|By Marketwired .||
|April 1, 2014 05:07 AM EDT||
WASHINGTON, DC -- (Marketwired) -- 04/01/14 -- Judicial Watch announced today that on February 28, it obtained documents from the U.S. Department of State revealing that Blue Mountain Group (BMG), the security firm hired to protect the U.S. Consulate in Benghazi, had lost at least two previous private security contracts in Tripoli and was hired despite a warning from the Embassy Acting Regional Security Officer.
According to the documents, obtained in response to a February 25, 2013, Judicial Watch Freedom of Information Act (FOIA) lawsuit, on June 7, 2012, Tripoli Acting Security Regional Officer (ARSO) Jairo Saravia sent the following email to RSO David Oliveira (Temporary Duty Office to Benghazi at the time) and others:
"Just a quick note in regards to Blue Mountain. The company has lost several security contracts here in Tripoli, including the Corinthian Hotel and Palm City Complex. The latest information is Blue Mountain is not licensed by the GOL to provide security services in Libya. I would advise not to use their services to provide security for any of our annexes and/or offices due to the sensitivity this issue has with the current GOL ...."
A second email that same day, from RSO Greg Levin, apparently responding to the Saravia email, said that BMG did not have a licensing problem, but did not refute that it had lost several security contracts in Tripoli. In fact, additional emails between State Department personnel in Libya sent that day suggest that licensing for security firms had become an acknowledged problem, with one email stating, "We have got to get legal to change how licensing is done for contractors."
The documents also reveal that in Benghazi in April 2012, there was almost a physical altercation between a BMG supervisor and a member of the Libyan 17th of February Martyrs Brigade, a Libyan militia that was supposed to provide security at the Benghazi compound the day of the September 11, 2012, attacks. According to an April 18, 2012, email from ARSO Teresa Crowningshield to DS Program Manager Norm Floyd:
"At 1130 hours, a verbal altercation occurred between the Libyan February 17th Martyrs Brigade team member and Mr. [REDACTED]. The team member then notified the brigade team leader of the incident, who then went to the gate to speak with [REDACTED]. At that time, a second verbal altercation occurred between the three and [REDACTED] left the compound. The team leader then came to the RSO office and reported the incident.
"The team leader stated that [REDACTED] made an inappropriate comment with reference to Gaddafi. Then when the team leader came to speak with [REDACTED] he made derogatory comments regarding the team leader's mother. As the situation escalated to the point of a likely physical confrontation, [REDACTED] left the compound."
The role BMG played in protecting the security of the Benghazi Consulate first came to light shortly after the September 2012 terrorist attack when State Department spokesperson Victoria Nuland emphatically denied that State had hired any private firm to provide security at the American mission in Benghazi:
QUESTION: (Inaudible) the claim was made yesterday that a company that is a spinoff of Blackwater, in fact, proposed or contracted the United States Government for this particular kind of eventuality, and it was caught up in some sort of bureaucratic -
MS. NULAND: Completely untrue with regard to Libya. I checked that this morning. At no time did we plan to hire a private security company for Libya.
QUESTION: Toria, I just want to make sure I understood that, because I didn't understand your first question. You said -- your first answer. You said that at no time did you have contracts with private security companies in Libya?
MS. NULAND: Correct.
On December 19, 2012, Judicial Watch filed a FOIA request with the State Department seeking, "Any and all records regarding, concerning, or related to the $387,413.68 contract awarded by the Department of State to an unidentified foreign awardee for 'Security Guards and Patrol Services.'" When State refused to comply with the FOIA request, Judicial Watch filed its February 25, 2013, lawsuit, which resulted in the documents revealing the BMG had lost previous security contracts in Libya.
"The American people have not been told the full truth about the events surrounding the terrorist attack on the U.S. Consulate in Benghazi," said Judicial Watch President Tom Fitton. "And now, we find out that the security firm hired to protect our personnel, Blue Mountain, had a track record of failure and was openly fighting with the Libyan guards they were supposed to train and supervise. What a mess. And that we have to battle in court for this basic information shows the extent of the Obama administration's scandalous cover-up."
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Dec. 4, 2016 09:30 AM EST Reads: 588
Successful digital transformation requires new organizational competencies and capabilities. Research tells us that the biggest impediment to successful transformation is human; consequently, the biggest enabler is a properly skilled and empowered workforce. In the digital age, new individual and collective competencies are required. In his session at 19th Cloud Expo, Bob Newhouse, CEO and founder of Agilitiv, drew together recent research and lessons learned from emerging and established compa...
Dec. 4, 2016 09:30 AM EST Reads: 761
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Dec. 4, 2016 09:00 AM EST Reads: 550
"Venafi has a platform that allows you to manage, centralize and automate the complete life cycle of keys and certificates within the organization," explained Gina Osmond, Sr. Field Marketing Manager at Venafi, in this SYS-CON.tv interview at DevOps at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 4, 2016 08:45 AM EST Reads: 788
Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU's GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes. In...
Dec. 4, 2016 08:30 AM EST Reads: 975
"Coalfire is a cyber-risk, security and compliance assessment and advisory services firm. We do a lot of work with the cloud service provider community," explained Ryan McGowan, Vice President, Sales (West) at Coalfire Systems, Inc., in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 4, 2016 08:30 AM EST Reads: 764
Regulatory requirements exist to promote the controlled sharing of information, while protecting the privacy and/or security of the information. Regulations for each type of information have their own set of rules, policies, and guidelines. Cloud Service Providers (CSP) are faced with increasing demand for services at decreasing prices. Demonstrating and maintaining compliance with regulations is a nontrivial task and doing so against numerous sets of regulatory requirements can be daunting task...
Dec. 4, 2016 08:15 AM EST Reads: 751
CloudJumper, a Workspace as a Service (WaaS) platform innovator for agile business IT, has been recognized with the Customer Value Leadership Award for its nWorkSpace platform by Frost & Sullivan. The company was also featured in a new report(1) by the industry research firm titled, “Desktop-as-a-Service Buyer’s Guide, 2016,” which provides a comprehensive comparison of DaaS providers, including CloudJumper, Amazon, VMware, and Microsoft.
Dec. 4, 2016 08:15 AM EST Reads: 705
Fact: storage performance problems have only gotten more complicated, as applications not only have become largely virtualized, but also have moved to cloud-based infrastructures. Storage performance in virtualized environments isn’t just about IOPS anymore. Instead, you need to guarantee performance for individual VMs, helping applications maintain performance as the number of VMs continues to go up in real time. In his session at Cloud Expo, Dhiraj Sehgal, Product and Marketing at Tintri, sha...
Dec. 4, 2016 08:00 AM EST Reads: 804
Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, will discuss how AI can simplify cloud operations. He will cover the following topics: why clou...
Dec. 4, 2016 08:00 AM EST Reads: 689
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web ...
Dec. 4, 2016 06:45 AM EST Reads: 1,228
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Dec. 4, 2016 06:15 AM EST Reads: 6,971
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
Dec. 4, 2016 05:30 AM EST Reads: 1,753
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes how...
Dec. 4, 2016 04:45 AM EST Reads: 4,968
WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web communications world. The 6th WebRTC Summit continues our tradition of delivering the latest and greatest presentations within the world of WebRTC. Topics include voice calling, video chat, P2P file sharing, and use cases that have already leveraged the power and convenience of WebRTC.
Dec. 4, 2016 04:30 AM EST Reads: 1,555