Objectives: The aim of this paper is to analyse the use of weaponised incendiary kites
and helium balloons in the Israeli-Palestinian hostilities between March and December 2018.
The paper argues that arson started with incendiary kites and balloons can easily be exploited
for terrorist purposes and poses a serious challenge for regular armed forces and for civilian
emergency services.
Methods: The paper examines the Palestinian ‘Great March of Return’ as a background for
the development of a new Hamas’ tactic and briefly describes the chronology of arson terrorism in
the context of other hostilities at the Gaza-Israeli border. The study focuses on the two following
questions: why are the kites and balloons useful for the current goals of Hamas and how do the
Israelis respond to this new threat? The study uses comparative scientific literature and document
analysis, the analysis of statements released by the Israeli authorities and the Israeli media reports
related to the arson attacks.
Results: The main findings include the role of simple, non-lethal weapons in spreading fear
for terrorist purposes and the advantages of turning everyday-use materials into weapons in
a situation where there is limited access to regular arms. The second part of the study deals with
the effects of arson attacks on the Israeli side of the conflict and the countermeasures undertaken
in the Gaza Periphery. The author concludes that airborne arson attacks pose a serious threat to
advanced Israeli defence systems, solely because of their primitive and unpredictable character.
Conclusions: The overall findings of this paper present the threat of arson terrorism in the
context of an asymmetric conflict.
REFERENCES(33)
1.
Al-Omari, G. and Herzog, M., 2018. Neutralizing the Gaza Powder Keg. The Washington Institute for Near East Policy, Washington.
Brand, N., Shuker, P. and Siman-Tov, D., 2018. ‘Th e March of Return’ – Operative Achievement and Strategic Failure: A Test Case for Cognitive Warfare. INSS Insight, No 1063.
Coordination of Government Activities in the Territories (COGAT), 2017. Hamas Terror Tunnels. [online] Available from: http://www.cogat.mod.gov.il/en... [Accessed 10 Dec 2018].
Efron, S., Fischbach, J. and Blum, I., 2018. Th e Public Health Impacts of Gaza’s Water Crisis. Analysis and Policy Options. RAND Corporation, Santa Monica.
Elran, M., Padan, C., 2018. A Burning Dilemma: Another Round or a Change of Reality?. [online] Available from: https://www.israeldefense.co.i... [Accessed 15Jan 2019].
Gross, J.A., 2018a. Condoms, Kites, Birthday balloons: ‘Silly’ Gaza Weapons Could Lead to Real War. [online] Available from: https://www.timesofisrael.com/... [Accessed 1 Dec 2018].
Israel Ministry of Foreign Affairs, 2018. Arson terror from Gaza continues to devastate southern Israel. [online] Available from: https://mfa.gov.il/MFA/Foreign... [Accessed 5 Jan 2019].
Israel’s Homeland Security, 2018. Revolutionary Counter-Drone Technology Developed by Israeli Startup. [online] Available from: https://i-hls.com/archives/847... [Accessed7 Jan 2019].
Keren Kayemeth LeIsrael, 2018. Fighting Fires from ‘Kite Terror’ in Israeli Fields and Forests. [online] Available from: http://www.kkl-jnf.org/about-k... [Accessed 5 Jan 2019].
Meir Amit Intelligence and Terrorism Information Center, 2018. Report: Institutionalizing arson terrorism. [online] Available from: https://www.terrorism-info.org... [Accessed 3 Dec 2018].
Rinat, Z., 2018. More Fires Near Gaza Border Could Cause Irreversible Damage, Israel’s Parks Authority Warns. [online] Available from: https://www.haaretz.com/israel... [Accessed 13 Dec 2018].
United Nations Offi ce for the Coordination of Humanitarian Affairs, 2018. Gaza Blockade. [online] Available from: https://www.ochaopt.org/theme/... [Accessed 12 Nov 2018].
United Nations Security Council (UNSC), 2004. Resolution 1566 on Threats to International Peace and Security Caused by Terrorist Acts, S/RES/1566 (2004). [online] Available from: http://www.un.org/ruleofl aw/fi les/n0454282.pdf [Accessed 4 Jan 2019].
Security analysis of drones systems: Attacks, limitations, and recommendations Jean-Paul Yaacoub, Hassan Noura, Ola Salman, Ali Chehab Internet of Things