Tagged: yom kippur war

Yom Kippur War - East of Suez Canal 0

Deceit of an Ally, Part 3

B R U C E  B R I L L | I ended the previous installment by raising some burning questions that still need to be answered. All of these questions came to a head as I approached the end of my tour of duty as a Middle East intelligence analyst for NSA, the U.S. National Security Agency. I was still at my permanent assignment at Fort Meade, Maryland, when I, finally, received my honorable discharge.

0

Deceit of an Ally, Part 2

B R U C E  B R I L L | In my role at the NSA as a linguist and military analyst in the early 1970s, I was given information, two days before it happened, that — for a certainty – Syria and Egypt were going to invade Israel on October 6, 1973 – Yom Kippur. Therefore, I was astonished to learn that, when the Yom Kippur War broke out, the Israelis were caught with their pants completely down. The critical intelligence I had been informed about should have been passed on to our ally, Israel; but it was not.

Yom Kippur War Israeli Soldiers 0

Deceit of an Ally, Part 1

B R U C E  B R I L L | The interrogator said, “You’re having a problem with that one.” I was. I don’t know what exactly the needles on the lie detector told the interrogator, but the machine had clearly caught me in a lie. I was an American soldier working as a Middle East intelligence analyst at the National Security Agency (NSA) at Fort Meade, Maryland, and I was being interrogated by an NSA security officer.

Psalm 121:4 0

Reflections on October 7, 2023

R A F A E L  R A B I N O V I C H | On October 7, 2023, Israel was caught off guard by a multi-front attack executed by Hamas. The attack mirrored the surprise assault launched by Arab armies on Yom Kippur 50 years prior. This substantial reliance on technology led to Israel’s vulnerability as explicit warnings from the enemy were persistently ignored. The focus was on previous threats, overlooking the potential for different modes of attack. The author argues that Israel must learn to safeguard its vulnerabilities and anticipate risks by prioritizing discreet and strategic security measures.