Israel Invades Gaza After Hamas Refuses To Yield

Smoke rises over Gaza City, in the northern Gaza Strip, where Israeli forces began a ground invasion following 10 days of rocket fire, on Thursday, July 17, 2014.

AP Photo/Lefteris Pitarakis

AA Font size + Print

Smoke rises over Gaza City, in the northern Gaza Strip, where Israeli forces began a ground invasion following 10 days of rocket fire, on Thursday, July 17, 2014.

Israel sends ground forces into Gaza to stop rocket attacks, military officials said, after Palestinians ignore repeated warnings to cease fire. By Kevin Baron

Under cover of naval, air and artillery strikes, thousands of Israeli forces marched into the Gaza Strip on Thursday after Palestinian rocket fire at Israel continued despite attempts at a United Nations-brokered cease fire to the 10-day conflict.

The advance followed repeated warnings from Jerusalem that it would invade if Palestinian rockets did not cease.

At 3:14 p.m. EDT, the office of the Israeli Defense Force spokesman tweeted, “BREAKING NEWS: A large IDF force has just launched a ground operation in the Gaza Strip. A new phase of Operation Protective Edge has begun.” Prime Minister Benjamin Netanyahu’s office said the attacks targeted tunnels used by terrorists to enter Israel from Gaza and other Hamas locations, The Jerusalem Post reported.

The warring sides supposedly were progressing with talks in Egypt on Wednesday, when former President Mahmoud Abbas, former British Prime Minister Tony Blair, and Egypt’s President Abdel Fattah al-Sisi met. 

In what has become a battle of real time public relations messaging between Israel and Palestinians as much as actual fighting, the IDF is live-tweeting the fighting, arguing its attacks are defensive operations against unceasing terrorist attacks from Gaza. The military has been promoting its humanitarian efforts for days, reporting ton-for-ton how much aid Israel is letting into Gaza. IDF officials have warned Gaza residents to take cover before Israeli strikes, and directed residents where to take shelter to be safe from Thursday’s campaign.

In Gaza, Palestinian leaders have argued that Israel has launched a disproportionate military operation against its population, trapping civilians in the territory without electricity or humanitarian supplies, labeling all fighters as terrorists. Globally, Palestinian supporters have flooded Twitter with verbal attacks on Israel using the hashtag #GazaUnderAttack.

But Israel argues Hamas is creating human shields by hiding in schools, mosques and hospitals. The United Nations recently found rockets in an abandoned school, but said it was the first known case. 

“We know that Hamas terrorists are operating underground, and that’s where we will meet them,” tweeted the IDF spokesman’s office on Thursday. “We have hit Hamas hard, and we will continue to hit Hamas hard.”

“I think invasion is the wrong word, I think we’re talking about a ground incursion at the moment” said Mark Regev, spokesman for Netanyahu, on CNN. “We will do what needs to be done to stop that hostile fire from Gaza into Israel.”

On Thursday, an Israeli military spokesman said more Israelis would be called up to military service in addition to the 50,000 mobilized so far. Israel would focus on degrading Hamas’s infrastructure and capabilities, but not attempt to expel their rule of the territory, according to The New York Times.

Pentagon spokesman Rear Adm. John Kirby told Defense One not to expect Defense Department officials to comment on the Israeli invasion on Thursday, pointing to Defense Secretary Chuck Hagel’s comments last week at the Pentagon. Hagel said that Israel had a right to defend itself and called on all sides to avoid escalating the conflict, but offered no support for the perspective of Palestinians who argue they are under siege by Israel, trapped in the strip and unable to escape the attack.  

Nearly 1,500 rockets have been “launched at Israel,” and 1,093 of them hit the country, the IDF said. In return, Israel has struck more than 1,600 targets, The Times reported.

“You’ve got to understand, and I think people don’t get this abroad—the people of those border communities, they have suffered from rockets from Gaza, day in, day out. Not for days, not for weeks but for years,” Kirby said. “I think they’re finally seeing the Israeli army moving in—I think, I can understand, from their point of view, that they will feel a certain level of satisfaction that finally ground forces are going there to try to get rid of that terrorist threat.”

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.