Pentagon lays out detailed regulations for security contractors

The Defense Department released an interim final rule Friday laying out policy regarding the use of private security contractors in war zones.

The interim rule, which is effective immediately, modifies the Code of Federal Regulations to include policies and procedures for selecting, training, equipping and overseeing private security contractors.

The Office of the Undersecretary of Defense for Acquisition, Technology and Logistics, which filed the rule, wrote that it is "of critical importance" to address insufficient policy and guidance regulating the actions of security contractors working for Defense and other agencies in war zones.

"It will procedurally close existing gaps in the oversight of private security contractors, ensure compliance with laws and regulations pertaining to inherently governmental functions, and ensure proper performance by armed contractors," the rule stated.

The rule requires combatant commanders to develop detailed guidance for security contractors operating in their geographic area of responsibility. The guidance must address a range of specific issues, from ensuring private security contractors have the proper training and certification to carry weapons to coordinating communication between PSCs and military forces.

The rule, which is open for comment until Aug. 13, states that private security contractors must document and report incidents involving weapons discharges, attacks, deaths or injuries of PSCs or as a result of action by PSCs, or destruction of property. The contractors must also report any active, nonlethal countermeasures taken in response to a perceived threat if that incident "could significantly affect U.S. objectives with regard to the military mission or international relations."

In filing the rule, Defense officials said the timing was critical, as the increase of troops in Afghanistan will result in a corresponding rise in the number of private security contractors there.

Doug Brooks, president of the International Peace Operations Association, which represents private security firms, said the rule codifies practices Defense has been implementing for awhile. It makes sense to formalize lessons learned in Iraq so they can apply in Afghanistan, he said. Until now those lessons have been addressed piecemeal through amendments to contracts with security firms.

"A lot of the contractual issues have been largely sorted out in Iraq, but we're seeing them pop up again in Afghanistan," Brooks said. "They're going to have to be sorted out in Afghanistan, which can be a little bit of a painful process, so this is good."

Erik Quist, general counsel for EOD Technology Inc., a Tennessee-based firm providing security and ordnance disposal services, agreed that most of the rule's requirements mirror what Defense has been writing into security service contracts.

"It's not new, it's not burdensome and the fact that there is now, at this level of government, an official articulation and direction of the process, that's very important," Quist said. "If we know what the process should be we don't have to fret that if something's absent from our contract, we won't know what to do. Institutionalizing these requirements under the pending new rule is an important part of the overall effort to protect the taxpayer's best interests while at the same time establish a process to utilize the very valuable role private security companies can play in supporting the government."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

    Download
  • Cyber Risk Report: Cybercrime Trends from 2016

    In our first half 2016 cyber trends report, SurfWatch Labs threat intelligence analysts noted one key theme – the interconnected nature of cybercrime – and the second half of the year saw organizations continuing to struggle with that reality. The number of potential cyber threats, the pool of already compromised information, and the ease of finding increasingly sophisticated cybercriminal tools continued to snowball throughout the year.

    Download
  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • GBC Issue Brief: The Future of 9-1-1

    A Look Into the Next Generation of Emergency Services

    Download
  • GBC Survey Report: Securing the Perimeters

    A candid survey on cybersecurity in state and local governments

    Download
  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.

    Download
  • eBook: State & Local Cybersecurity

    CenturyLink is committed to helping state and local governments meet their cybersecurity challenges. Towards that end, CenturyLink commissioned a study from the Government Business Council that looked at the perceptions, attitudes and experiences of state and local leaders around the cybersecurity issue. The results were surprising in a number of ways. Learn more about their findings and the ways in which state and local governments can combat cybersecurity threats with this eBook.

    Download

When you download a report, your information may be shared with the underwriters of that document.