Skip to content

Israeli Surveillance Tech Still Powers Russian Systems Despite Sanctions

A banned Israeli tool still watches over Moscow's elite. How did BriefCam slip through sanctions—and who might be exploiting its surveillance power?

The image shows a military truck with a missile on the back of it driving down a dirt road...
The image shows a military truck with a missile on the back of it driving down a dirt road surrounded by plants and stones. In the background, there are hills, trees, buildings, and poles, and the sky is visible at the top of the image. This scene is likely part of an Israeli defense system, which is set to be used by the United States.

Israeli Surveillance Tech Still Powers Russian Systems Despite Sanctions

Israeli-developed video analytics software, BriefCam, is operating within Russian surveillance systems despite international sanctions. The discovery has raised serious security concerns in Moscow over potential reconnaissance risks. Officials fear the technology could be used to gather intelligence or target individuals. BriefCam was originally acquired by Canon in 2018 and later integrated into Milestone Systems’ XProtect platform. However, Milestone withdrew from Russia in 2022 following sanctions. Despite this, the software remains active in several high-profile locations, including the Russian Academy of Sciences, the Eurasia skyscraper, and the Zotov cultural centre.

The software’s capabilities include rapid analysis of video streams, event detection, and the identification of specific human actions or vehicles. Its presence in Russia has been maintained through illicit ‘gray’ import schemes, cracked versions, or third-party distributors. These back-channel networks are part of a broader pattern where Russia bypasses export controls using intermediaries and shell companies. Security experts warn that similar Israeli software was previously used to hack Iranian surveillance systems for reconnaissance on high-ranking officials. The continued operation of BriefCam in Russia highlights persistent gaps in enforcing sanctions on sensitive technology.

The ongoing use of BriefCam underscores Russia’s reliance on covert supply chains to sustain its military and intelligence infrastructure. The software’s presence in key facilities suggests vulnerabilities in both export controls and cybersecurity measures. Authorities have yet to confirm whether the system has been exploited for foreign surveillance.

Read also: