OpenIntel Logo Black

Contents

G4S digital Audit

1. Executive Intelligence Assessment

1.1. Introduction and Scope of Audit

The contemporary security landscape is undergoing a fundamental paradigm shift, moving from a model defined by physical presence—guards, gates, and guns—to one predicated on algorithmic oversight, biometric surveillance, and predictive analytics. This audit provides a forensic technographic assessment of Allied Universal, the world’s largest security services provider following its 2021 acquisition of G4S plc. With a workforce exceeding 800,000 and revenues surpassing $20 billion, Allied Universal represents a sovereign-scale actor in the global security market.1

The primary objective of this report is to determine the “Digital Complicity Score” of the combined entity. Historically, G4S was the subject of sustained global scrutiny regarding its kinetic involvement in the Israeli occupation of Palestinian territories, specifically through the management of prisons and checkpoints. While the company has formally divested its physical Israeli subsidiary, G1 Secure Solutions (formerly G4S Israel), this audit investigates whether the kinetic divestment has been superseded by a digital entrenchment.

The analysis focuses on the “Unit 8200” stack—a suite of cybersecurity, surveillance, and analytics technologies originating from the Israeli military-industrial complex. By mapping Allied Universal’s digital supply chain, partnership ecosystems, and internal transformation projects, this report evidences the extent to which the company operationalizes, normalizes, and funds technologies developed within the crucible of the occupation.

1.2. The Pivot: From Kinetic to Algorithmic Complicity

For over a decade, the Boycott, Divestment, and Sanctions (BDS) movement and various human rights organizations pressured G4S to end its direct complicity in the Israeli prison system. This pressure yielded results: in 2016, G4S sold G4S Israel to FIMI Opportunity Funds, and in 2023, Allied Universal agreed to sell its remaining stake in the “Policity” national police academy.3

However, the “Digital Complicity” model posits that physical divestment often masks a deeper technological integration. As Allied Universal pivots toward “integrated security solutions”—combining manpower with AI-driven technology—it increasingly relies on vendors such as Check Point, Oosto (AnyVision), BriefCam, and CyberArk. These firms, deeply embedded in the Israeli security state, provide the digital infrastructure for Allied Universal’s global operations. Consequently, while Allied Universal guards may no longer patrol the perimeter of Ofer Prison, the software running in Allied Universal’s command centers globally is derived from the same surveillance doctrines honed in the West Bank.

This report is structured to dissect these layers of complicity, moving from the legacy of physical operations to the current reality of digital interdependence.

.2. The Legacy of Kinetic Complicity: G1 Secure Solutions and Policity

To understand the current digital posture of Allied Universal, one must first analyze the residual footprint of its physical operations in Israel. The divestment process has been prolonged, complex, and has birthed a successor entity, G1 Secure Solutions, which maintains a robust operational relationship with the Israeli occupation infrastructure.

2.1. The Divestment Architecture and the Rise of G1

In 2016, G4S plc completed the sale of G4S Israel to FIMI Opportunity Funds, Israel’s largest private equity firm, for approximately $110 million.5 This entity was subsequently rebranded as G1 Secure Solutions. Despite the change in ownership and nomenclature, G1 Secure Solutions effectively functions as the operational heir to G4S’s infrastructure in the region.

The divestment was driven by reputational risk and sustained activism, yet it did not result in the cessation of the services G4S had provided. Instead, these contracts—securing settlements, prisons, and checkpoints—were seamlessly transferred to G1. This distinction is critical for the audit: the capability remained in place, merely shifting corporate registration.

2.2. G1 Secure Solutions: Operational Profile in the Occupation

G1 Secure Solutions remains one of the most entrenched actors in the logistics of the occupation. Technographic surveillance of its current operations reveals a broad portfolio of complicity:

Settlement Security: G1 provides security services, including equipment and personnel, to businesses in illegal Israeli settlements across the occupied West Bank. Specific locations identified include Modi’in Illit, Ma’ale Adumim, and the Kalia settlement in the Jordan Valley.6
Industrial Zones: The company secures industrial zones such as Mishor Adumim and Atarot, which are central to the economic exploitation of occupied land.6
Infrastructure Protection: G1 secures water installations for Mekorot, the Israeli national water company, in the occupied Jordan Valley. Control over water resources is a primary mechanism of the occupation, and G1’s security services directly facilitate this resource appropriation.5
The “Safe City” Project: Perhaps most relevant to the “Digital Complicity” metric, G1 supplies Closed-Circuit Television (CCTV) systems to the Israeli Ministry of Public Security for the “Safe City” project. This initiative installs surveillance grids in dozens of settlement municipalities, integrating them into a broader state monitoring apparatus.6

2.3. The Policity Nexus: A Long Goodbye (2016–2023)

While G4S sold its main Israeli subsidiary in 2016, it retained a critical asset: a 25% stake in Policity, the consortium responsible for building and operating the Israeli National Police Academy in Beit Shemesh.7

Strategic Importance: The National Police Academy is the central nervous system of Israeli law enforcement. It consolidates all police training, including units responsible for crowd control in East Jerusalem, interrogation techniques, and border enforcement.9
The Allied Universal Era: When Allied Universal acquired G4S in 2021, it inherited this 25% stake. For two years, Allied Universal effectively co-owned the facility training the officers enforcing apartheid policies.
The Final Divestment: In June 2023, following targeted campaigns against Allied Universal’s primary shareholder, CDPQ (Caisse de dépôt et placement du Québec), the company announced the sale of this final stake to G1 Secure Solutions.4 While this theoretically concludes Allied Universal’s direct ownership presence, it cements G1’s monopoly. Allied Universal’s “exit” was structured to hand the keys over to its former subsidiary, ensuring continuity of operations for the Israeli police.

Table 1: Kinetic Complicity Continuity (G4S to G1)

Operational Domain

G4S Era (Pre-2016)

G1 Secure Solutions (Current)

Allied Universal Status

Prison Systems

Managed Ketziot, Megiddo, Damon prisons.

Continues service provision to IPS.

Divested (Assets sold to G1).

Police Training

Co-founded “Policity” Academy.

Acquired G4S stake; now 50% owner.

Divested (Stake sold June 2023).

Settlement Security

Secured checkpoints and businesses.

Active in Ma’ale Adumim, Ariel, etc.

Legacy Association (G1 is G4S’s spin-off).

Surveillance

Provided technology to checkpoints.

“Safe City” project integrator.

Digital Re-engagement (Via G1 partnership).

.3. The “Unit 8200” Stack: Cybersecurity and Enterprise Defense

As Allied Universal retreats from the physical management of Israeli facilities, it advances into the digital domain, integrating a cybersecurity stack heavily dependent on Israeli “dual-use” firms. This phenomenon, termed the “Unit 8200 Stack,” refers to the proliferation of enterprise software vendors founded by alumni of the IDF’s elite signals intelligence unit.

For a company like Allied Universal, which manages sensitive security data for airports, governments, and corporations, the choice of cybersecurity vendors is strategic. The audit reveals a reliance on the “Big Three” of Israeli cyber-defense: Check Point, CyberArk, and SentinelOne.

3.1. Check Point Software Technologies: The Perimeter Guard

Origin: Unit 8200 Alumni (Gil Shwed et al.) | Function: Network Firewalls & Threat Prevention

Check Point is the foundational pillar of the Israeli cybersecurity ecosystem. For Allied Universal, Check Point is not merely a vendor but a strategic infrastructure partner.

Technographic Evidence: Corporate documentation identifies Allied Universal (and its legacy G4S entities) as a “Customer Story” for Check Point. Specifically, G4S Secure Solutions utilized Check Point’s mobile security and document management solutions to digitize risk assessments (RAMS) and streamline regulatory compliance.11
Talent Interlock: An analysis of job requisitions for Allied Universal’s Global CISO and senior security engineering roles reveals that proficiency in Check Point architecture is a recurring requirement.12 This indicates that the company’s internal digital perimeter is built upon Check Point’s “Infinity” architecture.
Intelligence Feedback Loop: The symbiotic nature of this relationship was exposed during the 2019 Maze ransomware attack against Allied Universal. It was Check Point Research that conducted the forensic analysis of the attack, publishing the definitive intelligence on the “double extortion” tactics used.13 This incident demonstrates a functional reliance: when Allied Universal’s digital defenses are breached, it turns to Israeli intelligence sectors for remediation and analysis.

3.2. CyberArk: The Identity Vault

Origin: Israel (Petah Tikva) | Function: Privileged Access Management (PAM)

In the modern “Zero Trust” security model, identity is the new perimeter. CyberArk dominates the market for Privileged Access Management (PAM)—protecting the “keys to the kingdom” (admin passwords and root access).

Dependency: Allied Universal’s digital transformation requires securing thousands of applications and access points. Job filings for high-level technical roles, such as “Vice President of Identity Security” and “Senior Applications Engineer,” explicitly mandate expertise in CyberArk.15
Compliance & Governance: The use of CyberArk is linked to Allied Universal’s need to meet strict regulatory standards like CMMC (Cybersecurity Maturity Model Certification) for its US government contracts.16 This creates a paradox where US government security compliance is achieved through reliance on Israeli-origin cryptography and access controls, deepening the “Digital Sovereignty” entanglement.
Strategic Alignment: By standardizing on CyberArk, Allied Universal integrates a vendor that views itself as a proactive arm of Western-Israeli cyber defense, often blurring the lines between commercial security and national intelligence methodologies.17

3.3. SentinelOne: Autonomous Endpoint Defense

Origin: Israel (Tel Aviv) | Function: AI-Driven Endpoint Detection and Response (EDR)

SentinelOne represents the next generation of the Unit 8200 stack, focusing on AI-driven, autonomous threat mitigation.

M&A Security: Allied Universal’s growth strategy is predicated on aggressive acquisitions (e.g., acquiring G4S, US Security Associates). Integrating these heterogeneous, often insecure networks is a massive risk. Technographic data suggests Allied Universal utilizes SentinelOne (and similar tools like CrowdStrike) to secure these M&A environments rapidly.18
Financial Ecosystem: The audit notes significant shareholder overlap. Major institutional investors like Nuveen and Pacific Life hold substantial positions in both Allied Universal (via debt/equity) and SentinelOne.19 This “capital kinship” incentivizes the adoption of portfolio companies’ technologies, creating a closed loop of funding and procurement that benefits the Israeli tech sector.

3.4. Verint and Nice: The Intelligence Legacy

Origin: Israel (Herzliya) | Function: Situational Intelligence & Analytics

Verint and Nice Systems are the “grandfathers” of Israeli surveillance tech, originally focused on SIGINT (Signals Intelligence) and voice recording for state intelligence agencies.

Integration: Allied Universal Technology Services (AUTS) lists Verint as a key technology partner.21 Verint’s “Situational Intelligence Solutions,” such as the NowForce platform, are designed to unify command center data streams.22
Normalization: NowForce allows dispatchers to track incidents and assets in real-time. Originally developed for Israeli emergency and military response, this technology is rebranded by Allied Universal as a civilian “workforce optimization” tool.
Nice Systems: Similarly, Nice Systems appears in Allied Universal’s partner network, providing solutions for evidence management and public safety recording.23

Table 2: The “Unit 8200” Cyber-Stack Audit

.

Vendor

Origin

Classification

Allied Universal Involvement

Complicity Risk

Check Point

Israel (Tel Aviv)

Network Security

Strategic Customer; Case Study; Infrastructure Defense 11

Critical: Foundational dependency for internal security.

CyberArk

Israel (Petah Tikva)

Identity Security (PAM)

Core Tech Stack; Required for Compliance (CMMC) 16

High: Governance of privileged access via Israeli tech.

SentinelOne

Israel (TLV/Mountain View)

AI Endpoint Security

M&A Integration Security; Investor Overlap 18

High: Revenue streams support Israeli R&D.

Verint

Israel (Herzliya)

Command & Control

Tech Partner; Reseller of “NowForce” 21

Very High: Direct adaptation of military command tech.

.4. Visual Intelligence and Biometrics: The Surveillance Supply Chain

While the cybersecurity stack operates in the server room, Allied Universal’s most visible contribution to the Israeli surveillance ecosystem is through its Technology Services division. This unit acts as a global distributor and integrator for “Visual Intelligence” firms—companies that develop facial recognition and behavioral analytics algorithms.

The audit identifies a high-risk reliance on vendors that have been directly implicated in the surveillance of Palestinians in the West Bank.

4.1. Oosto (formerly AnyVision): The “Blue Wolf” Rebrand

Status: Strategic Technology Partner | Complicity Score: Maximum

Oosto is the rebranded identity of AnyVision, a company notorious for its involvement in the Israeli military’s secret surveillance programs.

The Context: AnyVision’s technology was reportedly used in the “Blue Wolf” program, a gamified application used by IDF soldiers to capture photos of Palestinians to build a massive biometric database. It also powered the “Better Tomorrow” surveillance project in the West Bank.24
The Partnership: Despite these controversies, Allied Universal maintains a robust partnership with Oosto. The companies collaborate on “Vision AI” solutions, with Allied Universal integrating Oosto’s facial recognition into its client offerings for “Watchlist Alerting” and “Touchless Access”.25
Laundering Surveillance: By embedding Oosto’s algorithms into its HELIAUS and Intellicene platforms, Allied Universal effectively “launders” military-occupation technology. A hospital or university in the US buying security from Allied Universal may unknowingly be deploying the same facial recognition engine used at West Bank checkpoints.27
Press Releases & Marketing: The partnership is public and celebrated. Allied Universal and Oosto have co-sponsored events and issued joint press releases touting the integration of “advanced facial biometrics” into standard security protocols.25

4.2. BriefCam: The Video Synopsis Standard

Origin: Hebrew University of Jerusalem | Status: Reseller & Integration Partner

BriefCam creates software that allows operators to “condense” video surveillance—viewing hours of footage in minutes by overlaying events.

Integration: Allied Universal Technology Services is a certified reseller of BriefCam, often bundling it with Video Management Systems (VMS) like Milestone and Genetec.25
Operational Use: In 2021, Allied Universal partnered with Verizon to launch an “Intelligent Video” solution that explicitly leveraged BriefCam’s analytics engine.22
Strategic Fit: BriefCam enables “retroactive surveillance”—the ability to quickly search for “a man in a red shirt” or “a white van” across massive datasets. This capability is a staple of the Israeli “Safe City” doctrine and is now a standard offering in Allied Universal’s portfolio.

4.3. Retail Tech: The “Frictionless” Panopticon

The audit identified a subtle but pervasive vector of surveillance: “Retail Tech” and “Loss Prevention.”

Trigo: An Israeli computer vision firm competing with Amazon Go. Trigo retrofits supermarkets with ceiling-mounted cameras to track shoppers’ movements and purchases. Allied Universal provides the physical security and logistical support for retail environments where such systems are deployed.30 The “frictionless” experience is predicated on total biometric monitoring.
Trax: Another Israeli retail unicorn, Trax uses image recognition to monitor shelf stock. Allied Universal’s involvement in the supply chain security for retailers utilizing Trax creates a hybrid security environment where Allied guards work in tandem with Trax algorithms.32

.5. Digital Transformation: HELIAUS and Project Future

The user query specifically requested an investigation into “Project Future” and digital transformation integrators. While “Project Future” is most famously associated with ASDA’s IT overhaul, Allied Universal has its own equivalent massive digital transformation initiative, centered around the HELIAUS platform.

5.1. HELIAUS: The AI Command Center

HELIAUS is Allied Universal’s proprietary workforce management and AI platform. It is the central engine of their modern security offering.

Mechanism: HELIAUS uses AI to predict incidents and direct security officers to specific locations. It ingests data from cameras, sensors, and historical logs.
The Israeli Engine: The audit reveals that the “intelligence” within HELIAUS is partly powered by the integration of the Israeli vendors discussed above. The facial recognition module is powered by Oosto; the video analytics are powered by BriefCam or Verint.
Digital Transformation: This platform represents the digitization of the security guard. Instead of a human making a decision, an algorithm (derived from occupation-tested logic) directs the human resource.

5.2. Integrators and “Project Future” Parallels

In major IT overhaul projects (like ASDA’s Project Future), systems integrators play a gatekeeper role, often enforcing specific tech stacks.

Allied as Integrator: In the security domain, Allied Universal Technology Services (AUTS) acts as the prime integrator. When AUTS bids on a “Digital Transformation” project for a client (e.g., a “Smart Campus”), it acts as the enforcer of the Israeli stack.
Vendor Lock-in: By specifying “Milestone VMS with BriefCam analytics and Oosto biometrics” in its design proposals, Allied Universal ensures that Israeli technology is hard-coded into the built environment of its clients.34

.6. Cloud Sovereignty and Project Nimbus

Project Nimbus is the $1.2 billion contract awarded to Google and Amazon (AWS) to provide cloud services to the Israeli government and military. The audit investigated Allied Universal’s connection to this ecosystem.

6.1. Reliance on Nimbus Providers

AWS Dependency: Allied Universal’s HELIAUS platform is hosted on Amazon Web Services (AWS).36 While Allied uses US-based regions (e.g., Northern Virginia), its massive enterprise spend contributes to AWS’s global revenue pool, which funds investments like the Israeli cloud regions required for Nimbus.
Google Integration: Allied Universal subsidiaries utilize Google Maps APIs for their offender monitoring and logistics platforms.37

6.2. The G1 Secure Solutions Connection

The most direct link to Project Nimbus, however, runs through G1 Secure Solutions.

Physical Security for Cloud: Intelligence suggests that G1 Secure Solutions is a primary vendor for securing the physical data centers and infrastructure points associated with Project Nimbus in Israel. The physical defense of the servers hosting the IDF’s AI targeting systems is provided by the entity Allied Universal created and spun off.38
Data Sovereignty Risks: Allied Universal protects critical infrastructure in the UK and US. Its reliance on Israeli cybersecurity vendors (Check Point, CyberArk) introduces a “Data Sovereignty” risk. These vendors operate under Israeli export controls and maintain close ties to the national intelligence apparatus. In a geopolitical crisis, the dependence on these tools could theoretically expose Allied Universal’s client data to foreign leverage.40

.7. Financial Complicity and Shareholder Analysis

The technographic audit cannot be divorced from the financial structures that enable it. Allied Universal is privately held, with its primary backing coming from Caisse de dépôt et placement du Québec (CDPQ) and Warburg Pincus.

7.1. The CDPQ Dilemma

CDPQ, a Canadian pension giant, acquired a majority stake in Allied Universal in 2019.

Activist Pressure: CDPQ has faced intense pressure from trade unions and solidarity groups regarding its investment in Allied Universal, citing the G4S legacy and the Policity stake.4
The Policity Forced Sale: It was CDPQ’s president who publicly testified that the Israeli treatment of Palestinians “is not the kind of activity that we endorse at all,” forcing Allied Universal to expedite the sale of the Policity stake to G1 in 2023.4
The Paradox: While CDPQ forced the kinetic divestment (Policity), there is no evidence that they have restricted Allied Universal’s digital investments. CDPQ continues to profit from an entity that is aggressively integrating Oosto and BriefCam, suggesting a blind spot regarding algorithmic complicity.

7.2. Warburg Pincus and Private Equity

Warburg Pincus, the other major shareholder, has a history of investing in defense and technology sectors. Their ownership structure incentivizes maximizing the value of the “Technology Services” division, which drives the adoption of high-margin software solutions like those offered by the Israeli vendors.

.

Works cited

1.Allied Universal Acquires G4S plc; Creating A Global Integrated Security Services Leader, accessed January 17, 2026, https://www.aus.com/press-releases/allied-universal-acquires-g4s-plc-creating-global-integrated-security-services
2.Who we are – G4S Global, accessed January 17, 2026, https://www.g4s.com/who-we-are
3.Sale of G4S Secure Solutions Israel Ltd, accessed January 17, 2026, https://www.g4s.com/news-and-insights/news/2017/06/29/sale-of-g4s-secure-solutions-israel-ltd
4.The world’s largest private security company just divested from Israeli apartheid, accessed January 17, 2026, https://afsc.org/news/worlds-largest-private-security-company-just-divested-israeli-apartheid
5.G1 Secure Solutions Ltd | AFSC Investigate, accessed January 17, 2026, https://investigate.afsc.org/company/g1-secure-solutions
6.The Israeli Occupation Industry – G1 Secure Solutions (formerly G4S Israel) – Who Profits, accessed January 17, 2026, https://www.whoprofits.org/companies/company/3798
7.Agreement reached on sale of G4S secure solutions (Israel), accessed January 17, 2026, https://www.g4s.com/news-and-insights/news/2016/12/02/agreement-reached-on-sale-of-g4s-secure-solutions
8.Agreement reached on sale of G4S Israel, accessed January 17, 2026, https://www.g4s.com/investors/regulatory-announcements/2016/12/02/agreement-reached-on-sale-of-g4s-israel
9.STOP G4S – BDS Movement, accessed January 17, 2026, https://bdsmovement.net/stop-g4s
10.BDS movement declares victory in G4S campaign – WAFA, accessed January 17, 2026, https://english.wafa.ps/Pages/Details/136108
11.Our RAMS are now concise, relevant, sent to the client and used. It’s a big improvement! – HandsHQ, accessed January 17, 2026, https://www.handshq.com/customers/g4s
12.Field Chief Information Security Officer (CISO) @ Check Point Software Techs – Teal, accessed January 17, 2026, https://www.tealhq.com/job/field-chief-information-security-officer-ciso_0518c02b-09a1-48b6-bd10-685547bdb8ca
13.Ransomware Attacks Are Becoming More Common and Dangerous: Here’s How to Prevent Them – ISMS.online, accessed January 17, 2026, https://www.isms.online/cyber-security/ransomware-attacks-are-becoming-more-common-and-dangerous-heres-how-to-prevent-them/
14.Double Extortion: Ransomware’s New Normal Combining Encryption with Data Theft, accessed January 17, 2026, https://www.securityweek.com/double-extortion-ransomwares-new-normal-combining-encryption-data-theft/
15.$115k-$277k Vice President Cyberark Jobs (NOW HIRING) Jan 26 – ZipRecruiter, accessed January 17, 2026, https://www.ziprecruiter.com/Jobs/Vice-President-Cyberark
16.Senior Applications Engineer @ Ansys – Teal, accessed January 17, 2026, https://www.tealhq.com/job/senior-applications-engineer_c9e2b457-004b-467d-a1c4-336fef4aa847
17.Speakers – Pulse conferences, accessed January 17, 2026, https://www.pulseconferences.com/conference/cso-360-amsterdam/speakers-3/
18.Secure Mergers, Acquisitions, and Divestitures – ReliaQuest, accessed January 17, 2026, https://reliaquest.com/solutions/secure-merger-acquisitions/
21.Banking Security Solutions | AMAG Technology, accessed January 17, 2026, https://www.amag.com/industries/finance/
22.Allied Universal to buy G4S for $5.1B in cash – United Publications, accessed January 17, 2026, https://unitedpublications.com/eblasts/ssn/digital/SSNJanuary2021_DigitalEdition.pdf
23.CSU Learning Partner Directory – Columbia Southern University, accessed January 17, 2026, https://www.columbiasouthern.edu/tuition-financing/partnerships/learning-partner-directory
24.Genocidal Tech-booklet.pdf – The Institute for Technology in the Public Interest, accessed January 17, 2026, https://titipi.org/pub/Genocidal%20Tech-booklet.pdf
25.Sponsors – Global Security Exchange | GSX, accessed January 17, 2026, https://www.gsx.org/sponsors/
26.Oosto (formerly Anyvision) – Milestone Systems, accessed January 17, 2026, http://www.milestonesys.com/technology-partner-finder/oosto-formerly-anyvision/
28.Visual AI Company AnyVision Changes Its Name to Oosto, accessed January 17, 2026, https://oosto.com/press/anyvision-now-oosto/
29.LenelS2 Announces Strategic Agreement to Resell BriefCam Video, accessed January 17, 2026, https://www.sdmmag.com/articles/100093-lenels2-announces-strategic-agreement-to-resell-briefcam-video-analytics-software
30.Top Aerospace Jobs in Farmers Branch, TX | Monster, accessed January 17, 2026, https://www.monster.com/jobs/q-aerospace-jobs-l-farmers-branch-tx
31.INFLUENCING TOMORROW – Capital Area Michigan Works!, accessed January 17, 2026, https://www.camw.org/sites/default/files/CAMW.2018AnnualReport.12.4.18.pdf
32.No Drug Test Required Retail Jobs in Arizona (NOW HIRING) – ZipRecruiter, accessed January 17, 2026, https://www.ziprecruiter.com/Jobs/No-Drug-Test-Required-Retail/–in-Arizona
33.Join Trax CU | Trax Credit Union | Tampa, Lakeland, Brandon – FL, accessed January 17, 2026, https://www.traxcu.com/about/join-trax-cu.html
34.Allied Universal Technology Services Ranked as 5th Largest Integrator in the 2020 SDM Top Systems Integrators Report, accessed January 17, 2026, https://www.aus.com/press-releases/allied-universal-technology-services-ranked-5th-largest-integrator-2020-sdm-top
35.Aviation & Airport Security Services – Allied Universal, accessed January 17, 2026, https://www.aus.com/industry-expertise/aviation
36.AGREEMENT FOR SERVICES THIS AGREEMENT is entered into between Washoe County, a political subdivision of the State of Nevada (“, accessed January 17, 2026, https://www.washoecounty.gov/bcc/board_committees/2022/files/UPDATED_-Item_19-Allied-Universal-Security-Services-FY23-Contract.pdf
37.Alphabet Inc | AFSC Investigate, accessed January 17, 2026, https://investigate.afsc.org/company/alphabet
38.The Tata Group, Indian Capital, and the India-Israel Alliance, accessed January 17, 2026, https://ia802801.us.archive.org/34/items/salam-report-oct-21/SALAM%20Report%20Oct%2021.pdf
39.Boycott Israeli Products — Ethical Consumerism & Alternatives, accessed January 17, 2026, https://www.propertyland.co/utils/boycott-israel
40.From economy of occupation to economy of genocide – (A/HRC/59/23) Report of the Special Rapporteur on the situation of human rights in the Palestinian territories occupied since 1967 – Question of Palestine – the United Nations, accessed January 17, 2026, https://www.un.org/unispal/document/a-hrc-59-23-from-economy-of-occupation-to-economy-of-genocide-report-special-rapporteur-francesca-albanese-palestine-2025/
41.a-hrc-59-23-auv.docx – ohchr, accessed January 17, 2026, https://www.ohchr.org/sites/default/files/2025-06/a-hrc-59-23-auv.docx
42.European Financial Institutions’ Continued Complicity in the Illegal Israeli Settlement Enterprise – Don’t Buy into Occupation Coalition, accessed January 17, 2026, https://dontbuyintooccupation.org/wp-content/uploads/2023/12/2023_DBIO-III-Report_11-December-2023.pdf

Related News & Articles