Years of experience, polished intelligence, clear methods make Israeli security forces proficient at preventing suicide attacks By RAMIT PLUSHNICK-MASTI Associated Press Writer JERUSALEM Israel has become proficient at disarming suicide bombers, allowing attackers to be captured alive and lead security forces to their main target _ the mastermind of the strike.
The most recent capture was over the weekend, when high-tech sensors on a security fence alerted forces to the fact that someone had infiltrated Israel from the Gaza Strip. Hours later, the would-be Palestinian suicide bomber was found in near isolated agricultural community with five kilograms (11 pounds) of explosives strapped to his waist. Security forces instructed the teenage attacker to remove the bomb belt and surrender. He complied and was captured alive. "They decided that first of all he has to be caught," said Zeev Schiff, a military analyst for the Israeli daily Haaretz. "Had he resisted or made a wrong move, they would have killed him." Israel's experience has been painfully acquired _ more than 100 Palestinian suicide bombers have killed hundreds over the past five years. Like most security forces, Israeli police and soldiers have clear instructions to shoot to kill if all else fails, and Israeli counterterrorism experts said London's police were not out of line Friday when they shot a Brazilian electrician suspected of being a bomber. Jean Charles de Menezes was wearing a padded jacket and acted in a way that raised suspicions of plainclothes officers, who followed him from an apartment bloc that was under surveillance. The electrician was shot eight times when he ran into a subway car. "They (the British) are nervous, they are frightened ... this leads to more mistakes," Schiff said. "Unfortunately, they will learn." Israel has suffered suicide bomb attacks in public places and buses for more than a decade. During the current conflict, which started in late 2000, 505 people have been killed in 120 Palestinian suicide bombings. As a result, security precautions can be seen everywhere. Restaurants are required to have armed guards checking patrons at the entrance, main bus stations and shopping malls feature airport-style walk-through metal detectors and X-ray machines. For decades, Israeli citizens have been on the lookout for suspicious objects that might be bombs, and on a given day a main street in an Israeli city is likely to be closed while police check a package someone left behind. Despite years of such experience, Israel has made mistakes similar to the shooting in London, but such errors are rare now that other methods are in place to prevent bombers from reaching their target. "There are no good solutions to this dilemma," said Boaz Ganor, a counterterrorism expert. "So long as this phenomenon of suicide attacks is being spread all over the world ... such mistakes are imminent." Suicide attacks are the method of choice for global terrorist groups because of their effectiveness, Ganor said. Although just 0.5 percent of Palestinian attacks during the past five years have been suicide bombings, they have caused about half of Israeli casualties, he said. Preventing a bomber from blowing up once he has reached his target is almost impossible. There are no known cases of Israeli security forces preventing an attack by shooting dead a bomber. On occasion, security guards _ and even civilians _ have wrestled bombers to the ground, but their success was due to the fact that the explosives didn't detonate. Once, a robot handed a captured bomber a pair of scissors that he used to cut an explosives belt off his body. The explosives were later neutralized by sappers. Instead, Israel has shifted its focus to preventing attackers from ever reaching their targets. A security barrier with high-tech sensors alerts forces to infiltrators and serves as a physical obstacle that makes it difficult for Palestinians to get into Israel from the West Bank and Gaza Strip. The West Bank barrier is only one-third complete, but Israeli security experts credit it with stopping many would-be bombers. Targeted killings by the air force and elite combat units eliminated a many leaders of violent Palestinian groups. Also, pinpoint arrest raids have filled Israeli prisons with handlers and masterminds who are privy to plans, helping security agents to prevent future attacks. The key to all of it is good intelligence, especially human intelligence, and cooperation between different branches of security, an area in which Israel has reached unprecedented levels of success, said Eran Lehrman, formerly a member of Israel's intelligence services. Currently, there are also international efforts to develop technology that would make it possible to either detect a bomber from a distance or immobilize the attacker immediately without killing him, Ganor said. "The problem today is that when you try to paralyze someone, you either have to be close to him or it takes a few minutes, which is not good enough," Ganor said. (rpm/ml) 050725 171011 Copyright 2005 Associated Press. All rights reserved. This material may not be published, broadcast, rewritten or redistributed. FAIR USE NOTICE: All original content and/or articles and graphics in this message are copyrighted, unless specifically noted otherwise. All rights to these copyrighted items are reserved. Articles and graphics have been placed within for educational and discussion purposes only, in compliance with "Fair Use" criteria established in Section 107 of the Copyright Act of 1976. The principle of "Fair Use" was established as law by Section 107 of The Copyright Act of 1976. "Fair Use" legally eliminates the need to obtain permission or pay royalties for the use of previously copyrighted materials if the purposes of display include "criticism, comment, news reporting, teaching, scholarship, and research." Section 107 establishes four criteria for determining whether the use of a work in any particular case qualifies as a "fair use". A work used does not necessarily have to satisfy all four criteria to qualify as an instance of "fair use". Rather, "fair use" is determined by the overall extent to which the cited work does or does not substantially satisfy the criteria in their totality. If you wish to use copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml THIS DOCUMENT MAY CONTAIN COPYRIGHTED MATERIAL. COPYING AND DISSEMINATION IS PROHIBITED WITHOUT PERMISSION OF THE COPYRIGHT OWNERS. [Non-text portions of this message have been removed] -------------------------- Want to discuss this topic? Head on over to our discussion list, [EMAIL PROTECTED] -------------------------- Brooks Isoldi, editor [EMAIL PROTECTED] http://www.intellnet.org Post message: osint@yahoogroups.com Subscribe: [EMAIL PROTECTED] Unsubscribe: [EMAIL PROTECTED] *** FAIR USE NOTICE. This message contains copyrighted material whose use has not been specifically authorized by the copyright owner. OSINT, as a part of The Intelligence Network, is making it available without profit to OSINT YahooGroups members who have expressed a prior interest in receiving the included information in their efforts to advance the understanding of intelligence and law enforcement organizations, their activities, methods, techniques, human rights, civil liberties, social justice and other intelligence related issues, for non-profit research and educational purposes only. We believe that this constitutes a 'fair use' of the copyrighted material as provided for in section 107 of the U.S. Copyright Law. If you wish to use this copyrighted material for purposes of your own that go beyond 'fair use,' you must obtain permission from the copyright owner. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml Yahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/osint/ <*> To unsubscribe from this group, send an email to: [EMAIL PROTECTED] <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/