External Communication in Social Media During Asymmetric Conflicts

Total Page:16

File Type:pdf, Size:1020Kb

External Communication in Social Media During Asymmetric Conflicts Bernd Hirschberger External Communication in Social Media During Asymmetric Conflicts Political Science | Volume 108 Dedicated to my parents Anja and Franz-Xaver and all who supported my research Bernd Hirschberger works as a human rights advisor for the German Commis- sion for Justice and Peace. Before starting a career as practitioner, he graduated with a PhD degree from the University of Munich, examining external communi- cation during asymmetric conflict in social media. Bernd Hirschberger External Communication in Social Media During Asymmetric Conflicts A Theoretical Model and Empirical Case Study of the Conflict in Israel and Palestine Supported by a scholarship of the Cusanuswerk, the German episcopal academic scholarship foundation for outstanding catholic students within the framework of a state scholarship system for highly talented students. Dissertation, Ludwig-Maximilians-Universität München (University of Munich), 2020 Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche National- bibliografie; detailed bibliographic data are available in the Internet at http:// dnb.d-nb.de This work is licensed under the Creative Commons Attribution 4.0 (BY) license, which means that the text may be remixed, transformed and built upon and be copied and re- distributed in any medium or format even commercially, provided credit is given to the author. For details go to http://creativecommons.org/licenses/by/4.0/ Creative Commons license terms for re-use do not apply to any content (such as graphs, figures, photos, excerpts, etc.) not original to the Open Access publication and further permission may be required from the rights holder. The obligation to research and clear permission lies solely with the party re-using the material. First published in 2021 by transcript Verlag, Bielefeld © Bernd Hirschberger Cover layout: Maria Arndt, Bielefeld Printed by Majuskel Medienproduktion GmbH, Wetzlar Print-ISBN 978-3-8376-5509-4 PDF-ISBN 978-3-8394-5509-8 EPUB-ISBN 978-3-7328-5509-4 https://doi.org/10.14361/9783839455098 Printed on permanent acid-free text paper. Contents Introduction ........................................................................... 9 1.1 Wars of words and images – The effectualness of pictures and stories of war and their strategic exploitation by conflict parties ............................... 9 1.2 Research focus, research questions and core thesis..................................15 1.3 Overview – Thesis outline ............................................................ 17 Conceptualization ....................................................................19 2.1 Conceptualizing “external communication” ...........................................19 2.2 Conceptualizations of strategies of external communication......................... 20 Theory – Explaining the selection of strategies of external communication........................................................ 33 3.1 Theoretical expectations of established theories .................................... 33 3.2 The conflict structure as explanation for the selection of strategies of external communication ............................................ 35 3.3 Interests ........................................................................... 43 3.4 Opportunities....................................................................... 53 3.5 Relations of the pathways, variation across time and possible alternative explanations ............................................... 82 Case selection, research design & methodology ............................. 87 4.1 The case of the conflict in Israel and Palestine ...................................... 87 4.2 Identifying strategies of external communication.................................... 97 4.3 Explaining the selection of external communication strategies ...................... 112 Empirics I – Identifying strategies of externalcommunication in the conflict in Israel and Palestine Empirics I – Identifying strategies of external communication in the conflict in Israel and Palestine ................................................... 119 5.1 Results of the quantifying qualitative content analysis.............................. 120 5.2 Robustness check – Results of the automated quantitative large-scale content analysis and the semi-structured interviews ............................... 124 Empirics II – The impact of the operational environment on the selection of the strategy of external communication in the conflict in Israel and Palestine Empirics II – Interests............................................................. 139 6.1 General pattern – Interests resulting from the distribution of capabilities ............ 141 6.2 Detailed example: Interests resulting from the distribution of economic & financial capabilities ............................... 153 6.3 Detailed example: Interests resulting from the distribution of social/institutional capabilities................................................... 161 Empirics II – Opportunities ....................................................... 169 7.1 Opportunities to convince...........................................................170 7.2 Opportunities to present – Overview................................................. 177 7.3 Opportunities to present – The impact of the distribution of military capabilities.............................................................. 181 7.4 Opportunities to present – The impact of the distribution of economic & financial capabilities ............................................... 194 7.5 Opportunities to present – The impact of the distribution of social/institutional capabilities.................................................. 205 7.6 Identifying the most successful strategy by controlling for efficiency ................214 Empirics II – Crisis communication and alternative explanations........ 225 8.1 Routine vs. crisis communication .................................................. 226 8.2 Alternative explanations ........................................................... 229 Conclusions ......................................................................... 235 9.1 Summary.......................................................................... 235 9.2 Theoretical core contributions ..................................................... 238 9.3 Limitations and proposals for future research: Thinking beyond the conflict in Israel and Palestine ................................ 238 9.4 Practical recommendations ....................................................... 243 Literature and sources............................................................ 251 10.1 Academic literature ............................................................... 251 10.2 Interviews......................................................................... 283 10.3 Software .......................................................................... 284 10.4 News articles, magazines and blogs ............................................... 284 10.5 Conference Documents, legislative documents and (other) primary sources ........ 296 10.6 Statistics and data bases .......................................................... 303 10.7 Sourcesofmaps.................................................................. 306 10.8 List of figures ..................................................................... 307 10.9 List of tables ...................................................................... 308 10.10 Online annex ...................................................................... 309 1. Introduction 1.1 Wars of words and images – The effectualness of pictures and stories of war and their strategic exploitation by conflict parties Pictures and stories of war make a difference. In their recent contributions to the study of conflicts and peace scholars like Mary Kaldor (Kaldor 1999 & 2013) and Chistopher Daase (Daase 1999) have demonstrated that modern conflicts are complex and embedded in a global context of interactions and interdependencies. The outcome and development of a conflict, therefore, is not simply determined by the military capacities of the actual conflict parties (“hard power”) but is also shaped by socio-cultural factors, such as the image of the conflict parties, their credibility, the perception of shared values and moral support (“soft power”) (cf. also Nye 2008; Nye 2009): In the modern globalized world, many con- flicts attract the attention of even those countries that are far away from the actual center of the conflict (Yarchi 2016: 291f.). This can stimulate external moral, diplo- matic, economic or even military interventions by state, or private, actors (Jakob- sen 1996). These interventions can have a significant impact on the course ofthe conflict, as they can provide valuable support for a conflict party or they can as- sert pressure on a conflict party. The image audiences abroad have of a conflict and its actors influences whether external actors intervene in a conflict or not. And, if external actors decide to intervene, the image of the conflict and its actors they have influences what kind of measures they choose for their intervention (cf. Kaldor 1999: 57-68 using the example of the war in Yugoslavia as an illustration; Yarchi 2016: 292f.).1 On the one hand, negative pictures and stories from conflict are proven to encourage mobilization against conflict parties. On the other hand, however, it is noteworthy
Recommended publications
  • WALTER CRONKITE – IMAGE #28 the 20Th Summer Olympic Games
    WALTER CRONKITE – IMAGE #28 The 20th Summer Olympic Games were held in Munich, Germany, in 1972. Tensions ran high at these Olympics, because they were the first Olympic games held in Germany since the Nazis hosted them in 1936. The Israeli athletes and their trainers were especially nervous. Many had family members who had been murdered during the Holocaust or were themselves Holocaust survivors. The first few days of the Olympic Games went smoothly. On September 4th the Israeli team spent the evening out, seeing the play, Fiddler on the Roof. Then they went back to the Olympic Village to sleep. A little after 4 a.m. on September 5th, as the Israeli athletes slept, eight members of the Palestinian Liberation Organization terrorist group, Black September, jumped over the six-foot high fence that encircled the Olympic Village. The terrorists headed straight for 31 Connollystrasse, the building where the Israeli contingent was staying. Around 4:30 a.m. the terrorists entered the building. They rounded up the occupants of apartment 1 and, then, apartment 3. Several of the Israelis fought back. Two of them were killed. A couple of others were able to escape out windows. Nine were taken hostage. By 5:10 a.m. the police had been alerted, and news of the attack had spread around the world. The terrorists then dropped a list of their demands out the window. They wanted 234 prisoners released from Israeli prisons and two from German prisons by 9 a.m. Negotiators were able to extend the deadline to noon, then to 1 p.m., then to 3 p.m., then to 5 p.m.
    [Show full text]
  • The Munich Massacre: a New History
    The Munich Massacre: A New History Eppie Briggs (aka Marigold Black) A thesis submitted in partial fulfilment of the requirements of the degree of BA (Hons) in History University of Sydney October 2011 1 Contents Introduction and Historiography Part I – Quiet the Zionist Rage 1. The Burdened Alliance 2. Domestic Unrest Part II – Rouse the Global Wrath 3. International Condemnation 4. The New Terrorism Conclusion 2 Acknowledgments I would like to thank first and foremost Dr Glenda Sluga to whom I am greatly indebted for her guidance, support and encouragement. Without Glenda‟s sage advice, the writing of this thesis would have been an infinitely more difficult and painful experience. I would also like to thank Dr Michael Ondaatje for his excellent counsel, good-humour and friendship throughout the last few years. Heartfelt thanks go to Elise and Dean Briggs for all their love, support and patience and finally, to Angus Harker and Janie Briggs. I cannot adequately convey the thanks I owe Angus and Janie for their encouragement, love, and strength, and for being a constant reminder as to why I was writing this thesis. 3 Abstract This thesis examines the Nixon administration’s response to the Munich Massacre; a terrorist attack which took place at the 1972 Olympic Games in Munich. By examining the contextual considerations influencing the administration’s response in both the domestic and international spheres, this thesis will determine the manner in which diplomatic intricacies impacted on the introduction of precedent setting counterterrorism institutions. Furthermore, it will expound the correlation between the Nixon administration’s response and a developing conceptualisation of acts of modern international terrorism.
    [Show full text]
  • Counterterrorism CHAPTER 13 the Options
    Counterterrorism CHAPTER 13 The Options OPENING VIEWPOINT: THE DEATH OF OSAMA BIN LADEN Al-Qa’ida founder Osama bin Laden was killed during a individual. Based on other surveillance and circumstantial intel- raid by United States naval special forces on May 2, 2011, in ligence information, officials surmised that Osama bin Laden Abbottabad, Pakistan. The successful attack by a unit popularly resided at the compound with his couriers and their families. known as SEAL Team Six ended an intensive manhunt for the Options for assaulting thedistribute compound included a surgi- most wanted terrorist leader in the world. cal strike by special forces, deploying strategic bombers to The successful hunt for Osama bin Laden originated from obliterate the compound, or a joint operation with Pakistani fragments of information gleaned during interrogations of pris- security forces. Theor latter two options were rejected because oners over several years beginning in 2002. Believing that bin of the possibility of killing innocent civilians and distrust of Laden retained couriers to communicate with other operatives, Pakistani security agencies. Approximately two dozen SEAL interrogators focused their attention on questioning high-value commandos practiced intensely for the assault, and were targets about the existence and identities of these couriers. temporarily detailed to the CIA for the mission. A nighttime This focus was adopted with an assumption that bin Laden and helicopter-borne attack was commenced on May 2, 2011. other Al-Qa’ida leaders would rarely communicate using cellpost, The courier al-Kuwaiti and several others were killed during phone technology as a precaution against being intercepted by the assault, and women and children found in the compound Western intelligence agencies.
    [Show full text]
  • Targeted Killing: Self-Defense, Preemption, and the War on Terrorism
    Journal of Strategic Security Volume 2 Number 2 Volume 2, No. 2: May 2009 Article 1 Targeted Killing: Self-Defense, Preemption, and the War on Terrorism Thomas Byron Hunter Follow this and additional works at: https://scholarcommons.usf.edu/jss Part of the Defense and Security Studies Commons, National Security Law Commons, and the Portfolio and Security Analysis Commons pp. 1-52 Recommended Citation Hunter, Thomas Byron. "Targeted Killing: Self-Defense, Preemption, and the War on Terrorism." Journal of Strategic Security 2, no. 2 (2010) : 1-52. DOI: http://dx.doi.org/10.5038/1944-0472.2.2.1 Available at: https://scholarcommons.usf.edu/jss/vol2/iss2/1 This Article is brought to you for free and open access by the Open Access Journals at Scholar Commons. It has been accepted for inclusion in Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected]. Targeted Killing: Self-Defense, Preemption, and the War on Terrorism Abstract This paper assesses the parameters and utility of “targeted killing” in combating terrorism and its role within the norm of state self-defense in the international community. The author’s thesis is that, while targeted killing provides states with a method of combating terrorism, and while it is “effective” on a number of levels, it is inherently limited and not a panacea. The adoption and execution of such a program brings with it, among other potential pitfalls, political repercussions. Targeted killing is defined herein as the premeditated, preemptive, and intentional killing of an individual or individuals known or believed to represent a present and/or future threat to the safety and security of a state through affiliation with terrorist groups or individuals.
    [Show full text]
  • 11 July 2006 Mumbai Train Bombings
    11 July 2006 Mumbai train bombings July 2006 Mumbai train bombings One of the bomb-damaged coaches Location Mumbai, India Target(s) Mumbai Suburban Railway Date 11 July 2006 18:24 – 18:35 (UTC+5.5) Attack Type Bombings Fatalities 209 Injuries 714 Perpetrator(s) Terrorist outfits—Student Islamic Movement of India (SIMI), Lashkar-e-Toiba (LeT; These are alleged perperators as legal proceedings have not yet taken place.) Map showing the 'Western line' and blast locations. The 11 July 2006 Mumbai train bombings were a series of seven bomb blasts that took place over a period of 11 minutes on the Suburban Railway in Mumbai (formerly known as Bombay), capital city of the Indian state of Maharashtra and India's financial capital. 209 people lost their lives and over 700 were injured in the attacks. Details The bombs were placed on trains plying on the western line of the suburban ("local") train network, which forms the backbone of the city's transport network. The first blast reportedly took place at 18:24 IST (12:54 UTC), and the explosions continued for approximately eleven minutes, until 18:35, during the after-work rush hour. All the bombs had been placed in the first-class "general" compartments (some compartments are reserved for women, called "ladies" compartments) of several trains running from Churchgate, the city-centre end of the western railway line, to the western suburbs of the city. They exploded at or in the near vicinity of the suburban railway stations of Matunga Road, Mahim, Bandra, Khar Road, Jogeshwari, Bhayandar and Borivali.
    [Show full text]
  • What Drives Terrorist Innovation? Lessons from Black September And
    What Drives Terrorist Innovation? Lessons from Black September and Munich 1972 Authors: Andrew Silke, Cranfield Forensic Institute, Cranfield University, Shrivenham, UK. E-mail: [email protected] Anastasia Filippidou, Centre for International Security and Resilience, Cranfield University, Shrivenham, UK. Abstract: Understanding terrorist innovation has emerged as a critical research question. Terrorist innovation challenges status quo assumptions about the nature of terrorist threats and emphasises a need for counterterrorism policy and practice to attempt to not simply react to changes in terrorist tactics and strategies but also to try to anticipate them. This study focused on a detailed examination of the 1972 Munich Olympics attack and draws on the wide range of open source accounts available, including from terrorists directly involved but also from among the authorities and victims. Using an analytical framework proposed by Rasmussen and Hafez (2010), several key drivers are identified and described, both internal to the group and external to its environment. The study concludes that the innovation shown by Black September was predictable and that Munich represented a profound security failure as much as it did successful terrorist innovation. Keywords: terrorism, terrorist innovation, Munich 1972, Black September 1 Introduction A growing body of research has attempted to identify and understand the factors associated with innovation in terrorism (e.g. Dolnik, 2007; Rasmussen and Hafez, 2010; Horowitz, 2010; Jackson and Loidolt, 2013; Gill, 2017; Rasmussen, 2017). In part this increased attention reflects a concern that more innovative terrorist campaigns might potentially be more successful and/or simply more dangerous. Successful counterterrorist measures and target hardening efforts render previous terrorist tactics ineffective, forcing terrorists to innovate and adapt in order to overcome countermeasures.
    [Show full text]
  • Palestinian Groups
    1 Ron’s Web Site • North Shore Flashpoints • http://northshoreflashpoints.blogspot.com/ 2 Palestinian Groups • 1955-Egypt forms Fedayeem • Official detachment of armed infiltrators from Gaza National Guard • “Those who sacrifice themselves” • Recruited ex-Nazis for training • Fatah created in 1958 • Young Palestinians who had fled Gaza when Israel created • Core group came out of the Palestinian Students League at Cairo University that included Yasser Arafat (related to the Grand Mufti) • Ideology was that liberation of Palestine had to preceed Arab unity 3 Palestinian Groups • PLO created in 1964 by Arab League Summit with Ahmad Shuqueri as leader • Founder (George Habash) of Arab National Movement formed in 1960 forms • Popular Front for the Liberation of Palestine (PFLP) in December of 1967 with Ahmad Jibril • Popular Democratic Front for the Liberation (PDFLP) for the Liberation of Democratic Palestine formed in early 1969 by Nayif Hawatmah 4 Palestinian Groups Fatah PFLP PDFLP Founder Arafat Habash Hawatmah Religion Sunni Christian Christian Philosophy Recovery of Palestine Radicalize Arab regimes Marxist Leninist Supporter All regimes Iraq Syria 5 Palestinian Leaders Ahmad Jibril George Habash Nayif Hawatmah 6 Mohammed Yasser Abdel Rahman Abdel Raouf Arafat al-Qudwa • 8/24/1929 - 11/11/2004 • Born in Cairo, Egypt • Father born in Gaza of an Egyptian mother • Mother from Jerusalem • Beaten by father for going into Jewish section of Cairo • Graduated from University of King Faud I (1944-1950) • Fought along side Muslim Brotherhood
    [Show full text]
  • A Guide to Understanding the Struggle for Palestinian Human Rights
    A Guide to Understanding the Struggle for Palestinian Human Rights © Copyright 2010, The Veritas Handbook. 1st Edition: July 2010. Online PDF, Cost: $0.00 Cover Photo: Ahmad Mesleh This document may be reproduced and redistributed, in part, or in full, for educational and non- profit purposes only and cannot be used for fundraising or any monetary purposes. We encourage you to distribute the material and print it, while keeping the environment in mind. Photos by Ahmad Mesleh, Jon Elmer, and Zoriah are copyrighted by the authors and used with permission. Please see www.jonelmer.ca, www.ahmadmesleh.wordpress.com and www.zoriah.com for detailed copyright information and more information on these photographers. Excerpts from Rashid Khalidi’s Palestinian Identity, Ben White’s Israeli Apartheid: A Beginner’s Guide and Norman Finkelstein’s This Time We Went Too Far are also taken with permission of the author and/or publishers and can only be used for the purposes of this handbook. Articles from The Electronic Intifada and PULSE Media have been used with written permission. We claim no rights to the images included or content that has been cited from other online resources. Contact: [email protected] Web: www.veritashandbook.blogspot.com T h e V E R I T A S H a n d b o o k 2 A Guide to Understanding the Struggle for Palestinian Human Rights To make this handbook possible, we would like to thank 1. The Hasbara Handbook and the Hasbara Fellowships 2. The Israel Project’s Global Language Dictionary Both of which served as great inspirations, convincing us of the necessity of this handbook in our plight to establish truth and justice.
    [Show full text]
  • Israel - Palestine Conflict - a Tale of Grave Human Violations & Innumerable Casualties
    RESEARCH PAPER Law Volume : 4 | Issue : 9 | September 2014 | ISSN - 2249-555X Israel - Palestine Conflict - A Tale of Grave Human Violations & Innumerable Casualties KEYWORDS Mr.Manish Dalal Mr.ArunKumar Singh Assistant Professor in Law Noida International First year, Faculty of Law, Noida International University University * Corresponding author ABSTRACT Israel - Palestine conflict is one of the most burning issues of modern times which poses a big threat to international peace & security. This conflict is an example of grave human rights violations & a large no. of human causalities’. The warring sides are the Israeli government on the one hand and a group named Hamas which is controlling Gaza Strip after winning the elections in 2006 on the other hand. Hamas is mostly viewed as a terrorist organization all over the world. Both Israel & Hamas do not recognize each other's authority & ready to use violence to achieve their means. But to understand the reasons for this conflict one has to go back to history in the middle of 20th century where it all started. Introduction The First Palestinian Intifada The history of this war dates back to the year 1948 with The First Palestinian Intifada also known as a the first Pal- the declaration of State of Israel on 15th May, 1948 which estinian uprising against the Israeli occupation began on didn’t go down well with the Arab League which pro- 8th December, 1987 & ended on 13th September, 1993 claimed that the entire area given to Israel belongs to with the signing of Oslo Accords. It was the first biggest them & it didn’t recognize Israel as a State giving rise to uprising against Israel after their 1967 occupation of the 1948 Arab-Israel war in which many people lost their lives disputed territory of Gaza Strip, West Bank & East Jerusa- & many more became refugees.
    [Show full text]
  • How Norms Die: Torture and Assassination in American Security Policy Christopher Kutz*
    How Norms Die: Torture and Assassination in American Security Policy Christopher Kutz* large and impressive literature has arisen over the past fifteen years concerning the emergence, transfer, and sustenance of political norms A in international life. The presumption of this literature has been, for the most part, that the winds of normative change blow in a progressive direction, toward greater or more stringent normative control of individual or state behavior. Constructivist accounts detail a spiral of mutual normative reinforcement as actors and institutions discover the advantages of normative self- and other eval- uation. There is also now much interesting research focused on the question of how to predict the emergence of future norms. I focus, however, on a different issue here: the death of norms that had once seemed well internalized and institutionalized. The issue arises in relation to one of the most dramatic features in the defense policy of the United States since : the crumbling of highly restrictive normative regimes prohibiting in- terrogatory torture and assassination as part of the “global war on terror.” My aim here is to sketch what I take to be the central features of cases in which even norms that are clearly defined and apparently well internalized in a democ- racy nonetheless lose their grip on policy. The ultimate lesson, however, is an un- appealing irony: While democracies surely do better than authoritarian regimes in adopting and internalizing certain kinds of constraints, in part because of a greater sensitivity to public mobilization around normative questions, that same sensitiv- ity makes the long-term survival of these norms precarious.
    [Show full text]
  • Crimes Committed by Terrorist Groups: Theory, Research and Prevention
    The author(s) shown below used Federal funds provided by the U.S. Department of Justice and prepared the following final report: Document Title: Crimes Committed by Terrorist Groups: Theory, Research and Prevention Author(s): Mark S. Hamm Document No.: 211203 Date Received: September 2005 Award Number: 2003-DT-CX-0002 This report has not been published by the U.S. Department of Justice. To provide better customer service, NCJRS has made this Federally- funded grant final report available electronically in addition to traditional paper copies. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. Crimes Committed by Terrorist Groups: Theory, Research, and Prevention Award #2003 DT CX 0002 Mark S. Hamm Criminology Department Indiana State University Terre Haute, IN 47809 Final Final Report Submitted: June 1, 2005 This project was supported by Grant No. 2003-DT-CX-0002 awarded by the National Institute of Justice, Office of Justice Programs, U.S. Department of Justice. Points of view in this document are those of the author and do not necessarily represent the official position or policies of the U.S. Department of Justice. This document is a research report submitted to the U.S. Department of Justice. This report has not been published by the Department. Opinions or points of view expressed are those of the author(s) and do not necessarily reflect the official position or policies of the U.S. Department of Justice. TABLE OF CONTENTS Abstract .............................................................. iv Executive Summary....................................................
    [Show full text]
  • Israel's War on Terrorism
    Israel Studies: An Anthology - Israel's War on Terrorism Israel's War on Terrorism: A Historical and Political Perspective By Arie Perliger (April 2009) Introduction March 2002 was a devastating month for the citizens of Israel. The country was in the midst of the Al-Aqsa intifada and the suicide attack campaigns of the Palestinian organizations had reached their peak. Eleven times during this month, suicide bombers blew themselves up in the streets of Israel’s cities, causing more than 579 casualties including 81 fatalities. [1] On another six occasions that same month, the Israeli security forces thwarted attacks before the suicide bombers were able to complete their missions. The Israeli political leadership, however, was not ready to increase its response to the Palestinian attacks. The Israel Defense Forces were instructed to continue limited raids on the infrastructure of the Palestinian organizations in the West Bank and the Gaza Strip, actions which included mainly arrests and intelligence gathering operations. This policy of restraint changed after the night of March 27. In the evening hours of that day, 250 guests were sitting in the festive Park Hotel dining room, cheerfully celebrating the Passover holiday seder. Around 8:00 pm the celebration was halted. A Hamas operative by the name of Abd al-Basset Muhammad Odeh walked into the room and detonated an explosive device that was attached to his upper body. The aftermath was appalling. Twenty-nine Jews were killed and another 144 were injured. [2] The particular horrors of the attack and the fact that it was carried out on the Jewish holiday that celebrates the freedom of the People of Israel created a public and political environment that essentially left Israeli policy makers with no option but to respond with force.
    [Show full text]