Generational Dynamics: Forecasting America's Destiny Generational
Dynamics
 Forecasting America's Destiny ... and the World's

 |  HOME  |  WEB LOG  |  COUNTRY WIKI  |  COMMENT  |  FORUM  |  DOWNLOADS  |  ABOUT  | 

Generational Dynamics Web Log for 16-Jul-2009
Israeli soldiers accuse Israel's army of genocide in Gaza war

Web Log - July, 2009

Israeli soldiers accuse Israel's army of genocide in Gaza war

Soldiers gave about 50 anonymous testimonies to Breaking the Silence, an Israeli soldiers’ organization.

They describe the Israeli army’s use of human shields and deliberate targeting of civilian structures. The descriptions support the claim that soldiers were given orders to shoot first and ask questions later.

As I've written in the past, Israel has been following a typical path that any country follows during a generational Crisis era. Any country will become increasingly genocidal as the Crisis era progresses, until the crisis war reaches a climax.

(For more information, see "Sri Lanka, Pakistan and Gaza are all following the same path," "Gaza war heads toward cease-fire, while violence surges in Sri Lanka," and "In Gaza and Sri Lanka, war slides into genocide.")

You can find translations of all the soldiers' testimonies here. I read through a couple of dozen of the testimonies, and I can't say I really found anything particularly shocking.

The coverage that I heard on the BBC had led me to believe that the soldiers were monsters, killing every civilian in sight. The actual testimonies showed some of that, but very little.

Here's one of the testimonies under the category "Bombardment". This is probably one of the most graphic of all the testimonies:

"Nearly no one ran into the enemy. I know of two encounters during the whole operation. The soldiers, too, were disappointed for not having had any encounters with terrorists. The defined situation was that sparing our forces was of primary importance. This means that if we detect anyone, we disconnect, summon a helicopter and take down the house. That was the clear definition and that is how it was done. As soon as we detect anyone, our forces improve their position and get into defense layout, and a helicopter takes down the house. No direct contact unless it happens at the first moment of the encounter. At least in the paratroopers' designated area, there were hardly any encounters at all.

Question: Were there definitions for identifying things?

Not as far as we were concerned. I don't know whether things were clearly defined, but as for the language, it was "suspects, lookouts, people standing on roofs and looking towards our forces, making suspect movements on the roof, bending down, looking out beyond the rim" – such were definitions of suspects that were enough to call a UAV or helicopter.

Question: You said there were orders to take down people seen on a roof.

As far as I know, I'm not certain what is considered suspect and what proper rules of engagement are. We responded to anything that seemed suspect to us. A helicopter or a firing *** was activated passed on detailed reports of what we see. A *** would arrive, connected to the command post at and then the people at the central command post could see what was going on and if it looked suspect to them, they would activate it."

Other testimonies describe looting of houses and the use of white phosphorous. Some of these things may technically be war crimes, but they're nothing compared to what happened in Sri Lanka. And by the way, they're nothing compared to the tactics that Israel will be using in the next war, whenever and wherever it may occur.

(Comments: For reader comments, questions and discussion, see the Mideast thread and the Sri Lanka crisis civil war thread of the Generational Dynamics forum.) (16-Jul-2009) Permanent Link
Receive daily World View columns by e-mail
Donate to Generational Dynamics via PayPal

Web Log Pages

Current Web Log

Web Log Summary - 2016
Web Log Summary - 2015
Web Log Summary - 2014
Web Log Summary - 2013
Web Log Summary - 2012
Web Log Summary - 2011
Web Log Summary - 2010
Web Log Summary - 2009
Web Log Summary - 2008
Web Log Summary - 2007
Web Log Summary - 2006
Web Log Summary - 2005
Web Log Summary - 2004

Web Log - December, 2016
Web Log - November, 2016
Web Log - October, 2016
Web Log - September, 2016
Web Log - August, 2016
Web Log - July, 2016
Web Log - June, 2016
Web Log - May, 2016
Web Log - April, 2016
Web Log - March, 2016
Web Log - February, 2016
Web Log - January, 2016
Web Log - December, 2015
Web Log - November, 2015
Web Log - October, 2015
Web Log - September, 2015
Web Log - August, 2015
Web Log - July, 2015
Web Log - June, 2015
Web Log - May, 2015
Web Log - April, 2015
Web Log - March, 2015
Web Log - February, 2015
Web Log - January, 2015
Web Log - December, 2014
Web Log - November, 2014
Web Log - October, 2014
Web Log - September, 2014
Web Log - August, 2014
Web Log - July, 2014
Web Log - June, 2014
Web Log - May, 2014
Web Log - April, 2014
Web Log - March, 2014
Web Log - February, 2014
Web Log - January, 2014
Web Log - December, 2013
Web Log - November, 2013
Web Log - October, 2013
Web Log - September, 2013
Web Log - August, 2013
Web Log - July, 2013
Web Log - June, 2013
Web Log - May, 2013
Web Log - April, 2013
Web Log - March, 2013
Web Log - February, 2013
Web Log - January, 2013
Web Log - December, 2012
Web Log - November, 2012
Web Log - October, 2012
Web Log - September, 2012
Web Log - August, 2012
Web Log - July, 2012
Web Log - June, 2012
Web Log - May, 2012
Web Log - April, 2012
Web Log - March, 2012
Web Log - February, 2012
Web Log - January, 2012
Web Log - December, 2011
Web Log - November, 2011
Web Log - October, 2011
Web Log - September, 2011
Web Log - August, 2011
Web Log - July, 2011
Web Log - June, 2011
Web Log - May, 2011
Web Log - April, 2011
Web Log - March, 2011
Web Log - February, 2011
Web Log - January, 2011
Web Log - December, 2010
Web Log - November, 2010
Web Log - October, 2010
Web Log - September, 2010
Web Log - August, 2010
Web Log - July, 2010
Web Log - June, 2010
Web Log - May, 2010
Web Log - April, 2010
Web Log - March, 2010
Web Log - February, 2010
Web Log - January, 2010
Web Log - December, 2009
Web Log - November, 2009
Web Log - October, 2009
Web Log - September, 2009
Web Log - August, 2009
Web Log - July, 2009
Web Log - June, 2009
Web Log - May, 2009
Web Log - April, 2009
Web Log - March, 2009
Web Log - February, 2009
Web Log - January, 2009
Web Log - December, 2008
Web Log - November, 2008
Web Log - October, 2008
Web Log - September, 2008
Web Log - August, 2008
Web Log - July, 2008
Web Log - June, 2008
Web Log - May, 2008
Web Log - April, 2008
Web Log - March, 2008
Web Log - February, 2008
Web Log - January, 2008
Web Log - December, 2007
Web Log - November, 2007
Web Log - October, 2007
Web Log - September, 2007
Web Log - August, 2007
Web Log - July, 2007
Web Log - June, 2007
Web Log - May, 2007
Web Log - April, 2007
Web Log - March, 2007
Web Log - February, 2007
Web Log - January, 2007
Web Log - December, 2006
Web Log - November, 2006
Web Log - October, 2006
Web Log - September, 2006
Web Log - August, 2006
Web Log - July, 2006
Web Log - June, 2006
Web Log - May, 2006
Web Log - April, 2006
Web Log - March, 2006
Web Log - February, 2006
Web Log - January, 2006
Web Log - December, 2005
Web Log - November, 2005
Web Log - October, 2005
Web Log - September, 2005
Web Log - August, 2005
Web Log - July, 2005
Web Log - June, 2005
Web Log - May, 2005
Web Log - April, 2005
Web Log - March, 2005
Web Log - February, 2005
Web Log - January, 2005
Web Log - December, 2004
Web Log - November, 2004
Web Log - October, 2004
Web Log - September, 2004
Web Log - August, 2004
Web Log - July, 2004
Web Log - June, 2004


Copyright © 2002-2016 by John J. Xenakis.