Inside the Islamist Terrorist's Mind: a Conversation With

Total Page:16

File Type:pdf, Size:1020Kb

Inside the Islamist Terrorist's Mind: a Conversation With AMERICAN ENTERPRISE INSTITUTE INSIDE THE ISLAMIST TERRORIST’S MIND: A CONVERSATION WITH FORMER CIA INTERROGATOR JAMES MITCHELL BOOK DISCUSSION PARTICIPANTS: JAMES MITCHELL, AUTHOR MARC A. THIESSEN, AEI 9:30 AM – 11:00 AM TUESDAY, DECEMBER 6, 2016 EVENT PAGE: http://www.aei.org/events/inside-the-islamist-terrorists-mind-a- conversation-with-former-cia-interrogator-james-mitchell/ TRANSCRIPT PROVIDED BY DC TRANSCRIPTION – WWW.DCTMR.COM MARC THIESSEN: (In progress) — on September 11th, 2001, and how stunned our whole nation was at the ability of terrorists to penetrate our defenses and wreak such destruction in our midst. All of us were wondering who had attacked us, what do they want, and most importantly, what else were they planning? Today, we take for granted the fact that we know the answers to those questions, we know that the attacks were carried out by al Qaeda on the orders of Osama bin Laden, that they were conceived and executed by his operational commander, a terrorist mastermind named Khalid Sheikh Mohammed. But in those early days after 9/11, we didn’t know any of that. We almost knew nothing about the enemy who had hit us. We didn’t know that KSM was the mastermind of 9/11 or that he was the operational commander of al Qaeda or who his key accomplices were or what they were planning by way of follow-on attacks. And unbeknownst to us, there were actually two terror networks out there that were waiting to carry out the second wave. There was the KSM network that carried out 9/11, and then there was something called the Hambali network, which was a network of Southeast Asian terrorists that KSM had recruited because he knew we’d be on the lookout for Arab men. And they had a series of attacks planned that our guest today knows very well. But on 9/11, we didn’t know any of that. Then, beginning in 2002, we began to capture and interrogate senior terrorist leaders, men like Abu Zubaydah, Ramzi bin al- Shibh and the mastermind of 9/11, Khalid Sheikh Mohammed. And these captured terrorists gave us information that allowed the CIA to round up virtually all the key members of those networks and dismantle them and stop the attacks that they had planned. And today we are honored to have with us the man who interrogated those high- value terrorists and got them to provide that information that saved so many American lives, Dr. James Mitchell. In the 15 years since 9/11, no one has heard from KSM. He’s been isolated from the world, first in CIA custody, then in Guantanamo Bay. But Dr. Mitchell has spent thousands of hours with KSM and other senior al Qaeda operatives. He’s looked directly into the face of evil. And in doing so, he came to understand the terrorist mind, what drives them, what motivates them better than almost anyone in America because the terrorists told him what drives them and what they believe. And now, for the first time, Dr. Mitchell is sharing what KSM told him, including his opinions on US counterterrorism policy, the Bush administration’s response to 9/11, his plans for new attacks, and why KSM believes that ultimately they’re going to prevail, again, their war against America. Dr. Mitchell’s new books, “Enhanced Interrogation: Inside the Minds and Motives of the Islamic Terrorists Trying to Destroy America,” offers his first-person account of the CIA’s terrorist interrogation program, his personal interactions with the men who planned and executed the biggest and worst terrorist attack in history and people who would do it again gladly if they had the chance. This is the first time that Dr. Mitchell I believe is speaking in public at a forum like this about this, and so we’re very honored that you chose to join us here at AEI. Thank you for coming. JAMES MITCHELL: Thanks for having me. MR. THIESSEN: So the details of enhanced interrogation have been widely discussed and debated, and I’m sure when we get to the Q&A, we can get into some of those questions, but I’d like to focus today primarily on what you’ve learned from these terrorists in talking to them. But just so people understand that the conversations with KSM that you’re describing weren’t happening while he was strapped to a waterboard. MR. MITCHELL: Oh, no. MR. THIESSEN: Can you explain the difference between enhanced interrogation, debriefing, and also what you call “how you doing?” visits, right? Walk us through that. MR. MITCHELL: Okay. These enhanced interrogations that I was part of really only dealt with about 14 of the top folks. I didn’t have anything to do with the mid-level or low-level folks at all. And most of these interrogations took place over a period of time of about two weeks. KSM’s took about three weeks. And then after that, there was no enhanced interrogations for KSM — you know, none at all. And so our goal in doing enhanced interrogations was to get them to make some movement, to be willing to engage in the questions instead of rocking and chanting and doing the other sorts of things that they had previously been doing. And once they started doing that, we switched to social influence stuff because we know that the real way that you get the cooperation that you want is not by trying to coerce it out of them. It’s by getting them to provide the information in a way that they don’t feel particularly pressured to do it. And we had to be very, very careful when we were doing enhanced interrogations not to ask leading questions, not to try — we weren’t interested in confessions, you know. I don’t ever know — in fact, I don’t know a single — I’ve dealt with 13 or 14 of the worst ones, right, KSM, Zubaydah, Ramzi bin al-Shibh, al Nusri, the Cole bomber, I’ve dealt with a lot — and none of them refused to identify what they had done. I mean, so it wasn’t a matter of — we weren’t looking for confessions because confessions won’t stop attacks. What stops attacks is actionable intelligence. And the way that you can get the actionable intelligence dealt with is to get through these enhanced interrogations, get them working with you so that you can use social influence after that to get the information that you want because — so what we did is we moved very quickly to debriefing. And the way that worked was — for the CIA, interrogation was questioning a person who was deliberately trying to withhold information and was hostile about providing that. And it usually involved at least the possibility of some EITs, although we didn’t — you might be authorized to do EITs for 15 days, but we wouldn’t do EITs for 15 days, right? As soon as they started working with us, we moved away from it. And then, after that, we would gradually bring the subject matter experts in because I’m not the guy to be asking the questions. The guy you want to ask them the question is the expert on whatever the question is that they have. So we would bring in, in one case, the person who wrote the president’s daily briefs because he had questions that he wanted to ask Abu Zubaydah. So we’d bring in other people, and we would sit in there with them and help them without any kind of coercion at all to ask the questions that they were hoping to get. And then, once the person was completely able to — meaning the detainee was willing to engage with a debriefer, we got out of it. You know, we stepped back. We might still monitor; we might still go in in the beginning to see how things were going. But you need your WMD experts asking about WMD. You know, Jim Mitchell is not the guy to be making up intelligence requirements. That’s done by huge numbers of experts who are experts in the field, what I think is almost irrelevant. They would give me briefings on who these people were and intensive briefings on what expected before we did it. So you had interrogations, which usually took about two weeks. And then, their entire rest of the time, they were with the CIA, they were never subjected to EITs again — never, right? So KSM had three weeks of EITs and then never again, not even when they were trying to find out the location of bin Laden, not even when they were trying to get him to provide information that would allow us to identify the courier. And we knew he was lying to us. We did not use EITs on him because EITs were to be used to stop catastrophic attacks. And if it wasn’t an attack, Jim wasn’t interested in doing it, you know. And since I worked for them, they weren’t interested in doing it either. They don’t want to beast people to find out where somebody’s hiding, right? So there were interrogations, which were short, then there were debriefings, where you dealt specifically with intelligence requirements. And then there were a variety of other meetings that we had with the detainees. In my book I call them maintenance visits because that’s what the CIA called them, but we had great concerns about these guys once they started working with us getting sour because they were in isolation.
Recommended publications
  • Case 2:15-Cv-00286-JLQ Document 182-5 Filed 05/22/17
    Case 2:15-cv-00286-JLQ Document 182-5 Filed 05/22/17 Exhibit E Case 2:15-cv-00286-JLQ Document 182-5 Filed 05/22/17 1 2 3 4 Interrogating the Enemy 5 6 7 The Story of the CIA's Interrogation of Top al-Qa'ida Terrorists 8 9 10 (Working Title) 11 By James E. Mitchell, Ph.D., 12 Architect of the CIA Interrogation Program 13 14 With Bill Harlow 15 1 MJ00022577 Case 2:15-cv-00286-JLQ Document 182-5 Filed 05/22/17 1 long time ago not to be offended by this sort of posturing. It frequently went away when 2 you got on the ground and started working. 3 4 The operational psychologist told me that our task on the way over was to rough out a 5 design for the cell where Zubaydah was to be held. We were told that, because of his 6 importance as a potential source of intelligence and the severity of his injury, the cell 7 needed to be lighted 24 hours a day. Closed circuit TV cameras were also required. We 8 wanted Zubaydah focused on the interrogators and for the cell to not be a source of dis- 9 tracting stimulation, so we recommended they paint it white. Speakers were needed so 10 music could be played, mostly as sound masking for security reasons because the 11 guards were located just outside the door, but also, if ordered, as an irritant to wear on 12 him if he chose not to cooperate.
    [Show full text]
  • 15-L-1645/0 0 0 /194
    (b )( 1) (b)(3) NatSecAct TS::SC'l' Verbatim Transcript of Combatant Status Review Tribunal Hearing for IS'.'1 10024 OPENING REPORTER : On the record RECORDER: All rise. PRESIDENT: Remain seated and come to order. Go nhead. Recorder. RECORDER: This Tribunal is being conducle<l at 1328 March 10, 200 ; on board C.S. Naval Base Guantanamo Bav. Cuba. The following personnel are present: Captain (b)(6) United Slates Navy, President Lieutenant Colonel b) 6) • t..:nited States Air Force. Member Lieutenant Colonel (b)(6) United States Marine Corps. Member Lieutenant Colonel (b)(6) , United States Air F11rce, Personal Re pre sen ta the Language Analysis.+.--,...,..,,.,.---. (b)(6) ......... ..,.... Gunnery Sergeant (b)(6) l nited States Marine Corps. Reporter Lieutenant Colonel'-P!!~~) --"" . United States Anny, Recorder Captain (b)(6) 1:; c ge Advocate member »fthe Tribunal. OATH SESSION 1 RECORDER: All Rise. PRESIDE!\T: The Recorder will be sworn. Do you, Lieutenant Colonel j(b)(6) I solemnly swear that you will faithfully pcrfonn the duties as Recorder assigned in this Tribunai so help you God'' RECORDER: I do. PRESIDENT: The Reponer will now be :;worn. The Recorder will administer the oath. RECORDER: ()o you Gunnery Sergeant l(b)(6) ~wear or affinn that y<•u will faithfully <lis~: harge )'Our duties as Reporter assigned in this Tribunal ro help you God? REPORTER: I do. PRESIDENT: The Translator will be sworn. JSN #10024 Enclosure (3) Page I of27 (b )( 1) (b)(3) NatSecAct 15-L-1645/0 0 0/194 (b }( 1) (b)(3) NatSecAct TS:lSCJt RECORDER: Do you swear or affinn that you will faithrully perform 1he duties ofTranslaror in the case now in hearing so help you God? TRANSLATOR: I do PRESIDEN I': We will take a brief recess now in order in lo bring Detainee into the room.
    [Show full text]
  • Ordinanza Che Istituisce Provvedimenti Nei Confronti Delle Persone E Delle Organizzazioni Legate a Osama Bin Laden, Al Gruppo «Al-Qaïda» O Ai Taliban
    Ordinanza che istituisce provvedimenti nei confronti delle persone e delle organizzazioni legate a Osama bin Laden, al gruppo «Al-Qaïda» o ai Taliban Modifica del 27 aprile 2012 Il Dipartimento federale dell’economia, visto l’articolo 16 della legge del 22 marzo 20021 sugli embarghi, ordina: I L’allegato 2 dell’ordinanza del 2 ottobre 20002 che istituisce provvedimenti nei confronti delle persone e delle organizzazioni legate a Osama bin Laden, al gruppo «Al-Qaïda» o ai Taliban è modificato secondo la versione qui annessa. II La presente modifica entra in vigore il 1° maggio 2012.3 27 aprile 2012 Dipartimento federale dell’economia: Johann N. Schneider-Ammann 1 RS 946.231 2 RS 946.203 3 La presente mod. è stata pubblicata in via straordinaria il 30 apr. 2012 (art. 7 cpv. 3 LPubl; RS 170.512). 2012-0849 1 Provvedimenti nei confronti delle persone e delle organizzazioni legate RU 2012 a Osama bin Laden, al gruppo «Al-Qaïda» o ai Taliban Allegato 2 (art. 1, 3 cpv. 1 e 2, art. 4 e 4a) Sono aggiunte le iscrizioni seguenti: A. Elenco di persone fisiche appartenenti o associate ai Taliban (131 persone) TI.A.160.12. Name: 1: ABDUL SAMAD 2: ACHEKZAI 3: na 4: na Title: na Designation: na DOB: 1970 POB: Afghanistan Good quality a.k.a.: Abdul Samad Low quality a.k.a.: na Nationality: Afghan Passport no.: na National identification no.: na Address: na Listed on: 2 Mar. 2012 Other infor- mation: Senior Taliban member responsible for the manufacturing of improvised explosive devices (IED). Involved in recruiting and deploying suicide bombers to conduct attacks in Afghanistan.
    [Show full text]
  • Video-Recorded Decapitations - a Seemingly Perfect Terrorist Tactic That Did Not Spread Martin Harrow DIIS Working Paper 2011:08 WORKING PAPER
    DIIS working paper DIIS WORKING PAPER 2011:08 Video-recorded Decapitations - A seemingly perfect terrorist tactic that did not spread Martin Harrow DIIS Working Paper 2011:08 WORKING PAPER 1 DIIS WORKING PAPER 2011:08 MARTIN HARROW MSC, PhD, Consulting Analyst at DIIS [email protected] DIIS Working Papers make available DIIS researchers’ and DIIS project partners’ work in progress towards proper publishing. They may include important documentation which is not necessarily published elsewhere. DIIS Working Papers are published under the responsibility of the author alone. DIIS Working Papers should not be quoted without the express permission of the author. DIIS WORKING PAPER 2011:08 © Copenhagen 2011 Danish Institute for International Studies, DIIS Strandgade 56, DK-1401 Copenhagen, Denmark Ph: +45 32 69 87 87 Fax: +45 32 69 87 00 E-mail: [email protected] Web: www.diis.dk Cover Design: Carsten Schiøler Layout: Ellen-Marie Bentsen Printed in Denmark by Vesterkopi AS ISBN: 978-87-7605-449-6 Price: DKK 25.00 (VAT included) DIIS publications can be downloaded free of charge from www.diis.dk 2 DIIS WORKING PAPER 2011:08 CONTENTS Abstract 4 Introduction 5 Decapitation as a weapon 5 Video-recorded decapitations 2002-2009 8 The reproductive dynamics of terrorist tactics 11 The accessibility of video-recorded decapitations as a tactic 12 Effectiveness of terrorism – impacting two different audiences 14 Why not video-recorded decapitations? 18 Iraq 18 Afghanistan 19 The West 20 Conclusion 21 List of References 23 DIIS WORKING PAPER 2011:08 ABSTracT Video-recorded decapitations have an enormous impact, they are cheap and easy, and they allow the terrorists to exploit the potential of the Internet.
    [Show full text]
  • Pakistan's Terrorism Dilemma
    14 HUSAIN HAQQANI Pakistan’s Terrorism Dilemma For more than a decade, Pakistan has been accused of sup- porting terrorism, primarily due to its support for militants opposing Indian rule in the disputed Himalayan territory of Jammu and Kashmir. Until September 11, 2001, Islamabad was also the principal backer of the Taliban regime in Afghanistan. Although Pakistan has now become a key U.S. ally in the war against terrorism, it is still seen both as a target and staging ground for terrorism. General Pervez Musharraf ’s military regime abandoned its alliance with the Taliban immediately after the terrorist attacks in New York and Washington. U.S. forces were allowed the use of Pakistani air bases for operations in Afghanistan. Pakistani intelligence services provided, and continue to provide, valuable information in hunting down Taliban and al-Qaeda escapees. The Pakistani military is cur- rently working with U.S. law enforcement officials in tracking down terrorists in the lawless tribal areas bordering Afghanistan. In a major policy speech on January 12, 2002, Musharraf announced measures to limit the influence of Islamic militants at home, including those previously described by him as “Kashmiri free- dom fighters.” “No organizations will be able to carry out terrorism 351 352 HUSAIN HAQQANI on the pretext of Kashmir,” he declared. “Whoever is involved with such acts in the future will be dealt with strongly whether they come from inside or outside the country.”1 Musharraf ’s supporters declared his speech as revolutionary.2 He echoed the sentiment of most Pakistanis when he said, “violence and terrorism have been going on for years and we are weary and sick of this Kalashnikov culture … The day of reckoning has come.” After the speech, the Musharraf regime clamped down on domes- tic terrorist groups responsible for sectarian killings.3 But there is still considerable ambivalence in Pakistan’s attitude toward the Kashmiri militants.
    [Show full text]
  • Torture and the Cruel, Inhuman and Degrading Treatment of Detainees: the Effectiveness and Consequences of 'Enhanced
    TORTURE AND THE CRUEL, INHUMAN AND DE- GRADING TREATMENT OF DETAINEES: THE EFFECTIVENESS AND CONSEQUENCES OF ‘EN- HANCED’ INTERROGATION HEARING BEFORE THE SUBCOMMITTEE ON THE CONSTITUTION, CIVIL RIGHTS, AND CIVIL LIBERTIES OF THE COMMITTEE ON THE JUDICIARY HOUSE OF REPRESENTATIVES ONE HUNDRED TENTH CONGRESS FIRST SESSION NOVEMBER 8, 2007 Serial No. 110–94 Printed for the use of the Committee on the Judiciary ( Available via the World Wide Web: http://judiciary.house.gov U.S. GOVERNMENT PRINTING OFFICE 38–765 PDF WASHINGTON : 2008 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 VerDate Aug 31 2005 15:46 Jul 29, 2008 Jkt 000000 PO 00000 Frm 00001 Fmt 5011 Sfmt 5011 H:\WORK\CONST\110807\38765.000 HJUD1 PsN: 38765 COMMITTEE ON THE JUDICIARY JOHN CONYERS, JR., Michigan, Chairman HOWARD L. BERMAN, California LAMAR SMITH, Texas RICK BOUCHER, Virginia F. JAMES SENSENBRENNER, JR., JERROLD NADLER, New York Wisconsin ROBERT C. ‘‘BOBBY’’ SCOTT, Virginia HOWARD COBLE, North Carolina MELVIN L. WATT, North Carolina ELTON GALLEGLY, California ZOE LOFGREN, California BOB GOODLATTE, Virginia SHEILA JACKSON LEE, Texas STEVE CHABOT, Ohio MAXINE WATERS, California DANIEL E. LUNGREN, California WILLIAM D. DELAHUNT, Massachusetts CHRIS CANNON, Utah ROBERT WEXLER, Florida RIC KELLER, Florida LINDA T. SA´ NCHEZ, California DARRELL ISSA, California STEVE COHEN, Tennessee MIKE PENCE, Indiana HANK JOHNSON, Georgia J. RANDY FORBES, Virginia BETTY SUTTON, Ohio STEVE KING, Iowa LUIS V. GUTIERREZ, Illinois TOM FEENEY, Florida BRAD SHERMAN, California TRENT FRANKS, Arizona TAMMY BALDWIN, Wisconsin LOUIE GOHMERT, Texas ANTHONY D.
    [Show full text]
  • Leaderless Jihad West Point Ctc Summaries
    ALL FEl INFflRNITIuII CONTAINED NEPEIN Tl1JCLPSIFIED DATE O1 LI 5l DIm1shn WEST POINT CTC SUMMARIES IC LEADERLESS JIHAD Terror Networks in the Twenty-First Century flivcrsit\ Pclms\ 1\ jnia Press 2015 The Islamist terrorist threat is radicalization Dr Marc Sageman MD global rapidly evolving process Islamic terror networks of the twenty-first century are before it reaches its Ph.D is forensic psychia more fluid and violent end The most effective trist and government coun becoming independent unpredictable than their more structured forebears that conducted countermeasure to tcrtcrrorism consultant He This book builds combat the homegrown holds various academic and die 9/11 attacks The present direat in the West has upon Dr Sagemans terrorist threat is evolved from infiltration outside trained includ by terronsts to the professional positions previous volume interrupt Scholar in Residence against ivhom international cooperation and border radicalization process ing at Understanding Ter before effective it reaches its the York Police protection are to homegrown self-financed New Depart ror 1\Tetlrorks 2004 vioient end Senior Fellow the self-trained terrorists Dr Sageman describes this ment at and utilizes die same scattered network of wannabes Research In global homegrown Porcign Policy approach of apply- as leaderless ihad The that form this stitute and Clinical Assistant groups ing the scientific method to the study of terronsm movement are physically uncoimected from al Qaeda Professor at the University Whereas in his book the author worked
    [Show full text]
  • Global War on Terrorism and Prosecution of Terror Suspects: Select Cases and Implications for International Law, Politics, and Security
    GLOBAL WAR ON TERRORISM AND PROSECUTION OF TERROR SUSPECTS: SELECT CASES AND IMPLICATIONS FOR INTERNATIONAL LAW, POLITICS, AND SECURITY Srini Sitaraman Introduction The global war on terrorism has opened up new frontiers of transnational legal challenge for international criminal law and counterterrorism strategies. How do we convict terrorists who transcend multiple national boundaries for committing and plotting mass atrocities; what are the hurdles in extraditing terrorism suspects; what are the consequences of holding detainees in black sites or secret prisons; what interrogation techniques are legal and appropriate when questioning terror suspects? This article seeks to examine some of these questions by focusing on the Global War on Terrorism (GWOT), particularly in the context of counterterrorism strategies that the United States have pursued towards Afghanistan-Pakistan (Af-Pak) since the September 2001 terror attacks on New York and Washington D.C. The focus of this article is on the methods employed to confront terror suspects and terror facilitators and not on the politics of cooperation between the United States and Pakistan on the Global War on Terrorism or on the larger military operation being conducted in Afghanistan and in the border regions of Pakistan. This article is not positioned to offer definitive answers or comprehensive analyses of all pertinent issues associated with counterterrorism strategies and its effectiveness, which would be beyond the scope of this effort. The objective is to raise questions about the policies that the United States have adopted in conducting the war on terrorism and study its implications for international law and security. It is to examine whether the overzealousness in the execution of this war on terror has generated some unintended consequences for international law and complicated the global judicial architecture in ways that are not conducive to the democratic propagation of human rights.
    [Show full text]
  • No Torture. No Exceptions
    NO TORTURE. NO EXCEPTIONS. The above sketch by Thomas V. Curtis, a former Reserve M.P. sergeant, is of New York Times an Afghan detainee, Dilawar, who was taken into U.S. custody on December 5, 2002, and died five days later. Dilawar was deprived of sleep and chained to the ceiling of his cell—techniques that the Bush administration has refused to outlaw for use by the CIA. Further, his legs were, according to a coroner, “pulpified” by repeated blows. Later evidence showed that Dilawar had no connection to the rocket attack for which he’d been apprehended. A sketch by Thomas Curtis, V. a Reserve M.P./The 16 January/February/March 2008 Introduction n most issues of the Washington Monthly, we favor ar- long-term psychological effects also haunt patients—panic ticles that we hope will launch a debate. In this issue attacks, depression, and symptoms of post-traumatic-stress Iwe seek to end one. The unifying message of the ar- disorder. It has long been prosecuted as a crime of war. In our ticles that follow is, simply, Stop. In the wake of Septem- view, it still should be. ber 11, the United States became a nation that practiced Ideally, the election in November would put an end to torture. Astonishingly—despite the repudiation of tor- this debate, but we fear it won’t. John McCain, who for so ture by experts and the revelations of Guantanamo and long was one of the leading Republican opponents of the Abu Ghraib—we remain one. As we go to press, President White House’s policy on torture, voted in February against George W.
    [Show full text]
  • True and False Confessions: the Efficacy of Torture and Brutal
    Chapter 7 True and False Confessions The Efficacy of Torture and Brutal Interrogations Central to the debate on the use of “enhanced” interrogation techniques is the question of whether those techniques are effective in gaining intelligence. If the techniques are the only way to get actionable intelligence that prevents terrorist attacks, their use presents a moral dilemma for some. On the other hand, if brutality does not produce useful intelligence — that is, it is not better at getting information than other methods — the debate is moot. This chapter focuses on the effectiveness of the CIA’s enhanced interrogation technique program. There are far fewer people who defend brutal interrogations by the military. Most of the military’s mistreatment of captives was not authorized in detail at high levels, and some was entirely unauthorized. Many military captives were either foot soldiers or were entirely innocent, and had no valuable intelligence to reveal. Many of the perpetrators of abuse in the military were young interrogators with limited training and experience, or were not interrogators at all. The officials who authorized the CIA’s interrogation program have consistently maintained that it produced useful intelligence, led to the capture of terrorist suspects, disrupted terrorist attacks, and saved American lives. Vice President Dick Cheney, in a 2009 speech, stated that the enhanced interrogation of captives “prevented the violent death of thousands, if not hundreds of thousands, of innocent people.” President George W. Bush similarly stated in his memoirs that “[t]he CIA interrogation program saved lives,” and “helped break up plots to attack military and diplomatic facilities abroad, Heathrow Airport and Canary Wharf in London, and multiple targets in the United States.” John Brennan, President Obama’s recent nominee for CIA director, said, of the CIA’s program in a televised interview in 2007, “[t]here [has] been a lot of information that has come out from these interrogation procedures.
    [Show full text]
  • Human Rights Watch All Rights Reserved
    HUMAN RIGHTS Delivered Into Enemy Hands US-Led Abuse and Rendition of Opponents to Gaddafi’s Libya WATCH Delivered Into Enemy Hands US-Led Abuse and Rendition of Opponents to Gaddafi’s Libya Copyright © 2012 Human Rights Watch All rights reserved. Printed in the United States of America ISBN: 1-56432-940-2 Cover design by Rafael Jimenez Human Rights Watch is dedicated to protecting the human rights of people around the world. We stand with victims and activists to prevent discrimination, to uphold political freedom, to protect people from inhumane conduct in wartime, and to bring offenders to justice. We investigate and expose human rights violations and hold abusers accountable. We challenge governments and those who hold power to end abusive practices and respect international human rights law. We enlist the public and the international community to support the cause of human rights for all. Human Rights Watch is an international organization with staff in more than 40 countries, and offices in Amsterdam, Beirut, Berlin, Brussels, Chicago, Geneva, Goma, Johannesburg, London, Los Angeles, Moscow, Nairobi, New York, Paris, San Francisco, Tokyo, Toronto, Tunis, Washington DC, and Zurich. For more information, please visit our website: http://www.hrw.org SEPTEMBER 2012 ISBN: 1-56432-940-2 Delivered Into Enemy Hands US-Led Abuse and Rendition of Opponents to Gaddafi’s Libya Summary ........................................................................................................................................... 1 Key Recommendations....................................................................................................................
    [Show full text]
  • Style Attacks and the Threat from Lashkar-E-Taiba
    PROTECTING THE HOMELAND AGAINST MUMBAI- STYLE ATTACKS AND THE THREAT FROM LASHKAR-E-TAIBA HEARING BEFORE THE SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE OF THE COMMITTEE ON HOMELAND SECURITY HOUSE OF REPRESENTATIVES ONE HUNDRED THIRTEENTH CONGRESS FIRST SESSION JUNE 12, 2013 Serial No. 113–21 Printed for the use of the Committee on Homeland Security Available via the World Wide Web: http://www.gpo.gov/fdsys/ U.S. GOVERNMENT PRINTING OFFICE 85–686 PDF WASHINGTON : 2013 For sale by the Superintendent of Documents, U.S. Government Printing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2250 Mail: Stop SSOP, Washington, DC 20402–0001 COMMITTEE ON HOMELAND SECURITY MICHAEL T. MCCAUL, Texas, Chairman LAMAR SMITH, Texas BENNIE G. THOMPSON, Mississippi PETER T. KING, New York LORETTA SANCHEZ, California MIKE ROGERS, Alabama SHEILA JACKSON LEE, Texas PAUL C. BROUN, Georgia YVETTE D. CLARKE, New York CANDICE S. MILLER, Michigan, Vice Chair BRIAN HIGGINS, New York PATRICK MEEHAN, Pennsylvania CEDRIC L. RICHMOND, Louisiana JEFF DUNCAN, South Carolina WILLIAM R. KEATING, Massachusetts TOM MARINO, Pennsylvania RON BARBER, Arizona JASON CHAFFETZ, Utah DONDALD M. PAYNE, JR., New Jersey STEVEN M. PALAZZO, Mississippi BETO O’ROURKE, Texas LOU BARLETTA, Pennsylvania TULSI GABBARD, Hawaii CHRIS STEWART, Utah FILEMON VELA, Texas RICHARD HUDSON, North Carolina STEVEN A. HORSFORD, Nevada STEVE DAINES, Montana ERIC SWALWELL, California SUSAN W. BROOKS, Indiana SCOTT PERRY, Pennsylvania MARK SANFORD, South Carolina GREG HILL, Chief of Staff MICHAEL GEFFROY, Deputy Chief of Staff/Chief Counsel MICHAEL S. TWINCHEK, Chief Clerk I. LANIER AVANT, Minority Staff Director SUBCOMMITTEE ON COUNTERTERRORISM AND INTELLIGENCE PETER T.
    [Show full text]