Feeds

Musos demand Guantanamo Bay playlist

Were Bee Gees used to torture suspects?

Eight steps to building an HP BladeSystem

A coalition of musicians is demanding the US government cough a list of tracks allegedly used to torture inmates of Guantanamo Bay, as former prisoners claim they were subjected to the Bee Gees, Britney Spears and Sesame Street at "ear-splitting level".

According to the Telegraph, the National Security Archive in Washington has sent a Freedom of Information (FOI) request to agencies including CIA, FBI and Department of Defence on behalf of artists such as Billy Bragg, Pearl Jam, Rage Against The Machine and REM.

The Archive's executive director, Thomas Blanton, insisted: "At Guantanamo, the US government turned a jukebox into an instrument of torture."

Jayne Huckerby, research director at New York University's Centre for Human Rights and Global Justice, claimed the CIA turned the dial up to ten to "humiliate, terrify, punish, disorient and deprive detainees of sleep, in violation of international law".

Rage Against The Machine guitarist Tom Morello raged: "The fact that music I helped create was used as a tactic against humanity sickens me. We need to end torture and close Guantanamo now."

CIA spokesman George Little insisted the music was employed for "security" and "not for punitive purposes". He assured the volume level was "far below a live band". ®

Boost IT visibility and business value

More from The Register

next story
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.