Feeds

CIA erased waterboarding videos

'It was done in line with the law,' insists top spook

Mobile application security vulnerability report

The director of the CIA has admitted that videotapes of American intelligence operatives using harsh interrogation methods on terrorist suspects have been destroyed.

The interrogations in question are said to have taken place in 2002, when the US intelligence community had been unleashed by a vengeful president in response to 9/11. At that point, the CIA was specifically authorised by George Bush to use a range of interrogation measures not permitted to other US agencies.

The most famous of these means is so-called "waterboarding", where a prisoner is made to feel that he is drowning by having water poured onto a gag. Many commentators consider this to be torture, and in fact the method has now become so controversial that - reportedly - it is no longer allowed to the CIA, which has eased off substantially from its aggressive posture in the year or so immediately after 9/11.

It is thought that the 2002 tapes may have shown the interrogation of Abu Zubaydah, the first terror suspect seized by the CIA in the post-9/11 era. Zubaydah, under severe questioning, was said to have led the US to his comrade Ramzi Binalshibh. Binalshibh, harshly-questioned/tortured in his turn - and possibly also in the now-destoyed tapes - supposedly gave information which led to the capture in 2003 of Khalid Sheikh Mohammed, believed to have masterminded the 9/11 attacks. Mohammed is also said to have provided a great deal of key information after his capture.

British intelligence officers have since made it clear to their Parliamentary oversight body that they believe the US spies were using torture at this stage, and that a lot of useful intelligence was gained as a result.

It appears that the videos in this case were destroyed in 2005. Yesterday, aware that this fact was to be published by the New York Times, CIA head and former general Michael Hayden sent a letter to all CIA personnel - a copy of which was soon obtained by the AP news wire.

"The agency was determined that it proceed in accord with established legal and policy guidelines. So, on its own, CIA began to videotape interrogations," Hayden wrote, putting the point of view that the videos - while probably quite shocking viewing - showed compliance with the executive orders then in force.

That being the case, one might ask why they were destroyed.

"The tapes posed a serious security risk," according to Hayden.

"Were they ever to leak, they would permit identification of your CIA colleagues who had served in the programme, exposing them and their families to retaliation from al-Qaida and its sympathisers."

This is also true of many another document or file held by the agency, yet not destroyed. However Hayden says there was nothing to hide.

"What matters here is that it [the interrogation] was done in line with the law," Hayden said in his letter.

"Over the course of its life, the agency's interrogation programme has been of great value to our country. It has helped disrupt terrorist operations and save lives. It was built on a solid foundation of legal review. It has been conducted with careful supervision. If the story of these tapes is told fairly, it will underscore those facts."

It is said by intelligence insiders that the CIA's "enhanced interrogation" powers have now been seriously cut back. Legislation is pending which would remove these powers altogether.

There is also an ongoing legal dispute as to whether the US intelligence community flouted evidence-disclosure rules in relation to the trial of another 9/11 conspirator, Zacarias Moussaoui. His lawyers' requests for interrogation recordings became most troublesome in 2005, around the time that the tapes under discussion were wiped.

However, much as the CIA's few years of post-9/11 special powers may be coming to an end, it is unlikely that the use of torture and extralegal procedures against terrorist suspects outside the USA will stop now, or that it only began in 2002. Former CIA man Bob Baer, speaking of his own service in the 1980s and 90s, famously said:

"If you want a serious interrogation, you send a prisoner to Jordan. If you want them to be tortured, you send them to Syria. If you want someone to disappear - never to see them again - you send them to Egypt."

Waterboarding is actually rather mild and civilised in this context. The unusual thing here is that the strongarm work was being done by American operatives with the knowledge of their bosses, rather than by proxy or without permission.

More coverage from the New York Times here, and from AP here

Mobile application security vulnerability report

More from The Register

next story
UK.gov's Open Source switch WON'T get rid of Microsoft, y'know
What do you mean, we've ditched Redmond in favour of IBM?!
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
Major problems beset UK ISP filth filters: But it's OK, nobody uses them
It's almost as though pr0n was actually rather popular
US Social Security 'wasted $300 million on an IT BOONDOGGLE'
Scrutiny committee bods probe derailed database project
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Australia floats website blocks and ISP liability to stop copyright thieves
Big Content could get the right to order ISPs to stop traffic
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.