Khalil Shreateh specializes in cybersecurity, particularly as a "white hat" hacker. He focuses on identifying and reporting security vulnerabilities in software and online platforms, with notable expertise in web application security. His most prominent work includes discovering a critical flaw in Facebook's system in 2013. Additionally, he develops free social media tools and browser extensions, contributing to digital security and user accessibility.

Get Rid of Ads!


Subscribe now for only $3 a month and enjoy an ad-free experience.

Contact us at khalil@khalil-shreateh.com

Lavender AI Interface Used by Israeli Intelligence
Israeli occupation personnel scanning Palestinian faces using the Blue Wolf app at a checkpoint.

Israel's Lavender AI system used to identify human targets in Gaza, its connections to Blue Wolf and Red Wolf surveillance technologies, and the legal, ethical, and humanitarian controversies surrounding automated warfare

The Rise of Algorithmic War

Since the onset of the Gaza war following October 7, 2023, the Israeli occupation has increasingly relied on artificial intelligence to automate parts of its war operations. One controversial system, known as Lavender, was reportedly used to identify human targets for aerial strikes in Gaza. Developed by Israel’s elite Unit 8200, Lavender combines large-scale data collection with behavioral analysis to classify individuals as potential combatants.

This article explores the Lavender system in depth—its architecture, operational philosophy, technical underpinnings, associated systems like Blue Wolf and Red Wolf, and the international outcry it has sparked.

What Is the Lavender System?

Lavender is a military-grade AI algorithm used to identify individuals suspected of affiliation with Hamas or Islamic Jihad. Instead of targeting active combatants on the battlefield, Lavender often marks individuals based on indirect indicators—like their phone activity or GPS movements.

Key Capabilities:

  • Targets based on behavioral patterns, not direct evidence.
  • Integrates data from signals intelligence, surveillance drones, and telecom monitoring.
  • Processes massive datasets faster than any human analyst could.

How Lavender Works

The core mechanism of Lavender is predictive profiling. The system aggregates and analyzes multiple inputs to determine whether a person poses a threat:

  • Mobile phone metadata (calls, movements, locations)
  • Surveillance footage from drones or ground units
  • Interception of communications and social media patterns

If a person’s profile fits a certain pattern associated with militant activity, their home may be flagged as a target for airstrike—often with no further human validation.

Margin of Error: The 10% Problem

One of the most alarming statistics associated with Lavender is its 10% error margin. This means that 1 in 10 people marked for death may have no verifiable ties to militant groups.

Even more concerning is that the system was used en masse, with little to no human review in many cases. This resulted in the deaths of civilians based on machine-generated suspicion.

Collateral Damage Policy

Israeli policy reportedly allowed for the killing of 15 to 20 civilians for every “low-ranking militant” and up to 100 civilians for high-level targets. This tolerance for collateral damage was embedded in how Lavender recommendations were executed.

Key Concerns:

  • Disproportionate force: Entire residential buildings flattened.
  • No warning: Many civilians were unaware they were at risk.
  • Lack of transparency: No accountability for mistaken targets.

The Use of Dumb Bombs

Unlike precision-guided munitions, many Lavender-designated strikes were carried out using unguided or "dumb" bombs. These cause indiscriminate destruction, increasing the likelihood of mass civilian casualties.

This practice raised questions about whether the Israeli military was deliberately choosing more destructive methods to maximize damage.

Global Reactions and Legal Ramifications

UN Criticism

United Nations Secretary-General António Guterres expressed grave concern over the use of systems like Lavender. He warned that these tools blur the lines of accountability and may violate international humanitarian law.

Legal Implications

Human rights organizations argue that Lavender represents a form of algorithmic extrajudicial execution, which could be prosecuted under international war crimes statutes.

Israel's Official Position

Israel denies that Lavender is a “kill list” generator. According to official statements, it is merely a database used to assist intelligence officers. However, reports from whistleblowers and investigative journalists contradict this, showing that the system was directly tied to airstrike decisions.

Related Surveillance Tools

Lavender is not operating in isolation. It is part of a broader ecosystem of Israeli surveillance and targeting technologies.

Red Wolf System

Used at military checkpoints—especially in the West Bank city of HebronRed Wolf scans the faces of Palestinians without consent and adds them to a biometric database if they are not already registered.

Blue Wolf App

Blue Wolf is an app installed on soldiers’ smartphones that performs real-time facial recognition. It categorizes individuals by threat level:

  • Green = Safe to pass
  • Yellow = Detain
  • Red = Arrest immediately

The app feeds data into what some soldiers have referred to as a “secret Facebook for Palestinians.”

Incentivizing Surveillance

Israeli soldiers are reportedly rewarded with extra leave days based on the volume of data they collect—photos of ID cards, license plates, or faces. Surveillance is gamified, turning privacy violations into metrics for performance. 
If you are Palestinian, there is no doubt that you have been subjected to the photographing of your car, yourself, and your personal ID by occupation soldiers (using smart phones) at a specific checkpoint you passed through. The occupation army offers incentives to its soldiers based on the amount of data they collect, rewarding them with extra days off and vacations.

The Wolf Pack Network

These systems—Lavender, Red Wolf, and Blue Wolf—comprise a single, centralized database infrastructure unofficially referred to as “The Wolf Pack.” It includes:

  • Biometric profiles
  • Behavioral predictions
  • Family relationships
  • Geographic movement histories

This infrastructure facilitates continuous surveillance and real-time targeting.

Real-World Example: “Ahmed”

During the early days of the war, Lavender identified a man—referred to here as “Ahmed” (a pseudonym)—as a Hamas affiliate based solely on phone metadata. His house was struck by an unguided bomb, resulting in the deaths of his entire family.

No human officer verified the data before the strike. Later investigations revealed no militant ties.

Accuracy vs. Assumption

Lavender’s reliance on indirect data like presence in certain areas makes it vulnerable to contextual errors. For example, a journalist covering an event in a “flagged” zone could be misidentified as a militant.

Worse, the lack of human verification means these assumptions often go unchallenged.

Mass Surveillance and Discrimination

Lavender’s data-collection methods involve sweeping up information without consent, exclusively targeting Palestinians. This form of surveillance:

  • Lacks legal oversight
  • Violates privacy en masse
  • Reinforces structural discrimination

Legal Accountability in Question

AI-based targeting systems like Lavender represent a challenge to existing international legal frameworks. Critics argue:

  • Machines lack moral judgment
  • Data can be biased or fabricated
  • AI accountability remains legally undefined

Lavender may become a test case for how future wars are prosecuted and judged in international courts.

Final Thoughts

The Lavender AI system illustrates the terrifying potential of automated warfare, where decisions about life and death are made by algorithms. When governments deploy such systems without transparency or oversight, the consequences are borne not by machines—but by civilians, families, and entire communities.

Share & Stay Informed

If you found this article informative, consider sharing it with others. Stay connected for updates on this and related topics:

🔗 https://shreateh.net/links

Social Media Share