This forensic audit was commissioned to rigorously evaluate the extent, nature, and operational impact of Cisco Systems’ involvement with the Israeli Ministry of Defense (IMOD), the Israel Defense Forces (IDF), and the broader security apparatus of the State of Israel. The primary objective is to determine the “Military Complicity” of the target entity by analyzing its leadership, ownership, operational footprint, and supply chain integration. The audit is designed to distinguish between the incidental commercial availability of generic goods and meaningful, material support that enhances the kinetic, logistical, or surveillance capabilities of the Israeli security forces.
The analysis is structured around four Core Intelligence Requirements (CIRs) established to guide the forensic investigation:
The forensic evidence gathered and analyzed in this report indicates that Cisco Systems does not merely occupy a position of “Incidental” or “Low” complicity. Rather, the entity functions as a foundational pillar of the Israeli military’s Command, Control, Communications, Computers, and Intelligence (C4I) architecture. The complicity is characterized by deep structural integration rather than transactional commodity sales. Cisco’s technology forms the “digital nervous system” of the IDF, enabling the centralization of intelligence data, the execution of Network Centric Warfare (NCW) at the tactical edge, and the logistical coordination of the home front during active combat operations.
Cisco’s involvement spans the entire spectrum of military operations, from the strategic level—where it serves as the primary architect of the IDF’s “David’s Citadel” underground data center—to the tactical level, where its embedded routers provide the essential connectivity for armored personnel carriers and main battle tanks. Furthermore, the company has demonstrated a willingness to engage in direct civil-military fusion through the development of bespoke software platforms like “Israel Rises” to support the IDF Home Front Command. Consequently, this audit places Cisco Systems in the High (Upper) band of the complicity scale. While not a manufacturer of lethal munitions itself, Cisco provides the essential infrastructure without which the lethal platforms of the IDF cannot operate effectively in a modern networked battlespace.
The relationship between Cisco Systems and the Israeli defense establishment is not defined by sporadic sales of office equipment but by massive, multi-year strategic tenders that have fundamentally reshaped the IDF’s technological capabilities. The forensic trail begins with the critical shift in procurement strategy that occurred in 2017, a pivotal moment that cemented Cisco’s role as the central nervous system of the Israeli military.
In January 2017, the Israeli Ministry of Defense (IMOD) concluded a massive tender process intended to modernize the entire server infrastructure of the IDF. For decades, Hewlett Packard (HP) and subsequently Hewlett Packard Enterprise (HPE) had been the dominant players in this domain. However, in a strategic move to upgrade its capabilities to handle the era of “Big Data” warfare, the IMOD selected Cisco Systems as the sole provider of servers for the Israeli military and other security forces.1
This contract was not a standard commercial transaction; it was a strategic partnership aimed at overhauling the military’s computing power. The initial value of the contract was estimated at a minimum of $250 million (approximately 1 billion NIS) over its initial term, with options for extension.1 This figure, while significant, understates the operational impact of the deal. By designating Cisco as the sole provider, the IDF effectively locked its operational continuity into the Cisco ecosystem, creating a dependency on Cisco’s proprietary Unified Computing System (UCS) architecture.
The financing mechanism for this tender further underscores its military nature. The procurement was paid for by the United States government through the Foreign Military Sales (FMS) program.1 The FMS program is a form of security assistance authorized by the U.S. Arms Export Control Act, allowing foreign governments to purchase U.S. defense articles and services. The utilization of FMS funds explicitly categorizes the Cisco hardware not as civilian commercial goods, but as “defense articles” necessary for the security of the recipient state. This financial routing confirms that the U.S. and Israeli governments view these servers as integral components of Israel’s military capabilities.
The primary operational deliverable of the 2017 tender was the establishment of the IDF’s largest ICT underground data center, known as “David’s Citadel” (Metzudat David). Located in a secure military base in the Naqab (Negev) region, this facility represents the physical manifestation of the IDF’s transition to a cloud-based, network-centric fighting force.1
Before the construction of David’s Citadel, IDF computing resources were often distributed across various corps and units, leading to data silos. The strategic vision behind the new data center was to centralize computing power to enable real-time data fusion. The facility, completed in 2020, reportedly possesses a storage capacity 10,000 times greater than standard computing centers and integrates data from over 300 different surveillance, intelligence, and combat units.4
The operational implications of this centralization are profound. In modern warfare, specifically the doctrine practiced by the IDF in Gaza and the West Bank, the “Kill Chain”—the process of identifying a target, verifying it, and assigning a weapon system to destroy it—relies heavily on the rapid synthesis of intelligence. Signals intelligence (SIGINT) from Unit 8200, visual intelligence (VISINT) from Unit 9900, and human intelligence (HUMINT) from the Shin Bet must be cross-referenced instantly. Cisco’s Unified Computing System serves as the hardware substrate for this fusion. It hosts the databases and AI-driven systems (such as “The Gospel” and “Lavender”) that generate target banks for airstrikes.1 Without the massive processing power and low-latency data transfer capabilities provided by the Cisco infrastructure at David’s Citadel, the industrial-scale target generation described in recent conflicts would be technologically impossible.
While reports indicate that Dell Technologies won a subsequent tender to replace Cisco as the main server provider in 2023, forensic examination of the IMOD procurement database reveals that the military’s reliance on Cisco has not ceased. On the contrary, the outbreak of the “Swords of Iron” war in October 2023 necessitated urgent procurement of trusted, legacy-compatible hardware to support the surge in operational tempo.
An analysis of the IMOD procurement database for the period between November 2023 and January 2024 reveals a cluster of eight distinct contracts for Cisco servers, valued at a total of nearly $2 million.1 These procurements were executed under tender exemptions (Ptor MiMichraz), a mechanism often used during wartime to bypass bureaucratic delays for essential supplies. The continued purchase of Cisco servers during active combat suggests a phenomenon known as “Vendor Lock-in.” The IDF’s most critical operational applications—likely built and optimized for the Cisco UCS architecture during the five-year “David’s Citadel” era—cannot be easily migrated to a new vendor’s hardware in the midst of a high-intensity conflict. Therefore, Cisco remains the de facto hardware backbone of the current military campaign, providing the stability and continuity required for ongoing operations.
While Cisco Systems (USA) is the manufacturer of the technology, the operational implementation on the ground is frequently managed through Israeli systems integrators, primarily Bynet Data Communications (part of the Rad-Bynet Group).2 This partnership structure is a critical element of the supply chain that requires detailed scrutiny.
Bynet serves as the “boots on the ground” for Cisco in Israel. They act as the prime integrator, physically installing the servers in bases, running the cabling, and providing ongoing maintenance and support.6 Bynet was identified as the key contractor for the implementation of the “David’s Citadel” project using Cisco hardware.1 This arrangement allows Cisco to maintain a degree of commercial separation, framing its sales as business-to-business (B2B) transactions with a local partner rather than direct business-to-government (B2G) military sales. However, the forensic evidence pierces this veil: the 2017 IMOD tender was explicitly for Cisco equipment 1, and Cisco Israel’s leadership has publicly celebrated these contracts as part of their “commitment to the State of Israel”.2 The relationship is symbiotic; Bynet’s status as a “Gold Partner” and its ability to win massive defense contracts are predicated on its exclusive access to Cisco’s superior technology stack.
The audit reveals that Cisco’s involvement extends far beyond the air-conditioned server rooms of the Ministry of Defense. Through the supply of “Embedded Services Routers” (ESR) and the licensing of its proprietary IOS (Internetwork Operating System) software to manufacturers of ruggedized military gear, Cisco technology has been physically integrated into the combat vehicles and tactical networks of the IDF. This section analyzes the “Tactical Edge” of Cisco’s complicity.
The Cisco ESR6300 Embedded Services Router is a critical component identified in this audit. Unlike the standard routers found in corporate offices, the ESR6300 is a “board-level” product—a stripped-down, high-performance circuit board designed specifically to be integrated into custom military enclosures.7 It is the engine of the tactical internet.
The technical specifications of the ESR6300 align perfectly with the requirements of the IDF’s “Digital Army Program” (Tzayad). The unit is optimized for SWaP (Size, Weight, and Power) constraints, allowing it to fit into the cramped electronics bays of tanks and drones. Crucially, it supports “Mobile Ready Net” technology, which allows for secure, ad-hoc networking between moving vehicles.9 In a combat scenario, where tanks, APCs, and drones are constantly maneuvering, maintaining a stable IP network is incredibly difficult. Cisco’s proprietary algorithms manage this complexity, allowing a platoon of tanks to share video feeds, target data, and blue-force tracking information seamlessly.
The marketing literature for the ESR6300 and its predecessor, the ESR5915, explicitly targets the defense sector, listing “military and aerospace,” “manned or unmanned vehicle,” and “sensor applications” as primary use cases.9 This confirms that the product is not a generic dual-use good that happens to be used by the military; it is a product designed for the military market.
Cisco does not typically manufacture the heavy metal boxes bolted onto the hull of a tank. Instead, it partners with specialized engineering firms that “package” its ESR boards for combat use. In the Israeli context, the key partners identified are Enercon Technologies and its U.S. subsidiary, Milpower Source.
Enercon Technologies manufactures the MILTECH series of networking products, which are ubiquitous in the Israeli defense ecosystem. The MILTECH 9012C and MILTECH 9020 are managed military-grade switches and routers designed to withstand the shock, vibration, and extreme temperatures of the battlefield.11 The technical datasheets for these products explicitly state that they feature “optional Cisco ESR” or “Cisco IOS XE management”.13
This “Cisco Inside” branding is significant. It means that the operational capability of the MILTECH router—its ability to secure data via NSA Suite B encryption, its ability to manage Quality of Service (QoS) for voice and video, and its interoperability with the rest of the IDF network—is derived entirely from Cisco’s technology. Enercon provides the shell; Cisco provides the brain. These units are explicitly marketed for deployment in “manned/autonomous vehicles, Avionics and UAVs” 12, creating a direct link between Cisco and the kinetic platforms of the IDF.
The forensic audit correlates the presence of these ruggedized Cisco systems with specific IDF platforms, confirming their role in the “Kill Chain.”
The Merkava Mk 4 main battle tank and the Namer armored personnel carrier are equipped with advanced C4I systems that enable them to operate as part of a networked force. The “Torch” (Tzayad) command and control system, developed by Elbit Systems, relies on a robust IP network to function. The presence of MILTECH routers (powered by Cisco) in these vehicles allows tank commanders to stream live video from their optics to headquarters or to receive real-time target updates from aerial drones.15 The integration of the Cisco ESR enables the high-throughput routing required for these data-intensive applications. In the context of the invasion of Gaza, this technology allows for tighter coordination between armor and infantry, increasing the lethality and tempo of operations.
The Eitan, the IDF’s newest wheeled APC produced by IMOD and Oshkosh Defense, features a highly digitized architecture. It is equipped with the “Iron Fist” active protection system and a peripheral camera array that provides 360-degree situational awareness.16 Processing the massive data flow from these sensors and distributing it to the crew’s displays requires a high-bandwidth, low-latency backbone. The network architecture supporting these requirements is consistent with the specifications of the Cisco ESR6300 series, which is marketed for exactly this type of “next-generation vehicle architecture”.9
The audit also suggests the presence of Cisco technology in the UAV sector. Research indicates the use of Cisco routers in the ground control stations and datalinks of systems like the IAI Heron.18 UAV operations are fundamentally data operations; the drone is a sensor that collects vast amounts of video and SIGINT that must be backhauled to intelligence centers. The “digital backbone” of rapid reaction units and drone squadrons often comprises “radios by Ericsson and routers by Cisco” 19, highlighting Cisco’s role in the intelligence collection pipeline.
Operational continuity during wartime requires more than just hardware; it requires software platforms that coordinate logistics, manpower, and civil resilience. The audit reveals that Cisco has demonstrated a willingness to develop such platforms specifically for the IDF Home Front Command, moving beyond the role of a vendor to that of a partner in the war effort.
In October 2023, in the immediate aftermath of the Hamas attacks and the commencement of the bombardment of Gaza, Cisco Israel engineers collaborated directly with the IDF Home Front Command (Pikud HaOref) to develop a digital platform titled “Israel Rises”.3
The platform was designed to facilitate cross-sector joint action, aggregating data from the Israeli army, government ministries, civil society organizations, and the private sector to coordinate logistics and support.20 While often framed in the media as “civil assistance,” the Home Front Command is a uniformed branch of the IDF responsible for civil defense and resilience during war. Its operations are integral to the nation’s ability to sustain a conflict. A platform that streamlines logistics, housing for evacuees, and supply distribution directly unburdens the military’s administrative load, allowing resources and attention to be focused on combat operations on the front lines.
Crucially, the development of “Israel Rises” was not an off-the-shelf purchase of existing software. The system was “developed with the support of Cisco to fit wartime needs”.20 This indicates active engineering collaboration and resource allocation by Cisco management to solve a specific operational problem for the Israeli military during an active conflict. This level of responsiveness and customization demonstrates a deep ideological and operational alignment with the IDF’s objectives.
Since 2020, Cisco has been deploying its Unified Communications System across the IDF.3 This system integrates voice, video, and data transfer between military units, creating a unified collaboration environment. It is explicitly described in reports as serving to “accelerate the Israeli military’s response timeframe”.4
With the mobilization of over 300,000 reservists in late 2023, the need for robust remote collaboration tools skyrocketed. In November 2023, Cisco sold Webex solutions to the Israeli military (via Bynet) to further enhance remote collaboration capabilities.3 Modern warfare is coordination-intensive; secure video conferencing allows command staff to orchestrate operations in Gaza from remote headquarters, conduct briefings with field commanders, and manage the complex logistics of a multi-front war. By providing the platform for this communication, Cisco enables the command and control (C2) resilience of the IDF.
Cisco’s alignment with the Israeli security apparatus is further evidenced by its internal Human Resources policies during the conflict. In October 2023, the company provided grants to its 800 employees in Israel. Notably, the largest grants were specifically designated for “reservists in the Israeli military”.4 While many companies supported their employees, the specific financial subsidization of those called up to active duty constitutes a form of direct material support for the IDF’s manpower mobilization. It ensures that reservists face no financial disincentive to serve, thereby supporting the military’s operational readiness.
The audit finds that Cisco’s technology is integral to the maintenance of the military occupation in the West Bank and East Jerusalem. The company facilitates both the physical surveillance of the Palestinian population and the economic entrenchment of illegal settlements through the provision of critical infrastructure.
Cisco is a key partner in the technological infrastructure of Jerusalem, specifically in the “Smart City” initiatives that underpin the Mabat 2000 (Mabat 2000) surveillance project.16 Mabat 2000 is a panoptic surveillance network covering the Old City of Jerusalem, involving hundreds of CCTV cameras, facial recognition integration, and command centers that monitor the movement of Palestinians 24/7.21
In 2017, Cisco signed a Memorandum of Understanding (MOU) with the Jerusalem Municipality to provide the communication infrastructure, servers, and “Kinetic for Cities” platform for this project.16 In the context of East Jerusalem—territory occupied under international law—the implementation of “Smart City” technology is not merely about municipal efficiency; it is a tool of control. The Cisco infrastructure provides the bandwidth and processing power required to ingest thousands of video feeds, run analytics, and allow Israeli police and security services to track individuals in real-time. By providing the “smart” backbone, Cisco enables the automation of the occupation in one of the most sensitive geopolitical flashpoints in the region.
Cisco has partnered with the Israeli government to establish “technological hubs” known as the Klika project. These hubs are government-subsidized co-working spaces designed to bring high-tech employment to peripheral areas. However, the audit confirms that a significant number of these hubs are located in illegal settlements in the occupied West Bank and Golan Heights.
As of September 2023, seven of the 36 operating Klika hubs equipped with Cisco technology are located in occupied territory 2:
These hubs are furnished with Cisco hardware, video conferencing systems, and networking gear. By equipping and branding these hubs, Cisco actively normalizes the settlement enterprise and provides the economic infrastructure necessary for their sustainability. The provision of high-tech jobs within settlements like Itamar and Kiryat Arba—known for their hardline ideological stance—incentivizes continued settlement expansion and integrates these illegal outposts into the mainstream Israeli economy. This activity directly contravenes the UN Guiding Principles on Business and Human Rights and international humanitarian law regarding the economic exploitation of occupied territories.
Cisco’s complicity extends to the internal security apparatus as well. Between 2020 and 2021, the Israel Police purchased over 4 million NIS worth of Cisco equipment, including “Nituv” (routing) systems.4 Furthermore, through integrators like Bynet, Cisco technology serves the Israel Prison Service (IPS). Bynet is recognized for providing services to Israeli prisons, including phone tapping and biometric systems.3 These systems rely on the underlying network infrastructure—often Cisco-based—to function, implicating Cisco in the surveillance and control of the Palestinian prisoner population.
Cisco’s complicity is deepened by its aggressive strategy of acquiring Israeli defense-adjacent startups and integrating their technology—and personnel—into its global portfolio. This creates a feedback loop where military technology developed by the IDF is commercialized by Cisco, and Cisco’s capital reinforces the Israeli defense-tech ecosystem.
Cisco has acquired at least 20 Israeli companies, many of which were founded by alumni of Unit 8200, the IDF’s elite signals intelligence unit.22 This unit is responsible for the interception of communications and cyber warfare. The skills and technologies developed there often have direct dual-use applications.
This acquisition strategy serves a dual purpose. First, it allows Cisco to internalize military-grade encryption, compression, and analytics technologies developed in the incubator of the Israeli military. Second, it acts as a massive capital injection into the Israeli defense-tech ecosystem, rewarding the commercialization of military research and encouraging the flow of talent between the IDF and the private sector.
Cisco is listed as a supplier in directories such as SIBAT (IMOD International Defense Cooperation Directorate).27 Its equipment is essential for the operations of Israel’s major defense contractors:
The forensic evidence presented in this audit enables a rigorous classification of Cisco Systems based on the defined bands of military complicity.
Cisco Systems defies a single, narrow classification due to the breadth of its involvement. It operates across multiple bands simultaneously:
Primary Classification: High (Upper)
Detailed Impact Description: Munitions Precursors & Sub-Systems (Digital).
While Cisco does not manufacture the warhead, it manufactures the digital nervous system that guides the warhead. The “David’s Citadel” data center and the tactical routing grid are the “essential electronic sub-systems” of the IDF’s kill chain. Furthermore, the development of the “Israel Rises” platform and the direct support for Home Front Command during the 2023-2024 Gaza war demonstrate an active, ideological commitment to the state’s military operations that transcends commercial neutrality.
| Area of Operations | Evidence | Complicity Level |
|---|---|---|
| Strategic Core | “David’s Citadel” Data Center; 2017 Tender; Continued IMOD Procurement via FMS. | High (Upper) |
| Tactical Edge | ESR6300 Router Cards; MILTECH Ruggedized Switches; Integration into Merkava/Namer. | High |
| Logistics | “Israel Rises” Platform; Unified Communications (Webex); Employee Reservist Grants. | Low-Mid |
| Occupation | “Smart City” Jerusalem (Surveillance); “Klika” Settlement Hubs. | Moderate-High |
| Supply Chain | Acquisitions of Unit 8200 startups; Integration with Bynet/Elbit. | Moderate |
Conclusion: Cisco Systems is a Tier-1 Enabler of the Israeli military apparatus. Its technology is not incidental; it is structural. The removal of Cisco technology would catastrophically degrade the IDF’s ability to conduct network-centric operations, manage its intelligence data lakes, and coordinate its logistical home front. Therefore, the entity is assessed as having High (Upper) military complicity.