23.12.2012 Views

Piercing the Fog - Air Force Historical Studies Office

Piercing the Fog - Air Force Historical Studies Office

Piercing the Fog - Air Force Historical Studies Office

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Planning <strong>the</strong> Defeat of Japan<br />

forces’ radio practices to detect possible faulty American tendencies that could<br />

provide information to <strong>the</strong> enemy. Such overseas units, scattered across Europe,<br />

<strong>the</strong> Mediterranean, CBI, and <strong>the</strong> Pacific, formed <strong>the</strong> basis of an AAF tactical Y-<br />

Service. O<strong>the</strong>r squadrons, like <strong>the</strong> 6th, assigned to Fourth <strong>Air</strong> <strong>Force</strong> at Hamilton<br />

Field, and stationed in <strong>the</strong> hills above Daly City, California, immediately south<br />

of San Francisco, worked on a more strategic level. This squadron intercepted<br />

Japanese and o<strong>the</strong>r countries’ transmissions and forwarded <strong>the</strong>m to Arlington<br />

Hall Station in Virginia for decryption and analy~is.’~<br />

On a more extensive plane, <strong>the</strong> A-2 increasingly drew radio intelligence<br />

from MIS in Washington after <strong>the</strong> spring of 1943, when <strong>the</strong> Allies began to<br />

have more success with Japanese Army cryptology. Most of <strong>the</strong> decrypted<br />

message information, except for that read by <strong>the</strong> A-2 himself (who became an<br />

ULTRA recipient), was in finished form, i.e., it came to <strong>the</strong> <strong>Air</strong> Staff as reports<br />

or assessments of German or Japanese capabilities and intentions. Within <strong>the</strong><br />

A-2 office by war’s end was a small department, <strong>the</strong> Special Sources Section,<br />

Collection Branch, that received and handled MAGIC diplomatic decrypts but<br />

not <strong>the</strong> more general, operationally related ULTRA. Access to <strong>the</strong> MAGIC<br />

material was tightly controlled. Although <strong>the</strong> Collection Branch’s chief and <strong>the</strong><br />

executive officer knew of <strong>the</strong> material’s existence, nei<strong>the</strong>r had authorization to<br />

see it. The most important for <strong>the</strong> A-2 staff was, of course, ULTRA related to <strong>the</strong><br />

Japanese air war, as that part of <strong>the</strong> conflict was A-2’s main task. Despite <strong>the</strong><br />

increased use of <strong>the</strong> ULTRA source, <strong>the</strong> AAF’s intelligence analysts remained<br />

frustrated throughout <strong>the</strong> final two years of <strong>the</strong> conflict, both because of <strong>the</strong><br />

method by which MIS conveyed Japanese ULTRA to <strong>the</strong>m, and because of <strong>the</strong><br />

secrecy and restrictions imposed on its use.<br />

MAGIC decrypts, rewritten for use by <strong>the</strong> A-2, tended to cover specific<br />

topics extracted from regular diplomatic radio traffic, whereas <strong>the</strong> rest of <strong>the</strong><br />

ULTRA resembled that being taken by <strong>the</strong> British from German messages.<br />

Because ULTRA was too fragmentary in its decrypted form, G-2 could not<br />

prepare analyses or reports from a particular message or even groups of<br />

messages. The best intelligence from Japanese Army ULTRA was very often<br />

derived from <strong>the</strong> long process of decrypting, collating, analyzing, and refining,<br />

very much like that which <strong>the</strong> MIS’s Anglo-American counterpart carried on at<br />

BP. Final information, e.g., <strong>the</strong> OB summaries, thus reached A-2 without<br />

notation of source, and without explanation of <strong>the</strong> reasons for restrictions on its<br />

use and dissemination. Fueling <strong>the</strong>ir grumbling was not knowing <strong>the</strong> reasons for<br />

<strong>the</strong> reports’ formats and <strong>the</strong> constraints on freedom to use <strong>the</strong> data as <strong>the</strong> A-2<br />

staff saw fit. The worst part, of course, was that <strong>the</strong> normal air intelligence<br />

officers could not be let in on <strong>the</strong> secret, even by <strong>the</strong> A-2 himself, who knew<br />

<strong>the</strong> source?6 The A-2 analysts, not knowing <strong>the</strong> origin, could not trust <strong>the</strong><br />

product.<br />

Still, secrecy and source protection alone did not explain entirely <strong>the</strong><br />

dissatisfaction, for Hodges and Quesada, <strong>the</strong>mselves ULTRA readers, made<br />

363

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!