{"id":10450,"date":"2014-02-26T09:28:52","date_gmt":"2014-02-26T12:28:52","guid":{"rendered":"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/?p=10450"},"modified":"2014-02-26T09:28:52","modified_gmt":"2014-02-26T12:28:52","slug":"techniques-dinterrogatoire-a-lusage-de-la-cia","status":"publish","type":"post","link":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/livros\/techniques-dinterrogatoire-a-lusage-de-la-cia\/","title":{"rendered":"Techniques d&#8217;interrogatoire \u00e0 l&#8217;usage de la CIA"},"content":{"rendered":"<p><span style=\"color: #003366;\"><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-10451\" alt=\"Techniques d'interrogatoire \u00e0 l'usage de la CIA\" src=\"http:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2014\/02\/techniques-dinterrogatoire-a-lusage-de-la-cia.jpg\" width=\"145\" height=\"236\" srcset=\"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2014\/02\/techniques-dinterrogatoire-a-lusage-de-la-cia.jpg 145w, https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-content\/uploads\/2014\/02\/techniques-dinterrogatoire-a-lusage-de-la-cia-92x150.jpg 92w\" sizes=\"auto, (max-width: 145px) 100vw, 145px\" \/>Jean-Pierre Perrin, Olivier Fr\u00e9bourg, Vincent Delezo\u00efde, Anne Maizeret<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Editor Editions des Equateurs<\/strong><\/span><\/p>\n<p><span style=\"color: #003366;\"><strong>Descripci\u00f3n:<\/strong><\/span> La publication de ces m\u00e9morandums secrets sur la torture r\u00e9v\u00e8le la face cach\u00e9e des m\u00e9thodes de la CIA dans sa lutte contre Al-Qaida. Ces quatre textes ont \u00e9t\u00e9 rendus public en avril 2009 par le Pr\u00e9sident Barack Obama. Ils constituent un document accablant sur les techniques de la plus c\u00e9l\u00e8bre agence de renseignement. Simulations de noyades, projections contre un mur, privations de sommeil, nudit\u00e9, gifles, confinement en pr\u00e9sence d&#8217;un insecte, manipulations di\u00e9t\u00e9tiques, etc. Ces quatre m\u00e9mos forment un v\u00e9ritable manuel de torture en usage dans la plus grande d\u00e9mocratie du monde. Ici sont expos\u00e9es des m\u00e9thodes rationnelles, sadiques, archa\u00efques, perverses d&#8217;interrogatoire. Ce document brut, historique est, d&#8217;ores et d\u00e9j\u00e0, rune des pi\u00e8ces d\u00e9cisives de l&#8217;introspection \u00e0 laquelle les Etats-Unis vont se livrer sur les ann\u00e9es Bush et leur guerre contre le terrorisme.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jean-Pierre Perrin, Olivier Fr\u00e9bourg, Vincent Delezo\u00efde, Anne Maizeret Editor Editions des Equateurs Descripci\u00f3n: La publication de ces m\u00e9morandums secrets sur la torture r\u00e9v\u00e8le la face cach\u00e9e des m\u00e9thodes de la CIA dans sa lutte contre Al-Qaida. Ces quatre textes ont \u00e9t\u00e9 rendus public en avril 2009 par le Pr\u00e9sident Barack Obama. Ils constituent un document accablant sur les techniques de la plus c\u00e9l\u00e8bre agence de renseignement. Simulations de noyades, projections&hellip; <\/p>\n","protected":false},"author":3,"featured_media":10451,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[109,15,6],"tags":[],"class_list":["post-10450","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-francais","category-fraude-e-investigacao","category-livros"],"views":211,"_links":{"self":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/10450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/comments?post=10450"}],"version-history":[{"count":1,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/10450\/revisions"}],"predecessor-version":[{"id":10452,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/posts\/10450\/revisions\/10452"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media\/10451"}],"wp:attachment":[{"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/media?parent=10450"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/categories?post=10450"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bibliotecadeseguranca.com.br\/fr\/wp-json\/wp\/v2\/tags?post=10450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}