The Psychologist Behind the CIA's Torture Program Desperately Wants to Speak Out

ruskpp/Shutterstock.com

The psychologist who wrote the CIA's post-9/11 torture program wants to tell his story to the world, if only non-disclosure agreements with the U.S. government weren't holding him back. 

James Mitchell, the retired Air Force general and psychologist who figures prominently in the Senate's report on the ineffectiveness of the post-9/11 torture programgave his first extensive interview to the Guardian, in which he spoke broadly about "the program," and lamented about how he could not delve into the specifics. "I would be happy to tell my entire story," Mitchell told the Guardian's Jason Leopold. "But I have been told numerous times that if I violate the non-disclosure agreement there would be criminal and civil penalties." Those are very real consequences, so instead we're treated to Mitchell complaining about "fat guys in the basement" who have been ordered to slander him on behalf of the government. "People make up stuff about me," he says. "They say I'm a Mormon. I'm actually an atheist."

Mitchell welcomes the increased attention the government and public have given enhanced interrogation techniques, especially in the wake of Zero Dark Thirty's release, even if he can not participate in the discussion. "I am interested in having an active and honest debate, but only if the Justice Department and federal government release me from my agreement," he told the Guardian. Unsurprisingly, Mitchell is unapologetic about the possibly useless torture techniques he developed during his time with the CIA:

"The narrative that's out there is, I walked up to the gate of the CIA, knocked on the door and said: 'Let me in, I want to torture people, and I can show you how to do it.' Or someone put out an ad on Craigslist that said, 'Wanted: psychologist who is willing to design torture program.' It's a lot more complicated than that," Mitchell told the Guardian in his first public comments since he was linked to the CIA's enhanced interrogation program seven years ago.

"I'm just a guy who got asked to do something for his country by people at the highest level of government, and I did the best that I could," Mitchell says now. 

The entire interview is fascinating, compelling, and worth your time. Mitchell's credentials with the military prior to his torture program work are impressive. His political ideology is interesting, to say the least. "I'm not a Republican or a Mormon or a gun nut or power hungry," he says. Mitchell believes global warming is a myth and that Obama's health care program is a "shit sandwich." Read the interview over at the Guardian.

(Image via ruskpp/Shutterstock.com)

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.