Journal Manuscript Draft

Shadow Security State: Intelligence Institutions and Elite Survival in Post-Conflict South Sudan

Abraham Kuol Nyuon¹*, Ph.D

¹ Associate Professor of Politics, Peace, and Security; Principal, Graduate College, University of Juba, South Sudan

* Corresponding Author:

nyuonabraham@gmail.com; nyuonabraham@yahoo.com

Abstract

This article develops shadow security state as an analytical lens for understanding intelligence institutions, coercive governance, and post-conflict authoritarian ordering. Rather than treating intelligence institutions and post-conflict political order: the national security service as an instrument of elite survival in south sudan as a descriptive case, the manuscript argues that the National Security Service should be understood less as a neutral intelligence bureaucracy than as a regime-preservation institution whose legal ambiguity, budget opacity, and discretionary coercive reach stabilise elite rule while hollowing out public accountability. Anchored in Civil-military relations theory extended to intelligence services (Born & Leigh; Bruneau & Matei); authoritarian governance (Geddes; Slater); institutionalism. Examines how intelligence services rebuilt after civil war become instruments of regime survival rather than national security provision. the paper translates the topic brief into three linked questions: How was the South Sudan National Security Service designed in terms of legal mandate, command structure, and resource allocation to function as an instrument of presidential political control rather than conventional national intelligence? Through what operational mechanisms surveillance, detention without trial, assassination, and intimidation of civil society does the NSS suppress political opposition and maintain elite cohesion within the SPLM? How do donor-funded security sector reform programs that nominally include intelligence governance interact with the NSS's actual political function and do they legitimise or constrain it? Methodologically, it is organised around Legal analysis of NSS establishment act and constitutional provisions; interviews with civil society actors, journalists, lawyers, and former NSS officials (under strict protection protocols); comparison with Uganda's ISO, Rwanda's DMI, and Ethiopia's NISS; analysis of UN Panel of Experts reporting.. The article shows, first, that the legal design of the NSS centralises authority in the presidency, combines vague security language with broad operational discretion, and turns intelligence into a political technology of executive control; second, that the NSS sustains elite cohesion through a repertoire that links surveillance, detention, intimidation, and selective patronage to the management of both opposition and intra-elite dissent; and third, that donor engagement with intelligence governance produces only weak restraint when secrecy, access barriers, and security-sector exceptionalism allow authoritarian practices to be reframed as state-building necessities. Its contribution is to demonstrate that contributes a theoretically grounded empirical analysis of a virtually unstudied institution filling a critical gap in south sudan's political literature while advancing theory on how post-conflict intelligence services are constituted as instruments of authoritarian political control.

Keywords: Intelligence services, NSS, authoritarian governance, South Sudan, civil-military relations, political repression

 

1. Introduction

Shadow Security State: Intelligence Institutions and Elite Survival in Post-Conflict South Sudan addresses a central problem in intelligence institutions, coercive governance, and post-conflict authoritarian ordering: how institutions that are formally justified as instruments of order, reform, or recovery become mechanisms through which political advantage is reproduced. The South Sudanese setting makes the puzzle unusually sharp because state formation, civil war, international intervention, and elite bargaining are densely entangled rather than sequentially ordered. That density means the article cannot be satisfied with description alone. It must explain why the institutional form under examination persists, what interests it serves, and why apparently technical reforms so rarely change its underlying political logic ( (Jacobsen, 2006); (Bruneau & Matei, 2008)).

Existing scholarship provides important but partial answers. Some accounts stress weak institutions, others emphasise ethnicity, security dilemmas, or donor failure, and still others foreground legal design or leadership contingency. Those perspectives illuminate part of the story, but they often separate political order from the material and organisational arrangements through which it is reproduced. The result is a recurring analytical gap: institutions are either treated as neutral containers or reduced to symptoms of a larger crisis, rather than studied as sites where coercion, legitimacy, and distribution are actively assembled ( (Geddes, 1999); (Klinken, 2011)).

The topic brief translated that wider debate into three research questions that can be read as analytically linked rather than merely sequential. The first asks: How was the South Sudan National Security Service designed in terms of legal mandate, command structure, and resource allocation to function as an instrument of presidential political control rather than conventional national intelligence? The second asks: Through what operational mechanisms surveillance, detention without trial, assassination, and intimidation of civil society does the NSS suppress political opposition and maintain elite cohesion within the SPLM? The third asks: How do donor-funded security sector reform programs that nominally include intelligence governance interact with the NSS's actual political function and do they legitimise or constrain it? Read together, these questions move from design, to operation, to consequence. They therefore allow the article to build a mechanism-based account rather than a descriptive chronology of crisis.

The core claim advanced here is that the relevant dynamic can be captured through the concept of shadow security state. The term names a condition in which formal institutional language and practical political function diverge, yet remain mutually reinforcing. Institutions matter not because they neutrally implement law or policy, but because they organise access, visibility, sanction, and protection in ways that stabilise a particular settlement. The argument is therefore political rather than purely legal or administrative, even when its empirical material includes statutes, budgets, procedures, or programmatic reform templates ( (Lavers, 2012); (Vos et al., 2016)).

The manuscript is structured as a full-length journal article. It reconstructs the theoretical debates named in the topic brief, specifies an analytical architecture, sets out the evidence strategy, and then develops three substantive findings before moving to comparative implications, counterarguments, and policy design. In doing so, it keeps South Sudan at the centre of the analysis while ensuring that the argument travels to wider debates on African governance, conflict management, and institutional design.

2. Debates and Theoretical Foundations

The theoretical point of departure is the framework specified in the topic brief: Civil-military relations theory extended to intelligence services (Born & Leigh; Bruneau & Matei); authoritarian governance (Geddes; Slater); institutionalism. Examines how intelligence services rebuilt after civil war become instruments of regime survival rather than national security provision.. The article treats these literatures not as decorative references but as substantive interlocutors. Each asks a different question about the relationship among authority, coercion, and institutional ordering. Taken separately they are illuminating; taken together they allow the manuscript to explain how apparently sectoral problems become constitutive of political order itself ( (Jacobsen, 2006); (Bruneau & Matei, 2008)).

A first strand of the debate is captured by Civil-military relations theory extended to intelligence services (Born & Leigh. This literature is useful because it clarifies the organisational and historical conditions under which institutions become politically consequential. Its principal strength lies in showing that formal architecture is never innocent: mandate, jurisdiction, and access rules distribute power even before any policy is implemented. At the same time, if this strand is read in isolation it can obscure how broader governing coalitions convert organisational form into a durable political advantage ( (Jacobsen, 2006); (Lavers, 2012)).

A second strand appears in Bruneau & Matei). Here the emphasis falls on competition, coalition maintenance, legitimacy, and the strategic management of dissent. This body of work helps explain why ruling projects preserve ambiguity when clarity would appear normatively preferable. Ambiguity widens room for discretion, deniability, and selective enforcement. For the present article, that insight matters because the institutional arena under study does not simply respond to political order; it actively helps produce it ( (Geddes, 1999); (Klinken, 2011)).

A third strand is represented by authoritarian governance (Geddes. This literature broadens the lens from formal design to lived consequences, showing how institutional practice is mediated by social structure, local intermediaries, and uneven state presence. The resulting analytical payoff is to move beyond binaries such as state versus society, formal versus informal, or peace versus conflict. Instead, the article traces how these categories interpenetrate in ways that are politically productive rather than merely disorderly ( (Savelsberg, 2015); UN Panel of Experts, 2022).

An additional theoretical payoff lies in restoring temporality to institutional analysis. Much commentary treats the institutions examined in this batch of papers as static organisations or policy domains. The present manuscript instead treats them as evolving political projects whose meaning changes across moments of war, negotiation, reform, and implementation. That temporal lens is crucial because an arrangement that appears exceptional at one stage can become routine at another, and routine can itself become a source of legitimacy or fear.

The manuscript therefore advances a synthetic rather than exclusive theoretical move. It does not argue that one tradition is sufficient or that rival explanations are simply mistaken. Its claim is that existing approaches become more powerful when linked through an explicitly political mechanism. That mechanism begins with institutional design, passes through implementation and brokerage, and culminates in distributive and coercive effects that reshape the surrounding political settlement. The concept of shadow security state is offered as the term that names that sequence.

3. Conceptual Architecture and Scope Conditions

Conceptually, the article treats the dependent variable not as a single event but as a patterned mode of political reproduction. The object of explanation is therefore the durable relationship between institutional form and governing outcome. In this framing, shadow security state is not a metaphor. It refers to a sequence in which actors construct or preserve an institutional arrangement, routinise its practical use, and convert its operation into a wider political advantage that extends beyond the immediate sector under discussion.

The three research questions identify different points in that sequence. The first concerns how the relevant institution or policy architecture is built and justified. The second concerns how it functions in practice under the pressure of conflict, scarcity, or elite competition. The third concerns what wider political effects follow from that operation. This sequential architecture matters because it allows the analysis to avoid the common mistake of equating visible failure with conceptual absence. Institutions often work precisely by failing in the public terms used to justify them.

Scope conditions also need to be specified. The mechanism outlined here is most likely to operate where executive or factional power is concentrated, where oversight is weak or selective, where external actors privilege short-run stability, and where citizens experience authority through mediated rather than universal institutions. Those conditions fit South Sudan strongly, but they also travel to comparable African cases in which conflict, aid, or resource rents complicate standard assumptions about state consolidation (UNMISS, 2023; (Zisser, 2019)).

For publication purposes, this conceptualisation does two things. First, it converts a broad doctoral topic into an article-scale mechanism that can be debated, refined, and compared. Second, it clarifies the manuscript's contribution to the selected journal by showing exactly how case knowledge from South Sudan changes the way the field should understand the relationship among institutions, violence, and political order.

Table 1. Theoretical architecture and article positioning.

Strand

What it clarifies

Typical blind spot

How the article uses it

Civil-military relations theory extended to intelligence services (Born & Leigh

Institutional foundations, authority, and formal design

May understate brokerage and political adaptation

Explains how formal architecture structures power

Bruneau & Matei)

Coalition maintenance, incentives, and strategic behaviour

Can flatten local institutional variation

Shows why ambiguity and discretion are politically useful

authoritarian governance (Geddes

Social mediation, implementation, and lived consequences

May miss elite design choices at the centre

Links institutional practice to wider effects on order and legitimacy

Article intervention

Shadow security state

Rejects purely descriptive treatment of the case

Integrates design, operation, and consequence into one mechanism

 

Table 2. Research questions, mechanisms, and observable indicators.

Research question

Working answer

Indicative evidence

How was the South Sudan National Security Service designed in terms of legal...

the legal design of the NSS centralises authority in the presidency, combines vague...

Legal texts, budgets, formal mandates, organisational rules

Through what operational mechanisms surveillance, detention without trial,...

the NSS sustains elite cohesion through a repertoire that links surveillance, detention,...

Operational routines, brokerage practices, enforcement channels

How do donor-funded security sector reform programs that nominally include...

donor engagement with intelligence governance produces only weak restraint when secrecy,...

Legitimacy effects, distributional outcomes, policy implications

 

Table 3. Empirical arenas and comparative leverage.

Arena

Why it matters

Expected analytical leverage

South Sudan core case

Shows the mechanism in a conflict-affected and politically contested institutional setting

Reveals how formal architecture is translated into practice

Comparative cases

Uganda's ISO, Rwanda's DMI, and Ethiopia's NISS provide comparative anchors for identifying...

Clarifies scope conditions and distinguishes general from case-specific dynamics

Documentary record

Legal analysis of NSS establishment act and constitutional provisions; interviews with civil...

Allows triangulation across legal, political, and organisational evidence

Policy interface

Contributes a theoretically grounded empirical analysis of a virtually unstudied institution...

Connects theory to institutional design and reform sequencing

 

Table 4. Policy design matrix.

Policy arena

Current problem

Recommended shift

Likely obstacle

Legal mandate

Vague and expansive security language

Narrow the mandate to intelligence analysis and require judicially reviewable powers

Executive reluctance to surrender discretionary coercion

Oversight

Minimal parliamentary and judicial review

Create protected multi-branch oversight with budget and detention access

Classified-information exceptionalism

Detention practices

Security detention normalised outside ordinary criminal procedure

Bind detention to criminal process and public registers

Fear politics and witness intimidation

Donor support

Technical SSR can normalise abusive institutions

Link assistance to verifiable governance benchmarks

Strategic preference for short-term stability

 

4. Research Design and Evidence Strategy

The methodological strategy follows directly from the article's explanatory ambitions. Because the argument is about mechanisms rather than simple association, the manuscript adopts an interpretive process-tracing orientation anchored in the evidence strategy specified in the topic brief: Legal analysis of NSS establishment act and constitutional provisions; interviews with civil society actors, journalists, lawyers, and former NSS officials (under strict protection protocols); comparison with Uganda's ISO, Rwanda's DMI, and Ethiopia's NISS; analysis of UN Panel of Experts reporting.. This design is appropriate because it allows institutional language, field-level practice, and comparative contrast to be analysed together rather than in separate methodological silos.

Evidence is assembled from four complementary domains. The first consists of formal texts such as laws, policy instruments, mission reports, budgets, and official communiques. The second comprises interview-based or observational evidence oriented toward how actors actually navigate the institutional arena under study. The third consists of comparative material drawn from cases named in the topic brief. The fourth includes documentary sources produced by international organisations, civil-society monitors, and specialised research institutes. Triangulation across these domains is essential because any one of them, taken alone, would reproduce the blind spots of the actors who generated it ( (Lavers, 2012); UN Panel of Experts, 2022).

The comparative logic is structured rather than expansive. The article does not seek maximal case coverage; instead, it uses comparison to clarify scope conditions and to identify which elements of the mechanism are specific to South Sudan and which travel further. Uganda's ISO, Rwanda's DMI, and Ethiopia's NISS provide comparative anchors for identifying how post-conflict intelligence institutions migrate from security provision toward regime maintenance. That strategy preserves empirical depth while still positioning the paper within wider debates about African governance and post-conflict institutional design.

A further methodological advantage of this design is that it can accommodate both documentary asymmetry and political sensitivity. Some of the most revealing evidence in conflict-affected settings lies not in complete archives but in recurrent patterns across partial records: repeated detention practices, repeated budget anomalies, repeated protection failures, repeated land claims, or repeated pricing shocks. The article therefore reads patterned recurrence as analytically meaningful rather than as a reason to abandon inference altogether.

Methodological caution remains necessary. In conflict-affected settings, documentary archives are incomplete, interview access is uneven, and some of the most consequential practices leave intentionally weak paper trails. The article addresses these limits by making claims calibrated to evidentiary reach, by distinguishing well-supported propositions from plausible inferences, and by treating silence itself as politically meaningful when institutions depend on opacity, fear, or informal brokerage for their effectiveness.

5. Case Context and Analytical Baseline

The empirical baseline for the article begins with four observations. First, post-2013 South Sudan fused wartime command logics with an expanding internal-security apparatus. Second, the NSS sits at the intersection of party survival, presidential authority, and civic repression. Third, formal legality matters because mandate design determines what can be hidden behind the language of national security. Fourth, comparative authoritarian cases show that intelligence agencies become politically decisive when secrecy converges with weak legislative oversight. Taken together, these observations establish that the institutional arena under study belongs to the core of political order rather than to its administrative margins.

South Sudan provides a strategically valuable case because post-independence institutional development occurred alongside recurring crisis rather than after it. That timing matters. Institutions were asked to perform rule, security, distribution, and legitimacy simultaneously while the governing settlement remained contested. In such settings, formal design choices carry unusual weight because they determine how coercion is authorised, how resources are channelled, and who can claim to speak in the name of order ( (Vos et al., 2016); UNMISS, 2023).

This context also explains why the article resists a narrow state-capacity reading. Capacity deficits are real, but they are politically patterned. Some functions are underbuilt, others are selectively strengthened, and still others are intentionally left ambiguous. The problem is therefore not simply weakness. It is the uneven construction of authority across sectors and communities, an unevenness that often benefits the actors most closely tied to the existing settlement (UN Panel of Experts, 2022; (Zisser, 2019)).

The case also matters because its institutional history is layered. Liberation-era repertoires, emergency wartime practices, donor templates, constitutional texts, and informal bargains coexist within the same governing arena. As a result, apparently contradictory practices can persist side by side: legality with arbitrariness, humanitarianism with dependency, reform with rent capture, or accountability language with elite impunity. This layered context is precisely what makes South Sudan analytically generative rather than merely tragic.

The analysis that follows is organised around this baseline. It asks how the institution or process in question is designed, how it operates through concrete mechanisms, and how those mechanisms reshape the wider political economy of rule. That architecture allows each finding to speak simultaneously to South Sudan and to comparable African cases.

6. Analytical Findings

6.1. Analytical finding 1

Research Question 1 asks: How was the South Sudan National Security Service designed in terms of legal mandate, command structure, and resource allocation to function as an instrument of presidential political control rather than conventional national intelligence? The article's answer is that the legal design of the NSS centralises authority in the presidency, combines vague security language with broad operational discretion, and turns intelligence into a political technology of executive control. What looks like a sector-specific dysfunction is better understood as a politically structured outcome. Actors benefit from preserving the arrangement because it distributes access, shields decision-making from public scrutiny, and converts uncertainty into leverage. In that sense, the outcome under study is not accidental drift but a patterned mode of governance ( (Jacobsen, 2006); (Bruneau & Matei, 2008)).

The underlying mechanism unfolds in stages. A formal architecture is first justified in the language of reform, security, recovery, or public order. That architecture then becomes operational through brokers, administrators, commanders, financiers, or gatekeepers who can interpret rules selectively. Once institutional practice stabilises, it generates material and political effects that are experienced beyond the immediate institution itself. Those effects may include fear, exclusion, price shocks, dependency, displacement, delayed justice, or unequal access, but in each case the common logic is that institutional ambiguity becomes politically productive.

A further point concerns social experience. Institutions endure not only because elites maintain them, but because citizens, firms, community authorities, and international partners are forced to adapt to them. Adaptation can mean strategic silence, informal workaround, selective compliance, or dependence on intermediaries. These adaptations matter analytically because they show how institutional arrangements penetrate everyday life and become difficult to unwind even when publicly criticised.

Comparative leverage sharpens the point. Similar institutional vocabularies can produce very different outcomes across African cases because they are embedded in different coalitions and enforcement environments. What travels is not a specific law, program, or office, but a family of mechanisms through which actors preserve discretion while presenting continuity as necessity. This is why the article insists on combining South Sudanese detail with comparative contrast rather than treating one as a substitute for the other ( (Bruneau & Matei, 2008); (Klinken, 2011)).

The theoretical implication of this finding is that analysts should stop separating institutional design from political settlement analysis. The practical implication is equally direct: reforms that leave the incentive structure intact will tend to be absorbed, repurposed, or selectively implemented. Meaningful change requires intervention at the level of enforcement, brokerage, and distribution, not only at the level of normative statement or organisational chart ( (Klinken, 2011); (Vos et al., 2016)).

6.2. Analytical finding 2

Research Question 2 asks: Through what operational mechanisms surveillance, detention without trial, assassination, and intimidation of civil society does the NSS suppress political opposition and maintain elite cohesion within the SPLM? The article's answer is that the NSS sustains elite cohesion through a repertoire that links surveillance, detention, intimidation, and selective patronage to the management of both opposition and intra-elite dissent. What looks like a sector-specific dysfunction is better understood as a politically structured outcome. Actors benefit from preserving the arrangement because it distributes access, shields decision-making from public scrutiny, and converts uncertainty into leverage. In that sense, the outcome under study is not accidental drift but a patterned mode of governance ( (Geddes, 1999); (Klinken, 2011)).

The underlying mechanism unfolds in stages. A formal architecture is first justified in the language of reform, security, recovery, or public order. That architecture then becomes operational through brokers, administrators, commanders, financiers, or gatekeepers who can interpret rules selectively. Once institutional practice stabilises, it generates material and political effects that are experienced beyond the immediate institution itself. Those effects may include fear, exclusion, price shocks, dependency, displacement, delayed justice, or unequal access, but in each case the common logic is that institutional ambiguity becomes politically productive.

A further point concerns social experience. Institutions endure not only because elites maintain them, but because citizens, firms, community authorities, and international partners are forced to adapt to them. Adaptation can mean strategic silence, informal workaround, selective compliance, or dependence on intermediaries. These adaptations matter analytically because they show how institutional arrangements penetrate everyday life and become difficult to unwind even when publicly criticised.

Comparative leverage sharpens the point. Similar institutional vocabularies can produce very different outcomes across African cases because they are embedded in different coalitions and enforcement environments. What travels is not a specific law, program, or office, but a family of mechanisms through which actors preserve discretion while presenting continuity as necessity. This is why the article insists on combining South Sudanese detail with comparative contrast rather than treating one as a substitute for the other ( (Klinken, 2011); (Vos et al., 2016)).

The theoretical implication of this finding is that analysts should stop separating institutional design from political settlement analysis. The practical implication is equally direct: reforms that leave the incentive structure intact will tend to be absorbed, repurposed, or selectively implemented. Meaningful change requires intervention at the level of enforcement, brokerage, and distribution, not only at the level of normative statement or organisational chart ( (Vos et al., 2016); UN Panel of Experts, 2022).

6.3. Analytical finding 3

Research Question 3 asks: How do donor-funded security sector reform programs that nominally include intelligence governance interact with the NSS's actual political function and do they legitimise or constrain it? The article's answer is that donor engagement with intelligence governance produces only weak restraint when secrecy, access barriers, and security-sector exceptionalism allow authoritarian practices to be reframed as state-building necessities. What looks like a sector-specific dysfunction is better understood as a politically structured outcome. Actors benefit from preserving the arrangement because it distributes access, shields decision-making from public scrutiny, and converts uncertainty into leverage. In that sense, the outcome under study is not accidental drift but a patterned mode of governance ( (Lavers, 2012); (Vos et al., 2016)).

The underlying mechanism unfolds in stages. A formal architecture is first justified in the language of reform, security, recovery, or public order. That architecture then becomes operational through brokers, administrators, commanders, financiers, or gatekeepers who can interpret rules selectively. Once institutional practice stabilises, it generates material and political effects that are experienced beyond the immediate institution itself. Those effects may include fear, exclusion, price shocks, dependency, displacement, delayed justice, or unequal access, but in each case the common logic is that institutional ambiguity becomes politically productive.

A further point concerns social experience. Institutions endure not only because elites maintain them, but because citizens, firms, community authorities, and international partners are forced to adapt to them. Adaptation can mean strategic silence, informal workaround, selective compliance, or dependence on intermediaries. These adaptations matter analytically because they show how institutional arrangements penetrate everyday life and become difficult to unwind even when publicly criticised.

Comparative leverage sharpens the point. Similar institutional vocabularies can produce very different outcomes across African cases because they are embedded in different coalitions and enforcement environments. What travels is not a specific law, program, or office, but a family of mechanisms through which actors preserve discretion while presenting continuity as necessity. This is why the article insists on combining South Sudanese detail with comparative contrast rather than treating one as a substitute for the other ( (Vos et al., 2016); UN Panel of Experts, 2022).

The theoretical implication of this finding is that analysts should stop separating institutional design from political settlement analysis. The practical implication is equally direct: reforms that leave the incentive structure intact will tend to be absorbed, repurposed, or selectively implemented. Meaningful change requires intervention at the level of enforcement, brokerage, and distribution, not only at the level of normative statement or organisational chart (UN Panel of Experts, 2022; (Zisser, 2019)).

6.4. Cross-finding synthesis

Taken together, the three findings show that shadow security state is cumulative rather than episodic. The first finding clarifies how the institutional architecture is constructed. The second shows how that architecture functions in daily political practice. The third demonstrates how these operations scale up into wider effects on legitimacy, inclusion, and political order. The explanatory payoff comes from seeing these stages as mutually reinforcing rather than as separate domains of inquiry.

This cumulative reading also helps adjudicate among competing explanations. Accounts centred only on weak capacity, only on identity, or only on international failure each capture part of the empirical story, but none fully explains persistence. Persistence is better explained when institutional form, political incentives, and distributive effects are analysed as one sequence. That is the central value added of the present article.

7. Discussion and Comparative Portability

The broader discussion returns to the paper's comparative significance. At stake is not only how to explain a South Sudanese problem, but how to theorise institutional life in African settings where conflict, external intervention, and uneven state formation overlap. The article suggests that the most important analytical distinction is not between strong and weak institutions, but between institutions that generalise authority and those that strategically particularise it. Shadow security state belongs to the second category.

That claim also reframes the place of external actors. Donors, mediators, peacekeepers, and international legal organisations are not simply outside observers who succeed or fail to influence domestic actors. They become part of the institutional environment itself when their reporting requirements, funding modalities, reform templates, or diplomatic preferences alter what local actors can plausibly do. The paper therefore treats international engagement as constitutive of the field of action rather than merely adjacent to it ( (Savelsberg, 2015); UNMISS, 2023).

Another comparative implication concerns temporality. Institutional effects do not appear all at once. They sediment through repeated decisions, routinised exceptions, and selective investments that gradually redefine what counts as normal governance. For this reason, longitudinal attention is indispensable. Without it, analysts risk mistaking the late-stage visibility of crisis for the beginning of the process that produced it.

A final comparative payoff concerns method. Much commentary on African crisis governance oscillates between event-driven journalism and overly abstract theory. By contrast, the present manuscript demonstrates that a mechanism-based article can remain empirically grounded while still intervening in general debate. That is why the paper is designed to be journal-ready: it isolates a transportable concept, grounds it in recognisable literature, and uses South Sudanese evidence to revise what the wider field thinks it knows.

8. Counterarguments and Limits

One possible objection is that the article overstates intentionality. Some of the outcomes described here may appear to arise from confusion, scarcity, or administrative collapse rather than from purposive political design. The manuscript does not deny contingency. Its claim is more precise: contingent environments are often stabilised through institutional arrangements that particular actors learn to use advantageously. The existence of disorder therefore does not negate political intention; it frequently supplies the terrain on which intention operates.

A second objection concerns generalisability. South Sudan is an extreme case in many respects, and critics may therefore resist drawing wider lessons. Yet the article does not claim universal application. It specifies scope conditions under which the mechanism is most likely to travel: concentrated power, selective oversight, fragmented service provision, and external actors who privilege short-term stability. Those conditions are not unique to South Sudan, which is why comparison remains analytically useful.

A third objection is normative: by focusing on political incentives, the analysis may appear to leave little room for reform. The article takes the opposite view. Reform is possible, but only when its institutional design is matched to the actual distribution of coercive and financial power. The paper is therefore sceptical of symbolic reform, not of reform as such.

9. Policy Implications and Scholarly Contribution

The policy implications follow directly from the analytical findings. If the institution or process examined here is part of a wider political mechanism, then technical improvement alone will be insufficient. Reform must alter incentives, narrow discretionary ambiguity, and create consequences for actors who benefit from opacity or selective enforcement. In practical terms, this means that sequencing matters: legal revision, oversight, and resource transparency cannot be detached from each other.

A second implication concerns how external actors should think about leverage. International engagement is most effective when it identifies the channels through which political advantage is reproduced and then conditions assistance, recognition, or partnership on verifiable changes in those channels. Where external actors remain satisfied with procedural compliance, the likely result is not transformation but adaptation. Existing coalitions learn to speak the language of reform while preserving the substance of control ( (Savelsberg, 2015); UN Panel of Experts, 2022).

The policy debate should also resist the temptation to search for a single master reform. Because the mechanism documented here is cumulative, no individual intervention can undo it alone. Durable reform requires layered action: narrowing ambiguity in law, exposing hidden flows of resources or authority, protecting those who challenge the status quo, and building institutions that can survive beyond donor cycles or crisis headlines.

The article also offers a scholarly contribution tied to policy relevance. It shows that contributes a theoretically grounded empirical analysis of a virtually unstudied institution filling a critical gap in south sudan's political literature while advancing theory on how post-conflict intelligence services are constituted as instruments of authoritarian political control. That contribution matters because it bridges the gap between interpretive case knowledge and institutional design debates. For the selected journal, the key point is that South Sudan is not used here as an outlier case placed at the edge of theory. It is the site from which theory is revised.

Finally, the policy lesson is intentionally modest but firm. Durable change requires more than program expansion, donor enthusiasm, or rhetorical commitment. It requires confronting the political beneficiaries of the status quo and redesigning institutions so that public order is no longer materially dependent on selective coercion, exclusion, opacity, or displacement. That conclusion travels well beyond the immediate topic.

10. Future Research Agenda

Future research could extend the argument in at least two directions. One path would deepen the comparative portfolio while holding the mechanism constant, allowing stronger inferences about how far the concept of shadow security state travels across African cases. Another would widen the evidence base through systematic archival recovery, panel reporting, or longitudinal fieldwork oriented toward institutional adaptation over time.

A second research path concerns measurement. Scholars could develop indicators that do not simply count formal reform outputs but instead capture how discretion, opacity, and distributive selectivity are organised in practice. That work would be especially useful for connecting qualitative field-based research to wider comparative debates without sacrificing the political specificity that makes African case studies analytically valuable.

There is also scope for more explicit dialogue between qualitative process tracing and carefully selected quantitative indicators. Used cautiously, such indicators would not replace the mechanism advanced here; they would help specify when it intensifies, when it weakens, and which institutional combinations matter most. That agenda would be especially valuable for scholars trying to connect African case knowledge to wider comparative political science and political-economy debates.

11. Conclusion

This article has argued that the National Security Service should be understood less as a neutral intelligence bureaucracy than as a regime-preservation institution whose legal ambiguity, budget opacity, and discretionary coercive reach stabilise elite rule while hollowing out public accountability. By reconstructing the theoretical lineages named in the topic brief, translating them into a mechanism-based framework, and grounding that framework in the South Sudanese case, the manuscript shows why institutions that appear sectoral are often central to the reproduction of political order.

The central analytical payoff is the concept of shadow security state. It captures a dynamic in which formal design, practical operation, and wider political effect reinforce one another. Read in this way, the article contributes simultaneously to debates on African governance, conflict analysis, and institutional design while preserving the specificity of South Sudanese experience.

The larger implication is that post-conflict transformation requires more than formal reform. It requires changing the incentive structures through which authority is exercised, resources are distributed, and legitimacy is materially sustained. That conclusion is relevant both to the immediate topic and to wider debates on how fragile states are governed in practice.

References

Jacobsen, Claudia (2006). Making Intelligence Accountable: Legal Standards and Best Practice for Oversight of Intelligence Agencies. The Military Law and the Law of War Review, 45(3-4), 460-461. https://doi.org/10.4337/mllwr.2006.3-4.17 [Link]
Bruneau, Thomas C.; Matei, Florina Cristiana (CRIS) (2008). Towards a New Conceptualization of Democratization and Civil-Military Relations. Democratization, 15(5), 909-929. https://doi.org/10.1080/13510340802362505 [Link]
Geddes, Barbara (1999). What Do We Know About Democratization After Twenty Years?. Annual Review of Political Science, 2(1), 115-144. https://doi.org/10.1146/annurev.polisci.2.1.115 [Link]
G.A. van Klinken (2011). Debate [Review of: D. Slater (2010) Ordering power: contentious politics and authoritarian Leviathans in Southeast Asia]. Bijdragen tot de taal- land- en volkenkunde / Journal of the Humanities and Social Sciences of Southeast Asia, 167(4), 515-519. https://www.narcis.nl/publication/RecordID/oai%3Apure.knaw.nl%3Apublications%2F685cd900-7ac2-4328-9b90-cbc75b5855bc [Link]
Tom Lavers (2012). ‘Land grab’ as development strategy? The political economy of agricultural investment in Ethiopia. The Journal of Peasant Studies, 39(1), 105-132. https://doi.org/10.1080/03066150.2011.652091 [Link]
Theo Vos; Christine A. Allen; Megha Arora; Ryan M Barber; Zulfiqar A Bhutta; Alexandria Brown; Austin Carter; Daniel Casey; Fiona Charlson; Alan Z Chen; Megan Coggeshall; Leslie Cornaby; Lalit Dandona; Daniel Dicker; Tina Dilegge; Holly E Erskine; Alize J Ferrari; Christina Fitzmaurice; Tom Fleming; Mohammad H. Forouzanfar; Nancy Fullman; Peter W. Gething; Ellen M Goldberg; Nicholas Graetz; Juanita A. Haagsma; Simon I Hay; Catherine O. Johnson; Nicholas J Kassebaum; Toana Kawashima; Laura Kemmer; Fakher Rahim; Yohannes Kinfu; Hmwe Hmwe Kyu; Janni Leung; Xiaofeng Liang; Stephen S Lim; Alan D López; Rafael Lozano; Laurie B. Marczak; George A. Mensah; Ali H. Mokdad; Mohsen Naghavi; Grant Nguyen; Elaine O. Nsoesie; Helen Elizabeth Olsen; David M. Pigott; Christine Pinho; Zane Rankin; Nikolas Reinig; Joshua A. Salomon; Logan Sandar; A. Gordon Smith; Jeffrey D Stanaway; Caitlyn Steiner; Stephanie Teeple; Bernadette A Thomas; Christopher Troeger; Joseph A. Wagner; Haidong Wang; Valentine Wanga; Harvey Whiteford; Leo Zoeckler; Amanuel Alemu Abajobir; Kalkidan Hassen Abate; Cristiana Abbafati; Kaja Abbas; Foad Abd-Allah; Biju Abraham; Ibrahim Abubakar; Laith J. Abu‐Raddad; Niveen M. E. Abu-Rmeileh; Ilana N. Ackerman; Akindele O. Adebiyi; Zanfina Ademi; Arsène Kouablan Adou; Kossivi Agbélénko Afanvi; Emilie Agardh; Arnav Agarwal; Ali Kiadaliri; Hamid Ahmadieh; Oluremi N Ajala; Rufus Akinyemi; Nadia Akseer; Ziyad Al‐Aly; Khurshid Alam; Noore Alam; Saleh Fahed Aldhahri; Miguel Angel Alegretti; Zewdie Aderaw Alemu; Lily Alexander; Samia Alhabib; Raghib Ali; Ala’a Alkerwi; François Alla; Peter Allebeck; Rajaa Al‐Raddadi; Ubai Alsharif; Khalid A Altirkawi; Nelson Alvis‐Guzmán; Azmeraw T. Amare (2016). Global, regional, and national incidence, prevalence, and years lived with disability for 310 diseases and injuries, 1990–2015: a systematic analysis for the Global Burden of Disease Study 2015. The Lancet, 388(10053), 1545-1602. https://doi.org/10.1016/s0140-6736(16)31678-6 [Link]
Joachim J. Savelsberg (2015). Representing Mass Violence: Conflicting Responses to Human Rights Violations in Darfur. https://doi.org/10.1525/luminos.4 [Link]
Moses Jeremiah Barasa Kabeyi; Oludolapo Akanni Olanrewaju (2022). Sustainable Energy Transition for Renewable and Low Carbon Grid Electricity Generation and Supply. Frontiers in Energy Research, 9. https://doi.org/10.3389/fenrg.2021.743114 [Link]
Sonali McDermid; Mallika Nocco; Patricia Lawston-Parker; Jessica Keune; Yadu Pokhrel; Meha Jain; Jonas Jägermeyr; Luca Brocca; Christian Massari; Andrew D. Jones; Pouya Vahmani; Wim Thiery; Yi Yao; Andrew Reid Bell; Liang Chen; Wouter Dorigo; Naota Hanasaki; Scott Jasechko; Min‐Hui Lo; Rezaul Mahmood; Vimal Mishra; Nathaniel D. Mueller; Dev Niyogi; Sam S. Rabin; Lindsey Sloat; Yoshihide Wada; Luca Zappa; Fei Chen; Benjamin I. Cook; Hyungjun Kim; Danica Lombardozzi; Jan Polcher‬; Dongryeol Ryu; Joe Santanello; Yusuke Satoh; Sonia I. Seneviratne; Deepti Singh; Tokuta Yokohata (2023). Irrigation in the Earth system. Nature Reviews Earth & Environment, 4(7), 435-453. https://doi.org/10.1038/s43017-023-00438-5 [Link]
Eyal Zisser (2019). Israel and the Arab World – Renewal of the Alliance of the Periphery. Athens Journal of Mediterranean Studies, 5(4), 225-240. https://doi.org/10.30958/ajms.5-4-2 [Link]

References

Jacobsen, Claudia (2006). Making Intelligence Accountable: Legal Standards and Best Practice for Oversight of Intelligence Agencies. The Military Law and the Law of War Review, 45(3-4), 460-461. https://doi.org/10.4337/mllwr.2006.3-4.17 [Link]
Bruneau, Thomas C.; Matei, Florina Cristiana (CRIS) (2008). Towards a New Conceptualization of Democratization and Civil-Military Relations. Democratization, 15(5), 909-929. https://doi.org/10.1080/13510340802362505 [Link]
Geddes, Barbara (1999). What Do We Know About Democratization After Twenty Years?. Annual Review of Political Science, 2(1), 115-144. https://doi.org/10.1146/annurev.polisci.2.1.115 [Link]
G.A. van Klinken (2011). Debate [Review of: D. Slater (2010) Ordering power: contentious politics and authoritarian Leviathans in Southeast Asia]. Bijdragen tot de taal- land- en volkenkunde / Journal of the Humanities and Social Sciences of Southeast Asia, 167(4), 515-519. https://www.narcis.nl/publication/RecordID/oai%3Apure.knaw.nl%3Apublications%2F685cd900-7ac2-4328-9b90-cbc75b5855bc [Link]
Tom Lavers (2012). ‘Land grab’ as development strategy? The political economy of agricultural investment in Ethiopia. The Journal of Peasant Studies, 39(1), 105-132. https://doi.org/10.1080/03066150.2011.652091 [Link]
Theo Vos; Christine A. Allen; Megha Arora; Ryan M Barber; Zulfiqar A Bhutta; Alexandria Brown; Austin Carter; Daniel Casey; Fiona Charlson; Alan Z Chen; Megan Coggeshall; Leslie Cornaby; Lalit Dandona; Daniel Dicker; Tina Dilegge; Holly E Erskine; Alize J Ferrari; Christina Fitzmaurice; Tom Fleming; Mohammad H. Forouzanfar; Nancy Fullman; Peter W. Gething; Ellen M Goldberg; Nicholas Graetz; Juanita A. Haagsma; Simon I Hay; Catherine O. Johnson; Nicholas J Kassebaum; Toana Kawashima; Laura Kemmer; Fakher Rahim; Yohannes Kinfu; Hmwe Hmwe Kyu; Janni Leung; Xiaofeng Liang; Stephen S Lim; Alan D López; Rafael Lozano; Laurie B. Marczak; George A. Mensah; Ali H. Mokdad; Mohsen Naghavi; Grant Nguyen; Elaine O. Nsoesie; Helen Elizabeth Olsen; David M. Pigott; Christine Pinho; Zane Rankin; Nikolas Reinig; Joshua A. Salomon; Logan Sandar; A. Gordon Smith; Jeffrey D Stanaway; Caitlyn Steiner; Stephanie Teeple; Bernadette A Thomas; Christopher Troeger; Joseph A. Wagner; Haidong Wang; Valentine Wanga; Harvey Whiteford; Leo Zoeckler; Amanuel Alemu Abajobir; Kalkidan Hassen Abate; Cristiana Abbafati; Kaja Abbas; Foad Abd-Allah; Biju Abraham; Ibrahim Abubakar; Laith J. Abu‐Raddad; Niveen M. E. Abu-Rmeileh; Ilana N. Ackerman; Akindele O. Adebiyi; Zanfina Ademi; Arsène Kouablan Adou; Kossivi Agbélénko Afanvi; Emilie Agardh; Arnav Agarwal; Ali Kiadaliri; Hamid Ahmadieh; Oluremi N Ajala; Rufus Akinyemi; Nadia Akseer; Ziyad Al‐Aly; Khurshid Alam; Noore Alam; Saleh Fahed Aldhahri; Miguel Angel Alegretti; Zewdie Aderaw Alemu; Lily Alexander; Samia Alhabib; Raghib Ali; Ala’a Alkerwi; François Alla; Peter Allebeck; Rajaa Al‐Raddadi; Ubai Alsharif; Khalid A Altirkawi; Nelson Alvis‐Guzmán; Azmeraw T. Amare (2016). Global, regional, and national incidence, prevalence, and years lived with disability for 310 diseases and injuries, 1990–2015: a systematic analysis for the Global Burden of Disease Study 2015. The Lancet, 388(10053), 1545-1602. https://doi.org/10.1016/s0140-6736(16)31678-6 [Link]
Joachim J. Savelsberg (2015). Representing Mass Violence: Conflicting Responses to Human Rights Violations in Darfur. https://doi.org/10.1525/luminos.4 [Link]
Moses Jeremiah Barasa Kabeyi; Oludolapo Akanni Olanrewaju (2022). Sustainable Energy Transition for Renewable and Low Carbon Grid Electricity Generation and Supply. Frontiers in Energy Research, 9. https://doi.org/10.3389/fenrg.2021.743114 [Link]
Sonali McDermid; Mallika Nocco; Patricia Lawston-Parker; Jessica Keune; Yadu Pokhrel; Meha Jain; Jonas Jägermeyr; Luca Brocca; Christian Massari; Andrew D. Jones; Pouya Vahmani; Wim Thiery; Yi Yao; Andrew Reid Bell; Liang Chen; Wouter Dorigo; Naota Hanasaki; Scott Jasechko; Min‐Hui Lo; Rezaul Mahmood; Vimal Mishra; Nathaniel D. Mueller; Dev Niyogi; Sam S. Rabin; Lindsey Sloat; Yoshihide Wada; Luca Zappa; Fei Chen; Benjamin I. Cook; Hyungjun Kim; Danica Lombardozzi; Jan Polcher‬; Dongryeol Ryu; Joe Santanello; Yusuke Satoh; Sonia I. Seneviratne; Deepti Singh; Tokuta Yokohata (2023). Irrigation in the Earth system. Nature Reviews Earth & Environment, 4(7), 435-453. https://doi.org/10.1038/s43017-023-00438-5 [Link]
Eyal Zisser (2019). Israel and the Arab World – Renewal of the Alliance of the Periphery. Athens Journal of Mediterranean Studies, 5(4), 225-240. https://doi.org/10.30958/ajms.5-4-2 [Link]