Skip to content

Rising worries in cybersecurity emerge as Israeli technology integrates in smartphones, following Netanyahu's comment

Warnings issued by Turkish cybersecurity specialists about potential Israeli technology in mobile devices following Netanyahu's comment that smartphones are part of Israel

Increased unease about cybersecurity in smartphones arises following Netanyahu's comment about...
Increased unease about cybersecurity in smartphones arises following Netanyahu's comment about Israeli technology

Rising worries in cybersecurity emerge as Israeli technology integrates in smartphones, following Netanyahu's comment

In a recent development, a digital user rights organisation, SMEX, has drawn attention to the pre-installation of an application called "AppCloud" on Samsung Galaxy M and A series smartphones in the Middle East and North Africa (WANA) regions. The application, developed by Israeli company IronSource based in Tel Aviv, reportedly harvests user data and cannot be disabled by users.

IronSource's activities have sparked concerns in countries where Israeli companies are barred from operating, such as Lebanon, due to legal and ethical issues. The SMEX has labelled AppCloud as "intrusive" and expressed concerns about its potential impact on user privacy and personal data security.

The installation of AppCloud, according to the SMEX, violates GDPR provisions in the EU and relevant data protection laws in the WANA region states, as it is done without user consent. This practice has raised eyebrows, given the sensitive nature of data being collected and the lack of transparency in how this data is being used.

It is important to note that Israeli technology is embedded in major smartphone brands, including Apple and Samsung. This is not a new phenomenon, as global chip manufacturers Nvidia and Intel have significant investments in Israel. The presence of Israeli-developed applications, such as AppCloud, raises questions about user privacy and data security.

The SMEX also highlighted IronSource's history of questionable practices regarding user consent and data privacy. The company has been embroiled in controversies in the past, which further fuels the concerns about AppCloud.

Moreover, the expert emphasised that Israeli-origin companies not only produce advanced spyware in Israel but also establish companies in Europe and the US to create cyber weapons. This practice has been a subject of debate, with concerns about the potential misuse of these technologies.

In a related incident, Turkish media outlets have expressed concerns about the Moovit transportation application's connections to Israel. The founder of Moovit reportedly received training at the Israeli military's IT academy, and one of its investors is a former programmer in Unit 8200, an army-affiliated team involved in software and cybersecurity projects.

The expert also described a recent incident where Turkish domestic software detected malware that only targets Turkey, but no action was taken by public institutions despite sharing the report. This incident underscores the challenges faced by domestic software developers in competing with Israeli products due to their lower prices, which make them more attractive to public sector institutions.

Social media platforms and messaging applications have been repeatedly exposed for sharing data with Israeli intelligence. This revelation has added to the concerns about the privacy and security of user data.

In the Hezbollah incident, it was demonstrated that these products are designed to enter governments' systems and can be activated when needed. This capability has raised serious concerns about national security and the potential for misuse of these technologies.

As the use of smartphones becomes more prevalent, it is crucial to ensure that user privacy and data security are not compromised. The concerns raised by SMEX and other experts highlight the need for transparency and accountability in the use of these technologies. Users must be informed about what data is being collected, how it is being used, and who has access to it. Until then, the potential risks to user privacy and data security remain a significant concern.

Read also:

Latest