Understanding Israel Palestine

Understanding Israel Palestine: Beyond the Walls - "Cyberweaponry, Kill-Switch Diplomacy and the Technology of Occupation"


Listen Later

In anticipation of Voices from the Holy Land's upcoming October 19th online film salon "The Israel Occupation Tech Lab," we will hear a segment Jeremy Rothe-Kushel produced in December 2020 and then remixed for August 2021 titled "Cyberweaponry, Kill-Switch Diplomacy and the Technology of Occupation." To find out about and register for Voices from the Holy Land's October 19th "Israel Occupation Tech Lab" film salon, you can go to:  voicesfromtheholyland.org or http://Tinyurl.com/VFHL-October2025 ------ "In this week's segment, Jeremy Rothe-Kushel preliminarily explores the realm of cybertechnology and cyber weapons 'battle-tested' on Palestinian people in the Occupied Territories and then deployed worldwide. This will work also to begin establishing a foundation for further future explorations into cyber breaches, cyberwar, and what could seen as a geopolitical & defacto Israeli policy; a policy to solidify Israel's realpolitikally absolute international immunity from the effective sanctioning of its asserted official territorial expansion in the West Bank and Golan Heights, and its long-term ongoing abuse of Palestinian human rights: This geopolitical strategy could be titled "kill-switch diplomacy", based upon the presence of Israeli military intelligence originated hardware and software delivered via both civilian and military spheres, and deployed into the epicenter of critical infrastructure in countries around the world, with civil society carrots of access to Israeli high technology up front, and an implied threat of Israeli-military intelligence accessed infrastructure kill-switch sticks on the backend. The recently announced hack of SolarWinds Orion Network management software that was cyber-penetrated in early 2020 via supply side software update delivery into thousands of Information Technology systems around the world, including significant portions of the US government, such as the Pentagon, Secret Service, State Department, Treasury, Commerce and Homeland Security, and vast numbers of Fortune 500 companies, is both resonant and possibly relevant here. While we will not delve deeply into it now, I just want to mention that there is industry analysis alleging a Microsoft 365 Office Cloud tie-in to the delivery of the SolarWinds Orion exploit, plausibly tying it to the issue of last year's surprising Trump-pushed Pentagon Cloud Joint Enterprise Defense Infrastructure contract to Microsoft over the expected recipient and previous cloud partner of the US government Amazon, led by Trump-critic Jeff Bezos, who was also personally targeted and hacked by Saudis apparently using Israeli NSO group cyberweaponry. Microsoft, which has had Research and Design units, facilities and operations heavily based in Israel for many years, in 2015 purchased an Israeli-originated company Adallom, started by 3 veterans of the Israeli NSA Unit 8200 and cyber entrepreneurial special forces-style super-elite Talpiot Program with Series A investment funding from the "Bill Gates of Israel" and godfather of it's modern cybertechnology industry, Zohar Zisapel of the RAD Group.  The next year, and in the lead up to the development of the Pentagon Cloud project announcement and then contract award, Microsoft put Adallom in the place of and rebranded it as Microsoft Cloud App Security. And while the SolarWinds hack, described as possibly the most substantial hack in US history giving the exploiters of the intrusion "God door access", has been publicly and preliminarily ascribed to Russian SVR advanced persistent threat cyber intelligence units, as this show's earlier interview with New York Times best-selling author and journalist Seth Abramson showed, Russia and Israel worked in cyber purpose together in relation to the 2016 election operations that served to install Donald Trump in the White House. Thus, a potential collaboration or cyber alliance of some sort between Russian and Israeli leadership is not necessarily implausible nor off the table. But fin introducing this segment and its focus on Israeli cyber weapons company associates NSO group and Circles, that have mainly been deployed against individuals such as journalists, dissidents and corruption investigators, there are 2 ideas about this realm of cyber that I want to make explicit, both revolving around the fact this technology is being deployed via a military intelligence network of a garrison warfare state: 1) these are cyber weapons that were, what is called in marketing materials, battle-tested. In the case of this garrison state Israel, and its cyber weapons, that means that they have been tested in the battle for maintaining a long term violent occupation, which by many credible accountings is criminal under international law. These cyber weapons are literally, whether used for surveillance or targeting for what the Israeli ministry of strategic affairs calls civil assassination or for more blunt physical assassination, such as when Saudi dissident analyst Jamal Khashoggi was targeted for his ultimate dismemberment via the use of the Israeli military intelligence firm NSO group cyberweapon called Pegasus, technologies of occupation. 2) even when hardware and hardware are being deployed by this military intelligence network for apparent civilian commercial and/or defensive purposes, it remains technology of cyberwar developed by operatives and officers of the Israeli military and intelligence command structure. and thus the question of a backdoor military application or implication of diplomatic threat remains present" https://beyondthewalls.substack.com
...more
View all episodesView all episodes
Download on the App Store

Understanding Israel PalestineBy KKFI 90.1 FM Kansas City Community Radio