This is a refreshed megathread for any posts on the conflict between (so far, and so far as I know) Hamas and the Israeli government, as well as related geopolitics. Culture War thread rules apply.
- 1375
- 6
What is this place?
This website is a place for people who want to move past shady thinking and test their ideas in a
court of people who don't all share the same biases. Our goal is to
optimize for light, not heat; this is a group effort, and all commentators are asked to do their part.
The weekly Culture War threads host the most
controversial topics and are the most visible aspect of The Motte. However, many other topics are
appropriate here. We encourage people to post anything related to science, politics, or philosophy;
if in doubt, post!
Check out The Vault for an archive of old quality posts.
You are encouraged to crosspost these elsewhere.
Why are you called The Motte?
A motte is a stone keep on a raised earthwork common in early medieval fortifications. More pertinently,
it's an element in a rhetorical move called a "Motte-and-Bailey",
originally identified by
philosopher Nicholas Shackel. It describes the tendency in discourse for people to move from a controversial
but high value claim to a defensible but less exciting one upon any resistance to the former. He likens
this to the medieval fortification, where a desirable land (the bailey) is abandoned when in danger for
the more easily defended motte. In Shackel's words, "The Motte represents the defensible but undesired
propositions to which one retreats when hard pressed."
On The Motte, always attempt to remain inside your defensible territory, even if you are not being pressed.
New post guidelines
If you're posting something that isn't related to the culture war, we encourage you to post a thread for it.
A submission statement is highly appreciated, but isn't necessary for text posts or links to largely-text posts
such as blogs or news articles; if we're unsure of the value of your post, we might remove it until you add a
submission statement. A submission statement is required for non-text sources (videos, podcasts, images).
Culture war posts go in the culture war thread; all links must either include a submission statement or
significant commentary. Bare links without those will be removed.
If in doubt, please post it!
Rules
- Courtesy
- Content
- Engagement
- When disagreeing with someone, state your objections explicitly.
- Proactively provide evidence in proportion to how partisan and inflammatory your claim might be.
- Accept temporary bans as a time-out, and don't attempt to rejoin the conversation until it's lifted.
- Don't attempt to build consensus or enforce ideological conformity.
- Write like everyone is reading and you want them to be included in the discussion.
- The Wildcard Rule
- The Metarule
Jump in the discussion.
No email address required.
Notes -
This is largely my thinking too. The original wireless communications setup is cost effective for hundreds of kilometers of perimeter, but centralised failure points like towers are too vulnerable. Buried cable is more expensive, but resistant to jamming or drone/rpg attacks. There needs to be much more redundancy in communications.
The other major issue is probably the majority of guards running for bunkers under the rocket attack, seemingly without means to shelter in place or to monitor the perimeter. I'd give them the benefit of the doubt and presume CCTV monitors in the bunkers, but the monitors are useless if cameras were taken out and they can't physically observe the fenceline.
Regarding KISS, I think the author is conflating multiple overlaying and interconnected barriers (as in Defense in Depth) with the systems reliance on the comms tower. He's right that there shouldn't be a single point of failure for the majority of the systems in place (which seemed to be the case). There should be redundancy and the use of multiple technologies and procedures carried out by humans. Flares, Radio, heck even periscopes from the bunkers could all have been useful as failsafes. These multiple systems should ideally function independently, and by doing so become a nightmare to overcome in an assault.
More options
Context Copy link