The professional networking platform LinkedIn has returned to the spotlight following a new investigative report accusing the company of enabling user surveillance and transferring data to third parties linked to the United States and Israel.
This development carries weight given the platform’s documented history of moderating Palestinian content and perceived alignment with Israeli narratives. The investigation raises two central questions: what exactly has been uncovered, and how extensive is Israeli influence within the company’s operational and technical ecosystem?
What the New Investigation Revealed
A report titled “BrowserGate”, published by the German organisation Fairlinked, found that LinkedIn embedded a small piece of browser-based code designed to detect whether users had specific browser extensions installed.
The mechanism extended beyond simple detection. According to the findings, it also collected technical device data, with part of this data flow allegedly connected to HUMAN Security, a firm that previously merged with the Israeli company PerimeterX.
How the Tracking Mechanism Worked
From a technical standpoint, the process was straightforward. The embedded code attempted to access a known file within each browser extension. If successful, the platform could confirm the presence of that extension on the user’s device.
In practical terms, this allowed LinkedIn to identify whether users were running tools that could either compete with its services or extract data from its ecosystem.
Testing conducted by BleepingComputer showed that LinkedIn scanned more than 6,236 extensions. These included widely used tools such as Apollo, Lusha, and ZoomInfo, alongside unrelated utilities like grammar assistants and job search extensions.
Device Fingerprinting Capabilities
The code did not stop at extension detection. It also gathered general technical data, including:
- Language settings
- Time zone
- Screen resolution
- Available memory
- CPU core count
- Battery status
- Audio and storage characteristics
While this information does not directly identify individuals, it enables the creation of a unique “device fingerprint”, allowing platforms to distinguish and track users with high precision.
A Gradual but Significant Expansion
The scale of this tracking capability has grown substantially over time. According to The Next Web:
- In 2017, LinkedIn scanned just 38 extensions
- By 2024, this rose to 461 extensions
- By February 2026, the number reached 6,167
- By April 2026, tests confirmed 6,236 extensions
This progression indicates a deliberate and sustained expansion rather than an isolated technical feature.
LinkedIn’s Response
LinkedIn stated that it scans certain extensions to protect its platform from tools that scrape data and to maintain system stability. The company also claimed that it does not use this data to infer sensitive personal information.
However, it did not provide clarity on:
- How the data is stored
- How long it is retained
- The exact scope of its usage
This lack of transparency has left the controversy unresolved.
A Record of Digital Bias Against Palestinians
Suppression of Palestinian Content
Years before the BrowserGate findings, LinkedIn faced repeated accusations of bias in moderating Palestinian-related content.
In October 2025, the organisation 7amleh published a report based on 15 testimonies from users and employees within Microsoft and LinkedIn. The report documented:
- Removal or restriction of posts supporting Palestinian rights
- Tolerance of content inciting harm against Palestinians
It also highlighted instances where senior management intervened beyond standard moderation procedures, resulting in what was described as “dual-layer censorship”. This approach restricted Palestinian voices while allowing hostile narratives to remain visible.
Internal complaints had reportedly been filed since October 2023. Many users began self-censoring out of fear that their professional opportunities could be affected.
Reclassification of Palestinian Cities
On 5 January 2026, 7amleh sent an open letter to LinkedIn’s CEO expressing concern over how Palestinian cities were labelled on the platform.
Cities such as Bethlehem and Ramallah were listed under “Judea and Samaria, Israel”. The organisation described this as a distortion of geographic reality and a form of digital normalisation of annexation.
The letter argued that:
- The terminology contradicts international recognition of the West Bank as occupied territory
- Biblical naming conventions reinforce settlement narratives
- Such classifications violate Palestinian digital rights
No formal response was issued by LinkedIn.
The Platform’s Operational Ties to Israel
LinkedIn is a US-based company headquartered in California. It was acquired by Microsoft in 2016 for $26.2 billion, while maintaining its brand and operational independence.
Despite this, the company has developed a clear operational footprint in Israel.
Expansion Into Tel Aviv
In February 2022, LinkedIn announced the acquisition of the marketing analytics startup Oribi. As part of the deal, the company confirmed plans to open an office in Tel Aviv.
According to TechCrunch, the deal was valued between $80 million and $90 million and marked LinkedIn’s first official presence in Israel.
By June 2023, Israeli financial outlet Globes reported that LinkedIn had leased an entire floor in Alon Tower B in Tel Aviv, covering 1,400 square metres and employing around 50 staff.
This expansion signals that LinkedIn’s presence is not limited to acquisition integration but forms part of a broader regional development and marketing strategy.
Cybersecurity Links and Infrastructure
HUMAN Security, which operates in both the United States and Tel Aviv, emerged as a key point of concern due to its merger with PerimeterX.
According to data from IVC and reporting by Calcalist:
- The merged entity maintained 110 employees in Tel Aviv
- An additional 50 roles were expected to be created
- A research and development centre was established in Israel
This positions the company as a joint US-Israeli cybersecurity actor within LinkedIn’s broader data ecosystem.
Microsoft’s Strategic Role
Ownership by Microsoft further intensifies scrutiny. The company has established deep security partnerships with the Israeli military, particularly after October 2023.
Leaked documents previously revealed that Microsoft invested millions into providing Microsoft Azure services used for intelligence gathering and targeting operations during the bombardment of Gaza.
This context strengthens concerns about how LinkedIn’s data infrastructure could intersect with broader geopolitical and military frameworks.
Conclusion
The BrowserGate investigation does not present an isolated technical issue. It reveals a layered system involving data collection, expansion of surveillance capabilities, and integration with cybersecurity networks linked to Israeli entities.
Combined with documented patterns of content moderation bias and the platform’s growing operational footprint in Tel Aviv, the findings point to a broader structural alignment rather than incidental overlap.
The absence of transparency from LinkedIn regarding data handling practices continues to fuel legitimate concerns about user privacy, digital rights, and the political dimensions of global technology platforms.





