In 1947, two years after the end of the Second World War, the United States passed the National Security Act. The stated purpose was to reorganize the military and intelligence apparatus for the emerging Cold War. The actual effect was to create a parallel government — one that operates in secret, with its own budget, its own foreign policy, its own rules, and functionally zero meaningful oversight by the elected officials who are supposed to control it.
This was not a minor administrative reorganization. It was the birth of the national security state — the single most consequential structural transformation in American governance since the Constitution itself.
The National Security Act of 1947 created three institutions that would reshape the world:
The National Security Council (NSC) — a body that centralizes foreign policy decision-making in the executive branch, bypassing the deliberative processes of Congress. The NSC operates in classified settings, produces classified directives, and makes decisions that commit the nation to covert actions, military operations, and strategic postures that the public may never learn about.
The Central Intelligence Agency (CIA) — the first peacetime intelligence agency in American history. Initially conceived as an information-gathering and analysis organization, the CIA almost immediately expanded into covert operations: regime change, assassination, propaganda, paramilitary warfare, drug trafficking, arms dealing, and the systematic manipulation of foreign governments. Within a decade of its creation, the CIA had overthrown democratically elected governments in Iran (1953) and Guatemala (1954), launched covert wars across three continents, and established a global network of proprietary companies, front organizations, and intelligence relationships that constituted a shadow foreign policy apparatus answerable to no electorate.
The Department of Defense — the consolidation of the War Department and Navy Department into a single structure with unified command, eventually growing into the largest employer on Earth, with an annual budget exceeding $800 billion, over 750 military bases in approximately 80 countries, and a procurement apparatus so vast that it constitutes its own economy.
In the decades since 1947, the national security state has expanded to include 18 intelligence agencies, an unknown number of special access programs, a classification system that conceals more information each year, and a network of private contractors so deeply embedded in intelligence operations that the boundary between government and corporation has effectively dissolved.
The defining feature of intelligence agencies is operational independence from democratic accountability.
The CIA's budget is classified. It has never been comprehensively audited by any public body. Its operations are authorized through presidential findings that are themselves classified, briefed to a handful of congressional leaders under conditions that prohibit them from taking notes, consulting staff, or publicly discussing what they were told. The Church Committee hearings of 1975 revealed that the CIA had conducted operations — including assassination programs, domestic surveillance, and human experimentation — that were unknown not only to Congress but to successive presidents.
The National Security Agency collects signals intelligence on a scale that defies comprehension — monitoring, recording, and storing communications data from billions of devices worldwide. Its operations were largely unknown to the public until 2013, when a single contractor, Edward Snowden, documented what the agency had built: a surveillance apparatus capable of capturing essentially every phone call, email, text message, and internet transaction on the planet.
These agencies do not merely serve the elected government. They constitute a separate center of power — one with its own institutional interests, its own operational momentum, its own understanding of what "national security" requires, and its own willingness to act on that understanding regardless of what the visible government may wish.
The most effective way to dismiss concerns about intelligence agency overreach is to call them conspiracy theories. The most effective rebuttal is to examine the programs that were once dismissed as conspiracy theories and are now admitted historical fact.
Operation Mockingbird. Beginning in the early 1950s, the CIA systematically recruited journalists, editors, and media executives at major American news organizations — including the Washington Post, the New York Times, CBS, Time, and Newsweek — to publish CIA-approved content, suppress unfavorable stories, and serve as conduits for propaganda. The program was revealed during the Church Committee hearings. CIA Director William Colby testified that the agency had relationships with journalists at "every major wire service, newspaper, news weekly, and television network." The public learned that their "free press" had been, in significant part, an instrument of intelligence agency narrative control.
MKUltra. From 1953 to at least 1973, the CIA conducted a program of mind control experiments on unwitting human subjects. The experiments included the administration of LSD, barbiturates, and other psychoactive substances to individuals who had not consented and did not know they were being experimented upon. Subjects included prisoners, mental patients, hospital patients, and CIA employees. Some experiments involved sensory deprivation, isolation, verbal abuse, and electroshock. The program was so sensitive that CIA Director Richard Helms ordered the destruction of all MKUltra files in 1973. A cache of financial records survived only because they had been misfiled. Without that bureaucratic accident, the program might have remained permanently concealed.
COINTELPRO. From 1956 to 1971, the FBI conducted a systematic campaign to "expose, disrupt, misdirect, discredit, or otherwise neutralize" civil rights organizations, antiwar movements, Black liberation groups, the American Indian Movement, women's rights organizations, and any domestic political movement that the Bureau deemed subversive. Tactics included infiltration, surveillance, psychological warfare, fabrication of evidence, harassment of families, incitement of violence between groups, and coordination with local law enforcement to harass and arrest targeted individuals. Martin Luther King Jr. was subjected to extensive surveillance, and the FBI sent him an anonymous letter suggesting he commit suicide. This was not the work of rogue agents. It was official FBI policy, authorized at the highest levels, conducted for over fifteen years, and concealed from every form of public oversight.
Operation Northwoods. In 1962, the Joint Chiefs of Staff — the highest-ranking military officers in the United States — presented to Secretary of Defense Robert McNamara a detailed plan for false flag operations against American civilians. The plan proposed bombings in American cities, the sinking of American ships, the shooting down of American aircraft, and a campaign of domestic terror — all to be blamed on Cuba as a pretext for military invasion. The plan was rejected by President Kennedy. But the fact that it was seriously proposed by the most senior military leaders in the country reveals not an aberration but an institutional mentality — one in which the lives of citizens are acceptable collateral in the pursuit of strategic objectives.
Each of these programs was, during its operation, dismissed as paranoid fantasy by anyone who suggested it existed.
Each is now documented, admitted, and part of the historical record.
The question is not whether intelligence agencies conduct operations that violate the rights, safety, and sovereignty of the populations they claim to protect. The question is what they are doing now that will be admitted in thirty years.
The Snowden revelations of 2013 confirmed what privacy advocates had warned about for years: the NSA, in cooperation with allied intelligence agencies and major technology companies, had built a surveillance apparatus of unprecedented scope.
PRISM — a program granting the NSA direct access to the servers of major technology companies including Google, Apple, Facebook, Microsoft, and Yahoo, allowing the collection of emails, chat logs, stored data, voice traffic, file transfers, and video conferencing.
XKeyscore — a system described in NSA training materials as allowing analysts to search "nearly everything a typical user does on the internet," including emails, social media activity, browsing history, and real-time online activity, using nothing more than an email address or IP address as a search term.
Upstream collection — the direct tapping of undersea fiber optic cables carrying the bulk of the world's internet traffic, allowing the NSA to collect and store vast quantities of communications data in transit.
The Five Eyes alliance — the intelligence-sharing arrangement among the United States, United Kingdom, Canada, Australia, and New Zealand — operates as a mechanism to circumvent domestic surveillance laws. Each nation is restricted from certain types of surveillance on its own citizens. The solution: each nation conducts surveillance on the other nations' citizens and shares the results. The legal prohibition is technically honored. The practical effect is nullified.
The result is a surveillance architecture in which every digital communication — every phone call, every email, every text message, every internet search, every social media post, every financial transaction — is potentially captured, stored, and searchable by intelligence agencies operating with minimal judicial oversight and effectively no public accountability.
The United States government classifies over 50 million documents per year. The classification system — Top Secret, Secret, Confidential, and the even more restricted Special Access Programs and Sensitive Compartmented Information — was designed to protect legitimate national security secrets.
In practice, it has become the primary mechanism by which the government conceals its activities from the public it serves.
Former officials across administrations have acknowledged that the vast majority of classified information is not classified to protect national security. It is classified to protect officials and agencies from embarrassment, legal liability, and public accountability. Classification prevents the public from knowing what is done in their name, with their money, and ostensibly on their behalf. It prevents journalists from reporting, courts from adjudicating, and legislators from overseeing.
When everything is classified, nothing can be challenged.
When nothing can be challenged, there is no accountability.
When there is no accountability, there is no democracy — only the performance of one.
The most dangerous threat to liberty is the one that operates in the name of protecting it.
Forward to 3.4 How Laws Are Actually Made — And For Whom Back to 3.2 Visible and Invisible Power Structures Back to table of contents Most People Have No Idea What Is Coming