Chapter 2
The Architecture of Secrecy
The Jurisprudence of Secrecy
The American national security state has, over seven decades, constructed a classification architecture of extraordinary sophistication—a nested hierarchy of secrecy that, at its apex, operates so far beyond conventional oversight mechanisms that its existence is not merely concealed but legally immunized from disclosure. Understanding this architecture is prerequisite to any serious analysis of UAP concealment, because the question is not whether classified programs could suppress extraordinary technology, but whether the existing legal and administrative machinery is structurally capable of doing so and, if so, how.
The foundational instrument is the Special Access Program (SAP) framework, governed primarily under DoD Directive 5205.07. SAPs are categorized into three ascending tiers of concealment. Acknowledged SAPs are programs whose existence is publicly admitted, though their operational contents remain classified. Unacknowledged SAPs (USAPs) are programs whose very existence is classified—not merely their contents but the fact of their operation. Their budgets are concealed within larger classified line items; their personnel are prohibited from acknowledging them even to colleagues with standard clearances. At the apex sits the category of Waived USAPs: programs for which the Secretary of Defense has formally exercised authority under 10 U.S.C. § 119 to explicitly waive congressional reporting requirements. Rather than briefing the full oversight committees of the House and Senate Armed Services Committees, only the "Gang of Eight"—the Speaker of the House, Senate Majority and Minority leaders, and the chairs and ranking members of the intelligence committees—receives notification, and even then frequently without operational detail sufficient to permit meaningful oversight.
A second parallel track of classification operates outside the executive order system entirely. Under the Atomic Energy Act of 1954, certain categories of information are classified as Restricted Data and treated as "born classified"—meaning the classification attaches automatically at the moment of creation and does not require an affirmative classification decision by a government official. Crucially, Restricted Data falls outside the standard executive order declassification system: no presidential order can declassify it; only an act of Congress or specific statutory authority can. Multiple whistleblowers and congressional investigators have asserted that UAP-related material—particularly material concerning propulsion physics and non-human biological specimens—has been categorized under this Act, placing it beyond the reach of ordinary declassification review.
The UAP Disclosure Act: A Legislative Odyssey
The UAP Disclosure Act (UAPDA) emerged from Congress in the summer of 2023 with a legislative pedigree and bipartisan support unusual for legislation touching classified programs. Its architects drew explicitly on the model of the JFK Assassination Records Collection Act of 1992, which established the Assassination Records Review Board and successfully transferred tens of millions of pages of classified documents into the public domain over a five-year period. The UAPDA envisioned an analogous mechanism: an independent review board empowered to compel the transfer of UAP-related records from government agencies and, critically, from private defense contractors.
The "eminent domain clause"—a provision treating classified UAP materials in contractor possession as subject to governmental seizure with compensation—was the legislative heart of the bill. It was designed to pierce the most impenetrable layer of the secrecy architecture: the defense contractor firewall. Contractors operating under private law with government-classified programs have argued, and courts have accepted, that even congressional oversight mechanisms cannot reach their internal classified research. The eminent domain mechanism, by treating such materials as property subject to takings law rather than classified information subject to national security law, was designed to circumvent this barrier through an entirely different legal avenue.
In each successive legislative cycle—the December 2023 National Defense Authorization Act, the late 2024 NDAA, and again in the December 2025 process—the eminent domain clause was excised with surgical precision. The removal was not the product of floor debate or recorded committee votes but occurred in the conference process, where House and Senate versions of the NDAA are reconciled in closed-door negotiations whose internal deliberations are not subject to public record requirements.
The figure who emerged from congressional insider accounts as central to this repeated removal is Terry Carmack, a senior staffer for Senate Minority Leader Mitch McConnell. Representative Eric Burlison of Missouri, a UAPDA supporter, stated publicly that "a staffer blocked UAPDA, not a U.S. Senator"—a formulation pointing unmistakably toward Carmack's role. While this attribution has not been independently corroborated through formal legislative records, the episode illustrates a structural feature of the secrecy architecture that receives insufficient attention: the most consequential gatekeeping decisions are made not by elected officials whose accountability is in principle electoral, but by permanent professional staff whose careers span administrations and whose networks extend deeply into the defense and intelligence establishment.
Key Political Figures and Financial Entanglements
The repeated legislative failure of the UAPDA's most consequential provisions cannot be understood without mapping the financial architecture that connects congressional oversight of the defense establishment to the defense establishment itself. Campaign finance data reveals patterns that, while individually within legal limits, collectively describe a systematic alignment of financial incentives with secrecy preservation.
Representative Mike Turner of Ohio, Chair of the House Permanent Select Committee on Intelligence during the period of the UAPDA's repeated dilution, represents a district that geographically encircles Wright-Patterson Air Force Base—the installation most frequently cited in UAP research as a repository for recovered non-human materials dating to the 1940s. Federal Election Commission records document that Turner received $186,250 from Lockheed Martin's PAC and associated personnel, supplemented by substantial contributions from Northrop Grumman and BAE Systems.
Source: Federal Election Commission filings, Lockheed Martin Corporation PAC contributions, cumulative through 2024 filing period.
Representative Mike Rogers of Alabama, Chair of the House Armed Services Committee during the same period, represents a district proximate to Redstone Arsenal, home to the Army's Missile Defense Command and a significant classified research infrastructure. Rogers received $143,250 from Lockheed Martin, with additional contributions from the same defense contractor constellation.
Source: Federal Election Commission filings, Lockheed Martin Corporation PAC contributions, cumulative through 2024 filing period.
These financial currents do not constitute evidence of corruption in any legally meaningful sense. They describe something structurally more significant: the systematic alignment of the political economy of defense oversight with the institutional interests of the entities being overseen. The oversight architecture is not merely compromised by financial relationships—it has been constituted by them, over decades of incremental normalization.
IR&D Laundering and the Defense Contractor Monopoly
The defense contractor firewall represents perhaps the most sophisticated component of the secrecy architecture because it leverages private law's immunities against public law's oversight requirements while simultaneously operating on public funds. The mechanism operates through what analysts have termed IR&D laundering: the use of Independent Research and Development (IR&D) funds to conduct classified research entirely outside congressional visibility.
IR&D is a cost accounting category under the Federal Acquisition Regulation that allows defense contractors to classify certain research expenditures as reimbursable overhead costs, recoverable from the government through contract pricing. The research funded through IR&D does not require a specific government contract; it does not require congressional authorization; it is not subject to the standard oversight mechanisms that apply to classified government programs. It is, in effect, government-funded private research conducted under private law with private classification authority.
The most direct documentary evidence of this system's operation in the UAP context is the Wilson-Davis memo—a document purported to record a 1997 conversation between Vice Admiral Thomas Wilson, then Director of the Defense Intelligence Agency, and physicist Dr. Eric Davis. According to the memo, Wilson discovered through official channels that a classified program potentially related to non-human technology existed within a defense contractor's internal structure. When Wilson attempted to access the program through his official position—as the serving director of the nation's premier defense intelligence agency—contractor security officials denied him access and informed him that his clearance was insufficient for their internally classified program. A serving four-star intelligence official was denied access to a program operated on government contract with government-reimbursed funds.
The memo's evidentiary status was significantly elevated on November 13, 2024, when it was entered into the Congressional Record during the House Oversight Committee hearing on UAP as document designation "SD001." This formal congressional documentation transforms the Wilson-Davis memo from a leaked document of contested provenance into an artifact of official government proceedings — a distinction with substantial implications for its legal and evidentiary weight.
The contractors most frequently cited in this architecture—Lockheed Martin's Skunk Works, Northrop Grumman's Advanced Programs division, and BAE Systems—operate advanced programs divisions with classification authorities that exceed in practice, if not in law, the oversight reach of congressional committees. Their longevity, their classified institutional memory, and their control over specialized manufacturing capabilities that government lacks in-house have created a structural autonomy that decades of defense acquisition policy have inadvertently consolidated.
Immaculate Constellation
Within the classified landscape, the program referred to under the designator Immaculate Constellation represents the most operationally sensitive known component of the UAP secrecy architecture. According to multiple sources, the program was initiated in approximately 2017 following the public exposure of the Advanced Aerospace Threat Identification Program (AATIP) and was designed to aggregate, classify, and analyze UAP sensor data collected by military and intelligence platforms, with particular emphasis on material that post-dated the Navy encounters that became public through the New York Times reporting.
Former AATIP director Luis Elizondo, who resigned from the Defense Intelligence Agency in 2017 citing ethical objections to the treatment of UAP data, provided congressional testimony and public statements describing a program characterized by extraordinary classification depth, deliberate compartmentalization preventing any single analyst from holding a complete picture of collected data, and an institutional culture that actively suppressed internal inquiry and penalized personnel who raised questions through formal channels.
Congressional attention to Immaculate Constellation intensified following testimony in closed sessions before the House Oversight Committee. Representative Nancy Mace of South Carolina conducted public inquiries highlighting what she characterized as excessive secrecy, the absence of meaningful congressional oversight, and credible reports of intimidation tactics deployed against whistleblowers who attempted to bring information to cleared congressional staff. Coverage by investigative journalists, including Fox Orlando's reporting on the program's internal structure, described a multi-domain expertise team conducting active analysis of recovered materials and biological data under layers of classification that precluded standard interagency review.
Consciousness Research as a Hidden Interface
The secrecy architecture extends beyond the material domain of recovered craft and biological specimens into the cognitive and perceptual domain of consciousness research—an area where the government's classified interest both predates and significantly exceeds its public acknowledgment.
The Monroe Institute, a non-profit organization in Faber, Virginia specializing in audio-guided altered states research through its proprietary Hemi-Sync technology, maintained for decades a relationship with the U.S. Army and Intelligence Community that was classified at the time of its operation. The Institute's founder, Robert Monroe, collaborated with the Army's Intelligence and Security Command to develop protocols for out-of-body experience induction and information retrieval under controlled conditions.
The CIA's Gateway Process, the subject of a 1983 classified analysis by Lieutenant Colonel Wayne McDonnell, explored the theoretical and practical dimensions of consciousness alteration as a means of accessing non-ordinary information channels. McDonnell's analysis drew on quantum physics, holographic brain models, and out-of-body phenomenology to construct a theoretical framework for understanding how altered states might enable access to a "universal continuum" of consciousness—a formulation strikingly convergent with Strømme's universal consciousness field framework developed three decades later.
The Army's Project Stargate, active from 1978 to 1995 and operated by the Defense Intelligence Agency with participation from the CIA and NSA, funded systematic investigation of remote viewing—the claimed ability of trained percipients to accurately describe distant locations and events under double-blind experimental conditions. Project Stargate produced a classified operational record including claimed contributions to intelligence collection that have never been fully assessed in declassified literature. Physicists Hal Puthoff and Russell Targ, operating from SRI International under government contract, produced the most rigorous experimental protocols of the program.
The convergence of these programs—Hemi-Sync, Gateway, Stargate—with Dr. Garry Nolan's contemporary neuroscientific work on the caudate-putamen and UAP contact suggests a through-line of classified government interest in the neurological and perceptual interface between human consciousness and whatever non-human intelligence represents. The secrecy architecture surrounding UAPs is not merely a material secrecy but an epistemological one: it conceals not only what has been found but what human minds might be capable of perceiving if the right neurological and cognitive conditions are met.
Allied Acknowledgment: International Declassified Assessments
The architecture of secrecy is not exclusively American. Allied governments have conducted independent assessments that, while less politically fraught than US disclosures, arrive at conclusions that reinforce the central claims of this chapter.
The French COMETA Report (1999)
The most senior government-affiliated analysis of UAP ever published, "UFOs and Defense: What Should We Prepare For?" was authored by a committee of retired French generals, admirals, and aerospace scientists chaired by General Denis Letty. The report concluded that UAP represent an "almost certain physical reality" of unknown flying objects with exceptional capabilities. It was transmitted directly to French President Jacques Chirac and led to the creation of GEIPAN — France's ongoing institutional UAP research program. In 2010, France's Sigma/3AF Commission endorsed COMETA's core conclusions. The COMETA report demonstrates that outside the unique political pressures of the US defense-contractor complex, senior military and scientific officials reached the same fundamental assessment: the phenomenon is real, physical, and unexplained.
The Canadian Smith Memo (1950)
A formerly TOP SECRET Canadian government memorandum dated November 21, 1950, from Wilbert Smith — senior radio engineer at Canada's Department of Transport — reported that flying saucers "exist," that the subject was "the most highly classified subject in the United States Government, rating higher even than the H-bomb," and that a small group headed by Dr. Vannevar Bush was studying them. The memo's authentication is not disputed. When Dr. Robert Sarbacher — a consultant to the US Research and Development Board named in the memo — was recontacted in 1983, he confirmed the substance of Smith's report.
Project Blue Book: The 701 Unexplained
The US Air Force's Project Blue Book investigated 12,618 UAP reports between 1952 and 1969. Of these, 701 — approximately 5.5% — remained officially "unidentified" after analysis. The Battelle Memorial Institute's classified Special Report No. 14, commissioned by Blue Book, found that higher-quality cases with better documentation and more credible witnesses were more likely to remain unexplained — the opposite of what the null hypothesis predicted. This statistical finding, buried in a classified annex, contradicts the standard dismissal that unexplained cases merely reflect insufficient data.
The AARO Historical Record Report (2024)
The Department of Defense's All-domain Anomaly Resolution Office published a 63-page historical review in March 2024 concluding it found "no verifiable information to substantiate claims" of extraterrestrial material possession or reverse-engineering programs. Critics — including David Grusch, whose sworn congressional testimony directly contradicts AARO's findings, and members of the Senate Intelligence Committee — disputed the report, noting that AARO had been granted limited access to legacy special access programs. The AARO report now represents the current "official position" — a position that the accumulated evidence documented in this chapter systematically contradicts.
Conclusion
The architecture of secrecy surrounding UAP programs is not a monolithic structure with a single controlling authority but a distributed, redundant, and self-reinforcing network of legal mechanisms, financial entanglements, administrative structures, and cultural norms that collectively produce and maintain concealment without requiring continuous active management. Waived USAPs provide legal immunity from oversight. The Atomic Energy Act provides classification permanence immune to executive action. IR&D funding provides financial invisibility. Defense contractor autonomy provides administrative inaccessibility. Financial relationships between contractors and their congressional overseers provide institutional alignment. Congressional staff with decades of deep-state relationships provide process control.
Dismantling these barriers requires more than legislative intent—it requires precision targeting of each specific mechanism. The Wilson-Davis memo, the financial contribution records, the cross-agency collaboration patterns documented in partially declassified materials, and the testimony of whistleblowers who have navigated these structures from the inside collectively constitute an evidentiary foundation from which a rigorous, systematic investigation could proceed. The architecture is complex; it is not impenetrable. What it requires is investigators willing to follow the structural logic of secrecy rather than merely demanding that its product—classified information—be voluntarily surrendered.