence of his sleuthing to pin down the identities of INTELLIGENTSIA (J. B. S. Haldane) and NOBILITY (Ivor Montagu), but those disclosures had already appeared in his book. He draws attention to the fact that Mitrokhin identified TINA as Melita Norwood, and, like Warner and Benson, implores his audience to study the VENONA traffic in more depth to uncover further spy names.

                • ‘“Stella Polaris” and the secret code battle in postwar Europe’ by Mathew Aid, Intelligence and National Security, Volume 17, Number 3, Autumn 2002

                This is a seventy-page article (including 327 Endnotes) that explores in depth the STELLA POLARIS events. Aid (who died in 2018) was an American military historian. It consists of a comprehensive analysis of the September 1944 retreat into Sweden of the Finnish Intelligence Group, including, most importantly, Major Hallamaa and his Sigint Section, the operation known as STELLA POLARIS. I shall not attempt to summarize the whole story, but I do remark that the entrepreneurial Hallamaa succeeded in causing some havoc among several foreign intelligence organizations.

                The story does not start auspiciously. Aid echoes the anecdote whereby Roosevelt forbad OSS’s Donovan from retaining ‘Russian code materials’ obtained from the Finns [sic, not ‘Swedes’], and required him to return them to the Soviet Embassy. Again, I point out that these were not all native Soviet documents that inadvertently ended up with the Americans. They were a complex set of materials derived from multiple sources: they would have been a massive eye-opener for Moscow. Aid then continues with the arresting claim: “The documents [declassified materials from the post-war Strategic Services Unit, or SSU, the intelligence section peeled off from the OSS in September 1945 before the CIA was created] reveal that throughout World War II, the OSS secretly obtained volumes of sensitive intelligence information concerning America’s wartime ally, the Soviet Union, from agents within the Finnish intelligence service.” This comment is, again, troublesome. World War II started in September 1939. The USA entered the war in November 1941. The OSS was not created until June 13, 1942. A strong assertion is weakened by a sloppy rendering of the chronological framework. This error is repeated twice later, where Aid claims that the OSS had been spying on the Soviet Union throughout the war. Aid also explains that most of the intelligence that the OSS gained came from Swedish sources, not Finnish ones – at least until early August 1944, when Hallamaa made overtures to Tikander.

                Reino Hallamaa

                When Hallamaa, soon after his arrival in Sweden, began seeking purchasers for the trove of intelligence material he had brought with him, the OSS’s 75-man station in Stockholm, led by Wilho ‘Ty’ Tikander, was a prime target. He also pointed out that the Finns had been decrypting US State Department traffic, and he then explained that most of their effort had been directed on Soviet codes, ‘of which he claimed they had broken over a thousand’. He showed the OSS some specimens. (This traffic obviously went beyond diplomatic cables, and covered much internal army, police, and other activity within the Soviet Union.) The OSS was keen to acquire the material, but the State Department got wind of it, and protested. Yet much of the intelligence reached Roosevelt’s eyes before the deal was abandoned.

                What the OSS did not know was that Hallamaa was selling the same material to the Swedes and the Japanese, i.e. not just to neutrals but to enemies of the Allies. (Finland was technically an enemy country under control of the Nazis, but also mostly fearful of Soviet repercussions in the wake of the Finnish-Soviet war of 1940.) And the Japanese of course informed the Germans. What the OSS had not done was to demand an exclusive purchase – which would have come at a higher price, no doubt. Moreover, when, on December 11, 1944, Donovan defied the State Department edict, and authorized Wikander to purchase the Russian cryptographic material, a remarkable action took place. The local OSS office photostated the material before sending it on to Washington. Thus, irrespective of whether Donovan in Washington photocopied it before handing it over to Gromyko, the Americans retained it. (Aid also writes that ‘SSA officials reportedly photocopied all 1,500 pages of the code materials’, citing a presentation made by Donovan’s executive officer, Edwin Putzell, in 2002), I do not believe this claim about OSS Stockholm’s initiative has been made elsewhere.

                A glimpse of what the package contained was gained from interception of wireless traffic from the Japanese military attaché in Stockholm, the notorious General Onodera (who gave many secrets away). Aid reports that the five codes given to the Japanese were ‘a five digit military codebook called 091-A; a five-digit NKVD codebook that was still in use as of November 1944; a four-digit military codebook used by Russian tank units on the Leningrad Front opposite Finland; and a four-digit military codebook used by Russian anti-aircraft units on the Leningrad Front.” This statement is troublesome, however. Aid refers to a ‘five-digit codebook that was still in use in November 1944’, presumably suggesting that the POBEDA book (the victim of Petsamo) endured until then. Yet all other sources indicate that POBEDA was replaced by JADE  in 1943. It seems more probable that Aid accurately identified the proprietorship of the codebook, but was mistaken about its withdrawal.

                There is other evidence to support that hypothesis. In Special Tasks Pavel Sudoplatov wrote:

                I do not think that American codebreakers played the decisive role in unmasking our espionage effort. In December 1941, our agent Senior Warrant Officer in Berlin reported that the Germans had seized our codebook in Petsamo, Norway, and were trying to decipher our cables. Naturally, we changed our codebooks. By the time the Petsamo book had fallen into American hands we had stopped using it entirely.

                Thus one might conclude from Aid’s analysis that the cryptologists at Arlington Park did indeed obtain the full [POBEDA] codebook, soon after the STELLA POLARIS acquisition, but that it was of use to them only when its deployment overlapped with the introduction of the duplicate OTPs. While the Soviets had known of the codebook exposure back in 1941 (and then taken a while to remedy the problem), they would in 1945 have received confirmation that the POBEDA codebook had been revealed, but, more seriously, concluded that all their domestic systems were in a dire shape, as far as security was concerned. That may have been the prompt to set ‘Black Friday’ in motion.

                There is obviously much more to tell, and I recommend that avid students locate Aid’s article, to learn more about the deceptions and plotting going on behind the scenes, including episodes involving the abscondment of the Hallamaa tribe to France and, inevitably, Wilfred Dunderdale of MI6. I note, in conclusion, some sentences that Aid writes about the British access to the STELLA POLARIS material:

                What MI6 did get was full and complete [??] access to the ‘Stella Polaris’ archives and the intelligence reports generated by the ‘Stella Polaris’ team in Paris. When the ‘Stella Polaris’ microfilm files were removed to London later in 1946, GCHQ took custody of the ‘Stella Polaris’ cryptographic materials. GCHQ, in turn, passed a copy of the Russian codebooks and related materials that it got from the Finns to the Army Security Agency at Arlington Hall Station in Virginia in the spring of 1946, apparently without knowledge of the SSU. The British referred to the material obtained from the Finns by the designator Source 267.

                So, even if the ASA did not get the materials from the OSS, they got them from GCHQ.

                • Intermediate Summary

                Despite the overwhelming fog, some framework of a story has gradually evolved. Yet it is remarkable how smoothly the more official histories have simply ignored the earlier anecdotal accounts, with their suggestions of assistance from acquired codebooks. One might expect a more coherent story gradually to be built up over time, but the NSA/CIA volumes have not been updated, and the later publications fail to address the obvious paradoxes in the literature. I present a temporary précis of the less controversial aspects:

                The Japanese traffic was highly useful in providing hints to message indicators. The serendipity discovery of duplicate OTPs in 1944 was the first major breakthrough. Trade and diplomatic traffic shared the same codebook, as well as faulty OTPs. Formulaic trade messages assisted in the process of building an embryonic codebook, and Gouzenko’s insights helped Arlington Hall understand the generic structure of codebooks and the use of ‘begin-spell’ techniques. Gardner’s knowledge of Russian sped up the process of filling out the codebook. The 1943-1946 traffic was easier to decrypt because it used a one-part codebook, introduced in 1943 after the Soviets learned in late 1941 that the POBEDA codebook had been compromised. Cribs dramatically improved the process during 1946-1948. Earlier traffic could not be addressed so well until the codebook acquired from the Finns/Germans in the TICOM operation was exploited – surprisingly late – in 1952. Most traffic after 1945 was undecipherable, with the Canberra-Moscow/Moscow-Canberra channels becoming a hold-out until the summer of 1948.

                One could also lay out five phases of Codebook/OTP coexistence, according to my modification to the method by which Budiansky delineated them. (He does not register my 1C phase):

                1A: Pre-1939 (not described)

                1B: 1939-1942 ‘POBEDA’ two-part codebook and proper OTPs

                1C: May 1942-November 1943 ‘POBEDA’ codebook, and introduction of duplicate OTPs

                2A: November 1943-1945 ‘JADE’ codebook and some duplicated OTPs

                2B: 1945-1948 ‘JADE’ codebook (probably), and new OTPs (except for Australia)

                One has to map onto these the probable timing of the Soviets’ reactions to evidence or rumour that their systems were under stress, namely the 1943 story that a copy of the POBEDA codebook had been obtained, the intelligence gleaned from Currie, Philby and Weisband about progress in decryption, the break-in at the consulate(s) in New York (and Washington) in 1944, the 1945 ‘return’ of the STELLA POLARIS material, the surrender to the FBI by Elizabeth Bentley in November 1945, and the indication in 1948 that the Canberra-Moscow channel was exposed.

                Yet questions remain. Why did Tiltman apparently not offer his Petsamo codebook to the team? Was Gardner really able to make such spectacular progress in 1946 without any other help? Can the unofficial stories be trusted? Which codebook did Gardner have displayed in his office? Why has the matter of his codebook, seen by Lamphere, been largely overlooked? Who initiated the consulate break-in(s), and why were their troves not exploited for so long? Were any other cribs overlooked? Why are the accounts of the retrieval of codebooks so confused? Why did the NSA ignore the STELLA POLARIS material from OSS and take so long to process the TICOM trove? Why did the KGB introduce a weaker codebook in 1943? When did Moscow discover that it had issued OTPs in duplicate?

                • What special factors contributed to, or hindered, the decryption of Soviet traffic?

                I see three major threads of activity, but it is not clear how they interact with each other, or how they influence events. The first thread consists of the activities of the incidental personnel who contributed through the supply of codebooks at various times (whether charred, with bullet-holes, or intact), and when actions were taken (or not taken) on such events. Much of this is not explicit, and the accounts are contradictory, so it is difficult to determine (for example) exactly what books were available to whom at what time. The second thread is the progress and milestones of the NSA (and GCHQ) cryptanalysts: when they started work on certain traffic, what they accomplished, what aids they received, in the form of cribs, legitimately acquired in messages, or through purloined material. The problem is that the texts of the telegrams that were (if only partially) decrypted, and were published in 1995, give no indication of the evolution of those translations, so it is impossible to determine (unless one of the official accounts makes it explicit) what intelligence was gained to pursue leads at what time. The third thread (which I analyze as a separate section) is the activities of the Soviets: when they heard stories about unauthorized acquisition of cryptographic materials, or rumours of cryptological breakthroughs, what the substance of the warnings was, how they reacted, when they concluded that they had reused OTPs, when they changed codebooks and when pads. The primary insights into these matters come from defectors (i.e. Gouzenko and Petrov), but the story is inevitably very murky.

                1. Codebooks

                The first puzzle is the matter of the codebooks. Codebooks were an essential part of the cryptographic process. When a message was being prepared for encryption, the cipher clerk would look up words and expressions in a dictionary that gave a five-number (or, in some versions ‘four-number’) code for the item to be represented. If a word did not appear in the codebook, and had to be spelled out, the codebook provided an entry (sometimes multiple alternate entries) for each letter, especially if it were not part of a Russian word. Thus the use of a codebook was the first step in concealment of the text: even if the eventual enciphered message (namely, adding a number randomly generated to the stream created from the codebook) were somehow broken, it would be very difficult for an analyst to work out what the resulting series of numbers meant unless a substantial part of the codebook had been constructed – or was available by other means.

                Yet the NSA continues to maintain that any availability of codebooks had no effect on the cryptanalytical successes of VENONA. Benson and Phillips wrote in their original ‘Umbra’ report: “The fundamental cryptanalytical discoveries and the decryptions through 1952 were not aided by our side having any KGB or GRU code book from anyone.” And Cecil Phillips wrote: “The 1944-46 messages – which yielded the early translations and the bulk of all translations – were recovered over a period of years by Arlington Hall cryptanalysts and decoded from a ‘codebook’ that crypto-linguist Meredith Gardner reconstructed by using classic codebreaking techniques.” Those are bold claims that suggest that there was nothing of use in the codebooks that were retrieved, or that, by the time codebooks were obtained, it was very late in the day. Moreover, it directly contradicts the testimony that Lamphere in particular offered.

                It is difficult for a layman to digest these claims. I have no idea what ‘classic codebreaking techniques’ means, but, to my mind, if a cryptanalyst has no plaintext to work from, and does not have access to any skeleton codebook entries, and is faced with an incomprehensible series of numbers that has to have the additive removed before the underlying text can be analyzed, when there no apparent clue to the subject matter exists, and one cannot even apply conventional traffic analysis to the cables, since they all issue from an immobile station, the task would be impossible. It would be like contemplating an empty crossword grid with no clues given. Moreover, the frequent references in the literature to cribs and aids (including a codebook that was – of course – not part of VENONA) belie the whole essence of the Benson/Phillips propaganda. ‘Classic codebreaking techniques’ to me would not include help gained from analogous trade messages sharing similar characteristics, or insights deriving from a defector giving valuable tips as to how special techniques were deployed in creating codebooks.

                John Tiltman

                According to the various accounts, as many as three codebooks had been retrieved from Soviet sources. The first was by senior GC&CS cryptologist John Tiltman. As Keith Jeffery wrote in the authorized history of MI6, of Tiltman’s visit to Finland in April 1940 (according to an internal GC&CS history, actually in early March): “Carr immediately replied in the affirmative and it was arranged that Colonel John Tiltman of GC&CS should travel out to Finland, where he was presented by Hallamaa with a Red Army code-book taken off a dead Russian officer and which ‘bore the marks of a bullet’. GC&CS noted afterwards that it had been ‘of real assistance’ to their cryptographers”. The official report of Tiltman’s visit (at HW 3/151 at the National Archives) states: “It transpired that the Finns were prepared to supply Russian intelligence provided the British paid for their equipment. Tiltman’s trip was followed up by a visit of Admiral Godfrey, the Director of British Naval Intelligence, who visited Finland in September 1940. This was judged to yield ‘very satisfactory’ results.” In the NSA tribute to Tiltman (‘A Giant Among Cryptanalysts’) appears the following paragraph: “In addition to his work coordinating efforts with the French, in March 1940 Tiltman was sent to Finland during the last two weeks of the Russo-Finnish War. He was not able to provide the Finns with much cryptologic help. His sole contribution was to tell them that the Soviet submarines operating in the Baltic were using onetime pads; hence, their messages were unbreakable as long as the system was used correctly, as it was. For his part, he received from the Finns a number of captured Soviet naval codebooks, copies of which would later be provided to the Americans.” (The NSA tribute does not mention that the Finns requested wireless equipment, of which they were very short, as part of the deal, and that Tiltman succeeded in getting the equipment shipped. The statement above from HW 3/151 about ‘the British paying for their equipment’ is bizarre.)

                Note that the first account refers to ‘a Red Army code-book’ and the last to ‘Soviet naval codebooks’, an alarming anomaly. The GC&CS history states that the Finns were able to provide the British ‘the current Naval Baltic Codes and some Military codes, the reconstruction of which was sufficiently advanced to make the traffic readable’. Irrespective of those discords, how had the retrieval helped? The contradictions increase, however. Robert Louis Benson of the NSA wrote: “We have seen that GC&CS had a body of Russian military and NKVD crypto material, obtained from the Finns by Colonel Tiltman in 1940. Russian Diplomatic traffic to and from London, which included the KGB and GRU traffic, was passed on international commercial circuits and, from later 1940, on national circuits too.” We now can add ‘military and NKVD’ to the classes of material obtained. While Benson’s second sentence seems inconsequential from the first, it might have relevance.  Benson specifically refers to ‘military and NKVD’, which suggests either a close similarity between the material, or else separate packages holding their own value.

                Abraham Sinkov

                Later in his report, Benson relates how the American Captain Sinkov visited Bletchley Park in 1941, when the British gave him a host of information about Russian systems, such as details on weather ciphers, the major army and air force signalling systems, and call-sign and radio procedures. In a hand-written note to his summary report on Russian systems, Sinkov concluded: “The Russian secret systems utilize a one part code book. These code books are super enciphered using additive, or special tables which vary from day to day”. How did Tiltman acquire that knowledge? We are not told. Yet Sinkov is surely wrong: the codebook in use at the time was a two-part codebook. He obviously knew the difference, and his statement is bewildering. On the other hand, his testimony hints that a comprehensive codebook was shared by all systems, presumably diplomatic, GRU (military), GRU (naval), and NKVD, and that the Americans should have known all about this in 1941. (In the TICOM expedition, as Randy Rezabek informs us in TICOM: the Hunt for Hitler’s Codebreakers, the Germans at HSL Ost told the Americans that the same five-figured codes were indeed used by the Army, Air Force and the NKVD!) Tiltman himself spent a month in Washington in March-April 1942, so surely would have added his personal testimony.

                I move on to the second codebook, the item obtained from the Petsamo consulate in 1941, and presumably an integral component of the STELLA POLARIS material. While Tiltman’s codebook ‘bore the marks of a bullet’, that obtained at Petsamo was ‘charred’. Martin confused Petsamo with the battlefield, as did Wright. Johnson was also imprecise: he suggested that some Petsamo materials were charred, but that the codebooks were in good shape. Yet he continued by stating that the ‘charred codebook fragments’ were handed over to Hallamaa of the Finnish Sigint Service. Johnson then suggests that the AFSA (when he must have meant ASA) was handed the codebooks by the British in 1945 or 1946: Aid confirms the fact of that transfer, since he uses the same identifier, ‘Source 267’ (as does Nigel West), and specifically names the beneficiary as the ASA. Benson and Warner acknowledge the existence of the Petsamo codebook, but restrict their comments to the fact that the Soviets were alerted to the Germans’ familiarity with it in 1943. Haynes and Klehr confirm that the copy that the Germans owned had been obtained from the Finns. Batvinis is simply confused.

                The evidence is overall clear that a (possibly damaged) version of the POBEDA (two-part) codebook that was in use in 1941, but suspended in 1943, should have been made available to Arlington Hall through the offices of Sinkov (1941), Tiltman (1942), the OSS (1945) and GCHQ (1946). And everything that Lamphere wrote about the charred codebook in Gardner’s office would tend to confirm that supposition. Lamphere linked it to Petsamo, and stated that Gardner, even though the codebook was not ‘current’, had found it ‘immensely useful’ in his efforts to construct the [JADE] codebook. No doubt, for even though the codes themselves would surely have changed, the entries in the codebook, and the principle of representation of letters to be invoked through ‘beginspell’ routines, would have constituted an enormous boost to Gardner’s work.

                So was the third codebook really a different animal? This was, of course, the item retrieved through one of the TICOM expeditions. I wrote earlier that Johnson had written that the OSS-Hallamaa set was not the same as the set that the TICOM team acquired shortly after the end of the war, and I had added: “Of course it may have been the same material, simply being the copy that landed up with the Germans.” Moreover, the full TICOM package apparently contained many other items, as well as the valuable codebook itself. Budiansky remarks that ‘most of the codebook’ was retrieved in the TICOM exploit, but he echoes the puzzling standard assertion (as articulated by Aldrich) that the ASA/NSA was not able to start exploiting it until 1953 or so. Budiansky similarly hinted at the alarming lethargy when he wrote (p 69):

                The Kod Pobeda book found by the TICOM team was applicable only to NKGB traffic sent before November 1943, and as of 1947 Gardner remained unaware the book had ever been recovered. Thus the effort at Arlington Hall at this point still relied upon pure cryptanalysis and ‘book breaking’ to reconstruct both the one-time-pads and the underlying codebooks, all sight unseen of the originals.

                It is odd that he did not pick up Lamphere’s statement about Gardner and his charred codebook, and ignored the fact that the ASA had received a copy of the materials from GCHQ.

                ‘TICOM’ by Randy Rezabek

                A study of the TICOM files by Randy Rezabek in his 2017 book TICOM: the Hunt for Hitler’s Codebreakers makes the behaviour of the ASA look even more erratic. Rezabek shows how German signals intelligence was wastefully deployed among several competing organizations. He describes how more than one copy of the Petsamo trove found its way into the hands of the Germans, specifically the OKW/Chi (the Oberkommando der Wehrmacht/Chiffrierabteilung), the OKW being the Nazi-controlled unit that bypassed the traditional services command, and the OKH/GdNA (the Oberkommando des Heeres/General der Nachrichten Aufklärung). OKW/Chi was never able to make inroads into Soviet diplomatic traffic, because of the OTPs, but Rezabek reported that the interrogation of Oberleutnant Schubert of the OKH on May 24, 1945

                  . . . revealed that the Germans had received a captured 5-figure codebook from the Finns and that the Russians had reused a one-time pad, allowing the system to be read for a while. They also had success with three and four figured codebooks re-enciphered with conversion tables. Later, when questioned about Soviet military and agents’ systems, he gave details of codes used by the NKVD and their counter-intelligence SMERSH system.

                The implication is clearly that it was the Germans, not the Finns, who had made that breakthrough, and it appears that the OKH had mirrored the experience of ASA in determining the use of duplicate pads, and its temporary existence, yet it is also very clear about codes used by the NKVD, and it is to me astonishing that this intelligence never filtered back to ASA at the time. After all, as Rezabek informs us, the TICOM teams had ASA representation on its groups, including the Bletchley Park ‘notable’ Major John Seaman, described as ‘US Army Security Agency liaison officer to GC&CS’. He also writes that ‘scooped up in the troves of documents from Burgscheidungen, the codebook ended up in the archives of the Army’s ASA and later, at the newly established NSA.’ Moreover, Colonel Bicher, who was prominently engaged with TICOM, had, by November 1945, taken up his duties as Deputy Chief of the Army Security Agency, and Rezabek adds that ‘ASA continued to collect and evaluate its TICOM materials, and in May 1946 published a nine-volume study, European Axis Intelligence in World War II as Revealed by TICOM Investigations  . . .’. Why did no one pick up this valuable material until 1953?

                Nevertheless, the official accounts remain very coy about TICOM. It might be because of the absurdly long time it took for the haul to be handed over to the NSA (or for the NSA to investigate it properly), and a reluctance to describe how inter-governmental rivalries prevented its dissemination. Another reason could be that the authorities did not want to admit that the ASA had had the same material for several years already, and preferred to exaggerate the skills of their cryptanalysts – a role that Cecil Phillips played to the hilt, and a story that was earnestly reinforced by Benson. The evidence seems clear to me that Tiltman gave Gardner his captured codebook, and that the ASA, out of its dislike for Bill Donovan and the OSS, tried to bury the contribution he made.

                1. Cribs

                As I have stated before the notion of ‘cribs’ can be embarrassing to some. It suggests ‘cheating’, as if that had any relevance in cryptanalysis. Yet there is a criminal aspect. Gardner had mentioned to Lamphere that progress in decryption would be very slow without cribs, and then, almost miraculously, the results of the raids conducted by the FBI of Soviet consulates came to light, and they delivered useful material by which Gardner could compare plain texts with their encrypted equivalents. Nigel West emphasized the importance of cribs in his book Sigint Secrets, stating that the best short-cut was always the duplicate text sent in plain language or a known cipher. Yet he also asserted in that book that the break-ins (n.b. plural) in New York ‘helped with low-grade traffic but were not much help with NKVD texts’. As always with West, one has to be guarded: how did he know that? And what does ‘not much help’ mean? That they provided some help? In what way? Very few plaintexts? I do not know.

                In VENONA, West wrote, ‘the issue of “black-bag” jobs remains very sensitive’. Indeed. It is very hard to gather reliable information about these operations. Who authorized them? And how did the raiders know how to find the relevant material? Did they leave any traces? Did the Soviets realize what had happened, and did they complain, or were the locals too embarrassed to admit to their superiors in Moscow that their security had been lax? Were the raids limited to New York, or did they extend to Washington? And why did the FBI sit on their hoard for so long, if it had been a carefully targeted attack, and requested by some other government department? So many questions the answers to which will probably never be obtained.

                The most notable, and heavily publicized, crib was the 1946 report drafted by Brigadier Francis Curtis, the Director of Post-Hostilities Plans, which set out British defence policy in the Mediterranean, and, in Nigel West’s words ‘effectively presaged the creation of NATO’. What happened at the Canberra end when this report was stolen and photographed by Ian Milner can be found in David Horner’s Spycatchers: the Official History of ASIO, 1949-1963. So eager was the local KGB station to get the news to Moscow that, instead of placing their copy in the diplomatic bag, they encrypted it word for word, and, when the original document was tracked down, the cryptanalysts at GCHQ and Arlington Hall had a field day.

                • What were the Soviet reactions? Why were they so sluggish?

                As I suggested earlier, I see ten distinct occasions when a Soviet response might have been expected, namely:

                1. The 1941 disclosure that a copy of the POBEDA codebook had been obtained;
                2. The intelligence gleaned from Currie in 1944 that the Americans were ‘solving the Russian codes’;
                3. Philby in 1944;
                4. The break-in(s) at the consulate(s) in New York (and Washington) in 1944;
                5. Weisband’s access at Arlington Park between 1945 and 1948;
                6. The February 1945 ‘return’ of the STELLA POLARIS material;
                7. Gouzenko’s defection in September 1945;
                8. The surrender to the FBI by Elizabeth Bentley in November 1945;
                9. The indication in 1948 that the Canberra-Moscow channel was exposed;
                10.  Philby in 1949.

                The Pobeda Codebook:

                KOD POBEDA

                (Photograph from the National Cryptologic Museum at NSA)

                When the Soviets learned, in November 1941, that the POBEDA codebook had been obtained by the Germans, they were not greatly alarmed. They believed that the strong protection of OTPs would mean any discoveries of code tables would be irrelevant. Nevertheless, they decided to introduce a new one (075-B; JADE, to the Americans). It took them about two years to complete the exercise, namely to devise new codes, print them, and get them distributed to all worldwide stations. (Pryser criticized them for dilatoriness, as if the replacement were a delayed reaction.) And yet this exercise introduced a weaker, one-part code, that proved to be more easily ‘broken’ than the previous one. (It would presumably have taken them even longer to produce a new two-part codebook.) Moreover, Sudoplatov later expressed his scepticism that Gardner would have been able to learn much from the POBEDA codes when trying to build the JADE book. Of course, the Soviets did not, at this stage, believe that the Americans had started to engage in a serious effort to decipher their diplomatic telegrams, and given that the Petsamo material had been stolen by the Germans, would not have imagined that it could have fallen into the hands of the Americans.

                Lauchlin Currie:

                According to Benson and Warner, Currie informed his contacts in the spring of 1944 that the Americans were on the brink of ‘breaking the code’, something that Elizabeth Bentley got to hear, and about which she later told her FBI interrogators. Currie, who did not really understand these matters, may well have overdramatized the situation. Klehr and Haynes write that ‘he may well have heard an overly optimistic report sent to the White House about the early Venona effort’ (p 47). In any event, on May 1, 1944, a circular was issued to all stations to use a new message-starting point when they encrypted cables. This was a straightforward change in procedure to effect, but it backfired, since Cecil Phillips soon noticed that the first five-digit cipher group was the indicator to which page of the OTP should be used. (The cable that described the change can be seen as Number 26 in the Benson-Warner work, on page 259.)

                Kim Philby (1):

                According to Genrikh Borovik in The Philby Files, pages 235-236, Philby’s London controller reported to Moscow on August 29, 1944, that Philby (STANLEY) had told him that GCHQ had people working on Soviet cyphers:

                ‘S’ also reports that according to Cowgill there are fifteen people working at the ‘Resort’ [i.e. Bletchley Park] on our ciphers. Menzies proposes to add many more people at the ‘Resort’ to work on deciphering. ‘S’ tells me that this should be avoided, since the ‘Resort’ has a lot of experience in deciphering.

                Moscow Centre did not appear to be unduly concerned about this news. It sounds as if Phiby was indeed referring to the VENONA project: he was intimately familiar with the ISCOT operation, but that was being undertaken in London, tackling communications between Moscow and communist groups in satellite countries. Philby had presumably already informed his bosses of ISCOT, since it had begun in June of 1943. In any event, that news was overshadowed by the other news that Philby revealed on that occasion – that he was probably going to be appointed chief of the new Soviet counter-intelligence section in MI6. No particular response has been recorded.

                Consulate Break-Ins:

                These events (apparently in 1944) are most mysterious, and very little has been written about them, as Nigel West intimated. Thus we do not know: i) at whose request the break-ins occurred, ii) how many of them there were, with New York and Washington being mentioned; iii) when they occurred; iv) how the FBI knew what to find, where, and whether they managed to hide their traces; v) why the FI apparently did nothing afterwards; and vi) whether the Soviets discovered the break-ins, and if so, why they did not make a vigorous protest. All we have is Lamphere’s not very convincing account, which I critiqued in detail earlier. If, indeed, plaintexts had been discovered alongside their encrypted versions, and the Soviets had suspected that they had been photographed, it should have constituted a very sharp warning. Yet they apparently did not respond.

                William Weisband:

                Weisband has been blamed for the disclosure of the VENONA project to his Moscow masters. Yet the records show that he was out of contact for much of the critical period, and that what he passed on mainly concerned internal Soviet military, police and other traffic, which was transmitted in plaintext. After a long gap in communications, he made contact with Feklisov on February 9, 1945, when he had fresh duties at Arlington Hall, and gained some high-level knowledge of the VENONA program. Yet he did not gain a permanent job there until August 26, 1946, when he was put to work on internal Soviet communications, and it was only in June 1947 that his team was transferred to the diplomatic messages. Again, he had been out of touch with his Soviet minders, and only in January 1948 did he make contact with Bruslov. Batvinis reports that, the following month, Weisband informed Bruslov on progress on VENONA, and plaintext systems such as TABER, and SHAMROCK. These disclosures may have alerted Moscow to the exposures still rife in Australia, but, even then, the Soviets did not react with authority or urgency, and it was in any case too late to protect anything by then. Weisband was interrogated by the FBI in 1950, but he denied everything.

                The STELLA POLARIS Material:

                One has to suspend belief over some of the claims made about the STELLA POLARIS material. First, that the trove handed over to the OSS and that discovered by the TICOM expedition were essentially identical. Second, that Donovan was forced to hand it all over to Andrey Gromyko, under pressure from Eleanor Roosevelt and Secretary of State Stettinius, since they claimed that it belonged to the Soviets. Third, that the NSA declined to acknowledge that it had received anything from the OSS, and failed to acknowledge that GCHQ had copied a portion, and had sent it to them. Fourth, that the NSA somehow managed to overlook the significance of the TICOM resource until 1952 or 1953, when they realized that it contained a useful codebook.

                So what did the two collections contain? Batvinis claimed that TICOM shipped seventy-three file cabinets of material, containing 300,000 documents, which may explain why NSA took so long to find that charred codebook. (Although it does not explain why a complete inventory was not taken immediately.) On the other hand, Warner and Benson described the 1,500 pages that were ‘returned’ to Gromyko in February 1945, and Costello and Tsarev, in Deadly Illusions, and Andrew and Gordievsky, in KGB: The Inside Story, echo that number. Yet, as former GCHQ historian Tony Comer has sagely pointed out to me, no codebook would have been that large and unmanageable: the documents must have included ancillary information, such as reciphering tables, or other analysis.

                The TICOM haul was obviously much bigger. Budiansky wrote of ‘eight tons’ of material (including technology) dug up at Rosenheim, and of the fact that the TICOM 3 expedition brought back 300,000 pages in one hundred-and-seventy steel file cases. The TICOM haul was much more expansive than that of STELLA POLARIS. Alvarez and Mark inspected the NSA archives, and learned that the records contained a ‘long list of Soviet codes, ciphers, and other cryptographic materials under the heading ‘STELLA POLARIS/Source 267’ [namely GCHQ]. Yet the 1944-45 fiscal report for the ‘Special Problems [Russian] Section’ did not mention any Finnish material. “If the code breakers had received product from the STELLA POLARIS group, the annual report probably would have said so”, they write, trustingly. But maybe not: if some facts had to be buried, then well-interred they were. Again, a weaselly use of words could also conceal much: ‘OSS’, when the information was received from GCHQ. ‘Finnish sources’, when they could better have been described as Swedish, or even German. Moreover, if the ASA had been able to gain so much useful intelligence from the TICOM interrogations of the German personnel in 1945 (see Johnson, above), why were they so slow in exploiting the documentation that came along with the exploit?

                Thus it is likely that only a small subset of the trove was handed over to Gromyko. It would have been absurd for Donovan to have presented a gift of intelligence that the Soviets had never seen before – even though their spies may have got wind of it. The repetitive term of ‘returned’ suggests that only items that were clearly viewed as having been in the original possession of the NKVD were presented, and Donovan probably minimized the scale and scope of the STELLA POLARIS material when dealing with the White House. Bradley Smith has offered the most detailed description of the process: he writes generally about ‘codes and documentary materials’ that were assembled and turned over, but also mentions that Colonel Buxton, the former OSS chief in Stockholm, had unnecessarily put his oar in, and informed the State Department that 15,000 sheets of material were involved. But if these ‘documentary materials’ were additive to the codes, whence did they spring? Were they German or Finnish commentary or analysis, which the Soviets were absolutely not entitled to see?

                Smith declared that the most surprising aspect of this transfer (overlooking the pressure from Red Eleanor) had been the decision by the U.S. government to send the codes back, ‘for this virtually guaranteed that the Russians would change their ciphers’. Yet this was a matter of codebooks, not ciphers, and the Soviet has long replaced the POBEDA codebook of which the details would have been in the package. So his conclusion that ‘the really irresponsible gamble had been taken by Dovonan when he purchased the codes in the first place’ is off the mark. Gromyko may not have been overwhelmed or surprised by his gift, and it did not provoke any changes in Soviet cipher procedures.

                A dissenting voice comes from Andrew and Gordievsky. They write that Donovan, after Buxton’s intervention, had to send a message to Colonel Fitin, head of the Foreign Directorate (INU) in Moscow, in which he disingenuously stated that ‘he had made no study of the material’. At Fitin’s request, the charred code book (and nothing else?) was passed over to Gromyko in Washington. Fitin was of course not deceived, although he was impressed by the naïveté of Roosevelt and Stettinius. The authors then state that the NKVD subsequently changed their codes in May 1945, and that ‘a copy of the charred 1944 code book was used from 1948 to help decrypt some NKVD/NKGB communications during the last year of the war’. They are doubly mistaken. The codebook was from 1941, not 1944, and there is no evidence that the Soviets changed their codes again, having done so at the end of 1943. Why the Arlington Hall team had to wait until 1948 before exploiting the codebook is not explained.

                Gouzenko’s Defection:

                Moscow was severely alarmed by the defection of Gouzenko in September 1945, but more because of the threats to the safety and concealment of its spy networks than by any cryptological revelations that Gouzenko might have passed on. Gouzenko belonged to the GRU, not the KGB, of course, and he brought no relevant material with him, just the knowledge of procedures, some messages that were of little use, and information on how codebooks were constructed. Budiansky states that the GRU used a completely different codebook from that the KGB deployed. (Some writers, such as John Bryden in Best-Kept Secret, and Phillip Knightley in The Master Spy, have exaggerated Gouzenko’s contribution.) Thus, instead of reacting with operational changes, the KGB just put all agents on alert, and ordered contacts to be reduced in frequency. Ironically, Weisband was affected by this edict as well, so it meant that any disclosures he had about activities at Arlington Hall were held over.

                Elizabeth Bentley:

                Bentley confessed to the FBI two months later, and revealed much about the extent of Soviet espionage in the United States. Her statements just reinforced the reduction of meetings.

                The Exposure of the Canberra-Moscow Channel:

                Remarkably, the channel between Canberra and Moscow was still using the faulty duplicate OTPs in 1948. Unfortunately, as I described before, the records to which I have access show only one-way traffic, so I cannot read how Makarov in Canberra responded to instructions and queries from Moscow. Yet those messages do provide insights into the way that the Soviets eventually worked out that their cables – especially from 1946 – had been exposed.

                On March 19, 1946, Makarov (EFIM) reported to Fitin (VIKTOR) in Moscow that Clayton (KLOD or CLAUDE) had obtained the documents ‘Security and the Indian Ocean’ and ‘Security in the Western Mediterranean and the Eastern Atlantic’, prepared by the English Post-Hostilities Planning Staff, dated May 19, 1945. Makarov was able to have them photocopied in thirty-five minutes so that Clayton could return them to the Department of External Affairs. Makarov concluded his message with the following: “  . . .it would be necessary to transmit immediately to MOSCOW but this will require copious telegraphic correspondence. We urgently request your instructions.”

                How Moscow responded is not available, but Makarov evidently encrypted the complete documents verbatim, which provide the VENONA teams with an excellent crib, and gave a large boost to their efforts to decrypt more traffic, with the result that they were processing 1948 messages ‘in real time’. Thus, when rumours of leakages surfaced in April 1948 that confidential papers had been passed on to the Soviets (with the cover story that a defector had informed the British) John Burton, Evatt’s chief adviser in the Ministry, who knew nothing about VENONA, began to ask questions about the source of the information, in order that he could try to track down the leakages. Shedden, who had little trust in Burton (according to Ball and Horner) essentially ignored him, which was a strange reaction if Burton had been charged with finding the source of the leak. Burton then provided cover for the obvious culprit, Ian Milner.

                Thus news soon reached Moscow that a very delayed reaction to the theft had taken place. It is possible that the Soviets then realized that their ciphers had been broken. Yet relevant inquiries from Moscow had already been sent. A message of March 26 asks Makarov to ‘state how and from whom KLOD received the information reported by you in [unrecovered]’. They had earlier suggested that KLOD was acting incautiously, and had asked Makarov to stop receiving documents from him, all of which suggests they had already received a warning about signals security. For several weeks, however, the cables show no alarm, and Moscow discussed routine matters such as bringing in new recruits. Only on June 2 does a note of urgency arrive: “Please confirm urgently the receipt of code 0177-B which was sent with post number  . . . on 8 January 1948.” That message was sent by Colonel Aleksey Shchekoldin, head of the KGB cipher section. No cables were decrypted after June 5.

                What is puzzling is why Canberra did not adopt the new pads (for that is how I interpret ‘code 0177-B’) in January. It was obviously not an order, since it had not been carried out. It was a preparatory measure, as the Cipher Section, maintaining a parallel set, knew that the pads would be running out soon. Makarov was not disciplined for this oversight, as he stayed in office right until the Petrov years. It all proves to me that Moscow had no idea about the duplicate OTPs up until this time, as they would have otherwise mandated an immediate world-wide change. Every other station – or, certainly, Washington, New York, and San Francisco – had used up their supply in 1945, and Moscow had had no inkling that there had been an exposure in its traffic with those cities. Bringing in new pads immediately, as a safety precaution, was obviously a good idea, but it does not prove to me that they recognized what the source of the problem had been at this juncture. How long it took them to work out what had happened may never be known, and those responsible would have done all they could to cover it up, knowing what their fate would be if detected.

                Lastly, the closedown of the outlying KGB channel had nothing to do with ‘Black Friday’. The covers had been put on diplomatic and intelligence traffic in June 1948. ‘Black Friday’ was provoked by what Moscow learned from Weisband about their highly insecure internal communications systems.

                Kim Philby (2)

                When Philby was posted to Washington in October 1949, he quickly picked up from Arlington Park the progress being made on VENONA, and the recognition of cryptonyms concealing the identities of spies. On a return to London in March 1950 (ironically a recall to discuss the Fuchs affair), Philby passed to Modin, the handler of Burgess and Blunt, the now infamous message (reported in West’s and Tsarev’s Crown Jewels, p 182):

                 . . . . the Americans and the British had constructed a deciphering machine which in one day does ‘the work of a thousand people in a thousand years’. Work on deciphering is facilitated by three factors; (1) A one-tie pad was used twice; (2) Our cipher resembles the cipher of our trade organization in the US: (3) A half-burnt codebook has been found in Finland and passed to the British and used to decrypt our communications. They will succeed within six to twelve months.

                Philby then referred to the CHARLES (Fuchs) case, and he went on to describe the threats to himself. Korovin, the rezident, admitted to Modin that ‘mistakes had been made in Soviet cipher procedures’, which may suggest that the Soviets had recognized the OTP problem before Philby brought it up.

                Hayes and Klehr picked up the story in their book, and added a Footnote (51, p 401) that reflected the views of Arlington Hall, but failed to clear up the confusion:

                Venona project cryptanalysts comment that Philby’s explanation, although adequate for warning Moscow that its cable traffic had been broken into, reflected a layman’s muddled understanding of cryptanalysis in that it exaggerated the assistance provided by early computers to sorting messages for duplications, overplayed how the burnt code book (which was in American, not British, hands) had been used up to that time (only as a model of Soviet code-making), and understood the way Trade messages assisted solutions.

                The comments about exaggeration were indeed, but Philby had clearly picked up from Gardner the intelligence about the charred Tiltman codebook, something that these non-laypersons definitely wanted to conceal.

                • Why has no further progress on VENONA messages been made since 1980? Why does there continue to be such secrecy over the programme?

                Last June, I wrote the following on coldspur, lamenting the lack of progress:

                I see a number of opportunities. First of all, a renewed attack on partially deciphered messages, using much faster computers, and probably advanced AI techniques, could surely reveal much more about the traffic and persons involved than was decrypted decades ago. Second, an integrative approach to the interpretation of information would be highly desirable since records released during the past twenty years for the Foreign Office, MI5, and GCHQ, as well as resources like the Mitrokhin Archive, would probably point to conflicting missions, and oversights in analytical opportunities. Third, much of the material that has been published has been redacted because of old sensitivities to living persons, and also contains errors or partial information that could be easily corrected based on intelligence that is now available. With the passage of time, and the deaths of such persons, such names should be restored. One of the most frustrating aspects of VENONA decrypts is that it has been impossible to determine what breakthroughs were made, when, which has complicated the task of historical interpretation.

                Given the previously mentioned appeals for continuing research into identifying the persons still hidden behind the cryptonyms, it is rather shocking that, in 2025, the state of the archives is in worse shape than it was twenty years ago. The decisions made by the NSA in obscuring a large part of the trove, and making the records unsearchable, are particularly egregious. In addition, no general housekeeping appears to have been made on the transcripts that are available, such as correcting obvious mistakes, sorting and identifying them correctly, or making emendations based on intelligence that has come to light since. A reconciliation of versions from different sources is sorely needed. An integrated view of the US, London and much neglected Swedish traffic should be made.

                Valiant efforts have been made by John Earl Haynes, but he is now in the process of moving his archive at the Wilson Center at Stanford University to the Davis Center at Harvard University and to the National Security Archives at George Washington University. What that transfer means technologically, I do not know: nor do I know whether the exercise will attempt to incorporate other files, or to engage in a clean-up of some sort. All this means, however, is that, even if there were a will to start a project of further investigation, it would by no means be a simple task.

                Following up on my comments above about computer analysis, it puzzles me why highly parallel processing, perhaps accompanied by AI techniques, has not been deployed to attack some of the obvious gaps in the transcripts. For instance, what about that one-way traffic from Moscow to Canberra from August 1946 onwards? The fact that no messages issued from Canberra to Moscow appear in any form can surely not be attributable to the fact that, for two years, Moscow always used duplicated pads, while Canberra used pristine ones? Given the nature of the posited exchanges, with, for example, Makarov being asked questions that required an answer, one might imagine that necessary phrases from the codebook would be used in the following cable? Also, when Makarov asked for guidance over the transmission of the British papers in 1946, why is there no response in the record? One can only conclude that GCHQ and the NSA have lost interest.

                And that conclusion leads to the second part of my query: whether there has been a serious decision made to hush things up, lest further embarrassing secrets be unveiled, such as the names of hitherto unidentified spies who had infiltrated government establishments. Again, from last summer, I reproduce what I wrote:

                Yet I could never understand why such an attempt at secrecy was necessary. William Weisband, a linguist at Arlington Hall, had informed his Soviet masters of the project, and by 1948 the Soviets were able to undertake a total overhaul of their encryption procedures. Kim Philby also informed them of the progress made on the exercise. Yet the Foreign Office (who admitted to being controlled by MI5’s demands) stubbornly insisted that there was a security risk. As late as September 28, 1953, Talbot de Malahide (yes, he!), responding to a request by Patrick Dean as to why the Office was against releasing all our knowledge of the Maclean/Burgess affair, wrote:

                The argument roughly is that it is most important to conceal from the Russians our knowledge of Bride [i.e. VENONA] material. They cannot, of course, now prevent us from extracting what we can from it. But if they knew we were doing this, they could take defensive action which would probably ruin any chance we still have of making use of the knowledge we obtain in this way. [FCO 158/126]

                Dean annotated: ‘Thank you! I agree.’, thus endorsing the code of silence. Yet why Malahide and co. thought that the Soviets would not already be taking ‘defensive actions’, based on their knowledge of the exercise, rather than waiting for the British to declare to the world what they had discovered, defies explanation. Of course, those illusions would shortly be shattered by the Petrov revelations a few months later.

                For some reason, American institutions also decided to try to keep the details about VENONA secret until writers like Chapman Pincher and Robert Lamphere started leaking details in the 1980s. It was not until 1995 that an admission was made, and a bi-partisan commission started releasing materials. From my study of the archives, I would conclude that the professed anxiety about admitting the VENONA programme to the public was attributable more to the embarrassment over the way that British institutions had been infiltrated, and to the decisions made about re-instituting Burgess and Maclean in prominent positions, than it was to the concern about divulging damaging secrets to the Soviets.

                While there was a justifiable conviction that trying to use the transcripts themselves as evidence in any criminal trial, because of the use of cryptonyms and the lack of transparency in how the decryptions themselves had been made, it seems to me that a substantial propaganda coup could have been made by explaining the stunning achievements of the exercise. It was not that it would have alerted the Soviets: they had made the necessary adjustments as soon as they learned of the exposure. It was not like the secrecy over the ENIGMA project, and the corresponding British Type-X equipment, which had been supplied to other countries after the war, and thus might have provoked embarrassing questions. This was a once-off example of a lapse in procedure, and a spectacular effort to exploit it. Chrsitopher Andrew wrote: “The value of VENONA as a counter-espionage tool was diminished, sometimes seriously, by the extreme secrecy with which it was handled.” (Defend the Realm, p 380)

                I regard it as absurd to maintain that there is a security risk in explaining openly how the VENONA project succeeded, how some of the breakthroughs were made, what the relationship between the various codebooks (diplomatic and trade; one-part and two-part – POBEDA and JADE) was, how Tiltman, STELLA POLARIS and TICOM individually contributed to the success, where exactly Gardner acquired his codebook with the inkblot or bullethole, etc. etc. The technology of 2026 is vastly different from that of 1946. The details about ULTRA and the Enigma machine have been discussed in great detail ever since Frederick Winterbotham broke the news in 1974. Why cannot the same openness be granted to VENONA, a phenomenon of equal significance? And why should attempts not be made to take a fresh stab at identifying the persons behind all those unresolved Russian cryptonyms? Nigel West wrote in the entry on VENONA in his Historical Dictionary of Signals Intelligence (2012): “While  the American policy appears to have given a measure of protection to the living, being those suspected Soviet sources who were never positively identified or confronted with the allegations, their British partners seem to have adopted political embarrassment as their principal criterion for eliminating sensitive names.” Yet too much time has passed. There are no longer any surviving Soviet agents from that time, and politicians from two or three generations back should not be protected from embarrassment.

                Conclusions

                1) Overall, the CIA/NSA have behaved dishonorably and deceptively in their quasi-official histories of the project. With the apparent goal of exaggerating the skills of its domestic cryptanalysts, and minimizing the contributions made by GCHQ, cribs from foreign channels, the acquisition of codebooks from various sources, or even assistance from computer techniques, Benson, Warner, Phillips and others have distorted what happened, and have even tried to reformulate memoir to fit the story. Even more remarkably, no one has risen to the task of challenging their accounts.

                2) The treatment of codebooks, and the explanation of their exploitation, are particularly egregious. Tiltman’s contribution, and the way in which Gardner unsubtly revealed to Lamphere how the codebook with the bullethole had helped him, has been blankly denied. At the same time, efforts have been made to blur the distinction between the Petsamo codebook and the battlefield version. The prevarications over the STELLA POLARIS incidents and the TICOM retrievals are simply ingenuous.

                3) The role of cribs has been vastly understated. There were probably similarities between the Trade codebooks and procedures and the Diplomatic equivalents that have not been described properly. It is difficult to understand how Gardner could have made such quick progress in 1946 without such help. The incidents of the consular break-ins, and their results, have been clumsily finessed. The role of the documents transmitted verbatim from Canberra in 1946 has been largely ignored.

                4) The disdain for the OSS, and Donovan in particular, shown by the ASA was probably warranted. Donovan was a pushy individual, and his organization was riddled with communists. Yet, for the histories to diminish entirely the contribution of the OSS in gaining material from the Finns/Swedes/Germans was foolish, especially since the records show that GCHQ off its own bat sent the same valuable material to Arlington Park soon after it was received.

                5) The stumbles of the KGB (which was increasingly controlling the GRU at this time, as well as being the department responsible for the production of OTPs) are remarkable. Even though it believed in the absolute security of its OTP system, in 1943 it made theoretically unnecessary changes to its codebooks that actually weakened its systems, and it changed the indicator process to make its traffic more exposed. It showed an irresponsible carelessness in not enforcing the use of new OTPs around the globe, thus allowing the dramatic disclosures of the Canberra-Moscow exchanges, which were a damaging phenomenon in many ways.

                6) The contributions to the demise of VENONA made by Currie, Weisband and Philby have been exaggerated. The KGB did not respond appropriately to early warnings, and Weisband was out of contact at the critical time. Weisband’s knowledge had a far greater effect on the Soviet Union’s domestic systems, and ‘Black Friday’ was in response to his alerts concerning those communications, not to the success of the decryptions of VENONA, which was not able to work on any traffic after June 1948. Philby’s revelations were too late to protect many Soviet spies from identification, although his knowledge did contribute to plans for the exfiltration of Burgess and Maclean.

                7) The obstructiveness of such as Eleanor Roosevelt and Minister of State Stettinius is regrettable, but nor surprising. There were many in prominent positions who, even if not actual fellow-travellers or agents of influence, still regarded the Soviet Union as an ally, and foolishly believed that by appeasing Stalin they would encourage him to behave more generously to the USA – and to the countries of Eastern Europe. The process of ‘returning’ material to Gromyko in 1945 has an element of farce about it.

                8) The woeful state of the VENONA materials, and the lack of any initiative to clean them up, or apply fresh techniques to resolving many unanswered questions, is extremely regrettable. Unfortunately there appears to be no pressure being applied by even those who have had an investment in studying VENONA. The project is now eighty years old: the USA stopped intensive work on it in the 1950s, and it is now almost ancient history. It needs another eager academic with a youthful cadre of undergraduates to resuscitate the project.

                9) The state of totally undeciphered messages is unknown. Whether there is a pool of all worldwide traffic in its original format of five-number groups held centrally (probably by the NSA or GCHQ) is currently indeterminable. Tiltman went on record as saying that Soviet traffic gathered by UK interception in the early years of the war was later destroyed. Likewise, it is impossible to tell whether the medium on which they were stored – and inspected as late as the 1980s – is still viable and readable forty years later. A statement from both organizations would be appropriate.

                (I thank coldspur correspondent Ian Wraith for his comments on an earlier draft of this article. Any mistakes I have made are of course mine, not his.)

                (Recent Commonplace entries can be seen here.)

                Leave a Comment

                Filed under Espionage/Intelligence, General History, Geography, Management/Leadership, Politics, Technology, Warfare

                Special Bulletin: Coldspur and GCHQ; The Spectrum App

                Note that the title of this report leads with ‘Coldspur and GCHQ’, not ‘Coldspur versus GCHQ’. I have no adversarial stance against the agency, which I overall admire and support. Yet I believe that GCHQ is struggling with its PR, and with the task of setting policy in a domain in which I have a special interest, namely that of declassifying previously confidential material, and then executing that policy. I have been struggling in recent months to gain the appropriate attention from GCHQ’s leaders, who appear to want to avoid the issue.

                As a one-man band, it is much easier for me to stake out an opinion, and to publish it speedily if I want to. I have no constituents who need to be consulted, or who will need ‘buy-in’ before any public statement is made. Once I have prepared a text, I can post it for universal access in minutes. That is obviously not so with any large institution, especially a government one, which will be wary of upsetting any of its ‘stakeholders’ in its statements to the world, and will require any number of checks to be made before publishing news or policy items on its website.

                Yet coming under public scrutiny is an unavoidable outcome of pressures for more openness, and GCHQ brought such on itself when it decided that an official history of the agency was merited, and commissioned an outside academic, Professor John Ferris, to write it. All the evidence points to the fact that it did not carefully think through the implications of what it had initiated, with the result that some confusing and contradictory statements concerning the release of previously classified material were made by the Director at the time the history was published, by the official historian himself, and later by the current departmental historian. As Ernest Bevin said: “If you open that Pandora’s Box, you never know what Trojan Horses will jump out.”

                Moreover (and it was this event that stirred me into action), when GCHQ was invited to contribute to a set of articles in a distinguished academic journal (Diplomacy and Statecraft), it delegated its contribution to a former employee, the historian who had guided Professor Ferris through the confidential material. That person was the distinguished and dedicated Tony Comer, who worked for the agency for thirty-seven years before retiring in 2020, and was awarded the OBE for his services. When I read his contribution, however, I was not sure whether he was writing in a private capacity, or whether his text had been pre-approved by his former employer before publication. I was surprised that GCHQ would not have entrusted the work to an in-house expert. In any event, I was rather critical of Comer’s description and defence of GCHQ’s opinions on official history. To his credit, he has maturely and very professionally not disengaged from the occasional discussions on cryptological matters that we have enjoyed for a while.

                I thus bring readers up-to-date here on the exchange of letters between GCHQ and me. I have previously published on coldspur the mailed letter that I sent at the end of November 2025. (The GCHQ website offers no email address to which members of the public can send messages: that might encourage a burdensome flood, I imagine.) My letter failed to arrive (so I was told), so I sent it again by email, to the Press Office, on January 19, and asked it to be routed to the Director, Mrs Keast-Butler. About five weeks later, on February 23, I received a response from Dr David Abrutat, the departmental historian. I was so disappointed by this reply that I wrote again to Ms. Keast-Butler, on March 2. Here follow the texts of the three messages:

                1. Coldspur to Keast-Butler (November 25, 2025 & January 19, 2026)

                Dear Ms Keast-Butler,

                I am a retired historian with a great interest in GCHQ. I read John Ferris’s Behind the Enigma when it came out, and I am prompted to write to you as I see several anomalies in the execution of GCHQ’s policy for releasing archival material that he used. (I am writing a traditional letter to you, as the GCHQ website appears to offer no on-line option for contacting anyone at the institution.) My inquiries run as follows:

                • On 24 February, 2017, GCHQ announced the commissioning of John Ferris to write an authorised history and said: “We will be giving as many source documents from the history as we can to the National Archives, alongside our continued programme of releasing previously secret documents from our past.” (https://www.gchq.gov.uk/news/gchq-to-celebrate-centenary-in-2019) What is the implication of ‘as we can’? Who, or what agency, controls those decisions?
                • In the Foreword of the history Jeremy Fleming wrote: “For those who want to research further and form their own conclusions, we are also releasing the source material to the National Archives.”
                • In his Introduction, John Ferris wrote: “Most of the material I used will be released to the National Archives after this book is published, though some files will be retained, and others redacted to varying degrees.” Why this contradiction with Jeremy Fleming’s statement?
                • However, five years after publication the only releases, so far as I can judge, appear as HW 92, consisting of twenty-five files. The descriptions are opaque, but relate mainly to Chapter 13: (HW 92/1-5 Signal traffic regarding Palestine, HW 92/5-13 about Konfrontasi and HW 92/14-25 about the Falklands Conflict), and thus ignore the bulk of Professor Ferris’s text. Why has the remainder of the material not been released?
                • Furthermore, these are only hardcopy releases to The National Archives. In an article in Diplomacy and Tradecraft of September 2025, Tony Comer, who appeared to be writing with authority on behalf of GCHQ, expressed his regret that they had not been digitized. I share his dismay, as the lack of digitization means that the documents have to be inspected at the National Archives at Kew, and taking books into the reading-room is forbidden. Thus there is no easy way for researchers ‘to form their own conclusions’ (as Mr Fleming suggested) by checking the text of Behind the Enigma with the sources used. For those of us distant from Kew, of course, access is impossible unless we contract someone to photograph the files – an expensive, wasteful and inefficient process.

                I should be very grateful if you could respond to my points, and especially if you could authorize a fuller release, and digitization, of documents used by Professor Ferris.

                Sincerely,

                Antony Percy

                • Abrutat to Coldspur (February 23)

                Dear Dr Percy,

                I have been asked by Director GCHQ and her Private Office, to respond to your enquiry regarding the release of GCHQ files relating to our authorised history, ‘Behind the Enigma,’ written by Professor John Ferris and published in 2020 by Bloomsbury. You have noted in your letter that our most recent releases to the National Archives (TNA) at Kew, listed under the HW92 series, pertains to this authorised history. The files that were released for the Chapter 13 stories around Konfrontasi, the Palestine Mandate and the Falklands conflict of 1982, were carefully selected. There are still sensitivities around GCHQ’s work during these periods, which means that significant parts of some of the files have to be retained, whether or not John Ferris had access to them during his research. On all our files released to TNA, we have to make considered judgements on operational security. The statements that have been made by Director and John Ferris still stand, but the onus and responsibility for file release lies with me and the Archives review team, for when this is able to happen in the interests of national security. On the question of digitisation, the Archives team at the time extensively reviewed the criteria for digital submission of the files, but records have to be released in the format in which they were created (in this case, paper hardcopy). Even as the Departmental Historian, I have to physically go to TNA Kew to look at our released files. I hope this goes some way to answering your questions.

                Best wishes,

                Dr David John Abrutat FRGS FRHistS GCHQ Departmental Historian

                • Coldspur to Keast-Butler (March 2)

                Dear Ms Keast-Butler,

                I am writing to you in response to Dr. Abrutat’s recent letter to me. I was extremely disappointed by what he wrote. Given its clumsy construction, and apparently illogical assertions, I have to wonder whether you, or any of the senior officers reporting to you, actually read it before it was transmitted, since I would have expected the text to be corrected and refined during the review process.

                When I originally wrote to you (over three months ago), I drew your attention to a statement that one of your predecessors, Sir Jeremy Fleming, made in the Foreword to John Ferris’s history of GCHQ. Since that expression of policy appeared to have been overlooked, or ignored, I was seeking an authoritative statement from you that would provide some explanation as to why GCHQ has not followed up on its promises to the readers of the book. Delegating the task to a departmental historian who would appear not to have any historical or cryptological academic credentials seems to be an abdication of responsibility.

                I regret that I failed to follow much of the logic in Dr. Abrutat’s statements.

                1. “The files that were released for the Chapter 13 stories around Konfrontasi, the Palestine Mandate and the Falklands conflict of 1982, were carefully selected.” I have no doubt that those files were ‘carefully selected’, but that is hardly the point. My challenge related to the statement by Fleming, who made an unqualified promise that ‘the source material’ would be released to the National Archives. The fact that GCHQ acknowledges that a very localized set of files was selected would tend to contradict what Fleming wrote. Does the release include all the ‘source material’ covered by that promise? It would appear not.
                • “There are still sensitivities around GCHQ’s work during these periods, which means that significant parts of some of the files have to be retained, whether or not John Ferris had access to them during his research.” It would not surprise me that GCHQ would still be withholding files to which John Ferris never had access: that was never an issue. But does the statement mean that you do not know exactly which material Ferris consulted? I assume that this statement means that Ferris did not see all the contents of some of the files: was a record kept of which documents he was allowed access to? Again, the original statement was that the individual documents seen by Ferris would be released soon after the publication of the book. Does Abrutat’s statement rescind that? Or has some of the material that Ferris saw, due for declassification, has subsequently been judged as Highly Sensitive? Had someone already separated GCHQ records into those two categories before Ferris was commissioned? If, indeed, Ferris was allowed access to Highly Sensitive material, was Behind the Enigma published with details about topics that GCHQ now regrets releasing? Is that why Ferris made his more guarded statement, when it was revealed to him that some material he had used was highly confidential? But, in that case, why was his text published without necessary excisions being made?
                • “On all our files released to TNA, we have to make considered judgements on operational security. The statements that have been made by Director and John Ferris still stand, but the onus and responsibility for file release lies with me and the Archives review team, for when this is able to happen in the interests of national security.” I can understand the need for that caution, but presumably Fleming was aware of the situation when he wrote his Foreword. It is, however, a contradiction to assert that the statements made by ‘Director’ (Fleming, presumably) and John Ferris still stand, first because they are in slight conflict with each other, and second, because the Archives Review team has now countermanded the judgments that Fleming made at the time. How is it that the team has greater authority than the former GCHQ Director, and that it is left to this group to make decisions on the vital issue of ‘operational security’? It is very alarming.
                • “On the question of digitisation, the Archives team at the time extensively reviewed the criteria for digital submission of the files, but records have to be released in the format in which they were created (in this case, paper hardcopy).” Is this a statement of the obvious? From my analysis of original files at the National Archives, I am very familiar with the format of the records – even to the extent that I recognize that some documents are photographs of the originals. Yet I also know that many files have been digitised, and I fail to see why GCHQ has made the decision that none of the relevant items should undergo that process. I referred to the fact that Fleming had encouraged readers to ‘form their own conclusions’ by their being able to access the fresh material, but, as I have explained, that is an almost impossible task given the lack of digitisation and the security constraints imposed at Kew.
                • “Even as the Departmental Historian, I have to physically go to TNA Kew to look at our released files.” I was not aware of any visit to Kew (or anywhere else) being possible without ‘physical’ means (unless GCHQ has devised a process of corporeal transference, the details of which are under a similar security embargo), but this voiced regret does not engage my sympathy. The ease with which Dr. Abrutat and his team could do their work would be improved if the files were digitised: he has made my point for me, and through that process the commitments made by Fleming could be realized.

                I very much look forward to reading your authoritative response, since I believe GCHQ owes its followers the provision of lucid statements of policy concerning classification and release of materials, and of clarification to the troubling background to Professor Ferris’s project. I plan to publish an update on the topic on my coldspur website in mid-March, and I should be happy to give you an outlet for a more official and less opaque response to my original inquiry.

                Sincerely,

                Antony Percy

                As of March 14, I have not yet received a reply. This page is open for the publication of GCHQ’s eventual response.

                *          *          *          *          *          *          *          *          *          *          *          *          *

                The Spectrum App

                For better or worse, our home has a bundled arrangement for Internet, telephone and cable service through one provider, originally Time-Warner Cable, now known as Spectrum. Of course, if its service is totally down, we have to use a cell-phone to call in to ascertain whether the company is aware of the outage, and what estimate it has for service to be restored. Yet dealing with the company over its automated phone-service, what with a cheery voice alerting you to the fact that the conversation may be recorded and used for training purposes (if only!) is a pain. Instead of routing you to Technical Support when you need it, they try to address any problems you may have by resetting the modem and router remotely.

                Our handicapped daughter Julia uses in her special area a ‘smart’ television, with AppleTV installed, which was for a long time attached to a satellite receiver (for reasons that I shall not go into.) In this bonus room she watches her TV programs, plays her videogames, and watches movies on her DVD player (and reads her books, and listens to her music). I had for a long time been meaning to simplify matters, and reduce costs, by replacing that satellite link with a cable connection, and eventually got round to looking into it. I then discovered that Spectrum no longer offered cable boxes, but, on the assumption that everyone would have a smart TV, required that the customer gain access through a Spectrum App. I thus investigated it: the download worked smoothly, and it was easy to access, and then list, the channels my daughter favours. Yet I did not cancel the satellite installation immediately. Julia was used to pressing a simple button on her satellite remote control. The App required more careful navigation across screens, and a less obvious set of controls. We worked on it, she became comfortable, and at the end of last year, I ripped out the satellite box, and cancelled the subscription.

                For a couple of months, things worked fine. Occasionally, Julia would hit a problem, but I was able to sort it out quite quickly. And then, on March 1, suddenly no TV channel would work. We could hear the sound, but the screen went blank, and a strange ribbon like a time-control on a YouTube video appeared at the base of the screen. I looked around on the Web for a problem report, but found nothing really relevant, although the general advice for such phenomena seemed to be to re-boot the AppleTV and reload the Spectrum App. I did all that, but the problem remained. It looked as if Spectrum had introduced a feature that allowed viewers to handle live TV as if it were recorded, with controls like those of a DVD, but had botched it. Indeed, next time I tried the App, I did see a brief reference to such a feature, described as ‘Pause and Replay’.

                I thus called Spectrum on the Monday morning, and eventually spoke to Ryan, in New York. He was sympathetic, but he had never heard of the problem before. He recommended the steps I had already taken. We went through it again. The problem remained: I described accurately what the screen looked like. He said that he would have to refer the case to the development team, and promised that I would hear back within seventy-two hours. Thursday morning came and went, so that afternoon, I went through the whole rigmarole of calling up Spectrum again, and was eventually put through to Donald, in Florida, who was able to call up my ticket, and educate himself on the problem. He could shed no light on it: he had not heard of the problem, and could not explain why nobody had called me back. Essentially, he told me simply to wait until the picture was restored.

                By this time I was seething more than normally (I am a Big Seether), and I asked to speak to his supervisor. I was quickly put on to Richard, to whom I described my frustrations, which boiled down to the following:

                • Why had I not received the promised call back?
                • Why had Spectrum not posted on its website the fact that such a problem had been reported, and what its estimate of repair was?
                • Why had Spectrum not withdrawn the faulty App, and replaced it with the previous version (which is something I used to perform when I was handling real-time systems back in the 1970s)?

                In short, Richard was very sympathetic, agreed with the justification of my three points, said he would pass on my message, and promised to call me back the following morning with an update.

                As might have been expected, Richard never called me back. I thus went through the dire process of calling Spectrum again (I wondered about trying to use its ChatRoom facilities, but I dreaded the thought of explaining to a robot what was going on before being able to contact a live person who would also have to be educated), and eventually spoke to Teresa, in Texas. She gave me the same spiel, although she did say that the problem was now acknowledged. I think that fired me up even more, since, if that were so, why had I not been notified? I thus asked to speak to her supervisor, a woman called Amanda, who was likewise unhelpful when I remonstrated about my dissatisfaction. No, she would not tell me how many customers might be affected by the flaw in the software. No, they would not consider returning to the previous version, as it would affect too many other users. (If, as I had now been told, the problem was related to the Spectrum-AppleTV interface, they would be doing a favour to the users of that equipment, and they surely must be able to localize the variant of the App in their central command centre, so that users of other platforms would not be affected.) No, they would not post any notice on the website, since only a few users were affected. (Why did that datum matter, even if it were true?) And No, it was not Spectrum’s policy to call back affected customers, so give up on that idea. I should just retry the App occasionally to ascertain if the problem had been fixed. Yes, a refund could possibly be orchestrated. But why are you complaining? Our records show that you have Spectrum cable-boxes connected to other TVs in your house! (The only positive arising from these encounters was that all five support personnel to whom I spoke were resident in the USA, and I could thus understand what they were saying.)

                By this time, I did not want to listen to any more nonsense from any Spectrum Customer Service Representative. I replaced the telephone receiver in disgust. This is 2026: a media company is way out of its depth. It does not know how to test and deliver software properly. It does not brief its technical support agents well. It has lousy support policies.  It maintains a website which it could use to provide support information, and thus to reduce the telephone load, but chooses to do nothing. And why does it not simply give out a ticket number on the first technical support call, so that a re-entrant to the system can be asked immediately whether the call is about an existing problem, and request the ticket number to be entered? Spectrum is another large bureaucracy that shows that it is incompetent and does not really care. I simply have to keep trying the App each day (and then reloading it, in case it has been changed) until the system works again. I have carried out that task every day this past week, with the same result: the app is still defective, and I have received no communication from Spectrum as of March 14.

                I post this report simply because I can, to let off steam, and in the belief that someone else out there might find it via a Google search. And that those poor Spectrum support personnel, to whom policies are not explained, and who are not given the aids they need, may alight on it, and use it to apply pressure on their management to improve the service the company tries to offer.

                P.S. March 16th, 11:00 am. I just spent an hour on the phone with Spectrum’s Jeanne-Marie in Buffalo, NY. She spoke to the back-room boys, and then very patiently took me through a process of switching the HDMI cable connections at the back of the TV. At first things got worse, but, when I found a spare HDMI cable , and replaced the existing AppleTV connection with it, the Spectrum App worked. Very helpful guidance by Jeanne-Marie, but why could Spectrum not have taken me through this process ten days ago, if that was the nature of the ‘known problem’? Julia is very happy.

                Leave a Comment

                Filed under Economics/Business, Espionage/Intelligence, Management/Leadership, Media, Personal, Technology

                2025 Year-End Round-up

                Great Moments from the Politburo: Number 7 in a series (Stalin never forgot a slight. He had Enukidze shot in 1937.)

                This Round-up is a typical ‘C’ (‘Congenial’) Report, offering a potpourri of observations and updates, many even serious, but none too deep or complicated for holiday reading. Impress your friends at those New Year parties by being the first with the latest coldspur news!

                Contents:

                Rights of Citizenship

                The Illegals

                What about Hollis?

                ‘When Philby Met Hollis’

                Brian Simon’s Mischief

                Lights! Camera! Action!

                Agent Werther

                Arthur Crouchley and the Contribution of Memoir

                VENONA: When did the Soviets Rumble It?

                The Mysterious Other Leggett

                Jane Archer

                The Letter to GCHQ

                Some Books Read

                Postal Woes

                ‘Le Genou de Coldspur’

                ELLI Unmasked at Last!

                Quotation of the Month:

                “A man in his eightieth year does not want to do things.” (Winston Churchill, from p 238 of Lord Moran’s Churchill: The Struggle for Survival 1945-1960, on December 30, 1953. I started my eightieth year on December 16, 2025.)

                Rights of Citizenship

                In my presentation at Whitgift School last September, I pointed out how unbalanced the laws of the United Kingdom concerning British citizenship had been in the 1930s and 1940s. The Soviet intelligence services (OGPU/NKVD and GRU) exploited the fact that, if a British man married a foreigner, that spouse would automatically gain the benefits of being a subject of the UK. Thus the Soviets were able to send to the United Kingdom three agents who had the legal cover of living and working there, namely Litzy Philby, née Kohlman, divorced from Karl Friedmann, Edith Tudor-Hart, née Suschitzky, and Ursula Beurton, née Kuczynski (agent Sonia), whose marriages were imbued with controversy.

                When Kim Philby married Litzy in Vienna in February 1934, it enabled Kim to exfiltrate his new wife from the threats to her safety caused by her subversive work with the communists. My belief is that Moscow at that time regarded Litzy as the prime asset in the marriage: Kim was an unknown quantity who had obviously expressed communist sympathies through his actions in Vienna, and across the Austrian border, but it would take time for him to be able to insinuate himself into any position of strategic access to secret information. In 1933, Edith Suschitzky married Alex Tudor-Hart, a doctor of leftist views, whom she had met in 1925, and they fled Vienna for England (and then Wales) that year so that Edith could escape persecution. I do not believe that Edith’s role and importance were ever so mighty as others (especially Anthony Blunt) have made out. Ursula Kuczynski had married Rudolf Hamburger in 1929, but their union had broken down by 1939, when he left Switzerland for China. In 1940 Ursula’s visa was about to expire, and the fascist threat to her was looming. Owing to perjurious testimony from Alexander Foote, Ursula gained a divorce from Rudolf, and with the help of the MI6 office in Geneva, married Len Beurton and managed to escape via Portugal to a new life in the United Kingdom. Her career will be familiar to regular readers of coldspur.

                While the Beurtons stayed married until their sudden flight to East Germany in early 1951 (and enjoyed the rest of their life together), the Philbys drifted apart soon after they settled down in London. Yet they failed to divorce – a bizarre lack of an action that would have helped Kim’s cover. Even the ‘divorce’ that Kim claimed to have occurred in 1946 is bereft of any evidence, and was logistically unlikely, so his subsequent marriage to Aileen Furse in September of that year may have been as bigamous as was Ursula Hamburger’s to Len Beurton, or Litzi’s to Georg Honigmann. It has occurred to me that the lack of pressure imposed by the NKVD on Philby to distance himself from his wife may have been due to its institutional belief that Litzy would lose her citizenship if she were no longer married to Kim, could lose her right of residency, and thus her utility as an agent would be destroyed. (Where she would have been expelled to in wartime would have been a puzzle.) Yet that was not the case. Foreign women who had so wisely selected a Briton as their partner were allowed to continue to enjoy the fruits of their decision even if the marriage failed.

                That was not how it was with British women, however. Lasses were supposed to marry a solid British husband, not Johnny Foreigner. As Clare Mulley explains in her recent biography of Elżbieta Zawacka, Agent Zo, when Audrey North, a WAAF attached to the Special Operations Executive who had been brought up in Croydon, Surrey, fell in love and married a Polish officer named Kazimierz Bilksi, known as ‘Rum’, in 1944, she automatically lost her British citizenship, according to the laws of the time. When their son, Andrew, was born in 1945, Rum realised that his future lay in Britain, he settled in Croydon, and eventually became a naturalised British citizen in 1954, thus restoring his wife’s nationality, and passing it on to their children. The law that had deprived Audrey of her citizenship and allegiance had been repealed in 1948, but it had no retroactive effect.

                Andrew Bilski started his education at Whitgift School a year before me, in 1955. I do not recall our ever being in the same class, but I remember him as a serious, beetle-browed young fellow. He wrote an unpublished memoir about discovering some of his father’s secrets as a daring officer in the Polish Army, titled Secrets of the Green Box, which Ms. Mulley was able to use in her book. I wonder how much Andrew knew at that time about his father’s exploits. Probably not much. Most men returning from the war were not outgoing about what they had seen and experienced, and (from my experience) ten-year-olds regarded whatever familial background they had experienced as simply being the norm, and buckled down simply to stay out of trouble, and learn from what they saw and heard.

                I am not sure how to categorize this obviously masculinist legislation, with its uneven treatment of native British and foreign women, the latter being treated preferentially. Presumably, when it was crafted, the lawmakers believed that other countries would have enacted similar laws. (A research opportunity for someone.) Yet the declaration includes some strong paternalistic Victorian sentiment, satirized by W. S. Gilbert. “But, in spite of all temptations, to belong to other nations, she remains an Englishwoman” not only does not scan, it was also verifiably untrue, as Audrey North found out. And then, in 1948, Enlightenment occurred with the passing of the British Nationality Act, although I doubt whether it became law because of the Bilskis.

                The Illegals

                ‘The Mitrokhin Archive’

                After reading my review of two books on Soviet and Russian ‘Illegals’ in my June posting, a correspondent wrote to me in early August, pointing out a few relevant chapters in The Mitrokhin Archive, compiled by Christopher Andrew from the resources of Valery Mitrokhin. He wondered whether I had overlooked what the book said about the ‘Illegals’ program. Now, I have to confess that, when I tackled this work several years ago, I SKIMMED it. I concentrated on those sections that were most important to me at the time, and failed to notice much engrossing material, of which Chapters 10, 11 and 12 constitute an important part. I have now resolved to return to those chapters.

                I had traditionally thought of ‘Illegals’ as foreign citizens, working on behalf of the RIS, gaining residency in a Western democracy by means of forged identity papers, or passports acquired by illicit means. They worked in parallel with the ‘legal’ residency that functioned under the aegis of the Soviet Embassy, and were thus not protected by diplomatic immunity should they be detected in any illegal activity. By these criteria, Arnold Deutsch (who is widely celebrated as being one of the ‘Great Illegals’ of the 1930s) was not an Illegal, since he came to the UK using his own name, with a valid passport, and a declared motive of study. So long as his activities were confined to missionary work, and clandestinely recruiting agents to the Communist cause, he was a subversive, but not an Illegal. If, however, he had progressed to activities such as accepting confidential information, and acting as a courier, he would have become part of the illegal agent network. Thus there are three aspects of ‘Illegality’: false authorization of identity and residence; complementary function to the legal intelligence entity; and engagement in illicit behaviour. It occurred to me that these categories could be defined more carefully: indeed, I posited to myself that they could be covered by respective adjectives, namely ‘unlawful’, ‘clandestine’ (the default ‘illegal’,) and ‘illicit’. In turn, these have their Russian equivalents: ‘bezzakonniy’, ‘nelegal’niy’, and ‘nezakonniy’.

                Having made those distinctions when I retrieved my electronic copy of The KGB Lexicon, edited by Valery Mitrokhin, I concluded that the KGB had perhaps confused the first two aspects of the term, but that the network aspect rightly dominates. ‘Illegal’ is an overloaded noun. The generic term for an ‘illegal’ in Russian is ‘nelegal’, and the Lexicon divides the group at a high level into the ‘razvedchik-nelegal’ (the illegal who is a career intelligence officer, often referred to as ‘cadre’, although that word does not appear in the Lexicon), and the ‘agent-nelegal’ (the agent of various heritage, who is not a member of the KGB, but who may have benefited from training alongside career officers). But what would a career intelligence officer be doing under cover with a false identity in a foreign country? On the other hand, if he were part of the Embassy staff, but acting as a controller of the ‘Illegals’, would he not enjoy the protection of diplomatic immunity? Overall, however, it is the status of the network, namely whether under diplomatic cover or not, that is the primary definition of ‘illegal’. Thus Deutsch, despite his proper credentials, would be classed as an Illegal because he operated and communicated apart from the official rezidentura.  I shall return to these definitions, since a glimpse of what Mitrokhin had to say was a bit of an eye-opener. I am going to have to defer proper analysis to a later coldspur post, however.

                P. S.  As I was putting this piece to bed, and going over it with my Chief Sensitivity Reader, I came across a passage from Peter Wright’s Spycatcher, on page 381, that I must have overlooked. Wright is discussing ELLI with Burke Trend, who has just remarked that there is no mention of ELLI in the intercepted traffic. “But I didn’t expect there would be”, replied Wright. “ELLI is an illegal, and, if that‘s the case, his communications would be illegal, not through the Embassy. If we found Sonia’s traffic, I am sure we would find ELLI. But we can’t.” So ELLI was an illegal, was he? That would appear to exclude Hollis from the lists of suspects, would it not? And since Sonia was in the country legally, as a British subject with a public identity, where would that place her? Moreover, after an initial foray, she sent all her information from Fuchs via her brother to the Soviet Embassy. Where does that leave things, Peter?

                Daydreaming, I also noticed that ‘ILLEGALS’ spelled backwards becomes ‘SLAG ELLI’.  I happened to read recently a story on the Internet that claimed that the ‘Great Era of the Illegals’ was all a hoax, since ELLI had infiltrated it as early as 1933, and passed on its secrets to MI5. The result was that several illegal cells were disbanded, and many of its members soon revolted in a campaign against the traitor, demanding he reveal himself, and then decamp. [Is this true? Ed.] Reading about that little saga prompted me to come up with a suitable palindromic summary: “OGPU Illegals wonder if ‘Era’ was stolen: indeed, nine (lots saw) are fired, now slag ELLI: “Up! Go!!”’.  Is that significant, perhaps? I know that my correspondent Michael Morris would think so. In any event, it acts as a perfect segue into the next section.

                What about Hollis?

                One of my correspondents recently asked me (before my October posting on Hollis during World War II): “Do you know if the suspicions about Roger Hollis have definitely been laid to rest?”. I was intrigued, since it was on the surface a very valid and important question, but it is essentially unanswerable. After all, where is the Court of Appeal in which such matters might finally get resolved? On the other hand, there is no ‘definitely’ or ‘finally’ in historiography, as we who analyze the evidence should accept that something new will always come along, and conclusions may have to be revised or annulled. There should, however, be some open ground where the state of the game can be assessed.

                So to whom should we look for a jury? To the experts and doyens? Nigel West seems to have gone into retirement, and is not publishing much new. Christopher Andrew, who may not even be responsible for the books now coming out under his name, has likewise largely disappeared from the public sphere. Moreover, he must have undermined his authority when he firmly announced, after collaborating with Oleg Gordievsky, that ELLI was certainly Leo Long. Richard Aldrich writes some splendid prose, but is frequently careless, and Calder Walton is likewise not disciplined or inquisitive enough to step into the shoes of intellectual leadership. By a similar token I see Michael S. Goodman, Charmian Brinson and Christopher Murphy as doughty chroniclers unwilling to put their head above the parapet. Jonathan Haslam has performed some impressive work, but lacks a strong public image, and now concentrates more on current politics. Rhodri Jeffreys-Jones? I had almost forgotten him. He has been productive, but has focussed more on USA matters, as has Christopher Moran, after his useful and entertaining Classified was published in 2013. Stephen Dorril, of MI6 and Lobster, is still around, but has been quiet recently. Michael Smith is another historian of MI6, and, while describing himself as a ‘journalist’, has been productive for a number of years writing books on intelligence. Ben Macintyre sparkles, but he is a journalist, not an historian, and we don’t forget his stumbles over Sonia. John Hughes-Wilson was an outside candidate, but he died recently. Richard Norton-Taylor, sometime with the Guardian, has been praised as a ‘doyen’, but he is more of a playwright than an historian, and, apart from a shared work on trade unions at GCHQ, has not undertaken the arduous process of writing a book.

                What about the serious journals? I do not subscribe to any of the major three, the Journal of Intelligence and National Security, the Journal of Intelligence History, and the International Journal of Intelligence and Counter-Intelligence (all part of the Taylor & Francis stable), owing to that outfit’s punitively expensive policies for the independent historian. Yet, from a scan of their recent Contents pages, I conclude that I am not missing much. JINS appears to concentrate on more theoretical and sociological aspects of intelligence, JIH, naturally, on the historical, normally going back some way beyond the events of the last seventy years, while IJICI assumes more of an ethical stance. They all seem rather cautious in their approach to recent controversies (as does History Today, by the way). It is as if the problematic events of half a century (roughly from 1934, when Philby was recruited, to 1988, when Spycatcher was cleared for sale), are too remote to be of current interest, but too recent to be re-assessed seriously, because so much of the relevant archival material remains unreleased.

                What is really needed is a forum to thrash these matters out. The Cambridge Intelligence Seminar (convened by Professor Andrew) would appear to be a good candidate, as the topics it offers are generally relevant. Yet it all looks rather exclusive, the talks are spread across individual days in the termtime, and its seminars are not record for posterity. The convention needs to be more public, more formal, more structured, and held in London. Might an institution such as the Royal Historical Society host such a show?* In that way, outstanding questions could be aired and discussed, and some methodology applied to processing the fruits of such as Chapman Pincher or Peter Wright, who have influenced public opinion so unduly. Perhaps a two-day seminar at Lancaster House? I would be delighted to contribute, as I could offer opinions on a number of fascinating topics. Indeed, I discussed this challenge in a coldspur piece in 2018, where I even presented ‘An Alphabet-Sized List of Intelligence Mysteries from WWII & After’ (see https://coldspur.com/confessions-of-a-conspiracy-theorist/). That list is a mixture of the wildly controversial and the mildly absorbing, so I would reconstruct it to focus on topics of major interest. I thus present the following intelligence conundrums:

                1. Who Was ELLI?
                2. How Did Burgess and Maclean Manage to Escape?
                3. Was Philby ‘Always Working for SIS’?
                4. Why Did Flight PB416 Crash?
                5. How Did Blunt Stay Unmasked for So Long?
                6. Was PROSPER Sacrificed?
                7. Did Gibby’s Spy Exist?
                8. Did Borodin Defect? Why Has His Case Been Suppressed?
                9. Why Were the Germans Taken In by Double-Cross?
                10. Why Was Agent SONIA not Detected?
                11. How Much Damage Did George Graham Cause?
                12. Did ter Braak Commit Suicide?
                13. Did Churchill Use the Rote Drei to Pass ULTRA Information to Stalin?

                These items should probably be pared down to a core of ten, which would provide a substantial feast. And then perhaps a book could be written on them, to provide a ‘state of the art’ summarization to satisfy my correspondent’s question. Is there anyone out there with contacts at the Royal Historical Society, or a publisher, to get things weaving? I am ready to play my part.

                [* I am reminded of those important scientific congresses that took place, mostly in the nineteenth century. Gordon Rattray Taylor pointed out how disputatious matters were addressed when he wrote: “  . . . when a panel of eminent geologists was asked to vote on the question ‘Is Eozoon canadense of organic origin?’ at the International Geological Congress of 1888, the vote was ‘No’ nine to four.”]

                ‘When Philby Met Hollis’

                A short time ago, I read somewhere that Roger Hollis had divulged to Kim Phlby, probably in 1945, how his F2 organization worked. Since I had claimed to cover Hollis’s activities in WWII quite comprehensively two months back, I thought to ought to investigate this story while the events were still fresh in my mind, and not too much water had passed down the Volga. It turned out that the account of the event appeared in a report that Philby sent to his controllers in Moscow, and it is published in a compilation titled The Secret Agent’s Bedside Reader, edited by Michael Smith (the author of Part 1 of a history of MI6 up to 1939, titled Six: I am awaiting the second volume), which was published by Biteback in 2014. I therefore had to acquire it, and indeed, a statement at the end of the chapter claims that ‘the above document is held at the SVR Archives in Moscow’. Who accessed it, and how it was delivered, are not stated, but it looks kooky enough to be both genuine and authentic.

                ‘The Secret Agent’s Bedside Reader’

                Smith’s Introduction states that Philby’s report was in fact written in October 1944, when Philby was ‘in his new role’ as head of Section IX, the Soviet counter-espionage unit. Philby did not assume leadership until Curry relinquished it at the end of the year, but he was obviously waiting in the wings at this stage. The interview was at Hollis’s request, seeking future collaboration with him and his own anti-subversion section, F2, which was then working out of Blenheim Palace.

                One might step back and consider the possible combinations of roles and knowledge assumed by Hollis in engaging Philby: what were his intentions? I see four profiles:

                1. Hollis is a penetration agent (of the GRU), and believes or knows that Philby is likewise (of the NKVD).
                2. Hollis is a penetration agent, and believes Philby to be a loyal British intelligence officer.
                3. Hollis is a loyal British intelligence officer, but suspects that Philby may be a Soviet agent.
                4. Hollis is a loyal British intelligence agent, and believes that Philby is likewise.

                If ‘1’, Hollis and Philby (especially if the latter knows of the former’s role) would be very cautious about meeting alone. Besides, Hollis would have already informed his controllers of his organization, and would not deem it necessary to brief Philby, certainly not at length. Philby would wonder why he was being told all this: he gives no indication in his report of Hollis’ allegiance as a ‘friend’.

                If ‘2’, Hollis might want to go through the formalities, but would not want to give Philby more information than he really needed to know. He would not have wanted any exterior officer snooping on his turf, and would have waited for an overture by Philby.

                If ‘3’, Hollis would be very cautious about giving Philby any information at all. He would have raised his suspicions with his boss, Petrie, who, if he shared Hollis’s knowledge of Philby’s history and was suspicious of his apparent volte-face, would have supported his policy of reticence.

                If ‘4’, whether he thought that Philby had always been clean, or had the insider knowledge that in 1939 he had switched his allegiances, and trusted him, Hollis would have warmly welcomed Philby’s imminent appointment, and sought out ways to collaborate. There were no other reasons to doubt Philby’s loyalty in 1944.

                The sketch that Hollis gives Philby has some intriguing highlights. He tells him that B Division was split into two ‘as the war got under way’, with one part dealing with enemy espionage and sabotage, and the other with subversive political movements and Soviet espionage, from which F Division was born. (We know that this is not completely true, however, because of Dick White’s shadowy operation against the Beurtons, for instance.) He describes how F2 (the anti-communist section) is split into three, with Hugh Shillito having a symbolic supervisory role in heading F2B (it was better to have a man in charge!), which is in practice run by Milicent Bagot. Bagot deals with foreign communists in the UK, Shillito with Soviet espionage, although how they divvy that work out, or make their determinations, is not clear. Hollis considers Bagot the most valuable member of the whole Division: she has been working on the transnational Communist problem for over twenty years, and has an encyclopædic knowledge of the subject. (Not information you would want to pass on to a suspected spy.) While Hollis judges that Shillito works well on details (such as his work on the Oliver Green spy case), he says that he is not so comfortable with the broader picture.

                Hollis then continues to describe various techniques and relationships: his dealings with the ‘Watchers’; his use of Maxwell Knight’s agents, who spy for the whole of MI5; telephone checks and postal censorship; and most vital of all, the microphones inserted in CPGB headquarters, from which F Division derives ‘about seventy pages of information a day’. Philby overall gained a good impression of Hollis, who, he said, put forward ‘the view that Soviet policy might well be designed to make the Anglo-Soviet pact a reality, and consequently to temper the revolutionary spirit of the Communist Party’. (Dream on, Roger!) Hollis added that it was very difficult to monitor the Russian [sic] Embassy or the Russian Trade Delegation, and no Soviet officials were being shadowed partly owing to the timidity of the Foreign Office.

                Philby also shows from his report that he has been in direct contact with David Clark of F2a. Clark offered him useful information about the Springhall case, and updated him on the escape of Graur (see https://coldspur.com/to-be-perfectly-blunt/ ), who left the UK a few days after Springhall’s arrest. Clark also told him how he had tricked the name of Desmond Uren (the spy in SOE) out of Helen Grierson in Glasgow, and Clark also pointed him towards two defectors (one named Yegoreff), both former NKVD officials who had been captured by the Germans. One of these had told the true story about the Katyn massacre.

                Thus it sounds like a second-rate but loyal officer trying to bolster his achievements, and foolishly giving away more than he needed to. Philby lapped it up.

                Brian Simon’s Mischief

                Brian Simon

                In my September report, I described how I had studied the material concerning Brian Simon’s visit(s) to the Soviet Union in the 1930s, viewable at the Library of University College, London. I pointed out that the first file in the ‘Visits Abroad’ section, 6/1, is simply titled ‘Soviet Union’, but contains no text of memoir, only a selection of photographs and postcards. I showed, however, that one of the postcards was dated 1936, so it obviously could not have been gathered while Simon was on the well-documented 1935 tour of the Soviet Union with Anthony Blunt, Michael Straight, Michael Young, Christopher Mayhew, and other worthies. On my return to the USA, I was able to inspect the remaining Simon PFs that Kevin Jones had photographed for me, and I discovered that he had indeed been detected in visiting the U.S.S.R. since his initial tour.

                The evidence is at sn. 8a in KV 2/4175, and is dated September 1, 1937. When Simon arrived at Dover from Calais, an immigration officer checked his passport, and noted that Simon ‘has recently visited the U.S.S.R.’. Since all sailings from the UK to Leningrad were carefully watched (and Simon was already being surveilled because of his communist sympathies), it is clear that Simon must have travelled to the Soviet Union via another country, and that, furthermore, his visa arrangements must have been made surreptitiously on his behalf, which is somewhat alarming. He could not hide his itinerary completely, as there must have been entry and exit stamps from the intermediate country. J. Blackburn of Special Branch put in his report, noting that ‘a discreet search of his baggage by H. M. Customs revealed nothing of interest to Special Branch’.

                MI5 must have taken a sharp interest, because, on September 10, the Passport Office replies to a request from a Miss Tughill [?] to see Simon’s Passport Office file. Indeed, the request appears to have been submitted by Kathleen (Jane) Sissmore via S.3.a, since the signature indicates ‘M.G. for K.M.M.S.’, and a request was received for the papers to be returned on September 15. The request contains the Passport number (LO 49049) and simply echoes the statement that Simon ‘recently visited U.S.S.R.’ Someone has inscribed: ‘1935 – or more recently?’, which would suggest a keen interest in knowing more about the subsequent visit. ‘Recently’ does not sound like 1935, in this context, yet the outcome of the inspection has been lost.

                Nothing much happens until January 1940, when an anonymous memorandum, probably from ‘DVW’, is sent to Roger Hollis, asking for information on Simon, since he has been reported as being in touch with ‘various aspects of the Student Movement in India’ – always a dangerous threat of subversion. On February 2, Hollis replies to ‘I.P.I.’ (not the International Press Institute, but an MI5 department involved with Indian affairs). He provides some details about Simon’s career to date, mentioning that he spent a months [sic] holiday in Russia in 1937, but writing nothing about the suspected follow-up visit. Rather a lazy effort, Roger, but why had your recent boss, Jane Archer, not followed up and made an entry in the file? If a customs officer could spot an anomaly, why could B4 not do the same?

                As I recorded in a note to my August piece on Astbury and Simon, I spotted also an entry in Goronwy Rees’s PF (KV 2/4608, sn. 400c), dated May 2, 1966, where Peter Wright recorded an interview with Blunt. He wrote: “That, so far, people identified as spies had not suffered the due consequences of the law. For instance, he himself, Leo LONG, John CAIRNCROSS, Brian SIMON and Peter ASTBURY were all still free men.” That would appear to seal the deal for Simon as Number Eight of the Cambridge Spies. (It is an extract, paragraph 5, from Wright’s full report on the interview on April 27, available in Blunt’s PF at KV 2/4709, sn. 439b.) It is possible, of course, that Wright may simply have been echoing Blunt’s anecdote about Simon and the GRU. Simon may have been an agent, and a dangerous one, but never actually handed over any confidential material. The significance of this posting is that the hint about Simon had been in the public domain for three years before the full record was issued in the Blunt PF earlier this year.

                Simon was a thoroughly bad lot, and I suspect there is far more to be discovered. I was slightly amused, when dipping lightly into his file of correspondence at UCL, to find an exchange of letters between him and Boris Ford of the Turnstile Press in December 1955. Simon had submitted an article titled ‘Educational Standards in the U.S.S.R.’, and Ford had rejected it on the grounds that it was not objective and lacked evidence to support its conclusions. Simon was indignant, and responded with one of those ‘Don’t You Know Who I Am?’ letters. But Ford stuck to his guns, and carefully and politely spelled out where he thought the article was at fault. At least Simon kept a record of the correspondence.

                Lights! Camera! Action!

                I have recently referred to the fact that I have been slowly catching up with my movie-watching: last January I reported that I had just watched The Fourth Man, and expressed my intent to watch Philby, Burgess and Maclean, distributed in 1977. I achieved that goal this summer, and also re-watched Tinker, Tailor, Soldier, Spy (the original with Alec Guinness), as I had only a hazy recollection of the action, although certain scenes (Jim Prideaux at the preparatory school, the interviews of Connie Sachs) had imprinted themselves quite sharply on my mind. It was an intriguing exercise: PB&M was quite well done, I thought, although it suffered from having been created before the Blunt disclosures came out, and his absence from the screenplay made it rather awkward and flat. And I had to sort out what the actor Anthony Bate was up to. He played Philby in PB&M, but I thought he was badly miscast, not having the charm, guile and personality that attended the real Kim: Bate was much more appropriate as the rather dull civil servant Oliver Lacon in TTSS.

                ‘Tinker, Tailor, Soldier, Spy’

                Seeing TTSS again was something of a surprise. First of all, I had to watch the American version, which was compressed from seven into six episodes, with the consequent loss of several scenes. I am sure that the conversations between Smiley and Sachs were one of the casualties, as I remembered them being much longer in the British TV series in the autumn of 1979. I had completely forgotten the marvellous encounters between Smiley and Roddy Martindale, the latter played with great panache and style by Nigel Stock, who had been a memorable Dr. Watson. In my naivety, I had back then utterly failed to grasp the significance of the relationship between Ricki Tarr and Irina, which was now all clarified. I appreciated much more the feline performance by Michael Aldridge as Percy Alleline. And Smiley was exactly as I had remembered him, down to the polishing of his eye-glasses.

                Yet I was shocked – yes, shocked – by one scene in particular, and that was the ambushing of Jim Prideaux in Czechoslovakia, as he goes out to try to rendezvous with the Czech traitor General Stevcek. (Prideaux was played, incidentally, by that fine actor Ian Bannen, whom I had first seen as a very striking Hamlet at Stratford in 1961.) Readers may recall my bewilderment at the clumsy plotting, and absurd melodrama, of le Carré’s The Spy Who Came In From The Cold, in 2022 (see https://coldspur.com/2022-year-end-round-up/), when I commented on the highly improbable way in which Leamas and Nan Parry were allowed to escape to the Wall, only to be shot down. The shooting of Prideaux was an exact echo of that shoddy misrepresentation of how a Communist secret police force would act. They would have spirited Stevcek away, and arranged for Prideaux to have an unfortunate accident. What they would not have done would be to set up a noisy and attention-drawing shoot-out, the details of which were bound to have escaped after the event. Not only that: dozens of sharpshooters appear to be on the scene, but their aim is so bad that Prideaux receives only a couple of non-fatal bullets in the back, which allows him to be captured alive. And then he is later exchanged in a spy-swap, so that he can recount the gory details on his return. What was le Carré thinking?

                It occurred to me that perhaps the screenwriters had got carried away, and that the author might not have been aware of what they did, or that he had been overridden because the producers needed some action. But that didn’t sound like our old chum le Carré, at all. So I went back to the text: pages 250-251 in my 1975 Pan edition. There it all is – theatrical shooting, floodlights, flairs exploding, Very lights going up, even tracer. Driving the car away, ‘he was almost clear – he really felt he was clear – when from the woods to his right someone opened up with a machine-gun at close quarters.’ More bullets flew. “The woods must have been crawling with troops.” Two shots caught him in the right shoulder, and then an ambulance came. (It was thoughtful of the Czechs to arrange for emergency medical services in the event that there might be non-fatal casualties from the assault.) But had it not been the intent of the Czech secret police to murder Prideaux, what with all that fire-power? Machine-guns?? So why did they take so much trouble to try to kill him, if they needed to grill him about the organization back in London? In any event, he was taken to a prison, interrogated intensely, and then to a camp, where he recuperated, until one night ‘he was taken to a military airport and flown by RAF fighter to Inverness’. Just like that. “With one bound Jack was free.”

                The Bodleian Library: John Le Carre’s Tradecraft

                The flaws in le Carré’s understanding of espionage tradecraft were brought home to me when I read about the current exhibition at the Bodleian, ‘John le Carré: Tradecraft’, an attempt to highlight the writer’s craft with the pen or typewriter. For instance, Literary Review of November 2025 offered a two-page encomium to the author’s meticulous plotting, referring to ‘the intricate grisaille of his fiction’. (“Search me, guv.”) John Phipps (whose qualifications are stated to be that he ‘is a contributing writer for The Economist’s 1843 magazine, and lives in London’) went on to write: “Yet as this exhibition makes clear, he worked hard to leave his readers with an impression of more-than-fictional truth. ‘Espionage is one of the few proud cases’, he [le Carré] once wrote, ‘in my thoroughly biased view, in which historical truth has been better served by fiction than by  . . . confections of warmed-up fact.’” Towards the end of his appreciation, Phipps wrote: “No one could match the brilliance of his plotting, or imitate the unfolding and rambunctious poetry of his prose.” No further questions, m’lud.

                Agent Werther

                ‘Hitler’s Traitor’

                One of the most astonishing books I have read this year was Louis Kilzer’s Hitler’s Traitor. I do not recall where I saw the reference to it, or the recommendation for it, but its subject matter made it a must-read. The topic is the betrayal of German battle plans through the Red Army spy-ring in Switzerland to Moscow Centre. It was published in 2000, but for some reason I had overlooked it, despite my deep interest in the activities of the Rote Kapelle, Agent Sonia, Alexander Foote, Rado, and all the rest of the gang, about which I have written much. The author’s thesis is that the source of the information, known as Werther, was none other than Martin Bormann, who had replaced Rudolf Hess, after the latter took flight to the UK in 1941, as head of the Nazi Party, and was a close adviser to Hitler. Kilzer died last year.

                Apart from indicating that Bormann had motive (he was a secret admirer of Stalin’s communism), opportunity (he was present at all cabinet meetings, and controlled the secretariat that recorded decisions), and means (he had access to a private Enigma machine and transmitter that could make contact with agent Lucy in Switzerland, similarly equipped) Kilzer founds his case on the assertion that Soviet archives show that the nature of the intelligence sent (such as who attended particular meetings) could have come only from someone in Bormann’s position. While giving due credit to the notion that Churchill revealed Enigma-derived intelligence, in disguise, via the Swiss network, using the known entity Alexander Foote as the wireless transmitter, Kilzer asserts that the British could not have derived the variety of specialized information which the Soviets received from intercepted and decrypted Enigma messages. (And nor could spies like John Cairncross, for example, who was awarded a medal for his intelligence on Kursk.)

                I found this thesis quite extraordinary. The idea that a high-up like Bormann could endanger himself and others in such traitorous behaviour, causing the loss of life of hundreds of thousands of German and other Axis soldiers, and get away undetected, simply did not make sense to me. (Other traitors have been suggested in the literature, such as Oster, but they also fail the smell test.) How the Gestapo and the Funkabwehr could not have noticed that a couple of spare Enigmas were being regularly used, and that their resultant communications were not picked up, defies comprehension. Moreover, the exercise would have required a vast effort of diligent work performed by clerks and others to compile the information, and keeping those activities clandestine must have been an enormous challenge. Furthermore, Kilzer claims that Moscow was so impressed with the intelligence received that it sent detailed questions back, which were sometimes answered within twenty-four hours.

                For example, I quote the following nonsensical passage (p 172):

                            The next day, the Center ordered Rado to get from Lucy ‘information on the Caucasian front and the most important news on the eastern front as well as the dispatch of new divisions to the eastern front without delay and with priority over all other information.’ [Source: RG 319, Box 59]

                            Werther acted immediately. Within twenty-fours of receiving [sic!!] this request, the Center sent the Swiss net the following message: ‘Our thanks to Werther for the information on the Caucasus front.’ [Source: Rado, p 153]

                It was here that my credulity snapped completely. If one considers the stages that messages had to go through, such speed was physically impossible. By the end of 1943, Foote was the only radio operator left, and he had to take on the whole load himself. Rado did not operate a receiver/transmitter. Foote did not know any Russian: he had some French and elementary German. He had his own codes. He received instructions from Moscow, which must have been sent in English. He claimed he did not have time to read the messages he processed, implying that they were written in English before he decrypted them. That means that questions would have to be translated from Russian to English before being sent to him. He then had the arduous task of decryption, which often kept him up all night (from 11 pm to 9 am). Any encryption/decryption or transmission errors would mean that the process would have had to be re-started.

                What next? Foote resided in Lausanne. He had to take the transcribed messages to his boss, Alexander Rado, at a pre-arranged meeting-point, probably after a phone-call. Rado lived in Geneva, about fifty miles away. After they had been handed over, someone would have to translate them into German, perhaps Rado, perhaps the next person in the chain. Rado (who never met Lucy, a man named Roessler) then had to travel to Lucerne to meet Roessler’s cut-out, Rachel (Sissy) Dübendorffer, who was very protective of her source, and did not allow anyone else to meet him. Lucerne is about one hundred and sixty-five miles from Geneva: more impromptu arrangements to be made for the handover, and then a meeting with Lucy arranged. After translation, Roessler would have to start work on his Enigma in order to get the requests to Berlin as fast as possible.

                The ENIGMA machine in operation

                But the Enigma was not an automated transmission device. It was an encryption machine. Photographs of the device in use show that it really required two operatives to use it effectively –  one to dictate the source message, and another to enter the characters for encryption and read out the result from the illuminated panel, so that the first operative could transcribe it. That would have been an immense challenge for Roessler, who was not known for being savvy with advanced equipment, and had not evidently undergone specialized training. He would have worked at night as well, so someone (or preferably two persons) would have to be available all the time the other end in Berlin to receive the message, decrypt it, and present it to Bormann for analysis and action. And then the whole operation would have to be initiated in reverse.

                Kilzer never analyses the logistics of this whole enterprise, let alone suggests that it is a problem in his theory. He just ignores it. And I have not yet found anyone who throws cold water on his story. Yet it is patently absurd to conceive that such exchanges could occur so smoothly over such distance, and through such a long chain, with all the corollary complications that I have spelled out. You can look up Wikipedia for the Rote Drei, and Lucy, and Werther, etc. etc. , but the entries are a complete mess, tripping over each other with contradictory claims. Kilzer’s book is mostly totally ignored. (I encourage anyone who has found a serious and deep review of the book to let me know where I may find it.)

                So what is the explanation? First of all, the Soviet archives may be largely a hoax – some reconstructed items to accompany what were genuine messages, perhaps in an attempt to annul the fact that the Red Army had depended on help by Great Britain. Thus the exclusive link to Bormann and his cabinet could be an utter lie. Second, there might have been a direct link from Berlin to Moscow, but that again raises such security and detection issues that it hardly seems possible. (The Harnack/Schulz-Boysen cell of the Rote Kapelle, which did transmit to Moscow, had been discovered in the summer of 1942.) It is true that the Nazis did exploit the Trepper network in Brussels for a while, sending a mixture of false and accurate intelligence back to Moscow in a Funkspiel. It started in December 1942, but sent mostly low-grade information of local interest, and of scant military value, in the months in which it worked through 1943. And above all, why, since the Nazi authorities must have been able to detect the transmissions, did they allow them to continue?

                Perhaps readers will understand why Item 13 in my list of conundrums (which I compiled before I finished Kilzer’s book) is so important, but it should probably be restated, probably along the lines of ‘What other channels apart from MI6’s link to the Rote Drei were used to send vital Nazi battle-plan information to Stalin?’

                Arthur Crouchley and the Contribution of Memoir

                I have occasionally pointed out how enlightening it would be if some previously unknown memoir, or batch of letters, were to surface that might shed light on some of the perplexing events in intelligence and counter-intelligence during the critical mid-twentieth century. Indeed, that resource might be the sole contribution should the absurdly restrictive practices of UK government departments endure. Perhaps David Petrie’s Diaries (which were in fact written, but then destroyed at the author’s bidding, as Christopher Andrew tells us) might magically be found? The trove of letters found at Burgess’s flat after he absconded? Jane Archer’s Diaries? The Aileen Furse-Flora Solomon Letters?

                I was thus excited when I met a very spry Anthony Morris, in his nineties, when I gave my talk at Whitgift School. He had come from Nottingham to hear my presentation – his first visit to his old school in sixty years. And he generously showed me some notes that his father-in-law, Arthur Crouchley, C.B.E., had compiled. Crouchley had joined MI6 in 1946, and risen to become Northern Area Controller. I gratefully promised to look into them, and to try to work out to what exactly they referred, and on what they shed light.

                There were three passages that caught my interest. The first ran as follows:

                The defection to the Soviet Union of Maclean and Burgess in 1951 caused major problems for SIS. The Soviets had changed their codes and moved over to OTPs (One Time Pads) and this had a devastating effect on GCHQ whose reports to us virtually ceased. The fruits of years of work and substantial expenditure vanished almost overnight .  . . . The view initially held in the Office about the disappearance of Burgess and Maclean was that they had merely ‘gone on a binge’.

                I was puzzled by this statement, as it did not tally with my sense of chronology. I had an exchange with Morris to try to pin down further details, but he sensed that Crouchley, who recorded these reminiscences only in the late 1980s, might have misremembered the events. I believe that there was a lot of disinformation being passed around at this time. I suspect that the information being passed by GCHQ to SIS was in fact VENONA material. When the Burgess/Maclean fiasco occurred, at a high level, I imagine that the cabal of Strang, White, and Menzies decided not to release any more, as it might disclose far more than the senior officers wanted revealed. Crouchley and co. may have been told that it was because the Soviets had changed to OTPs, but that was a fiction. The ‘secret’ of VENONA was that OTPs had already been deployed for well over a decade, but had undergone a challenge in 1942, when, under pressure, the NKVD reused OTPs and distributed them to all dependent stations and sections as new. The Soviets had learned, from Weisband and Philby, of possible breakthroughs in decryption made by GCHQ and NSA, and had, as a response, issued new codebooks and OTPs. The last VENONA decrypts occurred in August 1948, when the Australian Embassy belatedly replaced its OTP. (This is a simplification of a story that needs refining: I expand on it in the following section of this report.)

                Thus there was nothing significant, from a cryptological standpoint, about the escape of Burgess and Maclean in May 1951. Of course, it could be posited that Burgess and Maclean took with them intelligence that other codes had been compromised. That seems to be the rationale behind Crouchley’s statement that the defection caused problems, with the drying-up in 1951 closely following the escape, but that hardly makes sense. Burgess and Maclean would not have had access to any such insider information (and I doubt whether Blunt did at that time, six years after he had left MI5). If they had, they could have informed their handlers at the London Embassy at any time before they absconded. The discovery would not have to wait until Burgess and Maclean were debriefed in Moscow. My conclusion is, sadly, that Crouchley and his fellow officers were strung a line. Crouchley does not indicate how long ‘initially’ lasted, but the facts behind the disappearance were clearly withheld from junior offices. His narrative indicates how he was continually misled, and that he, like many other MI6 officers, was convinced of Philby’s innocence right up to his own flight. That was just after Dick White (so Crouchley wrote) informed his team that Nicholas Elliott had been sent out to Turkey to interrogate Philby over a claim that he had tried to recruit a woman in Berlin to the Soviet cause . . .  Another falsity, or a fascinating new lead?

                I am following up some aspects of these events, since I see many unresolved questions about the nature of any progress made against Soviet traffic after the war, thanks primarily to the vague and unhelpful statements on the subject made by John Ferris in his history of GCHQ.

                The second example has some historical significance, and deserves some background information. When Dick White appointed Crouchley to head a new Directorate in 1957, he explained that he wanted to establish a new section in London to gather intelligence about Soviet intentions, since MI6 had no sources inside the Soviet Union. White had picked Crouchley to leapfrog over Peter Lunn and other officers who had been senior to him. In his note, Crouchley explained that such a move might tread on MI5’s toes, writing:

                One of my first problems about the London-based station was to clear the position with the head of MI5. This was a tricky one. MI5 held firmly to the view that MI5 had the sole right to operate inside the UK. The division between the two services was, in their view, the simple concept that MI5 operated in the UK and MI6 operated abroad. This was, in fact, an oversimplification. The real division between the two services was, and still is, a division of functions. MI5 was, and is, responsible for security while MI6 was, and is, responsible for intelligence. In its simplest terms it may be said that MI5 was responsible for catching spies working for “enemy” nations while MI6 was responsible for gathering secret intelligence about enemy states, “enemy”, in both cases, having been narrowed down by this time mainly to “Communist”.

                The outcome was that Crouchley went to see Hollis to broach this subject, and Hollis was predictably opposed to the idea, stating that the division of labour was clear-cut on geographical grounds.  (He had apparently forgotten that MI5 had frequently demanded representation on foreign fields, such as in Europe at the end of the war, and in Washington after that.) Thus Crouchley changed his tack, and reported it as follows:

                Seeing that I was getting nowhere I said that I appreciated the point he was making and, to meet it, I said that I was prepared to arrange to keep him fully informed about our operations in this country and about any sources that we might recruit. At once his attitude changed. He no longer opposed. He agreed without further discussion and I left the meeting feeling that I had achieved an important breakthrough.

                Crouchley did not read much into that change of heart at the time, but wondered later whether Hollis had suddenly agreed to let MI6 operate so that he could inform his Russian masters as to what was going on. It appeared to confirm what he had been told elsewhere [see below] about Hollis’s treachery.

                I find this story absorbing. There is no doubt the encounter happened, but how should it be interpreted? First of all, I can find no other reference to White’s move to set up a domestic espionage operation: Stephen Dorril’s MI6 says nothing about it. In that sense, Crouchley’s insight is a dramatically fresh contribution to the history of the service. White presumably got his way. But what about Hollis? If he really had been a scheming penetration agent, skilled in subterfuge, would he not have simply succumbed to the initiative, and informed his masters about it, so that they could have been forewarned? Instead, he waited until an opportunity came for him to show his true colours, and to express enthusiasm at the prospect of gaining intelligence about émigré anti-Soviets that he could pass on. In that way he drew attention to himself. It is the old Pincheresque paradox: if Hollis let his guard slip, he was guilty. If he didn’t, it was because of his unmatched cunning.

                I looked at it from another angle – that of management technique. If I had been in White’s shoes, I would have discussed this beforehand with Hollis (who, after all, had been White’s protégé), so that he would not have been surprised by Crouchley’s approach. It is possible that Crouchley was sent out to see Hollis in some kind of ability test, to see how he responded to Hollis’s planned resistance to the idea, and that Hollis then played his part in the charade. But maybe not. White may not have been that subtle. Yet, if he had really been determined to set up the new unit and it sounds as if he was), sending in a relatively inexperienced officer to break the news was not the surest of steps. Again, an enticing, but not very clear-cut, incident.

                The third story relates to Roger Hollis and a nuclear scientist, in an event that Crouchley called to mind after he read Spycatcher in 1987. Crouchley recalls what he had been told in 1957 by two MI5 officers at a joint seminar on Russia at Magdalen College, Oxford.

                There was no question in the minds of my MI5 colleagues (I forget their names) that Hollis was a spy. But they were bitter in their complaints of his direction. They were a very angry about a recent case where, as a result of Hollis’s orders to them, a nuclear scientist from Cambridge, whom they knew to have been in contact with the Russians, had been allowed to leave England and go to Italy to take up an appointment at a University there, taking with him a whole pantechnicon full of his papers and possessions. The scientist (I forget his name – I have in mind that he had a Jewish name like Chaim (?)) had been under observation by MI5 for some time and was known by them to be in contact with Russian agents. Then he obtained a position as Professor in a University in Italy. The MI5 officers wanted to move against the Professor but Hollis would not allow them to take any action.

                Again, this is a fascinating anecdote that contains a measure of verifiable fact with anomalous detail. It is shame that Crouchley could not recall the names of the officers who, in the first year of Hollis’s tenure as Director General, deemed him a spy. (It occurs to me that the number of officers in MI5 who judged Hollis guilty were always outnumbered by those in MI6 who considered Philby innocent.) Readers of my recent investigation into Borodin will be familiar with the story of Ernst Chain, a biologist, not a nuclear scientist, who had indeed been in contact with the Russians, and did absquatulate to Italy to take up a Professorship for a number of years. Yet it all happened in 1948 – which was hardly ‘recently’. In any case, Hollis would not have then been in a position of authority to issue such orders. He had only that year been appointed head of C Division, and he was consumed with VENONA and Australian business. On the other hand, it seems very early for junior officers to harbour suspicions that Hollis was a spy. This was well before Golitsyn, and I have heard of no other evidence outside this bizarre case that would appear to incriminate him, or even to suggest that MI5 was protecting a spy.

                Crouchley’s story contains some realistic-sounding details about the two officers having to safeguard the pantechnicon taking the scientist’s effects, all the way to Dover, to ensure that the Professor departed safely. While that might be considered an unlikely use of senior officers’ time, it also seems an unnecessarily flamboyant way for Hollis to draw attention to the fact that he was abetting a probable Soviet agent. Was the story a mingling of the cases of Chain and Pontecorvo, perhaps, since Pontecorvo was an Italian? Yet Pontecorvo defected in 1950, he did not work at Cambridge, and his escape did not involve a security detail on the road to Dover. The reference to ‘Chaim’ would appear to be the clincher, unless there existed a further atom spy who otherwise fitted the description. But what were those two MI5 officers up to telling Crouchley the story, and how come it has not – so far as I know – appeared anywhere else?

                I do not doubt Crouchley’s integrity for one second, but these anecdotes prove how unreliable memory is. I think of all those biographies that rely largely on testimony from those who were around at the time, and whose confidence to the author are used to shed light on what Blunt, or Burgess, or anyone else, was up to at the time, and their thoughts are solemnly entered in the record.

                VENONA: When did the Soviets Rumble It?

                I was intending to write about VENONA this month when I was further motivated by a gobbet of intelligence on the Australia dimension of the project that fell into my lap. I had been ruminating over the fact that Richard Aldrich (in GCHQ) had quoted Ball and Horner (Breaking the Codes) as claiming that GCHQ had been decrypting NKGB Canberra-Moscow traffic in 1948 ‘almost in real time’. Several years ago, I had taken notes on the Ball and Horner book (published in 1998), which confirmed Aldrich’s claim. That seemed an extraordinary achievement, with many implications, and the fresh news shed some dramatic new light on the affair. I cannot tell the full story of the serendipitous revelation, but let’s just say that a joint NSA-GCHQ exercise resulted in the institutions’ deciding that I should be the beneficiary of their industry in intercepting some recent international email exchanges. We’ll leave it at that, shall we?

                ‘Breaking the Codes’

                I intend to explore some of the puzzles of the VENONA project more fully in a later bulletin, but I wanted to lay out an idea here, in the hope of receiving feedback. As a reminder, VENONA was the decryption project carried out by US Army Signal Security Agency (SSA) and GCHQ analysts, starting in the late nineteen-forties, and continuing occasionally until 1980. It exploited careless procedures by the management of the GRU and the KGB [a useful generic term for the various guises in which Soviet foreign counter-intelligence took shape from the thirties until the eighties], notably the re-use of One-Time Pads (OTPs). Such devices, by their definition, should never be re-used if message security is to be maintained, but violations of procedure enabled MI5 and the FBI to identify many Soviet agents, including Klaus Fuchs and Donald Maclean. The coded names of that pair appeared in message traffic, and their identity was confirmed by factual details concerning their lives and movements.

                One aspect that has always intrigued me is the question of when the Soviets realized how they had slipped up. It is important, first, to describe the three-way process by which messages were converted from Russian text (and words in English) into meaningless numerics. Agents and important figures (such as Roosevelt and Churchill) were given codenames, to start with – in the case of those two, KAPITAN and BOAR, respectively. (Even when great strides had been made in the decryption process, the anonymity of the subjects discussed caused problems in identifying agents until the NSA, the successor to the SSA, invoked the help of the FBI.) The next step was that as much of the text as possible would be replaced by 4-digit codes derived from a code-book, a kind of dictionary with a single entry for common terms used in intelligence traffic. If a word was not in the codebook, it could be represented by a look-up of entries for letters that were also in the book, multiple items sometimes being available for a single letter, with the exception routine being signalled by an ‘escape’ character sequence. The resulting string was then processed by a unique key taken from the OTP, a book of randomized numbers. The intermediate streams were treated by logically adding to the generated text the keys on a particular page of the pad, the existence of which was known only by the sender and the receiver, and kept under tight security. (Sometimes a further numeric-alphabetic translation occurred.) When the exercise was completed, the relevant page would be destroyed.

                This system appeared to be watertight. OTPs were almost impossible to decipher without a lot of help – for the most part ‘cribs’, that is full plaintexts of messages sent, for instance the reproduction of stolen documents in their entirety, that could be compared with their encrypted correspondents. Such an exercise might help with the process of constructing the lexicon or codebook, which allowed the numbers to be translated back to intelligible language. The Soviets were quite confident about the security of the system, therefore. Even if a codebook were found or stolen, the security of the OTP should have protected the confidentiality of the traffic. Yet the Russians appeared very nervous about the integrity of the codebook. When rumours started reaching them, initially from Lauchlin Currie in 1944, that inroads were being made on their messages by the USA’s decryption experts, their first instinct was to change the codebook, even though a new codebook would also be subject to the rigours of the OTP system. Their failure to inspect the OTP system itself suggests that at that time they did not suspect any flaws in those procedures.

                Even if they had suspected a problem with OTPs, however, they might have issued new codebooks, as a more rapid response, even though it would have been a nuisance, and require a period of familiarization in all the embassies. (And there might have been problems in wartime distributing such around the globe, so the process might have been slow.) Yet the more certain they had been about an OTP exposure, the more swiftly they should have reacted, even curtailing message transmission and using diplomatic bag facilities instead, or insisting on more cryptic expression of essential information. In that event new OTPs should have been created, and distributed urgently to all Embassies. The process of creating new OTPs, with proper random-number generation, and packaging them into separate OTPs for the five major lines of embassy traffic would have been even slower and more complicated than creating new codebooks, but it would have been an essential step.

                Yet the Soviets did not do that, not even when their agent William Weisband in 1946 started getting close wind of what the Americans had achieved. (According to Weinstein and Vassiliev, he did not make contact with the NKGB until 1948.) That may have been partly due to the fact that most OTPs had been replaced by then. The truth was that the stock of OTPs ran out at different speeds in each station, depending on the volume of traffic. A station like Washington or New York would probably have been refreshed in 1945, before the bulk of the traffic from 1944 was analyzed and decrypted in the 1946-1948 timeframe. Thus it is quite possible that the Soviets were slow in realizing what had happened in 1942, when, under pressure from the Nazi invasion, and the movement of government offices from Moscow to Kuibyshev, a large set of OTP pages had been duplicated, and inserted into the various OTPs to be used. That drastic error was why the VENONA project enjoyed its narrow, but deep, success. And, if Moscow concluded that all the exposed OTPs had been replaced by 1945, they might have dropped their guard.

                There was an outlier, however – Australia. The Canberra-Moscow link was one of the most revealing, definitely the most enduring, and surely the most overlooked channel. As I cited above, in 1948, GCHQ was ‘virtually reading the messages in real time’. When Weisband drew his bosses’ attention to continuing successes by GCHQ and NSA in early 1948, he probably identified a critical message that had been passed two years earlier, when a UK Post-Hostilities Paper was encrypted word for word, and transmitted to Moscow for reasons of urgency. That act must have provided an invaluable crib for the Western cryptanalysts. Yet by then MI5 was concerned about the leaks from Australia, especially since Woomera had been nominated as a guided weapons testing range. At the end of 1947, Prime Minister Attlee had to inform U.S. Secretary of State George Marshall of a possible exposure, and the necessity of re-considering Australia’s access to intelligence coming from BRUSA, the British-American Agreement. The Americans threatened to cut Australia out of any intelligence-sharing.

                The immediate outcome was that the Director General of MI5, Percy Sillitoe, accompanied by Roger Hollis, was dispatched to Australia in February 1948 to investigate the leakages, and recommend solutions. To protect the VENONA source, they brought a cover story about a defector’s providing them with information about the critical Planning Document. Yet they immediately faced a dilemma: whom could they trust to ask questions about who had had access to such confidential documents? Sir Fredrick Shedden, Minister of Defence, helped identify candidates for interview. Inevitably, out of clumsiness and inexperience (Sillitoe was still a policeman at heart, and Hollis was not the sharpest counter-intelligence officer), some of the real spies and fellow-travellers were interviewed. As Weisband started to bring fresh insights, alarm bells began to ring in the Soviet embassy as they learned more about their codes having been compromised.

                At this stage, in April 1948, the messages between Makarov, the NKGB rezident, and the head of the cypher group in Moscow, were still being intercepted and decrypted. London and Washington thus had a partial idea of what was being discussed, although some of the opposition’s messages must have passed by diplomatic bag, causing a delay. Some analysts have asserted that it was only then that Moscow concluded that some OTP keys had been compromised, and that it could have happened only through duplicated pages. On June 2, Moscow cabled Makarov to remind him that new books of OTP keys had been sent out to him that January, which implied that he should change the cypher immediately. The last message decrypted in the VENONA project was a cable sent three days later.

                So what was going on here? Why, when Moscow sent out fresh OTPs in January, did it not insist that the new keys be used immediately? Why would it have assumed that Australia was somehow not affected by the exposures that had affected other locations, as Currie, Philby and (maybe) Weisband had already warned? Did they perhaps think that Australia was so geographically removed so as not to come under GB or USA surveillance? Were they perhaps not tracking exhaustion of OTPs, and did they not realize that Australia had not been refreshed for some years, unlike, say, London or Washington? Was it the factor of the inquiries made by Shedden that truly made them conclude, so late in the day, that duplicated OTPs had caused the exposure?

                I then went back to Breaking the Codes, and re-read the chapters on VENONA (which I should have done at the outset). It is a useful book, with many valuable references, although the authors trust Chapman Pincher too much. I found the passage concerning ‘real time’, but, to my surprise, also a statement that, in June 1948, ‘the Residency in Canberra used up the last of the duplicated OTP pages’ (p 199). This comment was made without any note of astonishment or inquisition. The source for both claims appeared to be an item titled The KGB and the GRU in Europe, South America and Australia, Venona Historical Monograph No. 5, issued by the NSA in October 1996.

                With the help of an on-line colleague I found the email address of Professor Horner, and sent him a message asking whether he could shed further light on these assertions. To my delight, he responded almost immediately, although he was on a cruise, informing me, however, that the relevant chapters had been written by his co-author, Professor Desmond Ball, who had since died. Horner was unfamiliar with the research behind them. (The perils of co-authorship!) But he promised that he would look into it when he came back to Australian shores. While we were communicating I did manage to track down that Monograph No. 5.  Indeed, it does make the claim about ‘real-time’, as follows; “Unlike any other group of VENONA messages, some KGB messages on the Canberra-Moscow communications link were decrypted in near real-time, that is, close to the date of transmission.” Very well, not quite my idea of ‘real-time’, but close enough for government work, as they say. Yet the paragraph on Australia says nothing about the continued use of faulty OTPs enduring until the middle of 1948. Was that just an incidental remark by Ball, or did he pick it up from one of the many interviews and items of correspondence that the authors record in their Bibliography?

                Another puzzle is the trove of Canberra cables. On pages 204 and 207 Ball and Horner display prominently two important Canberra-Moscow cables, from March 1946 and June 1948, but do not indicate where they are stored, or if they are available for inspection. When the major VENONA announcement was made, in 1996, the NSA stated that ‘all the VENONA translations – roughly 2,900 KGB, GRU, and GRU-Naval messages – are being released to the public’, and it issued the url to access them, namely www.nsa.gov:8080\. That url is no longer active. I could not find them on the new, appallingly designed NSA website ( https://www.nsa.gov/Helpful-Links/NSA-FOIA/Declassification-Transparency-Initiatives/Historical-Releases/Venona/ , where 100 pages of cables from around the world are listed, apparently randomly, totalling about 1500 cables only. The ‘Search’ facility does not work properly.  What happened? My other source, the Wilson Center, is better organized, but does not show anything like the number of ‘over 200’ Australian cables that Monograph No. 5 claims were usefully decrypted. So where are they, and how are my unknown contacts managing to process them? All this secrecy over something that is as old as I am – why? (I have since been able to locate that particular message through the help of VENONA expert John L. Haynes, who shares my frustrations with the antics of the NSA. He kindly supplied me with a full set of the decrypted Canberra-Moscow traffic.)

                And the bizarre behaviour of Moscow remains uninspected. I find it incredible that, given the sensitivity and high exposure of flawed keys, and the information about the VENONA project that, if it had already considered duplicate OTPs a problem, Moscow would not have intervened aggressively in the exchanges with Canberra in 1948, as it would have demanded abandonment of the current pads. In a famous report from London to Moscow in 1950, Kim Philby reported on the success the Americans and the British were having, and he identified as the prime reason for their breakthroughs ‘a one-time pad used twice’. This must have been intelligence that he picked up in his role as MI6 liaison officer in Washington, and passed on to Modin in the spring of 1950.*  Was that the first inkling that Moscow had about the exact nature of the problem? I have seen no evidence that places it any earlier.

                Yet the final conundrum is the relationship of all this to what has been dubbed ‘Black Friday’, that day late in October 1948 when the Soviets reportedly changed all their codes, and thus made further decryption impossible. Even if they did not know where they had failed, they had to make some drastic changes. I do not understand this. All the traffic from the non-Australian circuits was already unreadable since the replacement of OTPs in 1945, and the NSA was not able to make any further advances in decades, so we are told. Thus the overdue replacement of the Canberra-Moscow OTPs might simply have represented the last correction that Moscow needed to make. Did NSA somehow not want to admit that, and instead to blame Weisband and Philby for revealing (almost) all, blowing up the event into some major move by the NKGB? Moreover, none of the famous cribs would have been available, and the uncovering of the KLOD (CLAUDE) network, and the extended investigation that led to the setting-up of ASIO, would not have happened if Moscow had simply ordered Canberra to switch to a new OTP in 1945.

                As Stephen Budiansky informs us in Code Warriors, there was much more to Black Friday than diplomatic and intelligence traffic, namely the wholesale reworking of the Soviet Union’s military and police systems, which constituted a huge blow to the decryption efforts of the USA. Yet he implies that the NSA ascribed the comprehensive changes to Weisband’s leaks, which would suggest that Moscow experienced a dramatic reaction only when it discovered that Canberra had been an exposure for three years longer than necessary, and that the Soviets thus went into overdrive at a time when the Cold War was considerably heating up. I am not absolutely sure that I am on the right lines here, but I intend to study the problem in full in the spring.

                [* According to Liddell’s diary, Philby had returned to London in March 1950 for a while, having been called back by MI6 to discuss the Fuchs affair (see West’s and Tsarev’s Crown Jewels, p 181). That visit must therefore have been the occasion on which he passed on his intelligence to Modin. In Venona, Haynes and Klehr, citing The Crown Jewels, represent Modin’s report as being sent in February 1950, but that must be a misreading. The Crown Jewels suggests that Burgess failed to turn up for a meeting with Modin on March 20, using as an excuse Philby’s summons and presence in London, and Modin’s ‘lengthy’ report on the crisis was probably sent in late April, by courier, not by cipher.]

                The Mysterious Other Leggett

                In an earlier Annotation on coldspur I had drawn attention to a probable anomaly in my descriptions of a certain George Leggett who worked for MI5. When I was writing about Brian Simon and Peter Astbury last August, I had referred to a note by G. H. Leggett (B1F) about Leo Long, when Leggett, in late 1952, was making inquiries about Communists at Cambridge in the 1930s. I added a paragraph about Leggett, which I reproduce here for convenience:        

                Likewise, you will find no mention of ‘George Leggett’ in Andrew’s Index. This is quite astonishing, as he was a significant but controversial figure. He was indeed in charge of B1F in 1952, and had been carrying out a study of Cambridge academics with baleful influences at the time. (When Thistlethwaite had moved on, and whereto, are unclear: he must have still been in MI5, since he lectured to outsiders as an expert on Communism. Liddell reported that he received a promotion in April 1953.) The Maurice Dobb PF (specifically sn. 133a in KV 2/1759) shows that Leggett was investigating both Dobb and Piero Sraffa in the autumn of 1952. Leggett (who was half-Polish) joined MI5 during World War II (according to Nigel West’s Historical Dictionary of British Intelligence) and ‘spent most of his career studying Soviet intelligence organizations and their operations’. If that is true, it is remarkable that his researches are not more prominent. According to Trevor Barnes, Leggett is the figure behind the pseudonym of ‘Gregory Stevens’ in Spycatcher (pp 320-324), a character of somewhat dubious credentials who had run the old Polish section of MI5, and held on his résumé the assistance to Stalin on translations at Yalta, as well as having relatives in the Polish Communist Party in London. He was forced to resign in the wake of the Golitsyn revelations after Wright accused him of being the ‘middle-grade’ spy called out by the defector. A letter in Burgess’s PF (sn.737b in KV 2/4115) shows that Leggett had been MI5’s Security Liaison Officer in Canberra in June 1956. According to Adam Sisman, he had also been responsible for recruiting David Cornwell (aka John le Carré) to MI5.

                I went on, however, to report that Guy Liddell had also been dealing with Leggett back in 1940, and that he and Roger Hollis had gone to consult Leggett for advice on what should be done with Communists in industry. I believe the first mention of Leggett is on February 20, 1940, when Liddell reports that Hollis went to see him about the question of interning members of the Communist Party. I had blithely assumed that it must be the same Leggett, as they were both some kind of expert on Communists, although the fact that Liddell and Hollis went to ‘consult’ him in May suggested that he was perhaps part of the Legal team. (In April, Leggett had written a letter to the Home Secretary, Maxwell, which would tend to reinforce that interpretation.) That Leggett also had to give some sort of approval to recommendations that Hollis put forward concerning cracking down on Communist would tend to support that notion. Unfortunately, Liddell does not offer any initials or first name for this individual.

                And then a long-standing coldspur enthusiast sent me details of G. H. Leggett’s biography (facts that I could have divined myself, had I been enterprising enough). First, he introduced me to a seminal work on the Cheka that Leggett had published in 1981 (see https://dn790007.ca.archive.org/0/items/george-leggett-the-cheka-lenins-political-police-claredon-press-1981/George%20Leggett%20-%20The%20Cheka_%20Lenin’s%20Political%20Police-Claredon%20Press%20%281981%29.pdf)  He retrieved a few other valuable items, including the assistance that Leggett gave to the Petrovs in Australia, and, most importantly, he provided some facts about Leggett’s life, such as a pointer to his archive at the Churchill College Archives at Cambridge University (see
                https://archivesearch.lib.cam.ac.uk/repositories/9/resources/1686
                ).  From this we can learn that George Leggett was born in Warsaw in 1921, the son of Norman John Francis Leggett and Halina née Tuczyn. Other evidence indicates that he was not recruited by MI5 until after WWII, which makes sense, given his age. (I notice that he was educated at St Cyprian’s, the notorious institution attended by George Orwell and Cyril Connolly.)

                So he could not have been the same person as the 1940 Leggett, as he would have been only nineteen at the time.  I took a look at ancestry.com. Passenger Lists show that Leggett (‘Vice-consul’) arrived in London from Japan on August 15, 1920, aged 29, with his wife, Halina, aged 26, and that their country of last permanent residence was, somewhat alarmingly, given as ‘Siberia’. It seems unlikely that George was born in Warsaw in 1921, therefore. The 1901 Census tells us that Norman, who had been born in Camberwell, London in 1892 (about), lived with his mother and father in Bermondsey. He had a brother, Harry W Leggett, so, if the 1940 Leggett was a relative, he was quite a distant one. Norman died on May 27, 1971.  Yet the records for George Leggett show something remarkable: he was born, not in Poland, but in Warsaw, Kosciusko, Indiana, USA (!), on September 25, 1921. George married Rani P D E Birch: she died the same year as George’s mother, in 1983. But the family tree on ancestry.com simply states ‘Warsaw’ as George’s birthplace. He died on May 1, 2012.

                Frederick Leggett

                Without any forenames it was difficult to track down the mysterious other Mr Leggett. Moreover, his name does not appear in the MI5 Staff List of December 1939 (available at KV 4/127). That is a surprise, given his apparent seniority and authority in 1940. And then an odd breakthrough occurred. I happened to look up ‘Leggett’ in the Index of MI5, The Cold War and the Rule of Law by Ewing, Mahoney and Moretta, and it (in fact, ‘Legget’) pointed me to page 262, where, from an account by Guy Liddell of a Director General’s Meeting on February 27, 1951, Sir Frederick Leggett, ‘one of the three advisers’ was reported to have objected to MI5’s going behind their backs to see the Prime Minister. I immediately turned to the relevant page in KV 4/473 (Liddell’s digitized Diaries) only to find that Liddell had noted that the minutes of the D.G. meeting were held in the envelope at the back of the diary. It appears that one of the three wise personages of Ewing, Mahoney and Moretta had gained access to the original ‘WALLFLOWER’ papers, as I have not been able to locate these valuable items, a topic worthy of investigation in itself.

                You will not gain a proper understanding of who the Three Wise Men were, or what their role was, from the inadequate Index of the book. They constituted a panel that was authorized to process any complaints voiced by civil servants who had been victims of Prime Minister Attlee’s ominously-sounding ‘Purge’ procedure in 1948. Sir Frederick Leggett (1884-1983) had been Chief Industrial Commissioner of the Ministry of Labour and National Service in 1941, and latterly its Deputy Director, and was clearly an expert on industrial employment law, and the rights of workers. Thus it would have been eminently suitable for Liddell and Hollis to seek him out at his Ministry. I believe the problem has been solved.

                Jane Archer

                Kathleen (aka ‘Jane’) Archer, nee Sissmore,

                I know that I am not the only person to be fascinated by the career of Jane Archer, née Kathleen Sissmore. Her illustrious service with MI5 in the 1930s, her role in the recruitment of Roger Hollis and her subsequent mentoring of him, the important part she played in the interrogation of Krivitsky and the reporting of his testimony, her consequent surprising removal to head the team of Reginal Security Liaison Officers, her very public dressing-down after apparently insulting Jasper Harker, resulting in her dismissal and transfer to MI6, her working for Philby, and watching what he did, her occasional visits back to MI5 and eventual re-recruitment by the Security Service, her assistance in the planned interrogation of Philby in 1951 – all has been very sketchily covered in the histories (by which, of course, I mean primarily Andrew).

                Thus it was with some excitement that I revealed, in my piece on Roger Hollis in October (see  https://coldspur.com/roger-hollis-in-wwii/ ) that the MI5 Employee Roll for December 1939 listed her as working, as a one-woman band with two assistants, Miss McNalty and Miss Small, in a unit named B14. Now I had never heard of B14 before, and it does not appear in Andrew’s or Curry’s histories. I found that Archer (who had married her husband, John, the day after war broke out) had been working as B14 since September, and her identity cropped up as she tracked the Krivitsky revelations in the USA, and arranged for his passage to the UK to be interrogated. Thus I assumed that Krivitsky had been treated as a Special Project, with a secret group set up to focus on the defector. Without performing any additional research at the time, I assumed that B14 had continued its existence through the spring of 1940, when Archer wrote her report, and that she was essentially unhooked from Roger Hollis, who continued to work as B4a.

                And then an insightful correspondent informed me that Archer had returned to B4 early in January 1940. He had been trawling through some of the related files of suspects interviewed around this time (including the King and Krivitsky PFs) and found that she was clearly identified as B4. Yet Krivitsky did not arrive in the UK until the end of January! Why would the unit be disbanded at that critical time? My correspondent suggested that it might have been because B14 had been created as a response to leads arising from the King case (John Herbert King was the Foreign Office clerk unmasked by Krivitsky in September 1939, and subsequently convicted of espionage in October of that year), and that, as those leads fizzled out, B14 was dissolved. But that hardly explains why creating B14 was necessary in the first place, and the continuing investigation into Krivitsky should have demanded the continuation of a secret unit. Perhaps B14 endured, and Archer essentially worked for two units before becoming BR (the RSLO job) in the early summer of 1940? Or did Dick White keep it under his wing as a means of maintaining control over some aspects of Soviet espionage?

                What it all means is that I shall have to make a detailed study of all those relevant files, in an attempt to discover overt communications and latent connections, and make a detailed record of Archer’s activities and affiliations. (From an early inspection, I conclude that B14 must have been a unit of some substance, as both Jasper Harker, who was Archer’s boss, and Vernon Kell, the Director General of MI5, issued letters in their names under the B14 umbrella before it was dissolved.) I know that some others among my coldspur correspondents are performing a detailed investigation into Archer’s life, so I am hopeful that, after a few months, a clearer picture will appear.

                The Letter to GCHQ

                Ms. Keast-Butler

                On November 25, I sent the following letter to the Director of GCHQ:

                “Dear Ms Keast-Butler,

                I am a retired historian with a great interest in GCHQ. I read John Ferris’s Behind the Enigma when it came out, and I am prompted to write to you as I see several anomalies in the execution of GCHQ’s policy for releasing archival material that he used. (I am writing a traditional letter to you, as the GCHQ website appears to offer no on-line option for contacting anyone at the institution.) My inquiries run as follows:

                • On 24 February, 2017, GCHQ announced the commissioning of John Ferris to write an authorised history and said: “We will be giving as many source documents from the history as we can to the National Archives, alongside our continued programme of releasing previously secret documents from our past.” (https://www.gchq.gov.uk/news/gchq-to-celebrate-centenary-in-2019) What is the implication of ‘as we can’? Who, or what agency, controls those decisions?
                • In the Foreword of the history Jeremy Fleming wrote: “For those who want to research further and form their own conclusions, we are also releasing the source material to the National Archives.”
                • In his Introduction, John Ferris wrote: “Most of the material I used will be released to the National Archives after this book is published, though some files will be retained, and others redacted to varying degrees.” Why this contradiction with Jeremy Fleming’s statement?
                • However, five years after publication the only releases, so far as I can judge, appear as HW 92, consisting of twenty-five files. The descriptions are opaque, but relate mainly to Chapter 13: (HW 92/1-5 Signal traffic regarding Palestine, HW 92/5-13 about Konfrontasi and HW 92/14-25 about the Falklands Conflict), and thus ignore the bulk of Professor Ferris’s text. Why has the remainder of the material not been released?
                • Furthermore, these are only hardcopy releases to The National Archives. In an article in Diplomacy and Tradecraft of September 2025, Tony Comer, who appeared to be writing with authority on behalf of GCHQ, expressed his regret that they had not been digitized. I share his dismay, as the lack of digitization means that the documents have to be inspected at the National Archives at Kew, and taking books into the reading-room is forbidden. Thus there is no easy way for researchers ‘to form their own conclusions’ (as Mr Fleming suggested) by checking the text of Behind the Enigma with the sources used. For those of us distant from Kew, of course, access is impossible unless we contract someone to photograph the files – an expensive, wasteful and inefficient process.

                I should be very grateful if you could respond to my points, and especially if you could authorise a fuller release, and digitization, of documents used by Professor Ferris.”

                I provided my email address, but I have not received an acknowledgment, let alone a response, to my letter. (The reason for my request will be revealed in next month’s coldspur.)

                Some Books Read

                ‘The Last Escape’

                The Last Escape by John Nichol and Tony Rennell (2004)

                I only recently got round to reading this gripping account of the trials of British and American prisoners-of-war in Europe from the end of 1944 to VE-Day. As the Red Army moved close to German-held territory, the Luftwaffe and the Wehrmacht started moving their charges on long marches eastwards. The POWs – some from Dunkirk, others captured as recently as the Arnhem disaster or the Battle of the Bulge –  suffered from emaciation, cold, hunger, and dysentery and other diseases. They feared death if left to the Russians, murder by the SS (which was killing German deserters around them), or even ‘friendly fire’ from Allied strafers. If they fell behind, or tried to escape, they would be shot. It is true that their overall sufferings were not as bad as those of the Jews and other inmates of Hitler’s concentration camps, or of the prisoners of the Japanese, or of the Russians and other Slavs who were captured by the Germans, but this is a harrowing tale, very elegantly written, that merits its separate attention. (A-)

                The Umbrella Murder by Ulrik Skotte (2024)

                This account of a dogged investigation to track down the killer of Georgi Markov, the Bulgaria exile fatally pricked by a ricin-tipped umbrella on Waterloo Bridge in 1978 should have been a sure-fire winner. Skotte, a Danish television journalist who became fascinated by the case, ended up, twenty-five years later, in finding the killer, a petty criminal who had been blackmailed by the Bulgarian secret police into performing the hit-job, with Soviet guidance. Skotte overall keeps the tension going, but some details of the quest, including his relationship with the link to the killer, an irritating Italian film-maker named Invernizzi, are not as fascinating as the author appears to judge them, and the final encounter drops into sentimentality. (B+)

                Zbig: The Life of Zbigniew Brzezinski by Edward Luce (2025)

                This enthralling biography of the politician and academic, best known for his role as Chief Security Adviser to President Carter, is certainly one of my books of the year. Zbig, born in Poland in 1928, was living in Canada when World War II broke out, and the rape of Poland remained a lingering sore all his life. He was famous for his relentless anti-Communism, and for his rivalry with another European émigré, Henry Kissinger. Luce weaves the personal story of Zbig’s ambition and successes very well with the politics of the time. My only disappointment is that he did not explain why Carter nurtured two strongly opposed power bases in his Secretary of State Cyrus Vance and in his Security Adviser, or why Zbig maintained such a long devotion to the weak Carter, who apparently treated most cabinet meetings like Bible classes. (A-)

                The Siege by Ben Macintyre (2024)

                Ben Macintyre does these in-depth investigations very well. His account of the ill-advised takeover of the Iranian Embassy in London by the Arabistan Liberation Front in April 1980 is well-researched, and he describes very well the morale and activities of the SAS (Special Air Service) team that eventually rescued the hostages. He is as sound on the political background as he is on the human interest stories, and, even for those readers who know the outcome, he keeps the tension high. I found the encyclopædic approach, such as Macintyre’s including events that had nothing to do with the siege, a little distracting, and the pace drags a bit towards the end, but his book is still an excellent read. (A-)

                The Spy in the Archive by Gordon Corera (2025)

                An account of how Vasili Mitrokhin painstakingly copied items from KGB files, and then smuggled them to his dacha, before defecting to the British Embassy in Vilnius in 1992, was something I had to read. Unfortunately, Corera does not have enough material to flesh out a book of any substance. His work contains much padding and digression, with a lot of familiar historical material reproduced, and large areas of white space in its 53 chapters and 289 pages. I should have liked to learn more about the fate of the Archive itself, why the British government got involved in trying to vet the book that Christopher Andrew produced from it, and why Mitrokhin and Andrew fell out so badly over the project. (C+)

                The Defector by Richard Kerbaj (2024)

                This particular defector was Oleg Lyalin, playboy member of the KGB in the London Embassy, who in 1971 was arrested while driving intoxicated, and agreed to defect in exchange for a pardon of the offence. His revelations were very informative in helping MI5 understand the set-up in the Soviet Embassy, and they led to Edward Heath’s bold move to expel one-hundred-and-five Soviet officials. Lyalin married his girl-friend, and the pair were hidden in the North of England. Unfortunately, there is not really enough to say about Lyalin to fuel a book, and thus Kerbaj has to pad his narrative with a lot of information that has appeared elsewhere. This may not be an objection for the reader new to the events, but for most intelligence enthusiasts it will be a drawback. (B)

                ‘Agent Zo’

                Agent Zo by Clare Mulley (2024)

                I am an admirer of Clare Mulley. She performs impeccable research, writes very well, and keeps a firm but balanced grip on her material. Her latest offering, Agent Zo, is about a little-known Polish resistance fighter in WWII, Elżbieta Zawacka. After acting as a courier, she made her way to Britain, where she was recruited by the SOE, and parachuted back into Poland to take part in the Warsaw Uprising of 1944. Zawacka was, astonishingly, arrested and tortured in 1951. A brave woman, she was not the easiest to get along with, as Mulley carefully explains. Yet I thought the author pushed the ‘fearless feminist’ theme a bit too much. I would have expected some insight (for example) into the plight of hostages who were killed in reprisals after one of Zawacka’s exploits – an enduring moral dilemma concerning resistance ‘heroes’ that has not received the treatment it merits. (B+)

                Parallel Lives by Iain Pears (2025)

                I had high expectations for this book, about the love affair between Larissa Salmina, an art curator in the Soviet Union, and Francis Haskell, a British art historian, bright together by their shared love of art. It received great reviews in the English press, and I was also drawn in by an encounter the pair had with Guy Burgess. Yet it was a great disappointment. Salmina and Haskell were not inherently interesting enough to warrant the attention, and they were not, after all, the first couple to have wed though coming from widely different cultures. Moreover, they do not get married until page 226 of 240, which was then things started to get interesting –  according to what the Letters page in the Times Literary Supplement informed me. A few fascinating background vignettes, including that dinner party at Guy Burgess’s flat in Moscow a few months before he died, but otherwise of little import. (B-)

                Allies at War by Tim Bouverie (2025)

                I was not greatly impressed by Tim Bouverie’s 2019 book Appeasement (see https://coldspur.com/on-appeasement/), but I consider his Allies at War much better. His main thrust is to explore the tensions between the Allies, and to describe how the ability (or inability) of Stalin, Roosevelt and Churchill to resolve their internal struggles ‘shaped the war and the world’. Now this is not really new territory, so any historian embarking on such a giant project (632 pages of text, sources and endnotes) should be exploiting a considerable amount of new sources, or be coming up with a startling new interpretation – or both. Bouverie has indeed tracked down some lively new diaries and memoirs to illustrate his theme, but they do not materially affect current understanding of the topic, in my opinion. On the other hand, his conclusions are refreshing and insightful, but do not go far enough, and he misses some important points. I plan to review the book in depth sometime early next year. (B+)

                ‘The Last Days of Budapest’

                The Last Days of Budapest by Adam Lebor (2025)

                This is a stunning account of the squeeze that Hungary, and Budapest in particular, underwent in the last years of World War II. Lebor has drawn upon a rich set of memoirs and diaries to complement his use of Hungarian, British, Israeli and American archives, and an impressive bibliography, to paint the horror that the city became as Hungary tried to detach itself from Nazism, while the Red Army approached. Britain’s SOE and the American’s OSS valiantly tried to intercede, but were practically powerless among the retributions and fears. The Jews suffered unimaginably as the fascist Arrow Cross exercised its reign of terror, with the Roman Catholic monk András Kun perhaps being the most monstrous, but atrocities were committed indiscriminately. I at times was overwhelmed by the prolificity of names, and lost my way, but the book remains a searing and unforgettable slice of history for a location and time that has been largely overlooked. (A-)

                Every Spy a Traitor by Alex Gerlis (2024)

                When I was in the UK, I read a stellar review in the Times of a new spy novel, The Second Traitor, by someone called Alex Gerlis, of whom I had never heard. So, when I was in Waterstone’s in Piccadilly, I checked it out, and I found that there were earlier novels by him in paperback. Every Spy a Traitor looked compelling: it was about a Soviet spy in British Intelligence in the late 1930s. It was blurbed as ‘A 2024 Financial Times Book of the Year’, which sounded authoritative, and the Daily Express described Gerlis as ‘one of the superstars of modern spy fiction’. So I bought it. But it was feeble. Poor psychology, unconvincing characters, and inept plotting that made John le Carré look like Sir Arthur Conan Doyle. I laboured to finish this real dud. (C+)

                The Cambridge Spy Ring by Shawnna Morris (2025)

                I can see why a book that integrated the stories of the Cambridge Five would be an appealing offering, but I do not understand why Pen & Sword would commission an unknown Coloradan amateur to do the job. The Cambridge Spy Ring appears to have been written for a more uninformed American audience, although it was oddly launched in the UK first. It offers no new insights, and Ms. Morris has not delved into any recent archival material, simply extracting from most of the works of the usual suspects the highlights of the careers of the pentad. For instance, she cites Richard Davenport-Hines’s Enemies Within (which is closest to covering the same ground) in her bibliography, but she never refers to it in her Endnotes. Her book contains many errors, as well as some real howlers: for instance, A. J. Ayer, the philosopher, known as ‘Freddie’, is identified as the FBI agent Frederick Ayer. Its index is feeble, and the layout clumsy. Morris has done a decent job in adding a substantial relevant historical background, and she weaves the individual careers together well, even if she misses the untruths and deceptions. (Dick White appears hardly at all, and there is no room for Smolka or Hollis.) I commend her for that difficult job. I wish she had had a chance to consult coldspur and the Kew archives before attempting to educate her American public, but it should interest those who have not studied the individual biographies. Despite her book’s representing a valiant effort, however, and partially filling a gap: I cannot give it more than a C+.

                The Invisible Spy by Thomas Maier (2025)

                I bought this item because it sounded as if it might have some fresh insights on the shady Charles (‘Dick’) Ellis, who was William Stephenson’s Number 2 at British Security Coordination in New York during the war. It is the biography of one Ernest Cuneo, an attorney who was a fixer for Roosevelt, and helped BSC’s propaganda efforts. Yet I failed to detect exactly what Cuneo did: maybe he was an ‘invisible’ spy because he really did not contribute much. The book is a bit of a mess, with some chaotic chronology, and a lot of repetition, as if some chapters had been written in isolation. It contains many hoary stories about WWII, most of which had little to do with Cuneo. Moreover, while it has some new perspectives on Cuneo’s friendship with Ian Fleming, it sheds no fresh light on Ellis, although the author’s judgment is very sceptical of Ellis’s reliability. (C+)

                Postal Woes

                I always enjoy the ‘task’ of writing Christmas cards to old friends and relatives in the UK. Over the years, the number I write has steadily decreased, owing to death, decay, and estrangement, but I gain pleasure from inscribing a personal message to each recipient, and then copying the address by hand from a decades-old address book (with addresses suitably updated, of course). No computerized labels or special printing for me. And, similarly, I enjoy opening cards from friends I have not seen for years, and reading their reciprocal personalized greetings.

                Yet this process is becoming expensive – especially from the English side. I noticed that a card from the UK requires a stamp of £3.40 denomination, the equivalent of about $4.00. I paid about $1.50 for an individual stamp of my current batch of international ‘Forever’ items (meaning that they can be used no matter how much the cost increases in the future). I doubt whether the British and US governments have any reciprocal arrangements for allocating costs in what is an obviously unbalanced affair, but I can understand why many of my correspondents have switched to electronic greetings.

                This year, I have had fresh concerns. Over the past few months, there have been multiple incidents of postal theft across this section of North Carolina – primarily outgoing greetings cards, with many persons reporting on social media that birthday cards for distant grandchildren never arrived, some with money or checks/cheques in them, no doubt. Our birthday cards (with no enclosures) to our son and to our grand-daughters in California never arrived. I have reported this problem to the local Post Office, and even alerted one of the Wilmington TV stations to the story, but I have never received as much as an acknowledgment. Thus I wondered whether any of my Christmas cards to the UK had arrived. If anyone reading this is a customary recipient, and has not received a card, I should be grateful if they could let me know.

                [Since writing this, on December 23, I heard from my brother that the card I sent to him and his wife had not arrived. I scurried round and sent a few emails to other intended recipients, and discovered that many cards – all posted on December 8 – had indeed arrived that very day. Since then, two more truants have turned up. Perhaps a Go-Slow to penalize that cheap transatlantic postage charge?]

                The postal system in this country is in some disarray. The current ‘Forever’ stamp for domestic mail costs 78c. If I want to send a card to my friend down the road, or to one in Hawaii, about five thousand miles away, I use the same denomination. Yet even the local system is frayed. We have noticed that cards, invoices and letters from locations in Southport, the town in which we live, are sent first to Greensboro, North Carolina, to be sorted and re-routed. The overstamp confirms it. Yet Greensboro is two-hundred and eighty miles from Southport, about the same distance as is York from Croydon, Surrey, where I used to live. Is that not crazy? That local mail cannot quickly be filtered out for faster delivery strikes me as quite absurd. I suppose there must be a reason for it, but many aspects of life these days puzzle me.

                ‘Le Genou de Coldspur’

                ‘Claire’s Knee’

                I recall Eric Rohmer’s charming film of 1970, ‘Le Genou de Claire’ (‘Claire’s Knee’), which was disappointingly short on pathological analysis, if I recollect correctly. I have shared my recent problems in the genicular area with one or two correspondents (who probably muttered ‘TMI’ under their breath), and I thought I would extend the ordeal by reproducing what was posted on my health record after a recent MRI. I know there are many knee-sufferers within the coldspur readership, so what I am about to reproduce may strike a chord. I was encouraged by the Healthcare Provider to visit my portal, and to steal a march on my orthopedic doctor by learning immediately what was up. My Chief Sensitivity Reader advised me, however, not to post the report directly here, as it might perturb those with a frail disposition, and I therefore attach a link for the truly dedicated.

                And I thought I just had a gammy knee! I feel quite privileged: I bet Denis Compton never received a report like that! But what did the Provider think I would do with the information? My knee still hurts, but I am happy that I do not have any obvious suspicious focal marrow signal abnormalities. I shall have to wait until January 14 to find out what all this means.

                And finally  . . .

                ELLI Unmasked at Last!

                The Soviet mole known as ELLI

                Was shopped by a bloke on the telly;

                It was not Roger Hollis

                Or even Barnes Wallis,

                But a cousin of Stéphane Grappelli.

                or

                But a customs inspector from Delhi.

                or

                But the dentist of Liza Minnelli.

                or

                …………………………………………

                [You get the idea. Just insert a line identifying your favourite candidate.]

                A very furtive and suspenseful 2026 to all my readers!

                (Recent Commonplace entries can be seen here.)

                4 Comments

                Filed under Economics/Business, Espionage/Intelligence, General History, Geography, Literature/Academia, Management/Leadership, Media, Personal, Politics, Technology

                Special Bulletin: ‘The Conundrum of N. M. Borodin’

                ‘One Man in His Time’, by N. M. Borodin

                In the July 26 issue of the Times Literary Supplement appeared a review of One Man in His Time, a memoir by one N. M. Borodin. Originally published in 1955, the volume has recently been re-issued by the Pushkin Press, and claims to tell the life-story of a Soviet microbiologist who defected in the United Kingdom in 1948, but delayed writing his memoir until after Stalin’s death in 1953. I present the review below: for those with access, it can be read at https://www.the-tls.co.uk/lives/autobiography/one-man-in-his-time-n-m-borodin-book-review-alexandra-popoff/.

                Alexandra Popoff’s Review: Spectator, July 26, 2024

                The name of a defector ‘Borodin’ was vaguely familiar to me. I recalled seeing his name somewhere in Guy Liddell’s Diaries. Yet it was very difficult to find other published information about him. Nigel West has listed him in a couple of places – but states his place of defection as Vienna in his Dictionary of Cold-War Espionage. Kevin Riehle does not mention him in his definitive work Soviet Defectors. Riehle’s work, however, concentrates on staff officers of the Soviet Union’s intelligence services, and, since Borodin was attached to a trade mission like Victor Kravchenko (of I Chose Freedom), does not meet Riehle’s criteria. I thus decided to order the book forthwith, and started digging around in my electronic archives.

                Two weeks later, a letter on Borodin by that tenacious chronicler of early twentieth-century Britain, Richard Davenport-Hines, appeared in the TLS (see https://www.the-tls.co.uk/regular-features/letters-to-the-editor/awkward-posture/) . It added some fascinating insights concerning Borodin’s associations with Britain’s secret agencies, as well as his relationship with an author whom Davenport-Hines classifies as ‘English modernism’s finest novelist’, Henry Yorke, who wrote under the alias Henry Green. (I find Green unreadable, but that is neither here nor there.)

                Richard Davenport-Hines’s Letter: Spectator, August 2, 2024

                By this time, I had completed a first pass at performing my own research on Borodin, and quickly wrote a letter to the Editor of the TLS, which I emailed on August 7. I present the text here:

                I should like to augment Richard Davenport-Hines’s fascinating observations on N. M. Borodin and Goronwy Rees (Letters, August 2). I believe that the events were a little more sinister than represented in the description by Mr. Davenport-Hines.

                On January 19, 1948, Anthony Blunt (whose expertise in bacteriology has been a well-protected secret) came to see Guy Liddell, to let him know, based on information coming from Goronwy Rees via Guy Burgess, that an MI5 officer had been clumsily prowling around the premises of Bennett and Shears, the company at which Rees was a director, asking questions about ‘mobilisation in Russia’. It turned out that the officer was MI5’s famous interrogator, Jim Skardon: the outcome was that Liddell met Rees, who told him openly that the Russians were buying penicillin plant from his company.

                Thus, on February 4, at a meeting of the Joint Intelligence Committee, the fact that Borodin had been noticed buying penicillin manufacturing capabilities, which could be used by the Soviets to advance their bacteriological warfare capabilities, was reported. Guy Liddell wrote: “If we could satisfy ourselves about his intentions and knowledge, we might consider him as a potential defector and take steps accordingly”. One of those steps was to ascertain whether he had any relatives in Russia who might be harmed. Two weeks later, the ‘Borodin case’ had advanced to the degree that Kenneth Strong and Liddell believed that exploiting Borodin could result in some breakthrough insights on the Soviet Union’s intentions. By March 5, the situation had progressed to the degree that Borodin had to be considered as an exception to the tightening restrictions on Soviet citizens.

                It was soon recognized, however, that the British harboured a Communist sympathizer at the heart of their bacteriological warfare planning. On February 23, Liddell and his colleagues discussed the person (whose name has been redacted), expressing their concern about him, who had been a member of the Communist Party until 1943. It is probable that the scientist was Howard Florey, who had been recruited by another notorious Communist J. B. S. Haldane. Florey was well-known for wanting the fruits of penicillin to be made available for all mankind, while his collaborator and fellow Nobel-prize winner Ernst Chain had wanted patents on the process of manufacturing penicillin to be applied for.

                On March 11, Liddell had a further discussion with Rees and Blunt about the penicillin business, where, again, the presence of the art-historian, who had retired from MI5 a few years before, might have caused some eyebrows to be raised. Liddell specifically brought up the point that, if the Russians had the technical know-how for making a penicillin plant, it might give them a two years’ advance in creating agents of bacteriological warfare. Why he thought it suitable to share these insights with the pair of one-time (and maybe current) Soviet agents is not clear.

                Yet a complete bouleversement of the Floreyan case appeared to occur by the following September, when Professor Florey himself came to see Liddell, alongside Lang Browne, to discuss Dr. Chain. Liddell wrote: “Dr. Chain, who had somewhat improperly entered into a contract with the Trade Delegation (Soviet) to sell them information about penicillin, has now gone on a year’s holiday in Italy. Florey hopes to edge him out, but if necessary would like, at some future date, to inform the appropriate authority at Oxford that we could confirm the Professor’s information about the disreputable conduct of Dr. Chain.”

                Other accounts suggest that Chain had gone to Italy to work, not rest and play, and that, frustrated by the lack of commitment from the British Government to fund penicillin-manufacturing capabilities, had found a responsive chord with the Italians. Was Florey trying to cover his own disloyalty by denigrating his ex-colleague in this way? After all, it was clear that the Americans did not want the secrets of penicillin manufacturing to leave U.S. or British shores. Florey may have been successful in his accusations, because Chain was thereafter twice refused a visa to enter the United States.

                It is notable that Russian sources credit Borodin with successfully kick-starting the Soviet Union’s industry. In an article from 2022, E. V. Shertsneva profiled Borodin, stating that the scientist ‘while on scientific assignments in England, provided the USSR with important scientific and technical information and producers [sic] for production of penicillin and streptomycin’, and that his contribution was recognized by the Soviet leadership. If, indeed, Borodin did successfully defect, he either did so after he had passed on the industrial secrets, or he ensured that a replacement would perform the work for him. In any event, Borodin was reported as speaking at a conference on Russian affairs held at Oxford University on August 9, 1949, an event at which Guy Burgess also gave an address.

                A final twist to the story was provided when Rees was being interviewed about his revelations concerning Burgess and Blunt in June 1951, soon after the disappearance of Burgess and Maclean. An entry in his MI5 file written by J. D. Robertson (B2) states that an MI5 officer ‘will bear in mind the suspicion that Goronwy REES when leaving Government employment for business, may have played a part in assisting the Russians to obtain penicillin equipment from America, of which the Americans were at the time anxious to ban the export to the Soviet Union’. Were they wrong about Rees? Or had he arranged for the dirty work to be completed before he presented himself as a loyal informer?

                In any event, Guy Liddell was shown to be an atrocious judge of character, and a very undisciplined protector of privileged information. He managed to share secrets of bacteriological warfare with four very dubious characters: Rees, Burgess, Blunt – and Footman, his previous colleague in MI6. Ironically, Rees’s file later states that Footman was also believed to have been an agent of the Russian Intelligence Service. Whatever Borodin had been up to, and what the terms of his defection were, would all certainly have been relayed to the Kremlin. In Alexandra Popoff’s review of ‘One Man in his Time’ (July 26), she writes that Borodin was able to declare in his memoir that ‘he was neither infected nor liquidated’. But what happened to him? And was his defection real?

                I did not receive any communication back from the Editor, but hoped that the letter might appear in the issue dated August 16. When an email announcing the publication of that issue appeared in my email box at 1:30 local time on July 15, I quickly learned that the Editor (Martin Ivens) had regrettably decide not to publish my letter (It was longer than most submissions, admittedly). Yet I must assert that I believe his judgment was at fault, for the following reasons:

                1. My letter was twice as interesting as that of Mr. Davenport-Hines. [Only ‘twice’? Would you not agree that ‘three times’ would be more accurate? Ed.] It could have provoked some exciting new observations.
                2. Martin Ivens missed a great opportunity to position the TLS as a leading vehicle for eliciting breakthrough research in intelligence matters, a topic of unfailing and enduring interest with the reading public.
                3. There exists an odd symmetry between Davenport-Hines and me. I accept that he is a far better-known author (and must be the ‘doyen’ of one particular sphere, I am certain), but we have a shared history. When Misdefending the Realm was reviewed by Mark Seaman in the TLS several years ago, my book shared space with Davenport-Hines’s Enemies Within (see https://coldspur.com/misdefending-the-realm/). That was before Ivens’ time.

                I notice also that Davenport-Hines’s most recent book is titled History in the House: Some Remarkable Dons and the Teaching of Politics, Character and Statecraft, which was reviewed in the Spectator of August 3. It consists of a series of essays about ‘a select and self-regulated group of men who taught modern history’ at Christ Church, Oxford in the 19th and 20th  centuries. Despite my affection for the place (I am an alumnus of the college), this compilation sounds only slightly more engaging than Beachcomber’s Anthology of Huntingdonshire Cabmen. Indeed, the reviewer Nihil Krishan opined that ‘it was faintly surprising that such a book found a trade publisher at all’.

                But back to Borodin. Meanwhile, I have been extending my research. My copy of One Man In His Time arrived on August 10, and I have read just over one hundred pages so far. (I have other important books on the boil.) I dug around to try and determine the discrepancy in the name of Pontifex, and that of Bennett and Shears, and discovered that the latter company had been acquired by Pontifex back in 1908. I verified that Goronwy Rees had completely ignored his employment by Pontifex and by MI6 in A Chapter of Accidents, and that his daughter had innocently described the firm as ‘brewers’ engineers and chemical plant manufacturers, or in other words, coppersmiths and brassfounders’. Liddell’s Diaries pointed to more strategic and confidential manufacturing processes.

                I also discovered one or two further entries in Liddell’s Diaries that had escaped me beforehand, partly because names had been redacted. I overlooked the following entries:

                • On February 26, the penicillin problem was discussed at a meeting of the Bacteriological Warfare Committee. Liddell pronounced that ‘Sir Paul Fildes was the last word in BW’, and recorded the USA’s strict policy for requiring control of the technology for manufacturing the drug.
                • On March 5, a need for making Borodin’s case a special one was discussed in the context of tighter registration requirements for Soviet citizens in the country.
                • On May 18, an apparent conflict between Professor Florey and Professor Fildes emerged. John Marriott reported to Liddell on Florey’s seeming ‘to indicate that there would be no harm in allowing the Russians to purchase penicillin plant in this country. This, in spite of the fact that an entirely contrary view had been expressed by the eminent Professor Fildes, who is supposed to be the last word in B.W.’
                • On July 2, more facts emerged about Borodin. Liddell was told by Dick White that Borodin [though his name is redacted] ‘has turned up at Florey’s at Oxford and has asked him for his assistance. John Marriott is to go down to Oxford to see Florey.’ It might appear that Florey would not be a useful confidant for someone in Borodin’s position.
                • Later that same day, Liddell was able to write: “John Marriott has arrived back from Oxford. Everything has gone extremely well. XXXX is not in the least apprehensive. He has thought out everything very carefully. He does not think that his return to Russia will [sic!] have any effect on the fate of his family either one way or the other, but is certain that he himself will be liquidated. He intends to remain in his department and clear up all his affairs so that there can be no accusation of misappropriation of funds. He says that nobody here can question his visits anywhere as he is master in his own house and would not brook interference from anyone except the Ambassador. He has a great deal to tell us and is willing to co-operate to the full.”

                I found these passages very alarming. The last suggests that Borodin at that time intended to return to Russia and face the consequences. His return to Russia is phrased in the future tense, not the conditional, and is reinforced by the words ‘is certain that he himself will be liquidated’. And the duplicity of Florey, at one moment stating that no harm could come from allowing the Soviets to buy penicillin plant, and then, a few months later, denigrating Chain in his absence, is shocking.

                I also discovered an article written a few days ago by a Dr. Anthony Rimmington, posted on ‘Medium’, about Borodin, visible at https://medium.com/@t.rimmington/the-spy-who-came-in-from-the-mold-n-borodin-the-first-russian-biological-defector-to-the-west-516d8dfa03b3. Rimmington is a former Senior Research Fellow at Birmingham University. I reached out to him via his publisher, who forwarded my message, but I have not yet heard back from him.

                That’s it for now. I noticed that Borodin claimed that he had acquired vital penicillin technology as early as 1946, so there are a lot of questions still to be answered concerning his defection, and what happened to him afterwards. When I have finished his book I shall return to this investigation, construct a proper chronology, and hope that I may have received useful information in the interim.

                2 Comments

                Filed under Economics/Business, Espionage/Intelligence, General History, Politics, Science, Technology

                The 617 Squadron Association ‘Historian’

                I am posting this Special Bulletin to record a recent email exchange between Dr. Robert Owen, the official historian of the 617 Squadron Association, and me. As part of my campaign to elevate awareness of the saga of ‘The Airmen Who Died Twice’, I had tried to contact the Squadron through various means, without success. Then, in the middle of May, I found a different email address, and sent my Synopsis (see https://coldspur.com/the-airmen-who-died-twice-synopsis/ ), as well as the supporting PDFs, to it. At the end of the month I received an email from Dr. Owen, and the following brief correspondence ensued.

                Dr. Owen to me, May 29:

                “Dear Mr Percy,

                Your analysis of the crash of Lancaster PB416 has been passed to me for comment.

                There are certainly a lot of unanswered questions in respect of the loss of this aircraft, not least the actual number of bodies found at the crash site and subsequently interred.

                 In analysing your hypothesis I have also consulted with my counterpart in the IX Sqn Association (an ex RAF Tornado navigator) who has also looked into this incident, hence my rather delayed reply.

                My own reading of this work is that it tells two separate stories – Operation Paravane with the loss of PB416 and, if I have understood it correctly, an alleged plot (the explanation of the Soviet/Norwegian element is not easy to follow) for Soviet agents to assassinate Peder Furubotn

                 The link between these two lines of enquiry is ascribed to the crash of PB416 in Norway, and the continuing mystery surrounding the number of bodies aboard the aircraft and their identities.

                 The difficulty in reconciling the number of bodies is not disputed. Their identities are confused by the initial reports listing personnel allegedly aboard PB416 who are definitely known not to have been on the flight.  This issue of identity can be explained by an administrative error.

                The claim that there were more than nine bodies (the official crew/passenger number) cannot be explained with any certainty, but again administrative error, combined with the later exhumation and re-burial might be a contributory factor.  Without exhumation of the remains of the “unknown airman” in Nesbyen cemetery (which seems an impossible scenario) and formal identification by forensic methods this mystery seems likely to remain unresolved.

                 It was suggested for a long time that the additional casualty might have been a member of ground staff – but this can be categorically refuted since all RAF members on Paravane – less those known to have been officially on board PB416 are known to have returned safely – including all of the ground contingent.

                 The idea that there was a stowaway has also been discounted.  The question was discussed amongst a number of Paravane veterans and they were all adamant that It would have been impossible for a stowaway to conceal themselves aboard the Lancaster without the connivance of the crew.

                 Thus the presence of any addition personnel on board would have to have been with the knowledge of the crew.  If this was the case how might this presence be explained?  If, as is suggested the additional personnel were Soviet agents who were to be parachuted out over Norway, how could this action be explained to the crew?

                The key to keeping anything a secret is limiting the number “in the know” and, ideally that those “in the know” are of sufficient rank/status to be entrusted with such information. If this is the case (and surely any alleged plan for the despatch of Soviet agents into Norway for an assassination would be seen as having the highest security rating) then why was a relatively junior crew selected for the task.  Frank  Levy was a Flying Officer.  Furthermore, why were these Soviet agents placed aboard an aircraft that was carrying not only its normal crew complement of seven, but an additional two passengers – thus increasing the number of personnel who would have knowledge of the operation?

                 It would have been far more logical for any such agents – assuming that there were such – to have been carried aboard a senior officer’s aircraft.  In this case this would be that of W/Cdr Tait, with his aircraft carrying only his normal crew of seven.

                 If W/Cdr Tait and his crew were not to be involved, and if these personnel were to be dropped at night over unfamiliar territory, with terrain that by its nature had limited features to assist navigation, then another sensible assumption might be that the aircraft/crew chosen contained an experienced / senior navigator.  The most obvious choice in such an instance would have been the crew of S/Ldr Fawke, a more senior captain, whose navigator, F/Lt Bennett was the Squadron Navigation Officer.

                 So why would Levy, relatively junior, whose aircraft was already carrying two additional passengers, be selected for such a task if indeed the scenario is correct? Who might have selected him?  Presumably the Squadron Commander – W/Cdr Tait.

                In his later years Tom Bennett, Gerry Fawke’s navigator, became the No. 617 Squadron Association historian  – my predecessor.  I knew Tom well.  As might be expected of a navigator, he was a man of detail, conscientious and diligent.  One of his areas of enquiry was the loss of PB416 and the mystery of the identification of its casualties. He pursued many avenues including Air Historical Branch, the British Embassy in Oslo, the Norwegian War Graves Service and local Norwegians. He also discussed the episode with W/Cdr Tait.

                 As Squadron Navigation Officer, he was responsible to W/Cdr Tait for all matters concerning navigation.  He was closely involved with the final navigation preparations for Paravane, to the extent that before the operation he was sent personally to collect the required charts of Scandinavian and Soviet territory from RAF Northolt under conditions of the greatest security.

                 Likewise, as Navigation Officer he would have been involved in post-operational navigational analysis – including consideration of possible reasons for the loss of PB416.

                 This being so, it seems inconceivable that Tom would not have gained some knowledge (even if only a hint/suspicion) of any covert circumstances, had there been any, relating to this flight, either at the time, or in later conversation with W/Cdr Tait.

                 The results of his investigations failed to establish any definitive answer to the mystery of the identification of crew members.  They did however, suggest that there had been several layers of compounded administrative error which can be explained by a number of reasonable factors –the fog of war, poor record keeping or lost documentation.

                As for as the reason for the aircraft’s loss:  The location of PB416’s crash clearly places it off the planned route back to Woodhall Spa.  This is sometimes attributed to a navigation error – which might include the “blown off course” explanation quoted.

                However, the crash location might also be accounted for if the the aircraft was on an intended route for it to make a landfall in Northern Scotland.  There might be several explanations for this:

                 Airfields in the Moray region were acceptable as diversionary airfields. The aircraft may have been making a diversion to Lossiemouth, as did a number of aircraft returning the following night.

                 John Sweetman’s “Tirpitz – Hunting the Beast”, p. 116 cites the instance of F/O Watts of 617 Sqn,:

                 “..Watts in KC-N hit ‘a huge occluded frontal system’ over Sweden, lost his pitot head and ‘all indicated air speed’, then discovered that fog had closed in over Woodhall causing him to divert to Lossiemouth.”    A number of other aircraft also diverted to Lossiemouth.

                 Admittedly, the weather does not appear to have been an issue in the night of 16/17 September.

                Levy’s aircraft may have experienced a technical problem which resulted in the crew deciding on a shorter route, with a shorter sea crossing to a diversionary airfield such as Lossiemouth or Kinloss.  There are uncorroborated reports that before the crash an aircraft was heard which sounded as if in trouble / with rough running engines.

                 There is no conclusive proof that this was PB416, but it might suggest that the aircraft was experiencing technical issues.  It is known that engine problems were experienced on account of the low grade Russian aviation fuel and that one IX Sqn aircraft was forced to abort its return flight for this reason and return to Yagodnik.

                Another consideration is that the aircraft may have been fired upon by flak as they transited across Finland, Sweden or Norway.  This again is given credence by Sweetman (p114):

                 “Iveson’s log book shows that KC-F was fired on over Finland”  and on p. 116: “Three 9 (N flown by Harris with a JW bomb load, W & V) and two 617 (E & Z) Squadron Lancasters left on 18 September. Flying in Knilans’ KC-W 17 September, Bell the navigator recalled that ‘our aircraft had a bent frame, was difficult to control, and the starboard outer engine needed a major overhaul’. He failed to mention three extra passengers from a crashed aircraft. Off course near Stockholm, the Lancaster attracted the hostile attention of Swedish anti-aircraft guns. (Hell, I thought these guys were supposed to be neutral’, hollered Knilans.) Like Watts, they found Woodhall fog-bound and diverted to Lossiemouth.”

                A Norwegian account attributed to one of the first to reach the crash site states that the wreckage of PB416 showed evidence of battle damage and that the fuel tanks were “torn and empty”.

                 If this is correct, then the possibility of PB416 receiving battle damage necessitating a diversion should be factored into the debate.

                The question of an additional crew member, or members on board remains enigmatic, but here again the waters are muddied by lack of conclusive evidence. If we accept that there were other(s) on board the aircraft, there is still no proof positive to link them to the alleged Soviet assassination plot. It would make as much sense, to suggest that they may have been additional personnel who were being ferried to the UK.  If so, then unless their origin/identity/purpose can be determined no conclusion can be drawn.

                “The work is a hypothesis lacking firm proofs, but offering enough credible evidence to provide as watertight an argument as can be expected.”   Though each separate line of enquiry has been well researched, there is no firm indication of any conclusive link between the Paravane force and a Soviet assassination attempt, or even suggests any such connection. Any hypothesis based on such a claim must be at best conjecture based upon supposition and circumstantial evidence.

                 Gaps and inconsistencies in documentary evidence, are not unusual.  Often it is a case of human/administrative error, or the loss of records with the passage of time.  Such omission/inconsistency does not necessarily indicate subterfuge or conspiracy.   Absence of evidence is just that… absence of evidence.

                 Without further evidence to link the two directly the enigma must surely remain?

                With all good wishes, 

                 Rob

                Dr Robert Owen

                Official Historian, 617 Sqn Association”

                I immediately sent a message of thanks, as follows:

                “Dear Rob,

                Many thanks for your patient and comprehensive reply.

                What gratifies me most is that I see at last an admission that the crash at Saupeset represents an ‘enigma’ that clearly needs an explanation. In my investigations, I was dismayed by the lack of any recognition that anything untoward had happened, which led me to believe that the authorities wanted to bury the episode.

                Over the weekend, I shall study very carefully your message, and respond with appropriate seriousness in a few days’ time. I am by no means a dogmatist, and developed my theory after intense study of much archival and biographical material. As I am sure you will agree, the final word on any historical event is never written, and I look forward to exploring with you the possible circumstances that led to this extraordinary disaster. 

                With thanks again for the considerable time you must have spent on this,

                Best wishes, 

                Tony.”

                On June 2, I sent Dr. Owen my full response:

                “Dear Robert,

                I am replying to your very thoughtful message, which I very much appreciated.

                I have a few general comments, and I shall then attempt to address your more detailed points.

                1)      Anonymity and Secrecy: I was puzzled by the apparent secrecy behind the investigations of historians before you. You state that ‘it was suggested for a long time . . ’, and ‘the idea that there was a stowaway has also been discounted’. Yet you give no indication as to who made these assessments, or where and when they appeared. It seems astonishing – even shocking to me – that no proper investigation was undertaken soon after the events at the end of the war, when witnesses were available. (Perhaps it was, but the report was suppressed . . . ) What happened to Tom Bennett’s report (if he wrote one)? Were the results of these investigations ever promulgated so that the public or other historians could discuss them? If not, why not? Why is there nothing on the website that refers to the tragedy?

                2)      Administrative Errors: Likewise, you state that ‘the issue of identity can be explained by administrative error’. Who has made that judgment? And how can such an unfortunate  series of circumstances all be laid at the feet of some careless administrator? After all, fifteen Lancasters made it home that night, with a full complement of aircrew and passengers correctly recorded. Thus the error to which you ascribe the identification problem affected the sole aircraft that went off course, resulting in a confusion over who was killed that went on for two years. Surely it was the responsibility of the flight supervisors to be absolutely accurate over the composition of crews of airplanes, so that next of kin could be confidently informed when incidents of this nature occurred? Was the problem characterized as an administrative error at the time, and was remedial action taken?

                3)      Breadth and Depth of Research:  You mention that Tom Bennett ‘pursued many avenues of research, including Air Historical Branch (= what?), the British Embassy in Oslo, the Norwegian War Graves Service and local Norwegians’. But when did this happen? And what was he told? Did he have communications with the Commonwealth War Graves Commission? Or the Air Ministry, or its successor, the Ministry of Defence? Do you believe that Wing Commander Tait had been completely open with him? Do you not agree that the investigations that I have carried out concerning SOE and Operation PICKAXE, the military mission in Moscow, the NKVD, Milorg, the Norwegian Communist Party, the Americans at Poltava, etc. etc. are relevant to a proper analysis of the case?

                To address your other points:

                ·         I am surprised that you say that an exhumation of the remains the unknown airman at Nesbyen seems an ‘impossible scenario’. If he is indeed ‘unknown’, no one should be offended, and DNA analysis should reveal vital clues to his identity.

                ·         It is important that the idea of a ‘stowaway’ be discarded. I have never suggested that any agent could have secreted himself on the Lancaster without his presence being detected, even if in British uniform camouflage! The crew must have known that some special operation was under way. It might have been explained to them as another PICKAXE operation, where RAF bombers were used to drop Soviet agents in occupied territories as part of the SOE-NKVD collaborative project. And the fact that PARAVANE veterans discussed this possibility proves that the idea had been considered. But how was the mystery introduced to these veterans? Were they told about the Wyness/Williams debacle? Did they discuss whether agents might have been infiltrated on board with the approval of the authorities?

                ·         I would regard the minor distinction between exposing the secret to nine rather than seven, as a risk, as minimally relevant. After all, was not each of the fifteen Lancasters returning that night carrying extra passengers, because of the damaged craft left behind as not being airworthy?

                ·         I have no insights on the suitability for such a mission of Wing Commander Tait versus Flight Officer Levy, or how Levy was selected. But maybe Tait’s role was to lead the squadron in its loose information, and the chosen plane had to be last in line, so that it could peel off without its deviation being noticed by the crew of any other craft. I agree with you that Tait must have selected Levy for the operation, and again wonder how much he told Bennett. (One could surmise, perhaps cynically, that the least experienced crew was chosen to undertake such a dangerous mission, and that Churchill would not have been too chagrined had it failed.)

                ·         You suggest that it seems ‘inconceivable’ that Tom Bennett would not have picked up any hint of covert operations, had there been any. Yet the issue of ‘stowaways’ had been raised, which truly suggests some clandestine activity had been suspected. And, if he had indeed picked up such suspicions, might he perhaps have been strongly instructed not to disclose them?

                ·         You refer to the ‘fog of war, poor record-keeping, and lost documentation’ as possible causes of the mystery of the identification, and treat them as ‘reasonable’ factors. (Though how ‘lost documentation’ could be a predecessor phenomenon in this incident seems hard to believe.) Yet again, I reinforce the fact of the peculiar circumstances whereby these ‘administrative errors’ affected solely one plane out of sixteen – one that had a large number of enigmatic aspects to its flight crew, its adjusted flightpath, and the troubling circumstances of its demise.

                ·         You again use the passive voice: the location of the crash ‘is sometimes attributed to a navigation error – which might include the “blown off course” explanation offered’. (How could a ‘navigation error’ take place when the aircraft were flying in formation? How easily could a Lancaster be ‘blown off course’ without making a correction, or communicating the problem? And how come no other plane underwent the experience?) Who has submitted these explanations and judgments? Why does no one take responsibility? Moreover, the Flight Loss Card indicates that PB416’s destination was ‘Norway’, and it records the crash site as being near Nesbyen. The plane was reported as having circled the area for some time. Moreover, there was no apparent surprise when the navigator asked Dyce for a QDF reading! Why do you ignore this clearly documented evidence?

                ·         As for making landfall in Northern Scotland, as I understand it, some of the Lancasters were rerouted to land at Lossiemouth, because of fog at Woodhall Spa, and did in fact land there (as Flight Officer Watts recorded). The maps indicate that the safest route was still to fly over Sweden and north of Denmark, and then make progress towards Lincolnshire or Northern Scotland. Taking that sharp turn to the west across occupied Norway offered no advantage whatsoever. You admit that weather does not appear to have been an issue that night – at least not over Sweden.

                ·         Could Levy have decided on a shorter route without informing his controllers, or without the controllers noticing that he had diverted? Why, if the aircraft was experiencing technical issues, would it remove itself from the formation, and pass over hostile territory? Moreover, if you look at the map of the route, once a plane reached the Skagerrak in the North Sea, Lossiemouth is actually closer than Lincolnshire.

                ·         If low-grade Russian fuel was to blame, how come that PB416 was again the sole victim of this misfortune? Presumably all sixteen planes were fuelled from the same source, and fifteen made it back without incident. By the way, you quote Iveson’s log (mentioned by Sweetman) that stated that his crew, ‘like Watts’, found Woodhall fog-bound, and the plane thus diverted to Lossiemouth. Is that Sweetman’s interpretation? Was it really left to the officer to make that determination? If so, how could it have been that Levy, in PB416, knew about the needed diversion when he was over Sweden?

                ·         Where is the Norwegian account of the crash site held? Can it be inspected? I am not surprised that, if PB416 flew into a mountain, the craft ‘showed evidence of battle damage and that the fuel tanks were “torn and empty”’! Did anyone really expect that they would survive the impact intact? Should we really treat this information seriously?

                ·         The evolution of the ‘identified’ members of the crew  – and passengers – of PB416 merits special attention, as shown in the following phases:

                i)  The September Operations Record Book, showing the original seven listed from the departure on September 11 (without Naylor and Shea), and recording the disappearance of the aircraft on September 18, with an assumption that the crew was the same;

                ii) the roster (‘nominal roll’) of those that left Yagodnik on PB416, compiled by Squadron Leader Harman (unavailable, but apparently adding only Shea as passenger);

                iii) the recognition on the Flight Loss Report made out at Woodhall Spa the day after the accident that Naylor and Shea had both been passengers;

                iv) the numeration of bodies on the ground, made by local Norwegians;

                v) the listing of names on the crude memorial in August 1945 (including Wyness and Williams),

                vi) the initial Graves Registration Report from August 1945 (which omitted McNally, but included Wyness and Williams);  

                vii) the ‘final’ War Graves Commission report in December 1946 (with McNally restored, and Williams and Wyness removed); and  

                viii) the ten headstones in Nesbyen Churchyard, including an unknown airman.

                ·         The public deserves to know about this. While I, in my articles, have done my best to describe and interpret the sequence of events that drove the confusion, I see no evidence that the Squadron has performed any rigorous analysis of the debacle. Yet the fact remains: there is an unknown airman lying in rest in the Churchyard, and neither you nor the Ministry of Defence can explain who it might be, as there is no British (or Canadian) officer missing to be accounted for. I agree that I can offer no solid evidence of the conspiracy, but my hypothesis is much more plausible than the vague claims of human and administrative error that you propose. (The ‘fog of war’ is an inadequate explanation.) Professor Titlestad (whose father was Peder Furubotn’s security officer) is one of several who accept my conclusions. It will remain an enigma only so long as you keep it under wraps, and show no resolve to explore it further. I hope that my endeavours will encourage you to open up, publish your findings, and engage in a further debate about the events. Also, that the Squadron and the Ministry will be ready to offer an apology when the eightieth anniversary of the crash comes up this September.

                I respectfully await learning what your next steps will be.

                Sincerely,
                Tony.”

                Dr. Owen’s reply of June 5 was disappointingly terse:

                “Dear Tony

                I have spent a considerable amount of time considering your hypothesis, and commented as requested.  

                I have nothing further to add.

                Rob”

                This failure to engage was extremely depressing. I am sure that Dr. Owen is a fine man, dedicated to serving the Squadron Association for whom he works, but his behaviour does not display the attributes that a serious historian should regard as essential to his or her craft. It was incurious, unimaginative, obscurantist, selective, insular, and proprietary. It reinforces my belief that history is too important to be delegated to ‘official historians’. To ignore the evidence and resort to identifying causes such as ‘the fog of war’ is simply unprofessional. I therefore issue this posting in the hope that someone else may pick it up and gain the attention of more independent and resourceful analysts.

                2 Comments

                Filed under Espionage/Intelligence, General History, Geography, Management/Leadership, Politics, Technology, Travel

                Special Bulletin: ‘The Airmen Who Died Twice’ – Part 4

                Peder Furubotn

                [I present the final segment in my series ‘The Airmen Who Died Twice’, offering a bold but confident hypothesis concerning Stalin’s objectives for the mission of sending agents to Norway disguised as British RAF officers. I have added a page containing the whole report in PDF format at ‘Airmen Who Died Twice’ (PDF), which may make the experience easier. This process is something of an experiment for me. I hope to improve the presentation soon. Feedback and tips appreciated!]

                Chapter 7: Resistance in Norway

                The overwhelming questions to be answered regarding the Soviet Union’s ability to stow two agents on a British plane, dressed in RAF uniforms, to parachute into southern Norway in September 1944 are: What possible objective could such a mission have had? And why would the RAF agree to such a foolhardy and potentially embarrassing adventure? The assumption must be that, for the mission to be successful, the agents, probably incapable of speaking fluent and unaccented English, would have been deemed capable of carrying out the impersonation of legitimate British officers, and thus of gaining access to the circle of a communist leader in whom Joseph Stalin had a particular interest. His name was Peder Furubotn, and he had for some time been incurring Stalin’s acute displeasure. Yet, if anything went wrong – or, equally astounding, even if the project were successful – the agents’ costume would immediately have implicated the RAF, with highly embarrassing implications.

                In the analysis of these conundrums, it is useful to recapitulate the role of Norway in the war, its occupation by German forces, the collaboration or competition between various sabotage organizations and the nation’s governments at home and in exile, and the tenuous and contradictory relationship it held with the Soviet Union, a nominal ally. Norway was separated from Stalin’s fortress only by a thin section of the Finnish Petsamo region, an area rich in minerals, however, and thus bearing strategic importance.

                The country had been ill-equipped to resist the German invasion of April 9, 1940. Hitler had designs on Norway’s natural resources, including its hydro-electric power, but he also needed to control the flow of iron-ore from neutral Sweden across the natural land-route. Great Britain and France had been aware of the threat, and they had prepared to send an Expeditionary Force to gain control of the valuable port of Narvik. This was conceived during the war between Finland and the Soviet Union, which started in September 1939. At that time, Nazi Germany and the Soviet Union were signatories to a joint non-aggression pact, and control of Finland had been granted to Stalin for purposes of national self-defence. Any communist-inspired resistance movements against the Germans were forbidden – until, of course, the Barbarossa invasion of Russia in June 1941 changed all the rules.

                Britain in fact had had to beat a hasty retreat, assisting with the escape of the Norwegian royal family to London to create a government-in-exile in June 1940. It had overestimated the power of its own navy and misread the intentions of the Wehrmacht. Thus Norway fell into the category of occupied territory, and a cowed population had to decide what form resistance to the German invaders should take. In fact, the Nazis were overall more indulgent with the Norwegians than they were with other conquered nations: they regarded the Nordic race as Aryan brothers, and hoped to integrate the populace into the New Order when the war was won. That favouritism, however, did not extend to mercy when violence was exacted against their police and military forces, with some harsh reprisals enacted, and this tension played a major role in the following years.

                Routes of Arctic Convoys

                Soon after Barbarossa, however, Norway took on fresh significance when Churchill and Roosevelt resolved, in August 1941, to assist the Soviet Union by sending supplies through the Arctic convoy system. This required ships to navigate the dangerous Norwegian and Barents seas to reach, primarily, the ports of Murmansk and Archangel, skirting the northern coasts of Norway, and thus becoming potential prey to German craft berthed in Norwegian ports and inlets, such as the battleship Tirpitz. The convoys continued (with some interruptions) until the end of the war. Stalin kept a close eye on Norway, and he evolved his strategy as the war progressed.

                The accounts of resistance in Norway present a contradictory picture: some display ignorance, others practice concealment, and others distort (for political reasons). It is consequently often difficult to pin down the details of events – both their motivations and their outcomes. It seems to me that both London (in the guise of the government-in-exile and SOE) and Moscow (the NKGB) believed that they were controlling the strings, when in fact the agencies on the ground often pursued unlikely alliances to further their goals. I here try to concentrate on the less controversial facts, identifying the main motifs in the plotline.

                The British Special Operations Executive trained and prepared a vigorous Norwegian section to carry out sabotage within Norway, which became more intense when the British suspected the Nazis of creating ‘heavy water’ as an important part of the project to build an atomic bomb. Yet fierce reprisals in response to SOE raids alarmed the major resistance organization in place, Milorg, and it resolved instead on a more passive approach, and to focus on preparation to assist invading forces for the time when the Nazis began to lose the war. Milorg was led by a lawyer, Jens Hauge, an enigmatic and controversial figure, who had sought a medical discharge from military service in 1939. He joined in early 1942. The tensions between SOE and Milorg were then resolved by the creation of the Anglo-Norwegian Collaboration Committee in the spring of 1942, and SOE’s independent course was officially halted by October of that year. Yet Milorg did not halt its own sabotage activities, and it pursued a course of assassinations of known traitors.

                There was, however, another resistance group, Osvald, which evolved out of the pre-war antifascist Wollweber League, and was led by the more aggressive Asbjorn Sunde. He invoked the assistance of the Communist Party (now strictly underground), and established training centres around the country. Sunde was a tougher character, a sailor who had learned sabotage and assassination in the Spanish Civil War fighting with the Communists for the Republican movement against Franco’s Nationalists, and he was a loyal Stalinist. Thus a pattern familiar elsewhere in occupied Europe emerged: certain resistance groups were set on restoring the pre-war political configuration (such as SOE collaborating with the royalist/social democratic government-in-exile), while others were being directed by Moscow in preparation for a post-war communist takeover. Sunde was ordered to minimize sabotage activity, and to concentrate instead on providing intelligence to his NKGB bosses. Yet the relationships appear to have been very complex: the government-in-exile sometimes gave directions to the Stalinist Osvald group on sabotage projects, and it appears that even Milorg collaborated with it, engaging Sunde’s hitmen to carry out its targeted assassinations.

                Added to this recipe was the afore-mentioned Peder Furubotn, leader of the Communist Party in Norway. Furubotn’s organizational skills and connections allowed him to sponsor resistance groups in Oslo, Bergen, and Hallingdal. He was also a controversial figure, known for his independence of thought: he was an outlier, a provincial, with his power-base in Bergen away from the capital centre of Oslo. But he was also a dedicated patriot who desired to bring a domestic Communist regime to Norway after the war through democratic processes, not under the thrall of the Soviet Union (rather like an unauthoritarian Tito). He had in fact spent the years 1930-1938 in Moscow, an experience that included the witnessing of the Great Purge and the execution of some of his friends, which assuredly made him deviate from the solid Stalinist line he had taken up in the 1920s.

                Professor Titlestad

                According to his biographer, Professor Torgrim Titlestad, who has uniquely been able to inspect Russian archives, Furubotn had long been under the threat of execution, since in Moscow he had aligned himself closely with Bukharin, the executed ‘traitor’, and had refused to declare his public support for the outcome of the show-trials in 1938. Before Barbarossa, the Norwegian Communist party had tried to have Furubotn, who had from Bergen independently undertaken resistance in that period, removed from the Party, but the tables were turned when the Soviet Union became an enemy of the Nazi occupiers. At the time most other important Norwegian communists had either been killed, were in the hands of the Germans, or were refugees in Sweden, and Furubotn was elected General Secretary at the end of 1941. This was in defiance of Stalin’s orders of 1938 (when Furubotn was banished back to Norway from Moscow), that he should hold no senior position in the Party.

                Furubotn was able to work independently for many years. He was a survivor. In spite of frequent unsuccessful attempts to bring him in line, during the war Moscow lacked local resources or the military reach to change his behaviour, or to remove him from office. At first glance, the need to have him out of the picture should have appeared less urgent as the war progressed, since Norway (apart from the strategic Petsamo region) did not feature strongly in Stalin’s plans for territorial control of Europe. It was not a conventional ‘buffer state’, hardly a threat to his ambitions, and Stalin accepted that it was part of the ‘western’ sphere of influence. The Soviet dictator did not want to waste resources in trying to control it, although he supported British-American desires to prevent valuable troops from being transferred from Norway to the battle zones in Germany, and he did collaborate with the British and Americans in the plan to oust the Nazis from the Finnmark (the North-east Norwegian territory abutting the Soviet Union).

                Sunde’s Osvald group – perhaps surprisingly, given Sunde’s Stalinist aims – gained his funds primarily from the government-in-exile in London, supplemented occasionally by Moscow (through the agency of the Soviet legation in Stockholm, as the VENONA transcripts show). Yet Sunde looked to his rival, Furubotn, for funds, too. In September 1942 he agreed to supply guards at Furubotn’s central camp of the Norwegian Communist Party (NKP) in Hemsedal, in exchange for a continuing supply of money and materiel from the NKP leader. Furubotn had tried to make Sunde sabotage-leader for the NKP, but on the condition that he break his ties with Moscow – something Sunde refused to do, which strained the relationship, and led to severe friction by the end of 1943. Sunde established a training centre in Rukkekdalen in the winter of 1942, and recruited a network of saboteurs in the Torpo-Gol and Nesbyen areas, in the Hallingdal valley. This was the same area used by Milorg to establish its ‘Elg’ base in the early summer of 1944.

                Reichskommissar Terboven

                Yet the decreasing effectiveness of sabotage, and the costs of maintaining the subversive units, prompted a change of plan. By February 1944, Milorg, alongside the Foreign Office, SOE, and the OSS, had openly disparaged the Communist sabotage efforts, and had applied pressure on Osvald to reduce its aid for Furubotn. The feud between Sunde and Furubotn (which had sharpened when Furubotn had threatened to kill Sunde if he followed through on a plan to assassinate the Nazi Commissar Terboven) intensified. A month later, Sunde did indeed withdraw protection for Furubotn and his network, and he turned his attention to Norwegian exile groups in Sweden. The British increased their operations in support of eventually ousting the Germans: Operation FIRECREST was launched by sea in April 1944, a four-man team landing and then starting to give weapons training. In May, Moscow, through Pavel Sudoplatov (of Special Tasks), ordered Sunde to wind up his organization, and refrain from any further sabotage, Stalin explicitly admitting that the British were in charge in southern Norway, and that the theatre was too far away from Moscow for it to exert any influence. In June, however, Sunde’s network, including Furubotn’s group, came under fresh attack from the Gestapo and the Wehrmacht in Operation ALMENRAUSCH.

                Furubotn did not respond well to these moves, and he was increasingly isolated: he had enemies in Hauge and Sunde already, but now, with his autonomous subversion efforts, became an irritant to the British to compound the enmity to him maintained by Stalin. That may have been a fresh pretext for Stalin to want to have him eliminated – as a proven ‘Trotskyist’ defying the policy of the vozhd – and a move against him could represent a useful gesture to his allies. Furubotn had incurred Stalin’s anger by defying his order to stay out of the Party organization when he had returned to Norway, by executing subversive campaigns during the period of the Nazi-Soviet pact (which he had openly criticized), by refusing orders to move to Sweden (where he feared he might be killed), by expressing support for the Norwegian government-in-exile in London, for attempting to wean Sunde away from the NKGB, and for openly publishing anti-Stalinist tracts in the summer of 1944. Others had been killed for less, and Furubotn believed that attempts would be made on his life on his home territory. Professor Titlestad has suggested that Moscow may have recommended to Sunde that he remove his security details from Furubuton’s hideout, thus perhaps allowing the Gestapo to infiltrate the NKP, and to take on the task of eliminating Furubotn. Yet Furubotn had escaped the ALMENRAUSCH assault, despite Sunde’s apparent betrayal, and may thereby have come afresh in Stalin’s sights.

                The circumstances of the ALMENRAUSCH operation are puzzling. If a sizeable force assembled by the Wehrmacht with the help of the State Police (the Statspolitiet) did in fact conduct a punitive operation against Norwegian resistance forces (including Milorg, and the two factions of the KPN) on June 13, 1944, it is astonishing how little loss of life there was. The Wikipedia entry (the only account in English, I believe) at https://en.wikipedia.org/wiki/Operation_Almenrausch indicates that a force of eight-hundred was deployed, but that the operation was largely unsuccessful, even though it attacked a ‘secret’ hideout. Eight communists were arrested, but only one was executed. That does not sound like a typical Nazi response. Professor Titlestad explains it as a combination of the Nazis not wanting to kill a large number of fellow-Aryans, as well as a degree of nervousness about the chances of survival of the members of this punitive force in a hostile rural region. Yet the Professor also writes that Furubotn had been the Gestapo’s most wanted man, and that it had tortured and killed Norwegians in an attempt to track him down. The decisive outcome for Stalin, however, was that, in July 1944, Furubotn was still alive.

                If an agreement solely for the infiltration by air by NKGB agents to Furubotn’s camp, without any explicit goal of assassination, did take place between Stalin and Churchill (which must be the least alarming hypothesis), it occurred at a time when relationships between Great Britain and the Soviet Union were rapidly deteriorating. SOE had grown frustrated with the lack of co-operation in Moscow, and the Foreign Office was infuriated by Stalin’s abuse of its Military Mission there. The Warsaw Uprising, when Stalin refused to allow Allied planes to refuel on Soviet territory, and the Red Army watched what was happening from across the Vistula, contributed to the discord. In addition, the pressure on the War Cabinet to return to the Soviet Union all POWs they had been liberating, and the lack of co-operation from the Russians over the efforts to attack the Tirpitz, conspired largely to an atmosphere of utter distrust. On August 18, Foreign Office Permanent Secretary Orme Sargent even declared that the Soviet Union was the future Enemy Number 1.

                What is certain that some intense discussions took place in London towards the end of August, with Milorg’s chief, Hauge, visiting for four weeks, having been authorized to use the ‘bearing ball’ run by Mosquito from Stockholm to Leuchars. One outcome of that visit was that Milorg now became known as ‘Home Forces’. According to one account, sensing that victory was in sight, the ANCC in January had authorized the provision of a large amount of weaponry to Milorg, and in June SHAEF (now having taken charge of SOE projects) approved of attacks on Nazi industries and lines of communication. Professor Færøy, on the other hand, has stated very confidently that these increased shipments did not take place until ‘the autumn’. The scope of military coordination debated then included measures to counter German scorched earth policy, the capture of Gestapo documents, the destruction of the Gestapo HQ in Oslo and (perhaps most provocatively) a list of agreed assassination targets. Hauge’s meetings in Britain to determine these policies were held at senior level with the Norwegian Government in exile, with Special Forces Headquarters, with the Anglo-Norwegian Collaboration Committee, and with Viscount Selborne, the Minister of Economic Warfare in London, as well as with General Thorne in Edinburgh. Thorne was responsible for the deception plan of FORTITUDE NORTH, as well as for the preparation for the liberation of Norway. Yet, because of the sensitivity of the conspiracy, it is hard not to conclude that the meetings in the United Kingdom must have been entirely coincidental to the plot against Furubotn.

                More reliable wireless communications were now being established between SOE and Milorg, and, in Operation GOLDEN EAGLE, two more agents were dropped directly in the Hallingdal area on August 28, to help establish the Elg base with improved radio contact, and to enable preparation for further intensive and frequent drops of supplies over the following months. And then, as Britain started to consolidate its hold over subversive operations in southern Norway, in early September 1944 the very sudden and highly momentous intelligence arrived that Stalin had approved the launching of attacks on the Tirpitz from Soviet territory, which caused a sudden flurry of changes to the PARAVANE project.

                Whether the planned assassination of Furubotn (which is posited here as the motivation for the infiltration into southern Norway of Stalin’s agents) was related to the permission Stalin gave for British bombers to fly from Soviet airfields is probably unverifiable. The British must have had something important to gain from the arrangement, but any decision taken must have occurred at the highest levels of command. It is possible that Churchill did not know what Stalin’s precise plan for his agents was, but his agreement in allowing them to assume the identities of live RAF officers is extremely incriminating. If any knowledge of the details of the conspiracy did exist, it must surely have been restricted to Churchill and Gubbins, the head of SOE. SOE/MI6 had a direct – but highly insecure –  line to Moscow through its representative George Hill, who was on good terms with Stalin, so negotiations could have been carried on through that medium. The relevant archival material shows some intense exchanges between London and Moscow in August and early September of 1944, but nothing obviously attributable to the Furubotn plot.

                As for the RAF, it would obviously have known that it was being ordered to mount a highly irregular operation, but the leaders (i.e. Portal, Harris, Cochrane, McMullen, and Bottomley at the Air Ministry) would not have been aware that the objective of the mission was in fact assassination. They were probably informed that the subterfuge was simply part of an extended PICKAXE operation (i.e. one in a series of co-operative ventures between SOE and the NKGB), where Soviet agents had to be infiltrated in disguise in order that they would be welcomed properly by Hauge’s Milorg network. They would not have known that Sunde (probably) would then lead the twosome to Furubotn’s lair.

                Stalin and Churchill

                On the other hand, it was a low-risk undertaking for Stalin: he did not care about the fate of agents sent abroad on sabotage missions; their lives were expendable, and, since they would be wearing RAF uniforms, it would be difficult to trace anything to him, in any case. But for the British, it was a highly dangerous operation, involving deceit, not just with RAF crewmen, but with the Norwegian government, who, if its members learned of the plot, would not have taken kindly to the phenomenon of murder missions by foreign Communist infiltrators being abetted by their close wartime ally. Even if the mission had been successful, and the perpetrators had in some way been removed without their masquerade being detected, word might have leaked out, because of the packed Lancaster, the airmen who made it back safely, and the knowledge of the impersonated officers returning home. But if it failed – and in such a disastrous and spectacular fashion, as it did – the repercussions could have been tragic and far-reaching. Yet the destruction of the plane, and all inside it, managed to impose an eighty-year silence that has succeeded in exculpating all the perpetrators.

                [I thank Professors Titlestad and Færøy for their advice on this chapter. The opinions represented here are of course my own, and I likewise take responsibility for any errors. coldspur]

                Chapter 8: Conclusions

                No documentation to prove that Churchill and Stalin conspired to launch the operation to Hallingdal has appeared, and it probably never will. Yet such a decision, to have NKGB agents dressed up in the uniforms of living RAF officers, and be equipped with their ID-tags, can have been authorized only at the very top. It was assuredly not an SOE operation (although SOE radios and servicemen were certainly employed); nor was it an idea of Bomber Command, which would have been fiercely resistant to the subterfuges and risks associated with such an enterprise. Churchill’s irrational and misguided desires to placate Stalin must have convinced him that the Generalissimo’s demands were worth acceding to. The opportunity to carry out an attack on the Tirpitz from Soviet territory, with a presumed greater chance of success than flying directly from Scotland, must have been irresistible to him.

                Lancaster at Yagodnik

                One can imagine the strained atmosphere when Lancaster PB416 prepared for take-off at Yagodnik on September 17, 1944. Because of the damaged and unusable planes left behind, their crews had to be allotted to the remaining flightworthy aircraft, resulting in crowded conditions. The mood would probably have been very positive, however, given the (modest) degree of success of PARAVANE, and the prospect of returning home with no loss of squadron life. And yet two Soviet citizens were foisted on this particular team, and the members must have been informed that the couple, equipped with parachutes, was to be dropped somewhere along the flightpath. They might not have known that the agents were masquerading as British fellow-airmen underneath their jackets, but they were probably disconcerted about this irregular deviation from the plans.

                Etnedal

                PB416 was never blown off course by inclement weather, as RAF reports later claimed. As the last plane in loose formation, it peeled off from the chain ahead of it off the coast of Sweden, and made a course for southern Norway. We know it was expected, because the navigator radioed his co-ordinates over Oystogo in Etnedal when the plane arrived there soon after one o’clock in the morning of September 17. These measures were recorded without alarm, even though the location was over three hundred miles to the north-west of the path on which the rest of the sixteen Lancasters were cruising home.

                What went wrong? One can perhaps imagine that the NKGB agents had second thoughts – not that they probably had any first thoughts of their own volition over the exploit. Threats had probably been made concerning their families. They knew that they must be on a suicide mission: even if they were successful in finding Furubotn, and assassinating him, they would not survive long in their British greatcoats, with their British ID-tags, but probably owning only a smattering of English, if any. Furthermore, they had to survive the parachute drop itself. It is highly unlikely that they had had parachute training, let alone from a British bomber, and the prospect of landing correctly on hard ground uninjured, and then meeting up with a friendly reception committee, must have seemed distant.

                One could conjecture that they perhaps tried to convince the pilot that he should abandon the drop, and take his ‘stowaways’ onwards to Scotland. But Squadron-Leader Levy had his orders, and he would not have wanted to present himself at Lossiemouth with two illegal NKGB agents in his complement of passengers, with much explaining to do, and no doubt flak to be received from the high-ups. The agents were probably armed. Perhaps some sort of skirmish took place, and the plane circled while attempts to resolve the issue, with Levy trying to convince the agents of their duty, took place. The dangers of the terrain went unnoticed, and the plane hit a treetop on the mountain in the Saupeset valley above the town of Nesbyen.

                RAF at Dyce, Aberdeen, which had been tracking the movements of PB416, must have known of the mission, and soon assumed that the plane was lost without any survivors. Yet the details appear, strangely, to have escaped their notice. If the Milorg reception-party, aided by SOE agents recently arrived (and maybe attended by Sunde), were in wireless contact (which they surely were, to have been able to finalize the arrangements), they would have transmitted the facts about the horrific collision with the mountain, and presumably have added that there could have been no survivors. Local civilians quickly erected a cross to indicate the ten bodies discovered, which they promptly buried. And yet this news never reached Bomber Command, or, if it did, was ignored. After the defeat of the Germans in May 1945 locals remembered the dead airmen with a hand-painted plaque in Norwegian.

                The fact was that it was more convenient for the full list of crew members to remain unknown and unknowable. The story about NKGB ‘stowaways’ could thus remain a secret for a while: the facts buried in red tape and obfuscation – the fog of war. Yet that calm was disturbed when the initial Graves Report was issued in July 1945, and then altered the following month, after an on-site inspection of the markers in Nesbyen revealed the names of Wyness and Williams among the casualties. By then, of course, Wyness and Williams were dead, and could tell no tales. Some coughing, and shuffling of papers resulted, and by the end of December 1946 the final report was able to declare that one unknown airman (of undefined nationality, but perhaps that need not be explicitly stated) had perished alongside the nine certain casualties. No one seemed to want to pose the question: how could the RAF not know who had boarded PB416 in Yagodnik?

                Even in this decade an incurious listlessness governs the attitudes of the War Graves Commission in England. Its representative acknowledges the paradoxes articulated in the records, but he shows no interest in taking the matter further. One could assume, perhaps, that corporate memory in the RAF (and in other departments of the UK government) endures to the extent that its employees and associates are firmly cautioned not to encourage any members of the public to press too hard on certain matters. One can admire the dedication that such civil servants (and volunteers) apply to maintaining histories and records while at the same time one has to challenge their lack of resolve.

                617 Squadron Badge

                As another example, in 2021, the painstaking Nigel Austin posed a question to the Official Historian of the 617 Squadron Association about the procedures involved in compiling a Flight Loss Card. (There is no mention of the loss of Lancaster PB416 on the Association’s web-page.) Dr Owen patiently explained the roles of the Air Ministry, Bomber Command, and the International Red Cross, and suggested that lines of communication became tangled during the investigations. He implied that the initial reports were confused because it seemed that items of clothing belonging to Wyness and Williams had presumably been borrowed, but he overlooked the issue of ID-tags. It was as if this were the first time that anyone associated with the Squadron has investigate the enigma, and Owen concluded his response as follows: “The more one looks, more gaps and unanswered/unanswerable questions emerge with regard to this loss”. Is the word ‘unanswerable’ telling – a sign of policy? In any case, no follow-up occurs.

                Even today, almost eighty years after the events, it would be politically highly embarrassing for the truth to be conceded. First is the fact of the cover-up itself – a betrayal of openness, a disgraceful lack of admission of responsibility to the relatives of those who died in the crash, and a promotion of lies about its cause. Second is the damage it performs to the reputations of those involved – the institutions themselves, of course, but also those who led them, and in particular Winston Churchill, with his sentimental behaviour towards Stalin, and his unforgivable tendency to relish picaresque adventures, and to become too involved in them. That is an aspect that his biographers have touched on, but – alongside his interventions in the betrayal of SOE ‘F’ circuits in France in the summer of 1943 – it merits much greater attention.

                Churchill had conflicting motives: to make a bold enough gesture to appease Stalin, but to keep it so secret that he would not offend the Norwegian government. Sadly, his obsession over Tirpitz was misguided: he did not know how sparse were its fuel supplies; he did not realize how cautious Hitler’s plans were for deploying the battleship, in his anxiety to protect his Nordic fleet; and he was unaware of utterly low the morale of the Tirpitz crew had sunk, frustrated by inactivity and the barrenness of northern Norway. Yet he surely could not have imagined that the destruction of the Lancaster aircraft, and all on board, could have been a possible outcome of his reckless agreement. The plane having reached Oystogo, it could have continued its flight, taking the Soviet agents to Scotland, where they would never have been heard of again, without Stalin being any the wiser. Whether the impersonators were anguished that the mission had been abandoned, or whether they pressured the pilot to cancel the drop, and save them, will almost certainly never be known. Yet the ineluctable fact that nothing about the operation ever seems to have leaked out from Norwegian sources who were involved on the ground is perhaps the most remarkable phenomenon of this tragic event.

                As for Stalin, it should come as no surprise that he would pursue such an adventure. He was ruthless, exploited weaknesses in his allies (both Churchill and Roosevelt), and single-mindedly hunted down anyone who challenged his authority. Furubotn would have been just another victim in the line of such as Ignace Reiss, Juliet Poyntz, Walter Krivitsky, Leon Trotsky, and a whole lot more. The opportunity arose, Stalin grabbed it, and he formulated the plot in a way that it could not be easily traced to any of his decisions, whether it succeeded or not. Not that any attribution to his scheming would have worried him: everything would have simply been denied.

                Peder Furubotn probably never knew about the exploit, or that he had avoided yet another attempt on his life. Did he really deserve the fate that Stalin had decreed for him? Professor Titlestad has devoted a large part of his career to investigating Furubotn, and he has written a biography of him, unfortunately not yet published. The Professor has created, however, a website dedicated to his researches, at https://furubotnarkivene.no/, and the ‘English’ tab introduces the visitor to a very useful article on his subject. What is startling to this writer is that the Professor sets out to rehabilitate Furubotn, describing him as ‘one of Norway’s most colorful and charismatic political leaders of the 20th century’ and that ‘for five years, he fought a life-and-death battle to avoid being killed by the Gestapo in Norway and became a role model for surviving the illegal struggle against the overwhelmingly powerful German occupation and its Norwegian collaborators in the NS [the Nasjonal Samling, the only legal party in Norway from 1942 to 1945]’. That was not how I had initially interpreted his role, but Furubotn’s daring example was converted into significant success for the Communist Party after the war.

                Professor Titlestad present some fascinating insights into Furubotn’s post-war career, when he even returned to Moscow and remained unscathed, describing him as a more constitutionally sensitive Communist, perhaps a ‘Euro-communist’ of the kind that excited leftist politicians in the western democracies in the 1950s. While I am in any case unqualified to comment on such analysis, this article focusses on the war years alone, and it seems that the record of Furubotn’s activities between 1940 and 1945 is very hazy. It is difficult to track at what time the revolutionary Communist morphed into the simpler and rather sentimental left-winger that the post-war record shows. What is clear, however, is that Furubotn defied Stalin too many times, and his enemies within the KPN made sure that accounts of his misconduct got back to the vozhd.

                I thus have to express some reservations about Furubotn’s heroism and reputation. Furubotn seems rather a sorry figure to me: a man lacking formal education who learned about Marxism only when he went to Moscow, and who, after the war, drifted into a vague socialism that invoked the Bible as often as it brought in The Communist Manifesto. If Furubotn had been a Communist during the war, whether Stalinist or not, the mission of a communist was class warfare, authoritarian control (‘the dictatorship of the proletariat’, of course, which was a ridiculous slogan). The institution of Communist power always ended in the incarceration or execution of class enemies, and the abandonment of any constitutional safeguards. The senior resistance organization, Milorg, detested the Communist Party, whether it was Sunde’s or Furubotn’s, and Milorg became the official voice of the people representing the government-in-exile. Yet the Communist message still resonated strongly among major sectors of Norway’s population.

                I thus maintain a few doubts about the Professor’s assessment of the integrity of Furubotn and his motives. He writes, also, that the Oslo Harbour sabotage operation orchestrated by Furubotn in the autumn of 1944 was an epochal event. “This activity, which carried the death penalty from the German side, greatly contributed to keeping the hope of liberation alive among Norwegians”,  he writes. Yet such an attack went entirely against the grain of what Milorg (and, reportedly the Stalinist rump group led by Sunde) was trying to achieve, and the reprisals could have been severe. Most Norwegians must have realized by then that the Nazis were on the run, and that the Allies were moving inexorably into occupied countries, including Norway. Which Norwegians would have been excited about the destruction of the capital’s port by a subversive revolutionary at that stage of the war?

                One last aspect of what appears to me to be a controversy lies in the Professor’s account of Furubotn’s time in Moscow before the war. He somewhat mysteriously writes that ‘Stalin reluctantly allowed him to return to Norway in the autumn of 1938 after 8 years in Moscow’, adding that Stalin kept the family of his son, Gilbert, in the Soviet Union as hostages. I was not aware that Stalin undertook any action ‘reluctantly’, which suggests unrealistically that the vozhd would actually listen to advice from his ministers – and that that group would actually proffer advice to him rather than simply await instructions. (The Black Book of Communism states that Furubotn ‘escaped’ from Moscow.) Elsewhere, Professor Titlestad notes that Furubotn was sent back and essentially demoted to serve a minor role in the Party in his hometown of Bergen, and the Professor has explained to me, having inspected KGB archives in Moscow, that Stalin let him go because he believed that the Gestapo would perform the murderous job for him. Yet Stalin’s ability to recall that he had let Furubotn slip through his fingers would give him additional incentive to extinguish the rebel: the PARAVANE episode of September 1944 was not the first attempt to silence Furubotn for good.

                Nikolai Bukharin

                The other observation that I found incongruous was the categorization of Nikolai Bukharin, whom Furubotn admired, and whom Sunde had apparently invoked alongside Genrikh Yagoda in denouncing Furubotn. Professor Titlestad writes: “Bukharin had long been one of the leading liberal Soviet leaders after the revolution in 1917, and his trial attracted significant international attention.” I believe that this is a serious misconception. Bukharin was innocent of most of the crimes he was accused of (but perhaps not that of threatening Stalin’s power), but he was no ‘liberal’. He was a Bolshevik who had enthusiastically embraced the revolution, and he was until his death a firm champion of the ‘glorious Cheka’ and its barbarous methods. A too facile equivalence of Bukharin and Furubotn glosses over what Furubotn might have become.

                *          *          *          *          *          *          *          *          *          *          *          *          *

                Postscript

                Lastly, a few observations on methodology. My collaborator on this project, Nigel Austin, has been a determined sleuth, tracking down arcane sources, identifying persons who have some connection with the mystery, and refusing to let go. I know, however, that he was continually on the search for proof of exactly what happened on that night in September, the proverbial ‘smoking gun’, and he might have proceeded forever until he found such. I have occasionally been able to track down such items in my attempts to solve intelligence mysteries, such as with the memorandum about Guy Burgess and the Comintern, the Letter from Geneva concerning Len and Ursula Beurton, and the article in the Viennese newspaper that revealed much about MI6 and Kim Philby, but such moments are very rare.

                I decided to explain to Nigel that historiography is frequently an exercise of the imagination, a detective investigation, in which one searches for clues, and then tries to construct a pattern of behaviour and events that can explain what is superficially inexplicable. There is not going to be a solid paper-trail in a case as complex as this. And that is how it was with ‘The Airmen Who Died Twice’. To me, the borrowed uniforms and ID-tags suggested stowaways of some kind. Yet in those conditions the stowaways could not have been furtive: they must have had approval. They could not have been British airmen: that group was completely accounted for. They must therefore have been agents, saboteurs, spies, of some kind. They would not have been Norwegian communists in exile: such persons would not have had to disguise themselves that way, impersonating British RAF crew members. They must have been NKGB agents – Russians. And if they were agents, they must have had a mission. And the obvious mission was assassination. A study of Norwegian resistance quickly came up with the name of Peder Furubotn, who had offended Stalin.

                Thus was the theory constructed. It all seemed rather tenuous: had Furubotn really annoyed Stalin that much? And why would Stalin choose that time to set his murder-squad off the leash? And then the encounter with Professor Titlestad’s latest research indicated that assassination attempts had already been made against Furubotn. Stalin could no longer rely on the Gestapo or the Sunde organization to get rid of his foe. So he took on the task himself, and invoked the gullible Churchill to assist him. As the cliché goes: ‘The rest is history’. But in this case it has not been so – until now. And it would be commendable if the British Government, through the Ministry of Defence, made some sort of statement and apology to the public and to the relatives of the dead airmen in time for the eightieth anniversary of the crash on September 17, 2024.

                4 Comments

                Filed under Espionage/Intelligence, General History, Geography, Management/Leadership, Politics, Technology, Travel, Warfare

                Special Bulletin: ‘The Airmen Who Died Twice’ – Part 3

                (This bulletin contains the third segment of my study of ‘The Airmen Who Died Twice’, which explains why two Soviet agents were carried on board a British Lancaster aircraft in September 1944, a flight that ended in disaster when the plane crashed into a hill in Norway. For the previous two segments, please turn to Part 1 and Part 2.)

                The Lofotens

                Chapter 5: Intelligence Manœuvres

                The implications of co-operation between the RAF and the NKGB in infiltrating Soviet citizens with subversive objectives into a third country occupied by the enemy are highly significant. It is such a sensitive issue that one would have to conclude that one of Britain’s wartime intelligence organizations was involved. Admittedly, southern Norway was beyond the regular range where the Soviets were able to drop agents for intelligence purposes, but they would not have sought British assistance unless it were not a routine operation. It does not appear that they wanted to parachute in a spy or saboteur blind, without some sort of reception committee. Hence they must have been seeking help from British or British-trained contacts on the ground. Such a pattern is not unprecedented, but the utter lack of any reference, in the records of the RAF and the intelligence agencies, to the joint operation over Norway points not just to a highly clandestine operation, but also to a monumental embarrassment when it ended so dismally and tragically.

                The two institutions that maintained networks in countries occupied by the Nazis were the Special Operations Executive (SOE) and the Secret Intelligence Service (SIS, sometimes known as MI6). The first was essentially a sabotage organization, a civil unit reporting to the Ministry of Political Warfare, although many of its leaders were military men. It had been created by Winston Churchill in 1940, specifically to cause havoc behind enemy lines. SIS, on the other hand, was an intelligence-gathering service with some history that worked more by stealth. It resented SOE’s very existence, since the business of sabotage tended to draw the attention of the enemy, while the agents of SIS worked as quietly as possible. Moreover, the fact that SOE had agents in the field meant that they were also a provider of intelligence. Claude Dansey, the assistant chief of SIS, made it his mission to undermine SOE whenever he could.

                Hugh Dalton

                SOE had an occasionally very strained relationship with the governments-in-exile of the countries where they built their networks. Hugh Dalton, the first minister responsible for SOE, was a socialist who viewed the mission of his organization to enhance the possibility of implementing socialist ‘revolutions’ throughout Europe after the Nazi foe had been defeated. Such a strategy was anathema to most governments-in-exile which, composed of members of the pre-war ruling class, hoped to reinstall the previous form of government, and its attendant privileges, after the war. In addition, Dalton was a notorious showman, who misrepresented SOE’s achievements in Norway, and over-promised to Churchill what the section could achieve. In turn, Churchill, ever the romantic, in February 1942 told the Norwegian government-in-exile that Norway would be the first country to be liberated – a foolish claim.

                On the ground, however, much of the strongest resistance to the fascists came from underground communist groups, who had suspended their disgust when the Nazi-Soviet pact occurred. After June 1941, when Hitler invaded the Soviet Union, and Stalin’s dictatorship became an ally of the western democracies, these cells renewed their vigorous ambitions for proper (not Daltonian) revolution. A pattern across Europe occurred whereby weapons and supplies dropped by parachute, intended for patriot forces, frequently ended up in units taking orders from Stalin. The perennial problem with SOE was that its strategy was apparently to prepare patriot armies for the coming arrival of British troops, but that event often took years in the making, or never happened at all, which was damaging to morale. Moreover, there was a permanent risk of arms caches being discovered by the Germans, or simply falling into disrepair. SOE’s management of expectations was poor, to say the least.

                Frank Foley

                This pattern repeated itself in Norway. Before the war, the SIS station in Oslo reported through Stockholm, but after some embarrassing events in Sweden, Frank Foley (who had been posted to Oslo in September 1939) returned to London in early 1940, and was put in charge of the whole of Scandinavia and the Low Countries. The Royal Navy soon made demands on SIS for intelligence on German naval movements along the coast. The arrival of SOE agents complicated matters, however: Norway was too thinly populated for networks to remain isolated, and there were several clashes between the two organizations. Moreover, SOE initially worked independently of both the Norwegian government-in-exile, and of Milorg, the military arm of the Norwegian Home Front, which, despite its name, was more focused on the future liberation of the country than attention-drawing sabotage adventures. SOE kept clear of it, as it regarded its security as lax. Likewise, the small communist groups also stayed apart from Milorg. They criticized it for its passivity, and were less concerned about Nazi brutalities.

                The Lofotens Raid

                Thus some harsh lessons were learned. The reprisals after the Lofotens raid of December 1941 triggered Norwegian animosity to SOE, which led to the establishment of a Joint Anglo-Norwegian Committee in London in February 1942. In January, a new SOE Norwegian section was split off from the Scandinavian unit, and the very pragmatic John Wilson had been appointed its head. Yet it took time for the Committee to exert any influence. In April 1942, mismanaged landings at the community of Telavåg, involving mis-steps by both MI6 and SOE in which two Gestapo officers were killed, led to fearsome reprisals. SOE accordingly made contact with Milorg in September of that year, in a spirit of collaboration. It took the first major operation undertaken by SOE and Combined Operations forces (commandos), the November 1942 attempt to land gliders in an attack on the Vermork heavy-water plant, to change policy. The assault was a disaster. The participants were executed: severe reprisals on the civilian population followed. Both Milorg and the government in London were horrified, and their disgust led to a more cautious approach to sabotage. The eventual sinking, in February 1944, of the steamer carrying heavy water on Lake Tinnsjo bolstered SOE’s reputation, but twenty-six persons were drowned in the process.

                Reprisals after Telavag
                Norsk Hydro, Vermork

                1943 was a transition year. After Milorg had supported, in April, an attack by the communist Sunde’s group on labour offices in Oslo, the government in exile called it to stop collaborating with communist organizations. In May, at a conference in Sweden, Milorg agreed that its future activities would be determined by the Allied Supreme Command, and that its mission would be to prepare for liberation. Norway had a role to play in diversionary exercises away from the main European theatre (Operation TINDALL, as part of the COCKADE deception plan), and some weaponry was parachuted in for the Norwegian resistance. Yet SOE itself suffered a major setback that autumn, when the infiltration of its Dutch and French circuits was discovered by the Chiefs of Staff. SOE survived (thanks to Churchill’s intervention), but was put under military control, the Norwegian Section of SOE coming under Special Forces Headquarters in May 1944. Soon afterwards General Eisenhower sent out a stern message to the Norwegians that, in the wake of the Normandy landings, no national uprising should take place, as the Allies had no immediate plans to invade their country. A predictable lowering of morale ensued, and, in recompense, some steady carefully-targeted sabotage operations were encouraged.

                The early months of 1944 had created a new climate, however. In February, the Foreign Office reported that uncontrolled sabotage by the Communists was increasing, sometimes with the aid of arms supplied by SOE. That was not part of the plan. In May, the Germans tried to press-gang Norwegian workers for work in the Reich, and hundreds of youths fled to the mountains, thus creating a kind of Norwegian ‘maquis’. An unuathorized but efficient group known as the ‘Oslo Gang’ reached a peak of sabotage activity in August. On August 17, Milorg executed a very damaging operation in which an oil storage depot at Son, on the Oslofjord, was exploded. More serious plans for guerrilla attacks were forged, and in May 1944, four sites were identified for the congregation of partisans, one of which was at Elg, north-west of Oslo – a few miles from Nesbyen, the site of the crash. Two men parachuted into Elg on August 31, 1944, and over a hundred men assembled there, with weapons and food stockpiled. That same month Jens Hauge, the head of Milorg, had travelled to London for four weeks of consultations with SOE, Army chiefs, the Ministry of Economic Warfare, and the Norwegian government-in-exile, and he crossed back into Norway from Sweden.

                Meanwhile, SIS in Sweden had been experiencing its own tribulations. The Admiralty applied pressure on the organization to provide intelligence on Kirkenes, on the Norway/Russia border, which led to a catastrophic joint project with the Soviets, where two SIS agents were flown into an airbase in August 1942. Instead of parachuting them in promptly, however, the Russians held them for two months, and then dropped them, improperly equipped, into Finland rather than Norway. They were captured, handed over to the Germans, and shot. Soon afterwards, the hapless head of station John Martin was replaced by the Russian-speaking Cyril Cheshire, but the lessons from trying to collaborate with the Soviets on clandestine operations appeared not to have been passed on, and properly internalized.

                Improbably, the closest cooperation between SOE and SIS occurred within the section of SOE that worked in the Soviet Union. At the end of 1941, an exchange of missions between London and Moscow had been set up, with an old WWI Russia veteran George Hill appointed as leader. He took a small group with him to start negotiating with the NKVD on shared sabotage endeavours, while the obdurate Colonel Chichaev took up a corresponding post in London. The whole project was highly controversial, since the Soviets wanted SOE help in parachuting agents into Western Europe, which was out of reach of their aircraft. The governments-in-exile would have had a fit if they had known that a British intelligence unit was abetting a potential Communist revolution in their home countries. Moreover, the Foreign Office – quite enthusiastic about ‘co-operating’ with Soviet diplomats – was alarmed at the prospect of collaboration with Communists in more murky quarters.

                As it turned out, the operation (named PICKAXE) was for many reasons a disaster, and incriminations started to flow both ways. Collaboration was called off in practical terms by early 1944. Yet by then, the SOE mission in Moscow had been badly abused by the NKGB (as the NKVD became). Hill had probably been appointed by Menzies, the head of SIS, and he represented both SIS and SOE in some of his agent management roles. Unfortunately his cipher-clerk, George Graham (who was of Russian aristocratic birth), allowed himself to be suborned by NKGB intrigues, with the result that Soviet intelligence gained access to SIS codes and cyphers. How that helped Stalin in his preparation for Yalta is an untold story.

                A further group in the drama was the 30 Mission, a British military unit sent out to Moscow in 1941, charged with exchanging military intelligence as a way of improving Allied combat against the Nazis. This was another troubled enterprise, since the officers who went there mostly returned in disgust after a short spell, frustrated by Soviet obtuseness and secrecy. Its negotiations had to take place via contacts in a department of the NKGB, and its direct exchanges with the Red Army (and even more so, the Air Force, which was subsidiary to the Army and Navy) were few and constrained. With the Arctic Convoys playing a large role in sustaining the Soviet Union’s goodwill, and ability to counter the Wehrmacht, a large body of sailors and other men was required in Murmansk, a presence that alarmed the NKGB, for fear of ideological infection of the local populace. 30 Mission was the hub through which all the problems and challenges had to be routed: General Martel, and his successor, General Burrows, tried vainly to make the Soviets see reason, and concluded that resolution and hard bargaining produced better results than attempts to please their reluctant hosts.

                Voskresenskaya-Rybkina

                Last but not least was the offensive arm of the NKVD/NKGB. In July 1941, after Barbarossa, Pavel Sudoplatov was appointed director of the Administration of Special Tasks, charged with sabotage and political assassination abroad. (Sudoplatov had been overall responsible for the murder of Leon Trotsky in 1940.) One of his closest associates was a woman called Zoya Voskresenskaya, also known as Rybkina, via marriage, and as a working alias, Madam Yartseva. Rybkina was sent by Sudoplatov to Stockholm, ostensibly as the press attaché to the Ambassador, Alexandra Kollontai, but in fact as the head of the NKVD station, which exercised a firm control over the activities of all the staff. Her husband, who went by Boris Yartsev as a junior diplomatic official in Stockholm, returned to Moscow in 1943, was present at Yalta, and met his death in Czechoslovakia, in 1947, in one of those mysterious car crashes that prematurely took the lives of intelligence officers who fell out of favour.

                In his memoirs, Sudoplatov wrote glowingly about his protegée, who had actually been his handler in Helsinki at the beginning of his career. In 1942, Sudoplatov was also put in charge of collecting information about atomic weaponry, and agents working for Rybkina in Sweden gained information from Lisa Meitner, who had discovered fission with her nephew, Otto Frisch. Sudoplatov claimed that the British knew about the NKGB’s networks in Sweden, and that they were collaborating with the Soviets on joint sabotage operations in Europe. Like many agents who worked under Beria, she was purged (but not imprisoned or killed) after Beria’s own execution.

                The deHavilland Mosquito

                Yet the most remarkable aspect of Rybkina’s possible contribution to this story is the journey she made to the United Kingdom in February 1944. The VENONA transcripts inform us that Vasily Razin, the First Secretary at the Stockholm Legation, informed Lt.-General Pavel Fitin, the head of the Foreign Intelligence Directorate in Moscow, that IRINA (Rybkina) had successfully arrived in England, by air, on February 6. This flight was operated as part of the so-called ‘ball-bearing’ run, almost certainly deploying a modified Mosquito. It was actually run by the Norwegian Air Force, but under civilian registration, with crews wearing BOAC uniforms and carrying British passports. It was a harrowing and dangerous experience: there was room for only one clandestine passenger, in the bomb-bay. Niels Bohr, the atomic scientist, was one beneficiary, and almost died from lack of oxygen.

                The Mosquito Bomb-bay

                Why permission should be granted to a known Soviet intelligence agent to take advantage of such a facility is mysterious, and can only point to some very high-level and secret negotiations. What is more, soon after Rybkina arrived, Colonel Chichaev had a private meeting with Colin Gubbins of SOE, a record of which may never have been made. Whether these events were related to the sudden movements in August, 1944, when Colonel Burrows of 30 Mission was recalled to London, his opposite number in the NKGB, General Slavin, disappeared abroad on some unspecified business, Jens Hauge, the head of Milorg, also travelled to London to meet with SOE officers, and two SOE agents were parachuted into the mountainous country north-west of Oslo, is still a matter of speculation. The coincidences are remarkable, yet the need for extreme secrecy over the negotiations with Stalin probably indicates that the particulars of the parachute drop were not on the agenda of the meetings.

                Chapter 6: Stalin’s Organs

                ‘Smersh’ by Vadim Birstein

                The rationale behind Stalin’s constant re-organization of his security apparatus is sometimes hard to unravel. In 1943, he separated some functions from the NKVD (The Peoples Commissariat for Internal Affairs) into a structure that had briefly existed in 1941, the NKGB (The People’s Commissariat for State Security). The latter was supposed to focus on the territories that had been briefly held between 1939 and 1941, and were shortly expected to return under Soviet rule, such as the Baltic States. But it lacked ample security forces. The NKVD had its foreign mission withdrawn, and concentrated on domestic affairs, such as surveillance of the citizenry, and management of the GULAG. At the same time, Stalin created a new body, SMERSH (‘Death to Spies!’), peeling off those cadres in the NKVD responsible for monitoring disaffection and cowardice in the armed forces. According to Pavel Sudoplatov, Stalin made this move to prevent his NKVD chief Lavrenty Beria from interfering with military promotions – and demotions.

                SMERSH existed between April 1943 and May 1946. Its head was Viktor Abakumov, who, like many of Stalin’s security and intelligence chiefs, came to a grisly end. Yet, while its initial task was to root out corruption in the military, it soon took over a more aggressive role identifying and eliminating real or imagined opponents of the Soviet regime in newly conquered territories. Moreover, while the initial threat was identified as German infiltration of the armed forces, its innate suspicion of foreigners in general meant that it turned its attention on the presence of Allied forces on Soviet territory. Notably, supervision of the American air bases in Ukraine had become the responsibility of SMERSH, alongside keeping a close eye on the naval mission in Murmansk supporting the convoys, and on the short-lived presence of PARAVANE operational staff at Yagodnik.

                Foreigners might not only be spies: they might also exert a pernicious influence on Soviet citizenry, and the records show that the organs assiduously kept a watch on any liaisons between Soviet citizens and members of the visiting armed forces and their support crews, and followed up with dire threats. Yet the war diaries of the PARAVANE operation do indeed show that some officers showed a more than casual interest in Soviet installations of technology, such as communications. The fact that such interest paled into insignificance against the wholesale theft of Western technology and ideas that the GRU (Military Intelligence) and the NKVD/NKGB had been undertaking for years was irrelevant to the earnestness of SMERSH’s hunt to extirpate any such activity.

                Mikhail Ryumin

                A SMERSH officer submitted a report on the PARAVANE operation on October 6, 1944, casting doubts on the true motives of the RAF members who led it. The report was probably written by a sadistic thug called Mikhail Ryumin, who was head of the Counter-Intelligence White Army Flotilla, reporting directly to Admiral Panteleyev in Archangel and Abakumov in Moscow. Ryumin had moved up the NKVD ranks by being a protégé of Nikolai Yezhov, the short-lived executor of Stalin’s most dreadful purges, but had survived after Yezhov’s execution. He was later a prime mover in the so-called ‘Doctors’ Plot’, a mirage of Jewish conspiracy conceived by Stalin, and he even denounced his boss, Abakumov. Stalin fired him for incompetence, however, and, after the dictator’s death, Beria had Ryumin arrested and executed.

                Ryumin’s report shows that he had a hazy understanding of the PARAVANE mission, emphasizing the failure of the attack on the Tirpitz as a cover for the true objective of seeking information about Soviet military installations (“It can be concluded that under the pretext of the shuttle operation, the flight had an exclusively reconnaissance purpose.”). He refers to the loss of one Lancaster over Norwegian territory, but indicates mistakenly that the return flights were undertaking another bombing raid on the battleship. As evidence for his conclusions about ulterior purposes of the mission, he lists misleading data about the weight and explosive capacity of the Tallboy bomb, the pilots’ cancellations of call-signs on the radio, and an understatement of the number of officers and men who would be arriving (which was, in fact, justified).

                The fact that he had been kept in the dark about the true circumstances surrounding the change of plan is shown by the fact that he attributes the haphazard landings at various airfields to a deliberate ploy by the RAF to determine the location, size, and condition of those same airfields. Of course, his report may have been crafted to show the appropriate communist diligence in disparaging the RAF’s failure to sink the Tirpitz, the objective of Operation PARAVANE. Its timing, moreover, could be significant: it was submitted to his boss, Abakumov, three days before the start of the so-called ‘Tolstoy’ Conference in Moscow, where Stalin hosted Churchill and Eden, and the notorious agreements about the carve-up of Europe were made without Roosevelt’s presence.

                Group Captain McMullen

                Yet some inappropriate nosing around was undertaken by some of the RAF contingent (see Chapter 3). Captain Abercrombie, who had joined the (military) 30 Mission in Moscow the previous April, sought permission to take photographs without constraints, and asked questions about the radio and power stations in Archangel. Ryumin also had negative things to say about a Lieutenant-Colonel Happen, who, after a request by Group Captain McMullen to travel via Moscow, Stalingrad and Tehran to Cairo been rejected, apparently made disparaging remarks and spread ‘anti-Soviet sentiments’. The fact was that the RAF members generally had good relations with their opposite numbers in the Soviet Naval Air Force, and probably said too much in unguarded moments. Such conversations were bound to be overheard by or reported to the SMERSH commissars embedded in the units. (An Appendix to the War Diary refers to ‘the sprinkling of N.K.V.D. personnel (male and female) to check that the interests of the Communist Party are not prejudiced’.) The Diary nevertheless expresses great appreciation of the support they received, especially from Colonel Loginov, who was Chief of Staff to the Commander of the Air Forces of the White Sea Flotilla, and McMullen wrote generous letters of thanks. These commendations (which may have been largely political) would have cut no ice with Ryumin.

                Pavel Sudoplatov

                One significant Soviet officer who was familiar with Ryumin (and had a low opinion of him) was Pavel Sudoplatov, who had been appointed head of the NKVD ‘Special Tasks’ unit in July 1941. Sudoplatov, who had engineered the assassination of Trotsky, was thus responsible for sabotage behind enemy lines, as well as further assassinations. He also took on a major role in handling disinformation exercises to fool the Germans about a potential anti-Soviet movement within the Soviet Union, as well as Operation MONASTERY, which aimed to penetrate the Abwehr’s intelligence network behind Soviet lines. Abakumov was jealous of Sudoplatov’s role, wanting it for himself, and challenged him in 1942 to turn over all radio deception games against the Germans to him. He was partially successful, but Sudoplatov kept the MONASTERY operation, as well as the COURIERS operation, which claimed the existence of an anti-Soviet faction within the Russian Orthodox Church. Thus the rivalries between Sudoplatov and Abakumov may have contributed to some mis-steps in the execution of the mission to Nesbyen.

                The relevance of these connections is important in the PARAVANE story because of Sudoplatov’s relationship with the NKVD officer Zoya Voskresenskaya, also known as Rybkina, after her marriage to another NKVD officer. She had worked for Sudoplatov at the beginning of the war, planning sabotage, and training partisans, when she and her husband were suddenly sent to Stockholm, where she was appointed nominally the press attaché to the Ambassador, Alexandra Kollontai, and took up the name Yartseva. Stockholm, the capital of Sweden, a neutral country, was, like Portugal’s Lisbon, a nest of spies and intelligence-gathering, and it controlled through regular communication the Stalinist faction of the Norwegian Communist Party, as well as providing it with funds. Yartseva was actually the most important person in the Embassy, and was also responsible for controlling the receipt and transmission of all the intelligence coming from the Soviet Union’s Rote Kapelle network in Germany. (Ian Fleming’s Rosa Klebb was reputedly based on her.)

                Voskresenskaya-Rybkina

                Sudoplatov’s relationship with Yartseva went back many years, since she had actually been his controller in Finland in the early 1930s, and they stayed in close touch. Yartseva had more recently been involved with Sudoplatov’s COURIERS operation, controlling members of the clergy in Kalinin. Sudoplatov also claimed that Yartseva was part of his management team on the ENORMOZ (atomic weapons) project, but his version of events has been challenged by Western experts. Yet they did have another important colleague – Colonel Chichaev, the NKVD representative in London charged with liaising with SOE and its Russian section, and maybe even handling some of the NKVD’s nest of spies. Chichaev had spent time at the Stockholm Embassy in 1940, working with Yartseva.

                These threads would come together as Stalin’s strategy for Scandinavia took shape. His ambitions were overall modest for neighbouring territories that were not to be occupied by the Red Army. Finland was problematic. It had a long border with the Soviet Union, and after losing a war in 1940 against the Communist regime – in which the Red Army was at first humiliated – the country had dangerously aligned itself with Nazi Germany, in the belief that Hitler would be the victor. While Stalin respected the Finns for their courage, he resolved to exploit them because of their support of the Fascists rather than waste military forces in conquering them. He was anxious to gain strategically useful territories from them, such as islands in the Gulf of Finland, in order to give him protection for the port of Leningrad and the Baltic States, and regain ownership of the Petsamo (Russian: Pechenga) region in the far north, with its valuable nickel mines. Moreover, the Communist Party was strong in Finland, although Stalin had purged many of its leading members in Moscow.

                Pechenga

                Sweden was not really a consideration: it had remained neutral during the war, and was geographically not so relevant. Norway had been occupied by the Nazis, and harboured a somewhat subdued resistance movement. Despite the lack of contiguity, some of Stalin’s ministers had pressed for Sweden and Norway to come under the Soviet ‘sphere of influence’, with Norway’s Communist Party a potential asset. The Norwegian government-in-exile was fearful that the Red Army would make incursions through the north of the country, and in early 1944 made appeasing overtures through the Soviet ambassador to avert the possibility. While Stalin probably found satisfaction in keeping that threat alive, and gaining concessions from the Norwegians, he in fact did not want to move Red Army divisions to Norway. He would prefer that the British take responsibility for clearing the country of Nazi troops, although he did not want the latter pouring into Northern Russia. (The negotiated restoration of Pechenga would present the Soviet Union with a narrow border with Norway.) Thus, in the summer of 1944, he pressed Churchill and Eden to take a leading role in the liberation of Norway, and gained a concession from them in August that Finland naturally fell in his bailiwick, and that the British had no strategic interests there.

                The western Allies wanted to consolidate their assaults into western Europe and Germany before dealing with the Wehrmacht in Norway: to that end the Chiefs-of-Staff had developed an operational feint called RANKIN designed to pin German troops in Norway through the D-Day invasions. On the other hand, the British did not want premature uprisings in Norway, hoping to preserve the partisan forces to hold their fire until the real day of reckoning. They were aware, however, of maverick Communist Party guerrilla units continuing to cause trouble. Yet Stalin, as in France, did not want any Communists to engage in provocative behaviour and risk turning the Americans against him before the Nazis had been beaten. Thus British and Soviet needs in the area began to converge. Stalin wanted to sign a pact with Finland, using it as a proxy.  He planned to demand from it the harassment of German divisions in the north of the country, as he wanted to move the few divisions he maintained on the Finnish border to the vital German battlefield, and he sought British assistance in the endeavour.

                On September 19, 1944, a few days after the PARAVANE Operation was executed, the Moscow Armistice was signed by representatives of Finland, the Soviet Union and Great Britain. The British War Cabinet had reviewed its protocols as early as September 7. They laid out some strict conditions: for example, the withdrawal of Finnish troops to the frontier as it existed in 1940; Finland to be responsible for disarming German land, air and naval forces in the country; the transfer to the Soviet Union of critical territories, such as Pechenga; the provision of up to three hundred million dollars’ worth of goods as indemnification for Soviet losses; and the handover of airfields in southern Finland for the Soviets to attack German forces in the Baltic States. Whether this last item was part of a quid pro quo with the British for the use of Soviet airfields in the attacks on the Tirpitz is not stated. But the timing is intriguing, and Stalin was accustomed to including ‘secret’ protocols in his political agreements.

                The negotiations that led up to this agreement are regrettably opaque. Yet the intrigues in sending Yartseva to London in February 1944, and the subsequent meetings (see Chapter 5) must have had some serious objectives. Stockholm was a notoriously isolated location: it took the Petrovs nine months to reach it from Moscow in 1942. For Yartseva to gain approval from the British and Norwegian governments for a valuable place on the ball-bearing run to Leuchars in Scotland (and presumably a return flight) must have meant that they considered she had both clout and information of great value, and that it was both safe and wise to allow her to have discussions with Chichaev. What political backdrop could have led to such a concession?

                (The final part of this story will appear on April 15.)

                Leave a Comment

                Filed under Espionage/Intelligence, General History, Geography, Management/Leadership, Politics, Technology, Travel, Warfare

                Special Bulletin: ‘The Airmen Who Died Twice’ – Part 1

                Hallingdal, Norway

                Preface:

                This Special Bulletin consists of the first two chapters of a report ‘The Airmen Who Died Twice’, the culmination of a project to investigate a mysterious airplane crash in Norway in September 1944. The events were first described in June 2022 on this website at  https://coldspur.com/special-bulletin-the-airmen-who-died-twice/. The complete article contains eight chapters: I shall publish two more in each of the following three months. In that way, the full account shall be available for the British authorities to respond to in time for the solemn eightieth anniversary of the crash of PB416 at Saupeset in Norway on September 17, 2024. I believe the relatives of those crew members killed in the accident deserve a proper apology for the deception and attempt at a cover-up that quickly followed the incident.

                I want to give full credit to the role that my collaborator, Nigel Austin, played in this research project. The original idea was his. He discovered some traces of the clumsily muddled story, and uniquely identified the contradictions in what little archival material existed. He then doggedly chased down resources and spokespersons for various organizations that were involved. He contacted me for assistance in providing some method and structure to his endeavour, and I was gripped enough by the drama and paradoxes in his outline to want to work with him. Unfortunately, some personal problems prevented Nigel from completing his side of our agreement, and I decided to take over the project before the details escaped from my overtaxed brain. I thus performed some original research on my own, and also turned Nigel’s observations into a narrative that I hope both instructs and explains. I also believed that it was very important that the story be published well before the eightieth anniversary, and, since no commitment from any historical magazine had been secured in time, I decided to use coldspur as the medium.

                Readers will notice that the report lacks any Footnotes. I took this approach in order to broaden the appeal of the text. However, I believe that the narrative is adequately sprinkled with references that will convince readers of the scholarly nature of the investigation. Sources can be supplied, and I shall list them separately, later. On the other hand, many of the communications that must have occurred are not traceable, and probably never will be. That is in the nature of highly confidential government undertakings. Thus the work is a hypothesis lacking firm proofs, but offering enough credible evidence to provide as watertight an argument as can be expected. I hope that, through the publication of these eight chapters, readers around the globe may be prompted to discover and present fresh memoirs, letters, or other documents that will flesh out the story. Or, of course, blow it apart. Because historiography is never finished.

                Appearing here on February 15: Chapter 3 (‘The RAF in Yagodnik’) and Chapter 4 (‘The Crash at Saupeset’). Enter the date in your calendar now! And, if you have observations or details to add to the story, please send them to me at antonypercy@aol.com.

                Chapter 1: Introduction and Historical Background

                The saga of ‘The Airmen Who Died Twice’ is a story about a rash deviation from a serious World War II aerial operation that went horribly wrong. It is a tale about hazardous decisions made under pressure, in a climate of tensions across political, geographical, linguistic, cultural and temporal boundaries. It contains aspects of deep secrecy, betrayal, deception and self-delusion, and has ever since remained a mystery to most British government officials who have had to deal with its legacy. And, above all, it is a story of sacrifice, of brave young men who, having committed to risk their lives in genuine opposition to a real enemy, perished in an unnecessary and highly risky enterprise that should never have seen the light of day.

                Battleship Tirpitz

                The official – and well-documented – engagement was Operation PARAVANE, which was prepared in August 1944, and took place the following month. PARAVANE was a project undertaken by the RAF to bomb the Nazi battleship, Tirpitz, lying in a Norwegian fjord, and ready to attack the British-American convoys that were transporting valuable matériel to Stalin, via the ports of Murmansk and Archangel. After the foray against the Tirpitz was completed, launched from Soviet territory, and a reduced set of aircraft was being prepared to bring the airmen home to the United Kingdom, a decision was made to re-route one of the aircraft over Swedish airspace to a location over southern Norway, where two parachutists were to be dropped to undertake a dangerous mission. Having arrived at its destination, the plane crashed into a mountain, and all aboard lost their lives. This series of articles offers an explanation of what events and negotiations led to the disaster.

                At the time that Operation PARAVANE was executed, the war against the Axis forces was considered by most military experts to have been nominally won. The Western Allies had made a successful re-entry to Normandy in June 1944, and were advancing steadily towards the German borders. By the end of August, Paris had been re-occupied. The Soviet Red Army had advanced on a broad front from Bucharest to the River Dvina in Latvia, and General Rokossovsky’s Army was approaching Warsaw. British, Canadian and American troops had begun to cross the Gothic Line in the Apennines of Italy. Inside Germany, opposition to Hitler was mounting. On July 20, the plot to assassinate him had taken place, although the dictator escaped with injuries. The Allies demand for ‘unconditional surrender’ meant, however, that many more months of intense fighting would take place before the Germans capitulated.

                Great Britain and the Soviet Union had always enjoyed a fragile relationship in the conflict with Nazi Germany. When the contradictions of the Nazi-Soviet pact were unveiled by Hitler’s attack on Russia in June 1941, Churchill had immediately expressed urgent support for his erstwhile ideological foe, who had helped Germany with valuable matériel in its assault on Britain. Stalin had responded by quickly making unreasonable demands on Britain, and used his network of spies to gain intelligence, and his agents of influence and ‘useful idiots’ to further the Soviet cause with the British citizenry. After making a private foolish and unauthorized commitment to Stalin about launching a ‘second front’ in France way before the Allies were ready, Churchill was continuously nervous about the dictator’s moods. Yet, after the Soviets repelled the German advance at Stalingrad in February 1943, the balance of power shifted markedly.

                In this context, Churchill’s desire to destroy the battleship Tirpitz might be viewed as a bit obsessive. The U-Boat threat in the Atlantic had been largely eliminated, but Britain was still committed to delivering matériel to Stalin through the Arctic Convoys, and the presence of Tirpitz at Altenfjord in Northern Norway represented a large menace to their safety. After the disastrous scattering of the convoy to Murmansk, PQ17, in July 1942, the convoys had been suspended for a few months, and again in the summer of 1943, because of preparations for Operation TORCH. On October 1, 1943, however, Churchill, always eager to appease the demanding Stalin, had assured the Soviet leader that they would resume in mid-November. Moreover, the Soviets had been difficult and prickly over the British presence in Murmansk, ordering two communications stations there to close. In April 1944, British aircraft had tried to attack the Tirpitz from Scottish bases with Barracuda bombers, but they had caused little damage. They followed up during the summer with six further futile attempts, at considerable expense of fuel and ammunition, but were foiled by bad weather and the ship’s defences.

                Shrewd observers –  especially in the War Office – had already recognized that the Soviet Union was going to be an ideological and maybe real adversary after the war, as Stalin’s plans for subjugating the countries of eastern Europe became clear. Despite the Foreign Office’s enduring belief that Stalin and his commissars would behave like English gentlemen if they were approached with a spirit of cooperation, the Soviets remained uncompromising, suspicious, secretive, and very protective of their country’s subjects. Any intrusion from the West was interpreted as espionage, and as an initiative designed to subvert the Communist empire. Attempts to share intelligence between Britain’s services (i.e. SOE and MI6) and the NKVD had collapsed in mutual incriminations, and SOE was ready to withdraw its station in Moscow in the spring of 1944. Thus the opportunity for cooperation over bombing raids on the Tirpitz would have seemed to be unpromising.

                Such qualms would be reinforced by the scandalous behaviour of the Soviet Union during the Warsaw Uprising, which had started on August 1. It was on the Poles’ behalf that Britain had declared war on Germany back in September 1939, and a vigorous Polish government-in-exile in London was keen to see it resume a traditional role in a freed Poland after the Germans had been expelled. Churchill (and, to a lesser extent Roosevelt) was anxious to provide all the help he could to the beleaguered Poles in Warsaw, but was restricted in having to launch support flights from bases in the United Kingdom and in Brindisi, Italy. Stalin had other ideas: he had created the so-called Polish Committee for National Liberation on July 22, and planned to install a Communist regime in Warsaw when the Soviets took the city from Germany. He refused to offer any support to the rebels from his troops on the other side of the Vistula, and rejected Churchill’s requests for landing-grounds behind Soviet-held territory. Stalin was now more universally accepted, even by Britain’s Foreign Office, as an untrustworthy partner.

                Thus the Cold War could be said to have started, not with the revelations about Soviet atom spies in September 1945, not at the Yalta Conference in February 1945, but on the banks of the Vistula in September 1944. When Churchill later met Stalin at the ‘Tolstoy’ talks in Moscow in early October, a rather cynical carve-up of Europe was arranged. At this convention Stalin also made stringent demands for a new Polish-Russian border, roughly equating to the old Curzon Line, but forcing the important city of Lvov to be on the Russian side. Churchill was required to return to London to take this dismal message to the Poles, having already upset them with his refusal to challenge Stalin on the circumstances of the Katyn massacres of 1940. The political climate for the British gaining a high degree of collaboration from the NKVD and Soviet Air Force on an aerial mission that required the use of Soviet airfields for an assault on the Tirpitz would therefore seem to have been entirely hostile.

                Yet some measure of cooperation had taken root in the summer of 1944. A combined military mission to Moscow had been established as long ago as July 1941. At that time the role of the 30 Mission (as it was dubbed) was more of an intelligence-gathering exercise, as the British War Office and Foreign Office believed then that the Soviet Union would collapse in a matter of weeks before the Nazi onslaught. It was led by a rather foppish Major Macfarlane, whose intelligence background irritated his hosts. In April 1944, however, just as NKVD-SOE relationships had broken dramatically apart, a Lieutenant Abercrombie was sent out to try to define some manner of shared objectives. These background negotiations turned out to be pivotal for the ability of Bomber Command to make rapid changes to its plans at the beginning of September 1944. After the success using the Tallboy bomb in raids on French ports, a fresh approach using these new weapons was considered, initially involving bombers stretching their fuel resources by flying again from Lincolnshire and Scotland to the northern fjords of Norway.

                It was in this context that the plans for Operation PARAVANE were made.

                Chapter 2: Planning for PARAVANE

                Tirpitz in Kafjord, inner to Altenfjord

                It was only after June 1944, when successful operations using the 12,000 lb. Tallboy bomb were carried out in France, that the Royal Air Force started to consider using the weapon against the German battleship Tirpitz, berthed at Altenfjord in northern Norway. Yet there was a catch: the only aircraft that could carry such a heavy bomb was a modified version of the Avro Lancaster. After detailed analysis RAF Bomber Command concluded in August that an operation to deploy a squadron of Lancasters for a direct raid from Scotland was not feasible because of the aircraft’s fuel capacity. They thus considered using a base in the northern Soviet Union, Vaenga 1, near Murmansk, as an intermediate refuelling station after the raid.

                This airfield, Vaenga 1, was already known to the RAF, as it had been used by Coastal Command (151 Wing) back in 1941, shortly after the Soviet Union became an ally. Hampdens and Mosquitoes had been sent there for training Soviet crews. In April 1943, Coastal Command had evaluated Operation HIGHBALL, using the newly formed 618 Squadron with specially modified Mosquito aircraft, and the Barnes Wallis-designed bouncing bomb, to attack the Tirpitz. Vaenga had been considered as a possible destination, or even launching-site for the operation, but concerns were expressed about the security aspects of exposing technological secrets to the Soviets, and for a variety of reasons the project was abandoned.

                Hurricanes at Vaenga Airfield

                At the instigation of the Americans, who first came up with the idea of using Soviet bases for shuttle bombing, General Ismay, at the Moscow Conference of October-November 1943, had made a request for the provision of such bases on Russian territory. The Joint Chiefs of Staff also made a request for the Russians to exchange codes and procedures for communicating weather information, and instructed the US and GB Missions in Moscow to follow up. In April 1944, the question of bombing the Tirpitz was raised by Admiral Fisher at the first Mission Conference held by General Burrows (who had replaced General Martel in March). In May Burrows started defining procedures for how airmen stranded in Soviet territory should identify themselves, suggesting strongly that some agreement for the RAF to operate over Russia had been worked out. Briefly, negotiations appeared to improve, as the Soviets articulated plans for attacking the Germans in Northern Norway, which the British believed might assist the BODYGUARD deception. While that venture came to nothing, by August 1944 it appears to have been Bomber Command’s understanding that gaining approval for an operation that required landing on Soviet soil would be a formality. A message dated August 28 indicates that permission would nevertheless have to be sought through the Mission in Moscow.

                The formal request was made on September 1, for an operation scheduled to take place on September 7 – an alarmingly short period for gaining approval, and then planning and implementing all the support and infrastructure required. While that approval appeared to be very quickly forthcoming, however, a setback occurred. Vaenga was quickly deemed to be unsuitable. The same day, Air Vice-Marshal Walmsley of Bomber Command, working on a survey recently undertaken by a Squadron Leader in the Photographic Reconnaissance Unit, wrote to Air Commodore Bufton in the Air Ministry requesting that alternatives in the Archangel area be investigated. The primary obstacle seemed to be that Vaenga’s proximity to the target meant that it could be exposed to raids from the German Air Force (although it should not have needed photographic research to confirm that). Moreover, the runways were probably of inferior quality.

                Yagodnik Airfield

                The outcome was that from a shortlist of a few other airfields, Yagodnik, on an island south-west of Archangel, almost 400 miles from Murmansk, rapidly became the favourite. It possessed a solid runway that could be extended to 1500 yards – shorter than that at Vaenga, but adequate, as the minimum length required was 1400 yards. One intriguing fact is found in a report describing the airfield, dated as far back as May 22, 1944. That survey pointed out that Yagodnik had been used by fighters and bombers, specifically the Petlyakov PE-8, a rather clumsy and accident-prone heavy bomber formally known as the TB-7. The fact that British personnel had been given permission to inspect such facilities, without any accusations of spying, suggests that negotiations for possible use by the RAF had been going on for some time. That may explain why Air Marshall Harris could take for granted at this late stage that the Soviets would agree to such an initiative, despite their customarily extreme wariness of foreigners. Any such move would have had to be approved by Stalin, and the role of 30 Mission as an intermediary in Moscow reinforces that assumption.

                The willingness of Stalin to cooperate needs to be analyzed in the context of events in the recent past. Chapter 1 of this story described the ill feeling that had been engendered by his lack of support for the air drops of his western allies, who were trying to assist the Warsaw Uprising. Yet a lesser known scheme involving the United States at Poltava (an airbase in the Ukraine, west of Kharkiv) should also be taken into account. This precedent for the use of Soviet airbases had recently occurred as Operation FRANTIC, whereby the Soviets granted rights to the USA Air Force to conduct bombing-raids from Poltava on German territory between June and September 1944. This operation was not without controversy, however: the Americans were abused by the Soviets, especially when, on June 21, Soviet air defences failed to prevent a highly destructive raid on US aircraft by German airplanes, all of which escaped intact. Moreover, by that time, with the Soviet land forces moving close to Germany, the value of the base had sharply diminished. The important manufacturing targets identified by the Soviets were actually closer to Great Britain than Poltava.

                Poltava Airfield

                What is more, the Soviets had exploited the presence of American aircraft on their soil by stealing technology secrets. In the light of their own very weak capabilities in this domain, they were keenly interested in the American technique of strategic bombing. Stalin issued strict instructions that every detail of American advanced technology be recorded by the Soviet Air Force, and the latter salvaged materials from aircraft that had crash-landed on Russian soil. They also learned all about the procedures of American ground-to-air-to-ground communications. Thus the opportunity to learn from the RAF about the Tallboy bomb and its method of delivery would have been highly valuable for future Soviet military capabilities. Stalin may have been sympathetic to the project to eliminate Tirpitz, but he had more devious goals in cooperating with Bomber Command. While the vozhd was extremely wary of any Soviet citizens’ being exposed to foreign influences, and the NKGB and SMERSH were trained to consider all such persons on their soil as spies, the arrangement of procuring advanced British technology on Russian soil (or swamp) would deliver more important prizes.

                In fact, a more detailed examination of the War Diary of 30 Mission indicates that Stalin had become a more encouraging force behind the project for launching air operations over Norway. When General Burrows took over from the rather ineffectual General Martel, he started to introduce more discipline and determination into his dealings with the Soviets, including better treatment for casualties from convoy operations, and a loosening of the absurd rules about the issuance of visas to returning British officers. He pursued more aggressively the return of radio equipment seized by Soviet customs officials. And, as mentioned above, he started seeking procedures for assisting British aircrew members, possibly stranded on Soviet soil, to help identify themselves to the Red Army or the NKGB, a measure that must indicate that he expected British planes to be operating over Soviet territory. The Soviets were habitually unco-operative, but Burrows learned that they responded better to hard bargaining.

                In any case, following the positive signal from the Kremlin, more detailed preparations were briskly made. To accompany the squadrons of Lancasters, Liberator aircraft would be required to carry maintenance engineers and spares. Group Captain McMullen was made responsible for the discipline, quartering and messing of all crews, and was scheduled to fly out in a Liberator in advance of the Lancaster squadrons. His role was to establish communications protocols, and rules for the use of beacons, and relay them to the UK, so that the arriving aircraft could safely find their way to Yagodnik. He had to arrange for the provision of fuel and oil to supply the aircraft for their journey home. He was also to be responsible for dispatching the operational air party on its return flight, or should the original operation have been abortive, on a repeat operation. He was to keep in close contact with British Naval authorities in Archangel and the Air Attaché in Moscow.  All in all, it was an astonishingly complex and difficult task to be completed in just a few days, with issues of terrain, security, politics, language and electronic communications to be sorted out. Despite all the challenges, on September 7, the Operational Order was issued for all aircraft to be moved to the forward bases at Lossiemouth, Kinloss and Milltown.

                Yet a very late revision to the plan occurred. As a further complication, Bomber Command had, after intense calculations and trials, concluded on September 11 that PARAVANE would better be launched from inside Soviet territory (and not simply use such bases for refuelling). The reason offered later was that the weather was primarily responsible, but also because the closeness of the Russian bases to northern Norway was less demanding on fuel requirements. In addition, the location would enable a surprise, and thus potentially more successful, attack from the south-east, since German Radio-Detection Finding apparatus would be less effective in spotting raids from that direction. Thus the new plan required the squadrons to fly directly to the Archangel area, there to rest and refuel, before launching the attack on the Tirpitz, and then returning to Yagodnik.

                Operation PARAVANE (revised)

                Who actually conceived this new plan is an enigma: the conclusions appeared to have been arrived at without consulting the Soviets. More sympathetic messages had recently been arriving from Stalin, however. At the end of August, he had floated the idea of creating an International Air Corps, to which Churchill responded enthusiastically. And on September 9, Stalin had announced that he would allow Allied planes to be launched from Ukrainian territory to support the Warsaw uprising – a hopelessly late gesture to save the Poles, but an indication that the presence of the RAF in northern Russia would now be treated more positively. This move was all the more significant since the Soviet Foreign Minister Vyshinski had recently forbidden any US planes assisting the Warsaw Uprising from returning to their base at Poltava.

                This change of plan also presents some paradoxes. The archive does not state who made the decision: some historians claim it was Harris. At the end of August, Air Vice-Marshal Cochrane had been involved in intense trials with Squadron-Leader Tait that suggest that he had set out to ‘prove’ that the Tirpitz would be out of range, as if he had been commissioned to provide evidence for a decision already made. Despite coming to conclusions, presumably, that a direct flight to Altenfjord for the assault before landing in northern Russia would not be feasible, the existing plan must have been passed up to Harris for him to adjudicate. Why did Cochrane not propose an alternative plan? He either a) wanted the whole operation called off; b) was not aware of the possibility of an alternative approach by launching the attack from Soviet territory; or c) was party to an elaborate ruse, and pretended to play the innocent.

                One account suggests that the USAAF had been the Soviets’ preferred choice as a collaborator for the assault on the Tirpitz. While Stalin did not have serious designs on occupying Norway (he was not even considering re-entering his contiguous neighbour Finland, despite the fact that it had been an adversary during the war), he was interested in gaining part of the Finnmark territory to the North, which would give him access to valuable mines, but yield a short frontier with Norway. In this regard, he still considered the Tirpitz a threat. But he disparaged the multiple, expensive, but unsuccessful series of raids on the battleship by the British, and hoped that the Americans might consider a second base in northern Russia. The Americans had been too chastened by the Poltava experience, however, and, with Germany on the run, Roosevelt was not interested in further buccaneering exploits in the European theatre of war. Thus Stalin turned to the British.

                The archival material does suggest that a higher authority was involved. Harris’s memorandum announcing the change is directed to the Admiralty, with a copy sent to Bottomley at the Air Ministry. A memorandum from the Air Ministry informing 30 Mission of the change of plan has a time-stamp of three minutes earlier, however, indicating perhaps that both Bomber Command and the Air Ministry had recently been informed of the new directives. The Air Ministry memorandum attributed the change of plan to ‘weather conditions’ in the target area being too variable: Harris does not provide that as a reason. Moreover, Harris does not take responsibility in his own text, writing instead that ‘It has now been decided’ that the bombers will fly directly ‘from English bases’ (i.e. not via Lossiemouth or Unst) to Yagodnik. The implication is that the decision to launch the attack from Yagodnik had already been made, and it was the details on the route that were important. It is clear, from the anomalous and incongruous cables exchanged between Bomber Command, the Air Ministry, the Admiralty, the Naval Station in Murmansk, and 30 Mission in Moscow that an elaborate smokescreen was being created to conceal the secrecy and irregularity of the agreement with Stalin to use Soviet bases. The apparent rapid decision about a direct flight would have alarming and fateful consequences.

                2 Comments

                Filed under Espionage/Intelligence, General History, Geography, Management/Leadership, Politics, Technology, Travel, Warfare

                Mini-Bulletin: a new Web Hoster

                Visitors to coldspur will have read that I recently experienced some problems with the availability and reliability of the coldspur site. My web hoster was evidently not comfortable with the management of sites maintained by WordPress software, and declared it was getting out of that particular business. I have thus spent several hours over the past two weeks investigating alternatives, and then migrating the whole site to another hoster. This operation has not been without some frustrating experiences, but I believe that it has now successfully completed. This is the first update to be posted via the new outfit. The switch should be completely transparent, but I would appreciate any feedback from visitors who notice any differences, such as in speed of page-loading, or presentation of material. Thank you!

                Leave a Comment

                Filed under Technology, Uncategorized

                Summer 2023 Round-Up

                J. L. Austin

                Contents:

                Introduction

                The Cyber-Attack

                Kim Philby

                ‘The Scarlet Papers’

                What’s New at Kew

                Intelligence Officers

                The Lady Novelists

                Beverly Gage and ‘G-Man

                Summer Biographies

                • Ellis, Ker-Seymer, Déricourt, Austin, Orwell, Berlin

                The Love-Lives of the Philosophers

                Coldspur: Method, Archive & Topography

                Introduction

                For this August bulletin, I decided I needed to take a break from the intensive research into Kim Philby that has occupied me over the past few months. I suffered a nasty bout of Covid in June, which knocked the stuffing out of me, and also put a dent in my research agenda. So, in this summer round-up, I take instead the opportunity for the more leisurely exercise of catching up with various intelligence-related events and activities. This tour d’horizon has turned out to be a bit more expansive than originally planned: I hope every coldspur reader will find herein something of interest.

                The Cyber-Attack

                My website suffered a short-lived, but alarming, disruption in early June. I was working from my iPad when I was suddenly unable to access any coldspur page except the home page. I immediately went to my PC, only to find that the same problem occurred, with some message indicating that the page I was seeking was unavailable. This happened in the evening, so I sent off a message to the support desk of my web hoster, and awaited a response. Early the next morning I received a message back suggesting that I clear my browser cache, and, having done so, I saw the apparent return of the complete coldspur site.

                So I turned to my PC, and then discovered that there was no cache problem there: the site was available likewise, so I quickly concluded that something else had been at fault. Moreover, I then noticed that a few of the recent comments made by visitors were no longer visible. It looked as if there had been a problem in the regular back-up/recovery procedures. I brought this fact to the attention of the support person, who then dug an even greater hole for herself by stating that such procedures were not the responsibility of her company, and that I needed to get in touch with the outfit that actually hosted the site. Her company was responsible only for managing the WordPress environment.

                Now, there are few things that rouse my ire more quickly than technical support organizations who guess, or bluff, or try to deceive me. I have no business relationship with any other entity, and, indeed, I have to declare this outfit as my ‘web hoster’ each year when I renew my contract for www.coldspur.com with GoDaddy. I thus contacted the President of the company in some frustration, and asked him to sort it out. The outcome was that he did get involved, and had to apologize for his support person, who ‘misspoke’, yet he himself was guilty of some prevarication. He started off by stating that the management of the site had indeed been entrusted to a ‘third party’ (which suggests a separate legal entity to me), but he then backtracked somewhat in asserting that the management of all WordPress sites had been consolidated on to a single server. When I pressed him, he admitted that part of his business was in fact outsourced to another company. He could not explain what had happened, but confirmed that the few missing comments were indeed lost for ever.

                I am not happy about this at all, and have requested a more thorough approach to data archiving and data quality. In the meantime, I apologize to those couple of coldspur readers whose comments were lost, and especially to David Coppin who took the time to try to re-create his comments.

                And then, on the morning of July 30, coldspur became completely unavailable. I informed the web hoster, and soon received an acknowledgment, as well as a message from the President of the company that his team was working on the problem, and that it would contact me as soon it made progress. I wondered whether the outage was due to Chinese malware, since a disturbing story appeared in the New York Times the same day, alerting readers to the exposure of critical national infrastructure by China’s malicious actions. I reflected, however, that the availability of coldspur is probably not vital to the safety and integrity of the social fabric of the United States. I thought it far more likely that MI5, anticipating another blistering post on August 1, and suspecting that coldspur’s defences would be on low alert on a Sunday, had decided to disrupt its availability.

                The site was down for about twelve hours. I learned later that the problem had not just affected coldspur: it had been in fact been caused by a Chinese DDoS (Distributed Denial of Service) attack! No virus or malware had infiltrated the servers, but a blitz of messages brought the installation to its knees, and a range of new IP addresses had to be added to the firewall. Who would have thought a relatively minor installation in North Carolina would come under attack? Was this random? Or did the Chinese have some knowledge of which websites were maintained by this hoster? I was also interested in whether the Department of Homeland Security keeps track of all such attacks. The President of the company told me that he had reported the onslaught to his upstream provider (a wholesale manager of IP addresses and traffic), but it does not seem that there is a requirement to inform the government. Given the source of the invasion, and the current ferment over China’s cyberattacks, that strikes me as odd.

                Kim Philby

                In the Spectator of June 10, Douglas Murray wrote a column ‘How to dismantle history’, selecting as his subject the TV adaptation of Ben Macintyre’s Colditz. He introduced the author in the following terms: “He is a fine popular regurgitator of history who has previously brought to public notice such things as the hitherto untold story of a spy named Kim Philby.” Apart from the fact that the adaptation of A Spy Among Friends apparently contains some creative flourishes that would tend to undermine its reliability as a historical record (I have not watched it), I was struck by the paradox: if the story of Philby is ‘hitherto untold’, how could Macintyre ‘regurgitate’ it?

                I did not expect, a few months ago, that I would be dedicating so much of my research and writing time this year to Philby. I know that several coldspur readers have devoured everything they could find about Philby over the years, and I have been much the same – but without paying really close attention to the details (apart from my inspection of all the accounts of his recruitment by the NKVD in 1933-1934, as laid out in Misdefending the Realm.) Thus I succumbed to the familiar broad-brushed arc of his career: the marriage to Litzi, the recruitment by Arnold Deutsch, the assignments in Spain, the attachment to SOE, and then to MI6, the near disastrous exposure by Volkov, the interlude in Turkey, the posting to Washington, the secrets revealed by VENONA, the postulated ‘Third Man’ role with Burgess and Maclean, the investigations, the time in the wilderness, and the eventual escape from Beirut.

                Dominating this career was Philby’s memoir My Silent War, which seems to have been cited quite indiscriminately by any number of writers, including the ‘authorized’ historian, Christopher Andrew, even though its source and sponsorship should have given grounds for severe scepticism. I have pointed out before that, when in that text Philby identifies his past employer as MI5, it serves as a kind of radio security check, whereby he informs his readers in Britain that they shouldn’t really take all that he writes very seriously, as everything is under the control of the KGB (who in general never understood the difference between MI5 and MI6.)

                Then, at the beginning of this year, a few queries from coldspur readers (and especially some exchanges with Keith Ellison) prompted me again to dig into aspects of Philby’s career, gather a few archives that I had overlooked, re-inspect some folders that I already had on my desk, and start building a chronology for some of the more controversial events in Philby’s career. Writing the reports of the past few months has been a fascinating experience, and has made me believe that a brand new biography of Philby is required, one that would not automatically ‘regurgitate’ all the falsehood of his memoirs, and the exculpatory asides of those officers who were supposed to have been monitoring him, but instead point out some of the anomalies and confront the fact that, on many aspects of his troublesome life, we simply do not know exactly what happened.

                And there is more work to be done, for example on the origin of the Litzi Feabre alias, verification of what must have been a very shaky divorce settlement, what was known about Burgess’s connections before 1951, the Foreign Office post-mortems, and the mysteries of Philby’s last few years with MI6, including the falsehoods passed on by Nicholas Elliott. In that context, while reading recently Burton Hersh’s history of the CIA, The Old Boys, I came across the following passage: “He [Wisner] downplayed American annoyances at the pigheadedness of the English at suggestions that they get busy or flutter their people, stop mincing around and bring the Philby situation to a head. At Dulles’s urging, Wisner got close enough to Roger Hollis [1959] to break loose ‘a really valuable body of evidence about Philby,’ Cleve Cram says, ‘which filled in a lot of the chinks and helped overcome the horrified reaction around the Agency when we were given to understand that MI6 was running him still’.” What might Hollis have known, and what could he possibly have told Wisner that would have calmed the concerns of the restless Americans?

                Moreover, in recent weeks, fresh leads have sprung up to be investigated: Vivian’s dissimulations of August 1946; Philby’s postwar presence in Vienna and the missing Bruce Lockhart tape; the surprising addition of Philby to the circle of acquaintances of the psychiatrist Eric Strauss; the debate about ‘STEVENSON’; and a suggestion in a recent book by Charlotte Dennett (Follow the Pipelines) that Philby was involved in the 1947 death of her father, the CIA agent Daniel Dennett, in an aircrash. I have ordered the book, and shall report more later. Perhaps most significant is the acquisition of the MI5 December 1939 Staff Lists from the National Archives, that include a ‘Miss Furse’ working in C2b. Keith Ellison has pointed out to me that Yuri Modin wrote, in My 5 Cambridge Friends, that Philby, at the time he was recruited by MI6 in 1941, ‘was having a passionate love affair with Aileen Furse, who worked in the MI5 archive department’. So was Aileen already working for MI5 when she met Kim at the Solomon/Birch luncheon? And was she thus able to wield some power over him?

                ‘Among Others’ by Michael Frayn

                Lastly, towards the end of the month, while reading Michael Frayn’s new collection Among Others: Friendships and Encounters, I learned that Frayn had innocently introduced his college (Emmanuel, Cambridge) friend John Sackur to Harold Evans of the Sunday Times in 1967. The encounter did not go well, since the paper was deep into its investigation of Philby, and Evans discovered (from his deputy editor, Frank Giles) that Sackur worked for MI6. Frayn postulates that Sackur may have been sent to Evans on a mission to try to control the narrative, and that he, Frayn, was used as a channel. Frayn led me back to Evans’s account in his memoir My Paper Chase (which I had read when it came out, but had forgotten the episode), but that did not seem to me to represent the whole story. Where else had I read about it?

                Evans refers to Phillip Knightley’s belief that Sackur was a member of a dissident group inside MI6. Knightley had argued in 1998, in an article in British Journalism Review, that Sackur was in fact a member of a ‘ginger group’ who wanted the Philby inquiry to go ahead, so that further Soviet agents could be unmasked. My first thought was that was equally unlikely, and a check on Chistopher Moran’s Classified seemed to confirm that what the Sunday Times was about to reveal was way beyond the control of MI6, or even the UK government. It would have been pointless and clumsy to try to encourage the investigation in person. Moran had suggested that Sackur had probably been sent as a spy to discover exactly what the Sunday Times had put together, and that he reported to his bosses the extent of the possible damage.

                I needed to find the article. David Spark, in his book Investigative Reporting, sources Knightley’s comments as Volume 9, Number 2 of the British Journalism Review, in June 1998, where an abstract of Knightley’s riposte to a critical piece by his ex-colleague Bruce Page piece can be seen (https://journals.sagepub.com/doi/abs/10.1177/095647489800900206). It reads: “In the last issue of the British Journalism Review Bruce Page criticired [sic] a former Sunday Times colleague, PHILLIP KNIGHTLEY, for his role in the paper’s investigative campaigns 30 yearr [sic] ago. Knightley now exercises his right of reply.”Yet nothing by Bruce Page in 1998 can be found via a search on the Review’s website. In fact, Page did write a piece criticizing Knightley in Volume 9, Number 1, with his authorship not indexed, but his focus was apparently on thalidomide. I needed to find out how the riposte switched to Philby.

                After a while, I managed to get a copy of the Knightley piece, titled ‘The inside story of Philby’s exposure’. The facts are predictably elusive but the interpretation of what happened comes down partly to timing. Knightley starts off by setting the introduction by Frayn to Evans as occurring ‘when The Sunday Times was sniffing around the story’ of Philby, i.e. when any conclusions would have been very tentative, and he reports that Sackur appeared to be taken aback when Evans told him that the paper was looking into the life of ‘your old Foreign Office colleague’, Kim Philby. Sackur’s response was extreme: he immediately elevated the potential political embarrassment such an investigation would provoke, and described Philby as ‘a copper-bottomed bastard’. This exchange would suggest that Evans and his team did not yet know that Philby worked for MI6, and that Evans learned of Sackur’s employer only soon afterwards, when Sackur met Giles. Naturally, Sackur’s outburst encouraged Evans to pursue the case even more determinedly. (Evans recounts all this in his memoir.)

                The disagreement between Page and Knightley comes down to the reason why Sackur appeared in Evans’s office. Page believed that it was coincidence, and that Sackur genuinely wanted to leave the ‘Foreign Office’ (i.e. MI6) for a journalistic career, while Knightley was convinced that Sackur was one of the ‘young Turks’ who were disgusted that their senior officers in MI6 would not let him (and Stephen de Mowbray and Arthur Martin) continue their molehunt, and Sackur thus wanted to encourage the exposure of Philby. In this scenario, Sackur must have gained a smell of what the Sunday Times was up to: his surprise was feigned, and his melodramatic response deliberate. Yet Evans’s conclusion was that Sackur ‘was not a plant, but a young man whose conscience would give him no rest’.

                Moran, writing in 2013, had had access, however, to the private papers of George Wigg, the Paymaster-General in Harold Wilson’s government, which confirmed that Sackur had indeed gone on a fishing-trip, and, having learned the extent of the investigation, alerted his bosses and sent Whitehall in a tizzy. Maybe his behaviour in front of Evans was to gain the trust and confidence of Bruce Page, which certainly occurred when the leader of the ‘Insight’ team took Sackur for a liquid lunch at Manzi’s seafood restaurant in Soho. In this scenario, the disclosure of facts that Sackur revealed to Page at their meeting may have been a deliberate attempt to distract the paper from the more serious crimes of Philby. Evans even records that Sackur gave broad hints about Philby’s transgressions in World War II rather than in the Cold War, which his team ‘eventually’ was able to determine as relating to Germany’s plans for a separate peace, and the purging of Catholic opposition to the communists in Germany – actually after the war. All very odd. As Frayn describes, Sackur was a deceiver par excellence.

                And what happened to John Sackur? Frayn and Evans write that he died young. Outside Frayn’s vignette (Sackur’s non-appearance at a college reunion inspired Frayn’s play Donkeys’ Years), I have been able to find a few references to him. Daphne Park’s best friend was a Jean Sackur. Was she related, I wonder? The answer came from Paddy Hayes, the author of Queen of Spies, his biography of Park. He had interviewed Jean Sackur, who had been married to John, and divorced from him some time in the 1960s. Ancestry.com confirms that Christopher John Sackur was born in Wharfedale, Yorkshire, on February 8, 1933 (his mother née Humphries), and died on January 24, 1986, in Bury St Edmunds. (see https://www.findagrave.com/memorial/241252354/christopher-john-sackur). He married Jean La Fontaine in the summer of 1958, in Cambridge, married a woman named Morgan in 1974, and further married Joanna Butt in May 1985. Hayes writes that Sackur was offered a job by the Sunday Times ‘Insight’ team, but that MI6 would not let him go there, after which he became a successful management consultant. Another report states that Sackur was one of those officers ‘burned’ by the revelations of George Blake to his Moscow bosses, and that John Quine, head of MI6 counter-intelligence, decided that Sackur had to resign. As with all such stories, the truth is hard to pin down.

                The Scarlet Papers

                As I was drafting the section above, I came across, in the May issue of Literary Review, a short review of a novel by one Matthew Richardson, titled The Scarlet Papers. It started off as follows:

                This magnificent spy novel sees disappointed academic Max summoned to a secret interview with Scarlet King, an elderly woman he has never met. His expertise being the history of the intelligence services, he knows that she was once the most senior woman in MI6 and one of the greatest specialists on the Soviet Union.

                ‘The Scarlet Papers’ by Matthew Richardson

                After giving a glimpse of the plot (without really spoiling the reader’s future enjoyment) the author of the review (Natasha Cooper) continues:

                Richardson uses plenty of real names to provide authenticity, from John le Carré and Vasily Mitrokhin to Sergei Skripal, Maurice Oldfield and even Churchill’s confidant Professor Lindemann. He draws upon his own experiences as a researcher and speechwriter in Westminster, with the result that his political and civil service characters behave in ways that are entirely convincing.

                Well, up to a point, Ms. Cooper. I of course had to acquire the book after this endorsement, and was entertained by the smoothly-written novel. Perhaps it does not need to be mentioned that Kim Philby plays a semi-prominent role, something that piqued my attention even more. But authenticity requires more than dropping in famous names from the world of intelligence, using all the established jargon of spycraft, and scattering dozens of well-known (even overused) anecdotes that have populated the literature over the past fifty years. It requires chronological exactitude, and attention to detail in background, careers, expertise, achievements, psychology and motivations.

                The problem starts with Scarlet King herself, who is described as being in her nineties at the time of the action – in fact given more precisely as ninety-five in one passage. Her first assignment with MI6 was in Vienna in 1946. Thus, if she were, say, twenty-five years old at the time, the action would probably be no later than 2016. (At one point, Richardson writes that she was only twenty-one when she took on her first assignment for MI6 in Vienna in 1946 – highly improbable!) Yet, in one scene, Scarlet is accused of possibly meeting Philby at the SOE training school at Beaulieu in Hampshire, since she had worked previously for SOE. Philby was dismissed from SOE in the summer of 1941, however, and soon after joined MI6, which, to require King to be of a reasonable age to be employed by SOE, would probably bring the current events forward a few years. And then we learn that she attended Lady Margaret Hall at Oxford University, gaining her degree in Modern Languages, which means that she must have completed it in the summer of 1939 or 1940 (at the latest) to be recruited by SOE, which would give her a probable birth-year of about 1917.

                Now matters start to get stretched the other end. From ‘authentic’ remarks made by MI5 officers, we learn that ‘current’ events must be occurring after 2018, since the attempted assassination on Skripal in Salisbury is referred to as an event worth recalling. Next, we learn that the year must be in the 2020s, as Brexit (January 2020) is referred to as a past happening. Thus Scarlet King suddenly would have to be a centenarian – and a very sprightly one, at that. But then Richardson informs his readers that King was born in 1923, and was ‘recruited’ (by what organization I shall not divulge) at the tender age of thirteen. She then is described as appearing in sub fusc at Oxford, which meant she must have been admitted to the university at a very young age to be ready to work at SOE in 1940. Yet later in the book, we are told that she went up to Oxford after the announcement of the Nazi-Soviet pact in the autumn of 1939, which would make her recruitment in by SOE in 1940 utterly impossible. Nevertheless, King continually draws on her experiences during training at the SOE school in Arisaig. She is again described as being aged ninety-five in what must be 2021 or 2022. It is all a mess.

                The curriculum vitae of the historian embroiled in the plot (Max Archer) is just as dubious. He is aged forty-two at the time of the events, which has him born in (say) 1980. He earned a double-first at Cambridge (under Christopher Andrew), took a Master’s degree, and then, having been rejected for a job in MI6 at the end of 2001, was accepted to take a Ph.D. at Harvard. He then returned to the UK, working as an assistant professor at the London School of Economics, which must have taken him up to about 2005. He went on to write two books that gave him his reputation: a volume titled Double Agents: A History, and The Honourable Traitor: An Unauthorized Life of Kim Philby. No dates are given for these publications, but they did apparently necessitate some heavy years of toil. Yet Max is described as having been a consultant to the BBC series The Cambridge Spies (not something one should be very proud of, by the way, because of the way it played around with the facts). That production came out in 2003, however, when Max was presumably completing his doctorate in Boston.

                Moreover, the two publications in his name cast serious doubts on Archer’s professional excellence. Richardson himself throws around the term ‘double agents’ carelessly (using them to categorize Philby and Blunt, for example), when what he really means is ‘agents in place’, ‘penetration agents’, or simply ‘traitors’. Just because a person betraying his country happens to work for an intelligence service does not make him a ‘double agent’. (Michael Holzman, Ben Macintyre, Tim Tate, et al., please note.) That Richardson is aware of this semantic error is made evident in a speech that he allocates to Max Archer (p 264): “‘My academic research is on double agents’, he said, steadying his voice. ‘Intelligence officers who officially work for one side but secretly work for the other. The thing is, technically, some intelligence historians dispute the use of the term “double agents” for professional spies like Philby and the Cambridge Five.’” Why, if he were a serious historian who wanted to make his reputation, Archer would go against the grain of what ‘some’ intelligence historians affirm (how many are there, anyway?), and promote an incorrect and unrecognized classification, Richardson does not explain.

                Likewise, the account of his biography of Philby is unconvincing and ambiguous. Archer is supposed to have spent years in the archives digging out the facts about Philby, but the whole point of Kim is that there was practically no archival evidence available about him – certainly not in the early 2000s, and the books about him relied largely on the secretive investigations and interviews conducted by the Sunday Times ‘Insight’ team, unreliable memoirs from his colleagues, as well as Philby’s own highly dubious account, My Silent War. Yet Archer is described as taking four years to write his biography, and the Endnotes took twelve months. What they could have contained, for a professedly serious academic publication, would have been very thin gruel. (Even if he had had access to the same MI5 files that Christopher Andrew was able to inspect – impossible, by the way, since there were no historians ‘authorized’ before Andrew – most of his Endnotes would simply have stated ‘Security Service Archives’.) Yet Archer later explains that both his books were tuned for a less demanding market (p 228): “He’d glamorized them, emphasized the sex and the danger, even hoped they might be optioned in a splashy bidding war by Hollywood and hungrily consumed by the masses.” That is absurd: you cannot be the pot-boiling Ben Macintyre and the dryasdust Michael S. Goodman at the same time.

                I could cite more – but enough. The book is pure hokum – quite enjoyable hokum – but still hokum. If the fictional characters are too closely tethered to real figures, credibility is quickly undermined, while if they also lack their own coherence in the imagined world, the whole edifice crumbles. What publishers in this sphere need are not Sensitivity readers but Authenticity Readers.

                What’s New at Kew

                In March of this year, I submitted a Freedom of Information Request to the National Archives at Kew. I had noticed that HO 382/255, a file on Georg Honigmann and his daughter Barbara (by Kim Philby’s former wife, Litzi) relating to their passport status, had been withheld, not to be released until 2061! This was shocking. I could not understand why information on the Honigmanns could still be regarded as sensitive. After all, Georg had absconded to East Berlin in 1946, seventy-seven years ago, and Litzi had joined him soon afterwards, whereupon they were married.  Barbara was born in 1949. The file was closed, it seems, in December 1960, and an arbitrary retention period of one hundred years allocated. Why would the Home Office need to maintain information on these people for so long, and who might be affected by its disclosure? Was something embarrassing about Litzi included, perhaps?

                The initial response was not encouraging, but due process was followed. At last, on June 28, I received the following message from the Quality Manager at the National Archives:

                Thank you for your enquiry regarding a review of:

                HO 382/255 – HONIGMANN, George [sic] Friedrich Wolfgang: German. HONIGMANN, Barbara: German


                Please accept our apologies for the delays in responding to your Freedom of Information request.

                I can now confirm that a redacted version of this record will be made available for public viewing at The National Archives, Kew by 5 July 2023. We have outlined your options for accessing the record at the end of this response.

                We have had to carry out a public interest test.  This was because some of the information you requested is covered by the Section 23(1) exemption, which by virtue of Section 64(2), becomes a qualified exemption where information falling within it is contained in a historical record in a public record office, such as The National Archives. Section 23 exempts from public disclosure, information that is directly or indirectly supplied by, or relates to, certain organisations dealing with security matters listed at Section 23(3).

                After careful consideration, the public interest in releasing some of the information you have requested is outweighed by the public interest in maintaining the exemption. 

                We have applied the Section 23(1) exemption to information in the file relating to the Security Service. We shall continue to protect such information for the personal security of the individuals involved and the national security of the United Kingdom. It is in the public interest that our security agencies can operate effectively in the interests of the United Kingdom, without disclosing information that may assist those determined to undermine the security of the United Kingdom and its citizens.

                The judiciary differentiates between information that would benefit the public good and information that would meet public curiosity.  It does not consider the latter to be a “public interest” in favour of disclosure.  In this case disclosure would neither meaningfully improve transparency nor assist public debate, and disclosure would not, therefore, benefit the public good.

                I scanned a copy of a police report from this record in order to obtain the Metropolitan Police’s approval to release their Special Branch generated material, (something I am obliged to do under the Freedom of Information Act).
                As they have stated that they have no objection to release, I have attached a copy of the scan so that you at least have some details to look at while waiting for the file to be made available in full.

                The file has now been returned to the repository.

                My London-based researcher has recently viewed and photographed the file, and I received it on August 9. There does not, at first glance, appear to be anything controversial in it, apart from the fact that Barbara Honigmann (who is still alive), the daughter of Georg and Litzi (sometime Philby) Honigmann applied to spend a month in the United Kingdom when she was eleven years old, in 1960! No doubt there are other secrets within. I shall provide a full report on it in my September bulletin. One thing that had struck me is that Honigmann is described in the header as being ‘German’, yet a sample of the file sent to me by the Quality Manager reports on Honigmann’s application for British naturalization in 1936, on the basis that he promised that he ‘he had no intention for making application to the German authorities for permission to retain his German citizenship if granted British naturalization’. Puzzled, I returned to the Honigmann files previously released, and then discovered that Honigman’s application for naturalization was rejected because of his communist sympathies.

                Intelligence Officers

                I frequently ask myself: what makes a good intelligence officer, and were those recruited by MI5 in wartime well-suited to their career? Selecting a profession has a high degree of chance about it, in my opinion. I almost went into teaching (and took a post-graduate degree in education), but I think I would have been a very poor schoolmaster. (Several persons I have encountered said that I should have been a lawyer.) Fortunately I joined IBM instead, and finished my career in a job of technology analysis that I believe was ideal for me, demanding business acumen, technical knowledge and experience, good analytical and communications skills, and a healthy lack of idealism. And one thinks of doctors: presumably all doctors who pass their final examinations must be qualified, but one would expect a vastly different set of skills between those who passed with flying colours and those who always confused the ileum with the ilium.

                Were the Oxbridge dons, lawyers, and acquaintances from the Club uniquely suited to the positions found for them in MI5 when it was recruiting furiously in 1940? Perhaps on the principle that smart persons can adapt to the demands of any particular job, it made sense, but training and preparation were practically non-existent, and the management infrastructure was woefully inefficient. Moreover, there were different kinds of skill required: more cerebral, contemplative assessment of evidence, with a background of history and politics required; interrogatory skills in challenging and verifying the stories of suspected spies; the more people-oriented capabilities of emotional intelligence and patience in running agents.

                Allen Dulles

                I recently came across what Allen Dulles, the head of the CIA, wrote about ideal intelligence officers. In The Craft of Intelligence appears the following:

                                “When I recently addressed a class of junior trainees at CIA I tried to list what I thought were the qualities of a good intelligence officer. They were:

                            Be perceptive about people

                Be able to work well with others under difficult conditions

                Learn to discern between fact and fiction

                Be able to distinguish between essentials and non-essentials

                Possess inquisitiveness

                Have a large amount of ingenuity

                Pay appropriate attention to detail

                Be able to express ideas clearly, briefly and very important, interestingly

                Learn when to keep your mouth shut.”

                As afterthoughts to what he presented in his lecture, he added other desirable characteristics: an understanding of other points of view; no rigidity or closed-mindedness; lack of ambitiousness or rewards in fame or fortune.

                It’s not a bad list: I wonder whether his trainees were screened before they were hired, or whether he thought that some of the qualities could be inculcated into them? I might add a hard-headed, even cynical, perspective on how the world works, a degree of humility, and a sense of humour, even to the extent of not taking oneself too seriously. (Are you listening back there, Angleton?) And I was reminded of the sentences that Stella Rimington included in her memoir concerning Peter Wright (that I used in my July coldspur):

                            But it [counter-espionage work] is not the quick jumping to conclusions and the twisting of facts to meet the theory which Peter Wright went in for in those days. He was in fact by then [1972] everything which a counter-espionage officer should not be. He was self-important, he had an over-developed imagination and an obsessive personality which had turned into paranoia. And above all he was lazy.

                Wright would have failed the Dulles test quite dramatically.

                But what about his colleagues, in MI5 and MI6? Were they much better? Consider the very smart and cerebral but rather romantic and impressionable Guy Liddell, lacking confidence in expressing his opinions forthrightly; the ambitious and political Dick White, who manipulated others to protect his position; the bumbling and easily influenced Arthur Martin, who certainly could not keep quiet when he needed to; the insightful but neurotic and demanding John Curry; the vain and detached Valentine Vivian, suffering from depression, who did not have the brain-power to recognize what he was up against; the unpopular and heartless loner Claud Dansey, whose deviousness led him into some dismal traps; the well-intentioned but cautious and unbrilliant Roger Hollis, who really just wanted to stay out of trouble and play golf; the misplaced Percy Sillitoe, treating counter-espionage as a police exercise, who had to call in from the USA for instructions. In comparison with this lot, I suspect that Jasper Harker and Felix Cowgill may have received an undeservedly bad press.

                On the other hand, I believe the true stars were more junior officers like Jane Archer (née Sissmore), Michael Serpell and Hugh Shillito, who had their fingers on the pulse, but for various reasons were pushed aside or became disheartened. And one has to recognize that it would take a very persistent and confident MI5 leadership, with carefully prepared arguments and principles, to withstand some of the political pressures. If Petrie, Liddell and White had insisted to the Ministry of Aircraft Production, just after the Soviet Union had entered the war as an ally in the summer of 1941, that Klaus Fuchs should in no circumstances be employed on the Tube Alloys project because he was a known Communist, their careers might have been put in jeopardy.

                And what about all those MI6 officers with Russian connections – Alexander McKibbin, Henry Carr, Paul Dukes, Stephen Alley, George Hill, Wilfred Dunderdale, Harold Gibson, George Graham, and maybe others? They were selected because they spoke Russian, and knew the country: some of them had wives from tsarist times. Obvious candidates to handle agents behind the lines. But of course those qualifications represented a massive exposure. Their skills and background stood out a mile to the various Russian Intelligence Services over the years, and they were ideal candidates for manipulation by the NKVD through the issuance of threats to family members still residing in the Soviet Union. Unimaginative heads of MI6 could not spot the danger, and the cause of counter-intelligence – injured of course by Philby – was mortally damaged.

                It was not easy. And re-discovering a passage in the 1944 Bland Report (which made recommendations about the future organization of MI6) caused me to reflect that the leadership of the Services sometimes failed to come to grips properly with their missions. Keith Jeffery cites a statement inserted by Stewart Menzies (after influence from the rather flimsy Peter Loxley, Alexander Cadogan’s Private Secretary, who was tragically killed in an aircraft accident on his way to Yalta), which tried to steer an apolitical track:

                            We think it is important that those concerned [eh?] in the S.I.S. should always bear in mind that they ae not called upon to investigate such organisations [Nazis, Communists, Anarchists, etc.] because of their political ideology; and that they should therefore only engage in such investigations when there is prima facie evidence that the organization in question may be used as instruments of espionage, or otherwise when specifically requested to do  . . . We consider it to be of great importance that the S.I.S. should avoid incurring any suspicion that it is the instrument of any political creed in this country, and we believe therefore that C would always be well advised to seek guidance from the Foreign Office as to what political parties in foreign countries need special watching, and for how long.

                This seems to me to be taking neutrality too far. (It was at a time when factions in the Foreign Office were strenuously promoting ‘co-operation’ with the Soviet Union.) Defending the Realm, the Constitution (no matter how dispersed or vague it was) – even the Empire – was presumably what MI6 and MI5 were supposed to be doing: confounding the knavish tricks of those who wanted to overthrow them could hardly be construed as adopting a political ideology. This must have raised a few guffaws in the Kremlin.

                In conclusion, after reading the biography of J. L. Austin (q.v. infra), I realized that it was a figure like him that MI5 (and MI6) desperately needed to coordinate intelligence about Soviet intentions and practice in all their aspects – Leninist and Stalinist doctrine, the Comintern and its successors, Moscow’s relationship with the CPGB, the role of spies, illegals and agents of influence, the use of propaganda and subversion. Austin’s capacity for hard work, his ability to learn, his excellent memory, his historical sense, his patience, his lack of sentimentality, and his synthetic abilities in interpretation all gave him an unmatched capability. Two heads of the CIA, Walter Bedell Smith (q.v. infra) and William Casey, were both highly impressed with Austin’s work, and tried to bring his disciplines to work in reforming the organization.

                But instead, MI5 and MI6 got Hollis and Vivian.

                The Lady Novelists

                If W. S. Gilbert’s text for The Mikado had had to undergo the surveillance of a ‘sensitivity reader’, we would have been spared the appearance of ‘the lady novelist’ in Ko-Ko’s list of persons who ‘never would be missed’. Lest anyone be under the misapprehension that I carry any bias against members of this category, I hasten to point out that I am an enthusiastic fan of Angel Thirkell, Helen MacInnes, Olivia Manning, Barbara Pym, and Elizabeth Taylor. Thus I trust that my recent criticisms of Kate Atkinson, Rebecca Stanford and Charlotte Philby will not be interpreted as a sad case of male chauvinism. As is evident, I mete out the same harsh treatment to characters like Matthew Richardson.

                Unfortunately, when I wrote to Charlotte Philby, suggesting that her obvious talents might be better applied to writing a non-fictional account of her grandfather’s marriage with Litzi instead of an imagined tale of his relationship with Edith Tudor-Hart, she reacted badly, believing that I was being facetious. (An unremarkable conclusion, should she have happened to know me, but in this case I was behaving utterly sincerely.) I immediately tried to repair the damage, but heard no more from her. I wonder whether she has been tracking the saga on coldspur. . . .  Nevertheless, I remain a sucker for picking up these creative attempts to write convincing fiction based on a distortion of historical events.

                The latest in this genre that I read was a title that caught my eye on the Barnes & Noble best-selling table – The Paris Spy by Susan Elia Macneal. Since it involved an SOE agent in 1942, as the plans for the ‘invasion’ of France are being made, I thought I should give it a go. Heaven knows, the author might have dug out some new source I had overlooked. When I inspected the bibliography at the back, I could tell that she had immersed herself deeply into the goings-on with F Section, Buckmaster, Déricourt, Atkins, Dansey, Khan and company.

                ‘The Paris Spy’ by Susan Elia Macneal

                The novel turned out to be another mess of fiction and ‘authenticity’. At times, Macneal introduces real characters in her plot, but introduces the main actors by hiding their real-life models behind imagined names. Thus James Lebeau is based on Henri Déricourt, Henry Gaskell on Maurice Buckmaster, Diana Lynd on Vera Atkins, and George Bishop on Claude Dansey. (Occasionally she forgets where she is, and refers to such characters by the names of their prototypes.) The author admits, proudly, that her story is ‘fiction, pure fiction’ but then acknowledges her debt to Phyllis Brooks Shafer, retired Berkeley Professor, as well as Ronald J. Granieri, director of research and lecturer in history at the Lauder Institute at Wharton at the University of Pennsylvania, for their contribution by checking her manuscripts for historical accuracy.

                But what can ‘historical accuracy’ mean in such a scenario? The plot is quite absurd, with a larger-than-life appearance by Coco Chanel, implausibly simplified radio transmissions, miraculous escapes – one aided by an accommodating Nazi officer – the seizure of prisoners of the Germans, and an unlikely flight back to the United Kingdom in which the Déricourt character pilots the Lysander, but has to be subdued and rendered unconscious, whereafter the heroine (who has never flown a  plane beforehand) manages to bring it home with the help of a groggy RAF officer. It is not to say that the book lacks style: wartime Paris is described with obvious care, and Macneal has a good knack for dialogue. All harmless nonsense, I suppose, and it seems that there is an audience for such hokum which does not care about the extravagances and distortions.

                Beverly Gage and ‘G-Man’

                ‘G-Man’ by Beverly Gage

                One of my summer reading assignments was to read Beverly Gage’s critically acclaimed and Pulitzer Prize-winning biography of J. Edgar Hoover, the long-lasting director of the F.B.I. Now, I have never regarded Hoover as a very estimable or sympathetic figure: I detected a high degree of hypocrisy in his private life, and judged his commitment to dirty tricks disgraceful. I considered that his approach to segregation and civil rights, and his obstinacy in deeming the movements behind them as being inevitably controlled by Soviet intelligence, were simply foolish. I had also been disturbed by Hoover’s inappropriate championing of the Catholic Church – something that Gage dispenses with fairly sympathetically in just three pages – and was thus intrigued to read, in the July issue of History Today, a review of a new book on his influence in this sphere, titled The Gospel of J. Edgar Hoover: How the FBI Aided and Abetted the Rise of White Christian Nationalism, by Lerone A. Martin. The reviewer, Daniel Rey, writes: “From Hoover’s petty squabbling over biblical disputes to his flagrant abuse of the separation of church and state, the details in Martin’s book are astonishing.” I doubt whether I shall get round to reading this – one can take only so much Hoover in one decade – but it just shows that the ‘definitive’ biography will never be written.

                Yet Gage manages to describe Hoover as a vaguely respectable character, politically savvy and ready to adjust – obviously something he would have had to perform if he managed to fulfill his duties under eight different US presidents, from Coolidge to Nixon. If a biographer is going to spend that amount of time on any character, he or she will probably present a mostly positive angle on the subject. I was surprised, however, given what I recalled of Anthony Summers’s 1993 biography of Hoover, how little time she spent on Hoover’s secret files on politicians, items that he used to threaten anyone who challenged him. Why, for instance, could Richard Nixon not bring himself to fire Hoover when all his aides were pressing him to do so? Gage also has no room to explore the way her subject was sometimes lampooned. In 1964, the satirist Art Buchwald wrote a column claiming that Hoover was a ‘mythical person first thought up by Reader’s Digest’, which magazine took the name from the manufacturer of kitchen equipment. Hoover was not amused.

                Hoover had appeared on my screen because of his demand to have Fuchs interrogated in prison by an FBI officer, because of the episodes involving Philby, Burgess and Maclean, because of his energetic anti-communist stance, and because he had tried to prevent the CIA learning about VENONA. I had always been a bit puzzled about his relative patience with the visits of MI5 chiefs and vice-chiefs (e.g. Sillitoe, Liddell, Hollis) who had gone to Washington in an attempt to appease him, since he must have considered the set-up at the Security Service impossibly leaky and not managed on the strict procedural and hierarchical lines that he prided himself on developing for the FBI. In fact, Hollis and Liddell do not appear in Gage’s index (there is no mention of Hoover’s gift of golf-clubs to Hollis), and Sillitoe is mentioned only in the context of his giving an honorary knighthood to Hoover at the British Embassy in 1951. Gage is very weak on matters of international intelligence, such as the complicated relations between the CIA and the FBI when it came to the handling of Soviet defectors and agents-in-place, most notably Michał Golenewski. That all goes to show, I suppose, that you can write a rich 837-page biography without touching some of the critical aspects of a life, and that Gage has a naturally domestic focus.

                Gage overall writes quite elegantly (I do not understand why she capitalizes ‘Black’, but not ‘white’, but observe that this anomalous usage extends to the pages of the Times Literary Supplement), and her narrative moves forward strongly. Yet I wondered whether her perspective lost some of its individuality in the process of writing. In her Acknowledgments she gives credit to no less than one-hundred-and-twenty-eight individuals, and it is difficult for me to see how she could listen to the opinions of that many persons without compromising her independence of voice. For example, she shows a less than authoritative stance on the issues of ‘racial and social justice’, and the competition between ‘capitalism and communism’, and sometimes evades judgments where a more confident scholar would have put her oar in. The sources she gives are overall thorough, although it worries me when a respectable academic relies on Ben Macintyre’s A Spy Among Friends and Phillip Knightley’s The Master Spy for her intelligence on Kim Philby, and she also cites Amy Knight’s highly flawed When the Cold War Began for her information on the Gouzenko case. How can I trust her authority on the topics and authors with which I am not familiar?

                One of her woollier assertions really stopped me in my tracks. On page 418, she writes: “One Venona cable even hinted that Walter Bedell Smith, director of the CIA beginning in 1950, might have been turned by the Soviets during his time in Moscow as American ambassador.” No commentary is supplied: no source for this claim is given. I judge that observation so shocking, with highly grave implications if true, that it should never have been allowed to appear in the text so baldly. If the evidence is flimsy, the observation should have been omitted. If it is not, a proper analysis should have been offered. I can find no reference to Bedell Smith in either of the two primary American works on the VENONA project, namely the book by Haynes & Klehr, and that by Romerstein & Breindel. Moreover, I cannot imagine anyone less likely to have been ‘turned’ (whatever that means in this context) than Bedell Smith. I accordingly sent a polite email to Professor Gage, asking her to provide me with the source statement, and to explain exactly what she meant. (Writing emails to authors is frequently a thankless task: non-academics tend to hide behind their agents or their publishers, but academics normally display an email address somewhere on the institution’s website, and that is how I was able to target Professor Gage’s inbox – or spam folder.)

                I received no acknowledgment or reply. I put her on the List.

                Summer Biographies

                It is a rich summer for the publication of biographies. Jesse Fink, who declared himself a coldspur enthusiast a few months ago, is a British-Australian author. His latest offering, as he posted, is a life of the intelligence officer Charles ‘Dick’ Ellis, titled The Eagle in the Mirror, and his objective is to refute the common claim that his subject was a ‘scoundrel’ – contrary to what I, like many others, believed. In order to get my hands on this book as soon as possible, I ordered it from amazon.uk, and eagerly look forward to its arrival, and learning what the facts about this mysterious character are.

                I also read in a recent Spectator a review of a recently-published biography of the photographer Barbara Ker-Seymer, written by Sarah Knights. Attentive coldspur readers will recall that I covered this little-known character in a piece from February 2019, Two Cambridge Spies – Dutch Connections (1) ( https://coldspur.com/two-cambridge-spies-dutch-connections-1/) , where I explored Ker-Seymer’s links with Donald Maclean, and whether she was the elusive ‘Barbara’ to whom Goronwy Rees referred. Duncan Fallowell’s review in the magazine was hardly compulsive: “She took some attractive photo-portraits before the war in her studio above Asprey’s and that was it.” I wondered, if Ker-Seymer was so insignificant, why Knights deemed her worthy of a biography. Was anything about Maclean to be revealed in the book? I doubt whether I shall bother to acquire it, since Knights may not have advanced so far as I did in my researches. Maybe somebody out there reading this report will know more, and inform me.

                At some stage I am also expecting the arrival of Robert Lyman’s book on the double-agent Henri Dericourt. Lyman, a somewhat arrogant New Zealander (in his self-promotion, he always prefixes his name with ‘Dr.’, in my mind a rather pretentious habit when exercised by those who are not medical practitioners), appears not to have been chastened by the drubbing that Patrick Marnham gave him recently on coldspur (see https://coldspur.com/special-bulletin-patrick-marnham-responds-to-robert-lyman/ ). For example, it has been reported to me that Lyman was enthusiastically touting his ‘new’ researches at the Chalke Valley History Festival in June. Patrick and I are very sceptical that Lyman will have come up with any fresh insights after his time at Kew, and it seems to us that he is being set up by Mark Seaman and the other Foreign Office propagandists as the successor to the now much subdued Francis Suttill. I suppose I shall have to acquire his book when it comes out, in the cause of research completeness, but, again, if any coldspur reader can perform the job for me first, and advise me accordingly, I should be very grateful.

                ‘J. L. Austin’ by M. W. Rowe

                On August 4, I received my copy of M. W. Rowe’s J. L. Austin: Philosopher and D-Day Intelligence Officer, which was reported (in a Spectator review) to have a fascinating account of the Oxford philosopher’s contribution to intelligence in World War II. It weighed in heftily at just over two pounds, with 660 pages. I completed it on August 19: it is a monumental work, a tour de force in many aspects, but ultimately unsatisfactory. The problem is that it actually consists of three separate books: a conventional biography of Austin, a study of military intelligence in World War II, to which Austin contributed mightily, and an account of Ordinary Language Philosophy in post-war Oxford. None of these three subjects is probably worthy of a separate volume, yet, when merged together, they produce something rather indigestible.

                Austin tragically died very young, of lung cancer at the age of forty-eight, and the events of his life, outside the war service and the linguistic battles at Oxford, do not contain enough of interest to fill a biography. The cause is not helped by a very stodgy and irrelevant genealogical introduction, which, by focussing on only one patrilineal thread, does not do justice to the scope of Austin’s heritage, and sentimentally makes some rather unrigorous conclusions. I cite here an example of Rowe’s whimsical day-dreaming: “It is pleasing to think that two mordant intellects and fine prose stylists – the J. Austen who wrote Sense and Sensibility and the J. Austin who wrote Sense and Sensibilia – are related, even if their closest common ancestor is to be found in the late fifteenth century.” That is a rather desperate effort.

                On the other hand, the middle section, on intelligence on wartime, is fascinating, and sheds vital fresh light on Austin’s contribution, especially concerning the D-Day landings, that has not been published beforehand. Yet the author chooses to include a host of ancillary information about the conflict that has little to do with Austin’s life. The last section is simply tedious: Austin’s apparent obsession with the detailed inspection and promotion of ‘Ordinary Language’ to solve ‘philosophical problems’ (that are undefined) seems to this reader quite futile, since that school of philosophy combines a mixture of the palpably obvious with a failure to understand that language is an infinitely deceptive tool, and that the spoken form, through emphasis and intonation, introduces a whole fresh dimension of significance and meaning. Rowe quotes something that Isaiah Berlin, in a typically arch and equivocal manner, wrote about Austin, as the philosopher was dying, that, to my mind, ironically undermines the whole principle of ‘Ordinary Language’: “  . . . I think on the whole that he is the cleverest man I have ever known – in curious ways also the nicest, perhaps not the nicest, but wonderfully benevolent, kind, good and just, despite all his little vanities, etc.” Analyzing the difference between ‘the nicest’ and ‘the nicest’ could have occupied a whole seminar. I recall reading, in my late teens, Language, Truth and Logic, by Austin’s adversary, A. J. Ayer, followed by Austin’s Sense and Sensibilia, and then Ernest Gellner’s Words and Things, which tried to demolish the kernel of Austin’s ‘Ordinary Language’ ideas. My vague recollection is that I found Gellner, despite his rather lush and imprecise prose, the most convincing.

                ‘Sense and Sensibilia’ by J. L. Austin

                The book is not helped by a too rich set of distracting Footnotes, mostly clarifying who some rather obscure and less obscure persons were – all of which could have been relegated to a Biographical Appendix, so that the reader could more easily discover what nuggets and insights the author wanted to mention that he did not judge were appropriate to include in his narrative. This clutter is reflected in a less-than-useful Index, which is dominated by the same hundreds of personal names, while ignoring many of the more vital entities (such as wartime Operations) in which I had interest. I was also puzzled that no analysis of Austin’s precipitous demise was given. He had been a dedicated pipe-smoker – like thousands of his generation – but why did he succumb so early to squamous cell carcinoma? (My father, who was born a month before Austin, also smoked a pipe intensively until the 1970s, but outlived him by forty-five years.) And how come that Austin, a resolute atheist, was given a grand memorial service in the University Church of St. Mary the Virgin? I should also have liked to learn more about the contribution of Austin’s loyal and admirable widow, Jean, who, as I picked up from a New York Times review of Nikhil Krishnan’s A Terribly Serious Adventure, carried on teaching philosophy at Oxford after her husband’s death. So – a necessary read, in many ways, but it is hard to see at which audience this dense tome is targeted.

                And then there are the reissues of two famous works: D. J. Taylor’s biography of George Orwell, and Michael Ignatieff’s revised life of Isaiah Berlin. I have an extensive supply of Orwell-related literature in one of my bookcases, including Taylor’s Life, the biographies by Crick, Meyer, Bowker, Shelden, and dozens of volumes that inspect various aspects of Orwell’s life and works, as well as an almost full set of the magnificent Complete Works of George Orwell, edited by Peter Davison. In view of my breakthrough research in 2004 suggesting that Orwell had Asperger’s Syndrome – a diagnosis later confirmed by Professor Michael Fitzgerald in his 2005 book The Genesis of Artistic Creativity (see https://coldspur.com/reviews/orwells-clock/ ), I was keen to learn how Taylor had treated this information in Orwell: The New Life. I had written to Taylor many years ago, and pointed him to my article posted on coldspur, so he must have been aware of the theory.

                ‘Orwell: The New Life’ by D. J. Taylor

                The book duly arrived. I checked out the index: no mention of Fitzgerald or Percy or Asperger’s. Yet the flyleaf declares that the book uses ‘a wide range of previously unknown sources’, and that it is ‘poignant, far-reaching, and critically astute’. I read all of its 540 dense pages, and enjoyed it, but did not learn much more than I gained from the 2003 version, and it sometimes is simply too encyclopaedic. Indeed, the resident literary lampoonist and satirist at Private Eye captured the spirit of it in a short parody published a few weeks ago. While his contributions are always presented anonymously, I know that the author’s identity is – D. J. Taylor.

                So what happened? I was apparently not the only reader to wonder about Taylor’s disdain. Alexander Larman, in a review of the biography in the July issue of The Spectator World, wrote:

                “Taylor shies away from any suggestion that Orwell was on the autism spectrum, but judging by many of the actions depicted in this necessarily lengthy but never self-indulgent book, he suffered from at least a moderate form of Asperger syndrome, which might explain his often uncomprehendingly forthright attitude towards his fellow writers.”  Yet that is only partly true. Taylor does not ‘shy away’: he never even engages with the hypothesis, which represents a very bizarre way of treating fresh research. Ignoring coldspur is perhaps pardonable, but pretending that the relevant publication by the very prominent Professor Fitzgerald had no merit is surely inexcusable. Since a review of the book also appeared in Literary Review, I sent a letter to the Editor of that excellent magazine describing my puzzlement, and drawing attention to both my article and the book by Professor Fitzgerald. He declined to print my letter.

                Soon afterwards, I read in the Wall Street Journal of August 12-13 a very positive review of a book titled Wifedom, a biography of Orwell’s first wife Eileen O’Shaughnessy, by Anna Funder. The reviewer, Donna Rifkind, wrote:

                            Ms. Funder clearly believes that Eilleen’s role in Orwell’s life has been undervalued. She balks at the ways Orwell views “women – as wives – in terms of what they do for him, or ‘demand’ of him.” His exalted status, she implies, has obscured how tyrannical this hater of tyrannies could be, how insensitive he was towards the women who best understood him.

                It has been shown that Orwell treated several women in his life in a severely abusive manner. Taylor definitely soft-pedalled this aspect of his hero. It sounds as if a new version of his work is called for . . .

                And then there was Michael Ignatieff and Isaiah Berlin. I learned from a Facebook post by Henry Hardy (Berlin’s long-time amanuensis and editor) that a revised edition of Isaiah Berlin: A Life, first published in 1998, was to appear this summer. I awaited its appearance eagerly. After all, in my study of Berlin, most prominently in my 2015 History Today article The Undercover Egghead (see https://coldspur.com/the-undercover-egghead/), in my comprehensive coverage in Misdefending the Realm (2017), and in my elegiac contribution in Isaiah in Love (see https://coldspur.com/isaiah-in-love/), I had done much to disclose Berlin’s involvement with intelligence, frequently of a highly dubious nature, which Berlin, in his conversations with Ignatieff, and in his own writings, had very strenuously denied. Surely Henry Hardy would have alerted Ignatieff to my contributions: Hardy had attended the lecture at Buckingham University where I first unveiled The Undercover Egghead, he was familiar with Misdefending the Realm, and had complimented me (he is not one to dispense praise easily) on Isaiah in Love.

                ‘Isaiah Berlin: A Life’ by Michael Ignatieff

                I had enjoyed the first edition of the Life, but thought it intellectually lazy. I do not know how one can write a serious biography when one is mainly dependent upon the reminiscences of the subject himself. Ignatieff brought a cultured and refined perspective to the incidents in Berlin’s life, but it was far too hagiographic, focused too much on Berlin’s frequently garbled thinking without analyzing it critically, and lacked objectivity and discipline in covering the essence of Berlin’s ‘Jewishness’ (whatever that means), and his adherence to ‘Judaism’ and Zionism. Thus I had great expectations that the new edition would address many of the faults of the first, and take into consideration the bulk of what has been written about Berlin in the past twenty-five years.

                The arrival of the book was a colossal disappointment. It is described as a ‘fully revised definitive edition’, ‘a magisterial biography’. No new blurbs are listed, however: Doris Lessing’s tribute is highlighted, but she died in 2013. That was not a good sign. In his Preface, Ignatieff writes that ‘a steady stream of articles, books and commentary have explored Berlin’s ideas. In this new edition, I have tried to incorporate as much of this new material as possible’. He claims that he has also ‘tried to clarify Berlin’s relations with important figures’, but his interest is superficial. He maintains the individual chapters that carved up the first edition. His Endnotes reveal only about three books that have been published since 1998, and two of those consist of reminiscences of Berlin, one of which is by Henry Hardy himself. ‘Definitive’ it is not. Even Hardy agrees that a proper authoritative and objective life of Berlin remains to be written.

                Thus we read no fresh analysis of Berlin’s activities in the intelligence world. The story that Guy Burgess was on a mission to Russia, for MI5 (an error, since any overseas engagement would have been undertaken by MI6), and that he wanted Berlin to be appointed as a Press Officer at the British Embassy in Moscow, is carelessly repeated, as is Berlin’s denial that he ‘had ever been sent on a secret mission anywhere by anyone’, in response to Goronwy Rees’s assertions in his People article in 1956. None of the many incidents that I describe in my articles, from the visit to sub-Carpathian Ruthenia in the summer of 1933 (see https://coldspur.com/reviews/homage-to-ruthenia/) , through the strange negotiations with Chaim Weizman at the end of 1940, to the furtive meetings in Washington with Anatoly Gorsky, the previous handler of the Cambridge Five in London, starting in December 1944, is covered.  I also note (something that I overlooked in the first edition) that Berlin ‘gave every assistance to Peter Wright . . . .who called in search of any other accomplices Burgess might have had inside academe or the Establishment’. What possibly might Berlin have known if he was never involved with Intelligence?

                Henry Hardy (who worked closely with the author on the notes and sources, and the editing of the book) agrees with me that Ignatieff is guilty of misleading his audience, and wrote to me declaring that ‘he shouldn’t have pretended to have done more than he did, and he should have made the case for leaving the book essentially unaltered’, adding that he didn’t think Ignatieff could be bothered to perform any more research. It is all rather sad, and the Pushkin Press should be embarrassed over this sorry effort to present the thing as a ‘fully revised definitive edition’. I have not seen any reviews yet, but I shall watch out to detect whether anybody has the same reaction as I did. (The Summer Special issue of Prospect carried an encapsulation of Berlin’s ideas by Ignatieff, suggesting that his Concepts of Liberty could act as guidance for the political challenges of today, but I found it too abstract and unconnected – as useless as the ideas of his adversary, John Rawls, Daniel Chandler’s biography of whom was reviewed a few pages on.)

                The Love-Lives of the Philosophers

                As I read Ignatieff’s book, I made notes on items that I thought were incorrect, or examples of sloppy or imprecise writing. I sent these to Henry Hardy, and some lively exchanges followed. One particular item that caught my eye was a sentence in the first paragraph of Chapter 15, where Ignatieff describes a scene at a beach outside Portofino in 1956. He lists some characters visible in Aline Berlin’s home movie, including ‘Stuart Hampshire and his son Julian Ayer’. Ayer? What did that mean? Had a few words been omitted? I know that Hampshire and Ayer (A. J. or ‘Freddie’, the logical positivist) were closely associated, but why would Hampshire’s son be called Julian Ayer? (Hampshire is of intelligence interest to me, since he worked with Hugh Trevor-Roper in the Radio Analysis Bureau of the Radio Security Service in World War II, and, despite a slightly questionable reputation, was invited by the government to conduct an audit of Britain’s intelligence services, and specifically GCHQ, in 1965.) I also checked out the first edition: there the text runs simply ‘Stuart Hampshire and his son Julian’. So I asked Hardy about it: was this a mistake? His first response was to inform me that Julian was indeed Hampshire’s son, but was known as Ayer. From straightforward research on Wikipedia, I established that Hampshire had married Ayer’s first wife, Renée Lees, and I assumed that Julian was thus his stepson.

                Stuart Hampshire

                Yet further investigations pointed to something more sinister. Hardy then told me that Julian was not Hampshire’s stepson: he was Hampshire’s biological son, ‘conceived before his parents were married’. This, however, turned out to be something of an understatement, and I sent my consequent discoveries to Hardy: “A long time before his ‘parents’ were married! All very strange. Julian was apparently born in 1939, but Ayer did not divorce Renée Lees until 1945, and Hampshire did not marry her until 1961. Thus Julian’s status at Portofino in 1956 was indeed ambiguous. On-line information on him describes him as Ayer’s ‘adopted son’”. Moreover, when I returned to Hampshire’s Wikipedia entry that morning, references to Julian (that I had picked up a couple of days ago) had disappeared, even though the last date of change was given as July 23. It seems that Hampshire’s daughter, Belinda, was also a product of his liaison with Renée Lees.

                I detect some awkwardness over these events. Sadly, Julian was drowned in the tsunami disaster of 2004: maybe Ignatieff judged that it was time to open up about these relationships. By simply adding ‘Ayer’ to ‘Julian’, however, he provoked far more questions than he closed. What were his motivations?

                And then, the very same day on which I was pursuing this inquiry, I read a column in the Spectator of July 22 by Charles Moore where he explained that the father of the Archbishop of Canterbury, Justin Welby, was Churchill’s private secretary Sir Anthony Montague Browne. His mother, Lady Williams of Elvel, admitted that she had gone to bed with Browne, ‘fuelled by a large amount of alcohol on both sides’, probably the night before she eloped with Gavin Welby. DNA tests gave a 97.78 probability that Montague-Browne was Welby’s father. What is it about the sexual mores of the Great and the Good, and what do they think they are they up to, lecturing to us about Morality? I knew that Freddie Ayer was a relentless satyr, but it seems that his habits were adopted by many of his friends and contemporaries. One of the fresh revelations in Ignatieff’s book is that Isaiah Berlin, after his marriage to Aline, not only carried on his affair with the sometime Soviet agent Jenifer Hart (which I had learned from Nicola Lacey’s biography of her husband H. L. A. Hart), but also conducted one with the Oxford sociologist (and later head of Newnham College, Cambridge) Jean Floud. Floud, née Macdonald, had married Peter Floud, and joined the Communist Party with him in 1938. Peter Floud’s brother Bernard was probably a member of the Oxford Group of spies, and committed suicide as the net closed in in 1967. Maybe it was over details concerning that circle that Berlin was able to clarify matters for Peter Wright.

                Coldspur: Method, Archive & Topography

                Method

                It occurs to me that it might be useful to describe the method(ology) behind my conclusions posted on coldspur, and how I treat comments submitted by readers. My researches are undertaken with the suspicion that most accounts of events in the world of espionage and counter-espionage are probably inaccurate, and a detailed study frequently reveals anomalies in time, geography and psychology, as well as conflicts between different records. (The full methodology I applied when performing my doctoral thesis can be inspected at  https://coldspur.com/reviews/the-chapter-on-methodology/. )

                My writing is designed to counter the baleful influences of at least four groups: 1) Those who write memoirs, or confide ‘remembrances’ to their biographers, when their primary objective is to beautify their reputation; 2) The bureaucrats, such as the ‘Foreign Office advisors’ who guide (for example) SOE researchers away from embarrassing material, and government employees (current or retired) who display indulgence to their ‘colleagues’ for sentimental reasons; 3) The amateur historians who distort the facts out of carelessness or a desire to glorify their subjects, or look for publicity by promoting melodramatic theories; and 4) The authorized historians who breach their professional objectivity by agreeing with their sponsors to constrain their areas of research.

                What I am doing is, I suppose, ‘investigative reporting’, but of recent history, not current events. The experts in this subject encourage the maintenance of a large number of human sources – giving as an example the Sunday Times team researching Philby. Yet it requires an open mind and a good nose to distinguish between probable facts and possible disinformation when dealing with such sources: Bruce Page with Sackur, Seale and McConville with Vivian, Chapman Pincher and Anthony Glees with White and Reilly. Thus ‘sources’ can be a two-edged sword. I have enjoyed the contributions of very few ‘live’ inputs during my research. Moreover, it probably explains another dimension of the 70-year rule for releasing archival material. That limitation is frequently explained as a mechanism to protect the living, or their relatives. Yet it is just as useful for the authorities in preventing the insiders from being interrogated by inquisitive researchers, since they are no longer with us.

                As I process the information available, and publish my conclusions, I am of course merely developing hypotheses. I never pretend that they are the last word on the subject, and I encourage challenges to them. Contrary to the belief of some, an accurate account of what really happened is not going to magically appear from an exhaustive presentation of all the ‘facts’. Some records may never be released, disinformation has been inserted into the archives, and memoirs are notoriously unreliable. I note the following statement from M. W. Rowe’s biography of J. L. Austin, where the author comments on the challenge of dealing with less than conclusive evidence: “ . . . truth is ultimately more likely to emerge from a bold, crisp and refutable claim than a range of hesitated options; and a full discussion of every option would weigh down the story and take up too much space.”

                Well, I suppose my texts could be crisper, but I do believe that recording a detailed exposition of my material is essential for the benefit of posterity, since it will not appear anywhere else. I develop my hypotheses from a meticulous examination of information from multiple sources, and try to interpret/transform a series of discrete events into the structure of a plausible theory (such as my recent hypothesis that in 1939/40 Kim and Litzy Philby presented themselves to MI5 and MI6 as turncoats from Communism). Now a thesis such as this, which helps to explain a number of riddles and paradoxes, could be refuted, but that will not happen simply because one (or more) of the links in the chain can be broken. For example, some readers have challenged my suggestion that the informant to MI5 in 1953 was Graham Greene, and they may be right. Yet, even if that person is never correctly identified, it cannot detract from the fact that someone, almost certainly from MI6, told MI5 that the psychiatrist Eric Strauss knew more than he should have about Philby’s exploits in Turkey.

                Thus most of the comments that I gratefully receive on coldspur help me to refine the arguments, and correct errors. So far, no one has submitted any evidence that causes me to retract a theory, though I am ready to do so, if appropriate. To any sceptics, I sometimes reply: “Show me an alternative explanation that fits the facts!”, but that may be unreasonable, as they have neither the time nor the interest to go that far, and they might disagree with me over what the ‘facts’ are. I should love to participate in a forum that explored these rival ideas, such as a debate at Lancaster House (probably not chaired by Mark Seaman), but that is unlikely to happen. Coldspur under WordPress is not the most efficient chat-room for exploring rival ideas, but it is what I have, and the ability to follow up controversies in my own space and time enables me to avoid the noise and muddle of other media. 

                Archive

                As I have previously written, I have been trying to find a home for my substantial library, and a custodian for coldspur, for the time when I am no longer around. I believe I have found a suitable educational institution who is eager to house my collection and provide a portal to my research and other archival material, but I have nothing in writing yet, so I am reluctant to say any more until a firm agreement has been reached. What has emerged from the discourse so far is the requirement to have my collection of books catalogued, and I have thus been involved in working with a website called LibraryThing (https://www.librarything.com/home) to enter the details of the relevant volumes in my library.

                So far I have entered about fifteen-hundred items on intelligence, history and general biography, with a few thousand still to be processed. (It may be that the institution will not want all my library, which contains a large selection of fiction, books on language, poetry and humour, including a particularly rich assortment of volumes of comic and nonsensical verse.) It has been a fascinating exercise: LibraryThing offers a choice of search engines to locate a title, normally by ISBN, such as amazon, the Library of Congress, and the British Library. I have found that amazon is by far the fastest and the most reliable. Very oddly, even when a book is identified with a ‘Library of Congress’ number, for instance, that search capability usually fails to come up with a candidate. For older books, of course, when no ISBN number existed, I have to enter search arguments by title and author, and make annotations. Occasionally no entry at all can be found, and I have to input all the details (publisher, date, etc.) myself. I place a little sticky label on each book entered, in order to control where I am.

                One revelation for me has been how chaotic the ISBN system is. It looks as if it maintains an erratic ‘significance’ in its coding (and we data modellers know how error-prone such coding systems can be, as, for example, that used for postcodes in the UK), but I don’t know what it is, and there appears to be little consistency between what should be related entries, and books republished in a different format frequently own vastly different identifiers. I also found that some newish books remarkably have no ISBNs printed within them, and that some have them, but they are wrong, or have been used by other books before them. One of my on-line correspondents has made a detailed study of ISBNs and formats, and I may return to this issue at some stage.

                A fascinating benefit from this exercise is that the user of LibraryThing can determine how many other users own the same volumes. This feature is a little unreliable, however, as it does not distinguish between different editions, but works only by title. Thus my owning a very rare nineteenth-century edition of a memoir, for example, may appear to be echoed in a count of other registers when the latter probably reflect much later re-prints. Occasionally, I find that I am the sole owner of a particular volume, which is a pleasing discovery.

                I hope to report more on this project soon.

                Topography

                As the volume of research on coldspur has increased, I find it more and more difficult to track down references, statements and conclusions that I have made. (My bulletins have been going on for over eight years now, comprising what I estimate to be about one-and-a half million words – not all of serious import, of course.) An Index would be highly desirable, but I do not think the creation of one is going to happen. The internal search capability within WordPress is somewhat useful, but it identifies only the entry that contains the reference(s), and is thus very laborious. I do preserve the original Word version of each posting, so I can go back to an individual report and execute a search that highlights each reference. But I have found that an inadequate mechanism.

                I know that there are procedures out there that can convert text, even extracted from coldspur itself, and convert into a PDF, maybe with Index entries, and that would be a great help, but would not go far enough. For an Index to be useful, it needs qualification of the entry (how many of you have been frustrated to look up, say, ‘Philby’, in the Index of a book, and find a list of twenty-eight page numbers without any indication of what aspect of ‘Philby’ each covers?). I know, from my experience in compiling the Index for Misdefending the Realm how desirable such a capability is, but also how tedious an exercise it is. 

                The other aspect of this dilemma is the fact that I now detect multiple linkages between my research projects that were not obvious beforehand, such as the manipulation of the FBI/CIA by Dick White in 1951 and the investigations into Philby that summer, or the involvement of Claude Dansey in the attempts to ‘turn’ Ursula Kuczynski, Henri Déricourt, and, possibly, Litzi Philby. Thus I plan to provide some sort of guide to the coldspur archive, organized along chronological lines, that will highlight important threads and related events, and provide direct pointers to the urls, as well as the position of the relevant text within the report itself, so that the required information may be found more easily. That is my hope, anyway. I plan to start this project soon, and I hope to deliver the results before the end of the year. 

                (This month’s Commonplace entries viewable here.)

                4 Comments

                Filed under Espionage/Intelligence, General History, Literature/Academia, Management/Leadership, Personal, Philosophy, Politics, Technology