Tel Aviv – A number of widely used mobile apps, downloaded by millions worldwide, are now under scrutiny for having deep ties to Israeli military intelligence units. The revelation raises new concerns over digital privacy, surveillance, and the ethics of data-driven technologies.
According to a report by TechTrends, many of these apps were founded or led by former members of Unit 8200, the Israeli military’s elite cyber-intelligence division, or Mamram, the central computing unit within the Israel Defense Forces (IDF).
The apps span various categories—from AI-powered video editors and public transit navigation to mobile gaming—yet share a common background: their creators’ links to intelligence or military operations.
Some of these apps are popular among Indonesian users as well. For instance, the digital map service Waze and public transport platform Moovit are both connected to Israeli intelligence alumni.
Below is the list of apps identified by TechTrends:
- Waze – founded by ex-Unit 8200 engineers
- Moovit – built by former Mamram unit developers
- Supersonic – CEO formerly led operations for the Israeli Army
- ZipoApps – founded by former Unit 8200 intelligence agents
- Bazaart – created by an ex-IDF intelligence officer
- Lightricks – co-founded by a current Unit 8200 member
- Playtika – launched by the son of a former IDF Chief of Staff
- Crazy Labs – founders reportedly still serve in the IDF
- CallApp – founder served three years in Unit 8200
- Gett – founded by a former Unit 8200 executive
- Fooducate – launched by a former Israeli Air Force pilot
The concern is not solely their origins, but also the opaque data practices behind their success. Some of these companies have faced allegations of embedding adware, surveillance tools, or harvesting unnecessary user data.
One example is Simple Gallery, which was originally an open-source tool but became highly commercialized shortly after being acquired by an Israeli firm. Meanwhile, apps like ZipoApps and Supersonic have drawn criticism for predatory data collection and unclear opt-in tracking models.
Despite these warnings, the download numbers continue to surge, driven by heavy advertising budgets and close partnerships with platforms like Google and Meta.
How to Protect Yourself
For users concerned about data security, especially regarding apps with military ties, here are practical steps:
- Check the developer name in the official app store
- Look up the company profile on LinkedIn or Crunchbase
- Support developers committed to ethical, transparent data practices
As digital surveillance grows more sophisticated, understanding who builds the apps we use daily has never been more important.