Discussing Primary Recourses What can you recall about the Zimmerman Telegram from the unit on WWI? Who was it addressed to? Who was it from? Why was it written? How was it written?
Warm Up
Problem-SolveProblem-Solve
You and your partner have to send a You and your partner have to send a message to another group. The message is message to another group. The message is about a secret mission and a surprise attack about a secret mission and a surprise attack on the enemy. If the enemy intercepts the on the enemy. If the enemy intercepts the message, it will no longer be a “surprise” message, it will no longer be a “surprise” and the enemy will be prepared for the and the enemy will be prepared for the attack. What are some possible solutions?attack. What are some possible solutions?
©2012, TESCCC
Cryptography: writing in code; write something that is readable to something that is unreadable by the enemy.
The U.S. struggled with coding because Germany was able to decode encrypted information.
BIG PROBLEM: How to solve it?
©2012, TESCCC
Today we will be talking about the
NavajoCode
U.S. Mobilization U.S. Mobilization and War on Two and War on Two
FrontsFronts
U.S. Gets Pulled Into War: U.S. Gets Pulled Into War: Pearl Harbor Pearl Harbor
Aircraft and midget Aircraft and midget submarines of the Imperial submarines of the Imperial Japanese Japanese Navy began an Navy began an attack on the U.S naval base attack on the U.S naval base under the command of under the command of Admiral Chuichi Nagumo Admiral Chuichi Nagumo The attack was devastating The attack was devastating in loss of life and damage to in loss of life and damage to the U.S. fleet. At 06:05 on the U.S. fleet. At 06:05 on December 7, 1941 December 7, 1941 the six the six Japanese carriers launched Japanese carriers launched a first wave of 183 aircraft a first wave of 183 aircraft composed mainly of dive composed mainly of dive bombers, horizontal bombers, horizontal bombers and fighters.bombers and fighters.
Scenes from Pearl Harbor, Scenes from Pearl Harbor, Hawaii on December 7, Hawaii on December 7,
19411941
This attack takes the United States from a This attack takes the United States from a stance of neutrality in WWII to a declaration stance of neutrality in WWII to a declaration of war that will occur on two fronts: of war that will occur on two fronts:
Europe Europe to fight Nazi Germany and Fascist to fight Nazi Germany and Fascist Italy: the war in Europe was predominately Italy: the war in Europe was predominately fought on landfought on land
The The PacificPacific Realm to fight Imperialist Japan: Realm to fight Imperialist Japan: the war in the Pacific was fought both at sea the war in the Pacific was fought both at sea and on landand on land
United States MobilizesUnited States Mobilizes Domestic (industry’s rapid Domestic (industry’s rapid
mobilizationmobilization) –American industry ) –American industry began converting America's industrial began converting America's industrial base to produce armaments and other base to produce armaments and other war material, rather than civilian war material, rather than civilian goods. Mobilization increased after goods. Mobilization increased after 1941 when the U.S. declared war on 1941 when the U.S. declared war on the Axis powers. the Axis powers. This was crucial in the defeat of the Axis powers.
International (relationship with allies) – International (relationship with allies) – Roosevelt’s relationship with Winston Roosevelt’s relationship with Winston ChurchillChurchill led to the Lend Lease Act led to the Lend Lease Act which allowed the U.S. to support which allowed the U.S. to support Britain’s war effort before the U.S. Britain’s war effort before the U.S. entered the warentered the war
The development of conventional The development of conventional weaponsweapons
HigginsHiggins boat (used boat (used for D-Day invasion for D-Day invasion of Normandy)of Normandy)
TanksTanks
BombersBombers
““Liberty” cargo ships – Liberty” cargo ships – Merchant MarinesMerchant Marines is the fleet is the fleet of U.S. civilian-owned merchant of U.S. civilian-owned merchant vessels, operated by either the vessels, operated by either the government or the private government or the private sector, that engage in commerce sector, that engage in commerce or transportation of goods and or transportation of goods and services in and out of services in and out of the navigable waters of the the navigable waters of the United States. The Merchant United States. The Merchant Marine is responsible for Marine is responsible for transporting cargo and transporting cargo and passengers during peace time. In passengers during peace time. In time of war, the Merchant time of war, the Merchant Marine is an auxiliary to Marine is an auxiliary to the Navy, and can be called upon the Navy, and can be called upon to deliver troops and supplies for to deliver troops and supplies for the militarythe military
GlidersGliders
C-47 Planes that pull gliders into the air.
Glider planes have no engines. Why were they used? How do you get it back if it doesn’t have an engine.
Why they are so cool.
TorpedoesTorpedoes Improved submarinesImproved submarines
The The M1M1 rifle rifle (first semi-(first semi-automatic rifle)automatic rifle)
FlamethrowerFlamethrower
How American patriotism inspired How American patriotism inspired exceptional actions by citizens and military exceptional actions by citizens and military
personnelpersonnel The The Navajo Navajo Code Talkers – Navajo Code Talkers – Navajo
American Indians were recruited by the American Indians were recruited by the military to encode, transmit and decode military to encode, transmit and decode messages; the Navajo language was used messages; the Navajo language was used to develop a code that was not broken by to develop a code that was not broken by the enemythe enemy
In In cryptographycryptography, , encryptionencryption is the is the process of encoding messages (or process of encoding messages (or information) in such a way that information) in such a way that eavesdroppers or hackers cannot read it, eavesdroppers or hackers cannot read it, but that authorized parties can. but that authorized parties can.
Primary Sourcehttp://www.youtube.com/watch?v=Yq2Cp1DUOWc
Top Related