Book description
The history of various aspects of the development of the U.S. Navy's communications intelligence structure and processes in the years leading up to the attack on Pearl Harbor.
Table of contents
- Foreword
-
1. Pearl Harbor Revisited: United States Navy Communications Intelligence 1924–1941
- 1.1. INTRODUCTION
- 1.2. EARLIEST EFFORTS
- 1.3. ROLE OF ONI
- 1.4. EARLY WAR PLANS
- 1.5. JAPANESE FLEET CAPABILITIES AND INTENTIONS
- 1.6. CRYPTOLOGIC CHALLENGE: NAVY-ARMY COOPERATION
- 1.7. BUREAUCRACY PREVAILS
- 1.8. STATUS QUO IN THE PACIFIC
- 1.9. A NEW ATTEMPT AT COOPERATION
- 1.10. JAPANESE CRYPTOGRAPHY
- 1.11. RECOVERING THE "BLUE BOOK"
- 1.12. INTRODUCING JN-25
- 1.13. TURNING VICTORY INTO DEFEAT
- 1.14. INTRODUCING "PURPLE"
- 1.15. DISARMAMENT: PAYING THE PRICE
- 1.16. CONFUSING DIPLOMACY
- 1.17. STRUGGLING FOR RESOURCES
- 1.18. PLANNING FOR WAR
- 1.19. WAR GAMES
- 1.20. PACIFIC BUILDUP
- 1.21. NATIONAL EMERGENCY
- 1.22. CIRCUMSTANCES FAVOR DIPLOMATIC TARGETS
- 1.23. INFORMATION GAPS
- 1.24. COOPERATION WITH ALLIES
- 1.25. THE MOVE TO HAWAII
- 1.26. SUPPORT TO THE PACIFIC FLEET
- 1.27. JAPANESE INTENTIONS REVEALED
- 1.28. SUPPORT TO ASIATIC FLEET
- 1.29. JAPANESE STRATEGY
- 1.30. JAPANESE NAVY
- 1.31. DIPLOMATIC MESSAGES
- 1.32. WARNING MESSAGES
- 1.33. REACTION
- 1.34. COMINT AFTER THE OPENING ATTACK
- 1.35. CONCLUSION
- A. Naval Messages Intercepted between 5 September and 4 December 1941
- B. Summary of Diplomatic Messages July – November 1941
- C. Highlights from COM-14 Daily COMINT Summary
- Notes
- Abbreviations Used in Text and Appendixes
- Notes on Sources
- Bibliography
- About the author
Product information
- Title: Pearl Harbor Revisited: United States Navy Communications Intelligence, 1924-1941
- Author(s):
- Release date: October 2013
- Publisher(s): Center for Cryptologic History, NSA
- ISBN: 01120100012SI
You might also like
article
Reinventing the Organization for GenAI and LLMs
Previous technology breakthroughs did not upend organizational structure, but generative AI and LLMs will. We now …
book
IBM Private, Public, and Hybrid Cloud Storage Solutions
This IBM® Redpaper™ publication takes you on a journey that surveys cloud computing to answer several …
book
We Have Root
A collection of popular essays from security guru Bruce Schneier In his latest collection of essays, …
book
A Dictionary of British and Irish History
An authoritative and extensive resource for British and Irish history Quickly access basic information on the …