Feral Jundi

Tuesday, August 30, 2011

Industry Talk: Pentagon Contracting Policy Is Faulted By The CWC And Center For Public Integrity

Our report is not an attack on contractors. In general, contractors have provided essential and effective support to U.S. personnel in Iraq and Afghanistan. But the costs have been excessive, largely because of a shrunken federal acquisition workforce and a lack of effective planning to use contractors and the discipline of competition.

That is great that the CWC made this distinction, because it is very easy for the government to place blame on private industry (agent), and not blame the Pentagon (principal) for any of this. I should also note that in the second article below, the author correctly placed blame on President Obama for not following through with his campaign promises. Here is the quote:

President Obama weighed in on the problem both as a candidate in 2008 and in a presidential memo in 2009. The center also cited a memo promising efforts at greater use of “multisource, continuously competitively bid” contracts issued in 2010 by Defense Undersecretary Ashton Carter, the Pentagon’s senior procurement chief.
But “campaign pledges and memos have made little headway in combating the problem,” wrote analyst Sharon Weinberger, whose team studied a dozen government reports and investigations and interviewed eight former government officials and experts.

And this is the statistic that really stands out. This administration has had plenty of time and opportunity to make things right and follow through with promises, and they have not done this.

Meanwhile, the Center for Public Integrity’s research findings, which it will unfold daily this week in a series called “Windfalls of War,” include an analysis of federal data concluding that “the Pentagon’s competed contracts, based on dollar figures, fell to 55 percent in the first two quarters of 2011, a number lower than any point in the last 10 years since the terrorist attacks of 9/11.” The center noted that the issue of noncompetitive contracting practices has been examined many times by the Government Accountability Office, the Defense Department’s inspector general, and the Commission on Wartime Contracting.

I can’t tell you how frustrating this has been to watch. The US government has so many reports and data points to draw conclusions from. We have been contracting for the last ten years and have numerous lessons learned to apply to our contracting machine.  How many more reports or suggestions or critiques does it take?

Now one thing that I noticed in the first article that I wanted to point out, is this quote:

Projects that are or may be unsustainable are a serious problem. For instance, U.S. taxpayers spent $40 million on a prison that Iraq did not want and that was never finished. U.S. taxpayers poured $300 million into a Kabul power plant that requires funding and technical expertise beyond the Afghan government’s capabilities. Meanwhile, a federal official testified to the commission that an $11.4 billion program of facilities for the Afghan National Security Forces is “at risk” of unsustainability.

Unsustainable projects, equipment, or weapons systems are an area of conflict that just kills me. We threw so much money at these conflicts, and the war planners and strategists determine projects that must be built to support the war effort. These projects create jobs and they give the local population something to do, other than picking up a gun and joining the insurgency.

But what happened to commons sense in this planning?  Why build a prison that Iraqis do not want?  Why build a power plant that would require money and expertise that a country does not have? It’s like giving some kid without a drivers license and makes 500 dollars a year, a Porche, and expecting them to be able to pay for the insurance, gas and maintenance of the thing. Let alone thinking they have the skills necessary to drive that vehicle safely. It is just irresponsible, and that is the way we should be looking at war planning and how we help these countries.

I would also be interested to read how many of these types of wasteful or unsustainable projects were the contributors to this $30 billion dollar figure? Of course I will concede to the fact that there have been wasteful or fraudulent companies, but over all I still put the blame on those leaders that came up with this war planning and oversaw this contracting process.

Finally, here is the list of suggestions that the CWC put up as a teaser. This is an interesting list, but I do disagree with the inherently governmental portion.

Security Council meetings to ensure that the many agencies involved in contingency contracts or grants are properly resourced and coordinated;
-Making more rigorous use of risk analysis when deciding to use contractors, rather than assuming that any task not on a list of “inherently governmental function” is appropriate for contracting;
-Requiring that officials examine current and proposed projects for risk of unsustainability, and cancel or modify those that have no credible prospect of operating successfully; and
-Creating a permanent inspector general for contingency operations so that investigative personnel are ready to deploy at the outset of a contingency, and to monitor preparedness and training between contingencies.

To me, contractors are certainly capable of doing anything the military can do. To include offensive operations. I have brought up examples of this kind of offensive capability, both American and other. Companies like the AVG’s Flying Tigers, our early privateers, or companies like Executive Outcomes all showed the potential of privatized offensive operations. So private industry can do the job, and to me, the decision to use private industry for such a thing should be based on the national security of a country, and of the military leaders tasked with protecting a country, and not on some false idea that industry is not capable of such things. Private industry is a tool in the toolbox of national security, and the survival of a country is ‘inherent’. –Matt

 

 

Reducing waste in wartime contracts
By Christopher Shays and Michael Thibault,
August 28, 2011
At least one in every six dollars of U.S. spending for contracts and grants in Iraq and Afghanistan over the past decade, or more than $30 billion, has been wasted. And at least that much could again turn into waste if the host governments are unable or unwilling to sustain U.S.-funded projects after our involvement ends.
Those sobering but conservative numbers are a key finding of the bipartisan Commission on Wartime Contracting in Iraq and Afghanistan, which will submit its report to Congress on Wednesday. All eight commissioners agree that major changes in law and policy are needed to avoid confusion and waste in the next contingency, whether it involves armed struggle overseas or response to disasters at home.
Tens of billions of taxpayer dollars have been wasted through poor planning, vague and shifting requirements, inadequate competition, substandard contract management and oversight, lax accountability, weak interagency coordination, and subpar performance or outright misconduct by some contractors and federal employees. Both government and contractors need to do better.

(more…)

Tuesday, August 9, 2011

Maritime Security: Pirates Using Wolfpack Tactics–Attacked Bulk Carrier With 12 Skiffs!

That’s 12 skiffs with 5-8 armed pirates per vessel, and all equipped with boarding ladders!  First off, bravo to the armed security team that was able to hold off such an attack! I would give every security contractor on that boat a bonus and a medal.

This kind of swarming attack was discussed earlier on this blog when we were talking about the New Rules of War. It is an interesting evolution of tactics, but one that is not surprising. Wolfpack also comes from the famous U-boat naval tactic.

But this incident also brings up some serious questions about the state of armed security teams currently in operation out there. This particular company was able to repel the attack, probably because they had a sufficient defensive plan, an organized force and the proper weapons. But what about those companies out there that do not have their operations squared away or are poorly manned, equipped and armed? Right now, armed guards on boats have a pretty good track record, but with tactics like these, I could actually see pirates successfully defeating an armed team.

Now what is a sufficient plan and/or weapons?  That is a great question, and I believe companies would be wise to consult those who are specialists when it comes to defending vessels.  One individual in particular that I would recommend contacting, would be Fredrik C. Jonsson, the author of Maritime Sniper Manual. You can find him on Facebook, and he has set up a Maritime Sniper Manual Facebook page.

What is really cool about Fredrik is that he can advise companies on the most cost effective and accurate weapons they would need, in order to deal with threats like ’12 skiffs swarming a vessel’.  I would imagine that most of the Russian type weapons would be adequate because of cost and availability. But definitely pick Fredrik’s brain on this if you are looking for ideas.

All in all though, it will be each team on each boat that has to pool their resources and thought power together, and figure out the best way to defend their client. I certainly hope that the companies that employ these brave souls are doing all they can to support them and give them the tools they need to be successful. From weapons to NVG’s, to solid admin and pay.  All of this is important, if you want your teams to be successful out there. And what is really important, is to have solid leadership managing those teams.

Strategically speaking, I believe the defense has the advantage out there. They have the height, they have the fields of fire, and they have the size of the vessel to work with. Any pirate up against an aggressive defense coming from such a platform, will have a tough time.  But that is why pirates are experimenting with wolf pack tactics. They can apply strength or combat power to one point on a vessel, and get the breach. Especially if they can occupy the rest of the defense of the vessel with the swarm and harassing fires. So to me, this is why it is so important that everyone gets the word about this potential threat, and really takes an honest look at their strategies and tactics for dealing with such a thing.

It is the same song and dance that I promote with the suicide assaulter tactic that enemies are using on land. You must study these attacks, and be honest with yourself about the effectiveness of your security plan. If you have a good learning organization within your team/company, and you apply Kaizen to the whole thing, you should do well. And never underestimate the enemy–know yourself, know your enemy. –Matt

 

John Hamilton's painting of a wolf pack attack on merchant vessels.

IMB Piracy Report

Attack Number: 303-11

Date: Sat Aug 06 2011

Type of Vessel : Bulk Carrier

Location detail: Around 20nm ENE of Assab, Eritrea

Attack Type: Fired_Upon

Narrations: 06.08.2011: 1505 UTC: Posn: 13:07.2N – 043:04.9E, Around 20nm ENE of Assab, Eritrea, Red Sea.

Twelve skiffs with five to eight pirates in each skiff approached a bulk carrier underway. As the skiff closed guns and ladders were noticed. Warning flares were deployed by te onboard security team. the skiffs continued to approach the vessel at 17 knots. At a distance of around 300 meters, on th ecommand of the Master, the onboard security team fired warning shots resulting in most of the skiffs falling back and circling the vessel. Two skiffs continued to chase the vessel and returned fire. The skiffs and the security team exchanged fire and after 30minutes and numerous approaches the skiffs aborted and moved away.
—————————————————————-
Attempted Pirate Attack in Red Sea Suggests Pirates Hunting in Packs?
Monday, August 8, 2011
According to a report filed Sunday August 7th by the IMB Live Piracy Reporting Centre*, pirates attacked a vessel approximately 20 nm off the coast of Eritrea in the Red Sea. What marks this attack out for special attention, and the reason it should be of particular concern to all shipping companies and members of the maritime community is that in this instance, it would appear the pirates attacked in large numbers, en masse.

(more…)

Monday, August 1, 2011

Publications: Claire Lee Chennault–Theorist And Campaign Planner, By Major John M Kelley

I wanted to post this as a resource for anyone studying private military forces and their uses by nations. Claire Lee Chennault led the company called the American Volunteer Group or AVG in China against the Japanese after the bombing of Pearl Harbor, all with US blessing. His small force of mercenary pilots fought for 600 dollars a month (which was two to three times more than their military pay) and 500 dollars per Japanese aircraft they shot down.(offense industry)

What makes Claire significant is his theory of war, and the US military’s desire not to heed his theories. Matter of fact, it was this clash that led to Claire leaving the military, and later going to China with the blessings of the US to advise China’s fledgling air force. Claire in essence had an outlet to apply his theories of war, and not only did he advise the Chinese, but raised a mercenary army to assist.

This small mercenary army of aviators took on the entire Japanese air force at that time, and it was Claire’s planning and strategic thinking that evened the odds against the Japanese. He was certainly able to prove his theories of air power as soon as Japan bombed Pearl Harbor and brought the US into outright war with Japan. AVG was the only asset of the US that could strike back at the Japanese immediately after that attack.

And boy did they stick it to the Japanese. Their private war lasted about 6 months, and they did some damage:

The AVG was officially credited with 297 enemy aircraft destroyed, including 229 in the air. However, a researcher who surveyed Japanese accounts concluded that the number was much lower: 115. Fourteen AVG pilots were killed in action, captured, or disappeared on combat missions. Two died of wounds sustained in bombing raids, and six were killed in accidents during the Flying Tigers’ existence as a combat force.

The fight was also very uneven, and this was a PMC versus the air force and resources of a nation. Here is a statistic of how many folks we are talking about. Which further emphasizes how the AVG had to really depend upon the support of the people and really effective use of aerial strategy.

By November 1941, when the pilots were trained and most of the P-40s had arrived in Asia, the Flying Tigers were divided into three squadrons: 1st Squadron (“Adam & Eves”); 2nd Squadron (“Panda Bears”) and 3rd Squadron (“Hell’s Angels”).They were assigned to opposite ends of the Burma Road to protect this vital line of communications. Two squadrons were based at Kunming in China and a third at Mingaladon Airport near Rangoon. When the United States officially entered the war, the AVG had 82 pilots and 79 aircraft, although not all were combat-ready.

The paper below goes into detail about the theory, and pay particular attention to how similar the thinking is to Sun Tzu. Yet there is not one mention of him studying Sun Tzu?  You see concepts like attacking weakness with strength, using deception, the effective use of lookouts and networks, and the whole ‘know yourself, know your enemy’ theme.  He really focused on the strengths of the Chinese people and bringing them into the strategy.  The people are the ones that called in enemy fighter positions through an organized system of observers, helped build up the 100 bases that were crucial to Claire’s mobility strategy, and helped rescue downed pilots. This was an aerial version of guerrilla warfare.

There is a lot of good stuff in this paper, and the point I want folks to think about for the grand picture of this story, is that private force can be a strategic asset of a nation.  Claire and his AVG ‘airmen of fortune’ were celebrated in the US and world as they prosecuted the war in Asia in the post Pearl Harbor days. It would be like DynCorp waging war in Pakistan in the days right after 9/11, and everyone cheering them on as they decimate terrorist hideouts.

The AVG or the Flying Tigers also remind me of Stirling’s Private Army in Yemen. I wouldn’t be surprised if AVG is what inspired Stirling, because AVG’s private war in Asia was big news around the world.  You could also classify this as a case for the successful use of a PMC in offensive operations, or actually fighting a war. (much like with Executive Outcomes) And of course, it is another case study of offense industry, with the use of bounties as an incentive. So for all of those reasons, I think it is important to give some attention and credit to this man and what he and his company was able to accomplish. –Matt

General Claire Chennault

Monday, July 18, 2011

Cool Stuff: The Children’s Illustrated Clauswitz

Filed under: Cool Stuff,Strategy,War Art — Tags: , , , , , , — Matt @ 2:14 PM

I chuckled when I first found out about this and was considering making this a ‘funny stuff’ post. But then I started really looking at this effort from a different point of view, and that is if you can reduce the theories of Clauswitz into a children’s book, then that is pretty damned cool and impressive. It would also really open up the world of strategy to children, and likewise shame adults who did not know about this strategy.

The other thing I like about this project is that I could see this book selling quite well to the defense industry families and military families of the world. Parents are always interested in the whole ‘Baby Einstein’ concept of buying products that could make their children smarter. Imagine a child learning the very basic elements of strategy at such a young age, and how that could apply to all of their endeavors for the rest of their lives?  I know I have been personally inspired by the leading strategies of business and war, and this knowledge has been immensely helpful for understanding the world we live in. That knowledge of strategy could also make a person wealthy, help in conflict resolution, help in contests of business or war, or even help in their personal survival. Lot’s of positives that can come from this knowledge. So what’s next?  A children’s illustrated guide for Sun Tzu or Col. John Boyd? –Matt

Blog for Children’s Illustrated Clauswitz here.

Tuesday, July 12, 2011

Maritime Security: Pirates Are Using NVG’s And Hacking Shipping Company Email Accounts

I had to put this one out there, because this is just one more indication as to what kind of game the pirates are playing. With the amount of money they are making from ransoms, a fantastic investment for them would be to determine what boats ‘do not have’ armed security, just so they can focus on those boats. From hacking accounts, to stealing or purchasing information, to watching the departing vessels and identifying if they have security–they are doing it all.

They are probably scouring the internet in other places as well, trying to obtain any information that would be helpful. That means online forums, Facebook, Twitter, blogs, open source news articles–all of the things that everyone in the world has access too.

What is troubling as well, is there are no laws or regulations on OPSEC for maritime security.  So if a guy wants to post photos or talk about their latest contract out on the high seas, they could do it without any pressure against the practice. It is on that individual, that company that hires them, and that shipping company that uses that guard force to keep this in check. I guess the thing that guys have to remember is that you have to assume that anything you post on your Facebook or forum, will be read by the public to include criminals. Criminal entities will find a way to read your stuff, despite your privacy settings, if they have determined that your information has value.

Likewise, if you are the owner of a security company or shipping company, I would suggest taking as many precautions as possible to protect your email accounts from hackers.  Perhaps look at using more secure email services like Hushmail or similar encrypted mail systems. Anything to make it more difficult for these guys to find out what you are up to. An IT security specialist could be a good investment for getting you started on a secure system of communications and protocols.

The other thing I wanted to bring up, that this article kind of delved into, is the latest pirate tactical developments. It is my understanding that not only are pirates using cutting torches so they can break into safe rooms, but are also using night vision goggles or NVG’s to attack at night.(thanks to a reader for the tip) With that said, I would highly suggest to companies that have teams on boats to equip your folks with NVG’s and ensure your ‘night time strategy and tactics’ are sound. Pirates are attacking at night because it is a tactical advantage. You must also assume that they have thought about the other tools of night time boarding, and this should give the naval warfare experts out there plenty to chew on as to how best to defeat such a thing.

So what else could the pirates do to gain advantage?  How about using UAV’s?  A store bought RC plane with a camera or night vision camera, could easily be deployed by a pirate crew to probe your vessel’s defenses. They could also use UAV’s to look for potential targets out there.  Or an investor might come along that has access to the bigger more capable UAV’s, and provide that for the operation. Anything the pirates think they need to be successful will be looked at in terms of cost benefit analysis.

Another thing they could do is actually go into the water with a re-breather, and at night, much like a commando unit would do, all to close the distance and gain surprise. They could also contract the services of criminal groups that might specialize in this kind of diving. Anything for them to gain relative superiority in their assault.

I would also think that pirates have been studying military tactics and strategy for operations on the high seas. Anything that a modern naval force would do in terms of boarding ships, a pirate crew will try to copy.(mimicry strategy) Pirates will watch youtube videos, or watch in real time as naval forces do their thing out there. They are watching and learning, and driven by the thrill of the hunt and the massive reward for their efforts.

Another development is upgrades to current weaponry. This article from Maritime Security Review discussed the possibility that pirates are now using RPG 29’s. Here is the quote:

One maritime security sources said that this may point to the acquisition of the RPG 29 model, rather than the standard RPG 7.
RPG 29s were developed in Russia in the 1980s, and pack a punch sufficient to penetrate the frontal armour of most modern tanks. Secondhand models are now in circulation in the Middle East. Security professionals have feared for some time that the Somalis would sooner or later get their hands on them.
According to experts, when the more powerful RPGs are deployed, “A vessel’s hull might be easily breached, with further damage, injury or even death incurred to the crew within.”

The other thing to look at is the money and support mechanism for today’s piracy. Investors know a good deal when they see it, and especially jihadist investors. If groups like Al Shabab are demanding a 20 percent cut in the profits, then now piracy becomes a cash cow for them and their operations. In some parts of the world, piracy might be the only real criminal/fund raising game in town, and the rise in piracy attacks only confirms the popularity and profitability of this type of offense industry.

Piracy also has a lot of cross over benefits as well. You can use these guys to smuggle drugs, weapons, terrorists,  human traffic, and all for profit. You can use these guys to capture large boats to use as weapons against ports, blocking waterways, or attacking other vessels, or as bases for attacks. So piracy is an excellent game for terrorists and criminals to get into, and they are mutually beneficial to each other. In order to stay ahead of these guys in terms of strategy and tactics, all of us must continue to study and ‘know our enemy’.  Never underestimate them and always assume that if you can think it up, they have probably came up with the same idea. –Matt

Pirate Games
July 12, 2011

The Somali pirate gangs have adapted to the growing fleet of warships and maritime patrol aircraft arrayed against them. One of the new tricks is getting into the databases of shipping companies and their Internet based communications. This information is bought from criminal operatives in London and the Persian Gulf, and provides precise information where the most lucrative and vulnerable ships will be.
Much of the money obtained from ransoms is used to buy goods and services from Persian Gulf merchants and other “specialists.” This includes assistance in negotiating with the shipping and insurance companies, as well as other services. This includes intelligence. The Persian Gulf is rife with corruption, and this makes it easier to buy needed information. That’s harder to do in London (the center of the maritime insurance industry, and where much information on where the most valuable ships are). British police have detected some efforts to obtain information for pirates, and believe these efforts are becoming more intense.

(more…)

« Newer PostsOlder Posts »

Powered by WordPress