Contents

Cisco

Key takeaways
  • Cisco is identified as the primary architect of the IDF’s digital nervous system, powering AI targeting and C4I from the "David’s Citadel" data center.
  • Company mobilized operational support after Oct 7, 2023, co-developing "Israel Rises" and supplying servers and engineers to military logistics.
  • Cisco’s Israeli acquisitions and R&D presence integrate Unit 8200 alumni, channeling military-grade tech and capital into the defense-tech ecosystem.
  • Cisco enabled settlement entrenchment via "Klika" digital hubs and smart-city surveillance, normalizing occupation and violating international law according to the dossier.
BDS Rating
Grade
A
BDS Score
891 / 1000
7.90 / 10
9.50 / 10
7.40 / 10
8.50 / 10
links for more information

1. Executive Dossier Summary

Company: Cisco Systems, Inc.

Jurisdiction: Global Headquarters: San Jose, California, USA / Operational Subsidiary: Cisco Systems Israel Ltd. (Caesarea, Netanya, Tel Aviv).

Sector: Technology / Networking Infrastructure / Cybersecurity / Defense.

Leadership: Chuck Robbins (Chair & CEO); Eyal Dagan (EVP, Strategic Projects); Haim Pinto (VP Technology).

Intelligence Conclusions

The forensic corporate intelligence assessment of Cisco Systems, Inc. establishes, with a high degree of confidence, that the entity has transcended the traditional boundaries of a commercial technology vendor to become a Tier 1 – Systemic Strategic Partner to the Israeli military-industrial complex and the state’s apparatus of occupation. The investigation, drawing upon procurement records, technographic audits, and financial disclosures, reveals a corporate profile deeply embedded in the operational continuity of the Israel Defense Forces (IDF), the surveillance of the Occupied Palestinian Territory (OPT), and the economic sustainability of the illegal settlement enterprise.

Strategic Architecture of Warfare

The most critical finding of this dossier is the identification of Cisco Systems as the primary architect of the IDF’s “digital nervous system.” The audit confirms that Cisco’s proprietary hardware and software form the backbone of the “David’s Citadel” (Metzudat David) underground data center.1 This facility, situated in the Naqab (Negev) desert, represents the centralization of the Israeli military’s Command, Control, Communications, Computers, and Intelligence (C4I) capabilities. It is not merely a storage facility; it is the computational engine that powers the IDF’s transition to Network Centric Warfare (NCW). The investigation indicates that the high-performance computing (HPC) clusters and low-latency switching fabrics provided by Cisco are the essential physical substrates hosting AI-driven targeting systems such as “The Gospel” and “Lavender”.3 These systems, used to generate target lists at an industrial scale during the 2023-2024 bombardment of Gaza, rely on the specific “deep buffering” and high-throughput capabilities inherent in Cisco’s Silicon One architecture. Therefore, the entity is forensically linked to the kinetic lethality of the military campaign, acting as the indispensable enabler of the “kill chain” from sensor to shooter.

Operational Integration and Wartime Mobilization

Unlike neutral commercial entities that maintain a separation between vendor and client, Cisco has demonstrated an active, ideological commitment to the Israeli war effort. Following the events of October 7, 2023, the company’s leadership, specifically CEO Chuck Robbins, mobilized corporate resources to support the state, declaring that teams were “working day and night to ship our technology to Israel” at the “request of the country”.5 This was not rhetorical; it was operational. Cisco engineers co-developed the “Israel Rises” logistical platform for the IDF Home Front Command, a uniformed branch of the military responsible for civil defense and wartime logistics.2 This direct collaboration constitutes material support for the state’s ability to sustain prolonged combat operations. Furthermore, the provision of financial grants specifically designated for employees serving as military reservists integrates the corporate treasury with the state’s military manpower mobilization.6

Economic Normalization and Settlement Entrenchment

The audit uncovers a systemic pattern of economic complicity that extends into the illegal colonization of the West Bank and Golan Heights. Through the “Klika” initiative, in partnership with the Israeli Ministry for the Development of the Negev and the Galilee, Cisco has equipped and established “Digital Hubs” in illegal settlements such as Modi’in Illit, Beitar Illit, Kiryat Arba, and Katzrin.2 By providing the technological infrastructure that allows settlers to participate in the high-tech economy remotely, Cisco mitigates the economic isolation of these outposts, normalizing their status and incentivizing their expansion. This activity stands in direct violation of the Fourth Geneva Convention regarding the transfer of population into occupied territory and constitutes the pillage of land for commercial gain.

The “Safe Harbor” Ethical Failure

A forensic comparison of Cisco’s geopolitical conduct reveals a catastrophic failure of ethical consistency. In response to the Russian invasion of Ukraine in 2022, Cisco executed a “clean break,” destroying approximately $23 million in assets to ensure its technology could not be used by the aggressor state.5 Conversely, in response to the ICJ-recognized plausible genocide in Gaza, Cisco deepened its engagement, expediting supply chains and developing bespoke software for the military. This disparity exposes the company’s Human Rights Policy as a selective instrument of geopolitical alignment rather than a universal ethical framework.

Systemic Aggregation of Military Capability

Structurally, Cisco functions as a massive aggregator of Israeli military-grade technology. Through an acquisition strategy exceeding $7.2 billion, the company has systematically absorbed firms founded by veterans of the IDF’s Unit 8200 (Signals Intelligence), such as Leaba Semiconductor, Portshift, and Robust Intelligence.8 This “revolving door” mechanism allows Cisco to internalize “battle-tested” surveillance and cyber-warfare technologies while injecting billions of dollars into the Israeli defense ecosystem. The resulting integration is so profound that former Israeli military intelligence officers now sit on Cisco’s global Executive Leadership Team, influencing the company’s strategic direction worldwide.

In summary, Cisco Systems is not an incidental observer of the occupation but a purpose-built actor in its maintenance. Its technology monitors the occupied population in East Jerusalem 2, its routers guide the tanks in Gaza 9, its servers process the intelligence for airstrikes 4, and its capital sustains the military-tech economy.8 The entity is graded as Tier A: Extreme Complicity.

2. Corporate Overview & Evolution

Origins & Founders

While Cisco Systems was established in 1984 in the United States, its corporate identity within the context of this investigation is defined by its deep, decades-long integration into the Israeli technological ecosystem. The company’s trajectory in the region is distinct from its operations in other international markets, characterized by a shift from simple commercial presence to strategic interdependence.

The foundational moment for this entanglement occurred in 1997, with the establishment of Cisco’s first development center in Netanya.10 Unlike sales offices or customer support centers typical of multinational expansion, this facility was conceived from the outset as a core Research and Development (R&D) hub. This strategic decision signaled Cisco’s intent to treat Israel not merely as a market for its goods, but as a source of its intellectual property. The Netanya facility, along with subsequent expansions in Caesarea and Tel Aviv, has grown to employ approximately 800 engineers, validating Israel’s status as a critical node in Cisco’s global innovation network.

The “founders” relevant to this dossier are the architects of the Israeli firms Cisco has acquired, who have subsequently embedded themselves within Cisco’s corporate DNA. The audit identifies a recurrent pattern: the acquisition of companies founded by veterans of the IDF’s elite technological units, specifically Unit 8200. This unit, often compared to the US National Security Agency (NSA), is responsible for signals intelligence, code decryption, and cyber warfare. The technologies developed within this unit—offensive cyber capabilities, mass surveillance algorithms, and high-speed data processing—are inherently dual-use. By acquiring firms founded by Unit 8200 alumni, Cisco effectively commercializes military-grade technology for the global market.

Key Figures in the Acquisition Pipeline:

  • Eyal Dagan and Ofer Eini: Founders of Leaba Semiconductor, acquired by Cisco in 2016 for roughly $320 million.3 Both Dagan and Eini are veterans of the IDF’s technological units. Their company specialized in high-throughput networking silicon, a technology essential for managing the massive data flows of modern internet traffic—and modern warfare. Following the acquisition, Dagan did not merely exit; he ascended the corporate ladder to become Executive Vice President of Strategic Projects, reporting directly to the global CEO. This placement puts a former architect of Israeli military technology at the right hand of Cisco’s leadership.
  • Zohar Kaufman: Co-founder of Portshift, a cloud security firm acquired in 2020 for approximately $100 million.3 Kaufman, a veteran of the intelligence sector, transitioned to become the Director of Cisco’s Tel Aviv office. His trajectory illustrates the “revolving door” where military expertise is monetized through acquisition and then re-integrated into the corporate leadership structure in the region.
  • Yaron Singer: Founder of Robust Intelligence, acquired in September 2024 for $400 million.8 Singer is a former officer in an IDF special operations unit. His public statements have linked his recruitment strategy to the Israeli talent pool, even during active conflict, reinforcing the seamless nature of the labor market between the military and the corporation.
  • Nitzan Shapira and Ran Ribenzaft: Co-founders of Epsagon, acquired in 2021 for $500 million. Both are veterans of IDF intelligence units. They now serve as Directors at Cisco, further solidifying the influence of the military-tech milieu within the company’s engineering divisions.3

Leadership & Ownership

The governance structure of Cisco Systems reveals a leadership team and Board of Directors that are ideologically and materially aligned with the defense establishment and the State of Israel. This alignment is not passive; it is active, vocal, and strategic.

Chuck Robbins (Chair and CEO):

Chuck Robbins has steered Cisco toward an overt partisan stance regarding Israel. His leadership is defined by a departure from the traditional corporate “neutrality” often feigned by multinationals. Following the attacks of October 7, 2023, and the subsequent bombardment of Gaza, Robbins did not issue a generic call for peace. Instead, he explicitly aligned the company with the Israeli state’s response. In internal and external communications, he stated that Cisco teams were “working day and night to ship our technology to Israel” and providing cybersecurity assistance “at the request of the country”.5 This language is significant: it positions Cisco as a logistical partner fulfilling state requests during wartime. Furthermore, Robbins has maintained a high-profile relationship with the Jewish National Fund (JNF), an organization responsible for land administration policies that systematically discriminate against non-Jewish citizens and Palestinians. His participation in the inauguration of “Digital Hubs” alongside Israeli President Reuven Rivlin demonstrates a willingness to lend the Cisco brand to state-sponsored normalization projects.5

Michael D. Capellas (Lead Independent Director):

The presence of Michael Capellas on the Board of Directors presents a severe governance risk regarding human rights. Capellas simultaneously serves on the Board of Cellebrite, an Israeli digital intelligence company.5 Cellebrite is globally notorious for its phone-hacking technology, which has been used by repressive regimes, police forces, and the Israeli military to extract data from mobile devices. The technology is a key tool in the digital surveillance arsenal. Capellas’s dual role suggests that the highest levels of Cisco’s governance structure are comfortable with the ethics of the intrusive surveillance industry. It creates a direct governance bridge between Cisco, the provider of network infrastructure, and Cellebrite, the provider of digital extraction tools.

Wesley G. Bush (Independent Director):

Wesley Bush, who joined the board in 2019, is the former Chairman and CEO of Northrop Grumman, one of the world’s largest defense contractors and a major supplier of weaponry to the IDF.5 His background lies in the heart of the military-industrial complex. His expertise is likely instrumental in navigating the complex regulatory environment of Foreign Military Sales (FMS), the US government program used to finance Cisco’s massive server contracts with the Israeli Ministry of Defense. His presence signals a strategic alignment with the defense sector, viewing military contracts not as a sideline but as a core component of the business.

Haim Pinto (VP of Technology):

Based in Israel, Haim Pinto serves as a key operational link between the company and the local ecosystem. He has been quoted in Israeli media celebrating the symbiotic relationship between Cisco and the IDF. He described the “connection between the technology units in the Israeli military and the high-tech companies in Israel” as a “significant anchor,” noting that the sight of uniformed officers working alongside Cisco engineers is “very natural to us”.4 This statement is a direct admission of the erosion of boundaries between the civilian corporate entity and the military apparatus.

Analytical Assessment

The structural evolution of Cisco Systems in Israel reveals a company that has successfully “indigenized” itself into the local security state. It is not an external actor looking in; it is an internal actor looking out.

  • Structural Integration: By acquiring firms like Leaba and Portshift, Cisco has integrated the “Unit 8200 stack”—offensive cyber logic, deep-packet inspection, and high-throughput silicon—into its global product lines. This means that technology developed for Israeli military intelligence becomes the standard for global enterprise security, and conversely, Cisco’s global capital funds the R&D of the Israeli military-tech sector.
  • Economic Dependency: The sheer scale of R&D operations in Israel (800+ engineers) creates a dependency. Cisco relies on this talent pool to maintain its global competitiveness in silicon and cloud security. This talent pool is inextricably linked to the military reserve system. Any attempt to divest or sanction Israel would threaten this critical innovation engine, creating a strong internal incentive for the company to support the status quo and oppose BDS (Boycott, Divestment, Sanctions) initiatives.
  • Ideological Alignment: The leadership’s engagement with state institutions like the JNF and the explicit support for the war effort indicate that this integration is not just economic but ideological. The company views itself as a partner in the “Start-Up Nation” project, accepting the premises of that project—including the occupation and militarization—as necessary conditions for business.

3. Timeline of Relevant Events

This chronological reconstruction details the pivotal moments in Cisco’s deepening complicity, tracking the trajectory from initial investment to full-scale wartime mobilization.

Date Event Significance
April 1997 Establishment of R&D Center in Netanya Cisco opens its first major development center in Israel, headed by Michael Laor. This marks the strategic pivot from treating Israel as a sales market to a source of core technology.10
2005–2013 Nadav Zafrir Commands Unit 8200 While pre-dating direct investment, Zafrir’s tenure establishes the doctrine of “cyber-intelligence” that later informs the companies Cisco invests in. Zafrir co-founds Team8, a key Cisco partner.3
March 2012 Acquisition of NDS Group ($5.0 Billion) Cisco acquires NDS, a Jerusalem-based provider of video encryption. This brings 5,000 employees and deep expertise in digital security into the fold. The technology is dual-use for surveillance stream encryption.8
2013 Acquisition of Intucell ($475 Million) Purchase of Self-Optimizing Network (SON) technology. This tech is critical for managing cellular networks in the complex topography of the West Bank, ensuring connectivity for settlers and military forces.8
June 2016 Acquisition of Leaba Semiconductor ($320M) Cisco acquires Leaba, founded by Unit 8200 veterans Eyal Dagan and Ofer Eini. This acquisition brings the “Silicon One” architecture in-house, essential for high-speed military networking.3
June 2016 Acquisition of CloudLock ($293 Million) Purchase of a cloud security firm founded by IDF veterans. The technology enables “data sovereignty,” allowing government clients to secure classified data in public clouds.3
January 2017 Strategic Server Tender Win ($250M+) Cisco replaces HPE as the sole provider of servers for the IDF. Funded by US Foreign Military Financing (FMS), this contract initiates the modernization of the military’s IT backbone.9
2017 Jerusalem “Smart City” Partnership Cisco signs an MoU with the Jerusalem Municipality to build the network infrastructure for the “Mabat 2000” surveillance grid in Occupied East Jerusalem.3
March 2018 Launch of “Digital Hubs” (Klika) Cisco partners with the government to launch tech hubs, expanding the network to include illegal settlements like Modi’in Illit and locations in the occupied Golan Heights.7
2019 Wesley G. Bush Joins Board Former Northrop Grumman CEO joins the Cisco Board, reinforcing ties to the defense industrial base.5
2020 Completion of “David’s Citadel” The IDF’s massive underground data center becomes operational. Powered by Cisco UCS servers and Nexus switches, it centralizes C4I functions for the entire military.9
March 2020 Unified Communications Deployment Cisco begins deploying secure IP telephony and video collaboration systems across the IDF, integrating voice, video, and data for combat units.11
October 2020 Acquisition of Portshift ($100 Million) Cisco acquires a Kubernetes security firm founded by intelligence veterans, securing the “tactical cloud” capabilities used by the military for edge computing.3
August 2021 Acquisition of Epsagon ($500 Million) Purchase of an observability platform essential for maintaining the reliability of distributed military networks and the “kill chain” data flow.3
March 2022 Exit from Russia In response to the invasion of Ukraine, Cisco destroys $23 million in assets to ensure a “clean break,” setting a precedent for ethical withdrawal from aggressor states.5
October 7, 2023 “Israel Rises” Platform Launch Immediately following the outbreak of war, Cisco engineers co-develop a logistical platform for the IDF Home Front Command to support the war effort.2
October 2023 CEO Pledge of Support Chuck Robbins publicly states Cisco is “working day and night” to ship technology to Israel “at the request of the country”.5
Nov 2023 Wartime Procurement & Webex The IMOD executes emergency contracts for Cisco servers ($2M) and purchases Webex licenses to facilitate remote command and control during the Gaza ground invasion.9
March 2024 Investment in Team8 ($500M Round) Cisco joins a massive investment round for the Unit 8200-linked venture foundry during active conflict, deepening its stake in the military-tech ecosystem.3
Sept 2024 Acquisition of Robust Intelligence ($400M) Purchase of an AI security firm founded by a former IDF special operations officer, highlighting the continued focus on securing AI models used in warfare.8

4. Domains of Complicity

This section constitutes the core of the forensic audit. It dissects the four primary domains of complicity—Military, Digital, Economic, and Political—providing a deep-dive analysis of the mechanisms, technologies, and implications of Cisco’s involvement.

Domain 1: Military & Intelligence Complicity (V-MIL)

Goal: To rigorously establish the extent to which Cisco Systems provides the material infrastructure, hardware, and logistical support that enables the lethal operations of the Israel Defense Forces (IDF).

Evidence & Analysis:

1. The “David’s Citadel” Data Center: The Brain of the Kill Chain

The investigation confirms that Cisco is the primary architect of the David’s Citadel (Metzudat David) data center, the IDF’s most critical IT infrastructure project in decades. Completed in 2020, this underground facility in the Naqab functions as the “digital nervous system” of the military.

  • The Mechanism: Following a 2017 tender victory valued at over $250 million (financed by US FMS aid), Cisco deployed its Unified Computing System (UCS) blade servers and Nexus high-speed switches to replace legacy HPE infrastructure.9 This consolidation was not merely about storage; it was about data fusion. The facility integrates intelligence from Aman (Military Intelligence), the Air Force, and ground forces into a single data lake.
  • The Lethal Implication: This data center hosts the AI-driven targeting systems “The Gospel” (Habsora) and “Lavender,” which were used extensively during the 2023-2024 war on Gaza to generate kill lists at superhuman speeds. These AI models require massive parallel processing power and “deep buffering” to handle bursts of data without packet loss. Cisco’s Silicon One architecture is specifically designed for these high-performance workloads. Without the physical servers provided by Cisco, the latency required to identify a target, verify it, and assign a weapon would be impossible to achieve at the industrial scale observed in Gaza. Cisco provides the compute cycles that drive the genocide.

2. Tactical Edge Connectivity: The Router in the Tank

Cisco’s complicity extends from the strategic command center to the “tactical edge”—the mud and rubble of the battlefield. The audit identifies the Cisco ESR6300 Embedded Services Router as a key component in the IDF’s digitized combat platforms.

  • The Mechanism: The ESR6300 is a board-level, ruggedized router designed to be integrated into military enclosures. It is optimized for Size, Weight, and Power (SWaP) constraints. These units are integrated into the Merkava Mk 4 main battle tank, the Namer APC, and the Eitan APC via integrators like Enercon/Milpower.9
  • The Lethal Implication: These routers enable the “Mobile Ready Net,” allowing combat vehicles to maintain high-speed IP connectivity while moving. This network supports the “Torch” (Tzayad) battle management system, which allows tank commanders to stream video, receive target coordinates from drones, and coordinate fire with other units. By providing the router that physically resides inside the tank, Cisco is a direct enabler of the platform’s lethality. The distinction between “commercial tech” and “weaponry” vanishes when the hardware is bolted into a tank to facilitate the firing solution.

3. Wartime Procurement and “Vendor Lock-In”

Despite reports that Dell won a subsequent tender to replace Cisco as the main server provider, procurement records from the Israeli Ministry of Defense (IMOD) reveal a different reality during wartime.

  • The Mechanism: Between November 2023 and January 2024—the peak of the aerial and ground assault on Gaza—the IMOD executed at least eight non-tender emergency contracts for Cisco servers, totaling nearly $2 million.9
  • The Lethal Implication: This continued procurement during active conflict evidences “Vendor Lock-in.” The IDF’s most critical applications, built and optimized on Cisco architecture over the previous five years, could not be migrated to a new vendor in the middle of a war. Cisco remained the de facto hardware backbone for the operational continuity of the military campaign. The IMOD’s reliance on Cisco was absolute; they needed trusted, legacy-compatible hardware to keep the kill chain running without interruption.

Counter-Arguments & Assessment:

  • Counter-Argument: Cisco sells “dual-use” technology that is commercially available; it does not manufacture weapons.
  • Forensic Rebuttal: This argument fails on the “Proximity” and “Intent” tests. The ESR6300 is marketed specifically for defense and aerospace sectors. The “David’s Citadel” contract was a direct engagement with the Ministry of Defense to build a military facility, paid for by military aid (FMS). The “Israel Rises” platform was a bespoke development for a military branch. These are not accidental sales of office supplies; they are strategic contracts for mission-critical military infrastructure.

Analytical Assessment: High Confidence. Cisco’s technology is structural to the IDF’s war-making capability. It provides the brain (data center) and the nerves (tactical network) of the military machine.

Intelligence Gaps:

  • Specific inventory lists detailing the exact number of ESR6300 units deployed in the active Merkava fleet.
  • Confirmation of whether Cisco “Smart Net” support services are currently active for the David’s Citadel facility.

Domain 2: Digital & Surveillance Complicity (V-DIG)

Goal: To determine if Cisco’s technology facilitates the surveillance, control, and digital repression of Palestinian populations in the Occupied Palestinian Territories (OPT).

Evidence & Analysis:

1. Jerusalem “Smart City”: The Panopticon of East Jerusalem

In 2017, Cisco signed a strategic partnership with the Jerusalem Municipality to implement a “Smart City” project. In the context of Occupied East Jerusalem, this initiative functions as a surveillance grid.

  • The Mechanism: Cisco deployed the underlying fiber optic network, wireless mesh points, and edge computing nodes that support the “Mabat 2000” (Gaze 2000) surveillance center.2 This center, located in the Old City, monitors hundreds of CCTV cameras 24/7.
  • The Systemic Implication: The “Smart City” infrastructure is weaponized to track Palestinian residents, enforce movement restrictions, and suppress protests at flashpoints like the Damascus Gate. Cisco’s high-bandwidth switches are required to stream high-definition video in real-time to the police command center. By providing the “pipes” for this video data, Cisco enables the visual dominance of the occupying power. The “Smart City” branding serves as a euphemism for a militarized urban surveillance apparatus.

2. Biometric Integration: The Automated Occupation

The audit reveals that Cisco’s infrastructure serves as the integration layer for biometric control systems used at checkpoints.

  • The Mechanism: The IDF and Israel Police utilize facial recognition systems like “Blue Wolf” and “Red Wolf” to scan Palestinian faces at checkpoints and verify permits. While Cisco does not write the facial recognition algorithms (often provided by firms like Oosto/AnyVision), its network architecture is essential for their operation. The massive flow of biometric data—high-resolution images that need to be matched against a central database in milliseconds—requires a low-latency, high-throughput network.3
  • The Systemic Implication: Cisco’s hardware minimizes the “decision time” at checkpoints, allowing the occupation to automate control over Palestinian movement. This efficiency reduces the manpower required for the occupation, making the system of apartheid more sustainable and scalable. Cisco technology transforms the checkpoint from a physical barrier into a digital gate, controlled remotely and instantaneously.

3. Project Nimbus and Cloud Sovereignty

Cisco plays a critical role in the IDF’s transition to the cloud via Project Nimbus, the government’s massive cloud contract.

  • The Mechanism: The IDF operates a “Hybrid Cloud” model, keeping classified data in on-premise bunkers (like David’s Citadel) while bursting other workloads to the public cloud (Google/AWS). Cisco provides the secure on-ramp for this architecture. Through acquisitions like CloudLock (CASB) and Portshift (Kubernetes security), Cisco provides the encryption and governance layers that allow the Ministry of Defense to trust the cloud.3
  • The Systemic Implication: This “Cloud Sovereignty” capability is vital for the IDF’s digital transformation. It allows the military to leverage the infinite compute power of the cloud for AI training and logistics while maintaining military-grade security. Cisco acts as the bridge between the military’s internal network and the global cloud ecosystem.

Counter-Arguments & Assessment:

  • Counter-Argument: Smart City projects improve municipal efficiency and safety for all residents.
  • Forensic Rebuttal: In a coercive environment like East Jerusalem, where the municipality actively pursues policies of demographic engineering and home demolitions, surveillance data is a tool of control, not service. The “Mabat 2000” system is explicitly a security tool used by the police, not a traffic management system. The benefits are asymmetrical: security for the settler, surveillance for the occupied.

Analytical Assessment: High Confidence. Cisco functions as the digital backbone of the surveillance state in East Jerusalem and provides the essential connectivity for the automated control of the West Bank.

Intelligence Gaps:

  • Direct evidence of Cisco hardware physically located at specific checkpoints (e.g., Qalandia, Bethlehem 300).

Domain 3: Economic & Structural Complicity (V-ECON)

Goal: To analyze Cisco’s role in the Israeli economy, specifically its support for the settlement enterprise and its integration with the military-industrial complex through acquisitions.

Evidence & Analysis:

1. Settlement “Tech Hubs”: The Klika Project

The investigation confirms that Cisco is a primary partner in the “Klika” initiative, a government project to establish “technological hubs” in the “periphery.”

  • The Mechanism: The audit identifies that Cisco has equipped and established hubs in illegal settlements, including Modi’in Illit, Beitar Illit, Kiryat Arba (a notorious hardline settlement in Hebron), Itamar, and Katzrin (Occupied Golan Heights).5 Cisco provided the video conferencing units, networking hardware, and branding for these spaces.
  • The Systemic Implication: This constitutes a direct violation of international law. By providing the infrastructure for these hubs, Cisco allows settlers to work remotely in the high-tech sector, removing the economic barrier of commuting to Tel Aviv. This “telecommuting occupation” strengthens the economic viability of the settlements, encouraging population growth and normalizing the status of these illegal outposts as standard suburbs. Cisco is effectively subsidizing the colonization of the West Bank and pillaging the land for commercial use.

2. The Aggregator Nexus & The Unit 8200 Pipeline

Cisco’s acquisition strategy in Israel is a massive engine of liquidity for the military-tech ecosystem. The company has spent over $7.2 billion acquiring roughly 20 Israeli companies.8

  • The Mechanism: A disproportionate number of these acquisitions target firms founded by veterans of Unit 8200.
    • Leaba: High-speed silicon (Unit 8200 founders).
    • Portshift: Kubernetes security (Intel/Security background).
    • Intucell: SON technology (Unit 8200 founders).
    • Robust Intelligence: AI security (Special Ops founder).
  • The Systemic Implication: This creates a symbiotic financial loop. Cisco injects billions into the Israeli defense-tech ecosystem, rewarding the commercialization of military research. In return, it gains access to “battle-tested” technologies—offensive cyber logic, encryption, and surveillance algorithms—developed in the laboratory of the occupation. This validates the “Start-Up Nation” brand and encourages the militarization of the tech sector, as founders know that developing dual-use tech is a path to a lucrative Cisco exit.

3. Strategic FDI and R&D Dependence

Cisco’s local subsidiary, Cisco Systems Israel Ltd., acts as a core R&D node with ~800 engineers, not just a sales office.

  • The Mechanism: The Netanya and Caesarea facilities are integral to Cisco’s global product development, particularly for the Silicon One chip architecture.
  • The Systemic Implication: This structural commitment means Cisco treats Israel as an extension of its domestic innovation base. It is dependent on the local talent pool, which is inextricably linked to the military reserve system. This dependency creates a strong internal incentive for the company to support the status quo and resist divestment pressure, as its own product roadmap is held hostage by its reliance on Israeli engineering.

Counter-Arguments & Assessment:

  • Counter-Argument: The Digital Hubs are intended to bridge the digital divide for peripheral communities.
  • Forensic Rebuttal: The definition of “periphery” by the Israeli government includes illegal settlements. A corporate due diligence process should have flagged locations like Kiryat Arba—a hub of extremist settler violence—as “No-Go” zones. Operating there is a choice to legitimize the settlement enterprise. The presence of Cisco branding in an illegal settlement on stolen land is an act of political recognition.

Analytical Assessment: High Confidence. Cisco is actively engaged in the economic normalization of settlements and serves as a primary financial engine for the Israeli military-tech ecosystem.

Intelligence Gaps:

  • Revenue figures generated specifically from the settlement hubs vs. hubs within the Green Line.

Domain 4: Political & Ideological Complicity (V-POL)

Goal: To assess the ideological alignment of Cisco’s leadership and its participation in state-sponsored political initiatives.

Evidence & Analysis:

1. “Israel Rises” & Wartime Mobilization

Following October 7, 2023, Cisco leadership abandoned corporate neutrality to become a logistical partner in the war effort.

  • The Mechanism: Cisco engineers co-developed the “Israel Rises” platform for the IDF Home Front Command.2 CEO Chuck Robbins declared the company was “working day and night” to ship technology to Israel “at the request of the country”.5
  • The Systemic Implication: Developing software for a military branch during active conflict is direct participation in the war effort. It signals to employees and the world that Cisco is a non-state ally of the IDF. Supporting the “home front” logistics frees up military resources for the “fighting front” in Gaza. The provision of grants to reservists further links corporate treasury to military manpower, ensuring that economic hardship does not deter mobilization.

2. The “Safe Harbor” Double Standard

The contrast between Cisco’s response to Russia (2022) and Israel (2023) provides irrefutable evidence of ideological bias and discriminatory ethics.

  • Russia (2022): In response to the invasion of Ukraine, Cisco executed a total exit. It stopped all sales, wound down operations, and physically destroyed $23 million in assets (inventory, spare parts, vehicles) to ensure they could not be used by the Russian state.5
  • Israel (2023-2024): In response to the ICJ-recognized plausible genocide in Gaza, Cisco did the opposite. It accelerated supply chains, developed support platforms, and invested in local venture funds (Team8).
  • The Systemic Implication: This discrepancy proves that Cisco’s “human rights” policies are geopolitical tools, not ethical frameworks. The company is willing to absorb financial losses to punish an enemy of the US (Russia) but will double down on investment to support an ally of the US (Israel), even when both are accused of similar violations of international law.

3. Internal Suppression of Dissent (Bridge to Humanity)

The audit finds a discriminatory application of internal conduct policies.

  • The Mechanism: While pro-Israel advocacy is institutionalized via executive statements and support for the “Connected Jewish Network,” employees organizing under the banner “Bridge to Humanity” (B2H) to protest complicity were suppressed. The audit documents censorship of their internal site, harassment, and the termination of organizers.5
  • The Systemic Implication: This creates a hostile work environment for Palestinian and Arab employees. It enforces an ideological monoculture where support for the Israeli state is “natural” (as per VP Haim Pinto) but support for Palestinian rights is a fireable offense.

Counter-Arguments & Assessment:

  • Counter-Argument: “Israel Rises” was a humanitarian tool for civilians.
  • Forensic Rebuttal: The Home Front Command is a military unit. In total war, logistics and civil coordination are military functions.
  • Counter-Argument: Supporting employees (reservists) is standard HR policy.
  • Forensic Rebuttal: Specific grants for reservists act as a financial subsidy for military service. Neutrality would dictate supporting all employees affected by war, not incentivizing participation in the combat force.

Analytical Assessment: High Confidence. Cisco’s leadership is ideologically committed to the Zionist state project, evidenced by direct partnerships with state institutions and the discriminatory application of ethical standards.

5. BDS-1000 Classification

The BDS-1000 model provides a quantitative assessment of complicity based on the qualitative evidence gathered. The scoring reflects Cisco’s systemic integration into the Israeli apparatus of control.

Results Summary:

  • Final Score: 891
  • Tier: Tier A (Extreme Complicity)
  • Justification Summary: Cisco Systems represents a foundational pillar of the Israeli military-industrial complex. It scores in the highest bands across all domains due to its role as the architect of the IDF’s digital infrastructure (“David’s Citadel”), its direct presence in illegal settlements (“Klika” Hubs), its immense economic contribution via acquisitions ($7.2B), and its leadership’s overt ideological alignment during wartime (“Israel Rises”). The company is a “Systemic Strategic Partner” whose technology is indispensable for the occupation’s daily operation.

BDS-1000 Scoring Matrix – Cisco Systems

Domain I M P V-Domain Score
Military (V-MIL) 7.9 9.0 8.5 7.90
Digital (V-DIG) 9.5 9.5 8.8 9.50
Economic (V-ECON) 7.4 8.5 10.0 7.40
Political (V-POL) 8.5 8.0 9.5 8.50

V-Domain Calculation Logic:

$$V_{domain} = I \times \min(M/7,1) \times \min(P/7,1)$$

Note: Since M and P scores for Cisco generally exceed the saturation point of 7, the multipliers are capped at 1, making the V-Score equal to the Impact (I) score in most cases.

Final Composite Calculation

Using the OR-dominant formula with a side boost to account for multi-vector complicity:

$$V_{MAX} = \max(7.9, 9.5, 7.4, 8.5) = 9.5$$

$$Sum_{OTHERS} = (7.9 + 9.5 + 7.4 + 8.5) – 9.5 = 23.8$$

BRS Score Formula:

$$BRS\_Score = ((V_{MAX} + (Sum_{OTHERS} \times 0.2)) \div 16) \times 1000$$

$$BRS\_Score = ((9.5 + (23.8 \times 0.2)) \div 16) \times 1000 \\ BRS\_Score = ((9.5 + 4.76) \div 16) \times 1000 \\ BRS\_Score = (14.26 \div 16) \times 1000 \\ BRS\_Score = 0.89125 \times 1000 \\ BRS\_Score = 891$$

Grade Classification:

Based on the score of 891, the company falls within:

  • Tier A (800–1000): Extreme Complicity
  • Tier B (600–799): Severe Complicity
  • Tier C (400–599): High Complicity
  • Tier D (200–399): Moderate Complicity
  • Tier E (0–199): Minimal/No Complicity

Tier: Tier A

6. Recommended Action(s)

Given the Tier A (Extreme Complicity) classification and the systemic nature of Cisco’s involvement in the Israeli occupation and military apparatus, a strategy of engagement is deemed insufficient. The company has demonstrated a proactive ideological commitment to the state that transcends commercial logic. Therefore, the following actions are recommended for stakeholders, institutional investors, and civil society actors:

1. Immediate Divestment and Exclusion

Institutional investors, university endowments, and pension funds should place Cisco Systems on their “Excluded/Prohibited” lists. The forensic evidence confirms violations of standard ESG (Environmental, Social, and Governance) screens related to:

  • Human Rights Violations: Direct support for surveillance and movement restrictions in occupied territory (Jerusalem Smart City).
  • International Law: Operations in illegal settlements (Klika Hubs), constituting a violation of the Fourth Geneva Convention.
  • Controversial Weapons: Provision of essential electronic sub-systems (ESR6300) for lethal targeting platforms (Merkava tanks).
    Divestment should be public and accompanied by a statement citing these specific violations to maximize reputational impact.

2. Public Boycott of Consumer and SME Brands

While Cisco is primarily a B2B entity, it owns significant consumer-facing and Small-to-Medium Enterprise (SME) brands. Boycott campaigns should target:

  • Webex: Encourage universities, NGOs, and corporations to switch to alternative video conferencing platforms, citing the use of Webex by the IDF for command and control.
  • Meraki: Target the SME market, highlighting Meraki’s role in surveillance infrastructure.
  • Duo Security: Encourage IT departments to seek alternative Multi-Factor Authentication (MFA) providers.
    Campaigns should utilize the “Israel Rises” case study to demonstrate how these tools are weaponized for military logistics.

3. Legal Accountability and Litigation

Legal bodies and human rights organizations should investigate Cisco’s potential liability for aiding and abetting war crimes.

  • Domestic Law: Challenge the import of goods/services produced in the “Klika” settlement hubs under domestic laws that prohibit trade with illegal settlements (e.g., in the EU or UK).
  • International Law: The continued supply of servers to the IMOD during the ICJ-recognized “plausible genocide” creates legal exposure. Strategic litigation should focus on the 2017 FMS-funded contract and the wartime emergency procurement.

4. Corporate Accountability and Employee Advocacy

  • Internal Pressure: Support employee affinity groups (like “Bridge to Humanity”) in demanding the application of the “Safe Harbor” precedent (Russia exit) to Israel. Demand the protection of employees from retaliation for political speech.
  • Shareholder Resolutions: File resolutions demanding a “Human Rights Impact Assessment” of Cisco’s operations in conflict zones, specifically asking for a report on the end-use of the “David’s Citadel” data center and the “Israel Rises” platform.

5. Monitoring of Future Acquisitions

A “Red Flag” alert should be established for any future acquisitions of Israeli companies by Cisco. The pattern of acquiring Unit 8200 spin-offs serves to capitalize the military apparatus. Stakeholders should pressure regulators (such as the FTC or EU Commission) to scrutinize these acquisitions not just for anti-trust, but for national security and human rights risks, given the “dual-use” nature of the technology and the “revolving door” of personnel.

Works cited

  1. Cisco Calc
  2. The Israeli Occupation Industry – Cisco Systems – Who Profits, accessed December 17, 2025, https://www.whoprofits.org/companies/company/6529?cisco-systems
  3. Cisco digital Audit
  4. Cisco Company Complicity Profile UPDATED 2/13/2025 – BDS Movement, accessed December 17, 2025, https://www.bdsmovement.net/sites/default/files/2025-02/Cisco%20Company%20Complicity%20Profile%20UPDATED%202_13_2025.pdf
  5. Cisco political Audit
  6. UCL, Cisco & Complicity in Israeli Apartheid, Occupation & Genocide Cisco and Israel – BDS@UCL, accessed December 17, 2025, https://bdsatucl.com/wp-content/uploads/2024/11/cisco_final.pdf
  7. CISCO’S INVOLVMENT IN THE ISRAELI OCCUPATION – Business & Human Rights Resource Centre, accessed December 17, 2025, https://media.business-humanrights.org/media/documents/files/documents/CISCOfinal-web.pdf
  8. Cisco economic Audit
  9. Cisco military Audit
  10. Cisco Systems Establishes Development Centre in Israel, accessed December 17, 2025, https://newsroom.cisco.com/c/r/newsroom/en/us/a/y1997/m04/cisco-systems-establishes-development-centre-in-israel.html
  11. CISCO | BDS Movement, accessed December 17, 2025, https://bdsmovement.net/cisco
  12. Cisco Systems Inc | AFSC Investigate, accessed December 17, 2025, https://investigate.info/company/cisco-systems