Edition 001 — The Algorithmic Kill Chain

Intelligence notes | Strategic Analysis for the Information Age


Welcome to the first edition of Intelligence notes.

This newsletter is built on a simple premise: the most consequential developments in global security are rarely the ones receiving the most coverage. We focus on the structural shifts — the architectural changes to how states acquire power, project force, and control information — that will shape the next decade regardless of which crisis is dominating the headlines today.

This edition covers the algorithmic kill chain: how Western militaries have restructured the sensor-to-shooter loop around artificial intelligence, what this means operationally, and what the strategic implications are for adversaries, policymakers, and anyone paying attention to the future of warfare.


The Intelligence

Part I — Palantir Owns the Western Kill Chain

Palantir Technologies has become the epistemological layer of Western military intelligence.

Through systematic integration into the US DoD’s Joint All-Domain Command and Control (JADC2) architecture — via the Maven Smart System, TITAN, and its foundational “Ontology” data layer — the company has established a structural monopoly over how the Western military perceives, categorises, and acts on the battlefield.

The critical insight is not about software. It is about semantic architecture. Once a military command structure maps its operational reality onto Palantir’s Ontology — units, sensors, targets, logistics — migrating away becomes structurally equivalent to rebuilding the underlying epistemology of command. No competitor offers a drop-in replacement.

The financial moat closed in 2025. Following 109% year-over-year commercial revenue growth, Palantir is no longer dependent on federal contracts. Any attempt to impose oversight through budget pressure will selectively harm legacy hardware contractors — not Palantir.

The vulnerability that isn’t being discussed: Palantir’s Ontology integrates data from thousands of unstructured commercial feeds. An adversary capable of introducing corrupted telemetry upstream — not into Palantir’s hardened IL6 cloud, but into the commercial intelligence ecosystem feeding it — could systematically degrade targeting accuracy without triggering a single cybersecurity alarm. This is the primary near-peer exploitation vector that remains wholly unaddressed in public DoD disclosure.

Full analysis: [intelligencenotes.com/palantir-kill-chain]


Part II — The IDF’s Kill Machine

While Palantir provides the Western infrastructure, the Israel Defense Forces have shown what that infrastructure does at operational scale.

In Gaza, the IDF has deployed three AI targeting systems that are now the most studied case studies in military AI in the world.

The Gospel (Habsora) generates infrastructure target banks at machine speed — tunnel networks, command nodes, launch sites — at a rate that would take human analysts months to produce manually.

Lavender generates human target lists. By cross-referencing SIGINT, HUMINT, and social graph analysis, it assigned approximately 37,000 individuals as potential Hamas combatants. The average human review time per case before strike authorisation: 20 seconds. Human oversight has been structurally reduced to a formality.

“Where’s Daddy?” tracks targets’ movement patterns to identify when they return to residential locations, enabling strikes timed to maximise target presence at home. The result is documented high civilian casualty density in residential buildings.

The legal architecture is now broken. International Humanitarian Law — distinction, proportionality, precaution — assumes a human decision-maker who can be held accountable. When an algorithm generates the kill list and a human provides 20 seconds of review, the accountability chain collapses. The ICJ case (South Africa v. Israel) is the first formal engagement with this question. The precedents set here will govern all AI-enabled warfare that follows.

Full analysis: [intelligencenotes.com/idf-kill-machine]


The Strategic Picture

These two pieces connect into a single structural argument:

Palantir has built and now owns the data architecture that defines how Western militaries perceive the battlefield. The IDF has operationally demonstrated what AI-enabled targeting systems do when that architecture is deployed at scale in live urban warfare.

Every major military on Earth — the PLA, the Russian Federation, NATO members, regional powers — is studying Gaza as the empirical proof of concept for the doctrine of Intelligentised Warfare. The lessons being drawn:

  • AI targeting systems provide genuine generational advantages in target generation speed
  • The optimal countermeasure is not kinetic and not direct cyber — it is upstream data corruption of the intelligence feeds entering the AI
  • Legal accountability frameworks for algorithmic targeting do not yet exist; they are being built in practice before they are built in law
  • Any military without equivalent AI targeting capability is operating at a structural disadvantage in high-tempo warfare

What to Watch

  • ICJ proceedings (South Africa v. Israel) — the first systematic legal challenge to AI-enabled targeting. The judgments will set precedent.
  • US DoD JADC2 implementation — as Maven Smart System deployment expands, watch for procurement disclosures indicating which commands have gone fully Palantir-native.
  • PLA doctrine updates — China’s official doctrine documents (National Defence White Papers, Academy of Military Sciences publications) will increasingly reference Gaza data to justify intelligentised warfare investment.
  • Data supply chain security — the unaddressed vulnerability. Watch for any policy movement on securing commercial intelligence feeds entering military AI systems.

On the Vault

Intelligence notes is built on a living knowledge base at [intelligencenotes.com] — an interconnected graph of actors, concepts, weapons systems, crises, and historical events. Every article connects back to a structured network of source material.

The two full assessments referenced above are available on the site, with sourcing and cross-references.


Intelligence notes is published by Luiz H. S. Brandão — Intelligence Analyst and Strategic Studies Researcher specialising in Hybrid Threats & Cognitive Warfare.

Follow: @_Intellecta | @negisc_gepsi | @DiretoFront