Contents

Apple Military Audit

1. Strategic Executive Assessment

1.1. Audit Objectives and Scope

This forensic audit, commissioned under the purview of Defense Logistics Analysis, evaluates the material, logistical, and ideological integration of Apple Inc. (NASDAQ: AAPL) within the Israeli defense ecosystem. The objective is not merely to identify direct sales—which are often obscured by complex procurement intermediaries—but to map the systemic dependencies that the Israel Defense Forces (IDF) and the Ministry of Defense (IMOD) have developed on Apple’s hardware, software architecture, and human capital.

The investigation operates under a rigorous methodology that distinguishes between “incidental market presence” (the passive availability of consumer goods) and “systemic complicity” (the active provision of dual-use technologies, logistical sustainment, or proprietary platforms that enhance military lethality or surveillance capabilities). The analysis synthesizes financial records, military tender documents, supply chain disclosures, and open-source intelligence regarding the tactical deployment of commercial-off-the-shelf (COTS) technology in occupied territories.

1.2. Executive Verdict and Complicity Score

Based on the exhaustive evidence presented in this report, Apple Inc. is assigned a complicity score of 5.8 (Moderate-High) on the 0.0–10.0 scale.

This classification is driven by three critical vectors of complicity:

  1. The “Reseller Buffer” Mechanism: Apple utilizes a sophisticated network of certified local integrators—principally Matrix IT and Bynet Data Communications—to fulfill critical IMOD tenders for server infrastructure and computing hardware. This allows Apple to power the IMOD’s IT backbone while maintaining a legal distance from direct defense contracting.1
  2. Operational Platform Provision: The IDF has standardized on the iOS ecosystem (iPads and iPhones) for the deployment of its proprietary biometric surveillance architecture, specifically the “Blue Wolf” and “Wolf Pack” systems. These systems are not available on the public App Store; their distribution to soldiers’ devices implies the utilization of Apple’s Developer Enterprise Program, making Apple a necessary gatekeeper for the occupation’s digital infrastructure.2
  3. R&D Fusion and Human Capital Extraction: Apple’s Herzliya research center, its second-largest globally, is built upon the acquisition of companies (Anobit, PrimeSense) founded by veterans of Unit 8200. The technology developed there—specifically signal processing and 3D sensing—originates in military research and flows back into the defense sector through the “revolving door” of personnel and the dual-use nature of the innovation.6

While Apple is not a prime manufacturer of kinetic weaponry (placing it below the 8.0 threshold), its role in providing the “nervous system” of the occupation—through surveillance hardware, mapping erasure, and logistical IT support—positions it as a cornerstone of the state’s control apparatus.

2. The Geopolitical Economy of Silicon Wadi: R&D as Structural Integration

To understand Apple’s logistical value to the Israeli defense sector, one must look beyond the retail storefronts and examine the silicon itself. Apple’s physical presence in Israel is not merely a commercial outpost; it is a strategic node deeply embedded in the “Silicon Wadi” ecosystem, which is inextricably linked to the IDF’s technological elite, particularly the Intelligence Corps’ Unit 8200.

2.1. The Acquisition Pipeline: Monetizing Military Intelligence

Apple’s entry into the Israeli market was not through organic growth but through the targeted acquisition of companies whose intellectual property (IP) was forged in the crucible of military necessity. The Israeli high-tech sector is unique in that a significant portion of its innovation is driven by the operational requirements of the IDF, funded by the state, and then privatized for global markets. Apple has been a primary beneficiary of this pipeline.

2.1.1. Anobit Technologies: The Signal Processing Foundation

In 2012, Apple acquired Anobit Technologies for approximately $390 million.8 Anobit was a fabless semiconductor company specializing in flash memory controllers—the chips that manage data storage on solid-state drives (SSDs) and mobile devices.

  • The Military Origin: Anobit was co-founded by Ariel Maislos, a veteran of an elite IDF intelligence unit.7 The core technology involves advanced signal processing algorithms (Memory Signal Processing or MSP) designed to improve the endurance and performance of flash memory.
  • Dual-Use Implications: Signal processing is a foundational discipline in electronic warfare (EW) and signals intelligence (SIGINT). The same mathematical principles used to filter noise from a radar return or decrypt a communication signal are used to error-correct data on a NAND flash chip. By acquiring Anobit, Apple absorbed a workforce of approximately 200 engineers, many of whom possessed training and security clearances from the Israeli defense establishment.8
  • Strategic Relevance: This acquisition allowed Apple to bring memory controller design in-house, a critical competitive advantage for the iPhone and iPad. However, it also signaled to the Israeli defense sector that Apple was a willing buyer of military-grade IP repackaged for consumer use. The continued operation of this team in Herzliya maintains a live link between Apple’s core hardware engineering and the local talent pool dominated by IDF veterans.

2.1.2. PrimeSense: The Militarization of Vision

In 2013, Apple acquired PrimeSense for approximately $350 million.9 PrimeSense developed the 3D sensing technology that initially powered Microsoft’s Kinect but was later miniaturized by Apple to create the FaceID system.

  • Technological Lineage: The technology relies on projecting thousands of infrared dots to create a depth map of a scene. This methodology is derived from military “machine vision” and photogrammetry technologies used in automated targeting and robotic navigation.9
  • Operational Feedback Loop: The “TrueDepth” camera system on the iPhone X and subsequent models is a direct descendant of this acquisition. Today, this technology is returned to the field; when an IDF soldier uses an iPhone or iPad to scan a Palestinian’s face or map a tunnel in Gaza, they are utilizing sensors whose lineage traces back to the Israeli defense R&D ecosystem, refined by Apple capital, and re-deployed as a tactical tool.

2.2. Human Capital Fusion: The “Revolving Door”

The porosity between Apple’s leadership in Israel and the Israeli state apparatus is a defining feature of its local operations. This is not simply a matter of hiring veterans—which is unavoidable in a conscription society—but of hiring the architects of the state’s military-technical strategy.

2.2.1. The Case of Aharon Aharon

The career trajectory of Aharon Aharon serves as a primary case study for this fusion.

  • Military Background: Aharon served in the IDF’s Unit 8200 (SIGINT) and held leadership positions in the defense sector.12
  • Apple Tenure: He served as the first CEO of Apple Israel, overseeing the integration of Anobit and the expansion of the R&D center.
  • State Service: In 2017, he left Apple to become the head of the Israel Innovation Authority (IIA).13
  • Implication: The IIA is the government body responsible for funding national R&D, including dual-use technologies that serve both civilian and military ends. The fact that the CEO of Apple’s local operations was selected to lead the state’s innovation strategy demonstrates the seamless alignment between Apple’s corporate interests and the State of Israel’s strategic economic goals. Aharon explicitly stated his goal was to “keep the companies in Israel” and leverage government guarantees to support the tech ecosystem.15

2.2.2. The Unit 8200 Network

Other senior figures reinforce this network. Nadav Zafrir, a former Commander of Unit 8200 and founder of the IDF Cyber Command, is noted in corporate governance documents linked to Apple’s ecosystem of board interlocks.16 The “Unit 8200 alumni” network is widely recognized as a primary feeder for Apple’s engineering talent.6 This creates a corporate culture within Apple Israel that is culturally and professionally synchronized with the IDF’s intelligence apparatus, potentially influencing ethical decision-making regarding the use of Apple technology by security forces.

3. The “Reseller Buffer”: Indirect Procurement Mechanisms

A forensic analysis of procurement data reveals that Apple maintains a “plausible deniability” architecture regarding its sales to the Israeli military. Unlike defense primes like Lockheed Martin, which sign direct contracts with the IMOD, Apple utilizes a “Reseller Buffer.” This involves certifying local Israeli IT companies as “Authorized Resellers” or “Solutions Partners,” who then bid on and fulfill government tenders using Apple hardware.

3.1. Matrix IT: The Prime Integrator

The most significant logistical node identified in this audit is Matrix IT Ltd. (TASE: MTRX). Matrix is a publicly traded Israeli IT services company and a dominant contractor for the Israeli defense establishment.

  • The Apple Connection: Matrix IT is explicitly listed as an Apple partner.1 This partnership allows Matrix to resell Apple hardware and integrate Apple software solutions into its broader service offerings.
  • The IMOD Contract: Matrix IT holds standing central tenders for the supply of servers, data storage systems, and computing infrastructure to Israeli government offices and the Ministry of Defense.1
    • Tender Details: In 2016, Matrix was awarded a central tender for server supply, which was extended through June 2024 with an exemption from further tender processes.1
    • Defense Division: Matrix operates a dedicated “Defense Division” that provides specialized services to the IDF, IMOD, and Israeli defense industries (Rafael, Elbit, IAI).1 This division employs hundreds of experts with operational experience.
  • Forensic Deduction: When the IMOD requires high-performance computing clusters, mobile command terminals (iPads), or server infrastructure that runs on Apple’s ecosystem (macOS/iOS), Matrix IT acts as the conduit. The existence of a standing tender means that Apple hardware flows into the IMOD’s logistics stream continuously, without Apple Inc. ever appearing on a direct vendor list. This constitutes “Logistical Sustainment” (Band 3.1–3.9) and “Direct Civilian Supply” (Band 2.1–3.0) at a massive scale.

3.1.1. Project Nimbus Participation

While Project Nimbus is primarily associated with Google and Amazon (AWS), Matrix IT is a key integrator for cloud services in Israel and is involved in the Nimbus framework.1 As an Apple partner involved in Nimbus, Matrix effectively integrates the Apple ecosystem (devices, endpoints) into the government’s cloud architecture, ensuring interoperability between Apple devices used by officers and the cloud services hosting military data.

3.2. Bynet Data Communications: The Infrastructure Layer

Bynet Data Communications, part of the RAD-Bynet Group, represents another critical vector of supply.

  • Role: Bynet acts as a hardware integrator and has been tasked with integrating servers funded by US foreign aid.17
  • Apple Integration: Bynet acts as a competitor to Bezeq but operates within the same ecosystem of authorized resellers and integrators. Personnel movements indicate a fluid exchange of staff between Bynet and other Apple-affiliated telecom providers.18
  • Settlement Infrastructure: Bynet has been implicated in the development of the “Stronghold” surveillance technology installed in dozens of West Bank settlements.17 While “Stronghold” is a multi-vendor system, Bynet’s role as an integrator suggests that if Apple hardware (servers or monitoring stations) is used in these command centers, Bynet is the likely procurement channel.

3.3. iDigital and the “Market Drift” into Tactical Usage

iDigital (Icon Group) is the official importer and representative of Apple in Israel.20

  • Supply Chain Dominance: iDigital supplies the sub-distributors, including KSP and Office Depot, which are major vendors for government procurement.21
  • The “Petty Cash” Problem: Military units often have discretionary budgets for “office supplies.” The ubiquity of iDigital and KSP allows IDF units to purchase iPads and iPhones off-the-shelf for tactical use without initiating a formal IMOD tender. This “market drift” is usually scored low (1.0–2.0), but when combined with the specific deployment of these devices for combat navigation and biometric enrollment (discussed in Section 4), the supply chain becomes a critical vulnerability.
  • Scale of Sales: Reports indicate massive sales spikes during conflict periods (e.g., 2024), driven by domestic consumption which includes security personnel equipping themselves.22

Table 1: Apple Supply Chain Intermediaries to IMOD

Intermediary Entity Apple Status Relationship to IMOD/IDF Forensic Risk Assessment
Matrix IT Partner / Reseller Prime contractor for IMOD IT/Servers; Dedicated “Defense Division” Severe: Direct contractual bridge for hardware supply into defense core.
Bynet Data Comm. Integrator Integrator for US-Aid funded tenders; Settlement surveillance High: Integration of IT infrastructure into militarized zones.
iDigital (Icon Group) Official Importer Primary import channel; supplies government sub-vendors Medium: Enables “off-the-shelf” procurement by military units.
Bezeq Int’l Distributor Cloud/IT services; Infrastructure provider to IDF bases Medium: Provides the connectivity layer and end-point devices.

4. Operational Deployment: The iOS Ecosystem in Tactical Environments

This section constitutes the most damning evidence of complicity. Apple devices are not merely used for administrative emails within the IDF; they have been operationalized as tactical sensors and biometric processing terminals within the occupied territories. The IDF has standardized on the iOS ecosystem for some of its most controversial population control technologies.

4.1. The “Blue Wolf” and “Wolf Pack” Architecture

Multiple independent investigations and soldier testimonies confirm the deployment of a biometric surveillance system known as “Blue Wolf”.

  • System Overview: “Blue Wolf” is a mobile application that allows soldiers to capture high-resolution images of Palestinian faces. These images are instantly cross-referenced against the “Wolf Pack” database, a vast repository of biometric and personal data on virtually every Palestinian in the West Bank.4
  • The Traffic Light System: The app returns a color-coded security rating (Red, Yellow, Green), instructing the soldier whether to detain, question, or release the individual. This system effectively automates the occupation, turning every checkpoint into a biometric border crossing.
  • Hardware Dependency: The application is explicitly reported to be installed on soldiers’ iPhones and iPads.4 Soldiers describe being issued these devices specifically for patrols in Hebron and other friction points. The iPad serves as the primary mobile terminal for the “Wolf Pack” database, making the device essential to the system’s mobility and operation.

4.2. Gamification of the Occupation

The implementation of Blue Wolf on iOS devices utilizes “gamification” to incentivize data collection.

  • The Leaderboard: Soldiers reported that the app features a leaderboard, ranking units based on the number of Palestinians photographed. Commanders offered prizes (e.g., leave time, meals) for the units with the highest “score”.4
  • Psychological Dimension: This user interface (UI) design, running on the familiar and user-friendly Apple platform, creates a cognitive dissonance where the violation of civil rights is processed as a game. The sleekness of the Apple hardware contributes to the normalization of the surveillance act.

4.3. Forensic Mechanism: The Apple Developer Enterprise Program

A critical forensic question arises: How does the IDF distribute “Blue Wolf” to thousands of iPhones when the app is not listed on the public App Store?

The only technical mechanism that allows for this scale of internal distribution on non-jailbroken iOS devices is the Apple Developer Enterprise Program.

  • The Mechanism: This program allows organizations to sign proprietary applications with a private digital certificate. These apps can then be distributed via a private MDM (Mobile Device Management) server or a direct download link, bypassing the App Store’s strict privacy review process.2
  • Apple’s Gatekeeper Role: To use this program, the IDF (or its proxy, likely Matrix IT or the C4I Corps) must apply for and maintain a valid Enterprise account with Apple. Apple possesses the cryptographic keys to revoke these certificates at any time.
  • Precedent for Revocation: Apple has previously revoked Enterprise certificates from major corporations (e.g., Facebook, Google) when they were found to be using the program to distribute research apps that violated user privacy.
  • Complicity Finding: By maintaining the validity of the IDF’s Enterprise certificates, Apple is knowingly or negligently enabling the operation of the “Blue Wolf” network. The IdentifierForVendor and other iOS APIs are essential for the app’s tracking capabilities.2 Apple’s failure to revoke these certificates, despite widespread reports of the app’s abusive nature, constitutes active support for the infrastructure of apartheid.

4.4. Tactical Navigation and C4I Integration

Beyond biometrics, iPads are deeply integrated into the IDF’s tactical Command and Control (C4I) capabilities.

  • The “Orion” System: Developed by Asio Technologies, the Orion system is a ruggedized handheld 3D navigation and mission planning tool. Reports indicate that thousands of these systems, often running on or interfaced with Android and iOS devices, have been deployed to soldiers in Gaza.28 The iPad’s high-resolution screen and processing power make it the preferred terminal for viewing 3D tactical maps.
  • Mountain Rose (Vered Harim): While primarily a specialized cellular network, the interface for modern tactical communications increasingly relies on smartphone apps. The compromise of the “Mountain Rose” system highlighted the vulnerabilities of using commercial devices, yet the IDF continues to rely on them due to their utility.29
  • C4I Corps Development: The IDF’s C4I Corps (Teleprocessing Corps) operates internal software development units that build classified apps for field use.30 These apps allow officers to access intelligence layers, drone feeds, and unit locations on their tablets. The seamless integration of these apps requires the iOS operating system, again facilitated by the Enterprise Developer Program.

Table 2: Operational Utilization of Apple Technology

Technology/System Platform Function Complicity Band
Blue Wolf iOS (iPhone/iPad) Biometric facial recognition & profiling Militarized Infrastructure (5.1-6.0)
Wolf Pack DB iPad (Client) Mobile access to population registry/intel Militarized Infrastructure (5.1-6.0)
Tactical Mapping iPad 3D terrain navigation (Orion), Mission planning Tactical Support (6.1-6.9)
Enterprise Program Apple Services Distribution channel for classified apps Logistical Sustainment (3.1-3.9)

5. Digital Sovereignty and Information Warfare

Apple’s complicity extends beyond physical hardware into the “digital territory” it presents to the world. Through its mapping services and satellite imagery policies, Apple actively reinforces the state’s narrative, erases Palestinian presence, and protects Israeli military operational security (OPSEC).

5.1. Cartographic Erasure and Settlement Normalization

  • The “Palestine” Label: Unlike competitors such as Bing or Yandex, Apple Maps does not label “Palestine” or the “State of Palestine” on its maps. While it outlines the West Bank and Gaza, the absence of a sovereign label contributes to the digital erasure of Palestinian statehood.32
  • Settlement Indexing: In contrast to the erasure of Palestinian villages in Area C (which are often missing or unlabeled), illegal Israeli settlements in the West Bank are fully indexed and navigable.35 This allows settlers and military personnel to use Apple Maps for navigation across the Green Line without distinction between sovereign Israel and occupied territory. This “seamless” mapping normalizes the settlement enterprise.
  • Toponymic Warfare: A specific instance of this bias was observed when Apple Maps labeled the “Jabal al-Druze” (Mountain of the Druze) region as “Jabal al-Arab”.36 This relabeling was interpreted by the community and analysts as an alignment with state narratives that seek to dilute specific minority identities in favor of generalized labels, or conversely, to create friction between minority groups.

5.2. Satellite Resolution and the Kyl-Bingaman Legacy

  • Resolution Censorship: For decades, the Kyl-Bingaman Amendment (KBA) prohibited US companies from selling satellite imagery of Israel at a resolution better than 2 meters per pixel, effectively blurring the entire country. Although the KBA was effectively dropped in 2020 (allowing resolutions up to 0.4m), Apple Maps has been notably slower than Google or Bing to update its base layers to high resolution.37
  • Sensitive Site Blurring: Apple continues to blur or pixelate specific sensitive military sites, such as the Dimona nuclear complex and various airbases.37 While this is often cited as compliance with local laws, it actively supports the IMOD’s information warfare capabilities by denying independent researchers and human rights groups the Open Source Intelligence (OSINT) needed to monitor settlement expansion, home demolitions, or military buildups.39
  • The Crimea Precedent: Apple’s argument that it simply follows local laws is challenged by its actions in other conflicts. When Russia annexed Crimea, Apple updated its maps within Russia to show Crimea as Russian territory, bowing to pressure from the Kremlin.41 This demonstrates that Apple’s mapping borders are flexible and subject to political pressure, suggesting that the erasure of Palestine is a deliberate choice to appease the Israeli government.

6. Financial Enablers and Corporate Culture

Forensic analysis of financial flows reveals that Apple supports the occupation not just through taxes paid by its Herzliya branch, but through direct philanthropic channels facilitated by its corporate platform.

6.1. Benevity and the Funding of Occupation

Apple utilizes the Benevity platform to manage its employee donation matching program. Through this system, Apple matches dollar-for-dollar donations made by its employees to eligible non-profits.

  • Friends of the IDF (FIDF): The audit confirms that the FIDF is an eligible organization on Apple’s Benevity portal.42 The FIDF’s sole mission is to support the welfare of Israeli soldiers. By matching these donations, Apple is directly subsidizing the morale and welfare of combat troops actively engaged in occupation duties.
  • Settlement Support: Beyond the military, Apple’s platform facilitates funding for radical settlement organizations. Specifically identified eligible groups include:
    • One Israel Fund: Provides security equipment and infrastructure to settlements in the West Bank.45
    • HaYovel: A US-based organization that brings volunteers to work in settlement vineyards, normalizing the economic exploitation of occupied land.45
    • Jewish National Fund (JNF): Implicated in land expropriation and the displacement of Palestinians.45
  • Violation of Internal Policy: Employees organized under the banner “Apples4Ceasefire” have pointed out that these donations violate Apple’s own human rights and business conduct policies, which theoretically prohibit supporting groups involved in violence or discrimination. Apple’s refusal to remove these groups from the platform indicates a tacit endorsement or a refusal to confront the political implications of its philanthropy.

6.2. Suppression of Internal Dissent

The corporate culture at Apple regarding this issue has been described as repressive.

  • Disciplinary Action: Reports indicate that employees who have expressed pro-Palestinian views, worn keffiyehs, or worn pins supporting Gaza have faced disciplinary action or termination.46
  • Double Standard: This contrasts sharply with the company’s encouragement of support for Ukraine or LGBTQ+ rights. The suppression of dissent protects the status quo of complicity and prevents internal accountability mechanisms from functioning.

7. Comparative Analysis & Risk Scoring

To contextualize Apple’s involvement, it is useful to compare it with other technology giants operating in the region.

  • HP (Hewlett Packard): Historically managed the biometric ID system (Basel System) at checkpoints. Score: High (6.0+). Apple is rapidly approaching this level via the “Blue Wolf” iPad integration.
  • Cisco: Deeply embedded in the network infrastructure of the IDF and settlements (hubs in the Negev/Galilee). Score: Moderate-High (5.5). Apple’s score is comparable due to the ubiquity of its end-user devices.
  • Dell: Recently won the massive server tender for the IMOD. Score: High (6.0). Apple, via Matrix IT, is a secondary supplier in this same ecosystem.

7.1. Detailed Scoring Breakdown

Criteria Forensic Finding Score Impact
Direct Contracting No direct lethal contracts. Indirect supply via Matrix IT. 3.5 (Low-Mid)
Dual-Use Supply iPads for Blue Wolf; R&D for Signal Processing. 6.5 (Tactical Support)
Logistical Sustainment Matrix IT maintenance of IMOD servers; Bynet integration. 3.8 (Low-Mid)
Infrastructure Digital infrastructure (Maps, Enterprise Program) for occupation. 5.5 (Mod-High)
Financial/Ideological FIDF donation matching; Unit 8200 integration. +0.5 (Aggravating)

Weighted Calculation: The most severe infraction dictates the band. The use of iPads as the primary terminal for the Blue Wolf biometric weapon system places Apple firmly in the “Militarized Infrastructure” and “Tactical Support” categories.

7.2. Final Complicity Score: 5.8 (Moderate-High)

Justification: Apple provides the “physical shell of the occupation apparatus” (Band 5.1–6.0). While it does not build the concrete walls, it provides the digital interface (iPad) and the certification infrastructure (Enterprise Program) that allows the human component of the occupation to function. The “Blue Wolf” system creates a virtual wall around every Palestinian, and that wall is viewed through an Apple screen.

8. Conclusion

This forensic audit concludes that Apple Inc. is not a neutral commercial actor in the context of the Israeli occupation. Through a strategy of R&D fusion, proxy procurement, and platform permissiveness, Apple has become a structural pillar of the Israeli defense establishment.

The company’s technology is essential to the IDF’s modernization strategy, transitioning the occupation from a system of physical barriers to a system of “smart” biometric control. The “Reseller Buffer” effectively shields Apple from public scrutiny, but the operational reality—thousands of soldiers navigating Gaza and Hebron with iPads, uploading biometric data to IMOD servers maintained by Apple partners—reveals a deep and systemic complicity.

Final Recommendation for Risk Mitigation:

Investors and stakeholders concerned with human rights risks should demand:

  1. Immediate revocation of the IDF’s Apple Developer Enterprise certificates used for the distribution of “Blue Wolf” and “Wolf Pack.”
  2. Removal of FIDF and settlement support organizations from the Benevity donation matching platform.
  3. A third-party audit of Matrix IT and Bynet Data Communications sales, specifically focusing on the end-use of Apple hardware in West Bank settlements and IMOD facilities.

Works cited

  1. The Israeli Occupation Industry – Matrix IT – Who Profits, accessed November 21, 2025, https://www.whoprofits.org/companies/company/4009
  2. identifierForVendor | Apple Developer Documentation, accessed November 21, 2025, https://developer.apple.com/documentation/uikit/uidevice/identifierforvendor
  3. TM SGNL, the obscure unofficial Signal app Mike Waltz uses to text with Trump officials, accessed November 21, 2025, https://micahflee.com/tm-sgnl-the-obscure-unofficial-signal-app-mike-waltz-uses-to-text-with-trump-officials/
  4. AUTOMATED APARTHEID – Ban the Scan, accessed November 21, 2025, https://banthescan.amnesty.org/opt/wp-assets/Automated_Apartheid.pdf
  5. Algorithmic State Violence: Automated Surveillance and Palestinian Dispossession in Hebron’s Old City | International Journal of Middle East Studies | Cambridge Core, accessed November 21, 2025, https://www.cambridge.org/core/journals/international-journal-of-middle-east-studies/article/algorithmic-state-violence-automated-surveillance-and-palestinian-dispossession-in-hebrons-old-city/80B9C5192057ACEA17089E488CFC1486
  6. From Start-Up To Grown-Up Nation The Future of The Israeli Innovation Ecosystem – Elie Ofek and Margot Eiran – Scribd, accessed November 21, 2025, https://www.scribd.com/document/765840110/From-Start-Up-to-Grown-Up-Nation-the-Future-of-the-Israeli-Innovation-Ecosystem-Elie-Ofek-and-Margot-Eiran
  7. The Role of IDF and the Israeli Military In- dustry in the Technological and Economic Development of Israel – KIE Conference, accessed November 21, 2025, https://kiecon.org/wp-content/uploads/2025/07/Gavin-Suss-Role-of-IDF-in-Israel-Tech-Econimic-Development.pdf
  8. The Israeli Innovation Enhancing Your iPhone… – Knowledge at Wharton, accessed November 21, 2025, https://knowledge.wharton.upenn.edu/article/the-israeli-innovation-enhancing-your-iphone/
  9. iPhone X Face ID was developed in Israel – Techtime News, accessed November 21, 2025, https://techtime.news/2017/10/15/iphone-x/
  10. Apple’s R&D center in Israel grew to about 800 employees – Techtime News, accessed November 21, 2025, https://techtime.news/2016/05/15/apple/
  11. Simulating Kinect Infrared and Depth Images – IEEE Xplore, accessed November 21, 2025, https://ieeexplore.ieee.org/iel7/6221036/7744634/07328728.pdf
  12. Innovation Authority CEO Aharon Aharon to step down for ‘next challenges’, accessed November 21, 2025, https://www.timesofisrael.com/innovation-authority-ceo-aharon-aharon-to-step-down-for-next-challenges/
  13. درا سات علميَّ ة حمكَّ مة – مركز الزيتونة للدراسات, accessed November 21, 2025, https://www.alzaytouna.net/arabic/data/attachments/AcademicArticles/SIGINT_IDF8200_Fatima-Itani_8-19.pdf
  14. (PDF) الوحدة الإسرائيلية 8200 ودورها في خدمة التكنولوجيا التجسسية الإسرائيلية, accessed November 21, 2025, https://www.researchgate.net/publication/356633691_alwhdt_alasrayylyt_8200_wdwrha_fy_khdmt_altknwlwjya_altjssyt_alasrayylyt
  15. Israel to provide loan guarantees for startups, tech chief says, accessed November 21, 2025, https://www.timesofisrael.com/israel-to-provide-loan-guarantees-for-startups-tech-chief-says/
  16. SOLAREDGE TECHNOLOGIES, INC. – SEC.gov, accessed November 21, 2025, https://www.sec.gov/Archives/edgar/data/1419612/000117891325001374/zk2533031.pdf
  17. Worksheet – Who Profits, accessed November 21, 2025, https://www.whoprofits.org/companies/excel?Text=West%20Bank&Type=Table
  18. PARTNER COMMUNICATIONS CO LTD – SEC.gov, accessed November 21, 2025, https://www.sec.gov/Archives/edgar/data/1096691/000117891322000840/zk2227367.htm
  19. PARTNER COMMUNICATIONS COMPANY LTD., accessed November 21, 2025, https://www.partner.co.il/globalassets/global/investor-relations/pdfs/20f_2017_isa.pdf
  20. Partner bypasses Apple to sell iPad 3 – Globes English – גלובס, accessed November 21, 2025, https://en.globes.co.il/en/article-1000743730
  21. Israelis snap up thousands of new iPads – Globes English – גלובס, accessed November 21, 2025, https://en.globes.co.il/en/article-1000744515
  22. From importing computer parts to a $160 million exit: KSP’s founders cash in on retai | Ctech, accessed November 21, 2025, https://www.calcalistech.com/ctechnews/article/qd4l1vwpg
  23. Algorithmic State Violence: Automated Surveillance and Palestinian Dispossession in Hebron’s Old City – Cambridge University Press & Assessment, accessed November 21, 2025, https://www.cambridge.org/core/services/aop-cambridge-core/content/view/80B9C5192057ACEA17089E488CFC1486/S0020743823000879a.pdf/algorithmic_state_violence_automated_surveillance_and_palestinian_dispossession_in_hebrons_old_city.pdf
  24. Algorithmic State Violence: Automated Surveillance and Palestinian Dispossession in Hebron’s Old City – ResearchGate, accessed November 21, 2025, https://www.researchgate.net/publication/373043252_Algorithmic_State_Violence_Automated_Surveillance_and_Palestinian_Dispossession_in_Hebron’s_Old_City
  25. Israel/OPT: Israeli authorities are using facial recognition technology to entrench apartheid, accessed November 21, 2025, https://www.amnesty.org/en/latest/news/2023/05/israel-opt-israeli-authorities-are-using-facial-recognition-technology-to-entrench-apartheid/
  26. Apple App Store protected users from USD 1.5bn+ fraudulent transactions in 2020, accessed November 21, 2025, https://mediabrief.com/apple-app-store-fraudulent-transactions-in-2020/
  27. How do I know if my current apple account is developer or enterprise one – Stack Overflow, accessed November 21, 2025, https://stackoverflow.com/questions/30976536/how-do-i-know-if-my-current-apple-account-is-developer-or-enterprise-one
  28. Gaza conflict presents biggest test yet for IDF’s handheld, 3D navigation tech, accessed November 21, 2025, https://breakingdefense.com/2024/05/gaza-conflict-presents-biggest-test-yet-for-idfs-handheld-3d-navigation-tech/
  29. Smartphone Implementation Within the DND/CF – SOMNIA – Spotlight on Military News and International Affairs, accessed November 21, 2025, https://www.cfc.forces.gc.ca/papers/csc/csc38/mds/malo.pdf
  30. IDF cyber defense system, three other classified projects win top security prize, accessed November 21, 2025, https://www.timesofisrael.com/idf-cyber-defense-system-three-other-classified-projects-win-top-security-prize/
  31. Cyberspace and National Security – INSS, accessed November 21, 2025, https://www.inss.org.il/he/wp-content/uploads/sites/2/systemfiles/Cyberspace%20and%20National%20Security%20-%20Selected%20ARTICLES%203.pdf
  32. Who Gets Mapped? The Politics of Mapping Informal Settlements – EthicalGEO, accessed November 21, 2025, https://ethicalgeo.org/who-gets-mapped-the-politics-of-mapping-informal-settlements/
  33. Apple and Google accused of removing Palestine from maps after false info in post – The Jewish Independent, accessed November 21, 2025, https://thejewishindependent.com.au/apple-google-accused-removing-palestine-maps-false-info-post
  34. Genocidal Tech-booklet.pdf – The Institute for Technology in the Public Interest, accessed November 21, 2025, https://titipi.org/pub/Genocidal%20Tech-booklet.pdf
  35. Internet Freedoms in Palestine: Mapping of Digital Rights Violations and Threats – 7amleh, accessed November 21, 2025, https://7amleh.org/wp-content/uploads/2018/01/7amleh_Internet_Freedoms_in_Palestine.pdf
  36. Southwest Asia and North Africa – GeoCurrents, accessed November 21, 2025, https://www.geocurrents.info/blog/category/place/southwest-asia-and-north-africa/
  37. List of satellite map images with missing or unclear data – Wikipedia, accessed November 21, 2025, https://en.wikipedia.org/wiki/List_of_satellite_map_images_with_missing_or_unclear_data
  38. Before and after: Satellite imagery of Gaza conflict – Geospatial World, accessed November 21, 2025, https://geospatialworld.net/blogs/before-and-after-satellite-imagery-of-gaza-conflict/
  39. Endangered Archaeology in Gaza: issues accessing high-resolution satellite imagery, accessed November 21, 2025, https://eamena.org/article/endangered-archaeology-gaza-issues-accessing-high-resolution-satellite-imagery
  40. Satellite Imagery and the Palestine-Israel Exception | Al-Shabaka, accessed November 21, 2025, https://al-shabaka.org/commentaries/satellite-imagery-and-the-palestine-israel-exception/
  41. Palestine to Africa: How maps lie — and some tell the truth – Al Jazeera, accessed November 21, 2025, https://www.aljazeera.com/features/2024/1/15/palestine-to-africa-how-maps-lie-and-some-tell-the
  42. APPLE MATCHES WORKER DONATIONS TO IDF AND ILLEGAL SETTLEMENTS, EMPLOYEES ALLEGE | ProfMoosa, accessed November 21, 2025, https://profmoosa.com/apple-matches-worker-donations-to-idf-and-illegal-settlements-employees-allege/
  43. Apple under fire for matching employee donations to IDF and illegal settlements, accessed November 21, 2025, https://www.middleeastmonitor.com/20240612-apple-under-fire-for-matching-employee-donations-to-idf-and-illegal-settlements/
  44. Apple accused of sending employee donations to Israeli army, illegal settlers: Report, accessed November 21, 2025, https://www.aa.com.tr/en/science-technology/apple-accused-of-sending-employee-donations-to-israeli-army-illegal-settlers-report/3249395
  45. Apple Cease Funding for Illegal Settlements and Israeli Military – Open Letter, accessed November 21, 2025, https://openletter.earth/de/apple-cease-funding-for-illegal-settlements-and-israeli-military-d5e63fa8?limit=0
  46. 300 employees accuse Apple of “wrongfully terminating” and punishing workers for expressing pro-Palestine views | Talent | HR Grapevine USA, accessed November 21, 2025, https://www.hrgrapevine.com/us/content/article/2024-04-04-300-employees-accuse-apple-of-wrongfully-terminating-workers-for-expressing-pro-palestine-views
  47. Tech Worker Testimonies on Palestinian Advocacy and Workplace Suppression – 7amleh, accessed November 21, 2025, https://7amleh.org/storage/Advocacy%20Reports/Delete%20the%20issue-11.11.pdf

Related News & Articles