{"id":5078,"date":"2025-09-26T20:22:23","date_gmt":"2025-09-26T20:22:23","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=5078"},"modified":"2025-09-26T20:22:23","modified_gmt":"2025-09-26T20:22:23","slug":"microsoft-restricts-israel-defense-ministrys-azure-access-after-surveillance-report","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=5078","title":{"rendered":"Microsoft Restricts Israel Defense Ministry\u2019s Azure Access After Surveillance Report"},"content":{"rendered":"<p>Microsoft has disabled certain Azure services used by Israel\u2019s military to store phone calls acquired through mass surveillance in Gaza and the West Bank. The internal review remains ongoing, with more updates expected within days or weeks.\u00a0<\/p>\n<p>\u201cWe therefore have informed IMOD [Israel Ministry of Defense] of Microsoft\u2019s decision to cease and disable specified IMOD subscriptions and their services, including their use of specific cloud storage and AI services and technologies,\u201d wrote Brad Smith, vice chair and president at Microsoft, in an internal communication made public on Thursday. \u201cWe have reviewed this decision with IMOD and the steps we are taking to ensure compliance with our terms of service, focused on ensuring our services are not used for mass surveillance of civilians.\u201d\u00a0<\/p>\n<p>Employees and activists have spoken out against the use of Microsoft cloud services in surveillance of Palestinian populations in Gaza and the West Bank.<\/p>\n<h2 class=\"wp-block-heading\">Guardian investigation revealed surveillance\u00a0<\/h2>\n<p>Microsoft began to review some of its Israel Defense Forces (IDF) customers after an August 6 article by <a href=\"https:\/\/www.theguardian.com\/world\/2025\/aug\/06\/microsoft-israeli-military-palestinian-phone-calls-cloud\" target=\"_blank\" rel=\"noopener\">The Guardian<\/a> was released. The Guardian revealed Microsoft helped Israel\u2019s military surveillance agency, Unit 8200, collect and store millions of everyday phone calls in Gaza and the West Bank. IMOD had used its own resources to carry out surveillance, then <a href=\"https:\/\/www.theguardian.com\/world\/2025\/sep\/25\/microsoft-blocks-israels-use-of-its-technology-in-mass-surveillance-of-palestinians\" target=\"_blank\" rel=\"noopener\">stored the data<\/a> in a closed-off Azure environment and analyzed the audio using AI.\u00a0<\/p>\n<p>On September 25, <a href=\"https:\/\/blogs.microsoft.com\/on-the-issues\/2025\/09\/25\/update-on-ongoing-microsoft-review\/\" target=\"_blank\" rel=\"noopener\">Smith confirmed<\/a> \u201cevidence that supports elements of The Guardian\u2019s reporting. This evidence includes information relating to IMOD consumption of Azure storage capacity in the Netherlands and the use of AI services.\u201d\u00a0<\/p>\n<p>As a result, Microsoft ended certain subscriptions and services IMOD had been using, including \u201cspecific cloud storage and AI services and technologies.\u201d\u00a0<\/p>\n<p>According to Smith, Microsoft came to this conclusion by examining its own \u201cfinancial statements, internal documents, and email and messaging communications.\u201d Redmond\u2019s investigation did not involve accessing the content IMOD holds, as doing so would violate the customer\u2019s privacy rights, he explained. Instead, the investigation was guided by two principles: not providing technology for mass surveillance of civilians, and respecting the privacy rights of customers.\u00a0<\/p>\n<h2 class=\"wp-block-heading\">Microsoft employees demonstrated for change earlier this year\u00a0<\/h2>\n<p>Microsoft has a standard commercial relationship with IMOD, the company said in May.\u00a0<\/p>\n<p>Around the same time, Microsoft had released a statement in response to concerns from <a href=\"https:\/\/www.eweek.com\/news\/microsoft-review-gaza\/\">employees and the public<\/a> about the company\u2019s Azure and AI services being used to target civilians or cause other harm in the conflict in Gaza. At that time, Microsoft found \u201cno evidence\u201d its technology had been used to \u201ctarget or harm people.\u201d<\/p>\n<p>Groups such as No Azure for Apartheid emerged within Microsoft, asking the company to cease providing services to Israel\u2019s military, among other demands. In April, Microsoft employees Ibtihal Aboussad and Vaniya Agrawal, both software engineers, <a href=\"https:\/\/www.eweek.com\/news\/microsoft-ai-terminated-engineers-israel-military\/\">were fired<\/a> after interrupting executives\u2019 speeches to protest the company\u2019s conduct in Israel.\u00a0<\/p>\n<p><strong>Concerns about how tech is being used, particularly for surveillance, is not new. For instance, in February, OpenAI researchers found that <\/strong><a href=\"https:\/\/www.eweek.com\/news\/openai-ai-surveillance-china\/\"><strong>AI-powered surveillance tools using ChatGPT<\/strong><\/a><strong> \u201cseem to originate from China.\u201d<\/strong><\/p>\n<p>The post <a href=\"https:\/\/www.eweek.com\/news\/microsoft-restricts-azure-access-israel-military-surveillance\/\">Microsoft Restricts Israel Defense Ministry\u2019s Azure Access After Surveillance Report<\/a> appeared first on <a href=\"https:\/\/www.eweek.com\/\">eWEEK<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Microsoft has disabled certain Azure services used by Israel\u2019s military to store phone calls acquired through mass surveillance in Gaza and the West Bank. The internal review remains ongoing, with more updates expected within days or weeks.\u00a0 \u201cWe therefore have informed IMOD [Israel Ministry of Defense] of Microsoft\u2019s decision to cease and disable specified IMOD [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-5078","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/5078"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5078"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/5078\/revisions"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5078"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5078"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5078"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}