Pearl Harbor: The Seeds and Fruits of Infamy - Ludwig von Mises ...

Pearl Harbor: The Seeds and Fruits of Infamy - Ludwig von Mises ... Pearl Harbor: The Seeds and Fruits of Infamy - Ludwig von Mises ...

01.01.2013 Views

129 6. Modus Vivendi—Yes? No! Intelligence Information about an enemy is “intelligence.” Intelligence is one of the most valuable weapons in the arsenal of a belligerent. Most intelligence comes in bits and pieces—one fact here, another there, often seemingly unrelated. In the hands of an intelligent and capable agent, these bits and pieces may often be linked and made intelligible, yielding valuable information, “intelligence.” Th us coordination, analysis, and interpretation are extremely important. Th e more intelligence a nation can gain about its enemies—their forces, weapons, and plans—the more prepared it can be to forestall or oppose an attack. And the greater advantage it will have in any encounter. To gain information about their enemies, to observe and to eavesdrop, warring powers employ every available technique— spies, telescopes, balloons, radio intercepts, electronic devices, satellite photography, cryptography, and so on. Th ey seek to intercept secret communications. Th ey work to expose invisible inks, and to decipher codes and ciphers, often extremely intricate and complex ones that frequently are revised and altered. Espionage and counterespionage are important to both sides in any confl ict.

130 Pearl Harbor: The Seeds and Fruits of Infamy As we have seen, the United States had an advantage over the Japanese during the 1921–1922 Washington Naval Conference on disarmament because it was reading the Japanese government’s secret instructions to its representative. But the U.S. government closed down its cryptographic agency in 1929, although the Navy continued to maintain an intelligence offi ce, OP-20-G, which operated after 1916 under Commander Laurence F. Saff ord. And in 1930 the Army established its Signal Intelligence Service (SIS), headed by William Friedman. By 1940, these two agencies were deeply involved once more in analyzing and deciphering Japanese codes. At that time, the Japanese had many codes of varying complexities. Each was intended for a diff erent purpose. Th e most intricate were their diplomatic, consular, and naval codes. When the Japanese were especially anxious to assure the security of a message, they usually transmitted it in one of these codes. Th ey considered their diplomatic code to be their most complex and most indecipherable; they thought it was absolutely secure and used it for their very most secret messages. Japan’s Diplomatic Code Th e intelligence experts in the Army’s SIS and the Navy’s Op-20-G cooperated in the attempt to break the various Japanese codes. Although the Japanese navy code long defi ed U.S. cryptographers, they made considerable headway in breaking several others, including the consular code. Th eir most spectacular success, however, was with Japan’s diplomatic cipher. After some 18 or 20 months of painstaking eff ort, the Army and Navy experts fi nally succeeded in breaking this code. Th ey even constructed a machine that could duplicate the operations of the Japanese machine, including replicating the daily shuffl ing and transpositional changes by which the Japanese hoped

130 <strong>Pearl</strong> <strong>Harbor</strong>: <strong>The</strong> <strong>Seeds</strong> <strong>and</strong> <strong>Fruits</strong> <strong>of</strong> <strong>Infamy</strong><br />

As we have seen, the United States had an advantage over the<br />

Japanese during the 1921–1922 Washington Naval Conference<br />

on disarmament because it was reading the Japanese government’s<br />

secret instructions to its representative. But the U.S. government<br />

closed down its cryptographic agency in 1929, although the Navy<br />

continued to maintain an intelligence <strong>of</strong>fi ce, OP-20-G, which<br />

operated after 1916 under Comm<strong>and</strong>er Laurence F. Saff ord.<br />

And in 1930 the Army established its Signal Intelligence Service<br />

(SIS), headed by William Friedman. By 1940, these two agencies<br />

were deeply involved once more in analyzing <strong>and</strong> deciphering<br />

Japanese codes.<br />

At that time, the Japanese had many codes <strong>of</strong> varying complexities.<br />

Each was intended for a diff erent purpose. Th e most<br />

intricate were their diplomatic, consular, <strong>and</strong> naval codes. When<br />

the Japanese were especially anxious to assure the security <strong>of</strong> a<br />

message, they usually transmitted it in one <strong>of</strong> these codes. Th ey<br />

considered their diplomatic code to be their most complex <strong>and</strong><br />

most indecipherable; they thought it was absolutely secure <strong>and</strong><br />

used it for their very most secret messages.<br />

Japan’s Diplomatic Code<br />

Th e intelligence experts in the Army’s SIS <strong>and</strong> the Navy’s<br />

Op-20-G cooperated in the attempt to break the various Japanese<br />

codes. Although the Japanese navy code long defi ed U.S. cryptographers,<br />

they made considerable headway in breaking several<br />

others, including the consular code. Th eir most spectacular success,<br />

however, was with Japan’s diplomatic cipher.<br />

After some 18 or 20 months <strong>of</strong> painstaking eff ort, the Army<br />

<strong>and</strong> Navy experts fi nally succeeded in breaking this code. Th ey<br />

even constructed a machine that could duplicate the operations<br />

<strong>of</strong> the Japanese machine, including replicating the daily shuffl<br />

ing <strong>and</strong> transpositional changes by which the Japanese hoped

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!