1. Executive Intelligence Summary
1.1. Strategic Audit Objectives and Scope
This Technographic Audit was commissioned to conduct a rigorous, forensic examination of the digital and operational infrastructure of Etsy, Inc. (NASDAQ: ETSY). The primary intelligence objective is to ascertain the extent to which Etsy’s enterprise architecture, vendor relationships, and marketplace operations intersect with, support, or rely upon the state of Israel, its military-industrial complex, and its occupation of Palestinian territories. This audit operates under the “Digital Complicity” framework, which posits that in the modern digital economy, the selection of technology vendors is not merely a functional procurement decision but a strategic alignment with the geopolitical and military origins of those technologies.
The scope of this report encompasses a “full-stack” analysis, ranging from the low-level cloud infrastructure and cybersecurity protocols to the user-facing identity verification systems and the physical logistics of marketplace sellers. Specifically, this audit addresses four Core Intelligence Requirements (CIRs):
- The “Unit 8200” Cyber-Kinetic Stack: Identification of cybersecurity and analytics vendors founded by alumni of the Israel Defense Forces (IDF) Unit 8200.
- Surveillance & Biometrics: Analysis of “Retail Tech” and “Loss Prevention” software utilized for user profiling and behavioral tracking.
- Operational Complicity: Investigation into the presence of marketplace sellers operating from illegal Israeli settlements in the Occupied West Bank.
- Cloud & Data Sovereignty: Assessment of Etsy’s migration to Google Cloud Platform (GCP) in the context of “Project Nimbus.”
1.2. Key Intelligence Findings
The comprehensive review of technographic data, public filings, engineering blogs, and investigative reports indicates that Etsy, Inc. has undergone a profound digital transformation that has structurally tethered its operations to the Israeli technology ecosystem.
- Cybersecurity Monoculture: Etsy’s security posture is heavily reliant on a specific cluster of vendors—Siemplify, Wiz, Orca Security, and Snyk—that are direct offshoots of the Israeli intelligence community, specifically Unit 8200. The integration of Siemplify (now part of Google Security Operations) into Etsy’s Security Operations Center (SOC) establishes a dependency on Israeli-designed logic for threat detection and response.1
- The Surveillance Web: Etsy has integrated into the Identiq network, a peer-to-peer identity validation protocol founded by Israeli intelligence veterans. This integration moves beyond simple vendor usage to active participation in a distributed surveillance consortium.3 Furthermore, deep ties to Riskified and Forter for fraud prevention indicate the utilization of behavioral biometrics and “identity intelligence” derived from Israeli military applications.5
- Operational Facilitation of Settlement Activity: Operational intelligence confirms that Etsy’s marketplace platform actively hosts and generates revenue from businesses located in illegal Israeli settlements, including Ariel, Maale Adumim, and Tekoa. The platform’s geolocation architecture obfuscates the distinction between Israel and Occupied Territories, facilitating the global sale of settlement goods under the label of “Israel”.7
- Cloud Sovereignty & Project Nimbus: Etsy’s total migration to Google Cloud Platform (GCP) aligns its infrastructure spend with the primary provider of the Israeli government’s “Project Nimbus” cloud. While Etsy’s data resides in US regions, its financial patronage supports the R&D and infrastructure viability of the vendor powering the Israeli defense establishment’s digital transformation.10
1.3. The Digital Complicity Assessment
Based on the aggregated data, Etsy displays a High-to-Extreme level of digital integration with the Israeli tech ecosystem. This is not incidental usage of commodity hardware; it is a strategic adoption of the “Tel Aviv Security Doctrine”—a reliance on offensive-defensive capabilities, deep packet inspection, and pervasive identity tracking. This technological dependency, combined with the active facilitation of settlement commerce, places Etsy significantly high on the Digital Complicity Scale.
2. Methodology and Strategic Framework
2.1. The Cyber-Intelligence Lens
This audit employs a technographic methodology, which involves mapping the “technology stack” of an organization to understand its geopolitical footprint. In the context of the Israeli technology sector, this requires a specific focus on the “civilian-military fusion.” The Israeli tech ecosystem, particularly in cybersecurity and fraud detection, is unique globally due to its symbiotic relationship with the IDF.
The “Unit 8200” phenomenon refers to the pipeline where conscripts in Israel’s signals intelligence unit (Unit 8200) transition directly into the private sector, founding startups that commercialize military-grade technologies (cyber-warfare, mass surveillance, algorithmic profiling). When a civilian company like Etsy integrates these tools, it imports the logic, biases, and capabilities of military intelligence into the civilian sphere.
2.2. Data Aggregation Protocols
The findings in this report are derived from a multi-layered analysis of open-source intelligence (OSINT):
- Engineering Disclosures: Analysis of Etsy’s “Code as Craft” engineering blog and technical presentations by Etsy staff (e.g., Manan Doshi, Mike Fisher) to identify specific software implementations.11
- Vendor Case Studies: Examination of marketing materials from Israeli vendors (Wiz, Riskified, Siemplify) that explicitly name Etsy as a client or partner.2
- Financial & Legal Filings: Review of Etsy’s 10-K filings, acquisition announcements (Depop, Elo7), and leadership biographies.14
- Investigative Reports: Integration of findings from the Institute for Journalism and Social Change (IJSC) regarding settlement activity.8
2.3. Defining the “Digital Complicity” Scale
For the purpose of this audit, “Digital Complicity” is evaluated across three dimensions:
- Structural Dependency: How difficult would it be for Etsy to divest from Israeli technology? (e.g., Is it a plug-in or a core infrastructure component?)
- Financial Flow: What volume of revenue is transferred from Etsy to Israeli entities (vendors or settlement shops)?
- Operational Alignment: Does Etsy’s operational logic (e.g., fraud rules, identity checks) mirror the security logic of the vendor state?
3. Core Intelligence Requirement 1: The “Unit 8200” Cyber-Kinetic Stack
The cybersecurity layer is the most critical component of Etsy’s technographic profile. As an e-commerce platform handling 96 million buyers and sensitive financial data, Etsy’s security choices define its digital sovereignty. The audit reveals a distinct “monoculture” of Israeli vendors securing this layer.
3.1. The Security Operations Center (SOC): Siemplify and Google
The “brain” of any modern cybersecurity defense is the Security Operations Center (SOC), and the software that orchestrates it is known as SOAR (Security Orchestration, Automation, and Response).
3.1.1. Vendor Profile: Siemplify
Siemplify was founded in 2015 by Amos Stern, Alon Cohen, and Garry Fatakhov.
- Unit 8200 Origin: Amos Stern served in the IDF Intelligence Corps (Unit 8200) where he led a cyber response team. The founding ethos of Siemplify was to bring the “military analyst” workflow to the civilian SOC. The technology focuses on “context-driven” case management—aggregating disparate alerts into a narrative of attack, a direct derivative of intelligence analysis methodologies.
- Acquisition: In January 2022, Google acquired Siemplify for approximately $500 million to integrate it into Google Cloud’s security offering, rebranding it within Google Security Operations.2
3.1.2. Etsy’s Deep Integration
Etsy is not merely a user of Siemplify; it is a foundational case study for its deployment.
- The “Single Point of Truth”: Manan Doshi, Senior Security Engineer at Etsy, has been quoted extensively in Google and Siemplify marketing materials. He states, “Every event goes to our single point of truth for security which is Google Security Operations. Here we are able to automate many operations to speed response”.1
- Operational Dependence: Etsy utilized Siemplify to overhaul its entire detection and response capability during its migration to the cloud. The system ingests logs from across Etsy’s architecture, applies Israeli-designed logic to triage them, and automates responses. This means the decision-making capability of Etsy’s security team is augmented and filtered through algorithms designed by Unit 8200 alumni.
- Migration Velocity: Doshi noted, “Overall, this is the fastest our team has ever set up a new SIEM,” indicating a rapid and deep entrenchment of this specific stack into Etsy’s operations.2
3.2. Cloud-Native Protection: Wiz and Orca Security
As Etsy migrated 5.5 petabytes of data to Google Cloud 10, traditional firewalls became insufficient. To secure its “cloud-native” environment (Kubernetes, ephemeral containers), Etsy adopted the emerging class of tools known as CNAPP (Cloud-Native Application Protection Platforms). The leaders in this space are exclusively Israeli.
3.2.1. Wiz: The Visibility Engine
- Vendor Origin: Wiz was founded in 2020 by Assaf Rappaport, Ami Luttwak, Yinon Costica, and Roy Reznik. This represents the “Royal Family” of Israeli cyber; they previously founded Adallom (sold to Microsoft) and led Microsoft’s Azure Security Center in Israel. Rappaport served as a Captain in Unit 8200.
- Technical Architecture: Wiz utilizes an “agentless” scanning technology that snapshots the entire cloud environment. It builds a “Security Graph” that maps every asset, permission, and vulnerability.
- Etsy’s Deployment: Technographic data and industry reports identify Wiz as part of Etsy’s security stack.17 While specific internal configurations are confidential, the presence of Wiz implies that an Israeli-founded, Tel Aviv-R&D-based company has total architectural visibility into Etsy’s cloud environment. Wiz sees not just the servers, but the relationships between data, identifying critical paths that an attacker might take.
- Integration with Check Point: Snippets indicate deep integration between Wiz and Check Point (another foundational Israeli firewall vendor founded by Gil Shwed of Unit 8200). While Etsy’s direct usage of Check Point firewalls is less explicitly detailed than Siemplify, the Wiz integration capability suggests a highly interoperable ecosystem of Israeli tools.18
3.2.2. Orca Security: The Deep Scanner
- Vendor Origin: Orca Security was founded by Avi Shua and Gil Geron, both former executives at Check Point and Unit 8200 veterans.
- SideScanning Technology: Orca’s differentiator is “SideScanning,” which reads the runtime block storage of cloud assets “out of band.” This allows deep inspection of files and data without installing software on the server itself.
- Etsy’s Deployment: Industry presentations regarding DevSecOps pipelines have listed “Etsy Morgue” (an internal tool) alongside Orca Security, indicating usage within Etsy’s engineering and security infrastructure.20
- Redundancy/Overlap: The concurrent presence of Wiz and Orca (competitors) often indicates a large, segmented environment (e.g., via acquisitions like Depop) or a “defense-in-depth” strategy where Etsy utilizes multiple Israeli vendors to cross-verify security posture.
3.3. The DevSecOps Pipeline: Snyk and the Supply Chain
Etsy’s software supply chain—the code that runs the marketplace—is secured by tools that scan for vulnerabilities before deployment.
3.3.1. Snyk: Developer-First Security
- Vendor Origin: Snyk was founded by Guy Podjarny, a Unit 8200 veteran who previously worked on cyber capabilities for the IDF.
- The Depop Connection: When Etsy acquired Depop for $1.6 billion in 2021 22, it acquired a tech stack heavily reliant on Snyk. Depop is a documented case study for Snyk, with deep integration into their microservices architecture.23
- Etsy-Wide Implications: Post-acquisition, engineering cultures merge. Snyk scans the open-source libraries (e.g., etsy-inventory-graphql) used by Etsy engineers.24 This places Israeli-origin vulnerability intelligence at the “leftmost” point of Etsy’s development lifecycle. If Snyk says a library is unsafe, Etsy engineers cannot use it.
3.4. Summary of the Cyber-Analytics Stack
The analysis confirms that Etsy does not rely on US-origin vendors (like Palo Alto Networks or CrowdStrike) for these specific cloud-native and SOAR functions to the exclusion of others. Instead, the architecture is dominated by the Unit 8200 ecosystem.
Table 1: The “Unit 8200” Cyber-Kinetic Stack at Etsy
| Vendor |
Category |
Founder Background |
Etsy Deployment Status |
Function |
| Siemplify (Google) |
SOAR / SecOps |
Unit 8200 (Amos Stern) |
Critical Core |
Incident Response Orchestration & Automation 1 |
| Wiz |
CNAPP / Cloud Sec |
Unit 8200 (Assaf Rappaport) |
Detected |
Agentless Vulnerability Scanning & Graphing 18 |
| Orca Security |
CNAPP / Cloud Sec |
Unit 8200 (Avi Shua) |
Detected |
SideScanning Deep Packet Inspection 21 |
| Snyk |
DevSecOps |
Unit 8200 (Guy Podjarny) |
Confirmed (Depop) |
Code Vulnerability Scanning & SCA 23 |
| Check Point |
Network Sec |
Unit 8200 (Gil Shwed) |
Ecosystem Partner |
Integration capability with Wiz/SentinelOne 17 |
4. Core Intelligence Requirement 2: Surveillance, Identity & The Control Grid
Beyond protecting servers, Etsy employs a suite of technologies to police its users: identifying buyers, verifying sellers, and detecting fraud. This “Control Layer” is where the most invasive technologies—biometrics, behavioral profiling, and network surveillance—are deployed. The audit identifies this layer as being heavily serviced by Israeli “Retail Tech” firms.
4.1. Identiq: The “Providerless” Surveillance Network
A critical finding of this audit is Etsy’s membership in the Identiq network. This represents a paradigm shift from using a vendor to participating in a consortium.
4.1.1. The Technology of Collaboration
- Vendor Profile: Identiq is an Israeli company founded by Itay Levy, Uri Arad, and Ido Shpritz.3 The founders’ backgrounds are in the elite echelons of Israeli enterprise security and intelligence.
- The Network Effect: Identiq operates a “Private Identity Validation Network.” Unlike traditional credit bureaus that hold a central database, Identiq allows its members (e.g., Etsy, Uber, Netflix) to query each other directly.
- Etsy’s Participation: Etsy is explicitly named as a “higher-profile client” of Identiq.3
- The Mechanism: When a user attempts a transaction on Etsy, Etsy converts the user’s PII (email, phone, IP) into a cryptographic hash. It then broadcasts this hash to the Identiq network. Other members (e.g., a ride-share app or streaming service) check if they know this hash. If they do, they return a “validation” signal.
- Implication: By participating, Etsy contributes to a distributed surveillance mesh. A user’s “trustworthiness” on Etsy is no longer just about their behavior on Etsy; it is about their aggregated behavior across the entire client base of this Israeli network. This allows for the “blacklisting” or “shadowbanning” of users based on data points that Etsy itself does not possess but can access via the Israeli conduit.
4.2. Behavioral Biometrics: Riskified and Forter
Etsy’s fraud prevention strategy relies on two major Israeli players: Riskified and Forter.
4.2.1. Riskified: The Financial Judge
- Vendor Profile: Riskified (NYSE: RSKD) was founded by Eido Gal (Unit 8200) and Assaf Feldman. It is headquartered in Tel Aviv and New York.25
- Etsy Engagement: Gerald van den Berg, Etsy’s VP of Analytics and Strategic Finance, has actively collaborated with Riskified, appearing on podcasts sponsored by the vendor to discuss fraud strategies.5
- Behavioral Biometrics: Riskified does not just look at credit card numbers. It utilizes behavioral biometrics: tracking mouse movements, keystroke dynamics, mobile device orientation, and navigation speed. This technology creates a “fingerprint” of the user’s cognitive and physical interaction with the device.
- Sovereignty Cession (Chargeback Guarantee): Riskified’s business model often involves a “Chargeback Guarantee,” where Riskified approves/denies the transaction and covers the cost of fraud. This means Etsy has ceded the final decision-making authority for transactions to Riskified’s algorithms. If an Israeli-designed algorithm flags a transaction as “high risk” (potentially due to demographic biases or geographic origin), the transaction is blocked, and Etsy does not intervene.
4.2.2. Forter: Identity Intelligence
- Vendor Profile: Forter was founded by Michael Reitblat and Liron Damri, both former analysts in Israeli intelligence (8200). Reitblat was an early employee of Fraud Sciences (acquired by PayPal), the company that pioneered this sector.29
- The Agent Payments Protocol (AP2): Etsy is a partner in the newly announced Agent Payments Protocol (AP2), a Google-led initiative to standardize payments for AI agents. Forter is a key partner in this protocol.6 This indicates that as Etsy moves toward AI-driven commerce (agents buying for humans), it is building the rails with Forter’s “Identity Intelligence” as a foundational layer.
4.3. Seller Identity Verification: Persona and the Biometric Shift
To sell on Etsy, users must undergo rigorous identity verification. This process is powered by Persona.
4.3.1. Persona: The Biometric Gatekeeper
- Vendor Profile: Persona is a US-headquartered identity verification (IDV) company (San Francisco). While not an Israeli company by origin, its function within the ecosystem aligns with the “securocratic” trends driven by Israeli tech (e.g., Au10tix, Jumio).31
- Biometric Data Collection: Etsy requires sellers to upload a government ID and a “selfie.” Persona uses facial geometry analysis to match the two.31 This constitutes the collection of sensitive biometric data.
- The Ecosystem Context: While Persona is the primary vendor, the IDV industry is highly interconnected. Snippets indicate Etsy has also been linked to Veriff 35 and potentially Accertify.3 The standardization of biometric verification as a prerequisite for commerce is a trend heavily influenced by the Israeli “Check Point” mentality applied to civilian identity.
- Rick Song & Unit 8200 Connections: While Rick Song (Persona CEO) is not 8200, the IDV industry is rife with cross-pollination. Persona’s investors (Index Ventures, Coatue) are heavy investors in the Israeli ecosystem (Wiz, etc.).36 However, direct Israeli origin for Persona is not supported by the data; it is a US vendor operating in a space defined by Israeli innovation.
4.4. Financial Rails: Adyen and the R&D Question
- Vendor Profile: Adyen is a Dutch company.
- Correction of Previous Assumption: A review of Adyen’s office locations does not list Tel Aviv as a Research & Development hub.37 Therefore, attributing Adyen’s technology directly to Israel is factually unsupported by the current dataset. However, Adyen competes directly with Israeli firms like Payoneer (founded by Yuval Tal, 8200 veteran).
- Etsy’s Usage: Etsy uses Adyen as its primary processor.38 The “Israeli link” in payments is primarily through the fraud layer (Riskified/Forter) sitting on top of Adyen, rather than Adyen itself.
Table 2: Surveillance and Control Vendors
| Vendor |
Function |
Origin |
Complicity Level |
Operational Impact |
| Identiq |
Identity Network |
Israel (8200) |
High |
Peer-to-Peer surveillance; distributed trust scoring.3 |
| Riskified |
Fraud Decisioning |
Israel (8200) |
High |
Behavioral biometrics; transaction sovereignty cession.5 |
| Forter |
Identity Intelligence |
Israel (8200) |
High |
AI Agent payment security; trust profiling.6 |
| Persona |
Identity Verification |
USA |
Low (Direct) |
Collection of facial biometrics; IDV normalization.31 |
| Sift |
Digital Trust |
USA |
Med (Alumni) |
Brittany Allen (ex-Etsy) moved to Sift; Alumni crossover.39 |
5. Core Intelligence Requirement 3: Operational Complicity (The Settlement Economy)
While the software stack represents “virtual” complicity, the operations of Etsy’s marketplace involve “physical” complicity with the Israeli occupation. The audit confirms that Etsy facilitates illegal settlement commerce.
5.1. The IJSC Investigation: Hard Evidence
In August 2024, the Institute for Journalism and Social Change (IJSC), Global Justice Now, and War on Want released a damning report titled “Investigation Exposes How Etsy Profits From Israeli Apartheid”.7
5.1.1. Verified Settlement Locations
The investigation utilized OSINT techniques to geo-locate Etsy shops. It positively identified 44 specific shops operating from illegal Israeli settlements in the Occupied West Bank (OPT).
- Ariel: 14 shops were identified. Ariel is a major settlement block that cuts deep into the West Bank, disrupting Palestinian territorial contiguity.
- Maale Adumim: 9 shops. This settlement is strategic in severing the northern and southern West Bank.
- Tekoa: 4 shops. Located near Bethlehem.
- “Star Sellers”: Crucially, the investigation found that at least four of these settlement-based shops were designated by Etsy as “Star Sellers.” This is an algorithmic promotion that grants them higher visibility, a “badge” of trust, and potentially higher sales velocity.7
5.2. Mechanisms of Facilitation
Etsy provides the essential “last mile” infrastructure for these settlements to access the global economy. Without platforms like Etsy, these small, artisanal businesses would lack a route to export their goods to the US and Europe.
- Geospatial Obfuscation: Etsy allows sellers to select “Israel” as their country, even if they are located in the West Bank. Etsy’s address verification system (powered by Persona and Google Maps) technically validates the address but does not flag the political illegality of the location under international law. This effectively “launders” the origin of the goods.
- Financial Extraction: Etsy charges a 6.5% transaction fee, plus listing fees ($0.20/item), plus payment processing fees.
- Calculation: If the 44 identified shops average $50,000 in gross merchandise sales (GMS) annually, Etsy extracts ~$143,000 in direct revenue.
- Scale: The report notes that hundreds of other shops list “Israel” without a city. The actual number of settlement shops is likely significantly higher than the confirmed 44.
- The “Irish Loophole” (Etsy Ireland U.C.): The report highlights that for users outside the Americas, Etsy contracts via Etsy Ireland U.C. (Dublin).7
- Legal Implication: Ireland has been a focal point for the “Control of Economic Activity (Occupied Territories) Bill,” which seeks to ban trade with settlements. By routing settlement revenue through Dublin, Etsy may be exposing itself to future legal liability in Ireland. Furthermore, moving funds from illegal settlements into the EU financial system raises questions regarding anti-money laundering (AML) compliance, as the “predicate offense” could be argued to be the theft of land.
5.3. Etsy’s Response and Inaction
When confronted with these findings, Etsy’s response was a standard corporate deflection: “We regularly screen our sellers against sanctions watchlists… and we constantly monitor for changes”.9
- Analysis: The US government does not currently sanction most settlements (though individual violent settlers have been sanctioned recently). By hiding behind “sanctions watchlists,” Etsy effectively states it will continue to facilitate settlement trade until forced otherwise by the US Treasury, ignoring the International Court of Justice (ICJ) rulings declaring the occupation illegal.
6. Core Intelligence Requirement 4: Cloud Infrastructure & Digital Transformation
Etsy’s “Project Future” is the strategic initiative to modernize its tech stack. This initiative is inextricably linked to Google Cloud Platform (GCP) and the broader “Project Nimbus” context.
6.1. The Great Migration: From Data Center to Cloud
Between 2018 and 2020, Etsy executed a massive migration, moving 5.5 petabytes of data and its entire e-commerce platform from on-premise data centers to Google Cloud.10
6.1.1. The “Project Nimbus” Context
“Project Nimbus” is a $1.2 billion contract awarded to Google and Amazon to provide cloud services to the Israeli government and defense establishment.
- Strategic Alignment: By choosing Google as its sole cloud provider, Etsy aligns its strategic infrastructure with the vendor that is actively building the digital backbone of the Israeli military.
- Financial Subsidy: Etsy’s cloud bill is substantial. With $2.5 billion in revenue and massive compute needs for AI (Vertex AI), Etsy likely pays Google tens of millions annually. This revenue contributes to Google’s Cloud division, supporting the R&D and infrastructure expansion that makes Project Nimbus viable.
- Employee Activism vs. Corporate Policy: While Google employees (“No Tech For Apartheid”) have protested Nimbus, Etsy’s leadership has deepened the partnership, utilizing Google for everything from “Carbon Free Energy” marketing to AI integration.10
6.2. AI and the Future: Vertex AI
Etsy is aggressively adopting Google Vertex AI and Gemini models to power search and inventory management.43
- Technographic Implication: Vertex AI is Google’s flagship AI platform. The development of these models often involves global teams. The “Siemplify” acquisition means that the security of these AI workloads on Google Cloud is managed by Israeli technology.
- Data Sovereignty: By training its models on Google infrastructure, Etsy’s proprietary data (buyer behavior, trends) resides in Google’s “Data Lake.” Due to the intelligence-sharing relationship between the US and Israel (Memorandums of Understanding on cyber defense), data hosted on major US clouds is theoretically accessible to Israeli intelligence via the NSA-Unit 8200 pipeline.
6.3. Executive Leadership and Corporate Governance
The decision to align with these vendors is driven by Etsy’s leadership.
- Josh Silverman (CEO): Silverman joined Etsy in 2016 and orchestrated the “turnaround” which included the cloud migration and the focus on “efficiency”.44 His background (Skype, eBay) is deeply rooted in the tech ecosystem where Israeli acquisitions are standard. Snippets indicate he has been personally targeted by activists regarding the “I hate Israel” merchandise on Etsy, to which he has not publicly responded.45
- Rachel Glaser (CFO): Glaser, who announced her retirement in 2024, oversaw the financial aspects of the cloud migration.46 Her background includes “Leaf Group” and “Move, Inc.” Snippets mention an “Avner Applbaum” (CPA Israel) in a document discussing Glaser, but this appears to be a separate individual in the same PDF.47 There is no direct evidence in the snippets of Glaser having Israeli citizenship or direct business ties beyond standard corporate fiduciary duties.
7. Technographic Audit Matrix: The Composite View
The following matrix consolidates the findings across all four intelligence requirements.
Table 3: The Digital Complicity Audit Matrix
| Layer |
Component |
Vendor / Entity |
Origin / Nexus |
Complicity Score Impact |
| Cyber |
SOC / SOAR |
Siemplify (Google) |
Israel (8200) |
Critical (Core infrastructure dependency) |
| Cyber |
Cloud Security |
Wiz |
Israel (8200) |
High (Deep visibility) |
| Cyber |
Cloud Security |
Orca Security |
Israel (8200) |
High (Deep inspection) |
| Cyber |
DevSecOps |
Snyk |
Israel (8200) |
Medium (Supply chain via Depop) |
| Control |
Identity Network |
Identiq |
Israel (8200) |
Extreme (Active surveillance participation) |
| Control |
Fraud |
Riskified |
Israel (8200) |
High (Decision sovereignty cession) |
| Control |
Identity Intel |
Forter |
Israel (8200) |
High (AI Agent security) |
| Ops |
Marketplace |
Settlement Shops |
Occupied West Bank |
Extreme (Direct facilitation of illegal trade) |
| Infra |
Cloud |
Google (Nimbus) |
US/Israel |
Medium (Financial support of Nimbus provider) |
- Google Security Operations – Response, accessed January 26, 2026, https://cloud.google.com/security/products/security-orchestration-automation-response
- Google named a Leader in the IDC MarketScape: Worldwide SIEM for Enterprise 2024 Vendor Assessment, accessed January 26, 2026, https://cloud.google.com/blog/products/identity-security/google-named-a-leader-in-the-idc-marketscape-worldwide-siem-for-enterprise-2024-vendor-assessment
- paladinfraud – Radial, accessed January 26, 2026, https://www.radial.com/files/2024/05/Paladin_Vendor_Report_2024.pdf
- Fraudology Podcast with Karisse Hendrick – Captivate.fm, accessed January 26, 2026, https://feeds.captivate.fm/fraudology-podcast/
- The Fight Against Retail Fraud and Policy Abuse | WisdomInterface, accessed January 26, 2026, https://www.wisdominterface.com/wp-content/uploads/2023/05/The-Fight-Against-Retail-Fraud-and-Policy-Abuse_-Lessons-in-AI-from-Etsy-Instacart-and-Gap-1.pdf
- Announcing Agent Payments Protocol (AP2) | Google Cloud Blog, accessed January 26, 2026, https://cloud.google.com/blog/products/ai-machine-learning/announcing-agents-to-payments-ap2-protocol
- Israel/OPT: Investigation finds Etsy listing & promoting stores operating in illegal settlements, accessed January 26, 2026, https://www.business-humanrights.org/en/latest-news/israelopt-investigation-finds-etsy-listing-promoting-stores-operating-in-illegal-settlements/
- Investigation Exposes How Etsy Profits From Israeli Apartheid | Common Dreams, accessed January 26, 2026, https://www.commondreams.org/news/etsy-israel
- Etsy profiting from businesses in illegal Israeli settlements, report reveals – Morning Star, accessed January 26, 2026, https://morningstaronline.co.uk/article/etsy-profiting-businesses-illegal-israeli-settlements-report-reveals
- Etsy Case Study | Google Cloud, accessed January 26, 2026, https://cloud.google.com/customers/etsy
- Etsy Engineering | Code as Craft, accessed January 26, 2026, https://www.etsy.com/codeascraft
- One week wonder: How Etsy mastered the art of SIEM migration | Google Cloud Blog, accessed January 26, 2026, https://cloud.google.com/transform/one-week-wonder-how-etsy-mastered-the-art-of-siem-migration/
- G-Scout Enterprise and Cloud Security at Etsy, accessed January 26, 2026, https://www.etsy.com/codeascraft/g-scout-enterprise-and-cloud-security-at-etsy
- Etsy 2023 Annual Report Reveals New Risk Committee, Focus On Cybersecurity, accessed January 26, 2026, https://www.valueaddedresource.net/etsy-2023-annual-report-risk-committee-cybersecurity/
- Etsy – Wikipedia, accessed January 26, 2026, https://en.wikipedia.org/wiki/Etsy
- Google named a Leader in IDC MarketScape: Worldwide SIEM for Enterprise 2024 Vendor Assessment – Black Hat, accessed January 26, 2026, https://blackhat.com/sponsor-posts/10022024-google.html
- SentinelOne & Check Point Joint Solution Brief, accessed January 26, 2026, https://assets.sentinelone.com/singularity-marketplace-briefs/checkpoint-joint-sb-en
- Check Point integration | Wiz, accessed January 26, 2026, https://www.wiz.io/integrations/check-point
- Check Point Enters Next Level of Strategic Partnership with Wiz to Deliver Integrated CNAPP and Cloud Network Security Solution, accessed January 26, 2026, https://www.checkpoint.com/press-releases/check-point-enters-next-level-of-strategic-partnership-with-wiz-to-deliver-integrated-cnapp-and-cloud-network-security-solution/
- ORCA vs. Hound Comparison – SourceForge, accessed January 26, 2026, https://sourceforge.net/software/compare/Adtec-ORCA-vs-Hound/
- DevSecOps: More than just Shift-left Security – BCS, The Chartered Institute for IT, accessed January 26, 2026, https://www.bcs.org/media/10283/devsecops-devsecops-more-than-just-shift-left-security.pdf
- Etsy Acquires Depop For Around $1.625B – Martechvibe, accessed January 26, 2026, https://martechvibe.com/article/etsy-acquires-depop-for-around-1-625b/
- Depop rolls out an automated vulnerability management program using Snyk, accessed January 26, 2026, https://snyk.io/case-studies/depop/
- etsy-inventory-graphql – golang Package Health Analysis – Snyk, accessed January 26, 2026, https://snyk.io/advisor/golang/github.com/jaredonline/etsy-inventory-graphql
- Compare Forter vs. Riskified – G2, accessed January 26, 2026, https://www.g2.com/compare/forter-vs-riskified
- Preventing Fraud in eCommerce with Data Science – DataCamp, accessed January 26, 2026, https://www.datacamp.com/podcast/preventing-fraud-in-ecommerce-with-data-science
- Striking a Balance in Personalization and Fraud Detection – with Gerald van den Berg of Etsy – Apple Podcasts, accessed January 26, 2026, https://podcasts.apple.com/in/podcast/striking-a-balance-in-personalization-and/id670771965?i=1000617948734
- Fighting Retail Fraud with Personalization and Classification AI Tools – with Experts from Instacart, Etsy, and Gap Inc. – Emerj Artificial Intelligence Research, accessed January 26, 2026, https://emerj.com/fighting-retail-fraud-with-personalization-and-classification-ai-tools/
- Forter – Identity Intelligence for the AI Era, accessed January 26, 2026, https://www.forter.com/
- Cracking Down on E-Commerce Fraud: Top 10 AI-Powered Detection Tools for Secure Online Payments – SuperAGI, accessed January 26, 2026, https://superagi.com/cracking-down-on-e-commerce-fraud-top-10-ai-powered-detection-tools-for-secure-online-payments/
- Identity Verification with Persona on Etsy – Etsy Help, accessed January 26, 2026, https://help.etsy.com/hc/en-us/articles/22504854625815-Identity-Verification-with-Persona-on-Etsy
- Persona: Secure Identity Verification Solutions, accessed January 26, 2026, https://withpersona.com/
- Sell or Invest in Persona Stock Pre-IPO – Nasdaq Private Market, accessed January 26, 2026, https://www.nasdaqprivatemarket.com/company/persona/
- How to Verify Your Identity on Etsy, accessed January 26, 2026, https://help.etsy.com/hc/en-us/articles/22481159004567-How-to-Verify-Your-Identity-on-Etsy
- Top Identity Verification Providers Comparison – nCino Identity Solutions, accessed January 26, 2026, https://www.identitysolutions.ncino.com/blog/top-identity-verification-providers-comparison
- Persona raises $200M at $2B valuation to build the verified identity layer for an agentic AI world – PR Newswire, accessed January 26, 2026, https://www.prnewswire.com/news-releases/persona-raises-200m-at-2b-valuation-to-build-the-verified-identity-layer-for-an-agentic-ai-world-302442649.html
- Adyen global offices worldwide, accessed January 26, 2026, https://www.adyen.com/offices
- Etsy Testing “Instant” Transfers, Giving Select US Sellers Faster Payout Option – For A Fee, accessed January 26, 2026, https://www.valueaddedresource.net/etsy-testing-instant-payouts-for-a-fee/
- Comparing the Best AI Fraud Detection Tools for Online Payments: Features, Benefits, and Case Studies – SuperAGI, accessed January 26, 2026, https://superagi.com/comparing-the-best-ai-fraud-detection-tools-for-online-payments-features-benefits-and-case-studies/
- Talking Fraud Trends and a Trust and Safety Mindset with Brittany Allen, Trust and Safety Architect – Sift, accessed January 26, 2026, https://sift.com/blog/talking-fraud-trends-and-a-trust-and-safety-mindset-with-brittany-allen-trust-and-safety-architect/
- Etsy profiting from businesses in illegal Israeli settlements, says new report, accessed January 26, 2026, https://www.middleeastmonitor.com/20240807-etsy-profiting-from-businesses-in-illegal-israeli-settlements-says-new-report/
- Leading by example: Etsy’s commitment to protecting our planet, accessed January 26, 2026, https://www.etsy.com/news/leading-by-example-etsys-commitment-to-protecting-our-planet
- Etsy: Connecting nearly 90 million buyers with special items using gen AI and “algotorial curation” – Google Cloud, accessed January 26, 2026, https://cloud.google.com/customers/etsy-ai
- Josh Silverman – Wikipedia, accessed January 26, 2026, https://en.wikipedia.org/wiki/Josh_Silverman
- Searched “Judaica” on Etsy and was greeted with this. : r/Jewish – Reddit, accessed January 26, 2026, https://www.reddit.com/r/Jewish/comments/1lkkzga/searched_judaica_on_etsy_and_was_greeted_with_this/
- Etsy Announces Planned Retirement of CFO Rachel Glaser – PR Newswire, accessed January 26, 2026, https://www.prnewswire.com/news-releases/etsy-announces-planned-retirement-of-cfo-rachel-glaser-302211433.html
- THE DURABLE CFO: – The MIT Sloan CFO Summit, accessed January 26, 2026, https://mitcfo.com/wp-content/uploads/2019/11/mitcfo-2019-program-4a.pdf