Magazin Archive | INSS
go to header go to content go to footer go to search
INSS logo The Institute for National Security Studies, Strategic, Innovative, Policy-Oriented Research, go to the home page
INSS
Tel Aviv University logo - beyond an external website, opens on a new page
  • Campus
  • Contact
  • עברית
  • Support Us
  • Research
    • Topics
      • Israel and the Global Powers
        • Israel-United States Relations
        • Glazer Israel-China Policy Center
        • Russia
        • Europe
      • Iran and the Shi'ite Axis
        • Iran
        • Lebanon and Hezbollah
        • Syria
        • Yemen and the Houthi Movement
        • Iraq and the Iraqi Shiite Militias
      • Conflict to Agreements
        • Israeli-Palestinian Relations
        • Hamas and the Gaza Strip
        • Peace Agreements and Normalization in the Middle East
        • Saudi Arabia and the Gulf States
        • Turkey
        • Egypt
        • Jordan
      • Israel’s National Security Policy
        • Military and Strategic Affairs
        • Societal Resilience and the Israeli Society
        • Jewish-Arab Relations in Israel
        • Climate, Infrastructure and Energy
        • Terrorism and Low Intensity Conflict
      • Cross-Arena Research
        • Data Analytics Center
        • Law and National Security
        • Advanced Technologies and National Security
        • Cognitive Warfare
        • Economics and National Security
    • Projects
      • Preventing the Slide into a One-State Reality
      • Contemporary Antisemitism in the United States
      • Perceptions about Jews and Israel in the Arab-Muslim World and Their Impact on the West
  • Publications
    • -
      • All Publications
      • INSS Insight
      • Policy Papers
      • Special Publication
      • Strategic Assessment
      • Technology Platform
      • Memoranda
      • Posts
      • Books
      • Archive
  • Database
    • Surveys
    • Spotlight
    • Maps
    • Dashboards
  • Events
  • Team
  • About
    • Vision and Mission
    • History
    • Research Disciplines
    • Chairman of the Board
    • Board of Directors
    • Fellowship and Prizes
    • Internships
  • Media
    • Communications
    • Video gallery
    • Press Releases
  • Podcast
  • Newsletter
  • Campus
Search in site
  • Research
    • Topics
    • Israel and the Global Powers
    • Israel-United States Relations
    • Glazer Israel-China Policy Center
    • Russia
    • Europe
    • Iran and the Shi'ite Axis
    • Iran
    • Lebanon and Hezbollah
    • Syria
    • Yemen and the Houthi Movement
    • Iraq and the Iraqi Shiite Militias
    • Conflict to Agreements
    • Israeli-Palestinian Relations
    • Hamas and the Gaza Strip
    • Peace Agreements and Normalization in the Middle East
    • Saudi Arabia and the Gulf States
    • Turkey
    • Egypt
    • Jordan
    • Israel’s National Security Policy
    • Military and Strategic Affairs
    • Societal Resilience and the Israeli Society
    • Jewish-Arab Relations in Israel
    • Climate, Infrastructure and Energy
    • Terrorism and Low Intensity Conflict
    • Cross-Arena Research
    • Data Analytics Center
    • Law and National Security
    • Advanced Technologies and National Security
    • Cognitive Warfare
    • Economics and National Security
    • Projects
    • Preventing the Slide into a One-State Reality
    • Contemporary Antisemitism in the United States
    • Perceptions about Jews and Israel in the Arab-Muslim World and Their Impact on the West
  • Publications
    • All Publications
    • INSS Insight
    • Policy Papers
    • Special Publication
    • Strategic Assessment
    • Technology Platform
    • Memoranda
    • Posts
    • Books
    • Archive
  • Database
    • Surveys
    • Spotlight
    • Maps
    • Dashboards
  • Events
  • Team
  • About
    • Vision and Mission
    • History
    • Research Disciplines
    • Chairman of the Board
    • Board of Directors
    • Fellowship and Prizes
    • Internships
    • Privacy Policy and Terms of Use
  • Media
    • Communications
    • Video gallery
    • Press Releases
  • Podcast
  • Newsletter
  • Campus
  • Contact
  • עברית
  • Support Us
bool(false)

Home Magazin

Military and Strategic Affairs

עברית

Search publication

Volume 8

No. 1, July 2016
Military and Strategic Affairs
The Challenges Facing the Israel Defense Forces, 2015–2016
(This essay is an edited transcript of the chief of staff’s speech at the annual conference of the Institute for National Security Studies in January 2016.) The challenges facing the Israel Defense (IDF) Forces (IDF) in the foreseeable future are composed of three main factors. The first is Israel’s rapidly changing strategic environment. The nuclear deal between Iran and the superpowers and the subsequent lifting of the sanctions against Iran constitute a strategic turning point for the IDF’s major threat over the past decade. The...
Gadi Eisenkot
01.07.2016
Military and Strategic Affairs
Principles of the Israeli Political-Military Discourse Based on the Recent IDF Strategy Document
Relations between the military and political echelons in Israel are complex and multifaceted, both in theory and in practice. The problems resulting from the interface between the two have at times resulted in ineffective military deployment or a crisis of expectations. Moreover, as the positions of the political echelon are never unanimous, its directives to the military have not always been aligned with the government’s position, and sometimes even have been nebulous. In August 2015, the Israel Defense Forces (IDF) released a...
Kobi Michael | Shmuel Even
01.07.2016
Military and Strategic Affairs
Information-Sharing Challenges in an Intra-Sectorial Environment
Information sharing in cyberspace includes the sharing of attack methods, tools and means of attack, targets of an attack, weaknesses discovered, and ways of dealing with threats. Information sharing constitutes a strategic defensive principle. It is aimed at enhancing general strength in cyberspace. Various and diverse information-sharing initiatives are currently operating in Israel and throughout the world, but they are not as effective as they could be. This article addresses a number of economic and political challenges facing...
Gabi Siboni
01.07.2016
Military and Strategic Affairs
The Israeli Home Front Command: Missions, Challenges, and Future Prospects
The Israeli Home Front Command has undergone many phases of change until having reached its present level of preparedness for providing the adequate response to man-made security challenges. This level of performance raises several serious questions regarding its capacity to serve as Israel’s primary agent of response to major disruptions, extensive man-made security hazards, and natural novel risks. Its future success in standing up to wide-scale challenges will depend not only on its own level of preparedness, but also on its...
Meir Elran
01.07.2016
Military and Strategic Affairs
The Death of Human Intelligence: How Human Intelligence Has Been Minimized Since the 1960s
Since the beginning of time, the collection of human intelligence (HUMINT) has been the cornerstone of gaining an advantage over one’s enemies. Over the past fifty years, the United States, under three particular administrations, has tried to end the process of HUMINT collection. HUMINT has always been associated with tradecraft and the necessity to work with unsavory characters. The information gleaned from these characters, however, has proven both vital and important in terms of defending against a threat as well as pursuing an...
Bradley A. Lewis
01.07.2016
Military and Strategic Affairs
The Khorasan Group
The threat posed by the Islamic State to many nations has led to the formation of an international coalition whose forces have been bombing Islamic State targets in Iraq and Syria. Some of the bombings in Syria have targeted the strongholds of the Khorasan group. Very little is known about this group. It appears to be an international terrorist cell that settled in Syria under the cover of the country’s chaos in order to plan attacks against the West and train its members to carry them out. In September 2014, the United States...
Ariel Koch
01.07.2016
Military and Strategic Affairs
Combating Terrorism: Socioeconomic Issues, Boko Haram, and Insecurity in the North-East Region of Nigeria
The discourse on the root causes of the Boko Haram domestic terrorism group rages on in Nigeria, as extremists continue to lure destitute militants to their cause. Counter-terrorism needs to focus its efforts on eradicating the breeding grounds for these impoverished sympathizers. A new strategy and a new method should be adopted to prevent the threat of domestic terrorism. Fighting domestic terrorism with human development, specifically social and economic development, should emerge as a new public narrative and long-term objective...
Oluwaseun Bamidele
01.07.2016

Volume 7

No. 1, March 2015
Military and Strategic Affairs
Helicopters against Guerrilla and Terrorism: The Uniqueness of the Israeli Model
This essay discusses the role of the IDF’s fighter helicopters in Israel’s ongoing war against non-state actors. The essay first discusses the theoretical aspect of deploying aerial forces in a war against non-state actors and the advantages inherent in attack helicopters. The second part of the essay analyses the use of helicopters in armies around the world in this type of warfare, highlighting the IDF’s unique modus operandi, which is discussed in the third part of the essay. The essay’s conclusion is that the IDF does not view...
Tal Tovy
01.03.2015
Military and Strategic Affairs
Are Cyber Weapons Effective Military Tools?
Cyber-attacks are often viewed in academic and military writings as strategic asymmetric weapons, great equalizers with the potential of leveling the battlefield between powerful nations and those less capable.  However, there has been little evidence to suggest that cyber-attacks are a genuine military option in a state-on-state conflict. In instances of actual military operations (e.g., Afghanistan, Georgia, Iraq, and Israel/Gaza), there is little accompanying evidence of a military conducting cyber-attacks against either a...
Emilio Iasiello
01.03.2015
Military and Strategic Affairs
The IDF’s PR Tactics for Arab Television Channels
This essay examines the tactics used by IDF representatives in their interviews with Arab television channels to maintain the legitimacy of the struggle against the Palestinians and justify the use of force in that struggle. The essay, based on research analyzing dozens of interviews held by the al-Jazeera and al-Arabiya networks with IDF spokespeople, shows that the IDF uses three primary tactics to achieve that goal: denial, avoidance of responsibility, and attempts to downplay the perceived measure of aggression of the event in...
Yonatan Gonen
01.03.2015
Military and Strategic Affairs
Non-State Actors: A Theoretical Limitation in a Changing Middle East
The turmoil that has beset the Middle East since December 2010 deepened the instability and surfaced various conflicts and tensions that have been characteristic of the region throughout history. These events reveal the importance of non-state actors in the Middle East and give rise to the need to rethink “facts,” terms, and concepts connected to the phenomenon of the nation-state, practically and theoretically. Although non-state actors are not new in the global or Middle Eastern political landscape, it is evident that the...
Carmit Valensi
01.03.2015
Military and Strategic Affairs
Critical Infrastructures and their Interdependence in a Cyber-Attack – The Case of the U.S.
The growing use of information technology, monitoring, and control through computerized control systems, together with the increasing dependence of the free market on products and services supplied through infrastructure (for example, electric power), have increased interdependency between infrastructures. Consequently, an attack on critical infrastructure is liable to have a decisive effect on the functioning of other infrastructures. The interdependence between infrastructures requires those involved in planning a cyber-attack as...
Gil Baram
01.03.2015
Military and Strategic Affairs
Considering Operation Protective Edge: Can Declaration of War Be Part of a Strategy to Offset the Asymmetry of the Israeli-Hamas Conflict in the Gaza Strip?
Three rounds of violence between Israel and Hamas since 2008 have not resulted in any change to the fundamental essence of the conflict. Israel is trapped in an asymmetrical conflict with increasingly intense violence, a reality in which Hamas manages to prove the “Paradox of Power”: Israel’s military strength becomes its weakness while Hamas’ military weakness becomes its strength. Seeing Gaza as a state-like entity and declaring war on it may help alter public opinion, allowing for definition of clear goals and less engagement in...
Kobi Michael
01.03.2015
Military and Strategic Affairs
The Islamic State’s Strategy in Cyberspace
The success of the Islamic State (ISIS) includes the integration of interrelated elements in a way that helps the organization consolidate its control of extensive regions, serve as the current spearhead in the global Jihad effort, and threaten the world with terrorist attacks carried out by its agents holding citizenship in a Western country. These agents are liable to return to their homeland and along with “lone wolves” they are liable to carry out terrorist attacks against targets in the West. The aim of this article is to...
Gabi Siboni | Daniel Cohen | Tal Koren
01.03.2015
No. 2, August 2015
Military and Strategic Affairs
Social Resilience in the Jewish Communities around the Gaza Strip Envelope during and after Operation Protective Edge
This study examines and measures the social resilience of the residents of the Gaza Strip area during Operation Protective Edge in summer 2014 and thereafter. We provide an overview of the concept of resilience, focusing on the phenomenon of bouncing back towards recovery following the functional decline as a result of stressful events. Social resilience is measured here by three behavioral yardsticks: demographics and evacuation, therapeutics and education, and employment and economics. We chose two regional councils to represent...
Meir Elran | Zipi Israeli | Carmit Padan
01.09.2015
Military and Strategic Affairs
Debts of Honor, Costs of War: The Media’s Treatment of the Question of Casualties during Operation Protective Edge
Casualties first appeared on the public, political-military, and media agenda in the democratic, Western world in the 1990s. This article seeks to examine the Israeli media’s coverage of military casualties during Operation Protective Edge, especially in light of past patterns of reporting. Despite the public feeling that the operation was necessary, coverage did not totally revert to “traditional” patterns. During the case in point, the media dealt with causalities and the human price paid in war; however, it tried consciously to...
Zipi Israeli | Elisheva Rosman
01.09.2015
Military and Strategic Affairs
Social Protest in Operation Protective Edge: A Civilian Attempt to Challenge the Political Security Discourse
This essay examines the new civilian protest movement formed in the western Negev during Operation Protective Edge, and its implications for the political security discourse at the local and national level in Israel. Although this social movement arose out of a local security hardship, its activity is relevant to the country as a whole; the movement challenges the “rounds approach” that has emerged in recent years as the prevalent pattern of action in the context of the Israel-Hamas conflict. The movement tries to convey the message...
Carmit Padan
01.09.2015
Military and Strategic Affairs
Will Hamas be Better Prepared during its Next Confrontation With Israel?
Operation Protective Edge (July 7-August 26, 2014) was the longest and most complex military challenge in a continuing cycle of violence between the State of Israel and Hamas since the organization’s inception in 1987. It is still too early to assess the achievements and the results of the military campaign, which are still not sufficiently clear for either side, and to determine whether Israel succeeded in achieving its primary aim of establishing longterm deterrence. Throughout the campaign, Hamas used all its capabilities,...
Gabi Siboni | A. G.
01.09.2015
Military and Strategic Affairs
The Strategy for Integrating the Private Sector in National Cyber Defense in Israel
In February 2015, the Israeli government approved the establishment of the National Cyber Defense Authority, which will constitute the state’s operational arm for the defense of the civilian sphere against cyber threats. One of the state’s challenges is to integrate the private sector in this activity, both as the main consumer of defense and as a participant in the defense system. This article proposes a strategy for the state’s handling of this problem. In general, it is proposed that the state will defend the national...
Shmuel Even
01.09.2015
Military and Strategic Affairs
Israeli Black Flags: Salast Jihadi Representations in Israel and the Rise of the Islamic State Organization
Over the last two years, the Islamic State organization has become one of the most dangerous elements in the Middle East. Its very existence, essence, and actions affect many nations throughout the world; its effect is most striking in the Middle East. This terrorist organization, flying the black flag as its official banner, represents an extreme branch of orthodox Sunni Islam, challenging all existing orders of governance and seeking to replace them with an Islamic regime that imitates the conduct and way of life typical of the...
Ariel Koch
01.09.2015
Military and Strategic Affairs
More on Blood and Treasure
As a follow-up to the article “Blood and Treasure” published in Military and Strategic Affairs in March 2014, the author argues that military commanders and economists need to work together, rather than in parallel channels that never intersect.
Saul Bronfeld
01.09.2015
No. 3, December 2015
Military and Strategic Affairs
Between Imagined Reality and Real Terrorism
This essay focuses on how the Islamic State and other non-state actors use media and technology to influence individuals and groups by combining Internet activity with activity in the real world. The Islamic State functions in an actual physical and geographical space, in cyberspace, and within the conscious realm. Eachserves the Islamic State’s communications, propaganda, psychological warfare, and recruitment, influencing individuals and groups and inducing them to carry out “spontaneous” acts of terrorism. The way the Islamic...
Daniel Cohen
01.12.2015
Military and Strategic Affairs
What Should be the Role and Responsibility of the Government in Defending Private and Commercial Digital Intellectual Property?
The rapid development of cyberspace has led to a growing threat of criminally motivated cybertheft of intellectual property in general, and of commercial and private digital trade secrets in particular. This kind of cybercrime could have a critical impact on the international macro-economic system, including potential massive loss of tax revenue and drop in GDP. While most countries have strategic cyber defense doctrines to protect their physical critical infrastructures against politically motivated cyber warfare, they still lack...
Ron Shachar
01.12.2015
Military and Strategic Affairs
Cyberspace Espionage and its Effect on Commercial Considerations
Cyberspace is becoming the primary and most effective tool for commercial espionage and the theft of information and intellectual property. It allows the attacker a technological shortcut, giving him the competitive edge over the market in general and the defender in particular. This essay examines whether the need to confront cyberspace threats in general and, more specifically, organizational information security affects the considerations of decision makers in commercial enterprises. Decisions relating to the feasibility of...
Gabi Siboni | David Israel
01.12.2016
Military and Strategic Affairs
Has the “Spider Web” Theory Really Collapsed? Casualty Sensitivity during Operation Protective Edge
The public discourse during Operation Protective Edge (2014) reflected a higher degree of willingness to accept military casualties than it had during previous wars or operations, particularly the Second Lebanon War (2006). In this article, I seek to clarify the prevailing argument regarding Israeli society’s greater willingness to accept military deaths, and to show that this argument should not be accepted at face value. My argument is that casualty sensitivity exists, but it is more complex than it appears to be and is also...
Yagil Levy
01.12.2016
Military and Strategic Affairs
China’s Strategic Nuclear Arms Control: Avoiding the “Thucydides Trap”
The “Thucydides Trap” refers to the propensity in history for rising states to challenge putative hegemons or other leading powers for international position, sometimes resulting in war. China’s growing military and economic power in the twenty-first century challenges American and Russian leadership on international security issues, including nuclear arms control and nonproliferation. Yet strategic nuclear arms reductions have still proceeded in a two-sided framework of US-Russian negotiations. Despite obvious difficulties, China...
Stephen J. Cimbala
01.12.2015
Military and Strategic Affairs
HUMINT in the Cybernetic Era: Gaming in Two Worlds
The cyber era has caused enormous changes in intelligence and intelligence gathering. This article discusses whether the profession of human intelligence (HUMINT) is currently still relevant when cyberspace constitutes the main scene for intelligence gathering and action. If so, what missions should it assume, and are new opportunities being created for new operational methods in the cyber era? The article examines the substance of the HUMINT discipline and the challenges that cyberspace poses to this discipline. It also addresses...
Avi Tal | David Siman-Tov
01.12.2015

Volume 6

No. 1, March 2014
Military and Strategic Affairs
In Retrospect: The Second Lebanon War
The processes that led to the Second Lebanon War and the events that took place during the war are analyzed six years after the war. The starting point for the analysis is the withdrawal from Lebanon in 2000, which, according to the analysis, was justified. However, from a broad perspective, it is evident that the overall processes since the withdrawal led to strategic choices that resulted in the IDF’s reduced operational preparedness. The article examines the decision making processes near the start of and during the course of the...
Ehud Olmert
01.03.2014
Military and Strategic Affairs
Nuclear Weapons in Asia: Perils and Prospects
The spread of nuclear weapons in Asia threatens nuclear deterrence and crisis stability in the region and offers unique challenges to United States and allied security. The article contrasts two possible futures for nuclear Asia: a relatively more constrained proliferation regime with tiered levels of agreed deployment ceilings among states; and an unconstrained nuclear arms race in Asia. Not only regional tensions, but also the overlap between regional and global antagonisms and ambitions might upset nuclear deterrence stability in...
Stephen J. Cimbala
01.03.2014
Military and Strategic Affairs
Commercial and Industrial Cyber Espionage in Israel
Cyberspace is especially suited to the theft of business information and to espionage. The accessibility of information, along with the ability to remain anonymous and cover one’s tracks, allows various entities to engage in the theft of valuable information, an act that can cause major damage. Israel, rich in advanced technology and a leader in innovation-based industries that rely on unique intellectual property, is a prime target for cyber theft and commercial cyber attacks. This article examines the scope of cyber theft and cyber...
Shahar Argaman | Gabi Siboni
01.03.2014
Military and Strategic Affairs
Blood and Treasure: On Military and Economic Thinking
This article argues that there is little difference between military thinking and true economic thinking, which is different from accounting-budgetary thinking. Most of the substantive disagreements between military commanders and economists stem from objective difficulties in predicting the future and quantifying the important components of risk, cost, and benefit. Other disagreements result from vested interests or mere egotistical issues. The article will also explore the problematic manner in which the defense budget is drafted,...
Saul Bronfeld
01.03.2014
Military and Strategic Affairs
Iron Dome’s Impact on the Military and Political Arena: Moral Justifications for Israel to Launch a Military Operation against Terrorist and Guerrilla Organizations
The military and political arenas are closely linked in Israel’s fight against terrorist and guerrilla organizations. Israel is a democratic country subject to legal and moral constraints and restraints, and therefore, when it initiates a military operation against such organizations, its justifications are important, as they will later affect its international legitimacy or lack thereof. This article discusses the Iron Dome system, which is designed to provide active protection for Israeli citizens. It attempts to answer...
Liram Stenzler-Koblentz
01.03.2014
Military and Strategic Affairs
Russia’s Security Intentions in a Melting Arctic
As the only non-NATO littoral state in the Arctic, Russia’s policies have great relevance for the region’s security environment. A series of military deployments and announced upgrades to infrastructure and weapon systems since 2007 have led to speculations that Moscow seeks to remilitarize its Arctic sector in anticipation of a warmer climate in the region. Using strategy documents and policy pronouncements since 2008 as instruments of analysis, this paper considers Moscow’s security intentions in a climatically changing Arctic. The...
Lincoln Edson Flake
01.03.2014
No. 2, August 2014
Military and Strategic Affairs
UN Peacekeeping Forces: Preventive Diplomacy and Its Limitations
Despite UN peacekeeping forces’ extensive activity in several conflict areas around the world, its abilities and effectiveness are limited. Furthermore, there is a lack of agreement and clarity regarding its legal and political aspects. The Israeli-Arab conflict has been the primary testing grounds in terms of developing the notion of peacekeeping during the Cold War, and stationing forces along and beyond Israel’s borders has served as means of “preventive diplomacy.” The end of the Cold War provided impetus for a number of...
Avi Beker
01.08.2014
Military and Strategic Affairs
Changing Trends in Unmanned Aerial Vehicles: New Challenges for States, Armies and Security Industries
In recent years, the use of unmanned aerial vehicles has been on the rise. However, there is an evident change in constituent components. As the number of countries utilizing these vehicles continues to increase, the manufacturing process has been revolutionized, allowing many nations and commercial companies to manufacture and sell UAVs to the highest bidder. The changes in manufacturing processes have given rise to an expansion of their possible use, including terror. These changes require a reevaluation in order to face the...
Liran Antebi
01.08.2014
Military and Strategic Affairs
Inter-Organizational Training for the Emergency Management System
The development and deployment of the Iron Dome system during Operation Pillar of Defense in November 2012 and Operation Protective Edge in the summer of 2014, demonstrated impressive technological capabilities. In addition, it indicated the need for an increased professionalization among the personnel engaged in emergency management, and the creation of a structured professional identity transcending organizational affiliation. Government Decision 1661 transferred the powers previously held by Israel’s Ministry of Home Front Defense...
Alex Altshuler | Meir Elran
01.08.2014
Military and Strategic Affairs
Protecting Foreign Manpower in the Israeli Gas Industry: Lessons from Nigeria
Global experience with oil and natural gas production indicates that international energy companies do not refrain from operating in areas of conflict and are not easily deterred by periodic terrorist attacks on their facilities. However, the case of the Nigerian Movement for the Emancipation of the Niger Delta (MEND) shows that even large corporations are liable to close their facilities when there is a direct attack on their foreign (non-local) employees. Israel can learn from the Nigerian experience how to cope with the...
Elai Rettig
01.08.2014
Military and Strategic Affairs
Sri Lanka and the Tamil Tigers: Conflict and Legitimacy
The Liberation Tigers of Tamil Eelam (LTTE) was founded in 1976, demanding the establishment of an independent state for the Tamil ethnic minority in northern and northeastern Sri Lanka. In May 2009, following over three decades of conflict, its leader, Velupillai Prabhakaran was killed and the group was dismantled. The LTTE was established long before other well-known terror groups emerged, and yet it received little attention in comparison. An analysis of the relations between Sri Lankan governments and the Tamil Tigers from the...
Shlomi Yass
01.08.2014
Military and Strategic Affairs
Developments in Iranian Cyber Warfare 2013-2014
In the course of 2013, Iran became one of the key players in the international cyber warfare theater. This development is a result of both defensive and offensive cyber force buildup processes and a measured relaxation of restraints on the part of Iranian decision makers with respect to offensive activity in cyberspace. Indeed, the Iranian activity points to major qualitative advances in Iran’s technological and operational cyber capabilities. This article examines the activity and progress in Iran’s cyber defense system, and the...
Gabi Siboni | Sami Kronenfeld
01.08.2014
No. 3, December 2014
Military and Strategic Affairs
From Plowshares to Swords? UN Forces on Israel’s Borders in the Second Decade of the Twenty-First Century
This article examines the contribution made by peacekeeping operations on Israel’s borders to regional stability since Israel’s establishment, especially in the face of the challenge posed by armed non-state actors in the second decade of the twenty-first century. The article is divided into three parts. The first part presents the main changes in the operating principles of peacekeeping missions from the Cold War to the present. The second provides a concise overview of the rationale for peacekeeping operations on Israel’s borders....
Chen Kertcher
01.12.2014
Military and Strategic Affairs
Hasn’t the Time Come for the Political Training of Senior IDF Officers?
The Harpaz Affair has revealed one of the worst crises in the history of the relations between the political and military echelons in Israel. Despite the great interest in the affair, one crucial aspect of the relations between then-Minister of Defense Ehud Barak and then-IDF Chief of Staff Gabi Ashkenazi has been ignored: the battle between the two over the “general headquarters” section of the IDF Supreme Command orders, which sets forth the status of the Defense Minister vis-à-vis the IDF Chief of Staff and reflects who is head of...
Yoram Peri
01.12.2014
Military and Strategic Affairs
The RMA Theory and Small States
The current Revolution in Military Affairs (RMA) theory has been the focus of academics and military analysts, trying to define the role of technology in transforming military affairs during the past three decades. However, despite the vast literature on the subject, only a limited number of studies look into the implications of RMA on small states. The emphasis on great powers, as some scholars suggest, is a reflection of the fact that the broader strategic studies literature does not necessarily consider small states, as their...
Francis Domingo
01.12.2014
Military and Strategic Affairs
A Multidisciplinary Analysis of Cyber Information Sharing
The emergence of the cyber threat phenomenon is forcing organizations to change the way they think about security. One of these changes relates to organizations’ policy on sharing cyber information with outside parties. This means shifting away from the view of the organization as an isolated, compartmentalized entity towards a view of the organization as a sharing one. Sharing generates a complex, multifaceted challenge to technology, law, organizational culture and even politics. Establishing a system of sharing serves many...
Aviram Zrahia
01.12.2014
Military and Strategic Affairs
Yemen: A Mirror to the Future of the Arab Spring
Ethnic, political, and religious rifts make Yemen one of the most complex arenas in the Middle East, even more so following the eruption of the Arab Spring, which in November 2011 ended the 33-year regime of President Ali Abdullah Saleh. The disintegration of the delicate political balance Saleh created has brought Yemen to the brink of an abyss with competing elites, ethnic revolts, separatists, external intervention and fundamentalist terrorism threatening to divide the country while hindering the new regime’s attempts to build a...
Sami Kronenfeld | Yoel Guzansky
01.12.2014
Military and Strategic Affairs
Managing Intellectual Property in the Defense Establishment: Opportunities and Risks
In Israel, there is a consensus on the value of all knowledge generated in the defense establishment and its contribution to the economy. But in the State Comptroller’s report of March 2014, the management of intellectual property (IP) at the Ministry of Defense was described as an ongoing fiasco, with the blame ascribed to both the Ministry of Defense and the Ministry of Finance. This essay seeks to contribute to the discourse on remedying the flaws and suggest some organizing principles in the management of IP, while considering...
Shmuel Even | Yesha Sivan
01.12.2014
Military and Strategic Affairs
And What If We Did Not Deter Hizbollah?
The consensus in Israel is that Hizbollah was deterred as a result of the Second Lebanon War, that because of the damage sustained by the group and its supporters, it refrained from fighting against Israel, and that quiet that has reigned on the northern border was a result of the war. In fact, most of the arguments supposedly proving that Hizbollah was deterred are less clear-cut than they appear. The majority of Hizbollah’s actions, both before and after the war, can be explained by other factors—domestic Lebanese and...
Yagil Henkin
01.12.2014

Volume 5

No. 1, May 2013
Military and Strategic Affairs
Legal Transparency as a National Security Strategy
This article will not offer a legal analysis or presume to take sides in the ongoing debate between the administration and its critics on legal positions regarding military and security issues. The basic assumption of this series of speeches asserted that such a discussion is unavoidable and even essential in any democratic country. The problem is that when it heats up, particularly in wartime, the debate is liable to frame the tension between security and values as an inevitable choice between them. Obama identified this...
Yoni Eshpar
01.05.2013
Military and Strategic Affairs
The Effect of Cyberwar Technologies on Force Buildup: The Israeli Case
The aim of this article is to present the role of cyber warfare technology in Israel’s security doctrine and to examine Israel’s preparations for dealing with the cyber threat by evaluating three necessary levels: (1) formulating a regular strategy for handling the threat posed by the development of cyber warfare technology; (2) allocating resources and budgets; and (3) effecting changes in the manner in which Israel builds its forces. An assessment of government publications will presumably demonstrate the importance of...
Gil Baram
01.05.2013
Military and Strategic Affairs
The Classic Cyber Defense Methods Have Failed – What Comes Next?
The classic defense methods employed throughout the world in recent decades are proving unsuccessful in halting modern malware attacks that exploit unknown (and therefore still unsolved) security breaches called “zero-day vulnerabilities.” This article proposes an up-to-date approach, based on an analysis of sensitive information that must be protected, for the purpose of identifying anomalous behavior. The article further proposes relying on the data to be protected as a source of knowledge for developing the defense...
Amir Averbuch | Gabi Siboni
01.05.2013
Military and Strategic Affairs
The Proliferation of Weapons in Cyberspace
Cyberspace is a phenomenon whose fundamental nature is to utilize an electromagnetic field for human purposes by means of technology. This article argues that such technology is a type of weapon. A common dictionary definition of “weapon” is “any instrument used in combat” or “any means employed to get the better of another.” A “cyber weapon,” therefore, is one that strikes with the purpose of vanquishing another by attacking systems connected to cyberspace. Cyber weapons can be used as...
Daniel Cohen | Aviv Rotbart
01.05.2013
Military and Strategic Affairs
Lessons from the Iron Dome
This article focuses on the Iron Dome system, which entered into operational service in early 2011 and demonstrated what it was capable of within a few months of its deployment. The article attempts to examine the lessons from the system’s deployment and to reassess the decision about purchasing the system. It will also examine future ramifications of deploying this system and other systems that are expected to enter into service in the near future.
Yiftah Shapir
01.05.2013
Military and Strategic Affairs
Determining Norms for Warfare in New Situations
The ethical doctrine of the war on terror is a set of principles that reflects an orderly conception dealing with the proper ways of conducting warfare against terrorism. Such a doctrine mediates between abstract values such as the “IDF spirit,” designed to guide commanders’ and soldiers’ behavior in any circumstances during their operations, and regulations, ROEs, and orders given to guide their behavior in a mission of a certain kind, under specific circumstances, at a specific time, and in a specific place....
Asa Kasher | Amos Yadlin
01.05.2013
Military and Strategic Affairs
Duqu's Dilemma: The Ambiguity Assertion and the Futility of Sanitized Cyberwar
The debate over the applicability or non-applicability of international law to cyberwar and the need for a cyber-specific international treaty might be irrelevant. Both camps, pro and con, argue about the need for cyberwar to have the Law of Armed Conflict (LOAC) or some new international legislation properly cover the cyber domain. Both camps, however, misread how the structure of the cyber domain precludes strategically “piggybacking” on conventional norms of war. International laws on conventional war are effective...
Matthew Crosston
01.05.2013
No. 2, September 2013
Military and Strategic Affairs
Processes of Military Decision Making
This essay examines the prevalent theoretical approaches to decision making and surveys practical models appropriate to the military setting. It discusses and compares the relative advantages and disadvantages of each model, and then makes recommendations about their application to the military decision making process. Currently, two major approaches, the rational and the cognitive, offer an orderly process that may help military leaders make better decisions. Neither is yet complete. Each approach offers its own set of concepts to...
Dudi (Yehuda) Alon
01.09.2013
Military and Strategic Affairs
Korea’s Wartime Command: Sovereignty, Security, and Independence
This article deals with South Korea’s security policy and its strategic relations with the United States. It analyzes Seoul’s policy vis-à-vis wartime command over the years, particularly the inluences of complex internal and external elements. The article describes how and why the transfer of command in wartime was delayed for many years, and addresses the inluences of former South Korean President Roh Moo-hyun, the military forces, the South Korean media, and North Korea in the process.
Alon Levkowitz
01.09.2013
Military and Strategic Affairs
Military Contrarianism in Israel: Room for Opposition by the Chief of Staff to Politicians
This article offers a structural analysis of the relations between the military and the political echelon on the basis of theories concerning the military’s bargaining space vis-à-vis the government. It contends that when the military perceives the conduct of politicians as harmful, it has a tendency to resist by demonstrating its independence and attempting to thwart the politicians’ will. The form and intensity of the military’s opposition is derived from the intersection between the level of perceived harm done to the military and...
Yagil Levy
01.09.2013
Military and Strategic Affairs
Who Will Stop the Robots?
Unmanned tools and systems play an increasingly large role in the modern battlefields, as these tools have significant advantages that encourage many countries and violent non-state actors to develop and use them. At the same time, this advanced technology raises moral, ethical, legal, and social concerns and questions. This article explains basic terms in the area of unmanned warfare, examines the developments made in the past twenty years, and presents the United States’ future plans in the field. It raises various challenges...
Liran Antebi
01.09.2013
Military and Strategic Affairs
The Military Secretary at the Junction of Israel’s Security Decisions
The prime minister’s military secretary is an officer with the rank of major general whose official role is to serve as a liaison between the prime minister and the IDF and other security agencies. In practice, his duties are more extensive, and thus his position is one of the most influential ones in the decision making process on security issues in Israel. Nevertheless, the military secretary does not have formal responsibility in the realm of national security, nor does he have a professional staff at his disposal. On certain...
Shmuel Even
01.09.2013
Military and Strategic Affairs
The Revolutionary Guards and the International Drug Trade
The Revolutionary Guards are significantly involved in the international drug trade, both directly and through proxies. This involvement provides the organization with access to sources of financing that bypass international sanctions, as well as to sophisticated operational platforms that support its subversive efforts aimed at the West. For Iran’s enemies, and especially to Israel, the link between a global, sophisticated, and determined organization as the Revolutionary Guards and the world of organized crime is a phenomenon that...
Sami Kronenfeld | Yoel Guzansky
01.09.2013
Military and Strategic Affairs
Cyber Weapons and International Stability
Though cyberspace is a domain of strategic importance, cyber weapons have not yet been associated with publicly well-enunciated doctrines of use comparable to that of the nuclear age. Taking two very different approaches from the strategic literature—Jervis’ security dilemma and Zagare & Kilgoure’s perfect deterrence model—cyber weapons are demonstrated in both cases to induce a higher level of international instability. In particular, instability is favored by the attribution issue and the lack of clear thresholds. The outline...
Guy-Philippe Goldstein
01.09.2013
Military and Strategic Affairs
Don’t Terminate: Deter to Prevent
In “On Nuclear War: Deterrence, Escalation, and Control” (Military and Strategic Affairs, December 2012), Professor Stephen Cimbala discusses various reasons for the failure of nuclear deterrence and expresses doubts about deterrence for several reasons. These include decisions (by the target of deterrence) that are not based on cost-benefit analysis; irrationality; and misunderstandings.
Uri Rechav
01.09.2013
No. 3, December 2013
Military and Strategic Affairs
The Threat of Terrorist Organizations in Cyberspace
This article discusses the threat of terrorism in cyberspace and examines the truth of the perceptions of this threat that have formed in recent years. It examines the capabilities that a non-state actor can achieve and whether these can constitute a real threat to the national security of states. For an analysis of the main threats facing a state from a multi-year perspective and in light of anticipated changes in a state’s strategic balance, the factors that threaten the state are presented and the roots of the threat are...
Gabi Siboni | Daniel Cohen | Aviv Rotbart
01.12.2013
Military and Strategic Affairs
Intelligence 2.0: A New Approach to the Production of Intelligence
In recent years, intelligence has undergone profound changes, both in relationships within the intelligence system and in relations between it and the political and military environment that it serves. These changes are also reflected in the practice of intelligence today and in the new concepts appearing in the discourse on intelligence, which are displacingthe traditional approaches, now outdated. The developments in intelligenceare the necessary result of the profound changes taking place in the human situation and in the nature...
David Siman-Tov | Ofer G.
01.12.2013
Military and Strategic Affairs
Is Might Right? Boko Haram, the Joint Military Task Force, and the Global Jihad
This paper critically examines the ongoing religious terrorism of Boko Haram  in northern Nigeria, focusing on why the group exists and its growing connection to the global jihad. It evaluates the coercive and conciliatory responses of the Nigerian government to Boko Haram, with particular reference to the Joint Military Task Force. Problematizing a security-only, killing approach to dealing with religious terrorism, it argues that countries fighting terror abroad should learn from the Nigerian experience of fighting Boko Haram that...
Daniel E. Agbiboa
01.12.2013
Military and Strategic Affairs
A Renewed, Sophisticated Containment Policy: Mastering and Constraining War and Violent Conflict in World Society
Preventing Iran from attaining nuclear weapons contravenes a particular understanding of containment. However, a renewed and sophisticated containment policy understood as mastering and constraining great wars and mass violence, including combating the spread of WMD and the escalation of violent conflicts, should be the overarching political aim of the international community. The strategy of containment was successfully applied against the USSR and eventually led to the demise of that superpower. The question then arises how to...
Andreas Herberg-Rothe
01.12.2013
Military and Strategic Affairs
Integrating Technologies to Protect the Home Front against Ballistic Threats and Cruise Missiles
This article discusses active protection in response to the rocket threat to Israel’s home front. The defense establishment anticipates that in an allout war, the home front would be attacked for about thirty days, and that every day there would be about one thousand rocket and missile hits that would cause thousands of casualties as well as damage to infrastructures and strategic sites. Israel has an active protection system with five layers of interceptor missiles, and in cooperation with the United States, it developed Nautilus, a...
Yossi Arazi | Gal Perl Finkel
01.12.2013
Military and Strategic Affairs
New Security Threats, Unilateral Use of Force, and the International Legal Order
The emergence of new security threats to the international community has led to a fundamental reevaluation of the contemporary international legal order. The events of September 11, 2001 in particular heralded thebeginning of an age of terror, characterized by the fear that terrorist groups could acquire and use weapons of mass destruction (WMD) against their targets. The ensuing war against transnational terrorism and proliferation of WMD is a new type of warfare, posing unique threats and unparalleled security challenges to the...
Afeno Super Odomovo
01.12.2013
Military and Strategic Affairs
Cyber Defense from “Reduction in Asymmetrical Information” Strategies
This essay confronts two main problems in cyber defense: the attribution issue (who is attacking?) and the threshold issue (is it worth all-out war?). Starting with a war-game scenario, an analytical framework based on the Tallinn Manual is suggested to delineate cases for wars and areas of crises. The prosecution of cyber crises is then proposed through two “reduction in asymmetrical information” strategies. The threshold issue can be alleviated with a better understanding of observable and simulated effects on the defending...
Guy-Philippe Goldstein
01.12.2013
Special Issue: Conference Proceedings
Military and Strategic Affairs
Challenges of Warfare in Densely Populated Areas
Gabi Siboni
01.04.2014
Military and Strategic Affairs
Why Urban Guerrilla Proliferates
Azar Gat
01.04.2014
Military and Strategic Affairs
The Use of Weapons in Densely Populated Areas
Isaac Ben-Israel
01.04.2014
Military and Strategic Affairs
Urban Warfare
Gal Hirsch
01.04.2014
Military and Strategic Affairs
Perceptions of “Self” versus “the Other” as a Religious Precept in Islamic Sharia
David Bukay
01.04.2014
Military and Strategic Affairs
Purity of Arms and the Immunity of Non-Combatants: An Unconditional Prohibition
Noam Zohar
01.04.2014
Military and Strategic Affairs
Justice in Asymmetric Wars of Independence
Yitzhak Benbaji
01.04.2014
Military and Strategic Affairs
Warfare in Densely Populated Areas: Identification, Discrimination, and Deterrence
Thomas E. Ayres
01.04.2014
Military and Strategic Affairs
The Developing Concept of the Civilian Element in Warfare
Guy Stoltz
01.04.2014
Military and Strategic Affairs
Armed Conflict and Terrorism: Identi€cation of Military Objectives
Laurie Blank
01.04.2014
Military and Strategic Affairs
Challenges Posed by International Law in the Context of Urban Warfare
Dan Efroni
01.04.2014
Military and Strategic Affairs
The Challenges of Military Operations in Densely Populated Areas: An Australian Perspective
Mark Evans
01.04.2014
Military and Strategic Affairs
The Challenges of Warfare in Densely Populated Areas: Concluding Remarks
Amos Yadlin
01.04.2014

Volume 4

No. 1, May 2012
Military and Strategic Affairs
The Challenges of Warfare Facing the IDF in Densely Populated Areas
Current assessments are that fighting in densely populated areas will be one of the main types of combat the IDF will face in the foreseeable future. This essay will focus on three points: one, change in threats facing the State of Israel; two, the main characteristics of the military response necessitated by the change in the threat; and three, some components of the necessary method of action in such confrontations.
Gabi Siboni
01.04.2012
Military and Strategic Affairs
The Challenges of Fighting in Densely Populated Areas: The Israeli Case
Since the middle of the twentieth century there has been a process of dramatic change in the history of warfare. The change in the landscape, i.e., natural landscapes turning into urban areas, requires a change in the nature of war, both on the part of the defender and on the part of the attacker.
Arnon Soffer
01.04.2012
Military and Strategic Affairs
Asymmetrical Warfare in the Gaza Strip: A Test Case
It behooves us to investigate asymmetry. Asymmetry between entities is measured not only in terms of force but also exists in every aspect in which there is a difference in the nature of the conflicting sides, in their goals, power, methods of operation, and especially the rules of the game by which they play.
Dan Harel
01.04.2012
Military and Strategic Affairs
Principles of Warfare in the Densely Populated Areas of Arab Non-State Entities
In Israeli research there are two types of discourse regarding how to assess and judge warfare in densely populated areas: the normative discourse and the operative discourse. Conspicuously absent is the interactive discourse with the non-state enemy, i.e., the willingness to look at oneself through the eyes of the enemy in the course of the fighting. This discourse exists among non-state organizations such as Hizbollah and Hamas.
Shaul Mishal
01.04.2012
Military and Strategic Affairs
How Challenges of Warfare Influence the Laws of Warfare
This essay will deal with the challenges to the laws of warfare posed by fighting in urban zones, the consequent changes to these laws, and the problems these changes have aroused and responses to them.
Eyal Benvenisti
01.04.2012
Military and Strategic Affairs
Legal Dilemmas in Fighting Asymmetrical Conflicts
What legal rules apply to armed confrontations against non-state elements in areas populated by civilians? What rules apply when the enemy does not honor the basic laws of warfare – does not distinguish itself from the local population, and even uses it for shelter and as a base of operations? This essay, which presents my position on the issue, refers to such confrontations as “asymmetrical conflicts.”
Pnina Sharvit Baruch
01.04.2012
Military and Strategic Affairs
Lawfare: The Legal Front of the IDF
Lawfare is closely linked to the challenges facing the regular armies of law-abiding nations engaged in asymmetrical confrontations in densely populated civilian urban areas. Therefore, as part of its preparations for the challenges it may have to face in the future, particularly in this type of fighting, the IDF must give the proper weight to the legal front that is likely to develop as an integral part of the same confrontation.
Avihai Mandelblit
01.04.2012
No. 2, September 2012
Military and Strategic Affairs
Dilemmas of Warfare in Densely Populated Civilian Areas
This essay attempts to present operational perspectives on conducting warfare in densely populated areas. It also distinguishes between three types of combat within this general category, with the goal of shedding light on this complex type of warfare.
Moshe Tamir
01.09.2012
Military and Strategic Affairs
Obligations of International Humanitarian Law
It is an understatement to say that armed conflicts fought in densely populated areas can and do cause tremendous human suffering. Civilians in particular have historically paid a high price in the form of death, injuries, and permanent disabilities. They have also paid indirectly through the effects of widespread damage to their homes, the impact on their livelihoods, and the destruction of the infrastructure that supplies the necessities of life. With modern conflicts increasingly fought in urban areas, civilians are increasingly...
Knut Dörmann
01.09.2012
Military and Strategic Affairs
Operation Unified Protector: Targeting Densely Populated Areas in Libya
Although at first sight many issues related to targeting densely populated areas seem similar, regardless of the type of conflict and the area where hostilities take place, it should be recalled that what works in the framework of one operation does not necessarily work in another operational context. This can be illustrated by two contemporary conflicts in which air assets play or played a major role: Afghanistan and Libya. Air operations conducted in the framework of International Security Assistance Force (ISAF) are similar but...
Christian de Cock
01.09.2012
Military and Strategic Affairs
Multi-Layered Defense and Initiated Attack in Defending the Homeland
If indeed the world is engaged in a global war on terrorism, what is the optimal way to defend against it? Should the response be focused on defensive aspects or should offensive ones augment defensive measures? Who are the enemies and where is the battle zone? This essay examines these questions from an historical perspective in order to draw conclusions and attempt to formulate some insights about the right strategy and most effective tactics involving technology as a critical component in the response to this type of warfare.
Uzi Eilam
01.09.2012
Military and Strategic Affairs
What Lies behind Chinese Cyber Warfare
Over the past several years China has been developing operational capabilities in the field of cyberspace warfare. A cyber attack may be defined as the unauthorized penetration of computer and communications systems belonging to individuals or organizations for the purpose of espionage and information theft, in order thereby to damage or disrupt the functioning of these systems or to damage other systems dependent on them, even to a point of causing actual physical damage. Despite denials by the Chinese government, researchers posit...
Gabi Siboni | Y. R.
01.09.2012
Military and Strategic Affairs
Applied Strategy: The Challenges of Applying Force in a Changing Middle East
Israel’s strategic environment of mid 2012 differs significantly from that of a few years ago. In the current environment, the military force application that Israel is liable to need differs in purpose, constraints, and the accompanying military-political interface from the force application of the past. The purpose of this article is to discuss some of the particular characteristics of force application in this contemporary environment.
Ron Tira
01.09.2012
Military and Strategic Affairs
Iran: Maritime Measures below the Threshold of War
This article will examine various aspects of maritime enforcement and prevention methods in the context of Iran, first and foremost a naval blockade, for the purpose of stepping up pressure to thwart proliferation of non-conventional weapons. In addition, it will discuss the ramifications of these enforcement and prevention measures and the relevant alternatives available to the international community.
Yoel Guzansky
01.09.2012
No. 3, December 2012
Military and Strategic Affairs
A Blueprint for Cyber Deterrence: Building Stability through Strength
Cyber threats pose a real and growing problem, and to date, United States efforts to counter them have lagged. While the ability to defend against an attack or intrusion must be maintained, the US, like any country, would be well served by deterring its adversaries from acting in the first place – at least when it comes to the most serious of actions, namely cyber warfare. Clearly not all hostile behavior can be deterred, but it is important to identify priorities in this regard and determine how best to address those that lead the...
Frank J. Cilluffo | Sharon L. Cardash | George C. Salmoiraghi
01.12.2012
Military and Strategic Affairs
On Nuclear War: Deterrence, Escalation, and Control
During the Cold War, and especially in the 1980s, there were some serious efforts in the academic and policy communities to study how a nuclear war could end.This study will attempt neither to construct particular scenarios of war termination nor to examine important topics such as bargaining strategies or monitoring and verification of nuclear cease fires. The focus here is broader, namely, the political-military contexts for the management of nuclear crises and post-crisis force operations, including escalation control and war...
Stephen J. Cimbala
01.12.2012
Military and Strategic Affairs
Israel's Second Lebanon War Reconsidered
Operation Change of Direction, the code name given to Israel’s war against Hizbollah in Lebanon in 2006 by the Operations Directorate of the Israel Defense Forces (IDF), was the most inconclusive performance by far in the IDF’s many trials by fire since 1948, in that it represented the first time that a major regional confrontation ended without a clear cut victory on Israel’s part. The campaign’s uneven course and outcome resulted from a more overarching deficiency in strategy choice, whose most flawed...
Benjamin S. Lambeth
01.12.2012
Military and Strategic Affairs
In Defense of Stuxnet
Revelations about Stuxnet and Flame have provoked a chorus of dire warnings on the dangers of cyber warfare and the need for action. Yet the most troubling question to emerge from these revelations is why, if cyber warfare is such a critical issue, are so many people so badly informed about it? Suggestions that Stuxnet or Flame have increased risk are based on a faulty understanding of how much risk already exists in cyberspace, the already high frequency of state-sponsored malicious cyber action, and the rapid growth in many...
James A. Lewis
01.12.2012
Military and Strategic Affairs
Iran and Cyberspace Warfare
This article examines the current situation regarding various elements of Iran’s cyberspace development process. The first section analyzes the country’s cyberspace strategy, while the second section describes the organizational and operational response to the formulated strategy. This comprises three components: infrastructures for training and developing technological manpower for work in cyberspace; technological developments that have already been introduced; and the overall processes of cyberspace force construction....
Gabi Siboni | Sami Kronenfeld
01.12.2012
Military and Strategic Affairs
The Growing Power of the Indian Navy: Westward Bound
This article reviews India’s gradual rise to the status of international power and its growing interest in the “expanded neighborhood,” with a focus on the western section of that “neighborhood.” This comprises, first and foremost, the maritime region west of India through the Strait of Hormuz in the north and the Gulf of Aden and Horn of Africa in the south, and also includes the Persian Gulf, the Red Sea, and the East African coast. The terms “power projection,” “sea power,” and...
Yuval Tzur | Tamir Magal | Nadav Kedem
01.12.2012
Military and Strategic Affairs
Cybercrime: A National Security Issue?
The implications of cyberspace crime for national security derive from the way technology is used by hostile elements. This article proposes a policy directed examination of the meaning of cyberspace crime and its impact on national security. Currently, cybercrime is hardly significant beyond the realms of IT risk management and law enforcement. However, this article identifies two separate conditions where cybercrime could become a substantial threat to national security.
Lior Tabansky
01.12.2013

Volume 3

No. 1, May 2011
Military and Strategic Affairs
Iranian Involvement in Lebanon
Israel’s military engagement with Hizbollah in the summer of 2006 has been called by many different names and monikers, including, of course, the Second Lebanon War, which was adopted by Israel as the official name of the war. Some commentators on Arab television stations called it the sixth Arab-Israeli round. In truth, however, most of the Arab world, at least its leaders and important segments of its ruling elites, supported Israel, and more precisely, stood aside with the expectation, which ultimately was not met, that...
Eyal Zisser
01.05.2011
Military and Strategic Affairs
The Unique Features of the Second Intifada
Over a decade has passed since the eruption of the second intifada, a grueling period for Israel with the long, sustained, and intensive series of terrorist attacks launched by terrorist organizations against civilians and soldiers of the State of Israel. Most difficult were the suicide attacks, generally carried out in urban centers and causing large numbers of casualties – dead and wounded – among the civilian population. Predictably, therefore, the terrorism phenomenon became a dominant issue on Israel’s national and popular...
Zaki Shalom | Yoaz Hendel
01.05.2011
Military and Strategic Affairs
Israeli Naval Power: An Essential Factor in the Operational Battlefield
Although the State of Israel has always been threatened from the sea, preparing for the threat was not an important priority for the state’s leaders, as reflected by the resources that were allocated to the navy. However, once long range missiles appeared in the naval arena (in the 1960s), it became clear that the navy’s vessels and the air force’s planes were not capable of coping with this challenge.
Zeev Almog
01.05.2011
Military and Strategic Affairs
Naval Flanking in Ground Warfare
The Mediterranean Sea, Israel’s only open border, also borders Israel’s enemies to the north and the Gaza Strip to the south, thereby linking it to enemy states. Thus, Israel’s control of this naval arena would enable it to project military strength from the sea, and afford it the capability to embark on landing operations of various types. “The shores of the State of Israel, the naval interface with each of our enemies, require us to expand our naval strength to the point of being able to land forces from the...
Gideon Raz
01.05.2011
Military and Strategic Affairs
Israel's Unilateral Withdrawals from Lebanon and the Gaza Strip: A Comparative Overview
In the last decade, Israel unilaterally withdrew from two areas: the security zone in southern Lebanon and the Gaza Strip. Israel had previously withdrawn unilaterally from occupied territories without political agreements, but these two withdrawals were more significant and traumatic, both socially and politically, than any prior withdrawal. The time that has passed since these unilateral withdrawals affords us some historical perspective and allows us to compare them in terms of their outcomes and the processes they generated, both...
Reuven Erlich
01.05.2011
Military and Strategic Affairs
Basic Concepts in Cyber Warfare
Developments in computers have made possible far reaching changes in all areas of life, and the rapid progress in computing, communications, and software has led to a dramatic reduction in the cost of producing, processing, and disseminating information. The scientific-technological developments of recent decades gave rise to “the information revolution,” which involves the processing and dissemination of information. Information technologies continue to develop at an accelerated pace, and a new era has arisen in the...
Lior Tabansky
01.05.2011
Military and Strategic Affairs
Protecting Critical Assets and Infrastructures from Cyber Attacks
The impact of computer and communications systems in recent decades has not bypassed the national security of states in general, and the State of Israel in particular. Most systems in developed societies rely on computer and information infrastructures, and this growing dependence on information and communication technologies means that a blow to computers and information flow processes is liable to disrupt, paralyze, and sometimes even cause substantive physical damage to essential systems. Computer-based capabilities and their...
Gabi Siboni
01.05.2011
No. 2, November 2011
Military and Strategic Affairs
Responding to the Need for International Legitimacy: Strengthening the IDF Strike Force
This essay analyzes the main changes that have occurred in the strategic arena, especially the rising influence of the delegitimization campaign on the deployment of military force. The essay claims that in light of these changes the IDF must formulate a comprehensive strategy to coordinate force buildup and force deployment, and thereby allow an effective confrontation with the complex challenges facing the nation.
Yuval Bazak
01.11.2011
Military and Strategic Affairs
Planning Force Deployment in the IDF General Staff
IDF General Staff planning processes relate to two primary areas: force buildup and force deployment. The fundamentals of military doctrine of any army, and particularly the IDF, necessitate full synchronization between the two, and the element that underlies all planning processes is what is needed for force deployment. Upon the establishment of the IDF, these processes were assigned to a single framework: the General Staff Branch. However, more than sixty years later, planning in the General Staff today has been decentralized among...
Gabi Siboni
01.11.2011
Military and Strategic Affairs
A Troubled Geostrategic Marriage: US-Pakistan Relations
This essay surveys Pakistan’s national interests and the rationale underlying its posture vis-à-vis the United States, especially regarding cooperation in the war on terrorism. It also examines the regional struggles in which Pakistan is involved, specifically, its bitter conflict with India and its relations with China. Despite the recent US criticism of Pakistani conduct and deteriorating bilateral relations, a comprehensive examination of the geostrategic regional situation and the interests of both the United States and...
Dan Barak | Einav Yogev
01.11.2011
Military and Strategic Affairs
Fighting against Irregular Forces: Afghanistan as a Test Case
This essay analyzes the factors behind Afghanistan’s instability and argues that understanding them can explain the political and military difficulty in destroying irregular forces that share a strong ideology and operate in a given geographical arena. The essay claims that understanding the area politically, socially, and demographically allows for the formulation of a strategy and varied modi operandi for defeating the guerrilla forces.
Tal Tovy
01.11.2011
Military and Strategic Affairs
Critical Infrastructure Protection against Cyber Threats
The article begins by defining the subject of critical infrastructures, and discusses the origins, uniqueness, and innovativeness of the threat to them. It then discusses levels of coping with the threat, using conceptual parallels to the world of military content. The existing Israeli response will be reviewed briefly, with an emphasis on the central challenges the cyber threat poses to public policy. Finally, directions for future research and action will be presented.
Lior Tabansky
01.11.2011
No. 3, December 2011
Military and Strategic Affairs
The Strategic Uses of Ambiguity in Cyberspace
Strategic ambiguity has an honored place in the mores of statecraft. The studied unwillingness of states to say what they have done (or would do) coupled with the lack of proof that they have done it (or would do it) liberates other states. They can argue that something was done, but if their purposes so dictate, they can pretend that it was not done. The degree of doubt can vary: from thorough (no one is sure what has happened or would happen) to nominal (no one is fooled). In either case, however, those who did it have provided a...
Martin C. Libicki
01.12.2011
Military and Strategic Affairs
Unraveling the Stuxnet Effect: Of Much Persistence and Little Change in the Cyber Threats Debate
This article aims to provide a balanced picture of the phenomenon of cyberwar. It will show how and why the meaning of “cyberwar” has evolved from the narrow conception referring exclusively to military interaction to its broad meaning, which has become detached from “war” and encompasses almost every activity linked to the aggressive use of computers. In particular, it will distinguish between different forms of cyber conflict in order to lay the ground for a levelheaded threat assessment. It further shows...
Myriam Dunn Cavelty
01.12.2011
Military and Strategic Affairs
An Interdisciplinary Look at Security Challenges in the Information Age
This article relies illuminates the characteristics of the information age and clarifies the issues that emerge when technological development interfaces with national security. It analyzes the current characteristics of cyberspace, and discusses the implications for national security questions. It then reviews the field known as information warfare and focuses on the totally new phenomenon of computer warfare in cyberspace. The article then reviews cyber weapons and methods of warfare, discusses defense, attack, and deterrence, and...
Isaac Ben-Israel | Lior Tabansky
01.12.2011
Military and Strategic Affairs
Cyberspace and Terrorist Organizations
This essay focuses on an analysis of the factors that are likely to make terrorist organizations use cyber tools to perpetrate attacks on critical infrastructures of sovereign institutions and symbols, commercial and industrial infrastructures and systems, and public civilian targets. In addition, it examines the question of whether the threat is actual and imminent, or whether it is a far-fetched possibility that surfaces from time to time in the general discourse on the subject.
Yoram Schweitzer | Gabi Siboni
01.12.2011
Military and Strategic Affairs
Cyber Warfare and Deterrence: Trends and Challenges in Research
The possibility of successful deterrence against cyber attacks is limited with regard to each of the dimensions required for its success: the existence of capability (weapons), the credibility of the threat, and the ability to convey the threatening message to the potential challenger. Nonetheless, there are several elements to consider that under certain circumstances are likely to serve as the basis for successful deterrence even in the realm of cyberspace. This essay surveys the literature and proposes directions for continued...
Amir Lupovici
01.12.2011
Military and Strategic Affairs
The Decline of the Reservist Army
The IDF reserves, formerly the backbone of the military’s force, is now at a crossroads, and it appears that even the IDF command and the political echelon are not sure how to reshape it. This essay argues that a combination of political and economic costs involved in operating the reserves is accelerating the decline of this force, and is part of the general move towards the transformation of the IDF from conscript to professional army.
Yagil Levy
01.12.2011
Military and Strategic Affairs
Think Before You Act: On the IDF Withdrawal from Lebanon in 2000
This article presents several facts and conclusions stemming from the Israeli withdrawal from Lebanon in 2000. It also discusses two other events that occurred after the withdrawal: the Second Lebanon War in 2006, and a relatively small yet important event, the departure of Syrian forces from Lebanon in 2005. All these events are connected to one another.
Giora Eiland
01.12.2011

Volume 2

No. 1, June 2010
Military and Strategic Affairs
Ethical Aspects of the Response to Terrorism
In a democratic state the question of when it is appropriate to embark on a war is within the purview of the government, because it is the body responsible for any activity touching on relations between states and other political entities. This question has ramifications for defense of the state, its citizens, and its soldiers. Similarly, the question of what is appropriate action after the war, when working towards peace, is within the government’s purview because any step towards a settlement between the parties is of political...
Asa Kasher
01.07.2010
Military and Strategic Affairs
The Changing Threat
The purpose of this conference is to try to understand the changes in the threat against the State of Israel that have taken place in recent years, and to examine the components of the optimal response to the threat. Today’s seminar is organized within the framework of the INSS Military and Strategic Affairs Program, which aims to enhance the public discourse on subjects relevant to this discipline through conferences and the Military and Strategic Affairs journal.
Gabi Siboni
01.06.2010
Military and Strategic Affairs
The Range of Threats against Israel
This essay focuses primarily on the threats against the State of Israel and touches little on the responses to these threats. Over the last sixty years, the threats Israel has been forced to tackle have assumed different emphases, but the fundamental principle for understanding them has not changed, namely: the world around us, the Arab world, most of the Muslim world – not necessarily “most” in the numerical-statistical terms, but in terms of those determining the outlook of that world – does not consent to the existence of an...
Yaakov Amidror
01.06.2010
Military and Strategic Affairs
The Terrorism Threat against Israel from al-Qaeda and Global Jihad
This essay analyzes the current risks to Israel’s interests in Israel and abroad (including Jewish interests abroad) from al-Qaeda and its affiliates. To illustrate the risks, it is useful to review the ideology of these groups and show how it translates into practical expression through a survey of the groups’ activities in different arenas around the world.
Yoram Schweitzer
01.06.2010
Military and Strategic Affairs
A Changed Threat? The Response on the Northern Arena
In light of talk about the northern sector heating up and the possibility of a deterioration into war, the question of the change in the threat facing Israel – from the longstanding situation in which the state’s reference scenario was a surprise attack for the purpose of conquering either limited or more extended territory to the new reality that includes extensive rocket and missile fire at Israeli population centers together with the use of terrorism and guerilla tactics – again rises to the surface.
Gadi Eisenkot
01.06.2010
Military and Strategic Affairs
Terrorism under a Nuclear Umbrella: Threat and Response
The central questions regarding military force for a democratic nation state are: can war be expected, does military force deter a war, and should a war erupt, can the state endure it and emerge victorious. Force buildup derives from the operational response to the threat. The problem that states and militaries face today is that there is no generic formula for force application and force buildup relevant to a threat that combines large scale – even global – terrorism and conventional capabilities, all under the threat of a nuclear...
Giora Segal
01.06.2010
Military and Strategic Affairs
Ethical Aspects of the Response to Terrorism
In a democratic state the question of when it is appropriate to embark on a war is within the purview of the government, because it is the body responsible for any activity touching on relations between states and other political entities. This question has ramifications for defense of the state, its citizens, and its soldiers. Similarly, the question of what is appropriate action after the war, when working towards peace, is within the government’s purview because any step towards a settlement between the parties is of political...
Asa Kasher
01.06.2010
Military and Strategic Affairs
The Foundations of Israel’s Response to Threats
This essay suggests responses that the State of Israel – not necessarily the IDF – should provide to five types of problems presented elsewhere in this volume: (a) the problem of Lebanon; (b) the high trajectory threat, which although it relates to Lebanon is a more general threat, as also appears from the Gaza Strip, Syria, and Iran, and harbors great damage potential that may not have been presented in its full the preceding discussions; (c) what is the right way of prosecuting a war with Syria; (d) coping with the Iranian nuclear...
Giora Eiland
01.06.2010
Military and Strategic Affairs
Creating the Relevant Response to the Threat
This essay discusses the response to the threat at the strategic level and to some extent also the operative level, but does not address the response at the technical or tactical level. Likewise at the tactical level, one must always ask what requires the most attention.
Gershon HaCohen
01.06.2010
No. 2, October 2010
Military and Strategic Affairs
The Test of Consciousness: The Crisis of Signification in the IDF
The Czech philosopher Edmund Husserl (1859-1938) claimed that as we are thinking creatures amassing life experiences, assisted by language and descriptive capabilities and endowed with the ability to judge, draw conclusions, and make decisions, and as we are constantly in search of truths, from time to time there occur conceptual developments in our understanding of reality, followed by linguistic developments. Husserl, who preceded the era in which post-modernism has assumed intellectual hegemony, also claimed that “to live...
Nadir Tsur
01.10.2010
Military and Strategic Affairs
Naval Firepower and its Role in Land Battles
Inside the crowded geo-strategic box that is Israel’s domain, the western sector is the only open border and is thus both the Achilles’ heel of Israel enemies and a great opportunity for the IDF. At the same time, technological improvements on the enemy’s side and its growing arsenal of a wide range of rockets and missiles are a severe threat to Israel in every land battle. In the sea domain the navy enjoys many advantages: it is a constant presence in the arena, it is difficult to track, its activity is possible in...
Gideon Raz
01.10.2010
Military and Strategic Affairs
In Search of the Holy Grail: Can Military Achievements be Translated into Political Gains?
Among military thinkers it is axiomatic that the purpose of utilizing military force is to realize a political end. Clausewitz wrote that the goal of war is to impose one’s political will on the enemy, and for Liddell Hart the goal is “a better state of peace.” Indeed, according to American military doctrine the finish line of a military campaign is reached when the president no longer needs military tools in order to realize national goals. From the national-strategic end state defined by the president, the...
Ron Tira
01.10.2010
Military and Strategic Affairs
The Nature of the Radical Axis
The Middle East has recently operated under the not implausible fear that a regional war is about to break out. Therefore, Israel is closely following any sign of growing closeness among the members of the radical axis, a relationship that peaked with the Damascus summit in February 2010 and the transfer of – or at least what seemed like the intention to transfer – “balance destabilizing” weapons to Hizbollah. It is therefore important to understand the extent to which the axis – Iran, Syria, Hizbollah, and Palestinian...
Yoel Guzansky
01.10.2010
Military and Strategic Affairs
Abdullah Azzam, al-Qaeda, and Hamas: Concepts of Jihad and Istishhad
While al-Qaeda and Hamas have become household terms, far less familiar is the man behind the idea of al-Qaeda, the Palestinian sheikh Abdullah Yusuf Azzam, who also did much to support the establishment and entrenchment of Hamas. This essay traces the links between Azzam and these two radical Islamic organizations and outlines his major influence on central components of their agendas – jihad (holy war) and istishhad (martyrdom).
Asaf Maliach
01.10.2010
Military and Strategic Affairs
An al-Qaeda Balance Sheet
Nine years after the 9/11 attacks, there is a growing sense among academic, government, and think tank counterterrorism analysts that al-Qaeda is losing the battle against its enemies, led by the West in general and the United States in particular. Indeed, there are ample signs that al-Qaeda is in trouble, including its loss of important operational leaders; defeat or near defeat of various al-Qaeda franchises outside the Afghan-Pakistani headquarters; and a slew of ideological challenges leveled against the group by some of its...
Assaf Moghadam
01.10.2010
Military and Strategic Affairs
Al-Qaeda and Suicide Terrorism: Vision and Reality
Suicide bombings are not a new phenomenon in the annals of contemporary terrorism. Hizbollah in Lebanon was the first to make modern use of this weapon; it was later adopted by other organizations around the world. What characterizes modern suicide terrorism and sets it apart from suicide attacks carried out from the first century until the middle of the 20th is that it is perpetrated by means of explosives carried on the suicide attacker’s body or on some type of mobile platform driven by the suicide attacker into his target,...
Yoram Schweitzer
01.10.2010
Military and Strategic Affairs
Defeating Suicide Terrorism in Judea and Samaria, 2002-2005
From mid 2005 suicide terrorism from Judea and Samaria stopped being a significant component of the IDF’s war on Palestinian terrorism, thus marking the end of a long, demanding process that began with the Israeli government’s decision to launch Operation Defensive Shield and have the IDF operate in Palestinian cities. It is difficult to determine precisely when the process concluded, but around the middle of 2005 the number of suicide attacks from Judea and Samaria dropped to a very low level, and since then this general...
Gabi Siboni
01.10.2010

Volume 1

No. 1, April 2009
Military and Strategic Affairs
Hamas' Military Wing in the Gaza Strip: Development, Patterns of Activity, and Forecast
On December 24, 2008, the Israeli cabinet led by Prime Minister Ehud Olmert authorized the IDF plan to attack the Gaza Strip and to change the security reality in the south of Israel in order to improve the lives of the local population. Three days later, the army embarked on Operation Cast Lead. The operation began with an air strike on Hamas military targets in the Gaza Strip. In two waves of attack involving more than 80 aircraft, the IDF destroyed rocket depots, outposts, training bases, and government centers. This was the start...
Guy Aviad
01.04.2009
Military and Strategic Affairs
Is the IDF Prepared to Face a Regular War against the Arab States?
Since its establishment, Israel’s security policymakers believed the IDF must be prepared to face every possible threat scenario presented by the Arab states, including a war involving all Arab countries.This principle guided Israel’s position on various security issues. The IDF’s performance in the Sinai Campaign, the Six Day War, and to a large extent the Yom Kippur War seems to have proved the validity of the principle. In each of these cases, the Israeli army emerged with the upper hand, and there was little...
Zaki Shalom
01.04.2009
Military and Strategic Affairs
From the Second Intifada through the Second Lebanon War to Operation Cast Lead: Puzzle Pieces of a Single Campaign
This essay seeks to view Operation Cast Lead as a piece in a developing sequence, beginning with the second intifada and continuing through the Second Lebanon War, in terms of two major components: the military response to the threat and the public understanding of the effectiveness of the military response. There is a close symbiotic relationship between the two components because Israel’s response to the threat involves military combat elements alongside civilian stamina and defense capabilities. The two components are...
Gabi Siboni
01.04.2009
Military and Strategic Affairs
The Limitations on Fighting a Terrorilla Army: Lebanon and Gaza as Test Cases
In the past two and a half years, Israel has waged two military campaigns – against Hizbollah in Lebanon and against Hamas in Gaza – and in both, the campaigns were labeled in the public discourse in Israel and abroad as wars against terrorist organizations. The use of this term to describe the enemies Israel fought and the characteristics of these battles is not only imprecise and misleading but also shrouds the character of the enemy and the nature of the confrontation in a haze, minimizes their complexity, and creates unrealistic...
Yoram Schweitzer
01.04.2009
Military and Strategic Affairs
Between Lebanon and Gaza: Hizbollah in Operation Cast Lead
At the end of the Second Lebanon War, many claimed that the State of Israel had not succeeded in strengthening Israel’s deterrence vis-à-vis Hizbollah. An examination of the organization’s response to Operation Cast Lead and a comparison with its response to Operation Defensive Shield demonstrate that Israel’s actions in the Second Lebanon War did in fact result in considerably stronger Israeli deterrence.
Ronen Manelis
01.04.2009
Military and Strategic Affairs
"Lebanon Lite": Lessons from the Operation in Gaza and the Next Round against Hizbollah
Operation Cast Lead against Hamas in the Gaza Strip filled both the IDF and the Israeli public with a sense of success, and justifiably so – at least militarily speaking. In the course of the fighting, Israel managed to greatly reduce the rocket fire at the Israeli home front, with relatively little loss of life and property; the air force managed to render severe blows to the Hamas infrastructure in the Gaza Strip and eliminate senior operatives in the military and political wing of the organization; and the ground forces...
Amir Kulick
01.04.2009
Military and Strategic Affairs
Civilian Aid as an Integral Combat Effort
From early November to December 27, 2008, when Operation Cast Lead got under way, 365 rockets and 177 mortar bombs were fired at Israel; on December 20, 2008 alone, 15 rockets and 25 mortar bombs were fired. The attack on civilian life and the threat against the residential centers near the Gaza Strip and within the rocket range moved the government of Israel and the IDF to embark on Operation Cast Lead to render a blow to Hamas, responsible for the policy of violence towards Israel. The intention was to damage the...
Yigal Eyal
01.04.2009
Military and Strategic Affairs
Trapped Between Maneuver and Firepower: Hamas and Hizbollah
Hizbollah and Hamas are guerilla and terrorist organizations that in less than 20 years have developed into quasi-governmental entities. They have done so in a relatively smaller area than is usually the case in guerilla warfare, and in the case of the Gaza Strip, primarily in urban areas suited to this type of fighting. Militarily, Hizbollah is a big brother of Hamas: Hizbollah is more experienced, knowledgeable, and selfassured. Nonetheless, Hizbollah is learning from Hamas’ conduct during Operation Cast Lead and is...
Giora Segal
01.04.2009
No. 2, October 2009
Military and Strategic Affairs
Three Years since the Second Lebanon War: Opening Remarks
Although the writing was on the wall for several years prior, it appearsthat time will show that the first day of the Second Lebanon War markeda watershed. The war presented the public in Israel with a clear picture ofa threat that has changed radically. Before the war, the IDF had focusedon combating Palestinian terrorism and on attempting to construct anupdated understanding of warfare against the classical military threat;the war, however, revealed the full force of the threat coming from hightrajectory fire.
Gabi Siboni
01.10.2010
Military and Strategic Affairs
The Second Lebanon War: Lessons on the Strategic Level
The following article touches on seven points that are conclusions of sorts from three central military episodes of recent years: Operation Defensive Shield in the West Bank in April 2002, the Second Lebanon War, and Operation Cast Lead. A comparison of these events allows us to formulate general conclusions relevant to similar events in the future. Six of the issues refer primarily to the past and the present, but have ramifications for the future. The seventh is an attempt to assess what would happen should a Third Lebanon War...
Giora Eiland
01.10.2009
Military and Strategic Affairs
The IDF in the Years before the Second Lebanon War
It is very difficult to analyze and understand the Second Lebanon War without understanding how the IDF entered it. By this I am not referring to the moment the decision was made to attack on July 12, 2006, rather to the processes that occurred in the years leading up to the war. In this context, it is necessary to try to understand the fields where the military was focusing its endeavors, the topics with which the army was dealing, and the outlook of the IDF’s leadership at that time. It is necessary to focus on two central,...
Moshe Kaplinsky
01.10.2009
Military and Strategic Affairs
1701: A Worthless Security Council Resolution?
Amos Gilad, the head of the Defense Ministry’s political-security branch, testified before the Winograd Commission about grim words that do not describe any disaster in the military arena, rather the mindset and sense in Israel regarding the adoption of UN Security Resolution 1701. It seems that this testimony reflects to a large extent the lack of preparedness and thought characteristic of the political dimension – as well as the military level – in everything connected with the Second Lebanon War.
Oded Eran
01.10.2009
Military and Strategic Affairs
Hizbollah: The Battle over Lebanon
At the height of the Lebanese parliamentary elections campaign, Hassan Nasrallah addressed a conference in the Beqaa Valley. In an impassioned speech, he sought to enlist support for Hizbollah’s candidates by referring to the Israeli enemy.
Eyal Zisser
01.10.2009
Military and Strategic Affairs
The Second Lebanon War: Achievements and Failures
In the three years since the Second Lebanon War there has been absolute calm on the northern border, the likes of which no one can remember since the 1970s. This reality was purchased with the lives of civilians and soldiers who fell in battle, with the pain of the injured, both soldiers and civilians, and with the cost of those whose lives were destroyed and who bear the scars and wounds of that war to this day. My heart goes out to them.
Dan Haloutz
01.10.2009
Military and Strategic Affairs
The Second Lebanon War as a Watershed
Wars are difficult and traumatic, and as such, their impact goes well beyond their immediate time frame and the people directly involved. In this sense, the Second Lebanon War is not unusual. In hindsight, and in light of the thoughtful analyses presented at this conference, it seems that the most prominent phenomenon about the Second Lebanon War is the fact that it was a watershed – a pivotal moment in which different processes ceased, accelerated, or significantly changed direction. This is true at the personal level regarding the...
Gabi Siboni | Amir Kulick
01.10.2009
No. 3, December 2009
Military and Strategic Affairs
Hizbollah's Force Buildup of 2006-2009: Foundations and Future Trends
On August 12, 2006, the UN Security Council adopted Resolution 1701, paving the way for the end of 34 days of warfare between Israel and Hizbollah, a campaign later named the Second Lebanon War. Apart from the immediate need to establish a ceasefire, the Security Council hoped to change the security reality in southern Lebanon while neutralizing the elements that were responsible for the escalation, and prevent the repetition of another round of fighting between the sides. Accordingly, certain security arrangements were put in place,...
Guy Aviad
01.12.2009
Military and Strategic Affairs
Intelligence and the Challenges of High Trajectory Fire
Every state defines its basic self interests and what in its mind constitutes existential threats. On the basis of these definitions, the state formulates the relevant responses, whether military, diplomatic, economic, or other, to events and developments. For years, the Israeli military response relied on three basic principles: deterrence, warning, and decision. The three principles implied that Israel must deter the Arab states from starting wars. Should deterrence fail, then Israel’s intelligence must supply a timely...
Amir Kulick
01.12.2009
Military and Strategic Affairs
War and Victory
Before embarking on Operation Cast Lead, the IDF and the defense establishment held many discussions about the need for military action in the Gaza Strip and the strategic objective of such an action in the event it would in fact occur. These discussions were held in light of the sharply worded recommendations of the Winograd Commission.
Gabi Siboni
01.12.2009
Military and Strategic Affairs
The IDF and the Road to a More Professional Military
This essay analyzes the main changes that have occurred in the strategic arena, especially the rising influence of the delegitimization campaign on the deployment of military force. The essay claims that in light of these changes the IDF must formulate a comprehensive strategy to coordinate force buildup and force deployment, and thereby allow an effective confrontation with the complex challenges facing the nation.
Yuval Bazak
01.12.2009
Military and Strategic Affairs
The US Military in Iraq and the IDF in Judea and Samaria
In recent years the phenomenon of war has been commonly divided into symmetrical warfare and asymmetrical warfare. Notwithstanding new semantics, however, there is nothing new about this division, which represents the two principal interrelated components of war and therefore demands ongoing professional study. Confrontations between countries are liable to develop into symmetrical conventional wars, and at the same time or in their wake, a confrontation with asymmetrical properties can ensue. The transition from fighting a...
Giora Segal
01.12.2009
Military and Strategic Affairs
Warfare against Insurgencies: The Theory behind the Practice
For most of its sixty years, the State of Israel has faced an ongoing confrontation generated by guerilla/terrorist movements. After World War II, it became customary to call this phenomenon a war of revolution or insurgency, connoting confrontation launched by politicalrevolutionary movements whose goal is to attain governance through violent means and the politicization of the local population. This is not guerilla or terrorist warfare in the classical sense, rather a war that in the beginning uses guerilla tactics (rural or urban)...
Tal Tovy
01.12.2009

Sorry, no posts match your search,
You can search for others ....

Stay up to date

Registration was successful! Thanks.
  • Research

    • Topics
      • Israel and the Global Powers
      • Israel-United States Relations
      • Glazer Israel-China Policy Center
      • Russia
      • Europe
      • Iran and the Shi'ite Axis
      • Iran
      • Lebanon and Hezbollah
      • Syria
      • Yemen and the Houthi Movement
      • Iraq and the Iraqi Shiite Militias
      • Conflict to Agreements
      • Israeli-Palestinian Relations
      • Hamas and the Gaza Strip
      • Peace Agreements and Normalization in the Middle East
      • Saudi Arabia and the Gulf States
      • Turkey
      • Egypt
      • Jordan
      • Israel’s National Security Policy
      • Military and Strategic Affairs
      • Societal Resilience and the Israeli Society
      • Jewish-Arab Relations in Israel
      • Climate, Infrastructure and Energy
      • Terrorism and Low Intensity Conflict
      • Cross-Arena Research
      • Data Analytics Center
      • Law and National Security
      • Advanced Technologies and National Security
      • Cognitive Warfare
      • Economics and National Security
    • Projects
      • Preventing the Slide into a One-State Reality
      • Contemporary Antisemitism in the United States
      • Perceptions about Jews and Israel in the Arab-Muslim World and Their Impact on the West
  • Publications

    • All Publications
    • INSS Insight
    • Policy Papers
    • Special Publication
    • Strategic Assessment
    • Technology Platform
    • Memoranda
    • Database
    • Posts
    • Books
    • Archive
  • About

    • Vision and Mission
    • History
    • Research Disciplines
    • Chairman of the Board
    • Board of Directors
    • Fellowship and Prizes
    • Internships
    • Support
    • Privacy Policy and Terms of Use
  • Media

    • Communications
    • Video Gallery
    • Press Release
    • Podcast
  • Home

  • Events

  • Database

  • Team

  • Contact

  • Newsletter

  • עברית

INSS logo The Institute for National Security Studies, Strategic, Innovative, Policy-Oriented Research, go to the home page
40 Haim Levanon St. Tel Aviv, 6997556 Israel | Tel: 03-640-0400 | Fax: 03-744-7590 | Email: info@inss.org.il
Developed by Daat A Realcommerce company.
Accessibility Statement
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
No audio version available for this podcast