23.12.2012 Views

Piercing the Fog - Air Force Historical Studies Office

Piercing the Fog - Air Force Historical Studies Office

Piercing the Fog - Air Force Historical Studies Office

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Building an <strong>Air</strong> Intelligence Organization<br />

American airmen before <strong>the</strong>ir entry into <strong>the</strong> war, and those like aerial photore-<br />

connaissance, whose operational applications had received little attention before<br />

<strong>the</strong> war. New uses for standard peacetime procedures found application in<br />

technical analysis of downed enemy aircraft or captured equipment.<br />

Pearl Harbor and Implications for <strong>Air</strong> Intelligence<br />

Perhaps no single event in American history has been <strong>the</strong> subject of as much<br />

analysis and hindsight judgment than has <strong>the</strong> Japanese attack on Pearl Harbor.<br />

The apparent failure to interpret <strong>the</strong> content of Japanese diplomatic messages<br />

(MAGIC) seems to make Pearl Harbor a classic case of <strong>the</strong> failure of intelligence.<br />

But to focus exclusively on MAGIC is to ignore o<strong>the</strong>r factors equal to, if<br />

not more important than, <strong>the</strong> events that led to December 7th. For at its core,<br />

Pearl Harbor was not a failure of intelligence so much as it was a failure of<br />

command. The circumstances surrounding <strong>the</strong> surprise attack on American<br />

forces at Hawaii and <strong>the</strong> Philippines offer an almost endless detailing of how<br />

not to prepare for war. In implications for air intelligence, and for planning and<br />

operations, <strong>the</strong>se insights can be considered within two broad categories:<br />

organization (including <strong>the</strong> structure of intelligence agencies and <strong>the</strong> collection<br />

and dissemination of intelligence) and evaluation.<br />

Nei<strong>the</strong>r <strong>the</strong> War nor <strong>the</strong> Navy Department was organized to take advantage<br />

of <strong>the</strong> information MAGIC and o<strong>the</strong>r sources provided. By tradition and practice,<br />

intelligence was a junior, and neglected, branch of <strong>the</strong> services. Nei<strong>the</strong>r service<br />

had a central organization for evaluating such intelligence as was available.<br />

Within <strong>the</strong> WDGS, <strong>the</strong> chief of <strong>the</strong> MID, Brig. Gen. (<strong>the</strong>n Col.) Hayes A.<br />

Kroner, admitted that development of a central evaluation capability was still<br />

in “<strong>the</strong> planning stage” in 1941 .’ Any coordination that did occur was at best<br />

informal. Although a Joint Intelligence Board had been created in <strong>the</strong> fall, it had<br />

met only once by December 7, and that was late in November. The lack of a<br />

central analysis capability meant that no group had <strong>the</strong> responsibility or <strong>the</strong> time<br />

to reflect on bits of intelligence nor to ponder <strong>the</strong> possible links among<br />

seemingly disparate fragments of information. Consequently, <strong>the</strong> several critical<br />

and potentially decisive signals that flowed into infant intelligence analysis<br />

channels were subjected only to fragmented, often isolated, review.<br />

The most obvious instance of this fragmentation was <strong>the</strong> excessive control<br />

imposed on access to intercepted high-level Japanese message traffic. Rightly<br />

concerned with <strong>the</strong> consequences of losing this unique look into Japanese<br />

decision making, senior American military leaders imposed rigid controls not<br />

only on <strong>the</strong> source, but on <strong>the</strong> information itself. This well-intentioned restraint<br />

was achieved at <strong>the</strong> expense of exploiting what that information might offer. A<br />

number of people in key positions did not have access to this essential<br />

113

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!