File:IDF raid in Jenin, January 2023 I.jpg

Page contents not supported in other languages.
This is a file from the Wikimedia Commons
From Wikipedia, the free encyclopedia

Original file(1,600 × 1,068 pixels, file size: 399 KB, MIME type: image/jpeg)

Summary

Description
עברית: פעילות משותפת של שב"כ, ימ"מ, מג"ב וצה"ל בלב מחנה הפליטים ג׳נין מול התארגנות צבאית של פעילי הג'יהאד האסלאמי הפלסטיני.
Date
Source

https://www.idf.il/כתבות-ועדכונים/2023/ינואר/פעילות-משותפת-של-כוחות-הביטחון-צהל-שבכ-יממ-מגב-במחנה-פליטים-בג-נין-מול-פעילי-גאפ-שלושה-מבוקשים-נוטרלו-מבוקשים-חמושים-נהרגו-בחילופי-ירי-260123/

This file contains IDF content and released to Public domain by the Israeli Defence Forces Spokesperson's Unit.
To view all images uploaded courtesy of IDF Spokesperson's Unit

This tag does not indicate the copyright status of the attached work. A normal copyright tag is still required. See Commons:Licensing.

العربية | Zazaki | English | español | français | עברית | हिन्दी | italiano | македонски | മലയാളം | Nederlands | polski | русский | +/−

Author IDF Spokesperson's Unit photographer
Permission
(Reusing this file)
VRT Wikimedia

This work is free and may be used by anyone for any purpose. If you wish to use this content, you do not need to request permission as long as you follow any licensing requirements mentioned on this page.

The Wikimedia Foundation has received an e-mail confirming that the copyright holder has approved publication under the terms mentioned on this page. This correspondence has been reviewed by a Volunteer Response Team (VRT) member and stored in our permission archive. The correspondence is available to trusted volunteers as ticket #2023022310015699.

If you have questions about the archived correspondence, please use the VRT noticeboard. Ticket link: https://ticket.wikimedia.org/otrs/index.pl?Action=AgentTicketZoom&TicketNumber=2023022310015699
Find other files from the same ticket: SDC query (SPARQL)

Other versions
Attribution
(required by the license)
InfoField
IDF Spokesperson's Unit / 
 / IDF Spokesperson's Unit
Wikimedia Israel This file was released by the IDF Spokesperson's Unit in collaboration with Wikimedia Israel.


To view all images donated as part of the collaboration project
For more files please add a request to this page (Hebrew wikipedia).


Licensing

w:en:Creative Commons
attribution share alike
This file is licensed under the Creative Commons Attribution-Share Alike 3.0 Unported license.
You are free:
  • to share – to copy, distribute and transmit the work
  • to remix – to adapt the work
Under the following conditions:
  • attribution – You must give appropriate credit, provide a link to the license, and indicate if changes were made. You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
  • share alike – If you remix, transform, or build upon the material, you must distribute your contributions under the same or compatible license as the original.

Captions

Joint activity of the Shin Bet, Yamm, Magab and IDF in the heart of the Jenin refugee camp against a military organization of the Palestinian Islamic Jihad activists.

Items portrayed in this file

depicts

26 January 2023

image/jpeg

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeThumbnailDimensionsUserComment
current15:31, 30 January 2023Thumbnail for version as of 15:31, 30 January 20231,600 × 1,068 (399 KB)Lonparis{{Information |Description={{he|1=פעילות משותפת של שב"כ, ימ"מ, מג"ב וצה"ל בלב מחנה הפליטים ג׳נין מול התארגנות צבאית של פעילי הג'יהאד האסלאמי הפלסטיני.}} |Source=https://www.idf.il/כתבות-ועדכונים/2023/ינואר/פעילות-משותפת-של-כוחות-הביטחון-צהל-שבכ-יממ-מגב-במחנה-פליטים-בג-נין-מול-פעילי-גאפ-שלושה-מבוקשים-נוטרלו-מבוקשים-חמושים-נהרגו-בחילופי-ירי-260123/ {{IDF}} |Date=2023-01-26 |Author={{LangSwitch|en = IDF Spokesperson's Unit photographer|he = צלם חטיבת [[:he:דובר צה...
The following pages on the English Wikipedia use this file (pages on other projects are not listed):

Global file usage

The following other wikis use this file: