Torture and Other Forms of Interrogation Techniques Report (Assessment)

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

In any society, many sophisticated and complex crimes are committed repeatedly. To get the information from those who committed or are suspected to have committed the crime, many methods are used. These methods are referred to as interrogation techniques. Criminal Intelligence Agency (C.I.A) officials in the United States authorized interrogation techniques in mid-March 2002. Some of these methods involve torture and are harsh and brutal. A number of them even inflict severe mental and physical pain to those being interrogated. This has elicited a heated debate on whether or not to apply these methods of interrogation. In addition, in order to protect the rights of the accused, safeguards have been put in place for those involved in the interrogation. The purpose of this paper is to examine whether torture and other forms of interrogation techniques should be used in obtaining intelligence that has the potential to save lives.

Torture and other harsh forms of interrogation techniques

The intelligence unit of any organization is involved in collecting, evaluating, and synthesizing raw data. The unit should be very effective and use the right methods to obtain the necessary information since some of these methods like torture are ineffective. From a criminal law point of view, torture is the process of inflicting severe physical and mental pain on a person to obtain information from them or other people known to them suspected to have committed a crime (Garcia, 2009, p.1).

The US Military Intelligence and the C.I.A used torture during the war on terror to obtain information from terrorists after the September 11, 2001 attack. The Abu Ghraib Prison in Iraq and Guantanamo Bay are examples of prisons that have used torture for a long time. Some of the torture techniques used include making an individual stand for long, depriving them of sleep, waterboarding, and exposing them to cold, among others. These techniques are not effective because an individual can be so desperate as to tell you anything that he/she thinks you need at the moment (Risen, Johnston & Neil, 2004, para. 5). This is the case if, for example, the experience is too much to bear (for example, waterboarding. This results in obtaining false and unreliable information and hence the intelligence unit may not be able to achieve their goals (Mazetti & Shane, 2009, p. 23). Additionally, the interrogation process may take longer as in some cases the individuals may tend to keep quiet refusing to disclose any information. This leads to a delay in knowing the problem and solving it.

Moreover, torture and other harsh forms of interrogation are degrading, inhuman and illegal so need not be used (Priest, 2004, para.15). In addition, history has shown that when used on an individual they become resistant and hence are likely to repeat the crime. Torture does not yield accurate intelligence; due to lack of verification of information obtained since there is no time for that. In addition, history has shown that many officials have lost their jobs others imprisoned and charged big amounts of money because of using torture. More so many detainees have died because of torture (Ross & Espositon, 2005, p.31).

Conclusion

From the discussion above, torture and other harsh forms of interrogation techniques are not necessary and permissible in obtaining intelligence capable of saving lives. Instead, other careful and psychologically sensitive methods should be used. Here the interrogating team establishes trust and a rapport with the accused in order to extract accurate and reliable data.

Reference List

Garcia, M. J. (2009).UN convention Against Torture (CAT): Overview and Application to Interrogation Techniques.USA. Congress Research Service. Web.

Mazetti, M., & Shane, S. (2009). Interrogation Memos Detail Harsh Tactics by the C.I.A. The New York Times.

Priest, D. (2004). CIA puts harsh tactics on hold. The Washington Post. Web.

Risen, J., Johnston D., & Neil, L. (2004). Harsh C.I.A methods in Top Qaeda Interrogations. New York Times.

Ross, B., & Espositon, R. (2005). C.I.A’S Harsh Interrogation Techniques described. ABC News. Web.

More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2022, March 15). Torture and Other Forms of Interrogation Techniques. https://ivypanda.com/essays/torture-and-other-forms-of-interrogation-techniques/

Work Cited

"Torture and Other Forms of Interrogation Techniques." IvyPanda, 15 Mar. 2022, ivypanda.com/essays/torture-and-other-forms-of-interrogation-techniques/.

References

IvyPanda. (2022) 'Torture and Other Forms of Interrogation Techniques'. 15 March.

References

IvyPanda. 2022. "Torture and Other Forms of Interrogation Techniques." March 15, 2022. https://ivypanda.com/essays/torture-and-other-forms-of-interrogation-techniques/.

1. IvyPanda. "Torture and Other Forms of Interrogation Techniques." March 15, 2022. https://ivypanda.com/essays/torture-and-other-forms-of-interrogation-techniques/.


Bibliography


IvyPanda. "Torture and Other Forms of Interrogation Techniques." March 15, 2022. https://ivypanda.com/essays/torture-and-other-forms-of-interrogation-techniques/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
Privacy Settings

IvyPanda uses cookies and similar technologies to enhance your experience, enabling functionalities such as:

  • Basic site functions
  • Ensuring secure, safe transactions
  • Secure account login
  • Remembering account, browser, and regional preferences
  • Remembering privacy and security settings
  • Analyzing site traffic and usage
  • Personalized search, content, and recommendations
  • Displaying relevant, targeted ads on and off IvyPanda

Please refer to IvyPanda's Cookies Policy and Privacy Policy for detailed information.

Required Cookies & Technologies
Always active

Certain technologies we use are essential for critical functions such as security and site integrity, account authentication, security and privacy preferences, internal site usage and maintenance data, and ensuring the site operates correctly for browsing and transactions.

Site Customization

Cookies and similar technologies are used to enhance your experience by:

  • Remembering general and regional preferences
  • Personalizing content, search, recommendations, and offers

Some functions, such as personalized recommendations, account preferences, or localization, may not work correctly without these technologies. For more details, please refer to IvyPanda's Cookies Policy.

Personalized Advertising

To enable personalized advertising (such as interest-based ads), we may share your data with our marketing and advertising partners using cookies and other technologies. These partners may have their own information collected about you. Turning off the personalized advertising setting won't stop you from seeing IvyPanda ads, but it may make the ads you see less relevant or more repetitive.

Personalized advertising may be considered a "sale" or "sharing" of the information under California and other state privacy laws, and you may have the right to opt out. Turning off personalized advertising allows you to exercise your right to opt out. Learn more in IvyPanda's Cookies Policy and Privacy Policy.

1 / 1