Of Fake Medrashim

WE WEAR TEFILLIN ONLY ON SHABBOS אין מניחין תפילין אלא בשבת

The Sefer מדרש פליאה (The Puzzling Midrash )  is a compilation of puzzling statements and riddles.

Contrary to popular belief, they are not מדרשי חז”ל. They  were invented by Darshonim who made up statements that
sound illogical and then solved them.

Harav Hagaon Ovadyah Yosef זצ”ל (Yechave Da’as 5-3) quotes a מדרש פליאה and a solution from R. Akiva Eiger zt”l

אין מניחין תפילין אלא בשבת”  You don’t put on Tefilin except on Shabbos.  The spelling of   בית שין בית תיו –are the Roshei Teivos of במקום שער במקום תפוח Rosh is placed where there is (was) hair. Yad is placed on part of the arm where the muscles are.

The מהרש”א in מהודרא בתרא  ( Shabbos 88b) explains, the פסוק in Tehillim (119 -164) “שקר שנאתי ואתעבה , תורתך אהבתי“. I have hated falsehood and abhorred it, your Torah I love.

Dovid Hamelech is referring to the Darshonim who fool the public with their lies. They say over מדרשים שקרים (invented Midrashim)  and then explain the Midrash with their lies. He only likes true Torah and not invented lies.

From Toras Aba, here.

‘Hashomrim’ Cards – Yes or No?

Shomrim Cards: A Modern Battle Over the Minds of Jewish Youth

Alongside some books I acquired, a fine collection of Shomrim Cards came in to my possession. In many Hasidic circles of late, Shomrim Cards are very popular among the young, traded, collected and promoted by all ages. The cards, brainstormed by a certain Rabbi Shaul Yitzchak Rabinowitz, who recently died a tragic young death after a long illness, have one motive and message: to win over the school-aged children in the fight against the smartphones.
examples of some Shomrim Cards שומרים קארטלעך

The people behind these cards and their supporters, are of the belief that owning a smartphone is of the greatest dangers to Jewish life today and the cards offer a way to show what they believe to be the horrors of the smartphone to the children in an illustrative and fun way, in the form of trading cards. The cards show the smartphone users looking like animals and devils, they describe them as being on the way to hell or to jail as a result of their iPhones, and other cards show them as ending up abandoning their religion as a result of their smartphone addictions. A recent fundraising blitz to promote the cards, collected over $50,000. A recent advertising campaign sought volunteers to give out the cards to children.

http://adm.kikar.co.il/data/auto/addonsmgr/rs/42hgbcao.jpeg
Advertising the success of a fundraiser for Shomrim Cards, achieving $50,000

On the other side of the fence, are the growing number of people in the Hasidic Community fighting and protesting against the Shomrim Cards. Many people believe that the cards are instructing the children to be disrespectful of adults, lose all sense of proportion regarding good and evil and are a horrible way of educating children, even if they are in agreement on the danger of the smartphone. Recently, a fight broke out in Boro Park, outside a synagogue which had a Shomrim booth set up outside, promoting the cards, with their table being turned over by someone claiming that the cards were corrupting the youth. Rabbi Menachem Mendel Teitebaum, the son of the Satmar Rebbe (Williamsburg), though acknowledging the dangers of smartphones,  is said to have come out against the cards in his Shabbat Hagadol sermon, saying that they lacked Rabbinic guidance. Several schools have now banned the cards, and many parents have voiced their concern against the cards, both online and within the community. Others voice the concern of bringing children into a discussion that should be made between adults and that young school students shouldn’t be exposed to such things.

How To Search Yourself Online

Search Yourself Online

Overview

Laptop open with webpage search bar and magnifying glass with stick figure in it

You most likely have heard how important it is to protect your privacy and the information you share online. To demonstrate this, we are going to try something new; we are going to show you how to research yourself and discover what information is publicly known about you. The process is called OSINT, a fancy way of saying Open Source Intelligence. This means researching public resources online to see how much information you can learn about a computer IP address, a company, or even a person like yourself. Keep in mind, cyber attackers are using these very same tools and techniques. The more attackers can learn about you, the better they can create a targeted attack. This concept has existed for years, but the latest online tools make it so much simpler to accomplish.

How to Find Information

You will not find all the information on a single website. Instead, you start with one website, learn some details, then use those details to search on and learn from other sites. Then you combine and compare results to create a profile or dossier of your subject. A good place to start is with search engines such as Google, Bing, or DuckDuckGo. Each of these have indexed different information about you, so start your search with more than one search engine. Start by typing your name in quotes, but after that expand your search based on what are called operators. Operators are special symbols or text you add to your search that better define what you are looking for. This is especially important if you have a common name; you may have to add more information such as your email address or the town you live in. Learn more about operators and advanced search techniques in the Resources section at the end. Examples include:

  • “FirstName LastName” > What information can I find online about this person
  • “Firstname Lastname@” > Find possible email addresses associated with this person
  • “Firstname lastname” filetype:doc > Any word documents that contain this person’s name

There are also sites dedicated to learning about people. Try one of these sites to see what is publicly known about you. Keep in mind these sites are not always accurate or may be country specific. You may have to search several sites to verify the information you find.

  • https://pipl.com
  • https://cubib.com
  • https://familytreenow.com

Finally, there are numerous other sites you can search to learn more, such as Google Images, Google Maps, social media sites, and many others. For an interactive list of all the different websites you can use to learn about yourself, we recommend the OSINT Framework at https://osintframework.com.

How to Find Information

  1. Learn what other people or organizations have collected, posted, or shared about you online (churches, schools, sports clubs, or other local community sites).
  2. Understand that these same resources are available to anyone else, including cyber criminals who can use that information to target you. Be suspicious. For example, if you get an urgent phone call from someone claiming to be your bank, just because they know some basic information about you does not prove it is your bank. Instead, politely hang up, then call your bank back on a known, trusted number to confirm it is them. It is the same with email, just because an email has some known facts about you does not mean it is legitimate.
  3. Consider what you share publicly and the impact that information could have on you, your family, or your employer.

Subscribe to OUCH! and receive the latest security tips in your email every month.

From Security Awareness, here.

האם השב”כ מתכון להציל חיים?

חסרי אחריות

מלאכת ההשתקה לא זרה לשב”כ, שנים ארוכות הם מסתירים ודואגים לטשטש מניע לאומני לפיגועים של ערבים מדוע כאן היוצרות התהפכו?

מאיר אטינגר

כ”ג טבת תשע”ט – 13:52 31/12/201

ההודעה שהותירו לכלי התקשורת אתמול דוברי המחלקה היהודית בשב”כ לכלי התקשורת קרעה את מסכת הצביעות מעל פניה של כנופייה זו.

כבר שנים ארוכות שאותם אנשים פועלים להסביר בכל במה אפשרית שפעולות תגמול של יהודים עצמאיים כנגד האוייב הערבי, מסכנות לטענתם את היהודים בכל שהפרסום עלול לגרום לטענתם להסלמה ולתסיסה אצל האויב ולהניע פיגועים כנגד יהודים.

לפי אותו הגיון מתבקש להשתיק ככל הניתן ידיעות על מעשים של יהודים כנגד ערבים, כדי למנוע הסלמה ולהציל לפי אותו קו מחשבה חיים של יהודים מלאכת ההשתקה לא זרה לשב”כ, שנים ארוכות הם מסתירים, מעלימים מידע דואגים לטשטש מניע לאומני לפיגועים של ערבים, כדי לייצר תחושת ביטחון מדומה, וכדי למנוע התקוממות נגדית אצל יהודים.

מתבקש היה אם ככה שאנשי המחלקה היהודית שמתיימרים להציג את עצמם בתחפושת של הדואגים לביטחון היהודים היו משתדלים לכל הפחות להצניע ידיעות כאלו, בפרט כאשר ישנה סברא מבוססת שמדובר בכלל במעשה שלא בוצע על ידי יהודים.

במציאות הם עשו את ההפך בדיוק? דאגו מהרגע הראשון לפרסם שמדובר ביהודים גם כשאין שום קצה חוט לכך שאכן זהו המצב.

לשם מה נועדו פרסומים אלו? האם באמת כדי ללבות הסלמה ולהביא לפיגועים כנגד יהודים? איזה אינטרס מצדיק את הסיכון לפי דבריהם ההסלמה בטחונית וסיכון חיים של יהודים?

מה מניע את השב”כ שמומחה בהודעות עמומות כמו צעיר מקלקיליה דקר יהודים ברעננה תוך כדי צעקות אללה הוא אכבר טרם ידוע אם הרקע הוא לאומני או פלילי, להזדרז להוציא הודעות שמאשימות יהודים במעשה, השאלה מתעצמת שבעתיים לאור העובדה שלטענת. השב”כ עצמו הודעה כזו עלולה להביא לסיכון חיים של יהודים???

את התשובה לשאלה זו תצטרכו לענות בעצמכם כי אין זה משנה אם אלו שיקולים אישיים או פוליטיים מה שברור הוא דבר אחד לא דאגה לחיי היהודים או אחריות בטחונית מניעה את אותם אנשים, ההפך בדיוק מדובר באנשים חסרי אחריות לאומית. את מסכת הצביעות שנקראה אתמול צריך לחשוף מהר ככל האפשר.

ולסיום – כעת שכבר הבנו באלו אנשים מדובר, ראוי גם את ההערכות הביטחוניות שלהם לבחון באותן משקפיים אישיות ופוליטיות שדרכם הן פועלים

מאתר הקול היהודי, כאן.

‘Terrorists’ Easily Transition into Politicians (and Other Lessons)

U.S. Should Rethink

FOR RELEASE

Tuesday
July 29, 2008

Current U.S. strategy against the terrorist group al Qaida has not been successful in significantly undermining the group’s capabilities, according to a new RAND Corporation study issued today.

Al Qaida has been involved in more terrorist attacks since Sept. 11, 2001, than it was during its prior history and the group’s attacks since then have spanned an increasingly broader range of targets in Europe, Asia, the Middle East and Africa, according to researchers.

In looking at how other terrorist groups have ended, the RAND study found that most terrorist groups end either because they join the political process, or because local police and intelligence efforts arrest or kill key members. Police and intelligence agencies, rather than the military, should be the tip of the spear against al Qaida in most of the world, and the United States should abandon the use of the phrase “war on terrorism,” researchers concluded.

“The United States cannot conduct an effective long-term counterterrorism campaign against al Qaida or other terrorist groups without understanding how terrorist groups end,” said Seth Jones, the study’s lead author and a political scientist at RAND, a nonprofit research organization. “In most cases, military force isn’t the best instrument.”

The comprehensive study analyzes 648 terrorist groups that existed between 1968 and 2006, drawing from a terrorism database maintained by RAND and the Memorial Institute for the Prevention of Terrorism. The most common way that terrorist groups end — 43 percent — was via a transition to the political process. However, the possibility of a political solution is more likely if the group has narrow goals, rather than a broad, sweeping agenda like al Qaida possesses.

The second most common way that terrorist groups end — 40 percent — was through police and intelligence services either apprehending or killing the key leaders of these groups. Policing is especially effective in dealing with terrorists because police have a permanent presence in cities that enables them to efficiently gather information, Jones said.

Military force was effective in only 7 percent of the cases examined; in most instances, military force is too blunt an instrument to be successful against terrorist groups, although it can be useful for quelling insurgencies in which the terrorist groups are large, well-armed and well-organized, according to researchers. In a number of cases, the groups end because they become splintered, with members joining other groups or forming new factions. Terrorist groups achieved victory in only 10 percent of the cases studied.

Jones says the study has crucial implications for U.S. strategy in dealing with al Qaida and other terrorist groups. Since al Qaida’s goal is the establishment of a pan-Islamic caliphate, a political solution or negotiated settlement with governments in the Middle East is highly unlikely. The terrorist organization also has made numerous enemies and does not enjoy the kind of mass support received by other organizations such as Hezbollah in Lebanon, largely because al Qaida has not engaged in sponsoring any welfare services, medical clinics, or hospitals.

The study recommends the United States should adopt a two-front strategy: rely on policing and intelligence work to root out the terrorist leaders in Europe, North America, Asia and the Middle East, and involve military force — though not necessarily the U.S. military — when insurgencies are involved.

The United States also should avoid the use of the term, “war on terror,” and replace it with the term “counterterrorism.” Nearly every U.S. ally, including the United Kingdom and Australia, has stopped using “war on terror,” and Jones said it’s more than a mere matter of semantics.

“The term we use to describe our strategy toward terrorists is important, because it affects what kinds of forces you use,” Jones said. “Terrorists should be perceived and described as criminals, not holy warriors, and our analysis suggests that there is no battlefield solution to terrorism.”

Among the other findings, the study notes:

  • Religious terrorist groups take longer to eliminate than other groups. Since 1968, approximately 62 percent of all terrorist groups have ended, while only 32 percent of religious terrorist groups have done so.
  • No religious terrorist group has achieved victory since 1968.
  • Size is an important predictor of a groups’ fate. Large groups of more than 10,000 members have been victorious more than 25 percent of the time, while victory is rare when groups are smaller than 1,000 members.
  • There is no statistical correlation between the duration of a terrorist group and ideological motivation, economic conditions, regime type or the breadth of terrorist goals.
  • Terrorist groups that become involved in an insurgency do not end easily. Nearly 50 percent of the time they end with a negotiated settlement with the government, 25 percent of the time they achieved victory and 19 percent of the time, military groups defeated them.
  • Terrorist groups from upper-income countries are much more likely to be left-wing or nationalistic, and much less likely to be motivated by religion.

“The United States has the necessary instruments to defeat al Qaida, it just needs to shift its strategy and keep in mind that terrorist groups are not eradicated overnight,” Jones said.

The study, “How Terrorist Groups End: Lessons for Countering al Qaida,” can be found at www.rand.org.

The report was prepared by the RAND National Defense Research Institute, a federally funded research and development center that does research for the Office of the Secretary of Defense, the Joint Staff, the unified commands and other defense agencies.

From The RAND Corporation, here.