Guantanamo and the Abuse of Presidential Power
eBook - ePub

Guantanamo and the Abuse of Presidential Power

Guantanamo and the Abuse of Presidential Power

  1. 336 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Guantanamo and the Abuse of Presidential Power

Guantanamo and the Abuse of Presidential Power

Book details
Book preview
Table of contents
Citations

About This Book

In his address to the nation on September 20, 2001, President Bush declared war on terrorism and set in motion a detention policy unlike any we have ever seen. Since then, the United States has seized thousands of people from around the globe, setting off a firestorm of controversy. Guantanamo and the Abuse of Presidential Power explores that policy and the intense debates that have followed. Written by an expert on the subject, one of the lawyers who fought -- and won -- the right for prisoners to have judicial review, this important book will be of immense interest to liberals and conservatives alike. With shocking facts and firsthand accounts, Margulies takes readers deep into the GuantĂĄnamo Bay prison, into the interrogation rooms and secret cells where hundreds of men and boys have been designated "enemy combatants." Held without legal process, they have been consigned to live out their days in isolation until the Bush administration sees fit to release them -- if itever does. Margulies warns Americans to be especially concerned by the administration's assertion that the Presidentcan have unlimited and unchecked legal authority. Tracing the arguments on both sides of the debate, this vitally important book paints a portrait of a country divided, on the brink of ethical collapse, where the loss of personal freedoms is under greater threat than ever before.

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Guantanamo and the Abuse of Presidential Power by Joseph Margulies in PDF and/or ePUB format, as well as other popular books in Politics & International Relations & Terrorism. We have over one million books available in our catalogue for you to explore.

Part One

Understanding
Camp Delta

One

“An Atmosphere of
Dependency and Trust”

I

In the Introduction, we saw for the first time—and apparently in spite of her best efforts—the methods of Sergeant Lacey, who, according to an FBI agent on the scene, grabbed a prisoner’s genitals in the course of an interrogation. We also learned about “detainee #63,” who “had been subjected to intense isolation for over three months,” after which time he was seen “evidencing behavior consistent with extreme psychological trauma (talking to non-existent people, reporting hearing voices, crouching in a corner of the cell covered with a sheet for hours on end). ” As we will see, Sergeant Lacey’s conduct is by no means an aberration. A Pentagon investigation confirmed “numerous instances” in which female interrogators, using dye, pretended to flick or spread menstrual blood on prisoners.1 The technique was intended to interfere with the prisoners’ prayer; a Pentagon official familiar with the investigation said, “If a woman touches him prior to prayer, then he’s dirty and can’t pray.” 2 Nor is this confined to Guantánamo. Since 9/11, the United States has opened approximately six hundred investigations into prisoner abuse. As of February 2006, ninety-eight prisoners had died in U.S. custody, and thirty-four of these deaths are being investigated by the military as suspected or confirmed homicides.3
These events naturally lead us to ask why the Administration created Camp Delta and the other prisons in the war on terror. One answer is that the Administration needed a place to hold captured prisoners, just as in any war. But these are not like the prisons we built for captives in World War II, or Korea, or Vietnam. To understand these prisons, we must return—however painful it may be—to that Tuesday morning, September 11, 2001. I was living in Minneapolis at the time and was driving to my office when I heard the news on the radio that the first World Trade Center tower had been hit by a plane. No one seemed to understand what had taken place, and there was some thought it may have been an accident. Inside, my colleagues and I watched the scene unfold on television. My wife was in Mexico City on business at the time and I reached her in her hotel. The telephone was our only connection, but we clung to it like a lifeline as the second plane crashed into the south tower. Soon we learned about the plane at the Pentagon, and not long after about the plane downed in Pennsylvania. This was not an accident.
For a time, all was chaos. Speculation flew and confusion reigned. There was a rumor that a plane was unaccounted for, somewhere near Seattle. Before long, all planes were grounded, leaving my wife stranded in Mexico. Like so many others, and though thousands of miles apart, we watched together on television as the stricken towers fell. We spent anxious hours trying to reach our friends in New York, many of whom lived and worked in the shadow of what came to be known as Ground Zero. But our efforts were in vain; lines were down and circuits were jammed. For the next several days, I shook my head in silent disbelief and could not help but cry at the tragic stories of family members wandering the streets of New York, checking hospitals and morgues, looking for the loved ones they had so casually kissed goodbye that Tuesday morning. We cannot escape these memories, nor should we try. And we cannot fairly evaluate what took place in the days, months, and even years that followed unless we are willing to keep these memories in mind.
The Bush Administration has not provided a complete explanation for its detention policy. (Part of the motivation for this book is that no one else has either.) But that explanation emerges clearly enough if we examine things from the Administration’s perspective, beginning with 9/11. On that day, al-Qaeda carried out the most destructive foreign attack on U.S. soil in this country’s history. Thousands died, and the lives of thousands of others were shattered forever. The damage to the economy quickly raced into the billions of dollars. More importantly, the nation emerged from that morning different from the night before, and not simply for the rage and confusion that followed in the wake of the attack.
And while September 11 was successful beyond the maddest dreams of its planners, it should not have been a complete surprise. As the 9/11 Commission and others have rightly pointed out, the threat of Islamic terrorism had been present for years:
  • 1993: A group led by Ramzi Yousef detonated a bomb at the base of the World Trade Center. The police also uncovered a plot by Sheik Omar Abdel Rahman to blow up a number of New York landmarks, including the Holland and Lincoln tunnels.
  • 1995: Police in Manila uncovered a plot by Yousef to blow up a dozen U.S. airliners over the Pacific.
  • 1996: A truck bomb in Dhahran, Saudi Arabia, exploded at the base of the Khobar Towers, killing nineteen U.S. servicemen and wounding hundreds of others.
  • 1998: Osama bin Laden issued his now infamous fatwa claiming it was God’s decree that Muslims kill Americans. Al-Qaeda operatives carried out nearly simultaneous truck bomb attacks on the U.S. embassies in Nairobi, Kenya, and Dar es Salaam, Tanzania, killing 224 and wounding thousands.
  • 1999: A U.S. Customs agent arrested Ahmed Ressam at the U.S.-Canadian border as he was smuggling explosives into the country. His target was Los Angeles International Airport.
  • 2000: Al-Qaeda operatives in Aden, Yemen, used a motorboat filled with explosives to blow a hole in the side of the USS Cole, killing seventeen servicemen.4
Though bin Laden was certainly a grave and growing threat, his success that morning in 2001 demonstrated just how little we knew about al-Qaeda, including the extent to which the terror network had penetrated American society and its plans for the future. Even if various intelligence agencies knew scattered pieces, in the years before 9/11 “there was no comprehensive review of what the intelligence community knew” about the organization.5 Whatever else 9/11 may signify, therefore, it surely represented a failure (and perhaps an indictment6) of the intelligence community. Three days after the attacks, Congress authorized the president to use “all necessary force” against those responsible.7 On September 20, the president vowed to meet this threat by using “every resource at our command,” including “every necessary weapon of war.” 8
Once the Administration decided to mount a military response, it was inevitable that the military (and, we will see, the CIA) would capture a substantial number of people. The Administration no doubt hoped at least some fraction of these prisoners would be members of al-Qaeda. But at the same time, the Administration must have considered that the number of prisoners with useful intelligence was potentially quite small. Military planners estimate that during counterinsurgency operations, the enemy “capture rate” “may be very low,” in part because the “failure of the enemy to wear a uniform or other recognizable insignia results in an identification problem. As a result, large numbers of civilian suspects may also be detained during operations.” 9 In Vietnam, for example, the military reported that only one of every six detainees taken into custody was actually a prisoner of war.10 But having these prisoners in custody provided the Administration with an opportunity to shed light on a dark and shadowy enemy—assuming it could identify the few prisoners with useful information, and extract it during interrogations.
The Bush Administration also might have expected this would be no easy task. Al-Qaeda, like a number of clandestine military organizations, is obsessed with secrecy. During the search of an alleged al-Qaeda member’s home in Manchester, England, police found a training manual that showed just how carefully the organization guards its internal structure. The manual cautioned members to establish widely dispersed cells “whose members do not know one another, so that if a cell member is caught the other cells would not be affected, and work would proceed normally.” 11 The manual also advised members to employ a variety of deceptions and subterfuges to disguise their identity and objectives. All of this makes the task of extracting intelligence from al-Qaeda agents that much more difficult. Yet, as we will see, U.S. military regulations explicitly prohibit torture and all forms of coercive interrogations. These regulations were written to comply with the Geneva Conventions, which were drafted to ensure that people captured during armed conflict are treated humanely.* If we followed the law, would we miss the chance to acquire valuable intelligence?
Finally, though 9/11 was undoubtedly a monstrous crime, the Bush Administration could have concluded that interrogations in the war on terror were fundamentally different from interrogations in a criminal case. A police interrogator typically wants to know whether a suspect committed a crime that took place sometime in the past. But a military interrogator typically wants to know the nature and character of the enemy, including its structure and future plans. Learning about a particular event that took place in the past may be only incidental to this purpose. The difference between police and military interrogations, therefore, is frequently (but not always) the difference between gathering evidence to be used in the prosecution of an event that has already taken place and gathering intelligence to be used for a military campaign that will take place in the future. And since 9/11 was principally an intelligence failure, the Administration could have believed the interrogations should look more like the latter than the former.12

II

The Administration’s vision of military intelligence-gathering is based on the “mosaic theory,” which maintains that intelligence—particularly human intelligence (labeled HUMINT and referring to intelligence extracted from people)—about an unconventional enemy is not likely to come from a single, all-important interrogation with one captured prisoner. By design, each prisoner knows only a small piece relating to his own involvement, and in some cases may not even understand the significance of that piece, which emerges only when combined with other, seemingly innocent, pieces of information culled from interrogations with every other prisoner. And with each new prisoner, analysts need to retrace their steps, cross-checking the new information against the old. This may require that prisoners be interviewed over and over again, even if they had been questioned at length only days or weeks earlier. Only through this painstaking process will a mosaic finally emerge that captures the complete picture of the enemy and its plans, or so the Administration maintains.
The Bush Administration first articulated this theory within days of 9/11, when it began to detain hundreds of people, most of whom were Muslim men, for alleged violations of their immigration status. These immigration detentions are not the focus of this book, since they took place within a preexisting legal framework.13 But these detentions are nonetheless important to our inquiry, because the Administration altered that framework in important ways that shed light on the eventual detentions at GuantĂĄnamo and elsewhere.
Prior to 9/11, people arrested for immigration violations were typically released on bond while their cases worked their way through the courts. For the immigration detentions after 9/11, however, the Administration adopted a wholesale policy of preventive detention—the controversial practice of incarcerating people while the government determines whether they did anything wrong.14 In scores of proceedings, the Administration defended this practice by submitting the same affidavit from FBI Agent Michael Rolince, who explained that “the business of counterterrorism intelligence gathering in the United States is akin to the construction of a mosaic.” 15 According to Rolince:
At this stage of the investigation, the FBI is gathering and processing thousands of bits and pieces of information that may seem innocuous at first glance. We must analyze all that information, however, to see if it can be fit into a picture that will reveal how the unseen whole operates…. What may seem trivial to some may appear of great moment to those within the FBI or the intelligence community who have a broader context within which to consider a questioned item or isolated piece of information. At the present stage of this vast investigation, the FBI is gathering and culling information that may corroborate or diminish our current suspicions of the individuals who have been detained…. In the meantime, the FBI has been unable to rule out the possibility that respondent is somehow linked to, or possesses knowledge of, the terrorist attacks on the World Trade Center and the Pentagon. To protect the public the FBI must exhaust all avenues of investigation while ensuring that critical information does not evaporate pending further investigation.16
At the same time, the Administration wanted to construct this “mosaic” in secret. It refused to disclose “the number of people arrested, their names, their lawyers, the reasons for their detention, and other information related to their whereabouts and circumstances.” 17 It also ordered that the press be excluded from all immigration proceedings involving these detainees, and that the cases not be listed on the public docket. But secret arrests and closed courts are virtually unheard of in this country. The government had never before tried to close an entire set of cases based on a blanket, undifferentiated claim that closure was a good idea, rather than on a case-by-case demonstration of need. A number of organizations filed requests under the Freedom of Information Act seeking, among other things, the names of the prisoners and their attorneys, the location of their arrest, and the location of their incarceration.18
The Administration refused to budge, arguing that even the most modest disclosures would threaten national security. The organizations sued in federal court in Washington, D.C., and the Administration defended its claim to secrecy in a declaration by James Reynolds, chief of the Terrorism and Violent Crime Section in the Criminal Division of the Justice Department. In his declaration, Reynolds warned that “as long as these investigations remain open and active, disclosing the information in question could result in significant harm to the interests of the United States….” 19
[R]eleasing the names of the detainees who may be associated with terrorism and their place and date of arrest would reveal the direction and progress of the investigations by identifying where DOJ [Justice] is focusing its efforts. In effect, it would allow terrorist organizations to map the progress of the investigation and thereby develop the means to impede them. Even disclosing the identities of those detainees who have been released may reveal details about the focus and scope of the investigation and thereby allow terrorists to counteract it…. The rationale that underlies the withholding of the names of the detainee...

Table of contents

  1. Cover
  2. Dedication
  3. Epigraph
  4. Preface
  5. Introduction
  6. Part One: Understanding Camp Delta
  7. 1 “An Atmosphere of Dependency and Trust”
  8. 2 “Debility, Dependence, and Dread”
  9. 3 “The System That Has Been Developed”
  10. Part Two: Unlike Any Other We Have Ever Seen
  11. 4 “You Are Now the Property of the U.S. Marine Corps”
  12. 5 Debating Torture
  13. 6 “The More Subtle Kind of Torment”
  14. Part Three: “Our Executive Doesn’t”
  15. 7 “War Is Not a Blank Check”
  16. 8 A Pattern of Deceit
  17. 9 “Finding Someone Else to Do Your Dirty Work”
  18. Part Four: The Future of Camp Delta
  19. 10 What If He’s a Shepherd?
  20. 11 Asking Why
  21. 12 “Just Shut It Down and Then Plow It Under”
  22. Acknowledgments
  23. Notes
  24. Index
  25. Copyright