UNITED24 - Make a charitable donation in support of Ukraine!

Military

[House Hearing, 112 Congress]
[From the U.S. Government Printing Office]






                                     

                         [H.A.S.C. No. 112-97]

 
                   USE OF AFGHAN NATIONALS TO PROVIDE
                  SECURITY TO U.S. FORCES, IN LIGHT OF
                    THE ATTACK ON U.S. PERSONNEL AT
                   FORWARD OPERATING BASE FRONTENAC,
                       AFGHANISTAN, IN MARCH 2011

                               __________

                      COMMITTEE ON ARMED SERVICES

                        HOUSE OF REPRESENTATIVES

                      ONE HUNDRED TWELFTH CONGRESS

                             SECOND SESSION

                               __________

                              HEARING HELD

                            FEBRUARY 1, 2012

                                     
[GRAPHIC] [TIFF OMITTED] TONGRESS.#13




                  U.S. GOVERNMENT PRINTING OFFICE
72-935                    WASHINGTON : 2012
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Printing 
Office, http://bookstore.gpo.gov. For more information, contact the 
GPO Customer Contact Center, U.S. Government Printing Office. 
Phone 202-512-1800, or 866-512-1800 (toll-free). E-mail, gpo@custhelp.com.  
                                     
                   HOUSE COMMITTEE ON ARMED SERVICES
                      One Hundred Twelfth Congress

            HOWARD P. ``BUCK'' McKEON, California, Chairman
ROSCOE G. BARTLETT, Maryland         ADAM SMITH, Washington
MAC THORNBERRY, Texas                SILVESTRE REYES, Texas
WALTER B. JONES, North Carolina      LORETTA SANCHEZ, California
W. TODD AKIN, Missouri               MIKE McINTYRE, North Carolina
J. RANDY FORBES, Virginia            ROBERT A. BRADY, Pennsylvania
JEFF MILLER, Florida                 ROBERT ANDREWS, New Jersey
JOE WILSON, South Carolina           SUSAN A. DAVIS, California
FRANK A. LoBIONDO, New Jersey        JAMES R. LANGEVIN, Rhode Island
MICHAEL TURNER, Ohio                 RICK LARSEN, Washington
JOHN KLINE, Minnesota                JIM COOPER, Tennessee
MIKE ROGERS, Alabama                 MADELEINE Z. BORDALLO, Guam
TRENT FRANKS, Arizona                JOE COURTNEY, Connecticut
BILL SHUSTER, Pennsylvania           DAVE LOEBSACK, Iowa
K. MICHAEL CONAWAY, Texas            NIKI TSONGAS, Massachusetts
DOUG LAMBORN, Colorado               CHELLIE PINGREE, Maine
ROB WITTMAN, Virginia                LARRY KISSELL, North Carolina
DUNCAN HUNTER, California            MARTIN HEINRICH, New Mexico
JOHN C. FLEMING, M.D., Louisiana     BILL OWENS, New York
MIKE COFFMAN, Colorado               JOHN R. GARAMENDI, California
TOM ROONEY, Florida                  MARK S. CRITZ, Pennsylvania
TODD RUSSELL PLATTS, Pennsylvania    TIM RYAN, Ohio
SCOTT RIGELL, Virginia               C.A. DUTCH RUPPERSBERGER, Maryland
CHRIS GIBSON, New York               HANK JOHNSON, Georgia
VICKY HARTZLER, Missouri             BETTY SUTTON, Ohio
JOE HECK, Nevada                     COLLEEN HANABUSA, Hawaii
BOBBY SCHILLING, Illinois            KATHLEEN C. HOCHUL, New York
JON RUNYAN, New Jersey
AUSTIN SCOTT, Georgia
TIM GRIFFIN, Arkansas
STEVEN PALAZZO, Mississippi
ALLEN B. WEST, Florida
MARTHA ROBY, Alabama
MO BROOKS, Alabama
TODD YOUNG, Indiana
                  Robert L. Simmons II, Staff Director
                 John Chapla, Professional Staff Member
                 Debra Wada, Professional Staff Member
                      James Weiss, Staff Assistant


                            C O N T E N T S

                              ----------                              

                     CHRONOLOGICAL LIST OF HEARINGS
                                  2012

                                                                   Page

Hearing:

Wednesday, February 1, 2012, Use of Afghan Nationals To Provide 
  Security to U.S. Forces, in Light of the Attack on U.S. 
  Personnel at Forward Operating Base Frontenac, Afghanistan, in 
  March 2011.....................................................     1

Appendix:

Wednesday, February 1, 2012......................................    33
                              ----------                              

                      WEDNESDAY, FEBRUARY 1, 2012
USE OF AFGHAN NATIONALS TO PROVIDE SECURITY TO U.S. FORCES, IN LIGHT OF 
   THE ATTACK ON U.S. PERSONNEL AT FORWARD OPERATING BASE FRONTENAC, 
                       AFGHANISTAN, IN MARCH 2011
              STATEMENTS PRESENTED BY MEMBERS OF CONGRESS

McKeon, Hon. Howard P. ``Buck,'' a Representative from 
  California, Chairman, Committee on Armed Services..............     1
Smith, Hon. Adam, a Representative from Washington, Ranking 
  Member, Committee on Armed Services............................     3

                               WITNESSES

Dahl, BG Kenneth R., USA, Deputy Commanding General for Support, 
  10th Mountain Division (LI), Fort Drum, New York...............     5
Motsek, Gary J., Deputy Assistant Secretary of Defense for 
  Program Support Acquisition, Technology and Logistics, U.S. 
  Department of Defense..........................................     7
Sedney, David S., Deputy Assistant Secretary of Defense for 
  Afghanistan, Pakistan and Central Asia, U.S. Department of 
  Defense........................................................     8
Townsend, BG Stephen J., USA, Director, Pakistan-Afghanistan 
  Coordination Cell, Joint Chiefs of Staff.......................     6

                                APPENDIX

Prepared Statements:

    Dahl, BG Kenneth R., joint with BG Stephen J. Townsend, Gary 
      J. Motsek, and David S. Sedney.............................    40
    McKeon, Hon. Howard P. ``Buck''..............................    37
    Smith, Hon. Adam.............................................    39

Documents Submitted for the Record:

    [There were no Documents submitted.]

Witness Responses to Questions Asked During the Hearing:

    Mr. Conaway..................................................    53
    Mr. Johnson..................................................    53
    Mr. Scott....................................................    53

Questions Submitted by Members Post Hearing:

    Mr. Kissell..................................................    58
    Mr. McKeon...................................................    57
    Mr. Ruppersberger............................................    60
USE OF AFGHAN NATIONALS TO PROVIDE SECURITY TO U.S. FORCES, IN LIGHT OF 
   THE ATTACK ON U.S. PERSONNEL AT FORWARD OPERATING BASE FRONTENAC, 
                       AFGHANISTAN, IN MARCH 2011

                              ----------                              

                          House of Representatives,
                               Committee on Armed Services,
                       Washington, DC, Wednesday, February 1, 2012.
    The committee met, pursuant to call, at 10:05 a.m. in room 
2218, Rayburn House Office Building, Hon. Howard P. ``Buck'' 
McKeon (chairman of the committee) presiding.

    OPENING STATEMENT OF HON. HOWARD P. ``BUCK'' MCKEON, A 
 REPRESENTATIVE FROM CALIFORNIA, CHAIRMAN, COMMITTEE ON ARMED 
                            SERVICES

    The Chairman. Committee will come to order.
    In September last year, this committee explored the issue 
of attacks by members of the Afghan National Security Forces on 
U.S. and coalition personnel. The witnesses concluded that the 
DOD [Department of Defense] had mitigated the risk about to the 
degree we can in these few occasions when such attacks have 
occurred.
    Since then, the committee staff has continued to look into 
the factors behind attacks by Afghan nationals on coalition 
forces, including attacks conducted by Afghans hired by private 
security contractors to protect U.S. bases.
    The staff has used the attack in March 2011 at Forward 
Operating Base Frontenac as a case study to better understand 
the range of issues. In that attack, two soldiers died, 
including my constituent, Specialist Rudy Acosta, and four were 
wounded.
    I would like to note that Specialist Acosta's father and 
mother, Dante and Carolyn Acosta, are with us here today.
    Private security contractors are used in Afghanistan to 
provide personal protective services for Department of State 
personnel and dignitaries, to guard construction sites, to 
ensure safe movement for other private companies doing business 
in Afghanistan, for guarding supply convoys, and to augment 
coalition forces by providing base security.
    In the case of base security, the Commander in Chief is 
responsible for determining the size of the U.S. force deployed 
to Afghanistan and other places around the world, the missions 
that the force will undertake, and the necessary contractor 
support.
    For different reasons, both President Bush and President 
Obama have chosen to limit the size of the U.S. force and to 
use private security contractors to enhance base security.
    In contrast, it is Congress' role, and the purpose of 
today's hearing, to assess the advisability of these policies 
and whether the administration needs to change its approach.
    Complicating matters further, President Karzai has dictated 
that only Afghan nationals may be certified for employment as 
private security guards, and has not permitted U.S. citizen 
contractors.
    Karzai has also ordered the private security contractors to 
be disbanded. The Afghan Ministry of Interior will assume full 
responsibility for providing the Afghan Personal Protection 
Force, a new organization that from March 2012 onward, with a 
few exceptions, will replace private security contractors.
    The APPF [Afghan Personal Protection Force] will be 
available on a fee-for-service basis to coalition forces to 
perform the services that I just described.
    According to the DOD, the Afghan Ministry of Interior, in 
conjunction with U.S. and coalition forces, will use a vetting 
and screening process that will be the same for both the Afghan 
National Security Forces and the APPF.
    I recognize that it would be virtually impossible to 
establish a foolproof screening process. Our own national 
security screening system is not foolproof.
    Yet we must recognize that the existing processes failed to 
identify 42 attackers from 2007 to 2011. Thirty-nine of those 
attacks were by members of the Afghan National Security Force 
and three by contractor employees.
    Though less than 1 percent of Afghan forces and security 
guards have attacked coalition forces, this is 42 attacks too 
many, and the new process must do better.
    Another concern is that the screening and vetting has been 
tragically weak in picking up signs of threats after the Afghan 
joined either the Afghan National Security Force or a private 
security contractor. DOD data indicates that at least 60 
percent of all the attacks appear to be motivated by personal 
matters arising after the hiring.
    So it was with the attacker at FOB [Forward Operating Base] 
Frontenac. In July 2010, at another forward operating base, his 
employer, Tundra Security, fired him for allegedly making 
statements about killing U.S. personnel and recommended that he 
not be rehired.
    The contractor's chain of command did not enter that 
recommendation into the attacker's file, and the attacker was 
rehired by the same contractor in 2011, just before the attack 
at Frontenac.
    Moreover, because a parallel U.S. investigation of the 2010 
allegations concluded that the statements could not be 
substantiated, the U.S. official at the base decided not to 
enter the allegations about the attacker in the U.S. watchlist 
system.
    Adding to my concern about the vetting system not being 
focused in the right place, a U.S. rescreening of all Afghan 
security guards at Frontenac immediately after the attack 
resulted in several being dismissed as unworthy of employment.
    Finally, I am concerned about the Department's September 
statement that its efforts have mitigated the risk about to the 
degree we can. At the time, the committee was not aware that 
the frequency of these attacks had dramatically increased in 
2010 and 2011. In fact, 75 percent of all attacks have occurred 
in the last 2 years.
    The Department attributes the increase with the growth of 
U.S. forces in Afghanistan. But we need to understand the 
contributing factors better, so that more effective steps can 
be taken to further mitigate attacks on U.S. and coalition 
personnel.
    Before introducing our witnesses, I would like to read Mr. 
Acosta's statement into the record. This was written on 
Wednesday, February 1st, 2012.
    ``Last month, we received the U.S. Army A.R. 15-6 report 
regarding the March 19th, 2011 attack on U.S. Army FOB 
Frontenac, Kandahar Province, Afghanistan, which resulted in 
the death of our son, Specialist Rudy A. Acosta and Corporal 
Donald Mickler, and the wounding of four other soldiers.
    The report highlighted the fact that although the U.S. 
government allows private security contractors to provide base 
security in hostile lands, basic levels of safeguards were 
either not implemented or not followed. This allowed an Afghan 
national, who made prior threats against U.S. troops, to be 
reemployed by PSC [Private Security Contractor] Tundra Security 
and carry out a lethal attack.
    Our family and the Nation believe that this practice should 
be ended and rules be put in place so that only U.S. troops 
guard U.S. troops on these posts. However, as long as this 
practice continues, these PSCs, like Tundra, must follow rules 
put in place to safeguard our troops and there must be 
consequences if they fail to do so.
    We are disappointed that we were not allowed to testify in 
person before the House Armed Services Committee on this 
critical issue.''
    I would also inform members that some of the material 
provided to the committee is classified. The classified items 
are noted in the hearing memo.
    If any member wishes to discuss classified matters after 
the hearing, our witnesses have agreed to make themselves 
available in 2337 immediately following this hearing. If any 
member wishes to go to 2337 for this classified material, 
please let the committee staff know before our hearing ends 
today.
    Ranking Member Smith.
    [The prepared statement of Mr. McKeon can be found in the 
Appendix on page 37.]

STATEMENT OF HON. ADAM SMITH, A REPRESENTATIVE FROM WASHINGTON, 
          RANKING MEMBER, COMMITTEE ON ARMED SERVICES

    Mr. Smith. Thank you, Mr. Chairman.
    I want to thank the chairman for having this hearing, and 
most importantly for his attention to this issue. I know this 
has been a huge priority for you and the majority staff and for 
this full committee. And I appreciate all the work on it 
because it is a critically important issue.
    As you look at the report and see the disturbing number of 
attacks committed by ANSF [Afghan National Security Forces] and 
Afghan contractors against our troops, it is indeed a very 
serious and troubling situation. Our troops are in Afghanistan 
to protect the Afghan people and to protect their government.
    To be turned on by the very people they are fighting with 
and for undermines the entire operation, and places our troops 
at an unacceptable level of risk.
    And I think there has been a thorough study of this, but I 
think it is also clear that we can do more.
    More not just in the initial screening process determining 
who is going to be in proximity to our troops, armed and in a 
position to cause harm, but even after they are hired, after 
they have gone through the screening and vetting situation, to 
continue to monitor for problems and err on the side of 
interceding sooner, rather than later; that if we are not sure 
if someone is 100 percent with us and safe, then need to go 
find them a different job without a gun so close in proximity 
to our troops and soldiers that places them at risk.
    Clearly, there is more screening that could be done and 
more protection that can be done as we learn more about what 
motivated these attacks, and hopefully learn and see where 
those attacks come from.
    Certainly, some of them have been infiltration from the 
Taliban, and we need to make sure we do a better job of 
screening initially. But a lot of them simply come down to 
personal matters that arise during the course of their service, 
but these are things that can be seen by those who are 
observant.
    We need to keep a much keener eye for Afghan National 
Security Forces and Afghan contractors who may become a 
problem, and intervene, find ways to protect our troops and put 
that ANSF soldier who may be a problem in a place where they 
don't have the proximity to do this kind of harm.
    So, I look forward to the testimony, to hear more about 
what we can do to better protect our troops from these kinds of 
attacks. And again, I want to thank Mr. McKeon especially for 
his attention to this issue and for the work.
    It is a critically important issue to protect our troops 
and a major problem right now in Afghanistan.
    I look forward to working with our witnesses and the 
committee to find solutions to better protect our troops in 
Afghanistan.
    And with that, I yield back.
    [The prepared statement of Mr. Smith can be found in the 
Appendix on page 39.]
    The Chairman. Thank you.
    Our witnesses today are Mr. David S. Sedney, Deputy 
Assistant Secretary of Defense for Afghanistan, Pakistan, and 
Central Asia, from the Department of Defense; and Mr. Gary J. 
Motsek, Deputy Assistant Secretary of Defense for Program 
Support, Acquisition, Technology, and Logistics from the 
Department of Defense; Brigadier General Stephen Townsend, U.S. 
Army, Director, Pakistan-Afghanistan Coordination Cell, Joint 
Chiefs of Staff; Brigadier General Kenneth Dahl, U.S. Army, 
Deputy Commanding General for Support, 10th Mountain Division, 
Fort Drum, New York.
    General Dahl, since you directed the A.R. 15-6 
investigation into the attack at FOB Frontenac, we would like 
you to begin, and then we will just move down the row.
    Thank you.

STATEMENT OF BG KENNETH R. DAHL, USA, DEPUTY COMMANDING GENERAL 
 FOR SUPPORT, 10TH MOUNTAIN DIVISION (LI), FORT DRUM, NEW YORK

    General Dahl. Chairman McKeon, Ranking Member Smith, and 
distinguished members of the committee, it is an honor to 
appear before you.
    I welcome the opportunity to contribute to your 
understanding of the events that took place at FOB Frontenac 
and I appreciate your oversight of operations in general.
    I would like to begin by once again expressing my 
condolences to the families of the brave soldiers that we lost, 
and to honor the sacrifices of all service men and women and 
their families from whom we continue to ask so much.
    I am aware that you have previously been provided a full, 
un-redacted version of the Army investigation conducted under 
Army Regulation 15-6. I am confident that I will be able to 
cover the key findings and recommendations of that 
investigation in this open session.
    While serving in Regional Command South in Afghanistan, I 
appointed an officer to investigate the circumstances of the 19 
March 2011 attack on FOB Frontenac. In addition to the standard 
scope of an investigation for any incident resulting in the 
death of a soldier, we directed this investigation to also 
specifically consider the role of the security contractor, in 
this case Tundra, the vetting process to hire local Afghans, 
and to make recommendations to improve our processes and 
prevent similar incidents in the future.
    The challenges identified in the investigation are complex 
and the implementation of those recommendations is deliberate 
and is ongoing. The investigation identified the assailant, a 
Tundra employee, as an insurgent who infiltrated the ranks of 
Tundra in order to execute an internal attack.
    The attack resulted in the tragic deaths of two great 
soldiers and the injury of four others. Due to the quick 
actions of two well-trained soldiers and the excellent response 
of medical personnel on the scene, the unit did mitigate the 
impact of this attack and prevented greater casualties.
    A key finding of the investigation was that the assailant 
had indeed been fired months prior for making unsubstantiated 
threats against U.S. soldiers at a FOB in a different location. 
Given that the threats were unsubstantiated, neither Tundra nor 
the command annotated those threats in an official record, 
which, had they been recorded may have prevented the assailant 
from being rehired.
    Additionally, the investigation revealed that the command 
found the orders and policies governing the personal security 
contractor--the vetting and hiring of those, to be vague and 
confusing. The recommendations from this investigation focused 
on clarifying pertinent guidance, creating a comprehensive 
background file for all local Afghan contract hires, and 
sharing the findings at all levels of the formation and 
throughout the chain of command to increase awareness and 
prevent similar incidents in the future.
    I will point out that the investigation also made specific 
recommendations to recognize the courage and quick action of 
those soldiers who responded to the attack.
    The attack on FOB Frontenac was a tragic event. All 
commanders take very seriously their responsibility to protect 
our soldiers.
    We have taken steps to correct the errors in process and 
the confusing policies identified in the investigation. But 
sadly, in this case, these corrections would likely not have 
altered the outcome.
    Nonetheless, it is our duty to explore every avenue to 
protect our soldiers. And we welcome your leadership and the 
oversight of this committee, which causes us to examine 
ourselves and find ways to improve our operations.
    Thank you.
    [The joint prepared statement of General Dahl, General 
Townsend, Mr. Motsek, and Mr. Sedney can be found in the 
Appendix on page 40.]
    The Chairman. General Townsend.

 STATEMENT OF BG STEPHEN J. TOWNSEND, USA, DIRECTOR, PAKISTAN-
      AFGHANISTAN COORDINATION CELL, JOINT CHIEFS OF STAFF

    General Townsend. Chairman McKeon, Ranking Member Smith, 
and members of the committee, thank you for this opportunity to 
talk to you today about our efforts to assist the Afghan 
National Security Forces in ensuring their ranks are free from 
those who might seek to harm our troops, who are fighting 
alongside them to build an Afghanistan that will never again be 
a safe haven for terrorists.
    First, let me add my personal condolences to General Dahl's 
for the family of the troops who lost their lives at FOB 
Frontenac, like the Acosta family who are here today.
    I would like to thank them publicly for their son's service 
and their family's sacrifice.
    And to the families of all our troops, both U.S. and 
allies, who have been killed or injured in other unfortunate 
attacks like this one during our mission in Afghanistan.
    Our bottom line up front is the protection of service 
members deployed in harm's way against any threat remains one 
of our highest priorities for our commanders and leaders, both 
here in Washington and in the field. Although there is no such 
thing as perfect protection, especially in Afghanistan, we know 
we must continue to develop effective ways to combat the 
insider threat to our service members.
    To that end, we appreciate this committee's support in 
exploring the best methods to provide security for Americans 
and our allies doing the Nation's work in Afghanistan.
    As this committee is well aware, our efforts in Afghanistan 
have not been without great sacrifice. We still face a very 
determined enemy who uses asymmetric methods to harm our 
troops, including insider attacks.
    A major focus of our military campaign is developing an 
increasingly self-reliant Afghan National Security Force that 
can lead the fight in the near future.
    We are working closely with Afghan leaders to reduce 
potential insider threats through a layered system that 
includes screening and vetting before an Afghan enters service, 
cultural training for Afghan service members, and growing an 
Afghan counterintelligence capability so they can detect 
potential insider threats before they come to fruition.
    Now, for our part, we are reinforcing the importance of 
cultural and language training prior to deployment for our 
forces, emphasizing the importance of our own conduct each day 
in reducing unnecessary frictions with our partners, reviewing 
our own counterintelligence efforts in theater, and finally, 
reminding our leaders and soldiers they must always have their 
own protection foremost in their minds and ultimately provide 
their own security.
    One important part of this approach involves an eight-step 
vetting process that uses both Afghan cultural practices, such 
as recommendations from village elders, as well as modern 
technology in the form of biometrics to help screen and vet 
Afghans before they enter service.
    Looking ahead to the transition of private security 
contractors to the Afghan Public Protection Force, we will see 
Afghan security guards undergoing a vetting process like this 
one.
    In these brief remarks, I have highlighted some of the 
efforts to address potential insider threats. As our campaign 
increasingly transition security lead to the Afghans, and as 
our role shifts from leading combat operations to a primary 
focus on security assistance, our military personnel will be 
increasingly employed as embedded trainers and advisers with 
Afghan units.
    While we can't completely eliminate the potential for 
insider threats, we can greatly reduce them by using a 
multilayered approach that includes smart vetting procedures, 
cultural training, leader and soldier force protection 
awareness, and counterintelligence efforts.
    Again, thank you for your continuous support to our men and 
women in uniform.
    The Chairman. Thank you.
    Mr. Motsek.

  STATEMENT OF GARY J. MOTSEK, DEPUTY ASSISTANT SECRETARY OF 
    DEFENSE FOR PROGRAM SUPPORT ACQUISITION, TECHNOLOGY AND 
             LOGISTICS, U.S. DEPARTMENT OF DEFENSE

    Mr. Motsek. Chairman McKeon, Ranking Member Smith, and 
members of the committee, thank you again for the opportunity 
to appear before you to discuss the use of Afghan nationals to 
provide security U.S. forces in light of the attack on U.S. 
personnel at Forward Operating Base Frontenac.
    I, too, would also like to extend my condolences to the 
families of our soldiers, and by extension, to all family 
members who have lost their lives and loved ones. Their deaths 
are all tragic.
    Generally speaking, contractors perform well and provide 
essential support to the conduct of our operations within 
Afghanistan. Without them, under the present conditions there, 
we would have to divert approximately 20,000 troops from 
essential combat tasks to perform noncombat-related security 
functions. And our allies in Afghanistan are in a similar 
situation.
    In other words, we would have to move 30 percent of our 
force, whose primary mission is to offensively engage the 
enemies of our Nation, and are equipped and trained for that 
mission to provide basic security services oriented, primarily, 
frankly, against criminal elements.
    The investigation has clearly shown that although our basic 
policies are sound, there were weaknesses in execution, and we 
will continue to address these.
    DOD has a broad range of management policies and 
operational procedures to effect, provide, and achieve more 
effective oversight and coordination of contractor operations.
    Our oversight and responsibilities aren't static, but 
constantly evolve as we apply insights from lessons learned.
    For example, regarding PSCs--and we when we first appeared 
before this committee regarding the oversight of PSCs, we have 
gone from a basic memorandum of agreement and the interagency 
process to a formal DOD instruction.
    We are now in the code of Federal regulations. And we are 
about to finalize an American Standards Institute standard on 
management and quality. And we will trust that will yield 
eventually an international standard that we can adopt 
internationally.
    DOD policy requires all contractor personnel, regardless of 
nationality, to comply with DOD regulations as well as the 
applicable laws of the United States and the host country. 
Biometrics is now an integral part of that oversight and 
vetting process.
    Incidents that involve local nationals attacking U.S. 
forces or allies are unacceptable, and we must do all we can to 
eliminate or minimize those risks.
    Frankly, as the chairman and ranking member have said, I 
don't believe we can actually fully eliminate them, but we must 
do everything in our power to minimize them. Because our 
national objectives in Afghanistan include that our forces work 
side-by-side with those of the host nation.
    I assure you we will continue to assess our procedures and 
operations to minimize those risks, and improve where we can 
find and identify shortfalls. There is no end state to the way 
we review and implement our processes.
    Again, the incident at FOB Frontenac was an obvious 
tragedy, and no investigation or hearing can minimize or 
relieve that loss.
    Hopefully, this testimony provides a documentary baseline 
of the topics we were asked to address during this hearing. And 
as my fellow witnesses, we are prepared to address your 
questions.
    Thank you.
    The Chairman. Thank you.
    Mr. Sedney.

  STATEMENT OF DAVID S. SEDNEY, DEPUTY ASSISTANT SECRETARY OF 
   DEFENSE FOR AFGHANISTAN, PAKISTAN AND CENTRAL ASIA, U.S. 
                     DEPARTMENT OF DEFENSE

    Mr. Sedney. Thank you, Mr. Chairman, Ranking Member Smith, 
distinguished members of the committee. And thank you for the 
opportunity to testify today.
    I particularly thank you for your continued support for our 
troops.
    It is important in this hearing, and as we discuss 
Afghanistan, that we focus on why the United States is in 
Afghanistan. We are there to ensure that Afghanistan is never 
again used by our enemies to attack the United States.
    Our core goal is to disrupt, dismantle, and defeat Al 
Qaeda, and to prevent Afghanistan from again becoming a safe 
haven for such attacks.
    This is a mission that I know our soldiers, sailors, 
airmen, and marines understand. Their efforts and sacrifices 
allow the rest of us to enjoy the benefits of freedom that our 
military is dedicated to uphold.
    The conflict in Afghanistan has and remains a tough war in 
very difficult circumstances. However, our military has proven 
immensely adaptable as it has found ways to address those 
challenges, particularly in the past 3 years.
    The changes in the way we fight and partner with the 
Afghans is key to the success we are having.
    Three years ago, we submitted a report to Congress, a 1230 
report, saying essentially that we were losing in Afghanistan. 
Our most recent report demonstrates that clearly the momentum 
has shifted to our side and the Taliban are on their back foot.
    Violence continues to decrease largely due to our close 
partnership with the Afghans and the Afghan security forces. 
The more the Afghans take the lead, the less effective the 
Taliban are.
    To a certain extent, the increased partnership may place 
our force at greater risk, particularly as the Taliban 
recognized the importance of that partnership and actively 
attempted to counter it. But partnership also decreases the 
risk and decreases the need for U.S. and coalition forces to be 
in Afghanistan over the long term as we move towards on 
transitioning to Afghan lead and protecting their own country.
    I would like to add my sincere and personal condolences to 
the families of the servicemen who lost their lives, have been 
wounded in support of these goals, and particularly, I offer 
condolences to the Mickler and Acosta family and their 
colleagues for this incident.
    Every loss of life is a tragedy, and our military and 
defense personnel work hard to prevent these incidents and 
protect our forces. And we also constantly look for ways to 
learn from past events to prevent further tragedies.
    The issue that we are discussing today, that of the insider 
threat, is larger than this instance of private security 
personnel killing U.S. service members. In the combat zone that 
is Afghanistan, similar incidents of violence have occurred, 
including Afghans attacking our allies, Afghan security forces 
attacking each other, and Afghan security forces attacking 
civilians.
    Every attack--every event in itself is tragic. And we are 
working with our allies and partners in Afghanistan and our 
Afghan partners in order to try to prevent them.
    Incidents such as what happened at FOB Frontenac are truly 
tragic. And as the chairman pointed out, there has been an 
increase in attacks over the past year, at the same time as we 
have surged coalition forces and surged through to the number 
of Afghan security forces over the last 3 years.
    During that time, both our forces, our coalition allies, 
and Afghan security forces have suffered casualties. And I 
would add that the number of casualties that we have suffered, 
and our allies have suffered, and our Afghan allies have 
suffered is an evidence of the commitment to that core goal 
that I mentioned before that is shared by all who are involved.
    Not all of the insider threat attacks, of course, were 
caused by insurgent infiltration. In fact, as the chairman 
mentioned, our studies have shown that the majority are due to 
other circumstances. Personal issues, combat stress, and other 
factors, some of which we don't fully understand in every 
individual case, often underlie these attacks.
    Combat stress that leads to use of violence by forces 
against their colleagues and their partners is something that 
is an unfortunate characteristic of war everywhere and 
something that we must do everything we can to prevent in 
Afghanistan and elsewhere.
    However, I want to stress again that partnership with the 
Afghan security forces is a critical part of our strategy. And 
that is what is allowing us to make progress in Afghanistan, 
what is allowing us to have the prospect of transition to 
Afghan security lead.
    We are now in a position where half of the population of 
Afghanistan is in areas and provinces that are transitioning to 
Afghan security lead. And the capabilities that they have been 
able to build through this increased partnership is what is 
allowing that to happen and allowing the United States, as 
President Obama has already done, to reduce our presence in 
Afghanistan by 10,000 forces over the past year.
    We have also seen that the attacks on U.S. and our 
coalition allies by Afghan forces are more likely to happen 
where there is limited interaction between Afghans and U.S. and 
coalition forces.
    Where there was closer partnership, better interaction, 
understanding, better mentoring it is less likely that such an 
attack will occur. We continually need to look at the lessons 
that we are learning from these tragedies, both the one at FOB 
Frontenac and more recent ones, to find ways to prevent future 
ones.
    In order to do that, we have to work together with our 
Afghan colleagues.
    As the chairman pointed out in his opening statement, the 
vetting process for both the Afghan security forces and the 
follow-on to the security companies of the Afghan Public 
Protection Force is using vetting methods that we have 
developed.
    It is important that those vetting methods, both the 
initial vetting and, as the ranking member mentioned, continued 
vetting once the forces are in place are improved in order to 
prevent these incidents of attack on friendly forces.
    The Afghan Public Protection Force, which the chairman 
mentioned, is a force that will be under the control of the 
Ministry of Interior.
    As the chairman stated, this is a result of a decree from 
President Karzai saying that private security contractors, who 
provide protection to fixed sites, development projects, and 
convoys, will transition to Afghanistan lead under the Afghan 
Protection Force. That will happen for private companies, non-
governmental organizations, and other non-military activities 
this year, and it will happen for military activities in March 
of 2013, a year from now.
    To help build this force, ISAF [International Security 
Assistance Force] has set up an advisory group which will 
partner with the Public Protection Force and the Ministry of 
Interior to develop and train the force. That action is ongoing 
today in order to have it stood up and ready next month, in 
March of 2012.
    We are also actively looking at ways to improve the 
Ministry of Interior's ability to oversee the Public Protection 
Force and the remaining private security contractors that will 
continue to protect diplomatic activities in Afghanistan.
    Vetting is very difficult in a country such as Afghanistan 
which lacks much of the infrastructure and information systems 
that we have here. So our vetting process includes use of 
Afghan traditional methods, such as having village elders 
provide recommendations on potential recruits, as well as more 
modern procedures, such as the biometrics that Mr. Motsek 
mentioned, drug testing and criminal background checks.
    In closing, I want to emphasize that we at the Department 
of Defense take the death or injury of every U.S. personnel in 
Afghanistan or elsewhere very seriously. The security of our 
troops and the success of our mission are our top priority.
    No system is perfect, but no system, as Mr. Motsek said, is 
static. We are continually looking at this, and we appreciate 
the opportunity in this hearing to have your ideas, Mr. 
Chairman, and those of your colleagues on how we can do a 
better job.
    Thank you.
    The Chairman. Thank you.
    As I said in my opening statement, going forward the 
screening and vetting process must overcome the shortcomings 
detailed in the AR 15-6 and the other reviews done following 
the attack at FOB Frontenac.
    What corrective actions were taken after the attack at FOB 
Frontenac and how will those actions and others mitigate the 
risks inherent in the new screening process?
    General Townsend. Chairman, I will take that question. And 
maybe some of my colleagues will have some additional comment.
    There were a number of orders produced after that attack. 
There was an AAR [After Action Review], just like we always 
do--Mr. Sedney said we are a learning organization. So, we did 
an after action review in addition to these investigations, 
came up with a list of things that we could do better, and 
fragmentary orders, supplemental orders went out to the force 
to do that.
    Some of those things, specifically, related to some of the 
weaknesses that were identified in this investigation and a 
couple of others, specifically, the need for the private 
security companies to adhere to the same vetting process that 
we are using with the Afghan National Security Forces.
    A couple others that I think were very important were--and 
Mr. Motsek mentioned this in his opening statement--that we 
have added a requirement for a weekly screening.
    So, they are not just now screened when they first enter 
service, but there is a requirement for the commanders on the 
FOBs to screen all local nationals that come on and off the FOB 
on a random basis at least weekly. That is done through 
biometrics. So that if new information emerges, there is a 
chance they will catch that if it wasn't caught when they 
initially entered service.
    A couple other points were made about increasing force 
protection awareness for our soldiers themselves and their 
leaders.
    I will let General Dahl comment on----
    The Chairman. Let me just ask one question that goes along. 
Shia Ahmed had gone through the screening, but he had used a 
little bit different name each time.
    And how do you measure that against the biometrics? How do 
you pick that up?
    General Townsend. Yes, sir.
    The biometrics--a guy may report in with more than one 
name, which is not uncommon in Afghanistan, because frequently 
they have one name and they don't know how to spell it. And it 
is not clear to us sometimes how to spell it exactly, so it 
might even be misspelled.
    The guy only has one set of fingerprints. He has only got 
one facial photograph. He has only got one iris scan.
    So, it doesn't matter how many names are entered into the 
biometrics, we are going to know who he is, and we are going to 
be able to----
    The Chairman. So using the different names--or he could 
have done that like unintentionally.
    General Townsend. That is right. That is right.
    Which is not uncommon.
    The Chairman. But the name isn't the important thing. It is 
the biometrics, how they----
    General Townsend. That is exactly right.
    And, sir, I will ask General Dahl to speak a little bit 
more about the lessons learned that were applied in Regional 
Command South.
    General Dahl. Yes, Chairman.
    As you saw in the report, we made a number of 
recommendations as a result of the 15-6 to our higher 
headquarters to be incorporated more broadly theater-wide, and 
then across the force, not just in the Army, and also for 
training.
    But specifically in Regional Command South immediately 
following the approval of the investigating officer's findings 
and recommendations, in Regional Command South, where we had 
the authority to implement changes ourselves, we put several 
things into place.
    Our first intention was to close the gap between having 
people, Afghans, employed on our FOBs that had not been 
screened. So we set out to put in an order to our subordinate 
task forces and formations to immediately enroll and screen, as 
rapidly as possible, all those who are working on those FOBs, 
so we could control that piece.
    The second, sir, was that in a sustainment endeavor, once 
they were enrolled, we wanted to conduct monthly 50 percent of 
those working on that FOB would be continually screened at 
random, 50 percent, against the current watchlist.
    So the information had entered the watchlist since they had 
been vetted initially, there was an opportunity to pick up on 
that. And it wasn't practical to do 100 percent weekly or 
monthly, but we chose 50 percent monthly at random against the 
current watchlist, so that we would have some sustainment 
mechanism to pick up on new information that would enter.
    And then finally, sir, we conducted training. And this was 
training of our contracting officer representatives, those 
young officers, in some cases noncommissioned officers, who are 
responsible for oversight of the local contract in that area, 
making sure that they were more familiar with their 
responsibilities, more familiar with the policies and the 
procedures that the investigation officer had determined were 
confusing.
    I will add, sir, that I am now back at Fort Drum. We still 
have soldiers who are downrange, and we are preparing others to 
go. And I had seen some of this incorporated into some of our 
pre-deployment training as well.
    But, again, I can only speak locally in that regard for 
Fort Drum and RC [Regional Command] South, and 10th Mountain 
Division.
    The Chairman. Thank you.
    General Townsend, why do we need to have Afghan personnel 
guarding U.S. and coalition bases and soldiers?
    What are the implications of having U.S. personnel perform 
these security missions?
    General Townsend. Well, sir, as Mr. Motsek mentioned in his 
opening statement, this is not a new phenomenon. Our use of 
contracted security guards goes back a long way in our history, 
into the 1800s and even before.
    And one of the reasons we do that is it reduces the burden 
on our soldiers, and allows them to focus. We never have enough 
soldiers. It reduces the burdens on the soldiers and allows 
them to focus on the primary tasks that they have to do.
    As Mr. Motsek said, it is the offensive operations and the 
complex counterinsurgency tasks that we need them to do. So if 
they are guarding convoys, or development projects, or fixed 
sites, or even standing watch on a perimeter, then they are not 
able to engage in those higher and more complex tasks.
    So that is one of the main reasons that we do it, probably 
the most significant reason that we do it, sir.
    The Chairman. Thank you very much.
    Yes?
    Mr. Motsek. Yes, sir, if I could just say, there is always 
a misperception that we are using security guards everywhere.
    The use of security guards is condition-based. It doesn't 
relieve the commander in the field for making the determination 
that this particular location, the threat is more of a military 
threat as opposed to a criminal threat, and therefore I choose 
not to use security contractors or eventually the APPF to 
provide this security.
    The commander is not relieved of that responsibility. And 
so just because we have an installation or just because we have 
a convoy, that doesn't necessarily mean we default 
automatically to a contractor-based solution set.
    In my opening statement, I mentioned that 20,000 personnel 
would have to be diverted to this function. But I would also 
ask, and the committee is painfully aware of this, that we have 
a rotational base that we have to use to provide support 
downrange.
    And so generally speaking, the rule of thumb is for every 
job you have downrange, there are two more in the rear, one who 
is returned and one is getting ready to go.
    So for the 20,000 personnel I was talking about that we 
presently use in Afghanistan to provide this security process, 
we would be talking up to 60,000 people in the force, the 
military force, that would have to be aligned to perform that 
function.
    The Chairman. Thank you.
    Ranking Member Smith.
    Mr. Smith. Thank you, Mr. Chairman.
    First, just a question in terms of--security guards are 
certainly part of the problem, but we also train the ANSF. We 
train with them, and we fight alongside them.
    Of the incidents where they have attacked our troops, I 
don't know if you know the numbers, how many have been security 
guard situations where it is people who have been supposedly 
protecting compounds or protecting areas?
    And how many of them have been ANSF forces that were 
fighting alongside or training with?
    Do you happen to know off the top of your head what the 
breakdown is on that?
    Mr. Sedney. Three of the cases are involving private 
security forces. The rest of them are Afghan National Police or 
Afghan National Army soldiers.
    Mr. Smith. So that seems to be the bulk of the problem in 
the area.
    And I guess the big question I have is, so you go through 
the initial screening process and obviously it is not perfect. 
We don't have a 100 percent database on every Afghan national 
who is signing up to be part of the ANSF or part of these 
contracting forces, but you do the best you can.
    But once they get in there, if there is a concern, a 
problem--and as you have gone through these cases, I guess two 
questions.
    And number one, have you gone back and found signs in most 
of those cases where after the fact some of our soldiers or 
marines have come forward and said, ``Well, look, the guy was 
saying this and doing this. We knew he was squirrely for a long 
time. We were worried about him.''
    So have you discovered that?
    And second, if you do discover that kind of thing now, what 
are your options and what do you do? How do you respond?
    Do you take this person out of the unit?
    How do you respond to those sorts of threats as they become 
perceived before they actually turn into an attack?
    General Townsend. Thank you, sir.
    The short answer to your first question is, yes, we have 
seen signs after the fact. Not in all cases.
    You know, we do a pretty deliberate postmortem, the 
investigations, the AARs. And they sometimes result in soldiers 
saying, ``We saw signs.''
    Afghan soldiers will say it. Our soldiers will say it 
sometimes.
    In other cases, there is no hint from any witness that 
there was any trouble with this soldier.
    So, once there are signs identified, if someone steps 
forward and provides those, then the commander there, the 
contractors and the commanders, can make decisions to remove 
that individual from the force.
    Let us talk about the ANSF in particular.
    I was at a FOB in Gardez, Afghanistan, where one day the 
Afghan intelligence officer came in and briefed the commander 
that there was a soldier he was concerned about.
    And he didn't really have good information. It wasn't 
really all that substantial.
    But the Afghan commander looked at me and said, ``He is off 
this FOB today.'' And he had him transferred away, just to 
remove the potential source of the problem.
    That is one example of Afghans taking a decision.
    Mr. Smith. And as you have investigated this and learned 
more about how these incidents happen, have you taken steps in 
terms of training our troops to, okay, look for this, report 
it?
    I mean, have we upped the awareness in some way, and if so, 
how?
    General Dahl. Yes, sir.
    Your question speaks precisely to conducting the after-
action report, conducting the lessons learned, and extracting 
those signals that we weren't attending to previously. And 
post-mortem when you are conducting these investigations and 
the soldiers or the Afghans come forward and say, ``You know, 
in hindsight, now it is clear to me that maybe we should have 
paid more attention to this.''
    Those are precisely the pieces of information that are 
incorporated into training so that--and it is spread widely 
across the formations, so that each soldier, each Afghan is now 
attentive to those indicators that weren't there before.
    So we did incorporate those in Regional Command South 
locally, and now those are also things that I am seeing in our 
pre-deployment training for the formations that we are sending 
in the future.
    Mr. Smith. Thank you.
    Thanks very much, Mr. Chairman. I yield back.
    The Chairman. Thank you.
    Mr. Wilson.
    Mr. Wilson. Thank you, Mr. Chairman.
    And thank you all for being here today, also for, Mr. and 
Mrs. Acosta, our sympathy with you.
    I am the father of four sons serving in the military, two 
who were in combat in Iraq. And so, I particularly have a great 
sympathy and identification. And I know, too, that our chairman 
has been deeply affected by your loss.
    At this time, General Townsend, I was very grateful. My 
former National Guard unit, the 218th Brigade of the South 
Carolina National Guard, served in Afghanistan 2007, 2008, led 
by General Bob Livingston, who has subsequently been elected 
the only elected adjutant general in the United States.
    But when I went to visit them, because I went every 3 
months, I was so proud of their service and concerned.
    But it was amazing to me. I thought the 1,600 troops, the 
largest deployment from our state since World War II, would be 
concentrated at Camp Phoenix and that the training would be a 
rotation to the camp.
    But to my surprise, our troops were at FOBs and military 
personnel all across the country. As it turned out, it was, 
again, such a positive experience that the net of this was that 
our personnel felt like they were working with Afghan brothers.
    So, we know that there can be incidents such as this, and I 
am just hoping that the persons that I have worked with, that 
in the future that we are vetting the other persons, the Afghan 
security forces who are serving.
    As we vet, is there any polygraph capability? Or is that 
used if there is some suspicion of someone being a threat to 
our troops?
    General Townsend. Sir, there is a polygraph capability in 
theater. However, it is rarely used for this type of thing.
    It is a very complex procedure. We rarely employ it in our 
own security forces here for particular jobs. It is complex and 
just hard to do on a large scale.
    So, I would imagine that polygraph capability could be used 
in a particular investigation. But we don't typically use it in 
screening folks for employment, sir.
    Mr. Wilson. And I would hope, though, that if a person has 
been identified as indicating a desire to kill Americans, that 
that might raise itself to where a polygraph could be used. And 
with the advances in technology today, I certainly hope that, 
and whatever biometric records there are, that could be 
considered.
    What is the military standard that is used by personnel to 
enter unfavorable data about Afghan nationals?
    General Townsend. There are a couple of venues for that.
    The first--we will just take Afghan soldiers and police, 
for example.
    The first would be with their chain of command through the 
Afghan system. The Afghans also have a biometric system that we 
are helping them build and stand up.
    And we have our own biometric system. And that biometric 
watchlist is really a master database of all of our partners, 
and all of our known and suspected enemies also are in that 
database.
    They are entered into that with their name, and as I spoke 
about earlier, some of their biological data, identification 
data, is entered into that.
    There is actually a questionnaire that you fill out, 
address, where you are from, parents' names, all that kind of 
stuff is entered. And that is probably the best place to put 
it. That is the watchlist that you hear us refer to.
    So if the information is entered into that and uploaded 
into the database, then all U.S. forces in theater will have 
access to that information.
    Mr. Wilson. And that is very encouraging. And indeed, with 
the technologies we have today, things that would have been 
unimaginable can be done.
    So, I appreciate that positive response.
    I also want to know, what recourse do U.S. commanders have 
if they are unsatisfied with the Afghan Police Protection Force 
which has been supplied to a base?
    General Townsend. The commanders have complete authority 
and freedom to secure their unit in any way they see fit. And 
so if they are any time unsatisfied with any aspect of the 
security, they are authorized to take whatever measure they 
need to take to ensure the security of their unit.
    Mr. Wilson. And so it could be reported that there is 
either an individual or maybe a whole unit could be replaced?
    General Townsend. Yes, sir.
    And in fact, General Dahl can probably speak more about it.
    In the specific incidence at FOB Frontenac, there was a new 
unit that had arrived. And there was in his contractor chain, 
the perpetrator was identified to be fired.
    But in the U.S. military chain, those facts weren't quite 
as clear. That was a disconnect that we have sought to try to 
correct.
    And General Dahl----
    Mr. Wilson. And, General, thank you, I would like to get 
your point, too.
    General Dahl. Yes, sir, two points, to readdress your 
earlier question.
    You were looking for what is the threshold or the standard 
that would require an entry to be made on the watchlist.
    And clearly, we did not have a defined standard to help our 
contracting officer representatives at the time, which caused 
some confusion.
    And a lot of that is left to the judgment of the 
individual, which is why we know we have to select the right 
individual who has the maturity and the training and the 
expertise to exercise that judgment. And we have to train them.
    Those are some of the powerful lessons we learned from this 
case that we have incorporated.
    To your second question, the local commander has the 
authority to remove anyone from his FOB, from his operating 
base.
    The contractor has the authority to fire. But whether the 
contractor fires or not, the commander has the authority to 
remove those people from his base.
    And then last, sir, just to reiterate a comment that was 
made earlier, I don't want to give any impression that military 
commanders are absolving any responsibility for the security of 
their soldiers.
    These personal security contractors that are hired are 
integrated into that security plan. And they are placed in 
those places where they can perform that function and we save 
our very highly trained, well-equipped, combat-experienced 
soldiers for the larger tasks.
    Mr. Wilson. Thank you very much.
    General Dahl. Yes, sir.
    The Chairman. Thank you.
    Mr. Reyes.
    Mr. Reyes. Thank you, Mr. Chairman.
    Let me first add my condolences to Mr. and Mrs. Acosta.
    Is there--and maybe just a yes or no answer from all four 
of you--is there a fail-safe system that we could institute 
that would give us any kind of a guarantee?
    General Townsend. Yes, sir, there is a fail-safe system. 
And I will let my fellow witnesses reply, and I can then 
explain it a little bit.
    Mr. Reyes. Okay.
    Who?
    General Townsend. Okay, sir.
    So, the fail-safe system that you are referring to--and we 
have kind of talked about it here a little bit--is the 
commander is ultimately responsible for his unit security as 
are the individual troopers.
    And so that fail-safe system that is out there, it is a 
technique that is employed, is to make sure you post a guard 
for yourself. And that is always an option to these soldiers.
    And they can always post a guard to overwatch what they are 
doing if at any time they feel the threat warrants it.
    Also, there is a technique it is referred to as a 
``guardian angel.'' And that is--I guess, a good analogy would 
be sort of like a designated driver.
    The guardian angel is not there to participate in the 
activity that is being done. He is there to watch out for his 
buddies while they do that activity, whether it be a meeting, 
or cleaning weapons, or undergoing physical training.
    This guardian angel is prepared to fight. And he is in a 
position of advantage to overwatch that activity. And that is 
what he does.
    And sometimes that can be done in an unobtrusive way by 
introducing a person into a meeting who just sits and watches 
what is going on in the room, and doesn't really participate in 
the meeting.
    So, that is just an example of these fail-safes that are 
taught to our soldiers in training, and they are available to 
the commanders and any soldier.
    Mr. Reyes. Yes, General.
    General Dahl. Yes, sir. If I could just--I am not going to 
disagree with my buddy, but I interpreted your question a 
little bit differently.
    Just to add, we should aspire to develop and implement a 
fail-safe system. And that is precisely what we are doing, 
because we are going to meet our responsibilities to secure our 
formations.
    However, we have to remember that in combat environment, 
not everything turns out the way you expect it. And you simply 
cannot anticipate everything, and unfortunate events happen. It 
is a very, very risky environment.
    So, we are committed to meet that challenge and do 
everything we can. But we also have to recognize in that 
environment we just don't control everything.
    Mr. Reyes. But if I heard you correctly, this fail-safe 
system, as much as we can do it--and look, I just want to 
remind everybody, we had a horrible attack at Khost, right on 
the border with Pakistan, where we lost a number of CIA 
[Central Intelligence Agency] personnel.
    But what you are saying is that the fail-safe system still 
requires our military being involved, correct?
    General Townsend. Yes, absolutely. And, of course, they 
are.
    And in fact, I didn't mean to imply earlier that--and I 
thank General Dahl for pointing out that, there is no--I guess, 
it is probably improper to say there is a fail-safe system, 
because no system is perfect.
    Mr. Reyes. Right.
    General Townsend. So, this is a thinking enemy that we are 
dealing with here, a cunning enemy, who wants to hurt us.
    And every now and then, the enemy is going to have some 
success.
    So, what we are trying to do is eliminate as much as 
possible, reduce the possibility that that can happen. But we 
can't eliminate it completely.
    I didn't mean to imply, in any of our statements so far, 
that U.S. forces don't pull security for themselves. They do.
    In fact, again, it is up to the local commanders.
    So, there are places where the commanders have made risk 
assessments that it is appropriate for either local security 
contractors or Afghan security forces to secure that area.
    In other places, they deem that it is more appropriate that 
we do it together. And in other places, it is very appropriate 
that we do it ourselves----
    Mr. Reyes. And if I can just interrupt you, because I 
wanted to get this other point in.
    Do we currently have any backlogs in the system for anyone 
that wants to know the potential for somebody being a threat? 
Are there any backlogs?
    Are we up-to-date on any inquiries of the system?
    General Townsend. Sir, I think I understand your question.
    There is actually--it is almost instantaneous if someone 
wants to check the watchlist. There are some physical 
limitations to the system.
    For example, if I have gone out and enrolled some folks in 
biometrics, I actually have to go upload it into the master 
database. And that takes time. It takes resources. And 
sometimes I have got to have a good signal, a good bandwidth to 
get my upload out.
    So, there are some physical limitations that might be a 
delay. But we are talking here a matter of hours or days, not a 
significant backlog to enter data into the database and check 
the master watchlist.
    Mr. Motsek. Sir, you bring up an excellent point. This 
technology helps us do this.
    And as General Townsend said, we are managing a bunch of 
different databases and linking them consistently. But you are 
all keyed to that piece of equipment down range which has had 
limited availability, to be blunt about it.
    They break. We have challenges.
    In light of that--again, trying to improve what we do and 
recognize what we have learned--next month the Army, for 
example, will be deploying for the first time.
    And, hopefully, we will be deploying in large numbers later 
this year, a biometric device that is much more simple to 
operate. It is based on a smartphone technology as opposed to 
the larger packages that you have seen previous to this.
    And we could be much more free in the distribution of those 
downrange.
    So instead of having the existing chains of people 
providing access, we now give one to the contracting officer 
representative, him or herself, as opposed to having to go to 
an intelligence specialist or someone else at the installation.
    And that input now becomes multiplied as we proliferate the 
systems downrange.
    Mr. Reyes. Thank you.
    And thank you, Mr. Chairman.
    The Chairman. Thank you.
    Mr. Conaway.
    Mr. Conaway. Thank you, Mr. Chairman, and also, Mr. and 
Mrs. Acosta, our condolences, as well.
    Fifty-eight percent of these incidences were not related to 
the enemy we faced necessarily, but would just appear to be 
personnel disputes between the Afghans and, I guess, somebody, 
either the Americans or someone else.
    The process of maintaining how those disputes are going on 
and--can you talk to us a little bit about how units are 
trained to watch for these kind of, for lack of a better place, 
workplace kind of incidences where somebody gets insulted, or 
they don't get the job they thought they were going to get, and 
how do we watch for that.
    And then much of that is intuitive based on you were there, 
you understood what the fight was going on.
    How do we hand off in unit rotations, the information about 
the people who have left there that might be subject to some 
sort of a workplace issue that could develop into an armed 
response, so to speak?
    General Townsend. Sir, if it is all right, I will take the 
question about how do we manage the frictions. And I will ask 
General Dahl to maybe address the question about battle 
handover of the information.
    On your question about the personal reasons, there are a 
number of personal reasons that cause this kind of a conflict 
to occur. You pointed out a couple of them yourself.
    One of them is just simple insults. Another one is combat 
stress that the individuals are under.
    Cultural misunderstandings, I kind of talked about that in 
my opening remarks. Those are some of the examples.
    Religious and ideological frictions, where I watch you do 
some activity and I perceive it in one way based on my religion 
or ideology.
    So these are all some of the reasons that go into the 
personal motivations that these Afghans--when they act out.
    Mr. Conaway. Looking at the 26 incidences that have 
happened so far related to that, do we analyze, kind of, what 
categories those fall into? And can we learn anything from it?
    General Townsend. Yes, sir. In fact, we do.
    And where we can identify that there are personal 
motivations, sometimes they are not discernible. Where we can 
discern those, you can categorize those.
    I just described some of the categories. Some of the things 
we can learn from it, first of all, and I kind of mentioned 
this in my opening remarks, is the importance of cultural 
training that all U.S. service members undergo before they 
deploy.
    And in fact, General Karimi, the chief of staff of the 
Armed Force of Afghanistan, has directed that his soldiers will 
start undergoing cultural training as well, so they understand 
a little.
    That is not something we have attended to in the past--
making sure Afghans know how to deal with us as their partners.
    We have been training our side of that equation for a long 
time.
    The other one is our own conduct. Making sure that our own 
soldiers comport themselves the way we would expect U.S. 
soldiers to do that.
    And I will ask General Dahl if he can talk about, maybe, 
the transfer of that information about people.
    General Dahl. Congressman, two points. One is training, and 
the other one is leader involvement or leader over watch.
    And what we have done, in Afghanistan in particular to get 
after this, is to insert greater attention to the training and 
the leader oversight during what we call RSOI, the receiving 
and the staging and the onward integration of the forces.
    So when they arrive into Afghanistan, there is additional 
attention paid toward the cultural situation in that specific 
location. Because there are cultural differences as you go from 
district to district, province to province.
    So we will address those so that the soldier is aware and 
sensitive to cultural differences that could be a problem.
    And then also the awareness, but also the involvement of 
the leadership in that training and in the overwatch is 
important.
    Mr. Conaway. Is there specifically in the checklist of 
handoff from one to--this issue about, here are the five 
individuals we have had some sort of a dustup with. We don't 
know if it is going to result in anything.
    But I am watching him. You should, as well.
    Is there a formal kind of a handoff of that issue 
specifically between commanders?
    General Dahl. Sir at the unit level, the commander-to-
commander and his non-commissioned officer 1st sergeant or 
command sergeant major, command sergeant major, will identify 
who are the strong soldiers and who are the weak soldiers.
    And I think that that applies not only to our own 
formations but to our partners, as well.
    Mr. Conaway. Okay, you said you think that applies, but is 
it institutionalized so that we do, in fact, get some attention 
paid to this issue, since 26 percent of these incidents 
occurred not from guys who supported the Taliban or supported 
Al Qaeda, but are actually just got mad at us for their own 
reasons.
    General Dahl. I understand, sir. I can't say that it has 
been institutionalized across the Army.
    General Townsend. Sir, you make a great point here. And as 
General Dahl has pointed out, something that a lot of units are 
doing, but you are asking is everyone required to do it.
    Mr. Conaway. Right.
    General Townsend. I can't answer that affirmatively right 
now. But I have written it down. We will take that back.
    [The information referred to can be found in the Appendix 
on page 53.]
    General Townsend. And if it is not, it is an easy add to 
the orders that I had talked about earlier.
    But is this on the relief in place battle handover 
checklist that there is a specific point in that relief in 
place where the outgoing commander and the incoming commander 
talk about potential insider threats, and people that have been 
identified as maybe being suspicious will check on that.
    If we can get you an answer on that before the end of the 
hearing we will. But I have written it down to follow up.
    Mr. Conaway. Thanks. Gentleman yields back.
    The Chairman. Thank you.
    Mr. Johnson.
    Mr. Johnson. Thank you, Mr. Chairman, for holding this 
hearing on this matter that is critical to the safety and 
security of U.S. forces in Afghanistan.
    I want to also give my personal condolences to the Acostas 
for the sacrifice that you have made, and the sacrifice that 
your son made on behalf of this country.
    And isn't it comforting to know that that sacrifice was 
made for the security of a country that you can now come to and 
petition the civilian authorities to look at the circumstances 
that led to your son's sacrifice.
    You have that ability here in the United States. And that 
is what your son gave his life for.
    And for that we will appreciate him. And we appreciate you 
for taking your time and resources to petition your government 
to take a look at these circumstances, to see whether or not 
there is something that can prevent another family from having 
to go through what you have had to go through as a result of 
the same circumstances that resulted in your son's sacrifice.
    So, I want to thank you all for being here.
    I also want to thank General Townsend and the rest of the 
folks on the panel today for being here to testify. I cite 
General Townsend since he is a Georgia native. He is my 
homeboy.
    So, welcome, sir.
    I do have a question.
    Can you define, General Townsend, what success is in 
Afghanistan? What would be our success?
    And also I would like to know from Mr. Sedney, whether or 
not we are on course to remove all of our forces from 
Afghanistan by the end of 2014.
    General Townsend. Sir, that question you just asked me is 
pretty high up on the pay scale for me to answer. But I will 
just look at our national objectives in Afghanistan as I 
understand them.
    First of all is to ensure that Afghanistan never again 
becomes a safe haven for transnational--specifically Al Qaeda--
but other transnational terrorists that might threaten our 
country. That is job one on the success list.
    Secondly is to do that, we have determined that what we 
want to do is establish a credible enough Afghan state and 
security force that they can secure themselves, and we don't 
have to stay there forever to make sure it is not a safe haven.
    So, those are my definitions of success. And I will turn it 
over to Mr. Sedney to talk about progress.
    Mr. Johnson. I would also add a comment.
    The fact that they, the Afghans, seem to not want us to be 
there does not mean that they are not interested in protecting 
their country from outside influence, aka Al Qaeda, or some 
other terrorist group that seeks to use the country as a base.
    Is that correct?
    General Townsend. Sir, I would maybe express a little 
exception to your point of they don't want us there. I have met 
a lot of Afghans in my three tours there. And there are a lot 
of Afghans that want us to be there and help them help 
themselves.
    There are certainly a number that don't, but your point is 
exactly right, and I would agree that just because--even those 
that don't want us there, don't necessarily want Afghanistan to 
be a haven for international terrorists.
    Mr. Johnson. Well, your clarification is well taken.
    Mr. Sedney.
    Mr. Sedney. Thank you, Congressman, and I will certainly 
fully associate myself with General Townsend's point that we--
and your point is accurate as well--we and the Afghans share a 
goal of having Afghanistan being responsible for its own 
security.
    Afghans don't want their country to be used to attack other 
countries, with the small exception of those that support the 
Taliban, which is a very small amount.
    You asked if we are on track towards that goal. And I would 
say yes, we are.
    As the President stated in his remarks in June, when he 
announced that we would be withdrawing 10,000 troops by the end 
of this year, and we have--by the end of last year, and we did 
remove those 10,000 troops.
    We are on track towards achieving our goal of having an 
Afghanistan that is capable of defending itself from the threat 
of terrorism and from the possibility of safe havens.
    To do that, there is both a lot of fighting that needs to 
be done and a lot of training, advising, and assisting the 
Afghan security forces, because it is building the Afghan 
security forces through the partnership with them that is 
enabling that transition to take place.
    And already, as I said, almost 50 percent of the country, 
of the population of the country is in areas that are 
transitioning.
    The Afghans, as General Townsend said, do appreciate the 
advice and support and assistance that we are giving them, and 
I would say particularly in the military.
    I have met from the top of the Afghan military to the 
ordinary fighting Afghan, innumerable Afghans who expressed 
their appreciation for us.
    I have heard that from Mr. Wardak, and from the Afghan 
generals repeatedly, that they appreciate. But that they are 
also, to be frank, embarrassed by the fact that other countries 
have to come and do their fighting for them.
    They want to do their fighting on their own. We want to 
enable that.
    So, we are on course to do that. And that will enable us to 
transition to Afghan security lead.
    There will be, of course, as the Secretary of Defense has 
said, a continuing need to train, advise, and assist the Afghan 
military after 2014, after that transition to their lead.
    Mr. Johnson. All right. Thank you.
    And I am out of time.
    If I had more time, I would ask whether this screening 
process currently used by the Afghan National Security Forces 
to vet recruits to the Afghan Public Protection Force, whether 
or not it is adequate and practical. But perhaps someone else 
will ask that question.
    The Chairman. Gentleman's time has expired.
    Will you please take that question for the record?
    [The information referred to can be found in the Appendix 
on page 53.]
    Mr. Scott.
    Mr. Scott. Thank you, Mr. Chairman.
    Sir, ma'am, I am sorry about your loss. And I want to thank 
you for coming today.
    I think it elevates the importance of the meeting and 
reinforces our need to fix the issues over there so that this 
doesn't happen again.
    General Townsend, you mentioned that many times some of the 
Afghans who are applying for these positions cannot spell their 
name. One of the things that I was taken aback by when I was in 
Afghanistan--we were at a NATO [North Atlantic Treaty 
Organization] police training facility--is the extreme lack of 
education.
    And taking a man or a woman who can't spell their name, or 
couldn't read a book of the level of The Cat in the Hat, if you 
will, and handing that person an AK-47 [assault rifle] and 
expecting them to carry out security-related details.
    And my question gets back to, in these events that we have 
seen where we have had these tragedies, is the lack of 
education a common denominator, or are the attacks carried out 
by people who--Afghans who may very well be better educated?
    Is the education level, has that been a common denominator 
in the people who have carried out the attacks?
    General Townsend. I will ask for General Dahl's help a 
little bit on the education piece.
    I haven't seen any data that associates level of education. 
I know that we have seen attacks by those who are illiterate, 
as well as attacks by those who are highly educated.
    I don't know. I haven't seen that trend. So, I can't talk 
to that. Maybe General Dahl can.
    I will say that your point about education and literacy is 
a very important one. And it is something that we are tackling 
very explicitly.
    The NTM-A, NATO Training Mission-Afghanistan, has a very 
strong literacy program. GIRoA [Government of the Islamic 
Republic of Afghanistan] has a strong literacy program to--it 
is probably one of the most important social developments, I 
think, in all Afghanistan, is there is a very focused program 
to teach Afghan soldiers and policemen how to read.
    Right now about half of the Afghan Army has been exposed to 
reading between a first and the third grade level. It has 
been--that target has been ratcheting up.
    But the goal is that all Afghan service members in the 
police or the army during the term of their enlistment, their 
first enlistment, learn how to read.
    And I think this has implications for the country that go 
far beyond a higher quality security force when they go back to 
their villages and are able to read after their term in 
service.
    And, General Dahl, can you help me about education.
    General Dahl. Yes, sir.
    Congressman, thank you for the question.
    I would just add that--and you are right.
    I was in the South, and in the South illiteracy is 
particularly high. I learned in my time over there that a lack 
of education, the lack of ability to read or write or add or 
subtract did not necessarily limit someone from performing a 
particular function or achieving a capability.
    But it severely challenges our efforts to train them, 
which--and we learned a lot of lessons about how to go about 
that in a way where we are communicating more effectively.
    It takes a little bit longer. You have to start at a very, 
very base level.
    But I guess we are learning just because someone can't read 
and write doesn't mean they are not capable, just means you 
have to go about it a little bit differently.
    So, I am not that concerned about that long-run.
    I would add that the training program, the literacy program 
that is part of the development of the ANSF forces is very, 
very good. It is possible that in the future that cadre of ANSF 
is--becomes some of the most literate people, at least in the 
South.
    I can say that that would be true. And I will leave it at 
that.
    Mr. Scott. I guess my question--and I will end with this 
and allow this process to move on.
    It seems to me that somebody who is less educated would be 
more susceptible to the rhetoric, if you will, and to be led 
down the path of carrying out an attack, or some type of 
terrorist attack by some other type of what they might refer to 
as a religious leader.
    Thank you, gentlemen.
    Mr. Sedney. Congressman, on that you have asked an 
excellent question. We will go back and see if there is a 
connection between illiteracy and training in the carrying out 
of those attacks.
    I don't think we have been asking that question, and based 
on your input, we will do that.
    Thank you.
    [The information referred to can be found in the Appendix 
on page 53.]
    Mr. Motsek. Sir, if I may add one more thing, with regards 
to the security contractors.
    The reliability of the educated contractor is significantly 
greater. One of the reasons why we had a fracture early on 
between the police force and the security contractors is the 
very good security companies recognized very early if they 
offered education to their employees, they would have a better 
and more reliable employee.
    Something as fundamental as to be able to count the money 
you are paid on a given day is extraordinarily important. When 
you give a person that capability, you have changed something.
    Several months ago, when I was in country, I saw a gate 
guard that I had seen before. He ran up to me and he literally 
handed me his AK-47.
    He handed it to because he read the serial number off the 
side of it to me. He was incapable of doing that before.
    So, I would argue that it is not a question of reliability 
so much as competency. You have a more competent individual if 
we follow the path that you have described.
    Mr. Scott. Thank you.
    Mr. Chairman, I yield.
    The Chairman. Thank you.
    Last year when I was in Afghanistan meeting with General 
Caldwell, he pointed out that vast majority of the country are 
illiterate. And the problem that they have of teaching--a 
sergeant trying to teach them how to fire a weapon, when he 
says, ``Put four cartridges in,'' they didn't know what four 
was.
    But he told us at that time that the 70,000 they had 
recruited that year, most of them had gotten through that 
training up to the third grade, and vast improvement.
    And I think that will have long-lasting effects for the 
country, too. They felt very good about the fact that they were 
getting education, and as has been stated, they felt good about 
that.
    Mr. Kissell.
    Mr. Kissell. Thank you, Mr. Chairman, and to the family, 
thank you for being here today.
    We lost a young man in 2010 in Iraq in a very similar 
situation. It is most troublesome, and our condolences and 
prayers are with you.
    I thank the gentlemen for being here today.
    General Townsend, a lot has been said about biometrics. And 
what happens when the machines don't work?
    I read somewhere that there seemed to be a failure and not 
enough machines throughout the country.
    What happens when the machines don't work?
    General Townsend. That is a great point, sir, and thanks 
for that question.
    The biometrics is just one piece of a complex and layered 
system that I talked about in my opening remarks. There are 
actually four levels to this: prevent, educate, train, and 
protect. Those are the four levels.
    The biometrics comes into the prevent piece. The prevent 
piece is largely based on that eight-step vetting process.
    One step of that vetting process is biometrics. And then 
you have heard testimony here that we are continuing now with 
weekly screening.
    Mr. Kissell. And General, if--and I apologize for 
interrupting. I do want to follow along this path for just a 
second.
    If there was not a machine working in one step for 
biometrics, checks could not be made. Would that be enough to 
at least pause somebody being in the process? So, you would not 
say okay, we don't have this today, but we will go ahead and 
bring him in anyway.
    General Townsend. And that is a great point. And that is 
actually one that I think the outcomes of the investigation 
from the FOB Frontenac incident. And Mr. Motsek can talk about 
I think, here in a second, the arming process for security 
contractors.
    But no, the process stops when a person can't be 
biometrically enrolled into the watchlist, his forward movement 
through the induction process stops.
    And if you would talk about arming----
    Mr. Motsek. Right, as General Townsend said, it has got to 
be multilayered. And if you follow the procedures correctly, 
you have the biometric process. And indeed, you have two 
biometric processes now.
    You have the U.S. biometric process and you have an Afghan 
biometric process that are complementary. So you have got that.
    But the same process, you have an arming requirement as 
well. The Afghan Ministry of Interior is the one who provides 
you your arming authority from the Afghan government. And we 
should have the same corollary, and we had the same processes 
in place where we provide an arming authority as well.
    And in this particular instance, as you recall in the 
investigation, the local commander thought he had a window 
because this person had been previously employed and the like. 
He thought he had a window.
    My position as the DOD guy is that window does not exist.
    You are proper in your assessment that if you cannot 
properly biometrically enroll someone, if you cannot properly 
license them to be armed, because that infers training and 
knowledge on certain rules, that the process has to stop. And 
then you----
    Mr. Kissell. How complete is the biometric database from 
all people that are inputting and checking?
    How free of stovepiping is this information?
    Is it broad, so that various inputs, there is not, say, one 
department, one country, one unit that is not included or does 
not have access across the board?
    General Townsend. There is an Afghan database and there is 
a U.S. database. And we share information.
    You might understand why we would have a separate database 
from the Afghans. But by and large, there is not that much 
difference, but we share information. So, there is a deliberate 
effort to prevent the stovepiping, sir, that you are talking 
about.
    Mr. Kissell. Once someone is vetted and once they have been 
brought in, and I know you talk about the weekly checks, but 
how difficult would it be, for example, if someone was, say, 
looked like, if they were Taliban, they looked like someone who 
had been vetted.
    How difficult would it be for somebody else to come on base 
and assume the identification of somebody who has been vetted?
    Do we reach a comfort level? Do we have daily checks?
    How difficult would it be for me to come on base looking 
like somebody else, and have access to be able to do harm?
    General Dahl. Sir, I can say, just to refer to my comments 
earlier.
    I know one of the things we did immediately afterwards was 
to ensure everyone, all of our contractors, not just the 
personal security contractors, but all of the Afghan 
contractors on our bases were enrolled and vetted.
    But then on a sustainment basis, we went with 50 percent on 
a monthly basis randomly. That is a case where we would pick on 
someone like that.
    But it is not perfect. We wouldn't pick on them perhaps the 
day that they walked on and were impersonating someone else, if 
that is what you are alluding to.
    And really it is a material solution. It is how much time 
and how much equipment do you have to dedicate to this.
    So again, we want to aspire to the perfect solution, given 
the limitations that we have. And those are the measures that 
we have taken.
    Mr. Kissell. Thank you, gentlemen.
    Thank you, Mr. Chairman.
    I do have some other questions that I will forward for 
outside follow-up.
    The Chairman. Thank you.
    Mrs. Hartzler.
    Mrs. Hartzler. Thank you, Mr. Chairman, thank you, panel, 
and most of all, thank you for coming today, for your service 
and your sacrifice.
    Our prayers are with you and the Nation's gratitude. So 
thank you, thank you.
    Regarding the incident, I want to kind of hone in on that a 
little bit. And it looks like, that first of all, the Tundra 
employees did an investigation and let this person go.
    But that recommendation was never incorporated into the 
Tundra personnel records. And then subsequently, the U.S. 
investigated also into the allegations, but they couldn't 
substantiate the credibility of the statements, so the officer 
decided not to enter this information in.
    I would like to know, since this happened what change of 
procedures has there been, first of all, in U.S. policy at it 
relates to investigations of this kind?
    If they determine that somebody is unsubstantiated, then 
what is the process?
    Has that been changed? Or are they required now to enter 
that? Or----
    General Dahl. Ma'am, I will start, and then I will hand it 
off.
    You are correct. Your read of the investigation is exactly 
correct.
    We had two different judgments that were made, one by the 
Tundra contractor, one by the officer who was responsible. And 
it speaks to the question that was raised earlier as to what is 
the threshold that would require a mandatory entry in there.
    I know that what we did afterwards locally was to 
essentially raise that threshold, raise any suspicion, that 
would cause an entry to be made and that person to be removed.
    And this partly explains why post the attack at FOB 
Frontenac, when we went and did that vetting of all the 
employees there, that some additional ones were removed.
    I will ask my colleagues if they could talk about how we 
have institutionalized that beyond my experience.
    General Townsend. I think it was Ranking Member Smith, who 
said earlier that we need to intercede earlier. If it is 
unclear, err on the side of safety, which I think kind of sums 
up what we are talking about here.
    But in the end, these are judgments by leaders and 
commanders on the battlefield.
    So if someone brings an allegation to me, I am going to 
hear it out and explore it. And at some point, I will make a 
decision that it is either substantiated and he is fired, or it 
is substantiated and he is fired or he is not fired, but it is 
put as a note in the watchlist.
    Or it is completely unfounded because this guy has got 
some--there is some conflict between the two of them. So, the 
person who is giving me the allegation is just unfounded. And 
so, I might make a decision not to enter it.
    Just because an allegation has been made, these leaders out 
there are making those judgment calls.
    But I think Mr. Smith's point about err on the side of 
safety for the U.S. soldiers is a good rule to go by, ma'am.
    Mr. Motsek. The other thing that changed was that--again in 
the investigation, because it was unsubstantiated, the senior 
leadership of Tundra chose not to put it in the person's file.
    We now require them to put ``investigation concluded, it 
was unsubstantiated,'' so it is not a non-response. It is not a 
non-placement. You have to make an affirmative decision, and 
record that affirmative decision now.
    Mrs. Hartzler. I am glad to hear that.
    General Townsend. Can I add?
    One of my assistants here just handed me a note that says 
actually the USFOR-A [United States Forces-Afghanistan] order 
requires an entry to any incident that may pose a threat to 
U.S. personnel such as threats, if the person makes a threat or 
has a negligent discharge with their weapon.
    But again, there is going to be some line there where it is 
a commander's call. Is that really a threat or is that not?
    And that is what we are talking about.
    Mrs. Hartzler. Okay. I am a little confused as to what you 
just said.
    I thought you just said that it is procedure that it is 
entered. But then you say, it is up to the commander's call. So 
is it or isn't it?
    General Townsend. Yes, such things, obvious things such as 
threats. So if I make a threat against an American force, they 
are required to enter.
    But if someone says, ``I heard so-and-so make a threat to 
an American force,'' there is going to be a commander who is 
going to investigate that, and he is going to make a decision. 
``Okay, I don't think that is credible.''
    Is it credible or is it not credible?
    If I know that he threatened Americans, that is very 
credible.
    General Dahl. And, ma'am, just to tie it back to the 
investigation also, the officer who did not enter that in there 
determined that the threat was unsubstantiated. So, he was not 
required to make an entry at that time in his judgment.
    Had he made the judgment that it was a substantiated 
threat, he would have made the entry.
    Now, it is a requirement to make that entry. But still 
there is a judgment that has to be exercised as to whether or 
not this is a credible threat, or if this is just someone who 
is--it is a family dispute and they are trying to cause 
problems for another.
    Mrs. Hartzler. So, you say he does have to enter it, 
though, even if he doesn't let him go, he does enter it?
    General Dahl. Yes, ma'am. The policy requires the entry be 
made if the judgment is made that he is a threat.
    Mrs. Hartzler. Got you. I think that is good.
    It needs to be in there, even if it is unsubstantiated. 
People need to know.
    And I want to follow up on your earlier anecdotal story 
about the Afghan security officer.
    General, you said they came in and there was a soldier and 
they had some concerns about them, so they let him go and moved 
him out of that.
    What was done with him, besides just letting him go? I am a 
little concerned he might go to another FOB and do the same 
thing.
    General Townsend. Right. In the case that I was referring 
to, that soldier had a personal conflict--reportedly had a 
personal conflict with a specific American soldier, not that he 
had a problem with all Americans.
    But there was a personal insult that was perceived by this 
Afghan soldier. And so the Afghan commander made a decision to 
move him away to a different location and remove him from that 
conflict.
    At the time, I thought that was an appropriate decision 
made by an Afghan leader dealing with an Afghan soldier.
    Mrs. Hartzler. But hopefully note that conflict in his 
record that went with him. Yes?
    General Townsend. I don't know about that at the time, 
ma'am. This is about a year and a half ago. And even at that 
time, all of our Afghan security forces weren't yet entered 
into biometrics.
    Mrs. Hartzler. I appreciate it. I just think we need to err 
on the side of caution and have a valid record that goes with 
people so that in the future people know of past instances to 
avoid any potential future negative incident.
    Thank you. Thank you, Mr. Chairman.
    The Chairman. Thank you.
    Mr. Platts.
    Mr. Platts. Thank you, Mr. Chairman. Appreciate your 
holding this important hearing. Certainly appreciate all the 
witnesses' testimony and focus on this important issue.
    I want to add my words of personal sympathy and gratitude 
to the families who have lost loved ones.
    You know, we can often take for granted the freedoms we 
have, and the truth is, we only have the blessings of freedoms 
we do as Americans because of heroic selflessness of our men 
and women in uniform who are willing to go into harm's way and 
give their lives in service to this Nation.
    So, we certainly have you in our prayers, and our gratitude 
for you giving your loved ones for all of us.
    General Townsend, if you could comment--and I recognize we 
are in an open setting here, not a classified setting--but 
earlier today, Reuters reported the following: ``The United 
States military said in a secret report that the Taliban, 
backed by Pakistan, are set to retake control of Afghanistan 
after NATO-led forces withdraw, raising the prospect of a major 
failure of Western policy after a costly war.''
    Again, knowing we are in an open setting, are you able to 
comment at all on the existence of this report, or the general 
characterization about the Taliban retaking control, anything 
in your knowledge that would relate to what is being reported 
today by Reuters?
    General Townsend. I can comment a bit about it, but, as you 
said, not much because of the classified nature of the report.
    Mr. Platts. Understood.
    General Townsend. The truth is I am aware of the existence 
of the report. I have received a copy of it. But I haven't read 
it and digested it myself.
    What I do know is the report is taken from interrogations 
of Taliban prisoners. And so, these guys that were--you got to 
keep it in context.
    The folks that are quoted in this report are some of the 
most ideologically committed folks on the enemy side. So, I 
don't think they are representative, one, of the Taliban as a 
whole, nor are they representative of the Afghan people.
    I think that is probably--best I know off of a quick glance 
at the cover of the report, that is about all I can say on it.
    Mr. Platts. So based on your knowledge and what we can talk 
about here in an open setting, the report isn't a finding of 
our own intelligence gathering out there on the street, in 
essence, but more those who we have captured who are in a 
defiant manner saying this is what is going to happen.
    And so the credibility of the basis of that report needs to 
be maybe closely scrutinized?
    General Townsend. I don't want to attack the report because 
I haven't read it. But I just want to keep it in context, that 
the reports are coming from enemy soldiers held in captivity--
--
    Mr. Platts. And maybe say the credibility of the source or 
the basis of the report, not the report itself.
    General Townsend. Yes, sir.
    Mr. Platts. Okay. Thank you.
    And, again, appreciate all of our witnesses for your 
service to our Nation. And we are grateful for what you do.
    So, Mr. Chairman, I yield back.
    The Chairman. Thank you very much.
    I want to thank you for being here today. I appreciate the 
testimony that you have given, the questions that have been 
asked.
    I believe we have received some of the answers that we have 
sought on how we can reduce the number of these attacks.
    The committee will continue to review and investigate these 
attacks and work with the DOD to constantly work on making 
improvement in this area with the DOD and with the Army.
    Thank you very much.
    This hearing then is adjourned.
    [Whereupon, at 11:40 a.m., the committee was adjourned.]
?

      
=======================================================================




                            A P P E N D I X

                            February 1, 2012

=======================================================================

      
?

      
=======================================================================


              PREPARED STATEMENTS SUBMITTED FOR THE RECORD

                            February 1, 2012

=======================================================================

      
              Statement of Hon. Howard P. ``Buck'' McKeon

              Chairman, House Committee on Armed Services

                               Hearing on

             Use of Afghan Nationals To Provide Security to

         U.S. Forces, in Light of the Attack on U.S. Personnel

           at Forward Operating Base Frontenac, Afghanistan,

                             in March 2011

                            February 1, 2012

    In September last year, this committee explored the issue 
of attacks by members of the Afghan National Security Forces on 
U.S. and coalition personnel. The witnesses concluded that DOD 
had ``mitigated the risk about to the degree we can,'' in 
``these few occasions'' when such attacks have occurred.
    Since then, the committee staff has continued to look into 
the factors behind attacks by Afghan nationals on coalition 
forces, including attacks conducted by Afghans hired by private 
security contractors to protect U.S. bases. The staff has used 
the attack in March 2011 at Forward Operating Base Frontenac as 
a case study to better understand the range of issues. In that 
attack, two soldiers died, including my constituent, Specialist 
Rudy Acosta, and four were wounded. I would like to note that 
Specialist Acosta's father and mother, Dante and Carolyn 
Acosta, are with us today.
    Private security contractors are used in Afghanistan to 
provide personal protective services for Department of State 
personnel and dignitaries, to guard construction sites, to 
ensure safe movement for other private companies doing business 
in Afghanistan, for guarding supply convoys, and to augment 
coalition forces by providing base security. In the case of 
base security, the Commander in Chief is responsible for 
determining the size of the U.S. force deployed to Afghanistan, 
the missions that force will undertake, and the necessary 
contractor support. For different reasons, both President Bush 
and President Obama have chosen to limit the size of the U.S. 
force and to use private security contractors to enhance base 
security. In contrast, it is Congress' role, and the purpose of 
today's hearing, to assess the advisability of these policies 
and whether the Administration needs to change its approach.
    Complicating matters further, President Karzai has dictated 
that only Afghan nationals may be certified for employment as 
private security guards and has not permitted U.S. citizen 
contractors. Karzai has also ordered the private security 
contractors to be disbanded. The Afghan Ministry of Interior 
will assume full responsibility for providing the Afghan 
Personal Protection Force (APPF), a new organization that from 
March 2012 onward, with a few exceptions, will replace private 
security contractors. The APPF will be available on a fee-for-
service basis to coalition forces to perform the services I 
just described.
    According to DOD, the Afghan Ministry of Interior, in 
conjunction with U.S. and coalition forces, will use a vetting 
and screening process that will be the same for both the Afghan 
National Security Forces and the APPF.
    I recognize that it would be virtually impossible to 
establish a foolproof screening process. Our own national 
security screening system is not foolproof. Yet, we must 
recognize that the existing processes failed to identify 42 
attackers in 2007 to 2011. Thirty-nine of those attacks were by 
members of the Afghan National Security Force, and three by 
contractor employees. Though less than one percent of Afghan 
forces and security guards have attacked coalition forces, this 
is 42 attacks too many and the new process must do better.
    Another concern is that the screening and vetting has been 
tragically weak in picking up signs of threats after the Afghan 
joined either the Afghan National Security Force, or a private 
security contractor. DOD data indicates that at least 60 
percent of all the attacks appear to be motivated by personal 
matters, arising after hiring.
    So it was with the attacker at FOB Frontenac. In July 2010 
at another forward operating base, his employer, Tundra 
Security, fired him for allegedly making statements about 
killing U.S. personnel and recommended that he not be rehired. 
The contractor's chain of command did not enter that 
recommendation into the attacker's file, and the attacker was 
rehired by the same contractor in 2011, just before the attack 
at Frontenac.
    Moreover, because a parallel U.S. investigation of the 2010 
allegations concluded that the statements could not be 
substantiated, the U.S. official at the base decided not to 
enter the allegations about the attacker in the U.S. watch list 
system.
    Adding to my concern about the vetting system not being 
focused in the right place, a U.S. rescreening of all Afghan 
security guards at Frontenac immediately after the attack 
resulted in several being dismissed as ``unworthy'' of 
employment.
    Finally, I am concerned about the Department's September 
statement that its efforts have ``mitigated the risk about to 
the degree we can.'' At the time, the committee was not aware 
that the frequency of these attacks had dramatically increased 
in 2010 and 2011--in fact, 75 percent of all attacks have 
occurred in the last 2 years. The Department attributes the 
increase with the growth of U.S. forces in Afghanistan. But, we 
need to understand the contributing factors better, so that 
more effective steps can be taken to further mitigate attacks 
on U.S. and coalition personnel.

                      Statement of Hon. Adam Smith

           Ranking Member, House Committee on Armed Services

                               Hearing on

             Use of Afghan Nationals To Provide Security to

         U.S. Forces, in Light of the Attack on U.S. Personnel

           at Forward Operating Base Frontenac, Afghanistan,

                             in March 2011

                            February 1, 2012

    Thank you, Mr. Chairman, for calling this hearing. I would 
like to thank our witnesses for agreeing to come before us to 
testify about this subject as well.
    We ask our brave men and women in uniform to take on many 
risks and dangers in wartime, and they should not have to be 
concerned about being attacked by those whom they serve with or 
seek to protect.
    We in Congress, and those in the Pentagon, owe it to our 
military personnel to do everything we can to reduce this sort 
of risk. Like the actions taken over time to reduce friendly 
fire casualties, eliminating the threat of ``insider attacks'' 
should be a high priority, whether from a private security 
contractor or member of the Afghan National Security Forces 
(ANSF). Hearings such as the one today are helpful in 
determining what drives these sorts of attacks, and what 
policymakers can do to prevent them from occurring in the 
future. It is our duty to do whatever we can to protect our men 
and women in uniform, and that includes preventing attacks from 
the Afghan troops that they serve with.
    In addition to presenting a security risk to our troops, 
attacks of this nature also undermine the trust between U.S. 
and Afghan personnel. That trust is a key ingredient in our 
efforts to build the ANSF, and those forces are a key factor in 
our plan to eventually wind down our involvement in the war in 
Afghanistan. Similarly, if our military personnel cannot rely 
on those hired to guard U.S. bases, they cannot be effective.
    Again, I would like to thank our witnesses for appearing 
today and thank the Chairman for holding this hearing.

[GRAPHIC] [TIFF OMITTED] T2935.001

[GRAPHIC] [TIFF OMITTED] T2935.002

[GRAPHIC] [TIFF OMITTED] T2935.003

[GRAPHIC] [TIFF OMITTED] T2935.004

[GRAPHIC] [TIFF OMITTED] T2935.005

[GRAPHIC] [TIFF OMITTED] T2935.006

[GRAPHIC] [TIFF OMITTED] T2935.007

[GRAPHIC] [TIFF OMITTED] T2935.008

[GRAPHIC] [TIFF OMITTED] T2935.009

[GRAPHIC] [TIFF OMITTED] T2935.010

?

      
=======================================================================


              WITNESS RESPONSES TO QUESTIONS ASKED DURING

                              THE HEARING

                            February 1, 2012

=======================================================================

      
             RESPONSE TO QUESTION SUBMITTED BY MR. CONAWAY

    General Townsend. DOD has established a set of counterinsurgency 
training and operational standards to focus U.S. military units on 
specific requirements prior to and during their deployments to 
Afghanistan. Some of the skills are not Afghanistan-specific, such as 
``understand the operational environment'' while others apply directly 
to current operations such as ``establish combat outpost.'' A specific 
requirement relative to enhancing force protection aboard U.S. forward 
operating bases is conducting a ``relief in place'' during unit 
turnovers. This task involves incoming/outgoing commanders reviewing 
all current security conditions and sharing relevant force protection 
information including standard operating procedures. This information 
sharing also includes reviewing the status of local Afghans or Afghan 
National Security Force personnel living and/or working aboard the 
base. [See page 21.]
                                 ______
                                 
             RESPONSE TO QUESTION SUBMITTED BY MR. JOHNSON
    General Townsend. Part of the standardization of APPF is 
implementation of a screening process similar to ANSF's eight-step 
process. The APPF vetting process includes the following:
    1) Valid Tazkera (Afghan identity card); 2) Two letters from elders 
and/or guarantors; 3) Personal information; 4) Criminal records check; 
5) Drug screening; 6) Medical screening; and 7) Biometric collection 
and enrollment in MoI's system for check against watch lists.
    The recruiting packet verification is the only step from ANSF's 
eight-step process not included in the APPF system. As we begin to 
transition to APPF in the next few months we will be able to assess the 
adequacy and effectiveness of this vetting process in relation to 
recruitment and employment of APPF. The vetting process has been 
effective and adequate to screen ANSF and we have already turned away 
several APPF recruits using the seven-step process. A most recent 
example occurred within an APPF training class where 21 recruits were 
screened out due to vetting issues and drug screening failures. [See 
page 24.]
                                 ______
                                 
              RESPONSE TO QUESTION SUBMITTED BY MR. SCOTT

    Mr. Sedney. We do not specifically track this information. 
Afghanistan is a country in which the majority of the population is 
illiterate. More than 80 percent of all Afghan National Security Forces 
(ANSF) recruits are illiterate when they enter the service. Less than 
30 percent of the ANSF are literate to the international literacy 
standard. We have seen high-profile events such as the attack at Kabul 
International Airport conducted by educated Afghan officers. However, 
we have not directly studied whether literacy and education are 
correlated to the likelihood of attack. [See page 25.]
?

      
=======================================================================


              QUESTIONS SUBMITTED BY MEMBERS POST HEARING

                            February 1, 2012

=======================================================================

      
                   QUESTIONS SUBMITTED BY MR. MCKEON

    Mr. McKeon. What department or agency was responsible for issuing 
the contract to Tundra and making sure it did what it promised to do in 
providing security for the base?
    Mr. Motsek. The Senior Contracting Official--Afghanistan (SCO-A) of 
the Joint Theater Support Contracting Command let the contract. The 
Defense Contract Management Agency--Afghanistan (DCMA-A) was 
responsible for the management of the contract (W91B4L-09-D-0024 and 
Task Order 00081C).
    Mr. McKeon. It looked like Tundra (a Canadian company) may have had 
an Afghan subsidiary involved in paying the Afghan personnel. If the 
local hires were not directly employed by the Canadian company (Tundra) 
that received the contract from the U.S. Government (and paid for by 
our tax dollars), is the private contractor still required to be 
responsible for control and compliance with our rules of the security 
personnel on the ground (including the Afghan employee of Tundra that 
attacked our son and his fellow soldiers)?
    Mr. Motsek. Contract W91B4L-09-D-0024 was awarded to Tundra 
Security Consultants Afghanistan (Tundra SCA), which is the Afghan-
owned subsidiary of Tundra Strategies of Canada. Although Afghan-owned 
and operating with a mostly Afghan staff, Tundra SCA operates with a 
Canadian management team. The contract was not awarded to Tundra 
Strategies of Canada, and Tundra SCA's personnel were not hired by that 
company. Under the terms of the contract, Tundra SCA was responsible 
for control of security personnel on the ground and compliance with our 
rules and regulations, pursuant to the terms of its contract.
    Mr. McKeon. Are these private security contractors like Tundra 
providing security at the base also allowed to participate in combat 
operations with our troops?
    Mr. Motsek. No. Private Security Company (PSC) contractors are 
restricted from performing combat functions per Department of Defense 
Instructions (DODI) 1100.22, 3020.50, and 3020.41, the Defense Federal 
Acquisition Regulations (DFARs), and the terms of their contracts. Use 
of force by PSC personnel is limited to self-defense, the defense of 
others, and the preservation of designated critical or inherently 
dangerous property against unlawful attack.
    Mr. McKeon. What actions were taken against the private security 
contractor for any failure to follow required procedures for vetting 
and supervision of their personnel?
    Mr. Motsek. Tundra SCA's official records did not indicate that the 
perpetrator of the Forward Operating Base (FOB) Frontenac attack was 
previously terminated because he posed a threat, as the allegation was 
investigated and determined to be unsubstantiated. He had been 
biometrically enrolled during his previous term of employment with 
Tundra SCA, but had not yet been re-enrolled at the time of the 
incident, although a request for re-enrollment had been submitted.
    Based on the results of the review, DCMA-A issued a Level III 
Corrective Action Request (CAR) to Tundra SCA dated May 7, 2011. Tundra 
SCA responded to the CAR with a Corrective Action Plan (CAP) on June 
15, 2011. After the review of all required documentation, DCMA-A fully 
accepted Tundra SCA's CAP and closed the CAR on July 6, 2011. However, 
the contract continues to be audited by DCMA-A through the support of 
the Contracting Officer Representatives and the DCMA-A Quality 
Assurance Representatives. Additionally, DCMA-A has documented Tundra 
SCA's unsatisfactory performance at FOB Frontenac in the Joint 
Contingency Contracting System for SCO-A's use in evaluating contractor 
performance.
    Mr. McKeon. What vetting was the private contractor (Tundra) 
required to perform before entrusting its guard with a weapon around 
our troops?
    Mr. Motsek. At the time of the FOB Frontenac incident, Tundra SCA 
was contracted to provide security at nine (9) installations in 
Afghanistan. Pursuant to the terms of its contract, Tundra SCA was 
required to submit a plan detailing its processes for hiring employees, 
performing background checks, and providing the results of the 
background check to the contracting officer for review and acceptance.
    The plan submitted by Tundra SCA required agency checks at both the 
local and national level. Local agency checks included identity 
verification via valid Tazkera (the Afghan identity card), verification 
of work history, address confirmation, fingerprinting, and a local 
police check to receive a clearance certificate for each employee. 
National agency checks required the contractors to submit a completed 
employee information package to the Afghanistan Ministry of Interior 
(MoI) and the Afghanistan National Directorate of Security (NDS), which 
investigates major crime and potential connections to terrorist 
organizations. Pending a successfully cleared background check, the 
Afghanistan Ministry of Foreign Affairs would then issue a certificate 
of successful vetting and acceptance.
    Additionally, Tundra SCA was required to support the Government of 
the Islamic Republic of Afghanistan (GIRoA) portion of the vetting 
process by submitting requests for biometric enrollment, ensuring the 
availability of language interpretation services during the screening 
and enrollment processes, and requesting Global Unique Identification 
numbers from GIRoA enrollers to verify each individual enrollment. The 
action with GIRoA was accomplished; the re-enrollment with the U.S. 
Government biometric database was pending. The individual was still in 
the U.S. database due to his previous employment.
    Prior to submission of an arming request, all local nationals and 
third-country nationals must submit to full biometric enrollment. 
Additional routine biometric screening then continues in accordance 
with local installation policies and procedures. Like all contractors, 
Tundra SCA is required to notify the contracting officer's 
representative, the local installation Force Protection agency, and the 
theater arming approval authority immediately if individuals are 
revealed as potential security risks during biometric processing.
    Tundra SCA was also required to develop a process by which employee 
termination would be communicated to the contracting officer and local 
installation Force Protection agencies. The aim is to prevent 
unauthorized access, and to communicate potential security risks 
concerning individuals terminated for cause to NDS for biometric watch 
list consideration. To prevent the rehiring of high-risk personnel, all 
contractors were additionally required to develop a plan of action to 
address the tracking and communication of employee dismissals to all 
sites managed by the contractor. Finally, according to the terms of its 
contract, Tundra SCA was required to maintain records on the screening 
status of its employees for six months following termination.

    Mr. McKeon. What can and needs to be done to insure that our troops 
are only guarded by fellow U.S. troops while on base in areas that we 
are conducting military actions such as Afghanistan?
    Mr. Sedney. The contractors' ability to provide specific security 
functions frees up U.S. Forces to conduct more combat-focused missions. 
Contractors perform their missions well and provide essential support 
for the conduct of operations in Afghanistan as they do worldwide. 
Without contractors (20,000 presently performing the function today), 
we would have to divert forces from essential combat tasks to perform 
these security functions. The use of civilians to guard U.S. bases in 
Afghanistan, based upon threat analysis, is consistent with our use of 
them elsewhere in the world and in previous conflicts.
                                 ______
                                 
                   QUESTIONS SUBMITTED BY MR. KISSELL

    Mr. Kissell. Are there any other related, recorded problems on this 
issue than those that led to a death?
    General Dahl. The investigation conducted by Regional Command-South 
identified a number of shortcomings in the policies governing the 
hiring and management of Afghan private security contractors and the 
execution of those policies. These problems are discussed in some 
detail in the investigation report, a copy of which was provided to the 
Committee before the hearing. Although the investigation found that 
those specific issues did not lead directly to the deaths of the 
Soldiers at FOB Frontenac, the command took immediate steps to correct 
the problems to provide an additional measure of security for our 
Soldiers.
    Mr. Kissell. Are there other companies with similar security 
responsibilities as Tundra Strategies, which are setting good examples, 
such that U.S. forces would want to see emulated? Furthermore, how 
closely are U.S. forces monitoring these companies to ensure that there 
aren't other up-and-coming potential assailants?
    General Dahl. I defer to the Joint Staff and OSD regarding current 
policies and the performance of private security contractors (PSCs) in 
theater. The policies in place at the time of the FOB Frontenac attack 
and the subsequent improvements implemented within Regional Command-
South applied to all private security contractors, to include to 
requirement to screen PSC employees and to mitigate the risks 
associated with insider threats.
    Mr. Kissell. Once Afghan nationals are hired to provide security to 
U.S. Forces, how much access are they allowed throughout the forward 
operating base or military facility? Similarly, why aren't there 10% 
random daily biometric checks for Afghan nationals accessing a U.S. 
facility with the purpose of providing security?
    General Dahl. I defer to the Joint Staff and OSD on current theater 
policies regarding access by private security contractors (PSCs). 
During the time I was deployed to Regional Command-South, access was 
based on contact performance requirements, with oversight provided by 
the local commander and contracting officer representative. Likewise, 
specific force protection measures were applied by local commanders 
consistent with theater policies and their own risk assessments. As 
noted in the materials provided to the Committee before the hearing, 
the Regional Command-South commander directed that all subordinate Task 
Forces conduct random, 50 percent monthly screening/verification of all 
PSC employees to ensure they were not on the Afghan Watch List.

    Mr. Kissell. Are there any other related, recorded problems on this 
issue than those that led to a death?
    General Townsend. Since May 2007, ISAF elements identified 42 ANSF 
and 3 PSC related insider incidents. The cause of each event varies. We 
utilize the lessons learned in each attack to identify potential 
counter-measures and reduce the primary causes of insider attacks.
    Mr. Kissell. Are there other companies with similar security 
responsibilities as Tundra Strategies, which are setting good examples, 
such that U.S. forces would want to see emulated? Furthermore, how 
closely are U.S. forces monitoring these companies to ensure that there 
aren't other up-and-coming potential assailants?
    General Townsend. USFOR-A FRAGO 11-128 sets specific standards for 
all of the private security companies supporting U.S. installations. As 
with all contracts, contractor's performance is monitored against 
stated contract requirements and standards. Terms and conditions of the 
contract provide a means to ensure that the contractor is effectively 
performing, e.g., penalties, show cause (notice of non-performance), 
and termination. The IJC Armed Contractor Oversight Directorate (ACOD) 
monitors all of the PSCs in order to enforce compliance with US 
requirements. Each unit and installation commander is also responsible 
for monitoring and ensuring compliance by all PSC personnel in order to 
reduce the future insider threat.
    Mr. Kissell. Once Afghan nationals are hired to provide security to 
U.S. Forces, how much access are they allowed throughout the forward 
operating base or military facility? Similarly, why aren't there 10% 
random daily biometric checks for Afghan nationals accessing a U.S. 
facility with the purpose of providing security?
    General Townsend. The level of access provided to U.S. Military 
facilities is based on the specific contract. USFOR-A FRAGOs 11-128 and 
11-086 set specific requirements for units using contract security 
personnel. Contractors are required to wear access badges issued via 
biometric registration in order to ensure that they operate in areas 
authorized by their contract.
    USFOR-A FRAGO 11-086 now directs commanders to conduct weekly 
biometric screening of local national contractors. Commanders may use 
their discretion in determining how to execute the required weekly 
screening. The use of a 10% random check would be up to the discretion 
of the requiring activity commander.

    Mr. Kissell. Are there any other related, recorded problems on this 
issue than those that led to a death?
    Mr. Motsek. Since May 2007, ISAF elements identified 42 ANSF and 3 
PSC related insider incidents. The cause of each event varies. We 
utilize the lessons learned in each attack to identify potential 
counter-measures and reduce the primary causes of insider attacks.
    Mr. Kissell. Are there other companies with similar security 
responsibilities as Tundra Strategies, which are setting good examples, 
such that U.S. forces would want to see emulated? Furthermore, how 
closely are U.S. forces monitoring these companies to ensure that there 
aren't other up-and-coming potential assailants?
    Mr. Motsek. USFOR-A FRAGO 11-128 sets specific standards for all of 
the private security companies supporting U.S. installations. As with 
all contracts, contractor's performance is monitored against stated 
contract requirements and standards. Terms and conditions of the 
contract provide a means to ensure that the contractor is effectively 
performing, e.g., penalties, show cause (notice of non-performance), 
and termination. The IJC Armed Contractor Oversight Directorate (ACOD) 
monitors all of the PSCs in order to enforce compliance with US 
requirements. Each unit and installation commander is also responsible 
for monitoring and ensuring compliance by all PSC personnel in order to 
reduce the future insider threat.
    Mr. Kissell. Once Afghan nationals are hired to provide security to 
U.S. Forces, how much access are they allowed throughout the forward 
operating base or military facility? Similarly, why aren't there 10% 
random daily biometric checks for Afghan nationals accessing a U.S. 
facility with the purpose of providing security?
    Mr. Motsek. The level of access provided to U.S. Military 
facilities is based on the specific contract. USFOR-A FRAGOs 11-128 and 
11-086 set specific requirements for units using contract security 
personnel. Contractors are required to wear access badges issued via 
biometric registration in order to ensure that they operate in areas 
authorized by their contract.
    USFOR-A FRAGO 11-086 now directs commanders to conduct weekly 
biometric screening of local national contractors. Commanders may use 
their discretion in determining how to execute the required weekly 
screening. The use of a 10 percent random check would be up to the 
discretion of the requiring activity commander.

    Mr. Kissell. Are there any other related, recorded problems on this 
issue than those that led to a death?
    Mr. Sedney. Since May 2007, International Security Assistance Force 
(ISAF) elements have identified 42 Afghan National Security Forces 
(ANSF) and 3 Private Security Contractor (PSC)-related insider 
incidents. The facts of each event are different. We utilize the 
lessons learned from such incidents to identify potential counter-
measures and reduce the primary causes of insider attacks.
    Mr. Kissell. Are there other companies with similar security 
responsibilities as Tundra Strategies, which are setting good examples, 
such that U.S. forces would want to see emulated? Furthermore, how 
closely are U.S. forces monitoring these companies to ensure that there 
aren't other up-and-coming potential assailants?
    Mr. Sedney. USFOR-A Fragmentary Order 11-128 sets specific 
standards for all of the private security contractor (PSCs) supporting 
U.S. installations. As with all DoD contracts, the contractor's 
performance is monitored against stated contract requirements and 
standards. The terms and conditions of the contract provide a means to 
ensure that the contractor is effectively performing, e.g., penalties, 
show cause (notice of non-performance), and termination. The U.S. 
Forces-Afghanistan Armed Contractor Oversight Directorate (ACOD) 
monitors all U.S. PSCs in order to enforce compliance with U.S. 
requirements. Each unit and installation commander is also responsible 
for monitoring and ensuring compliance by all PSC personnel in order to 
reduce the future insider threat.
    Mr. Kissell. Once Afghan nationals are hired to provide security to 
U.S. Forces, how much access are they allowed throughout the forward 
operating base or military facility? Similarly, why aren't there 10% 
random daily biometric checks for Afghan nationals accessing a U.S. 
facility with the purpose of providing security?
    Mr. Sedney. The level of access provided to U.S. military 
facilities is based on the specific contract. USFOR-A Fragmentary 
Orders (FRAGOs) 11-128 and 11-086 set specific requirements for units 
using contract security personnel. Contractors are required to wear 
access badges issued via biometric registration in order to ensure that 
they operate in areas authorized by their contract.
    USFOR-A FRAGO 11-086 now directs commanders to conduct weekly 
biometric screening of local national contractors. Commanders may use 
their discretion in determining how to conduct the required weekly 
screening. The use of a 10 percent random check would be up to the 
discretion of the requiring activity commander.
                                 ______
                                 
                QUESTIONS SUBMITTED BY MR. RUPPERSBERGER

    Mr. Ruppersberger. A background investigation for U.S. personnel 
can range from a simple criminal records check to a more thorough 
review, like what is done for many in the Intelligence Community. When 
hiring Afghan Nationals to protect the personal security of U.S. forces 
and/or assets, it makes sense that background investigations should be 
done for them as well. However, it does not seem possible to do the 
same level of background investigation in Afghanistan as those done in 
the United States. Are some types of background investigation applied 
to Afghan Nationals, and how do you plan on incorporating those results 
into your employment decision?
    General Townsend. Agency checks at both local and national level 
are required. Local agency checks include identity verification via 
valid Tazkera (the Afghan identity card), verification of work history, 
address confirmation, fingerprinting, and local police check to receive 
a clearance certificate for each employee. National agency checks 
require contractors to submit a completed employee information package 
to the Afghanistan Ministry of Interior (MoI) and the Afghanistan 
National Directorate of Security (NDS), which investigates major crime 
and potential connections to terrorist organizations. Pending a 
successfully cleared background check, the Afghanistan Ministry of 
Foreign Affairs would then issue a certificate of successful vetting 
and acceptance.
    Additionally, contractors are required to support the Afghan 
Government (GIRoA) portion of the vetting process by submitting 
requests for biometric enrollment, ensuring availability of language 
interpretation services during the screening and enrollment processes, 
and requesting Global Unique Identification number from GIRoA enrollers 
to verify each individual enrollment.
    Prior to submission of an arming request, all local nationals and 
third-country nationals must submit to full biometric enrollment. 
Additional routine biometric screening then continues in accordance 
with local installation policies and procedures. All contractors are 
required to immediately notify the contracting officer's 
representative, the local installation Force Protection agency, and the 
theater arming approval authority of individuals who are revealed as 
potential security risks during biometric processing.
    Contractors are also required to develop a process by which 
employee termination would be communicated to the contracting officer 
and local installation Force Protection agencies. While the aim is to 
prevent unauthorized access, the process also communicates potential 
security risks to NDS for biometric watch list consideration. To 
prevent the rehiring of high-risk personnel, all contractors are 
additionally required to develop a plan of action to address the 
tracking and communication of employee dismissals to all sites managed 
by the contractor. Finally, according to the terms of its contract, 
contractors are required to maintain records on the screening status of 
its employees for six months following termination.

    Mr. Ruppersberger. A background investigation for U.S. personnel 
can range from a simple criminal records check to a more thorough 
review, like what is done for many in the Intelligence Community. When 
hiring Afghan Nationals to protect the personal security of U.S. forces 
and/or assets, it makes sense that background investigations should be 
done for them as well. However, it does not seem possible to do the 
same level of background investigation in Afghanistan as those done in 
the United States. Are some types of background investigation applied 
to Afghan Nationals, and how do you plan on incorporating those results 
into your employment decision?
    Mr. Motsek. Agency checks at both local and national level are 
required. Local agency checks include identity verification via valid 
Tazkera (the Afghan identity card), verification of work history, 
address confirmation, fingerprinting, and local police check to receive 
a clearance certificate for each employee. National agency checks 
require contractors to submit a completed employee information package 
to the Afghanistan Ministry of Interior (MoI) and the Afghanistan 
National Directorate of Security (NDS), which investigates major crime 
and potential connections to terrorist organizations. Pending a 
successfully cleared background check, the Afghanistan Ministry of 
Foreign Affairs would then issue a certificate of successful vetting 
and acceptance.
    Additionally, contractors are required to support the Afghan 
Government (GIRoA) portion of the vetting process by submitting 
requests for biometric enrollment, ensuring availability of language 
interpretation services during the screening and enrollment processes, 
and requesting Global Unique Identification number from GIRoA enrollers 
to verify each individual enrollment.
    Prior to submission of an arming request, all local nationals and 
third-country nationals must submit to full biometric enrollment. 
Additional routine biometric screening then continues in accordance 
with local installation policies and procedures. All contractors are 
required to immediately notify the contracting officer's 
representative, the local installation Force Protection agency, and the 
theater arming approval authority of individuals who are revealed as 
potential security risks during biometric processing.
    Contractors are also required to develop a process by which 
employee termination would be communicated to the contracting officer 
and local installation Force Protection agencies. While the aim is to 
prevent unauthorized access, the process also communicates potential 
security risks to NDS for biometric watch list consideration. To 
prevent the rehiring of high-risk personnel, all contractors are 
additionally required to develop a plan of action to address the 
tracking and communication of employee dismissals to all sites managed 
by the contractor. Finally, according to the terms of its contract, 
contractors are required to maintain records on the screening status of 
its employees for six months following termination.

                                  



NEWSLETTER
Join the GlobalSecurity.org mailing list