(De)Constructing the Iron wall: the story of Palestinian military infiltration from the Gaza Strip
<p dir="ltr">This article examines the evolution of Palestinian infiltration tactics in response to Israel’s security barriers, culminating in Hamas’s 7 October attack. It introduces the Security Barrier-Adaptation Model (SBAM) to analyse the cyclical interplay between Israeli fortif...
محفوظ في:
| المؤلف الرئيسي: | |
|---|---|
| منشور في: |
2025
|
| الموضوعات: | |
| الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
| _version_ | 1864513523953958912 |
|---|---|
| author | Yara Nassar (23124679) |
| author_facet | Yara Nassar (23124679) |
| author_role | author |
| dc.creator.none.fl_str_mv | Yara Nassar (23124679) |
| dc.date.none.fl_str_mv | 2025-03-11T09:00:00Z |
| dc.identifier.none.fl_str_mv | 10.1080/09592318.2025.2474526 |
| dc.relation.none.fl_str_mv | https://figshare.com/articles/journal_contribution/_De_Constructing_the_Iron_wall_the_story_of_Palestinian_military_infiltration_from_the_Gaza_Strip/31239952 |
| dc.rights.none.fl_str_mv | CC BY 4.0 info:eu-repo/semantics/openAccess |
| dc.subject.none.fl_str_mv | Human society Political science Information and computing sciences Cybersecurity and privacy Security barrier-adaptation model 7 October 2023 The Gaza Strip Hamas infiltration tactic asymmetric warfare |
| dc.title.none.fl_str_mv | (De)Constructing the Iron wall: the story of Palestinian military infiltration from the Gaza Strip |
| dc.type.none.fl_str_mv | Text Journal contribution info:eu-repo/semantics/publishedVersion text contribution to journal |
| description | <p dir="ltr">This article examines the evolution of Palestinian infiltration tactics in response to Israel’s security barriers, culminating in Hamas’s 7 October attack. It introduces the Security Barrier-Adaptation Model (SBAM) to analyse the cyclical interplay between Israeli fortifications and Palestinian countermeasures, identifying three core phases: barrier innovation, counter-adaptive tactics, and systemic readjustment. It highlights how Palestinian armed groups have innovated tactics, using tunnels, land, and sea routes, to infiltrate and circumvent Israeli defenses. By contextualizing infiltration within asymmetric warfare dynamics, the article reveals the limitations of static defense strategies and the iterative adaptation of adversarial strategies.</p><h2 dir="ltr">Other Information</h2><p dir="ltr">Published in: Small Wars & Insurgencies<br>License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1080/09592318.2025.2474526" target="_blank">https://dx.doi.org/10.1080/09592318.2025.2474526</a></p> |
| eu_rights_str_mv | openAccess |
| id | Manara2_780d4b3b1f09fdca9b0a230a644bd1d0 |
| identifier_str_mv | 10.1080/09592318.2025.2474526 |
| network_acronym_str | Manara2 |
| network_name_str | Manara2 |
| oai_identifier_str | oai:figshare.com:article/31239952 |
| publishDate | 2025 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| rights_invalid_str_mv | CC BY 4.0 |
| spelling | (De)Constructing the Iron wall: the story of Palestinian military infiltration from the Gaza StripYara Nassar (23124679)Human societyPolitical scienceInformation and computing sciencesCybersecurity and privacySecurity barrier-adaptation model7 October 2023The Gaza StripHamasinfiltration tacticasymmetric warfare<p dir="ltr">This article examines the evolution of Palestinian infiltration tactics in response to Israel’s security barriers, culminating in Hamas’s 7 October attack. It introduces the Security Barrier-Adaptation Model (SBAM) to analyse the cyclical interplay between Israeli fortifications and Palestinian countermeasures, identifying three core phases: barrier innovation, counter-adaptive tactics, and systemic readjustment. It highlights how Palestinian armed groups have innovated tactics, using tunnels, land, and sea routes, to infiltrate and circumvent Israeli defenses. By contextualizing infiltration within asymmetric warfare dynamics, the article reveals the limitations of static defense strategies and the iterative adaptation of adversarial strategies.</p><h2 dir="ltr">Other Information</h2><p dir="ltr">Published in: Small Wars & Insurgencies<br>License: <a href="http://creativecommons.org/licenses/by/4.0/" target="_blank">http://creativecommons.org/licenses/by/4.0/</a><br>See article on publisher's website: <a href="https://dx.doi.org/10.1080/09592318.2025.2474526" target="_blank">https://dx.doi.org/10.1080/09592318.2025.2474526</a></p>2025-03-11T09:00:00ZTextJournal contributioninfo:eu-repo/semantics/publishedVersiontextcontribution to journal10.1080/09592318.2025.2474526https://figshare.com/articles/journal_contribution/_De_Constructing_the_Iron_wall_the_story_of_Palestinian_military_infiltration_from_the_Gaza_Strip/31239952CC BY 4.0info:eu-repo/semantics/openAccessoai:figshare.com:article/312399522025-03-11T09:00:00Z |
| spellingShingle | (De)Constructing the Iron wall: the story of Palestinian military infiltration from the Gaza Strip Yara Nassar (23124679) Human society Political science Information and computing sciences Cybersecurity and privacy Security barrier-adaptation model 7 October 2023 The Gaza Strip Hamas infiltration tactic asymmetric warfare |
| status_str | publishedVersion |
| title | (De)Constructing the Iron wall: the story of Palestinian military infiltration from the Gaza Strip |
| title_full | (De)Constructing the Iron wall: the story of Palestinian military infiltration from the Gaza Strip |
| title_fullStr | (De)Constructing the Iron wall: the story of Palestinian military infiltration from the Gaza Strip |
| title_full_unstemmed | (De)Constructing the Iron wall: the story of Palestinian military infiltration from the Gaza Strip |
| title_short | (De)Constructing the Iron wall: the story of Palestinian military infiltration from the Gaza Strip |
| title_sort | (De)Constructing the Iron wall: the story of Palestinian military infiltration from the Gaza Strip |
| topic | Human society Political science Information and computing sciences Cybersecurity and privacy Security barrier-adaptation model 7 October 2023 The Gaza Strip Hamas infiltration tactic asymmetric warfare |