A Security System for the Two-State Solution

Total Page:16

File Type:pdf, Size:1020Kb

A Security System for the Two-State Solution MAY 2016 ADVANCING THE DIALOGUE A Security System for the Two-State Solution Ilan Goldenberg, Major General (Res.) Gadi Shamni, Nimrod Novik, and Colonel Kris Bauman About the Authors Acknowledgements Ilan Goldenberg is a Senior Fellow and This report was the product of numerous consultations Director of the Middle East Security and workshops with former and current Israeli, Palestinian, Program at the Center for a New American Jordanian, and American security officials and negotiators. Security (CNAS). Prior to CNAS, he served We are deeply grateful to all of them for their time, insights, at the U.S. Department of State as Chief and creativity. A special thank you goes to our colleagues of Staff for the small team supporting at Commanders for Israel’s Security and the Amman Center Secretary John Kerry’s initiative to for Peace and Development for their close collaboration on conduct permanent status negotiations between Israelis this effort, as well as our colleagues at Israel Policy Forum, and Palestinians. Goldenberg previously served as a Special whose advice and support have been invaluable. We thank Advisor on the Middle East and then as the Iran Team Chief Loren Dejonge Schulman for her thoughtful inputs, Nicholas in the Office of the Undersecretary of Defense for Policy. A. Heras and Peter Kirechu for their research support, and Maura McCarthy and Melody Cook for assistance with Major General (Res.) Gadi Shamni is editing and design. Finally, we would like to thank the Smith Vice President for Land Systems at Richardson Foundation, Peter A. Joseph, Gideon Argov, Israel Aerospace Industries. He served in the Goldman Sonnenfeldt Foundation, and the Morningstar the Israel Defense Forces for 36 years, Foundation for their generous support of this project. including as Commander of the Hebron Regional Brigade, Commander of the Gaza Division, and Commander for Central Disclaimer Command. He also served as the Military Advisor to the The views expressed herein are those of the authors and do Prime Minister and in Washington as the Israeli Defense not necessarily represent the views of the Department of Attaché to the United States. Defense, the Department of State, or the U.S. government. The authors alone are responsible for any errors of fact, analysis, or omission. Nimrod Novik, Ph.D., is President and CEO of Novik Networking (NN-DC). He was Chairman and is a Senior Associate About the Middle East Security of the Economic Cooperation Foundation and is the Israel Fellow of the Israel Policy Program Forum. He is also a member of the Steering The Middle East Security Program conducts cutting-edge Committee of Commanders for Israel’s research on the most pressing issues in this turbulent region. Security. He served as the Senior Advisor on Foreign Policy The program focuses on the sources of instability in the to Shimon Peres, as a Special Ambassador of the State of region, maintaining key U.S. strategic partnerships, and Israel, and as an Advisor to the Israeli National Security generating solutions that help policymakers respond to both Council, and has engaged extensively in Track II diplomacy. fast-moving events and long-term trends. The Middle East Security Program draws on a team with deep government Colonel Kris Bauman, Ph.D., is a Senior and nongovernment experience in regional studies, U.S. Military Fellow at the Institute for National foreign policy, and international security. It analyzes trends Strategic Studies at National Defense and generates practical and implementable policy solutions University in Washington. In 2013-14, he that defend and advance U.S. interests served as the Chief of Staff to General John Allen in his role as Senior Advisor to the Secretary of Defense. Allen’s team was responsible for the security portfolio during Kerry’s initiative to conduct permanent status negotiations between Israelis and Palestinians. Cover Photo The top image shows members of the Israeli Border Police. The bottom image shows members of the Palestinian National Security Forces. Both the Israeli and Palestinian security forces will be key components of the security system for the two-state solution detailed in this report. (Getty Images) Advancing the Dialogue A SECURITY SYSTEM FOR THE TWO-STATE SOLUTION 0 Executive Summary 09 SECTION 1 Overview 10 Chapter 1 Political and Security Context 15 Chapter 2 Organizing Principles of the Security System 23 SECTION 2 The Security System at End State 24 Chapter 3 Internal Security 28 Chapter 4 Border Security 36 Chapter 5 Non-Ground Domains 43 Chapter 6 Regional Security 48 SECTION 3 Transitioning to the End State 49 Chapter 7 Transition Process After an Agreement 57 Chapter 8 Steps to Be Taken Today, Prior to an Agreement 60 Conclusion 2 @CNASDC Key Principles Israelis will never agree to a two-state solution unless their security concerns are addressed. Palestinians will never agree to what they view as an endless occupation. To address both sides’ needs, this report proposes a security system based on the following key principles: Build a multilayered system that addresses Israel’s security concerns in which Israel retains the right of self defense as well as the capacity to defend itself by itself, but ensures this is only necessary in extremis. Minimize Israeli visibility to Palestinian civilians and pursue significant early steps that signal a fundamental change on the ground to Palestinians. Plan a conditions-based, performance-dependent area-by-area phased rede- ployment of Israeli security forces with target timetables, benchmarks, and an effective remediation process. Conduct significant upgrades to security systems and infrastructure. Build joint operations centers and data sharing mechanisms for all parties such that there is maximum situational awareness of the security environ- ment for Israelis but minimal intrusion on Palestinian sovereignty. Employ American forces for training, equipping, evaluating, and monitoring, and for conducting highly limited operations along the Jordan River. 3 Middle East Security | May 2016 Advancing the Dialogue: A Security System for the Two-State Solution Executive Summary onfidence in the possibility of solving the Israeli- Bank could also likely be adjusted and implemented in Palestinian conflict is at a nadir. More than 20 similar form in Gaza. C years after Oslo, both sides are deeply disillu- This paper first provides key principles and objec- sioned and trust is nonexistent. The withdrawal from tives of a security architecture for the two-state solution Gaza and ensuing takeover by Hamas, combined with the that address Israeli anxieties but are still acceptable increasing instability in Syria, Egypt’s Sinai, and across to Palestinians. The second section describes the key the region, have led much of the Israeli public to conclude elements of a proposed security architecture as it would that for security reasons, Israel cannot move forward on appear at end state, after many years of planned transi- an agreement with the Palestinians. Meanwhile, many tion. The third part of the study addresses the elements Palestinians have decided that Israel has no intention of of a transition plan to move both parties safely from the ever redeploying from the West Bank. And the United current arrangement to the enduring security architec- States, the Arab world, and the international community ture we envision – including steps that can begin today in general are focused on more pressing security chal- even without an agreement. lenges and frustrated with the lack of progress between Finally, it is important to note that we consider this Israelis and Palestinians. study to be a constant work in progress. The purpose is Nonetheless, several factors point to the need to produce not to propose the one definitive solution to this chal- a public study on security arrangements that would provide lenge, but instead to lay out a series of solutions that better security for both Israelis and Palestinians in a two- should continue to be debated and refined to meet both state solution: parties’ needs. 1. The need to add legitimacy and infuse confidence Key Principles in some of the key concepts underpinning the The overall security system would be based on the fol- two-state solution; lowing key principles: 2. The increasing importance that the Israeli public • Build a multilayered system that addresses Israel’s ascribes to the security challenges associated with security concerns in which Israel retains the right of the two-state solution; and self defense as well as the capacity to defend itself by itself, but ensures this is only necessary in extremis. 3. The centrality of security considerations in Israeli reluctance to move toward an agreement. • Minimize Israeli visibility to Palestinian civilians and pursue significant early steps that signal a funda- The purpose of this study is to demonstrate that well- mental change on the ground to Palestinians. thought-through security measures in the context of the • Plan a conditions-based, performance-dependent two-state solution can provide Israelis and Palestinians area-by-area phased redeployment of Israeli security with a degree of security equal or greater to that provided forces with target timetables, benchmarks, and an today by Israel’s deployment into the West Bank, and that effective remediation process. such measures can be consistent with Palestinian needs for • Conduct significant upgrades to security systems sovereignty and dignity. In the context of a two-state agree- and infrastructure. ment, Israel would still have the right and ability to defend itself by itself as any sovereign state does. But the intent of • Build joint operations centers and data sharing this proposed security architecture is to build in a multilay- mechanisms for all parties such that there is ered system so that the need for unilateral Israeli action is maximum situational awareness of the security vastly reduced to rare emergency situations. environment for Israelis but minimal intrusion on The study also addresses security arrangements for Gaza Palestinian sovereignty.
Recommended publications
  • Civil Resilience Network Conceptual Framework for Israel's Local & National Resilience
    Israel Trauma Coalition for Response and Preparedness Civil Resilience Network Conceptual Framework for Israel's Local & National Resilience Version B Elul 5769 August 2009 Civil Resilience Network – Version B - 2 - Elul 5769 August 2009 "It's not the strongest of the species that survives nor the most intelligent, but the one most responsive to change" (Charles Darwin, On the Origin of Species, 1859) … "The entire people is the army, the entire land is the front" (David Ben-Gurion, May 1948) … "Israel has nuclear weapons and the strongest air force in the region, but the truth is that it is weaker than a spider's web" (Hassan Nasrallah, May 26, 2000) ... "The durability of spider webs enable them to absorb the concentrated pressure of a weight ten times that of the most durable artificial fiber" (P. Hillyard, The Book of the Spider, 1994) Civil Resilience Network – Version B - 3 - Elul 5769 August 2009 Table of Contents Table of Contents............................................................................................................ 3 Funders: UJA Federation of New York ....................................................................... 5 Partners ........................................................................................................................... 5 THE ISRAEL TRAUMA COALITION: RESPONSE AND PREPAREDNESS............................... 5 THE REUT INSTITUTE ..................................................................................................... 5 Acknowledgements........................................................................................................
    [Show full text]
  • Combating Political Violence Movements with Third-Force Options Doron Zimmermann ∗
    Between Minimum Force and Maximum Violence: Combating Political Violence Movements with Third-Force Options Doron Zimmermann ∗ Introduction: Balancing the Tools of Counter-Terrorism In most liberal democratic states it is the responsibility of the police forces to cope with “internal” threats, including terrorism, since in such states terrorism is invariably defined as a criminal act rather than a manifestation of insurgent political violence. In many such instances, the resultant quantitative and qualitative overtaxing of law en- forcement capabilities to keep the peace has led to calls by sections of the public, as well as by the legislative and executive branches of government, to expand both the le- gal and operational means available to combat terrorism, and to boost civilian agen- cies’ capacity to deal with terrorism in proportion to the perceived threat. The deterio- rating situation in Ulster in Northern Ireland between 1968 and 1972 and beyond is an illustrative case in point.1 Although there have been cases of successfully transmogrifying police forces into military-like formations, the best-known and arguably most frequent example of aug- mented state responses to the threat posed by insurgent political violence movements is the use of the military in the fight against terrorism and in the maintenance of internal security. While it is imperative that the threat of a collapse of national cohesion due to the overextension of internal civil security forces be averted, the deployment of all branches of the armed forces against a terrorist threat is not without its own pitfalls. Paul Wilkinson has enunciated some of the problems posed by the use of counter-ter- rorism military task forces, not the least of which is that [a] fully militarized response implies the complete suspension of the civilian legal system and its replacement by martial law, summary punishments, the imposition of curfews, military censorship and extensive infringements of normal civil liberties in the name of the exigencies of war.
    [Show full text]
  • Tunnel Operations in the Israel Defense Forces: Adapting The
    Original Manuscript Armed Forces & Society 1-21 ª The Author(s) 2020 Tunnel Operations in the Article reuse guidelines: sagepub.com/journals-permissions DOI: 10.1177/0095327X20924040 Israel Defense Forces: journals.sagepub.com/home/afs Adapting the Warrior Ethos to Post-Heroic Conflict Nehemia Stern1 , Uzi Ben-Shalom1, Niv Gold2, Corinne Berger1, Avishai Antonovsky3, and Dvir Peleg1 Abstract This study presents an empirically grounded account of tunnel combat operations in the Israel Defense Forces (IDF) within the context of “post-heroic” warfare. Cur- rent scholarship on “post-heroism” has viewed the technological and professional standards of contemporary military conflicts as distancing the individual combatant from the modern battlefield. Little attention has been given however to the ways in which soldiers themselves experience and adapt to post-heroic conditions. Findings based on in-depth semistructured interviews with 17 IDF tunnel combatants show these soldiers actively reinterpreting the strategic importance placed on distancing the warrior from the battlefield. This exploratory article suggests that an individual “warrior ethos” still resonates amid the professional and technological contours of post-heroic (underground) conflicts. By presenting a novel account of contemporary tunnel warfare from the perspective of the combatants themselves, this research sheds new light on the different personal dimensions that impact post-heroic military operations. 1 Department of Sociology and Anthropology, Ariel University, Israel 2 Clinical Branch, Department of Mental Health, Medical Corps, Israel Defense Force, Israel 3 Mental Fitness Branch, Department of Mental Health, Medical Corps, Israel Defense Forces, Israel Corresponding Author: Nehemia Stern, Department of Sociology and Anthropology, Ariel University, Ariel 40700, Israel.
    [Show full text]
  • The Israel Defense Forces, 1948-2017
    The Israel Defense Forces, 1948-2017 Kenneth S. Brower Mideast Security and Policy Studies No. 150 THE BEGIN-SADAT CENTER FOR STRATEGIC STUDIES BAR-ILAN UNIVERSITY Mideast Security and Policy Studies No. 150 The Israel Defense Forces, 1948-2017 Kenneth S. Brower The Israel Defense Forces, 1948-2017 Kenneth S. Brower © The Begin-Sadat Center for Strategic Studies Bar-Ilan University Ramat Gan 5290002 Israel Tel. 972-3-5318959 Fax. 972-3-5359195 [email protected] www.besacenter.org ISSN 0793-1042 May 2018 Cover image: Soldier from the elite Rimon Battalion participates in an all-night exercise in the Jordan Valley, photo by Staff Sergeant Alexi Rosenfeld, IDF Spokesperson’s Unit The Begin-Sadat (BESA) Center for Strategic Studies The Begin-Sadat Center for Strategic Studies is an independent, non-partisan think tank conducting policy-relevant research on Middle Eastern and global strategic affairs, particularly as they relate to the national security and foreign policy of Israel and regional peace and stability. It is named in memory of Menachem Begin and Anwar Sadat, whose efforts in pursuing peace laid the cornerstone for conflict resolution in the Middle East. Mideast Security and Policy Studies serve as a forum for publication or re-publication of research conducted by BESA associates. Publication of a work by BESA signifies that it is deemed worthy of public consideration but does not imply endorsement of the author’s views or conclusions. Colloquia on Strategy and Diplomacy summarize the papers delivered at conferences and seminars held by the Center for the academic, military, official and general publics.
    [Show full text]
  • Download This Report
    A LICENSE TO KILL Israeli Operations against "Wanted" and Masked Palestinians A Middle East Watch Report Human Rights Watch New York !!! Washington !!! Los Angeles !!! London Copyright 8 July 1993 by Human Rights Watch. All rights reserved. Printed in the United States of America. Library of Congress Card Catalog Number: 93-79007 ISBN: 1-56432-109-6 Middle East Watch Middle East Watch was founded in 1989 to establish and promote observance of internationally recognized human rights in the Middle East. The chair of Middle East Watch is Gary Sick and the vice chairs are Lisa Anderson and Bruce Rabb. Andrew Whitley is the executive director; Eric Goldstein is the research director; Virginia N. Sherry and Aziz Abu Hamad are associate directors; Suzanne Howard is the associate. HUMAHUMAHUMANHUMAN RIGHTS WATCH Human Rights Watch conducts regular, systematic investigations of human rights abuses in some sixty countries around the world. It addresses the human rights practices of governments of all political stripes, of all geopolitical alignments, and of all ethnic and religious persuasions. In internal wars it documents violations by both governments and rebel groups. Human Rights Watch defends freedom of thought and expression, due process of law and equal protection of the law; it documents and denounces murders, disappearances, torture, arbitrary imprisonment, exile, censorship and other abuses of internationally recognized human rights. Human Rights Watch began in 1978 with the founding of Helsinki Watch by a group of publishers, lawyers and other activists and now maintains offices in New York, Washington, D.C., Los Angeles, London, Moscow, Belgrade, Zagreb and Hong Kong.
    [Show full text]
  • A Ballistic Missile Primer
    A BALLISTIC MISSILE PRIMER Steve Fetter The Rocket Equation Consider a single-stage rocket with a lift-off mass Mlo and a burn-out mass Mbo. In the absence of gravity and air resistance, the change in the rocket's velocity from lift-off to burn-out (the "delta-v") is given by " Mlo % !v = ve log e $ ' (1) # Mbo & where ve is the exhaust velocity of the propellant. If the rocket has n stages, the total delta-v of the rocket is given by n # M & !v = !v + !v + """ + !v = v log lo (2) t 1 2 n ) ei e % ( i=1 $ M bo 'i th where vei is the exhaust velocity of the i stage and (Mlo/Mbo)i is the ratio of the rocket mass when the ith stage ignites to its mass when the stage burns out. The mass ratio of the ith stage is given by ! $ M + M + ''' + M + m ( M (1( s ) M (1( s ) M bo t1 t2 ti p pi i pi i # & = = 1( i (3) " M lo % M t + M t + ''' + M t + mp i 1 2 i M + m ) t j p j=1 where M is the propellant mass in the ith stage, s is the fraction of propellant in pi i th th the i stage that remains unburned, M ti is the total mass of the j stage before it is ignited, and mp is the mass of the rocket payload. The unburned fraction is very low in modern boosters (e.g., s = 0.0012 in the Minuteman-II first stage) and can therefore usually be ignored.
    [Show full text]
  • The Uncertain Role of the Tank in Modern War: Lessons from the Israeli Experience in Hybrid Warfare
    No. 109 JUNE 2016 The Uncertain Role of the Tank in Modern War: Lessons from the Israeli Experience in Hybrid Warfare Michael B. Kim The Uncertain Role of the Tank in Modern War: Lessons from the Israeli Experience in Hybrid Warfare by Michael B. Kim The Institute of Land Warfare ASSOCIATION OF THE UNITED STATES ARMY AN INSTITUTE OF LAND WARFARE PAPER The purpose of the Institute of Land Warfare is to extend the educational work of AUSA by sponsoring scholarly publications, to include books, monographs and essays on key defense issues, as well as workshops and symposia. A work selected for publication as a Land Warfare Paper represents research by the author which, in the opinion of ILW’s editorial board, will contribute to a better understanding of a particular defense or national security issue. Publication as an Institute of Land Warfare Paper does not indicate that the Association of the United States Army agrees with everything in the paper but does suggest that the Association believes the paper will stimulate the thinking of AUSA members and others concerned about important defense issues. LAND WARFARE PAPER No. 109, June 2016 The Uncertain Role of the Tank in Modern War: Lessons from the Israeli Experience in Hybrid Warfare by Michael B. Kim Major Michael B. Kim currently serves as the Squadron Executive Officer for the 8th Squadron, 1st Cavalry Regiment, 2d Stryker Brigade Combat Team, 2d Infantry Division. Prior to his current position, he graduated from the Command and General Staff College (CGSC), Fort Leavenworth, Kansas, and completed the Art of War Scholars Program.
    [Show full text]
  • Israel's Struggle Against Hamas
    Università degli Studi “Roma Tre” Scuola Dottorale in Scienze Politiche XXV Ciclo Israel’s Struggle Against Hamas Supervisore Dottorando Prof. Leopoldo Nuti Niccolò Petrelli Coordinatore della Sezione Prof. Leopoldo Nuti Introduction The PhD research, ‘Israel’s Struggle against Hamas: Strategic Culture, Adaptation and War’, studies the impact of cultural factors on the Israeli counter-insurgency vis-à-vis Hamas in the period comprised between 1987 and 2005, analyzing to what extent the peculiar traits of the Israeli approach to security and military affairs account for the shaping of a distinct ‘way of war’ and for the successes and failures of the Jewish state in countering the Islamic Resistance Movement’s insurgency. The concept of ‘counter-insurgency’ is logically contingent on that of ‘insurgency’, to which it applies. Being insurgency a protracted struggle to control a contested political space conducted by one or more popularly based non-state challengers1, ‘counter-insurgency’ could be defined as all those measures through which elements of national power are applied for the purpose of suppressing an insurgency. From this definition it appears clear how the concept constitutes an analytical paradigm through which scholars and practitioners approach asymmetric warfare (or war against ‘irregulars’, ‘partisans’ or ‘guerrillas’), that is struggles between non-state and state actors.2 Although old as human civilization, asymmetric warfare rose to prominence after 1945, coming to represent the norm, rather than the exception, of war.3 The end of the Cold War and the last two decades seemed to confirm the ascendancy of this specific kind of warfare over ‘conventional’ or ‘symmetric warfare’ and the setting of a pattern that will probably continue for some time.4 Counter-insurgency represents therefore a topic worth to study not only by virtue of its prominence in the history of warfare, but also in light of the nature of the conflicts confronting the international community, either currently and possibly also in the near future.
    [Show full text]
  • Terrorism in Israel Learning from the Very Best!!
    Saint Leo University, in partnership with Security Solutions International, is proud to announce the course: Terrorism in Israel Learning from the Very Best!! May 15-May 23, 2020-Summer Session Saint Leo Students will earn either 3 undergraduate credits, or 3 graduate credits Saint Leo is the only University that attends this trip! By attending this training course, we will obtain an inside look at the way Israel’s ports, airports, shopping malls, government buildings, critical infrastructure, schools and stadiums are protected. We will be meeting some of the people that are responsible for keeping Israel safe. We will also be learning about Suicide Terror, about VBIEDs, about protecting VIP’s and other high profile targets. The aim of this program is to take away ideas on how to harden targets in our own areas by observing Israeli techniques and translating them to fit our own vulnerabilities, thus better protecting our country from these violent actions. Because the face of terrorism changes more easily than conventional forces, we must always be learning. This is the only way to stay ahead of the threat. Israel is a very small, young country that has accomplished a tremendous amount in a very short time against a background of either full-scale war or protracted low-intensity conflicts throughout most of its existence. Over the last two years, they have managed to stop nearly 95% of the terrorist attacks against them. Through a total of 60 study hours, our students will benefit from their knowledge, and will apply it in areas like Public Safety, School Safety, Port and Airport Security, Aviation Security, Critical Infrastructure and Government Building Security and Dignitary Protection.
    [Show full text]
  • South Africa Missile Chronology
    South Africa Missile Chronology 2007-1990 | 1989-1981 | 1980-1969 | 1968-1950 Last update: April 2005 As of May 28, 2009, this chronology is no longer being updated. For current developments, please see the South Africa Missile Overview. This annotated chronology is based on the data sources that follow each entry. Public sources often provide conflicting information on classified military programs. In some cases we are unable to resolve these discrepancies, in others we have deliberately refrained from doing so to highlight the potential influence of false or misleading information as it appeared over time. In many cases, we are unable to independently verify claims. Hence in reviewing this chronology, readers should take into account the credibility of the sources employed here. Inclusion in this chronology does not necessarily indicate that a particular development is of direct or indirect proliferation significance. Some entries provide international or domestic context for technological development and national policymaking. Moreover, some entries may refer to developments with positive consequences for nonproliferation 2007-1990 26 April 2007 The state-owned arms manufacturer Denel Group has signed a 1 billion rand (143 million U.S. dollars) deal with Brazil to co-develop a new generation missile. The missile will be the next-generation A-Darter, and air-to-air missile designed to meet future challenges of air combat fighters. The partnership will Brazil will bring "much needed skills, training and technology transfer to the country." Furthermore, future export contracts of another 2 billion rand are expected in the next 15 years. — "S. Africa, Brazil sign missile deal," People's Daily Online, 26 April 2007, english.people.com.cn.
    [Show full text]
  • Fighting Terror Effectively: an Assessment of Israel’S Experience on the Home Front
    FIGHTING TERROR EFFECTIVELY: AN ASSESSMENT OF ISRAEL’S EXPERIENCE ON THE HOME FRONT HIGH LEVEL HOME FRONT GROUP NOVEMBER 2016 FIGHTING TERROR EFFECTIVELY: AN ASSESSMENT OF ISRAEL’S EXPERIENCE ON THE HOME FRONT Copyright © 2016 by Friends of Israel Initiative All rights reserved. No part of this publication may be reproduced, distributed, or transmitted in any form or by any means, including photocopying, recording, or other electronic or mechanical methods, without the prior written permission of the publisher, except in the case of brief quotations embodied in critical reviews and certain other non-commercial uses permitted by copyright law. 2 FIGHTING TERROR EFFECTIVELY: AN ASSESSMENT OF ISRAEL’S EXPERIENCE ON THE HOME FRONT TABLE OF CONTENTS HIGH LEVEL HOME FRONT GROUP BIOGRAPHIES 6 FOREWORD 9 EXECUTIVE SUMMARY 10 THE HIGH LEVEL HOME FRONT GROUP 19 SECTION A: ISRAEL’S EXPERIENCE OF TERRORISM AGAINST ITS HOME FRONT 21 ISRAEL’S HISTORIC EXPERIENCE OF TERRORISM 22 1 1.1 Background 22 1.1.1 A Potentially Existential Threat 22 1.2 The History of Terrorism Against Israel 22 1.2.1 Pre-Statehood Violence and Conventional Warfare 22 1.2.2 Cross-Border Terror Raids 23 1.2.3 The Palestine Liberation Organization and the Globalization of Terror Against Israel 23 1.2.4 The Rise of the Terror-Army Hybrid 23 1.2.5 The First Intifada and the First Gulf War 23 1.2.6 Suicide Bombings and The Second Intifada 24 1.2.7 Rocket Attacks from Gaza and Lebanon 25 1.2.8 Terror at Home and Abroad 26 TERRORISM AGAINST ISRAEL TODAY: 2 THE SMALL-SCALE TERROR CAMPAIGN
    [Show full text]
  • Israel's War on Terrorism
    Israel Studies: An Anthology - Israel's War on Terrorism Israel's War on Terrorism: A Historical and Political Perspective By Arie Perliger (April 2009) Introduction March 2002 was a devastating month for the citizens of Israel. The country was in the midst of the Al-Aqsa intifada and the suicide attack campaigns of the Palestinian organizations had reached their peak. Eleven times during this month, suicide bombers blew themselves up in the streets of Israel’s cities, causing more than 579 casualties including 81 fatalities. [1] On another six occasions that same month, the Israeli security forces thwarted attacks before the suicide bombers were able to complete their missions. The Israeli political leadership, however, was not ready to increase its response to the Palestinian attacks. The Israel Defense Forces were instructed to continue limited raids on the infrastructure of the Palestinian organizations in the West Bank and the Gaza Strip, actions which included mainly arrests and intelligence gathering operations. This policy of restraint changed after the night of March 27. In the evening hours of that day, 250 guests were sitting in the festive Park Hotel dining room, cheerfully celebrating the Passover holiday seder. Around 8:00 pm the celebration was halted. A Hamas operative by the name of Abd al-Basset Muhammad Odeh walked into the room and detonated an explosive device that was attached to his upper body. The aftermath was appalling. Twenty-nine Jews were killed and another 144 were injured. [2] The particular horrors of the attack and the fact that it was carried out on the Jewish holiday that celebrates the freedom of the People of Israel created a public and political environment that essentially left Israeli policy makers with no option but to respond with force.
    [Show full text]