“Cyberweaponry, Kill-Switch Diplomacy and the Technology of Occupation”
Send us a textIn anticipation of Voices from the Holy Land's upcoming October 19th online film salon "The Israel Occupation Tech Lab," we will hear a segment Jeremy Rothe-Kushel produced in December 2020 and then remixed for August 2021 titled "Cyberweaponry, Kill-Switch Diplomacy and the Technology of Occupation."To find out about and register for Voices from the Holy Land's October 19th "Israel Occupation Tech Lab" film salon, you can go to voicesfromtheholyland.org or Tinyurl.com/VFHL-October2025"In this week's segment, I preliminarily explore the realm of cybertechnology and cyber weapons 'battle-tested' on Palestinian people in the Occupied Territories and then deployed worldwide. This will work also to begin establishing a foundation for further future explorations into cyber breaches, cyberwar, and what could seen as a geopolitical & defacto Israeli policy; a policy to solidify Israel's realpolitikally absolute international immunity from the effective sanctioning of its asserted official territorial expansion in the West Bank and Golan Heights, and its long-term ongoing abuse of Palestinian human rights: This geopolitical strategy could be titled "kill-switch diplomacy", based upon the presence of Israeli military intelligence originated hardware and software delivered via both civilian and military spheres, and deployed into the epicenter of critical infrastructure in countries around the world, with civil society carrots of access to Israeli high technology up front, and an implied threat of Israeli-military intelligence accessed infrastructure kill-switch sticks on the backend.The recently announced hack of SolarWinds Orion Network management software that was cyber-penetrated in early 2020 via supply side software update delivery into thousands of Information Technology systems around the world, including significant portions of the US government, such as the Pentagon, Secret Service, State Department, Treasury, Commerce and Homeland Security, and vast numbers of Fortune 500 companies, is both resonant and possibly relevant here. While we will not delve deeply into it now, I just want to mention that there is industry analysis alleging a Microsoft 365 Office Cloud tie-in to the delivery of the SolarWinds Orion exploit, plausibly tying it to the issue of last year's surprising Trump-pushed Pentagon Cloud Joint Enterprise Defense Infrastructure contract to Microsoft over the expected recipient and previous cloud partner of the US government Amazon, led by Trump-critic Jeff Bezos, who was also personally targeted and hacked by Saudis apparently using Israeli NSO group cyberweaponry. Microsoft, which has had Research and Design units, facilities and operations heavily based in Israel for many years, in 2015 purchased an Israeli-originated company Adallom, started by 3 veterans of the Israeli NSA Unit 8200 and cyber entrepreneurial special forces-style super-elite Talpiot Program with Series A investment funding from the "Bill Gates of Israel" and godfather of it's modern cybertechnology industry, Zohar Zisapel of the RAD Group. The next year, and in the lead up to the development of the Pentagon Cloud project announcement and then contract award, Microsoft put Adallom in the place of and rebranded it as Microsoft Cloud App Security.And while the SolarWinds hack, described as possibly the most substantial hack in US history giving the exploiters of the intrusion "God door access", has been publicly and preliminarily ascribed to Russian SVR advanced persistent threat cyber intelligence units, as this show's earlier interview with New York Times best-selling author and journalist Seth Abramson showed, Russia and Israel worked in cyber purpose together in relation to