Feral Jundi

Tuesday, November 30, 2010

Industry Talk: Security Firms’ Future Looks Bright

     While it may seem strange for powerful countries to hand over to the private sector their monopoly on legitimate violence, Chaliand says it should be seen as a private-public partnership.

     Good little article here, and it helped to bring into perspective what this code means and what it could lead too. The only thing I would disagree with here is the cost of contractors versus military. No one ever mentions the whole pension thing or lifetime medical benefits that the military retiree receives, and contractors will not(unless a company provides that).  Nor is the cost of maintaining a large standing army during times of peace ever mentioned as being politically impossible, thus making the idea of an ‘instant support force’ of contractors during times of war a good idea. Or politicians can raise an army through the means of a draft and see how that works……Or not.

     Which takes us back to this code and the possible benefits of such a thing.  Militaries and countries around the world could really stand to benefit from an industry that is well regulated and ready to go.  Most importantly, an industry/temporary work force that is willing and able to serve in a war for that country. Hmmmm–‘willing’ versus ‘forced’, ‘temporary’ versus ‘long term’. –Matt

Security firms’ future looks bright

Nov 22, 2010

by Frédéric Burnand

Private security contractors, 60 of whom recently signed an international code of conduct in Geneva, could see their growth legitimised by this document.

But specialists are warning that without a planned control mechanism the code, which pledges respect of human rights and humanitarian law, could be nothing but an empty shell.

Private security firms have been very active in Afghanistan and Iraq in recent years. Before that it was Africa. But everywhere they operate, these companies have a reputation for carrying out uncontrolled mercenary activities.Today, they want to clean up their image through regulation, according to Alexandre Vautravers, head of international relations at Geneva’s Webster University.“Since the beginning of the decade, the Washington-based International Stability Operation Association has been working on the code of conduct,” he said.

Blackwater a signatory

The document signed in Geneva under the auspices of the Swiss authorities is therefore a response to demands from within the industry. Even Blackwater, best known for its activities in Iraq and since rebranded Xe Services, is one of the signatories.For French author Gérard Chaliand, who has written extensively about the mercenary business, companies like Blackwater have always found ways of surviving and expanding despite the criticism they face.“Regulating this industry seems indispensable to me with extended activities requiring new rules,” he told swissinfo.ch. “But it shouldn’t just be declarations of intention: there should also be sanctions.” (more…)

Film: Casting Call For The Show Most Lethal, $100,000 To The Winner

     Now this is cool. This is the casting notice for an upcoming show on Spike TV called ‘Most Lethal’. I figured that many of my readers are exactly the type of guys that would qualify for such a thing, and if they wanted to take a break from contracting in the war for a bit, this just might be your deal. Good luck out there. –Matt

Here is the Facebook page for the casting here.

Here is the email if you cannot read it on the poster below: sofsearch@grbtv.com

  

Most Lethal

Call To Action: Certification In The Private Security Industry Webinar Series, American University

     Now this is interesting and it kind of reminds me of the discussions we had over at Jake’s Combat Operator website awhile back.  Once you determine the standards, the next step would be certification.  So what these folks are doing is getting everyone under the tent and talking shop as to the best way to go about that. It is stuff like this that help governments figure out their certification process, so that is why I pay attention.

     Although I would like to note that no one from this group has made any effort to contact me, and I have yet to see anything mentioned about this process on any of the forums or websites. You would think that if they wanted a lively and honest discussion about PSC’s and certification, that they would put out an invitation like this at the places that security contractors hang out.

     So with that said, I think it would be pretty cool to see a bunch of us ‘knuckle draggers’ attending this thing online or in person to give our two cents.  After all, these so-called experts are putting together the ideas and concepts that will later be applied to how to govern this industry. I care that they get it right, and I hope a few of you out there care as well.

     Also, be sure to check out the 1st and 2nd webinar series by following the instructions below.  –Matt

OPEN INVITATION – PLEASE DISTRIBUTE WIDELY

Webinar Series

CERTIFICATION IN THE PRIVATE SECURITY INDUSTRY:

DISCERNING BEST PRACTICES AND APPLYING LESSONS FROM OTHER SECTORS

You are cordially invited to participate, either in person or via the Web, in the final in a series of webinars examining best practices in the certification of voluntary business standards. After the November 9 signing of the International Code of Conduct for Private Security Providers by 58 companies, the focus of multi-stakeholder discussions will move to the next phase: the development of mechanisms for effective governance and oversight. These webinars provide information from experts familiar with the certification of management, process, environmental, labor, and supply chain standards—a useful resource for participants in and supporters of the code. Through an open, expert-led dialogue, these webinars hope to foster learning and consensus building and ensure that best practices pave the way forward.

Webinar 3: Labor standards and supply chain certification, Wednesday, December 1, 12:00-1:30pm EST

Chair: Rebecca DeWinter-Schmitt, Assistant Professor, School of International Service, American University

Moderator: Krista Hendry, Executive Director, Fund for Peace

Presenters:  Jorge Perez-Lopez, Executive Director, Fair Labor Association

Elly Harrowell, Campaigner, Global Witness – to speak on the Kimberley Process Certification Scheme

Rochelle Zaid, Executive Director, Social Accountability Accreditation Services (accreditation body for SA 8000)

INSTRUCTIONS FOR PARTICIPATING:

You can participate in person or remotely. To attend in person, please come to:

American University (4400 Massachusetts Ave, Washington DC), Ward Building Room 102.

To join via the Web, use Mozilla Firefox (free download available at www.mozilla.com) as your browser and click on the link below. (You can use other browsers but may run into compatibility issues.) When prompted enter your first and last name, and hit the “Run Wizard” to ensure your software is compatible and up-to-date. The Wizard will prompt you to plug in a microphone to finish. Hit “Next” to skip this step, as you only will be able to type questions to the panelists during the Q and A session through the “chat box” function. Please direct questions for the panelists to Heather Elms and technical questions to Sophie Grumelard.

Go here.

No RSVP required. Please feel forward this invitation to anyone you feel might be interested in participating!

For more information or questions, contact:

Rebecca DeWinter-Schmitt at rd9171a@american.edu or rdewinter@rcn.com

*****

NOW AVAILABLE: VIEW THE ARCHIVED WEBINARS

Webinar 1:  Management and process standards, Wednesday, October 27, 12:00-1:30pm EST

Chair: Heather Elms, Associate Professor, Kogod School of Business, American University

Moderator: Rebecca DeWinter-Schmitt, Assistant Professor, School of International Service, American University

Presenters: Claire Mahon, Senior Researcher, Geneva Academy of International Humanitarian Law and Human Rights

Dr. Marc Siegel, Commissioner, ASIS International, Global Standards Initiative

David Simpson, Director of Standards and Collaborative Governance, AccountAbility

Webinar 2:  Environmental certification, Wednesday, November 10, 12:00-1:30pm EST

Chair: Heather Elms, Associate Professor, Kogod School of Business, American University

Moderator: Jorge Rivera, Associate Professor, George Washington University School of Business

Presenters: Petra Tanos, Coordinator, Sustainable Value Chains, Rainforest Alliance Sarah Buffaloe, LEED Associate, US Green Building Council Ben Cashore, Professor, Environmental Governance & Political Science, Yale School of Forestry and Environmental Studies

To access the archived webinar, enter American University’s BlackBoard site here. Use “new12” as your Username and Password. Under My Courses, click on Certification Webinar Series. In the left hand navigation toolbar, you will find the presenters’ Power Point slides. To watch a playback of the webinar, go to Wimba Classroom and Archives and click on the Wimba Classroom link. Scroll down to the bottom of the page and hit the blue arrow under Enter to start the playback. (Sound will kick in with the video after approximately 20 seconds.)

Monday, November 29, 2010

Technology: China Used Cyber Privateers In Attack Against Google

     The hack was part of a computer sabotage campaign carried out by government operatives, private security experts and Internet outlaws recruited by the Chinese government. This has been going on since at least 2002, the cable said.

     I read this and the first thing that popped out at me was that China was contracting with private industry to attack an enemy in cyber space (the commons).  In this case, that enemy was Google.

     Also, just look at the list of folks they contracted with, and you wonder how is this not cyber privateering?  Perhaps the Chinese understand the concept of ‘creating an industry out of destroying your enemies’, much better than the west. It is also the Chinese who are doing this, and not some poor third world country.

     So this is the next thought that came to mind.  If China is doing this, then why couldn’t the US use the same tool of cyber warfare against the Chinese, or even against a group like Wikileaks?  Hell, we can even be open about it and issue Letters of Marque and Reprisal to individuals and companies in order to make this happen. Just a thought, and hey, China is doing it. lol –Matt

Chinese Government Ordered Hack on Google Servers: Wikileaks

By Clint Boulton2010-11-29

Wikileaks gave the New York Times a diplomatic cable that shows the Chinese government was responsible for the hack on Google’s Gmail system.

China’s government was indeed behind the hack on Google’s Gmail system earlier this year according to a cable captured by the controversial Wikileaks organization.

Wikileaks, which butters its bread collecting secret documents and seeding them in media outlets, snagged 250,000 American diplomatic cables dating back three years and released some of them to the New York Times and other media outlets.

The Times cited one of the cables as proof that “China’s Politburo directed the intrusion into Google’s computer systems in that country, a Chinese contact told the American Embassy in Beijing in January.”

The hack was part of a computer sabotage campaign carried out by government operatives, private security experts and Internet outlaws recruited by the Chinese government. This has been going on since at least 2002, the cable said.

A Google spokesperson told eWEEK: “We aren’t going to be able to comment. As you know, since we revealed this incident in January, we haven’t been speculating as to the parties responsible.”

(more…)

Industry Talk: AEGIS Defence Gets TFBSO Contract In Iraq, EODT Wins FOB Lindsey Deuce Contract In Afghanistan

    This is a quick update on some news with two companies and their contracts won.  If any readers have anything else to add to these two deals, feel free to comment below. –Matt

Contract Award Date: November 16, 2010

Contract Award Number: W91GDW-11-C-9000

Contract Award Dollar Amount: $3,037,880.14 (EST)

Contractor Awarded Name: AEGIS DEFENCE SERVICES LTD

Nov 26, 2010

The contract is to provide all resources, personnel, equipment and management necessary for the technical management, oversight, transportation of Task Force members, and security support of the TFBSO economic revitalization activities performed predominantly in the Baghdad region, or on request to other areas throughout Iraq as required. Security services include security program management, anti-terrorism support and analyses, movement/escort security, transportation support, and close personal protection. The Contractor will provide security advisors and planners to facilitate, coordinate and implement security requirements and contingency plans. The proposed period of performance for this contract will be 68 calendar days or 25 November 2010 – 31 January 2011. The estimated dollar value is $3,343,662.11

FBO link here.

—————————————————————–

EODT Awarded Security Contract at Forward Operating Base Lindsey Deuce, Afghanistan

LENOIR CITY, TN (November 29, 2010) – EOD Technology, Inc. (EODT) has been awarded a task order by the Kandahar Regional Contracting Center to perform security services at Forward Operating Base (FOB) Lindsey Deuce in Kandahar, Afghanistan.

Under this task order, EODT will conduct defensive security and surveillance operations designed to protect Coalition Forces. Security operations will be performed within the confines of FOB Lindsey Deuce.

This task order was awarded under the Area of Operations (AO) Mountain Warrior Indefinite Delivery/Indefinite Quantity (IDIQ) contract for providing security services in support of Coalition Force missions throughout the Mountain Warrior Area of Operation.

In addition to securing military installations in Afghanistan, EODT provides construction and mine action services, to include demining and battle area clearance, in Afghanistan and other locations worldwide.

Story here.

Older Posts »

Powered by WordPress