Book Read Free

Fighting to Lose

Page 8

by John Bryden


  These were wonderful opportunities for Owens as A-3504. An ordinary spy approaching even one aerodrome in wartime Britain risked execution if caught, and so would go cautiously. Owens could visit as many aerodromes as he could manage with absolutely no fear should he trigger base security. It emboldened Owens to gather information with an aggressiveness no ordinary spy could match. In one case, he talked his way past the entrance gate and drove around an airfield counting the parked aircraft. In the pubs of Harrogate, he cozied up to airmen and asked questions delicate enough to get him shot. Captain Robertson could not have made it easier for Major Ritter’s A-3504.

  To better assess the accuracy of the information Owens was collecting, Robertson again enlisted the help of Major Boyle over at the Air Ministry. Between them, they compiled much of the RAF’s order of battle in England, supplementing “the complete list” of squadrons supplied by Boyle with contributions from MI5’s newly created local security control officers (SCOs).36 Neither man seems to have been concerned that by centrally collecting this data they increased the risk that the whole package could be leaked to the enemy.

  As for whether Owens was telling the enemy more on his trips to the Continent than he should, Robertson put on record his conviction that Owens was entirely trustworthy: “He is a stupid little man who is given to doing silly things at odd moments, but I am perfectly convinced he is straightforward in the things that he gives me and the answers to my questions.”37

  Throughout this period, according to the Hamburg–Berlin teletype messages that Robertson never saw, this “stupid little man” steadily provided the Germans with high-grade intelligence on his trips across the Channel, some of it supplied by Major Boyle and some of it apparently gathered by Owens himself.

  4

  January–April 1940

  By the beginning of 1940, it would have been patently obvious to Ast Hamburg’s Major Ritter that his British opponents had little clue about how to run a wireless spy. He must have shook his head when Owens told him that the MI5 wireless operator who sent A-3504’s reports was a civilian, not a qualified military person, and that the people trying to run him as a double agent had little knowledge of codes and ciphers. It was the perfect circumstance for Funkspiel — the epitome of the spymaster’s art.

  It was initially not as ideal as Ritter might have imagined. Britain’s War Office wireless listening service — formerly MI8(c) but now renamed the Radio Security Service (RSS) — was not looking for spies, but only for illicit signals that might be used as radio beacons to guide in German bombers. Only suspicious transmissions in Britain were being sought, and they were not being monitored at all for their content.

  This changed in December with the arrival at the War Office of a Canadian army signals officer who was looking for advice on how to handle the obviously clandestine wireless traffic being intercepted by a Canadian signals intelligence unit in Ottawa. Within two weeks, E.W.B. Gill, an Oxford professor and former wireless intelligence officer of the First World War, was dispatched to the Radio Security Service, then still based at Wormwood Scrubs (London) along with MI5, to have it abandon the radio-beacon searches and listen instead for what might be German enemy-agent transmissions. As the Canadians had discovered, there was plenty of suspicious stuff out there, but neither MI6 nor the Government Code & Cipher School had shown much interest.1

  On learning that an RSS volunteer operator was handling the wireless communications of a double agent code-named SNOW that MI5 was running, Major Gill undertook to have the German side of the traffic studied. It was soon found that Hamburg, SNOW’s control station in Germany, was exchanging messages with another station, whose signal was moving along the coast of Norway — a ship. The cipher used was similar to the congratulations code that had been given to Owens, and Major Gill, with the help of Lieutenant Hugh Trevor-Roper, a twenty-six-year-old German-speaking Oxford scholar who had arrived with him, managed to puzzle it out.

  The name of the ship was the Theseus, and it was reporting on neutral ships headed for British ports. On January 29, Gill forwarded this information to the Government Code & Cipher School, but instead of a thank-you, its chief, Commander Alastair Denniston, fired back that Gill should stick to listening and leave the cipher-breaking to the experts. Undaunted, Gill continued to have the Theseus traffic monitored, and extended the listening to other stations across the Channel that appeared to be exchanging transmissions of a similar type.2

  The Theseus was a “spy ship,” as the term was applied during the Cold War to vessels that roamed the high seas listening in on foreign radio communications using sophisticated wireless receiving equipment. Ships could be positioned precisely where the signals of a distant transmitter could best be heard.

  In the case of spies, once their signals were picked up and copied, the ship could be moved to where it could best retransmit them to the mainland station. In the case of the Theseus, this would have been Hamburg. It worked the other way, too. The wireless operator for SNOW could be made to hear the Theseus, depending on where the vessel was transmitting from.3

  The choice of wireless operator for the Theseus must have been deliberate. He was twenty-four-year-old Friedrich Kaulen, son of a German merchant. Fair-haired and good-looking, he was R-2220, an agent of Nest Bremen. His Abwehr assignment immediately before the Theseus had been two years as a spy in England for Abt I Luft, and he had received kudos for his excellent photographs of British secret air fields, anti-aircraft batteries, and searchlight emplacements.

  Ordinarily, the wireless operator on a military vessel would be a naval rating or, in the case of a spy ship, perhaps an army signals specialist. Kaulen, however, was an amateur civilian radio hobbyist, much like the volunteer operators who did much of the listening for the RSS, and like the operator who transmitted for Owens. Kaulen’s only second languages were English and French, an odd choice for a wireless operator who was to remain for months in Norwegian waters. On the other hand, if the Germans wanted to do a wireless deception — a Funkspiel — on the operator of Owens’s transmitter, should they have figured out that it was under British control, it would make sense that they would use a person just like Kaulen, and do it from a ship.4

  Kaulen’s ability to understand English would be handy for confirming that he had Owens’s signal, since he only spoke English. As for getting the correct frequency, that would not have been a problem: as a Nest Bremen spy, Kaulen’s commanding officer would have been the Abt I Luft chief at Ast Hamburg — Major Ritter.

  At Major Gill’s urging, the Radio Security Service in London began avidly collecting the new traffic and, because he and Trevor-Roper shared a flat, they would work on the material in the evenings. By simple anagramming, they found they could break other messages, and these revealed that Hamburg was in contact with spies in Belgium, Holland, and Luxembourg.5

  On March 20, at a meeting with Gill and Captain Robertson of MI5, Commander Denniston of the Government Code & Cipher School agreed to assign one of his codebreakers to the traffic.6 This was to be sixty-six-year-old Oliver Strachey, who had briefly held a job with the India railway system before marrying the suffragette Rachel Conn Costelloe and enjoying a reversal of household roles until his First World War stint with MI1(b), the War Office code-breaking agency that Colonel Simpson had headed. He stayed on after the war when MI1(b) merged with the navy’s Room 40 to form the Government Code & Cipher School (GC&CS). He was then with a GC&CS team working on German naval traffic.

  Gill and Trevor-Roper were convinced they had found the Radio Security Service’s noble purpose. They saw it as opening a window on the operations of the German secret services. Denniston remained cool. Strachey did not produce a decrypt from the new intercepts until April 14, a week after the German invasion of Norway.7

  Denniston’s dismissiveness is indicated by the fact that Strachey was no more than one senior citizen with a pencil and paper, whose output was assigned the lofty and surely sardonic title, Intelligence Service (Oliver Str
achey) — ISOS. Denniston had good reason to be skeptical. The ciphers used for the messages Gill and Trevor-Roper were so excited about were of a First World War vintage that, thanks to the indiscretion of a former director of Naval Intelligence, the Germans had to know the British could easily break. Denniston could be sure they would not be using them for messages of any real value.

  The former Naval Intelligence head in question was the famous Admiral Reginald Hall, who had presided over the codebreakers of the Admiralty’s Room 40 during the First World War. He is widely credited with covertly releasing the intercepted “Zimmerman Telegram,” which in 1917 helped bring the United States into the war. In 1919, the war over, he left the navy in a swirl of ill-feeling, probably having to do with how difficult he had been to work with while serving in his positions of high responsibility. He tended to be arrogant and autocratic, and there were some in senior government circles who probably were not sad to see him go, shoved a little, perhaps, by not giving him certain honours that he might have felt he deserved. He took with him some ten thousand decrypts of German navy, Foreign Office, and espionage messages, and stashed them at home.

  In 1925, an American civilian lawyer approached Hall on the off chance he could help him with a case he was working on aimed at getting Germany to pay for damages for the “Black Tom” explosion that shook New York Harbor in 1916. What he needed was hard evidence linking the destruction of a munitions depot to German agents. Hall led Amos Peaslee to the stacks of decrypts, gave him the run of the house, including servants, for as long as he wanted, and went off to Scotland on a shooting holiday. Three days later, Peaslee had found and copied 264 cables and radiograms pertinent to German First World War covert operations in America.

  The decrypts ignited a blaze of publicity when the case was heard in The Hague in 1927. The German government may have had its suspicions, but it had no idea of the extent to which the British had been reading its secret communications, and probably still were. The immediate and lasting consequence was the Government Code & Cipher School was locked out of all German Foreign Office and German army traffic, the Foreign Office switching to unbreakable one-time pads (single-use sheets of random letters whose numerical equivalents are added to those of the letters in a message to encipher it) and the army to high-security plug board ciphering machines (akin to early telephone switchboards, they allow for the creation of thousands of unique electronic circuits).8 It stood to reason that the Abwehr, the German army’s secret intelligence service, would have taken similar measures.

  To make the breach in secrecy even worse — and it could hardly have been — the types of German ciphers compromised were subsequently described by the American cryptologist Herbert Yardley in the popular book The American Black Chamber (1931) and in detail by Helen Fouché Gaines in her Elementary Cryptanalysis (1939). The most vulnerable had been transposition ciphers, which at their weakest were solvable by anagramming.

  Commander Denniston could have told all this to Gill and Trevor-Roper, but he did not. Colonel Simpson, as the former head of the British Army’s wartime equivalent of Room 40, could certainly have explained it to Captain Robertson, except that the previous month he had been transferred out of MI5 to General Wavell’s army in the Middle East.9 Neither the Radio Security Service nor MI5 — as far as available documents show — were ever directly told that the ciphers of the type used by the Abwehr messages being intercepted had been compromised for years.

  Probably to Denniston’s complete surprise, with Hitler’s invasion of Norway it was found that the Theseus was using these same simple ciphers to relay back to Germany the reports of spies on shore. Some of these deciphered messages were given to Churchill, again head of the Admiralty, and it undoubtedly caused him to remember the glory days of Room 40 when the signals of the German High Sea Fleet were being read. He ordered that the Theseus not be disturbed. When it was all over, and Norway lost, Gill again urged Strachey to get busy on the traffic that still was coming in from spies across the Channel, evidently in France, Belgium, and Holland. Strachey’s output was so meagre, however, that Gill offered him one of his own staff to help move things along.10

  Meanwhile, MI6’s clandestine wireless service was coming of age. Its chief, Gambier-Parry, had been the marketing manager in Britain for the American radio and appliance maker Philco, and had recruited from the company a wireless engineer by the name of Harold Robin who developed a portable transmitter that weighed less than ten pounds. This, plus the introduction of super-secure one-time pads for enciphering messages, enabled MI6 to begin to deploy its own clandestine wireless observers in the field, rather than just in embassies, one such team reporting from a mountainside during the Norway crisis. This was a milestone in the modernization of MI6.11

  Gambier-Parry’s operational headquarters was in Bletchley Park, a stately property MI6 acquired near the start of the war to house the expanding Government Code & Cipher School. He hired experienced signals personnel co-opted from the army and navy, and growth was so rapid that before long the team had to be moved to new premises five miles away at Whaddon Hall. Its official designation was MI6 (Section VIII).12

  Having a more professional wireless operation than the Radio Security Service, with its handful of signals personnel relying on Post Office and amateur radio listeners, MI6 (VIII) was capable of doing a far better job of tracking the clandestine wireless activity coming from the countries bordering Germany.13 It may be that one reason that Strachey was breaking so little for Gill was that his decrypts were going first to MI6.

  MI5, by contrast, remained slow to grasp the technical aspects of wireless technology. When someone wondered why the Germans were not worried about the British locating their agent’s transmitter by taking bearings on its signal, Owens was told to raise the matter during his meeting with DR. RANTZAU in Antwerp at the beginning of April, and to ask whether he should be sending on different frequencies. Not necessary, DR. RANTZAU replied; it was very difficult to pinpoint the locations of illicit wireless sources. There had been one transmitting in the Wilhelmshaven area, he said, but despite all efforts it had been impossible to run it down.14

  This was nonsense. A radio signal is strongest along the line of sight, a fact that enables a transmitter to be located simply by turning the aerials of two or more receivers toward where the signal is strongest and then drawing lines on a map to where they intersect. This was called direction finding (DF), the ancestor of the twenty-first century’s Global Positioning System (GPS), and could be done over long distances or from close up by mobile receivers. The technique had been known during the First World War and was still being used by both sides to locate enemy warships at sea and enemy army and air force units on land. It was also used by government agencies like Britain’s Post Office, Canada’s Department of Transport, and the U.S. Federal Communications Commission to pinpoint the location of unlicensed wireless sets.

  Obviously, in order to survive in enemy territory, it is helpful for a spy to change frequencies and call signs as often as practical, but the most important necessity is to send from different locations. DR. RANTZAU was not asked the most crucial question: Was it safe for JOHNNY — the name Ritter preferred to use for Owens — to always be sending from the same place? The Germans themselves were soon to provide the answer when Britain’s sabotage agency, Special Operations Executive, began landing its agents into occupied Europe. Their wireless transmissions were DF’d and they were caught by the score.15

  The only MI5 officer with the technical clout to challenge DR. RANTZAU’s advice — Colonel Simpson — had left.16 In his absence, Robertson chose to believe his German opponent. This is all the more ironic in that just at this time Denniston forwarded to him a report from the French direction-finding service, which had picked up the SNOW transmitter’s signal and had identified it as coming from around London. “I shall be very glad,” Robertson wrote Major Cowgill of MI6, “if you will reply to the French telling them that we know all about the station, and t
hat they need worry no further.”17

  Yet, if the French could hear the SNOW transmitter and get bearings on it, surely Robertson should have thought the Germans would assume the British could, too. It appears he was blind to this logic. If he asked for Gill’s opinion, it is not on the record.18

  DR. RANTZAU did concede that it might be a good idea if JOHNNY changed his call sign from time to time. According to Owens, Ritter went out and bought two copies of the book The Dead Don’t Care by Jonathan Latimer, one for him to keep and the other for Owens. He then explained how every day they could both use them to derive a new call sign to locate the page and line where the letters could be found.19

  In fact, Major Ritter was providing Owens with the means to secretly encipher his own messages, and in a way that was unlikely to be discovered. An agreed-upon published text — book, magazine, newspaper — enables spy and spymaster to construct an enormous number of fresh cipher keys. All they need to do is decide on which pages to find the key letters or key words on particular days. Provided the messages are then enciphered by the substitution method, rather than by transposition, they can be very difficult to break.

  Owens may have been playing games here. When leaving Germany for Britain just before the war, he had been assigned the novel Oil for the Lamps of China by Alice Hobart for his cipher keys.20 It could be he never used it because it was not consistent with his reading tastes, and would have stood out in his possession. The invasion of Holland and Belgium was impending, however, and he was going to really need his own secret cipher, especially if he had access to a transmitter through another spy, or he had his own hidden away.

 

‹ Prev