Secrecy and Human Capital Management in US NSA and Israel Unit 8200

Total Page:16

File Type:pdf, Size:1020Kb

Secrecy and Human Capital Management in US NSA and Israel Unit 8200 LOOSE LIPS BUILD SHIPS? Secrecy and Human Capital Management in US NSA and Israel Unit 8200 A THESIS SUBMITTED TO THE INTERSCHOOL HONORS PROGRAM IN INTERNATIONAL SECURITY STUDIES CENTER FOR INTERNATIONAL SECURITY AND COOPERATION FREEMAN SPOGLI INSTITUTE FOR INTERNATIONAL STUDIES STANFORD UNIVERSITY By: Lisa Catherine Wallace June 2014 Advisors: Mariano-Florentino Cuéllar Colonel Joseph Felter Abstract ! How do intelligence organizations attract and make use of top talent? This paper approaches this question through a comparative case study of the labor ecosystems surrounding both the US’ National Security Agency and IDF’s signals intelligence branch, Unit 8200. As the cyber realm continues to assume a growing role in modern national security threat environments, intelligence organizations must grow and adapt to accommodate these new objectives. This inevitably involves the question of how to attract and make use of top talent in order to solve difficult and highly technical national security problems. Israel and the United States share similar national security interests, and both possess burgeoning and impressive high-technology clusters. This paper claims that a growing, public network of Unit 8200 and other Intelligence Corps alumni is extant in Israel’s high-technology sector. Furthermore, affiliation with Unit 8200 has a positive signaling and social capital value. By contrast, this paper argues that alumni from the NSA do not possess as strong of a signaling or social capital value in the US. This paper argues that the NSA is hindered by the ontology, secrecy, and culture of the organization itself, as well as US public understanding of national security organizations and cyber threats. In Israel, this paper suggests that that Unit 8200’s associated signaling and social capital value benefits its alumni, Israel’s technology sector, and the unit itself. This paper argues that this phenomenon is unusual, and despite the uniqueness of Israel’s national security system, is prescriptive for the United States, where social capital and signaling is not directly leveraged by intelligence organizations as a recruiting tool. This paper argues that increasing the professional signaling and social capital value associated with intelligence organization affiliation is good for the organizations themselves by helping attract and make use of talent. ! ii Dedicated to Clifford Nass. ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! ! iii Acknowledgements My completion of this project would not have been possible without the help of some truly exceptional friends and mentors. First, I would like to thank my thesis advisors Colonel Joseph Felter and Professor Mariano-Florentino Cuéllar, both of whom devoted an extraordinary amount of time and investment into helping me construct and realize this thesis. Tino, I have been continuously amazed by how much I manage to learn from every session we have. Your advice is always so succinct it sounds rehearsed. Thank you for your patience and steadfast support of my project and of me. Joe, your commitment to undergraduate education and teaching is staggering. I learned so many skills about writing, international relations, and project conceptualization from your mentorship this year, skills that will stay with me long after I graduate. This is only surpassed by what you have taught me about leadership, which will stay with me even longer. Thank you. I am also incredibly thankful to Dr. Martha Crenshaw and Dr. Coit Blacker, the Co- Directors of the CISAC Honors Program. I have learned more than I can say from their mentorship and teaching of the CISAC Honors class. Both Professor Blacker and Professor Crenshaw are true examples of world-class academics, and it has been a privilege to learn from them this year. Special thanks to our TA Shiri Krebs for encouragement and last-minute assistance with logistical details. Separate from the official advisors to this project, I would like to thank a number of individuals associated with CISAC who were enormously helpful in the completion of this thesis. I absolutely could not have completed this project without the help of Ryan Mayfield. Ryan’s advice, editing, and moral support was absolutely invaluable. Additionally, I am truly grateful for Tim Junio’s support, counsel, and friendship over the course of the past year. Thank you to Neil Narang, Patrick Cirenza, and Peter Davis for watching me rehearse my presentation and providing helpful feedback. Thank you very much to Gil-li Vardi and Amir Goldberg for initial discussions of this project and its disciplinary approach. Thank you to Russell Wald for keeping my project and research interests in mind and helping with interview scheduling. Special thanks to the cyber contingent of the CISAC Honors Program. Mailyn Fidler was invaluable with editing these chapters and extraordinarily generous with her time and support. Connor Gilbert helped significantly in project framing and keen input. I would also like to thank the rest of the CISAC cohort, Yassamin, Claire, Isabella, Lauryn, Elle, Daniel, James, Reed, and Keshav, for their friendship and mentorship. Small Unit Cohesion is a great thing. Finally, I would like to thank Marc Abramowitz, Yitz Applbaum, and Nimrod Ran for their help securing interviews and opportunities in Israel. I am forever grateful for those experiences and favors. iv Table of Contents Abstract(...................................................................................................................................................(ii! Acknowledgements(............................................................................................................................(iv! Table(of(Figures(..................................................................................................................................(vii! Chapter(1:(Introduction(......................................................................................................................1! Argument(...........................................................................................................................................................(3! Methodology(.....................................................................................................................................................(4! Significance(.......................................................................................................................................................(6! Road(Map(...........................................................................................................................................................(6! Chapter(2:(Conceptualizing(Human(Capital(in(Intelligence(Organizations(........................9! Organization(Theory(...................................................................................................................................(10! Signaling(..........................................................................................................................................................(12! Networks(.........................................................................................................................................................(13! Chapter(3:(Working(for(the(Surveillance(State:(the(US(National(Security(Agency(........(16! The(Cyber(Age(................................................................................................................................................(18! The(Agency(......................................................................................................................................................(20! Case(Limitations(............................................................................................................................................(21! The(Network(...................................................................................................................................................(23! Secrecy(..............................................................................................................................................................(29! Current(Strategy(............................................................................................................................................(37! Credential(........................................................................................................................................................(40! Conclusion(.......................................................................................................................................................(43! Chapter(4:(Network(Effects(.............................................................................................................(44! Unit(8200(.........................................................................................................................................................(46! Part(1:(The(Unit(8200(Network(................................................................................................................(47! An!Unenforced!Policy!of!Secrecy!...........................................................................................................................!47! Brain!Security!is!National!Security!.......................................................................................................................!52! Part(2:(The(Unit(8200(Credential(.............................................................................................................(56!
Recommended publications
  • ASD-Covert-Foreign-Money.Pdf
    overt C Foreign Covert Money Financial loopholes exploited by AUGUST 2020 authoritarians to fund political interference in democracies AUTHORS: Josh Rudolph and Thomas Morley © 2020 The Alliance for Securing Democracy Please direct inquiries to The Alliance for Securing Democracy at The German Marshall Fund of the United States 1700 18th Street, NW Washington, DC 20009 T 1 202 683 2650 E [email protected] This publication can be downloaded for free at https://securingdemocracy.gmfus.org/covert-foreign-money/. The views expressed in GMF publications and commentary are the views of the authors alone. Cover and map design: Kenny Nguyen Formatting design: Rachael Worthington Alliance for Securing Democracy The Alliance for Securing Democracy (ASD), a bipartisan initiative housed at the German Marshall Fund of the United States, develops comprehensive strategies to deter, defend against, and raise the costs on authoritarian efforts to undermine and interfere in democratic institutions. ASD brings together experts on disinformation, malign finance, emerging technologies, elections integrity, economic coercion, and cybersecurity, as well as regional experts, to collaborate across traditional stovepipes and develop cross-cutting frame- works. Authors Josh Rudolph Fellow for Malign Finance Thomas Morley Research Assistant Contents Executive Summary �������������������������������������������������������������������������������������������������������������������� 1 Introduction and Methodology ��������������������������������������������������������������������������������������������������
    [Show full text]
  • Trend Analysis the Israeli Unit 8200 an OSINT-Based Study CSS
    CSS CYBER DEFENSE PROJECT Trend Analysis The Israeli Unit 8200 An OSINT-based study Zürich, December 2019 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich Trend analysis: The Israeli Unit 8200 – An OSINT-based study Author: Sean Cordey © 2019 Center for Security Studies (CSS), ETH Zurich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zurich CH-8092 Zurich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zurich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group, Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Cordey, S. (2019). Trend Analysis: The Israeli Unit 8200 – An OSINT-based study. Center for Security Studies (CSS), ETH Zürich. 1 Trend analysis: The Israeli Unit 8200 – An OSINT-based study . Table of Contents 1 Introduction 4 2 Historical Background 5 2.1 Pre-independence intelligence units 5 2.2 Post-independence unit: former capabilities, missions, mandate and techniques 5 2.3 The Yom Kippur War and its consequences 6 3 Operational Background 8 3.1 Unit mandate, activities and capabilities 8 3.2 Attributed and alleged operations 8 3.3 International efforts and cooperation 9 4 Organizational and Cultural Background 10 4.1 Organizational structure 10 Structure and sub-units 10 Infrastructure 11 4.2 Selection and training process 12 Attractiveness and motivation 12 Screening process 12 Selection process 13 Training process 13 Service, reserve and alumni 14 4.3 Internal culture 14 5 Discussion and Analysis 16 5.1 Strengths 16 5.2 Weaknesses 17 6 Conclusion and Recommendations 18 7 Glossary 20 8 Abbreviations 20 9 Bibliography 21 2 Trend analysis: The Israeli Unit 8200 – An OSINT-based study selection tests comprise a psychometric test, rigorous Executive Summary interviews, and an education/skills test.
    [Show full text]
  • The Truth of the Capture of Adolf Eichmann (Pdf)
    6/28/2020 The Truth of the Capture of Adolf Eichmann » Mosaic THE TRUTH OF THE CAPTURE OF ADOLF EICHMANN https://mosaicmagazine.com/essay/history-ideas/2020/06/the-truth-of-the-capture-of-adolf-eichmann/ Sixty years ago, the infamous Nazi official was abducted in Argentina and brought to Israel. What really happened, what did Hollywood make up, and why? June 1, 2020 | Martin Kramer About the author: Martin Kramer teaches Middle Eastern history and served as founding president at Shalem College in Jerusalem, and is the Koret distinguished fellow at the Washington Institute for Near East Policy. Listen to this essay: Adolf Eichmann’s Argentinian ID, under the alias Ricardo Klement, found on him the night of his abduction. Yad Vashem. THE MOSAIC MONTHLY ESSAY • EPISODE 2 June: The Truth of the Capture of Adolf Eichmann 1x 00:00|60:58 Sixty years ago last month, on the evening of May 23, 1960, the Israeli prime minister David Ben-Gurion made a brief but dramatic announcement to a hastily-summoned session of the Knesset in Jerusalem: A short time ago, Israeli security services found one of the greatest of the Nazi war criminals, Adolf Eichmann, who was responsible, together with the Nazi leaders, for what they called “the final solution” of the Jewish question, that is, the extermination of six million of the Jews of Europe. Eichmann is already under arrest in Israel and will shortly be placed on trial in Israel under the terms of the law for the trial of Nazis and their collaborators. In the cabinet meeting immediately preceding this announcement, Ben-Gurion’s ministers had expressed their astonishment and curiosity.
    [Show full text]
  • We Only Spy on Foreigners": the Myth of a Universal Right to Privacy and the Practice of Foreign Mass Surveillance
    Chicago Journal of International Law Volume 18 Number 2 Article 3 1-1-2018 "We Only Spy on Foreigners": The Myth of a Universal Right to Privacy and the Practice of Foreign Mass Surveillance Asaf Lubin Follow this and additional works at: https://chicagounbound.uchicago.edu/cjil Recommended Citation Lubin, Asaf (2018) ""We Only Spy on Foreigners": The Myth of a Universal Right to Privacy and the Practice of Foreign Mass Surveillance," Chicago Journal of International Law: Vol. 18: No. 2, Article 3. Available at: https://chicagounbound.uchicago.edu/cjil/vol18/iss2/3 This Article is brought to you for free and open access by Chicago Unbound. It has been accepted for inclusion in Chicago Journal of International Law by an authorized editor of Chicago Unbound. For more information, please contact [email protected]. “We Only Spy on Foreigners”: The Myth of a Universal Right to Privacy and the Practice of Foreign Mass Surveillance Asaf Lubin Abstract The digital age brought with it a new epoch in global political life, one neatly coined by Professor Philip Howard as the “pax technica.” In this new world order, government and industry are “tightly bound” in technological and security arrangements that serve to push forward an information and cyber revolution of unparalleled magnitude. While the rise of information technologies tells a miraculous story of triumph over the physical constraints that once shackled mankind, these very technologies are also the cause of grave concern. Intelligence agencies have been recently involved in the exercise of global indiscriminate surveillance, which purports to go beyond their limited territorial jurisdiction and sweep in “the telephone, internet, and location records of whole populations.” Today’s political leaders and corporate elites are increasingly engaged in these kinds of programs of bulk interception, collection, mining, analysis, dissemination, and exploitation of foreign communications data that are easily susceptible to gross abuse and impropriety.
    [Show full text]
  • Spy Culture and the Making of the Modern Intelligence Agency: from Richard Hannay to James Bond to Drone Warfare By
    Spy Culture and the Making of the Modern Intelligence Agency: From Richard Hannay to James Bond to Drone Warfare by Matthew A. Bellamy A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (English Language and Literature) in the University of Michigan 2018 Dissertation Committee: Associate Professor Susan Najita, Chair Professor Daniel Hack Professor Mika Lavaque-Manty Associate Professor Andrea Zemgulys Matthew A. Bellamy [email protected] ORCID iD: 0000-0001-6914-8116 © Matthew A. Bellamy 2018 DEDICATION This dissertation is dedicated to all my students, from those in Jacksonville, Florida to those in Port-au-Prince, Haiti and Ann Arbor, Michigan. It is also dedicated to the friends and mentors who have been with me over the seven years of my graduate career. Especially to Charity and Charisse. ii TABLE OF CONTENTS Dedication ii List of Figures v Abstract vi Chapter 1 Introduction: Espionage as the Loss of Agency 1 Methodology; or, Why Study Spy Fiction? 3 A Brief Overview of the Entwined Histories of Espionage as a Practice and Espionage as a Cultural Product 20 Chapter Outline: Chapters 2 and 3 31 Chapter Outline: Chapters 4, 5 and 6 40 Chapter 2 The Spy Agency as a Discursive Formation, Part 1: Conspiracy, Bureaucracy and the Espionage Mindset 52 The SPECTRE of the Many-Headed HYDRA: Conspiracy and the Public’s Experience of Spy Agencies 64 Writing in the Machine: Bureaucracy and Espionage 86 Chapter 3: The Spy Agency as a Discursive Formation, Part 2: Cruelty and Technophilia
    [Show full text]
  • Location, Event&Q
    # from what/ where which how why who for MOBILE versi on click here when who who where when index source "location, event" "phys, pol, med, doc" detail physical detail political name "9/11 Truth Interactive Spreadsheet Click on dow n arrow to sort / filter, click again to undo." Top 100 / compilations entity entity detail country / state date Item .. right-click on li nk to open in new tab 1 "Francis, Stephen NFU" WTC physical Controlled demolition Explosive experts "Overwhelming evidence indicates that a combination of n uclear, thermitic and conventional explosives were used in a controlled demoliti on of the WTC on 9/11. Nanothermite contributed but does not have sufficient det onation velocity to pulverize the WTC into dust. Architects & Engineers for 9/11 Truth is leading gatekeeper trying to deflect Israel's role. See Cozen O'Connor 9/11 lawsuit." pic "9/11 Truth, anti-Zionists" Engineers / Scie ntists "U.S., Israel, SA, Britain" 2 "Francis, Stephen NFU" "WTC, Pentagon, PA" political False flag Cabal "The cabal: U.S., Britain, Saudi Arabia and Israel execu ted the 9/11 false flag attack in order to usher in a new 'war on terror' along with the Iraq and Afghanistan wars and fullfil the PNAC's 'Full Spectrum Dominan ce' of the Middle East and its resources ... all have roots that go back to Zion ist / Nazi Germany, the Cold War ... 9/11 was a planned step." lnk Intel ag encies "Cabal: US, UK, Israel & SA" Mossad / Sayeret Matkal "U.S., Israel, S A, Britain" 3 "Fox, Donald" WTC 1-2 physical "Mini Neutron, Fissionless Fusio n" Controlled demolition "VeteransToday: Fox, Kuehn, Prager, Vike n,Ward, Cimono & Fetzer on mini neutron bombs discuss all major WTC theories micr o nuke (neutron) most promising comparatively low blast effects, a quick blast o f radiation that doesn't linger, a series of shape charged mini-neutron bombs we re detonated from top to bottom to simulate a free fall collapse.
    [Show full text]
  • National Security Agency
    Coordinates: 39°6′32″N 76°46′17″W National Security Agency The National Security Agency (NSA) is a national-level intelligence agency of the United National Security Agency States Department of Defense, under the authority of the Director of National Intelligence. The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems.[8][9] The NSA relies on a variety of measures to accomplish its Seal of the National Security Agency mission, the majority of which are clandestine.[10] Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Since then, it has become the largest of the U.S. intelligence organizations in terms of Flag of the National Security Agency personnel and budget.[6][11] The NSA currently conducts worldwide mass data collection and has been known to physically bug electronic systems as one method to this end.[12] The NSA is also alleged to have been behind such attack software as Stuxnet, which severely damaged Iran's nuclear program.[13][14] The NSA, alongside the Central Intelligence Agency (CIA), maintains a physical presence in many countries across the globe; the CIA/NSA joint Special Collection Service (a NSA Headquarters, Fort Meade, Maryland highly classified intelligence team) inserts eavesdropping devices in high value targets (such Agency overview as presidential palaces or embassies).
    [Show full text]
  • 1 the Anglo-Israel Association 2016 / 2017
    2016 / 2017 THE ANGLO-ISRAEL ASSOCIATION 1 WHO WE ARE FOUNDER COUNCIL The Late Brigadier General Lady Sainsbury (Chairman) Sir Wyndham Deedes, CMG, DSO Lady Anderson Sir Andrew Burns, KCMG HON PRESIDENT The Earl of Balfour CONTENTS HE The Ambassador of Israel Mrs E Corob Dame Vivien Duffield, DBE Chairman’s Message 5 HON VICE-PRESIDENTS Mr JM Greenwood Mr M Green Mrs M Park Shimon Peres: A Great Statesman, a Tragic Politician 6 Mrs L Hochhauser The Marquess of Reading Mr J Marshall Mr D Sumberg New Beginnings, stronger ties by HE David Quarrey, HM Ambassador to Israel 10 Mr GR Pinto The Lord Weidenfeld Lady Sainsbury The Rt Hon The Lord Woolf, PC Jews and the Temple Mount 12 Mr A Yablon EXECUTIVE COMMITTEE (TRUSTEES) Doves and Hawks in the Israeli Political Debate 18 The Lord Bew (Chairman) DINNER COMMITTEE Mrs J Atkin Lady Baker (Co Chairman) Palestinians: The Power Struggle between Young Guard and Old Guard 20 Lady Baker Mr A Reeve (Co Chairman) Mr R Bolchover (Co-Deputy Chairman) Ms L Diamond Ethnic Harmony in an Israeli City you never heard of 23 Miss B Dingle Mr B Streather Professor D Hochhauser (Co-Deputy Chairman) Mrs E Tarling UN has Lost Credibility, Integrity Due to Unfair Treatment of Israel by Yair Lapid 24 Mr D Kessler Mr H Lewis FCA (Hon Treasurer) EXECUTIVE DIRECTOR Palestinian terrorism and Muslim hypocrisy: An open letter from a Muslim woman 25 Ms O Polizzi Mrs Ruth Saunders Mr A Reeve In the News 26 Mr B Streather Mrs E Tarling Israel’s First Master of Wine 29 Mr T Vince Brits on tour to the Start-up- Nation 30 Innovations from Israel 32 FOLLOW THE ANGLO-ISRAEL ASSOCIATION ON FACEBOOK AND TWITTER AT: ‘Catch the Jew’ 48 ‘A Reflection’ 50 facebook.com/AngloIsraelAssoc/ @AngloIsraelAssn The Eleventh Anglo-Israel Colloquium 52 Debating Matters Israel 56 7th Ambassadors’ Round table 58 ANGLO-ISRAEL ASSOCIATION Informal Fallacies and Israel Discussion 60 PO Box 47819, London NW11 7WD T: 020 8458 1284 F.
    [Show full text]
  • Incoming Letter: Radvision
    CARTER LEDYARD & MILBURN LLP Counselors at Law 701 8th Street, N. w., Suite 410 2 Wall Street Washington, DC 20001-3893 Steven J. Glusband (202) 898-1515 Partner New York. NY 10005-2072 570 Lexington Avenue Direct Dial: 212-238-8605 Tel (212) 732-3200 New York, NY 10022-6856 E-mail: [email protected] Fax (212) 732-3232 (212) 371-2720 April 13,2009 Securities and Exchange Commission Division of Corporation Finance Office ofMergers and Acquisitions 100 F Street, NE Washington, D.C. 20549 Attention: Christina Chalk, Esq. Michele Anderson, Esq. Re: Request for exemptive relief from the provisions of Rule 14d-7(a)(1) and no-action relief under the provisions of Rule 14e-l(c) promulgated under the Securities Exchange Act of 1934, as amended Ladies and Gentlemen: We are submitting this request for exemptive and no-action relief on behalf of our client, Mr. Zohar Zisapel, a resident and citizen of the State ofIsrael. Mr. Zisapel intends to commence a tender offer (the "Offer") to purchase ordinary shares, par value NIS 1.00 per share (the "Ordinary Shares"), of Radvision Ltd. (the "Company"), so as to increase his voting power therein from 24.5%1 to approximately 29.5%. (The exact number of Ordinary Shares sought to be purchased in the Offer will be determined prior to the commencement of the Offer and will be disclosed in the offer to purchase relating thereto.) Mr. Zisapel hereby requests that the Securities and Exchange Commission (the "Commission") grant exemptive relief from the provisions of Rule 14d-7(a)(1), and no-action relief from the provisions of Rule 14e-l(c), in each case promulgated under the Securities Exchange Act of 1934, as amended (the "Exchange Act"), to allow him to extend his tender offer and conduct a four-calendar day additional offering period as mandated by applicable Israeli law.
    [Show full text]
  • Russell Berrie Nanotechnology Institute
    Russell Berrie Nanotechnology Institute Technion - Israel Institute of Technology Nano Review 2012/14 The RBNI vision of transformation that is happening at Technion City, in Israel and across the globe is shared by the philanthropic Russell Berrie Foundation, the Government of Israel through the Forum for National R&D Infrastructure (TELEM) and the Technion - Israel’s first institute of technology. Making real Russell Berrie Foundation the dream: Government of Israel Technion - Israel Institute of Technology GUARDIAN MENTOR BUILDER Leo and Julia Forchheimer Barbara, Robert and Marguerite Barazani Matilda and Gabriel Barnett Estate of Dr. Lillian Chutick Foundation Samuel Goldfarb Greenberg Marshall and Marilyn Butler Edward Epstein Davi-Linda and David Charlotte and Jules Joskow Berkowitz Estate Alan and Tatyana Forman The Rosalinde and Arthur Friedman Walter Kann Russell Berrie Foundation Sidney Slauson Gilbert Foundation Friends of Technion Fund at Earle and Judy Kazis Estate of Lee Goodstein Joseph and Bernice Shirley and Marshall Mazer Combined Jewish Foundation Fund Sanford Kaplan Trust Tanenbaum Family Philanthropies Eugene M. Lang Foundation Legacy Heritage Fund Limited Sandy and Herb Pollack Paula and James Gould Nancy and Sid Lejfer Lorry I. Lokey BENEFACTOR Queensboro Hill Jewish Claire and Sidney Handler Deborah and Stuart Levey Rechler Foundation Norman and Vivian Belmonte Centre Jewish Communal Fund Barrie and Ilya Mirman Ben and Esther Rosenbloom Isabelle and Scott Black Judith and Herman Swartz Margaret and Marvin Menzin Esther Mishkin Foundation Estate of Raya Cowan Wagner-Braunsberg Family Gloria and Sonny Monosson Herbert and Celia Mittleman Eric F. Ross Aaron Etra Wunsch Foundation Edith and Sidney Posel Nelco Foundation Safra Foundation Dean R.
    [Show full text]
  • H Subject: Fw: Sawers / Telegraph Articles
    UNCLASSIFIED U.S. Department of State Case No. F-2014-20439 Doc No. C05795070 Date: 02/13/2016 RELEASE IN PART B1,1.4(B),1.4(D),B6 From: H <[email protected] > Sent: Friday, July 13, 2012 1:46 AM To: '[email protected]' Subject: Re: Sawers / Telegraph articles Classified by DAS, A/GIS, DoS on 02/13/2016 — Class: Gobsmacking! CONFIDENTIAL — Reason: 1.4(B), 1.4(D) — Declassify on: 07/13/2032 From: Sullivan, Jacob 3 [mailto:[email protected]] Sent: Thursday, July 12, 2012 11:18 PM To: H Subject: Fw: Sawers / Telegraph articles See the article down the string. From: Sherman, Wendy R Sent: Thursday, July 12, 2012 09:25 PM To: Nuland, Victoria 3; Murad, Eshel William; Hammer, Michael A; Ventrell, Patrick H; Sullivan, Jacob 3; Einhorn, Robert 3; 'Benjamin_3._Rhodes <Benjamin_l_Rhodes B6 Cc: Grantham, Chris W; Lakhdhir, Kannala S Subject: Re: Sawers / Telegraph articles Yes, Chris Grantham on my staff sent me an Alert Iran that had this story. Most unfortunate on many levels to say the least. Where to begin... From: Nuland, Victoria J Sent: Thursday, July 12, 2012 09:08 PM To: Murad, Eshel William; Hammer, Michael A; Ventrell, Patrick H• Sullivan Jacob 3; Sherman, Wendy R; Einhorn, Robert 3; 'Benjamin J. Rhodes <Benjamin J._Rhodes B6 Subject: Fw: Sawers / Telegraph articles Fysa - this from my UK embassy contact. Sawers heads MI6. From: James.Barbour [mailto B6 Sent: Thursday, July 12, 2012 06:21 PM To: Nuland, Victoria 3 Cc: Toner, Mark C Subject: FW: Sawers / Telegraph articles Toria, 1.4(B) 1.4(D) B1 UNCLASSIFIED U.S.
    [Show full text]
  • Ceragon Networks Ltd. Notice of 2018 Annual General Meeting of Shareholders ___
    CERAGON NETWORKS LTD. ___________________________________________ NOTICE OF 2018 ANNUAL GENERAL MEETING OF SHAREHOLDERS ___________________________________________ TO BE HELD ON JUNE 12, 2018 Notice is hereby given that the 2018 Annual General Meeting of Shareholders (the “Meeting”) of Ceragon Networks Ltd. (the “Company”) will be held on Tuesday, June 12, 2018 at 5:00 p.m. (Israel time), at the offices of the Company, 24 Raoul Wallenberg Street, Tel Aviv, Israel, for the following purposes: 1. To re-elect Zohar Zisapel, Yael Langer and Shlomo Liran, and to elect Ira Palti, our President and CEO, and Avi Eizenman, to serve on the Board of Directors of the Company and to approve a grant of options to each of them (except for Mr. Palti), as part of their consideration for service as directors; 2. To elect Avi Berger and Meir Sperling to serve on the Board of Directors of the Company as external directors, and to approve a grant of options to each of them, as part of their consideration for service as external directors; 3. To approve amendments to the Company's Executives & Directors Compensation Policy; 4. To approve a cash bonus plan and equity compensation to our Chief Executive Officer for 2018; and 5. To re-appoint Kost Forer Gabbay & Kasierer, a Member of Ernst & Young Global, as the Company’s independent auditor for the fiscal year ending December 31, 2018 and until immediately following the next annual general meeting of shareholders. In the Meeting, you will also have an opportunity to receive and consider the auditor’s report and the audited consolidated financial statements of the Company for the fiscal year ended December 31, 2017.
    [Show full text]