Login to your account

Username *
Password *
Remember Me

Create an account

Fields marked with an asterisk (*) are required.
Name *
Username *
Password *
Verify password *
Email *
Verify email *
Captcha *
Reload Captcha

UK Spy Agency Decrypts Old Secrets With New Exhibition

Written by  Jul 09, 2019

Historic gadgets used by British spies will be revealed for the first time later this week, as one of the country's intelligence agencies steps out the shadows to mark its centenary -- and to educate people about the risks of cyber-attacks.

The Government Communications Headquarters (GCHQ) will hold an unprecedented exhibition at London's Science Museum, taking visitors through 100 years of secret conversations and eavesdropping.

It was the codebreakers of GCHQ at Bletchley Park who helped break the Germans' Enigma code during World War II -- as portrayed in the Oscar-winning 2014 film The Imitation Game, starring Benedict Cumberbatch.

A prototype of the Enigma cipher machine used by the Germans will be on display. But the standout exhibit at this new exhibition is the 5-UCO machine developed in 1943 to send decrypted German messages to officers in the field.

"It was one of the first electronic and fully unbreakable cipher machines and was considered so secret that it was long thought to have been destroyed to conceal the very fact of its existence," GCHQ chief Jeremy Fleming told journalists on Tuesday.

"It turns out we kept one and it's here for everyone to see."

The spy chief said his agency had given unique access to the famous museum in an attempt to tackle the rising threat of cyber crime.

"It is no longer enough for us to serve in secret... openness is our strength," he said.

"We are aiming to put tailored advice in the hands of every citizen," he added.

A laptop infected with the infamous "WannaCry" virus highlights how ordinary citizens can unwittingly act as a gateway for cyber-attacks against major institutions.

This was the virus that brought the computer system of Britain's National Health Service to its knees in 2017.

Folder Lock - Data Security & Encryption [Download]
£12.79amazon uk

- Cold War intrigue -

The exhibition begins with a probe of the radio technology used by the nascent GCHQ to calculate the position of German airships attacking Britain in World War I.

It features clothes from crewmen who perished when one was shot down in southern England. It then showcases infamous encoding devices, such as the Enigma machine, and the ingenious methods that the team at Bletchley Park -- the wartime home of Britain's top code-breakers -- used to crack the code. A recreation of a humble suburban home near London tells the extraordinary Cold War tale of a Canadian couple who were sending top-secret military information to Moscow on a radio transmitter hidden under their kitchen floor.

And it tackles more recent issues from the digital age, including the revelations by US whistleblower Edward Snowden about the controversial techniques used by GCHQ to intercept communications. On display is a laptop used by Guardian journalists working on the story -- which intelligence chiefs ordered them to smash up.

"They were happy for us to tell that story," curator Liz Bruton told AFP. "It would be a very odd exhibition not to include that."

They had consulted with academics and civil libertarians about how to approach the issue of security and privacy, she added. Visitors will be introduced to the capabilities of quantum computing in creating more secure communications -- but also the risks it carries in cracking current systems. And the hot-button issue of social media is explored through an art installation that churns out real-time Tweets including certain emotive phrases.

"It highlights the amount of data we put out into the world and who has access to that, who owns it," said Bruton.

The final piece reveals the limits to GCHQ's moves towards transparency, displaying dust from pulverized machines used by the agency. "There are stories we couldn't tell," explained Bruton.

"Top Secret: From Ciphers to Cyber Security" opens to the public on Wednesday and runs until February 2020.

Is it worth a visit? please let us know.

Did you find this article useful? Comment below or follow us on
Facebook, Twitter or LinkedIn.

Sam Collins

Sam is the most experienced member of the team having worked for 19 years in the tech industry and now tech journalism. He is full of passion for all things tech and this comes across in his work.


We would like to invite IT Security Professionals from the UK to join our other contributors in providing high quality articles for our website.

To enhance IT Security Centres credentials and to offer an opportunity for other IT Professionals and IT Companies to share their work, information and ideas.

We are always happy to hear from other IT Security Professionals and look forward to your incite. please contact us for more information.

Popular News

Jun 13, 2020 IT Security News

Microsoft announces major issue in Windows 10 June 2020 updates

On 9th June, 2020, Microsoft released cumulative updates for supported versions of Windows 10 including version 2004, ve...

Jun 12, 2020 Cyber Security

NHS email service fooled users in phishing attack

NHS Digital is contacting users of its NHSmail email system after a small number of mailboxes were compromised in a gene...

Jun 09, 2020 Cyber Threats

Common types of cyber-attacks and how to avoid them

With cyber-attacks on the rise, businesses are constantly worried about losing vital data and the threat is very real. ...

Jun 12, 2020 IT Security News

100,000 cheap wireless cameras sold in the UK are vulnerable to hacking

Consumer advocacy organisation Which? has issued a warning over the security of wireless camera brands made by China-bas...

Jun 09, 2020 IT Security News

Self-employed targeted by hackers with HMRC SMS phishing scam

Cyber criminals have launched a new phishing scam designed to steal personal and financial details of millions of self-e...

Jun 25, 2020 IT Security News

NCSC catch a million phish

The National Cyber Security Centre has received the millionth submission to its Suspicious Email Reporting Service. ...

Jun 08, 2020 Cyber Security

Ransomware attack compensation: What the UK public think

UK consumers believes businesses should stand their ground having suffered a ransomware attack and refuse to negotiate w...

Jun 11, 2020 IT Security News

UK government still can’t decide how NHS contact tracing app should work

A new report today says that the UK government still hasn’t decided exactly how its NHS contact tracing app should wor...

Jun 06, 2020 Cyber Security

Phishing attacks on companies using PBX systems increases dramatically

While video conferencing solutions have become the prime targets for hackers recently following the shift to remote work...

Jun 10, 2020 IT Security News

Is your boss spying on you whilst you are homeworking?

The recent worldwide move to working from home has caused concern amongst employers.

Jun 12, 2020 Cyber Security

Cybersecurity in the shortsighted gig economy

The ‘gig’ economy encompasses the increasing economic trend for professionals to take on a series of temporary work ...

Jun 27, 2020 IT Security News

Apple devices to get encrypted DNS

Apple this year will boldly go where its peers have gone before by implementing support for encrypted DNS in iOS and mac...

Jun 16, 2020 Internet of Things

Ripple20 Bug Exposes Millions of IoT Devices

Exactly how many of the devices that include Ripple20 bugs are directly hackable via the internet remains far from clear...

Jul 23, 2020 Cyber Security

Many cyber attacks on UK sports industry says report

At large percentage of sporting institutions, organisations and teams in the UK have suffered a security incident in the...

Jun 08, 2020 Data Security

IBM data encryption is progressing

IBM is making a move forward with its homomorphic encryption (FHE) solution, providing encryption for in-use and shared ...

Jun 11, 2020 Cyber Security

UK government to fund nine cyber security projects

The government is to invest £10m through March 2024 from various sources to fund nine academic cyber security projects ...

Symantec Home 120x60