Israel's Counterterrorism Strategy
-
Boaz Ganor
About this book
Author / Editor information
Reviews
Israel’s Counterterrorism Strategy, by the preeminent authority Boaz Ganor, will be viewed as the definitive history of the country’s long and varied experience with a mode of conflict that became the challenge of our age. The revelations of its leaders are fascinating. To understand the policy and ethical complexities of counterterrorism, start here.
Matthew Levitt, author of Hezbollah: The Global Footprint of Lebanon’s Party of God:
In Israel’s Counterterrorism Policy, the scholar-practitioner Boaz Ganor provides a balanced, considered, and meticulous master course on the history of Israeli counterterrorism and the lessons learned. He offers a much-needed strategic perspective on a tactical challenge, making a strong contribution to counterterrorism studies.
Ambassador Nathan Sales, former U.S. undersecretary of state (acting) and coordinator for counterterrorism:
This book is a tour de force. Boaz Ganor expertly traces the history of Israel’s efforts to protect itself against successive waves of terrorism while seeking to uphold its liberal democratic values.
Yaakov Perry, former director of the Israeli Security Agency; former minister and member of Parliament:
In Israel's Counterterrorism Strategy, Boaz Ganor provides a unique viewpoint on Israel’s most critical counterterrorism challenges. Through interviews with the people in charge of devising and implementing Israel’s counterterrorism policy, he presents a remarkable account of the threats that Israel has faced since its independence and how its decision makers have responded.
Shabtai Shavit, former head of Mossad, 1989–1996:
Israel's Counterterrorism Policy is an important contribution to counterterrorism and security literature. Through unparalleled access to decision makers, prime ministers, ministers of defense, and heads of security and intelligence services, Boaz Ganor provides a comprehensive overview of Israel’s counterterrorism policy over the years and analyzes the key dilemmas and challenges. A must-read for leaders, security practitioners, students, and journalists alike.
Topics
|
Publicly Available Download PDF |
i |
|
Publicly Available Download PDF |
v |
|
Publicly Available Download PDF |
vii |
|
Publicly Available Download PDF |
ix |
|
Requires Authentication Unlicensed Licensed |
1 |
|
Requires Authentication Unlicensed Licensed |
5 |
|
Requires Authentication Unlicensed Licensed |
26 |
|
Requires Authentication Unlicensed Licensed |
41 |
|
Requires Authentication Unlicensed Licensed |
61 |
|
Requires Authentication Unlicensed Licensed |
74 |
|
Requires Authentication Unlicensed Licensed |
89 |
|
Requires Authentication Unlicensed Licensed |
120 |
|
Requires Authentication Unlicensed Licensed |
165 |
|
Requires Authentication Unlicensed Licensed |
195 |
|
Requires Authentication Unlicensed Licensed |
231 |
|
Requires Authentication Unlicensed Licensed |
261 |
|
Requires Authentication Unlicensed Licensed |
292 |
|
Requires Authentication Unlicensed Licensed |
333 |
|
Requires Authentication Unlicensed Licensed |
345 |
|
Requires Authentication Unlicensed Licensed |
349 |
|
Requires Authentication Unlicensed Licensed |
385 |
|
Requires Authentication Unlicensed Licensed |
389 |