Pearl Harbor: The Seeds and Fruits of Infamy - Ludwig von Mises ...
Pearl Harbor: The Seeds and Fruits of Infamy - Ludwig von Mises ... Pearl Harbor: The Seeds and Fruits of Infamy - Ludwig von Mises ...
129 6. Modus Vivendi—Yes? No! Intelligence Information about an enemy is “intelligence.” Intelligence is one of the most valuable weapons in the arsenal of a belligerent. Most intelligence comes in bits and pieces—one fact here, another there, often seemingly unrelated. In the hands of an intelligent and capable agent, these bits and pieces may often be linked and made intelligible, yielding valuable information, “intelligence.” Th us coordination, analysis, and interpretation are extremely important. Th e more intelligence a nation can gain about its enemies—their forces, weapons, and plans—the more prepared it can be to forestall or oppose an attack. And the greater advantage it will have in any encounter. To gain information about their enemies, to observe and to eavesdrop, warring powers employ every available technique— spies, telescopes, balloons, radio intercepts, electronic devices, satellite photography, cryptography, and so on. Th ey seek to intercept secret communications. Th ey work to expose invisible inks, and to decipher codes and ciphers, often extremely intricate and complex ones that frequently are revised and altered. Espionage and counterespionage are important to both sides in any confl ict.
130 Pearl Harbor: The Seeds and Fruits of Infamy As we have seen, the United States had an advantage over the Japanese during the 1921–1922 Washington Naval Conference on disarmament because it was reading the Japanese government’s secret instructions to its representative. But the U.S. government closed down its cryptographic agency in 1929, although the Navy continued to maintain an intelligence offi ce, OP-20-G, which operated after 1916 under Commander Laurence F. Saff ord. And in 1930 the Army established its Signal Intelligence Service (SIS), headed by William Friedman. By 1940, these two agencies were deeply involved once more in analyzing and deciphering Japanese codes. At that time, the Japanese had many codes of varying complexities. Each was intended for a diff erent purpose. Th e most intricate were their diplomatic, consular, and naval codes. When the Japanese were especially anxious to assure the security of a message, they usually transmitted it in one of these codes. Th ey considered their diplomatic code to be their most complex and most indecipherable; they thought it was absolutely secure and used it for their very most secret messages. Japan’s Diplomatic Code Th e intelligence experts in the Army’s SIS and the Navy’s Op-20-G cooperated in the attempt to break the various Japanese codes. Although the Japanese navy code long defi ed U.S. cryptographers, they made considerable headway in breaking several others, including the consular code. Th eir most spectacular success, however, was with Japan’s diplomatic cipher. After some 18 or 20 months of painstaking eff ort, the Army and Navy experts fi nally succeeded in breaking this code. Th ey even constructed a machine that could duplicate the operations of the Japanese machine, including replicating the daily shuffl ing and transpositional changes by which the Japanese hoped
- Page 101 and 102: 78 Pearl Harbor: The Seeds and Frui
- Page 103 and 104: 80 Pearl Harbor: The Seeds and Frui
- Page 105 and 106: 82 Pearl Harbor: The Seeds and Frui
- Page 107 and 108: 84 Pearl Harbor: The Seeds and Frui
- Page 109 and 110: 86 Pearl Harbor: The Seeds and Frui
- Page 111 and 112: 88 Pearl Harbor: The Seeds and Frui
- Page 113 and 114: 90 Pearl Harbor: The Seeds and Frui
- Page 115 and 116: 92 Pearl Harbor: The Seeds and Frui
- Page 117 and 118: 94 Pearl Harbor: The Seeds and Frui
- Page 119 and 120: 96 Pearl Harbor: The Seeds and Frui
- Page 121 and 122: 98 Pearl Harbor: The Seeds and Frui
- Page 123 and 124: 100 Pearl Harbor: The Seeds and Fru
- Page 125 and 126: 102 Pearl Harbor: The Seeds and Fru
- Page 127 and 128: 104 Pearl Harbor: The Seeds and Fru
- Page 129 and 130: 106 Pearl Harbor: The Seeds and Fru
- Page 131 and 132: 108 Pearl Harbor: The Seeds and Fru
- Page 133 and 134: 110 Pearl Harbor: The Seeds and Fru
- Page 135 and 136: 112 Pearl Harbor: The Seeds and Fru
- Page 137 and 138: 114 Pearl Harbor: The Seeds and Fru
- Page 139 and 140: 116 Pearl Harbor: The Seeds and Fru
- Page 141 and 142: 118 Pearl Harbor: The Seeds and Fru
- Page 143 and 144: 120 Pearl Harbor: The Seeds and Fru
- Page 145 and 146: 122 Pearl Harbor: The Seeds and Fru
- Page 147 and 148: 124 Pearl Harbor: The Seeds and Fru
- Page 149 and 150: 126 Pearl Harbor: The Seeds and Fru
- Page 154 and 155: Modus Vivendi—Yes? No! 131 to thw
- Page 156 and 157: Modus Vivendi—Yes? No! 133 So thr
- Page 158 and 159: Modus Vivendi—Yes? No! 135 4. U.S
- Page 160 and 161: Modus Vivendi—Yes? No! 137 have s
- Page 162 and 163: Modus Vivendi—Yes? No! 139 were i
- Page 164 and 165: Modus Vivendi—Yes? No! 141 of est
- Page 166 and 167: Modus Vivendi—Yes? No! 143 for th
- Page 168 and 169: Modus Vivendi—Yes? No! 145 their
- Page 170 and 171: Modus Vivendi—Yes? No! 147 Japane
- Page 172 and 173: Modus Vivendi—Yes? No! 149 given.
- Page 174 and 175: Modus Vivendi—Yes? No! 151 by Chi
- Page 176 and 177: Modus Vivendi—Yes? No! 153 After
- Page 178 and 179: Modus Vivendi—Yes? No! 155 way of
- Page 180 and 181: Modus Vivendi—Yes? No! 157 c. We
- Page 182 and 183: Modus Vivendi—Yes? No! 159 Japane
- Page 184 and 185: 7. Japanese Action Appears Imminent
- Page 186 and 187: Japanese Action Appears Imminent 16
- Page 188 and 189: Japanese Action Appears Imminent 16
- Page 190 and 191: Japanese Action Appears Imminent 16
- Page 192 and 193: Japanese Action Appears Imminent 16
- Page 194 and 195: Japanese Action Appears Imminent 17
- Page 196 and 197: Japanese Action Appears Imminent 17
- Page 198 and 199: Japanese Action Appears Imminent 17
- Page 200 and 201: Japanese Action Appears Imminent 17
130 <strong>Pearl</strong> <strong>Harbor</strong>: <strong>The</strong> <strong>Seeds</strong> <strong>and</strong> <strong>Fruits</strong> <strong>of</strong> <strong>Infamy</strong><br />
As we have seen, the United States had an advantage over the<br />
Japanese during the 1921–1922 Washington Naval Conference<br />
on disarmament because it was reading the Japanese government’s<br />
secret instructions to its representative. But the U.S. government<br />
closed down its cryptographic agency in 1929, although the Navy<br />
continued to maintain an intelligence <strong>of</strong>fi ce, OP-20-G, which<br />
operated after 1916 under Comm<strong>and</strong>er Laurence F. Saff ord.<br />
And in 1930 the Army established its Signal Intelligence Service<br />
(SIS), headed by William Friedman. By 1940, these two agencies<br />
were deeply involved once more in analyzing <strong>and</strong> deciphering<br />
Japanese codes.<br />
At that time, the Japanese had many codes <strong>of</strong> varying complexities.<br />
Each was intended for a diff erent purpose. Th e most<br />
intricate were their diplomatic, consular, <strong>and</strong> naval codes. When<br />
the Japanese were especially anxious to assure the security <strong>of</strong> a<br />
message, they usually transmitted it in one <strong>of</strong> these codes. Th ey<br />
considered their diplomatic code to be their most complex <strong>and</strong><br />
most indecipherable; they thought it was absolutely secure <strong>and</strong><br />
used it for their very most secret messages.<br />
Japan’s Diplomatic Code<br />
Th e intelligence experts in the Army’s SIS <strong>and</strong> the Navy’s<br />
Op-20-G cooperated in the attempt to break the various Japanese<br />
codes. Although the Japanese navy code long defi ed U.S. cryptographers,<br />
they made considerable headway in breaking several<br />
others, including the consular code. Th eir most spectacular success,<br />
however, was with Japan’s diplomatic cipher.<br />
After some 18 or 20 months <strong>of</strong> painstaking eff ort, the Army<br />
<strong>and</strong> Navy experts fi nally succeeded in breaking this code. Th ey<br />
even constructed a machine that could duplicate the operations<br />
<strong>of</strong> the Japanese machine, including replicating the daily shuffl<br />
ing <strong>and</strong> transpositional changes by which the Japanese hoped