Beruflich Dokumente
Kultur Dokumente
Bakir, Vian. 2013. Torture, Intelligence and Sousveillance in the War on Terror: AgendaBuilding Struggles. Farnham: Ashgate. http://www.ashgate.com/isbn/9781472402554
Summary
Torture, Intelligence and Sousveillance in the War on Terror examines in depth the
agenda-building struggles of the Bush and Blair political administrations (and those of their
successors in the US and UK) over their use of torture to gain intelligence for the War on Terror
(2001-12). Given that the Bush Administrations torture-for-intelligence policy initiated soon
after 9/11 was kept secret for several years, as remains the level of complicity of the UK (and at
least 53 other nation-states governments, according to the report Globalizing Torture by the
Open Society Justice Initiative (2013)), this book deepens our understanding of processes of
Strategic Political Communication (SPC), and exposes dominant political discourses on the
torture-for-intelligence policy in the USA and its key ally, the UK. Importantly, it explores key
agendabuilding drivers that exposed the tortureintelligence nexus, not just in the Third Estate
(legislatures) and Fourth Estate (news and current affairs outlets), but also the Fifth Estate (that
realm of digital and social media that advances the peoples right and ability to communicate).
These discursive modes of resistance to SPC comprise unauthorized insider leaks and official
investigations (Third Estate); investigative journalism and real-time reporting stemming from
new media technologies (Fourth Estate); and Non-Governmental Organisation activity and
sousveillance (this comprising communitybased recording from firstperson perspectives) (Fifth
Estate). I unearth the power-knowledge relationships imbued within the torture-intelligence
nexus; and evaluate the strengths and weaknesses of the various modes of resistance to SPC. This
facilitates an assessment of the health of the public sphere across the Third, Fourth and Fifth
Estates.
Methodology
There is a large body of work on the medias role in agendabuilding processes
dating back to the1960s and continuing to flourish today, examining to what extent, and how,
policymakers, the media and the public influence each others agendas. This book is a
longitudinal agendabuilding study, overlaid with critical approaches concerning power and
knowledge. Unlike standard approaches to agenda-building that assume the permanent
importance of specific media outlets in agendabuilding, or specific measures of public and
political opinion and their hypothesized mutual influence, I am more interested in how
protagonists act to build agendas based on their own perceptions of what is significant
although the challenge was how to achieve this without insider access. My approach necessitated
a reconstruction of the web of influence of key texts publicly cited by key protagonists in the case
studies examined while remaining mindful of concurrent policy choices made in the use of
torture to extract intelligence, many of these policies remaining secret for years. I call this a
protagonistdirected approach to agendabuilding.
It generated an ever-expanding mass of key texts - such as news reports, current
affairs programmes, legal and policy documents, public inquiries, photographs, memoirs, and
NGO reports. I organized these into seven archives which were then cross-referenced, compared
and critically analyzed to unearth agenda-building struggles.
- Archive One: Once Secret Declassified and Leaked Official Documents
- Archive Two: Public Inquiries, Official Investigations and Court Proceedings
- Archive Three: NGO Documentation
- Archive Four: Memoirs and Accounts of Key Protagonists
- Archive Five: Histories Written by Journalists, Lawyers and Sociologists
- Archive Six: News and Current Affairs Articles
- Archive Seven: Artifacts of Sousveillance
I chose 4 case studies to examine. They were selected to enable understanding of the
operation and relative strength of the various modes of resistance to SPC, and to particularly
scrutinize the newest mode of resistance sousveillance.
The first case study is where sousveillant photographs of - at the very least - cruel,
inhuman and degrading treatment of the first publicly known detainee in the War on Terror, John
Walker Lindh, should have alerted the public to Americas start of its secret policy of torture
forintelligence in 2001, but failed to do so.
The second case study examines a case where sousveillance was spectacularly
successful the publicisation in 2004 of torture photographs taken by American soldiers of
security detainees in Abu Ghraib prison in Iraq.
The third case study examines a case of hoax sousveillance published in the UKs
Daily Mirror linked to the treatment and subsequent death in 2003 of Iraqi civilian, Baha Mousa
at the hands of British troops in Iraq, raising the question of torture by the British military.
The fourth case study examines agendabuilding regarding complicity of British
intelligence agencies in the tortureintelligence nexus, through a case where there was no
photographic sousveillance that of Binyam Mohamed.
Key Findings
There are lots of specific details about the interplay of SPC and resistance in each of
the case studies, these examined at length across four chapters. More broadly, there are a number
of broader-based Key Findings, that:
- Delineate power-knowledge relationships constituting the torture-intelligence nexus;
Evaluate the strengths and weaknesses of the various modes of resistance to SPC;
Explore the influence on the media of secretive, manipulative intelligence activities;
Re-evaluate agenda-building models;
- And discuss the health of the public sphere.
I shall discuss some of these Key Findings under the following headings: Istherea
SecretState?CantheSecretStatebechallenged?
IsthereaSecretState?
Yes. SPC used by the American and British Administrations in the War on Terror clearly
ranged from the secretive and silencing to the persuasive.
Secretive activity included legal memos on torture, guidelines on interrogations and
intelligence assessments. These positioned those in the know as part of an elite force pushing
forward legal and moral boundaries in their fight to prevent terrorism while relegating the wider
public to ignorant bystanders.
Activity aimed at generating silences comprised plea bargains that silenced
detainees, censoring Guantnamo detainees descriptions of their own torture in pretrial
hearings, deals with journalists to censor or withhold information that affected national security,
weeding out sousveillance of torture online, suppression of visual sousveillance of torture while
courtsmartial and criminal investigations proceeded; destruction of videotapes of CIA
interrogations; and withholding key information from intelligence oversight committees. These
position those in the know as part of an elite force policing the public sphere to keep the wider
public and their representatives ignorant of unpalatable but necessary official practices,
relegating the likely emotional and/or moral public dissent towards such practices as
unaffordable niceties.
Persuasive activity included the propagation and repetition of a few key messages
consistently over time, with the aim of misdirecting public attention from the secretive and
silencegenerating activities.
access to the official sources. Journalism based on anonymous leaks can fall prey to authorized
leaking. Indeed, this is one of the ways in which professional communicators seek to influence
information environments, while the public remains under the (false) impression that the
investigative journalism is independently sourced and verified.
- Real-time reporting, while feared by political administrations for being
uncontrollable and unpredictable, was never evidenced as a mode of resistance in the tortureintelligence issue, pointing to its rarity as a mode of challenging official versions.
Fifth Estate Some Problems
- Some NGOS, to maintain their access to, and influence with, policymakers, are
conditioned to modify their claims and avoid public controversy (eg the International Committee
of the Red Cross regarding access to detainees and conditions of their incarceration in the War on
Terror). Also, NGOs can be delegitimized by claims that they are not party to all relevant
information, or that they are pursuing singleissue, idealistic interests and so ignoring the
complexities, practicalities and facts of the risks and benefits in protecting national security.
- Sousveillance relies on serendipitous recordings, and so may not exist; it needs
trusted agendabuilders (eg journalists, NGOs) to mobilize it as evidence; and it may be
destroyed before ever reaching a wider public.
Policy Implications
The problem with any study of agenda-building is that the broader knowledge can
be used for either side those who believe they should support the secret state to ensure the
greater good of national security, and those who believe that such manipulation of knowledge is
unwarranted and undesirable. Coming down on the side of freedom of information and speech;
the ability and right of citizens to know what their governments policies are; and political
accountability and transparency, the policy implications are presented here accordingly, to
encourage resistance to SPC.
Ensurethecontinuationofpoliticalinvestigationsandinquiriesatinternational
levels, and the timely, free and universal access to the reports. Threats to political
investigationsincluderesources(moneyandtime)andensuringmeaningfulremits.
Encourage whistleblowing by raising awareness of how to whistleblow, and
thesocialvalueofdoingso;andbyofferinggreaterprotectionstowhistleblowers.Threatsto
whistleblowingincludeignorance,apathyandfear.
Strengtheninvestigativejournalismbyallowinggreateraccesstothefullrange
of sources available; and ensure speedy compliance with their FOIA requests. Educate and
supportjournaliststobemorecriticalofapparentleaksfrompoliticaladministrationsthatin
factmaybesecretlyauthorizedleaksmadetofurthertheadministrationsagenda.Threatsto
investigative journalism range from political secrecy institutionalised by law (such as the
UKs Official Secrets Act 1989); official stonewalling (such as ignoring, delaying, or
incompletelyaddressingFOIArequests);andthecommercialandprofessionalpressureson
journaliststoensureregularaccesstoofficialsourcesofnews.
- Encourage sousveillance so that citizens continue to engage in personal
information flows and make their voices heard, for free. Threats to such engagement range from
monetizing access to social media and the wider digital media ecology (a barrier to participation),
through to scaring citizens from engaging (for instance, by high profile punishment of whistleblowers like US Army intelligence analyst Bradley Manning, and WikiLeaks founder Julian
Assange; or by alerting people that their online activities are being surveilled).
EncouragecitizenengagementwithNGOs(awareness,donations,membership).
Threats to such engagement range from ignorance (from deliberate, to information
overload) to apathy. WhereNGOshaveaccesstospecialistknowledge(forinstance,gleaned
throughtheirprimaryresearchandaccesstothosetheyaretryingtohelp),encourageNGOs
toengagewithpolicymakers.ThreatstosuchengagementincludeblockingNGOsaccessto