TITLE

THE INTELLIGENCE FAILURE OF PEARL HARBOR

AUTHOR(S)
Kahn, David
PUB. DATE
December 1991
SOURCE
Foreign Affairs;Winter91/92, Vol. 70 Issue 5, p138
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article focuses on the U.S. communications intelligence prior to World War II. Tension with Japan had begun when the United States seized the Philippines in 1898. Within the Imperial Japanese Navy a vocal faction saw the westward march of the United States as squeezing and poisoning Japan. Friction intensified at the Washington disarmament conference of 1922, when the United States forced Japan to accept a lower warship ratio than it would have liked. This American diplomatic victory was achieved with the help of the charismatic cryptanalyst Herbert O. Yardley and his assistants, whose solution of coded Japanese diplomatic messages told American negotiators just how far they could push the Japanese. During the 1930s, the navy attacked and often solved other Japanese naval codes--for administration, merchant ships, logistics, intelligence--and several cipher machines. When codebreaking failed, traffic analysis provided much information. Traffic analysis infers an organization's structure and operation from message routing, message volume, call signs and operators' chatter.
ACCESSION #
9112230009

 

Related Articles

  • Yamamoto: The Man Who Planned Pearl Harbor (Book). Boyle, John // Library Journal;2/1/1990, Vol. 115 Issue 2, p90 

    Reviews the book "Yamamoto: The Man Who Planned Pearl Harbor," by Edwin P. Hoyt.

  • Military History.  // Baltic Defence Review;Jun2003, Vol. 10 Issue 2, p1 

    Focuses on Baltic military history. Focus on Estonia's use of its intelligence gathering capability in the inter-war period; Description of the Estonian radio-intelligence which was a novel strand of intelligence activities during the inter-war period.

  • Estonian Interwar Radio-Intelligence.  // Baltic Defence Review;Jun2003, Vol. 10 Issue 2, p123 

    Focuses on the history of Estonian interwar radio-intelligence. Functions of the Estonian pre-war military intelligence service, the Second Department of the General Staff and its intelligence branch, Section D; Partnership between the Second Department and German military intelligence service...

  • Famous last military words: 'It seemed like a good idea at the time.' Guttman, Jon // Military History;Nov2005, Vol. 22 Issue 8, p6 

    Cites events in the history of the military where military intelligence was not properly employed. Consequences of wishful or assumptive thinking in the military; Implications of wishful thinking on the U.S. invasion of Iraq in 2003; Factors to consider before embarking on a military operation.

  • What Intelligence Agencies Do. Rabiger, Joanna // Government Intelligence Agencies;2003, p9 

    Discusses the key duties and responsibilities of the intelligence agencies of countries. Safeguarding of national security; Prevention of the spread of illegal arms and nuclear weaponry; Combating global drug trafficking. INSET: RESPONSIBILITIES.

  • Untitled. Thomas, Charles W. // Military Intelligence Professional Bulletin;Apr-Jun95, Vol. 21 Issue 2, p2 

    Explains that army intelligence is a vital element of the total intelligence system. Focus of army intelligence; Importance of utilizing emerging technologies to advance army intelligence; Discussion on the elements that make total intelligence system.

  • Intelligence for the Coalition: The Story of Support to Coalition Task Force-Kuwait. Moore, William R.; Boll, Jr., Kenneth H. // Military Intelligence Professional Bulletin;Jan-Mar99, Vol. 25 Issue 1, p4 

    Discusses the organization of the Coalition Task Force-Kuwait (CTF-K) intelligence operations support units as part of the Operation Desert Thunder in February 1998. Functions of CTF-K C/J2 section; Role of the Task Force Counterintelligence Coordinating Authority; Functions of the Joint...

  • CI and HUMINT in Multinational Operations: The Lessons of Vigilant Blade 97. Pick, Michael W.; Rentner, Kevin S.; Dukat, Robert J. // Military Intelligence Professional Bulletin;Jan-Mar99, Vol. 25 Issue 1, p16 

    Discusses the lessons from Vigilant Blade 1997, the exercise on counterintelligence (CI) and human intelligence (HUMINT) by the United States, Australia and Great Britain. Definition of CI and HUMINT; Problems of coordination; Information on the participants in the exercise; Training objectives.

  • Collection Focus Development in Peacekeeping Operations. Faulkner, Timothy L. // Military Intelligence Professional Bulletin;Jan-Mar99, Vol. 25 Issue 1, p23 

    Discusses the purpose of collection focus development, a military intelligence concept. Elements of a scheme of maneuver to prevent violence and protect the force collecting the information; Process of collection in a peacekeeping operation.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics