Free Republic
Browse · Search
VetsCoR
Topics · Post Article

Skip to comments.

The FReeper Foxhole Remembers Intelligence Failure at Pearl Harbor? (1929-1941) - Dec 16th, 2004
World War II Magazine. | May 2001 | David Kahn

Posted on 12/15/2004 10:41:21 PM PST by SAMWolf



Lord,

Keep our Troops forever in Your care

Give them victory over the enemy...

Grant them a safe and swift return...

Bless those who mourn the lost.
.

FReepers from the Foxhole join in prayer
for all those serving their country at this time.


.................................................................. .................... ...........................................

U.S. Military History, Current Events and Veterans Issues

Where Duty, Honor and Country
are acknowledged, affirmed and commemorated.

Our Mission:

The FReeper Foxhole is dedicated to Veterans of our Nation's military forces and to others who are affected in their relationships with Veterans.

In the FReeper Foxhole, Veterans or their family members should feel free to address their specific circumstances or whatever issues concern them in an atmosphere of peace, understanding, brotherhood and support.

The FReeper Foxhole hopes to share with it's readers an open forum where we can learn about and discuss military history, military news and other topics of concern or interest to our readers be they Veteran's, Current Duty or anyone interested in what we have to offer.

If the Foxhole makes someone appreciate, even a little, what others have sacrificed for us, then it has accomplished one of it's missions.

We hope the Foxhole in some small way helps us to remember and honor those who came before us.

To read previous Foxhole threads or
to add the Foxhole to your sidebar,
click on the books below.

Why Weren't We Warned?


The contention that broken Japanese codes could have alerted the United States won't go away. But is there a simpler explanation than a failure of intelligence?

More than 60 years later, Americans still wonder how Japan's surprise attack on the Pacific Fleet could have succeeded. The joint congressional committee that investigated the attack in 1945 and 1946 put the question sharply: "Why with some of the finest intelligence available in our history, with the almost certain knowledge that war was at hand, with plans that contemplated the precise type of attack that was executed by Japan on the morning of December 7--Why was it possible for a Pearl Harbor to occur?"


Admiral Husband Kimmel - Commander in Chief, U.S. Pacific Fleet,


The best intelligence came from breaking Japanese codes. Solving the secret messages of a hostile power is like putting a mirror behind the cards a player is holding, like eavesdropping on the huddles of a football team. It is nearly always the best form of intelligence. It is faster and more trustworthy than spies, who have to write up and transmit their reports and who are always suspected of setting up or falling for a deception. It sees farther into the future than aerial reconnaissance, which detects only what is present. It is broader in scope than the interrogations of prisoners, who know little more than what they have experienced. And it is usually cheaper and less obtrusive, hence more secret, than all of these. But it has a serious double-barreled failing: It cannot provide information that a nation has not put onto the airwaves, and its apparent omniscience and its immediacy seduce its recipients into thinking they are getting all the other nation's secrets.

This is one of the lessons of Pearl Harbor. American code-breakers performed prodigies, giving remarkable insight into Japanese thinking. But that insight was not total, and so even the extraordinary U.S. cryptanalysis could not warn policymakers of Japan's secret intentions.

The nations of the world learned the value of code-breaking during World War I. Radio--used extensively in that conflict for the first time--gave them their opportunity. Messages were easily intercepted, so armies and navies sheathed them in codes and ciphers. But linguists and mathematicians on both sides learned to crack them, and the information thereby obtained provided victory after victory to generals, admirals and political leaders. Cryptanalysis substantially helped France to block the supreme German offensive in 1918, Germany to defeat Russia, Britain to bring the United States into the war, the United States to convict a German spy. When hostilities ended, the powers refounded these agencies to retain in peace the benefits won in war.


Lt. Gen. Walter C. Short - Commander of US Army defenses in Hawaii


The United States was one of these nations, and its main target was Japan. Before World War I, Japan had defeated China and then Russia to become mistress of the western Pacific. Now it was building a fleet to match that of the United States and, under a League of Nations mandate, had occupied islands that enabled it to menace the ocean routes to the Philippines. It was generally felt that Japan constituted the greatest danger to the United States.

The State and War departments jointly set up the Cipher Bureau in 1919 under the inspiring leadership of Herbert O. Yardley, a 30-year-old who had created and run a code-breaking unit for military intelligence in World War I. The Cipher Bureau scored the first great achievement of American code-breaking while working out of a narrow brownstone at 141 East 37th Street in Manhattan. Despite only a rudimentary knowledge of Japanese, Yardley and his associates cracked Japanese diplomatic codes. A bewhiskered missionary then turned the messages into English. Sent to the State Department, the translated messages informed American negotiators at the Washington naval disarmament conference of 1921-22 about Japan's fallback position on capital ships. Armed with this knowledge, the negotiators pushed Japan to promise to build such ships in a U.S.­Japan tonnage ratio not of 10-to-7, as Japan had wanted, but to 10-to-6--the equivalent of three fewer battleships.

Although the Navy was more concerned about Japan than was any other element of government, it had no code-breaking unit. Then, early in 1923, naval intelligence came upon a 1918 Japanese naval code book while rifling the steamer trunk of a Japanese naval officer visiting New York. This impelled the Navy to create a code-breaking agency--called, for security reasons, the Research Desk--within the Division of Naval Communications. Its first head was Laurance F. Safford, a lieutenant with a flair for mechanics and mathematics. He set up shop with four civilians in Room 1621 of the Main Navy Department, a temporary wooden building on Constitution Avenue near the Lincoln Memorial. One of the first things he did was to establish radio intercept stations in the Pacific, to furnish more material for code-breaking than was obtainable through haphazard monitoring by ships and the naval radio station in Shaghai.


Herbert O. Yardley


In August Safford took one of his most important strides forward when he hired 32-year-old Agnes Meyer Driscoll as a cryptanalyst. A onetime mathematics teacher and former employee of the Code and Signal Section, under which the Research Desk came, she soon proved to be an outstanding code-breaker. Among her first assignments was to work on the photographed code from the rifled steamer trunk. The Research Desk had found that not only was the "plaintext," or the original message, encoded; its code groups themselves were enciphered. "Miss Aggie," as Driscoll was called, had to remove that encipherment. Incessantly turning the pages of the reproduced code book with the rubber tip of her eraser, she completed that job after two or three years of work. A husband-and-wife team of translators turned the Japanese into English. By then, in 1926, Safford had returned to sea. He was succeeded by Lieutenant Joseph J. Rochefort, one of the first American naval officers to have studied Japanese in Japan. He was a "mustang"--a former enlisted man who had earned a commission. This had made him tough and independent in a world dominated by Annapolis graduates; he neutralized his caustic speech with a conciliatory smile. Rochefort became one of the very few Americans with aptitude both in the Japanese language and in code-breaking.

A subordinate, who most likely helped to crack Japanese subsidiary code, remembered: "Hours went by without any of us saying a word, just sitting in front of piles of indexed sheets on which a mumbo jumbo of figures or letters was displayed in chaotic disorder....[We] gave ourselves to cryptography with the same ascetic devotion with which young men enter a monastery."



The hardest part of breaking a code is the beginning. Rochefort explained it in colorful terms: "It first off involved what I call the staring process. You look at all of these messages that you have, you line them up in various ways, you write them one below the other, and you'd write them in various forms and you'd stare at them. Pretty soon you'd notice a pattern; you'd notice a definite pattern between these messages. This was the first clue....You notice a pattern that when you follow through, you say this means so-and-so; you'd run that through, and it doesn't work out. Then you'd proceed on some other effort and eventually, if you're lucky and the other fellow makes mistakes, which he invariably will, then you come up with a solution that will stand up under test, and this gives your first lead-in."

Rochefort said he felt good while doing this work "because you have defied these people who have attempted to use a system they thought was secure, that is, it was unreadable. It was always somewhat of a pleasure to defeat them or challenge them." But the work took its toll. While engaged in the actual cryptanalysis, he said, he generally felt frustrated. The tension was so great that after work he had to lie down for two or three hours before he could eat anything; he developed ulcers anyway, and this, together with the fact that duty in communications intelligence hurt a man's career, drove him to get out of the work when his tour at the Research Desk ended in 1927.


Agnes Meyer Driscoll


The translation of the photographed Code No. 1 originally had been put together in ten "volumes" with metal-strip Acco office binders. When Safford returned from sea duty to the Research Desk in June 1929, he had the material retyped in four copies on huge 12-by-18-inch forms and bound in two volumes in red buckram McBee binders, far more convenient to use. This gave the code its more common name, the Red Code.

On December 1, 1930, the Japanese replaced it with a new code. But Driscoll by then had learned the ships, communications patterns, and frequently used phrases of the Japanese fleet, and she solved its transposition encipherment and then reconstructed the entire 85,000-group, two-part code. It was later called, from the color of its binding, the Blue Code. Her work was a remarkable feat of cryptanalysis, and for years it gave the U.S. Navy insight into Japanese forces and tactics.



TOPICS: VetsCoR
KEYWORDS: cipherbureau; codebreaking; cryptology; freeperfoxhole; japan; josephjrochefort; magic; pearlharbor; purple; sis; veterans; wwii
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-8081-94 next last
Two events in 1929 led the army to expand its own code-breaking activities. In May, after giving the new secretary of state a little time to understand the realities of the job, Yardley passed him some solved messages. Henry L. Stimson was shocked at what he regarded as a dishonorable and counter-productive activity--"Gentlemen do not read each other's mail," he said later, maintaining that "the way to make men trustworthy is to trust them." He withdrew State Department support from the Cipher Bureau. In the meantime, the Army decided that Yardley was not doing what it needed most: training cryptanalysts for immediate use in case of war. These events doomed the unit, which was dissolved on October 31, 1929--two days after the great stock market crash. Its papers went to the Army's Signal Corps.


Henry L. Stimson


This body had set up a small cryptologic group of its own in 1921, hiring a 29-year-old who was on his way to becoming the world's greatest cryptologist. William F. Friedman--natty, uptight, brilliant--had written some theoretical treatises of landmark importance and had solved German codes in France during World War I. His new job was nominally to improve the Army's own codes and ciphers, but doing this properly required him to test cryptographic systems offered to it. This gave him experience in cryptanalysis and expanded the Army's knowledge of it. With the closing of Yardley's agency, it was logical for the Signal Corps to add code-breaking to its responsibilities, and Friedman became the head of a new Signal Intelligence Service (SIS). He hired three young men who knew languages and mathematics to serve as junior cryptanalysts. The first to report was 21-year-old Frank B. Rowlett, a former teacher from Virginia with an all-American look to him. At 8 a.m. on April 1, 1930, Rowlett found himself entering Room 3406 of the Munitions Building--next door to the main Navy Department building, which housed the navy code-breakers--on Constitution Avenue near the Lincoln Memorial.

Two months later, Rowlett and his colleagues were excitedly combing through the secret files of Yardley's defunct organization. This most clandestine and most valuable form of intelligence thrilled them. They went on to study basic cryptography and the solution of machine ciphers, clearly the wave of the future. In 1932, their training completed at last, they attacked Japanese diplomatic cryptographic systems, working on messages provided by the Army's new intercept service.

They first cracked a simple code, the LA. That code did little more than replace the syllables of the plaintext with pairs of code letters listed in a code book. In fact, the system resembled simple cryptograms found in Sunday newspapers. First the Japanese words of the message were transliterated into romanized letters (so that Western telegraphic systems could be used in sending them). This was done by using the katakana (literally, "borrowed words"), a syllabary that expresses Japanese words phonetically. The words were then encoded by looking up each syllable.


William F. Friedman


When the cryptanalysts discovered that LA encrypted only insignificant messages, such as expense or vacation reports, and when they had gained more knowledge of Japanese diplomatic language and communications practices, they then focused on more important messages. These were protected by electromechanical machines that enciphered messages at one end and deciphered them at the other. The machines produced more complicated ciphers because they constantly changed the enciphered letters as the cipher clerk typed the message. Only a counterpart machine, properly set and advancing at the same pace as the sender's, could decipher the message. That system served two main Japanese diplomatic communication networks--one covering the Far East, the other linking Tokyo with major world capitals.

As difficult as machine systems are, however, study of the cryptograms did yield clues. Vowels, for instance, had a relatively higher frequency than consonants. It appeared that the machine divided the romanized alphabet (used in the katakana transliteration) into two subsets, the six vowels and the twenty consonants. Working with one of the less garbled intercepts, and perhaps with some help from the Navy's solution of another Japanese cipher machine, Rowlett and Solomon Kullback, one of the other original junior cryptanalysts, struck gold one day: Among their tentative recoveries of plaintext were three letters followed by an unknown and then another letter: oyobi. They knew then that they had cracked the system, because oyobi is romanized Japanese for "and." They named this machine system Red (not related to the Red Code).

By 1937, for the first time in American history, solutions of foreign messages began going to the White House, probably to President Franklin D. Roosevelt. Gentlemen were once again reading someone else's mail. It revealed, for instance, advance information about Italy's possible adherence to the German-Japanese Anti-Comintern Pact. This was in March 1937, six months before American diplomats began reporting on it. Later it provided part of the text of the treaty.


Frank B. Rowlett


The next year, messages began to appear suggesting that a new machine would supplement and probably eventually replace the older one, which was wearing out. On February 20, 1939, three messages in the new system were intercepted, and over the next three months messages in Red gradually disappeared. Japan's major diplomatic messages had become unreadable. Faced with the loss of the nation's paramount intelligence source the SIS mounted a concentrated attack to solve the new machine. Friedman put Rowlett in charge and exercised overall supervision himself. The Americans called the new machine Purple, perhaps in part because its deeper hue fit its deeper mystery.

These half-dozen cryptanalysts were providing the United States with its best secret intelligence on Japan as relations with that nation, which was persisting in its aggression against China, deteriorated. The cryptanalysts plunged into their work in Rooms 3416 and 3418 in the Munitions Building. Room 3418, about 25 feet square with a steel door secured by a combination lock and with barred windows, was known as the vault. As additional cryptanalysts were assigned to the Purple problem, the group moved into larger quarters, finally occupying about eight rooms.


Lieutenant Joseph J. Rochefort


Rowlett worked in Room 3416. His desk was usually neat, for he spread out his worksheets on a nearby table. He was extremely focused on the work, arriving at 7 a.m., an hour early, and leaving at 5 p.m., an hour late. He never hummed or chewed his pencil or muttered to himself; he looked out the window only when something distracted him; he never drank coffee at work, though he did puff on a pipe. His mind did not dwell on the cryptanalytic problems during the 15-minute drive to work from Arlington County, but each morning he would exchange ideas with the other cryptanalysts--Robert O. Ferner, Albert W. Small, Genevieve Grotjan and Mary Jo Dunning, assisted by Leo Rosen, Sam Snyder, Kenneth D. Miller, Glenn S. Landig and Cyrus C. Sturis, Jr.--whose names deserve to be remembered. After the conference, they all would return to their desks. Quiet reigned as they pored over the intercepts, most of which had been teletyped in from the monitoring stations; sometimes they puzzled over statistical and alphabetical tables compiled from the intercepts. Only the rustling of papers and the scratching of pencils disturbed the silence, although for a time the banging and hammering of workmen on another floor proved frustrating.

Reconstructing a cipher system is like solving an immensely complicated scientific problem, with this difference: Nature does not deliberately conceal her secrets. The researchers concoct hypotheses and test them. If x stands for e, will the other cipher-to-plain equivalents that it entails make sense? Or will they merely yield gibberish, or lead to a self-contradiction? Can one recovered alphabet be linked with another? There is no clear way to the answer, as there is in the algebra problems posed in math classes. Particularly in the early stages of a difficult cryptanalysis, the work is one of the most excruciating, agonizing, tantalizing, compelling mental processes known to humans--and, when successful, one of the most satisfying.


Genevieve Grotjan


Purple had carried over from Red the division of letters into groups of six and 20 letters. But by now the six were not exclusively vowels. Nevertheless, within a few weeks the cryptanalysts ascertained how they were enciphered. This enabled the team to recover the plaintext for those letters. The process was slow and painstaking. Assigned to devise a way to mechanize this pencil-and-paper method, Rosen hit upon the idea of using telephone selector switches, employed in dialing. They worked like a dream, and the solution process was considerably speeded up.

Despite Rosen's remarkable advance, the totality of Purple still resisted the Americans. Friedman, who had been supervising the work rather loosely, was asked by his bosses--all extremely supportive, financially as well as psychologically--to participate personally. His genius helped considerably. The Navy also lent a hand temporarily, organizing its files the same way as the Army's to facilitate cooperation. After about four months, however, the Navy returned to its main effort, Japanese naval codes. The SIS pushed ahead. Within Rowlett's group, teamwork was extremely close; determination was pervasive. No one complained that a task was too menial. Rowlett was confident from the start that they would reconstruct the Purple mechanism the way he and others had reconstructed the Red Code. He never got depressed, even though months went by without a solution. As they sought a breakthrough, the cryptanalysts spent much of their time trying to match possible plaintext--guesses, often educated, as to the cipher-text, or encoded language and numbers. Early in the effort, for example, many identical Japanese telegrams were sent to multiple addresses; some of the telegrams were composed using the Red machine, some the Purple. The cryptanalysts could read Red, which then gave them the text of the same Purple messages. They knew, too, that many diplomatic dispatches began "I have the honor to inform Your Excellency that..." and they often tried that as the start of the plaintext. In a very few cases, the State Department gave them the text of notes to or from the Japanese ambassadors, which the code-breakers used as cribs.


Purple Machine


The code-breakers had to make all sorts of guesses. They theorized that the Purple machine would have to advance in some regular fashion, that its mechanism would have to click forward at some prescribed rate. Suppose, for example, that the probable plaintext word Japan was guessed. If the probable a's were represented in the cipher-text by, say, x and z, then the cryptographers could hypothesize that the encoding machine had simply moved forward one space with each new letter: x for a, something for p, and z for the next a.
1 posted on 12/15/2004 10:41:22 PM PST by SAMWolf
[ Post Reply | Private Reply | View Replies]

Comment #2 Removed by Moderator

To: All
Some people have conjectured that this fabulous decoded information made it clear to Roosevelt and his advisers that Pearl Harbor was going to attacked. They say the president, wanting to bring the United States into the war on the side of Great Britain, traitorously suppressed this information and sacrificed American ships and American lives to achieve his goal. Various theories have been put forth to support this notion.



Safford himself, by then a captain, agreed. He based his argument upon the so-called winds code. Japan had notified its diplomatic posts in a J19-K10 circular telegram on November 19 that if diplomatic relations and international communications were likely to be cut off, it would warn these posts with a fake weather forecast in the middle of the Japanese shortwave news broadcast. If Japanese-American relations were in danger, the forecast would predict "east wind rain." American code-breakers solved this message on November 28. Immediately, a frantic effort was made to pick up this broadcast. Safford insisted that the "winds execute"--the forecast--was heard on December 4 and that the intercept was subsequently removed from the files as part of a coverup. Virtually no one has supported this contention. But even assuming that an execute message had been transmitted, it would at best confirm that relations were strained. In no way could it point to Pearl Harbor.

Rear Admiral Edwin T. Layton has argued that the lack of a Purple machine in Hawaii prevented Admiral Husband Kimmel and General Walter Short, the commanders there, from using Magic-provided information on international affairs to illuminate their situation. This would have enabled them to predict the attack, Layton has claimed. But this is speculation, supported only by hindsight. Moreover, the presence of a Purple machine in the Philippines did not prevent the American forces from being surprised.

Author John Toland found several former radio operators who had been listening in San Francisco or at sea. They said that in the week before December 7, they had heard a cacophony of radio signals from northwest of Hawaii--presumably the strike force heading for Pearl Harbor. They said they reported this, to no effect. But this story founders because, according to the Japanese, the strike force maintained absolute radio silence throughout its voyage. And American naval intercept units, straining to pick up whatever they could on the Japanese naval circuits, heard nothing. U.S. radio-intelligence operators knew that several carriers had dropped out of the traffic picture. They thought that the ships were in home waters, covering a movement to the south--the Philippines or the oil- and rubber-rich Dutch East Indies. Carrier communications had likewise vanished in February and July 1941, and naval radio-intelligence operators hypothesized then that the carriers had been held near Japan--a hypothesis later determined to be factual. But what happened then was not what was happening in December.



Several writers have suggested that the solution of the many messages dealing with ship movements in and out of Pearl Harbor should have alerted the authorities to the impending attack. But similar messages were transmitted about the Philippines, the Panama Canal, San Francisco, San Diego and Seattle. In fact, from August 1 to December 6, 59 such intercepts dealt with the Philippines and only 20 with Hawaii. The writers have pointed to one intercept, instructing the consulate in Hawaii to divide the Pearl Harbor anchorage into smaller areas for more precise reporting of ship locations, as a clear indication of a forthcoming attack. That is hindsight. At the time, the authorities viewed it merely as evidence of the thoroughness of Japanese intelligence or of the need to abbreviate communications.

James Rusbridger, in his book Betrayal at Pearl Harbor, claims that the British code-breaking unit at Singapore solved enough of JN25 to reveal the plan to attack Pearl Harbor and that this information was passed on to Prime Minister Winston Churchill, who withheld it from Roosevelt to ensure American entry into the war, thereby enabling the attack to succeed. Citing the Official Secrets Act, British authorities have denied Rusbridger any access to the records of the unit, and the U.S. Navy reports that it cannot find any of these JN25b solutions, partial or complete, from before December 7. His thesis rests on the memory of an Australian code-breaker working in Singapore. That is a slender reed upon which to base so heavy a charge. Moreover, Rusbridger does not distinguish between the a and b editions of JN25--and does not make clear why Churchill would try to get the Americans to fight Japan instead of Germany.

A retired communications intelligence analyst, Fred Parker, has dredged through the files of Japanese messages intercepted before Pearl Harbor but not solved until afterward. Though he has found no smoking gun, no message referring specifically to an attack on Pearl Harbor, he believes that the messages he has found point clearly to an impending attack there. He cites, for example, the presence of an oiler on what became the strike force's homeward route and the broadcast of the message "Climb Mount Niitaka 1208." The oiler obviously was put there, he says, to refuel the returning ships. The 1208 in the message meant December 8, the attack date on the Tokyo side of the international date line. Mount Niitaka (Hsin-kao in Taiwan) was the highest peak in what was then the Japanese empire. Parker contends that a solution of these messages would have suggested an attack on Pearl Harbor. Like the other theories, however, this is hindsight.



Some historians have contended that if only the Army and Navy intelligence officers, and perhaps State Department officials as well, had found the time to analyze all the intercepts as a group, they would have discerned a pattern that pointed to Pearl Harbor. This argument resembles one that Roberta Wohlstetter made in her book Pearl Harbor: Warning and Decision, in which she holds that the noise of the false evidence drowned out the indications of the true signals: "We failed to anticipate Pearl Harbor not for want of the relevant materials, but because of a plethora of irrelevant ones." This is wrong. There were no true signals, no clear indications of the attack.

The fact is that code-breaking intelligence did not prevent and could not have prevented Pearl Harbor, because Japan never sent any message to anybody saying anything like "We shall attack Pearl Harbor." The ambassadors in Washington were never told of the plan. Nor were any other Japanese diplomats or consular officials. The ships of the strike force were never radioed any message mentioning Pearl Harbor. It was therefore impossible for the cryptanalysts to have discovered the plan.

What, then, is the answer to the joint congressional committee's question? What about that "finest intelligence"? The simple answer is that, fine though it was, it was not fine enough. Perhaps if the United States had established intercept operators in the U.S. Embassy in Tokyo to obtain enough messages to make a solution of JN25b more likely, or had been able to buy a spy in the top circles of the Japanese government, or had been able somehow to fly aerial reconnaissance regularly above the island empire--then perhaps there might have been a chance that the Pearl Harbor attack would be detected in advance. None of these things could have been easily done. Even if they had, discovery of the plan would not have been certain. Japan had successfully closed all openings through which foreigners might gain information about its intentions. The real reason for the success of the Pearl Harbor attack lies in the island empire's hermetic security. Despite the American code-breakers, Japan kept her secret. For Americans, the Rising Sun rose in eclipse.


3 posted on 12/15/2004 10:42:40 PM PST by SAMWolf (I played poker with tarot cards; got a flush and five people died.)
[ Post Reply | Private Reply | To 2 | View Replies]

To: All


Here are the recommended holiday mailing dates for military mail this year:


For military mail addressed TO APO and FPO addresses, the mailing dates are:

------

For military mail FROM APO and FPO addresses, the mailing dates are:

Thanks for the information StayAtHomeMother



Veterans for Constitution Restoration is a non-profit, non-partisan educational and grassroots activist organization. The primary area of concern to all VetsCoR members is that our national and local educational systems fall short in teaching students and all American citizens the history and underlying principles on which our Constitutional republic-based system of self-government was founded. VetsCoR members are also very concerned that the Federal government long ago over-stepped its limited authority as clearly specified in the United States Constitution, as well as the Founding Fathers' supporting letters, essays, and other public documents.





Actively seeking volunteers to provide this valuable service to Veterans and their families.


UPDATED THROUGH APRIL 2004




The FReeper Foxhole. America's History. America's Soul

Click on Hagar for
"The FReeper Foxhole Compiled List of Daily Threads"

4 posted on 12/15/2004 10:43:15 PM PST by SAMWolf (I played poker with tarot cards; got a flush and five people died.)
[ Post Reply | Private Reply | To 3 | View Replies]

To: SZonian; soldierette; shield; A Jovial Cad; Diva Betsy Ross; Americanwolf; CarolinaScout; ...



"FALL IN" to the FReeper Foxhole!



Good Thursday Morning Everyone.


If you want to be added to our ping list, let us know.

If you'd like to drop us a note you can write to:

The Foxhole
19093 S. Beavercreek Rd. #188
Oregon City, OR 97045

5 posted on 12/15/2004 10:46:15 PM PST by snippy_about_it (Fall in --> The FReeper Foxhole. America's History. America's Soul.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: SAMWolf; snippy_about_it; bentfeather; Darksheare; Light Speed; PhilDragoo; Matthew Paul
Hello everyone!

To all our military men and women past and present, military family members, and to our allies who stand beside us
Thank You!


6 posted on 12/15/2004 10:48:04 PM PST by radu (May God watch over our troops and keep them safe)
[ Post Reply | Private Reply | To 2 | View Replies]

To: SAMWolf

Good evidence exists on the interception of the "Winds" message by the US Navy, and the destruction of evidence after the Pearl Harbor attack.

No good evidence exists that intercepts indicated that Pearl Harbor was the target beforehand.

Very excellent evidence exists that intercept intelligence from early November showed the Japanese would make war on the United States in the first two weeks of December. The Friday before the Sunday, December 7, there was a decrypt that was officially read as a Japanese attack on elements of the US Navy within the next few days.

All from memory. The Eric Nave book is the best non-technical one.


7 posted on 12/16/2004 1:35:12 AM PST by Iris7 (.....to protect the Constitution from all enemies, both foreign and domestic. Same bunch, anyway.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: snippy_about_it
Good morning Snippy.


8 posted on 12/16/2004 1:53:47 AM PST by Aeronaut (May all the feckless become fecked.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: snippy_about_it

Good morning, Snippy and everyone at the Foxhole.


9 posted on 12/16/2004 3:03:21 AM PST by E.G.C.
[ Post Reply | Private Reply | To 5 | View Replies]

To: snippy_about_it; SAMWolf; All

December 16, 2004

The Gift Of Family

Read: Exodus 20:1-20

Honor your father and your mother. —Exodus 20:12

Bible In One Year: Amos 4-6; Revelation 7


Through her books and lectures, Edith Schaeffer has become much appreciated for her insights into the value of life's ordinary days. When she and her husband Francis were first married, both sets of parents lived nearby. The newlyweds divided each Sunday afternoon and evening be-tween the Schaeffers and the Sevilles.

After a few years, Edith and Francis moved to Switzerland, where they could talk with their parents only once a year in a brief phone conversation.

Looking back half a century later, Edith wrote of being glad for the way they had used those Sunday afternoons. She noted that "proximity of loved ones is not an endless situation." She concluded that a package labeled "time to care for parents and exhibit love" doesn't just arrive someday. We must show love while we can.

The fifth of the Ten Commandments says: "Honor your father and your mother, that your days may be long upon the land which the Lord your God is giving you" (Exodus 20:12). The command to love and respect our parents applies equally to children living at home, newly independent young couples, and empty-nesters.

Seize each moment you have to love and honor your family. The opportunity won't last forever. —David McCasland

Putting It Into Action
  • Plan a regular time to call a family member.
  • Help an aged relative with a project or housework.
  • Write a letter to someone you love but cannot visit.

Time is one of the greatest gifts we can give each other.

10 posted on 12/16/2004 3:35:03 AM PST by The Mayor (We are saved not by what we do but by trusting what Christ has done.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: snippy_about_it; All

Good Morning


11 posted on 12/16/2004 4:25:35 AM PST by GailA (Happy Birthday JESUS! Merry CHRISTmas FRiends.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: snippy_about_it
From my email:

Christmas Sand

I had no Christmas spirit when I breathed a weary sigh, And looked across the table where the bills were piled too high.

The laundry wasn't finished and the car I had to fix, My stocks were down another point, the Dolphins lost by six.

And so with only minutes till my son got home from school I gave up on the drudgery and grabbed a wooden stool.

The burdens that I carried were about all I could take, And so I flipped the TV on, to catch a little break.

I came upon a desert scene in shades of tan and rust, No snowflakes hung upon the wind, just clouds of swirling dust.

And where the reindeer should have stood before a laden sleigh, Eight Hummers ran a column right behind an M1A.

A group of boys walked past the tank, not one was past his teens. Their eyes were hard as polished flint, their faces drawn and lean.

They walked the street in armor with their rifles shouldered tight, Their dearest wish for Christmas, just to have a silent night.

Other soldiers gathered, hunkered down against the wind, To share a scrap of mail and dreams of going home again.

There wasn't much at all to put their lonely hearts at ease, They had no Christmas turkey, just a pack of MREs.

They didn't have a garland or a stocking I could see, They didn't need an ornament-- they lacked a Christmas Tree.

They didn't have a present even though it was tradition, the only boxes I could see were labeled "ammunition."

I felt a little tug and found my son now by my side, He asked me what it was I feared, and why it was I cried.

I swept him up into my arms and held him oh so near and kissed him on the forehead as I whispered in his ear.

There's nothing wrong my little son, for safe we sleep tonight, Our heroes stand on foreign land to give us all the right,

To worry on the things in life that mean nothing at all, Instead of wondering if we will be the next to fall.

He looked at me as children do, and said it was alright, to thank the ones who help us and perhaps that we should write.

And so we pushed aside the bills and sat to draft a note, to thank the many far from home, and this is what we wrote:

God Bless You all and keep you safe, and speed your way back home. Remember that we love you so, and that you're not alone.

The gift you give you share with all, a present every day, You give the gift of liberty and that we can't repay.

12 posted on 12/16/2004 4:33:07 AM PST by GailA (Happy Birthday JESUS! Merry CHRISTmas FRiends.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: SAMWolf; snippy_about_it; Valin; bentfeather; All
On this day in History...

1944 Battle of the Bulge begins

with apologies ro valin, hope the new windows go well :-)

Regards

alfa6 ;>}

13 posted on 12/16/2004 5:35:28 AM PST by alfa6
[ Post Reply | Private Reply | To 4 | View Replies]

To: snippy_about_it; bentfeather; Samwise; msdrby
Good morning ladies. Flag-o-gram.


14 posted on 12/16/2004 5:43:42 AM PST by Professional Engineer (All wisdom is from the Lord, and with him it remains forever. ~ Ecclesiasticus 1.1)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Professional Engineer; SAMWolf; snippy_about_it; Samwise; Matthew Paul; Valin; alfa6; radu; All


Good morning FOXHOLE!

15 posted on 12/16/2004 6:36:53 AM PST by Soaring Feather
[ Post Reply | Private Reply | To 14 | View Replies]

To: snippy_about_it

Hiya, snippy!
16 posted on 12/16/2004 7:56:40 AM PST by Soaring Feather
[ Post Reply | Private Reply | To 15 | View Replies]

To: radu

Good Morning Radu.


17 posted on 12/16/2004 8:05:44 AM PST by SAMWolf (I played poker with tarot cards; got a flush and five people died.)
[ Post Reply | Private Reply | To 6 | View Replies]

To: snippy_about_it
Hey thanks for the ping.

Pearl Harbor mobilized the nation for quick victory as 9/11/01 has not - Draft, Rosie the Riveter war production, War Bonds to raise money. Just think three years after Pearl Harbor Italy was defeated, Japan was on the ropes and we were on the border of Germany. Four years after Pearl Harbor we were completely occupying and controlling the well-armed axis powers and starting them toward democracy. Japan awoke a 'sleeping giant' and the 'giant' answered back.

18 posted on 12/16/2004 8:07:42 AM PST by ex-snook (Exporting jobs and the money to buy America is lose-lose..)
[ Post Reply | Private Reply | To 5 | View Replies]

To: Iris7

I read "At Dawn We Slept", pretty good book with lots of detail. Seems all the "clues" were there, putting them together and drawing the proper conclusions was the problem.


19 posted on 12/16/2004 8:11:29 AM PST by SAMWolf (I played poker with tarot cards; got a flush and five people died.)
[ Post Reply | Private Reply | To 7 | View Replies]

To: Aeronaut

Morning Aeronaut.


20 posted on 12/16/2004 8:11:50 AM PST by SAMWolf (I played poker with tarot cards; got a flush and five people died.)
[ Post Reply | Private Reply | To 8 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-8081-94 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
VetsCoR
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson