The old Kremlin Relationships are New Again, Now Yemen

It came to my attention a few weeks ago that the United States was removing the 50+ stored nuclear weapons in Incirlik, from Turkey to Romania. Seems with some slight additional reporting that could be an accurate condition due to the unrest that persists since the failed coup of Erdogan. It is also reported that he is clearing some 38,000 prisoners from prisons to make room for those he has designated as participating in the coup. Meanwhile, the United States has dispatched a team to Ankara to talk over the demand by Erdogan to extradite Fethullah Gulen to Turkey after a complete docier was provided, complete with evidence that Gulen was part of the coup operations. (Note: Turkey is the only Islamic country that is a member of NATO). (Another note: Gulen is a friend and protected by Hillary)

While there are thousands of moving parts here with regard to Turkey, it is quite worthy to mention that after Turkey shot down a Russian fighter in the Turkman region the anger of Moscow grew towards Turkey, but that is no longer the case, in fact Putin and Erdogan have moved beyond history and have re-established collaboration and relations.

Meanwhile, now that Turkey is no longer and issue for Russia, it remains a big thorn for the United States and NATO. So, what is Russia doing now? The Kremlin is taking on more old relationships and making them new again. Beyond Syria, Venezuela, Cuba, Nicaragua, there is Africa and of course Iran and Yemen. What do you mean Yemen? Yes and all of these objectives are to take control of the Mediterranean, the Black Sea and of course NATO.

Yemen has been at the center of hostilities due to the Iranian backed Houthis where Saudi Arabia has worked towards control and a regime change there. It is also notable that Yemen was a top location for the CIA drone operations towards al Qaeda in the Arabian Peninsula, AQAP, until Iran and then Yemen fell and the United States was forced to flee.

It was announced that Russia recently signed a memorandum of understanding with Iran to use an Iranian airbase to conduct airstrikes against Islamic State. This emerging new couple, Iran and Russia spells trouble ahead for the West including those countries friendly to the West.

Image result for russia iran joint airbase

Ex-president Saleh offers ‘all Yemen’s facilities’ to Russia

 Looking at this map carefully, not the maritime traffic with oil tankers which are always challenged by Iran as are navies.

In a TV interview today, Yemen’s ex-president, Ali Abdullah Saleh, appeared to invite Russian military intervention in the country’s conflict. He talked of reactivating old Yemeni agreements with the Soviet Union and offfered “all the facilities” of Yemen’s bases, ports and airports to Russia. Saleh seemed to be advocating something similar to what happened in Syria, where Russia and Iran joined the conflict on the Assad regime’s side under the guise of fighting terrorism. A video of the interview is here, with a transcript in Arabic here. Saleh, who was ousted from the presidency in 2012, is allied to the Houthis who currently control the Yemeni capital and large parts of the country, especially in the north. For more than a year Saudi-led forces, who back Saleh’s exiled successor, Abd-Rabbu Mansour Hadi, have been bombing Houthi-controlled areas of Yemen. Meanwhile the Houthis, who have some Iranian backing, have attacked Saudi territory in the border area.

Talks in Kuwait aimed at ending the war recently collapsed. Separately from the Houthi-Saleh-Hadi conflict there are frequent attacks in Yemen by Islamist militants. In the Russian TV interview, Saleh described Russia as “the closest kin to us”, adding that it has “a positive attitude” in the UN Security Council. Saleh continued: “We extend our hands to Russia. We have agreements with the Russian Federation which were with the Soviet Union. The legitimate heir to the Soviet Union is the Russian Federation, we are ready to activate these treaties and agreements that were between us and the Soviet Union. “We agree on a principle, which is the struggle against terrorism … We extend our hands and offer all the facililties, and the conventions and treaties … We offer them in our bases, in our airports and in our ports – ready to provide all facilities to the Russian Federation.”

Former Gitmo Detainees Arrested, Linked to Brussels Attack

Former Gitmo Detainee Arrested, Charged With Being Top ISIS Recruiter

FoxInsider: The same week that President Obama released 15 Guantanamo Bay detainees, a former prisoner was arrested and charged with being a top recruiter for ISIS.

Abu Nassim was arrested in Libya just days after the State Department claimed that very few Gitmo detainees ever return to terror.

Nassim, whose full name is Moez Ben Abdulgader Ben Ahmed Al Fezzani, was reportedly trying to travel to Tunisia, where he is an ISIS commander and most-wanted terrorist.

He was arrested along with approximately 20 other ISIS supporters between the Libyan towns of Rigdaleen and Al-Jmail.

Nassim is considered a top jihadist recruiter in Italy.

*****

ForeignNewsDesk: Zintani forces loyal to the internationally-recognized Libyan National Army arrested Moez Ben Abdulgader Ben Ahmed Fezzani 47, known by his nom de guerre Abu Nassim, last week as he was trying to flee Sirte, Libya for Tunisia.

A commander of ISIS militants in Libya since 2014, Fezzani had been sought by Tunisian authorities in connection with the March 2015 Bardo Museum attack in Tunis.

Twenty-two people including 17 foreigners were killed in the attack later claimed by the Islamic State.

Fezzani, along with 20 Islamic State operatives, was arrested by a police patrol while travelling between the towns of Rigdaleen and Al-Jmail.

News of his purported arrest comes just days after Libyan authorities warned their Italian counterparts about the possibility of an Islamic State cell in Milan with connections to the wanted militant.

Following the capture of ISIS’ headquarters in Sirte last week, officials discovered a cache of documents linking the Italian cell to Fezzani.

Fezzani, who arrived in Italy in the late 80’s, disappeared in 1997 after authorities suspected him of involvement in jihadi activities, later resurfacing in Pakistan before joining Osama Bin Laden’s war in Afghanistan.

Arrested by the U.S. in 2001, Fezzani was held at Bagram’s detention facility before the Obama administration approved his transfer to Italy in 2009.

Fezzani stood trial in Italy for his earlier terror offenses, cooperating in terror activities in Bosnia in 1995, but was acquitted.

Upon appeal, he was sentenced to six years in jail, but by this time had already fled; first to Tunisia where he joined Al Qaeda’s Ansar Al Sharia and then to Syria joining the terror group’s Al Nusra affiliate.

In 2014, he transferred allegiances to ISIS’ Caliph Abu Bakr Al Baghdadi, before moving to Libya where he was reportedly appointed a leader of Katibat al-Battar, described as ISIS’ special operations unit in the volatile country.

“If the information on Fezzani proves to be true, it is very disturbing. Just like the head of the Islamic State, Abu Bakr al Baghdadi, this was a man we had in our detention facility and let go,” terrorism analyst Dr. Sebastian Gorka told The Investigative Project on Terror in March about Fezzani’s ISIS appointment.

There has been no confirmation of his arrest from Tunisian authorities, but Fezzani’s capture comes just days after the Obama administration announced its biggest release of Guantanamo Bay detainees as the President attempts to fulfil his pledge to close the detention camp.

*****

MENASTREAM ID is MENASTREAM’s new project where we provide information on terrorists with personal information, background and graphics

The Tunisian Ministry of Interior issued a search warrant on Monday February 8, 2016 for Moez Ben Abdelkader Ben Ahmed Fezzani also known as ‘Abu Nassim’ born 23/03/1969, son of Fatma Chihaoui, from Ezzahrouni, Tunis. The Ministry of Interior classified Moez Fezzani as a dangerous terrorist in its statement:

في إطار تعاون المواطنين مع الوحدات الأمنية بوزارة الداخلية وتوقيا من الأعمال الإرهابيّة، تطلب وزارة الدّاخلية الإبلاغ ال…

Location of the Ezzahrouni neighborhood in Tunis

moez2

An older picture of Fezzani

moez ben abdelkader ben ahmed fezzani

Photo provided by the Ministry of Interior of Tunisia in the search warrant for Fezzani

Moez Fezzani’s has a long history within the sphere of global terrorism that stretches back to both the Bosnian war and the war in Afghanistan. Afghanistan, jailed for 7 years at the ‘Baghram Prison’. Fezzani’s journey brings him to Italy where he’s is tried together with another Tunisian and former Guantanamo prisoner Riadh Nasri for providing logistical support in 2007 to a terrorist cell in Italy linked to the Salafist Group for Preaching and Combat (GSPC), which evolved into Al-Qaeda in the Islamic Maghreb. He was acquitted from charges of terrorism in 2011, but Tunisian authorities demanded his deportation, although Italian autorities already considered him a security threat. The first time his deportation was supposed to be carried out he managed to escape and went into hiding in Varese, Lombardy, to be cought once again and deported to Tunisia.

Fezzani joined Ansar al-Sharia Tunisia (AST) in 2012 and was reportedly active in various confrontations, in 2013 Fezzani left for Syria where he joined Jabhat al-Nusra and later ISIS. He reportedly moved to Libya in 2014 as a leader for Katibat al-Battar and according to sources he now holds a key role in Sirte. Fezzani is suspected for being the mastermind and supervisor of the planning processes behind the high-profile attacks against the Bardo Museum and Sousse.

The search warrant for Fezzani by the Ministry of Interior comes at a critical time when Libya facing the threat of foreign intervention, an intervention which will have significant consequences for Tunisia. We can not exclude that the MOI tacticly issued this warrant to raise public awareness facing both the terrorist threat and additional consequences linked to an eventual Libya intervention, we can also assume that MOI on purpose issued this warrant knowing Fezzani is in Libya, thus framing him as a high-profile target for the international coalition.

moez4

Trump’s Campaign Chair, Manafort with Podesta and Fraud

More continues to bubble to the surface with regard to Paul Manafort and Ukraine. For context, the Podesta Group is a functioning liberal organization run by two brothers. One, John Podesta has both worked for Barack Obama and Hillary Clinton. John is presently Hillary Clinton’s campaign chairman. The collusion advances and has history.

Image result for paul manafort ukraine russia

It is also important to add in two related items:

  1. RNC platform included full military and diplomatic support for Ukraine and it was the Trump campaign that removed this party plank.
  2. Two weeks ago, Ukraine went on a full war footing against the aggression and insurgency of Russia.
  3. Gen. Flynn, Trump’s military advisor dismisses Russian/Ukraine connections

Related reading: Ukraine prosecutor confirms Paul Manafort’s name appears in secret cash ledger

Trump advisers waged covert influence campaign

WASHINGTON (AP) — A firm run by Donald Trump’s campaign chairman directly orchestrated a covert Washington lobbying operation on behalf of Ukraine’s ruling political party, attempting to sway American public opinion in favor of the country’s pro-Russian government, emails obtained by The Associated Press show. Paul Manafort and his deputy, Rick Gates, never disclosed their work as foreign agents as required under federal law.

The lobbying included attempts to gain positive press coverage of Ukrainian officials in The New York Times, The Wall Street Journal and The Associated Press. Another goal: undercutting American public sympathy for the imprisoned rival of Ukraine’s then-president. At the time, European and American leaders were pressuring Ukraine to free her.

Gates personally directed the work of two prominent Washington lobbying firms in the matter, the emails show. He worked for Manafort’s political consulting firm at the time.

Manafort and Gates’ activities carry outsized importance, since they have steered Trump’s campaign since April. The pair also played a formative role building out Trump’s campaign operation after pushing out an early rival. Trump shook up his campaign’s organization again this week, but Manafort and Gates retain their titles and much of their influence. The new disclosures about their work come as Trump faces criticism for his friendly overtures to Russian President Vladimir Putin.

Trump said Thursday night that, if elected, he will ask senior officials in his administration not to accept speaking fees, for five years after leaving office, from corporations that lobby “or from any entity tied to a foreign government.” He said it was among his efforts to “restore honor to government.”

Manafort and Gates have previously said they were not doing work that required them to register as foreign agents. Neither commented when reached by the AP on Thursday.

The emails show Gates personally directed two Washington lobbying firms, Mercury LLC and the Podesta Group Inc., between 2012 and 2014 to set up meetings between a top Ukrainian official and senators and congressmen on influential committees involving Ukrainian interests. Gates noted in the emails that the official, Ukraine’s foreign minister, did not want to use his own embassy in the United States to help coordinate the visits.

Gates also directed the firms to gather information in the U.S. on a rival lobbying operation, including a review of its public lobbying disclosures, to determine who was behind that effort, the emails show.

And Gates directed efforts to undercut sympathy for Yulia Tymoshenko, an imprisoned rival of then-President Viktor Yanukovych. The Ukrainian leader eventually fled the country in February 2014 during a popular revolt prompted in part by his government’s crackdown on protesters and close ties to Russia.

The emails do not describe details about the role of Manafort, who was Gates’ boss at the firm, DMP International LLC. Current and former employees at Mercury and the Podesta Group, some of whom spoke on condition of anonymity because they are subject to non-disclosure agreements, told the AP that Manafort oversaw the lobbying efforts and spoke by phone about them. Gates was directing actions and seeking information during the project using an email address at DMP International, which he still uses.

Manafort did not return phone and email messages Thursday from the AP to discuss the project. After the AP reported earlier this week that Manafort helped the Ukrainian political party secretly route at least $2.2 million to the two Washington lobbying firms, Manafort told Yahoo News that the AP’s account was wrong. “I was not involved in any payment plans,” Manafort said.

Gates said Thursday he was busy with Trump campaign focus groups and promised to review the AP’s questions in writing, then did not respond.

Manafort also said in a statement earlier this week that he never performed work for the governments of Ukraine or Russia. Gates previously told the AP, “At no time did our firm or members provide any direct lobbying support.”

Under the U.S. Foreign Agents Registration Act, people who lobby on behalf of foreign political leaders or political parties must provide detailed reports about their actions to the Justice Department. A violation is a felony and can result in up to five years in prison and a fine of up to $250,000.

The emails illustrate how Gates worked with Mercury and the Podesta Group on behalf of Ukrainian political leaders. None of the firms, nor Manafort or Gates, disclosed their work to the Justice Department counterespionage division responsible for tracking the lobbying of foreign governments.

“There is no question that Gates and Manafort should have registered along with the lobbying firms,” said Joseph Sandler of Sandler Reiff Lamb Rosenstein & Birkenstock, a Democratic-leaning Washington law firm that advises Republican and Democratic lobbyists.

Manafort and Gates have said that they did not disclose their activities to the Justice Department because they did not oversee lobbying efforts and merely introduced the Washington firms to a Brussels-based nonprofit, the European Center for a Modern Ukraine, which they said ran the project. The center paid Mercury and the Podesta Group a combined $2.2 million over roughly two years.

The emails appear to contradict the assertion that the nonprofit’s lobbying campaign operated independently from Manafort’s firm.

In papers filed in the U.S. Senate, Mercury and the Podesta Group listed the European nonprofit as an independent, nonpolitical client. The firms said the center stated in writing that it was not aligned with any foreign political entity.

The 1938 U.S. foreign agents law is intended to track efforts of foreign government’s unofficial operatives in the United States.

Political consultants are generally leery of registering under it, because their reputations can suffer once they are on record as accepting money to advocate the interests of foreign governments — especially if those interests conflict with America’s. Moreover, registering under the law would have required Gates, Manafort or the lobbying firms to disclose the specifics of their lobbying work and their efforts to sway public opinion through media outreach.

Ina Kirsch, who runs the European nonprofit, has said the group’s work was independent and its goal was to bring Ukraine into the fold of Europe. The center has declined for years to reveal specific sources of its funding.

Gates confirmed to the AP previously that he was working for Ukraine’s ruling party, the Party of Regions, at the time.

The chairman of the Podesta Group, Tony Podesta — the brother of Hillary Clinton campaign chairman John Podesta — said his firm believed Gates was working for the nonprofit. Podesta said he was unaware of the firm’s work for the Ukraine’s Party of Regions, led by Yanukovych. On Thursday, his firm said it had nothing new to add.

Mercury’s founder, Vin Weber, an influential Republican and former congressman, told the AP that his firm was aware of Manafort’s and Gates’ affiliation with Ukraine’s political party and said Gates never participated in Mercury’s lobbying work. Weber did not respond to questions after the AP said it had obtained emails contradicting this.

 

The Russians Hacked the NSA? Ah…What?

This is bad bad bad….and panic has struck Washington DC ….payment is to be in Bitcoins…

Graphics of files below courtesy of Arstechnica.

    

More here in further detail.

*****

Most outside experts who examined the posts, by a group calling itself the “Shadow Brokers,” said they contained what appeared to be genuine samples of the code — though somewhat outdated — used in the production of the NSA’s custom-built malware. Most of the code was designed to break through network firewalls and get inside the computer systems of competitors like Russia, China and Iran. That, in turn, allows the NSA to place “implants” in the system, which can lurk unseen for years and be used to monitor network traffic or enable a debilitating computer attack.  More here.

NSA and the No Good, Very Bad Monday

LawFare: Monday was a tough day for those in the business of computer espionage. Russia, still using the alias Guccifer2.0, dumped even more DNC documents. And on Twitter, Mikko Hypponen noted an announcement on Github that had gone overlooked for two days, a group is hosting an auction for code from the “Equation Group,” which is more commonly known as the NSA. The auctioneer’s pitch is simple, brutal, and to the point:

How much you pay for enemies cyber weapons? Not malware you find in networks. Both sides, RAT + LP, full state sponsor tool set? We find cyber weapons made by creators of stuxnet, duqu, flame. Kaspersky calls Equation Group. We follow Equation Group traffic. We find Equation Group source range. We hack Equation Group. We find many many Equation Group cyber weapons. You see pictures. We give you some Equation Group files free, you see. This is good proof no? You enjoy!!! You break many things. You find many intrusions. You write many words. But not all, we are auction the best files.

This release included two encrypted files, and the password to one was provided as proof while the other remains encrypted. The attackers claim that they will provide the password to the second file to the winner of a Bitcoin auction.

The public auction part is nonsense. Despite prevailing misconceptions on cryptocurrency, Bitcoin’s innate traceability means that no one could really expect to launder even $1M out of a high profile Bitcoin wallet like this one without risking detection, let alone the $500M being requested for a full public release. The auction is the equivalent of a criminal asking to be paid in new, marked, sequential bills. Because the actors here are certainly not amateurs, the auction is presumably a bit of “Doctor Evil” theater—the only bids will be $20 investments from Twitter jokesters.

But the proof itself appears to be very real. The proof file is 134 MB of data compressed, expanding out to a 301 MB archive. This archive appears to contain a large fraction of the NSA’s implant framework for firewalls, including what appears to be several versions of different implants, server side utility scripts, and eight apparent exploits for a variety of targets.

The exploits themselves appear to target Fortinet, Cisco, Shaanxi Networkcloud Information Technology (sxnc.com.cn) Firewalls, and similar network security systems. I will leave it to others to analyze the reliability, versions supported, and other details. But nothing I’ve found in either the exploits or elsewhere is newer than 2013.

Because of the sheer volume and quality, it is overwhelmingly likely that this data is authentic. And it does not appear to be information taken from compromised targets. Instead, the exploits, binaries with help strings, server configuration scripts, 5 separate versions of one implant framework, and all sort of other features indicate that this is analyst-side code—the kind that probably never leaves the NSA.

It is also unlikely that this data is from the Snowden cache. Those documents focused on PowerPoint slides and shared data, not detailed exploits. Besides NSA, the only plausible candidate for ownership is GCHQ—and the implications of stealing Top Secret data from GCHQ and modifying it to frame the NSA would themselves be startling.

All this is to say that there is relatively high confidence that these files contain genuine NSA material.

From an operational standpoint, this is not a catastrophic leak. Nothing here reveals some special “NSA magic.” Instead, this is evidence of good craftsmanship in a widely modular framework designed for ease of use. The immediate consequence is probably a lot of hours of work down the drain.

But the big picture is a far scarier one. Somebody managed to steal 301 MB of data from a TS//SCI system at some point between 2013 and today. Possibly, even probably, it occurred in 2013. But the theft also could have occurred yesterday with a simple utility run to scrub all newer documents. Relying on the file timestamps—which are easy to modify—the most likely date of acquisition was June 11, 2013 (see Update, however). That is two weeks after Snowden fled to Hong Kong and six days after the first Guardian publication. That would make sense, since in the immediate response to the leaks, as the NSA furiously ran down possible sources, it may have accidentally or deliberately eliminated this adversary’s access.

As with other recent cyber conflicts, the  espionage aspect is troubling but not entirely new. It’s very, very bad that someone was able to go rummaging through a TS//SCI system—or even an unclassified Internet staging system where the NSA operator unwisely uploaded all this data—and to steal 300 MB of data. But whoever stole this data now wants the world to know—and that has much graver implications. The list of suspects is short: Russia or China. And in the context of the recent conflict between the US and Russia over election interference, safe money is on the former.

Right now, I’d imagine that the folks at NSA are having rather unpleasant conversations about what the other encrypted file might contain, and what other secrets this attacker may have gained access to. Even if they were aware of the attack that resulted in this leak, there’s no way of knowing what is in the other archive. Is there evidence of another non-Snowden insider who went silent three years ago? Was a TS//SCI system remotely compromised? Was there some kind of massive screw-up at an agency which prides itself on world class OPSEC? Some combination of the three?

And—most chillingly—what else might be released before this war of leaks is over?

 

Update:  Thanks to @botherder for pointing out that a couple files have a newer date:  One file has a date of June 17th, 2013; another has a date of July 5th, 2013; three setup strips are dated September 4th, 2013; and two have dates of October 18th 2013.  One of those files (which I’m currently investigating) is the database of allocated Ethernet MAC addresses, which may be able to identify a later minimum date of compromise.  If the latter date of October 18th, 2013 is correct, this is even more worrysome, as this suggests that the compromise happened four months after the initial Snowden revelations—a period of time when the NSA’s systems should have been the most secure.

Update 2: Looking at the dates again, it now does seem somewhat likely that this was data copied on June 11th, 2013 with a few updates with a compromise after October 18th.  This does make it more likely that this was taken from a set of files deliberately moved onto a system on the Internet used for attacking others.  To my mind, this is actually an even scarier possibility than the NSA internal system compromise: This scenario would have the NSA, after the Snowden revelations, practicing some incredibly awful operational security.  Why should the NSA include five different versions of the same implant on a system used to attack other systems on the Internet?  Let alone implants which still have all the debugging strings, internal function names, and absolutely no obfuscation?

Update 3: Kaspersky confirms that the particular use of RC6 matches the unique design present in other Equation Group malcode.  XORcat apparently confirmed that the Cisco exploit works and, due to the versions it can attack, was a zero day at the time.  This exploit would generally work to take over a firewall from the inside of a target network since it did require limited access that is almost always blocked from the outside.

*****

In part from the WashingtonPost:

A cache of hacking tools with code names such as Epicbanana, Buzzdirection and Egregiousblunder appeared mysteriously online over the weekend, setting the security world abuzz with speculation over whether the material was legitimate.

The file appeared to be real, according to former NSA personnel who worked in the agency’s hacking division, known as Tailored Access Operations (TAO).

“Without a doubt, they’re the keys to the kingdom,” said one former TAO employee, who spoke on the condition of anonymity to discuss sensitive internal operations. “The stuff you’re talking about would undermine the security of a lot of major government and corporate networks both here and abroad.”

Said a second former TAO hacker who saw the file: “From what I saw, there was no doubt in my mind that it was legitimate.”

“Faking this information would be monumentally difficult, there is just such a sheer volume of meaningful stuff,” Nicholas Weaver, a computer security researcher at the University of California at Berkeley, said in an interview. “Much of this code should never leave the NSA.”

The tools were posted by a group calling itself the Shadow Brokers using file-sharing sites such as BitTorrent and DropBox.

At the same time, other spy services, like Russia’s, are doing the same thing to the United States.

It is not unprecedented for a TAO operator to accidentally upload a large file of tools to a redirector, one of the former employees said. “What’s unprecedented is to not realize you made a mistake,” he said. “You would recognize, ‘Oops, I uploaded that set’ and delete it.”

Critics of the NSA have suspected that the agency, when it discovers a software vulnerability, frequently does not disclose it, thereby putting at risk the cybersecurity of anyone using that product. The file disclosure shows why it’s important to tell software-makers when flaws are detected, rather than keeping them secret, one of the former agency employees said, because now the information is public, available for anyone to employ to hack widely used Internet infrastructure. Read the full article here.

Private Contractors Left without Escape Plan in Afghanistan

The next Benghazi? State Department leaves contractors in Afghanistan without escape plan

Circa: The concerns are heightened by the fact that many of those civilians doing the security and nation-building work of the U.S. government hold sensitive security clearances, making them an attractive target for the enemy.

And the situation could become even more precarious after the U.S. military in Afghanistan draws down to just 8,400 troops by year’s end.

“It’s not just a political nightmare for somebody, it’s people’s lives at stake,” said Kevin Ofchus, head of Georgia-based firm Host Nations Perspectives Southwest Asia (HNPSWA) that has security contracts in Afghanistan.

The current situation

“The State Department says there’s a lack of infrastructure to support an emergency response after we’ve spent 15 years and billions of dollars on infrastructure,” he added.

Ofchus’s company is a member of the State Department’s Overseas Security Advisory Committee, and it chairs the Crisis Management Advisory Subcommittee in Kabul, which advises companies about security working in hot-zones.

And his sentiments are widely shared by a dozen other federal contractors in theater interviewed by Circa, some of whom would only talk on condition of anonymity because they feared reprisal from Washington.

“I was told ‘don’t bother going to Kabul, grab your weapon and fight your way through until you can reach an aircraft’ or whatever,” said one contractor working in Afghanistan, who spoke on condition of anonymity.

“I don’t think any of us count on State Department to have their shit together. I’ve never seen, heard or prepared for any evacuation plan.”

— -Anonymous contractor

So is there a plan?

State Department officials told Circa that there is an evacuation plan, but they could not release any details about it because it was classified.

Mike Warren, a security director for the USAID-backed Mining Investment and Development for Afghanistan Sustainability Project, known as MIDAS, says he believes State has a very remedial plan but it fails on almost every security protocol.

“The Department of State, in close coordination with the Department of Defense, has a crisis response plan for Afghanistan that encompasses civilians and contractors. U.S. Forces-Afghanistan, in close coordination with the U.S. Embassy in Kabul, maintains a classified Non-Combatant Evacuation Operations plan to support the chief of mission,” the department wrote in an email.

“I know the U.S. Embassy was working on a plan, but it’s a shell of what they need,” Warren said in a phone interview from Kabul. “There appears to be a lack of coordinated effort between the U.S. Embassy and the American companies and personnel here in Afghanistan.”

“I know the U.S. Embassy was working on a plan, but it’s a shell of what they need.”

— Mike Warren, security director for MIDAS

Circa obtained a Memorandum of Understanding (MOU) between the State Department and Department of Defense governing the protection and evacuation of U.S. citizens and nationals from threatened areas overseas. The document specifically outlines the duties and requirements of the various agencies.

The Secretary of State “will prepare the plans for the protection and evacuation of all U.S. citizens and nationals and designated other persons abroad, including the Department of Defense (non-combatants).” More terrifying details here from Circa.

*****

In part: Now, as President Obama prepares to hand off combat operations in Iraq, Afghanistan, Syria, and elsewhere, to his successor, he’s also bequeathing a way of war that relies on large numbers of guns-for-hire while, at least formally, restricting the number of American “troops” sent overseas. Since 2009, the ratio of contractors to troops in war zones has increased from 1 to 1 to about 3 to 1.

Private military contractors perform tasks once thought to be inherently governmental, such as raising foreign armies, conducting intelligence analysis and trigger-pulling. During the Iraq and Afghanistan wars, they constituted about 15 percent of all contractors. But don’t let the numbers fool you. Their failures have an outsized impact on U.S. strategy. When a squad of Blackwater contractors killed 17 civilians at a Bagdad traffic circle in 2007, it provoked a firestorm in Iraq and at home, marking one of the nadirs of that war.

Contractors also encourage mission creep, because contractors don’t count as “boots on the ground.” Congress does not consider them to be troops, and therefore contractors do not count again troop-level caps in places like Iraq. The U.S. government does not track contractor numbers in war zones. As a result, the government can put more people on the ground than it reports to the American people, encouraging mission creep and rendering contractors virtually invisible.

For decades now, the centrality of contracting in American warfare—both on the battlefield and in support of those on the battlefield—has been growing. During World War II, about 10 percent of America’s armed forces were contracted. During the wars in Iraq and Afghanistan, that proportion leapt to 50 percent. This big number signals a disturbing trend: the United States has developed a dependency on the private sector to wage war, a strategic vulnerability. Today, America can no longer go to war without the private sector. More here from DefenseOne.