File:Democratic State v Deep State.doc

From Wikispooks
Jump to navigation Jump to search

Democratic_State_v_Deep_State.doc(file size: 78 KB, MIME type: application/msword)

Warning: This file type can contain malicious code. Uploads to Wikispooks are virus-checked but you are nonetheless advised to exercise caution in handling this type of file.

Solid insights into the workings of the Deep State by Norwegian Academic Ola Tunander

From the Introduction:

In a 1955 study of the United States State Department, Hans Morgenthau discussed the existence of a US ‘dual state’. According to Morgenthau, the US state includes both a ‘regular state hierarchy’ that acts according to the rule of law and a more or less hidden ‘security hierarchy’—which I will refer to here as the ‘security state’ (also known in some countries as the ‘deep state’) —that not only acts in parallel to the former but also monitors and exerts control over it. In Morgenthau’s view, this security aspect of the state—the ‘security state’—is able to ‘exert an effective veto over the decisions’ of the regular state governed by the rule of law. While the ‘democratic state’ offers legitimacy to security politics, the ‘security state’ intervenes where necessary, by limiting the range of democratic politics. While the ‘democratic state’ deals with political alternatives, the ‘security state’ enters the scene when ‘no alternative exists’, when particular activities are ‘securitised’ —in the event of an ‘emergency’. In fact, the security state is the very apparatus that defines when and whether a ‘state of emergency’ will emerge. This aspect of the state is what Carl Schmitt, in his 1922 work Political Theology, referred to as the ‘sovereign’.

File history

Click on a date/time to view the file as it appeared at that time.

Date/TimeDimensionsUserComment
current13:38, 18 May 2010 (78 KB)Peter (talk | contribs)Solid insights into the workings of the Deep State by Norwegian Academic Ola Tunander Category:Deep Politics Theory
  • You cannot overwrite this file.

The following 2 pages uses this file: