SIGN IN to access Harper’s Magazine
Need to create a login? Want to change your email address or password? Forgot your password?
1. Sign in to Customer Care using your account number or postal address.
2. Select Email/Password Information.
3. Enter your new information and click on Save My Changes.
Subscribers can find additional help here. Not a subscriber? Subscribe today!
As a result of Congressional demands, the Pentagon’s inspector general took a look at the way the Pentagon investigated mistreatment of detainees in its custody. The study was completed on August 25, 2006 and was classified “secret.” It has now been declassified and is available online.
This document is revealing on a number of points, but little about it is quite so revealing as how national security classifications have been wielded. There is a consistent pattern, namely passages have been classified either to avoid political embarrassment or to avoid documentation of official sanctioning of torture. Indeed, the major rationale for security classification is apparent enough: to insure that the document would not become public during the last weeks of a highly charged national election campaign.
Here are some key conclusions:
“Allegations of detainee abuse were not consistently reported,
investigated, or managed in an effective, systematic, and timely
“Reports of detainee abuse by special mission unit task force personnel
dated back to June 2003, but we believe it took the publicized abuse at
Abu Ghraib [in spring 2004]… to elevate the issue to the Flag Officer
“There are many well-documented reasons why detention and interrogation
operations were overwhelmed [including] … inconsistent training; a
critical shortage of skilled interrogators, translators, and guard
force personnel; and the external influence of special operations
forces and OGAs ["other government agencies," namely, the CIA].”
As is usually the case with Pentagon reports, the most interesting thing about this is what has not been considered. That would, of course, be the relationship between Donald Rumsfeld and his coterie to the process of abusing detainees. By commissioning not one, but more than a dozen separate inquiries, and by narrowly delimiting each investigation, Rumsfeld used his consummate diplomatic skills to avoid a comprehensive study of the problem and to avoid attracting any attention to himself. The other major tool he wielded was the security classification process, as investigators were repeatedly told that materials they sought were classified and were unavailable to them–particularly when the materials related to torture. Finally, as we see in this report, the Office of Secretary of Defense repeatedly intervened in the editorial process of the reports, pushing to neuter the executive summaries and conclusions.
More from Scott Horton:
Conversation — August 5, 2016, 12:08 pm
Sidney Blumenthal on the origins of the Republican Party, the fallout from Clinton’s emails, and his new biography of Abraham Lincoln
Conversation — March 30, 2016, 3:44 pm
Joseph Hickman discusses his new book, The Burn Pits, which tells the story of thousands of U.S. soldiers who, after returning from Iraq and Afghanistan, have developed rare cancers and respiratory diseases.
Years ago, I lived in Montana, a land of purple sunsets, clear streams, and snowflakes the size of silver dollars drifting through the cold air. There were no speed limits and you could legally drive drunk. My small apartment in Missoula had little privacy. In order to write, I rented an off-season fishing cabin on Rock Creek, a one-room place with a bed and a bureau. I lacked the budget for a desk. My idea was to remove a sliding door from a closet in my apartment and place it over a couple of hastily cobbled-together sawhorses.
Amount of U.S. military aid given to the government of El Salvador each minute during the 1980s:
A team of European sexologists reported that 40 percent of Italian couples were not having sex, due in part to Italian men’s declining sex drive and growing predilection for prostitutes and cybersex.
Telecommunications company AT&T agreed to buy Time Warner for $85.4 billion in a bid to find new ways to reach consumers, and hackers took control of Internet-connected cameras and baby monitors to overwhelm the routing company Dyn with traffic, causing worldwide disruption to outlets such as Netflix and Amazon.
Subscribe to the Weekly Review newsletter. Don’t worry, we won’t sell your email address!
"She never thanked me, never looked at me—melted away into the miserable night, in the strangest manner I ever saw. I have seen many strange things, but not one that has left a deeper impression on my memory than the dull impassive way in which that worn-out heap of misery took that piece of money, and was lost."