Feral Jundi

Wednesday, July 29, 2009

Afghanistan: The Taliban Release a Copy of Their ‘Code of Conduct’ Rule Book

Filed under: Publications — Tags: , , , , , , — Matt @ 1:26 PM

   I found this at Jarret Brachman’s blog, which he got from Al Jazeera English.  If you follow the link below, he has some more stuff on these rules. It looks like the Taliban command is trying to get organized, or at least give the impression of getting organized. –Matt

——————————————————————

Code of conduct for Taliban

“From the Supreme Leader of the Islamic Emirate of Afghanistan [Mullah Omar] Layeha (rulebook) to the Mujahideen.

Rules for mujahideen. Each mujahid is obliged to obey the following rules:

1. A person with responsibility (only commanders) is allowed to give an invitation to those Afghans who are supporting infidels to join the way of the true Islam

2. To those who leave the infidels we will grant security for him and his property. But if he has some personal dispute, or somebody has some claim against him, he has to face our judiciary system.

3. Each mujahideen who is in contact with supporters of the current regime and who invites them to join the true Islam has to inform his commander.

(more…)

Friday, July 10, 2009

Publications: IG Says SBInet Has Too Many Contractors

Filed under: Publications,Technology — Tags: , , , , , — Matt @ 9:17 PM

     Now I read through the report, and there was no mention of EODT using armed guards to protect the building of these sites, so that was not the ‘inherently governmental’ portion they were talking about.  They were talking about the contractors doing the job of upper level management of CBP, which to me is a no-brainer–no duh that is inherently governmental.  It’s also inherently lazy on the part of the CBP to not draft their own reports for congress to read.

(more…)

Friday, June 12, 2009

Publications: At What Cost? Contingency Contracting in Iraq and Afghanistan, By the CWC

 

   Interesting report and check it out.  The things I thought were interesting was the discussion about the TWISS2 contracts, the RUF, and the fear of repeating the same mistakes in Afghanistan.  You think? pfffffft.-Matt

—————————————————————- 

Wartime Contracting Report

At What Cost? Contingency Contracting in Iraq and Afghanistan

By the Commission on Wartime Contracting in Iraq and Afghanistan 

 

Let the commission know what you think, click here. 

Saturday, May 30, 2009

Industry Talk: Contractor Census- More Security Contractors, Less Overall Contractors in the USCENTCOM AOR

   There is a lot of juice in this report(s), and I recommend reading through it to get a feel for where things stand right now.  The stuff that jumped out at me, is the increase in security contractors in both Iraq(23%) and Afghanistan(29%) from the last quarter census.  You would think with all the negative press out there, that the US would be cutting down on the use of armed contractors.  It looks to me like someone at least appreciates what we do, enough so to contract even more of us.  

   To me this is significant.  With Iraq, troop withdrawals will be creating security vacuums in some areas, and security contractors will be filling those gaps. And with the RUF being that we are only limited to defensive operations, you will see us taking over many defensive operations in Iraq and more Coalition troops being freed up for offensive operations.  The numbers don’t lie.

   With Afghanistan, this makes sense as well.  With an increase of troops, there will be an increase in support in the form of contractors.  But someone has to protect those contractors while they build stuff, and those security contractors will be used to defend FOBs to free up the troops so they can go on the offense.

   I highly recommend checking out the report, because it showed the graphs that went along with the report, as well as the break down in contractor types.  It is broken down under US Citizens, Third Country Nationals, and Local Nationals.  In Iraq, Third Country Nationals outnumbered everyone- lots of Ugandan security contractors is one example.  In Afghanistan, it is the Local Nationals that outnumber everyone, and there is no surprise there.   

   The trend line is there and security contractors are stepping up to fill these defensive security needs in the war. My hope is that the reforms needed to manage and account for these contractors is able to catch up.  And this report below showed some promising new developments in that area as well.  It sounds like the SPOT database is starting to work it’s magic, and I am glad they were able to get a better handle on the accountability area.  The decrease in overall contractor numbers from last quarter was somewhat contributed to this new database tracking system.  There is a description of the SPOT in the link I provided below, and I recommend reading that report as well.    

   In other areas, we will see how the SOFA and UCMJ issues turn out, because that is an area that definitely needs leadership and enforcement.  I still think that we need to be moving faster on the issue of contractor management and accountability, and for it to take this long to get just this far is disheartening.  We have a war to fight and this is all stuff that should have been hashed out years ago. –Matt

—————————————————————— 

CONTRACTOR SUPPORT OF U.S. OPERATIONS

IN USCENTCOM AOR, IRAQ, AND AFGHANISTAN

BACKGROUND:  This update reports DoD contractor personnel numbers in theater and outlines DoD efforts to improve management of contractors accompanying U.S. forces.  It covers DoD contractor personnel deployed in Iraq, Afghanistan, and the U.S. Central Command (USCENTCOM) area of responsibility (AOR) as of March 31, 2009.

KEY POINTS:

Ending 2nd quarter FY 2009, USCENTCOM reported approximately 242,657 contractor personnel working for the DoD in the USCENTCOM AOR.     

(more…)

Friday, May 22, 2009

Publications: Social Networking and National Security: How to Harness Web 2.0 to Protect the Country, by James Jay Carafano, Ph.D.

   Wow, maybe Dr. Carafano is reading FJ?  Because I read through this thing and thought that this was right up there with all the MyPMC.com stuff that I have been talking about.  So bravo for building that snowmobile!

   A couple of things I want to add to this thing, just to put a sprinkling of salt on this dish. Millennials (Generation Y), smart phones, and Boyd’s good ol’ Destruction and Creation paper to be more specific.

    Gen Y will have a huge impact on this country and the way we do business, and they already have had a big impact with the election of President Obama.  They are also one of this country’s main brains and braun in today’s work force. 

    According to this article, there are three (suggested) core elements that drive the ambitions of Generation Y in the workplace : 

Impact–Making a difference is a strong motivational force behind Gen Y’s efforts. Though salary and benefits continue to dominate the no. 1 and 2 on the importance list, making an impact ranks no 3.

Communication–The instant communication framework Gen Y developed through extensive computer usage has lead to a need for more professional feedback than that of past generations. Communication platforms such as SMS, e-mail, video chat, microblogging and blogging have engendered a mindset that necessitates constant communication with others. That mindset has carried over into the workplace.

Flexibility–The divide between work and life is continually growing narrower as more people shift from the bricks-and-mortar to a remote workplace. The rate of remote office workers has increased significantly in the past two years, according to WorldWideWeb.  

   In order to answer the needs of this kind of workforce, you must embrace the tools in which they depend upon.  The benefit will be incredible, if these Network Scientists and social networking engineers can come up with the right framework for this crowd. 

   I have already made my case for how PMC’s/Countries could use this technology, and guess what, today’s contractor workforce are all Millennial Combat vets with iPods and laptops and Myspace/Facebook accounts.  Embrace this stuff, or be left in it’s wake.

   Next, smart phones.  I mention this, because most everyone will have a smart phone here where they will be able to access their social networks, and they already do.  And because each person is like a walking sensor in whatever environment they are in, to not take advantage of this is stupid.  Emails, SMS, word processing, GPS, pictures and film, etc. are all possible on today’s smart phone.  Language software, internet surfing, youtube, you name it, and it is on a smart phone.  The more smart phones that flood the telecom market, the cheaper they get, and the impact of such a thing is that the Millennials will be even more connected and inspired by their environments.  I say inspired, because if that individual wants to make a difference, it will require stimulus that is outside of their bubble or system.  Closed systems suck, and smart phones are a way for people to maintain their connection online.  It allows them to venture out into the world and not worry about missing communications, and if you take the time to watch today’s society in let’s say a mall, you will soon see what I am talking about.  Everyone has smart phones or is wanting to get one, and it will have an impact.  

   Wait until the smart phone wave hits places like Afghanistan and Iraq.  These phones are like a internet cafe in your pocket, and that is a very powerful tool for anyone out there.  From the insurgent learning to make rockets from a Youtube video on a iPhone, to the English student trying to learn the language through a class on the phone, to a doctor looking up crucial information about a procedure–smart phones and all the open source applications that come with, will catch like fire in these countries and have an impact. 

   Finally, the wonderful paper called Destruction and Creation, written by Col. John Boyd, should get more mention when we talk about social networks.  The concepts define exactly why closed systems are not good, and to me, a social network is an excellent tool to open up a system and get external influence.  Think about it a little, and you start to understand why social networks are so powerful.  If I was to take this to a grand strategy level, social networks will help us to not be isolated mentally compared to our enemies. –Matt

Edit:  Dr. Carafano has just visited the site. (see comments section below) 

——————————————————————- 

 

Social Networking and National Security: How to Harness Web 2.0 to Protect the Country

May 18, 2009

by James Jay Carafano, Ph.D.

Backgrounder #2273

Computers have changed how Americans do almost everything. Soon they may alter national security. There is much more on the information superhighway these days than information. There is a traffic jam of conversation facilitated by e-mail, Facebook, MySpace, YouTube, Flickr, Digg, Wikipedia, LinkedIn, Twitter, and other social networking tools (often collectively called Web 2.0) that facilitate discussion, debate, and the exchange of ideas on a global scale.[1] This unprecedented capacity to listen and respond is inexorably restructuring the ways in which information is created and used.

(more…)

« Newer PostsOlder Posts »

Powered by WordPress