ir4099 - outsourcing of us intelligence dissertation v2

57
THE OUTSOURCING OF U.S. INTELLIGENCE Robert Akira Watson (110001586) This dissertation is submitted in part requirement for the Degree of M.A. (Honors with International Relations) at the University of St Andrews, Scotland, and is solely the work of the above named candidate. 24 April 2015 12,600 words

Upload: robert-akira-watson

Post on 17-Feb-2017

170 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: IR4099 - Outsourcing of US Intelligence dissertation v2

THE  OUTSOURCING  OF  U.S.  INTELLIGENCE  

 Robert  Akira  Watson  (110001586)  

     

         

This  dissertation  is  submitted  in  part  requirement  for  the  Degree  of  M.A.  (Honors  with  International  Relations)  at  the  University  of  St  Andrews,  

Scotland,  and  is  solely  the  work  of  the  above  named  candidate.    

         24  April  2015                                  12,600  words  

Page 2: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

1  

   

   

TABLE  OF  CONTENTS          

Abstract………………………………………………………………………….……………………………………...2    I−Introduction………………………………………………………………………………………………………..3    II−Intelligence  Contracting……………………………………………………………………………………...5    III−The  U.S.  Intelligence  Community  and  its  Place  in  Government……………………………..11    IV−Bureaucracy  and  Bureaucratic  Politics……………………………………………………………...14    V−Privatization  and  Principal-­‐Agent  Theory…………………………………………………………..21    VI−Issues  with  Intelligence  Contracting………………………………………………………………….28    VII−The  IC’s  Demand  for  Expertise…………………………………………………………………………45    VIII−Conclusion…………………………………………………………………………………………………….52    Appendix:  Glossary  of  Acronyms……………………………………………………………………………..53    References…………………………………………………………………………………………………………....54  

                         

 

Page 3: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

2  

         

ABSTRACT        

Private   contracting   in   U.S.   intelligence   is   a   $50   billion   per   year   industry   that   has  

received   little  public  and  academic  attention.    This  paper  aims   to   shed   light  on   this  

topic   by   evaluating   what   happens   when   contractors,   as   private   actors,   are   deeply  

involved   in   as   sensitive   an   activity   as   intelligence,   traditionally   reserved   to  

government.    To  support  discussion,  frameworks  for  public  and  private  provision  are  

developed,  and  principal-­‐agent  theory  is  extensively  used.    Intelligence  contracting  is  

studied  by   considering   the  problematic   issues   that   arise   in   the  private  provision  of  

different   intelligence   functions.     These   issues   taken   whole   provide   a   substantive  

argument   against   outsourcing   intelligence   to   contractors.   The   Intelligence  

Community’s   unique   demands   for   expertise   provide   the   thrust   of   the   argument   in  

favor   of   bounded   intelligence   contracting.     Through   its   dialectical   approach,   this  

paper  is  able  to  generate  normative  prescriptions  for  the  appropriate  use  of  private  

contractors  in  intelligence.      

                       

Page 4: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

3  

 THE  OUTSOURCING  OF  U.S.  INTELLIGENCE  

     

I.  INTRODUCTION        This   paper   examines   the   subject   of   intelligence   contracting.     The   involvement   of  

private  contractors   in   the  most  sensitive   functions  of  government  has  been  a  rising  

silent  trend  over  the  past  two  decades,  most  prevalent  in  the  United  States;  as  such,  

this   paper   exclusively   deals   with   contracting   in   within   the   17-­‐member   U.S.  

Intelligence   Community   (IC).     Intelligence   contracting   raises   serious,   troubling  

questions   about   conflict   of   interest,   democratic   accountability,   and   the   nature   of  

government   responsibility,   to   name   a   few.     This   paper   seeks   to   understand   the  

dynamics  at  work  when  contractors,  as  private  actors,  participate  in  what  most  would  

consider   inherently   governmental   functions,   and   from   this,   derive   a   normative  

conclusion  on  whether  this  involvement  is  appropriate.      

 

The   weight   of   the   legal   and   ethical   issues   associated   with   intelligence  

contracting  contrasts  with  the  dearth  of  public  and  academic  attention  the  subject  has  

received.     Pervasive   secrecy   surrounds   intelligence,   extending   to   the   use   of  

contractors.     Official   figures   are   difficult   to   come   by;   intelligence   budgets   are  

classified  and  contracting  companies  are  usually  not  at  liberty  to  disclose  their  work  

with   the   IC   in   much   detail   (Shorrock,   2008:   17).     Secrecy   creates   real   barriers   to  

scholarship   (Crampton,   Roberts,   and   Poorthuis,   2014:   197).     There   has   been   scant  

research   devoted   specifically   to   intelligence   contracting   (Shorrock,   2008;  

Chesterman,  2008;  Crampton  et  al.,  2014;  Hansen,  2006;  Krishnan,  2011).    The  topic  

Page 5: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

4  

does   sometimes   receive   passing   mention   in   the   larger   study   of   private   military  

contracting  as  well  as  intelligence  (Chesterman  and  Lednardt,  2009;  Isenberg,  2009;  

Singer,  2008).      

 

This   paper   makes   full   use   of   the   above   material,   as   well   as   unclassified  

government   reports   on   IC   contracting.     However,   achieving   this   paper’s   objectives  

requires   going   outside   the   strict   purview   of   international   relations   and   political  

science.    I  enlist  scholarship  in  public  administration,  bureaucracy,  and  privatization  

to  develop  a  theoretical  framework  for  approaching  intelligence  contracting.    Models  

of   public   and   private   provision,   including   their   respective   advantages   and  

disadvantages,   are   conceptualized;   intelligence   can   be   construed   as   a   service   to   be  

provided   by   either.     The   general   role   of   intelligence   in   U.S.   government   is   used   to  

provide   a   frame   of   reference   for   private   contracting.     Principal-­‐agent   theory  

undergirds  much   of   the   paper’s   discussion.    With   these   conceptual   instruments   in  

place,   intelligence   contracting   is   dissected   according   to   the   various   issues   and  

dilemmas   it   entails.    These   issues  are  weighted  against   the   IC’s  particular  demands  

for  expertise,  from  which  a  final  normative  assessment  of  intelligence  contracting  can  

be  made.  

                         

Page 6: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

5  

   

II.  INTELLIGENCE  CONTRACTING        Some   good   scholarship   has   been   written   about   private   military   and   security  

companies   (PMSCs)   amidst   their   rising   use   in   the   2000s.     PMSCs   may   offer   their  

services   to   state   and   non-­‐state   actors,   including   national   militaries   and   private  

businesses,  for  a  fee.    Intelligence  contractors  form  a  distinct  subsection  in  the  PMSC  

industry.     Their   use   by   the   U.S.   government   is   the   exclusive   focus   of   this   paper.    

Writing  in  2008,  Tim  Shorrock  estimated  the  domestic  private  intelligence  market  to  

be   worth   $50   billion   per   year   (Shorrock,   2008:   12).     According   to   an   unclassified  

2007  PowerPoint  presentation  by   the  Office  of   the  Director  of  National   Intelligence  

(ODNI),   spending   on   private   contracts   accounted   for   70   percent   of   the   intelligence  

budget  at  the  time  (Shorrock,  2008:  18-­‐19).    Across  the  IC,  which  includes  civilian  and  

military   intelligence  agencies,   contractors  are  believed   to  account   for  18  percent  of  

the  total  workforce  (RAND,  2013:  16-­‐17).    In  a  follow-­‐up  to  a  2007  ODNI  inventory  of  

the   IC   workforce,   the   ODNI’s   Chief   Human   Capital   Officer   (CHCO)   Ronald   Sanders  

cited   contractors   as   comprising   27  percent   of   the   total   IC  workforce   (ODNI,   2008).  

The   discrepancy   between   the   2007   and   2013   figures   reflects   two   factors:   First,  

intelligence  contracting  peaked  around  2005-­‐07,   largely   in   response   to  surfacing   IC  

and  congressional  concern  over  the  practice’s  extent  (ODNI,  2008).    Second,  different  

intelligence   agencies’   commonly   use   different   methodologies   for   defining   what  

constitutes  a  contractor,  and  more  specifically  a  core  contractor  (GAO,  2014:  18).      

 

Core  and  non-­‐core  contractors.  This  paper  breaks  down  intelligence  contractors  by  

their   use   in   core   and   non-­‐core   capacities.     Non-­‐core   contractors   supply   a   diverse  

Page 7: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

6  

range   of   mainly   uncontroversial   services,   such   as   staffing   cafeterias   and   grounds  

maintenance.    Non-­‐core  also  denotes  commodity  contractors,  which  sell  products  like  

computers   and   satellites   to   the   IC   (ODNI,   2008).     The   aforementioned   70   percent  

figure  includes  spending  on  non-­‐core  contractors  (ODNI,  2008).    Due  to  the  relatively  

mundane  nature  of  most  non-­‐core  contracting,   this  paper   focuses  predominately  on  

core  contractors.    Core  contractors,  as  defined  by  the  ODNI,  “provide  direct  support  to  

core  IC  mission  areas  such  as  collection  activities  and  operations  (both  technical  and  

human   intelligence   [HUMINT]),   intelligence   analysis   and   production,   basic   and  

applied   technology   research   and   development,   acquisition   and   program  

management,   and/or   management   and   administrative   support   to   those   functions”  

(Kennedy,  2006:  1).  

 

In  October  2009,  the  ODNI  issued  Intelligence  Community  Directive  612  (ICD  

612)   to   guide   IC   agencies   in   their   hiring   of   core   contractors,   by   stipulating  

appropriate   roles   for   their   use.     Directly   referenced   in   ICD  612   is   the   concern   that  

core   contractors   “perform   functions   closely   associated   with…inherently  

governmental  functions”  (GAO,  2014:  2).    This  basic  concern  undergirds  much  of  the  

criticism   of   military   and   intelligence   outsourcing   in   general.     I   return   later   in   the  

paper   to   the   inherently   governmental   standard,   which   is   a   federal   regulation  

supervising  contractible  activities.  

 

Intelligence  contracting  companies.    A  diverse  range  of  firms  of  different  sizes  and  

specialties   define   the   multibillion-­‐dollar   private   intelligence   industry.     Shorrock  

subdivides   the   intelligence   industry   into   four   classes   of   companies,   led   by   top   tier  

systems  integrators  (Shorrock,  2008:  23).    These  companies  are  worth  several  billion  

dollars,  possess  thousands  of  security-­‐cleared  staff,  and  are  involved  at  nearly  every  

Page 8: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

7  

level   of   intelligence,   obscuring   the   public/private   sector   division   in   intelligence  

(Shorrock,   2008:   23-­‐24).     Second   tier   companies   provide   specialized   technical   and  

analytic   services   to   the   IC,   often   as   subcontractors   for   the   systems   integrators  

(Shorrock,   2008:   24).   Third,   are   small   technical   firms   providing   more   singular  

expertise   to   intelligence   agencies;   many   of   these   companies   have   sprung   up   since  

9/11  and  are  regularly  based  around  the  Washington,  D.C.  area.    They  are  colloquially  

referred   to   as   beltway   bandits   (Shorrock,   2008:   25).     Shorrock’s   fourth   class   of  

contractors  includes  “companies,  large  and  small,  that  are  known  primarily  for  their  

achievements  in  information  technology,  communications,  or  satellites  [which]  have  

made  major  inroads  as  the  [IC]  has  opened  up  to  contracting”  (Shorrock,  2008:  26).    

This  class  of  companies  includes  major  telecommunications  providers  enlisted  by  the  

government  after  9/11   to  assist   in   its  mass  electronic   surveillance  and  data  mining  

programs  (Shorrock,  2008:  307).    A  common  denominator  for  these  companies  that  

should  be  apparent  is  their  servicing  of  the  IC’s  enormous  appetite  for  technology.    In  

the  proceeding  paragraphs   I   discuss   some  of   the   factors   that   have  helped   generate  

this  distinctive  demand,  which  defines  contemporary  intelligence.  

 

External  causal  factors  for  intelligence  contracting  

 

Peace   dividend   and   9/11.  With   the   Cold  War’s   end,   the   IC   suddenly   found   itself  

missing   its  primary  raison  d'être:   checking   the  global   communist   threat.    The  peace  

dividend  of  the  1990s  saw  dramatic  cuts  in  military  and  civilian  intelligence  budgets,  

leading  to  equally  substantial  cuts  in  personnel.    According  to  CHCO  Sanders,  the  IC’s  

workforce  peaked  between  the   late  1980s  and  early  1990s,  declining  by  40  percent  

before  bottoming  out  in  2001  (RAND,  2013:  43).    Many  of  these  former  government  

Page 9: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

8  

employees   found   work   in   the   private   sector,   bringing   with   them   their   experience,  

institutional  knowledge,  and  security  clearances  (Hansen,  2014:  73).  

 

Whether   a   fully   staffed   U.S.   intelligence   apparatus   would   have   potentially  

thwarted   the  9/11  attacks   is   totally   open   to   speculation.  What   is   clear,   however,   is  

that  in  the  immediate  aftermath  of  the  attacks  there  was  a  massive  surge  in  demand  

for  intelligence  services.    Owing  to  the  decimation  of  its  ranks  during  the  1990s,  the  

IC   found   itself  unable   to  meet   this  demand  with   in-­‐house  supply  (RAND,  2013:  45).    

Much  of  the  expertise  the  IC  needed  was  now  in  the  private  sector,  which  is  where  the  

IC  turned,  rapidly  expanding  capacity  with  contracted  personnel.    Between  2002  and  

2005,  the  IC’s  spending  on  contracts  rose  from  $32  billion  to  $43.5  billion,  before  the  

government   began   concerted   efforts   at   hiring   its   own   intelligence   personnel  

internally   (Shorrock,   2008:   113-­‐114).     Partly   because   of   this   post-­‐9/11   contracting  

binge  and  the  dependencies  it  seeded,  it  is  now  virtually  impossible  for  the  IC  to  wean  

itself  off  completely  from  contracted  labor.  

 

New  wars  and  new  actors.  Different  modes  of  conflict  are  historically  linked  to  the  

chosen   means   of   executing   military   ends.     Singer   argues   there   is   a   relationship  

between   mass   military   demobilization   and   increased   conflict   in   weak   state   zones  

(Singer,  2008:  38).    In  this  respect,  the  end  of  the  Cold  War  (which  included  a  set  of  

organizing  principles  for  international  relations)  and  the  peace  dividend  “produced  a  

vacuum   in   the   market   of   security”   (Singer,   2008:   49-­‐50).     The   post-­‐9/11   security  

paradigm,   as   part   of   a   broader   post-­‐Cold   War   paradigm,   views   threats   as   being  

unbound  to  traditional  state  actors  and  emanating  from  asymmetric  –  often  non-­‐state  

–   sources,   largely   in   the   form  of   international   terrorism  and   rogue   states   (Halperin  

and  Clapp,  2006:  10-­‐11).    Michael  Hayden,  a  former  director  of  the  CIA  and  the  NSA,  

Page 10: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

9  

framed   the   difference   between   Cold   War   and   post-­‐9/11   intelligence   as   having   to  

confront  an  enemy  (the  Soviets)  that  “was  easy  to  find  [but]  hard  to  finish”  and  now  

facing  a  jihadi  enemy  that  “is  easy  to  finish,  [just]  very,  very  hard  to  find”  (Shorrock,  

2008:  193-­‐194).      

 

Two-­‐edged  technologies.  A  major  factor  driving  the  ongoing  shifts  in  contemporary  

threats  and  conceptions  of   security   is   the  proliferation  of   two-­‐edged  technologies.     I  

borrow   this   term   from   the   ODNI’s   2006   “Five   Year   Strategic   Human   Capital   Plan”  

(ODNI,   2006:   3-­‐4).     Advances   in   computers,   the   internet,   imagery,   and   other  

information  technologies  (IT),  as  key  examples,  both  produce  great  societal  benefits  

and  complicate   the  state’s  ability   to  provide  security  within  and  outside   its  borders  

because   of   these   technologies’   empowering   of   non-­‐state   actors   (ODNI,   2006:   3-­‐4;  

Avant,  2009:  182).  

 

Technological  advancements   in  encryption,   IT,  communications,  and   imagery  

have   fundamentally   altered   how   intelligence   is   gathered   today.     Since   the   1990s,  

these   advancements   have   predominately   been   made   in   the   commercial   sector   –  

outstripping   the   government   and   IC’s   ability   to   keep   up   (Shorrock,   2007).     By   the  

1990s,   “commercial   developments   in   computing  power,   cryptology,   and  high-­‐speed  

telecommunications  [had]  surpassed”  the  NSA’s  capacity  to  collect  signals  intelligence  

(SIGINT)  and  break  codes  (Shorrock,  2008:  199-­‐199).    In  meeting  its  obligations  as  an  

agency,   the   NSA   under   Hayden   turned   to   the   private   sector,   with   its   technical  

expertise,   to  help  create  a  SIGINT  system  able   to  perform   in  a  world  of   cell  phones  

and  fiber  optics  (Shorrock,  2008:  201).    The  IC  has  a  crucial  demand  for  technological  

solutions   that   can   decipher   valuable   intelligence   from   the   reams   of   information  

available  from  open  sources.      In  satellites  and  imagery  software,  the  center  of  gravity  

Page 11: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

10  

today  for  technical  expertise  firmly  rests  in  the  private  sector  –  boosted  in  large  part  

by  Clinton-­‐era  policies  to  enhance  U.S.  competitiveness  in  high  technology  (Shorrock,  

2008:  245).  

 

Contemporary   technologies   offer   powerful   tools   for   intelligence   agencies   to  

conduct   their  work.    However,   these   same   technologies   are   two-­‐edged,   in   that   they  

offer   similar   benefits   to   previously   weak   actors   with   goals   contrary   to   American  

interests.     There   is   an   overwhelming   drive   within   the   IC   to   harness   technological  

advances   to   suit   intelligence   needs.     The   commercial-­‐driven   nature   of   today’s  

technological   innovations  has  meant   the   IC  has  had   to  enlist   the  help  of   the  private  

sector  to  accomplish  this.      

                                                 

Page 12: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

11  

   

III.  THE  U.S.  INTELLIGENCE  COMMUNITY    AND  ITS  PLACE  IN  GOVERNMENT  

     

This   section   describes   the   structure   of   the   U.S.   Intelligence   Community   and   the  

general  role  of  intelligence  in  American  government.  

 

The   Intelligence   Community.   The   U.S.   Intelligence   Community   consists   of   17  

organizations   structured   in   a   loose   federation   headed   by   the   Director   of   National  

Intelligence  (DNI),  whose  office,  the  ODNI,   is  one  of  the  17  IC  members  (GAO,  2014:  

1).    The  IC  is  broadly  divided  into  civilian  and  military  intelligence,  represented  by  the  

National   Intelligence  Program  (NIP)  and  Military   Intelligence  Program  (MIP).    Most  

government  intelligence  personnel  are  military,  and  80  percent  of  the  IC’s  budget   is  

under   the   Pentagon’s   jurisdiction,   extending   to   the   NSA,   National   Reconnaissance  

Office   (NRO),   and   National   Geospatial-­‐Intelligence   Agency   (NGA)   –   the   three   most  

important   collection   agencies   (Shorrock,   2008:   154).     There   are   significant  

differences  between  the  organizational  structure  of  the  NIP  and  the  MIP.    The  MIP’s  

primary   concern   is   intelligence   for   the   “planning   and   conduct   of   tactical   military  

operations”  (RAND,  2013:  52).    The  MIP  follows  a  formal  chain  of  command  with  the  

Secretary  of  Defense  at  the  top  (RAND,  2013:  53).    In  contrast,  the  civilian-­‐based  NIP  

lacks  clear  hierarchy  and  is  largely  decentralized.    Prior  to  the  intelligence  reforms  of  

2004,  the  CIA’s  director  served  simultaneously  as  head  of  the  agency  and  Director  of  

Central   Intelligence   (DCI),   with   responsibility   for   coordinating   the   activities   of   the  

entire   IC   but   lacking   power   to   fully   exercise   this  mandate   (RAND,   2013:   10).     The  

2004   reforms,   which   replaced   the   DCI   with   the   DNI,   were   meant   to   redress   this  

Page 13: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

12  

problem;  however,  the  DNI  still  lacks  “chain  of  command  authority,”  as  CHCO  Sanders  

pointed  out  in  2007  (RAND,  2013:  10).    

 

Office   of   the   Director   of   National   Intelligence.   The   Director   of   National  

Intelligence’s   position   and   office   were   created   by   the   Intelligence   Reform   and  

Terrorism   Prevention   Act   of   2004   (IRTPA).     Passage   of   the   IRTPA   and   the   ODNI’s  

establishment  were  motivated  by  the  9/11  Commission’s  recommendation  that  the  IC  

develop   stronger   central   leadership   to   more   effectively   coordinate   intelligence  

activities   (RAND,   2013:   5).     The   DNI   and   his   office   are   tasked   with   broad  

responsibilities,   which   include   coordinating   IC   functions,   facilitating   greater  

interagency  cooperation,  and  community-­‐wide  workforce  planning  (RAND,  2013:  7).    

However,  as  previously  pointed  out,  the  IRTPA  did  not  give  the  ODNI  sufficient  formal  

authority  to  truly  exert  centralized  control  of  the  IC.    As  part  of  its  workforce  planning  

mandate,  the  ODNI  has  basic  authority  to  regulate  the  use  of  contracted  personnel  by  

IC  agencies,  as   illustrated   in   its  2009   ICD  612,   stipulating  appropriate  uses   for  core  

contractors.     While   intelligence   agencies   generally   do   follow   the   ODNI   guidelines,  

actual  execution  of  workforce  policies  is  at  agencies’  discretion  (GAO,  2014:  28-­‐29).  

 

Role   of   intelligence   in   U.S.   government.   Annual   U.S.   government   spending   on  

intelligence  (civilian  and  military)  totals  almost  $80  billion  (Crampton,  Roberts,  and  

Poorthuis,  2014:  197).    As  with  any  bureaucratic  organization,   intelligence  agencies  

are   intended   as   an   executive   tool   for   implementing   decisions   made   by   the   state’s  

political   leaders  (Svara,  1999:  687-­‐688).    However,   intelligence  agencies  are  unique  

from   other   bureaucratic   actors   in   that   their   most   basic   mission   is   to   provide   the  

information   from  which   their   political   superiors   can  make   decisions.    Hence,  while  

these   agencies   are   situated   in   the   government’s   bureaucratic   hierarchy   under  

Page 14: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

13  

decision  makers,  their  main  sphere  of  activity  can  be  interpreted  as  existing  one  step  

ahead   of   decision-­‐making.     In   addition   to   providing   intelligence   and   analysis   to  

decision   makers,   intelligence   agencies   are   also   tasked   with   conducting   covert,   or  

clandestine,  operations:  this  area  is  a  particular  specialty  of  the  CIA.  

 

In   practical   terms,   the   IC’s   primary   responsibility   of   providing   the   sensitive  

information   used   as   the   basis   of   policy   formation   and   decision-­‐making   gives   it  

enormous   power   in   the   government.     Given   the   structural   power   the   IC   has,   U.S.  

intelligence   agencies   are   barred   from   recommending   specific   policies;   in   their  

estimates   and   reports   to   decision   makers,   including   the   president,   agencies   are  

instead  “limited  to  predicting  the  consequences  of  alternative  policies”  (Halperin  and  

Clapp,  2006:  142).    The  first  step  in  setting  the  IC’s  priorities  comes  from  the  White  

House’s  National  Security  Strategy  (NSS).    The  broad  points  conveyed  in  the  NSS  are  

adapted   into   the   classified   National   Intelligence   Priorities   Framework   (NIPF),   first  

introduced  in  2003  (RAND,  2013:  34).    The  NIPF  communicates  IC-­‐wide  guidance  for  

member   agencies   in   determining   their   resource   requirements   and   matching   NSS  

goals  with  individual  agencies’  own  internal  organizational  vision  (RAND,  2013:  35).    

Just  as  IC  members  use  the  NIPF  to  plan  their  organizational  functions,  the  ODNI  uses  

it  to  develop  community-­‐wide  planning  (RAND,  2013:  35).  

 

***  

 

Having  conceptualized  the  basic  role  of  the  IC  in  U.S.  government,  I  explore  in  Part  IV  

principles   of   model   bureaucratic   administration,   and   how   actual   governance  

frequently  deviates  from  this  model.  

 

Page 15: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

14  

   

IV.  BUREAUCRACY  AND  BUREAUCRATIC  POLITICS        

This   section   considers   various   theories   on   bureaucracy,   starting  with  Max  Weber’s  

foundational   work   on   the   topic.     I   then   consider   defects   in   bureaucratic  

administration,   which   center   on   the   premise   of   bureaucracy   as   a   politically   active  

agent.    Finally,  these  concepts  will  be  related  back  to  the  IC.  

 

Weber’s   rational   legal   bureaucracy.  Max  Weber’s  writings   in  his  Theory  of  Social  

and  Economic  Organization  underlie  the  classical  conception  of  modern  bureaucratic  

administration.    Weber   identifies   bureaucratic   administration   as   the   purest   type   of  

exercising   authority   on   rational   legal   grounds   (Weber,   2012:   333-­‐334).     It   is  

important  to  note  the  pure  distinction:  Weber  implies  the  systems  he  describes  do  not  

exist   in   practice   as   perfect  models.     Nonetheless,  Weber’s  work   is   still   normatively  

and   descriptively   valuable   in   studying   bureaucracy.     The   central   advantage   of  

bureaucracy   is   its   ability   to   handle   complex   tasks   in   a   maximally   efficient   and  

consistent  manner   (O’Connor,   2013).     Bureaucracy   is   able   to   do   this   because   of   its  

division   of   labor   into   different   offices,   each   with   a   marked   sphere   of   professional  

competence   and   responsibility   (Weber,   2012:   330).     As   Weber   demonstrates,   the  

exercise  of  power  by  bureaucracy  is  founded  on  the  basis  of  knowledge;  this  is  what  

makes  it  a  supremely  rational  form  of  authority  (Weber,  2012:  339).    Candidates  for  

office   are   selected   and   promoted   on   a   meritocratic   basis   by   their   technical  

qualifications   (Weber,   2012:   333-­‐334).     Offices   are   organized   by   hierarchy,  

generating   a   clear   chain   of   command   and   appeals/feedback  process;   this   hierarchy  

reflects   the   bureaucracy’s   specialized   division   of   labor   (Weber,   2012:   331).    

Page 16: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

15  

Bureaucracy’s  capacity  to  handle  complex  tasks  is  finally  cemented  by  its  potentially  

vast   fiscal  and  material  resources,   including  human  capital  (Hill,  1991:  271).    These  

resources  and  concentration  of  competencies   tend  to  put  public  administration  at  a  

distinct   advantage   over   competitors   in   providing   certain   goods   and   services,   often  

resulting   in   the   state   being   a   monopoly   provider   of   said   goods   and   services.    

Interestingly   for   this   paper,   one   of   services   associated   by   Weber   with   monopoly  

provision   by   the   state   is   the   legitimate   use   of   force:   military   and   intelligence  

contracting  plainly  challenge  this  idea.  

 

Weber’s   formal  model  of   legal  bureaucracy   is   the  essential   starting  point   for  

understanding   how   bureaucracies   and   public   provision   work,   or   at   least   are  

supposed  to  work.    In  the  following  paragraphs,  I  consider  two  general  criticisms  of  

bureaucratic   administration,   which   are   followed   by   the   bureaucratic   politics  

perspective.  

 

Two  criticisms  of  bureaucracy  

 

Subject  to  grooved  thinking.  While  Weber  idealized  bureaucracy  for  its  competence  

and  ability  to  handle  complex  tasks,  the  term  bureaucratic  has  negative  connotations  

for  most  of  the  public  (O’Connor,  2013).    It  conjures  an  image  of  administration  that  

tends   to   be   remote,   inflexible,   and   slow.     The   complex   tasks   bureaucracies   are  

responsible   for  managing   are   often   rife  with   uncertainties;   this   is   no   truer   than   in  

foreign  and  security  policy.     In  dealing  with  these  uncertainties,   large  organizations,  

like  bureaucracies,   and   their   staff   adopt  particular   assumptions   and   images   to   help  

instruct  their  work  (Halperin  and  Clapp,  2006:  21-­‐22).    How  these  images  are  formed,  

whether   other   individuals   share   them,   and   how   they   guide   thinking   and   action  

Page 17: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

16  

depends  on  a  wide  range  of  variables;  however,  a  good  place   to  start   looking   is   the  

actor’s  position  in  context.    Most  bureaucrats,  especially  in  low  to  mid-­‐level  positions,  

exhibit  what   is   called   grooved   thinking:   in   looking   at   a   given   situation   or   problem,  

they  are  inclined  “to  focus  on  a  few  key  variables  and  [have]  a  programmed  response  

to   those   particular   variables”   (Halperin   and   Clapp,   2006:   22).     Bureaucratic  

administrations   tend   to  condition  grooved   thinking  because   they  regularly  confront  

complex   problems   and   are   principled   on   producing   stable,   consistent   results   in  

dealing  with  these  problems.  

 

Bureaucratic   administration   as   antidemocratic?   Since   the   inception   of   modern  

bureaucratic  administration,  bureaucracy’s  concentration  of  resources  and  technical  

expertise  on  a  large  scale  in  unelected  officials  has  elicited  concerns  over  its  potential  

threat   to  democratic  accountability   (O’Connor,  2013;  Svara,  1999).    These  concerns  

are  related  to  the  general  perception  of  bureaucracy  as  remote  and  its  treatment  as  a  

black   box   (even   among   academics),   owing   to   the   complexities   and   scale   of   its  

operations   (Hill,   1991:   266).     The   apparent   separateness   between   bureaucratic  

administration  and  democratic  politics,  and  the  concerns  this  generates,  stems  from  

bureaucracy’s   operating   principle   of   exercising   authority   based   on   specific   neutral  

expertise   –   not   popular   support   (Svara,   1999:   677).     Sometimes   the  public   regards  

this  separateness  positively;  in  highly  partisan  American  politics,  bureaucrats  can  be  

viewed   as   honest,   unbiased   brokers   (Hill,   1991:   273).     Adhering   to   the   classical  

conception   of   bureaucracy   as   an   administrator   but   not   a   decision  maker,   a   certain  

degree  of  political  disengagement   is  necessary   for   the  successful   implementation  of  

policy.  

 

Page 18: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

17  

Having   considered   these   two   criticisms   of   bureaucracy,   I   now   examine   the  

argument  that  bureaucracies  are  actively  political  agents,  with  independent  interests  

and   decision-­‐making   processes   not   necessarily   constrained   by   Weber’s   views   on  

neutral,  rationally-­‐based  authority.  

 

 

Bureaucratic   politics.   As   Hill   writes,   “in   the   long   run,   political   issues   become  

bureaucratic   issues”  (Hill,  1991:  272).     In  most  cases  where  public  decision  makers,  

such  as  Congress  and   the  president,  delegate  authority   to  bureaucratic  or  executive  

bodies,  they  allow  these  agencies  discretion  in  determining  the  terms  and  substance  

of  their  mandate  (Laffont,  1990:  1344).    While  bureaucratic  agents  have  a  supposed  

professional  obligation  to  serve  the  public  interest  in  a  neutral  fashion,  this  entrusted  

discretion   means   that   ultimately   it   is   their   choice   to   decide   how   to   conduct   their  

activities.    Moreover,  the  notion  of  acting  in  the  public  interest  is  almost  impossible  to  

verify   because   it   is   too   ambiguous   a   term   to   feasibly   define   (Levine   and   Forrence,  

1990:  181).    In  foreign  and  security  policy,  including  intelligence,  actors  are  working  

in   the  similarly  vague  national  interest   (Halperin  and  Clapp,  2006:  9).    The  result   is  

that  agents   in  either  setting  will  pursue  their  own  private  conceptions  of   the  public  

and  national  interest  (Halperin  and  Clapp,  2006:  9).  

 

The   bureaucratic   politics   perspective   argues   that   bureaucratic   actors  

formulate   their   version   of   the   national   interest   along   their   interests   as   an  

organization.    Bureaucracy   is  not  a  monolithic  actor   (Hill,  1991:  274).     It  may  seem  

obvious,   but   it   is   necessary   to   remember   that   U.S.   government   is   populated   by   a  

multitude  of  different  agencies,  whose  responsibilities,  or  turfs,  frequently  overlap  in  

jurisdictional  gray  areas.     In  the  American  system  of  government,  there  is  moreover  

Page 19: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

18  

no   inherent   guarantee   of   an   agency’s   permanent   survival;   in   order   to   secure   their  

present  and  future  position  in  government,  bureaucratic  agencies  “must  be  politically  

proactive”   (Hill,   1991:   272-­‐273).     Bureaucratic   actors   are   acutely   aware   of   the  

implications   of   decisions   made   by   their   political   leaders,   especially   concerning  

budgets  (Halperin  and  Clapp,  2006:  26).    They  will  pursue  an  audience  with  decision  

makers  when   topics  at  hand   intersect  with   their  perceived  organizational   interests,  

and  will  advance  their  interests  in  these  settings,  in  concert  with  other  bureaucratic  

actors   sharing   similar   organizational   motivations   (Hill,   1991:   287).     This   process  

produces  outcomes  that  therefore  do  not  reflect  a  purely  rational  pursuit  of  the  public  

and  national  interest  but  rather  the  result  of  bargaining  among  involved  parties  (Hill,  

1991:  287).  

 

Application  to  the  IC.  In  the  final  portion  of  Part  III,  I  discussed  the  IC’s  model  role  in  

U.S.   government.     The   basic   conceptualization   presented   there   more   closely  

resembles  Weber’s  work  on  bureaucracy  –  as  a  neutral  executive  instrument  –  than  it  

does   bureaucratic   politics.     The   remainder   of   Part   IV   applies   this   latter   model   to  

further  develop  understanding  of  the  IC’s  role  in  government.  

 

Within  the  IC,   interagency  conflict   is  clearly  seen  in  competition  between  the  

CIA  and  armed  services  over  control  of  covert  operations  (Halperin  and  Clapp,  2006:  

40).     That   there   exist   numerous   redundant   functions   between   civilian   and  military  

intelligence   agencies   suggests   a   prevailing   concern   for   achieving   and   preserving  

organizational   autonomy.     The   arrival   of   new   actors   and   threats   in   foreign   and  

security  policy  has  a   causal   relationship   to   the  means   chosen   to  address   them:   this  

casual   relationship   is   furthermore   impacted   on   both   sides   by   new   technological  

developments.     What   means   are   chosen   can   create   new   operational   areas   and  

Page 20: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

19  

reorganize  old  ones   for  competing  bureaucratic  agencies,  producing  rippling  effects  

in  budgets  and  instigating  turf  wars.    A  contemporary  example  of  these  processes  in  

play  is  the  ongoing  debate  between  the  CIA  and  Pentagon  about  operational  control  

over  drone  warfare  (Harman,  2015:  101).      

 

Just   as   American   bureaucracy   is   not   monolithic,   neither   are   the   individual  

bureaucratic   agencies   themselves.     Internal   debate   over   what   should   be   a   given  

organization’s   essence   is   another   area   of   bureaucratic   politics.    While   the   NSS   and  

NIPF   provide   some   guidance   towards   setting   IC   members’   goals   and   needed  

capabilities,   the   agencies   still   preserve   considerable   freedom   in   ultimately  

determining   these   factors   (Halperin   and   Clapp,   2006:   26).     Returning   to   the   CIA’s  

drone   program,   the   use   of   drones   for   targeted   killings   has   produced   notable  

apprehension   among   many   CIA   officers   about   what   it   entails   for   the   agency’s  

organizational   essence   (Harman,   2015:   100-­‐101).     Within   the   CIA,   there   are   three  

rough   groups   of   opinion   about   what   should   be   the   agency’s   primary   focus:  

intelligence   gathering,   covert   operations,   and   intelligence   analysis   (Halperin   and  

Clapp,  2006:  34).  

 

Internal  and  interagency  competition  impacts  how  information  is  transmitted  

to  senior  officials  and  decision  makers  (Halperin  and  Clapp,  2006:  49).    Although  the  

IC   is   formally   limited   to  evaluating  alternative  policy   courses  and  cannot  endorse  a  

particular   option,   intelligence   agencies   can   still   effectively   signal   their   given  

preferences   in   weighting   the   consequences   of   alternative   policies   (Halperin   and  

Clapp,  2006:  142).    Additionally,  the  predilection  for  autonomy  can  hinder  sharing  of  

intelligence  between  agencies,  with  potentially  deleterious  consequences.    The  9/11  

Page 21: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

20  

Commission’s   criticism   of   the   CIA   and   FBI’s   failure   to   share   potentially   valuable  

intelligence  prior  to  9/11  can  be  read  this  way  (Halperin  and  Clapp,  2006:  147-­‐148).  

 

Concerns   about   the   democratic   accountability   of   bureaucratic   organizations  

are  no  more  relevant   than  they  are  with   intelligence.    Public  accountability   through  

congressional   oversight   of   intelligence   is   severely   constrained   by   the   pervasive  

secrecy   that  surrounds   intelligence  activities.    Only  select  members  of  Congress  are  

permitted   to   review   the   doings   of   the   IC,   with   strict   limitations   on   disclosure   of  

information  obtained  by  these  members  (Halchin  and  Kaiser,  2012:  34).    This  secrecy  

and   deficit   of   oversight   are   typically   justified   on   the   grounds   of   national   security  

(Nathan,  2009:  2),  which  essentially  means  intelligence  agencies  get  to  determine  the  

amount  of  oversight  they  receive.    One  of  the  few  potent  oversight  mechanisms  that  

exists  in  intelligence  is  informal  leaks,  which  I  briefly  consider  in  Part  VI.  

 

***  

 

This   section   has   attempted   to   demonstrate   that   government   bodies,   including  

intelligence  agencies,  can  and  do  deviate   from  norms  of   ideal  public  administration.    

To  determine  in  a  balanced  fashion  whether  it   is  appropriate  for  the  government  to  

outsource  intelligence  capabilities,  it  is  necessary  to  have  good  understanding  about  

how  public  provision  of  these  services  works.  

               

Page 22: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

21  

   

V.  PRIVATIZATION  AND  PRINCIPAL-­‐AGENT  THEORY        This   section  provides  basic  mechanisms  of  private  provision  of   goods  and   services,  

which   go   some   way   in   illuminating   the   motivations   for   privatizing   publically-­‐

administered   services,   like   intelligence.     I   also   formally   introduce   principal-­‐agent  

theory,  and  its  real  world  application  in  contracts.  

 

Reinventing  U.S.  government.    In  the  United  States,  faith  in  markets  and  skepticism  

with   government   provision   cross   Republican   and  Democratic   party   lines,   and   have  

done  so  more  or  less  since  the  Reagan  administration  (Freeman,  2003:  1292-­‐1293).    

Buttressing   these   beliefs   is   neoliberalism,   an   economic   and   political   doctrine  

skeptical  of  the  concentration  of  power  and  resources  in  the  central  government  and  

which   aims   to   delegate   as  many   functions   as   possible   to   the   private   sector   (Kruck,  

2014:   119).     Privatization   serves   as   a   key   vehicle   for   achieving   neoliberalism’s  

minimal  state  (Kruck,  2014:  119).      

 

During   Clinton’s   administration,   Vice   President   Al   Gore   was   tasked   with  

leading   the   National   Performance   Review   (also   known   as   the   “Reinventing  

Government”  initiative);  this  policy’s  basic  purpose  was  to  assess  which  government  

services   should   remain   public   and   which   should   be   opened   to   privatization   and  

contractor   bidding   (Freeman,   2003:   1293).     The   inherently   governmental   standard  

was   formally  developed  at   this   time.  (Chesterman,  2008:  1069-­‐1070).    According  to  

the  Federal  Activities  Inventory  Reform  (FAIR)  Act  of  1998,  inherently  governmental  

describes   functions   “so   intimately   related   to   the   public   interest   as   to   require  

Page 23: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

22  

performance   by   Federal   Government   employees”   (FAIR   Act,   2000).     The   Federal  

Acquisition  Regulation  (FAR),  which  governs  the  federal  government’s  purchasing  of  

goods   and   services   (including   contractors),   lists   in   Subpart   7.5   specific   functions   it  

considers   inherently   governmental,   for   which   contractors   cannot   be   used   (FAR,  

2006).    However,  the  FAR  list  is  “not  all  inclusive,”  which  leaves  agencies  discretion  in  

determining   whether   a   given   function   meets   the   FAR   standard   for   inherently  

governmental  (FAR,  2006).    The  result  is  that  the  inherently  governmental  standard  

acts  less  to  protect  public  provision  of  certain  services  than  it  does  to  justify  having  

them  provided  by  the  government  in  the  first  place  (Chesterman,  2008:  1069-­‐1070).    

This  paper  returns  to  the  inherently  governmental  standard  in  both  Parts  VI  and  VII.  

 

Private  provision  mechanisms.  Weber  describes  the  profit  motive  as  “the  ultimate  

driving  force  of  all  economic  activity”  in  a  market  economy  (Weber,  2012:  320-­‐321).    

Private  businesses  are  purposely  organized  to  maximize  profits,  which  sustain  the  life  

of  an  enterprise  (Trebilcock  and  Iacobucci,  2003:  1424).    Businesses,  as  producers  of  

goods   and   services,   in   a  model   free  market   compete   against   one   another   to   satisfy  

consumer   demands   (Avant,   2009:   181).     A   firm’s   performance   and   subsequent   net  

capital   accumulation   (profit)   is   determined   by   how   well   the   firm   supplies   its  

consumers’  demands  in  relation  to  other  firms.    Failure  to  sufficiently  meet  consumer  

demands  and  generally  poor  performance  and  waste  can   jeopardize  a   firm’s  profits  

and   thus   its   survival   (Trebilcock   and   Iacobucci,   2003:   1436).     The   profit   motive,  

market   competition,   and   the   risk  of   failure   combine   to   strongly   incentivize   a   firm’s  

performance:   the   basic   principles   of   market   discipline   (Trebilcock   and   Iacobucci,  

2003:   1436).     Free  market   and   privatization   advocates   use   this   concept   of  market  

discipline   to   argue   that  markets   naturally   self-­‐regulate,   as   well   as   to   argue   against  

public  provision  and  government  regulations.  

Page 24: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

23  

 

There   is   good   reason   to   be   skeptical   of   the   proposition   that   markets   self-­‐

regulate.     Versus   the   hard   controls   government   regulation   provides,   market-­‐based  

regulatory  mechanisms  are  essentially  voluntary  (Cockanye,  2009:  207-­‐208).    While  

the   profit   motive   underlies   the   notion   of   market   discipline,   there   are   certainly  

situations  where  it  can  lead  to  a  firm’s  determination  that  “going  for  the  ‘quick  score’  

is  worth  the  risks  of  long-­‐term  market  costs”  (Singer,  2008:  224).  

 

Private   versus   public   provision.   Private   businesses   are   motivated   to   maximize  

their  profits.    As  discussed,  these  profits  are  contingent  in  an  ideal  marketplace  upon  

how   well   a   firm   satisfies   its   consumers’   demands   in   comparison   to   the   firm’s  

competitors.     Thus,   market   discipline   means   that   producers   (private   firms)   are  

broadly   accountable   to   the   demands   of   their   consumers,  which   can   be   determined  

quantitatively  in  the  form  of  the  firm’s  earnings.    It  is  worth  noting  that  privatization  

advocates   elevate   utility   as   conceived   in   economic   terms,   and  mostly   neglect   other  

potentially   important   intrinsic   values   relevant   in   provision   (Freeman,   1296-­‐1297).    

The   primary   motivation   for   privatization   is   to   improve   efficiency:   delivering   high-­‐

quality   goods   and   services   at   the   minimum   possible   cost   (Freeman,   2003:   1296-­‐

1297).    

 

Privatization  advocates  argue  the  effectiveness  of  strictly   legal  accountability  

mechanisms   should   not   be   overstated,   including   the   notion   of   hierarchal   control  

embedded   in   bureaucratic   theory   (Trebilcock   and   Iacobucci,   2003:   1447-­‐1448).  

Public   agencies   typically   lack   the   incentives   towards  maximizing   performance   and  

minimizing   costs   competitive   market   discipline   conditions   (Freeman,   2003:   1297-­‐

1298).    Moreover,  these  agencies  have  soft  budget  constraints,  as  their  operations  are  

Page 25: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

24  

generally   guaranteed   by   taxpayer   dollars   regardless   of   performance   (Laffont   and  

Tirole,   1991:   88).     In   comparison,   private   providers   are   strongly   incentivized   by  

market   discipline   to   maintain   accountability   to   their   consumers’   demands   and   to  

deliver   goods   and   services   efficiently   (Freeman,   2003:   1297-­‐1298).     In   arguing   for  

privatization,  Trebilcock  and   Iacobucci  offer   the   following  summary:   “Market-­‐based  

accountability   is   not   merely   an   incidental   benefit   of   privatization;   [rather]   the  

benefits   of   privatization   arise   largely   because   of   the   accountability   generated   by  

private  markets”  (Trebilcock  and  Iacobucci,  2003:  1447-­‐1448).  

 

Principal-­‐agent   theory.  Undergirding  discussion  of  private  and  public  provision   is  

principal-­‐agent   theory.     Originally   developed   in   economics,   principal-­‐agent   theory  

describes   when   a   client   or   supervisor   (principal)   tasks   a   provider   or   subordinate  

(agent)   to   do   a   job   (O’Connor,   2013).     The   principal   is   interested   in   seeing   the   job  

completed  properly,  and  grants  the  agent  some  independent  discretion,  called  slack,  

to  fulfill  the  principal’s  directive  (Cockanye,  2009:  197-­‐198).    Slack  describes  the  fact  

that   principal-­‐agent   transactions   happen   “under   conditions   of   uncertainty   and  

asymmetric   information”   (Cockanye,   2009:   197-­‐198).     Slack   presents   an   agent  

opportunity   to   pursue   its   own   interests   in   place   of   its   principal’s.     An   agent   has   a  

broad   self-­‐regarding   interest   in   shirking,   which   is   any   deviation   from   a   task   as  

assigned  by  the  principal.    An  agent  may  also  be  working  simultaneously  for  multiple  

principals,   giving   rise   to   problems   of   coordination,   conflict   of   interest,   and   hidden  

gaming  (Cockanye,  2009:  209;  Laffont,  1990:  302).    Principals  must  therefore  monitor  

their  agents  in  order  to  ensure  their  instructions  are  properly  completed.    However,  

monitoring  costs  can  be  high.    Agents  are  the  actors  involved  in  actually  carrying  out  

their  principals’  orders  and  can  leverage  this  position  by  controlling  the  upward  flow  

Page 26: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

25  

of   information,   or   feedback   (O’Connor,   2013).     Monitoring   problems   are   further  

compounded  when  tasks  or  objectives  are  imprecise  and/or  difficult  to  verify.  

 

Contracts.  A  contract  is  a  principal-­‐agent  transaction  for  a  service.    In  everyday  life,  

most  decisions  to  contract  a  service,  such  as  a  lawyer  or  electrician,  are  made  on  the  

basis   of   needing   a   contractor’s   expertise   because   the   client   himself   lacks   the   given  

skills;   this   fact   points   to   the   asymmetric   information   that   frequently   accompanies  

contracts,   as   a   form   of   principal-­‐agent   transaction.     An   enduring   concern   in  

contracting  for  clients  is  being  overbilled  (Singer,  2008:  155).     In  comparison  to  the  

purchase   of   an   overpriced   good,   which   is   a   one-­‐off   event,   overbilling   for   a   service  

recurs  over  the  life  of  the  contract  (Singer,  2008:  155).    The  client  –  who  may  lack  the  

knowledge  and  tools  to  accurately  monitor  performance  –  is  at  the  contractor’s  mercy  

to  inform  him  on  the  contract’s  progress  and  what  should  be  done  next  (Singer,  2008:  

153).    Contractual  slack  exhibits  itself  acutely  in  the  form  of  contract  incompleteness:  

when  the  terms  and  objectives  of  a  contract  are  difficult  to  specify  and  subsequently  

difficult   to   monitor   (Singer,   208:   153).     Incomplete   contracts   give   contractors  

discretion  “to  make  judgment  calls,  trade-­‐offs,  and  [decisions]  to  fill  in  the  contractual  

gaps,”   which   may   not   be   in   their   client’s   best   interests   (Freeman,   2003:   1343).    

Overbilling   and   also   cost   reductions   through   sacrificing  quality  may  not   technically  

violate   the   terms   of   incomplete   contracts   (Freeman,   2003:   1345).     Most   of   the  

contracts   in   intelligence  are  necessarily  incomplete  because   the  areas   they  deal  with  

(foreign   and   security   policy)   are   inherently   complex   and   unpredictable,   making  

contractual  terms  difficult  to  specify  in  full  (Hart,  Shleifer,  and  Vishny,  1997:  1155).  

 

One  could  argue  that  a  contractor’s  desire  for  future  business  and  maintaining  

good   reputation   should   regulate   his   performance   and   prevent   undue   shirking.    

Page 27: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

26  

However,   this   desire   for   future   business   also   provides   perverse   incentives   for  

contractors   to   create  path  dependencies,  whereby   contractors   structure   future  need  

to  retain  their  services  through  their  current  work  (Cockanye,  2009:  208).    Some  jobs,  

especially   in   incomplete   contracts,  mandate   long-­‐terms   of   service,  which   paves   the  

way  for  principals  to  become  dependent  on  their  contractor/s.  

 

Public   and   private   provision   similarities.   Principal-­‐agent   theory   has   found  

widespread   application   outside   of   economics,   including   in   political   science   and  

international  relations.    Government  can  be  conceptualized  as  a  chain  configuration  

of  principals  and  agents  in  which  the  ultimate  principal  is  the  electorate,  whose  first  

agents   are   their   elected   officials,   which   act   as   principals   to   given   legislative  

committees,   followed  by  bureaucratic  agencies,  and  so   forth  (Cockanye,  2009:  210).    

At   each   principal-­‐agent   transaction   in   the   chain,   the   ultimate   principal’s   (the  

electorate’s)  interests  undergo  increased  agency  slack  (Cockanye,  2009:  210).    Public  

servants’   basic   mandate   to   promote   the   public   or   national   interest   is   similar   to  

contractual   incompleteness  or  slack.    Different  public  actors  can  all  pursue  different  

conceptions   of  what   they   claim   is   the  public   interest,   and   just   like  with   incomplete  

contracts,   none   of   them   are   necessarily   wrong   because   of   the   term’s   inherent  

ambiguity  (Levine  and  Forrence,  1990:  180-­‐181).    Finally,  the  bargaining  games  that  

occur   in   bureaucratic   politics   can   be   construed   as   a   sort   of  marketplace   exchange,  

where  the  goods  and  services  being  offered  are  policy  proposals  being  forwarded  to  

maximize  an  organization’s  given  interests.    The  consumers  in  this  case  are  decision  

makers  and  superior  officials.      

 

 

 

Page 28: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

27  

***  

 

This  section  considered  arguments  in  favor  of  privatization  as  well  as  some  relevant  

basic   mechanisms   of   private   provision,   importantly   the   profit   motive   and   market  

discipline.  This  section  also   introduced  principal-­‐agent   theory  and   its  application   in  

contracts,   which   provide   especially   valuable   tools   for   this   paper’s   purposes   of  

examining  intelligence  contracting.  

                                           

                   

Page 29: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

28  

   

VI.  ISSUES  WITH  CONTRACTING  INTELLIGENCE        

In  this  section,  the  theories,  principles,  and  background  presented  thus  far  are  used  to  

determine   what   happens   when   contractors,   as   private   actors,   are   involved   in   an  

activity  as  lacking  in  oversight  and  intertwined  with  the  public  and  national  interest  

as   intelligence.     Discussion   of   intelligence   contracting   here   takes   into   account   the  

respective   advantages   and   disadvantages   of   both   public   and   private   provision  

considered   in   previous   sections.     Two   case   examples,   the  NSA’s   Trailblazer   project  

and   Abu   Ghraib,   are   used   to   illustrate   the   contentious   issues   associated   with  

intelligence  contracting.    I  discuss  these  issues  in  rough  order  of  the  increased  scope  

and   gravity   of   the   problems   they   raise.     I   start   by   revisiting   the   inherently  

governmental  standard.      

 

What   is   inherently   governmental?   As   discussed   in   Part   V,   FAR   Subpart   7.5   lists  

functions  considered  inherently  governmental,  for  which  contractors  may  not  be  used.    

Listed  functions  particularly  relevant  to  intelligence  contracting  are:  “the  command  of  

military   forces,”   “the   conduct   [and   determination]   of   foreign   policy,”   “the  

determination  of   agency  policy,   such   as  determining   the   content   and   application  of  

regulations,”   and   “the   direction   and   control   of   intelligence   and   counter-­‐intelligence  

operations”   (FAR,   2006).     Subpart   7.5   also   notes   functions   which   “may   approach  

being”   inherently   governmental.     These   are   predominately   activities   where  

contractors   perform   in   administrative   and   advisory   capacities   dealing   with  

regulatory   compliance   and   contract   management,   which   may   lead   to   conflicts   of  

interest.    Both  of  these  lists,  as  previously  noted,  are  “not  all  inclusive”  (FAR,  2006).      

Page 30: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

29  

 

This  last  feature  of  FAR  Subpart  7.5  presents  federal  agencies  slack,  by  letting  

them  make  the  call  on  functions  not  explicitly  listed.    It  is  understandable  that  federal  

regulators  may   intend   the  not  all   inclusive   disclaimer   to   guide   agencies   to   proceed  

more  judiciously  in  their  hiring  of  contractors  rather  than  act  as  a  loophole.    However,  

this   hypothetical   intention   does   not   negate   what   the   FAR   actually   says   on   paper;  

agencies  are  still  largely  disposed  with  how  to  interpret  the  regulation.    Moreover,  as  

discussion   here   and   in   Part   VII   should   illustrate,   there   is   evidence   to   suggest  

contractors  have  been  employed  in  technically  restricted  functions.  

 

Two  cases  of  contract  miscarriages  

 

Presented  here  are   two  cases  of  private   contractor   involvement   in   intelligence   that  

resulted  in  controversy:  the  NSA’s  Trailblazer  program  and  the  Abu  Ghraib  prisoner  

abuse  scandal.  

 

The   NSA’s   Trailblazer   program.     Starting   in   the   late   1990s,   as   revolutionary  

advancements   in   computing,   encryption,   fiber   optics,   and   communications   were  

sweeping   through   the   private   sector,   the  NSA  began   exploring  methods   to  monitor  

cell  phone  and  electronic  communications  and  to  process  this  information  and  open  

source  data.    Michael  Hayden,  as  director  of  the  NSA,  championed  the  expanded  use  of  

contractors   to   develop   the   agency’s   SIGINT   capabilities   (Shorrock,   2008:   201-­‐202).    

Well  before  9/11,  Hayden  and  agency  officials  were  aware  of  the  NSA’s  challenges  in  

adapting   to   ongoing   technological   advances   (Mayer,   2011);   however,   the   attacks  

greatly  magnified  the  agency’s  impetus  to  develop  an  effective  SIGINT  system  for  the  

twenty-­‐first  century.  

Page 31: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

30  

 

Hayden   chose   to   pursue   the   Trailblazer   program,   over   a   rival   in-­‐house  

program   called   ThinThread,   which   was   purportedly   simpler   to   understand,   more  

cost-­‐effective,   and   included  privacy   protections   for  U.S.   citizens   (Mayer,   2011).     On  

October  21,  2002,   Science  Application   International  Corporation   (SAIC),   as   the   lead  

member   of   a   consortium   of   contractors,   announced   it   had  won   a   $280  million   26-­‐

month  contract  from  the  NSA  to  build  Trailblazer  (Business  Wire,  2002).    SAIC  is  the  

NSA’s   largest   contractor,   has   a   long  history  with   the   agency   (Shorrock,   2008:  215),  

and  ranks  among  the  top  tier  of  intelligence  contractors,  the  systems  integrators.  The  

NSA  choose  SAIC  to  lead  the  project  in  part  because  of  data  mining  programs  in  had  

developed  prior  to  9/11,  such  as  TeraText,  a  platform  for  downloading,  storing,  and  

rapidly  retrieving  massive  amounts  of  textual  data  (Shorrock,  2008:  216).      

 

The  NSA  believed  SAIC  would  be  able  to  deliver  a  silver-­‐bullet  solution  to  the  

agency’s  SIGINT  problems.    Trailblazer  was  intended  as  a  replacement  for  the  NSA’s  

Cold  War-­‐era  eavesdropping  system,  which  could  “capture  communications  travelling  

on  cell  phones,   fiber  optics,  and  across  the   internet”  (Shorrock,  2008:  214).    Tasked  

with  overseeing  Trailblazer  was  Deputy  Director  William  Black,  who  had  retired  from  

the  NSA   in   1997   to  work   for   SAIC,   and  had   since   returned   to   the   agency   (Gorman,  

2006).    Long  story  short,  Trailblazer  was  a  sweeping  failure.    By  the  time  the  program  

was   cancelled   in   2005   by   Hayden’s   successor,   Keith   Alexander,   its   price   tag   had  

swelled   from   $280   million   to   $1.2   billion   (Mayer,   2011).     NSA   and   SAIC  

mismanagement  reportedly  mired  Trailblazer;  the  NSA  in  particular  was  criticized  for  

taking  an  essentially  hands-­‐off  approach  (Shorrock,  2008:  219).    John  Pike,  director  of  

Globalsecurity.org,   believes   the   program   went   afoul   because   of   “differing  

interpretations   between   SAIC   and   the   NSA   over   data   mining”   as   well   as   the  

Page 32: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

31  

requirements   of   the   project   (Shorrock,   2008:   219-­‐220).     Nonetheless,   SAIC   was  

awarded  the  contract  for  Trailblazer’s  successor  program,  and  continues  to  maintain  

close  ties  with  the  NSA  (Shorrock,  2008:  218).    

 

Abu   Ghraib.   CACI   International   is   among  a   collection  of   companies   known  as  pure  

plays,   which   earn   the   bulk   of   their   revenue   from   one   industry;   in   this   case,  

intelligence   (Shorrock,   2008:   264).     CACI’s   involvement   in   the   Abu   Ghraib   scandal  

starts  in  2003  when  it  acquired  Premier  Technology  Group  (PTG),  a  smaller  company  

with   a   preexisting  blanket  purchase  agreement   (BPA)  with   the   Interior  Department  

“to   supply   ‘screening,   interrogation,   and   support   functions’   and   [HUMINT]   at   an  

unspecified  site  in  Iraq”  (Shorrock,  2008:  279-­‐280).  

 

CACI  and  Titan  (another  contracting  firm,  now  called  L-­‐3)  contractors  arrived  

at   Abu   Ghraib   prison   as   it  was   being   overhauled   to  mimic   Guantanamo   (Shorrock,  

2008:  279-­‐280).    Private   contractors  were  directly   involved   in   the  use  of   enhanced  

interrogation  techniques  (EITs)  on  prisoners  at  Abu  Ghraib.    These  contractors  were  

in   Iraq   to   serve   as   translators   and   had   no   training   in   conducting   interrogations  

(Krishnan,  2011:  199).    Claims  of  abusive  practices  at  Abu  Ghraib  started  to  arise  in  

2003  with   reports  by  Amnesty   International,   but   it  was  not  until   spring  2004  after  

several   press   investigations   that   the   scandal   became   widely   known   to   the   public  

(Hersh,  2004).    Even  after  CACI’s  improper  involvement  in  prisoner  abuse  was  made  

known,  the  U.S.  government  not  only  failed  “to  terminate  [their]  contract,  but  actually  

expanded   its   terms”   (Dickinson,   2009:   224).     No   formal   criminal   charges   were  

entered   against   contractors   involved   at   Abu   Ghraib   (Chesterman,   2008:   1063).     In  

June  2004,  256  Iraqis  lodged  a  class  action  lawsuit  against  CACI  and  Titan  under  the  

Alien  Tort  Claims  Act,  which  bounced  around  the  U.S.  federal  court  system  for  several  

Page 33: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

32  

years,  ending  with  case’s  dismissal  being  upheld   in  appeals  court   in  2009  (Business  

and  Human  Rights  Resource  Center).    

 

 

Secrecy,  market  problems,  and  accountability  

 

SAIC’s   involvement   in   the   NSA’s   Trailblazer   program   and   CACI   and   Titan’s  

involvement  in  prisoner  abuse  at  Abu  Ghraib  are  two  extreme  cases  exemplifying  the  

serious   concerns   stemming   from   intelligence   contracting.     The   proceeding  

paragraphs   discuss   these   issues   in   intelligence   contracting   and   relate   them   to   the  

Trailblazer  and  Abu  Ghraib  cases.  

 

Intelligence   market   and   market   discipline.   As   stated   in   Part   V,   the   benefits   of  

private   provision   arise   from   the   accountability   fostered   by   market   discipline  

(Trebilcock  and  Iacobucci,  2003:  1447-­‐1448).    This  market  discipline  is  predicated  on  

the  existence  of  competition  between  firms  in  a  relatively  free  market.    However,  this  

sort  of  market  simply  does  not  exist  in  the  private  intelligence  industry.    Intelligence  

agencies,   as   clients/principals,   are   both   unable   and   unwilling   to   promote   an   open  

market   for   contracting  services  with  more  readily  procurable   supply   (Singer,  2008:  

152).  

 

As   demonstrated   by   the   renewal   of   service   contracts   in   the   Trailblazer   and  

Abu   Ghraib   cases   following   the   contracted   companies’   failure   to   exercise   due  

diligence   and   their   involvement   in   public   controversy,   there   is   insufficient  

competition  in  the  intelligence  contracting  market  to  reward  good  players  and  punish  

bad   ones.     Favoritism  pervades   the   procurement   process   for   intelligence   contracts,  

Page 34: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

33  

with  privileged   firms  often  being  awarded  enormous   contracts   in   a  predetermined,  

non-­‐open   bidding   process   (Singer,   2008:   152).     It   is   understood   in   economics   that  

procurement  favoritism  can  lead  to  adverse  consequences,  including  “cost  overruns,  

production   delays,   and   performance   downgrading”   (Che,   1995:   1995).     All   three   of  

these   adverse   consequences   were   clearly   displayed   in   SAIC’s   performance   in  

Trailblazer.   NSA   Deputy   Director   Black,   who   was   tasked   with   the   project’s  

management,   is   a   manifestation   of   the   revolving   door   in   practice   (this   term   is  

discussed  later  in  this  section).    Black  was  hired  after  40  years  of  NSA  service  by  SAIC  

for   the   singular   purpose   of   soliciting   NSA   contracts   (Shorrock,   2008:   216).     He  

returned  to  the  agency  in  2000  to  lead  the  Trailblazer  program,  still  in  its  infancy  at  

the  time,  and  within  two  years  SAIC  had  “won  the  master  contract  for  the  program”  

(Shorrock,   2008:   216).     As  mentioned   earlier,   there   was   a   genuine   legitimate   NSA  

interest   in   the   technical   services   SAIC   could   offer;   however,   it   would   be   almost  

impossible   to   deny   SAIC   was   in   a   special   bidding   position   because   of   its   close  

personal  relationships  to  the  agency.  

 

Whether  by  intentional  design,  the  inherent  nature  of  the  provided  service,  or  

some   combination   of   both,  much   intelligence   contracting   displays  path  dependency.    

The  expansion  of  CACI’s  services  to  the  U.S.  mission  in  Iraq  following  the  Abu  Ghraib  

scandal  reflects  the  heavy  structural  dependence  of  the  U.S.  military  on  contractors  in  

the   conflict   (Kruck,   2014:   120-­‐121).     IT   services   –   from   offices’   routine   computer  

networks   to   the   NSA’s   highly   advanced   data   mining   operations   –   require   standby  

troubleshooting   and   maintenance,   particularly   as   systems   increase   in   size   and  

complexity.    This  creates  a  need  to  retain  contractors  for  long-­‐term  technical  support,  

even   if   they   were   hired   originally   only   to   build   a   given   IT   system.     The   highly  

specialized   nature   of   advanced   data   mining   programs   and   other   IT   systems,   like  

Page 35: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

34  

Trailblazer,   furthermore   means   intelligence   agencies   (as   principals)   often   face  

prohibitive  costs  in  switching  agents,  creating  an  undeniable  incentive  for  contractors  

to  price  gouge  (Cockanye,  2009:  208).  

 

Trailblazer   and   Abu   Ghraib   are   both   cases   of   incomplete   contracts.     With  

Trailblazer,  the  NSA  was  tasking  SAIC  to  construct  a  SIGINT  platform  on  a  scale  much  

greater   than   anything   in   either  parties’   previous   experience   (Shorrock,   2008:   220).    

Although   it   cannot   be  wholly   confirmed  here,   in   all   likelihood,   the  NSA  drafted   the  

original   contract   with   a   set   of   broad   requirements   that   were   both   too   vague   to  

effectively  monitor  and  evolved  over  the  course  of  the  contract  (Shorrock,  2008:  219-­‐

220).     At   Abu   Ghraib,   CACI   personnel   were   under   a   BPA,   which   is   an   especially  

incomplete  form  of  contract,  for  use  as  translators  –  not  interrogation.    Under  a  BPA,  

the  principal  does  not  specify  all  required  services  at  the  original  signing,  but  instead  

enters  task  orders  as  needs  arise  (Dickinson,  2009:  221).    The  flexible  terms  of  CACI’s  

Iraqi   BPA   had   a   direct   relation   to   the   reassignment   –   through   task   orders   –   of  

contracted   translators   to   prisoner   interrogations   (Dickinson,   2009:   221).     In  many  

intelligence   activities,   especially   HUMINT,   substantial   contractual   incompleteness  

should  be  expected.    Functions  are  often  almost  impossible  to  fully  contract  because  

they  are  value-­‐laden,   complex,   and  change  over   time   (Freeman,  2003:  1343).    Most  

privatization  advocates  agree  that  in  situations  such  as  these,  government  provision  

is   typically   preferable   to   contracting,   because   it   allows   public   officials   to   make  

important  judgment  calls  on  their  own  behalf  rather  than  having  private  agents  do  it  

for  them  (Freeman,  2003:  1343;  Hart,  Shleifer,  and  Vishny,  1997:  1130).  

 

There   are   valid   reasons   justifying   the   above   problems   with   the   private  

intelligence  market,   driven   by   intelligence   agencies’   prevailing   concern   for   secrecy.    

Page 36: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

35  

The   IC’s   responsibilities   in  national   security   fuel   the   confidentiality   surrounding   its  

operations  as  well  as   its  obtuse  procurement  process,  which  heavily   favors   familiar  

repeat   players   versus   firms   with   whom   the   IC   has   had   little   previous   experience  

(Cockanye,  203:  203).     IC  contract  procurement  tends  to  be  a   long,  arduous  process  

due  to  security  protocols;  smaller,  less  familiar  firms  may  simply  lack  the  resources  to  

outlast   this   process   (Shorrock,   2008:   27).     Moreover,   intelligence   agencies   tend   to  

make  contracts  not  with  a  given  firm,  per  se,  but  with  known  individuals  working  for  

these   firms,   often   former  officials   (Shorrock,  2008:  32-­‐33).     Former   senior  officials,  

like  William  Black   in   the   Trailblazer   case,   bring   tremendous   value   to   a   contracting  

firm.    Not  only  do   they  have   intimate   institutional  knowledge,  but   these   individuals  

also  carry  their  connections  still  in  government  to  the  company  (Shorrock,  2008:  31-­‐

32).  

 

Contractor   cost   effectiveness.   In   business   as   well   as   government,   outsourcing   is  

commonly  motivated  by  a  desire  to  reduce  costs,  by  lowering  the  overhead  entailed  

by  in-­‐house  provision.    In  hiring  a  full-­‐time  intelligence  officer,  the  government  bears  

significant   costs   in   screening   and   training,   as   well   as   sustained   costs   in   providing  

salary,   pension,   and   benefits.     Additionally,   intelligence   agencies   must   make   their  

hiring  decisions  based  on  their  present  and  future  strategic  needs  in  human  capital,  

which  are  contingent  (RAND,  2013:  13).    In  this  context,  hiring  a  contractor,  versus  a  

full-­‐time  public   employee,   can  be   fairly   attractive.     Contractors   offer   agencies  more  

flexibility   in  adjusting   their  supply  of  human  capital  and  expertise   to  shifting  needs  

(ODNI,  2008).    Entering  the  contracting  business  is  also  an  alluring  option  for  public  

employees,  as  individuals.    A  contractor  can  expect  to  earn  roughly  double  his  public  

counterpart’s  salary:  the  average  cost  yearly  cost  of  a  government  intelligence  officer  

Page 37: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

36  

(including  pension  and  benefits)  is  $125,000,  while  an  equivalent  private  contractor  

averages  between  $200,000  and  $250,000  (ODNI,  2008).    

 

It   is   not   clear,   however,   whether   contracting   is   actually   more   cost-­‐effective  

than   in-­‐house   provision   in   intelligence   and   defense,   as   well   as   business   generally  

(Singer,   2008:   157).     One   of   the   primary   reasons   intelligence   contracting   firms   are  

able   to   garnish   their   employees’   wages   so   well   is   their   procurement   costs   have  

already   been   borne   by   the   government   (Singer,   2008:   74).     The   majority   of  

intelligence  contractors  are  former  government  employees,  whether  in  intelligence  or  

the  military,   meaning   the   taxpayer   has   already   footed  most   of   their   training   costs  

(Singer,  2008:  77).    Owing  to  the  structure  of  the   intelligence  market  –   importantly,  

its   lack   of   effective   market   discipline   mechanisms,   overbilling   by   contractors   is   a  

significant,  recurring  concern  (Isenberg,  2009:  23).    As  discussed  in  Part  V,  overbilling  

in   service   contracting   can   be   especially   severe   when   compared   to   purchasing   an  

overpriced   good,   because   overcharging   can   occur   repeatedly   over   the   contract’s  

lifetime   (Singer,   2008:   155).     The   existence   of   path   dependencies   and   contractual  

slack  further  multiply  incentives  for  contractors  to  overbill  their  clients,  adding  to  the  

government’s  total  costs.  

 

Contracting  professionalism?  An  oft-­‐cited  concern  with  private  contractors  is  they  

are  not  upheld  to  the  same  standards  of  professionalism  as  government  intelligence  

officers.    In  The  Soldier  and  the  State,  Samuel  Huntington  argues,  “the  modern  military  

officer  corps  is  a  professional  body,”  and  asserts  that  professionalism  is  the  military  

officer’s   most   important   quality   (Huntington,   1985:   7).     Huntington   defines  

professionalism  by  its  three  distinguishing  characteristics  of  expertise,  responsibility,  

and  corporateness  (Huntington,  1985:  8-­‐9).    The  professional  military  officer  is  duty-­‐

Page 38: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

37  

bound   to   practice   his   expertise   in   the   management   of   violence   in   service   of   the  

military   security   of   the   state   (Huntington,   1985:   14-­‐15).     Huntington   plainly   states  

pecuniary  rewards  cannot  be  a  professional’s  primary  motivation  (Huntington,  1985:  

9-­‐10);   this   standard   is   used   to   differentiate   professional   officers   from  mercenaries  

(Huntington,   1985:   15).     The   notional   problem  with   pecuniary   versus   professional  

incentives   is   that   the   loyalty   and  performance   of   individuals  motivated   by   the   first  

only  extends  as   far  as   the  money.    Robert  Baer,  a   former  CIA  officer  with  extensive  

experience   in   the   Middle   East,   argues   contractors,   particularly   in   HUMINT,   are  

inherently   risk   averse.     Baer   explains   that   in   conducting   HUMINT,   officers   must   be  

willing  to  engage  in  potentially  life-­‐threatening  work,  “to  infiltrate  organizations  like  

Hezbollah  in  Lebanon  and  recruit  spies”  (Shorrock,  2008:  152).    A  public  servant,  who  

has   taken  a  professional   oath   and   is   interested   in  promotion  within   an   agency,   has  

greater  reason  to  take  risks  than  a  contractor,  who  is  “just  coming  in  and  collecting  a  

salary,”  according  to  Baer  (Shorrock,  2008:  152).  

 

However,  it  is  not  clear  that  pecuniary  rewards  negate  professionalism  or  are  

even  a  contractor’s  primary  motivation.      Firstly,  military  and  intelligence  officers  also  

receive   salaries;   they   are   essentially   distinguished   from   contractors   only   by   being  

under  public  oath.    How  this  oath  weighs  on  job  performance  is  open  to  debate,  but  it  

is   an   effectively   weak   monitoring   mechanism.     As   noted   earlier,   most   intelligence  

contractors  have  a  background  in  either  military  or  intelligence  service.  Returning  to  

Huntington,   he   argues   that   military   officers,   as   professionals,   possess   a   distinct  

military  mind,  which  arises  because  “people  who  act  the  same  way  over  a  long  period  

of   time   tend   to   develop   distinctive   and   persistent   habits   of   thought”   (Huntington,  

1985:  61).    Subsequently,  there  is  no  compelling  reason  why  or  explanation  how  an  

intelligence   officer   would   suddenly   change   their   fundamental   values   and   beliefs  

Page 39: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

38  

simply  upon  exiting  public   service   for   the  private   sector.    Most   full-­‐time  employees  

and  executives  of   intelligence  contracting   firms   furthermore   feel   they  are  genuinely  

working  in  the  national  interest  as  an  extension  of  the  IC,  albeit  in  the  private  sector  

(Hansen,   2014;   Singer,   2008:  154).     Finally,   the   IC’s   prevailing   concern   for   security  

and   the   stringent   process   of   obtaining   clearances   protect   against   most   rogue  

intelligence   contractors   and   incidentally   give   rise   to   certain   professional   norms  

within  the  industry  (Hansen,  2014:  75;  Avant,  2009:  188-­‐189).    

 

Accountability.    Undergirding  the  preceding  discussion  on  intelligence  contracting  is  

the   question   of   accountability:   specifically   a   concern   that   contractor   involvement  

undermines  oversight  and  control  of  activities  deeply   intertwined  with   the  national  

interest.     As   earlier   discussed,   insufficient   competition   in   the   private   intelligence  

industry   generally   prevents   market   discipline   from   emerging   to   regulate   firms’  

behavior.    Poor  performance  and  shirking  are  difficult  to  punish,  as  they  often  do  not  

technically  violate  the  incomplete  contracts  typical  in  intelligence.      

 

In   the   case   examples   of   Trailblazer   and   Abu   Ghraib   it   is   worth   noting   that  

contractor  misdeeds  were  only  uncovered  because  of  whistleblowers  (in  Trailblazer  

[Mayer,   2011])   and   investigations   by   non-­‐governmental   actors,   like   human   rights  

groups   and   the   media   (in   Abu   Ghraib)   –   not   public   regulators.     These   informal  

oversight   mechanisms   are   a   poor   basis   for   delivering   systemic   accountability.    

Whistleblowing,   as   a   primary   example,   is   too   irregular   to   sufficiently   deter  

wrongdoing;   the   government,   on   the   other   hand,   has   a   valid   concern   that  

whistleblowing,  or  leaks  in  its  preferred  parlance,  risk  real  harm  to  national  security  

interests   and   reputation.     Moreover,   undue   whistleblowing,   as   perceived   by   the  

government,  motivates  it  to  suppress  future  leaks.    

Page 40: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

39  

 

A   deficit   of   effective   formal   oversight   is   not   unique   to   the   subject   of  

intelligence  contracting,  however.    Rather,  it  characterizes  the  entirety  of  intelligence  

activity.    As  highlighted  in  Part  IV,  it  is  largely  at  the  intelligence  agencies’  discretion  

how   much   oversight   they   receive,   and   more   basically,   whether   their   activities  

conform  to  the  law.    Not  only  is  congressional  oversight  lacking,  but  furthermore,  the  

non-­‐disclosure  of   select   intelligence   committees’   proceedings  provides   few  political  

incentives   for   senators   and   congressmen   to   engage   in   intensive   oversight   to   begin  

with   (Halchin   and   Kaiser,   2012:   35).     Accepting   that   insufficient   oversight   extends  

across   the   IC,   and   not   just   its   use   of   contractors,   intelligence   contracting   still   feels  

problematic.    While  meaningful  oversight  of  the  IC  is  elusive,  intelligence  agencies  are  

at   least   de   jure   justified   in   democracies   by   their   grounding   in   the   rule   of   law   and  

governmental  hierarchy  (Chesterman,  2008:  1069).    Contractors,  on  the  other  hand,  

exist  outside  the  formal  hierarchy  of  public  accountability.    While  they  are  subject  to  

federal   and   local   regulations   as   any   other   business,   contractors   –as   private  

businesses   –   are   not   strictly   bound   to   constitutional   obligations,   unlike   public  

agencies  (Freeman,  2003:  1304-­‐1305).    Interestingly,  it  is  for  this  precise  reason  that  

governments   might   sometimes   use   contractors,   to   provide   a   cover   of   plausible  

deniability  (Singer,  2008:  209-­‐210).      

 

 

Public  versus  private  interests  

 

Perhaps   the   most   vexing   concerns   with   intelligence   contracting   stem   from   the  

question   of   how   the   private   interests   of   contractors   interact   with   the   public,  

Page 41: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

40  

specifically  national,   interest   the   IC   is   responsible   for   promoting.     The   crux   of   this  

question  comes  down  to  how  the  national  interest  is  determined.  

 

Conflicts  of  national   interest.  The  pursuit  of  profit,  as  covered  in  Part  V,  drives  the  

life   of   private   business.     Intelligence   contractors   may   insist   they   are   acting   in   the  

national   interest   in  a  manner   free   from  balance-­‐sheet  considerations;  however,   this  

claim   is   problematic.    Many  would   argue   it   is   fundamentally   impossible   for   private  

firms  “to  put  the  public  [or  national]  interest  before  their  private  business”  (Krishnan,  

2011:   203-­‐204);   this   is   probably   most   valid   in   conflicts   of   interest   where   clearly  

contradictory  incentives  exist  for  public  and  private  actors.  

 

However,   the   real   problem  of   the   claim   contractors   can   altruistically   pursue  

the   national   interest   resides   in   the   fact,   as   discussed   previously,   that   the   national  

interest  is  strikingly  vague  and  contested  even  among  government  actors  themselves.    

The   notion   of   “promoting   the   national   interest”   is   non-­‐contractible;   it   cannot   be  

meaningfully  reduced  to  quantitative  measures  and  is  therefore  difficult  to  stipulate  

in   contractual   terms.     Especially   in   intelligence,   contractors   operate   in   gray   areas  

where   defining   the   national   interest   becomes   increasingly   complex   (Singer,   2008:  

154).    Public  and  private  actors  in  this  setting  must  make  judgment  calls  on  what  is  in  

the   national   interest.     In   highly   complex   functions,   a   contractor   may   distort   the  

national  interest  to  private  advantage,  whether  intentionally  or  even  subconsciously  

(Singer,  2008:  154).    Yet  it  is  somewhat  reassuring  that  the  national  interest  is  vague  

and   frequently   contested,   as   it   suggests   this   interest   is   reached   though   a  

harmonization  of  different  actors’  varying  conceptions.    This   is   the  basic  premise  of  

bureaucratic   politics.     The   problem   is   intelligence   is   considered   privileged  

information,   and   is   therefore  weighted  differently   by   decision  makers   versus   other  

Page 42: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

41  

sources  of  information;  intelligence  contracting  inserts  distinctively  private  interests  

into  an  area  of  government  wielding  substantial  structural  power.        

 

Analytical   work   in   intelligence   provides   opportunities   for   contractor  

subversion   of   the   national   interest   –   more   so   than   in   highly   visible   cases   of  

wrongdoing  like  Abu  Ghraib  (Chesterman,  2008:  1064).    The  President’s  Daily  Brief,  

an   intelligence  summary  presented  by  the  DNI  to  the  White  House  each  morning,   is  

one  of  the  most  sensitive  documents  in  government  (Shorrock,  2008:  189-­‐190).    Over  

70  percent  of  the  document’s  content  is  furnished  by  the  NSA  (Shorrock,  2008:  189-­‐

90).    At   the   time  of   his  writing,   Shorrock   estimated  50   to  75  percent   of   the  people  

working   at   NSA   headquarters   and   ground   stations   internationally   to   be   private  

contractors   (Shorrock,   2008:   188).     This   places   private   contractors   very   close   to  

highest   levels   of   intelligence   analysis   in   the   IC   as   well   as   the   United   States’   top  

decision  makers.  

 

The  revolving  door.  The  revolving  door  describes  a  common  practice  of  individuals  

moving  between  government   and  private   sector   employment   (Shorrock,   2008:   32).    

This  practice  is  legal  in  the  United  States;  senior  public  officials  face  only  a  one-­‐year  

prohibition   from   lobbying  or  contracting   in   their   former   field   (Shorrock,  2008:  32).    

Interestingly,   the  term  first  originated  from  growing  criticism  in  the  1950s  over  the  

growth  of  the  military-­‐industrial  complex  (Mundheim,  1980/81:  709).    Since  then,  the  

revolving   door   has   retained   its  mostly   pejorative   connotation   to   describe   collusion  

between   government   regulators   and   the   industries   they   are   supposed   to   regulate  

(Meghani  and  Kuzma,  2011:  578)  

 

Page 43: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

42  

A  central  benefit  of  the  revolving  door  is  that  it  allows  specialized  knowledge  

and   expertise   to   be   transferred   between   public   and   private   sectors.     In   its   use   in  

regulatory   settings,   industry   veterans   provide   their   institutional   knowledge   to  

government,  enhancing  effective  performance  of  their  regulatory  tasks  (Meghani  and  

Kuzma,   2011:   576).     Industry-­‐specific   expertise   is   a   precious   commodity   for  

government   regulators,   and   it   is   necessary   for   good   regulatory   performance   (Che,  

1995:  379).    On  the  industry  side,  regulated  firms  value  former  regulators’  expertise  

to  help   “minimize   the   cost  of   complying  with   regulations”   (Che,  1995:  379).     In   the  

intelligence   industry,   former   senior   officials   are   crucial   to   a   contracting   firm   in  

establishing  potential  clients’  trust,  which  is  prerequisite  to  obtaining  big  intelligence  

contracts  (Shorrock,  2008:  32-­‐33).  

 

While   demand   for   expertise   on   both   the   public   and   private   side   is  

understandable,   the   revolving   door   can   produce   damaging   consequences   for  

oversight   and   industry  accountability.    The   revolving  door   can  bias  public  policy   in  

favor  of   industries’  special   interests,  degrade  public  confidence   in   the  government’s  

neutrality  and  authority,  and  give  special  interests  an  unfair  advantage  by  providing  

them   an   audience   other   policy   stakeholders   may   not   have   (Meghani   and   Kuzma,  

2011:   576-­‐577,   582).     Collusion   between   public   agencies   and   private   firms   also  

enhances   procurement   favoritism   and   can   deepen   path   dependencies.     The   NSA’s  

Trailblazer  program  and  specifically  Deputy  Director  Black’s  former  career  as  a  vice  

president  at  SAIC   illustrate   the  risks   towards  cost  overruns,  poor  performance,  and  

mismanagement   created   by   overly   close   ties   between   industry   and   the   IC.     On  

balance,   SAIC   emerged   from   the   Trailblazer   episode   relatively   unscathed.     The  

company   received   virtually   no   sanction   for   its   failure   to   deliver   on   Trailblazer;   its  

interests  prevailed  at  the  expense  of  the  taxpayer.      

Page 44: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

43  

 

Capture  of   the  national   interest.  The  revolving  door  is  closely  linked  to  the  notion  

of   regulatory   capture,   which   appears   in   economics   and   public   administration  

literature.     Regulatory   capture   argues   public   agencies,   particularly   regulators,   have  

life   cycles,   starting   with   a   sincere   interest   in   performing   their   oversight   mandate  

(Hill,  1991:  280).    Regulators’  expertise  requirements,  however,  eventually  lead  them  

to   recruit   personnel   from   regulated   industries,   and   their   worldview   increasingly  

conforms  to  industry’s  special  interests  over  time.    Ultimately,  these  public  oversight  

agencies   are   captured   by   industry,   and   the   public   interest   is   subverted   to   special  

private   interest   (Hill,   1991:   280).     The  more   slack   there   is   between   a   given   public  

agency  and  its  government  principal/s  –  Congress  for  example,  the  greater  risk  said  

agency   is   captured   (Levine   and  Forrence,   1990:  190).     This   is   because   the  distance  

between   industry   and   the   agency   is   shorter   than   that   between   the   agency   and   its  

public  principal,  providing  opportunities  for  hidden  gaming,  in  the  form  of  collusion,  

between  the  former  two.    This  problem  is  potentially  acute  in  intelligence  contracting;  

public   oversight   of   the   IC   is   lax,   and   relationships   between   contractors   and  

intelligence   agencies   are   commonly   closer   than   those   between   the   IC   and   its  

government  principals.  

 

A  few  voices  might  argue  that  private  special  interest  dominance  of  the  policy  

and   decision-­‐making   process   does   not   necessarily   thwart   the   public   and   national  

interest;   they   could   in   fact   be   construed   as   one   in   the   same.     However,   this  

proposition   is   limited   to   settings   in   which   these   two   interests   coincide.     Special  

interest  is  firstly  self-­‐regarding;  the  public  and  national  interest  serves  the  polity  as  a  

whole,  and  should  equitably  balance  different  and  diverging  private  interests  (Levine  

and   Forrence,   1990:   176).     Excessive   special   interest   influence   in   governance  

Page 45: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

44  

privileges   select   self-­‐regarding   interests   over   the   polity’s   general   interest,  

importantly   in   cases   where   they   deviate.     Understanding   this,   undue   contractor  

influence   in   the   IC   threatens   intelligence  agencies’   ability   to   fulfill   their  mandate   to  

promote  the  national  interest.    Furthermore,  public  perception  that  state  institutions  

are   dominated   by   special   interests   can   degrade   the   public’s   overall   trust   in   these  

institutions   and   weaken   their   authority   by   calling   into   question   their   legitimacy  

(Zahra  and  Kuzma,  2011:  581).  

 

***  

 

In   this   section,   I   presented   various   problems   that   can   arise   from   the   use   of  

contractors   in   intelligence.     These   problems   supply   good   arguments   against  

intelligence   contracting.     In   the   next,   penultimate   section,   I  weigh   these   arguments  

against  the  most  cogent  counterargument  in  favor  of  intelligence  contracting:  the  IC’s  

demand  for  specific  expertise  from  the  private  sector.  

                                       

Page 46: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

45  

   

VII.  THE  IC’S  DEMAND  FOR  EXPERTISE        Intelligence   contracting   peaked   sometime   between   2005   and   2007   after   surging  

dramatically  following  9/11.    Many  of  the  contractors  enlisted  during  the  early  2000s  

were   to   replenish   the   IC’s   personnel   ranks   decimated   by   budget   cuts   in   the   1990s  

(ODNI,  2008).    The  effort  to  return  more  intelligence  work  in-­‐house  was  spurred  by  

congressional   and  more   importantly   IC   concern   about   the   consequences   of   private  

contracting  (ODNI,  2008).    The  ODNI’s  2006  human  capital  plan  noted   in  particular  

“the   IC   [increasingly]   finds   itself   in   competition   with   its   contractors   for   [its]   own  

employees”  (ODNI,  2006:  6).    In  comparison  to  the  previous  two  administrations,  the  

Obama   administration   has   instituted  policies   pressuring   the  Pentagon   and   IC   to   be  

more   selective   in   using   contractors   (Isenberg,   2009:   15-­‐16).     Thus,   it   is   apparent  

there   is   some   level   of   recognition   by   the   U.S.   government   and   the   IC   of   the   issues  

surrounding  intelligence  contracting.  

 

For  its  part,  the  IC  would  do  well  by  reforming  its  agencies’  hiring  practices  to  

enhance  their  in-­‐house  human  capital  capacity  and  subsequently  reduce  dependence  

on  outside  contractor  expertise.    At  present,  agencies’  security  protocols  make  them  

highly   risk   averse   in   their   hirings   (McConnell,   2007).   Even   first   and   second-­‐

generation  U.S.  citizens  face  considerable  difficulty  in  landing  a  job  in  the  IC,  denying  

agencies  highly-­‐sought   foreign   language  skills   (McConnell,  2007).    Greater   IC  hiring  

flexibility,   however,   still   would   not   totally   resolve   the   structural   need   for   private  

expertise  in  some  areas  of  intelligence.    The  very  nature  of  contracted  work  ensures  it  

will  always  be  more   flexible   than  what   the  best   IC  hiring  reforms  could  accomplish  

Page 47: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

46  

(ODNI,   2008).     Flexibility   is   essential   for   intelligence   agencies   because   of   changing  

threats  and  technologies  they  must  adapt  to,  and  the  capabilities  contractors  provide  

in  unique  skills  and  surge  capacity  to  the  IC  are  noteworthy  (ODNI,  2008).      

 

In   the  proceeding  paragraphs,   I   break  down   intelligence  activities   into  areas  

which   are:   (1)   inappropriate   for   contractor   involvement,   (2)   appropriate   for  

contractor   involvement,   and   (3)   areas   where   the   appropriateness   of   contractor  

involvement  is  unclear  or  contingent.    To  do  so,  I  weigh  the  risks,  as  discussed  in  this  

paper,   raised   by   contractor   involvement   versus   the   particular   demand   for   a   given  

expertise,   which   is   also   evaluated   by   whether   agencies   can   sufficiently   procure   it  

internally.    

 

Exclusively   governmental   functions.   Subpart   7.5   of   the   FAR   on   inherently  

governmental   functions  naturally  provides  a  good  basis   for   judging  which  activities  

private   contractors   should   be   excluded   from.     Broadly   summarized,   the   policy  

expresses  concern  over  contractor  use  in  functions  where  they  have  equal  or  greater  

discretion  or  command  than  their  government  principals  (FAR,  2006).    This  applies  

especially   to   procurement   activities.     I   would   maintain   that   intelligence   agencies  

should  comply  more  diligently  with  the  existing  law  on  using  contractors,  and  would  

also   designate   a   few  more   inherently   governmental   functions   not   included   in   FAR  

Subpart  7.5,  applying  to  intelligence.  

 

Any  direct  use  of   lethal   force   in   an   intelligence   setting   should  be  exclusively  

reserved   to   public   actors.     Before   continuing   further,   I   would   underscore   that   this  

reservation  does  not  apply  the  same  to  principally  military  contractors.    In  drawing  a  

distinction   between   the   military   and   IC   as   it   relates   to   contracting,   the   military  

Page 48: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

47  

possesses  a  clearer  chain  of  command  and  greater  public  oversight  than  intelligence;  

wrongdoing   involving  military   contractors   is   therefore   more   likely   to   be   exposed.    

The   lack  of  oversight   the   IC  receives  creates  a  pressing  need   for   it  –  more  than  any  

other  area  of  government  –  to  exercise  due  diligence  and  assume  responsibility  for  its  

actions.     In   the   case   of   contractor   involvement   at   Abu   Ghraib,   the   fact   that   CACI  

International   and   Titan   have   suffered   no   criminal   or   civil   penalties   is   a   failure   of  

accountability  falling  largely  on  their  government  principals.    Clandestine  operations  

and   most   HUMINT   functions   should   be   provided   exclusively   by   public   agencies.    

Private   contractors   in   HUMINT   have   staffed   up   to   three-­‐quarters   of   the   CIA’s  

Islamabad  station,  held  positions  “as  sensitive  as  [overseas]  deputy  station  chief,”  and  

according   to   Robert   Baer,   have   even   determined  where   “CIA   officers   could   go   and  

who  they  could  meet”  in  Iraq  (Shorrock,  2008:  118).    The  last  two,  if  true,  are  a  direct  

violation   of   FAR   Subpart   7.5,   which   designates   “the   determination   and   control   of  

intelligence   and   counterintelligence   operations”   as   inherently   governmental   (FAR,  

2006).     In  most  HUMINT   cases,   there   is   no   structural   justification  why   intelligence  

agencies,  particularly  the  CIA,  cannot  furnish  their  own  capability,  as  they  did  for  the  

Cold  War’s  duration.    Recourse   to   the  private   sector  here   reflects  more  an  effort   to  

avoid  oversight  and  a  certain  indolence  on  the  agencies’  part  than  it  does  a  demand  

for  expertise  that  cannot  be  developed  within  government.  

 

Where  contractor  expertise  is  appropriate.  The  IC  must  handle  daily  an  immense  

volume  of  information  across  17  separate  agencies.    The  individual  agencies  are  often  

massive   organizations   themselves;   the   NSA   for   example   has   a   yearly   budget  

estimated   at   $10   billion   (Shorrock,   2008:   187).     Simply   coordinating   the   office  

activities   both  within   and   across   agencies   is   a   task   in   itself.     Assuming   they   can  be  

delivered  more  cost  effectively,   the   IC   should   outsource  non-­‐core   functions,   such  as  

Page 49: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

48  

maintaining  workplace  computer  systems,  custodial  work,  and  other  office   logistics.    

Agency   resources   can   then   be   reapportioned   to   focus   more   exclusively   on   core  

missions   in   intelligence   (Hansen,   2014:   60-­‐61);   this   is   the   logic   of   outsourcing   in  

general  and  the  original  intent  of  Clinton’s  privatization  initiatives.  

 

In   SIGINT,   which   is   the   core  mission   area   of  many   IC   agencies,   demand   for  

technical  expertise  in  computers,  encryption,  and  databases  –  as  examples,  is  a  valid  

reason   to   use   private   contractors.     Here   the   first   concern   is   not   necessarily   cost  

effectiveness,  but  rather   that  government  agencies  cannot   independently  reproduce  

the  technology  services  available  in  the  private  sector.    There  is  some  crossover  in  the  

core  and  non-­‐core  technical  functions  for  which  private  sector  expertise  is  sought  by  

the   IC.     To   illustrate:   the   ODNI   considers   commercial   satellite   vendors   to   be  

commodity  contractors,   rather   than  core   (ODNI,  2008).    For  an  agency   like   the  NRO,  

however,  which  devotes  95  percent  of  its  resources  to  contracts  (Shorrock,  2008:  16),  

purchasing   satellites   from   commodity   vendors   relates   directly   to   its   core   mission  

area  of  geospatial  intelligence  (GEOINT).    This  is  a  relatively  minor  nuance  that  does  

not  detract  from  the  general  point  to  be  made  about  the  IC  looking  to  contractors  for  

technical  expertise.  

 

Even  with   concerted   reforms   to   its   hiring   policies,   it   is   doubtful   the   IC   will  

become  the  first  destination  for  individuals  gifted  in  IT  (Harman,  2015:  104-­‐105).    As  

Harman  writes,  “over  the  long  run…Washington  won’t  win  a  digital  competition  with  

Silicon  Valley”  (Harman  2015:  105).    As  stated  in  Part  II,  today’s  technologies  are  two-­‐

edged.     Intelligence   benefits   greatly   from   the   modern   technology   available   to   it.    

Advanced  imagery  and  instant  communications  place  within  reach  Donald  Rumsfeld’s  

vision   of   network-­‐centric   warfare,   in   which   all   tactical   military   intelligence   is  

Page 50: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

49  

seamlessly   integrated   (Shorrock,   2008:   162,   234-­‐235).     The   ever-­‐increasing   speed  

and  storage  capacity  of   computers,  as  well  as  data-­‐processing  algorithms  and  other  

IT,   have   today   actualized  what   critics   call   the  national   surveillance   state   (Shorrock,  

2008:  340-­‐341).    However,  these  capabilities  only  exist  because  of  their  broad-­‐based  

development   in   the   private   sector.     Acquiring   these   capabilities   and   tailoring   them  

specifically   for   intelligence,   mandates   agencies   work   with   private   business.    

Moreover,  the  IC  has  impetus  for  fully  harnessing  today’s  technologies  because  they  

are  available  on  the  open  market  for  use  by  friend  and  foe  alike  (Shorrock,  2008:  340-­‐

341).  

 

This   convincing   intelligence   demand   for   technical   expertise   outweighs   the  

risks  of  contracting  as  illustrated  in  the  Trailblazer  episode,  but  it  does  not  mean  they  

should   be   dismissed.     The   IC’s   contracted   efforts   to   “modernize   its   computer   and  

software  systems”  have  periodically  resulted  in  costly  failures  (Krishnan,  2011:  198).    

Although  some  shirking  can  always  be  expected,  efforts  can  and  should  be  made   to  

minimize   the  problems  associated  with   intelligence  contracting  while  appropriately  

balancing   the   imperative   of   security.     Dickinson   (2009)   recommends   using   the  

contracts  themselves  as  the  best  vehicle  for  regulating  PMSCs;  I  would  agree  with  her.    

Contractual   terms   should   reduce   slack   by   including  more   specific   terms   of   service  

and  monitoring  mechanisms,   and   hiring   agencies   should   enforce   these   terms  more  

vigorously  –  including  by  termination  if  necessary.  

 

Contracting   gray  areas.  The  final  area  to  consider   is  where  the  appropriateness  of  

using   contractors   is   largely   contingent   upon   case-­‐by-­‐case   evaluation.     In   the  

immediate   aftermath   of   9/11,   the   Bush   administration   tasked   the   CIA   with  

conducting   interrogations   of   suspected   terrorists   and   also   running   secret   prisons  

Page 51: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

50  

(Mayer,   2007).     Owing   to   its   lack   of   existing   experience   in   these   activities,   the   CIA  

enlisted   private   contractors,  many   of  whom  were   retired  military   psychologists,   to  

develop   the   now   infamous   EITs   (Mayer,   2007).     Earlier   in   this   section,   I   argued  

contractors   should   not   be   involved   in   most   HUMINT   functions;   this   case   forms   a  

potential   exception.     Without   knowing   the   full   details,   it   is   difficult   to   assess   the  

validity   of   the   CIA’s   claim   of   lacking   interrogation   expertise.     If   any   organization   –  

public   or   private   –   has   at   its   disposal   the   tools   for   developing   interrogation  

techniques,  one  would   think   it   should  be   the  CIA.    Even  so,   this  sentiment  does  not  

exclude   the   possibility   that   a   private   entity   might   genuinely   be   able   to   furnish   a  

particular   HUMINT   skill   better   than   the   IC.     Other   related   gray   areas   are   mission  

planning   and   tactical   intelligence   –   for   example,   Lockheed   Martin   contractors  

assisting  with  drone  strikes  (Krishnan,  2011:  202).    These  functions  are  indirectly  but  

still  closely  linked  to  the  use  of  lethal  force.  

 

Intelligence   analysis   is   a   final   gray   area   for   two   primary   reasons.     First,   as  

previously   discussed,   a   single   piece   of   information   can   be   construed   by   way   of  

analysis   to   be   read   multiple   ways.     As   profit-­‐driven   actors,   incentive   exists   for  

contracted   intelligence   analysts   to   present   information   that   fashions   need   for   their  

continued   services.     Second,   many   contracted   intelligence   analysts   are   former  

government  analysts  doing  almost  identical  work  as  before,  meaning  the  government  

is   essentially  paying  double   the   cost   for   a   service   it   can   supply   in-­‐house   (Shorrock,  

2008:   125).     However,   there   are   some   justifications   for   using   outside   analysts,   the  

best   of  which   is   the   possibility   of   gaining   fresh   perspective   in   an   otherwise   closed  

bureaucracy   subject   to   grooved   thinking.     This   justification   naturally   assumes   the  

analyst  really  is  an  outsider,  and  not  simply  a  contract  rehire.    More  generally,  and  in  

Page 52: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

51  

comparison   to   gray   areas   in   HUMINT,  most   analysis  work   is   relatively   benign   and  

provides  few  opportunities  for  serious  harm,  except  cost  overruns  potentially.  

 

***  

       

This  concludes  the  paper’s  exploration  of  intelligence  contracting.    While  intelligence  

contracting   does   present   some   significant   troubling   issues,   a   great   deal   of   it   has  

emerged   because   of   legitimate   practical   necessity.     This   section   has   tried   to  

demonstrate   it   may   be   possible   to   outsource   certain   intelligence   functions   in   a  

qualified,   responsible   manner.     Short   of   this   standard,   however,   there   are   simply  

some  demands  for  expertise  in  the  IC  that  warrant  the  risks  of  private  provision.      

                                                 

Page 53: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

52  

   

VIII.  CONCLUSION        In   this  paper,   I  have  attempted   to  capture   the  motivations,  mechanisms,  and  messy  

problems  at  work  in  private  contractor  involvement  in  intelligence,  as  well  as  provide  

some  normative  judgment  on  the  topic.    The  recommendations  I  offer  in  Part  VII  on  

what   is   and   is   not   appropriate   for   contracting   are   informed   by   the   particular  

demands  of  the  IC  for  certain  expertise  as  well  as  the  preceding  content  of  the  paper.    

Understanding  how  government  should  work  and  how  it  does  work   in  actuality,   the  

advantages  and  disadvantages  of  private  provision,  how  the   IC   is  structured  and   its  

internal  politics   function,  and  finally,  what  role   intelligence  plays   in  government:  all  

of   these   are   vital   to   having   a   balanced   understanding   of   intelligence   contracting.    

Given  its  extent  and  the  structural  need  for  certain  private  expertise,  it  would  appear  

intelligence  contracting  –  in  some  form  or  another  –  is  here  to  stay.  

 

I   conclude   on   one   final   point.     A   recurring   theme   in   this   paper   has   been  

characteristics   inherent   to   intelligence,   such   as  minimal   oversight,   secrecy,   and   the  

need   to   keep   pace  with   current   technology.     Discussion   has   focused   solely   on   how  

these   factors   interact   with   private   contracting.     Questions   have   been   posed   like  

whether  contractors  should  assist  intelligence  agencies  in  conducting  mass  electronic  

surveillance.     However,   what   has   not   been   asked   is   whether   intelligence   agencies  

should   themselves   be   engaged   in   mass   electronic   surveillance.     Many   of   the   most  

vexing   issues   associated   with   intelligence   contracting   have   more   to   do   with   the  

practice  of  intelligence  generally,  than  with  contracting  itself.    These  issues  are  legally  

and  ethically  challenging,  and  deserve  critical  examination  in  their  own  right.  

Page 54: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

53  

         

APPENDIX:  GLOSSARY  OF  ACRONYMS        

BPA       –  blanket  purchase  agreement  CHCO       –  Chief  Human  Capital  Officer/Office  (ODNI)  CIA       –  Central  Intelligence  Agency  DCI       –  Director  of  Central  Intelligence  DNI       –  Director  of  National  Intelligence    EIT       –  enhanced  interrogation  technique  FAIR  Act     –  Federal  Activities  Inventory  Reform  Act  (1998)  FAR       –  Federal  Acquisition  Regulation  FBI       –  Federal  Bureau  of  Investigation  GEOINT     –  geospatial  intelligence  HUMINT     –  human  intelligence  IC       –  Intelligence  Community  ICD  612     –  Intelligence  Community  Directive  612  IRTPA       –  Intelligence  Reform  and  Terrorism  Prevention  Act  (2004)  IT       –  information  technology  MIP       –  Military  Intelligence  Program  NGA       –  National  Geospatial-­‐Intelligence  Agency  NIP       –  National  Intelligence  Program  NIPF       –  National  Intelligence  Priorities  Framework  NRO       –  National  Reconnaissance  Office  NSA       –  National  Security  Agency  NSS      –  National  Security  Strategy  ODNI       –  Office  of  the  Director  of  National  Intelligence  PMSC       –  private  military  and  security  company  PTG       –  Premier  Technology  Group  SAIC       –  Science  Application  International  Corporation  SIGINT     –  signals  intelligence  

       

Page 55: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

54  

   

REFERENCES        

“Abu  Ghraib  lawsuits  against  CACI,  Titan  (now  L-­‐3).”  Business  and  Human  Rights  Resource  Center.  Web.  24  April  2015.  http://business-­‐humanrights.org/en/abu-­‐ghraib-­‐lawsuits-­‐against-­‐caci-­‐titan-­‐now-­‐l-­‐3-­‐0  

 Che,  Yeon-­‐Che.  “Revolving  doors  and  the  optimal  tolerance  for  agency  collusion.”  RAND  Journal  of  

Economics  26.3  (1995).    Chesterman,  Simon.  “‘We  Can’t  Spy…If  We  Can’t  Buy!’:  The  Privatization  of  Intelligence  and  the  Limits  

of  Outsourcing  Inherently  Governmental  Functions.”  European  Journal  of  International  Law  19.5  (2008).  

 Chesterman,  Simon  and  Chia  Lehnardt,  editors.  From  Mercenaries  to  Market:  The  Rise  and  Regulation  of  

Private  Military  Companies.  Oxford  Scholarship  Online,  January  2009.  E-­‐book.  http://www.oxfordscholarship.com/view/10.1093/acprof:oso/9780199228485.001.0001/acprof-­‐9780199228485    Avant,  Deborah.  “The  emerging  market  for  private  military  services  and  the  problem  of  

regulation  (chapter  10).”  Chesterman  and  Lednardt  (2009)    Cockanye,  James.  “Make  or  buy?  Principal-­‐agent  theory  and  the  regulation  of  private  military  

companies  (chapter  11).”  Chesterman  and  Lednardt  (2009).    Dickinson,  Laura  A.  “Contract  as  a  tool  for  regulating  private  military  companies  (chapter  12).”  

Chesterman  and  Lednardt  (2009).    “Civilian  Intelligence  Community:  Additional  Actions  Needed  to  Improve  Reporting  on  and  Planning  

for  the  Use  of  Contract  Personnel.”  US  Government  Accountability  Office  (GAO)  (Report  to  Congressional  Requesters).  January  2014.  Web.  24  April  2015.  http://gao.gov/assets/670/660486.pdf  

 Crampton,  Jeremy,  Susan  Roberts,  and  Ate  Poorthuis.  “The  New  Political  Economy  of  Geographical  

Intelligence.”  Annals  of  the  Association  of  American  Geographers  104.1  (2014).    “Federal  Activities  Inventory  Reform  (‘FAIR’)  Act  of  1998.”  31  USC  §  501  (2000).      Freeman,  Jody.  “Extending  Public  Law  Norms  Through  Privatization.”  Harvard  Law  Review  116.5  

(2003).    Gorman,  Siobhan.  “Second-­‐ranking  NSA  official  forced  out  of  job  by  director.”  The  Baltimore  Sun.  31  

May  2006.  Web.  24  April  2015.  http://articles.baltimoresun.com/2006-­‐05-­‐31/news/0605310010_1_alexander-­‐black-­‐spy-­‐agency  

 Halchin,  L.  Elaine  and  Frederick  M.  Kaiser.  “Congressional  Oversight  of  Intelligence:  Current  Structures  

and  Alternatives.’”  Congressional  Research  Service  (report).  14  May  2012.    

Page 56: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

55  

Halperin,  Morton,  H.  and  Priscilla  A.  Clapp.  Bureaucratic  Politics  and  Foreign  Policy.  2nd  ed.  Washington,  D.C.:  Brookings  Institution  Press,  2006.  

 Hansen,  Morten.  “Intelligence  Contracting:  On  the  Motivations,  Interest,  and  Capabilities  of  Core  

Personnel  Contractors  in  the  US  Intelligence  Community.”  Intelligence  and  National  Security  29.1  (2014).  

 Harman,  Jane.  “Disrupting  the  Intelligence  Community:  America’s  Spy  Agencies  Need  an  Upgrade.”  

Foreign  Affairs  94.2  (2015).    Hart,  Oliver,  Andrei  Shleifer,  and  Robert  W.  Vishny.  “The  Proper  Scope  of  Government:  Theory  and  an  

Application  to  Prisons.”  The  Quarterly  Journal  of  Economics  112.4  (1997).    Hersh,  Seymour  M.  “Torture  at  Abu  Ghraib.”  The  New  Yorker.  10  May  2014.  Web.  24  April  2015.  

http://www.newyorker.com/magazine/2004/05/10/torture-­‐at-­‐abu-­‐ghraib      Hill,  Larry.  “Who  Governs  the  American  Administrative  State?  A  Bureaucratic-­‐Centered  Image  of  

Governance.”  Journal  of  Public  Administration  Research  and  Theory  1.3  (1991).    Huntington,  Samuel.  The  Soldier  and  the  State.  London:  Belknap  Press,  1985.    “Inherently  Governmental  Functions.”  48  C.F.R.  §§  7.500–7.503  (2006).    “Intelligence  Community  Directive  612:  Intelligence  Community  Core  Contractor  Personnel.”  Office  of  

the  Director  of  National  Intelligence  (ODNI).  30  October  2009.  Web.  24  April  2015.  http://fas.org/irp/dni/icd/icd-­‐612.pdf    

 Isenberg,  David.  “Private  Military  Contractors  and  US  Grand  Strategy.”  International  Peace  Research  

Institute,  Oslo  (PRIO)  (report).    January  2009.    Kennedy,  Patrick,  F.  “Memorandum  M-­‐06-­‐6019:  IC  Contractor  Inventory.”  Office  of  the  Director  of  

National  Intelligence  (ODNI).  12  April  2006.    Krishnan,  Armin.  “The  Future  of  US  Intelligence  Outsourcing.”  Brown  Journal  of  World  Affairs  18.1  

(2011).    Kruck,  Andreas.  “Theorizing  the  use  of  private  military  and  security  companies:  a  synthetic  

perspective.”  Journal  of  International  Relations  and  Development  17  (2014).    Laffont,  Jean-­‐Jacques.  “Analysis  of  Hidden  Gaming  in  a  Three-­‐Level  Hierarchy.”  Journal  of  Law,  

Economics,  and  Organization  6.2  (1990).      Laffont,  Jean-­‐Jacques  and  Jean  Tirole.  “Privatization  and  Incentives.”  Journal  of  Law,  Economics,  and  

Organization  7  (special  issue)  (1991).    Levine,  Michael  E.  and  Jennifer  L.  Forrence.  “Regulatory  Capture,  Public  Interest,  and  the  Public  

Agenda:  Toward  a  Synthesis.”  Journal  of  Law,  Economics,  and  Organization  6  (special  issue)  (1990).  

 Mayer,  Jane.  “The  Black  Sites”  The  New  Yorker.  13  August  2007.  Web.  24  April  2015.  

http://www.newyorker.com/magazine/2007/08/13/the-­‐black-­‐sites      Mayer,  Jane.  “The  Secret  Sharer.”  The  New  Yorker.  23  May  2011.  Web.  24  April  2015.  

http://www.newyorker.com/magazine/2011/05/23/the-­‐secret-­‐sharer?currentPage=all  

Page 57: IR4099 - Outsourcing of US Intelligence dissertation v2

 

 

56  

 McConnell,  Mike.  “Overhauling  Intelligence.”  Foreign  Affairs  86.4  (2007).  Web.  24  April  2015.  

http://www.foreignaffairs.com/articles/62643/mike-­‐mcconnell/overhauling-­‐intelligence    Meghani,  Zahra  and  Jennifer  Kuzma.  “The  ‘Revolving  Door’  between  Regulatory  Agencies  and  Industry:  

A  Problem  That  Requires  Reconceptualizing  Objectivity.”  Journal  of  Agricultural  and  Environmental  Ethics  24  (2011).  

 Mundheim,  Robert.  “Conflict  of  Interest  and  the  Former  Government  Employee:  Rethinking  the  

Revolving  Door.”  Creighton  Law  Review  14  (1980/81).    Nathan,  Laurie.  “Lighting  up  the  Intelligence  Community:  A  Democratic  Approach  to  Intelligence  

Secrecy  and  Openness.”  Global  Facilitation  Network  for  Security  Sector  Reform  (report).  April  2009.  Web.  24  April  2015.  http://epapers.bham.ac.uk/1528/1/Nathan_%2D2009%2D_LightingupIntelligence.pdf  

 O’Connor,  Thomas.  “Theories  of  Bureaucracy.”  Megalinks  in  Criminal  Justice.  14  October  2013.  Web.  24  

April  2015.  http://www.drtomoconnor.com/4090/4090lect02.htm      “Results  of  the  Fiscal  Year  2007  US  Intelligence  Community  Inventory  of  Core  Contractor  Personnel.”  

Office  of  the  Director  of  National  Intelligence  (ODNI)  (conference  call).  27  August  2008.  Web  24  April  2015.  http://fas.org/irp/news/2008/08/odni082708.html    

 “SAIC  Team  Wins  National  Security  Agency  TRAILBLAZER  Contract.”  Business  Wire.  21  October  2002.  

Web.  24  April  2015.  http://www.thefreelibrary.com/SAIC+Team+Wins+National+Security+Agency+TRAILBLAZER+Contract.-­‐a093081931  

 Shorrock,  Tim.  “The  Corporate  Takeover  of  US  Intelligence.”  Salon.  1  June  2007.  Web.  24  April  2015.  

http://www.salon.com/2007/06/01/intel_contractors/    Shorrock,  Tim.  Spies  for  Hire:  The  Secret  World  of  Intelligence  Outsourcing.  New  York:  Simon  &  

Schuster,  Inc.,  2008.    Singer,  Peter  W.  Corporate  Warriors:  The  Rise  of  the  Privatized  Military  Industry.  London:  Cornell  

University  Press,  2008.    Svara,  James  H.  "Complementarity  of  Politics  and  Administration  as  a  Legitimate  Alternative  to  the  

Dichotomy  Model."  Administration  &  Society  30.6  (1999).    Trebilcock,  Michael  J.  and  Edward  M.  Iacobucci.  “Privatization  and  Accountability.”  Harvard  Law  

Review  116.5  (2003).    “The  US  Intelligence  Community’s  Five  Year  Human  Strategic  Human  Capital  Plan:  An  Annex  to  the  US  

National  Intelligence  Strategy.”  Office  of  the  Director  of  National  Intelligence  (ODNI)  (report).  22  June  2006.  Web.  24  April  2015.  http://purl.access.gpo.gov/GPO/LPS75660  

 Weber,  Max.  The  Theory  of  Social  and  Economic  Organization.  Translated,  A.M.  Henderson  and  Talcott  

Parsons.  Mansfield  Center,  Connecticut:  Martino  Publishing,  2012.    “Workforce  Planning  in  the  Intelligence  Community.”  RAND  National  Defense  Research  Institute  

(report).  2013.  Web.  24  April  2015.  http://www.rand.org/pubs/research_reports/RR114.html