The National Security State — The Dual State
The theory that a hidden national security hierarchy operates alongside — and sometimes overrides — the visible constitutional government, creating what analysts have called a "dual state."
| Field | Details |
|---|---|
| Type | Theory / Government Structure |
| First Articulated By | Ernst Fraenkel (dual state concept, 1941); various analysts applied it to the US national security apparatus |
| Active Period | 1947 – present (from the National Security Act onward) |
| Key Claim | The United States operates two parallel governance systems: a visible constitutional state subject to democratic accountability, and a hidden national security state that operates through classification, secrecy, and emergency powers — largely beyond the reach of voters, Congress, or the courts. |
| Evidence Strength | WELL-DOCUMENTED |
Overview
The national security state theory holds that since the passage of the National Security Act of 1947 — which created the CIA, the National Security Council, and the modern Department of Defense — a parallel governance structure has grown alongside the constitutional government. This hidden hierarchy operates through:
- Classification — Millions of documents classified each year, keeping information from the public, the press, and even most members of Congress
- Secret courts — The FISA court, which operates entirely in secret and has historically approved the vast majority of surveillance requests
- Emergency powers — Continuity of Government (COG) plans and emergency authorities that can be activated without public knowledge or congressional approval
- National Security Letters — Administrative subpoenas that compel disclosure of information while prohibiting the recipient from revealing the request's existence
- Covert operations — Activities conducted without public knowledge and sometimes without full congressional oversight
The result, critics argue, is a government that presents a democratic face to the public while conducting significant portions of its most consequential activities — surveillance, covert warfare, regime change, and domestic monitoring — entirely in secret.
Historical Foundation
Ernst Fraenkel and the "Dual State"
The concept of a dual state was first articulated by German political scientist Ernst Fraenkel in his 1941 book "The Dual State," which analyzed Nazi Germany. Fraenkel identified two co-existing states:
- The normative state — The visible legal order with courts, laws, and rights
- The prerogative state — A parallel authority that could override legal norms whenever it chose, operating through emergency powers and political police
While Fraenkel's analysis was specific to Nazi Germany, subsequent analysts have applied the dual state concept to the American national security apparatus, arguing that a similar (though less extreme) bifurcation exists between the visible constitutional government and the hidden security state.
The 1955 Warning
As early as 1955, the Bulletin of the Atomic Scientists published analyses warning that the national security apparatus was developing characteristics of a parallel government — one that operated under rules fundamentally different from those governing the visible constitutional state.
Bob Jessop's Analysis
Political theorist Bob Jessop, in "The State: Past, Present, Future" (2015), provided a contemporary academic framework for understanding how states develop parallel governance structures. Jessop analyzed how the "normal" state and the "exceptional" or "emergency" state coexist, with the emergency apparatus always available to override normal democratic processes when elites deem it necessary.
The National Security Act of 1947
The foundational legislation for the modern national security state:
What It Created
- The Central Intelligence Agency (CIA) — America's first permanent peacetime intelligence agency, with a classified budget and covert operations capability
- The National Security Council (NSC) — A body within the executive branch that coordinates national security policy, often operating with limited congressional oversight
- The Department of Defense — Unifying the military under a single department with enormous budgetary and operational scope
- The Joint Chiefs of Staff — Formalizing military advisory and command structures
What It Enabled
The Act created the institutional infrastructure for:
- Permanent covert operations worldwide
- A classification system that could keep virtually any government activity secret
- A national security establishment with its own culture, priorities, and institutional interests separate from civilian governance
- A framework where "national security" could justify actions that would otherwise be illegal or unconstitutional
The Classification System
Scale of Secrecy
The federal classification system is one of the most powerful tools of the national security state:
- Millions of documents are classified each year at various levels (Confidential, Secret, Top Secret, and above)
- Compartmentalized programs (Special Access Programs, or SAPs) restrict information even within the classified world — a Top Secret clearance does not grant access to compartmentalized programs
- "Born classified" — Certain categories of information (particularly nuclear weapons data under the Atomic Energy Act) are classified from the moment of their creation, without any individual making a classification decision
- Over-classification — Multiple government reviews have found that a significant portion of classified information does not genuinely require protection, suggesting the classification system is used to prevent embarrassment and avoid accountability as much as to protect legitimate secrets
Classification as Power
The classification system gives the national security state a structural advantage over every other institution:
- Congress — Most members of Congress lack access to the most sensitive programs; even members of intelligence committees may be excluded from certain compartments
- The courts — Judges cannot review evidence they are not allowed to see; the "state secrets privilege" allows the government to block lawsuits by claiming that litigation would reveal classified information
- The press — Journalists who publish classified information face potential prosecution; sources face imprisonment
- The public — Citizens cannot evaluate policies they do not know exist
The FISA Court
How It Works
The Foreign Intelligence Surveillance Court (FISC), established by the Foreign Intelligence Surveillance Act of 1978, operates entirely in secret:
- Secret proceedings — No public hearings, no public docket, no public opinions (until recent reforms required some declassification)
- One-sided — Only the government presents arguments; there is no adversarial process and no defense counsel (limited amicus provisions were added after the Snowden revelations)
- Near-universal approval — The court has historically approved the vast majority of government surveillance requests, leading critics to call it a "rubber stamp"
- Broad authority — Post-9/11 amendments expanded FISA to cover bulk data collection, not just targeted surveillance of specific foreign agents
The Snowden Revelations
Edward Snowden's 2013 disclosures revealed that the FISA court had approved sweeping surveillance programs, including:
- Bulk collection of phone metadata for all calls made within the United States
- PRISM — A program allowing NSA to collect data directly from the servers of major tech companies
- Upstream collection — Tapping into fiber-optic cables carrying internet traffic
- XKeyscore — A system allowing analysts to search through vast databases of intercepted communications
These programs demonstrated that the FISA court had authorized a surveillance apparatus far more extensive than the public or most of Congress knew existed.
National Security Letters
National Security Letters (NSLs) are a distinctive tool of the national security state:
- Administrative subpoenas — Issued by the FBI without judicial approval
- Compel disclosure — Force telecommunications companies, banks, and other institutions to turn over customer records
- Gag orders — Recipients are prohibited from revealing that they received an NSL or what information was demanded
- Volume — The FBI issues thousands of NSLs annually
- No judicial review — Until legal challenges forced limited reforms, NSLs operated entirely outside the judicial system
The combination of compulsory disclosure and enforced secrecy makes NSLs a powerful example of how the national security state operates outside normal constitutional processes.
Continuity of Government (COG)
Cold War Origins
Continuity of Government planning began during the Cold War as a preparation for nuclear war:
- Purpose — Ensure the survival of the federal government in the event of a nuclear attack
- Shadow infrastructure — Secret bunkers, communication networks, and command structures built to allow governance to continue after a catastrophic attack
- Small group of insiders — Only a limited number of officials had full knowledge of COG plans
- Classified plans — The specific arrangements for post-attack governance remained highly classified
Post-Cold War Evolution
After the Cold War ended, COG planning did not cease — it evolved:
- Expanded scope — COG planning reportedly expanded from nuclear attack scenarios to other "emergencies," including terrorism and domestic unrest
- Oliver North's involvement — During the Iran-Contra investigation, it was revealed that Oliver North had been involved in COG planning that included provisions for suspending the Constitution and detaining large numbers of people
- Activation on 9/11 — COG plans were reportedly activated on September 11, 2001, marking the first known activation of these emergency procedures
- Post-9/11 authorities — Many post-9/11 security measures, including aspects of the PATRIOT Act and the creation of DHS, reportedly drew on COG planning frameworks
Peter Dale Scott has documented COG planning extensively, arguing that it represents one of the most significant and least understood components of the deep state.
Post-9/11 Expansion
The September 11 attacks triggered a massive expansion of the national security state:
New Institutions
- Department of Homeland Security (DHS) — Created in 2002, the largest government reorganization since the creation of the DoD; merged 22 agencies into a single department
- Transportation Security Administration (TSA) — Created to handle airport security, putting hundreds of millions of travelers under government screening
- Director of National Intelligence (DNI) — Created to coordinate the 17 intelligence agencies
- National Counterterrorism Center (NCTC) — A fusion center for terrorism-related intelligence
Expanded Authorities
- USA PATRIOT Act (2001) — Expanded surveillance authorities, lowered barriers between intelligence and law enforcement, broadened the definition of terrorism
- Authorization for Use of Military Force (AUMF) — Broadly interpreted to authorize military operations worldwide without specific congressional approval
- Enhanced interrogation — Euphemism for torture techniques authorized at the highest levels of government
- Extraordinary rendition — Transferring suspects to countries known to practice torture
- Warrantless wiretapping — NSA surveillance of domestic communications without FISA court approval (later retroactively legalized)
Budget Expansion
- Intelligence budgets expanded dramatically after 9/11
- The exact figures for intelligence spending remain classified, though the aggregate "black budget" has been estimated in the tens of billions annually
- The Washington Post's "Top Secret America" investigation (2010) found that 1,271 government organizations and 1,931 private companies worked on programs related to counterterrorism, homeland security, and intelligence at 10,000 locations across the United States
Evidence & Documentation
Declassified Documents
- Church Committee revelations (1975–1976) — Documented CIA domestic surveillance (Operation CHAOS), FBI domestic intelligence (COINTELPRO), and NSA warrantless wiretapping (Operation SHAMROCK)
- Iran-Contra documents — Revealed Oliver North's involvement in COG planning
- Snowden disclosures (2013) — Exposed the scale of NSA surveillance programs
- FISA court opinions — Partially declassified after Snowden, revealing the court's reasoning for approving bulk collection
Official Investigations and Reports
- Church Committee Final Report (1976) — "Intelligence Activities and the Rights of Americans"
- 9/11 Commission Report (2004) — Documented intelligence failures but also the scope of the security apparatus
- Senate Intelligence Committee Torture Report (2014) — Documented CIA enhanced interrogation program
- Washington Post, "Top Secret America" (2010) — Mapped the post-9/11 intelligence-industrial complex
Academic and Analytical Work
- Ernst Fraenkel, "The Dual State" (1941) — Foundational dual state theory
- Bob Jessop, "The State: Past, Present, Future" (2015) — Contemporary analysis of state power structures
- Peter Dale Scott, "The Road to 9/11" (2007) — Documented COG planning and its relationship to post-9/11 authorities
- Bulletin of the Atomic Scientists, 1955 — Early warning about the parallel national security state
Key Figures
| Person | Role |
|---|---|
| Ernst Fraenkel | Political scientist who developed the dual state concept |
| Edward Snowden | NSA contractor who revealed mass surveillance programs |
| Frank Church | Senator who chaired the committee investigating intelligence abuses |
| Peter Dale Scott | Researcher who documented COG planning and the deep state |
| Bob Jessop | Political theorist analyzing state power structures |
| Oliver North | Revealed to be involved in COG planning during Iran-Contra |
Criticisms & Counter-Arguments
- National security professionals argue that secrecy is necessary to protect sources, methods, and operational security — that revealing capabilities to adversaries would endanger lives and national security
- Defenders of the FISA court note that after reforms, the court has an amicus process and that its approval rate reflects the government's practice of only submitting well-prepared applications
- Some political scientists argue that the "dual state" concept overstates the independence of the security apparatus — that it ultimately remains subject to presidential direction and congressional funding
- Pragmatic arguments hold that the post-9/11 expansion, while imperfect, prevented further attacks and that the alternative — less security — would have been worse
- Reform advocates argue that the problem is not the existence of a national security apparatus but inadequate oversight, and that strengthening congressional and judicial oversight can address the democratic deficit without dismantling the security infrastructure
Related Perspectives
- Administrative State — The broader bureaucratic apparatus within which the national security state operates
- Deep Politics (Peter Dale Scott) — Scott's analysis of COG planning and the security state as deep political structures
- Lofgren's Hybrid Deep State — Lofgren identifies the national security establishment as a core deep state node
- Operation Mockingbird — CIA media manipulation as a national security state function
- Corporate Deep State — The contractor state as the private-sector extension of national security operations
- Turkish Deep State Origin — The original deep state concept, rooted in military and intelligence networks
Other Coverage Worth Reading
- Jimmy Dore: Comedian and political commentator who affirms the deep state is "the intelligence community" and "it's 100% real" —...
- CFR, Trilateral Commission, and Bilderberg Group: The thesis that a network of elite organizations -- primarily the Council on Foreign Relations (CFR), the **Trilateral...
- Philip Giraldi: Former CIA counter-terrorism specialist who identifies the deep state as a "Washington-New York axis" of national security officials...
- Mike Lofgren's Hybrid Deep State: Mike Lofgren's definition of the deep state as a "hybrid association of key elements of government and parts...
Sources
- National Security Act of 1947
- Ernst Fraenkel, "The Dual State" (Oxford University Press, 1941)
- Bob Jessop, "The State: Past, Present, Future" (Polity Press, 2015)
- Church Committee, Final Report, 1976
- Edward Snowden, NSA disclosures, 2013
- Peter Dale Scott, "The Road to 9/11" (University of California Press, 2007)
- Washington Post, "Top Secret America" investigation, 2010
- Senate Select Committee on Intelligence, "Committee Study of the CIA's Detention and Interrogation Program," 2014
- Bulletin of the Atomic Scientists, 1955
- Foreign Intelligence Surveillance Act of 1978 and subsequent amendments
This information was compiled by Claude AI research.