GCHQ
Page 72
Lerner, M.B., The Pueblo Incident: A Spy Ship and the Failure of American Foreign Policy (Lawrence: UP of Kansas, 2002)
Levy, S., Crypto: Secrecy and Privacy in the New Code War (Allen Lane, 2001)
Lewin, R., Ultra Goes to War: The Secret Story (Hutchinson, 1978)
Lewis, J., Changing Direction: British Military Planning for Post-War Strategic Defence, 1942–7 (Frank Cass, 2nd edn, 2003)
Long, P, ‘In Support of So Many’. Royal Air Force Station Watton 1945–2000 (Privately published, 2001)
Lucas, W.S., Divided We Stand: Britain, the US and the Suez Crisis (Hodder and Stoughton, 1991)
Lustgarten, L. and Leigh, I., In from the Cold: National Security and Democracy (Oxford: Oxford UP, 1994)
McKnight, D., Australia’s Spies and their Secrets (U. College London Press, 1994)
McLachlan, D., Room 39: Naval Intelligence in Action 1939–45 (Weidenfeld and Nicolson, 1968)
Maddrell, P., Spying on Science: Western Intelligence in Divided Germany, 1945–61 (Oxford: Oxford UP, 2006)
Mango, A., Turkey and the War on Terror: ‘For Forty Years We Fought Alone’ (Routledge, 2005)
Mastny, V., A Cardboard Castle: An Inside History of the Warsaw Pact, 1955–91 (Budapest: Central European UP, 2005)
Middlebrook, M., The Fight for the ‘Malvinas’: The Argentine Forces and the Falklands War (Viking, 1989)
Mikesh, R.C., B-57: Canberra at War (Ian Allan, 1980)
Mitchell, M. and T., The Spy Who Tried to Stop a War: Katharine Gun and the Secret Plot to Sanction the Iraq Invasion (PoliPointPress, 2008)
Montgomery Hyde, H., George Blake: Superspy (Futura, 1987)
Murphy, D.E., Kondrashev, S.A. and Bailey, G., Battleground Berlin: CIA vs KGB in the Cold War (New Haven: Yale UP, 1997)
Norton-Taylor, R. and Lanning, H., A Conflict of Loyalties: GCHQ 1977–91 (Cheltenham: New Clarion Press, 1991)
O’Malley, B. and Craig, I., The Cyprus Conspiracy: America, Espionage and the Turkish Invasion (IB Tauris, 2001)
Packard, W., A Century of Naval Intelligence (Washington DC: Office of Naval Intelligence, 1996)
Parrish, T., The Ultra Americans: The US Role in Breaking Nazi Codes (NY: Stein and Day, 1986)
Paterson, M., Voices of the Code-breakers: Personal Accounts of the Secret Heroes of World War II (Newton Abbot: David and Charles, 2007)
Pedlow, G.W. and Welzenbach, D.E., The CIA and the U-2 Program, 1954–1974 (Washington, DC: Central Intelligence Agency, 1998)
Perrett, B., Weapons of the Falklands Conflict (Poole: Blandford Press, 1982)
Pidgeon, G., The Secret Wireless War (UPSO, 2003)
Pilger, J., Freedom Next Time (Random House, 2006)
Pimlott, B., Harold Wilson (HarperCollins, 1992)
Pincher, C., Too Secret Too Long (Sidgwick and Jackson, 1984)
—Traitors; Labyrinths of Treason (Sidgwick and Jackson, 1987)
Pocock, C., The U-2 Spyplane: Toward the Unknown (Atglen PA: Schiffer Military History, 2000)
Powers, T., The Man Who Kept the Secrets: Richard Helms and the CIA (Weidenfeld and Nicolson, 1979)
Ranelagh, J., The Agency: The Rise and Decline of the CIA (NY: Simon and Schuster, 1986)
Ratcliff, R.A., Delusions of Intelligence: Enigma, Ultra and the End of Secure Ciphers (NY: Cambridge UP, 2006)
Reefe, P.K., Chatter: Dispatches from the Secret World of Global Eavesdropping (NY: Random House, 2005)
Rees, J., Looking for Mr Nobody: The Secret Life of Goronwy Rees (Weidenfeld and Nicolson, 1994)
Richelson, J., A Century of Spies: Intelligence in the Twentieth Century (NY: Oxford UP, 1995)
—The US Intelligence Community (NY: Ballinger, 1989)
—The Wizards of Langley: Inside the CIA’s Directorate of Science and Technology (Boulder CO: Westview, 2001)
Richelson, J. and Ball, D., Ties that Bind: Intelligence Cooperation between the UKUSA Countries (Boston: Allen and Unwin, 1985)
Riste, O., The Norwegian Intelligence Service, 1945–70 (Frank Cass, 1999)
Ritter, S., Iraq Confidential: The Untold Story of America’s Intelligence Conspiracy (IB Tauris, 2005)
Schecter, J.L. and Deriabin, P.S., The Spy Who Saved the World (NY: Charles Scribner’s, 1992)
Schwartz, D.N., NATO’s Nuclear Dilemmas (Washington DC: Brookings, 1983)
Scott, L.V., Macmillan, Kennedy and the Cuban Missile Crisis: Political, Military and Intelligence Aspects (Macmillan, 1999)
Scott, L.V. and Twigge, S., Planning Armageddon: Britain, the United States and the Command and Control of Western Nuclear Forces, 1945–64 (Harwood, 2000)
Sebag-Montefiore, H., Enigma: The Battle for the Code (Weidenfeld and Nicolson, 2000)
Seldon, A., Blair Unbound (Simon and Schuster, 2008)
Short, A., The Communist Insurrection in Malaya, 1948–1960 (Muller, 1975)
Singh, S., The Code Book (4th Estate, 1999)
Siniver, A., Nixon, Kissinger and US Foreign Policy Making: The Machinery of Crisis (Cambridge: Cambridge UP, 2008)
Smith, B.F., The Ultra-Magic Deals and the Most Secret Special Relationship, 1940–1946 (Shrewsbury: Airlife Publishing, 1993)
—Sharing Secrets with Stalin: How the Allies Traded Intelligence, 1941–45 (Kansas: U. of Kansas Press, 1996)
Smith, M., New Cloak, Old Dagger: How Britain’s Spies Came in from the Cold (Victor Gollancz, 1996)
—Station X: The Code-Breakers of Bletchley Park (Channel 4 Books, 1998)
—The Emperor’s Codes: Bletchley Park and the Breaking of Japan’s Secret Ciphers (Bantam, 2000)
—The Spying Game: A Secret History of British Espionage (Politico’s, 2003)
—Killer Elite: The Inside Story of America’s Most Secret Special Operations Team (NY: St Martin’s Press, 2007)
Smith, M. and Erskine, R. (eds), Action This Day: Bletchley Park from the Breaking of the Enigma Code to the Birth of the Modern Computer (Bantam, 2001)
Sontag, S. and Drew, C., Blind Man’s Buff: The Untold Story of American Submarine Espionage (NY: Public Affairs, 1998)
Stacy, W.W., US Army Border Operations in Germany, 1945–1983 (Headquarters US Army, Europe and 7th Army, Military History Office, 1984)
Stafford, D., Spies Beneath Berlin (John Murray, 2nd edn, 2002)
Stares, P.B., Command Performance: The Neglected Dimension of European Security (Washington DC: The Brookings Institution, 1991)
Strehle, R., Verschlüsselt [Encrypted]: Der Fall Hans Bühler (Zurich: Werd Verlag, 1993)
Stromseth, J.E., The Origins of Flexible Response: NATO’s Debate over Strategy in the 1960s (NY: St Martin’s, 1987)
Svendsen, A., Intelligence Cooperation and the War on Terror: Anglo-American Security Relations after 9/11 (Routledge, 2009)
Tamnes, R., The United States and the Cold War in the High North (Aldershot: Dartmouth, 1991)
Tantin, K., Revolt in Paradise (Heinemann, 1960)
Thomas, R., Espionage and Secrecy: The Official Secrets Acts 1911–1989 of the United Kingdom (Routledge, 1991)
Thorne, C., Allies of a Kind (Hamish Hamilton, 1979)
Urban, M., UK Eyes Alpha: The Inside Story of British Intelligence (Faber and Faber, 1996)
Van der Art, D., Aerial Espionage: Secret Intelligence Flights by East and West (Shrewsbury: Airlife, 1986)
Van der Bijl, N., Nine Battles to Stanley (Leo Cooper, 1999)
—Confrontation: The War with Indonesia, 1962–1966 (Leo Cooper, 2006)
Vincent, J., The Culture of Secrecy: Britain 1832–1988 (Oxford: Oxford UP, 1998)
Weadon, P.D., The Sigsaly Story (Fort Meade: NSA Center for Cryptologic History, 2009)
Weinstein, A. and Vassiliev, A., The Haunted Wood: Soviet Espionage in America (NY: Random House, 1999)
West, N., A Matter of Trust: MI5, 1945–72 (Weidenfeld and Nicolson, 1982)
—GCHQ: The Secret Wireless War, 1900–86 (Weidenfeld and Nicolson, 1986)
—The Secret War for the Falklands (Little, Brow
n, 1997)
—Venona (HarperCollins, 1999)
Westlake, M., Kinnock: The Biography (Little, Brown, 2001)
Whaley, B., Codeword Barbarossa (Boston: MIT Press, 1973)
Wilkinson, N., Secrecy and the Media: The Official History of the UK’s D-Notice System (Routledge, 2009)
Winterbotham, F.W., The Ultra Secret (Weidenfeld and Nicolson, 1974)
Wylde, N. (ed.), The Story of Brixmis, 1946–1990 (Arundel: Brixmis Association, 1993)
Young, J and Kent, J., International Relations Since 1945 (Oxford: Oxford UP, 2004)
Young, J.W., The Labour Governments, 1964–1970: International Policy (Manchester: Manchester UP, 2003)
Ziegler, P., Wilson: The Authorised Life (Weidenfeld and Nicolson, 1993)
Zubok, V. and Pleshakov, C., Inside the Kremlin’s Cold War from Stalin to Khrushchev (Cambridge: Harvard UP, 1997)
Secondary Works: Articles and Papers
Aid, M., ‘Relations with Allies’, unpublished paper
—‘The Russian Target: The UK-US Cryptologic Effort Against the Soviet Union, 1945–1950’, Paper to the Annual Conference of the Society for Historians of American Foreign Relations, June 2003
—‘US Humint and Comint in the Korean War: From the Approach of War to the Chinese Intervention’, IØNS, 14/4 (1999): 17–63
—‘US Comint in the Korean War (Part II): From the Chinese Intervention to the Armistice’, IØNS, 15/1 (2000): 14–49
Aldrich, R.J., ‘Secret Intelligence for a Post War World’, in Aldrich, British Intelligence, Strategy and the Cold War: 15–49
—‘GCHQ and Sigint in the Early Cold War 1945–70’, IØNS, 16/1 (2001): 67–96
—‘British Intelligence, Security and Western Cooperation in Cold War Germany: The Ostpolitik Years’, in Beatrice de Graaf, Ben de Jong, Wies Platje (eds), Battlegound Western Europe: Intelligence Operations in Germany and the Netherlands in the Twentieth Century (Amsterdam: Uitgeverij Het Spinhuis, 2007)
—‘Whitehall and the Iraq War: The UK’s Four Intelligence Enquiries’, Irish Studies in International Affairs, 16/1 (2005): 73–88
—‘The US-UK Intelligence Alliance in 1975: Economies, Evaluations and Explanations’, IØNS 21/4 (2006): 557–67
Aldrich, R.J. and Coleman, M., ‘The Cold War, the JIC and British Signals Intelligence, 1948’, IØNS, 4/3 (1989): 535–49
Alvarez, D., ‘Behind Venona: American Signals Intelligence in the Early Cold War’, IØNS, 14/2 (1999): 179–86
Anderson, R. and Roe, M., ‘The GCHQ Protocol and its Problems’, Lecture Notes in Computer Science, Issue 1233 (1997): 134–48
Andrew, C.M., ‘Gordon Welchman, Sir Peter Marychurch and the “Birth of Ultra” ’, IØNS, 1/2 (1986): 277–81
—‘The Growth of Intelligence Collaboration in the English-Speaking World’, Wilson Center Working Paper, 83 (November 1987)
—‘Churchill and Intelligence’, IØNS, 3/3 (1988): 181–94
—‘The Growth of the Australian Intelligence Community and the Anglo-American Connection’, IØNS, 4/2 (1989): 213–57
—‘Intelligence Collaboration between Britain and the United States During The Second World War’, in Hitchcock, W.T. (ed.), The Intelligence Revolution: A Historical Perspective (Washington DC: US Air Force Academy, 1991): 111–23
—‘The Making of the Anglo-American SIGINT Alliance’, in Peake and Halperin, In the Name of Intelligence: 95–109
—‘The Venona Secret’, in Robertson, K. (ed.), War, Diplomacy and Intelligence (Macmillan, 2002): 203–25
—‘Intelligence and International Relations in the Early Cold War’, Review of International Studies, 24/3 (1998): 321–30
Andrew, C.M. and Aldrich, R.J. (eds), ‘Intelligence Services in the Second World War’, Contemporary British History, 13/4 (1999): 130–69
Andronov, A., ‘American Geosynchronous Sigint Satellites’, Zarubezhnoye Voyennoye Obozreniye, 12 (1993): 37–43
Anonymous, ‘Wyton’s Cold War Spyplanes/No.51 Squadron Canberras’, International Air Power Review (2001): 130–7
Anonymous, ‘RAF Nimrod R.1.’, AIR International, July 2001: 29–35
Ball, D., ‘Controlling Theatre Nuclear War’, British Journal of Political Science, 19/3 (1989): 303–27
Ball, D.J., ‘Allied Intelligence Cooperation Involving Australia During World War II’, Australian Outlook, 32 (1978): 299–309
—‘Over and Out: Signals Intelligence (Sigint) in Hong Kong’, IØNS, 11/3 (1996): 474–96
Barker, G., ‘The Mystery Boats’, Australian Financial Review, 28 November 2003: 16–18
Baylis, J., ‘British Nuclear Doctrine: The “Moscow Criterion” and the Polaris Improvement Programme’, Contemporary British History, 19/1 (2005): 53–65
Bonsall, A., ‘Bletchley Park and the RAF Y Service: Some Recollections’, IØNS, 23/6 (2008): 827–41
Brown, K., ‘Intelligence and the Decision to Collect it: Churchill’s Wartime American Diplomatic Signals Intelligence’, IØNS, 10/3 (1995): 449–67
—‘The Interplay of Information and Mind in Decision-Making: Signals Intelligence and Franklin D. Roosevelt’s Policy-shift on Indochina’, IØNS 13/1 (1998): 109–31
Brugioni, D.A., ‘The Effects of Aerial and Satellite Imagery on the 1973 New Yom Kippur War, Air Power History, Fall 2004: 1–14
Budiansky, S., ‘Bletchley Park and the Birth of the Special Relationship’, in M. Smith and R. Erskine (eds), Action This Day, pp.211–36
Cain, F., ‘An Aspect of Postwar Relations with the UK and the US: Missiles, Spies and Disharmony’, Australian Historical Studies, 23/92 (1989): 186–203
—‘Venona in Australia and its Long-term Ramifications’, Journal of Contemporary History, 35/2 (2000): 211–48
Calvert, R.J., ‘39 Steps’, Aircraft Illustrated, 29/5 (1996): 76–81
Campbell, D., ‘Official Secrecy and British Libertarianism’, Socialist Register, 1979
—‘Phone Tappers and the State’, New Statesman, 1981: 54–5
—‘The Parliamentary Bypass Operation’, New Statesman, 23 January 1987: 8–12
Clarke, W.F., ‘Post-War Organisation’, Cryptologia, 13/2 (1989): 118–22
Clement, B., ‘GCHQ and the Unions: The Fight is not Over’, New Statesman, 9/419 (1996): 23
Cole, R.D., ‘GCHQ: A Doughnut on the Landscape’, Eye Spy, 1 (2001): 91–2
Constance, J., ‘How Jim Bamford Probed the NSA’, Cryptologia, 21/1 (1977): 71–4
Corby, S., ‘The GCHQ Union Ban, 1984–1997: The Unions’ Strategy and the Outcome’, Labour History Review, 65/3 (Winter 2000): 317–32
Cranston, A., ‘US Signals Intelligence to New Zealand Blocked’, Jane’s Defence Weekly 3 (16 February 1985): 243
Creevy, M., ‘A Critical Review of the Wilson Government’s Handling of the D-Notice Affair in 1967’, IØNS, 14/3 (1999): 209–27
Croft, J., ‘Reminiscences of GCHQ and GCB, 1942–5’, IØNS, 13/4 (1998): 133–43
Davies, P.J., ‘Organizational Politics and the Development of British Intelligence Producer/Consumer Interfaces’, IØNS, 10/4 (1995): 113–32
Denham, H., ‘Bedford-Bletchley-Kilindi-Colombo’, in Hinsley and Stripp (eds), Code-Breakers, 265–81
Denniston, A.G., ‘The Government Code and Cypher School Between the Wars’, IØNS, 1/1 (1986): 48–70
Donini, L., ‘The Cryptographic Services of the Royal (British) and Italian Navies: A Comparative Analysis of Their Activities in World War II’, Cryptologia, 14/3 (1990): 97–127
Drewry, G., ‘The GCHQ Case: A Failure of Government Communications’, Parliamentary Affairs, 38 (1985): 371–86
Easter, D., ‘GCHQ and British External Policy in the 1960s’, IØNS, 23/5 (2008): 681–706
Edwards, G., ‘Europe and the Falklands Crisis’, Journal of Common Market Studies, 22/4 (1984): 295–313
Erskine, R., ‘Anglo-US Cryptological Cooperation’, paper to the Fifth Annual Meeting of the International Intelligence History Study Group, Tutzing, Bavaria, June
1999
—‘When a Purple Machine Went Missing: How Japan nearly Discovered America’s Greatest Secret’, IØNS, 12/3 (1997): 185–9
—‘The Holden Agreement on Naval Sigint: The First BRUSA?’, IØNS, 14/2 (Summer 1999): 187–97
—‘The Admiralty and Cipher Machines During the Second World War: Not so Stupid After All’, Journal of Intelligence History, 2/2 (Winter 2002): 49–68
—‘Churchill and the Start of the Ultra-Magic Deals’, IJICI, 10/1 (1997): 57–74
Erskine, R. and Freeman, P., ‘Brigadier John Tiltman: One of Britain’s Finest Cryptologists’, Cryptologia, 27/4 (2003): 289–318
Ferris, J., ‘From Broadway House to Bletchley Park: The Diary of Captain Malcolm Kennedy, 1934–46’, IØNS, 4/3 (1989): 421–51
—‘Coming in from the Cold: The Historiography of American Intelligence, 1945–1990’, DH, 10/1 (1995): 87–116
Forster, A., ‘No Entry: Britain and the EEC in the 1960s?’, Contemporary British History, 12/3 (1998): 139–46
Gaddis, J.L., ‘Intelligence, Espionage and Cold War Origins’, Diplomatic History, 13/2 (1989): 191–213
Gandy, Oscar H. Jr, ‘Data Mining, Surveillance, and Discrimination in the Post-9/11 Environment’, in K. Haggerty and R. Ericson (eds), The New Politics of Surveillance and Visibility (Toronto: University of Toronto Press, 2006): 363–84
Garthoff, R.L., ‘Estimating Soviet Military Force: Some Light From the Past’, International Security, 14/4 (1990): 93–116
Gill, P., ‘‘Allo, ‘AIlo, ‘AIlo, Who’s in Charge Here Then?’, Liverpool Law Review, 9/2 (1987): 189–201
Goodman, M., ‘The Dog that Didn’t Bark: The Joint Intelligence Committee and the Warning of Aggression’, Cold War History, 7/4 (2007): 38–42
—‘The Tentacles of Failure: British Intelligence, Whitehall and the Buster Crabb Affair’, International Historical Review, 30/4 (2008): 768–84
Graham, K., ‘Giving the Information Message Traction: Embedding Knowledge Sharing at GCHQ’, Network, 2 (Autumn 2006): 25–30
Grey, C. and Sturdy, A., ‘The 1942 Reorganization of the Government Code and Cypher School’, Cryptologia, 32/4 (2008): 311–33.
—‘A Chaos that Worked: Organizing Bletchley Park’, Public Policy and Administration, 25/1 (2010): 47–68