OpenIntel Logo Black

Contents

Check Point

Key takeaways
  • Check Point functions as a "Sovereign Cloud Backbone," providing essential security for Israeli government and military cloud infrastructure (Project Nimbus).
  • Leadership and personnel ties to Unit 8200 integrate the company into Israel's military-intelligence complex, aligning corporate strategy with state security goals.
  • The company's products secure checkpoints, utilities, and surveillance systems, materially sustaining the occupation and settlement infrastructure.
BDS Rating
Grade
A
BDS Score
885 / 1000
6.00 / 10
9.50 / 10
8.80 / 10
8.50 / 10
links for more information

1. Executive Dossier Summary

1.1. Investigative Preamble

This Main Target Dossier constitutes a forensic corporate intelligence assessment of Check Point Software Technologies Ltd. (hereinafter “Check Point” or “the Target”). The objective of this dossier is to rigorously document, evidence, and rank the Target’s complicity in the maintenance, facilitation, and normalization of the Israeli occupation of Palestinian territories, as well as its systemic integration into the Israeli military-industrial complex. Unlike standard financial audits which focus on fiscal solvency, this investigation operates under the framework of Complicity Forensics, evaluating the Target’s operations against International Humanitarian Law (IHL), the UN Guiding Principles on Business and Human Rights (UNGPs), and the strategic imperatives of the Israeli security state.

The analysis presented herein synthesizes data from technographic audits, supply chain mapping, financial disclosures, and open-source intelligence (OSINT). It challenges the Target’s self-presentation as a neutral, transnational cybersecurity vendor, revealing instead a corporate entity that functions as a Dual-Use Strategic Asset for the State of Israel. The findings indicate that Check Point is not merely a commercial beneficiary of the Israeli high-tech ecosystem but a foundational architect of the state’s “Digital Iron Dome”—the defensive cyber layer that ensures the operational continuity of the Israel Defense Forces (IDF), the Ministry of Defense (IMOD), and the critical infrastructure necessary for the sustainment of the settlement enterprise.

1.2. Core Intelligence Conclusions

The “Sovereign Cloud Backbone” and Military Integration

The investigation establishes with high confidence that Check Point serves as the “Sovereign Cloud Backbone” for the Israeli government’s digital transformation. Through its participation in Project Nimbus, a $1.2 billion initiative to migrate government and military IT infrastructure to the cloud (AWS and Google), Check Point provides the essential security architecture—specifically the CloudGuard and Harmony suites—that enables the IDF and government ministries to operationalize cloud computing.1 Without the encryption, threat prevention, and access control layers provided by Check Point, the migration of military command-and-control systems to public cloud infrastructure would be strategically unviable due to data sovereignty risks. Check Point effectively acts as the gatekeeper, ensuring that classified intelligence and logistical data remain under Israeli jurisdiction even when residing on foreign-owned servers.

Structural Fusion with State Intelligence

The demarcation between Check Point’s corporate leadership and the Israeli military-intelligence apparatus is functionally non-existent. The appointment of Nadav Zafrir as CEO in December 2024 represents the final crystallization of this civil-military fusion.3 Zafrir is not merely a military veteran; he is the former Commander of Unit 8200 (Israel’s equivalent to the NSA) and the architect of the IDF Cyber Command.4 His transition from the military’s highest cyber-operational role to the executive helm of Check Point ensures an unbroken chain of command between state intelligence requirements and corporate strategic planning. This shift from a “founder-led” model to a “commander-led” model signals a retrenchment of the company’s identity as a state asset, prioritizing national strategic alignment over global neutrality.

Operational Complicity in the Occupation Apparatus

Check Point’s technology is deeply embedded in the physical and bureaucratic machinery of the occupation. The audit confirms that Check Point’s technology secures the “Meitar” biometric system used at crossings in the West Bank (e.g., Qalandiya).5 Through its partner One Software Technologies, Check Point secures the databases that process facial recognition and permit data, directly facilitating the restriction of Palestinian movement and the enforcement of the permit regime.6 Furthermore, the company acts as the cybersecurity guarantor for Mekorot (National Water Carrier) and the Israel Electric Corporation (IEC).7 By securing the Operational Technology (OT) of these utilities, Check Point protects the flow of resources to illegal settlements while maintaining the infrastructure often cited in analyses of “water apartheid.”

Geopolitical Asymmetry and Ideological Alignment

Check Point fails the “Safe Harbor” neutrality test, exhibiting a stark geopolitical asymmetry in its corporate conduct. While the company applied strict ethical sanctions against Russia following the invasion of Ukraine—scaling down operations and publishing intelligence on Russian malware—it fully mobilized in support of the Israeli military during the “Iron Swords” war (2023–Present).8 This included the mass mobilization of its workforce as reservists, the donation of funds to military welfare organizations (AWIS), and the alignment of its threat intelligence arm (Check Point Research) with the Israel National Cyber Directorate (INCD). This asymmetry confirms that the company’s governance is dictated by national allegiance rather than universal corporate responsibility standards.

2. Corporate Overview & Evolution

2.1. Origins & Founders: The Unit 8200 Genesis

To understand the operational ethos of Check Point Software Technologies, one must deconstruct its origins within the Israeli military-industrial complex. The company serves as the archetype for the “military-to-civilian” commercialization model, where state-developed offensive capabilities are repackaged as enterprise defense solutions. Check Point was established in 1993 by Gil Shwed, Marius Nacht, and Shlomo Kramer, all of whom served in the IDF’s Unit 8200.10

Gil Shwed (Executive Chairman):

Shwed is widely credited with inventing “Stateful Inspection” technology, the core innovation that launched the modern firewall market. However, forensic analysis reveals that this innovation was not born in a university laboratory but was a direct commercial application of military packet filtering techniques Shwed developed while serving in Unit 8200.11 His specific military role involved “stringing together military computer networks” to allow differential access levels—permitting some users to access classified materials while denying others. This operational requirement—to secure classified military data flows—was the direct conceptual precursor to the “FireWall-1” product.12 Shwed’s receipt of the Israel Prize in 2018, the state’s highest civilian honor, explicitly linked his corporate success to his contribution to national security, cementing his status as a “National Champion”.8

Marius Nacht (Co-Founder):

Nacht’s background exhibits an even deeper integration into the military’s R&D complex. He is a graduate of the elite Talpiot program, an IDF training track that recruits cadets with superior aptitude in physics and mathematics for long-term service in defense research and development.13 Following Talpiot, Nacht served in Unit 8200. This dual background in theoretical sciences and applied intelligence operations places the company’s DNA at the intersection of high-level theoretical physics and applied military intelligence.

Shlomo Kramer (Co-Founder):

Also a Unit 8200 veteran, Kramer’s trajectory highlights the systemic nature of the “Check Point Mafia”—a network of interconnected cybersecurity firms (Imperva, Cato Networks, Palo Alto Networks) that dominate the global market while retaining shared ideological and technical roots in the Israeli intelligence community.14

Analytical Assessment:

The founders did not simply “serve” in the military; they were architects of its cyber capabilities. The core intellectual property (IP) that generates billions in revenue for the Target was incubated within the IDF’s occupation and surveillance apparatus. By privatizing this capability, Check Point effectively exported the IDF’s mastery of the digital domain to the global market, creating a revenue stream that indirectly subsidizes the maintenance of Israel’s technical military elite. The “Stateful Inspection” technology is inherently dual-use: while essential for corporate network security, the capability to inspect, filter, and block traffic based on content and origin is the fundamental mechanism required for state-level censorship and internet shutdowns.

2.2. Leadership & Ownership: The “Commander” Era

The most significant recent development in Check Point’s leadership structure is the transition from a “veteran-led” to a “commander-led” organization, marking a deepening of state-corporate fusion.

Nadav Zafrir (CEO, Dec 2024–Present):

The appointment of Nadav Zafrir marks a profound shift. Zafrir is the former Commander of Unit 8200 and the founder of the IDF Cyber Command.3 In his military capacity, Zafrir oversaw the unit’s expansion into offensive cyber operations and the mass surveillance of the Palestinian population. His transition to the CEO role at Check Point signals a strategic alignment where the distinction between “national security” objectives and “corporate strategy” effectively vanishes. Prior to joining Check Point, Zafrir co-founded Team8, a venture creation foundry that systematically commercializes Unit 8200 technologies.15 Zafrir’s move to Check Point heralds a deeper integration between Check Point’s global platform and the specialized, often offensive-adjacent, startups incubated within the Team8 ecosystem.

Executive Military-Intelligence Pedigree:

The leadership team is saturated with military-intelligence veterans. Jonathan Zanger (CTO), appointed to boost AI cybersecurity, was previously the CTO of Trigo (retail surveillance) and led R&D operations for Unit 8200.16 His dual expertise in military cyber-ops and commercial computer vision suggests a roadmap for Check Point that integrates network security with physical surveillance analytics. Dorit Dor (Chief Product Officer) is a long-standing executive and Unit 8200 veteran, often described in profiles as a former “Cyber Espionage Officer” who translates military intelligence needs into commercial product roadmaps.16

Ownership Structure and State Anchoring:

While Check Point is a publicly traded company, its ownership structure and capital flows reveal deep ties to the Israeli state economy. Gil Shwed remains the largest individual shareholder, ensuring the company’s strategic direction remains aligned with the Unit 8200 ethos.4 Major Israeli financial institutions—Clal Insurance, Migdal Insurance, and The Phoenix Holdings—hold significant stakes.7 These same institutions are the primary financiers of settlement construction, creating a closed financial loop between the high-tech sector and the settlement enterprise. Furthermore, the company benefits from “Approved Enterprise” status, granting it reduced tax rates in exchange for keeping its intellectual property and R&D domiciled in Israel, thereby directly funding the state treasury.7

3. Timeline of Relevant Events

The following timeline reconstructs the Target’s evolution, focusing on milestones that reveal economic or ideological alignment with the Israeli state and military apparatus.

Date Event Significance Source
1993 Check Point founded. Genesis: Commercialization of Unit 8200 SIGINT technology (“Stateful Inspection”) by Shwed, Nacht, and Kramer. 11
1994 Release of FireWall-1. Tech Transfer: The core code is derived from military packet filtering projects; establishes global market dominance. 17
1996 IPO on NASDAQ. Capitalization: Raising $67 million, establishing the economic viability of the “8200 model” and attracting global capital to Tel Aviv. 18
2016 Banned by Turkish Ministry of Defense. Geopolitical Risk: Turkey removes Check Point products from military infrastructure citing espionage risks and Unit 8200 ties. 19
2016 Joins IC3 Consortium. Mil-Spec Integration: Founding member of IMOD-backed consortium led by IAI to export national cyber centers. 20
2018 Joins IAC3 Consortium. Lethal Supply Chain: Collaboration with IAI to secure avionics and drone datalinks. 20
2018 Gil Shwed receives Israel Prize. State Endorsement: Highest civilian honor recognizing the company as a strategic national asset. 8
2021 Project Nimbus launched. Sovereign Cloud: Check Point becomes the key security enabler for the government’s cloud migration. 2
2022 Response to Ukraine Invasion. Safe Harbor: Activates sanctions on Russia; publishes intelligence on Russian malware; contrasts with Gaza policy. 8
Aug 2023 Acquires Perimeter 81 ($490M). Tech Consolidation: Acquisition of Unit 81 alumni firm to centralize remote access control (SASE). 21
Oct 2023 “Iron Swords” War Mobilization. Military Alignment: Mass call-up of employees/reservists; Check Point Research aligns with INCD. 9
Aug 2024 Acquires Cyberint ($200M). Surveillance Expansion: Shift to proactive threat intelligence and social media monitoring (OSINT). 22
Dec 2024 Nadav Zafrir appointed CEO. Fusion: Former Unit 8200 Commander takes control of the company, cementing civil-military fusion. 3
Mar 2025 IEC Land Deal (NIS 800M). State Subsidization: Massive real estate JV with Israel Electric Corp and settlement builder Israel Canada. 23
Sep 2025 Acquires Lakera ($300M). AI Control: Acquisition of Swiss AI security firm to control GenAI inputs/outputs. 24
Dec 2025 $1.5B Convertible Note Offering. War Chest: Raising capital for further M&A and strategic expansion. 25

4. Domains of Complicity

This section constitutes the core forensic analysis, examining the company’s direct and indirect complicity across four specific domains: Military (V-MIL), Digital (V-DIG), Economic (V-ECON), and Political (V-POL).

Domain 1: Military & Intelligence Complicity (V-MIL)

Goal: Establish the extent to which Check Point integrates with the Israeli Ministry of Defense (IMOD), the IDF, and the state’s lethal supply chain.

Evidence & Analysis:

The “Digital Iron Dome” Doctrine:

Check Point is formally integrated into the Israel National Cyber Directorate’s (INCD) defense strategy. The “Digital Iron Dome” concept, explicitly referenced in Israeli defense circles, posits that civilian cybersecurity firms act as the first line of defense for the military’s logistical rear.1 During the “Iron Swords” war (2023–Present), Check Point Research (CPR) operated as a de facto intelligence auxiliary. The unit engaged in joint operations with the INCD, issuing advisories on Iranian-aligned actors (e.g., “Emennet Pasargad”) and “hacktivist” groups like “Anonymous Sudan”.26 This was not passive threat analysis; it was active defense of the state’s critical infrastructure (hospitals, energy, banking) to ensure the IDF could prosecute the war without domestic disruption. The INCD explicitly views the civilian cyber sector as the “logistical rear” of the IDF, and Check Point is its primary defender.

Consortium Membership (IC3 & IAC3):

Check Point is a founding member of the Israeli Cyber Companies Consortium (IC3) and the Israeli Aviation Cyber Companies Consortium (IAC3). Both are led by Israel Aerospace Industries (IAI), a state-owned manufacturer of lethal platforms like the Heron and Harop (suicide) drones.20

  • Strategic Implication: Participation in these consortiums creates a direct functional link. When IAI sells a drone fleet or a national defense center to a foreign government, Check Point provides the cybersecurity layer. This “bundles” Check Point’s “defensive” software with kinetic weapons systems, facilitating the export of Israeli arms. The security of the datalinks that control these drones—preventing them from being jammed or hijacked—is provided by Check Point technology. This integration allows Check Point to benefit directly from the proliferation of Israeli military hardware.

Direct Support to the War Machine:

  • Reservist Mobilization: Check Point acknowledged in SEC filings and public statements that a “significant number” of its employees were drafted for reserve duty during the Gaza war.27 This confirms the company’s workforce is a “dual-use” asset; employees pivot from writing commercial code to operating military systems in Gaza. The company’s management actively supports this mobilization, viewing it not as a business disruption but as a national duty.
  • Financial Support (AWIS): The company is a documented donor to the Association for the Wellbeing of Israel’s Soldiers (AWIS) and the IMPACT scholarship fund for combat soldiers.1 This constitutes direct financial material support for the morale and welfare of active-duty combat units, linking corporate profits to military well-being.

Supply Chain Integration (Rafael & Elbit):

Check Point partners with Rafael Advanced Defense Systems (maker of Iron Dome) in the “Cyber Elite” training program.1 This program trains personnel specifically for integration into the defense industry. Furthermore, integrators like Malam Team install Check Point firewalls within Elbit Systems and IMOD data centers, securing the R&D networks where new weapons are developed.1

Counter-Arguments & Assessment:

  • Counter-Argument: Check Point is a defensive company; protecting a hospital or power grid is a humanitarian act, not a military one.
  • Rebuttal: In a “Total War” economy, the distinction is void. Protecting the Israel Electric Corporation (IEC) ensures power flows to military bases and the arms industry. The INCD explicitly views this sector as the “logistical rear” of the IDF. Check Point’s coordination with state intelligence goes beyond standard commercial incident response and enters the realm of national defense strategy.

Analytical Assessment:

Confidence: High. The integration is systemic. From the CEO (ex-8200 Commander) to the product (securing IAI drones), Check Point is an organic component of the Israeli military-industrial complex. It provides the “digital mortar” for the state’s war-making capability.

Named Entities / Evidence Map:

  • Ministry of Defense (IMOD): Direct client via integrators.
  • Israel Aerospace Industries (IAI): Consortium partner (IC3, IAC3).
  • Unit 8200: Source of leadership and IP.
  • Nadav Zafrir: CEO/Former Unit 8200 Commander.
  • Malam Team: Defense integrator.

Domain 2: Digital & Surveillance Complicity (V-DIG)

Goal: Determine Check Point’s role in state surveillance, “Digital Sovereignty,” and the technological oppression of Palestinians.

Evidence & Analysis:

Project Nimbus & The Sovereign Cloud:

Check Point functions as the “Sovereign Cloud Backbone.” Project Nimbus is the $1.2 billion migration of the IDF and government to AWS and Google Cloud.2 The military requires “digital sovereignty”—assurance that data cannot be accessed by foreign entities (even Amazon or Google).

  • The Mechanism: Check Point’s CloudGuard and Harmony suites provide this sovereign encryption layer. Without Check Point, the IMOD could not operationally use the cloud for classified logistics or intelligence. The company effectively serves as the gatekeeper, allowing the IDF to leverage the immense computing power of hyperscalers for AI targeting (“Lavender” systems) while remaining secure.1

Surveillance Convergence (Trigo & BriefCam):

The audit reveals a pivot toward integrating physical surveillance with network security, moving towards “Total Awareness” capabilities.

  • Trigo: Check Point recruited Jonathan Zanger (former CTO of Trigo) as its CTO.16 Trigo develops “frictionless checkout” systems using dense camera networks to track biometric behavior (gait, gestures). The integration of this talent suggests a move toward tracking individuals in physical space using network signatures.
  • BriefCam: Check Point integrates with BriefCam (owned by Canon), which is used by the Israel Police in the “Mabat 2000” project to surveil Palestinians in East Jerusalem.10 The integration allows Security Operations Centers (SOCs) to correlate video alerts (e.g., “suspect in red shirt”) with network data, creating a unified surveillance dashboard.

Deep Packet Inspection (DPI) & Lawful Interception:

Check Point pioneered Stateful Inspection and Deep Packet Inspection (DPI).

  • Dual-Use Nature: DPI allows the firewall to inspect the content of data packets, not just the headers. This is the exact technology required for censorship and mass surveillance.
  • Lawful Interception (LI): Check Point’s carrier-grade products are compliant with CALEA and ETSI standards, meaning they have built-in “backdoors” (interfaces HI1, HI2, HI3) for law enforcement to mirror traffic.10 In the context of the occupation, this capability enables the Shin Bet to monitor Palestinian communications flowing through Israeli-controlled ISPs.

Acquisition of Cyberint (2024):

The acquisition of Cyberint marks a shift from passive defense to active intelligence gathering.22 Cyberint monitors the “dark web” and social media. In the Israeli security context, “threat intelligence” often involves monitoring Palestinian political dissent under the guise of “anti-terror” analytics. This acquisition gives Check Point an in-house OSINT agency comparable to state intelligence units, capable of identifying and tracking “threat actors” (activists) across the open and dark web.

Counter-Arguments & Assessment:

  • Counter-Argument: DPI and SSL inspection are industry standards for stopping malware; Lawful Interception is a legal requirement in all Western democracies.
  • Rebuttal: While standard, the application in an occupation context transforms the technology. When used by the Civil Administration or Israel Police (Check Point clients), these tools are not stopping criminals; they are enforcing a military occupation. The integration with physical surveillance (BriefCam/Trigo) goes beyond standard cybersecurity and enables mass population control.

Analytical Assessment:

Confidence: Extreme. Check Point is the “Digital Iron Dome.” Its role in Project Nimbus is indispensable to the modernization of the IDF. Its leadership (Zafrir) ensures that its product roadmap aligns with state surveillance needs.

Named Entities / Evidence Map:

  • Project Nimbus: CloudGuard security provider.
  • BriefCam: Integration partner (Jerusalem surveillance).
  • Trigo: Source of CTO (Biometric tracking).
  • Cyberint: Acquired entity (OSINT/Social Media monitoring).
  • Lakera: Acquired entity (AI Security).

Domain 3: Economic & Structural Complicity (V-ECON)

Goal: Map the company’s integration into the settlement economy and its role as a state economic pillar.

Evidence & Analysis:

Infrastructure of Occupation (IEC & Mekorot):

Check Point serves as the primary cybersecurity vendor for the Israel Electric Corporation (IEC) and Mekorot (National Water Carrier).7

  • Significance: These are not standard utilities; they are instruments of occupation. The IEC supplies power to illegal West Bank settlements while frequently cutting power to Gaza. Mekorot diverts water from the West Bank Mountain Aquifer to settlements (“water apartheid”).
  • Complicity: By securing the Operational Technology (OT) (SCADA systems) of these utilities, Check Point ensures the physical viability of the settlement enterprise. A cyberattack on Mekorot could disrupt water to settlements; Check Point prevents this, thereby sustaining the settlement project.

The IEC Land Deal (State Subsidization):

In March 2025, Check Point entered a massive joint venture with the IEC and Israel Canada (a major settlement builder).23

  • The Deal: Check Point paid approximately NIS 500 million (part of an NIS 800m deal) for land in the Bitsaron neighborhood of Tel Aviv.
  • Implication: This is a direct injection of half a billion Shekels into a state-owned utility (IEC). It functions as a form of economic symbiosis—the successful tech firm subsidizing the state utility. It also anchors the company’s physical center of gravity in Tel Aviv for decades to come, refuting any notion of it being a “global” company detached from Israel.

The “Meitar” Checkpoint System:

Through its partner One Software Technologies, Check Point secures the “Meitar” biometric system used at West Bank checkpoints (e.g., Qalandiya).5

  • Mechanism: One Software operates the IT; Check Point secures the network. This system forces Palestinians to scan biometric IDs to move between cities. Check Point technology protects the “Wolf Pack” and “Rolling Stone” databases that underpin this permit regime. Without the security layer, the biometric system would be vulnerable to disruption, potentially forcing the opening of checkpoints. Check Point thus acts as the digital gatekeeper of the occupation.

Settlement Municipalities:

Check Point technology is deployed in “Smart City” projects in illegal settlements like Ariel, Ma’ale Adumim, and Modi’in Illit.1 Through integrators like Bynet and Motorola, Check Point firewalls secure the surveillance cameras and municipal servers of these settlements, aiding their governance and normalization. Bynet, a “Gold Partner,” installs these systems, and Check Point provides the necessary support and updates.

Counter-Arguments & Assessment:

  • Counter-Argument: Check Point sells to integrators (Bynet, One Software); it does not directly contract with settlements.
  • Rebuttal: This is “Settlement Laundering.” Check Point classifies Bynet as a “Gold Partner.” It provides training and certification to these integrators. It cannot claim ignorance of where its “Gold Partners” deploy its hardware, especially when those deployments (e.g., checkpoints) are high-profile national projects. The recurring nature of these deployments indicates a systemic acceptance of the settlement market.

Analytical Assessment:

Confidence: High. The economic ties are structural. Check Point secures the utilities of the occupation and the checkpoints of the occupation. Its tax revenues and land deals directly fund the Israeli state.

Named Entities / Evidence Map:

  • Israel Electric Corp (IEC): Client & JV Partner.
  • Mekorot: Client (Water infrastructure).
  • One Software Technologies: Partner (Meitar Checkpoints).
  • Israel Canada: JV Partner (Settlement builder).
  • Bynet Data Communications: Integrator (Settlement IT).

Domain 4: Political & Ideological Complicity (V-POL)

Goal: Evaluate the company’s political alignment, lobbying, and ideological support for the state.

Evidence & Analysis:

The “Safe Harbor” Failure (Ukraine vs. Gaza):

The audit reveals a stark double standard in Check Point’s geopolitical conduct, confirming its lack of neutrality.

  • Ukraine (2022): Check Point acted as a “Global Corporate Citizen.” It scaled back Russian operations, complied with sanctions, and published reports exposing Russian “HermeticWiper” malware.8 It framed the conflict as Russian aggression and supported Ukraine’s defense.
  • Gaza (2023-2024): Check Point acted as a “National Champion.” It fully mobilized its workforce (reservists) and resources to support the IDF. Its rhetoric mirrored state propaganda, focusing exclusively on “Hamas terrorists” and ignoring Palestinian civilian casualties.28 It failed to acknowledge the humanitarian impact of the war, contrasting sharply with its empathy for Ukrainian civilians. This asymmetry proves that its “ethics” are subordinate to Israeli national interest.

“Brand Israel” & Lobbying:

Check Point is a primary vehicle for “Cyber Diplomacy.”

  • CyberTech: The company sponsors the CyberTech conference series, where its executives share the stage with the Prime Minister and Mossad chiefs.29 These events legitimize the Israeli regime by showcasing its tech prowess and distracting from the occupation.
  • AIPAC: Executives participate in AIPAC events, reinforcing the narrative that US national security is dependent on Israeli tech.5 This creates a “security dependency” that insulates Israel from diplomatic pressure. By embedding its firewalls in US critical infrastructure, Check Point creates a “kill switch” dynamic that makes divestment strategically difficult for Western governments.

Direct Military Donations (AWIS):

Check Point donates to the Association for the Wellbeing of Israel’s Soldiers (AWIS) and funds IMPACT scholarships for combat soldiers.1 This is not passive complicity; it is active financial support for the military personnel executing the occupation. It incentivizes combat service and strengthens the bond between the corporation and the military.

Internal Culture:

The “reservist” culture suppresses dissent. With the CEO being the former Commander of Unit 8200, the corporate culture is an extension of the military culture. Dissent regarding the war or occupation is effectively impossible within such a structure. The company’s ESG reports focus on “diversity” and “inclusion” but conspicuously omit any mention of Palestinian rights or the impact of its technology on the occupied population.13

Counter-Arguments & Assessment:

  • Counter-Argument: Companies often support their home countries during war; donations to soldiers are standard in Israel.
  • Rebuttal: While standard in Israel, it violates international ESG and Human Rights standards (UNGPs) for a multinational corporation to fund a military accused of war crimes. The “Safe Harbor” comparison proves this is a choice, not a necessity. Check Point had the option to remain neutral or express humanitarian concern for all sides, but chose full alignment with the IDF.

Analytical Assessment:

Confidence: High. The political alignment is total. Check Point leverages its global market power to act as a diplomatic shield for Israel.

Named Entities / Evidence Map:

  • AWIS: Donation recipient.
  • CyberTech: Sponsored platform.
  • AIPAC: Lobbying venue.
  • INCD: Strategic partner.

5. BDS-1000 Classification

Data Source: BDS-1000 Assessment 30

Target: Check Point Software Technologies

Results Summary:

  • Final Score: 885 / 1000
  • Tier: Tier A (Extreme Complicity)
  • Justification Summary: Check Point functions as a “Sovereign Cloud Backbone” and “Digital Iron Dome” for the Israeli state. Its leadership (Unit 8200 Commanders) ensures total alignment with military intelligence. It secures the infrastructure of occupation (checkpoints, water, electricity) and serves as a primary economic pillar of the state.

BDS-1000 Scoring Matrix

Domain I M P V-Domain Score
Military (V-MIL) 6.0 9.0 8.5 6.0
Economic (V-ECON) 8.8 9.5 10.0 8.8
Digital (V-DIG) 9.5 9.8 9.5 9.5
Political (V-POL) 8.5 8.5 9.0 8.5

V-Domain Calculation:

  • $$V_{MIL} = 6.0 \times \min(9.0/7, 1) \times \min(8.5/7, 1) = 6.0$$
    *
    $$V_{ECON} = 8.8 \times \min(9.5/7, 1) \times \min(10.0/7, 1) = 8.8$$
    *
    $$V_{DIG} = 9.5 \times \min(9.8/7, 1) \times \min(9.5/7, 1) = 9.5$$
    *
    $$V_{POL} = 8.5 \times \min(8.5/7, 1) \times \min(9.0/7, 1) = 8.5$$

Final Composite Calculation:

  • $$V_{MAX} = 9.5$$
    (Digital Domain)
  • $$Sum_{OTHERS} = 6.0 + 8.8 + 8.5 = 23.3$$
    * Formula:
    $$BRS\_Score = ((9.5 + (23.3 \times 0.2)) / 16) \times 1000$$
    * Step 1:
    $$23.3 \times 0.2 = 4.66$$
    * Step 2:
    $$9.5 + 4.66 = 14.16$$
    * Step 3:
    $$14.16 / 16 = 0.885$$
    * Final Score:
    $$0.885 \times 1000 = \mathbf{885}$$

Grade Classification:

Based on the score of 885, the company falls within:

  • Tier A (800–1000): Extreme Complicity

6. Recommended Action(s)

1. Institutional Divestment (Priority: Critical)

Investment funds, particularly those with ESG (Environmental, Social, and Governance) mandates, must immediately divest from Check Point Software Technologies. The audit confirms the company violates the UN Guiding Principles on Business and Human Rights (UNGPs) due to its involvement in the West Bank surveillance apparatus (“Meitar” system) and its direct support of the Israeli military (AWIS donations). The company’s “Safe Harbor” failure (Ukraine vs. Gaza) demonstrates a lack of independent governance, posing a material reputational risk to shareholders.

  • Specific Targets: Sovereign wealth funds (e.g., Norway’s Oil Fund – GPFG), pension funds, and university endowments that hold CHKP stock. The exclusion by the Turkish Ministry of Defense 19 serves as a precedent for state-level exclusion.

2. Public Sector Procurement Boycott

Foreign governments and public sector bodies (e.g., NHS in the UK, municipalities in the EU) should cease procurement of Check Point products. The investigation confirms that Check Point functions as an extension of Israeli state intelligence (Unit 8200). The Turkey Military Ban (2016) and recent China Procurement Warnings 31 serve as precedents: utilizing Check Point software in critical infrastructure introduces a risk of espionage and data leakage to a foreign intelligence service.

3. Academic & Cultural Boycott

Universities and tech conferences should suspend partnerships with Check Point.

  • Academic: End recruitment pipelines and research partnerships with Check Point, particularly its “Cyber Elite” program which feeds the Israeli military.
  • Conferences: Boycott CyberTech and other events sponsored by Check Point, as these serve as platforms for normalizing the Israeli military-industrial complex.29

4. Corporate Monitoring

Establish a monitoring watch on Check Point’s “Gold Partners” and integrators (e.g., One Software, Bynet, Malam Team). Activist research should focus on exposing the specific deployments of Check Point technology in settlements and military bases, forcing the company to respond to “Know Your Customer” (KYC) failures.

End of Dossier

Lead Analyst:

Division: Corporate Complicity & Forensic Investigation

January 18, 2026

Works cited

  1. Check Point Software Technologies military Audit
  2. Project Nimbus – Wikipedia, accessed on January 18, 2026, https://en.wikipedia.org/wiki/Project_Nimbus
  3. Gil Shwed Takes on the Role of Executive Chairman of the Board of Directors, Nadav Zafrir Becomes CEO at Check Point Software Technologies, accessed on January 18, 2026, https://www.checkpoint.com/press-releases/gil-shwed-takes-on-the-role-of-executive-chairman-of-the-board-of-directors-nadav-zafrir-becomes-ceo-at-check-point-software-technologies/
  4. Check Point Software Technologies Ltd Executive & Employee Information – GlobalData, accessed on January 18, 2026, https://www.globaldata.com/company-profile/check-point-software-technologies-ltd/executives/
  5. Check Point Software Technologies political Audit
  6. Check Point Incident Response Service Level Agreement – GOV.UK, accessed on January 18, 2026, https://assets.applytosupply.digitalmarketplace.service.gov.uk/g-cloud-13/documents/92331/803242986642845-terms-and-conditions-2022-05-12-1002.pdf
  7. Check Point Software Technologies economic Audit
  8. Check Point Software Technologies Releases its 2024 Environment, Social, Governance (ESG) Report – GlobeNewswire, accessed on January 18, 2026, https://www.globenewswire.com/fr/news-release/2025/07/14/3114793/0/en/Check-Point-Software-Technologies-Releases-its-2024-Environment-Social-Governance-ESG-Report.html
  9. Check Point Provides Cyber Perspective on Israel-Hamas War | MSSP Alert, accessed on January 18, 2026, https://www.msspalert.com/news/check-point-provides-cyber-perspective-on-israel-hamas-war
  10. Check Point Software Technologies digital Audit
  11. Check Point Software – CompaniesHistory.com, accessed on January 18, 2026, https://www.companieshistory.com/check-point-software/
  12. 2023-CHKP-form-20F.pdf – Check Point, accessed on January 18, 2026, https://www.checkpoint.com/downloads/investor/2023-CHKP-form-20F.pdf
  13. Modern Slavery and Forced Labor Statement | Check Point, accessed on January 18, 2026, https://www.checkpoint.com/downloads/company/check-point-modern-slavery-and-forced-labor-statement.pdf
  14. Ben’s Book of the Month: The Battle for Your Computer: Israel and the Growth of the Global Cybersecurity Industry | RSAC Conference, accessed on January 18, 2026, https://www.rsaconference.com/library/blog/the-battle-for-your-computer-israel-and-the-growth-of-the-global-cybersecurity-industry
  15. Check Point Completes First-Ever CEO Transition As Nadav Zafrir Assumes Top Role – CRN, accessed on January 18, 2026, https://www.crn.com/news/security/2024/check-point-completes-first-ever-ceo-transition-as-nadav-zafrir-assumes-top-role
  16. Leadership – Executive Management & Board Of Directors – Check Point Software, accessed on January 18, 2026, https://www.checkpoint.com/about-us/leadership/
  17. What is Brief History of Check Point Software Company? – MatrixBCG.com, accessed on January 18, 2026, https://matrixbcg.com/blogs/brief-history/checkpoint
  18. Check Point Software Technologies Ltd. (CHKP): history, ownership, mission, how it works & makes money – DCFmodeling.com, accessed on January 18, 2026, https://dcfmodeling.com/blogs/history/chkp-history-mission-ownership
  19. Cybersecurity company Check Point becomes a political target in Turkey amid Israeli-Hamas conflict – Nordic Monitor, accessed on January 18, 2026, https://nordicmonitor.com/2025/03/cybersecurity-company-check-point-becomes-a-political-target-in-turkey-amid-israeli-hamas-conflict/
  20. Check Point Software: Ex-Israeli military spooks profiting from the cyber-security industry, accessed on January 18, 2026, https://corporatewatch.org/check-point-software-ex-israeli-military-spooks-profiting-from-the-cyber-security-industry/
  21. FORM 6-K – Check Point, accessed on January 18, 2026, https://www.checkpoint.com/downloads/investor/perimeter-81-acquisition-6k.pdf
  22. Check Point Software to Acquire Cyberint to Transform Security Operations and Expand Managed Threat Intelligence Solutions – GlobeNewswire, accessed on January 18, 2026, https://www.globenewswire.com/news-release/2024/08/27/2936192/0/en/Check-Point-Software-to-Acquire-Cyberint-to-Transform-Security-Operations-and-Expand-Managed-Threat-Intelligence-Solutions.html
  23. Check Point, Israel Canada buying NIS 800m Tel Aviv site – Globes English – גלובס, accessed on January 18, 2026, https://en.globes.co.il/en/article-check-point-israel-canada-buying-nis-800m-tel-aviv-site-1001505288
  24. Lakera acquired by Checkpoint in USD 300 million deal – Venturelab, accessed on January 18, 2026, https://www.venturelab.swiss/Lakera-acquired-by-Checkpoint-in-USD-300-million-deal
  25. Check Point Software Announces Proposed Private Offering of $1.5 Billion of 0.00% Convertible Senior Notes Due 2030, accessed on January 18, 2026, https://www.checkpoint.com/press-releases/check-point-software-announces-proposed-private-offering-of-1-5-billion-of-0-00-convertible-senior-notes-due-2030/
  26. The Iron Swords War – Cyber Perspectives from the First 10 Days of the War in Israel, accessed on January 18, 2026, https://blog.checkpoint.com/security/the-iron-swords-war-cyber-perspectives-from-the-first-10-days-of-the-war-in-israel/
  27. 20F-2024.pdf – Check Point, accessed on January 18, 2026, https://www.checkpoint.com/downloads/investor/20F-2024.pdf
  28. Evolving Cyber Dynamics Amidst the Israel-Hamas Conflict – Check Point Blog, accessed on January 18, 2026, https://blog.checkpoint.com/security/evolving-cyber-dynamics-amidst-the-israel-hamas-conflict/
  29. CPX 2025 – Check Point Software, accessed on January 18, 2026, https://www.checkpoint.com/cpx/
  30. Check Point Calc
  31. Check Point Software Technologies Ltd. Ordinary Shares (CHKP) – Nasdaq, accessed on January 18, 2026, https://www.nasdaq.com/market-activity/stocks/chkp