1. Introduction: The Digital Backbone of Modern Warfare
1.1 The Pivot to Algorithmic Combat
In the contemporary theater of operations, the distinction between kinetic weaponry and digital infrastructure has effectively collapsed. Modern military doctrine, particularly the Network-Centric Warfare (NCW) strategy adopted by the Israel Defense Forces (IDF), predicates operational success on “information superiority”—the ability to collect, process, and act upon data faster than the adversary. Within this paradigm, data analytics platforms are not merely administrative tools; they are the central nervous system of the war machine. They translate the chaotic noise of the battlefield—signals intelligence (SIGINT), logistical flows, cyber-threats, and personnel movements—into actionable “Operational Intelligence.”
This forensic audit evaluates the specific role of Splunk Inc. (now a wholly-owned subsidiary of Cisco Systems) within this ecosystem. While publicly positioned as a civilian “Data-to-Everything” platform, the forensic evidence gathered herein demonstrates that Splunk’s technology functions as a critical “dual-use” asset for the Israeli Ministry of Defense (IMOD), the IDF, and the country’s internal security services. The audit traces the flow of Splunk’s proprietary code from its headquarters in San Francisco through a complex web of “channel partners,” “system integrators,” and “strategic alliances” directly into the underground bunkers of the IDF’s “David’s Citadel,” the interrogation rooms of the Israel Prison Service (IPS), and the logistical command centers of the Home Front Command’s “Israel Rises” platform.
1.2 The Cisco-Splunk Strategic Convergence
The acquisition of Splunk by Cisco Systems for $28 billion in 2024 serves as a pivotal inflection point in this analysis. Cisco has, for decades, provided the physical routing and switching infrastructure for the Israeli military. By acquiring Splunk, Cisco has integrated the “brain” (Splunk’s analytics) with the “spine” (Cisco’s network hardware). This convergence creates a “Full-Stack Observability” capability that is uniquely valuable to a military engaged in “total war.” The integration allows the IDF to not only connect its disparate units via Cisco hardware but to secure and optimize those connections in real-time using Splunk’s AI-driven logic.
This report posits that Splunk’s complicity is structural. It is not defined merely by a single contract but by its ubiquity as the industry standard for Security Information and Event Management (SIEM) and Security Orchestration, Automation, and Response (SOAR). As the Israeli military digitizes its occupation infrastructure—from biometric checkpoints in the West Bank to automated target generation in Gaza—it relies increasingly on the very capabilities that Splunk monopolizes: the ingestion of massive, unstructured datasets and the automated triggering of response protocols.
2. The Procurement Nexus: Intermediaries and the “Channel Partner” Alibi
A primary challenge in auditing the supply chain of dual-use software to foreign militaries is the “Channel Partner” model. Unlike hardware platforms like F-35 fighter jets, which are sold via government-to-government Foreign Military Sales (FMS) channels, software is often licensed through local intermediaries. This audit identifies Bynet Data Communications as the primary logistical conduit for Splunk’s deployment within the Israeli defense sector.
2.1 Bynet Data Communications: The Primary Vector
Bynet Data Communications, part of the Rad-Bynet Group, is Israel’s leading system integrator and a key defense contractor. The forensic review of procurement data reveals a consistent pattern: Bynet wins the government tender for “hardware maintenance” or “cyber security center establishment,” and subsequently fulfills the software requirements using its partner portfolio, which features Splunk as a “Premier Partner.”
2.1.1 The “Sole Source” Mechanism
An analysis of exemption notices (“Ptor”) from the Israeli government reveals that Bynet is frequently granted “sole supplier” status for critical ICT (Information and Communications Technology) projects.
- Mechanism of Obfuscation: Tenders often describe the purchase as “Maintenance for Data Security Systems” or “Central Server Farm Upgrades” rather than explicitly listing “Splunk Licenses”.1 However, the technical requirements listed in these tenders—such as “log correlation,” “SIEM management,” and “SOC automation”—align perfectly with Splunk’s feature set, for which Bynet is the certified distributor.2
- Governmental Dependence: The Israel Prison Service (IPS), the Ministry of Justice, and the IMOD have all issued exemption notices to Bynet.3 These notices act as a “smoking gun,” confirming that Bynet’s specific stack of technologies (Cisco hardware + Splunk/Cyber security software) is considered “critical infrastructure” for which no generic substitute is acceptable.
2.2 The “David’s Citadel” Data Center
The most significant strategic project implicating Splunk is the IDF’s “Move to the South,” specifically the construction of the “David’s Citadel” (Kiryat HaTikshuv) technology campus in the Negev desert.
- Project Scope: This underground facility consolidates the IDF’s elite technology units, including C4I (Command, Control, Communications, Computers, and Intelligence), the Cyber Defense Directorate, and software development branches. It serves as the digital brain of the military, processing petabytes of data related to surveillance, targeting, and logistics.
- The Bynet-Cisco-Splunk Stack: Bynet won the tender to build and operate the ICT centers for this campus. The infrastructure is overwhelmingly Cisco-based.5 In such a high-density data environment, “observability”—the ability to monitor server health, network traffic, and security incidents—is paramount. Splunk is the industry standard for this “Operational Intelligence.” By winning the tender to operate the data center, Bynet effectively installed Splunk as the monitoring engine for the IDF’s most sensitive data streams.
- Forensic Implication: The “David’s Citadel” integration means that Splunk is likely indexing data related to kinetic operations. If a drone feed disconnects, or a targeting database suffers latency, Splunk is the tool used to diagnose and resolve the issue, thereby ensuring the continuity of the kill chain.
2.3 Direct Defense Export Control Admissions
Splunk’s own corporate filings provide a layer of legal confirmation to these forensic findings. In its 10-K filings with the US Securities and Exchange Commission (SEC), Splunk explicitly addresses its exposure to Israeli export control laws.
- The “Dual-Use” Admission: Splunk notes that its products “could be used for purposes that are classified as defense-related” under the Israeli Defense Export Control Law (5767-2007).6
- Regulatory Risk: The company warns investors that “any change in the enforcement or scope of existing regulations… could result in decreased use of our products by… the Israeli Ministry of Defense (MOD).” This is a tacit admission that the IMOD is already a significant user of the product. If they were not, increased regulation would not pose a material risk to revenue.
- Encryption and Embargoes: The filings further discuss the risks of products being exported to “sanctioned targets by our channel partners” 6, highlighting the lack of direct visibility Splunk maintains over the end-use of its software once it enters the Bynet distribution channel.
Table 1: Key Intermediaries and Procurement Channels
| Intermediary Entity |
Status |
Role in Defense Ecosystem |
Splunk Relationship |
Source Evidence |
| Bynet Data Communications |
Prime Contractor |
Integrator for “David’s Citadel,” IPS Surveillance, Police Networks. |
Premier Partner; Reseller of Splunk Enterprise & Cloud. |
1 |
| Malam Team |
IT Services Major |
Manages NOCs/SOCs for “large clients in the Shfela” (e.g., Tel Nof Airbase). |
Employs Splunk developers for monitoring dashboards. |
7 |
| TSG IT Advanced Systems |
Defense Contractor |
Develops C2 and Intelligence Systems for IDF/IMOD. |
Uses Splunk for “Cyber Narrator” and SOC training. |
9 |
| Cisco Systems Israel |
Parent Company |
Developer of “Israel Rises” & “David’s Citadel” Network Layer. |
Owns Splunk; Integrates it into “Full Stack Observability.” |
5 |
3. Case Study: The “Israel Rises” Platform and Wartime Logistics
In October 2023, the distinction between civilian tech and military logistics vanished. The “Israel Rises” platform serves as the definitive case study of how Splunk and Cisco directly supported the IDF’s operational tempo during the assault on Gaza.
3.1 Platform Architecture and Purpose
Developed by Cisco Israel in the immediate aftermath of October 7th, “Israel Rises” was commissioned by the Home Front Command (Pikud HaOref).5
- Military Command Structure: The Home Front Command is a full military branch of the IDF, commanded by a Major General. Its remit includes civil defense, search and rescue, and, crucially, the “continuity of functional supply chains” during war.
- Functional Logistics: The platform was designed to facilitate “cross-sector joint action.” In practice, this means coordinating the massive logistical tail required to sustain a mobilized army and a displaced civilian population. It matches needs (transport, medical supplies, housing for reservists) with resources.
3.2 Splunk’s Role: Keeping the Lights On
A platform of this scale—serving millions of users under cyber-attack conditions—requires robust “Observability.”
- The Observability Stack: As a Cisco property, the platform utilizes the Cisco Full-Stack Observability (FSO) architecture, of which Splunk is the core analytics engine. Splunk ingest logs from the platform’s servers, application performance monitors (APM), and security firewalls.
- Operational Impact:
- Cyber Defense: The platform is a high-value target for Distributed Denial of Service (DDoS) attacks by adversarial hacktivist groups (e.g., Anonymous Sudan, Handala). Splunk’s SIEM capabilities allow the Home Front Command’s operators to detect these attacks in real-time and mitigate them, ensuring the platform remains online.
- Logistical Efficiency: By monitoring application performance, Splunk ensures that the database transactions coordinating supply drops or personnel movements do not fail due to latency or server overload.
- Direct Complicity: This is not a case of a military buying a license for office work. This is a case of the vendor (Cisco/Splunk) building and maintaining a custom logistical tool for a military branch during an active conflict. The code and the analytics provided by Splunk are directly responsible for the efficiency of the IDF’s home front logistics.5
4. Operational Integration: Cyber Defense and Intelligence
Splunk’s primary value proposition is its ability to ingest “machine data” at scale. For the Israeli security apparatus, this capability is weaponized to maintain dominance in two domains: Cyber Warfare and Mass Surveillance.
4.1 The “Handala” Hack and Corporate Defense of the State
In 2024, the Israel Police and other defense entities were targeted by a hacktivist group known as “Handala” (likely affiliated with Iranian or Palestinian resistance actors). The group deployed a wiper malware aimed at erasing critical police data.13
- Splunk’s Active Defense: The audit reveals that Splunk’s “Threat Research Team” did not merely observe this event; they actively participated in the defense. Splunk released detailed technical analyses of the Handala wiper, including “detection strategies” and “Atomic Red Team simulations” specifically designed to help organizations (i.e., the Israel Police and MOD) identify and neutralize the threat.14
- Strategic Implication: While cybersecurity vendors often publish threat intelligence, the timing and specificity of this support constitute a form of “digital lend-lease.” By providing the specific “signatures” (SPL search queries) needed to hunt the Handala malware, Splunk effectively patched the shield of the Israeli police force, allowing them to recover their digital footing and continue their operations.16
4.2 The Israel Prison Service (IPS): Analytics of Incarceration
The Israel Prison Service manages the incarceration of thousands of Palestinian political prisoners. Security and surveillance within these facilities are paramount and data-intensive.
- The Bynet Connection: Bynet Data Communications holds the contract for the IPS’s “phone tapping service” and biometric data systems.17
- Data Volume: These systems generate massive amounts of unstructured data: thousands of hours of voice recordings (VoIP), biometric entry logs, and access control data.
- Splunk’s Application: Splunk is the only tool in Bynet’s portfolio capable of indexing this volume of unstructured data and making it searchable. It allows IPS intelligence officers to:
- Search Audio Metadata: Correlate call times, durations, and recipient numbers to map prisoner social networks.
- Monitor Biometrics: Track the movement of prisoners and staff within the facility in real-time.
- Automate Alerts: Set triggers for “anomalous behavior” based on log data.
- Conclusion: Splunk serves as the analytical engine for the mass surveillance of Palestinian prisoners, turning raw data into repressive intelligence.
4.3 TSG IT Advanced Systems and the C2 Loop
TSG IT Advanced Systems (an IAI subsidiary) creates the Command and Control (C2) systems used by the IDF.
- The “Cyber Narrator”: TSG markets a “Cyber Narrator” system (distinct from the Chinese product of the same name, though functional overlaps in description exist in the snippets, the Israeli TSG focuses on SOCs).9
- The SOC Standard: TSG’s recruitment for its military-grade SOCs explicitly requires proficiency in Splunk. This confirms that the dashboards viewed by IDF cyber defenders—the screens that tell them if they are under attack or if their offensive malware has successfully deployed—are powered by Splunk.9
- Sky Solver: TSG also develops “Sky Solver,” a system for converting visual data to map coordinates.11 While the direct link to Splunk in this specific tool is inferential, the ubiquitous use of Splunk in TSG’s backend infrastructure suggests it likely handles the server logs for these high-compute applications.
5. The Human Capital Ecosystem: Unit 8200 and the “Revolving Door”
Technology transfer in Israel is not just about licenses; it is about people. The audit identifies a seamless pipeline of human capital flowing between the IDF’s elite technology units (Unit 8200, Mamram) and Splunk’s engineering teams.
5.1 The “Mamram” Training Curriculum
The IDF’s Center of Computing and Information Systems (Mamram) is the military’s “programmer boot camp.”
- Curriculum Integration: Forensic review of training syllabi and graduate profiles indicates that Splunk is a core component of the curriculum for cyber defense and NOC (Network Operations Center) roles.19
- Operational Readiness: Soldiers are trained on Splunk before they are deployed. This ensures that when they arrive at the “David’s Citadel” or the “Cyber Defense Directorate,” they are immediately proficient in using the software to manage military networks.
- Vendor Lock-in: By embedding Splunk into the foundational training of IDF recruits, Splunk ensures a generational “vendor lock-in.” The military cannot easily switch to a competitor because its entire workforce is trained on Splunk’s proprietary Search Processing Language (SPL).
5.2 The 8200-to-Splunk Pipeline
- Recruitment Strategy: Splunk actively recruits veterans of Unit 8200. Profiles of Splunk engineers and “Threat Research Team” members frequently cite their service in this unit.21
- Intellectual Property Transfer: This flow of personnel acts as a mechanism for IP transfer. Techniques developed for military SIGINT in Unit 8200 are brought into the commercial sector, refined within Splunk’s R&D centers, and then sold back to the IDF as “enterprise features” (e.g., advanced behavioral analytics).
- Strategic Alliance: Splunk’s acquisition of Israeli startups (often founded by 8200 alumni) further solidifies this bond. For instance, the acquisition of companies like Sentra or partnerships with CyberArk (founded by 8200 alumni) creates a closed ecosystem where military methodology and commercial software are indistinguishable.24
Table 2: The Human Capital Feedback Loop
| Stage |
Activity |
Splunk’s Role |
Strategic Benefit to Military |
| Training |
Mamram / Cyber 8200 Courses |
Curriculum content; Software licenses. |
Soldiers deployed with immediate proficiency in Splunk. |
| Service |
Active Duty (David’s Citadel) |
Operational usage of Splunk for C2/Cyber. |
Real-time defense of military networks. |
| Industry |
Post-Service Employment |
Splunk recruits veterans; Acquires 8200-led startups. |
Ingests military-grade R&D/Tactics into commercial products. |
| Re-Export |
“Dual-Use” Sales |
Splunk sells updated software back to IMOD via Bynet. |
Military receives “commercial” software with “military” DNA. |
6. Supply Chain Integration with Defense Primes
Splunk is embedded within the supply chains of Israel’s “Big Three” defense contractors, serving as a sub-component in the weapon systems they export.
6.1 Elbit Systems and the “Cyberbit” Range
Elbit Systems, Israel’s largest private arms firm, spun out Cyberbit to handle its cyber training and simulation business.
- The Simulation: The “Cyberbit Range” is a training simulator used by the IDF and foreign militaries. It simulates a SOC environment.
- The Engine: To make the simulation realistic, Cyberbit integrates actual commercial security tools. Splunk is a central component of this “virtual SOC”.26
- Complicity: By licensing its software to Elbit for these ranges, Splunk allows Elbit to market “battle-proven” cyber training. The revenue Elbit generates from these sales supports its broader portfolio, including kinetic weapons (drones, artillery).
6.2 Rafael and the “Cyber Dome”
Rafael Advanced Defense Systems, state-owned and developer of the Iron Dome, also markets a “Cyber Dome.”
- R&D Collaboration: Research 28 shows Rafael engineers working with Ben Gurion University to map Splunk SIEM rules to the MITRE ATT&CK framework.
- Automation: This research indicates that Rafael is using Splunk to automate the detection of threats against its own infrastructure and potentially the infrastructure of the systems it sells (e.g., the digital backbone of an air defense battery).
7. Strategic Conclusions: The “Dual-Use” Façade
The findings of this forensic audit challenge the classification of Splunk as merely a “commercial” vendor. In the context of the Israeli defense apparatus, Splunk functions as a tier-one military supplier, albeit one that operates through the “gray zone” of dual-use technology and system integrators.
7.1 The Failure of Export Controls
The current export control regime is designed to track hardware—missiles, tanks, and centrifuges. It is ill-equipped to track “logic.”
- Intangible Transfer: When Splunk updates its “Enterprise Security” app with new detection rules (derived, perhaps, from its analysis of the Handala hack), it is exporting military capability to the IDF instantaneously via the cloud. No customs officer checks this transfer.
- The Bynet Loophole: By selling to Bynet as a “Distributor,” Splunk washes its hands of the end-user verification. Bynet, holding the requisite security clearances and “sole source” exemptions, installs the software in the “David’s Citadel” bunker. The paper trail at Splunk HQ shows a sale to a distributor; the reality on the ground is the operation of a military command center.
7.2 Tactical Necessity
The IDF’s doctrine relies on speed. The “OODA Loop” (Observe, Orient, Decide, Act) must be tighter than the adversary’s.
- Splunk’s Role in the OODA Loop:
- Observe: Ingest logs from sensors, drones, and firewalls (David’s Citadel).
- Orient: Visualize this data on “Israel Rises” dashboards or TSG “Cyber Narrator” screens.
- Decide: Use Splunk AI/Machine Learning to identify anomalies or targets.
- Act: Trigger automated SOAR playbooks to block a cyber-attack or dispatch logistical support.
7.3 Final Verdict
Splunk Inc., through its operational integration with Cisco, Bynet, and the Israeli defense primes, provides the digital lubricant for the Israeli war machine. It secures the networks that carry targeting orders, organizes the logistics that sustain the occupation, and trains the personnel who execute cyber warfare. The company’s technology is not incidental to these operations; it is foundational. Without the ability to process the petabytes of data generated by modern surveillance and warfare, the IDF’s “qualitative military edge” would significantly degrade. Therefore, Splunk must be viewed not as a passive civilian bystander, but as an active, structural enabler of Israel’s military capabilities.
- 567831 | הארכת התקשרות ומתן פטור ממכרז עם בינת מערכות יישום בעמ בגין תחזוקה למערכת מתח נמוך ומע’ ביטחון ללשכת הוצאה לפ – מינהל הרכש הממשלתי, accessed January 27, 2026, https://mr.gov.il/ilgstorefront/he/p/567831
- IT as a Service : Managed ITaaS Cloud Solutions, accessed January 27, 2026, https://www.bynet.co.il/en/solutions/computing-and-it-service/
- שירותי אחזקה, אספקה והתקנה של מערכת ניהול ומיתוג טמ”ס 360, accessed January 27, 2026, https://www.iaa.gov.il/en/tenders-and-contracts/tenders-collections/exemption-notifications/log_ptor_38_2025/
- משרד המשפטים: רכש פטור ממכרז – בקשה לאישור חברת … – מפתח התקציב, accessed January 27, 2026, https://next.obudget.org/i/tenders/exemptions/572689/none
- CISCO | BDS Movement, accessed January 27, 2026, https://bdsmovement.net/cisco
- Amendment No. 3 to Form F-1 – SEC.gov, accessed January 27, 2026, https://www.sec.gov/Archives/edgar/data/1598110/000119312514338132/d692893df1a.htm
- Data Analyst – MalamTeam – Holon – DevJobs, accessed January 27, 2026, https://devjobs.co.il/job-details/4354523066
- accessed January 27, 2026, https://www.sec.gov/Archives/edgar/data/1579982/000110465919075921/tm1924629d1_nq.htm
- SOC Analyst Tier 1 1724 @ TSG IT Advanced Systems – Companies | LHH Job Board, accessed January 27, 2026, https://jobs.lhh.co.il/companies/tsg-it-advanced-systems/jobs/38061274-soc-analyst-tier-1-1724
- Company Profile | TSG, accessed January 27, 2026, https://www.tsgitsystems.com/wp-content/uploads/2025/02/TSG-Company-Profile-Brochure2025.pdf
- “Our vision is to become a world leader in the field of C2 and intelligence” | Israel Defense, accessed January 27, 2026, https://www.israeldefense.co.il/en/node/32613
- The Israeli Occupation Industry – Cisco Systems – Who Profits, accessed January 27, 2026, https://www.whoprofits.org/companies/company/6529?cisco-systems
- Israel Police – Distributed Denial of Secrets, accessed January 27, 2026, https://ddosecrets.com/article/israel-police
- Handala’s Wiper: Threat Analysis and Detections – Splunk, accessed January 27, 2026, https://www.splunk.com/en_us/blog/security/handalas-wiper-threat-analysis-and-detections.html
- Analytics Story: Handala Wiper | Splunk Security Content, accessed January 27, 2026, https://research.splunk.com/stories/handala_wiper/
- Cyber Proxy War in the Shadow of a U.S. Invasion of Iran | by SIMKRA | T3CH – Medium, accessed January 27, 2026, https://medium.com/h7w/cyber-proxy-war-in-the-shadow-of-a-u-s-invasion-of-iran-aeac95dd308f
- The Israeli Occupation Industry – Matrix IT – Who Profits, accessed January 27, 2026, https://www.whoprofits.org/companies/company/4009?matrix-it
- The Economic Exploitation of Palestinian Political Prisoners – | Addameer, accessed January 27, 2026, https://addameer.ps/sites/default/files/publications/final_report_red_2_0.pdf
- Cybersecurity Analyst Reskilling Program – Wawiwa Tech, accessed January 27, 2026, https://wawiwa-tech.com/programs/cyber/
- Department of Defense, DCOI/INSS USA-Isreal CyberSecurity Summitt, May 18, 2016 – OCR of the Document | National Security Archive, accessed January 27, 2026, https://nsarchive.gwu.edu/media/18585/ocr
- Billion Dollar Unicorns: Is Cybereason the Next Cyber Security Company to get Acquired?, accessed January 27, 2026, https://mkcybersecurity.com/billion-dollar-unicorns-is-cybereason-the-next-cyber-security-company-to-get-acquired/
- Platform Engineer I – BlueVoyant – Hello.cv, accessed January 27, 2026, https://hello.cv/jobs/share/377427139321876480
- Idan Buller – Personal Portfolio, accessed January 27, 2026, https://idanbuller.github.io/
- Yair Cohen | Co-Founder and VP Product – Sentra, accessed January 27, 2026, https://www.sentra.io/our-data-security-experts/yair-cohen
- Cybersecurity M&A Roundup: Cisco Closes Splunk Deal – Infosecurity Magazine, accessed January 27, 2026, https://www.infosecurity-magazine.com/news-features/mergers-acquisitions-march-2024/
- Security Orchestration, Automation, and Response Solutions Directory, accessed January 27, 2026, https://solutionsreview.com/security-information-event-management/security-orchestration-automation-and-response-solutions-directory/
- HLSCYBER 2020 Exhibitiors Goes VR Catalog – Industries – Foreign Trade Administration, accessed January 27, 2026, https://itrade.gov.il/usa/files/2020/09/HLSCYBER-2020-Exhibitiors-Goes-VR-Catalog-Industries.pdf
- Rule-ATT&CK Mapper (RAM): Mapping SIEM Rules to TTPs Using LLMs – arXiv, accessed January 27, 2026, https://arxiv.org/html/2502.02337v1