Feeds

Iraq 'abuse' contractors go on the offensive

CACI and Titan respond

  • alert
  • submit to reddit

Intelligent flash storage arrays

Defense contractor CACI International went on the offensive on Wednesday as it sought to contain the fallout from the alleged involvement of some of its staff in the abuse of prisoners in Iraq. CACI and Titan, another contractor named in accusations, risk becoming an easy target for the US Government as it looks to find someone to blame.

CACI and Titan have both rushed to respond to the leaking of a US Army report, which reportedly alleged that staff from private contractors had been linked to "sadistic, blatant and wanton criminal abuses" occurring in Abu Ghraib prison in late 2003. A clear concern for CACI is the potential damage that being named in the Taguba report could do to its reputation and business. CACI provides a range of technology services and application development and implementation for the military. It also provides non-IT related services such as training, intelligence and national security services.

The open discussion CACI is having with the press and its customers about the allegations is clearly a charm offensive, which it hopes will maintain an image of openness and trust. However, what is inevitable is that the longer the debacle continues, the more damage it is going to cause CACI.

Titan is currently undergoing an SEC investigation into alleged corruption. The company, which is currently being acquired by Lockheed Martin, came under a criminal investigation by the US Justice Department in early March for allegedly making illegal payments to certain international officials.

This scandal already put the proposed $2.4bn merger with Lockheed in doubt. Should Titan end up being implicated in the Iraq abuse case, this could become another stumbling block to the merger.

Yet perhaps the biggest threat to the long-term future of both CACI and Titan could be from the US Government itself. Keen to find some resolution to this political issue, it could end up pursuing a witch-hunt against any of the private contractors that have been involved in the alleged abuses.

This does not bode well for either CACI or Titan, which to date say they have not received any accusation, indictment, or even a phone call from the US Government questioning their propriety.

Source: ComputerWire/Datamonitor

Related stories

CACI: defence contractor gets defensive
New allegations in Iraq mobile network saga
Former security czar morphs into Rasputin

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
EU to accuse Ireland of giving Apple an overly peachy tax deal – report
Probe expected to say single-digit rate was unlawful
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.