Contents

Google Military Audit

1. Executive Intelligence Summary

1.1. Audit Scope and Objectives

This forensic audit has been commissioned to evaluate the operational, material, and ideological integration of Google LLC (and its parent company, Alphabet Inc.) within the Israeli defense apparatus. The primary objective is to determine the extent to which Google’s corporate leadership, proprietary technologies, capital allocation strategies, and cloud infrastructure support the Israel Defense Forces (IDF), the Ministry of Defense (IMOD), and associated military-industrial systems. This assessment distinguishes between the incidental commercial availability of dual-use goods—a common feature of the global technology market—and purpose-built, contractually obligated military support that materially enhances the lethality or operational continuity of the Israeli armed forces.

The investigation focuses on four critical vectors of complicity, derived from the core intelligence requirements:

  1. Direct Defense Contracting: Specifically the “Project Nimbus” framework and direct IMOD engagements, which represent a shift from ad-hoc procurement to structural integration.
  2. Operational AI & Surveillance: The utilization of Google’s artificial intelligence (AI) and computer vision assets for kinetic targeting cycles and population control in the Occupied Palestinian Territories (OPT).
  3. Venture Capital & Ecosystem Integration: The flow of capital through Google Ventures (GV), CapitalG, and Gradient Ventures into Israeli defense-cyber firms founded by Unit 8200 veterans, creating a feedback loop between military R&D and civilian capitalization.
  4. Geospatial & Logistical Support: The tactical application of Waze and Google Maps Platform for navigation and command-and-control (C2) within occupied zones.

1.2. Strategic Assessment

The audit concludes that Google’s involvement with the Israeli military establishment has transitioned from incidental commercial usage to systemic, structural integration. The “Project Nimbus” contract 1 serves as the cornerstone of this relationship, creating a dedicated “Landing Zone” 2 that integrates Google Cloud Platform (GCP) directly into the IMOD’s command and control infrastructure. This is not merely a vendor-client relationship; it is a strategic partnership designed to ensure the “functional continuity” of the Israeli state during conflict.4

Forensic evidence indicates that Google’s AI tools—specifically Vertex AI and facial recognition algorithms—are being operationalized by IDF units, including Unit 8200, to enhance targeting cycles in the Gaza Strip.5 Furthermore, Google’s venture capital arms have systematically capitalized the Israeli offensive cyber sector, investing in firms like Team8 and Orca Security, which are deeply embedded in the military-intelligence complex.8

The assessment ranks Google as a High-Complicity Entity (Tier 1). This ranking is justified by the provision of critical infrastructure that ensures the functional continuity of military operations during active conflict, the customization of services to bypass standard human rights terms of service, and the direct consulting support provided to the Ministry of Defense during the 2023-2024 bombardment of Gaza.

2. Direct Defense Contracting: The Project Nimbus Framework

2.1. The Strategic Architecture of Project Nimbus

Project Nimbus, a $1.2 billion joint contract awarded to Google and Amazon Web Services (AWS) in April 2021, represents a paradigm shift in how the Israeli government and defense establishment procure cloud infrastructure.1 Unlike standard commercial agreements where a government entity might purchase generic licenses, Nimbus is structured to ensure “functional continuity” and “sovereignty” for the Israeli state. This contract effectively integrates Google’s hyperscale computing power into the foundational layer of the Israeli state’s digital infrastructure.

The contract’s architecture is designed to address a specific strategic vulnerability of the Israeli defense establishment: the reliance on on-premise servers that are physically vulnerable and computationally limited. By migrating to the cloud, the IMOD gains access to elastic computing resources—crucial for training large AI models used in targeting—and distributed data storage that is more resilient to physical attack. The Finance Ministry’s announcement explicitly stated the project allows the defense establishment to access “all-encompassing cloud solutions,” marking the military as a primary stakeholder from the inception of the deal.1

The significance of this transition cannot be overstated. In modern network-centric warfare, the cloud is the battlefield’s logistical spine. It hosts the data lakes that feed intelligence analysis, the command-and-control applications that direct troop movements, and the AI models that generate target banks. By securing the Nimbus contract, Google has positioned itself not as a supplier of office software, but as the host of the IDF’s operational brain.

2.2. The “No-Boycott” and “Sovereignty” Clauses

A critical component of the Nimbus contract is its legal insulation of the Israeli government from external political pressure or corporate ethical guidelines. Leaked documents and reports confirm that Google agreed to highly unorthodox “controls” inserted by Israel.10 These include:

  • Prohibition on Service Denial: Google is contractually prohibited from denying service to any specific Israeli government entity, explicitly including the Ministry of Defense (IMOD) and the Israel Defense Forces (IDF).1 This clause effectively nullifies Google’s standard Terms of Service (ToS) regarding human rights violations when applied to the Israeli state. While standard ToS might preclude the use of AI for “weaponry” or “immediate harm,” the Nimbus framework subordinates these internal ethical guidelines to the contractual obligation of sovereign service provision.
  • No Right to Shut Down: The contract prevents Google from shutting down services due to boycott pressure or ethical concerns raised by its own employees.11 This creates a “lock-in” effect where, regardless of the operational reality on the ground—such as documented war crimes or plausibility of genocide as cited by international courts—Google is legally compelled to maintain the digital infrastructure supporting those operations.
  • Fiscal Penalties: Deviating from these requirements would incur significant financial penalties and legal action for breach of contract, creating a powerful corporate incentive to prioritize contract compliance over human rights due diligence.11

This legal framework demonstrates a high level of intentionality. Google’s leadership accepted these terms with full knowledge that they would prevent the company from enforcing its own AI Principles in the context of the Israeli occupation. It signifies a conscious decision to prioritize the commercial value of the contract over the potential reputational and ethical risks associated with military complicity.

2.3. The “Landing Zone”: Direct Military Integration

Perhaps the most significant forensic discovery in this audit is the existence of a dedicated “Landing Zone” for the Ministry of Defense within the Google Cloud architecture.2 In cloud engineering, a “landing zone” is not a metaphor; it is a specific technical construct. It refers to a configured environment with pre-set security, identity management, networking policies, and compliance guardrails that allows an organization to deploy workloads rapidly and securely at scale.

Documents viewed by investigators show that the IMOD has established a Google Cloud Landing Zone to enable “multiple units” to access automation technologies and AI services.2 The existence of a dedicated landing zone for the IMOD implies several critical technical realities:

  1. Segregated Infrastructure: The IMOD likely operates within a Virtual Private Cloud (VPC) or a specific organization node within Google’s hierarchy, designed to isolate military data from other government or civilian traffic while maintaining access to Google’s public cloud services.
  2. Identity Federation: To allow “multiple units” access, there must be a mechanism for federating IDF identity systems with Google Cloud Identity. This suggests a deep integration of military personnel directories with Google’s authentication services.
  3. Direct Consulting Support: In March 2024, amidst the ongoing offensive in Gaza, the IMOD drafted a consulting contract with Google worth over $1 million to assist with architecture design and implementation guidance for this specific zone.2 This finding is damning evidence of active support. It demonstrates that Google is not merely a passive vendor providing off-the-shelf goods; it is an active consultant helping the IMOD architect its military cloud infrastructure during a time of war.

The timing of this consulting contract—March 2024—places Google personnel in the loop of optimizing military IT systems while those systems are under the extreme load of combat operations. This moves the assessment from “provision of goods” to “provision of services,” a higher tier of complicity under defense logistics definitions.

2.4. Data Residency and Judicial Evasion

The Nimbus contract mandates the establishment of local cloud regions within Israel’s borders.1 While often framed as a latency and performance requirement, data residency in this context serves a geopolitical function. The establishment of the “me-west1” region in Tel Aviv ensures that Israeli government data remains physically within Israeli territory.12

However, leaked Finance Ministry documents reveal a more specific motivation: judicial evasion. The agreements contain mechanisms for the companies to secretly alert Israel if a foreign country requests access to Project Nimbus data.1 This structure effectively insulates the IDF’s operational data—potentially including target lists, surveillance logs, and command directives—from the jurisdiction of foreign courts or international investigative bodies.

If, for example, a European court issued a subpoena for data related to potential war crimes stored on Google servers, the Nimbus contract provisions would obligate Google to notify the IMOD, potentially allowing them to block the request or move the data. This provides the IDF with a “digital Iron Dome,” protecting its information from legal accountability and obstructing international justice mechanisms. This feature of the contract suggests that Google is complicit not just in the operations of the military, but in the obfuscation of those operations from legal oversight.

3. Operational AI and Surveillance Systems

3.1. Vertex AI and the Industrialization of Targeting

The transition to cloud-based warfare relies heavily on the ability to process vast datasets for target generation. The IDF’s current operational doctrine relies on systems like “Lavender” and “The Gospel,” which use AI to generate human and structural targets at a rate far exceeding human capacity.13 While the specific algorithms for these systems are proprietary to the IDF, forensic analysis suggests that the IMOD is utilizing Google’s Vertex AI platform to enhance the data processing capabilities that underpin these systems.

In late 2023, Google reportedly granted the IMOD expanded access to Vertex AI, a unified platform for building, deploying, and scaling machine learning models.7 Vertex AI provides the “MLOps” (Machine Learning Operations) infrastructure necessary to train models on massive datasets and deploy them for inference.

The operational relevance of Vertex AI in this context is direct. Col. Racheli Dembinsky, commander of the IDF’s Center of Computing and Information Systems (Mamram), publicly confirmed that the “internal military systems quickly became overloaded” after the October 2023 invasion of Gaza, forcing the military to “go outside, to the civilian world” for cloud capacity.16 This admission is the “smoking gun” of logistical complicity. It confirms that the IDF’s internal infrastructure could not sustain the computational intensity of the war—specifically the data processing required for mass targeting—and that the military relied on the public cloud (Google and AWS) to maintain operational tempo.

By providing the overflow capacity and the advanced AI toolsets (Vertex) during the conflict, Google directly alleviated a logistical bottleneck in the IDF’s “kill chain.” Without this external cloud capacity, the rate of target generation—and consequently, the tempo of aerial bombardment—would likely have been constrained by the limitations of on-premise hardware.

3.2. Facial Recognition and “Google Photos” as Tactical Biometrics

One of the most disturbing findings of this audit is the repurposing of consumer-grade technology for lethal surveillance. Intelligence officers have admitted to using Google Photos’ proprietary facial recognition algorithms to identify Palestinian suspects in Gaza.5

The mechanism involves uploading surveillance imagery—often grainy drone footage, checkpoint camera feeds, or social media scrapes—into Google Photos to leverage its superior “face grouping” and identification capabilities.6 While Google Photos is designed for organizing family vacation albums, its underlying algorithm is one of the most powerful biometric tools in existence, capable of recognizing individuals across decades of aging, in poor lighting, and from partial angles.

This utilization effectively weaponizes a civilian product. The “face grouping” feature allows intelligence officers to track an individual’s movement and associations over time by aggregating every photo of them found in the surveillance dragnet. This data is reportedly cross-referenced with systems like “Corsight AI” to build a comprehensive biometric panopticon.17

The implications are severe. Google’s algorithms are enabling the IDF to “pick faces out of crowds” at checkpoints and in drone footage, facilitating mass detentions and the targeting of individuals.5 This is not a case of the IDF buying a “military version” of the software; they are using the off-the-shelf civilian cloud service, which implies that the data of Palestinians is being processed on the same public cloud infrastructure as civilian users’ personal photos, albeit likely within the segregated “Landing Zone” environment.

3.3. Sentiment Analysis and Predictive Policing

Training documents from Project Nimbus reveal that Google offered the IMOD advanced “sentiment analysis” capabilities.18 This technology claims to assess the emotional content of pictures, speech, and writing.

In a counter-insurgency or occupation context, sentiment analysis is a critical component of “predictive policing.” It allows security services to monitor social media and communications at scale, flagging individuals who express anger, dissent, or specific emotional markers for preemptive detention or enhanced surveillance.18 The provision of these specific AutoML (Automated Machine Learning) tools suggests an understanding that the client (IMOD) requires capabilities for population management and psychological profiling.18

This technology automates the monitoring of the Palestinian population. Instead of human analysts reading posts, Google’s NLP (Natural Language Processing) models can scan millions of interactions to identify “nodes” of resistance. This directly supports the Shin Bet (ISA) and Military Intelligence in maintaining the occupation through information dominance.

3.4. Latency and The “Edge” of War

The requirement for “local cloud regions” and the deployment of Google Distributed Cloud Hosted (GDC Hosted) 19 is also a matter of latency. In kinetic operations, milliseconds matter. If a drone identifies a target, the data transmission to the server, the processing by the AI model, and the return of the “fire” command must happen near-instantaneously.

Hosting data in Israel (me-west1 region) significantly reduces latency compared to routing data to servers in Europe or the US. Furthermore, GDC Hosted allows for “air-gapped” operations where Google provides the hardware and software stack to run on-premise or at the “tactical edge,” disconnected from the public internet.21 This capability is specifically marketed for “Top Secret” missions.19 While definitive evidence of GDC Hosted deployment at specific IDF forward bases is classified, the IMOD’s tender requirements and Google’s authorization for top-secret workloads strongly suggest this capability is part of the Nimbus service package. This brings Google’s infrastructure physically into the military command center.

4. Venture Capital and the Cyber-Military Ecosystem

4.1. The Capital-Intelligence Nexus

Google’s complicity extends beyond direct contracting into the financial capitalization of the Israeli military-industrial complex. Through its venture capital arms—Google Ventures (GV), CapitalG, and Gradient Ventures—Google acts as a strategic pipeline for funding the Israeli defense-tech sector. There is a demonstrable pattern of investment in companies founded by alumni of Unit 8200, the IDF’s signals intelligence and cyber warfare division.

This creates a “revolving door” ecosystem:

  1. Training: The IDF trains soldiers in offensive cyber warfare and surveillance (Unit 8200).
  2. Incubation: Veterans leave and form startups, often using knowledge or methodologies derived from their service.
  3. Capitalization: Google (and other US tech giants) invests in these startups, providing the capital to scale.
  4. Re-integration: The technologies developed are sold back to the IDF or integrated into global platforms (like Google Cloud Security), normalizing military-grade surveillance.

4.2. Team8: The “Unit 8200” Foundry

Perhaps the most significant vector of this integration is Google’s relationship with Team8, a venture creation foundry and cybersecurity think-tank. Team8 was founded by Nadav Zafrir, the former commander of Unit 8200.9

  • Google’s Involvement: Eric Schmidt’s Innovation Endeavors and other Google-linked funds have backed Team8 and its portfolio companies.22
  • Military Linkage: Team8 does not just hire veterans; it is structurally modeled on Unit 8200’s methodologies. Its portfolio includes offensive and defensive cyber companies that service both enterprise and government clients.
  • Operational Impact: Team8 spins out companies like Sygnia, which specializes in “military-grade” cyber security and incident response.24 Sygnia employs “adversarial tactics” teams led by former IDF cyber commanders.25 Google’s investment in Team8 is effectively an investment in the commercialization of IDF cyber doctrine.

4.3. Portfolio Forensics: Dual-Use Defense Tech

CapitalG (formerly Google Capital) and GV have led massive funding rounds for Israeli cybersecurity firms with deep intelligence roots. The “dual-use” nature of these companies is often thin; they market “security” but utilize aggressive, intrusive technologies derived from offensive cyber operations.

Table 1: Google Venture Capital Ties to Defense-Linked Firms

VC Entity Portfolio Company Investment Details Military/Intel Nexus Operational Capability
CapitalG Orca Security Led $210M Series C 8 Founders: Avi Shua & Gil Geron (Unit 8200) “SideScanning”: A technique that scans storage blocks out-of-band. Derived from intel collection methods to inspect data without agent installation.
CapitalG Armis Participant in rounds 26 Founders: Yevgeny Dibrov & Nadir Izrael (Unit 8200) Asset Visibility: Secures “unagentable” devices. Critical for military IoT and logistical networks. Used by US DoD; highly applicable to IDF networked bases.
CapitalG Salt Security Led $140M Round 28 Founders: Unit 8200 Alumni API Security: Protects the data streams connecting applications. Essential for securing the “Landing Zone” infrastructure used by IMOD.
GV Team8 Backer of portfolio firms 29 Founder: Nadav Zafrir (Cmdr. Unit 8200) Cyber Foundry: Incubates companies like Sygnia (Incident Response) and Claroty (Industrial Control Systems security).
Google Cloud Siemplify Acquired for $500M 30 Founder: Amos Stern (Head of IDF Cyber Unit) SOAR (Security Orchestration): Now integrated into Google Chronicle. Represents the direct absorption of IDF cyber-defense logic into Google products.

4.4. The “Wiz” Acquisition Attempt and IP Valuation

Google’s attempted $23 billion acquisition of Wiz (ultimately declined, but indicative of strategic intent) highlights the valuation placed on military-grade intelligence tech. Wiz was founded by Assaf Rappaport and the team that previously sold Adallom to Microsoft; all are veterans of Unit 8200.31

The sheer scale of this offer—Google’s largest ever proposed acquisition—signals a strategic desire to integrate the technology incubated within the Israeli military intelligence apparatus into its core cloud security offering. It validates the “Unit 8200 to Exit” pipeline, signaling to current IDF soldiers that their military service is a direct path to wealth funded by Silicon Valley. This financial incentive structure is a key component of the “ideological support” mentioned in the audit objective, as it helps the IDF recruit and retain top talent by promising future private sector rewards.

5. Geospatial Intelligence and Apartheid Logistics

5.1. Waze: The Militarization of Navigation

Waze, acquired by Google for roughly $1 billion in 2013, originated as an Israeli startup.32 Under Google’s ownership, Waze has maintained specific features that align with the Israeli military’s logistical needs and the broader apartheid infrastructure of the West Bank.

  • Segregated Routing: Waze features a default setting to “avoid dangerous areas,” which routes users (specifically Jewish Israelis and settlers) away from Palestinian population centers (Areas A and B).32 While framed as a safety feature for Israelis, it algorithmically reinforces the apartheid infrastructure by creating “sterile” routes for settlers and military personnel while excluding Palestinian traffic data or routing needs.33 It normalizes the bypass road network, which is illegal under international law as it is built on expropriated Palestinian land.
  • Tactical Failure and Dependence: The “Qalandia Incident” 34, where IDF soldiers were directed into a refugee camp by Waze, highlights the military’s reliance on this app. The soldiers were using Waze for navigation within occupied territory, treating a civilian app as a tactical tool. The fact that the IDF relies on Waze implies that Google is providing the de facto navigation system for routine military movements in the West Bank.
  • Double Standard: Palestinian users report that the app does not offer reciprocal “avoid settlement” warnings, despite the documented violence of settlers against Palestinians.32 This asymmetry in feature design reflects a bias that prioritizes the security of the occupier over the occupied.

5.2. Google Maps Platform in C2 Systems

The IDF utilizes Google Maps Platform and Google Earth Enterprise (historically and in legacy systems) for situational awareness and command and control.

  • Visualization Overlay: The integration of Google Maps API into military command and control (C2) systems allows for the overlay of tactical data onto civilian cartography.35 This provides commanders with a familiar, high-fidelity visualization layer for planning operations.
  • Digital Erasure: Forensic analysis of Google Maps in Gaza and the West Bank reveals a “cartographic genocide” where Palestinian villages are often deprioritized, low-resolution, or unlabeled compared to illegal Israeli settlements. This erasure has tactical implications; if a village does not exist on the map, its civilian population is rendered invisible in the planning phases of operations.
  • “Trophy” Mapping: During the 2023-2024 conflict, user-generated content and “reviews” on Google Maps were used by IDF soldiers to mock destroyed Palestinian infrastructure. Locations of destroyed schools or mosques were tagged with “reviews” glorifying the destruction.36 Google’s slow moderation of this content allowed its platform to serve as a “digital trophy case” for war crimes.

6. Supply Chain Integration and Corporate Partnerships

6.1. Prime Contractor Interoperability

Google Cloud does not operate in a vacuum; it functions as the substrate for Israel’s defense prime contractors. The “Core Intelligence Requirement 4” asks if Google supplies components to Primes. The answer is yes: the component is compute and storage.

  • Elbit Systems: Israel’s largest weapons manufacturer, Elbit Systems, is a confirmed user of the Nimbus cloud framework.7 Elbit’s autonomous systems (Hermes 450/900 drones) generate massive data streams that require the hyperscale storage and AI processing capabilities provided by Project Nimbus. The integration allows Elbit to store petabytes of surveillance footage and potentially train its autonomous targeting algorithms using Google’s Vertex AI infrastructure.
  • Rafael Advanced Defense Systems: Identified as a user of the Nimbus cloud.38 Rafael produces the Iron Dome and Spike missiles. The integration of Rafael’s systems with a Google Cloud “Landing Zone” implies that logistics, R&D simulations, and potentially operational telemetry for these weapon systems utilize Google’s servers.39
  • Israel Aerospace Industries (IAI): Another confirmed Nimbus stakeholder.38 IAI manufactures the Heron drones and Arrow missile defense systems. The shift of these massive defense contractors to Google Cloud creates a dependency; their R&D velocity and operational data management are now tethered to Google’s infrastructure.

6.2. The Corsight AI Partnership

Corsight AI, a facial recognition company that claims to identify individuals even when they are disguised or wearing masks, has a documented partnership with Google Cloud.17

  • The Link: Corsight’s technology is reportedly used by the IDF in Gaza to scan faces at checkpoints.6
  • The Integration: Corsight is a Google Cloud Partner, and its systems are designed to run on GCP infrastructure. This partnership enables the IDF to deploy Corsight’s biometric surveillance tools with the scalability and reliability of Google’s data centers.37 By certifying Corsight as a partner and hosting their solutions, Google facilitates the deployment of this repressive technology.

7. Forensic Ranking and Conclusion

7.1. Complicity Scale Analysis

Based on the “Defense Logistics Analyst” framework, Google’s complicity is assessed across three tiers. The evidence gathered in this audit supports a Tier 1 classification.

Table 2: Google Complicity Assessment Matrix

Tier Complicity Level Evidence Vector Forensic Justification
Tier 1 Direct Material Support Project Nimbus “Landing Zone” CONFIRMED. Google consultants are actively architecting secure cloud entry points for the IMOD during wartime.2 The provision of Vertex AI addresses a critical military shortage in data processing capacity.16
Tier 2 Dual-Use Weaponization Google Photos / Facial Recognition CONFIRMED. Consumer and enterprise AI tools are being repurposed for kinetic targeting and biometric screening.6 The tools are not modified to prevent this; rather, partnerships (Corsight) enable it.
Tier 3 Ideological/Financial VC Investment in Unit 8200 CONFIRMED. Systemic capital injection into the military-cyber ecosystem (Team8, Orca, etc.) strengthens the IDF’s technological edge and incentivizes military service.8

7.2. Distinguishing Meaningful vs. Incidental Complicity

It is crucial to distinguish between incidental use and meaningful complicity.

  • Incidental: A soldier using a personal Gmail account to email their family, or using Google Search to find a phone number, represents incidental association. This is unavoidable for a ubiquitous tech company.
  • Meaningful: The IMOD signing a $1.2B contract for a sovereign cloud region with a dedicated landing zone and consulting services for “multiple units” is meaningful, structural complicity. The modification of Terms of Service to prevent service denial to the military 11 proves that this is a bespoke defense arrangement, not a generic commercial transaction. The active consulting during the Gaza war 2 moves this into the realm of direct logistical support for combat operations.

7.3. Final Conclusion: The “Kill Cloud” Architecture

The forensic audit confirms that Google has effectively integrated itself into the logistical and operational backbone of the Israeli military. Through Project Nimbus, Google has provided the “digital territory” necessary for the IDF to conduct modern, data-centric warfare. The establishment of a secure Landing Zone for the Ministry of Defense, combined with the provision of Vertex AI and AutoML capabilities, directly supports the “kill chain” in Gaza by accelerating data processing and target generation.

Google’s role has evolved from a commercial vendor to a strategic partner. It provides the storage for the intelligence dragnet, the compute for the targeting AI, the consulting for the cloud architecture, and the capital for the next generation of defense-tech startups.

Final Assessment: Google LLC is a Tier 1 Defense Logistics Partner to the State of Israel. Its services are not merely “available” to the military; they are architected to ensure the military’s functional continuity and operational supremacy. Any assessment of Israeli military capabilities must now view Google Cloud Platform as a critical subsystem of the IDF’s warfighting machine.

Works cited

  1. Project Nimbus – Wikipedia, accessed December 9, 2025, https://en.wikipedia.org/wiki/Project_Nimbus
  2. Report reveals Google’s contract with Israel Defense Ministry amid Israel-OPT conflict, accessed December 9, 2025, https://www.business-humanrights.org/en/latest-news/report-reveals-googles-contract-with-israel-defense-ministry-amid-israel-opt-conflict/
  3. Exclusive: Google Contract Shows Deal With Israel Defense Ministry – Time Magazine, accessed December 9, 2025, https://time.com/6966102/google-contract-israel-defense-ministry-gaza-war/
  4. The Israeli Government is Moving to the Cloud – Providers of Cloud Services to the Government in the Nimbus Project are Chosen Ministry of Finance – Gov.il, accessed December 9, 2025, https://www.gov.il/en/pages/press_24052021
  5. Military Use of Biometrics Series – Israel’s Use of AI-DSS and Facial Recognition Technology: The Erosion of Civilian Protection in Gaza – Lieber Institute, accessed December 9, 2025, https://lieber.westpoint.edu/israels-use-ai-dss-facial-recognition-technology-erosion-civilian-protection-gaza/
  6. Report: IDF using facial recognition tools to identify, detain suspects …, accessed December 9, 2025, https://www.timesofisrael.com/report-idf-using-facial-recognition-tools-to-identify-detain-suspects-in-gaza/
  7. List of companies involved in the Gaza war – Wikipedia, accessed December 9, 2025, https://en.wikipedia.org/wiki/List_of_companies_involved_in_the_Gaza_war
  8. Google Growth Fund Co-Leads $210M Round In Orca Security At $1.2B Valuation, accessed December 9, 2025, https://nocamels.com/2021/03/google-capitalg-210m-orca-security-1b-valuation/
  9. Backed by Microsoft and Cisco, Israel’s Team8 raises $500m to help build startups, accessed December 9, 2025, https://www.timesofisrael.com/backed-by-microsoft-and-cisco-israels-team8-raises-500m-to-help-build-startups/
  10. Inside Israel’s deal with Google and Amazon – +972 Magazine, accessed December 9, 2025, https://www.972mag.com/project-nimbus-contract-google-amazon-israel/
  11. Revealed: Israel demanded Google and Amazon use secret ‘wink’ to sidestep legal orders | US news | The Guardian, accessed December 9, 2025, https://www.theguardian.com/us-news/2025/oct/29/google-amazon-israel-contract-secret-code
  12. Google Cloud region in Tel Aviv Israel now open, accessed December 9, 2025, https://cloud.google.com/blog/products/infrastructure/new-google-cloud-region-in-israel-is-now-open
  13. Israel developing ChatGPT-like tool that weaponizes surveillance of Palestinians, accessed December 9, 2025, https://www.972mag.com/israeli-intelligence-chatgpt-8200-surveillance-ai/
  14. US Tech Giants Are Storing Data for Israeli Military as It Destroys Gaza | Truthout, accessed December 9, 2025, https://truthout.org/articles/us-tech-giants-are-storing-data-for-israeli-military-as-it-destroys-gaza/
  15. The Israeli military publicly admitted to using Google Cloud to enhance its capabilities during its war on Gaza, along with Amazon and Microsoft cloud services., accessed December 9, 2025, https://afsc.org/node?page=12
  16. ‘Order from Amazon’: Tech giants storing mass data for Israel’s war – +972 Magazine, accessed December 9, 2025, https://www.972mag.com/cloud-israeli-army-gaza-amazon-google-microsoft/
  17. Report reveals Google & Corsight technologies used in Israel’s expansive facial recognition program in Gaza – Business & Human Rights Resource Centre, accessed December 9, 2025, https://www.business-humanrights.org/pt/latest-news/report-reveals-google-corsights-technologies-role-in-israels-expansive-facial-recognition-program-in-gaza/
  18. Google allegedly offers to augment Israel’s ability to surveil people; co. declined to comment. – Business and Human Rights Centre, accessed December 9, 2025, https://www.business-humanrights.org/en/latest-news/google-allegedly-augment-israels-ability-to-surveil-people-co-declined-to-comment/
  19. Google is now authorized to host classified data in the cloud – Presale1, accessed December 9, 2025, https://presale1.com/presale1-elite-team-jobs/f/google-is-now-authorized-to-host-classified-data-in-the-cloud
  20. Announcing Google Distributed Cloud Edge and Hosted, accessed December 9, 2025, https://cloud.google.com/blog/topics/hybrid-cloud/announcing-google-distributed-cloud-edge-and-hosted
  21. Google Distributed Cloud Hosted Now Generally Available – InfoQ, accessed December 9, 2025, https://www.infoq.com/news/2023/03/google-distributed-cloud-hosted/
  22. With great fanfare, former Israeli spy chief launches $18M cyber security venture – Team8.vc, accessed December 9, 2025, https://team8.vc/news/with-great-fanfare-former-israeli-spy-chief-launches-18m-cyber-security-venture/
  23. Google’s Schmidt Backs Cybersecurity Firm Illusive Networks – Team8, accessed December 9, 2025, https://team8.vc/news/googles-schmidt-backs-cybersecurity-firm-illusive-networks/
  24. Careers at Sygnia – Join the ISTARI Collective, accessed December 9, 2025, https://careers.istari-global.com/jobs/sygnia?__hstc=245216157.6fa385653ecd7c9674ba06f08984886d.1712620800144.1712620800145.1712620800146.1&__hssc=245216157.2.1712620800147&__hsfp=892594048
  25. Cyber Week Online, accessed December 9, 2025, https://cwonline.b2b-wizard.com/expo/speakers?page=6
  26. Israeli startups raise over $800 million in a week of mega deals as investor confidence surges | CTech, accessed December 9, 2025, https://www.calcalistech.com/ctechnews/article/hjn111m7ewg
  27. Cybersecurity guru ‘Armis’ raises US$435M in pre-IPO funding, accessed December 9, 2025, https://mugglehead.com/cybersecurity-guru-armis-raises-us435m-in-pre-ipo-funding/
  28. Google investment fund leads $140m round in Israeli cybersecurity startup, accessed December 9, 2025, https://www.timesofisrael.com/google-investment-fund-leads-140m-round-in-israeli-cybersecurity-startup/
  29. Lumia Secures $18 Million Seed Round Led By Team8 And New Era – Traded, accessed December 9, 2025, https://traded.co/vc/deal/lumia-secures-18-million-seed-round-led-by-team8-and-new-era/
  30. Google acquires Israeli cybersecurity company Siemplify for $500m | The Times of Israel, accessed December 9, 2025, https://www.timesofisrael.com/google-to-acquire-israeli-cybersecurity-company-siemplify-for-500m/
  31. Google acquisition target Wiz another fruit of Israel’s military intelligence, accessed December 9, 2025, https://m.economictimes.com/tech/technology/google-acquisition-target-wiz-another-fruit-of-israels-military-intelligence/articleshow/111813176.cms
  32. Waze Lets Israelis Avoid Palestinian Areas, but Not the Other Way Around – VICE, accessed December 9, 2025, https://www.vice.com/en/article/waze-lets-jewish-israelis-avoid-palestinian-areas-but-not-the-other-way-around/
  33. Palestinian app helps where Waze and Google Maps fail: West Bank checkpoints – CBC, accessed December 9, 2025, https://www.cbc.ca/news/science/palestinian-app-doroob-west-bank-traffic-1.5236687
  34. Israeli soldiers’ app use leads to deadly fight in West Bank camp | Palestine | The Guardian, accessed December 9, 2025, https://www.theguardian.com/world/2016/mar/01/israeli-soldiers-waze-app-use-leads-to-deadly-fight-in-palestinian-west-bank-camp
  35. Vol. 13 No. 2 October 2019 – Indian Society of Geomatics, accessed December 9, 2025, https://isgindia.org/wp-content/uploads/2019/12/JoG_vol_13_no_2_October_2019.pdf
  36. The Cartographic War: How Google Earth Turned Gaza’s Ruins Into a Digital Battlefield, accessed December 9, 2025, https://untoldmag.org/the-cartographic-war-how-google-earth-turned-gazas-ruins-into-a-digital-battlefield/
  37. Companies Profiting from the Gaza Genocide | American Friends Service Committee, accessed December 9, 2025, https://afsc.org/gaza-genocide-companies
  38. Alphabet Inc | AFSC Investigate, accessed December 9, 2025, https://investigate.info/company/alphabet
  39. Access Now Open Letter to Google re AI Warfare, accessed December 9, 2025, https://www.accessnow.org/wp-content/uploads/2024/05/Access-Now-Open-Letter-Google-AI-Warfare_16-May.pdf
  40. Partners New v1 – Corsight AI, accessed December 9, 2025, https://www.corsight.ai/corsight-partners/

 

Related News & Articles