Freddie Ponton21st Century Wire
Imagine waking tomorrow to discover that the anonymous account you maintained for years, where you posted criticism of Israel’s bombardment of Gaza, and again in Iran, has been unmasked and profiled by a foreign intelligence service that now knows your legal name, your home address, your facial biometric data, and your family members’ identities, all because you clicked a blue verification button that promised greater reach, but instead funneled your personal data and documents directly into the hands of veterans of Israel’s notorious intelligence agencyUnit 8200. These are the very same Israeli cyberwarfare operatives who createdPegasus spywareused to trackJamal Khashoggibefore his assassination, theLavender AI systemwhich automatically generated kill lists of at least 37,000 Palestinians—marked for death based on their social connections, and who now, as revealed in August 2025, operate a dedicatedMicrosoft Azure cloud clusterstoring “a million calls an hour” of Palestinian surveillance data with the explicit endorsement of Satya Nadella’s executive team. The implications of this should concern everyone who uses the major social media platforms.
This latest report comes as the Israel/US-Iran war enters its second week, punctuated by theFebruary 28 bombing of Iranian schools, and ongoing attacks on regional desalination and oil and gas infrastructure, intensifying the surveillance targeting of critics on social media platforms.
This is not dystopian fiction, but the documented reality facing a substantial number of X users who recently discovered their real names being searched dozens, sometimes hundreds of times, from IP addresses inside Israel within hours of posting content critical of Israeli/US military operations in Iran.
This phenomenon can be traced directly to Elon Musk’s strange partnership withAu10tix, a shadowy Israeli ‘identity verification company’ whose administrative credentials sat exposed on a public Telegram channel for over a year. At the same time, X continued to mandate biometric data submission to this already-compromised system. At the time, when confronted by X users about handing over all of X user data to this Israeli firm, Musk initially acted concerned, but then proceeded to avoid the issue, which was not surprising, as he was then engaged in a geopolitical capitulation to theNetanyahu governmentafter the October 7th event blew up. In reality, by providing a backdoor to an Israeli intelligence-linked tech operation, Musk may have transformed X into the largest honeypot operation on the planet and established himself as a permanent Israeli strategic asset.
Even more bizarrely, his role as a political asset was realised whilst being used inDecember 2024when President Herzog personally called Musk toassist in hostage negotiationswith Hamas.
According to cybersecurity firmspiderSilkand investigative outlet404 Media, Mossab Hussein, chief security officer at spiderSilk, discovered exposed credentials belonging to anAu10tixNetwork Operations Centre manager that had been harvested byRedline infostealer malwarein December 2022 and posted to a Telegram channel in March 2023, where they remained accessible for over a year. The logging platform exposed names, birthdates, nationalities, identification numbers, images of uploaded passport and drivers license identity documents, and results of facial recognition scans. Husseinstatedthat Au10tix“failed to implement basic security measures to safeguard users’ identities and confidential documents”. One wonders whether this was accidental, or perhaps something more nefarious. Screenshots from the breached system showed direct references to client organizations includingTikTok, X, Uber, Fiverr, PayPal, Coinbase, LinkedIn, and Upwork—meaning the identity verification infrastructure of multiple major platforms was simultaneously compromised through a single Israeli contractor with documentedintelligence ties.
The pattern is as alarming as it is consistent, beginning with the unsettling experience that political commentatorNiko Houseand countless other content creators have documented. More shockingly, a routine check of Google Trends reveals their full legal names, names they never published online, being queried with obsessive frequency from within Israel immediately following viral posts criticising Israeli military actions or expressing solidarity with Palestinian civilians.
VIDEO: Israel Googled Me 100+ Times In 24 Hours (Source:Niko House | Youtube)
.These are not random searches driven by curiosity, but the digital signatures of target development, the initial phase of intelligence profiling where real-world identity is attached to an online persona. This is a process thatUnit 8200refined through decades of occupation surveillance in Palestine, where they compiled dossiers on numerousjournalists, activists, and indeed every Palestinian, including their medical histories, family relations, and sexual preferences—all of which could be leveraged for blackmail purposes. They have now exported this acquired know-how globally through an array of affiliated private intelligence contractors, under the dubious aegis of official “trusted partner” status with firms likeMeta and TikTok, and tech platform partnerships that collectively function as a distributed surveillance state capable for tracking and intimidating dissenting voices…anywhere on Earth.
Source: 21st Century Wire