Secrecy and Human Capital Management in US NSA and Israel Unit 8200
Total Page:16
File Type:pdf, Size:1020Kb
LOOSE LIPS BUILD SHIPS? Secrecy and Human Capital Management in US NSA and Israel Unit 8200 A THESIS SUBMITTED TO THE INTERSCHOOL HONORS PROGRAM IN INTERNATIONAL SECURITY STUDIES CENTER FOR INTERNATIONAL SECURITY AND COOPERATION FREEMAN SPOGLI INSTITUTE FOR INTERNATIONAL STUDIES STANFORD UNIVERSITY By: Lisa Catherine Wallace June 2014 Advisors: Mariano-Florentino Cuéllar Colonel Joseph Felter Abstract ! How do intelligence organizations attract and make use of top talent? This paper approaches this question through a comparative case study of the labor ecosystems surrounding both the US’ National Security Agency and IDF’s signals intelligence branch, Unit 8200. As the cyber realm continues to assume a growing role in modern national security threat environments, intelligence organizations must grow and adapt to accommodate these new objectives. This inevitably involves the question of how to attract and make use of top talent in order to solve difficult and highly technical national security problems. Israel and the United States share similar national security interests, and both possess burgeoning and impressive high-technology clusters. This paper claims that a growing, public network of Unit 8200 and other Intelligence Corps alumni is extant in Israel’s high-technology sector. Furthermore, affiliation with Unit 8200 has a positive signaling and social capital value. By contrast, this paper argues that alumni from the NSA do not possess as strong of a signaling or social capital value in the US. This paper argues that the NSA is hindered by the ontology, secrecy, and culture of the organization itself, as well as US public understanding of national security organizations and cyber threats. In Israel, this paper suggests that that Unit 8200’s associated signaling and social capital value benefits its alumni, Israel’s technology sector, and the unit itself. This paper argues that this phenomenon is unusual, and despite the uniqueness of Israel’s national security system, is prescriptive for the United States, where social capital and signaling is not directly leveraged by intelligence organizations as a recruiting tool. This paper argues that increasing the professional signaling and social capital value associated with intelligence organization affiliation is good for the organizations themselves by helping attract and make use of talent. ! ii Dedicated to Clifford Nass. ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! iii Acknowledgements My completion of this project would not have been possible without the help of some truly exceptional friends and mentors. First, I would like to thank my thesis advisors Colonel Joseph Felter and Professor Mariano-Florentino Cuéllar, both of whom devoted an extraordinary amount of time and investment into helping me construct and realize this thesis. Tino, I have been continuously amazed by how much I manage to learn from every session we have. Your advice is always so succinct it sounds rehearsed. Thank you for your patience and steadfast support of my project and of me. Joe, your commitment to undergraduate education and teaching is staggering. I learned so many skills about writing, international relations, and project conceptualization from your mentorship this year, skills that will stay with me long after I graduate. This is only surpassed by what you have taught me about leadership, which will stay with me even longer. Thank you. I am also incredibly thankful to Dr. Martha Crenshaw and Dr. Coit Blacker, the Co- Directors of the CISAC Honors Program. I have learned more than I can say from their mentorship and teaching of the CISAC Honors class. Both Professor Blacker and Professor Crenshaw are true examples of world-class academics, and it has been a privilege to learn from them this year. Special thanks to our TA Shiri Krebs for encouragement and last-minute assistance with logistical details. Separate from the official advisors to this project, I would like to thank a number of individuals associated with CISAC who were enormously helpful in the completion of this thesis. I absolutely could not have completed this project without the help of Ryan Mayfield. Ryan’s advice, editing, and moral support was absolutely invaluable. Additionally, I am truly grateful for Tim Junio’s support, counsel, and friendship over the course of the past year. Thank you to Neil Narang, Patrick Cirenza, and Peter Davis for watching me rehearse my presentation and providing helpful feedback. Thank you very much to Gil-li Vardi and Amir Goldberg for initial discussions of this project and its disciplinary approach. Thank you to Russell Wald for keeping my project and research interests in mind and helping with interview scheduling. Special thanks to the cyber contingent of the CISAC Honors Program. Mailyn Fidler was invaluable with editing these chapters and extraordinarily generous with her time and support. Connor Gilbert helped significantly in project framing and keen input. I would also like to thank the rest of the CISAC cohort, Yassamin, Claire, Isabella, Lauryn, Elle, Daniel, James, Reed, and Keshav, for their friendship and mentorship. Small Unit Cohesion is a great thing. Finally, I would like to thank Marc Abramowitz, Yitz Applbaum, and Nimrod Ran for their help securing interviews and opportunities in Israel. I am forever grateful for those experiences and favors. iv Table of Contents Abstract(...................................................................................................................................................(ii! Acknowledgements(............................................................................................................................(iv! Table(of(Figures(..................................................................................................................................(vii! Chapter(1:(Introduction(......................................................................................................................1! Argument(...........................................................................................................................................................(3! Methodology(.....................................................................................................................................................(4! Significance(.......................................................................................................................................................(6! Road(Map(...........................................................................................................................................................(6! Chapter(2:(Conceptualizing(Human(Capital(in(Intelligence(Organizations(........................9! Organization(Theory(...................................................................................................................................(10! Signaling(..........................................................................................................................................................(12! Networks(.........................................................................................................................................................(13! Chapter(3:(Working(for(the(Surveillance(State:(the(US(National(Security(Agency(........(16! The(Cyber(Age(................................................................................................................................................(18! The(Agency(......................................................................................................................................................(20! Case(Limitations(............................................................................................................................................(21! The(Network(...................................................................................................................................................(23! Secrecy(..............................................................................................................................................................(29! Current(Strategy(............................................................................................................................................(37! Credential(........................................................................................................................................................(40! Conclusion(.......................................................................................................................................................(43! Chapter(4:(Network(Effects(.............................................................................................................(44! Unit(8200(.........................................................................................................................................................(46! Part(1:(The(Unit(8200(Network(................................................................................................................(47! An!Unenforced!Policy!of!Secrecy!...........................................................................................................................!47! Brain!Security!is!National!Security!.......................................................................................................................!52! Part(2:(The(Unit(8200(Credential(.............................................................................................................(56!