operaciones clandestinas PMC

Dedicado a las compañias privadas de servicios militares, seguridad e inteligencia.
abuelo
Colaborador
Colaborador
Mensajes: 39
Registrado: 12 Ene 2007 12:47

operaciones clandestinas PMC

Mensaje por abuelo »

Buenos dias.

Llevo mucho tiempo leyendo diariamente el excelente hilo sobre las PMC y el trabajo de los PSD y queria dar la enhorabuena a Loopster de tenernos tan bien informados.

Una consulta Loopster, ¿podrias comentarnos algo mas de la PMC SOC-SMG y las operaciones "ofensivas y clandestinas" de esta u otras empresas?.

Muchas gracias.Saludos.
Avatar de Usuario
Loopster
Jefe de Operaciones
Jefe de Operaciones
Mensajes: 3298
Registrado: 10 Ene 2007 12:32
Ubicación: 22 Bunker

Mensaje por Loopster »

abuelo escribió:queria dar la enhorabuena a Loopster
Muchas gracias :wink:
¿podrias comentarnos algo mas de la PMC SOC-SMG y las operaciones "ofensivas y clandestinas" de esta u otras empresas?.
No :?

Como comprenderás sobre operaciones clandestinas no te puedo confirmar ni comentar nada más allá de lo que ya esté publicado. Lo siento pero al igual que en lo referente a unidades militares regulares... lo clandestino queda en la clandestinidad.

Solamente puedo decirte que se "abusó" de la política de armamento autorizado para PMCs y que SOC-SMG tiene contratos para dar cursos exclusivamente a varias unidades de OEs del Ejército Iraquí. El periodo de "involucraciones no necesariamente defensivas" fue más o menos público cuando las PMCs se dedicaron a reclutar y adiestrar a unidades del ejército iraquí y de la FPS (Facility Protection Service), donde se estiró la normativa para realizar operaciones preventivas contra atacantes confirmados. Raids sobre fábricas de coches bomba, supervisión de operaciones del ejército iraquí en Fallujah y Ramadi, etc... lógicamente si una PMC ha instruido una unidad militar iraquí y ésta debe combatir, no se la va a dejar bajo el mando de otra unidad americana que nunca ha trabajado con ellos.

Esto fue en 2004, 2005, a partir de entonces el ejército americano tomó el control del adiestramiento, instrucción y dirección del ejército iraquí.

Actualmente los contratos PMCs-ejército iraquí son del tipo CIVPOL, para enseñarles técnicas de investigación policial, seguridad básica, etc.

PD: Por supuesto varias PMCs siguen metidas en operaciones bajo dirección de la CIA/DIA/SSB... pero no se pueden dar datos concretos.
Cry havoc and unleash the hawgs of war - Otatsiihtaissiiststakio piksi makamo ta psswia
abuelo
Colaborador
Colaborador
Mensajes: 39
Registrado: 12 Ene 2007 12:47

Mensaje por abuelo »

OK lo entiendo.
Última edición por abuelo el 11 Mar 2016 23:00, editado 1 vez en total.
Avatar de Usuario
Loopster
Jefe de Operaciones
Jefe de Operaciones
Mensajes: 3298
Registrado: 10 Ene 2007 12:32
Ubicación: 22 Bunker

Mensaje por Loopster »

Ningún problema, imaginaba que no eras periodista (esos directamente me mandan un email y se piensan que voy a ir directo a contarles algo :lol: :lol: :lol: )


¿Lagarto? :wink:
Cry havoc and unleash the hawgs of war - Otatsiihtaissiiststakio piksi makamo ta psswia
abuelo
Colaborador
Colaborador
Mensajes: 39
Registrado: 12 Ene 2007 12:47

Mensaje por abuelo »

Si,lagarto lagarto.... pero ahora mismo cumpliendo funciones de corbata.

Saludos
Avatar de Usuario
Loopster
Jefe de Operaciones
Jefe de Operaciones
Mensajes: 3298
Registrado: 10 Ene 2007 12:32
Ubicación: 22 Bunker

Mensaje por Loopster »

En las próximas 24-48 horas va a ser publicado en varios blogs americanos sobre privatización de servicios militares y de inteligencia, así que como va a dejar de ser un "secreto a voces", ya podemos colgarlo aquí.

La empresa encargada actualmente de organizar, entrenar y dirigir en combate a las unidades especiales del Ejército de Iraq (suní) es USIS, United States Investigative Services, empresa dedicada a la investigación de futuros empleados del gobierno federal o de otras empresas de seguridad, pero con algunos detalles como ofrecer equipos de supervisión de seguridad formados y dirigidos por miembros de la Red Cell original (la de los 80).

Entre las actividades que llevan a cabo actualmente en Iraq están incluidas el encargarse de manejar varios de los sistemas de inteligencia y coordinación en la flotilla de KingAir 350 (dedicados a tareas COIN en la frontera con Irán) y a entrenar a varios equipos de comandos iraquíes, uno de ellos fue el que asaltó hace pocos meses la "fábrica" de camiones bomba y bombas químicas de Ramadi.

PD: No, no he sido yo quien lo ha contado por ahí, palabrita del niño Jesús.
Cry havoc and unleash the hawgs of war - Otatsiihtaissiiststakio piksi makamo ta psswia
chuski
Apoyo Tecnico
Apoyo Tecnico
Mensajes: 75
Registrado: 17 Oct 2007 21:32

Mensaje por chuski »

Cuando estuvísteis en Inf de Marina?
kilo009
Administrador
Mensajes: 7691
Registrado: 13 Nov 2006 22:29
Ubicación: Foro de Inteligencia
Contactar:

Mensaje por kilo009 »

¿Controlará la Policía afgana a los contratistas? Lo dudo bastante, muchos intereses, mucho dinero en juego y necesidad de protección.
Security companies fall foul of gun controls

Afghan police have begun a crackdown on private security guards carrying guns in Kabul, paralysing foreign aid and other organisations whose rules oblige them to travel with armed escorts. The Interior Ministry has also detained four foreign employees of two security companies for several days, including two British citizens who were released on Saturday but still have charges pending against them, The Times has learnt.

A French citizen and a Nepalese former Gurkha are thought still to be in custody after being detained, like their two British colleagues, on suspicion of carrying unlicensed firearms.

The Government says that it is trying to control illegal weapons and improve the regulation of an industry that has grown from nothing in 2001 to at least 60 companies employing almost 30,000 people, including up to 10,000 foreigners.

Industry insiders say that elements of the police are trying to cripple foreign firms and drive their clients to Afghan firms with links to the Interior Ministry or other parts of the Government. ASG, one of the biggest Afghan private security companies, is owned by a cousin of President Karzai.

Others suggest that some government officials are suspicious of private business in general and want to renationalise the entire security industry. Either way, the issue threatens to disrupt international civilian and military operations in Afghanistan, where private security companies even guard food and drink supplies for military bases.

“For a long time this has been seen as a private sector problem and, as much as people felt sorry for us, they didn’t want to get involved,” an industry source said. “But if it affects us, it affects our clients. The people who suffer in the end will be the people of Afghanistan.”

The Government has been putting pressure on the industry since last year, when it scrapped its old licensing regime and started drawing up new regulations, which among other things raised the licence price from $10,000 (£5,000) to $120,000. The new regulations were approved by Cabinet last month, but have not yet been through parliament, leaving many security companies in a legal limbo.

“It’s all very confusing,” another industry insider said. “The problem is that some people in the police and Government are connected to the dodgier local security firms.”

The latest blow came on Friday, when a local television station reported that police planned to search all private security guards and arrest anyone found carrying a firearm. Although that plan has not been confirmed officially, private security companies have taken it seriously because of the recent arrests, and some have decided to stop carrying firearms altogether. That has forced some of their clients to halt operations, because their security regulations insist that they be escorted by armed guards.

They are believed to include USAid, the US Government aid agency, and Bearing Point, a consultancy linked to the World Bank that advises the Afghan Finance Ministry. Neither organisation was available for comment. “It has started to have an impact on our clients and some have ceased operations – and these are not small operations, they are big players,” one of the industry sources said.

Many aid workers and other foreigners had already had their movements limited by curfews or “lockdowns” introduced after the Taleban attacked the Serena Hotel in Kabul last month.

Zamarai Bashary, an Interior Ministry spokesman, denied that a blanket ban on armed guards had been introduced but admitted that a crackdown had begun and several arrests had been made. “We have arrested a number of people – some foreigners, some Afghans – who were carrying weapons with no licence under the name of private security companies. These people have to comply with our laws and regulations, otherwise they damage the security situation rather than helping it.” He declined to identify those arrested.

Sources told The Times that they included two British and two Afghan employees of Blue Hackle – a British private security company – and that they were detained in Kabul on January 27. The Afghans are thought to have been freed yesterday. The British Embassy in Kabul declined to comment.

Blue Hackle said: “We are of course delighted that our employees have been released, but sensitivity is obviously very high and it would be inappropriate to comment at this stage.” The Frenchman and the Nepalese are thought to work for Global, another large security company whose clients include USAid.

Global staff were not immediately available for comment.

Growing concern

60: private security companies (PSCs) are currently working in Afghanistan

20: of these are owned and run by Afghans

30,000: security personnel are employed by all PSCs across the country

5,000: of these personnel are Westerners 5,000 are nonAfghans. Many of these are from Turkey, Pakistan, India and Nepal

17: of the PSCs are UK-owned

43,750: handguns, rifles, machineguns and rocket-propelled grenades are in the arsenals of PSCs

3.5: weapons for each employee

6,000: personnel are employed by the two largest US companies, Blackwater and DynCorp 500 average daily pay, in US dollars, for international PSC staff
Saber para Vencer

Twitter

Facebook
Avatar de Usuario
Loopster
Jefe de Operaciones
Jefe de Operaciones
Mensajes: 3298
Registrado: 10 Ene 2007 12:32
Ubicación: 22 Bunker

Mensaje por Loopster »

Joder con el artículito del Times... ¿por dónde empiezo? :twisted:

30,000: security personnel are employed by all PSCs across the country


43,750: handguns, rifles, machineguns and rocket-propelled grenades are in the arsenals of PSCs

3.5: weapons for each employee
43.750/3,5 = 12.500... 30.000 - 12.500 = 17.500 que (según el propio artículo del Times) se habrían sacado ellos mismos de la manga.
6,000: personnel are employed by the two largest US companies, Blackwater and DynCorp
Ni hartos de whisky tienen 6000 empleados en Afganistán. La compañía con más gente en Afganistán tiene 2300 empleados incluyendo afganos, TCNs y expats, y no es ni Blackwater ni Dyncorp.

Estas dos frases son lo único del artículo que explica algo...
Industry insiders say that elements of the police are trying to cripple foreign firms and drive their clients to Afghan firms with links to the Interior Ministry or other parts of the Government. ASG, one of the biggest Afghan private security companies, is owned by a cousin of President Karzai.

among other things raised the licence price from $10,000 (£5,000) to $120,000
Nada nuevo, ya comentamos los primeros arrestos en el foro semanas atrás, todas las empresas cerradas estaban dirigidas por afganos a excepción de una norteamericana cuyos archivos fueron confiscados y dos directivos arrestados por... otra PMC norteamericana :wink:
Cry havoc and unleash the hawgs of war - Otatsiihtaissiiststakio piksi makamo ta psswia
Avatar de Usuario
Loopster
Jefe de Operaciones
Jefe de Operaciones
Mensajes: 3298
Registrado: 10 Ene 2007 12:32
Ubicación: 22 Bunker

Mensaje por Loopster »

Posible cagada OPSEC de una empresa vinculada con la CIA y la NSA que trabaja suministrando traductores, lingüistas, software, hardware y expertos en guerra electrónica y de comunicaciones.

http://www.thespywhobilledme.com/the_sp ... s-web.html
[b]Contractor's Website Reveals Clandestine CIA Programs[/b] escribió:Is there any way one can figure out some of the CIA's most highly guarded secrets from a corporate website?

Absolutely.

I’ve done it. (And you can count on it that America’s friends and enemies alike have, too.)

Recently while researching a piece for The Spy Who Billed Me, I took a break and reviewed my internet logs to see who was curious about my recent writings on the black sites. Among hundreds of hits on the page (and thousands in the logs), one in particular jumped out. It was a single page view that lasted for some fifty seconds and it came from an unmasked site, a common signature. I backtracked it and was shocked at what I found.

Typically members of the Intelligence Community have their IPs masked when they visit the blog, living no fingerprints, but not this one. The hit was from a company I had never heard of before, but with less than a minute on their site, I knew I had discovered one of the Intelligence Community's most secretive contractors, one of the A teams. The big surprise was that this corporate website leaked secrets like Zubaydah after his first thrifty-five second waterboarding.

I'm sure many are skeptical that a contractor would reveal clandestine ops on their sites, but keep in mind their sites are also marketing themselves to the corporate world and sometimes they say a little too much, believing that they have coded their information enough to protect it.

So let's see what can be deduced from an open source, available to all of America's friends and enemies on the world wide web. We’ll dissect the company's website and see just how well intelligence outsourcing is working from an operational security perspective.

(Note: Not that every intel agency worth it's salt hasn't already scooped up this info, but out of respect for Intelligence Community sensibilities, I'll call the Dulles toll road corridor contractor "Heckle and Jeckle Gizmos" and I won't quote directly from the site.)



Now the first question when reviewing Heckle and Jeckle's site, or any contractor's for that matter, is to ask: who do these guys work for? This can help quickly zero in on what they're up to.

Heckle and Jeckle boast that most of their employees have TS/SCI clearances, many based on a particularly thorough procedure, the highest level of security clearances. There are but a handful of government agencies that require this for contractor access and really only two major intelligence agencies that do so. One of them is located in Langley, Virginia a couple of miles from the eastern entrance to the Dulles Toll Road and it has well-known, overt satellite offices stretching out west thereon at various exits. The other is located in Ft. Meade, Maryland.

For those who live as far out of the Beltway as I do, these clearances suggest that Heckle and Jeckle are doing business with the CIA and NSA.

The specific governmental entities Heckle and Jeckle provide outsourced services for can be quickly narrowed down though the geography of their corporate offices which are located near Dulles airport in northern Virginia; in Cumberland County, North Carolina; Virginia Beach, Virginia and Tampa, Florida and if we dig a little we discover they have staff co-located at an Annapolis Junction Maryland facility. To the uninitiated, that means they contract with the CIA, work extensively with Army and Navy tier-one Special Forces Teams as well as Special Operations Command (SOCOM) with a little NSA thrown in.

When it comes to who is working for whom in the Intel Community, geography doesn't lie: Location, location, location.



For purposes of our analysis, the next question then becomes , what is Heckle and Jeckle's specialty? According to their site, it's specialized communications, including nonattributable communication systems and communications devices that function in hostile environments. In fact, their employees have experience working in hostile and denied areas and have immediate availability to deploy as part of a team or alone to ply their trade abroad or in the US. (Private domestic spying, anyone?)

Go-bags packed, ready to deploy with teams raises the obvious follow up question: which teams?

Anyone know any teams in Virginia Beach or Fayettenam?

And where would they be tagging along with these Special Forces teams? Maybe to the Special Forces Club in London, but Heckle and Jeckle’s employees' background suggests foreign hostile or denied areas.

Now what could they possibly do in hostile, denied or politically sensitive areas?

Again, the contractor’s website gives us the answer: Heckle and Jeckle's comm equipment has offensive and defensive capabilities.

Offensive communications--can you say clandestine ELINT and SIGINT collection?

In laymen's terms, setting up in a house that happens to be in the path of a highly directional signal or on top of just the right cable, but in this case the metaphorical houses are probably in such friendly spots as Iran or wherever the yellow brick road of GWOT contracting leads.

To pull the conclusions of our open-source intelligence (OSINT) together, Heckle and Jeckle teams stand ready, custom-designed high-tech gadgets in hand, for clandestine missions in enemy territory to covertly and remotely intercept foreign communications or penetrate information systems. This can be done independently or in conjunction with SEAL or Delta or other secret squirrel teams on behalf of SOCOM and the CIA.

In other words, they set up black sites albeit a different type than has been in the news lately. To put it into context, such black sites such as covert listening posts in hostile territories and even in friendlier ones where discovery could create international tensions count among the Intelligence Community's blackest secrets. And now, thanks to the About page on Heckle and Jeckle's website, we know that the CIA is outsourcing this to Heckle and Jeckle, whose identity would make it somewhat easier to uncover the black collection sites.

Now that's serious OPSEC.

(We can only hope that they outsource the cover aliases they use when establishing and serving these sites.)





Digging inside the website, particularly into its previous versions which can be found in the internet archive, we can create an even more revealing picture of what Heckle and Jeckle are up to.

From job descriptions for various types of engineers they're seeking, we learn that their main facility is near the Dulles Toll Road in northern Virginia. Since contractors tend to locate their main facilities near their contracting agencies, this suggests that the bulk of their work is for the Division of Science and Technology (DS&T) at the CIA, the relevant offices of which are conveniently located nearby. No surprise. DS&T provides the equipment that the National Clandestine Services uses to do its job.

In 2005 the firm began posting job openings (although it's questionable how many linguists and engineers know enough about H&J to to go directly to their site looking for a job.) These are rich with details indicating various clandestine programs, OSINT just waiting to be scooped up.

Here we learn that Heckle and Jeckle are seeking subject matter experts (SME) in Arabic to work with its customer's teams in Annapolis Junction, MD. This can only be the National Security Agency. The NSA is primarily made up of contractors and providing them with SMEs is nothing special. Let's move on.

Heckle and Jeckle also brag about a micro-electromechanical facility which becomes particularly interesting in conjunction with their job openings announcements. Reviewing the skill sets they're looking for, it quickly becomes apparent that they design and program their own computer chips, so they're clearly creating proprietary cutting-edge gadgets. It's notable how frequently they're searching for engineers with experience in one of the most miserable operating systems for mobile devices: Windows mobile. They're also regularly seeking programmers versed in another mobile device language: Symbian. Now this information taken in conjunction with their specialty and their prior claims of micro-electromechanical facilities suggests they're designing and creating a lot of mobile, hand held covert communications devices.

And here I'd venture a pure guess that these are probably designed to look like standard run-of-the-mill Treos and other smart phones, blending their “intelligent phones” into the mobile world. The largest consumer of such gizmos is, of course, the CIA's DS&T, adding to suspicions that Heckle and Jeckle is a major DS&T contractor. The primary use of such covert communications gear is for communications with nonofficial cover officers (NOCs) and agents. So the information on Heckle and Jeckle's site suggests that they are likely designing and creating the latest must-have accessories for NOCs and agents, a far cry from the clunky COVCOM gear of yesteryear. (And from the Agency's point of view, knowledge of this would be a serious security breech. Keep in mind the CIA does not even allow contractors to acknowledge their affiliation with the Agency, let alone divulge the programs they are working on, particularly such sensitivities ones.)



Not only have CIA programs been compromised, so have SOCOMs. Judging from the job postings for positions in Florida, Heckle and Jeckle are doing data mining and analytical work for SOCOM. Among other things that can be deduced, they search for relational patterns of terrorist activity and affiliations, looking at a wide array of seemingly innocuous relationships using open source and clandestinely gathered data, particularly focusing upon financial transactional data. I'm betting they have a very sophisticated quantitative model that they're constantly tweaking that underlies this process.

Again, Heckle and Jeckle job postings give us hints to other SOCOM programs. It appears that Heckle and Jeckle are involved in tracking SOCOM assets worldwide. Moving beyond Heckle and Jeckle's own website to other open sources, it's possible to learn some of the specs of related handhelds including whose low-earth orbiting satellites they use. Digging a little deeper, it's also possible to discover the code name of Heckle and Jeckle's RF geolocation program...



US national security is compromised by the Intelligence Community's heavy dependence upon corporations, corporations whose websites sometimes spill out some of the darkest government secrets to those who know how to read them. Last week's revelations by D/CIA Hayden that CIA contractors have been involved in enhanced interrogation techniques at detention facilities (i.e. waterboarding at black sites) should make it clear even to the casual observer that private corporations are integrally involved in the Intelligence Community's most sensitive and secretive clandestine and covert programs. Nothing is off-limits. Corporate involvement in clandestine programs raises operational security concerns that only exist because these companies market their services to the private sector, capitalizing upon their exotic experience with the US government.

In other words, we're taking risks with our national security, risks we don't have to take. Perhaps some of the risk can be mitigated through restrictions upon contractor marketing and better contractor policing. As a big fan of the private sector and of government outsourcing, I don’t like to think that the problem is inherent to outsourcing, but at the moment, it’s hard to imagine it otherwise. A Congressional ban on using government contracting experiences for marketing purposes may be one partial solution.

The Director of National Intelligence McConnell has been a strong proponent of increased use of open-source intelligence, OSINT. It's overdue that the Intelligence Community takes OSINT for seriously counterintelligence (CI) purposes (and it comes as no surprise that CI uses of OSINT was a notable omission in the ODNI's Open Source Conference last summer.) This needs to be immediately addressed--our national security depends upon it. Eliot, are you listening?

I'm sure some in the Intelligence Community will be appalled that I have publicly posted this analysis, particularly since it involves a key clandestine player, but keep in mind, what I’ve done is an exercise in OSINT, an exercise the Intelligence Community should have done long ago. Whereas the contents of this article might come as a surprise to intelligence professionals in Ouagadougou and Ulaanbaatar, they won't be in Moscow, Beijing or even Tehran.

And they shouldn't be in McLean.

"Heckle and Jeckle" are the ones who posted the raw intel on their own website and they're the ones who left their corporate electronic footprints on my blog. It's particularly ironic, since they're specialists in covert communications. It's equally ironic that I've protected their identity when they’ve hardly bothered to hide our national secrets. It is not my intent to hurt the company.

It's my sincere hope that as a result of this post, the Intelligence Community pays a little more attention to the operational security compromises of the divided intelligence contractor mission of serving the public interest while marketing those same services to the corporate world. As I wrote in the Washington Post last summer, corporations have succeeded where few foreign governments have: they've penetrated the CIA. Now it's up to the Agency and the Intelligence Community to ensure that programs are not further compromised as a result of this wide-scale industrial penetration.

***

(And if anyone needs assistance closing up the gaps from someone who discerns faint patterns within reams of seemingly unrelated data, I rent out for parties.)
Cry havoc and unleash the hawgs of war - Otatsiihtaissiiststakio piksi makamo ta psswia
Responder

Volver a “Private Military Companies, PMCs”