Fighting Terrorism

The Threat of Maritime Terrorism to Israel

Issued on 02/10/2007 Type Article
Maritime Terrorism has become a buzzword among security experts over the past seven years. Incidents such as the attacks on USS Cole (October 2000) and MV Limburg (October 2002) demonstrated in the most graphic and chilling way the vulnerability of maritime transportation infrastructures, of both military and merchant shipping.
More

A suicide bombing attack in Tel Aviv was prevented by the detention of a Hamas operative which led to the discovery of an explosive belt

Issued on 24/09/2007 Type Article
A suicide bombing attack in Tel Aviv was prevented by the detention of a Hamas operative which led to the discovery of an explosive belt hidden in the southern part of the city. Its existence was revealed by an intensive security forces operation in Nablus.
More

Israeli security forces detained a Hamas terrorist operative in the Ramallah region suspected of planning a shooting attack against Israeli tourists in Amman in 2005.

Issued on 18/09/2007 Type Article
On July 31, 2007, Israeli security forces and the IDF detained Hisham Hader Shakr, 25, a Hamas operative from the village of ‘Ein Arik (west of Ramallah). An Israeli Security Agency interrogation revealed that at the beginning of 2005, when he was in Jordan, he, along with Shadi Daba’a, both activists in the Muslim Brotherhood, made plans to attack Israeli tourists in Jordan.
More

Yet another attempt to infiltrate Israel from the Gaza Strip:

Issued on 10/09/2007 Type Article
IDF forces thwarted an attack on an IDF outpost in the vicinity of Kissufim by a terrorist squad of Palestinian Islamic Jihad and Fatah
More

On the morning of August 25 two terrorist operatives infiltrated Israeli territory from the northern Gaza Strip by climbing over the security fence. They intended to carry out a killing attack at the settlement of Netiv Ha’asara north of the Gaza Strip.

Issued on 27/08/2007 Type Article
On the morning of August 25 IDF forces foiled an attempted terrorist attack at the settlement Netiv Ha’asara, north of the Gaza Strip. At approximately seven o’clock in the morning two terrorist operatives, exploiting the heavy fog cover in the region, managed to climb over the security fence using a rope ladder (on the Palestinian side of the border) and to slide down a knotted rope (on the Israeli side).
More

An IDF activity in the northern Gaza Strip exposed a tunnel shaft hidden in a hothouse, apparently dug to carry out a terrorist attack in Israel

Issued on 17/08/2007 Type Article
During the activities in the Beit Hanoun region a tunnel shaft was exposed in a tomato hothouse, about 700 meters (4/10 of a mile) from the northern Gaza Strip security fence. A generator sunk into the earth and tools used to dig the tunnel were also found. The IDF detonated the tunnel. It was discovered thanks to combined efforts the continuing activities of the IDF on the ground and of the Israeli Security Agency
More
1<14 | 15 | 16 | 17 | 18 | 19 | 20>25

Previous years bulletins

2003    2005    2006    2007    2008    2009    2011    2012    2013    2014
Information on Fighting Terrorism
One of the global challenges today is the war on terrorism. There are a variety of means and methods available to the war on terrorism, one of which is conventional military force.
There are other approaches to the war on terrorism beyond the military, such as preventing financing, enforcing laws, using political and economic measures to cut organizations off from their supporters, and infiltrating counterterrorism agents into terrorist organizations in order to expose them.
There are a variety of entities involved in the war on terrorism, among them military, internal security, judicial and economic bodies. Many states have established units especially to fight terrorism, whose duties include counterterrorism and fighting in real time.
Science and technology can also help in the war on terrorism because the global terrorism environment is constantly changing and the terrorist organizations become more sophisticated as they exploit technical innovations to increase their threat.