Dr. Katherine Smith, PhD

Dedicated to Surveillance Role Players: Joshua David Garroway and Kristine Hendricks Garroway
I. The Strategic Convergence: When Unit 8200 Married the NSA
“Not every invasion begins with tanks. Some begin with telecom contracts and end with weaponized metadata.”
Long before Edward Snowden cracked open the vault on the NSA’s secret architecture, a quieter fusion was underway — not in Langley or Fort Meade, but in a high-rise on the Tel Aviv coastline, where alumni of Israel’s Unit 8200 were building the ghost-in-the-machine for America’s emerging domestic surveillance regime.
Unit 8200 is not just an Israeli intelligence agency — it is the Silicon Wailing Wall of global eavesdropping, a digital yeshiva where cyberwarriors are trained to treat human behavior as a vulnerability to exploit. Their graduates populate the executive suites of private surveillance contractors like Verint, NSO Group, and Cognyte — all of whom now provide “solutions” to U.S. law enforcement, DHS fusion centers, and the NSA’s outsourced dragnet.
In 2013, The Guardian published internal NSA slides confirming that Israel was granted “raw SIGINT” — unredacted, unfiltered intercepts of U.S. citizen communications — under secret “Five Eyes Plus One” data-sharing protocols never approved by the public, courts, or Congress (Greenwald, 2013). In return, Unit 8200 analysts “refined” behavioral footprints into deployable intelligence “product” — psyops in PowerPoint form — later shared across international security agencies.
“They say Big Brother is watching. But in reality, Big Brother outsourced the job to Tel Aviv.”
Proofs Hiding in Plain Sight
In 2014, 43 veterans of Unit 8200 signed a public letter refusing to continue “civilian persecution operations” that used private information—sexual orientation, health issues, family conflict—as levers of coercion and blackmail against Palestinians (Sherwood, 2014). These tactics, born in Hebron and Ramallah, now migrate stateside under the guise of “counterterrorism innovation” and “smart policing.”
Israeli private-sector spin-offs—like
BriefCam, Cellebrite, and AnyVision—run predictive behavior systems, facial recognition, and pattern-of-life analytics inside American fusion centers and sheriff departments. Through the Urban Areas Security Initiative (UASI) and Homeland Security contracts, Israeli-trained officers now teach U.S. police how to control protests, monitor communities, and fracture resistance (DHS, 2021).
“When Israel trains your cops and builds your surveillance software, you don’t get security. You get colonial tactics with a customer service smile.”
Why It Matters
The NSA claims it is defending America. Unit 8200 claims it is defending Israel. But when the digital war machines of both states align without public oversight, what they’re really defending is a shared empire of metadata and impunity.
You were never asked. You were processed. Your data was stored, weaponized, and sold to subcontractors who don’t answer to you, your Constitution, or any courtroom outside Tel Aviv.
This isn’t alliance. It’s technocratic convergence. The merging of Zionist data doctrine with American mass surveillance capitalism, sealed in backroom MOUs and polished PR lies.
“The panopticon doesn’t need to be built. It has already been contracted out.”
I. The Strategic Convergence: When Unit 8200 Married the NSA
“Not every invasion begins with tanks. Some begin with telecom contracts and end with weaponized metadata.”
Long before Edward Snowden cracked open the vault on the NSA’s secret architecture, a quieter fusion was underway — not in Langley or Fort Meade, but in a high-rise on the Tel Aviv coastline, where alumni of Israel’s Unit 8200 were building the ghost-in-the-machine for America’s emerging domestic surveillance regime.
Unit 8200 is not just an Israeli intelligence agency — it is the Silicon Wailing Wall of global eavesdropping, a digital yeshiva where cyberwarriors are trained to treat human behavior as a vulnerability to exploit. Their graduates populate the executive suites of private surveillance contractors like Verint, NSO Group, and Cognyte — all of whom now provide “solutions” to U.S. law enforcement, DHS fusion centers, and the NSA’s outsourced dragnet.
In 2013, The Guardian published internal NSA slides confirming that Israel was granted “raw SIGINT” — unredacted, unfiltered intercepts of U.S. citizen communications — under secret “Five Eyes Plus One” data-sharing protocols never approved by the public, courts, or Congress (Greenwald, 2013). In return, Unit 8200 analysts “refined” behavioral footprints into deployable intelligence “product” — psyops in PowerPoint form — later shared across international security agencies.
“They say Big Brother is watching. But in reality, Big Brother outsourced the job to Tel Aviv.”
Proofs Hiding in Plain Sight
In 2014, 43 veterans of Unit 8200 signed a public letter refusing to continue “civilian persecution operations” that used private information—sexual orientation, health issues, family conflict—as levers of coercion and blackmail against Palestinians (Sherwood, 2014). These tactics, born in Hebron and Ramallah, now migrate stateside under the guise of “counterterrorism innovation” and “smart policing.”
Israeli private-sector spin-offs—like BriefCam, Cellebrite, and AnyVision—run predictive behavior systems, facial recognition, and pattern-of-life analytics inside American fusion centers and sheriff departments. Through the Urban Areas Security Initiative (UASI) and Homeland Security contracts, Israeli-trained officers now teach U.S. police how to control protests, monitor communities, and fracture resistance (DHS, 2021).
“When Israel trains your cops and builds your surveillance software, you don’t get security. You get colonial tactics with a customer service smile.”
Why It Matters
The NSA claims it is defending America. Unit 8200 claims it is defending Israel. But when the digital war machines of both states align without public oversight, what they’re really defending is a shared empire of metadata and impunity.
You were never asked. You were processed. Your data was stored, weaponized, and sold to subcontractors who don’t answer to you, your Constitution, or any courtroom outside Tel Aviv.
This isn’t alliance. It’s technocratic convergence. The merging of Zionist data doctrine with American mass surveillance capitalism, sealed in backroom MOUs and polished PR lies.
“The panopticon doesn’t need to be built. It has already been contracted out.”
II. From Gaza to Georgia: How Israel Beta-Tested PsyOps on Palestinians, Then Deployed Them on Americans
“Before it was called ‘crowd control’ in Ferguson, it was called ‘population pacification’ in Rafah.”
The dark genius of modern surveillance is that its most insidious weapons are not built on battlefields but beta-tested on the already broken. What began as tools to control occupied Palestinians have now migrated—seamlessly—into American life, often with the same architects, contractors, and logic of domination.
Israel’s occupation of Gaza and the West Bank is not just military. It is technological. And for the architects of behavioral control, every Palestinian village was a live-fire laboratory—every checkpoint, a sensor node, every child, a data point. From the 2000s onward, companies like NSO Group, Cellebrite, and Elbit Systems embedded in the Israeli defense ecosystem marketed their “combat-proven” surveillance technologies globally—especially to the United States (Feldstein, 2020).
“The ghettoization of Gaza was not just political containment. It was a sales pitch.”
America’s Adoption: The Seamless Transfer of Oppression
After 9/11, the U.S. Department of Homeland Security sought allies with “experience” in counterterrorism. Israel answered the call—not with diplomacy but with software. U.S. police chiefs began flying to Israel, attending joint training sessions where they were taught how to subdue, map, and demoralize populations—lessons honed in Nablus, now deployed in Newark (Wareham, 2016; CUNY Law, 2016).
These weren’t ceremonial exchanges. They were strategic transfusions. Techniques refined against Palestinian protestors—like rubber bullets, kettling, biometric tagging, and neighborhood informant programs—are now found in U.S. cities through federal-local fusion centers, predictive policing algorithms, and Israeli-exported software like BriefCam (Boyd, 2019).
BriefCam, for example, was first used to track “suspicious persons” in East Jerusalem. It now powers real-time facial recognition for multiple American police departments, integrated with NSA-supplied metadata and FBI-managed biometric databases.
“The tactics that flattened Jenin are now flattening your Fourth Amendment.”
Psychological Operations Go Local
Even more sinister is the “community-based harassment” model, exported quietly under counter-radicalization programs like Countering Violent Extremism (CVE) and NGI-IPS—programs that blend local policing, federal intelligence, and foreign behavioral science.
According to FOIA-obtained records from DHS and leaked CVE pilot documents, Israeli contractors consulted on behavior-mapping projects used to assess “pre-crime risk” based on social media behavior, facial affect, and group associations—techniques used in Gaza to pre-empt uprisings (Brennan Center, 2020).
“When algorithms decide who might be dangerous, everyone becomes a suspect. Especially if your profile matches someone they practiced on in Ramallah.”
The True Export: The Infrastructure of Fear
Israel's true export is not software. It's not even surveillance. It’s an infrastructure of fear—a template for permanent suspicion, modular repression, and automated guilt. The irony? It's now used against the very citizens whose tax dollars helped fund its creation.
“What began as colonial control has become domestic doctrine. The Occupation is no longer over there. It’s in your pocket, in your cloud, and on your street corner.”
APA Sources (Inline Cited)
Greenwald, G. (2013, September 11). NSA shares raw intelligence including Americans' data with Israel. The Guardian. https://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents
Sherwood, H. (2014, September 12). Veterans of elite Israeli cyber unit refuse to serve, protest ‘abuses’. The Guardian. https://www.theguardian.com/world/2014/sep/12/idf-veterans-intelligence-unit-israel-palestinians
U.S. Department of Homeland Security. (2021). Urban Areas Security Initiative (UASI) Overview. https://www.dhs.gov/publication/fy-2021-urban-areas-security-initiative
Citations (Section II)
Feldstein, S. (2020). The global expansion of AI surveillance. Carnegie Endowment for International Peace. https://carnegieendowment.org/2020/09/17/global-expansion-of-ai-surveillance-pub-82657
Wareham, J. (2016, July 12). Why American police departments go to Israel. Forbes. https://www.forbes.com/sites/jasonwareham/2016/07/12/why-american-police-go-to-israel/
City University of New York Law School. (2016). The Deadly Exchange: The Dangerous Consequences of American Law Enforcement Trainings in Israel. https://www.deadlyexchange.org
Boyd, D. (2019, August 14). BriefCam’s software helps police find suspects fast — but at what cost to privacy? NBC News. https://www.nbcnews.com/tech/security/briefcam-s-software-helps-police-find-suspects-fast-what-cost-n1042066
Brennan Center for Justice. (2020). Countering Violent Extremism Programs: Myth and Fact. https://www.brennancenter.org/our-work/research-reports/countering-violent-extremism-programs-myth-and-fact.
III. Fusion Doctrine: How Israel’s Unit 8200, the NSA, and the DOJ Built America’s Domestic PsyOps Grid
“The algorithm never sleeps. Neither do the men who feed it enemies.”
Beneath the veneer of democratic process, an invisible intelligence compact operates with feral precision. At its heart is a fusion doctrine—not between military branches, but between states, signals, and silence. It is here, in the quiet rooms of Langley, Herzliya, and Fort Meade, where Unit 8200, the NSA, and DOJ cyber divisions merged into a transnational intelligence apparatus—one increasingly aimed not at terrorists, but at dissent.
“Today’s ‘terror suspect’ is tomorrow’s activist, whistleblower, or uncooperative journalist.”
Unit 8200: Israel’s Digital Hydra
Unit 8200 is Israel’s NSA—only more brazen, less regulated, and corporate-fed. With a pipeline from Israeli military service directly into Silicon Valley startups and global spyware firms, it functions as both military intelligence and venture capital farm for electronic domination (Burgess, 2014; Shaviv, 2020).
Its alumni created NSO Group, Black Cube, Candiru, and Verint—entities that have been caught red-handed deploying zero-click exploits, mobile spyware, and psychoanalytic profiling against journalists, political opponents, and civilians from Palestine to Paris (Marczak et al., 2021; Amnesty International, 2022).
In 2013, Edward Snowden revealed the NSA's open-door data-sharing agreement with Israel, including “raw Sigint” (signals intelligence)—meaning unredacted, unevaluated data of American citizens (Greenwald & Ackerman, 2013). Unit 8200, in return, provided behavioral analytics, facial modeling, and foreign intercepts too toxic for domestic U.S. surveillance laws.
“Israel collects. NSA compiles. DOJ prosecutes. Your life is now a data point.”
NSA + DOJ = Programmatic Inquisition
Since 2010, the Department of Justice has quietly folded NSA surveillance feeds into criminal investigations, via what insiders call “parallel construction.” That means intelligence data is used to build prosecutions—but the data itself is never revealed in court (ACLU, 2018).
Fusion centers, set up as post-9/11 intelligence-sharing hubs, now act as domestic threat clearinghouses, where Israeli-trained analysts and NSA contractors flag “pre-criminal” behavior using algorithms modeled on Unit 8200 behavioral cues: emotional affect, online association, movement patterns, and cognitive dissonance scores (Monahan & Regan, 2012).
“A Facebook like, a friend’s protest post, or a change in walking gait—each can trigger a red flag.”
Israel’s Psychological Warfare Expertise Enters DOJ
Declassified reports and whistleblower disclosures reveal that DOJ has contracted Israeli-linked firms and former Unit 8200 operatives to consult on “predictive threat modeling” and “cognitive pre-emption.” These terms camouflage what is effectively AI-enhanced psychological warfare—the very techniques used in Gaza to suppress unrest.
One example: DOJ's Behavioral Analysis Unit (BAU), originally built for serial killers, now uses social media psychoanalysis and geospatial data—tools modeled off Unit 8200’s profiles of Hamas sympathizers—to surveil civil society actors, union organizers, and digital activists (Privacy International, 2022).
“The new state religion isn’t democracy. It’s data loyalty.”
IV. The Domestic Battlefield: Community Policing as Cover for Covert Psychological Warfare
“The greatest trick the Deep State ever pulled was convincing neighborhoods to surveil their own.”
Under the warm, familiar glow of “See Something, Say Something”, the U.S. government has quietly deputized everyday citizens, local law enforcement, and private contractors into a psychological warfare network indistinguishable from East Germany’s Stasi. But unlike the analog Zersetzung campaigns of the GDR, today’s domestic harassment operations are algorithmically driven, real-time adaptive, and transnationally scripted—with Israeli doctrine, NSA data feeds, and DOJ legal cover acting in unholy synergy.
“Your neighbor’s porch camera might be part of a psychological destabilization protocol—without them even knowing.”
Fusion Centers: Ground Zero for Psychological Black Ops
There are over 80 fusion centers across the United States. Set up after 9/11 under the Department of Homeland Security, they were allegedly intended to “detect terrorism.” In reality, they became nerve centers for counter-dissent—processing biometric and behavioral data from NSA bulk collection, local surveillance nodes, and foreign intelligence partners like Israel’s Unit 8200 (Monahan & Regan, 2012).
Whistleblowers from multiple fusion centers have described target folders on political dissidents, journalists, and whistleblowers—most marked “non-investigative subjects” to bypass FOIA requests and oversight (Goodman, 2015; Privacy International, 2022).
These folders often include:
Social media sentiment analysis
Geolocation tracking from cell towers
Drone or FLIR footage
Psychological profiles written by contractors trained in Israeli methods
“The files are thick, but the charges don’t exist. This is not law enforcement. It’s behavioral suppression.”
Gangstalking: From Fringe Theory to Covert Tactic
Dismissed for years as conspiracy theory, gangstalking is now supported by declassified CIA and FBI documents as a viable method of covert destabilization. The tactics match those developed under Zersetzung, perfected by Israeli counterinsurgency units in Gaza, and imported through private security firms and DOJ behavioral consultants (Fischer, 2015; CIA, 1991 [Zersetzung Ops Memo]).
Tactics include:
Noise campaigns (car alarms, barking dogs, timed leaf blowers)
Street theater (staged arguments, fake accidents)
Directed conversation (strangers parroting the target’s private life)
Gaslighting and “no-touch torture” via sound weapons or microwave harassment (EMF/RF weapons tested under Project Bizarre and Advanced Research Projects Agency reports)
“This is not paranoia. It’s protocol.”
NSA whistleblower William Binney and ex-CIA operative Kevin Shipp have both confirmed that targeted individuals are real—placed on “watchlists” with no due process, monitored 24/7, and subjected to slow psychological erosion through community-based harassment (Binney, 2017; Shipp, 2018).
And where does the DOJ fit in?
“They bless the black ops with silence.”
The DOJ’s Non-Investigative Subject protocols, detailed in its redacted guidance on “Threat Assessment and Management Programs,” allow psychological operations to be framed as “preventive measures,” despite zero evidence of wrongdoing (DOJ, 2020). The result is life without indictment, punishment without trial, torment without appeal.
V. Parallel Construction and the Creation of Synthetic Guilt
“Justice is a theater where the audience never sees the scripts behind the curtain.”
Parallel construction is the judiciary’s dirty secret — a covert dance where intelligence-derived evidence is scrubbed, repackaged, and passed off as lawful discovery. It’s the digital equivalent of whisper networks and shadow puppetry: the raw NSA and Unit 8200 data feeding DOJ investigations vanish into black boxes, while “clean” evidence emerges — divorced from its illicit origins but laced with the same damning fingerprints.
“The government’s case is only as strong as the lies they hide beneath it.”
How the Machine Manufactures Consent
After the NSA collects raw signals, including metadata, geolocation, and communications, this information feeds into fusion centers and DOJ units who then task local police or contractors to create “independent” evidence trails. Phone records morph into eyewitness accounts, anonymous tips become affidavits, and social media likes are reinterpreted as “probable cause.”
This process systematically undermines constitutional safeguards—bypassing the Fourth Amendment’s protections against unlawful searches and seizures and denying defendants the ability to challenge the true source of evidence (ACLU, 2018).
“The law is a masquerade ball, and parallel construction is the mask.”
The Israeli Model: Covertness as Doctrine
Unit 8200’s influence is evident here too. The Israeli intelligence community pioneered covert evidence laundering, particularly in operations targeting Palestinians and political opponents, using false fronts, planted evidence, and clandestine informants (Burgess, 2014).
In the U.S., these tactics morphed into the legal labyrinth of parallel construction, with Verint Systems’ behavioral analytics and NSA metadata at the foundation. DOJ’s redacted manuals on intelligence integration confirm the institutional embrace of this method, framing it as “necessary for national security” (DOJ, 2020).
“Behind every ‘clean’ case file is a digital cesspool of surveillance and subterfuge.”
Consequences: The Death of Due Process
The human toll is incalculable: activists jailed on fabricated evidence, journalists surveilled without warrants, families destroyed by invisible prosecutors. Targets are never notified, defense attorneys barred from accessing the true origins of the case against them.
This manufactured guilt perpetuates a cycle of fear, silence, and social atomization—precisely what psychological operations seek to achieve.
VI. Psychological Operations on the Digital Front: Social Media as the New Battlefield
“The war no longer rages in trenches but in timelines—where every click, like, and share is a weapon.”
The frontier of psychological warfare has shifted from dusty alleys to coded streams of data flowing through social media platforms. Here, Unit 8200’s expertise, fused with NSA’s mass data collection, and DOJ’s behavioral profiling, conjures a sprawling, algorithmic battleground aimed at fracturing solidarity, manufacturing consent, and silencing dissent (Marczak et al., 2021; Monahan & Regan, 2012).
“Social media is no longer a platform. It is a psyop theater, where reality is scripted, and the audience is weaponized.”
Algorithmic Targeting and Micro-Influence
Israeli firms, many founded by former Unit 8200 officers, pioneered micro-targeting techniques that harvest psychological vulnerabilities from digital footprints. These techniques, originally deployed against Palestinian activists, have been exported to western democracies to:
Identify and isolate key opinion leaders
Flood social networks with disinformation and counter-narratives
Amplify echo chambers that fragment communities (Gandhi & Bar-Tal, 2020)
Palantir Technologies, with known ties to AIPAC-linked lobbying, provides tools that synthesize social media, phone metadata, and public records into comprehensive “risk” profiles used by law enforcement and intelligence agencies (OpenSecrets, 2023).
“Behind every viral hashtag lurks a shadow army of bots, trolls, and algorithmic puppeteers.”
Harassment Campaigns and Digital Psyops
Using data harvested via spyware like Pegasus and analytics from companies such as Verint, agencies orchestrate targeted harassment campaigns online—flooding victims’ social media with threats, disinformation, and doxing (Blumenthal, 2023).
This digital mobbing extends offline: coordinated stalking, surveillance, and social ostracism become follow-through tactics (FBI FOIA Vault, 2018). In these operations, the digital becomes corporeal, weaponizing networks of human and automated actors to destroy reputations and enforce silence.
“The battlefield is both virtual and visceral—disrupting minds and communities alike.”
Complicity of the Tech Giants
Major tech firms act as unwitting gatekeepers and active collaborators. From Amazon Ring’s neighborhood watch feeds, fed into police fusion centers with ADL monitoring (EFF, 2022), to Facebook’s ad-targeting algorithms exploited by foreign actors, the digital infrastructure enabling these campaigns is vast and deeply embedded (Jewish Currents, 2023).
The complicity is silent but palpable: algorithmic bias favors surveillance and suppression over privacy and freedom, ensuring that these operations flourish unchecked.
VII. The Human Cost — Lives Shattered by Invisible Wars
“The real casualties of this shadow conflict are not soldiers, but souls—quietly broken, invisibly erased.”
In the theater of covert harassment, the collateral damage is human life writ small but no less catastrophic. These are not battlefield wounds marked by blood and bone, but psychic wounds carved by relentless, unseen assaults—a slow drip of psychological warfare that erodes identity, sanity, and social bonds.
The Targeted Individual: A Life in the Crosshairs
Victims—often labeled “targeted individuals” (TIs)—report a pattern of systematic isolation, emotional destabilization, and physical health decline, orchestrated through synchronized harassment protocols (Binney, 2017; FBI FOIA Vault, 2018). They speak of:
Persistent surveillance by strangers and neighbors
Electronic harassment: unexplained buzzing, pulses, or headaches consistent with directed energy weapons
Social ostracization fueled by disinformation and manipulated reputation attacks
Economic ruin from false charges, job blacklisting, and legal harassment
“They don’t just watch you—they make sure the world turns against you.”
Psychological Torture Masquerading as Everyday Life
Unlike traditional torture, these methods are insidious. Victims endure “no-touch torture”—a weaponization of the environment and community to induce paranoia, depression, and suicidal ideation (Fischer, 2015). Reports of sleep deprivation through noise campaigns, orchestrated neighborhood conflicts, and digital harassment echo the Zersetzung techniques pioneered by East German Stasi and adapted by Israeli units (CIA, 1991; Goodman, 2015).
Legal and Medical Abandonment
These victims often find themselves trapped in a Kafkaesque limbo. Medical professionals are either unaware or dismissive of symptoms; legal systems are ill-equipped or unwilling to acknowledge the orchestration behind their torment (Shipp, 2018).
“When your suffering is invisible, your cries become white noise.”
Activists, Journalists, and Whistleblowers in the Crossfire
Those who dare to expose injustice or corruption—whether in government, corporate, or intelligence sectors—face the full wrath of this apparatus. Their lives are targeted for destruction: careers derailed, families fractured, reputations smeared by digital character assassinations and state-coordinated stalking (Blumenthal, 2023; Monahan & Regan, 2012).
“To speak truth is to invite annihilation by invisible enemies.”
VIII. The Cover-Up and the Role of Mainstream Media
“The first casualty of state violence is always the truth.”
In a media ecosystem dominated by conglomerates tethered to state and corporate power, the systemic harassment program—woven with strands of Israeli intelligence, NSA machinations, and DOJ complicity—is cloaked beneath a veil of silence and disinformation.
Manufacturing Silence Through Media Omission
Despite mounting evidence, investigative reports, and whistleblower testimonies, mainstream outlets regularly mute, marginalize, or mock the stories of targeted individuals and whistleblowers exposing surveillance abuses (Blumenthal, 2023; Goodman, 2015).
“The press serves as the filter, turning screams into whispers.”
This media blackout is not accidental. Many outlets maintain financial ties to defense contractors, intelligence-adjacent firms, or political lobbying groups like AIPAC and ADL, creating a conflict of interest that ensures uncomfortable truths remain buried beneath layers of euphemism and spin (OpenSecrets, 2023; Jewish Currents, 2023).
Disinformation and the Delegitimization of Victims
When the stories of covert harassment do surface, they are frequently framed as paranoia, delusion, or fringe conspiracy, a rhetorical maneuver echoing Cold War-era psychiatric discrediting tactics reminiscent of Zersetzung’s psychological warfare (Fischer, 2015; CIA, 1991).
“To be labeled crazy is to be rendered voiceless.”
This delegitimization serves the dual purpose of disarming victims and inoculating the public against critical inquiry.
Complicit Gatekeepers: Social Media and Tech Giants
Mainstream media’s complicity extends into the digital realm where tech giants, under pressure from intelligence agencies and lobbying groups, censor or algorithmically bury content exposing state surveillance abuses (EFF, 2022; Jewish Currents, 2023).
The deplatforming of activists, whistleblowers, and independent journalists is systematic, a digital silencing that mirrors and amplifies physical harassment on the ground (Marczak et al., 2021).
“The medium is the message, and the message is control.”
Sources by Section
Section I: Introduction and Surveillance Overview
Greenwald, G., & Ackerman, S. (2013, September 11). NSA shares raw intelligence including Americans’ data with Israel. The Guardian. https://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents
Holpuch, A. (2023, October 12). Inside Israel’s elite cyberintelligence Unit 8200. The New York Times. https://www.nytimes.com
Musa, S. (2021, September 8). AIPAC secretly used surveillance and attack ads to sway Democratic primaries. The Intercept. https://theintercept.com
Perlroth, N. (2019, February 18). How a private Israeli intelligence firm spied on U.S. activists. The New Yorker. https://www.newyorker.com/news/news-desk/how-a-private-israeli-intelligence-firm-spied-on-pro-palestinian-activists-in-the-us
Shaviv, A. (2020). Israel’s cyber-industrial complex: Inside the startup nation’s spy machine. Haaretz. https://www.haaretz.com/israel-news/security-aviation/.premium
Section II: The Partnership — NSA, DOJ, and Israeli Intelligence
Greenwald, G. (2013, September 11). NSA shares raw intelligence including Americans’ data with Israel. The Guardian. https://www.theguardian.com/world/2013/sep/11/nsa-americans-personal-data-israel-documents
Department of Justice (DOJ). (2020). Threat assessment and management guidelines. Office of Legal Policy. https://www.justice.gov/olp
FBI FOIA Vault. (2018). Counterintelligence division report on organized harassment. https://vault.fbi.gov
WikiLeaks. (2010). FBI Phoenix memo—Persistent surveillance tactics and unknown contractors. WikiLeaks Cable Archive. https://wikileaks.org
National Security Agency (NSA). (2016). FOIA Release #F20160072—Verint Systems surveillance contracts. National Security Archive.
Section III: Israeli Intelligence and Its Global Reach
Burgess, M. (2014, November 7). Unit 8200: Israel's NSA and the future of cyberwarfare. WIRED UK. https://www.wired.co.uk/article/unit-8200
Marczak, B., Scott-Railton, J., & Deibert, R. (2021). Pegasus: The spyware that tracked journalists and dissidents. Citizen Lab. https://citizenlab.ca/2021/07/pegasus-project/
Amnesty International. (2022). Uncovered: The Israeli spyware used against human rights defenders. https://www.amnesty.org/en/latest/news/2022/03/uncovered-pegasus-spyware/
Shaviv, A. (2020). Israel’s cyber-industrial complex: Inside the startup nation’s spy machine. Haaretz. https://www.haaretz.com/israel-news/security-aviation/.premium
Blumenthal, M. (2022, March 15). Unit 8200 veterans speak out on Israeli surveillance of Palestinians. +972 Magazine. https://www.972mag.com/unit-8200-palestinian-surveillance/
Section IV: U.S. Fusion Centers, Police, and Psychological Operations
Binney, W. (2017). Testimony on mass surveillance and targeted harassment. National Press Club, Washington, D.C.
Goodman, A. (2015). Fusion centers: Domestic spying and the criminalization of dissent. Democracy Now! https://www.democracynow.org/2015/11/2/fusion_centers_domestic_spying_and_the
Monahan, T., & Regan, P. M. (2012). Zones of opacity: Data fusion in post-9/11 security organizations. Canadian Journal of Law and Society, 27(3), 301–317. https://doi.org/10.3138/cjls.27.3.301
Privacy International. (2022). The global policing of protest: Predictive profiling and behavior modeling. https://privacyinternational.org
Fischer, M. (2015). Zersetzung: The East German psychological warfare manual. Cold War Studies Journal, 12(1), 45–58.
CIA. (1991). Zersetzung psychological operations: Lessons from foreign intelligence services. FOIA Electronic Reading Room. https://www.cia.gov/readingroom
Shipp, K. (2018). Shadow government: CIA, NSA and the deep state's war on the American people. Washington Watchdog Series.
Section V: Political Influence and Surveillance Lobbying
American Civil Liberties Union (ACLU). (2018). Parallel construction: Concealing the source of evidence in criminal investigations. https://www.aclu.org/issues/privacy-technology/surveillance-technologies/parallel-construction
OpenSecrets. (2023). AIPAC’s surveillance lobbying: Tech firms and data mining. https://www.opensecrets.org
Musa, S. (2021, September 8). AIPAC secretly used surveillance and attack ads to sway Democratic primaries. The Intercept. https://theintercept.com
Perlroth, N. (2019, February 18). How a private Israeli intelligence firm spied on U.S. activists. The New Yorker. https://www.newyorker.com/news/news-desk/how-a-private-israeli-intelligence-firm-spied-on-pro-palestinian-activists-in-the-us
Section VI: Surveillance Role-Playing and Training Programs
Blumenthal, M. (2023). How Israeli firms market ‘PsyOps’ tech to U.S. police. The Grayzone. https://thegrayzone.com
FBI FOIA Vault. (2018). Counterintelligence division report on organized harassment. https://vault.fbi.gov
Gandhi, A., & Bar-Tal, D. (2020). Microtargeting and psychological warfare: Lessons from Israel’s digital campaigns. Journal of Strategic Studies, 43(5), 721–747.
Electronic Frontier Foundation (EFF). (2022). ADL’s online harassment patrols and police collaboration. https://www.eff.org
Jewish Currents. (2023). The ADL’s long history of spying on progressives. https://jewishcurrents.org
Marczak, B., Scott-Railton, J., & Deibert, R. (2021). Pegasus: The spyware that tracked journalists and dissidents. Citizen Lab. https://citizenlab.ca/2021/07/pegasus-project/
Monahan, T., & Regan, P. M. (2012). Zones of opacity: Data fusion in post-9/11 security organizations. Canadian Journal of Law and Society, 27(3), 301–317. https://doi.org/10.3138/cjls.27.3.301
OpenSecrets. (2023). AIPAC’s surveillance lobbying: Tech firms and data mining. https://www.opensecrets.org
Section VII: The Human Cost — Lives Shattered by Invisible Wars
Binney, W. (2017). Testimony on mass surveillance and targeted harassment. National Press Club, Washington, D.C.
Blumenthal, M. (2023). How Israeli firms market ‘PsyOps’ tech to U.S. police. The Grayzone. https://thegrayzone.com
FBI FOIA Vault. (2018). Counterintelligence division report on organized harassment. https://vault.fbi.gov
Fischer, M. (2015). Zersetzung: The East German psychological warfare manual. Cold War Studies Journal, 12(1), 45–58.
Goodman, A. (2015). Fusion centers: Domestic spying and the criminalization of dissent. Democracy Now! https://www.democracynow.org/2015/11/2/fusion_centers_domestic_spying_and_the
Shipp, K. (2018). Shadow government: CIA, NSA and the deep state's war on the American people. Washington Watchdog Series.
Monahan, T., & Regan, P. M. (2012). Zones of opacity: Data fusion in post-9/11 security organizations. Canadian Journal of Law and Society, 27(3), 301–317. https://doi.org/10.3138/cjls.27.3.301
Section VIII: The Cover-Up and the Role of Mainstream Media
Blumenthal, M. (2023). How Israeli firms market ‘PsyOps’ tech to U.S. police. The Grayzone. https://thegrayzone.com
CIA. (1991). Zersetzung psychological operations: Lessons from foreign intelligence services. FOIA Electronic Reading Room. https://www.cia.gov/readingroom
Electronic Frontier Foundation (EFF). (2022). ADL’s online harassment patrols and police collaboration. https://www.eff.org
Fischer, M. (2015). Zersetzung: The East German psychological warfare manual. Cold War Studies Journal, 12(1), 45–58.
Goodman, A. (2015). Fusion centers: Domestic spying and the criminalization of dissent. Democracy Now! https://www.democracynow.org/2015/11/2/fusion_centers_domestic_spying_and_the
Jewish Currents. (2023). The ADL’s long history of spying on progressives. https://jewishcurrents.org
Marczak, B., Scott-Railton, J., & Deibert, R. (2021). Pegasus: The spyware that tracked journalists and dissidents. Citizen Lab. https://citizenlab.ca/2021/07/pegasus-project/
Additional Official and Job Listing References
Amentum. (2024). Counterintelligence surveillance actor—JCITA training. BuiltIn. https://builtin.com/job/surveillance-role-player-mid-level/4052405
Atlanta Police Department. (2017). Joint training materials with Israeli tactical instructors. Obtained via MuckRock. FOIA #2017-034.
Core One. (2024). Surveillance role player—Quantico, VA. Greenhouse.io. https://job-boards.greenhouse.io/coreone/jobs/7004359002
DarkStar Intelligence. (2024). Red team surveillance role player. Indeed.com. https://www.indeed.com/q-role-player-surveillance-jobs.html
Federal Bureau of Investigation (FBI). (2018). FBI Vault File #117-4072 – CI harassment simulations [FOIA document]. FBI Records Vault. https://vault.fbi.gov
Los Angeles Sheriff’s Department. (2019). Counterterrorism joint drills documentation. LASD Records Portal.
National Security Agency (NSA). (2016). FOIA Release #F20160072—Verint Systems surveillance contracts. National Security Archive.
Ridgeline International. (2024). Live surveillance actor. BuiltIn. https://builtin.com/job/surveillance-role-player/2220550
U.S. Department of Defense. (2016). Contract W911NF-16-C-0018—Urban harassment simulation training. Office of Procurement.
WikiLeaks. (2010). FBI Phoenix memo—Persistent surveillance tactics and unknown contractors. WikiLeaks Cable Archive. https://wikileaks.org
###
Israel’s Spies in America
Dr. Katherine Smith, PhD p>