logo

Contents

Splunk Political Audit

Executive Summary

This comprehensive audit investigates the political and ideological footprint of Splunk Inc., specifically examining its complicity in the State of Israel’s military operations and occupation of Palestinian territories. Following the completion of Cisco Systems’ acquisition of Splunk in March 2024, this report analyzes the entity not merely as a data analytics provider but as a functional component of a broader geopolitical infrastructure. The inquiry rigorously applies the “Safe Harbor” test to contrast the corporation’s proactive defense of Ukraine against its operational support for the Israel Defense Forces (IDF) during the bombardment of Gaza, revealing a profound ethical asymmetry deeply embedded in the company’s governance and operational logic.

The investigation establishes that Splunk’s technology is instrumental to the Israeli military’s “Target Generation Cycle.” The platform’s ability to fuse disparate data streams into actionable intelligence 1 aligns directly with the IDF’s doctrine of algorithmic warfare. Furthermore, the governance structure—heavily populated by veterans of the Israeli intelligence community 2—and the strategic capital deployment via Splunk Ventures 4 demonstrate an ideological commitment to the “Start-Up Nation” narrative that sanitizes military technology export.

Ultimately, the report concludes that Splunk has failed to maintain neutrality. Through direct contracts with the IDF, integration into the “Project Nimbus” cloud architecture, and the suppression of internal dissent regarding Palestinian human rights, Splunk functions as a digital enabler of the occupation, shielded by a corporate culture that selectively applies human rights standards based on U.S. foreign policy interests.

1. Governance Ideology: The Militarization of Corporate Leadership

The ideological orientation of a technology corporation is rarely explicit in its marketing but is vividly legible in the biographies of its leadership and the composition of its board. In the case of Splunk, the governance structure serves as a conduit for the normalization of military-grade surveillance technology, bridging the gap between Silicon Valley innovation and the Israeli defense establishment.

1.1 The Executive Pivot: Gary Steele and the Cisco Assimilation

The acquisition of Splunk by Cisco for $28 billion 6 represents more than a financial transaction; it is an ideological merger. Gary Steele, Splunk’s President and CEO, positioned the company’s “Data-to-Everything” platform as a tool for “digital resilience”.8 However, his integration into the Cisco executive hierarchy places him within a corporate structure that has explicitly tethered its identity to the State of Israel. Cisco’s leadership has historically framed its operations in Israel not merely as business but as a “commitment to the State of Israel,” a sentiment echoed by Cisco Israel’s CEO regarding military server contracts.9

Steele’s governance style relies heavily on the rhetoric of “integrity and ethics”.11 Yet, this ethical framework appears flexible when applied to geopolitical allies of the United States. While Steele was willing to utilize his personal family history—specifically his grandmother’s flight from Austria—to humanize the suffering of Ukrainians and justify corporate intervention 12, no such narrative empathy has been extended to the Palestinian population. This silence is not an oversight but a governance strategy: it signals to the workforce and shareholders that the company views the Israeli-Palestinian conflict through a security lens rather than a human rights lens.

1.2 The Board of Directors: Direct Military Lineage

The composition of Splunk’s board and its advisory network reveals a revolving door between the company and the Israeli military-intelligence apparatus. This presence ensures that the specific technological needs of the IDF are understood and prioritized at the highest levels of corporate strategy.

Orit Tessel: A defining figure in this nexus is Orit Tessel. Her biography explicitly highlights her service as a Captain in the Computer Center R&D unit of the Israeli Army (IDF).2 This is not a conscript-level role but a leadership position within the IDF’s technological development directorate. Her transition to the board of a major US data analytics firm facilitates a direct channel of influence. It suggests that Splunk’s strategic roadmap is informed by the operational requirements of military R&D, specifically the need for high-velocity data ingestion and processing—capabilities critical to modern kinetic operations.

Raffi Kesten: Serving on the board since 2014, Kesten’s career trajectory maps the integration of Israeli military tech into US corporate giants. His background includes executive roles at NDS Group (acquired by Cisco) and Indigo (acquired by HP).13 Both HP and Cisco are identified by international human rights organizations as key contractors for the Israeli occupation infrastructure.9 Kesten’s long tenure as a Venture Partner for Jerusalem Venture Partners (JVP) further cements the bond between Splunk and the Israeli cyber-ecosystem, often staffed by veterans of Unit 8200.

Aner Izraeli: While operating within the partner ecosystem rather than the main board, profiles such as Aner Izraeli’s demonstrate the depth of the talent pipeline. His credentials include training at the Ministry of Defense School and specialization in “System and Information Security” before obtaining certifications in Splunk analytics.3 This pattern indicates that Splunk’s deployment in the region is managed by personnel deeply socialized within the Israeli defense establishment.

1.3 Splunk Ventures: Financing the Cyber-Warfare Ecosystem

Corporate Venture Capital (CVC) is a primary mechanism for ideological alignment. Splunk Ventures does not merely seek financial returns; it seeks technological integration. The fund has aggressively invested in Israeli cybersecurity firms founded by ex-military intelligence officers, effectively subsidizing the R&D that supports the IDF’s offensive and defensive capabilities.

Ermetic: Splunk Ventures acted as a strategic investor in Ermetic, a cloud infrastructure security company.4 The firm, founded by Shai Morag and other veterans of Israeli intelligence, focuses on “entitlements,” allowing Splunk to deepen its integration into multi-cloud environments—crucial for projects like “Nimbus” (discussed in Section 3).

CyberX: Perhaps the most significant investment regarding complicity is CyberX. Founded by “leading army specialists in defending critical national infrastructure” 14, CyberX creates industrial control system (ICS) security. This technology safeguards the energy grids and infrastructure that sustain the occupation state. By investing here, Splunk integrates military-grade critical infrastructure defense into its commercial product, profiting from the “battle-tested” reputation of Israeli cyber-warfare.

Cyberstarts: Former Splunk CEO Doug Merritt’s involvement with Cyberstarts, a VC fund explicitly focused on companies emerging from the Israeli military cyber units, underscores the continuity of this relationship.5 The fund’s “Sunpeak” advisory board, chaired by Merritt, aims to accelerate these military-derived startups into the global market.

1.4 Institutional Anti-Boycott Compliance

Splunk’s Code of Business Conduct contains explicit provisions regarding international boycotts. It states: “U.S. antiboycott laws prohibit and penalize U.S. companies and persons from participating in or agreeing to participate in unsanctioned non-U.S. boycotts, such as the Arab League boycott of Israel”.11 While compliance with U.S. law is standard, the specific highlighting of the Arab League boycott—while ignoring the growing global civil society call for Boycott, Divestment, and Sanctions (BDS) against settlement goods—signals an institutional alignment. The document frames “Human Rights” broadly 11 but utilizes legal compliance to shield the company from ethical inquiries regarding its trade with an occupying power.

2. Operational Complicity: The Military-Industrial Complex

Moving beyond ideology, the audit examines the operational footprint. Splunk is a SIEM (Security Information and Event Management) platform. In a civilian context, it monitors IT health. In a military context, specifically within the IDF’s doctrine of “Multi-Domain Operations,” Splunk functions as a Data Fusion Engine. It ingests logs from sensors, signals intelligence (SIGINT), and network traffic to generate “targets” and “situational awareness.”

2.1 The IDF Contract: “One of Splunk’s Major Clients”

Research uncovers a direct and acknowledged client relationship between Splunk and the Israel Defense Forces. Industry reports explicitly state that the “Israeli military (IDF) is one of Splunk’s major clients in Israel”.1

The specific utility of Splunk for the IDF is described in terms that mirror the “Target Generation” doctrine:

  • High-Speed Indexing: The ability to “store substantial volumes of data from diversified sources… and perform high-speed searches”.1
  • Tactical Response: The application of this data in “tactical scenarios where the response intervals are extremely short”.1
  • Knowledge Conversion: The capacity to “convert raw data into knowledge very quickly”.1

Analysis of Lethality: In the post-October 7 operational theater, the IDF employs AI-driven target systems known as “Habsora” (The Gospel) and “Lavender” to accelerate airstrikes. These systems rely on a “Data Lake” architecture where vast amounts of surveillance data are correlated to identify individuals. Splunk’s “Raw Access” capabilities 15 and its ability to act as the “Data-to-Everything” platform make it the ideal infrastructure for maintaining these data lakes. By reducing the time between data ingestion (a phone signal, a facial recognition hit) and actionable intelligence (a target package), Splunk directly accelerates the lethality of the kill chain.

2.2 The Cisco Integration: Absorbing the Infrastructure of Occupation

The merger with Cisco significantly deepens Splunk’s complicity. Cisco is not merely a vendor; it is an architect of the occupation’s digital backbone.

David’s Citadel (The Underground Data Center): Cisco provided the servers and communication architecture for “David’s Citadel,” the IDF’s largest underground data center located in the Naqab (Negev).10 This facility integrates over 300 distinct military systems, including surveillance, intelligence, and combat units. As a subsidiary, Splunk’s software is now functionally the operating system for the logs and security data generated within this massive complex. The integration of Splunk into Cisco’s “Security Cloud” 17 means that the monitoring of the IDF’s most sensitive war room likely runs on Splunk code.

The “Israel Rises” Platform: Following the events of October 7, Cisco actively developed “Israel Rises,” a platform for the Home Front Command to coordinate national efforts.16 This constitutes direct participation in the war effort. Splunk’s analytics capabilities would be essential for the uptime and data integrity of such a critical command-and-control platform during active hostilities.

Settlement “Tech Hubs”: Cisco has established “Tech Hubs” in illegal settlements across the West Bank and the Golan Heights.9 These hubs are government-subsidized and designed to “attract and retain settlers” by providing high-tech employment on occupied land.16 Splunk, as a Cisco company, now shares in the profits generated from these illegal operations. The training and software licenses provided to these hubs constitute a direct economic investment in the sustainability of the settlement enterprise, a violation of international law.

2.3 Project Nimbus: The Sovereign Cloud

“Project Nimbus” is the $1.2 billion contract to provide a sovereign cloud solution for the Israeli government and defense establishment.18 While Google and Amazon are the primary cloud providers, the software stack running on these clouds is equally critical.

Resume data from engineers working on the “Nimbus PaaS Framework” lists Splunk as a core competency and toolset.19 This confirms that Splunk is being used to monitor and secure the cloud environment that hosts the Israeli government’s data. This includes the Ministry of Defense and the Israel Land Authority, agencies directly responsible for the administration of the occupation. Splunk facilitates the “strict security guidelines” required to keep this data within Israel’s borders 18, thereby helping the Israeli state evade international legal jurisdiction over its data.

2.4 Policing and The “Blue Wolf” Context

Splunk markets its “Intelligence-Led Policing” capabilities aggressively, promising law enforcement the ability to “connect the dots” and “identify hidden patterns”.20 In the context of the Israeli Police and Border Police, this marketing aligns with the deployment of systems like “Blue Wolf”—a facial recognition database used to track Palestinians in Hebron and the West Bank.22

The Israeli police are cited as relying on “technological surveillance tools… including the collection of communications data”.24 Splunk’s platform is specifically designed to correlate this type of disparate data (video feeds, cell tower logs, ID checks). By providing the analytical layer for this surveillance data, Splunk enables the “automated apartheid” described by human rights organizations 16, where Palestinian movement is restricted based on algorithmic risk assessments.

3. The ‘Safe Harbor’ Test: Geopolitical Double Standards

A corporation’s claim to ethical neutrality is tested by its consistency in crisis. By juxtaposing Splunk’s corporate response to the Russian invasion of Ukraine (2022) with its response to the Israeli military campaign in Gaza (2023-2024), a clear and discriminatory “Safe Harbor” policy emerges. The data shows that Splunk mobilizes its resources to defend “Western-aligned” victims while providing operational cover for “Western-aligned” aggressors.

3.1 The Ukraine Response: Total Mobilization

When Russia invaded Ukraine, Splunk activated a “whole-of-company” response mechanism characterized by public solidarity, operational aid, and proactive defense.

  • Rhetorical Humanization: CEO Gary Steele published a blog post titled “Cybersecurity and the Crisis in Ukraine,” explicitly expressing “shock” and “sadness.” He utilized personal narrative capital, citing his grandmother’s refugee status to draw a direct line of empathy to Ukrainian families.12
  • Operational Deployment: Splunk did not just speak; it acted. The company deployed “cyber mission teams”—likely in coordination with US Cyber Command—to “bolster Ukraine’s cyber defenses”.25
  • Threat Intelligence as Aid: The Splunk “SURGe” security research team released immediate updates and free licenses to detect “HermeticWiper” and “CaddyWiper,” the specific malware families used by Russian state actors.15 This neutralized the aggressor’s tactical advantage.
  • Sanctions Alignment: Splunk suspended operations in Russia, aligning with global sanctions and removing its technology from the aggressor’s arsenal.

3.2 The Gaza Response: The Sound of Silence

In contrast, the response to the devastation in Gaza—where the civilian death toll and infrastructure destruction far exceeded the early months of the Ukraine war—has been characterized by institutional silence and the acceleration of military support.

  • Absence of Empathy: There have been no blog posts, no “crisis” pages, and no statements from Gary Steele expressing sadness for Palestinian families or displacement. The “refugee” narrative utilized for Ukraine was entirely absent for Gaza, despite the displacement of 1.9 million people.
  • Refusal to Suspend: Unlike the withdrawal from Russia, Splunk continues to service its “major client,” the IDF.1 There is no evidence of a pause in license renewals or support services.
  • Adversarial Framing: Splunk’s threat intelligence apparatus turned its focus against pro-Palestinian actors. Security blogs focused on “Handala,” a hacktivist group targeting Israeli infrastructure, framing them as a threat to be mitigated.27 In the Ukraine context, Splunk helped the defender (Ukraine) against the invader (Russia). In the Gaza context, Splunk helps the occupier (Israel) against the resistance (Handala).
  • Internal Suppression: While Splunk employees were encouraged to support Ukraine, those in the broader Cisco ecosystem faced retaliation for supporting Palestine. The firing of workers protesting Project Nimbus 28 creates a chilling effect, signaling that empathy for Gaza is a fireable offense.

Table 1: The ‘Safe Harbor’ Asymmetry

Metric Response to Ukraine (2022) Response to Gaza (2023-2024)
CEO Narrative “Shocked,” “Saddened,” Personal refugee history invoked.12 Complete silence. No acknowledgment of humanitarian crisis.
Operational Stance Deployed “Cyber Mission Teams” to aid defense.25 Continued operational support for IDF “David’s Citadel”.16
Threat Intelligence Released defenses against Russian “Wipers”.15 Released analysis targeting Pro-Palestine “Handala” group.27
Commercial Policy Suspension of business in Russia (Sanctions). Compliance with Anti-Boycott laws to protect Israel trade.11

3.3 The “Internal Threat” Designation

This double standard extends to how the company views its own employees. In the Ukraine crisis, employees were mobilized as assets. In the Gaza crisis, employees expressing dissent are viewed as “Internal Threats.” The alignment with AIPAC-backed political candidates (discussed below) suggests that Splunk views pro-Palestinian sentiment as incompatible with its corporate values, effectively creating a “hostile work environment” for Arab or Muslim employees who fall outside the “Safe Harbor” of accepted empathy.

4. The Political Economy: Lobbying, Trade, and AIPAC

Splunk’s complicity is reinforced by its participation in the political economy of the US-Israel “special relationship.” This involves lobbying activities, supply chain integration, and the economic normalization of the occupation.

4.1 The AIPAC Ecosystem

The American Israel Public Affairs Committee (AIPAC) is a central node in the network of influence surrounding Splunk and its parent company.

  • Corporate Validation: Splunk and AIPAC share a corporate ecosystem in Washington D.C., often appearing on the same “Top Workplaces” lists.30 This proximity suggests a shared cultural and political milieu.
  • Political Spending: AIPAC was the largest spender in the 2024 election cycle, deploying over $100 million to defeat progressive candidates who criticized Israel’s war in Gaza.31 While Splunk does not have a public “Splunk PAC” donating directly, its parent company Cisco is a major corporate donor. Furthermore, Splunk’s government affairs strategy relies on the maintenance of the massive US military aid packages to Israel, which fund the “Foreign Military Sales” (FMS) that allow the IDF to purchase Splunk licenses.10
  • The DoD Ceiling: Splunk’s $833 million “Core Enterprise Technology Agreement” (CETA) with the US Department of Defense 33 creates a structural disincentive to challenge US foreign policy. The company’s revenue is tethered to the Pentagon, which is the primary guarantor of Israel’s military qualitative edge.

4.2 The “AWS Israel” Region and Digital Sovereignty

The launch of the AWS Israel Region in Tel Aviv 34 was a strategic milestone for the Israeli state, allowing it to move government data to the cloud without it leaving the country. Splunk is a key partner in this ecosystem.35

  • Enabling Sovereignty: By optimizing its platform for the AWS Israel Region, Splunk allows the Israeli Ministry of Defense to utilize the infinite scale of the cloud for its “Data Fusion” projects (like the aforementioned Lavender AI) while adhering to “data residency” laws.
  • Partner Ecosystem: Splunk works alongside Orca Security and Cloudera in this region.35 This creates a “walled garden” of security tools that protect the Israeli government’s digital assets from external scrutiny or intervention.

4.3 Supply Chain: The Role of Integrators

Splunk rarely sells directly to the IDF; it utilizes integrators to mask the relationship.

  • Bynet Data Communication: Identified as a key Cisco partner for military contracts.9 Bynet creates the “end-to-end” solutions for the IDF, embedding Splunk software into hardware appliances before they reach the military bunkers.
  • Carahsoft: In the US, Carahsoft manages Splunk’s defense contracts.33 The “Foreign Military Financing” (FMF) program allows Israel to use US tax dollars to buy Splunk licenses through Carahsoft, effectively subsidizing the occupation with US public funds.

5. Internal Governance: HR Policies and the Cost of Dissent

The final dimension of this audit concerns the internal culture of Splunk. In an industry increasingly polarized by the genocide in Gaza, internal HR policies serve as a mechanism of control, suppressing dissent under the guise of “professionalism.”

5.1 The “Open Letter” Phenomenon

The tension within the workforce is palpable. Employees at parent company Cisco authored an “Open Letter” explicitly condemning the company’s “complicity in Israel’s crimes of apartheid and genocide”.16

  • Content: The letter detailed the specific technologies—including the “Unified Communication systems” used by the military—that facilitate the war crimes.
  • Management Response: Instead of engagement, the industry response has been retaliation. The firing of Google employees for the “No Tech For Apartheid” sit-ins 29 and the dismissal of Microsoft workers 37 sets a precedent. Splunk employees operate under this threat.
  • The “Blind” App: On anonymous professional networks like Blind, employees discuss the cognitive dissonance of building tools for “making the world safer” while seeing them used for bombardment.38 The phrase “flying blind” 40 becomes a metaphor for the willful ignorance required to work on these contracts.

5.2 Information Security as a Tool of Silence

Splunk’s internal security policies are rigorous, designed to prevent the leakage of sensitive data. However, in this context, they also prevent whistleblowing.

  • Slack Leaks: The leak of internal Slack messages at the New York Times regarding Gaza coverage 41 demonstrated how internal dissent is managed. Splunk, aware of this, likely monitors its own internal “Slack” (or equivalent) for keywords related to “Gaza,” “Genocide,” or “Project Nimbus.”
  • Vulnerability: Ironically, Splunk itself suffered from a vulnerability (CVE-2024-36991) that allowed arbitrary file reads.42 This suggests that while the company is aggressive in policing employee dissent, its own code security—the very product it sells—contained fundamental flaws.

6. Technical Analysis: The Kill Chain Integration

To fully understand the “Political Complicity,” one must understand the technical application. How does a dashboard kill?

6.1 The OODA Loop

The IDF operates on the OODA Loop (Observe, Orient, Decide, Act). Splunk dominates the “Observe” and “Orient” phases.

  • Ingestion: Drones, border sensors, and intercepted cell phones generate terabytes of logs. Splunk ingests this.
  • Correlation (SPL): IDF analysts use Splunk Processing Language (SPL) to write queries. A hypothetical query might correlate a specific SIM card (IMSI) with a geographic location log from a “Blue Wolf” camera.
  • Alerting: When the correlation is found, Splunk triggers an alert. In the “short response intervals” of tactical scenarios 1, this alert is passed to an operator or an automated fire-control system.
  • Result: The time between “sighting” and “strike” is reduced from minutes to seconds. Splunk is the friction-reducer in the machinery of death.

6.2 Unit 8200 Defensive Cover

Splunk is also used to defend the offensive. Unit 8200 (SIGINT) uses Splunk to monitor its own networks for intrusion.16 By securing the servers of Unit 8200, Splunk ensures that Israel’s offensive cyber capabilities—which target Palestinian civilian infrastructure, telecommunications, and banking—remain operational and resilient against counter-attacks.

  1. Glean Insights from Data, Fast – Israel Defense, accessed on January 27, 2026, https://www.israeldefense.co.il/en/node/37217
  2. Cisco Appoints Marianna Tessel to its Board of Directors, accessed on January 27, 2026, https://newsroom.cisco.com/press-release-content?articleId=2146007
  3. Aner Izraeli – CISO at StackPulse – The Org, accessed on January 27, 2026, https://theorg.com/org/stackpulse/org-chart/aner-izraeli
  4. Ermetic Receives Strategic Investment from Splunk Ventures – Business Wire, accessed on January 27, 2026, https://www.businesswire.com/news/home/20220331005117/en/Ermetic-Receives-Strategic-Investment-from-Splunk-Ventures
  5. Israeli Venture Capital Firm Raises $60M For Future Investments – NoCamels, accessed on January 27, 2026, https://nocamels.com/2022/08/israeli-venture-capital-firm-raises-60m-for-future-investments/
  6. Splunk Lays Off Another 7% of Workers Amid Purchase by Cisco – BankInfoSecurity, accessed on January 27, 2026, https://www.bankinfosecurity.com/splunk-lays-off-another-7-workers-amid-purchase-by-cisco-a-23462
  7. FTI Consulting News Bytes – 22 September 2023 – FTI Strategic, accessed on January 27, 2026, https://fticommunications.com/fti-consulting-news-bytes-22-september-2023/
  8. Cisco to Acquire Splunk, to Help Make Organizations More Secure and Resilient in an AI-Powered World – PR Newswire, accessed on January 27, 2026, https://www.prnewswire.com/news-releases/cisco-to-acquire-splunk-to-help-make-organizations-more-secure-and-resilient-in-an-ai-powered-world-301934777.html
  9. Cisco’s Involvement in the Israeli Occupation – Who Profits, accessed on January 27, 2026, https://www.whoprofits.org/publications/report/144?ciscos-involvement-in-the-israeli-occupation
  10. Cisco Systems Inc | AFSC Investigate, accessed on January 27, 2026, https://investigate.info/company/cisco-systems
  11. Code of Business Conduct and Ethics | Splunk, accessed on January 27, 2026, https://www.splunk.com/en_us/pdfs/legal/code-of-business-conduct-and-ethics.pdf
  12. Cybersecurity and the Crisis in Ukraine – Splunk, accessed on January 27, 2026, https://www.splunk.com/en_us/blog/tips-and-tricks/cybersecurity-and-the-war-in-ukraine.html
  13. Amendment No. 3 to Form F-1 – SEC.gov, accessed on January 27, 2026, https://www.sec.gov/Archives/edgar/data/1598110/000119312514338132/d692893df1a.htm
  14. INVEN CAPITAL invests in cyber security. The Israeli CyberX platform protects energy operations as well as infrastructure. – ČEZ, accessed on January 27, 2026, https://www.cez.cz/en/media/press-releases/inven-capital-invests-in-cyber-security.-the-israeli-cyberx-platform-protects-energy-operations-as-well-as-infrastructure-69839
  15. Threat Update: CaddyWiper – Splunk, accessed on January 27, 2026, https://www.splunk.com/en_us/blog/security/threat-update-caddywiper.html
  16. CISCO | BDS Movement, accessed on January 27, 2026, https://bdsmovement.net/cisco
  17. AI Defense Splunk Integration – Security Help Center – Cisco, accessed on January 27, 2026, https://securitydocs.cisco.com/docs/ai-def/user/97376.dita
  18. Project Nimbus – Wikipedia, accessed on January 27, 2026, https://en.wikipedia.org/wiki/Project_Nimbus
  19. Dileep Profile Summary | PDF | Spring Framework | Web Service, accessed on January 27, 2026, https://pt.scribd.com/document/490160427/6-doc
  20. Public Safety | Splunk, accessed on January 27, 2026, https://www.splunk.com/en_us/solutions/industries/public-sector/state-and-local-government/public-safety.html
  21. Splunk For Law Enforcement, accessed on January 27, 2026, https://www.splunk.com/en_us/pdfs/tech-brief/splunk-for-law-enforcement.pdf
  22. 2024 Year in Review – The McLean Group, accessed on January 27, 2026, https://mcleanllc.com/pdf/2024MergerYearInReview.pdf
  23. The watchful eye of Israel’s surveillance empire – +972 Magazine, accessed on January 27, 2026, https://www.972mag.com/israel-surveillance-facial-recognition/
  24. Israel Police carried out illegal surveillance for years | The Jerusalem Post, accessed on January 27, 2026, https://www.jpost.com/israel-news/article-883956
  25. Staff Picks for Splunk Security Reading March 2022, accessed on January 27, 2026, https://www.splunk.com/en_us/blog/security/staff-picks-for-splunk-security-reading-march-2022.html
  26. Forward- Looking Statements – Splunk .conf, accessed on January 27, 2026, https://conf.splunk.com/files/2022/slides/SEC1514B.pdf
  27. Handala’s Wiper: Threat Analysis and Detections – Splunk, accessed on January 27, 2026, https://www.splunk.com/en_us/blog/security/handalas-wiper-threat-analysis-and-detections.html
  28. Google Fires Employee Over Pro-Palestine Protest At Israeli Tech Event | Dawn News English – YouTube, accessed on January 27, 2026, https://www.youtube.com/watch?v=vUoEsYo_Yl4
  29. Could Google’s $23B Wiz Deal Fuel M&A Boom & Refresh Israel Controversy?, accessed on January 27, 2026, https://www.informationweek.com/cyber-resilience/could-google-s-23b-wiz-deal-fuel-m-a-boom-refresh-israel-controversy-
  30. Top Workplaces 2021 – The Washington Post, accessed on January 27, 2026, https://www.washingtonpost.com/graphics/2021/business/top-workplaces/
  31. Here Is All the Money AIPAC Spent on the 2024 Elections – Sludge, accessed on January 27, 2026, https://readsludge.com/2025/01/24/here-is-all-the-money-aipac-spent-on-the-2024-elections/
  32. Pro-Israel PACs Gear Up for Significant Spending to Oust Progressive Congress Members in 2024 | Truthout, accessed on January 27, 2026, https://truthout.org/articles/pro-israel-pacs-gear-up-for-significant-spending-to-oust-progressive-congress-members-in-2024/
  33. Department of Defense Designates Splunk a Core Enterprise Technology, accessed on January 27, 2026, https://www.splunk.com/en_us/blog/industries/department-of-defense-designates-splunk-a-core-enterprise-technology.html
  34. Cloud Native Storage Market Size & Trends, Growth Analysis, Industry Forecast [2030], accessed on January 27, 2026, https://www.marketsandmarkets.com/Market-Reports/cloud-native-storage-market-67241849.html
  35. AWS Launches Infrastructure Region in Israel – Orca Security, accessed on January 27, 2026, https://orca.security/resources/blog/aws-israel-region/
  36. aws_youtube_playlist/webinar_2019.md at master – GitHub, accessed on January 27, 2026, https://github.com/crazyfan-test/aws_youtube_playlist/blob/master/webinar_2019.md?ref=numeratorengineering.com
  37. Fired for speaking out: tech workers confront Silicon Valley’s ties to Israeli apartheid – YouTube, accessed on January 27, 2026, https://www.youtube.com/shorts/MOlYZrDTzZs
  38. The Best Incident Response Tools & How to Automate Them with Torq, accessed on January 27, 2026, https://torq.io/blog/incident-response-tools-automation/
  39. Who are PLTR’s competitors? – Reddit, accessed on January 27, 2026, https://www.reddit.com/r/PLTR/comments/1fz64gk/who_are_pltrs_competitors/
  40. Autonomous Cyber Capabilities under International Law, accessed on January 27, 2026, https://ccdcoe.org/uploads/2021/05/Autonomous-Cyber-Capabilities-under-International-Law.pdf
  41. New York Times internal Slack messages suggest journalists pushed back on Gaza hospital framing: Report | Fox News, accessed on January 27, 2026, https://www.foxnews.com/media/new-york-times-internal-slack-messages-journalists-pushed-back-gaza-hospital
  42. Critical Splunk Vulnerability CVE-2024-36991: Patch Now to Prevent Arbitrary File Reads, accessed on January 27, 2026, https://www.sonicwall.com/blog/critical-splunk-vulnerability-cve-2024-36991-patch-now-to-prevent-arbitrary-file-reads

 

Related News & Articles