![]() |
![]() |
||
![]() |
Quote:
Point. Counterpoint. Point. Counterpoint. Repeat as necessary. |
![]() |
|||
|
Quote:
|
![]() |
|
![]() |
Excuse me, I did not i was wrong. I just do not want to keep repeating the same arguments. US knew the japanese codes, how much time before the attack? We do not know. Did they have to react? You say FDR did not. I say that the attack was the perfect excuse to join the war. Without that attack, do you think US citizens would have supported a war in europe just 20 years after WWI?
|
![]() |
||
![]() |
Quote:
I believe you mean REASON. It really is too bad we entered the war, Hitler and Hirohito were awful nice guys, it's a real shame that we stopped them before they could paint the world in polka dots and feed all the starving children in Africa milk and cookies. And I am also unclear on what exactly makes the attack on Pearl the driving force behind our involvement in Europe, shouldn't FDR have waited until the Germans attacked Long Island? All jokes aside, the fact that the Japanese were planning and executing an attack on U.S. territory against United States citizens and servicemen would have led us to war with them regardless of the degree of its success. If the message HAD been decoded in time and we HAD had time to react, do you believe that our fighters would have met the Japanese over the Pacific, waved at each other, and called it a day? By that point, Japan had committed to war with the United States, whether or not the attack was a success, diplomatic relations had ceased the second the Imperial Navy turned their ships towards Hawaii, and sacrificing our fighting men would accomplish absolutely nothing. Point. |
![]() |
||
![]() |
Quote:
You need to understand the difference between Encrypt/ Decrypt vs Code Breaking and analysis. As before Encryption is designed mathematically to scramble and disguise the words within the message decrypting will give hard text. The text will contain operational data, but no one sends it with out code. For example if I want you to jump off at Phase line Green to attack hill 533 I may send. "Initiate Plan Tiger." When I send this and its intercepted then Analyists try to discern exactly what where or who Plan Tiger is. Code within encryption. The IJN/IJA used this extensively. The best example of this is the Battle of Midway. The US forces were tracking two IJN battle groups. One headed towards the Aleutian Chain and One heading towards the vicinity of Midway Island. The tactical commanders realiazed one was most probably a feint to draw out forces from the real objective. The Purple Section noticed that IJN messages kept refering to AF. Cmdr Joe Rosenthal OIC determined that AF was possibly Midway Island and convinced Admiral Nimitz to allow a Message to be sent in the clear from Midway concerning the Fresh Water Condenser being broke. The IJN intercepted and a Message was sent intercepted and decrypted that AF's (Midway island) was low on fresh water. This happened over a couple months. |
![]() |