The Revolving Door: Intelligence Officers to Surveillance Executives

The same people build surveillance for the state, then sell it in the private sector, then return to government with the same contacts and access. This is not a metaphor. It is a repeat pattern with named people moving between agencies, contractors, and surveillance firms.

Public money builds the tools. Private firms deploy them. The regulators often come from the same firms. The conflict is built in.

10,000+
Booz Allen TS/SCI staff
Booz Allen Hamilton - cleared employees working in US intelligence community contracts
$1M/mo
Keith Alexander advisory rate
Reported monthly fee sought from Wall Street banks after leaving NSA, 2014
26 of 45
Agencies contracted to Booz Allen
US intelligence agencies with Booz Allen Hamilton contracts
9+
GCHQ → private sector roles (Lobban)
Sir Iain Lobban held commissions at nine private entities within two years of leaving GCHQ
Security clearances work like assets. A former NSA director with an active TS/SCI clearance is valuable to a contractor because that clearance opens doors to classified procurement and to people inside the agency they used to run.

The US Revolving Door - Named Individuals

These officials held senior US intelligence or military jobs, then moved into private surveillance and defense work. These roles are public record.

FIG. 2Senior US intelligence officials - documented transitions to private sector
PersonGovernment RoleDeparturePrivate Sector Destination
Gen. Keith AlexanderNSA Director, Chief of CSS2014Founded IronNet Cybersecurity; sought $1M/month advisory from Wall Street banks
Gen. Michael HaydenNSA Director (1999–2005), CIA Director (2006–2009)2009Principal, Chertoff Group; board of directors, Motorola Solutions
James ClapperDirector of National Intelligence (2010–2017)2017Senior adviser, StellarPeak (intelligence contractor); earlier: Booz Allen Hamilton, SRA International, BAE Systems (Detica)
John BrennanCIA Director (2013–2017)2017Senior adviser, McKinsey & Company; senior intelligence analyst, NBC News / MSNBC
Adm. Mike RogersNSA Director, USCYBERCOM Commander (2014–2018)2018Operating partner, Team8 (Unit 8200-linked Israeli VC firm); boards and advisory roles across defense tech sector
Chris InglisNSA Deputy Director → National Cyber Director (Biden admin, 2021–2023)2014 / 2023Managing director, Paladin Capital Group (7 years); returned as National Cyber Director 2021; returned to Paladin as strategic adviser 2023
Robert CardilloDirector, National Geospatial-Intelligence Agency (2014–2019)2019Founded The Cardillo Group LLC; chairman of the board and chief strategist, Planet Federal (satellite imagery, NGA/NRO contracts)

Keith Alexander and IronNet

Keith Alexander ran the NSA from 2005 to 2014. He oversaw PRISM, XKeyscore, and the bulk metadataData about data, such as who contacted whom, when, from what device, and from which location. Metadata often remains exposed even when content is encrypted.Glossary → programs Edward Snowden exposed in 2013. Three months after retiring, he founded IronNet Cybersecurity and pitched financial firms on advisory work reportedly worth up to $1 million a month.

Representative Alan Grayson asked the NSA inspector general to review the deal, arguing that Alexander appeared to be selling access and knowledge built with taxpayer-funded classified programs. Alexander denied disclosing classified material, but not the fee structure. The NSA reviewed the matter and found no violation.

IronNet collapsed in 2023. Its customers included banks and critical infrastructure firms paying for access to Alexander's institutional knowledge. He left the board in February 2024.

Michael Hayden and the Chertoff Group

Michael Hayden led the NSA from 1999 to 2005, when the agency built the warrantless wiretapping program later known as STELLAR WIND. He then led the CIA from 2006 to 2009. After government, he joined the Chertoff Group, a security consulting firm, and stayed there for more than a decade.

Hayden also sat on the board of Motorola Solutions, which makes interception and communications systems used by police around the world. During the same period, he defended NSA mass surveillance in the media while working for firms that benefited from broad surveillance powers.

Chris Inglis - The Complete Cycle

Chris Inglis shows the whole loop. He served as NSA deputy director until 2014, spent seven years at Paladin Capital Group, then returned to government in 2021 as the first National Cyber Director. He served until February 2023, then went back to Paladin as a strategic adviser.

At each step, Inglis carried the same relationships, knowledge, and access forward. His time in private equity put him close to firms chasing government contracts. His time in government gave him power over the same contractor world he had just left, and would later rejoin.

Booz Allen Hamilton - The Structural Version

The personal version is easy to see. The structural version is Booz Allen Hamilton.

Booz Allen holds contracts with 26 of the 45 US agencies involved in intelligence work. It employs more than 10,000 people with Top Secret/Sensitive Compartmented Information clearances. It has been called a "shadow NSA" because its staff work inside agency spaces, on the same classified systems, often right beside government employees.

Edward Snowden was a Booz Allen contractor at the NSA facility in Hawaii when he copied and released the PRISM documents in 2013. His clearance and system access existed because Booz Allen held an NSA contract. The biggest intelligence leak in modern US history came from a contractor, not a direct government employee. That says a lot about how thin the line has become.

Booz Allen's leadership pipeline runs both ways. Former officials join with clearances that make them useful on day one. Booz Allen executives also move into government. The firm works as both a private company and a standing staffing layer for the intelligence system.

Mike Rogers and Team8

Mike Rogers led the NSA and US Cyber Command from 2014 to 2018. After retiring, he became an operating partner at Team8, the Tel Aviv venture firm founded by Unit 8200 veterans. Team8 builds cybersecurity and data analytics companies for the same US government and corporate markets Rogers knew well.

That Team8 move matters. Rogers went from running US signals intelligence to advising a fund built by alumni of Israeli signals intelligence. Products from that same Israeli intelligence world, including Pegasus, have been used against journalists, dissidents, and allied states.

The UK Revolving Door

The UK runs the same pattern through different institutions. The source agencies are GCHQ, MI5, MI6, and the NCSC. The landing spots include BAE Systems Applied Intelligence, Hakluyt, Control Risks, and a rotating set of cyber consultancies.

Sir Iain Lobban

Sir Iain Lobban ran GCHQ from 2008 to 2014. Within two years of leaving, he held advisory roles at nine private firms, including Palo Alto Networks, Wynyard Group, Glasswall Solutions, and Marsh. He also joined the advisory board of Hakluyt & Company, a private intelligence firm staffed heavily by former UK intelligence officers.

The UK's Advisory Committee on Business Appointments reviewed Lobban's moves and approved them. ACOBA has no real enforcement power. It cannot block jobs. It can only suggest delays or conditions. It approved all nine.

BAE Systems Applied Intelligence

BAE Systems' intelligence division, once called BAE Systems Detica, sells interception and data analytics systems to governments around the world, including some with long records of abuse. Former GCHQ and MI5 staff fill many of its ranks. Methods developed inside GCHQ move into private products through the people who built them.

Its government clients include the same UK agencies many of its senior staff once served. Those contracts run through personal relationships between current officials and former colleagues now selling services back to them.

Control Risks

Control Risks is a private intelligence and risk firm founded by former SAS and intelligence officers. It sells "political risk" and "corporate intelligence" to multinationals. In practice that can mean tracking labor organizing, mapping activist networks, and gathering information on civil society campaigns. Many staff come from MI5, MI6, GCHQ, and military intelligence. The methods are intelligence methods, turned on people using legal rights.

Australia

In Australia, the same pattern runs through ASD, ASIO, and Defence Intelligence. The main private recipients are BAE Systems Australia, L3 Harris, Thales Australia, CEA Technologies, and a growing set of cyber consultancies tied to the intelligence world.

Palantir's Australian government team has included former ASIO and ASD staff while the firm holds contracts with the AFP, Home Affairs, and defense agencies. The pattern matches the US and UK. Expertise and relationships gained inside the state get sold back to the same state.

AUKUS has pushed that convergence faster. Defense tech contracts now move through the same contractor world staffed by former intelligence officers from all three countries. The revolving door now works across allied states at once.

The Structural Problem

Three things turn this from an ethics problem into a structural one:

Security clearances as private assets. A TS/SCI clearance does not vanish when someone retires. It follows them into private work, where it gives an employer access to procurement channels, classified briefings, and cleared officials. Taxpayers paid for that access. A private firm then turns it into profit.

Knowledge transfer without disclosure. The methods, tools, and operational habits developed inside intelligence agencies are not published when their architects leave. They leave with them. Private surveillance firms build products on those methods without saying where they came from. Public R&D becomes private property.

Regulatory capture at scale. When watchdogs come from the industry and expect to return to it, rules start to reflect industry interests. In the US, even oversight bodies sit close to the contractors they watch. In the UK, ACOBA cannot block appointments. Australia's version is weak too. The people writing the rules are often the people who built the system and still profit from it.

The parallel to the US military's Section 1033 program is plain. Military hardware flows to local police. Intelligence methods flow to corporate surveillance through the people who built them in classified settings.

What This Means for Privacy

Technology built for national security does not stay there. It turns commercial. Facial recognition built for military targeting shows up in stores. IMSI catchers used in conflict zones end up with local police. Data platforms built to map militant networks get sold to banks, then adapted again for consumer profiling.

The same people carry the capability over. Alexander helped build the NSA's collection infrastructure, then sold advisory services tied to that knowledge to banks.

Independent technical oversight barely exists. The people who understand the systems either work in the industry now or expect to later. Legislative staff lack the classified knowledge needed to write precise limits. The people who do have that knowledge have reasons not to.

The revolving door does not give you smarter government. It gives you captured government, where agencies charged with limiting surveillance are staffed by people whose futures depend on keeping limits weak.

Follow the Money

This is not symbolic. It creates clear financial rewards for the people who pass through it and for the firms that hire them.

Frequently Asked Questions

What is the revolving door between government intelligence and the private surveillance industry?

The revolving door is the pattern of senior intelligence and military officials moving from agencies like the NSA, CIA, GCHQ, and DIA into board, advisory, and executive roles at surveillance firms and defense contractors. They bring clearances, knowledge of classified systems, and direct relationships with the agencies they just left. Many later return to government, which weakens any claim of independent oversight.

What did Keith Alexander do after leaving the NSA?

Keith Alexander ran the NSA from 2005 to 2014. Three months after leaving, he founded IronNet Cybersecurity. He reportedly sought $1 million a month from Wall Street banks for advisory work built on his government contacts and knowledge. Representative Alan Grayson called the arrangement potentially illegal. IronNet later collapsed, and Alexander left in February 2024.

What is Booz Allen Hamilton's relationship to the NSA?

Booz Allen Hamilton is the biggest contractor in the US intelligence world. It holds contracts with 26 of 45 intelligence agencies and employs more than 10,000 people with Top Secret/SCI clearances. Critics have called it a "shadow NSA" because contractors do work once kept inside the agency itself. Edward Snowden was a Booz Allen contractor with NSA access when he disclosed the PRISM program in 2013.

How does the revolving door affect oversight of the surveillance industry?

Regulatory capture happens when the people policing an industry came from that industry, still have ties to it, and may return to it. When intelligence agencies hire former contractors and contractors hire former agency chiefs, oversight stops being independent. The same people share clearances, contacts, and financial interests. Rules that would limit surveillance contracts can also cut into their future income.