Say thanks by supporting us!

Our website is made possible by displaying online advertisement to our visitors. Please consider supporting to us by disabling your ad blocker.

Processing...

Relying on intelligence as the chief touchstone for decisions about whether and when to attack creates a wide opening for misunderstandings, divergent interpretations, and vulnerabilities to parties with an interest in either attack or delay.

logo
Author:
Related Quote
Show all

Like Iran and Syria supplied Hezbollah with sophisticated anti-tank rockets - Matisse, Cornet, and other RPGs that caused great damage to Israeli tanks and Israeli infantry in 2006 - they did the same in Gaza with Hamas.

There are some episodes in the history of Israel that are still kept under the strongest secrecy thick veil possible. Some of them are 40 years old, 50 years old, and are still under thick, thick secrecy, and anyone violating this secrecy would be thrown into jail himself.

In 1982, Israel began an invasion across its northern border, seeking to root out elements of the Palestine Liberation Organization. The Israeli military wreaked destruction all the way up to Beirut and forced the P.L.O. out of Lebanon. It also defeated the Syrian Army and, particularly, the Air Force wherever it engaged them.

Generally speaking, Israeli intelligence did not hunt Nazi war criminals.

Israel has good reason to be concerned about its intelligence making its way to Moscow: Russia is a major player in the war in Syria on Israel's northern border, where it has also become a close ally of Iran and Hezbollah, Israel's sworn enemies.

I think that Netanyahu is a bit intimidated of and afraid of President Trump.

I'm the son of two Holocaust survivors. As a child, I heard from one of my parents' best friends about living through Mengele's infamous selection process at Auschwitz. He haunted my nightmares.

To the best of my knowledge, after the Pollard affair, Israel does not spy on the United States or against American targets.

Many casinos in the United States already use facial recognition software to identify undesirables, apparently with a fair degree of success.

Showcase
Show all

Relying on intelligence as the chief touchstone for decisions about whether and when to attack creates a wide opening for misunderstandings, divergent interpretations, and vulnerabilities to parties with an interest in either attack or delay.

Relying on intelligence as the chief touchstone for decisions about whether and when to attack creates a wide opening for misunderstandings, divergent interpretations, and vulnerabilities to parties with an interest in either attack or delay.

Relying on intelligence as the chief touchstone for decisions about whether and when to attack creates a wide opening for misunderstandings, divergent interpretations, and vulnerabilities to parties with an interest in either attack or delay.

Relying on intelligence as the chief touchstone for decisions about whether and when to attack creates a wide opening for misunderstandings, divergent interpretations, and vulnerabilities to parties with an interest in either attack or delay.

Relying on intelligence as the chief touchstone for decisions about whether and when to attack creates a wide opening for misunderstandings, divergent interpretations, and vulnerabilities to parties with an interest in either attack or delay.

Relying on intelligence as the chief touchstone for decisions about whether and when to attack creates a wide opening for misunderstandings, divergent interpretations, and vulnerabilities to parties with an interest in either attack or delay.

Relying on intelligence as the chief touchstone for decisions about whether and when to attack creates a wide opening for misunderstandings, divergent interpretations, and vulnerabilities to parties with an interest in either attack or delay.

Relying on intelligence as the chief touchstone for decisions about whether and when to attack creates a wide opening for misunderstandings, divergent interpretations, and vulnerabilities to parties with an interest in either attack or delay.

Relying on intelligence as the chief touchstone for decisions about whether and when to attack creates a wide opening for misunderstandings, divergent interpretations, and vulnerabilities to parties with an interest in either attack or delay.

Relying on intelligence as the chief touchstone for decisions about whether and when to attack creates a wide opening for misunderstandings, divergent interpretations, and vulnerabilities to parties with an interest in either attack or delay.

Relying on intelligence as the chief touchstone for decisions about whether and when to attack creates a wide opening for misunderstandings, divergent interpretations, and vulnerabilities to parties with an interest in either attack or delay.

Relying on intelligence as the chief touchstone for decisions about whether and when to attack creates a wide opening for misunderstandings, divergent interpretations, and vulnerabilities to parties with an interest in either attack or delay.

Relying on intelligence as the chief touchstone for decisions about whether and when to attack creates a wide opening for misunderstandings, divergent interpretations, and vulnerabilities to parties with an interest in either attack or delay.

Relying on intelligence as the chief touchstone for decisions about whether and when to attack creates a wide opening for misunderstandings, divergent interpretations, and vulnerabilities to parties with an interest in either attack or delay.

Relying on intelligence as the chief touchstone for decisions about whether and when to attack creates a wide opening for misunderstandings, divergent interpretations, and vulnerabilities to parties with an interest in either attack or delay.