Adam Driver in The Report. |
After the September 11 attacks, the CIA requested authorization to use what it euphemistically called “enhanced interrogation techniques” (“EIT” for short) and received authorization from National Security Advisor Condoleezza Rice to do so in July of 2002. (Not that the agency waited to start torturing – the authorization gave legal cover to what was already happening.) She did so after White House discussions with Vice President Dick Cheney, Secretary of State Colin Powell, Defense Secretary Donald Rumsfeld, and Attorney General John Ashcroft, and after the Department of Justice drafted what have come to be known as “Torture Memos,” wherein Deputy Assistant Attorney General John Yoo justified the torture of detainees believed to be involved with the 9/11 disasters. As late as 2010, after President Obama had ended EIT with one of his first executive orders, Cheney and Rice were still denying that the CIA had ever tortured prisoners in its charge.
In 2005, CIA official Jose Rodriguez destroyed videotapes of the torture of two suspects in CIA custody, Abu Zubaydah and Abd al-Rahim al-Nashiri. Their existence was unknown until The New York Times revealed it in 2007. The report understandably caused outrage, and the Senate Select Committee on Intelligence began to look into it. A young staffer named Daniel Jones reviewed documents covering the same time period and prisoners as the destroyed tapes and discovered that the treatment of the two men was far more brutal than anyone had been led to believe. He also discovered that the torture didn’t work: no actionable intelligence resulted from the horrific conduct.
The shocked committee expanded its investigations, which led to the creation and release of the “Torture Report,” a massive piece of work by Jones and his very small staff, who reviewed over six million documents in the face of CIA insistence that the torture was successful, stonewalling by John Brennan, Obama’s CIA director, CIA intrusion into the Senate Committee’s computer networks, and the removal of documents from that network.