Feral Jundi

Thursday, October 14, 2010

Industry Talk: Aid Workers’ Security Situation Spurs Talks On Afghan Contractor Ban

        What happened to Linda Norgrove was tragic in two ways. First is if she was doing a critical job that put her in harms way, then she should have been given competent security folks who are professionals and capable. And second, the tragedy of her getting kidnapped and the government having to either rescue her or pay a ransom has become a PR nightmare for all involved.

     Of course in this case they felt it necessary to rescue her and that mission was not successful. So what is worse? Using private security or letting your people get kidnapped due to a lack of security? (it reminds me of the piracy debate) Which goes back to what this article is talking about.

     Afghanistan is a far more dangerous place these days and requires ‘true’ security professionals to safely transport crucial civilian specialists from point A to point B. With a shortage of dependable and professional local national security types, as well as a lack of available military escorts, private security contracted through experienced and capable companies are the final and best option in my view.

     Tim Lynch wrote a great post the other day that talked about Linda and the banning of security companies in Afghanistan. It is a good read and be sure to follow his posts as this situation develops.

     We will see how the State Department is able to navigate this one, because if they plan on continuing their missions out there they will need authorization by the Afghan government to continue using their security contractors on the roads. –Matt

——————————————————————

Aid workers’ security situation spurs talks on Afghan contractor ban

October 12, 2010

By Elise Labott

Concerned a ban on security contractors in Afghanistan will curtail the efforts of development workers, the State Department is feverishly negotiating with the Afghan government about a set of conditions that will allow private security details to operate in the country, senior U.S. officials told CNN.

The officials, who spoke on the condition of anonymity because of the sensitivity of the negotiations, said the United States is concerned about a four-month deadline Afghanistan’s president imposed last month to phase out the country’s 52 private security companies by year’s end. If implemented, the move would leave critical aid personnel unprotected and unable to continue their work, a key pillar of the U.S. strategy as it seeks to stabilize Afghanistan.

The U.S. is in intense negotiations with the Afghan interior ministry for a “clarification letter” that would spell out a consistent and uniform set of guidelines by which contractors would be allowed to remain in the country and under what conditions they can operate. The guidelines should be finished within the next week, they said.

(more…)

Tuesday, October 12, 2010

Building Snowmobiles: Open Source Counter-Terrorism

     The other day I read an interesting post over at Global Guerrillas called ‘open source jihad’. Open source is a concept borrowed by the computer and software development community with a philosophy derived by what Eric Raymond conceived in his essay ‘The Cathedral and the Bazaar’. (see below)

     What John Robb was referring to specifically was Al Qaeda’s new open source jihad magazine called Inspire. It is kind of a comical magazine, but it is also a symbol of what open source warfare looks like in today’s modern world. It is a magazine designed to give jihadists throughout the world the ideas necessary to successfully attack and defeat infidels. The magazine has no license over the ideas, and hands these ideas out to anyone who wants them. That is the power of the idea exchange, and the intent is for people to take those ideas and do something with them.

     Now this is where my ideas come into the picture. John Robb continues to promote what today’s enemies of the world can and will do with this concept of open source warfare. But to me, I would like to present what today’s ‘good guys’ can do with open source warfare. Call it ‘open source counter-terrorism’, or whatever you want to call it–because that is the point, you can call it whatever you want to call it. lol All you have to remember is that this is a strategy of ‘mimicry’. (taking your enemy’s strategy, and adding something to it to give you the edge)

     With that said, what would open source counter-terrorism look like? Simply stated, read Feral Jundi and that is open source counter-terrorism. My target audience is security and military professionals, as well as the public, and my message has always been that of countering today’s enemies with new and interesting strategies and ideas. From destroying the cartels, to counter-piracy off the coast of Somalia, to defeating the Taliban and Al Qaeda at their game. This blog is an open source warfare publication for those that care about the fight. This Inspire magazine is the enemy’s equivalent.

     I would also classify other blogs and forums/message boards I follow as a form of open source counter-terrorism or open source warfare. We all locate the stories that would be interesting to our peers, we present them to the community, and we discuss. Folks come up with strategies and ideas in their brain about how to counter a specific threat, or what equipment to buy, or how to set up their weapon, etc. Hell, I originally learned about contracting by visiting a forum called Tactical Forums, and I would classify that as ‘open source contract job search’. lol Because in the beginning, there were no books or schools to teach you how to contract. You had to learn from numerous online sources and build off of other contractor’s strategies for the job search and working in the industry.

     But what is missing in the whole open source counter-terrorism game is more of a focus on the public at large. To me, the jihadist fears a public that is armed with the knowledge necessary to defeat them. The jihadist, pirate, cartel, or whomever all depend on the idea that civilians do not have the mental or emotional fortitude to defeat them. That terrorism will always reign supreme. Pfffft. I would like to change that.

     To be realistic though, I don’t expect grandma to pick up an M-240 and mow down terrorists. But I do think grandma can do things that can throw a serious wrench into the Usama or Zetas terror machine. Grandma can pick up a phone, she can identify scenarios that would be of concern, she can identify persons, she can film/tweet/text via smart phone all sorts of stuff that would be interesting to the sheep dogs. There are tons of things grandma can do within her power. She also has a brain, and can logically think out strategies and tactics, or provide a missing piece of information that no one else thought up. She has value and an empowered grandma can certainly be a counter to the empowered jihadist.

     Another concept that was brought up on my Face Book page by some readers was developing games to help educate the public on how to fight these folks. Massive multiplayer games on Facebook, or spectacular video games like Modern Warfare are examples of the kind of games that get incredible reach. They also present scenarios for players to strategize and out think enemies. Just the kind of thing to fuel open source counter-terrorism. The TV show called Surviving Disaster is another example of empowering civilians to survive and even stop terrorism. Entertainment is an excellent way of getting the ideas out there.

     On a side note, one other area of open source warfare that I keep introducing and hoping others will build off of is the concept of Letter of Marque and Reprisal. It is an old system of licensing that provided structure and a legal mechanism for the state and private industry partnership during times of war. I think it can be an effective system if given some modern upgrades.

     The number one theme of open source counter-terrorism though is to promote the concept that counter-terror is not just for police or military. It is a concept that gets the civilian population involved with counter-terror, both directly and indirectly. Directly– meaning armed with knowledge to defeat these folks or disrupt their operations, and indirectly by discussing, developing and sharing new strategies and ideas, or building off of current strategies and ideas via blogs and forums, that can help police/military/public to defeat these enemies. A big hat tip to John Robb and his ideas, and to my readers over the years for fueling the great open source counter-terror game here on this blog. –Matt

Open Source Warfare

The Cathedral and the Bazaar

——————————————————————

Open Source Warfare

Glenn ReynoldsJohn Robb’s chilling brief on postmodern terrorism23 May 2007

Brave New War: The Next Stage of Terrorism and the End of Globalization, by John Robb

Last year, I wrote a book called An Army of Davids: How Markets and Technology Empower Ordinary People to Beat Big Government, Big Media, and Other Goliaths. It was a celebration of how technology empowers the little guy, though I did spend some time discussing the darker sides of this development. John Robb’s Brave New War is in a way the mirror image of my argument: it devotes a lot of space to the dark side of the technological empowerment of individuals and small groups, and much less to potential upsides.

The dark side is certainly there. In the old days, you needed many people to commit significant mayhem—something like a Roman legion, or at least a century. Nowadays, one man with an AK-47 is probably a match for a hundred Roman legionaries, and modern explosives make matters even more asymmetrical. In the foreseeable future, Robb concludes, we may even see a situation where an individual can declare war on the world—and win. Or as science fiction writer Vernor Vinge put it in his recent book Rainbows End, set in 2025: “Nowadays Grand Terror technology was so cheap that cults and criminal gangs could acquire it . . . . In all innocence, the marvelous creativity of humankind continued to generate unintended consequences. There were a dozen research trends that could ultimately put world-killer weapons in the hands of anyone having a bad hair day.”

Wednesday, October 6, 2010

Maritime Security: Maersk Line, CMA CGM, And MSC Unite In Piracy Fight

The three lines also called for other steps to be taken, including creation of an effective regional coast guard and possible transit corridors to East Africa.

Meanwhile most shipowners are reluctant to have guns onboard, with Maersk repeating its opposition to armed personnel on its ships while MSC is reviewing the situation after several piracy incidents.

“We do not have armed guards at the moment but we are considering their use, to protect our crew, the ship and the cargo,” MSC assistant operations manager Pasquale Ferraro said. 

*****

     Interesting news. I think what we are seeing here is a consolidation of companies to help alleviate costs for such things as protection of ships.  Strength in unity and economy of scale stuff here. So with that said, will we see investments from this trio towards this ‘effective regional coast guard’? And is this coast guard going to be operated by a private company or what?

     Or perhaps they are referring to the insurance backed private navy that was discussed earlier? The insurers that Maersk works with is Chubb and Marsh.  Could these two insurers be contemplating what JLT has been proposing?

     The other story that I attached to this one, is the increase of piracy off the coast of Nigeria.  Africa Energy Intelligence is reporting on all of the security company activity there in regards to increased threats to the energy sector. The insurgency (MEND) will get stronger because piracy will soon become a source of income that will only increase the strength and capability of that insurgency. Bottom line is that they are copying what the Somali pirates are doing, and will use that money for their fight against the oil interests and government in that country.

     So protecting boats from Nigerian pirates, Jihadist pirates, and Somali pirates is slowly becoming a focus of the companies and those that insure them. Because paying ransoms only makes piracy, terrorism, and land based conflict worse by inadvertently financing those activities. Interesting stuff. –Matt

—————————————————————–

Box trio unite in piracy fight

Sep 22, 2010

Maersk Line, CMA CGM and MSC are joining up to draw attention to the continued threat of piracy.

The carriers also intend to swap ideas about how best to tackle the problem, which is likely to worsen as the monsoon season comes to an end.

With no sign that piracy attacks are likely to recede, the three lines are hoping their combined voice will send out a clear message that more needs to be done to safeguard commercial shipping lanes.

(more…)

Publications: Breaking Ranks–Dissent And The Military Professional, By Andrew Milburn

Should dissent be founded on the right action or the right effect? A third of the MCWAR officers surveyed argued that in the face of a moral dilemma, the military professional should focus on the effect desired: mitigation of the immoral order, rather than the conscience- salving but possibly ineffectual act of resignation. These officers advocated an indirect approach: addressing higher authority, leaking the story to trusted journalists or politicians, and dragging their feet in execution— “slow rolling” in military parlance. “What else can I do?” asked one officer rhetorically. “My only option is to conduct covert actions to reduce the risks of misfortune and of American casualties.”18 This approach is certainly not without precedent. As one Army colonel commented in response to the survey, “The most (commonly) used form of disobeying an order I’ve seen is slow-rolling.”19 This option does have some prima facie appeal, combining its own moral logic with a pragmatic focus on effects.

***** 

     Thanks to Paul from Facebook for bringing this to my attention.  This paper is actually causing quite a stir amongst the military crowd, and is certainly thought provoking. It also is relevant considering the General McChrystal firing a couple months back.

     What struck me as extremely interesting, is the conclusion and the preferred method of dissent with today’s command. That would be covert dissent, because it allows the commander to stay in their position of power and continue to protect their people and others.

     Commanders have a choice when they have decided that an order is immoral. They could be overt or covert with their protest. If they are overt, they would be fired or have to resign, but their message would be loud and clear. This is a symbolic stance, and can be successful if used properly.  The problem with that one though, is their men would still be a victim of that order because the replacement leadership would probably be selected for it’s ability to carry out the order and not question the higher command. You would hope that the symbolic open protest would stop the activity, but what if it doesn’t? Now you are no longer in the loop to stop the source of this terrible and life threatening decision making.

     Or an officer can stay in that position, yet covertly protest the order using a number of methods. You can fight it from within. Slow rolling or ‘dragging your feet’ was mentioned as the most commonly used way to disobey an order. Other methods were to leak the immoral or unethical order to the press or appealing to higher authorities. With these methods, an officer can stay in command, achieve the goal of commanding and protecting their troops, while at the same time disobeying the order. In other words, to stay in their position of power and dissent covertly is preferred.

     Now if I was to compare this to the private industry, there are similar themes. On the blog I have talked about some of this stuff under the category of Jundism. ‘Have the courage to do what is right’ is one of those topics that I have touched on. I have also discussed ways in which managers or contractors can report wrong doing within the company. You can be an overt whistleblower, or you can dissent covertly.  My thoughts on it are to dissent covertly, use whatever strategy you can to protect self and others, and leave the company as soon as you can find another gig. With this last method, you can also educate your subordinates to do the same and as a manager you can protect them until they too can leave. Just leave and don’t waste your time and life on a pathetic company. With this method, the company will either suffer massive attrition, damage to their reputation and a loss of money. Or if they care to be competitive in today’s market, they will learn that ‘taking care of your people’ is pretty darn important.

     The only time I advocate open protest is when lives are needlessly put at risk because of a company policy, and time is of the essence. You must protect yourself and others, and do it the smartest way possible. But I also realize that the situation dictates.

     Another point to bring up for those of you that have an interest in monitoring companies.  Probably one of the best indicators of the quality and health of a company, is to review how many folks have resigned or were fired. Those companies with high attrition rates are usually the ones that do a terrible job of taking care of their people. Or to review those companies with numerous defaults on contracts.

     I have even heard of guards organizing and striking, and that would be another area to investigate. Or better yet, guards collectively jumping contract, and crossing over to another company.  That way they maintain work and their team cohesion,  and they overtly hurt the company by costing them money (training, transport, etc.) or causing a default on contract.

     But these contractors can also become blacklisted by said company with both of these incidents. A contractor’s reputation might be negatively impacted by an action like this as well. So with that said, a contractor really has to be smart as to the best course of action.

    With that whole blacklist thing, I will have to do a separate post.  You can get blacklisted or put on a ‘do not hire’ list for all sorts of reasons and it is another reason why dissent must really be thought through before you take action. Good stuff and definitely some ‘to be, or to do‘ related ideas. –Matt

——————————————————————

Breaking Ranks: Dissent and the Military Professional

By Andrew R. Milburn

Click here to download the PDF

Lieutenant Colonel Andrew R. Milburn, USMC, is assigned to Special Operations Command, Europe, Future Operations (J3).

There are circumstances under which a military officer is not only justified but also obligated to disobey a legal order. In supporting this assertion, I discuss where the tipping point lies between the military officer’s customary obligation to obey and his moral obligation to dissent. This topic defies black-and-white specificity but is nevertheless fundamental to an understanding of the military professional’s role in the execution of policy. It involves complex issues—among them, the question of balance between strategy and policy, and between military leaders and their civilian masters.

Any member of the military has a commonly understood obligation to disobey an illegal order; such cases are not controversial and therefore do not fall within the purview of this article. Instead, the focus is on orders that present military professionals with moral dilemmas, decisions wherein the needs of the institution appear to weigh on both sides of the equation. Whether the issuer of the order is a superior officer or a civilian leader, the same principles apply. However, because issues at the strategic level of decisionmaking have greater consequences and raise wider issues, I focus on dissent at this level.

(more…)

Monday, October 4, 2010

Industry Talk: ManTech Awarded $70 Million Contract To Operate BETSS-C In Iraq

     This is another former military task being handed over to a contractor as the mission continues to change in Iraq. This is a very important job, much like the C-RAM contract I mentioned in the past, and the defenses of these bases will depend upon the job performance of these companies. Good leadership on the ground and team dedication towards doing a good job is critical for this stuff.

     It is also critical that these companies take care of their people. Angry and disgruntled contractors in these positions could definitely be a threat to the contract/mission. It is a reality that impacts both the military and private industry, and it is important to treat your people right if you want them to perform. DoD would be greatly served if they maintained a close watch on the performance of these companies and their crucial task, because lives depend upon it. Trust, but verify. –Matt

—————————————————————–

USJFCOM contractors use the Base Expeditionary Targeting and Surveillance System – Combined (BETSS-C) to look for suspicious activity on the range during Empire Challenge 10 (EC10). EC10 is an annual USJFCOM-led, multinational intelligence, surveillance and reconnaissance demonstration that showcases emerging capabilities and provides lessons learned to improve joint and combined interoperability. (USJFCOM Photo by Air Force Staff Sgt. Vanessa Valentine)

ManTech Awarded $70 Million Contract to Operate Advanced ISR, Battle Command and Force Protection Systems in Iraq

Oct. 4, 2010

ManTech International Corporation, a leading provider of innovative technologies and solutions for mission-critical national security programs, announced today that it has received a task order under its Strategic Services Sourcing (S3) prime contract to provide Base Expeditionary Target Surveillance Systems-Combined (BETSS-C) operators in Iraq. The multiple-award task order, in support of the U.S. Army’s Project Manager Night Vision/Reconnaissance, Surveillance and Target Acquisition (PM NV/RSTA), has an initial period of performance of 12 months and two optional six-month extensions. The expected value to ManTech is $70 million if all contract options are exercised.

(more…)

« Newer PostsOlder Posts »

Powered by WordPress