When the revolving door harms national security

Washington’s revolving door, whereby policymakers and other government officials cash out and put their public service experience and connections to work for private interests, has always been corrupting to our democracy. But it’s also harmful to our national security.

When U.S. cybersecurity officials cash out to private firms, and those private firms go to work for foreign governments, they are making the U.S. vulnerable by sharing our secrets with U.S. adversaries.

In her new book on U.S. cybersecurity weakness, Nicole Perloth tells some stories from the cyber revolving door. An excerpt in the New York Times includes a couple.

N.S.A. analysts left the agency to start cyber arms factories, like Vulnerability Research Labs, in Virginia, which sold click-and-shoot tools to American agencies and our closest Five Eyes English-speaking allies. One contractor, Immunity Inc., founded by a former N.S.A. analyst, embarked on a slippier slope. First, employees say, Immunity trained consultants like Booz Allen, then defense contractor Raytheon, then the Dutch and the Norwegian governments. But soon the Turkish army came knocking.

Companies like CyberPoint took it further, stationing themselves overseas, sharing the tools and tradecraft the U.A.E. would eventually turn on its own people. In Europe, purveyors of the Pentagon’s spyware, like Hacking Team, started trading those same tools to Russia, then Sudan, which used them to ruthless effect.

Congress and the NSA should do something about this. Our own snoops shouldn’t be allowed to go to work for foreign countries.

Related Content