Professional Documents
Culture Documents
Textbook National Security and Double Government 1St Edition Michael J Glennon Ebook All Chapter PDF
Textbook National Security and Double Government 1St Edition Michael J Glennon Ebook All Chapter PDF
https://textbookfull.com/product/foreign-affairs-federalism-the-
myth-of-national-exclusivity-1st-edition-michael-j-glennon/
https://textbookfull.com/product/american-national-security-
michael-j-meese/
https://textbookfull.com/product/rethinking-risk-in-national-
security-lessons-of-the-financial-crisis-for-risk-management-1st-
edition-michael-j-mazarr-auth/
https://textbookfull.com/product/colonial-bridgehead-government-
and-society-in-alexandria-1807-1882-michael-j-reimer/
Reimagining The National Security State Liberalism On
The Brink Karen J. Greenberg
https://textbookfull.com/product/reimagining-the-national-
security-state-liberalism-on-the-brink-karen-j-greenberg/
https://textbookfull.com/product/american-government-power-and-
purpose-theodore-j-lowi/
https://textbookfull.com/product/national-water-security-
mustapha-besbes/
https://textbookfull.com/product/american-government-power-and-
purpose-fifteenth-edition-theodore-j-lowi/
https://textbookfull.com/product/neuroepidemiology-1st-edition-
michael-j-aminoff/
Cover.indd 1 8/1/2014 1:21:34 PM
Cover.indd 2 8/1/2014 1:21:34 PM
National Security and
Double Government
Praise for National Security and Double Government
“Shrewdly updating Walter Bagehot’s theory of ‘double government,’ Michael
Glennon shows how present-day Washington really works. In our faux democ-
racy, those we elect to govern serve largely ornamental purposes, while those
who actually wield power, especially in the realm of national security, do so
chiefly with an eye toward preserving their status and prerogatives. Read this
incisive and richly documented book, and you’ll understand why.”
Andrew J. Bacevich
Professor of History and International Relations
Boston University
“In this timely book Michael Glennon provides a compelling argument that
America’s national security policy is growing outside the bounds of existing gov-
ernment institutions. This is at once a constitutional challenge, but is also a case
study in how national security can change government institutions, create new
ones, and, in effect, stand-up a parallel state. This is a well-argued book of aca-
demic import and policy relevance. It is recommended reading for an informed
debate on an issue of great significance.”
Vali Nasr
Dean of Johns Hopkins University’s School of
Advanced International Studies
“Michael Glennon’s National Security and Double Government explains why U.S.
foreign policy is prone to recurring failure and resistant to genuine reform.
Instead of being responsive to citizens or subject to effective checks and balances,
U.S. national security policy is in fact conducted by a shadow government of
bureaucrats and a supporting network of think tanks, media insiders, and ambi-
tious policy wonks. Presidents may come and go, but the permanent national
security establishment inevitably defeats their efforts to chart a new course.
Gracefully written and extensively researched, this book is the most penetrating
analysis of U.S. foreign policy that I have read in years.”
Stephen M. Walt
Robert and Renee Belfer Professor of International Affairs
Harvard Kennedy School
National Security and
Double Government
xwx
Michael J. Glennon
Oxford University Press is a department of the University of Oxford. It furthers the University’s
objective of excellence in research, scholarship, and education by publishing worldwide.
Oxford New York
Auckland Cape Town Dar es Salaam Hong Kong Karachi Kuala Lumpur Madrid
Melbourne Mexico City Nairobi New Delhi Shanghai Taipei Toronto
With offices in
Argentina Austria Brazil Chile Czech Republic France Greece Guatemala
Hungary Italy Japan Poland Portugal Singapore South Korea
Switzerland Thailand Turkey Ukraine Vietnam
Oxford is a registered trademark of Oxford University Press in the UK and certain
other countries.
Published in the United States of America by
Oxford University Press
198 Madison Avenue, New York, NY 10016
1 3 5 7 9 8 6 4 2
Note to Readers
This publication is designed to provide accurate and authoritative information in regard to
the subject matter covered. It is based upon sources believed to be accurate and reliable
and is intended to be current as of the time it was written. It is sold with the understanding
that the publisher is not engaged in rendering legal, accounting, or other professional
services. If legal advice or other expert assistance is required, the services of a competent
professional person should be sought. Also, to confirm that the information has not been
affected or changed by recent developments, traditional legal research techniques should be
used, including checking primary sources where appropriate.
You may order this or any other Oxford University Press publication
by visiting the Oxford University Press website at www.oup.com
For J. Norvill Jones
In framing a government which is to be administered by
men over men, the great difficulty lies in this: you must
first enable the government to control the governed;
and in the next place oblige it to control itself.
—James Madison, THE FEDERALIST NO. 51
CON T EN T S
Acknowledgments ix
1. Introduction 1
( vii )
( viii ) Contents
Risk Assessment 83
Power Allocation and Enhancement 84
Information Flows and Network Outputs 84
The Network Model 85
The Myth of Alternative Competing Hypotheses 88
7. Conclusion 113
Notes 119
Index 235
AC K NOW L ED GMEN T S
This book would not have been possible without the generos-
ity of many people. I am grateful to Artin Afkhami, Ashley
Belyea, Mike Eckel, Ian Johnstone, Robert Hillman, William
Martel, John Perry, Luca Urech, and Fletcher political science
workshop participants for insightful comments on an earlier
draft. Beaudre Barnes, Julia Brooks, Claudio Guler, Amy Tan,
and Cecilia Vogel provided cheerful and indefatigable research
assistance. The book expands an article, “National Security
and Double Government,” that initially appeared at page 1,
volume 5 of the Harvard National Security Journal (copyright
2014 by the Presidents and Fellows of Harvard College and
Michael J. Glennon). The staff of the Journal contributed con-
siderably in form and substance as the article evolved; Heather
Alpino, Catherine Arney, Aaron Blacksberg, Michael Dziuban,
Brian Kelly, Samuel Beswick, and the rest of the Journal arti-
cle team deserve special thanks. Innumerable Trumanites and
Madisonians, past and present, with whom I have thought,
talked, and worked over the years, shaped the ideas expressed in
this book. My debt to Joanna Glennon is vast and inexpressible.
( ix )
w
C H A P T ER 1
Introduction
(1)
( 2 ) National Security and Double Government
the 1917 Espionage Act eight times during his first administra-
tion to prosecute leakers (it had been so used only three times
in the previous ninety-two years);30 demanded that businesses
turn over personal information about customers in response to
“national security letters” that require no probable cause and
cannot legally be disclosed;31 continued broad National Security
Agency (NSA) homeland surveillance;32 seized two months of
phone records of reporters and editors of the Associated Press
for more than twenty telephone lines of its offices and jour-
nalists, including their home phones and cellphones, without
notice;33 through the NSA, collected the telephone records of
millions of Verizon customers, within the United States and
between the United States and other countries, on an “ongoing,
daily basis” under an order that prohibited Verizon from reveal-
ing the operation;34 and tapped into the central servers of nine
leading U.S. Internet companies, extracting audio and video
chats, photographs, emails, documents, and connection logs
that enable analysts to track foreign targets and U.S. citizens.35
At least one significant NSA surveillance program, involving
the collection of data on the social connections of U.S. citizens
and others located within the United States, was initiated after
the Bush administration left office.36
These and related policies were formulated and carried out
by numerous high- and mid-level national security officials who
served in the Bush administration and continued to serve in
the Obama administration.37
Given Senator Obama’s powerful criticism of such poli-
cies before he took office as President, the question,38 then, is
this: Why does national security policy remain constant even
when one President is replaced by another, who as a candidate
repeatedly, forcefully, and eloquently promised fundamental
changes in that policy?39
Various hypotheses have been suggested. One asserts
the substantive correctness of the Bush/Obama policies as
a response to perceived security threats. The continuity of
national security policy under politically differing presidents,
( 4 ) National Security and Double Government
could not name the Speaker of the House; and 63 percent did
not know how many Justices are on the Supreme Court.77 Far
more Americans can name the Three Stooges than any member
of the Supreme Court.78 Other polls have found that 71 percent
of Americans believe that Iran already has nuclear weapons79
and that 33 percent believed in 2007 that Saddam Hussein
was personally involved in the 9/11 attacks.80 In 2006, at the
height of U.S. military involvement in the region, 88 percent of
American 18- to 24-year-olds could not find Afghanistan on a
map of Asia, and 63 percent could not find Iraq or Saudi Arabia
on a map of the Middle East.81 Three-quarters could not find
Iran or Israel,82 and 70 percent could not find North Korea.83
In 1998—after nearly three decades of often heated debate
about the Anti-Ballistic Missile (ABM) Treaty and arguments
over related issues such as the proposed Strategic Defense
Initiative—two-thirds of Americans mistakenly believed that
a missile defense system was already in place.84 The “over-vote”
ballots of several thousand voters—greater in number than the
margin of difference between George W. Bush and Al Gore—
were rejected in Florida in the 2000 presidential election
because voters did not understand that they could vote for only
one candidate.85
There is, accordingly, little need for purposeful deception
to induce generalized deference; in contemporary America as
in Bagehot’s Britain, a healthy dose of theatrical show goes a
long way.
w
C H A P T ER 2
( 11 )
( 12 ) National Security and Double Government
ORIGINS
OPER ATION