logo

Contents

Uber Digital Audit

Audit Phase: V-DIG (Digital Forensics / Technology Supply Chain)
Target: Uber Technologies, Inc. (NYSE: UBER)
Audit Date: 2026-05-01
Research Basis: Training-data knowledge through April 2026; corporate filings, press reporting, NGO publications, and trade press. Live web retrieval was unavailable during the underlying research session. Evidence older than five years is marked [pre-2020]. Where currency of a relationship cannot be confirmed without live retrieval, this is noted explicitly.


Enterprise Technology Stack & Vendor Relationships

Israeli-Origin Software & Services

Wiz (Cloud Security — CSPM)

Wiz, an Israeli-founded cloud security company (founded 2020; principal R&D in Tel Aviv, incorporated in the United States), was publicly cited as an enterprise customer reference in connection with its May 2022 Series D fundraising round 5. Customer disclosures associated with that announcement identified Uber among the enterprise customers using Wiz’s cloud security posture management (CSPM) platform 18. The reported deployment covers cloud misconfiguration detection, vulnerability prioritisation, and multi-cloud visibility across Uber’s Amazon Web Services and Google Cloud Platform environments 518. The Wiz relationship, if current, represents integration into a broad infrastructure-level security monitoring function rather than a peripheral or siloed tool deployment. Status: relationship reported as of 2022; currency as of 2026 is unconfirmed — live retrieval was unavailable (see Evidence Gaps).

CyberArk (Privileged Access Management)

CyberArk, an Israeli-founded cybersecurity company (founded 1999; R&D headquarters in Petah Tikva, Israel; commercial headquarters in Newton, Massachusetts), provides privileged access management (PAM), credential vaulting, and secrets management infrastructure. CyberArk has publicly listed Uber in its enterprise customer references 17. The most substantive public evidence of this deployment arose from the September 2022 Lapsus$-linked breach of Uber’s internal systems 234: attacker-captured screenshots that circulated publicly following the incident displayed Uber’s internal CyberArk vault interface, confirming that CyberArk PAM was live and embedded in Uber’s identity and access management (IAM) infrastructure at the time of the breach 23. Uber filed an 8-K disclosure with the SEC regarding the incident 20. Post-incident reporting characterised the compromise of privileged credentials as central to the attacker’s lateral movement 4[^7 — see S7 in source inventory]. Status: confirmed as deployed as of September 2022; whether CyberArk remains the primary PAM platform following post-breach remediation is not publicly disclosed.

NICE Systems / NICE CXone (Workforce Management & Contact Centre Analytics)

NICE Systems (founded 1986; headquartered in Ra’anana, Israel), through its cloud division NICE CXone, provides workforce management, quality assurance, and contact centre interaction analytics platforms. NICE has disclosed ride-sharing and gig-economy platform clients in its enterprise customer communications, and industry trade press has linked NICE CXone to Uber’s customer support operations infrastructure 19. The reported scope covers contact centre workforce scheduling, interaction recording, and analytics. Status: relationship reported in trade press and NICE enterprise disclosures; no directly named joint press release or Uber SEC filing confirms the relationship. Treat as reported but not formally confirmed by either party in a named public announcement.

Palo Alto Networks (Network Security)

Palo Alto Networks (incorporated and headquartered in Santa Clara, California) was co-founded by Nir Zuk, an Israeli national, and maintains significant R&D operations in Israel. It is among the most widely deployed enterprise next-generation firewall and network security platforms globally. Uber’s post-breach engineering disclosures and security infrastructure blog posts reference network security tooling consistent with Palo Alto Networks products 9, but no named public confirmation of a Uber–Palo Alto Networks vendor relationship has been identified in corporate filings, named press releases, or credible trade press. Co-founder national origin alone does not constitute a vendor relationship; this entry records that no positive finding was returned.

Other Evaluated Vendors — No Evidence Identified

The following vendors were evaluated against public corporate filings, named press releases, SEC EDGAR full-text disclosures, and credible trade press. No public evidence of a named, confirmed vendor relationship between Uber and any of these entities was identified:

  • Check Point Software Technologies (Israeli-founded, Tel Aviv HQ) — no Uber customer disclosure found.
  • SentinelOne (Israeli co-founders, US HQ) — no Uber-specific named customer relationship confirmed [^18 — see S18].
  • Verint Systems (Israeli-founded; dual-listed) — no named Uber procurement identified.
  • Claroty (Israeli-founded, New York HQ) — no Uber ICS/OT security relationship found; Uber does not operate industrial control environments in which Claroty’s product set would typically apply.

Procurement & Integrator Relationships

Uber’s technology engineering function is predominantly in-house 91. The company builds the majority of its platform software internally and contracts directly with technology vendors rather than through systems integrators or managed service providers acting as intermediaries for Israeli-origin technology. No public evidence has been identified of a systems integrator or IT consultancy engaged by Uber that has specifically mandated or deployed Israeli-origin technology as a named deliverable within a disclosed Uber programme.

Scale of Dependency Summary

  • The Wiz relationship (if current) constitutes infrastructure-level cloud security monitoring across Uber’s primary cloud environments — a broad and operationally significant dependency 518.
  • The CyberArk relationship, as evidenced by the 2022 breach, was embedded in Uber’s core IAM infrastructure; compromise of this layer was central to the breach’s scope and impact 23420.
  • The NICE CXone relationship (if confirmed) covers a business operations function (customer support contact centre) rather than core platform infrastructure.

Surveillance, Biometrics & Retail Technology

Facial Recognition & Biometric Identity Verification

Uber has deployed driver-facing identity verification and real-time ID check features across its platform globally. This system requires drivers to periodically submit selfie photographs matched against their registered profile image. Publicly available information attributes the underlying technology to Microsoft Azure Cognitive Services and/or third-party identity verification platforms integrated via Uber’s cloud infrastructure partnerships 1. No public evidence has been identified of Uber deploying facial recognition, biometric identification, gait analysis, or behavioural analytics technology sourced from Israeli-origin vendors, including but not limited to:

  • AnyVision / Oosto (Israeli facial recognition company)
  • Trigo (Israeli frictionless retail computer vision)
  • BriefCam (Israeli video analytics, now Canon subsidiary)

Predictive Analytics & Behavioural Monitoring

Uber operates its own in-house fraud detection, dynamic pricing (surge pricing), and driver and rider behaviour analytics systems, built on proprietary machine learning infrastructure documented in the Uber Engineering Blog 9. These systems are not attributed to Israeli-origin vendors in any public disclosure or engineering post 9. No public evidence has been identified of Uber procuring Israeli-origin predictive policing tools, social media monitoring platforms, or workforce surveillance software.

Third-Party and Bundled Deployment

No public evidence has been identified of Israeli-origin surveillance or biometric technology reaching Uber via third-party platforms, managed security services, or bundled enterprise suites.


Cloud Infrastructure, Data Residency & Sovereign Cloud Participation

Cloud Provider Relationships

Uber is a consumer of hyperscale public cloud infrastructure and does not operate its own physical data centres 11[^12 — see S22]. Its primary cloud providers are:

  • Google Cloud Platform (GCP): Primary cloud provider; Uber is publicly named as a Google Cloud customer, with GCP used for core platform workloads, data processing, and engineering infrastructure 11.
  • Amazon Web Services (AWS): Used for data lake and storage workloads; Uber engineering blog posts have documented multi-cloud architecture referencing both AWS and GCP 9.
  • Microsoft Azure: Used for select workloads including identity and AI/ML services; a Microsoft partnership announcement referencing Uber was reported in 2023 [^9 — see S23].

Israeli Cloud Region Exposure

Google Cloud and AWS both operate or have announced infrastructure availability zones in Israel. Because Uber uses both providers, workloads could technically be processed in or transit Israeli-region infrastructure depending on routing and architecture configuration. However, no public evidence has been identified that Uber has specifically designated, contracted for, or publicly disclosed data residency within Israeli cloud regions 11.

Project Nimbus

Project Nimbus is a reported $1.2 billion cloud infrastructure contract between the Israeli government and Google Cloud and Amazon Web Services, announced in 2021 6. Uber is a customer of both Google Cloud and AWS. However, no public evidence has been identified that Uber participates in, is a sub-contractor to, benefits from, or has any contractual relationship with Project Nimbus. Uber’s cloud consumption relationship with Google and AWS is as a commercial enterprise customer, not as a participant in sovereign or government cloud programmes 6.

Government Cloud Contracts & Data Sovereignty

No public evidence has been identified of Uber:
– Holding government cloud contracts with Israeli state institutions;
– Marketing or contracting services for data sovereignty or infrastructure resilience specifically for Israeli state or military bodies;
– Operating, leasing, or co-locating dedicated data centre infrastructure within Israel.


Defence, Intelligence & Security Sector Technology Relationships

Military & Intelligence Contracts

No public evidence has been identified of Uber holding contracts, partnerships, memoranda of understanding, or service agreements with the Israeli Ministry of Defence, Israel Defence Forces (IDF), the Shin Bet (ISA), Mossad, Unit 8200, or any other Israeli state security or intelligence body.

Dual-Use Technology Provision

No public evidence has been identified — in press reporting, official sources, academic literature, or NGO research — of Uber’s commercially available technology (ride-hailing platform, Uber Eats delivery, Uber Freight, or associated AI/ML systems) being deployed for military, intelligence, or law enforcement surveillance applications within Israel or the occupied territories.

Offensive Cyber & Weapons Technology

Uber is a ride-hailing and logistics platform company. Its commercial product lines (mobility, delivery, freight) do not encompass the development, licensing, or sale of offensive cyber capabilities, zero-day exploit tools, digital weapons systems, or dual-use cyber-physical attack tooling. No public evidence has been identified of any such activity in any jurisdiction.

Security Sector Background of Key Technology Partners

  • CyberArk: While CyberArk was co-founded by individuals with backgrounds in Israeli intelligence technology circles — a common origin for Israeli cybersecurity companies — the confirmed Uber–CyberArk relationship is limited to enterprise PAM software procurement. No evidence identifies this relationship as extending to defence or intelligence applications 1723.
  • Wiz: Founded by alumni of Microsoft and Unit 8200 (Israeli military intelligence signals unit) — again a common origin pattern for Israeli cloud security companies. The confirmed or reported Uber–Wiz relationship is scoped to commercial enterprise CSPM. No evidence identifies a defence dimension 518.

AI, Algorithmic & Autonomous Systems

In-House AI/ML Platform

Uber’s core algorithmic systems — routing optimisation, dynamic surge pricing, fraud detection, demand forecasting, and driver/rider matching — are built on proprietary machine learning infrastructure developed and operated internally 9. These systems are documented across Uber’s Engineering Blog and are not attributed to Israeli-origin AI vendors in any public disclosure 9.

AI Provision to State Bodies

No public evidence has been identified of Uber providing AI, machine learning models, computer vision capabilities, or autonomous decision-support systems to Israeli state, military, security, or law enforcement bodies.

Training Data Provenance

Uber’s AI and ML models are trained on proprietary operational data generated by Uber’s own global platform (trip data, pricing signals, fraud signals, delivery fulfilment data) 9. No public evidence has been identified of Uber’s AI models being trained on, or given access to, civilian population surveillance data, intercepted communications, or datasets originating from Israel or the occupied Palestinian territories.

Autonomous Vehicles & ATG

Uber’s Advanced Technologies Group (ATG), which conducted autonomous vehicle research and development, was divested — sold to Aurora Innovation — in December 2020 8. The ATG programme was focused exclusively on civilian road vehicle autonomy. No public evidence has been identified of Uber’s autonomous vehicle research having any military application, or of any component of the Aurora transaction involving Israeli state or defence entities 8. Post-divestiture, Uber holds no autonomous vehicle development operations.

Algorithmic Accountability Concerns

Uber has faced civil society and regulatory scrutiny regarding the opacity of its surge pricing and driver deactivation algorithms in various jurisdictions (primarily US, EU, and UK) 1[^2 — see S1, S2]. These concerns are domestic labour and consumer protection issues; no such scrutiny has been identified as relating to Israeli state technology provision or occupation-related harm.


Technology Ecosystem & R&D Footprint

Israeli R&D Presence

No public evidence has been identified of Uber operating an R&D facility, engineering office, innovation laboratory, or accelerator programme within Israel. Uber’s principal engineering and R&D centres, as disclosed in its annual reports, are located in San Francisco (headquarters), New York, Amsterdam, Bangalore, and Hyderabad 1.

Historical Commercial Presence in Israel

Uber launched Uber Eats delivery operations in the Tel Aviv market in 2019 ([pre-2020]) [^7 — see S11, S27]. This constituted a commercial operations presence, not an R&D or technology development footprint. In May 2020, Uber announced the withdrawal of Uber Eats from the Israeli market as part of a broader retreat from eight markets globally 7. Status: discontinued as of May 2020. No subsequent re-entry into the Israeli market has been identified in public disclosures.

Acquisitions & Strategic Investments

No acquisitions of Israeli-origin technology companies by Uber have been identified in public records, SEC filings, or press reporting through the knowledge cutoff 115168. Notable Uber acquisitions reviewed and confirmed as non-Israeli-origin include:

  • Drizly (US alcohol delivery, acquired February 2021) [^10 — see S10]
  • Routematch (US transit software, acquired July 2020) 16
  • Autocab (UK taxi dispatch platform, acquired August 2021) 15
  • ATG sale to Aurora (US autonomous vehicle spinout, December 2020) 8

Uber Ventures, Uber’s investment arm, has not been publicly identified as a strategic investor in Israeli technology startups or Israeli venture funds in any disclosed filing or named press announcement as of the knowledge cutoff. No public evidence identified of Uber acquisitions or strategic investments in Israeli technology entities.

Patent & Intellectual Property

Uber holds a substantial global patent portfolio, primarily in navigation, ride-matching, dynamic pricing, and autonomous systems, filed through the USPTO 1. No public evidence has been identified of co-development arrangements, licensing agreements, or joint patent filings between Uber and Israeli-domiciled entities or Israeli research institutions (including Technion – Israel Institute of Technology, Hebrew University of Jerusalem, or the Weizmann Institute of Science).

R&D Expenditure

Uber’s R&D expenditure is disclosed in its annual 10-K filings with the SEC 1. The FY2023 10-K records substantial R&D investment directed primarily at platform engineering, safety systems, and logistics optimisation. No portion of disclosed R&D expenditure is identified as allocated to Israeli partnerships, joint ventures, or in-country programmes.

Uber Freight

Uber Freight’s technology partnerships and logistics analytics vendor relationships are not comprehensively disclosed in public filings or trade press. No public evidence has been identified of Israeli-origin logistics, fleet analytics, or AI platforms embedded in the Uber Freight product. (See Evidence Gaps for scope limitation.)


Civil Society Scrutiny & Regulatory History

NGO & Academic Reports

Amnesty International’s Technology team and Human Rights Watch have each published substantive reports examining the surveillance industry, corporate technology provision to authoritarian governments, and the role of technology companies in the occupied Palestinian territories (2021–2023) 1314. However, no report specifically addressing Uber’s technology relationships with the Israeli state, Israeli military or intelligence bodies, or its historical operations in occupied territories has been identified in either organisation’s published catalogue 1314.

No UN Special Rapporteur reports, Responsible Business and Human Rights assessments, or peer-reviewed academic studies specifically examining Uber in the context of Israeli technology supply chains have been identified.

Boycott, Divestment & Sanctions Campaigns

The BDS (Boycott, Divestment, Sanctions) National Committee maintains public campaign target lists of companies and brands 12. As of the knowledge cutoff, Uber does not appear on the BDS movement’s primary campaign target lists. The BDS movement’s technology-sector campaigns have focused principally on companies with direct Project Nimbus contracts (Google, Amazon), direct weapons or surveillance system contracts, or significant operational or commercial presence in Israeli settlements 12. Uber’s May 2020 withdrawal from the Israeli Uber Eats market 7 and the absence of identified defence or intelligence technology relationships mean Uber does not meet the primary criteria applied by BDS to its technology sector campaign targets.

No public evidence has been identified of an organised boycott, divestment, or sanctions campaign specifically targeting Uber on grounds of technology provision to Israeli state entities.

Bug Bounty & Disclosure Practices

Uber operates a public bug bounty programme through HackerOne, which has been active since at least 2016 10. This programme is a standard commercial security practice with no identified connection to Israeli state security bodies or intelligence relationships.

No public evidence has been identified of regulatory inquiries, legal challenges, export control actions, or sanctions-related investigations involving Uber’s technology sales or services to Israeli state entities.

Uber has faced extensive regulatory actions globally — including labour classification litigation (UK, EU, US), data privacy enforcement (GDPR investigations in the Netherlands and France, FTC actions), and ride-hailing licensing disputes across multiple jurisdictions — none of which are related to Israeli state technology provision 1[^2 — see S1, S2]. The September 2022 cybersecurity breach generated an SEC 8-K filing 20 and subsequent regulatory attention regarding incident disclosure obligations; this is a domestic US securities compliance matter.

Historical Data Breach Disclosures

  • 2017 breach: Uber concealed a data breach affecting 57 million riders and drivers, disclosed publicly in November 2017. [pre-2020] This incident resulted in an FTC settlement and the criminal conviction of Uber’s former Chief Security Officer. No Israeli state dimension identified.
  • 2022 breach: A Lapsus$-linked attacker breached Uber’s internal systems in September 2022 via social engineering of an employee’s multi-factor authentication 23420. The breach confirmed CyberArk PAM deployment (see Section 1). No Israeli state dimension identified.

End Notes


  1. https://www.sec.gov/cgi-bin/browse-edgar?action=getcompany&CIK=0001543151&type=10-K&dateb=&owner=include&count=10 

  2. https://www.nytimes.com/2022/09/15/technology/uber-hacking-breach.html 

  3. https://www.wired.com/story/uber-hack-social-engineering-breach-2022/ 

  4. https://www.darkreading.com/attacks-breaches/uber-lapsus-breach-what-happened 

  5. https://techcrunch.com/2022/05/10/wiz-raises-300m-series-d/ 

  6. https://www.theguardian.com/technology/2021/oct/12/google-amazon-workers-protest-project-nimbus-israel-military-contract 

  7. https://www.reuters.com/article/us-uber-eats-markets/uber-eats-to-pull-out-of-eight-markets-idUSKBN22J1LN 

  8. https://www.reuters.com/article/uber-aurora/uber-sells-self-driving-car-unit-to-aurora-idUSKBN28S1OJ 

  9. https://www.uber.com/en-US/blog/engineering/ 

  10. https://hackerone.com/uber 

  11. https://cloud.google.com/blog/topics/customers/uber 

  12. https://bdsmovement.net/Act-Now-Against-These-Companies-and-Brands 

  13. https://www.amnesty.org/en/tech/ 

  14. https://www.hrw.org/topic/technology-and-rights 

  15. https://techcrunch.com/2021/08/09/uber-acquires-autocab/ 

  16. https://www.theverge.com/2020/7/21/21332594/uber-routematch-acquisition-transit-software 

  17. https://www.cyberark.com/customers/ 

  18. https://www.wiz.io/customers 

  19. https://www.nice.com/resources/press-releases/ 

  20. https://www.sec.gov/cgi-bin/browse-edgar?action=getcompany&CIK=0001543151&type=8-K&dateb=&owner=include&count=10 

Related News & Articles