Terrorism News StoriesExcerpts of Key Terrorism News Stories in Major Media
Below are key excerpts of revealing news articles on terrorism from reliable news media sources. If any link fails to function, a paywall blocks full access, or the article is no longer available, try these digital tools.
For further exploration, delve into our comprehensive Military-Intelligence Corruption Information Center.
Note: This comprehensive list of news stories is usually updated once a week. Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.
Be careful what you say and whom you help -- especially when it comes to the Iraq war and the Iraqi government. President Bush issued an executive order last week titled "Blocking Property of Certain Persons Who Threaten Stabilization Efforts in Iraq." It could be interpreted as targeting the financial assets of any American who directly or indirectly aids someone who has committed or "poses a significant risk of committing" violent acts "threatening the peace or stability of Iraq" or who undermines "efforts to promote economic reconstruction and political reform" in the war-torn country. The text of the order, if interpreted broadly, could cast a far bigger net to include not just those who commit violent acts or pose the risk of doing so in Iraq, but also third parties -- such as U.S. citizens in this country -- who knowingly or unknowingly aid or encourage such people. The targeting of not just those who support perpetrators of violence but also those who support individuals who "pose a significant risk" of committing violence goes far beyond normal legal language related to intent and could be applied in a highly arbitrary manner, said Bruce Fein, a senior Justice Department official in the Reagan administration. Fein also questioned the executive order's inclusion of third parties, such as U.S. citizens who assist, sponsor or make "any contribution or provision of funds, goods, or services" to assist people on the Treasury list. "What about a lawyer hired to get someone off the list?" Fein asked. The Treasury Department's Office of Foreign Assets Control keeps a "Specially Designated Nationals and Blocked Persons" roll that includes those covered by several such executive orders. It most recently ran to 276 pages.
Note: To read the full text of the Executive Order, "Blocking Property of Certain Persons Who Threaten Stabilization Efforts in Iraq," click here.
President Bush set broad legal boundaries for the CIA's harsh interrogation of terrorism suspects yesterday, allowing the intelligence agency to resume a program that was suspended last year after criticism that it violated U.S. and international law. In an executive order lacking any details about actual interrogation techniques, Bush said the CIA program will now comply with a Geneva Conventions prohibition against "outrages upon personal dignity, in particular humiliating and degrading treatment." Two administration officials said that suspects now in U.S. custody could be moved immediately into the "enhanced interrogation" program and subjected to techniques that go beyond those allowed by the U.S. military. Rights activists criticized Bush's order for failing to spell out which techniques are now approved or prohibited. "All the order really does is to have the president say, 'Everything in that other document that I'm not showing you is legal -- trust me,' " said Tom Malinowski of Human Rights Watch. The CIA interrogation guidelines are contained in a classified document. A senior intelligence official, asked whether this list includes such widely criticized methods as the simulated drowning known as "waterboarding," declined to discuss specifics but said "it would be very wrong to assume that the program of the past would move into the future unchanged." CIA detainees have also alleged they were left naked in cells for prolonged periods, subjected to sensory and sleep deprivation and extreme heat and cold, and sexually taunted. A senior administration official briefing reporters yesterday said that any future use of "extremes of heat and cold" would be subject to a "reasonable interpretation . . . we're not talking about forcibly induced hypothermia."
Oregonians called Peter DeFazio's office, worried there was a conspiracy buried in the classified portion of a White House plan for operating the government after a terrorist attack. As a member of the U.S. House on the Homeland Security Committee, DeFazio, D-Ore., is permitted to enter a secure "bubbleroom" in the Capitol and examine classified material. So he asked the White House to see the secret documents. On Wednesday, DeFazio got his answer: DENIED. "I just can't believe they're going to deny a member of Congress the right of reviewing how they plan to conduct the government of the United States after a significant terrorist attack," DeFazio says. Homeland Security Committee staffers told his office that the White House initially approved his request, but it was later quashed. DeFazio doesn't know who did it or why. "We're talking about the continuity of the government of the United States of America," DeFazio says. "I would think that would be relevant to any member of Congress, let alone a member of the Homeland Security Committee." Bush administration spokesman Trey Bohn declined to say why DeFazio was denied access: "We do not comment through the press on the process that this access entails. It is important to keep in mind that much of the information related to the continuity of government is highly sensitive." Norm Ornstein, a legal scholar who studies government continuity at the conservative American Enterprise Institute, said he "cannot think of one good reason" to deny access to a member of Congress who serves on the Homeland Security Committee. This is the first time DeFazio has been denied access to documents. "Maybe the people who think there's a conspiracy out there are right," DeFazio said.
An independent oversight board created to identify intelligence abuses after the CIA scandals of the 1970s did not send any reports to the attorney general of legal violations during the first 5 1/2 years of the Bush administration's counterterrorism effort, the Justice Department has told Congress. The President's Intelligence Oversight Board -- the principal civilian watchdog of the intelligence community -- is obligated under a 26-year-old executive order to tell the attorney general and the president about any intelligence activities it believes "may be unlawful." The board was vacant for the first two years of the Bush administration. The board's mandate is to provide independent oversight, so the absence of such communications has prompted critics to question whether the board was doing its job. "It's now apparent that the IOB was not actively employed in the early part of the administration. And it was a crucial period when its counsel would seem to have been needed the most," said Anthony Harrington, who served as the board's chairman for most of the Clinton administration. Senate Judiciary Committee chairman Patrick J. Leahy (D-Vt.) added: "It is deeply disturbing that this administration seems to spend so much of its energy and resources trying to find ways to ignore any check and balance on its authority and avoid accountability to Congress and the American public."
A Marine corporal, testifying Saturday at the murder trial of a buddy, said that Marines in his unit began routinely beating Iraqis after being ordered by officers to "crank up the violence level." Cpl. Saul H. Lopezromo said Marines in his platoon, including the defendant, Cpl. Trent D. Thomas, were angry when officers criticized them as not being as tough as other Marine platoons. "We're all hard-chargers, we're not there to mess around, so we took it as an insult," Lopezromo said. Within weeks of allegedly being scolded, seven Marines and a Navy corpsman went out late one night to find and kill a suspected insurgent in the village of Hamandiya near the Abu Ghraib prison. Unable to find their target, the Marines and corpsman dragged another man from his house, fatally shot him, and then planted an AK-47 assault rifle near the body to make it look like he had been killed in a shootout, according to court testimony. "We were told to crank up the violence level," said Lopezromo, who testified for the defense. He indicated that during daily patrols the Marines became much rougher with Iraqis. Asked by a juror to explain, he said, "We beat people, sir." Lopezromo said he believed that officers knew of the beatings, and ... said he saw nothing wrong in what Thomas and the others did. "I don't see it as an execution, sir," he told the judge. "I see it as killing the enemy." He added that Marines, in effect, consider all Iraqi men as part of the insurgency. Prosecution witnesses testified that Thomas shot the 52-year-old Iraq at point-blank range after he had already been shot by other Marines and was lying on the ground. Lopezromo said a procedure called "dead-checking" was routine. Marines are taught "dead-checking" in boot camp ... he said.
The Federal Bureau of Investigation is developing a computer-profiling system that would enable investigators to target possible terror suspects. The System to Assess Risk, or STAR, assigns risk scores to possible suspects based on a variety of information, similar to the way a credit bureau assigns a rating based on a consumer's spending behavior and debt. The program focuses on foreign suspects but also includes data about some U.S. residents. Some lawmakers said ... that the report raises new questions about the government's power to use personal information and intelligence without accountability. "The Bush administration has expanded the use of this technology, often in secret, to collect and sift through Americans' most sensitive personal information," said Sen. Patrick J. Leahy (D-Vt.), chairman of the Senate Judiciary Committee. The use of data mining in the war on terror has sparked criticism. An airplane-passenger screening program called CAPPS II was revamped and renamed because of civil liberty concerns. An effort to collect Americans' personal and financial data called Total Information Awareness was killed. Law enforcement and national security officials have continued working on other programs to use computers to sift through information for signs of threats. The Department of Homeland Security, for example, flags travelers entering and leaving the United States who may be potential suspects through a risk-assessment program called the Automated Targeting System.
A proposed new FBI program would skirt federal laws by paying private companies to hold millions of phone and Internet records which the bureau is barred from keeping itself, experts say. The $5 million project would apparently pay private firms to store at least two years' worth of telephone and Internet activity by millions of Americans, few of whom would ever be considered a suspect in any terrorism, intelligence or criminal matter. The FBI is barred by law from collecting and storing such data if it has no connection to a specific investigation or intelligence matter. In recent years the bureau has tried to encourage telecommunications firms to voluntarily store such information, but corporations have balked at the cost of keeping records they don't need. "The government isn't allowed to warehouse the information, and the companies don't want to, so this creates a business incentive for the companies to warehouse it, so the government can access it later," said Mike German, a policy expert on national security and privacy issues for the American Civil Liberties Union (ACLU). "It's a public-private partnership that puts civil liberties to the test." In March, an FBI official identified the companies as Verizon, MCI and AT&T. Even the bureau's own top lawyer said she found the [FBI's] behavior "disturbing," noting that when requesting access to phone company records, it repeatedly referenced "emergency" situations that did not exist, falsely claimed grand juries had subpoenaed information and failed to keep records on much of its own activity.
The most intriguing secrets of the "war on terror" have nothing to do with al-Qaeda and its fellow travelers. They're about the mammoth private spying industry that all but runs U.S. intelligence operations today. In April, Director of National Intelligence Mike McConnell was poised to publicize a year-long examination of outsourcing by U.S. intelligence agencies. But the report was inexplicably delayed -- and suddenly classified a national secret. What McConnell doesn't want you to know is that the private spy industry has succeeded where no foreign government has: It has penetrated the CIA and is running the show. Over the past five years (some say almost a decade), there has been a revolution in the intelligence community toward wide-scale outsourcing. Private companies now perform key intelligence-agency functions, to the tune ... of more than $42 billion a year. Intelligence professionals [say] that more than 50 percent of the National Clandestine Service (NCS) -- the heart, brains and soul of the CIA -- has been outsourced to private firms such as Abraxas, Booz Allen Hamilton, Lockheed Martin and Raytheon. These firms recruit spies, create non-official cover identities and control the movements of CIA case officers. They also provide case officers and watch officers at crisis centers and regional desk officers who control clandestine operations worldwide. As The Los Angeles Times first reported last October, more than half the workforce in two key CIA stations -- Baghdad and Islamabad, Pakistan -- is made up of industrial contractors, or "green badgers," in CIA parlance. Intelligence insiders say that entire branches of the NCS have been outsourced to private industry.
Federal agents do not need a search warrant to monitor a suspect's computer use and determine the e-mail addresses and Web pages the suspect is contacting, a federal appeals court ruled Friday. In a drug case from San Diego County, the Ninth U.S. Circuit Court of Appeals in San Francisco likened computer surveillance to the "pen register" devices that officers use to pinpoint the phone numbers a suspect dials, without listening to the phone calls themselves. In Friday's ruling, the court said computer users should know that they lose privacy protections with e-mail and Web site addresses when they are communicated to the company whose equipment carries the messages. The search is no more intrusive than officers' examination of a list of phone numbers or the outside of a mailed package, neither of which requires a warrant, Judge Raymond Fisher said in the 3-0 ruling. Defense lawyer Michael Crowley disagreed. His client, Dennis Alba, was sentenced to 30 years in prison after being convicted of operating a laboratory in Escondido that manufactured the drug ecstasy. Some of the evidence against Alba came from agents' tracking of his computer use. The court upheld his conviction and sentence. Expert evidence in Alba's case showed that the Web addresses obtained by federal agents included page numbers that allowed the agents to determine what someone read online, Crowley said. The ruling "further erodes our privacy," the attorney said. "The great political marketplace of ideas is the Internet, and the government has unbridled access to it."
Note: So now every email you send and read can be monitored legally. Why didn't this make news headlines?
Part One: 'A Different Understanding With the President': In less than an hour ... Cheney's proposal had become a military order from the commander in chief. Foreign terrorism suspects held by the United States were stripped of access to any court -- civilian or military, domestic or foreign. They could be confined indefinitely without charges and would be tried, if at all, in closed "military commissions." "What the hell just happened?" Secretary of State Colin L. Powell demanded ... when CNN announced the order that evening, Nov. 13, 2001. National security adviser Condoleezza Rice, incensed, sent an aide to find out. Even witnesses to the Oval Office signing said they did not know the vice president had played any part. "Angler," as the Secret Service code-named him, has approached the levers of power obliquely, skirting orderly lines of debate he once enforced as chief of staff to President Gerald R. Ford. He has battled a bureaucracy he saw as hostile, using intimate knowledge of its terrain. He has empowered aides to fight above their rank, taking on roles reserved in other times for a White House counsel or national security adviser. And he has found a ready patron in George W. Bush for edge-of-the-envelope views on executive supremacy that previous presidents did not assert. Over the past six years, Cheney has shaped his times as no vice president has before. [The] relationship [between Bush and Cheney] is opaque, a vital unknown in assessing Cheney's impact on events. Officials who see them together often, not all of them admirers of the vice president, detect a strong sense of mutual confidence that Cheney is serving Bush's aims.
Note: This is an important, in-depth investigation of the Cheney vice-presidency. It is highly revealing and well worth reading it its entirety.
The U.S. Northern Command, the military command responsible for "homeland defense," has asked the Pentagon if it can establish its own special operations command for domestic missions. The request ... would establish a permanent sub-command for responses to incidents of domestic terrorism as well as other occasions where special operators may be necessary on American soil. The establishment of a domestic special operations mission, and the preparation of contingency plans to employ commandos in the United States, would upend decades of tradition. Military actions within the United States are the responsibility of state militias (the National Guard), and federal law enforcement is a function of the FBI. Employing special operations for domestic missions sounds very ominous, and NORTHCOM's request earlier this year should receive the closest possible Pentagon and congressional scrutiny. There's only one problem: NORTHCOM is already doing what it has requested permission to do. When NORTHCOM was established after 9/11 to be the military counterpart to the Department of Homeland Security, within its headquarters staff it established a Compartmented Planning and Operations Cell (CPOC) responsible for planning and directing a set of "compartmented" and "sensitive" operations on U.S., Canadian and Mexican soil. In other words, these are the very special operations that NORTHCOM is now formally asking the Pentagon to beef up into a public and acknowledged sub-command.
President Bush has turned the executive branch into a two-way mirror. They get to see everything Americans do: our telephone calls, e-mail, and all manner of personal information. And we get to see nothing about what they do. Everyone knows this administration has disdained openness and accountability since its first days. That is about the only thing it does not hide. But recent weeks have produced disturbing disclosures about just how far Mr. Bush’s team is willing to go to keep lawmakers and the public in the dark. That applies to big issues — like the C.I.A.’s secret prisons — and to things that would seem too small-bore to order up a cover-up. Vice President Dick Cheney sets the gold standard, placing himself not just above Congress and the courts but above Mr. Bush himself. For the last four years, he has been defying a presidential order requiring executive branch agencies to account for the classified information they handle. When the agency that enforces this rule tried to do its job, Mr. Cheney proposed abolishing the agency. Since the 9/11 attacks, Mr. Bush has tried to excuse his administration’s obsession with secrecy by saying that dangerous times require greater discretion. He rammed the Patriot Act through Congress with a promise that national security agencies would make sure the new powers were not abused. But on June 14, The Washington Post reported that the [FBI] potentially broke the law or its own rules several thousand times over the past five years when it used the Patriot Act to snoop on domestic phone calls, e-mail and financial transactions of ordinary Americans.
Anyone who follows technology or military affairs has heard the predictions for more than a decade. Cyberwar is coming. Although the long-announced, long-awaited computer-based conflict has yet to occur, the forecast grows more ominous with every telling: an onslaught is brought by a warring nation, backed by its brains and computing resources; banks and other businesses in the enemy states are destroyed; governments grind to a halt; telephones disconnect. Industrial remote-control technologies known as Scada systems, for Supervisory Control and Data Acquisition ... allow remote monitoring and control of operations like manufacturing production lines and civil works projects like dams. So security experts envision terrorists at a keyboard remotely shutting down factory floors or opening a dam’s floodgates to devastate cities downstream. But how bad would a cyberwar really be — especially when compared with the blood-and-guts genuine article? And is there really a chance it would happen at all? Whatever the answer, governments are readying themselves for the Big One. The United States is arming up. Robert Elder, commander of the Air Force Cyberspace Command, told reporters ... that his newly formed command, which defends military data, communications and control networks, is learning how to disable an opponent’s computer networks and crash its databases. “We want to go in and knock them out in the first round,” he said, as reported on Military.com.
Osama bin Laden was suspected of chartering a plane that carried his family and other Saudis from the United States shortly after 9/11, according to FBI documents released yesterday. One FBI document referred to a Ryan Air 727 plane that left Los Angeles on Sept. 19, 2001, carrying Saudi nationals. "The plane was chartered either by the Saudi Arabian royal family or Osama bin Laden," according to the document obtained by Judicial Watch. The flight made stops in Orlando, Washington, D.C. and Boston, and terminated in Paris. Asked about the documents' assertion, an FBI spokesman said, "There is no new information here. Osama bin Laden did not charter a flight out of the U.S."
Note: To read an excellent article on the implications of this brief report, click here.
The genocide in Rwanda 12 years ago was the most efficient ever carried out. 800,000 people were slaughtered in 100 days. One incredible and inspiring survivor’s tale has come to light only recently. It took Immaculee Ilibagiza, a college-educated young woman from a remote village, many years before she could confront the horrors she lived through. She is speaking out now, she says, to prevent further atrocities. It was extremely low tech ... just machetes, spears and knives, wielded by Hutus, the majority tribe as they tried to wipe out the minority Tutsis. [They] were slaughtered in their tracks, wherever they were found. When it was over, three out of every four Tutsis in Rwanda had been killed. When it began, Immaculee's father told her to run to a minister’s house three miles away, and to beg him to hide her. The minister was a Hutu. [He] put Immaculee and six other women in a tiny, rarely used bathroom in a remote corner of the house. Seven women were huddled in a bathroom measuring three feet by four feet, for 91 days. They took turns standing and stretching. "They were searching. They were there all the time," Immaculee remembers. She lost 40 pounds – one third of herself. What prompted the genocide? The Hutus had long-standing resentments against the Tutsis, who formed the nation's elite. There are things you can point to, but ... what could possibly explain what happened? Immaculee knows Rwandans can never forget but believes they must forgive. Revenge ... only prolongs the pain. Now she's a woman on a mission to spread the story ... hoping it can prevent future atrocities. She has giving lectures; she has written a book; and she is determined to stop the inevitable revisionists who claim the genocide never happened.
Note: An intense video clip of this story is available at the CBS link above. This article fails to mention the key fact that top officials in developing nations knew very well of the mass murder as it was happening, yet refused to send help. This is graphically portrayed in the powerful movie Hotel Rwanda. Immacullee's amazing book, Left to Tell, has been an huge inspiration to many people around the world.
An internal FBI audit has found that the bureau potentially violated the law or agency rules more than 1,000 times while collecting data about domestic phone calls, e-mails and financial transactions in recent years, far more than was documented in a Justice Department report in March that ignited bipartisan congressional criticism. The new audit covers just 10 percent of the bureau's national security investigations since 2002. The vast majority of the new violations were instances in which telephone companies and Internet providers gave agents phone and e-mail records the agents did not request and were not authorized to collect. The agents retained the information anyway in their files. Two dozen of the newly-discovered violations involved agents' requests for information that U.S. law did not allow them to have. The results confirmed what ... critics feared, namely that many agents did not ... follow the required legal procedures and paperwork requirements when collecting personal information with one of the most sensitive and powerful intelligence-gathering tools of the post-Sept. 11 era -- the National Security Letter, or NSL. Such letters are uniformly secret and amount to nonnegotiable demands for personal information -- demands that are not reviewed in advance by a judge. After the 2001 terrorist attacks, Congress substantially eased the rules for issuing NSLs, [leading] to an explosive growth in the use of the letters. More than 19,000 such letters were issued in 2005 seeking 47,000 pieces of information, mostly from telecommunications companies.
At the Republican debate, almost all the candidates said that they would not rule out a nuclear attack on Iran as a means to prevent it from getting its own nuclear weapons. Only one [candidate] would say that attacking Iran -- indeed even threatening to nuke Iran -- is not the right strategy. "We have to come to our senses about this issue of war and preemption," he said. The audience applauded, but he didn't get much support from his fellow candidates. Rep. Duncan Hunter of California was the starkest: "I would authorize the use of tactical nuclear weapons if there was no other way to preempt those particular centrifuges," he said. Former New York Mayor Rudolph Giuliani ... added that "you can't rule out anything and you shouldn't take any option off the table." Former Virginia Gov. Jim Gilmore also [stated] "all options are on the table" with regard to Iranian nuclear weapons. Said former Massachusetts Gov. Mitt Romney: "I wouldn't take any options off the table." After the debate, former Sen. Fred Thompson of Tennessee, who did not particpate, added his name to the list of candidates who would consider a preemptive attack against Iran. Only Rep. Ron Paul of Texas, the "Dennis the Menace" of his party, said he opposed a nuclear strike on moral grounds and because he believed Iran "has done no harm to us directly and is no threat to our national security." The Iraq war and the war against terrorism are the central battles of our time, these candidates say. They all profess their faith in God and the United States, and speak of a moral struggle between good and evil, between the United States and "radical Islam." Yet they are not willing to say that nuclear weapons have no place in modern confrontations.
Note: For what a top US general has to say about war manipulations, click here.
A terrorist watch list compiled by the FBI has apparently swelled to include more than half a million names. Privacy and civil liberties advocates say the list is growing uncontrollably, threatening its usefulness in the war on terror. The bureau says the number of names on its terrorist watch list is classified. A portion of the FBI's unclassified 2008 budget request posted to the Department of Justice Web site, however, refers to "the entire watch list of 509,000 names." A spokesman for the interagency National Counterterrorism Center (NCTC), which maintains the government's list of all suspected terrorists with links to international organizations, said they had 465,000 names covering 350,000 individuals. Many names are different versions of the same identity. In addition to the NCTC list, the FBI keeps a list of U.S. persons who are believed to be domestic terrorists - abortion clinic bombers, for example, or firebombing environmental extremists, who have no known tie to an international terrorist group. Combined, the NCTC and FBI compendia comprise the watch list used by federal security screening personnel on the lookout for terrorists. While the NCTC has made no secret of its terrorist tally, the FBI has consistently declined to tell the public how many names are on its list. "It grows seemingly without control or limitation," said ACLU senior legislative counsel Tim Sparapani of the terrorism watch list. Sparapani called the 509,000 figure "stunning. If we have 509,000 names on that list, the watch list is virtually useless," he told ABC News. "You'll be capturing innocent individuals with no connection to crime or terror." U.S. lawmakers and their spouses have been detained because their names were on the watch list.
Fly into the American air base of Tallil outside Nasiriya in central Iraq and the flight path is over the great ziggurat of Ur, reputedly the earliest city on earth. Ur is safe within the base compound. But its walls are pockmarked with wartime shrapnel and a blockhouse is being built over an adjacent archaeological site. When the head of Iraq's supposedly sovereign board of antiquities and heritage, Abbas al-Hussaini, tried to inspect the site recently, the Americans refused him access to his own most important monument. Under Saddam you were likely to be tortured and shot if you let someone steal an antiquity; in today's Iraq you are likely to be tortured and shot if you don't. The tragic fate of the national museum in Baghdad in April 2003 was as if federal troops had invaded New York city, sacked the police and told the criminal community that the Metropolitan was at their disposal. The local tank commander was told specifically not to protect the museum for a full two weeks after the invasion. Even the Nazis protected the Louvre. America [has converted] Nebuchadnezzar's great city of Babylon into the hanging gardens of Halliburton. In the process the 2,500-year-old brick pavement to the Ishtar Gate was smashed by tanks and the gate itself damaged. Babylon is being rendered archaeologically barren. Outside the capital some 10,000 sites of incomparable importance to the history of western civilisation, barely 20% yet excavated, are being looted as systematically as was the museum in 2003. When [archeologists] tried to remove vulnerable carvings from the ancient city of Umma to Baghdad, [they] found gangs of looters already in place with bulldozers, dump trucks and AK47s.
A former American army torturer has laid bare the traumatic effects of American interrogation techniques in Iraq - on their victims and on the perpetrators themselves. Tony Lagouranis conducted mock executions, forced men and boys into agonising stress positions, kept suspects awake for weeks on end, used dogs to terrify detainees and subjected others to hypothermia. But he confesses that he was deeply scarred by the realisation that what he did has contributed to the downfall of American forces in Iraq. Mr Lagouranis, 37, suffered nightmares and anxiety attacks on his return to Chicago. Between January 2004 and January 2005, he tortured suspects, most of whom he says turned out to be innocent. He says that he realised he had entered a moral dungeon when he found himself reading a Holocaust memoir, hoping to pick up torture tips from the Nazis. "When I first got back I had a lot of anxiety. I had a personal crisis because I felt I had done immoral things and I didn't see a way to cope with that. I saw a psychologist. I had a lot to work through." He says that helped prevent him becoming "a totally broken human being". Mr Lagouranis has written a recently published book about his experiences, Fear Up Harsh, a term for intimidating a detainee by shouting at him. He makes clear that torture has cost America its moral authority in Iraq by detaining innocent people and treating them badly. He writes: "My actions, combined with the actions of the arresting infantry who left bruises on their prisoners, and the actions of the officers who wanted to get promotions, repeated in microcosm all over this country, had a cumulative effect. I could blame Bush and Rumsfeld, but I would always have to also blame myself."
Note: For a top US general's comments on the psychological abuse soldiers suffer as a result of war, click here.
Important Note: Explore our full index to revealing excerpts of key major media news stories on several dozen engaging topics. And don't miss amazing excerpts from 20 of the most revealing news articles ever published.