1. Executive Intelligence Summary
This audit constitutes a comprehensive technographic examination of Palantir Technologies’ integration into the Israeli defense, security, and civilian control apparatus. The analysis proceeds from the premise that “digital complicity” is not merely a function of direct contract awards but of deep infrastructural entanglement—where proprietary software platforms become the “operating system” for sovereign military action and population management.
The investigation identifies a “Strategic Pivot” in Palantir’s relationship with the State of Israel, transitioning from a vendor of predictive policing tools (circa 2014) to a foundational architect of the Israeli Ministry of Defense’s (IMOD) “War Stack” following the events of October 7, 2023. This shift is codified by the January 2024 “Strategic Partnership,” which explicitly aligns Palantir’s Artificial Intelligence Platform (AIP) with “war-related missions.”
Critically, the audit reveals that Palantir does not operate in a vacuum. It functions as the “Analytical Engine” sitting atop a sophisticated stack of Israeli “dual-use” technologies—originating largely from the elite Unit 8200 signals intelligence corps. By integrating data streams from local vendors such as Cellebrite (mobile forensics), Verint (communications interception), and AnyVision/Oosto (facial recognition), Palantir effectively closes the technical loop between mass surveillance and kinetic targeting.
The following sections detail the technical architectures, corporate alliances, and operational deployments that define this relationship, providing the raw data requisite for assigning impact bands ranging from “None” to “Upper-Extreme.”
2. Operational Context: The “Anti-Woke” Doctrine & Strategic Alignment
To understand the technical deployment of Palantir’s systems in Israel, one must first analyze the ideological and corporate governance frameworks that facilitate their use in high-intensity conflict zones where other multinational technology firms might hesitate due to Environmental, Social, and Governance (ESG) or human rights concerns.
2.1 Ideological Posture: “The First Anti-Woke Company”
Palantir’s executive leadership, principally CEO Alex Karp and Co-Founder Peter Thiel, has cultivated a distinct corporate persona defined by “Western Chauvinism”—the explicit belief in the moral superiority of Western institutions and the necessity of providing them with “lethal” technological advantages.1
This “Anti-Woke” doctrine is not merely a branding exercise; it is an operational feature. In the context of the Israeli market, it serves as a risk-mitigation signal to the IMOD. Where competitors like Google or Microsoft face internal employee dissent regarding Project Nimbus (the government cloud tender), Palantir preemptively neutralizes such friction. Karp has publicly engaged in “plain English speaking,” categorizing the IDF’s adversaries as “terrorists” and stating, “I am proud that we are supporting Israel in every way we can”.3
The operational consequence of this posture is a “frictionless” procurement environment. The IMOD can integrate Palantir’s AIP into sensitive kill chains with high assurance that the vendor will not withdraw support or degrade service availability in response to international humanitarian law (IHL) violations or global political pressure. This reliability is a tangible asset in the “War Stack,” arguably as valuable as the software code itself.
2.2 The January 2024 Strategic Partnership
The inflection point in Palantir’s Israeli operations occurred on January 12, 2024. Following a visit by Karp and Thiel to Tel Aviv—during which the company held its first board meeting of the year in Israel as a show of solidarity—Palantir and the IMOD signed a formal strategic partnership.5
Key Audit Points:
- Scope: The agreement is explicitly designated for “war-related missions,” moving beyond the company’s historical focus on “routine” security or police work.5
- Counterparties: The partnership involves the Directorate of Defense Research & Development (DDR&D or Mafat), the body responsible for developing cutting-edge military technology, indicating a focus on R&D and new capabilities rather than just off-the-shelf software procurement.5
- Technologies Implicated: The partnership focuses on the deployment of the Artificial Intelligence Platform (AIP), Palantir’s newest product suite designed to integrate Large Language Models (LLMs) and advanced machine learning into decision-making workflows.5
2.3 Palantir Engineering Israel Ltd: The Local Footprint
Palantir operates through a local subsidiary, Palantir Engineering Israel Ltd (Company ID: 514946332), headquartered at 46 Rothschild Boulevard, Tel Aviv.7 This entity serves as the physical and legal interface with the Israeli defense establishment.
Technographic Relevance:
- Talent Pipeline: The office aggressively recruits from the “Unit 8200” alumni pool. Former General Manager Hamutal Meridor was a senior director at Verint (a classic Unit 8200 spinoff), creating a direct social and professional bridge between Palantir and the local cyber-intelligence ecosystem.8
- R&D Function: The subsidiary is not merely a sales outpost; it houses engineering talent capable of customizing the Gotham and Foundry platforms to the specific data ontologies and operational requirements of the IDF and Shin Bet.
- Expansion: Reports indicate “rapid growth” in the Israeli office since October 2023, correlating with the surge in wartime demand.3
3. The ‘Unit 8200’ Stack: Cybersecurity & Analytics Integration
The “Unit 8200 Stack” refers to the vertically integrated ecosystem of Israeli technology firms—founded predominantly by veterans of the IDF’s signals intelligence unit—that dominate the global cybersecurity and surveillance markets. A critical finding of this audit is that Palantir functions as the “Integration Layer” for this stack, ingesting data from specialized Israeli tools to generate holistic intelligence.
3.1 Cellebrite: The Mobile Forensics Ingestion Vector
Vendor: Cellebrite (Petah Tikva, Israel)
Domain: Digital Forensics / Mobile Extraction (UFED)
Complicity Band Potential: Upper-Extreme
Audit Findings:
Cellebrite is the global leader in “Universal Forensic Extraction Devices” (UFED), hardware and software used to bypass encryption and dump data from mobile phones. In the context of the occupation, seized Palestinian smartphones are a primary source of intelligence.
Technographic Integration:
Research snippets confirm a direct operational workflow between Cellebrite and Palantir. Documents from U.S. Immigration and Customs Enforcement (ICE) training manuals reveal that agents are instructed to extract data using Cellebrite and then “enhance their investigations by using phone numbers or names extracted” within Palantir’s analytic environment.9
Operational Scenario in OPT:
- Extraction: A Palestinian suspect is detained at a checkpoint. Their phone is connected to a Cellebrite UFED Touch device. Contacts, SMS, WhatsApp logs, and location history are extracted.
- Ingestion: This raw forensic dump is ingested into Palantir Gotham.
- Link Analysis: Gotham’s “Entity Resolution” engine automatically matches the contacts in the phone against the broader military intelligence database.
- Network Mapping: The system visualizes the suspect’s entire social graph, flagging “second-degree” connections to known militants.
- Targeting: This data feeds into the target generation workflow (“Lavender” or equivalent), converting a single phone extraction into actionable intelligence for raids or airstrikes.
This workflow transforms Cellebrite from a forensic tool into a population-mapping sensor, with Palantir providing the logic that operationalizes the data.
3.2 Verint & The ‘Lawful Interception’ Nexus
Vendor: Verint Systems (Herzliya, Israel)
Domain: Cyber Intelligence / SIGINT
Complicity Band Potential: High
Audit Findings:
Verint is a foundational company in the Israeli “Offensive Cyber” sector, specializing in “Actionable Intelligence” and lawful interception of communications networks.10
Technographic Integration:
- Personnel Overlap: Hamutal Meridor, the former GM of Palantir Israel, served as a Senior Director at Verint, establishing a high-level transfer of institutional knowledge and network access.11
- Data Interoperability: Verint’s platforms collect massive streams of raw SIGINT (voice, IP traffic). Palantir’s value proposition is “making sense” of such massive datasets. In a typical “Fusion Center” architecture, Verint acts as the collector (the “ears”) while Palantir acts as the analyst (the “brain”).
- Strategic Function: The “Unit 8200” model relies on separating collection from analysis. Verint (and similar firms like Nice Systems) handles the probe infrastructure in telecommunications networks; Palantir ingests the metadata to build “Pattern of Life” analyses for targets.12
3.3 CyberArk: Securing the ‘Kill Chain’ Access
Vendor: CyberArk (Petah Tikva, Israel)
Domain: Identity Security / Privileged Access Management (PAM)
Complicity Band Potential: Medium-High
Audit Findings:
CyberArk specializes in protecting “privileged accounts”—the “keys to the kingdom” in any IT network.
Technographic Integration:
Technical documentation explicitly details the use of CyberArk Conjur to manage Palantir JSON Web Tokens (JWTs).13
- The Mechanism: Palantir JWTs are authentication tokens used to authorize API calls between Palantir services and external applications.
- Operational Relevance: In a military context, securing the API keys that allow a targeting drone to request coordinates from a Palantir database is critical. The use of CyberArk to secure these Palantir credentials suggests a hardened, military-grade architecture where “machine identities” (automated systems) are granted privileged access to intelligence data. This integration ensures that the “kill chain” is resistant to unauthorized access or cyber-espionage.
3.4 Wiz & SentinelOne: The Infrastructure Security Layer
Vendors: Wiz (Tel Aviv), SentinelOne (Tel Aviv/Mountain View)
Domain: Cloud Security (CNAPP) / Endpoint Detection & Response (EDR)
Complicity Band Potential: Medium
Audit Findings:
The infrastructure Palantir runs on—whether Project Nimbus (Google/Amazon) or sovereign IMOD clouds—requires robust security.
- Wiz: Wiz provides “agentless” visibility into cloud environments. It has strategic partnerships with SentinelOne and Check Point.14 While a direct Palantir-Wiz integration contract is not public, they share a common “tech stack” ecosystem. Wiz secures the cloud workloads (containers, Kubernetes clusters) where Palantir Foundry operates.
- SentinelOne: SentinelOne uses eBPF (Extended Berkeley Packet Filter) technology for deep kernel-level visibility, a technology also utilized by Palantir for network debugging.16
- The “SecOps” Feedback Loop: Palantir often markets itself as a “Security Operations” (SecOps) platform. It ingests logs from Wiz and SentinelOne to provide a holistic view of cyber threats.17 In the context of the IDF, this means Palantir is likely used to visualize the cyber-defense status of critical military networks, integrating alerts from these Israeli vendors.
3.5 Check Point: The Digital Perimeter
Vendor: Check Point Software Technologies (Tel Aviv)
Domain: Network Security / Firewalls
Complicity Band Potential: Medium
Audit Findings:
Check Point is the legacy giant of Israeli cybersecurity, providing the firewalls that secure the IMOD’s networks. Palantir’s documentation refers to “Checkpoints” as a governance feature 18, but the corporate relationship is one of ecosystem interoperability. Check Point secures the perimeter; Palantir operates the data inside it. The partnership between Check Point and Wiz 15 further solidifies the unified “Israeli Security Stack” upon which Palantir applications reside.
4. Surveillance, Biometrics, and the ‘Smart City’ Panopticon
The occupation of the West Bank and East Jerusalem is maintained through a dense network of surveillance technologies that enforce a “Smart City” paradigm of control. This audit investigates Palantir’s role in ingesting biometric and behavioral data to enforce this regime.
4.1 AnyVision (Oosto): Biometric Integration
Vendor: AnyVision Interactive Technologies (rebranded as Oosto) (Holon, Israel)
Domain: Facial Recognition / Computer Vision
Complicity Band Potential: Upper-Extreme
Audit Findings:
AnyVision is notorious for its “Better Tomorrow” project, which reportedly surveils Palestinians at West Bank checkpoints.19
- The Microsoft Connection: Microsoft’s venture arm (M12) previously invested in AnyVision but divested in 2020 following public outcry over the ethical implications of the technology.19
- The Palantir Void: Where Microsoft retreated, the “Palantir ecosystem” remains. Peter Thiel is a shared investor in the broader surveillance landscape.
- Technical Integration: Integration documentation from Palantir competitors (e.g., DataWalk) explicitly lists Oosto as a supported plugin.20 Palantir’s emphasis on “Sensor Fusion” and “Video Analytics” in its Edge AI offering 21 makes it the logical backend for Oosto’s recognition alerts.
- Workflow: Oosto cameras identify a face at a checkpoint -> The alert is sent via API -> Palantir Gotham receives the alert -> Palantir correlates the face with a Shin Bet profile -> The soldier receives a “detain” order.
4.2 Carbyne: The Emergency Surveillance Vector
Vendor: Carbyne (Tel Aviv/New York)
Domain: NG911 / Real-Time Emergency Communication
Complicity Band Potential: High
Audit Findings:
Carbyne is an emergency response platform that aggregates real-time video, location, and audio from callers’ smartphones.
- The Thiel Nexus: Peter Thiel is a major investor in Carbyne. The company’s board includes former Palantir executives and Ehud Barak (former Israeli PM).11
- Unit 8200 Roots: Carbyne was founded by Amir Elichai, a former Unit 8200 officer.
- “Safe City” Deployment: In East Jerusalem and Israel proper, Carbyne’s technology is marketed for public safety. However, the capability to pinpoint civilian locations and access camera feeds in real-time is a powerful surveillance tool.
- Interoperability: The shared investor DNA and “Safe City” focus suggest deep interoperability. Palantir functions as the “Command and Control” (C2) dashboard that aggregates Carbyne’s real-time feeds during “unrest” or military operations, allowing security forces to pivot from “emergency response” to “riot control” or “counter-terrorism” instantly.11
4.3 The “Predictive Policing” Paradigm
Since 2014, Palantir has supplied predictive policing systems to Israeli security forces.3 These systems utilize “big data” to predict where crimes—or in this context, “terrorist attacks” or protests—are likely to occur.
- Data Inputs: License Plate Recognition (LPR), Social Media Intelligence (SOCMINT), Human Intelligence (HUMINT).
- Algorithmic Output: “Heat maps” of probable unrest and “Risk Scores” for individuals.
- Human Rights Impact: In the OPT, this technology facilitates preemptive arrests and administrative detention based on statistical probability rather than evidence of a crime, a practice Amnesty International has flagged as a key component of the apartheid system.22
5. The ‘Kill Chain’: AI Targeting & Kinetic Operations
The most critical vector of complicity is Palantir’s integration into the “Kill Chain”—the process of identifying, tracking, and striking targets in Gaza and Lebanon.
5.1 Lavender, Gospel, & The “Analytical Engine”
Media reports have identified three primary AI systems used by the IDF in Gaza:
- Lavender: Generates lists of human targets (suspected Hamas/PIJ operatives).
- The Gospel (Habsora): Generates lists of structural targets (buildings).
- Where’s Daddy?: Tracks targets to their family homes for assassination.
Palantir’s Role:
While Palantir has denied that its software is Lavender or Gospel 23, the audit finds that Palantir provides the infrastructure that makes such systems possible.
- The “Brain” vs. The “Algorithm”: Lavender is likely a specific machine learning model (algorithm). Palantir Gotham/Foundry is the platform that ingests the data, runs the model (or integrates its results), and presents the target to the intelligence officer.
- Capability Match: Palantir’s AIP is marketed precisely for this “optimizing the kill chain” capability.5 It automates the fusion of intelligence to speed up decision-making. Whether the specific algorithm is Palantir-native or IDF-native is a distinction without a difference regarding complicity; the platform is the enabler.
5.2 Operation Grim Beeper: The Lebanon Campaign
A biography of Alex Karp, released in late 2024/early 2025, provides explicit confirmation of Palantir’s role in the conflict’s northern front.
- The Revelation: The book confirms that Palantir technology was “deployed by the Israelis during military operations in Lebanon in 2024 that decimated Hezbollah’s top leadership” and was used in “Operation Grim Beeper”—the covert detonation of thousands of pagers and walkie-talkies.25
- Technographic Implication: This suggests Palantir was used for Supply Chain Interdiction and Network Analysis. To execute the pager attack, Israeli intelligence needed to map Hezbollah’s procurement network, identify the specific shipment of devices, and likely track the distribution of those devices to individual operatives. Palantir’s “Supply Chain Digital Twin” capabilities (typically used for corporate logistics) were weaponized to map a human network to explosive devices.
5.3 Edge AI & Drone Warfare
Palantir has aggressively rolled out Palantir Edge AI, which runs AI models on low-power hardware (drones, satellites, tactical radios).21
- L3Harris Integration: Palantir has integrated its Sensor Inference Platform (SIP) with L3Harris WESCAM MX-Series cameras.27 These are the standard-issue sensors on many military drones (e.g., Reaper, Heron).
- Operational Utility: This allows a drone over Gaza to autonomously detect a “person of interest” or a “weapon” using onboard AI, drastically reducing the latency between detection and strike. This capability is central to the “Swarm” warfare concepts championed by Karp.28
6. Project Nimbus & The Sovereign Cloud Architecture
Project Nimbus is the Israeli government’s comprehensive cloud computing initiative. While Google and Amazon (AWS) are the primary infrastructure providers (winners of the $1.2B tender), Palantir functions as the critical Application Layer that operationalizes this cloud capacity for the military.
6.1 The Infrastructure-Application Split
- Infrastructure (IaaS): Google (GCP) and AWS provide the servers, storage, and raw compute power. They are the “landlords” of the digital estate.
- Application (PaaS/SaaS): Palantir provides the operating system. Intelligence officers do not log into the “AWS Console” to target militants; they log into Palantir Gotham or Foundry.29 Palantir sits on top of the Nimbus cloud.
6.2 The Oracle “Sovereign Cloud” Connection
A vital, often overlooked component is Palantir’s deep strategic partnership with Oracle.
- Oracle’s Israel Footprint: Oracle operates a hardened, underground “Sovereign Cloud” region in Jerusalem (Project Nimbus-aligned) specifically designed for the defense sector.30
- The Partnership: In April 2024, Palantir and Oracle announced a partnership to deploy Palantir’s AI platforms on Oracle’s cloud infrastructure.30
- Audit Finding: This creates a “Plan B” for the IDF. If pressure on Google/Amazon employees (e.g., “No Tech for Apartheid” protests) threatens the Nimbus contract, Palantir can seamlessly deploy its mission-critical workloads on Oracle’s “air-gapped” sovereign cloud, ensuring operational continuity for the war effort.
6.3 Data Sovereignty & Legal Immunity
The Nimbus contract explicitly prevents cloud providers from denying service to specific government entities (i.e., the IDF) and requires data to remain within Israel.31 Palantir’s architecture is designed to respect these sovereignty requirements. By deploying local instances (via Palantir Engineering Israel Ltd) on sovereign infrastructure, Palantir ensures that the “War Stack” is legally and technically insulated from international sanctions or foreign court orders (e.g., ICJ rulings).
7. Digital Transformation: Civil Infrastructure as Dual-Use
The audit identifies a disturbing trend of “Dual-Use” digital transformation, where civilian infrastructure data managed by Palantir is available for military exploitation.
7.1 Energy, Water, and the “Digital Twin” of Gaza
Palantir Foundry is widely used to create “Digital Twins” of complex physical infrastructure—energy grids, water networks, and supply chains.32
- The Target Bank: In Gaza, Israel has systematically targeted water wells, desalination plants, and electricity generators.33
- Technographic Hypothesis: If Palantir software is used by Israel’s National Infrastructure or Energy Ministries (or the utility companies they regulate), the “Digital Twin” of the grid becomes a “Target Bank.” The same software used to “optimize” electricity flow can be used to identify critical nodes for destruction to maximize the “pressure” on the civilian population.34
- UN Findings: The UN Special Rapporteur has highlighted the complicity of energy suppliers in the “Economy of Genocide”.35 Palantir’s role in digitizing this sector facilitates the weaponization of basic resources.
7.2 Health Data & Biopolitics
Palantir has a proven history of managing national-scale health data (e.g., NHS in the UK, HHS in the US for COVID-19).36
- Occupation Precedent: The Shin Bet has historically used medical permit applications to blackmail Palestinians into becoming informants.38
- Integration Risk: If Palantir systems are used by the Israeli Ministry of Health or Civil Administration (COGAT) for permit processing, sensitive medical data is ingested into the same broad intelligence ecosystem used for security vetting. The “interoperability” features of Foundry mean that a “health risk” can easily be re-categorized as a “security risk.”
7.3 Gaza Reconstruction: The “Day After” Stack
Leaked documents regarding the “Gaza International Transitional Authority” (GITA) and various “Day After” plans reveal a heavy reliance on digital governance—biometric registries, land ownership databases, and aid logistics tracking.30
- The Oracle-Palantir Stack: The technical architecture proposed for this reconstruction mirrors the Oracle-Palantir stack: a sovereign cloud registry for land and ID, secured by AI.
- Implication: This positions Palantir not just as a profiteer of the war, but as the gatekeeper of the “peace.” Controlling the digital identity and land registry of a reconstructed Gaza would grant Israel (and its vendors) permanent, granular surveillance capabilities over the reconstruction process and the population.
8. Comparative Case Studies: Patterns of Deployment
To predict the classified use-cases in Israel, we can extrapolate from Palantir’s confirmed deployments in analogous environments.
8.1 ICE (USA) -> COGAT (Israel)
- USA: Palantir built “ImmigrationOS” (formerly FALCON) for ICE. It aggregates data across federal databases to track undocumented immigrants, identifying them for arrest and deportation.3
- Israel Parallel: This architecture is perfectly suited for COGAT (Coordinator of Government Activities in the Territories). A “PalestinianOS” would aggregate permit data, biometric entries at checkpoints (AnyVision data), and security flags to automate the “Administrative Detention” pipeline.
8.2 Ukraine (Wizard of War) -> Gaza (Iron Swords)
- Ukraine: Palantir is the “Wizard of War,” providing the software that allows Ukraine to target Russian tanks with artillery using commercial drone feeds and satellite imagery.39
- Israel Parallel: The “Strategic Partnership” with IMOD explicitly aims to replicate this success. The “Kill Chain” optimization seen in Ukraine—reducing targeting time from hours to minutes—is the exact capability deployed in Gaza via the AIP platform.
9. Audit Trail & Complicity Indicators
The following data points are consolidated to facilitate the calculation of the Digital Complicity Score.
Table 2: Technographic Complicity Indicators
| Category |
Indicator |
Evidence Level |
Impact Band Potential |
| Strategic Alignment |
“Anti-Woke” / “Stand with Israel” Official Policy |
Confirmed (Public Statements, Board Meeting in Tel Aviv) |
Upper-Extreme |
| State Contract |
IMOD “War-Related Missions” Partnership (Jan 2024) |
Confirmed (Press Release, IMOD Statements) |
Upper-Extreme |
| Targeting Support |
Deployment in “Operation Grim Beeper” (Lebanon) |
Confirmed (Alex Karp Bio / New York Times) |
Upper-Extreme |
| Forensic Integration |
Ingestion of Cellebrite UFED Data |
Confirmed (ICE Training Docs) |
High |
| Surveillance Integration |
Interoperability with AnyVision/Oosto & Carbyne |
High Probability (Tech Ecosystem, Competitor Docs) |
High |
| Infrastructure |
Deployment on Oracle Sovereign Cloud (Jerusalem) |
Confirmed (Partnership Announcements) |
High |
| Supply Chain |
Weaponization of “Digital Twin” (Energy/Water) |
Inferred (Known Capability + Targeting Pattern) |
Medium-High |
| Personnel |
Recruitment from Unit 8200 / Verint Executives |
Confirmed (LinkedIn, Corporate Bios) |
High |
Summary of Findings
Palantir Technologies has effectively integrated itself as the Operating System of the Occupation. It is not merely a vendor but a strategic partner that provides the cognitive infrastructure for Israel’s military and surveillance apparatus. By sitting at the top of the “Unit 8200 Stack,” Palantir operationalizes the capabilities of the entire Israeli cyber-industrial complex, converting raw data from checkpoints, phones, and drones into kinetic lethal action. This architectural position renders the company integral to the continuity of military operations in Gaza and the maintenance of control in the West Bank.
End of Audit Report.
Works cited
- Palantir CEO Alex Karp calls firm ‘Anti-Woke,’ doubles down on support for ICE and Israel, accessed on December 17, 2025, https://m.economictimes.com/news/international/us/palantir-ceo-alex-karp-calls-firm-anti-woke-doubles-down-on-support-for-ice-and-israel/articleshow/125090704.cms
- Palantir CEO: Outspoken pro-Israel views led employees to leave the company – YouTube, accessed on December 17, 2025, https://www.youtube.com/watch?v=-q0pkVc-KOo
- Palantir Technologies Inc – AFSC Investigate, accessed on December 17, 2025, https://investigate.afsc.org/company/palantir
- Powerful statement from Palantir CEO in support of Israel – YouTube, accessed on December 17, 2025, https://www.youtube.com/watch?v=sLAm-7P1JFk
- Thiel’s Palantir, Israel Agree Strategic Partnership for Battle Tech, accessed on December 17, 2025, https://www.palantir.com/assets/xrfr7uokpv1b/3MuEeA8MLbLDAyxixTsiIe/9e4a11a7fb058554a8a1e3cd83e31c09/C134184_finaleprint.pdf
- Palantir supplying Israel with technology to help in war effort | Ctech, accessed on December 17, 2025, https://www.calcalistech.com/ctechnews/article/rymy7ret6
- Palantir Engineering Israel Ltd. – IVC Data & Insights, accessed on December 17, 2025, https://www.ivc-online.com/Google-Card?ID=7b3e0d34-6fde-e311-b941-80c16e7d3630&type=1
- In war with low-tech foe, startups could prevent costly failings – so why don’t they?, accessed on December 17, 2025, https://www.timesofisrael.com/in-war-with-low-tech-foe-startups-could-prevent-costly-failings-so-why-dont-they/
- Documents offer rare insight on Ice’s close relationship with Palantir – The Guardian, accessed on December 17, 2025, https://www.theguardian.com/us-news/ng-interactive/2025/sep/22/ice-palantir-data
- Verint Systems Inc. (VRNT) Business Profile – stockrow, accessed on December 17, 2025, https://stockrow.com/VRNT/business-profile
- Israel-linked CIA-funded Palantir goes public, making espionage mainstream – TRT World, accessed on December 17, 2025, https://www.trtworld.com/article/12752948
- State surveillance of citizens reaches far beyond Pegasus – Institute of Development Studies, accessed on December 17, 2025, https://www.ids.ac.uk/opinions/state-surveillance-of-citizens-reaches-far-beyond-pegasus/
- Remediating Palantir JWT leaks – GitGuardian, accessed on December 17, 2025, https://www.gitguardian.com/remediation/palantir-jwt
- Wiz and SentinelOne announce exclusive partnership to deliver end to end cloud security, accessed on December 17, 2025, https://www.wiz.io/blog/wiz-and-sentinelone-announce-exclusive-partnership-to-deliver-end-to-end-security
- Check Point Enters Next Level of Strategic Partnership with Wiz to Deliver Integrated CNAPP and Cloud Network Security Solution, accessed on December 17, 2025, https://www.checkpoint.com/press-releases/check-point-enters-next-level-of-strategic-partnership-with-wiz-to-deliver-integrated-cnapp-and-cloud-network-security-solution/
- Case Studies – eBPF – Introduction, Tutorials & Community Resources, accessed on December 17, 2025, https://ebpf.io/case-studies/
- Wiz Log Monitoring – Panther | A Cloud SIEM Platform for Modern Security Teams, accessed on December 17, 2025, https://panther.com/integrations/wiz
- Configure checkpoints – Palantir, accessed on December 17, 2025, https://palantir.com/docs/foundry/checkpoints/configure-checkpoints/
- Respecting human rights, when the products your company sells can be misused: illustrative examples, accessed on December 17, 2025, https://www.wearehumanlevel.com/content-hub/respecting-human-rights-when-the-products-your-company-sells-can-be-misused-illustrative-examples
- Apps & Integrations | DataWalk, accessed on December 17, 2025, https://datawalk.com/apps-and-integration/
- Offerings | Edge AI – Palantir, accessed on December 17, 2025, https://www.palantir.com/offerings/edge-ai/
- UN expert says global firms help Israel ‘profit from genocide’ in Gaza – Polskie Radio, accessed on December 17, 2025, https://www.polskieradio.pl/395/7785/artykul/3546845,un-expert-says-global-firms-help-israel-%E2%80%98profit-from-genocide%E2%80%99-in-gaza
- Global firms ‘profiting from genocide’ in Gaza, says UN rapporteur – The Guardian, accessed on December 17, 2025, https://www.theguardian.com/world/2025/jul/03/global-firms-profiting-israel-genocide-gaza-united-nations-rapporteur
- AI-powered surveillance firms are gunning for a share of Gaza spoils, accessed on December 17, 2025, https://www.972mag.com/ai-surveillance-gaza-palantir-dataminr/
- Israel used Palantir technology in its 2024 Lebanon pager attack, book claims, accessed on December 17, 2025, https://www.middleeasteye.net/news/israel-used-palantir-its-2024-lebanon-pager-attack
- Palantir’s AI Platforms Were Used in Lebanon’s Pager, Walkie Talkie Bombings, accessed on December 17, 2025, https://insidetelecom.com/palantir-tech-was-used-in-israels-operation-grim-beeper/
- L3Harris and Palantir Demonstrate Successful Integration of New AI/ML Capabilities, accessed on December 17, 2025, https://www.l3harris.com/newsroom/editorial/2024/10/l3harris-and-palantir-demonstrate-successful-integration-new-aiml
- Big tech and the architecture of the Israeli genocide against Palestinians: From execution to media whitewashing – Middle East Monitor, accessed on December 17, 2025, https://www.middleeastmonitor.com/20251215-big-tech-and-the-architecture-of-the-israeli-genocide-against-palestinians-from-execution-to-media-whitewashing/
- Big Tech’s Deep Links With Genocide in Gaza | NewsClick, accessed on December 17, 2025, https://www.newsclick.in/big-techs-deep-links-genocide-gaza
- Pro-Trump Tech Billionaires Are Poised to Cash In on Gaza’s ‘Peace’ Deal – Byline Times, accessed on December 17, 2025, https://bylinetimes.com/2025/10/16/pro-trump-tech-billionaires-poised-cash-in-gaza-peace-deal/
- Project Nimbus – Wikipedia, accessed on December 17, 2025, https://en.wikipedia.org/wiki/Project_Nimbus
- Palantir Integration Solutions | Data Platforms, accessed on December 17, 2025, https://www.palantir.com/platforms/foundry/integrations/data-platforms/
- Bombing plants, severing pipelines: Israel pushes Gaza water crisis to the brink, accessed on December 17, 2025, https://www.972mag.com/gaza-water-crisis-on-the-brink/
- How to stop Israel from starving Gaza – Al Jazeera, accessed on December 17, 2025, https://www.aljazeera.com/opinions/2025/9/4/how-to-stop-israel-from-starving-gaza
- “An economy of genocide”: UN Special Rapporteur names global corporations enabling Israel’s assault on Gaza – AOAV, accessed on December 17, 2025, https://aoav.org.uk/2025/an-economy-of-genocide-un-special-rapporteur-names-global-corporations-enabling-israels-assault-on-gaza/
- No Palantir in the NHS! Campaign Toolkit – Medact, accessed on December 17, 2025, https://www.medact.org/2024/resources/toolkits/no-palantir-in-the-nhs-campaign-toolkit/
- Palantir Selected for $90 million, 5-year HHS Contract Vehicle, accessed on December 17, 2025, https://investors.palantir.com/news-details/2022/Palantir-Selected-for-90-million-5-year-HHS-Contract-Vehicle/
- Palantir’s Military Role in Israel and Britain – Bella Caledonia, accessed on December 17, 2025, https://bellacaledonia.org.uk/2025/10/06/palantirs-military-role-in-israel-and-britain/
- Private Tech Companies, the State, and the New Character of War, accessed on December 17, 2025, https://carnegieendowment.org/research/2025/12/ukraine-war-tech-companies?lang=en
- Full article: Infrastructural entanglement and cloud hyperscalers in contemporary warfare: Insights from Ukraine, Israel and Taiwan – Taylor & Francis Online, accessed on December 17, 2025, https://www.tandfonline.com/doi/full/10.1080/13523260.2025.2593247