Sunday, October 11, 2020

Letters to TLS Published and Not Published

This one was published:

Michael Moore (LETTERS,  October 2) impugns Israel that it practices a policy of exclusion in denying Arabs who reside in Jerusalem the right to vote in "general elections". He then further casts an aspersion in suggesting that situation is the same form of discrimination Jews faced elsewhere.

As "permanent residents", the category they fall in, while they cannot vote in national elections, they surely can in local elections. In the overwhelming cases, it is the free choice of Arabs of the pre-1967 municipal borders not to vote or even apply for full citizenship so as not to be viewed as "traitors" to the cause of "Palestine". In addition, there are many tens of thousands of Jews who, for reasons of their own, also have chosen not to become citizens, accepting a permanent residency status.


This one was not:

Sara Fredman (September 18) errs in writing "Judaism does not have ritualized confession". Every week day, except for the Shabbat and Holidays, a ritually observant Jew will recite a form of confession the text of which is fixed, called Tachanun in Hebrew. The chest is lightly beaten and at one point, one sits down, lowers one's head on his arm and recites several relevant verses from Psalms. True, unlike Catholics, there is no priest to confide in nor forgiveness formula. As on Yom Kippur, the enumeration of sins is in the plural.


And while we are at it, this one was from 2017 but did not make it in:

In his review of Daniel Heller's "Jabotinsky's Children", Colin Shindler writes of the relationship between the Betar youth movement and its leader, the Revisionist Party's Vladimir Zeev Jabotinsky, that "when he realized that Betar’s accelerating radicalization was out of control he began to respond to the “fashishtlekh” (little fascists). Given the static situation in Palestine and the darkening of Europe’s skies in the 1930s, Jabotinsky’s attempt to row back from maximalism failed, and was ignored by his followers" ("Learn to shoot", TLS, Nov, 7). 

On the eve of World War II, the number of members of Betar world-wide on six continents and more than 20 countries approached 80,000-90,000. Basing myself on 50 years of study and reviewing dozens of books based on documented research as well as personal reminisces and the literature and periodicals of the times, those who identified themselves as fascists perhaps numbered ten, including one intellectual who publicly back-tracked. Never was a fascist ideal or construct promoted in Betar.  Radicalization is not fascism. At the most, as Toby Lichtig wrote in the April 29, 2016 issue of TLS, there may have been "arguably 'fascist'...elements".

Maximalism, I would stress, was less a social, political and economic program and more a simple frame-of-mind which sought to gain and achieve the fullest possible Zionist goals as recognized by the League of Nations and formulated and conceived by generations of Jews. To mix or confound the two, by ideological rivals or scholars, must be avoided.



Packers and Movers Ahmedabad said...

Packers and Movers Ahmedabad list, Cheap Packers Movers Ahmedabad Charges, Local, Affordable Household Shifting Ahmedabad @ Packers and Movers Ahmedabad

Clarkson Coleman said...

[⏱️ 2min Read]
📁 Hiring a professional hacker has been one of the world's most technical valued navigating information.
•MOBILE PHONE HACKS.(Catching A Cheating Spouse).
High prolific information and Priviledges comes rare as it has been understood that what people do not see, they will never know. The affirmative ability to convey a profitable information Systematically is the majoy factor to success.
Welcome to the Global KOS hacking agency where every request on hacking related issues are fixed within a short period of time.
When you wonder “which hacking company should I hire, the first aspect that should concern you is Sincerity. Secondly, Rapid response. Clearly, you want to embark for services that povides swift response. With our astonishing Hackers, you will be glad to find out that our services Implies precision and action.
This post is definitely for those who are willing to turn their lives around for the better, either financial-wise, relationship-wise or businesses.
The manual Operation of this hackers is to potentially deploy a distinguished hacking techniques to penetrating computers.
If your shoe fits in any of the services below, you will be assigned to a designated professional hacker who is systematically known for operating on a dark web V-link protocol.
Providing value added services to clients as a hacker has been our sustaining goal.
Are you faced with cyber challenges like
💰Recovery of lost funds:✅(BITCOIN INVESTMENTS, BINARY OPTIONS, LOAN AND TRADING FOREX WITH FORGERY BROKERS.) 🖥️I would try my possible best to shortly explain this in particular.
This shocking study points to one harsh reality we all face today. It saddens our mind when client expresses annoyance or dissatisfaction of unethical behaviours of scammers. We have striven to make tenacious efforts to help those who are victims of this flees get off their traumatic feeling of loss. The cyber security technique used to retrieving back the victims stolen funds is the application of a diverse intercall XX breacher software enables you track the data location of a scammer. Extracting every informations on the con database. Every information required by the Global KOS would be used to tracking every transaction, time and location of the scammer. This is acheived using the systematic courier tracking base method•
However, there are secret cyber infiltrators called brokers and doom. The particular system used by this scammers permeates them to manupulate targets digital trading system or monetary fund based accounts. Strictly using a dark web rob to diverting successful trades into a negative outcome. This process bends to thier advantage while investors results to losing massive amount of money. An act of gaining access to an organization or databased system to cause damages. We have worked so hard to ensure our services gives you a 100% trading success to recover all your losses•
📲 HACKING A MOBILE PHONE:.✅ Do you think you are being cheated on? Curious to know what your lover is up to online? This type of hack helps you track every movement of your cheater as we are bent on helping you gain full remote access into the cheater's mobile phone using a Trojan breach cracking system to penetrate their social media platforms like Facebook, whatsapp, snapchat etc.
The company is large enough to provide comprehensive range of services such as•
Our strength is based on the ability to help fix cyber problems by bringing together active cyber hacking professionals in the GlobalkOS to work with.
®Global KOS™