Feeds

A future queen, the spy chief behind the Iraq 'dodgy dossier' – and a war base rendezvous

.-- .... .- - / -.. .. -.. / -.- .- - . / -- .. -.. -.. .-.. . - --- -. / ... . . ..--..

The Power of One Brief: Top reasons to choose HP BladeSystem

Kate Middleton, the Duchess of Cambridge, has been shown around the historic home of Britain's World War II codebreaking efforts by a former MI6 chief who was instrumental in Britain's decision to invade Iraq in 2003.

She visited Bletchley Park today to be greeted by the chairman of Bletchley Park Trust Sir John Scarlett, formerly the boss of the British Secret Intelligence Service under Tony Blair's government and a key author of the infamous “dodgy dossier” – Iraq's Weapons of Mass Destruction: The Assessment of the British Government [PDF].

The future Queen of England may have pondered questioning Sir John about the dreadful slaughter taking place today in Iraq by militants, which some politicians reckon is a consequence of the US and UK's ill-fated invasion of the country.

Instead she was shown how to decode a message in Morse code, which she managed to do with aplomb. After all, these sort of basic skills run in the family. Kate's grandmother Valerie Glassborow worked in Bletchley along with Lady Marion Body, who was on hand today to meet the duchess.

Sir John said: “The work at Bletchley Park made an immense contribution to the victory of Great Britain and our Allies in World War Two.

"It was a great honour to welcome The Duchess of Cambridge and to show her where her grandmother worked, especially now that Hut 6, along with other fragile buildings, has been restored to create a permanent and fitting tribute to the thousands of men and women whose work helped to shorten the war.”

As far as we know, Kate did not visit The National Museum of Computing, which is locked into a life-and-death struggle with the Bletchley Park Trust. Home to the famous Colossus machine, the museum has been sidelined by the trust, the latter of which has put up fences to keep visitors from visiting its estranged sister establishment. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
NSA man: 'Tell me about your Turkish connections'
Spooks ask Dabbsy to suggest a nice hotel with pool
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
Yahoo! Japan! launches! service! for! the! dead!
If you're reading this email, I am no longer alive
Plucky Rockall podule man back on (proper) dry land
Bold, barmy Brit adventurer Nick Hancock escapes North Atlantic islet
Russia sends SEX-CRAZED GECKOS to SPAAAAACE!
In space... no one can hear you're green...
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.