Wednesday, July 13, 2011
Military News: Medal Of Honor For Sergeant First Class Leroy Arthur Petry
Tuesday, July 12, 2011
Industry Talk: Extremists Use Iranian Weapons, Iraq Command Spokesman Says
This is not particularly new, and I have talked about IRAMs and EFPs here in the past. But it is still important to keep the information flow going out there as far as what are the ongoing threats. Military forces and contractors are still in Iraq, and they still face these threats. It is also important to point out that we have seen the highest amount of deaths in Iraq since 2009.
Both of these types of weapons are pretty specialized, and it would make sense that Iran would be behind the construction of ‘effective’ IRAM’s and EFP’s. It is also important to note that the spokesman made a very interesting point about the construction of this stuff. Here is the quote, and this kind of goes against the conventional wisdom about how ‘easy’ these weapons are to produce.
Neither weapon is something someone can produce on a lathe in a garage. The EFP requires very precise machining, and the explosive charge is cast. For the IRAM to be effective, it requires specially machined parts to attach the larger warhead to the missile.
The firing mechanisms are factory-made electronic parts that have no other use than firing off IRAMs or EFPs.
And the forensic teams can categorically state that the weapons are from Iran. In one case, an IRAM built in Iran was turned over to the Quds Force – part of the Iranian Revolutionary Guard – and then given to an Iraqi extremist in Kitab Hezbollah, a terrorist group that is a wholly owned subsidiary of the Quds Force, officials said.
So there you have it, and take that for what it is worth. I would imagine that insurgents would take the path of least resistance when it comes to weapons. If Quds are handing these things out, then why go through the effort to make these weapons in a garage? DIY weapons are nice and all, but getting them for free is better. Especially if Iran is logistically able to keep the flow of weapons consistent and sufficient. –Matt
Extremists Use Iranian Weapons, Iraq Command Spokesman Says
By Jim Garamone?American Forces Press Service
CAMP VICTORY, Iraq, July 11, 2011 – There is no doubt that deadly weapons being used against American forces in Iraq originated in Iran, a U.S. Forces Iraq spokesman said here today.
Army Maj. Gen. Jeff Buchanan led reporters traveling with Defense Secretary Leon E. Panetta on a tour of Joint Task Force Troy here, where they were free to talk to the men and women who examine all enemy ordnance to determine its origin and to look for ways to defeat the threat or prosecute those who launch attacks.
Part of the unit is the combined explosive exploitation cell laboratories. “When p[explosive ordnance disposal] teams go out and they respond to an explosive event, they collect whatever evidence they find and bring it back,” said a military official at the unit, speaking on background. “We take that evidence and take it apart and exploit it.”
The team looks at the weapon from a technical and chemical viewpoint. “You put all those puzzles together, and you can determine where they are from,” the official said. The team also can sweep the weapons for fingerprints and DNA evidence.
Publications: Journal Of International Peace Operations, July-August 2011
Maritime Security: Pirates Are Using NVG’s And Hacking Shipping Company Email Accounts
I had to put this one out there, because this is just one more indication as to what kind of game the pirates are playing. With the amount of money they are making from ransoms, a fantastic investment for them would be to determine what boats ‘do not have’ armed security, just so they can focus on those boats. From hacking accounts, to stealing or purchasing information, to watching the departing vessels and identifying if they have security–they are doing it all.
They are probably scouring the internet in other places as well, trying to obtain any information that would be helpful. That means online forums, Facebook, Twitter, blogs, open source news articles–all of the things that everyone in the world has access too.
What is troubling as well, is there are no laws or regulations on OPSEC for maritime security. So if a guy wants to post photos or talk about their latest contract out on the high seas, they could do it without any pressure against the practice. It is on that individual, that company that hires them, and that shipping company that uses that guard force to keep this in check. I guess the thing that guys have to remember is that you have to assume that anything you post on your Facebook or forum, will be read by the public to include criminals. Criminal entities will find a way to read your stuff, despite your privacy settings, if they have determined that your information has value.
Likewise, if you are the owner of a security company or shipping company, I would suggest taking as many precautions as possible to protect your email accounts from hackers. Perhaps look at using more secure email services like Hushmail or similar encrypted mail systems. Anything to make it more difficult for these guys to find out what you are up to. An IT security specialist could be a good investment for getting you started on a secure system of communications and protocols.
The other thing I wanted to bring up, that this article kind of delved into, is the latest pirate tactical developments. It is my understanding that not only are pirates using cutting torches so they can break into safe rooms, but are also using night vision goggles or NVG’s to attack at night.(thanks to a reader for the tip) With that said, I would highly suggest to companies that have teams on boats to equip your folks with NVG’s and ensure your ‘night time strategy and tactics’ are sound. Pirates are attacking at night because it is a tactical advantage. You must also assume that they have thought about the other tools of night time boarding, and this should give the naval warfare experts out there plenty to chew on as to how best to defeat such a thing.
So what else could the pirates do to gain advantage? How about using UAV’s? A store bought RC plane with a camera or night vision camera, could easily be deployed by a pirate crew to probe your vessel’s defenses. They could also use UAV’s to look for potential targets out there. Or an investor might come along that has access to the bigger more capable UAV’s, and provide that for the operation. Anything the pirates think they need to be successful will be looked at in terms of cost benefit analysis.
Another thing they could do is actually go into the water with a re-breather, and at night, much like a commando unit would do, all to close the distance and gain surprise. They could also contract the services of criminal groups that might specialize in this kind of diving. Anything for them to gain relative superiority in their assault.
I would also think that pirates have been studying military tactics and strategy for operations on the high seas. Anything that a modern naval force would do in terms of boarding ships, a pirate crew will try to copy.(mimicry strategy) Pirates will watch youtube videos, or watch in real time as naval forces do their thing out there. They are watching and learning, and driven by the thrill of the hunt and the massive reward for their efforts.
Another development is upgrades to current weaponry. This article from Maritime Security Review discussed the possibility that pirates are now using RPG 29’s. Here is the quote:
One maritime security sources said that this may point to the acquisition of the RPG 29 model, rather than the standard RPG 7.
RPG 29s were developed in Russia in the 1980s, and pack a punch sufficient to penetrate the frontal armour of most modern tanks. Secondhand models are now in circulation in the Middle East. Security professionals have feared for some time that the Somalis would sooner or later get their hands on them.
According to experts, when the more powerful RPGs are deployed, “A vessel’s hull might be easily breached, with further damage, injury or even death incurred to the crew within.”
The other thing to look at is the money and support mechanism for today’s piracy. Investors know a good deal when they see it, and especially jihadist investors. If groups like Al Shabab are demanding a 20 percent cut in the profits, then now piracy becomes a cash cow for them and their operations. In some parts of the world, piracy might be the only real criminal/fund raising game in town, and the rise in piracy attacks only confirms the popularity and profitability of this type of offense industry.
Piracy also has a lot of cross over benefits as well. You can use these guys to smuggle drugs, weapons, terrorists, human traffic, and all for profit. You can use these guys to capture large boats to use as weapons against ports, blocking waterways, or attacking other vessels, or as bases for attacks. So piracy is an excellent game for terrorists and criminals to get into, and they are mutually beneficial to each other. In order to stay ahead of these guys in terms of strategy and tactics, all of us must continue to study and ‘know our enemy’. Never underestimate them and always assume that if you can think it up, they have probably came up with the same idea. –Matt
Pirate Games
July 12, 2011The Somali pirate gangs have adapted to the growing fleet of warships and maritime patrol aircraft arrayed against them. One of the new tricks is getting into the databases of shipping companies and their Internet based communications. This information is bought from criminal operatives in London and the Persian Gulf, and provides precise information where the most lucrative and vulnerable ships will be.
Much of the money obtained from ransoms is used to buy goods and services from Persian Gulf merchants and other “specialists.” This includes assistance in negotiating with the shipping and insurance companies, as well as other services. This includes intelligence. The Persian Gulf is rife with corruption, and this makes it easier to buy needed information. That’s harder to do in London (the center of the maritime insurance industry, and where much information on where the most valuable ships are). British police have detected some efforts to obtain information for pirates, and believe these efforts are becoming more intense.
Monday, July 11, 2011
Maritime Security: Feral Jundi Survey–The Best Company To Work At For Maritime Security In 2011
This is cool. On the internet there has been a list floating around that detailed all of the maritime security related companies out there to apply with. I thought I would make a survey based on this list and offer it up for the readership to participate in. You get one vote per computer and one company of choice. Once you vote, you get to see the results, so it is pretty simple and quick. I also apologize if any companies are missing that are relevant, and I think I can make some edits to this thing. If not, this is just a test to see how this goes, and I might do more of this type of thing in the future. Let me know what you think in the comments section, and this should be fun to see what company gets the title of Best Company To Work At For Maritime Security In 2011. (also, feel free to pass around the link to get more folks taking the survey)-Matt
Edit: 07/12/2011- I have closed down the survey and these are the results. I had to shut it down because someone decided to cheat on the thing. I won’t name names, but they know who they are. It is the weakness of such surveys like this, just because they work great all the way up until someone decides they want to cheat the system. A better survey is one that can minimize cheating, and automatically keep people honest. That is the reality of the internet I guess, and it is too bad. Here are the results for the top three companies, and take it for what it’s worth.
MAST 8 votes
PVI 7 votes
EOS Risk Management 5 votes