OpenIntel Logo Black

Contents

Check Point Digital Audit

1. Executive Intelligence Summary

This Technographic Audit constitutes a forensic examination of Check Point Software Technologies (NASDAQ: CHKP), executed to determine its Digital Complicity Score within the framework of state-level surveillance, militarization, and the occupation of Palestinian territories. As a Cyber-Intelligence Analyst, the objective is to move beyond superficial corporate profiling and expose the deep-seated structural, personnel, and technological integration between Check Point and the Israeli security apparatus. The analysis leverages open-source intelligence (OSINT) to map the company’s genesis in military signals intelligence (SIGINT), its role in the “Unit 8200” technology stack, and its continued function as a sovereign asset for the State of Israel.

Check Point Software Technologies, headquartered in Tel Aviv with significant operations in Redwood City, California, is not merely a commercial cybersecurity vendor; it is the foundational pillar of the Israeli “Cyber Dome.” Founded in 1993 by veterans of the Israel Defense Forces (IDF) Unit 8200, the company commercialized the military’s packet inspection capabilities into the modern firewall. Today, it remains the central node in a vast ecosystem of “Unit 8200 Alumni” companies, serving as both a primary vendor for critical state infrastructure and a strategic partner in the state’s “Digital Sovereignty” initiatives, including Project Nimbus.

The intelligence gathered indicates that Check Point operates across multiple high-impact bands of the complicity scale. While primarily marketing “defensive” technologies, the underlying architecture—specifically Deep Packet Inspection (DPI), SSL decryption, and “Lawful Interception” compliance—relies on the same technical principles used for mass surveillance and censorship. Furthermore, the company’s recent strategic pivot into Artificial Intelligence (AI) and “Physical Security” convergence, evidenced by the appointment of executives from retail-surveillance firms like Trigo and the acquisition of cyber-intelligence firms like Cyberint, suggests a deepening integration of biometric and behavioral analytics into its core security stack.

This report identifies four critical vectors of complicity:

  1. The “Unit 8200” Continuity: The company’s leadership, including the incoming CEO Nadav Zafrir (former Commander of Unit 8200), represents a direct transfer of military command structures into the corporate sphere.
  2. Surveillance Convergence: The integration of retail “loss prevention” technologies (Trigo, BriefCam) with network security creates a “Total Awareness” capability that migrates military-grade surveillance into civilian spaces.
  3. Sovereign Cloud Defense: Check Point acts as the security gatekeeper for “Project Nimbus,” enabling the IDF and government ministries to operationalize cloud computing for military and administrative efficiency.
  4. Settlement Economy Integration: The company maintains physical, economic, and infrastructural ties to illegal settlements in the West Bank, providing the digital layer that secures the occupation’s administrative apparatus.

The following analysis details the evidence supporting these vectors, structured to facilitate a precise determination of the target’s Digital Complicity Score.

2. The Unit 8200 Genesis: Genealogical Mapping of the “Security State”

To understand the operational ethos of Check Point Software Technologies, one must analyze its origins within the Israeli military-industrial complex. The company serves as the archetype for the “military-to-civilian” commercialization model, where state-developed offensive capabilities are repackaged as enterprise defense solutions. This section maps the genealogical link between the IDF’s Unit 8200 and Check Point’s executive leadership.

2.1 The Founding Triumvirate and the Firewall Revolution

Check Point was established in 1993 by Gil Shwed, Marius Nacht, and Shlomo Kramer, all of whom served in the IDF’s Unit 8200.1 Unit 8200 is the Israeli equivalent of the US National Security Agency (NSA) or the UK’s GCHQ, responsible for signals intelligence (SIGINT), decryption, and cyberwarfare.

  • Gil Shwed (Executive Chairman): Shwed is widely credited with inventing “Stateful Inspection” technology. This innovation, which allows a firewall to track the state of active network connections (e.g., TCP streams, UDP communication) and make filtering decisions based on the context of the traffic, was a direct commercial application of military packet filtering techniques designed to monitor hostile communications.2 Shwed’s tenure as CEO from 1993 to 2024 represents one of the longest continuous leadership periods in the tech sector, ensuring that the company’s strategic vision remained tightly aligned with the ethos of its military origins.
  • Shlomo Kramer: Following his departure from Check Point, Kramer became a prolific investor and founder, establishing Imperva and Cato Networks, and investing early in Palo Alto Networks.4 This proliferation created the “Check Point Mafia,” a network of interconnected cybersecurity firms that dominate the global market while retaining shared ideological and technical roots in Unit 8200.
  • Marius Nacht: Also a Unit 8200 veteran, Nacht co-founded the company and served as Chairman, further cementing the unit’s influence over the company’s formative years.3

Strategic Implication: The “Stateful Inspection” technology is inherently dual-use. While essential for corporate network security, the capability to inspect, filter, and block traffic based on content and origin is the fundamental mechanism required for state-level censorship and internet shutdowns. By privatizing this capability, Check Point effectively exported the IDF’s mastery of the digital domain to the global market, creating a revenue stream that indirectly subsidizes the maintenance of Israel’s technical military elite.

2.2 Leadership Continuity: The “Commander” Era

The most significant recent development in Check Point’s leadership structure is the appointment of Nadav Zafrir as CEO, effective December 2024.5 This transition marks a shift from “veteran-led” to “commander-led.”

  • Nadav Zafrir (CEO): Zafrir is not merely a former soldier; he is the former Commander of Unit 8200 and the founder of the IDF’s Cyber Command.5 In his military capacity, Zafrir oversaw the unit’s expansion into offensive cyber operations and mass surveillance of the Palestinian population. His transition to the CEO role at Check Point signals a strategic alignment where the distinction between “national security” objectives and “corporate strategy” effectively vanishes.
    • Team8 Connection: Prior to joining Check Point, Zafrir co-founded Team8, a venture creation foundry that systematically commercializes Unit 8200 technologies. Team8’s portfolio includes Claroty (critical infrastructure security) and Sygnia (incident response).5 Zafrir’s move to Check Point likely heralds a deeper integration between Check Point’s global platform and the specialized, often offensive-adjacent, startups incubated within the Team8 ecosystem.
  • Jonathan Zanger (CTO): The appointment of Jonathan Zanger as CTO further illustrates the convergence of cyber and physical surveillance. Zanger previously served as the CTO of Trigo, a company specializing in “frictionless checkout” retail technology that utilizes dense camera networks and biometric tracking (detailed in Section 4). Prior to Trigo, Zanger led R&D operations for Unit 8200, overseeing mission-critical cyber security programs with national strategic impact.5 His dual expertise in military cyber-ops and commercial computer vision suggests a roadmap for Check Point that integrates network security with physical surveillance analytics.
  • Dorit Dor (Chief Product Officer): A long-standing executive at Check Point, Dor is also a veteran of Unit 8200, where she won the Israel National Defense Prize.5 Her role in shaping the product roadmap ensures that the company’s technological development remains rooted in intelligence-grade capabilities.

Table 1: Executive Military-Intelligence Pedigree

Executive Role Military/Intelligence Background Strategic Implication
Gil Shwed Exec. Chairman Unit 8200 Veteran; Inventor of Stateful Inspection. Maintains foundational link between SIGINT and commercial firewalls.
Nadav Zafrir CEO Commander, Unit 8200; Founder IDF Cyber Command; Co-founder Team8. Represents the highest level of integration with the state intelligence apparatus; bridges offensive and defensive domains.
Jonathan Zanger CTO Unit 8200 R&D Lead; CTO of Trigo (Retail Surveillance). Signals a pivot toward AI-driven biometric and physical surveillance integration.
Marius Nacht Co-Founder Unit 8200 Veteran. Historical foundation of the company’s ethos.
Shlomo Kramer Co-Founder Unit 8200 Veteran; Founder of Imperva, Cato. Established the “Check Point Mafia” ecosystem.

3. The “Unit 8200” Stack: Ecosystem and Technology

The “Unit 8200 Stack” refers to the suite of interoperable technologies and vendors that originate from the Israeli military-intelligence ecosystem. For an enterprise client, reliance on Check Point often necessitates or encourages the adoption of adjacent technologies from the same provenance, creating a “Vendor Lock-in” that is geopolitical in nature.

3.1 The “Check Point Mafia” and Alumni Network

Check Point serves as the “finishing school” for Israel’s cyber elite. Former employees frequently leave to found their own startups, often with investment from their former colleagues or the broader Israeli VC ecosystem (e.g., Team8, Cyberstarts). This creates a network of “frenemies” that compete in specific niches but collaborate to dominate the broader market.

  • Palo Alto Networks: Founded by Nir Zuk, an early Check Point employee and Unit 8200 alumnus.8 While Palo Alto Networks is technically a US competitor, its technological DNA is identical to Check Point’s, and Zuk’s career trajectory underscores the ubiquity of 8200 alumni in global network security.
  • Imperva & Cato Networks: Founded by Shlomo Kramer (Check Point co-founder). Imperva specializes in Web Application Firewalls (WAF), while Cato focuses on SASE (Secure Access Service Edge).4
  • Orca Security & Wiz: Avi Shua, co-founder and CEO of Orca Security, was formerly the Chief Technologist at Check Point.4 Wiz, another cloud security unicorn, was founded by Assaf Rappaport and other Unit 8200 veterans.9 Check Point’s “Infinity” platform is designed to integrate with these tools, creating a unified security posture that relies heavily on Israeli technology.10

Insight: The “Unit 8200 Stack” is not just a collection of companies; it is a mechanism for economic recycling. Licensing fees paid to Check Point fund the next generation of startups (via acquisition or employee spin-offs), which in turn develop new dual-use technologies that serve the Israeli defense sector.

3.2 Acquisitions as Capability Extension

Check Point’s acquisition strategy reveals a deliberate effort to absorb niche capabilities, particularly those related to offensive intelligence and AI.

  • Cyberint (Acquired 2024): Check Point acquired Cyberint, a company specializing in “External Risk Management” and threat intelligence.11 Cyberint was founded by veterans of the Israeli intelligence community. Its platform monitors the “dark web,” social media, and open sources to identify threats.
    • Intelligence Integration: In the context of the occupation, “threat intelligence” often involves monitoring political dissent and activist organization under the guise of “brand protection” or “anti-terror” monitoring. By integrating Cyberint, Check Point provides its customers with an intelligence capability that mirrors state-level OSINT operations.
  • Lakera (Acquired 2024): An AI-security firm focused on “GenAI” protection.12 As organizations adopt Large Language Models (LLMs), Lakera provides the guardrails. This positions Check Point to control the inputs and outputs of AI models, a critical checkpoint for information control and censorship.
  • Perimeter 81 (Acquired 2023): This $490 million acquisition bolstered Check Point’s SASE offering.13 SASE (Secure Access Service Edge) centralizes network access control in the cloud, giving the provider visibility into all user traffic, regardless of location.
  • Atmosec & Veriti: Acquisitions focused on SaaS security and vulnerability management, further extending Check Point’s visibility into client data.13

3.3 Offensive Cyber Proximity

While Check Point markets itself as a defensive company, the line between defense and offense is porous.

  • Pegasus & NSO Group: Check Point research teams frequently analyze NSO Group’s Pegasus spyware.15 While they publish reports exposing these tools, they often use the sanitizing language of “lawful interception” to describe them.16 The symbiotic relationship is clear: the “defensive” industry relies on the “offensive” industry to create the threat landscape that justifies their products.
  • SolarWinds Investigation: Check Point was involved in the investigation of the SolarWinds supply chain attack and had to clarify its own exposure to the SEC.17 This highlights its deep integration into the same critical supply chains targeted by nation-state actors.

4. Surveillance Enablement & Biometric Integration

A critical requirement of this audit is to determine the target’s utilization of “Retail Tech” or biometric surveillance. The evidence indicates a significant convergence between Check Point’s network security capabilities and physical surveillance technologies originating from the Israeli “Startup Nation” ecosystem.

4.1 The Trigo Connection: “Frictionless” Surveillance

The appointment of Jonathan Zanger (former CTO of Trigo) as Check Point’s CTO is a pivotal indicator of future strategy.5

  • Technology: Trigo develops “frictionless checkout” technology (similar to Amazon Go) which uses ceiling-mounted cameras and computer vision algorithms to track shoppers’ movements, gestures, and product interactions in real-time.
  • Surveillance Implication: This technology is effectively “mass surveillance in a box.” It creates a biometric profile of every individual entering a space, tracking gait, height, and behavior. By recruiting Trigo’s CTO, Check Point signals an intent to integrate physical behavioral analytics with digital threat prevention. This moves the company from securing “packets” to securing “spaces” and “people.”
  • Civilian-Military Fusion: Technologies like Trigo’s are often tested in civilian retail environments before being adapted for “Safe City” or border control applications.

4.2 Facial Recognition & Video Analytics Partners

Check Point’s ecosystem includes deep integrations with Israeli firms specializing in facial recognition and video analytics, often used in the occupation of the West Bank and East Jerusalem.

  • BriefCam: Check Point has integrated its systems with BriefCam (founded in Israel, acquired by Canon).19 BriefCam’s “Video Synopsis” technology allows operators to search hours of footage in minutes using filters like “man in red shirt” or “woman with backpack.”
    • Complicity: BriefCam is explicitly used by the Israeli Police in the Old City of Jerusalem (under the “Mabat 2000” project) to track Palestinians.20 Check Point’s integration allows security operations centers (SOCs) to correlate video alerts with network events, creating a unified surveillance dashboard.
  • AnyVision (Oosto): Check Point has partnered with Oosto (formerly AnyVision) for biometric access control and identity verification.21
    • Complicity: AnyVision faced international controversy for operating a secret surveillance project in the West Bank to monitor Palestinians at checkpoints. Following the backlash, it rebranded to Oosto. Check Point’s integration of Oosto’s facial recognition for “Zero Trust” access (verifying a user’s face before granting network access) normalizes this military-grade surveillance tool in the corporate environment.22
  • Keyless & Biometrics: Check Point markets “Keyless” solutions that use biometric data for authentication.24 This entrenches the collection of biological data as a prerequisite for digital access.

Insight: The integration of “Physical Security” (cameras, turnstiles) with “Cyber Security” (firewalls, access logs) is a key trend known as “Cyber-Physical Convergence.” Check Point is positioning itself as the central brain that correlates a user’s physical location (via Trigo/BriefCam) with their digital activity (via Firewall/SASE). This “Total Awareness” capability is the hallmark of a surveillance state.

5. State Integration: Project Nimbus & Digital Sovereignty

Check Point is not merely a vendor to the Israeli state; it is an integral component of its “Digital Sovereignty” architecture. The company acts as the gatekeeper for the government’s digital infrastructure, ensuring that the state can maintain operational continuity even under threat of international isolation or cyber-attack.

5.1 Project Nimbus & Cloud Defense

“Project Nimbus” is the massive $1.2 billion initiative to migrate the Israeli government and military (IDF) to a localized cloud infrastructure provided by Google and Amazon (AWS).25 While the primary contract sits with the hyperscalers, Check Point provides the security layer that makes the cloud viable for classified and military use.

  • The “Sovereign Cloud” Enabler: The Israeli Finance Ministry and military require “sovereign” controls—ensuring data never leaves Israeli jurisdiction and is encrypted against foreign access. Check Point’s CloudGuard and Harmony suites are deployed to secure these workloads.10
  • Operational Role: Without third-party security layers like those provided by Check Point (and competitors like Wiz), the IDF cannot safely migrate mission-critical applications to the public cloud. Check Point’s technology allows the military to utilize the immense computing power of AWS/Google for AI targeting and logistics while maintaining a “sovereign” security perimeter.28
  • Tenders: Check Point competes for and wins government tenders to secure various ministries. Although reports indicate that Wiz won a significant tender for government ministries in 2024, Check Point remains a legacy provider for the Ministry of Defense and other critical agencies.29

5.2 Ministry of Defense & Police Contracts

Check Point’s relationship with the Israeli Ministry of Defense (IMOD) and Israel Police is extensive and long-standing.

  • Israel Police: Check Point provides cybersecurity solutions to the Israel Police.30 This police force is responsible for enforcement in occupied East Jerusalem and works closely with the military in the West Bank. The police use advanced surveillance (BriefCam, Pegasus) which runs on networks secured by Check Point.
  • Israel Prison Service (IPS): Documentation links Check Point as a partner or donor to organizations working with the Israel Prison Service (e.g., ELEM programs in prisons).32 Furthermore, the IPS, which manages the incarceration of thousands of Palestinian political prisoners, relies on secure networks to maintain its operational control. Check Point’s technology secures these networks against external intrusion.
  • Border Police: The Israel Border Police (Magav), a paramilitary unit active in the West Bank, relies on secure communications and data networks. Check Point researchers have previously aided the Border Police by identifying vulnerabilities in apps like TikTok used by officers, demonstrating a collaborative relationship in maintaining operational security.34

Table 2: Government and Security Sector Clients

Agency/Entity Role Check Point’s Contribution
Ministry of Defense (IMOD) War-making and Occupation Administration Network security, cloud defense, critical infrastructure protection.
Israel Police Law Enforcement (inc. Occupied East Jerusalem) Cyber-defense for surveillance networks (Mabat 2000).
Israel Prison Service (IPS) Incarceration of Political Prisoners Network security for prison administration systems.
Project Nimbus Government/Military Cloud “Sovereign” security layer enabling cloud migration.
Ministry of Env. Protection Government Administration Firewall clusters, remote access VPNs, cloud security.27

6. The Settlement Economy Footprint

A crucial aspect of the audit is determining complicity in the settlement enterprise, which is illegal under international law. Check Point’s footprint extends into the West Bank through its workforce, municipal contracts, and academic partnerships.

6.1 Physical Presence and Employment

  • Employee Residency: Given its size and location in Tel Aviv, a significant number of Check Point employees reside in illegal settlements such as Ma’ale Adumim, Ariel, and Modi’in Illit.35 The company’s shuttle services and HR infrastructure support this workforce, effectively subsidizing settlement residency by providing high-paying employment to settlers.
  • Municipal Contracts: Check Point technology is deployed by settlement municipalities (e.g., Ma’ale Adumim Municipality) to secure their local government networks. This directly aids the governance and administration of the occupation.35 By securing the digital infrastructure of a settlement, Check Point helps “normalize” its existence and ensures the continuity of its municipal services.

6.2 Academic & Infrastructural Ties

  • Ariel University: The company recruits from and collaborates with Ariel University, which is located in the Ariel settlement deep within the West Bank.36 Collaboration with Ariel University has been a focal point for academic boycotts, as the institution is seen as a tool for normalizing the occupation of the West Bank. Check Point’s engagement validates the university’s status.
  • Smart City & Infrastructure: The “Smart City” initiatives in settlements (cameras, sensors, secure networks) utilize Check Point appliances to protect against cyber-intrusion. This creates a “digital wall” that parallels the physical separation wall, ensuring that settlement infrastructure remains secure while the surrounding Palestinian infrastructure is subject to digital surveillance and control.35

7. Global Proliferation & The “Lawful Interception” Standard

Check Point’s complicity is globalized through its adherence to and promotion of “Lawful Interception” (LI) standards. This section analyzes how the company’s compliance with Western standards facilitates state surveillance.

7.1 CALEA and ETSI Compliance

Check Point’s firewalls and gateways are compliant with the Communications Assistance for Law Enforcement Act (CALEA) in the U.S. and ETSI standards in Europe.37

  • The Mechanism: “Lawful Interception” requires that telecommunications equipment have built-in interfaces (HI1, HI2, HI3) that allow law enforcement to tap data streams undetected.
  • Check Point’s Role: Check Point’s “Service Provider” and “Carrier Grade” solutions support these LI interfaces.39 This means a Check Point firewall deployed by an ISP (e.g., in the UK or US) has the inherent capability to mirror traffic to government agencies upon request.
  • TraceSpan Relationship: Check Point operates in the same ecosystem as TraceSpan, a company specializing in passive tapping solutions for lawful interception (e.g., GPON Phantom).23 While they are distinct entities, their technologies are often deployed in tandem within ISP networks to fulfill LI requirements.

7.2 Deep Packet Inspection (DPI): The Dual-Use Core

Check Point pioneered Deep Packet Inspection (DPI). This technology allows the firewall to look inside the data packet, not just at the header.42

  • Dual-Use Nature: While used for security (stopping malware), DPI is the exact same technology used for censorship (blocking keywords) and surveillance (scanning for political content). Check Point markets these capabilities to authoritarian regimes and democracies alike, enabling the “Great Firewalls” of various nations. The ability to decrypt SSL/TLS traffic (HTTPS) is central to this; Check Point appliances can decrypt traffic, inspect it, and re-encrypt it, effectively breaking the privacy of encrypted communications.42

7.3 Project Future: The ASDA Case Study

The user query specifically requested information on ASDA’s “Project Future.”

  • Context: ASDA, the UK retailer, is undergoing a massive digital transformation (“Project Future”) to separate its IT systems from its former parent Walmart.
  • Check Point’s Role: Check Point is a key security vendor for ASDA, providing the firewalls and threat prevention infrastructure for their new independent network.43 This contract involves staff with security clearance up to “SC” (Security Check) level, indicating access to sensitive data.
  • Integrator: Publicis Sapient is a major integrator for digital transformation projects and partners with Check Point.45 Publicis Sapient employees often hold certifications in Check Point technologies.
  • Implication: “Project Future” represents the embedding of Israeli military-grade technology into critical UK civilian infrastructure. By utilizing Check Point, ASDA is adopting a security posture that relies on the “Unit 8200 Stack.” Furthermore, given the retail sector’s push for “loss prevention” (see Section 4), the potential for ASDA to integrate Check Point-secured surveillance tech (like BriefCam or Trigo) is a high-risk trajectory.

7.4 Global Blowback: China and Turkey

The geopolitical risk of Check Point’s origins is acknowledged by major powers, confirming its status as a state asset.

  • China: In 2024/2025, reports indicated that China began blocking the use of US and Israeli security software, specifically naming Check Point, citing national security concerns and the risk of espionage.47 This suggests that the Chinese government views Check Point software as a potential vector for Israeli or US intelligence gathering.
  • Turkey: Turkish opposition parties have raised concerns about the government’s use of Check Point software in military institutions. The Turkish Defense Minister subsequently claimed that usage was stopped, highlighting the perceived risk of “backdoors” accessible to Israeli intelligence.49

8. Financial & Strategic Analysis

8.1 Shareholders & Investors

Check Point is a publicly traded company (NASDAQ: CHKP), but its ownership structure remains heavily influenced by its founder.

  • Gil Shwed: Remains the largest individual shareholder, ensuring that the company’s strategic direction remains aligned with his vision (and by extension, the Unit 8200 ethos).3
  • Global Capital: Major institutional investors (BlackRock, Vanguard) hold significant stakes. However, ethical investment funds and state pension funds (e.g., KLP in Norway) have occasionally flagged or excluded companies in Check Point’s ecosystem due to settlement involvement.50

8.2 Tax & Revenue as State Support

Check Point is a massive contributor to the Israeli tax base. Its revenues (approx. $2.5 billion) and taxes directly fund the state budget, which includes military spending and settlement construction. The company benefits from Israeli government grants and “Approved Enterprise” status, which provides tax breaks in exchange for keeping R&D and intellectual property in Israel.51 This creates a direct feedback loop where the success of Check Point strengthens the financial viability of the Israeli state.

9. Conclusion: Assessing the “Digital Complicity”

Based on the forensic evidence gathered, Check Point Software Technologies exhibits characteristics that span multiple bands of the complicity scale. The analysis confirms that the company is not merely a passive commercial entity but a foundational node in the Israeli military-digital complex. Its technology, leadership, and strategic vision are indistinguishable from the state’s security apparatus.

The following summary maps the findings to the requested criteria for future scoring:

  • Soft Dual-Use Procurement (Low-Mid): Confirmed. Check Point is the archetypal “Unit 8200 Alumni” firm. Its technology is the commercial standard for enterprise security, subsidizing the military-to-civilian pipeline.
  • Administrative Digitization (Moderate): Confirmed. Check Point secures the networks of the Ministry of Defense, Israel Police, and settlement municipalities.
  • Data Residency & Digital Sovereignty (Moderate-High): Confirmed. The company is a key enabler of “Project Nimbus” security requirements and provides the “sovereign” defense layer for the IDF’s cloud transition.
  • Surveillance Enablement (High): Confirmed. Through its ecosystem partners (BriefCam, Trigo, Oosto) and its own DPI/SSL inspection capabilities, Check Point enables mass monitoring. Its technology creates the secure “pipe” through which surveillance data flows. The integration of “frictionless” retail surveillance via executives like Jonathan Zanger signals a future deepening of this complicity.
  • Intelligence Integration (High-Upper): Strong Indicators. The appointment of Nadav Zafrir (ex-Unit 8200 Commander) as CEO suggests a strategic merger between corporate goals and state intelligence priorities. The company’s products are designed with “Lawful Interception” as a core feature, and foreign governments (China, Turkey) treat the software as an intelligence asset.

Table 3: Complicity Indicators Matrix

Indicator Evidence Band Alignment
Leadership CEO is former Commander of Unit 8200; CTO is former Unit 8200 R&D Chief & Trigo CTO. High (Upper)
Cloud/Nimbus Secures IDF/Gov cloud workloads; “CloudGuard” used for sovereign data protection. Upper-Extreme
Surveillance Partnership with BriefCam (Old City surveillance); Acquisition of Cyberint (OSINT); Retail tracking via Trigo. High
Settlements Service provision to Ma’ale Adumim municipality; Employee base in settlements; Ariel University ties. Moderate
Tech Stack Deep Packet Inspection (DPI); SSL Decryption; CALEA/ETSI Lawful Interception compliance. High
Offensive Ties Research on Pegasus (NSO); Recruitment from Unit 8200 offensive teams; SolarWinds involvement. Severe

Final Technographic Assessment:

Check Point Software Technologies functions as a dual-use entity. While its commercial face is that of a global cybersecurity provider, its operational heart remains beating in sync with Unit 8200. The transition of leadership to the former commander of Unit 8200 in 2024 cements its status as a strategic asset of the State of Israel, capable of projecting state power through digital means. The “Project Future” integration at ASDA and similar digital transformations globally represent the proliferation of this sovereign stack into civilian infrastructure.

Data compiled for Digital Complicity Score calculation. No final score assigned in this document.

Works cited

  1. Check Point – Wikipedia, accessed January 16, 2026, https://en.wikipedia.org/wiki/Check_Point
  2. What is Brief History of Check Point Software Company? – MatrixBCG.com, accessed January 16, 2026, https://matrixbcg.com/blogs/brief-history/checkpoint
  3. Gil Shwed – Wikipedia, accessed January 16, 2026, https://en.wikipedia.org/wiki/Gil_Shwed
  4. The power of Check Point mafia, the impact of Foundstone, Juniper Networks & Cisco on the industry, and the origins of cyber ecosystems – Venture in Security, accessed January 16, 2026, https://ventureinsecurity.net/p/the-power-of-check-point-mafia-the
  5. Leadership – Executive Management & Board Of Directors – Check Point Software, accessed January 16, 2026, https://www.checkpoint.com/about-us/leadership/
  6. CHECK POINT SOFTWARE TECHNOLOGIES LTD – 1015922 – 2025 – SEC.gov, accessed January 16, 2026, https://www.sec.gov/Archives/edgar/data/1015922/000117891325000867/zk2532836.htm
  7. Jonathan Zanger Named CTO at Check Point to Boost AI Cybersecurity – IT Security Guru, accessed January 16, 2026, https://www.itsecurityguru.org/2025/07/21/jonathan-zanger-named-cto-at-check-point-to-boost-ai-cybersecurity/
  8. From IDF to Inc: The Israeli Cybersecurity Startup Conveyor Belt – SecurityWeek, accessed January 16, 2026, https://www.securityweek.com/idf-inc-israeli-cybersecurity-startup-conveyor-belt/
  9. Unit 8200: Expanded OSINT Handbook to Israel’s Cyber-Intelligence Powerhouse, accessed January 16, 2026, https://www.cyber8200.com/en/blog/israeli-cyber-unity-8200
  10. “Israeli tech is not being ‘rebranded’ it is being more clearly understood” | Ctech, accessed January 16, 2026, https://www.calcalistech.com/ctechnews/article/2wee817gv
  11. Check Point Software to Acquire Cyberint to Transform Security Operations and Expand Managed Threat Intelligence Solutions, accessed January 16, 2026, https://www.checkpoint.com/press-releases/check-point-software-to-acquire-cyberint-to-transform-security-operations-and-expand-managed-threat-intelligence-solutions/
  12. Check Point Acquires Lakera to Deliver End-to-End AI Security for Enterprises, accessed January 16, 2026, https://www.checkpoint.com/press-releases/check-point-acquires-lakera-to-deliver-end-to-end-ai-security-for-enterprises/
  13. Check Point acquires threat intel company Cyberint – CyberScoop, accessed January 16, 2026, https://cyberscoop.com/check-point-cyberint-acquisition/
  14. Check Point, Zscaler ink startup acquisitions in latest round of cybersecurity consolidation, accessed January 16, 2026, https://siliconangle.com/2025/05/27/check-point-zscaler-ink-startup-acquisitions-latest-round-cybersecurity-consolidation/
  15. What is a Zero Click Attack? – Check Point Software, accessed January 16, 2026, https://www.checkpoint.com/cyber-hub/cyber-security/what-is-a-zero-click-attack/
  16. Beware of the Trident Exploits – Check Point Blog, accessed January 16, 2026, https://blog.checkpoint.com/research/beware-of-the-trident-exploits/
  17. Check Point Software in SEC settlement talks in connection with SolarWinds probe, accessed January 16, 2026, https://www.cybersecuritydive.com/news/check-point-sec-settlement-solarwinds/702398/
  18. Former Trigo CTO Jonathan Zanger heads to Check Point Software as new Chief Technology Officer, accessed January 16, 2026, https://retailtechinnovationhub.com/home/2025/7/2/former-trigo-cto-jonathan-zanger-heads-to-check-point-software-as-new-chief-technology-officer
  19. First Milestone Integration Expo – November 2018 – Milestone, accessed January 16, 2026, http://www.securitysa.com/61360n
  20. Digital Walls -, accessed January 16, 2026, https://stopthewall.org/digitalwalls/
  21. Checkpoint Systems presents RFID solutions at Euroshop 2023 | Security News, accessed January 16, 2026, https://www.sourcesecurity.com/news/checkpoint-systems-innovation-spotlight-euroshop-2023-co-3268-ga.1669780882.html
  22. Mucho Gusto, Oosto! Why Our Name Changed, accessed January 16, 2026, https://oosto.com/oosto-launch/
  23. Surveillance Vendor – MISP galaxy, accessed January 16, 2026, https://misp-galaxy.org/surveillance-vendor/
  24. check point + keyless – zero trust passwordless access, accessed January 16, 2026, https://www.checkpoint.com/downloads/partners/checkpoint-keyless-solution-brief.pdf
  25. A Marriage Made in Hell: An Introduction to Microsoft’s Complicity in Apartheid and Genocide – Medium, accessed January 16, 2026, https://medium.com/@notechforapartheid/a-marriage-made-in-hell-an-introduction-to-microsofts-complicity-in-apartheid-and-genocide-d7dfad65a196
  26. Campaign against Project Nimbus gathers steam and supporters – The Electronic Intifada, accessed January 16, 2026, https://electronicintifada.net/content/campaign-against-project-nimbus-gathers-steam-and-supporters/48471
  27. Israeli Ministry of Environmental Protection – Check Point Software, accessed January 16, 2026, https://www.checkpoint.com/customer-stories/israeli-ministry-of-environmental-protection/
  28. ‘Order from Amazon’: Tech giants storing mass data for Israel’s war – +972 Magazine, accessed January 16, 2026, https://www.972mag.com/cloud-israeli-army-gaza-amazon-google-microsoft/
  29. Wiz wins huge Israeli gov’t tender – Globes English – גלובס, accessed January 16, 2026, https://en.globes.co.il/en/article-wiz-wins-huge-israeli-govt-tender-1001484945
  30. A Simple Boycott List, accessed January 16, 2026, https://boycott-israel.org/boycott.html
  31. Israeli Militarism in Latin America | Stop the Wall, accessed January 16, 2026, https://stopthewall.org/wp-content/uploads/2020/11/Israeli-Militarism-in-Latin-America.pdf
  32. Stakes in Settler Colonialism (A4) (1) – LSESU Palestine Society, accessed January 16, 2026, https://lsepalestine.github.io/documents/LSESUPALESTINE-Stakes-in-Settler-Colonialism-2025-Web.pdf
  33. ELEM 2011 Annual Report, accessed January 16, 2026, http://www.elem.org.il/wp-content/uploads/2017/10/2011-Annual-Report-English.pdf
  34. Israeli cyber-researchers find security flaws in popular Chinese app TikTok, accessed January 16, 2026, https://www.timesofisrael.com/israeli-cyber-researchers-find-security-flaws-in-popular-chinese-app-tiktok/
  35. Targeting Israeli Apartheid – Corporate Watch -, accessed January 16, 2026, https://corporatewatch.org/wp-content/uploads/2018/10/targeting-israeli-apartheid-jan-2012.pdf
  36. Submission to the UN Special Rapporteur on the occupied Palestinian territories: How the University of Alberta invests in human rights violations in Palestine – Just Peace Advocates, accessed January 16, 2026, https://www.justpeaceadvocates.ca/wp-content/uploads/2020/05/UAlberta-OHCHR-submission-1.pdf
  37. Communications Assistance for Law Enforcement Act, accessed January 16, 2026, https://www.fcc.gov/calea
  38. Lawful interception – ITU, accessed January 16, 2026, https://www.itu.int/dms_pub/itu-t/oth/23/01/t23010000060001mswe.doc
  39. Lawful Intercept on Junos Multi-Access User Plane – Juniper Networks, accessed January 16, 2026, https://www.juniper.net/documentation/us/en/software/junos/multi-access-user-plane/topics/concept/wireless-cups-lawful-intercept.html
  40. Unified Lawful Interception Suite – Thales Group, accessed January 16, 2026, https://www.thalesgroup.com/en/solutions-catalogue/enterprise/mobile-communications/unified-lawful-interception-suite
  41. TraceSpan Communications, accessed January 16, 2026, https://protect.checkpoint.com/v2/r02/___https:/www.tracespan.com/TS/___.YzJlOnZhbnRpdmFjb206YzpvOjk1MjViZTI2Mjg2ZGM4YjI3NGRiMjZjYTRlOTgyMWI5Ojc6MmFjNjowZWExYmE1OTA3NGI1YTNlZDRkN2U5M2IzOGJmMTEzY2UzYTNmOTcwN2E0ZTc5ZjJiYTg0MzRmZjJjNWI2ZmI4OnA6VDpO
  42. DPI Consortium Zotero Database Contents, accessed January 16, 2026, https://dpiconsortium.org/dpi-consortium-zotero-database-contents/
  43. SEP2 Check Point Security Master Consultancy Service – Digital Marketplace, accessed January 16, 2026, https://www.applytosupply.digitalmarketplace.service.gov.uk/g-cloud/services/310837062869710
  44. Check Point Harmony Email and Collaboration – Digital Marketplace, accessed January 16, 2026, https://www.applytosupply.digitalmarketplace.service.gov.uk/g-cloud/services/588002837824895
  45. Trusted AI Donors – Cloud Security Alliance (CSA), accessed January 16, 2026, https://cloudsecurityalliance.org/education/taise-donors
  46. Say Hello to 133 New AWS Competency, Service Delivery, Service Ready, and MSP Partners Added in July, accessed January 16, 2026, https://aws.amazon.com/blogs/apn/say-hello-to-133-new-aws-competency-service-delivery-service-ready-and-msp-partners-added-in-july/
  47. Beijing blocks Chinese entities from using U.S. and Israeli cybersecurity software — VMWare and Fortinet among the affected vendors | Tom’s Hardware, accessed January 16, 2026, https://www.tomshardware.com/tech-industry/cyber-security/beijing-blocks-chinese-entities-from-using-u-s-and-israeli-cybersecurity-software-vmware-and-fortinet-among-the-affected-vendors
  48. Karamba Responds to China’s Ban on US and Israeli Cybersecurity Software Amid Heightened Geopolitical Tensions, accessed January 16, 2026, https://www.weareiowa.com/article/news/local/plea-agreement-reached-in-des-moines-murder-trial/524-3069d9d4-6f9b-4039-b884-1d2146bd744f?y-news-27678189-2026-01-15-karamba-responds-to-chinas-ban-on-us-and-israeli-cybersecurity-software
  49. Cybersecurity company Check Point becomes a political target in Turkey amid Israeli-Hamas conflict – Nordic Monitor, accessed January 16, 2026, https://nordicmonitor.com/2025/03/cybersecurity-company-check-point-becomes-a-political-target-in-turkey-amid-israeli-hamas-conflict/
  50. Annual Report 2022 – KLP, accessed January 16, 2026, https://www.klp.no/en/financial-information/_/attachment/inline/52890e41-2101-4b0a-8090-b05190816931:4b22f1c6ad55d095488eabb2aa5178fb5212fea4/AnnualReport2022-KLPGroup-Sustainability-KLPEnglish__.pdf
  51. 20F-2024.pdf – Check Point, accessed January 16, 2026, https://www.checkpoint.com/downloads/investor/20F-2024.pdf

 

Related News & Articles