 
 
Currently released so far... 251287 / 251,287
Articles
Brazil
Sri Lanka
United Kingdom
Sweden
 Global
United States
Latin America
Egypt
Jordan
Yemen
Thailand
Browse latest releases
Browse by creation date
Browse by origin
Embassy Athens
Embassy Asuncion
Embassy Astana
Embassy Asmara
Embassy Ashgabat
Embassy Apia
Embassy Antananarivo
Embassy Ankara
Embassy Amman
Embassy Algiers
Embassy Addis Ababa
Embassy Accra
Embassy Abuja
Embassy Abu Dhabi
Embassy Abidjan
Consulate Auckland
Consulate Amsterdam
Consulate Alexandria
Consulate Adana
American Institute Taiwan, Taipei
Embasy Bonn
Embassy Bujumbura
Embassy Buenos Aires
Embassy Budapest
Embassy Bucharest
Embassy Brussels
Embassy Bridgetown
Embassy Brazzaville
Embassy Bratislava
Embassy Brasilia
Embassy Bogota
Embassy Bishkek
Embassy Bern
Embassy Berlin
Embassy Belmopan
Embassy Belgrade
Embassy Beirut
Embassy Beijing
Embassy Banjul
Embassy Bangui
Embassy Bangkok
Embassy Bandar Seri Begawan
Embassy Bamako
Embassy Baku
Embassy Baghdad
Consulate Belfast
Consulate Barcelona
Embassy Cotonou
Embassy Copenhagen
Embassy Conakry
Embassy Colombo
Embassy Chisinau
Embassy Caracas
Embassy Canberra
Embassy Cairo
Consulate Curacao
Consulate Ciudad Juarez
Consulate Chiang Mai
Consulate Chennai
Consulate Chengdu
Consulate Casablanca
Consulate Cape Town
Consulate Calgary
Embassy Dushanbe
Embassy Dublin
Embassy Doha
Embassy Djibouti
Embassy Dili
Embassy Dhaka
Embassy Dar Es Salaam
Embassy Damascus
Embassy Dakar
Department of State
DIR FSINFATC
Consulate Dusseldorf
Consulate Durban
Consulate Dubai
Consulate Dhahran
Embassy Guatemala
Embassy Grenada
Embassy Georgetown
Embassy Gaborone
Consulate Guayaquil
Consulate Guangzhou
Consulate Guadalajara
Embassy Helsinki
Embassy Harare
Embassy Hanoi
Consulate Hong Kong
Consulate Ho Chi Minh City
Consulate Hermosillo
Consulate Hamilton
Consulate Hamburg
Consulate Halifax
American Consulate Hyderabad
Embassy Kyiv
Embassy Kuwait
Embassy Kuala Lumpur
Embassy Koror
Embassy Kolonia
Embassy Kinshasa
Embassy Kingston
Embassy Kigali
Embassy Khartoum
Embassy Kathmandu
Embassy Kampala
Embassy Kabul
Consulate Krakow
Consulate Kolkata
Consulate Karachi
Consulate Kaduna
Embassy Luxembourg
Embassy Lusaka
Embassy Luanda
Embassy London
Embassy Lome
Embassy Ljubljana
Embassy Lisbon
Embassy Lima
Embassy Lilongwe
Embassy Libreville
Embassy La Paz
Consulate Leipzig
Consulate Lahore
Consulate Lagos
Mission USOSCE
Mission USNATO
Mission UNESCO
Mission Geneva
Embassy Muscat
Embassy Moscow
Embassy Montevideo
Embassy Monrovia
Embassy Mogadishu
Embassy Minsk
Embassy Mexico
Embassy Mbabane
Embassy Maseru
Embassy Maputo
Embassy Manila
Embassy Manama
Embassy Managua
Embassy Malabo
Embassy Majuro
Embassy Madrid
Consulate Munich
Consulate Mumbai
Consulate Montreal
Consulate Monterrey
Consulate Milan
Consulate Merida
Consulate Melbourne
Consulate Matamoros
Consulate Marseille
Embassy Nouakchott
Embassy Nicosia
Embassy Niamey
Embassy New Delhi
Embassy Ndjamena
Embassy Nassau
Embassy Nairobi
Consulate Nuevo Laredo
Consulate Nogales
Consulate Naples
Consulate Naha
Consulate Nagoya
Embassy Pristina
Embassy Pretoria
Embassy Praia
Embassy Prague
Embassy Port Of Spain
Embassy Port Moresby
Embassy Port Louis
Embassy Port Au Prince
Embassy Podgorica
Embassy Phnom Penh
Embassy Paris
Embassy Paramaribo
Embassy Panama
Consulate Ponta Delgada
Consulate Peshawar
Consulate Perth
REO Mosul
REO Kirkuk
REO Hillah
REO Basrah
Embassy Rome
Embassy Riyadh
Embassy Riga
Embassy Reykjavik
Embassy Rangoon
Embassy Rabat
Consulate Rio De Janeiro
Consulate Recife
Secretary of State
Embassy Suva
Embassy Stockholm
Embassy Sofia
Embassy Skopje
Embassy Singapore
Embassy Seoul
Embassy Sarajevo
Embassy Santo Domingo
Embassy Santiago
Embassy Sanaa
Embassy San Salvador
Embassy San Jose
Consulate Sydney
Consulate Surabaya
Consulate Strasbourg
Consulate St Petersburg
Consulate Shenyang
Consulate Shanghai
Consulate Sapporo
Consulate Sao Paulo
Embassy Tunis
Embassy Tripoli
Embassy Tokyo
Embassy Tirana
Embassy The Hague
Embassy Tel Aviv
Embassy Tehran
Embassy Tegucigalpa
Embassy Tbilisi
Embassy Tashkent
Embassy Tallinn
Consulate Toronto
Consulate Tijuana
Consulate Thessaloniki
USUN New York
USMISSION USTR GENEVA
USEU Brussels
US Office Almaty
US OFFICE FSC CHARLESTON
US Mission Geneva
US Mission CD Geneva
US Interests Section Havana
US Delegation, Secretary
US Delegation FEST TWO
UNVIE
UN Rome
Embassy Ulaanbaatar
Embassy Vilnius
Embassy Vientiane
Embassy Vienna
Embassy Vatican
Embassy Valletta
Consulate Vladivostok
Consulate Vancouver
Browse by tag
AEMR
ASEC
AMGT
AE
AS
AMED
AVIAN
AU
AF
AORC
AGENDA
AO
AR
AM
APER
AFIN
ATRN
AJ
ABUD
ARABL
AL
AG
AODE
ALOW
ADANA
AADP
AND
APECO
ACABQ
ASEAN
AA
AFFAIRS
AID
AGR
AY
AGS
AFSI
AGOA
AMB
ARF
ANET
ASCH
ACOA
AFLU
AFSN
AMEX
AFDB
ABLD
AESC
AFGHANISTAN
AINF
AVIATION
ARR
ARSO
ANDREW
ASSEMBLY
AIDS
APRC
ASSK
ADCO
ASIG
AC
AZ
APEC
AFINM
ADB
AP
ACOTA
ASEX
ACKM
ASUP
ANTITERRORISM
ADPM
AINR
ARABLEAGUE
AGAO
AORG
AMTC
AIN
ACCOUNT
ASECAFINGMGRIZOREPTU
AIDAC
AINT
ARCH
AMGTKSUP
ALAMI
AMCHAMS
ALJAZEERA
AVIANFLU
AORD
AOREC
ALIREZA
AOMS
AMGMT
ABDALLAH
AORCAE
AHMED
ACCELERATED
AUC
ALZUGUREN
ANGEL
AORL
ASECIR
AMG
AMBASSADOR
AEMRASECCASCKFLOMARRPRELPINRAMGTJMXL
ADM
ASES
ABMC
AER
AMER
ASE
AMGTHA
ARNOLDFREDERICK
AOPC
ACS
AFL
AEGR
ASED
AFPREL
AGRI
AMCHAM
ARNOLD
AN
ANATO
AME
APERTH
ASECSI
AT
ACDA
ASEDC
AIT
AMERICA
AMLB
AMGE
ACTION
AGMT
AFINIZ
ASECVE
ADRC
ABER
AGIT
APCS
AEMED
ARABBL
ARC
ASO
AIAG
ACEC
ASR
ASECM
ARG
AEC
ABT
ADIP
ADCP
ANARCHISTS
AORCUN
AOWC
ASJA
AALC
AX
AROC
ARM
AGENCIES
ALBE
AK
AZE
AOPR
AREP
AMIA
ASCE
ALANAZI
ABDULRAHMEN
ABDULHADI
AINFCY
ARMS
ASECEFINKCRMKPAOPTERKHLSAEMRNS
AGRICULTURE
AFPK
AOCR
ALEXANDER
ATRD
ATFN
ABLG
AORCD
AFGHAN
ARAS
AORCYM
AVERY
ALVAREZ
ACBAQ
ALOWAR
ANTOINE
ABLDG
ALAB
AMERICAS
AFAF
ASECAFIN
ASEK
ASCC
AMCT
AMGTATK
AMT
APDC
AEMRS
ASECE
AFSA
ATRA
ARTICLE
ARENA
AISG
AEMRBC
AFR
AEIR
ASECAF
AFARI
AMPR
ASPA
ASOC
ANTONIO
AORCL
ASECARP
APRM
AUSTRALIAGROUP
ASEG
AFOR
AEAID
AMEDI
ASECTH
ASIC
AFDIN
AGUIRRE
AUNR
ASFC
AOIC
ANTXON
ASA
ASECCASC
ALI
AORCEUNPREFPRELSMIGBN
ASECKHLS
ASSSEMBLY
ASECVZ
AI
ASECPGOV
ASIR
ASCEC
ASAC
ARAB
AIEA
ADMIRAL
AUSGR
AQ
AMTG
ARRMZY
ANC
APR
AMAT
AIHRC
AFU
ADEL
AECL
ACAO
AMEMR
ADEP
AV
AW
AOR
ALL
ALOUNI
AORCUNGA
ALNEA
ASC
AORCO
ARMITAGE
AGENGA
AGRIC
AEM
ACOAAMGT
AGUILAR
AFPHUM
AMEDCASCKFLO
AFZAL
AAA
ATPDEA
ASECPHUM
ASECKFRDCVISKIRFPHUMSMIGEG
BEXP
BE
BG
BN
BU
BMGT
BR
BH
BM
BA
BO
BRUSSELS
BK
BTIO
BT
BL
BF
BBSR
BB
BILAT
BX
BWC
BY
BGD
BURMA
BP
BTA
BC
BLUE
BURNS
BD
BBG
BESP
BIT
BUD
BECON
BUSH
BAGHDAD
BARACK
BOUCHAIB
BTC
BELLVIEW
BIC
BEXB
BFIF
BZ
BIOTECH
BIDEN
BTIOEAID
BGMT
BUY
BORDER
BRIAN
BNUC
BEN
BMENA
BI
BIO
BFIO
BIOTECHNOLOGY
BHUM
BGOV
BOL
BAPOL
BMEAID
BEPX
BUT
BATA
BEXPC
BTRA
BLUNT
BS
BXEP
BAIO
BPTS
BEMBA
BITO
BRITNY
BEXT
BEAN
BV
BALKANS
BRITNEY
BIOS
BFIN
BASHAR
BMOT
BEXPASECBMGTOTRASFIZKU
BRPA
BEXD
BTIU
BIDOON
BIMSTEC
BOU
BKPREL
BOIKO
BSSR
BUEINV
BNATO
BULGARIA
BIH
BOSNIA
BAKOYANNIS
BPIS
BCXP
BOND
BLR
BOQ
BEXPECONEINVETRDBTIO
BERARDUCCI
BOEHNER
BINR
BEXPPLM
BAYS
BW
BOUTERSE
BBB
BCW
BAECTRD
BGPGOV
BTT
CASC
CJAN
CPAS
CFED
CA
CG
CO
CWC
CY
CH
CU
CVIS
CI
CE
CD
CS
CT
CB
COUNTER
CMGT
COM
CBW
CF
CNARC
CHR
CN
CENTCOM
COUNTRY
CLEARANCE
CM
CIVS
CITES
CONDOLEEZZA
COE
CLOK
CDC
CVR
CTERR
CDG
CHIEF
CTM
CTR
CIS
CLINTON
CRIMES
CHPREL
CONS
COMMERCE
CDB
CROATIA
CSW
CARICOM
CW
CV
CDI
CIDA
CRIME
CKGR
CIA
CCSR
CR
CAFTA
CARC
COUNTERTERRORISM
CONTROLS
CTRYCLR
CJ
CBD
CACS
CYP
CVPR
CODEL
CHALLENGE
COUNTRYCLEARANCE
CPUOS
CITEL
CHILDREN
CNAR
CUSTODIO
CAPC
CIP
CZ
CWG
CBM
CONDITIONS
CP
CBIS
CHRISTOF
CMP
CTER
CASCC
CIO
CHERTOFF
CASA
CBC
CAN
CASCKFLOMARRPRELPINRAMGTMXJM
CFG
COLIN
CROS
COL
CHRISTIAN
CENSUS
CMT
CACM
CND
CBTH
CASCR
CMFT
CJUS
CWCM
COPUOS
CHAVEZ
CFIS
CYPGOVPRELPHUM
CONEAZ
CEDAW
CENTRIC
CAS
CEPTER
CLMT
COLOMBO
CAMBODIA
CGEN
CON
CARIB
CDCC
CONTROL
CIAT
CHELIDZE
COSI
CVISPRELPGOV
CSCE
CPC
CTBT
CPPT
CFE
CX
CONGRINT
COMESA
CPA
CARE
CPCTC
CVIA
CVISCMGTCASCKOCIASECPHUMSMIGKIRF
CUETRD
CONSULAR
CEN
CBSA
CHG
CORRUPTION
CL
CAMERON
CRIM
COETRD
CKOR
CARSON
CITIBANK
CSEP
CYPRUS
CHAD
CIC
CUL
COMMAND
CENTER
CRISTINA
CEA
CDCE
CHENEY
CAIO
CHINA
CBE
CGOPRC
CMGMT
CICTE
CONGO
CCY
CAVO
CHAO
CBG
CVIC
CLO
CVISU
CRUZ
CNC
CMAE
CONG
CIJ
CONAWAY
CHN
CASCSY
CUBA
COLLECTIVE
CSIS
CNO
CRM
CASCSU
CYPRUSARMS
CUCO
CUIS
CASE
CHRISTOPHER
CAC
CFSP
CRS
CIVAIR
CK
CANAHUATI
CEUDA
CYNTHIA
CITT
CASTILLO
CPU
CCC
CASCCH
CQ
CEC
CAJC
CHAMAN
DR
DA
DJ
DEMARCHE
DEA
DPOL
DTRA
DEPT
DISENGAGEMENT
DTRO
DPRK
DEAX
DOMESTIC
DB
DEMOCRATIC
DO
DEMARCHES
DRL
DEFENSE
DHSX
DPKO
DK
DARFUR
DAVID
DEPORTATION
DOMESTICPOLITICS
DCG
DY
DHS
DMIN
DHA
DEMETRIOS
DCRM
DHRF
DPAO
DRC
DANIEL
DS
DSS
DOMC
DOE
DCM
DIPLOMACY
DEOC
DOD
DOC
DAFR
DCHA
DONALD
DEM
DE
DCDG
DAO
DARFR
DUNCAN
DOJ
DC
DHLAKAMA
DPM
DOT
DMINE
DCOM
DVC
DELTAVIOLENCE
DIEZ
DEFENSEREFORM
DKEM
DEFIN
DU
DRIP
DKDEM
DSR
DAN
DTFN
DCI
DHLS
DENNIS
DANFUNG
DAC
DESI
DDD
ETRD
ETTC
EU
ECON
EFIN
EAGR
EAID
ELAB
EINV
ENIV
ENRG
EPET
EZ
ELTN
ELECTIONS
ECPS
ET
ER
EG
EUN
EIND
ECONOMICS
EMIN
ECIN
EINT
EWWT
EAIR
EN
ENGR
ES
EI
ETMIN
EL
EPA
EARG
EFIS
ECONOMY
EC
EK
ELAM
ECONOMIC
EAR
ESDP
ECCP
ELN
EUM
EUMEM
ECA
EAP
ELEC
ECOWAS
EFTA
EXIM
ETTD
EDRC
ECOSOC
ECPSN
ENVIRONMENT
ECO
EMAIL
ECTRD
EREL
EDU
ENERG
ENERGY
ENVR
ETRAD
EAC
EXTERNAL
EFIC
ECIP
ERTD
EUC
ENRGMO
EINZ
ESTH
ECCT
EAGER
ECPN
ELNT
ERD
EGEN
ETRN
EIVN
ETDR
EXEC
EIAD
EIAR
EVN
EPRT
ETTF
ENGY
EAIDCIN
EXPORT
ETRC
ESA
EIB
EAPC
EPIT
ESOCI
ETRB
EINDQTRD
ENRC
EGOV
ECLAC
EUR
ELF
ETEL
ENRGUA
EVIN
EARI
ESCAP
EID
ERIN
ELAN
ENVT
EDEV
EWWY
EXBS
ECOM
EV
ELNTECON
ECE
ETRDGK
EPETEIND
ESCI
ETRDAORC
EAIDETRD
ETTR
EMS
EAGRECONEINVPGOVBN
EBRD
EUREM
ERGR
EAGRBN
EAUD
EFI
ETRDEINVECINPGOVCS
EPEC
ETRO
ENRGY
EGAR
ESSO
EGAD
ENV
ENER
EAIDXMXAXBXFFR
ELA
EET
EINVETRD
EETC
EIDN
ERGY
ETRDPGOV
EING
EMINCG
EINVECON
EURM
EEC
EICN
EINO
EPSC
ELAP
ELABPGOVBN
EE
ESPS
ETRA
ECONETRDBESPAR
ERICKSON
EEOC
EVENTS
EPIN
EB
ECUN
EPWR
ENG
EX
EH
EAIDAR
EAIS
ELBA
EPETUN
ETRDEIQ
EENV
ECPC
ETRP
ECONENRG
EUEAID
EWT
EEB
EAIDNI
ESENV
EADM
ECN
ENRGKNNP
ETAD
ETR
ECONETRDEAGRJA
ETRG
ETER
EDUC
EITC
EBUD
EAIF
EBEXP
EAIDS
EITI
EGOVSY
EFQ
ECOQKPKO
ETRGY
ESF
EUE
EAIC
EPGOV
ENFR
EAGRE
ENRD
EINTECPS
EAVI
ETC
ETCC
EIAID
EAIDAF
EAGREAIDPGOVPRELBN
EAOD
ETRDA
EURN
EASS
EINVA
EAIDRW
EON
ECOR
EPREL
EGPHUM
ELTM
ECOS
EINN
ENNP
EUPGOV
EAGRTR
ECONCS
ETIO
ETRDGR
EAIDB
EISNAR
EIFN
ESPINOSA
EAIDASEC
ELIN
EWTR
EMED
ETFN
ETT
EADI
EPTER
ELDIN
EINVEFIN
ESS
ENRGIZ
EQRD
ESOC
ETRDECD
ECINECONCS
EAIT
ECONEAIR
ECONEFIN
EUNJ
ENRGKNNPMNUCPARMPRELNPTIAEAJMXL
ELAD
EFIM
ETIC
EFND
EFN
ETLN
ENGRD
EWRG
ETA
EIN
EAIRECONRP
EXIMOPIC
ERA
ENRGJM
ECONEGE
ENVI
ECHEVARRIA
EMINETRD
EAD
ECONIZ
EENG
ELBR
EWWC
ELTD
EAIDMG
ETRK
EIPR
EISNLN
ETEX
EPTED
EFINECONCS
EPCS
EAG
ETRDKIPR
ED
EAIO
ETRDEC
ENRGPARMOTRASENVKGHGPGOVECONTSPLEAID
ECONEINVEFINPGOVIZ
ERNG
EFINU
EURFOR
EWWI
ELTNSNAR
ETD
EAIRASECCASCID
EOXC
ESTN
EAIDAORC
EAGRRP
ETRDEMIN
ELABPHUMSMIGKCRMBN
ETRDEINVTINTCS
EGHG
EAIDPHUMPRELUG
EAGRBTIOBEXPETRDBN
EDA
EPETPGOV
ELAINE
EUCOM
EMW
EFINECONEAIDUNGAGM
ELB
EINDETRD
EMI
ETRDECONWTOCS
EINR
ESTRADA
EHUM
EFNI
ELABV
ENR
EMN
EXO
EWWTPRELPGOVMASSMARRBN
EATO
END
EP
EINVETC
ECONEFINETRDPGOVEAGRPTERKTFNKCRMEAID
ELTRN
EIQ
ETTW
EAI
ENGRG
ETRED
ENDURING
ETTRD
EAIDEGZ
EOCN
EINF
EUPREL
ENRL
ECPO
ENLT
EEFIN
EPPD
ECOIN
EUEAGR
EISL
EIDE
ENRGSD
EINVECONSENVCSJA
EAIG
ENTG
EEPET
EUNCH
EPECO
ETZ
EPAT
EPTE
EAIRGM
ETRDPREL
EUNGRSISAFPKSYLESO
ETTN
EINVKSCA
ESLCO
EBMGT
ENRGTRGYETRDBEXPBTIOSZ
EFLU
ELND
EFINOECD
EAIDHO
EDUARDO
ENEG
ECONEINVETRDEFINELABETRDKTDBPGOVOPIC
EFINTS
ECONQH
ENRGPREL
EUNPHUM
EINDIR
EPE
EMINECINECONSENVTBIONS
EFINM
ECRM
EQ
EWWTSP
ECONPGOVBN
FLU
FJ
FREEDOM
FR
FI
FAO
FARM
FINANCE
FINREF
FAS
FOR
FERNANDO
FM
FIN
FOREIGN
FAC
FBI
FAA
FAOAORC
FARC
FTA
FORCE
FRB
FCSC
FRELIMO
FETHI
FRANCIS
FDA
FA
FP
FORCES
FSC
FTAA
FREDERICK
FWS
FRA
FSI
FRPREL
FIXED
FREDOM
FGM
FEFIN
FOI
FINV
FT
FK
FEDULOV
FMS
FINR
FRAZER
FCS
FDIC
FINE
FRANCISCO
FO
FNRG
FORWHA
FEMA
FCC
FAGR
FIR
FMGT
FCSCEG
FKLU
FPC
FMC
FKFLO
FOOKS
FATAH
FRU
FRIED
FMLN
FISO
FCUL
FELIPE
FAOEFIS
FIGUEROA
FRN
GTIP
GM
GT
GON
GB
GR
GG
GA
GJ
GY
GV
GH
GZ
GAERC
GUTIERREZ
GAZA
GATES
GOI
GCC
GE
GF
GEORGE
GPGOV
GOV
GLOBAL
GUAM
GBSLE
GL
GAO
GPOI
GU
GC
GAZPROM
GESKE
GERARD
GOG
GANGS
GAMES
GEF
GZIS
GUIDANCE
GIWI
GREGG
GKGIC
GTMO
GTREFTEL
GHONDA
GRQ
GI
GN
GUILLERMO
GASPAR
GPI
GS
GIPNC
GATT
GABY
GONZALEZ
GUEVARA
GOMEZ
GOVPOI
GARCIA
GJBB
GPOV
GO
GCCC
GUANTANAMO
GMUS
GGGGG
GGFR
GWI
HA
HO
HK
HR
HUMANR
HUMAN
HUM
HSTC
HU
HL
HURI
HILLARY
HUMANRIGHTS
HUMANITARIAN
HIV
HHS
HRPGOV
HDP
HUMRIT
HLSX
HURRICANE
HOSTAGES
HYDE
HT
HRPREL
HAWZ
HN
HIPC
HRECON
HKSX
HCOPIL
HI
HILLEN
HUNRC
HADLEY
HUD
HEAVEN
HRPARM
HRICTY
HRCS
HIGHLIGHTS
HOURANI
HTSC
HESHAM
HRC
HTCG
HRIGHTS
HIJAZI
HRKAWC
HRKSTC
HECTOR
HARRIET
HRETRD
HUMOR
HOWES
HSWG
HG
HARRY
HIZ
HYLAND
HELGERSON
HRPHUM
HILARY
HRPREF
HERCEGOVINA
HRMARR
HEBRON
HAMID
HE
HRKPAO
HOA
HPKO
HORTA
HSI
HZ
HYMPSK
HNCHR
IS
ILAB
IN
IZ
IR
IT
IMF
IBRD
ID
IAEA
IC
ISLAMISTS
ICTY
IRAQ
ILO
IV
ITRA
IO
IRAN
IMO
IGAD
IPR
ICAO
ICJ
ICRC
INMARSAT
ITALY
IRAQI
ISSUES
ISRAELI
IFAD
IICA
INF
IIP
IQ
ITU
INRD
IWC
ITECON
ISRAEL
ITMOPS
IFRC
INDO
IDB
ITECIP
IRNB
INTERNAL
ISLE
IPROP
ICTR
ILC
ISAF
IOM
ITPREL
INCB
ITALIAN
ISO
IRM
IEA
INRB
IRS
IACO
IZPREL
IAHRC
IAEAK
ITKICC
ISA
INL
INFLUENZA
IASA
IMET
IRL
IVIANNA
INTERPOL
ICCAT
IRC
ICC
IMMIGRATION
INR
INTELSAT
IADB
ICCROM
ITTSPL
ITIA
IL
INTELLECTUAL
IMTS
ITEFIS
IA
IRMO
IEFIN
IDA
ITEUN
ITEAGR
INAUGURATION
ITRD
IE
ISPA
IBPCA
IRPREL
IFO
INSC
ISPL
IHO
IZMARR
ISCON
IRAS
INRPAZ
ITEIND
IRE
ICAC
IDLI
INRA
ISCA
IP
ITA
INV
ITKIPR
ISN
IDLO
ITPHUM
IRDB
ITPREF
IPET
IAES
INT
ICSCA
ITKTIA
ICRS
ITPGOV
IRGG
IZECON
IRPE
IBRB
IZPHUM
IFR
ITKCIP
ITEFIN
ICES
IFC
ICG
IBD
ITMARR
IRCE
IEF
IPGRI
ITTPHY
ITER
IG
IND
IDR
ITNATO
IZAORC
ISAAC
IEINV
IX
ITETTC
IACI
ITELAB
ISTC
IZMOPS
IGF
ITTSPA
IATTC
IK
ITETRD
IZEAID
IAZ
INTEL
IOC
IDP
ITECPS
IACHR
ITAORC
ILEA
ISAJ
IFIN
ISNV
INPFC
ITELTN
IF
IFM
ISKPAL
ITPARM
ISPHUM
ITUNGA
IPK
IRQEGION
IRLE
IEAB
IPINS
IPPC
IACW
IUCN
IWI
INRO
ITF
ITEAIR
IZPGOV
IINS
IAIE
IRA
INVI
IMC
INS
IAII
IBET
IMSO
INNP
IQNV
IBB
IRAJ
JO
JA
JM
JP
JCIC
JOHN
JOSEPH
JE
JI
JUS
JIMENEZ
JN
JABER
JOSE
JAT
JEFFERY
JULIAN
JAMES
JY
JHR
JAPAN
JSRP
JEFFREY
JML
JEAN
JKJUS
JKUS
JENDAYI
JOHNNIE
JAWAD
JK
JS
JUAN
JOHANNS
JAM
JUSLBA
JONATHAN
KFLO
KPKO
KDEM
KFLU
KTEX
KMDR
KPAO
KCRM
KIDE
KN
KNNP
KG
KMCA
KZ
KJUS
KWBG
KU
KDMR
KAWC
KCOR
KPAL
KOMC
KTDB
KTIA
KISL
KHIV
KHUM
KTER
KCFE
KTFN
KS
KIRF
KTIP
KIRC
KSCA
KICA
KIPR
KPWR
KWMN
KE
KGIC
KGIT
KSTC
KACT
KSEP
KFRD
KUNR
KHLS
KCRS
KRVC
KUWAIT
KVPR
KSRE
KMPI
KMRS
KNRV
KNEI
KCIP
KSEO
KITA
KDRG
KV
KSUM
KCUL
KPET
KBCT
KO
KSEC
KOLY
KNAR
KGHG
KSAF
KWNM
KNUC
KMNP
KVIR
KPOL
KOCI
KPIR
KLIG
KSAC
KSTH
KNPT
KINL
KPRP
KRIM
KICC
KIFR
KPRV
KAWK
KFIN
KT
KVRC
KR
KHDP
KGOV
KPOW
KTBT
KPMI
KPOA
KRIF
KEDEM
KFSC
KY
KGCC
KATRINA
KWAC
KSPR
KTBD
KBIO
KSCI
KRCM
KNNB
KBNC
KIMT
KCSY
KINR
KRAD
KMFO
KCORR
KW
KDEMSOCI
KNEP
KFPC
KEMPI
KBTR
KFRDCVISCMGTCASCKOCIASECPHUMSMIGEG
KNPP
KTTB
KTFIN
KBTS
KCOM
KFTN
KMOC
KOR
KDP
KPOP
KGHA
KSLG
KMCR
KJUST
KUM
KMSG
KHPD
KREC
KIPRTRD
KPREL
KEN
KCSA
KCRIM
KGLB
KAKA
KWWT
KUNP
KCRN
KISLPINR
KLFU
KUNC
KEDU
KCMA
KREF
KPAS
KRKO
KNNC
KLHS
KWAK
KOC
KAPO
KTDD
KOGL
KLAP
KECF
KCRCM
KNDP
KSEAO
KCIS
KISM
KREL
KISR
KISC
KKPO
KWCR
KPFO
KUS
KX
KWCI
KRFD
KWPG
KTRD
KH
KLSO
KEVIN
KEANE
KACW
KWRF
KNAO
KETTC
KTAO
KWIR
KVCORR
KDEMGT
KPLS
KICT
KWGB
KIDS
KSCS
KIRP
KSTCPL
KDEN
KLAB
KFLOA
KIND
KMIG
KPPAO
KPRO
KLEG
KGKG
KCUM
KTTP
KWPA
KIIP
KPEO
KICR
KNNA
KMGT
KCROM
KMCC
KLPM
KNNPGM
KSIA
KSI
KWWW
KOMS
KESS
KMCAJO
KWN
KTDM
KDCM
KCM
KVPRKHLS
KENV
KCCP
KGCN
KCEM
KEMR
KWMNKDEM
KNNPPARM
KDRM
KWIM
KJRE
KAID
KWMM
KPAONZ
KUAE
KTFR
KIF
KNAP
KPSC
KSOCI
KCWI
KAUST
KPIN
KCHG
KLBO
KIRCOEXC
KI
KIRCHOFF
KSTT
KNPR
KDRL
KCFC
KLTN
KPAOKMDRKE
KPALAOIS
KESO
KKOR
KSMT
KFTFN
KTFM
KDEMK
KPKP
KOCM
KNN
KISLSCUL
KFRDSOCIRO
KINT
KRG
KWMNSMIG
KSTCC
KPAOY
KFOR
KWPR
KSEPCVIS
KGIV
KSEI
KIL
KWMNPHUMPRELKPAOZW
KQ
KEMS
KHSL
KTNF
KPDD
KANSOU
KKIV
KFCE
KTTC
KGH
KNNNP
KK
KSCT
KWNN
KAWX
KOMCSG
KEIM
KTSD
KFIU
KDTB
KFGM
KACP
KWWMN
KWAWC
KSPA
KGICKS
KNUP
KNNO
KISLAO
KTPN
KSTS
KPRM
KPALPREL
KPO
KTLA
KCRP
KNMP
KAWCK
KCERS
KDUM
KEDM
KTIALG
KWUN
KPTS
KPEM
KMEPI
KAWL
KHMN
KCRO
KCMR
KPTD
KCROR
KMPT
KTRF
KSKN
KMAC
KUK
KIRL
KEM
KSOC
KBTC
KOM
KINP
KDEMAF
KTNBT
KISK
KRM
KWBW
KBWG
KNNPMNUC
KNOP
KSUP
KCOG
KNET
KWBC
KESP
KMRD
KEBG
KFRDKIRFCVISCMGTKOCIASECPHUMSMIGEG
KPWG
KOMCCO
KRGY
KNNF
KPROG
KJAN
KFRED
KPOKO
KM
KWMNCS
KMPF
KJWC
KJU
KSMIG
KALR
KRAL
KDGOV
KPA
KCRMJA
KCRI
KAYLA
KPGOV
KRD
KNNPCH
KFEM
KPRD
KFAM
KALM
KIPRETRDKCRM
KMPP
KADM
KRFR
KMWN
KWRG
KTIAPARM
KTIAEUN
KRDP
KLIP
KDDEM
KTIAIC
KWKN
KPAD
KDM
KRCS
KWBGSY
KEAI
KIVP
KPAOPREL
KUNH
KTSC
KIPT
KNP
KJUSTH
KGOR
KEPREL
KHSA
KGHGHIV
KNNR
KOMH
KRCIM
KWPB
KWIC
KINF
KPER
KILS
KA
KNRG
KCSI
KFRP
KLFLO
KFE
KNPPIS
KQM
KQRDQ
KERG
KPAOPHUM
KSUMPHUM
KVBL
KARIM
KOSOVO
KNSD
KUIR
KWHG
KWBGXF
KWMNU
KPBT
KKNP
KERF
KCRT
KVIS
KWRC
KVIP
KTFS
KMARR
KDGR
KPAI
KDE
KTCRE
KMPIO
KUNRAORC
KHOURY
KAWS
KPAK
KOEM
KCGC
KID
KVRP
KCPS
KIVR
KBDS
KWOMN
KIIC
KTFNJA
KARZAI
KMVP
KHJUS
KPKOUNSC
KMAR
KIBL
KUNA
KSA
KIS
KJUSAF
KDEV
KPMO
KHIB
KIRD
KOUYATE
KIPRZ
KBEM
KPAM
KDET
KPPD
KOSCE
KJUSKUNR
KICCPUR
KRMS
KWMNPREL
KWMJN
KREISLER
KWM
KDHS
KRV
KPOV
KWMNCI
KMPL
KFLD
KWWN
KCVM
KIMMITT
KCASC
KOMO
KNATO
KDDG
KHGH
KRF
KSCAECON
KWMEN
KRIC
LE
LH
LI
LT
LY
LTTE
LO
LG
LA
LU
LABOR
LANTERN
LVPR
LEE
LORAN
LEW
LAB
LS
LOPEZ
LB
LYPHUM
LAOS
LAS
LARS
LMS
LV
LN
LAW
LEBIK
LARREA
LZ
LBY
LGAT
LPREL
LOG
LEVINE
LAURA
LR
LTG
LAVIN
LOVE
LICC
LK
LEB
LINE
LIB
LOTT
LEON
LEGAT
LEIS
LEAGUE
LANSANA
LEGATT
LIMA
LBAR
LKDEM
MARR
MOPS
MU
MA
MASS
MY
MNUC
MX
MI
MZ
MK
MR
MC
MTCRE
MV
MCAP
MNUCPTEREZ
MEDIA
MP
MO
MG
MD
MW
ML
MT
MN
MTS
MLS
MF
MAR
MDC
MPOS
MEPI
MCC
MEPN
MIL
MNLF
MRCRE
MAS
MARRMOPS
MATT
MUNC
MCAPS
MOPPS
MAAR
MCA
MTCR
MOOPS
MOPP
MTAG
MH
MILITARY
MASSIZ
MEPP
MILLENNIUM
MGMT
MILITANTS
MAPP
MS
MDA
MARITIME
MTRCE
MGT
MEX
MFO
MARTIN
MASSMNUC
MILI
MONUC
ME
MORRIS
MCCAIN
MACP
MCAPN
MASC
MICHAEL
MARANTIS
MCAT
MINUSTAH
MARS
MMAR
MCRM
MNUCWA
MONTENEGRO
MAP
MINORITIES
MARRIZ
MGL
MCTRE
MESUR
MOP
MWPREL
MURRAY
MHUC
MCAPMOPS
MUKASEY
MARIE
MNUCH
MED
MTAA
MEETINGS
MORS
MGTA
MAPS
MCCP
MOHAMAD
MUC
MSG
MASSPHUM
MARRIS
MRSEC
MOROCCO
MASSZF
MTRE
MBM
MACEDONIA
MARQUEZ
MANUEL
MITCHELL
MARK
MGOV
MICHEL
MILA
MCGRAW
MOHAMED
MNUK
MSIG
MRRR
MARRGH
MARAD
MNUCECON
MJ
MNNC
MOPSGRPARM
MFA
MCNATO
MENDIETA
MARIA
MEPPIT
MNUR
MMED
MOTO
MILTON
MERCOSUR
MNVC
MIC
MIK
MORALES
MOTT
MNU
MINURSO
MNUCUN
MCCONNELL
MIKE
MPP
MALDONADO
MIGUEL
MASSPGOV
MOPSPBTS
MASSAF
MONY
MTCAE
MOLINA
MZAORC
MARV
MULLEN
MCAPARR
MCAPP
MNNUC
MNUS
MNUN
MB
MDO
MORG
MPOL
MAHURIN
MUCN
MARRSU
MPS
MNUM
MDD
MTCRA
MOS
MOPSMARR
MARRV
MEP
MASSTZ
MTRRE
MPREL
MASSPGOVPRELBN
MRS
MARINO
MIAH
MASSPRELPARM
MOHAMMAD
MEA
MQADHAFI
MURAD
MAYA
NI
NATO
NAR
NP
NU
NO
NL
NZ
NAS
NS
NC
NH
NG
NATIONAL
NSF
NPT
NATOPREL
NR
NSC
NEGROPONTE
NAM
NSSP
NGO
NE
NSFO
NIH
NTSB
NK
NATEU
NDP
NA
NASA
NLD
NAFTA
NRC
NADIA
NOAA
NANCY
NT
NIPP
NEA
NARC
NZUS
NSG
NKNNP
NATOF
NATSIOS
NARCOTICS
NATGAS
NB
NRR
NTTC
NUMBERING
NICOLE
NAC
NGUYEN
NET
NORAD
NCCC
NKWG
NFSO
NOK
NONE
NTDB
NPA
NRRC
NPG
NERG
NEPAD
NACB
NEY
NAT
NAVO
NCD
NOI
NOVO
NEW
NICHOLAS
NEC
NARR
NMNUC
NON
NCTC
NMFS
NELSON
NUIN
NBTS
NRG
NNPT
NEI
NFATC
NFMS
NATOIRAQ
NATOOPS
NATOBALKANS
NAMSA
NATOPOLICY
NCT
NW
NMOPS
NV
NATOAFGHAN
NMUC
NBU
NKKP
NLO
NLIAEA
NUC
NDI
OPRC
OPIC
OPCW
OIIP
OCII
OVIP
OSCE
OTRA
OREP
OPDC
OFDP
OAS
OFDA
OEXC
OECS
OECD
ODPC
OMS
ODIP
OPBAT
OIC
OMIG
OSCI
OPCD
OFFICIALS
OCSE
OSD
OLYMPICS
OAU
OM
OIE
OBAMA
OXEC
OGIV
OXEM
OIL
OECV
ORUE
OPEC
OF
ORA
OFDPQIS
OEXP
OARC
OLYAIR
ORTA
OMAR
OFPD
OPREP
OCS
ORC
OES
OSAC
OSEC
ORP
OVIPIN
OVP
OVID
OSHA
OCHA
OMB
OHCHR
OPID
OBS
OPOC
OHIP
OFDC
OTHER
OCRA
OFSO
OCBD
OSTA
OAO
ONA
OTP
OPC
OIF
OPS
OSCEPREF
OESC
OPPI
OTR
OPAD
OTRC
ORGANIZED
ODC
OPDAT
OTAR
ON
OVIPPREL
OPCR
OPDP
OIG
OTRAZ
OCED
OA
OUALI
ODAG
OPDCPREL
OEXCSCULKPAO
OASS
ORCA
OSTRA
OTRAORP
OBSP
ORED
OGAC
OASC
OTA
OIM
OI
OIPP
OTRAO
OPREC
OSIC
OPSC
OTRABL
OICCO
OPPC
ORECD
OCEA
OHUM
OTHERSASNEEDED
OSCEL
OZ
OPVIP
OTRD
OASCC
OHI
OPICEAGR
OLY
OREG
OVIPPRELUNGANU
OPET
PREL
PINR
PGOV
PHUM
PTER
PE
PREF
PARM
PBTS
PINS
PHSA
PK
PL
PM
PNAT
PHAS
PO
PROP
PGOVE
PA
PU
POLITICAL
PPTER
POL
PALESTINIAN
PHUN
PIN
PAMQ
PPA
PSEC
POLM
PBIO
PSOE
PDEM
PAK
PF
PKAO
PGOVPRELMARRMOPS
PMIL
PV
POLITICS
PRELS
POLICY
PRELHA
PIRN
PINT
PGOG
PERSONS
PRC
PEACE
PROCESS
PRELPGOV
PROV
PFOV
PKK
PRE
PT
PIRF
PSI
PRL
PRELAF
PROG
PARMP
PERL
PUNE
PREFA
PP
PGOB
PUM
PROTECTION
PARTIES
PRIL
PEL
PAGE
PS
PGO
PCUL
PLUM
PIF
PGOVENRGCVISMASSEAIDOPRCEWWTBN
PMUC
PCOR
PAS
PB
PKO
PY
PKST
PTR
PRM
POUS
PRELIZ
PGIC
PHUMS
PAL
PNUC
PLO
PMOPS
PHM
PGOVBL
PBK
PELOSI
PTE
PGOVAU
PNR
PINSO
PRO
PLAB
PREM
PNIR
PSOCI
PBS
PD
PHUML
PERURENA
PKPA
PVOV
PMAR
PHUMCF
PUHM
PHUH
PRELPGOVETTCIRAE
PRT
PROPERTY
PEPFAR
PREI
POLUN
PAR
PINSF
PREFL
PH
PREC
PPD
PING
PQL
PINSCE
PGV
PREO
PRELUN
POV
PGOVPHUM
PINRES
PRES
PGOC
PINO
POTUS
PTERE
PRELKPAO
PRGOV
PETR
PGOVEAGRKMCAKNARBN
PPKO
PARLIAMENT
PEPR
PMIG
PTBS
PACE
PETER
PMDL
PVIP
PKPO
POLMIL
PTEL
PJUS
PHUMNI
PRELKPAOIZ
PGOVPREL
POGV
PEREZ
POWELL
PMASS
PDOV
PARN
PG
PPOL
PGIV
PAIGH
PBOV
PETROL
PGPV
PGOVL
POSTS
PSO
PRELEU
PRELECON
PHUMPINS
PGOVKCMABN
PQM
PRELSP
PRGO
PATTY
PRELPGOVEAIDECONEINVBEXPSCULOIIPBTIO
PGVO
PROTESTS
PRELPLS
PKFK
PGOVEAIDUKNOSWGMHUCANLLHFRSPITNZ
PARAGRAPH
PRELGOV
POG
PTRD
PTERM
PBTSAG
PHUMKPAL
PRELPK
PTERPGOV
PAO
PRIVATIZATION
PSCE
PPAO
PGOVPRELPHUMPREFSMIGELABEAIDKCRMKWMN
PARALYMPIC
PRUM
PKPRP
PETERS
PAHO
PARMS
PGREL
PINV
POINS
PHUMPREL
POREL
PRELNL
PHUMPGOV
PGOVQL
PLAN
PRELL
PARP
PROVE
PSOC
PDD
PRELNP
PRELBR
PKMN
PGKV
PUAS
PRELTBIOBA
PBTSEWWT
PTERIS
PGOVU
PRELGG
PHUMPRELPGOV
PFOR
PEPGOV
PRELUNSC
PRAM
PICES
PTERIZ
PREK
PRELEAGR
PRELEUN
PHUME
PHU
PHUMKCRS
PRESL
PRTER
PGOF
PARK
PGOVSOCI
PTERPREL
PGOVEAID
PGOVPHUMKPAO
PINSKISL
PREZ
PGOVAF
PARMEUN
PECON
PINL
POGOV
PGOVLO
PIERRE
PRELPHUM
PGOVPZ
PGOVKCRM
PBST
PKPAO
PHUMHUPPS
PGOVPOL
PASS
PPGOV
PROGV
PAGR
PHALANAGE
PARTY
PRELID
PGOVID
PHUMR
PHSAQ
PINRAMGT
PSA
PRELM
PRELMU
PIA
PINRPE
PBTSRU
PARMIR
PEDRO
PNUK
PVPR
PINOCHET
PAARM
PRFE
PRELEIN
PINF
PCI
PSEPC
PGOVSU
PRLE
PDIP
PHEM
PRELB
PORG
PGGOC
POLG
POPDC
PGOVPM
PWMN
PDRG
PHUMK
PINB
PRELAL
PRER
PFIN
PNRG
PRED
POLI
PHUMBO
PHYTRP
PROLIFERATION
PHARM
PUOS
PRHUM
PUNR
PENA
PGOVREL
PETRAEUS
PGOVKDEM
PGOVENRG
PHUS
PRESIDENT
PTERKU
PRELKSUMXABN
PGOVSI
PHUMQHA
PKISL
PIR
PGOVZI
PHUMIZNL
PKNP
PRELEVU
PMIN
PHIM
PHUMBA
PUBLIC
PHAM
PRELKPKO
PMR
PARTM
PPREL
PN
PROL
PDA
PGOVECON
PKBL
PKEAID
PERM
PRELEZ
PRELC
PER
PHJM
PGOVPRELPINRBN
PRFL
PLN
PWBG
PNG
PHUMA
PGOR
PHUMPTER
POLINT
PPEF
PKPAL
PNNL
PMARR
PAC
PTIA
PKDEM
PAUL
PREG
PTERR
PTERPRELPARMPGOVPBTSETTCEAIRELTNTC
PRELJA
POLS
PI
PNS
PAREL
PENV
PTEROREP
PGOVM
PINER
PBGT
PHSAUNSC
PTERDJ
PRELEAID
PARMIN
PKIR
PLEC
PCRM
PNET
PARR
PRELETRD
PRELBN
PINRTH
PREJ
PEACEKEEPINGFORCES
PEMEX
PRELZ
PFLP
PBPTS
PTGOV
PREVAL
PRELSW
PAUM
PRF
PHUMKDEM
PATRICK
PGOVKMCAPHUMBN
PRELA
PNUM
PGGV
PGOVSMIGKCRMKWMNPHUMCVISKFRDCA
PBT
PIND
PTEP
PTERKS
PGOVJM
PGOT
PRELMARR
PGOVCU
PREV
PREFF
PRWL
PET
PROB
PRELPHUMP
PHUMAF
PVTS
PRELAFDB
PSNR
PGOVECONPRELBU
PGOVZL
PREP
PHUMPRELBN
PHSAPREL
PARCA
PGREV
PGOVDO
PGON
PCON
PODC
PRELOV
PHSAK
PSHA
PGOVGM
PRELP
POSCE
PGOVPTER
PHUMRU
PINRHU
PARMR
PGOVTI
PPEL
PMAT
PAN
PANAM
PGOVBO
PRELHRC
RS
RO
REGION
RU
RP
REACTION
REPORT
RELFREE
RELATIONS
RIGHTS
RW
REL
REGIONAL
RICE
RIGHTSPOLMIL
RSP
REINEMEYER
RFREEDOM
RM
RAID
ROW
ROBERT
REFORM
RGOV
REFUGEES
REALTIONS
RFE
ROBERTG
RSO
RPREL
RHUM
RQ
RPEL
RF
ROME
RIVERA
RECIN
REF
RENAMO
RUS
RAMON
RAY
RODHAM
REFUGEE
RATIFICATION
RGY
RUEHZO
REUBEN
REA
RICHARD
RENE
REO
ROOD
RCMP
RA
RELIGIOUS
RUMSFELD
RREL
ROY
REIN
RUPREL
RELAM
REMON
RR
RVKAWC
RV
RI
RBI
RMA
RE
RAMONTEIJELO
RAED
RPREF
RWANDA
RODRIGUEZ
RUEUN
ROSS
RPTS
RLA
REID
RSOX
RTT
ROK
RCA
RAS
RWPREL
RRB
RAMOS
RL
RIMC
RAFAEL
RODENAS
RUIZ
RFIN
RSZ
REFPAN
SU
SY
SENV
SOCI
SO
SNAR
SF
SA
SCUL
SI
SP
SW
SMIG
SCNV
SN
SZ
SOE
START
SL
SR
SE
SG
SETTLEMENTS
SANC
SILVASANDE
SCIENCE
SOCIETY
SM
SECDEF
SOLIC
SYRIA
SCRS
SOWGC
SADC
ST
SC
SIPDIS
SHUM
SCCC
SAN
SAARC
SENVEFISPRELIWC
SPGOV
SHI
SECRETARY
SMAR
SCPR
SCOM
SECRET
SENC
SOM
SK
SARS
SYR
SENU
SNAP
SENVQGR
SPCE
SCOI
SENVEAGREAIDTBIOECONSOCIXR
SENVENV
SPECIALIST
SABAH
SECURITY
SURINAME
STATE
SOCIO
SSH
SOCIA
SUFFRAGE
SCI
SNA
SOCIS
SECTOR
SASEC
SEC
SOCY
SIAORC
SUCCESSION
SOFA
SENVSENV
SYAI
SAIS
SREF
SD
STUDENT
SV
SCVL
SULLIVAN
SECI
SCUIL
SMIGBG
SIPR
SEN
SEP
STEPHEN
SECSTATE
SNRV
SOSI
SANR
SIMS
SNARPGOVBN
SEVN
SAFE
STEINBERG
SASC
SHANNON
SENSITIVE
SPP
SGWI
SWMN
SPTER
SWE
SFNV
SCUD
SPCVIS
SOVIET
SMIL
SACU
SLM
SCULKPAOECONTU
SUMMIT
SPSTATE
SMITH
SOCIKPKO
SCRSERD
SB
SENVSPL
SCA
SARB
SH
SNARCS
SNARN
SYSI
SMIT
SUDAN
SIPRNET
SCULUNESCO
SERBIA
SNARIZ
SORT
SENVCASCEAIDID
SPECI
SBA
SNARC
SIPDI
SYMBOL
SPC
SERGIO
STP
SCHUL
SXG
SNUC
SELAB
STET
SCRM
SENS
SUBJECT
SEXP
SKCA
SWHO
SMI
SGNV
SSA
SOPN
SASIAIN
SIUK
SRYI
SAMA
SAAD
SKSAF
SENG
SOCR
STR
SENVKGHG
SPILL
SALOPEK
STC
SRS
SCE
SAIR
SRIT
SOMALIA
SLOVAK
SOLI
SAO
SX
SRPREL
SKEP
SECON
SOC
STAG
SUSAN
SERZH
SARGSIAN
SCOL
SYTH
SOCISZX
SMRT
SKI
SNARR
SUR
SPAS
SOIC
SNARPGOVPRELPHUMSOCIASECKCRMUNDPJMXL
SOI
SIPRS
SOCIPY
SNARKTFN
SPPREL
SNARM
SENVSXE
SCENESETTER
SNIG
TBIO
TU
TRGY
TI
TW
TJ
TH
TS
TC
TPHY
TIP
TURKEY
TSPA
TX
TAGS
TN
TR
TZ
TERRORISM
TSPL
TRSY
TT
TK
TCSENV
TO
TINT
THPY
TD
TERFIN
TP
TECHNOLOGY
TNGD
TL
TV
TRAFFICKING
TAX
TSLP
THIRDTERM
TRADE
TOPEC
TBO
TERR
TRV
TY
TRAD
TPSL
TERROR
TRYS
TIFA
TORRIJOS
TRT
TF
TIO
TFIN
TREATY
TSA
TAUSCHER
TECH
TG
TE
TOURISM
TNDG
TVBIO
TPSA
TRGV
TPP
TTFN
THKSJA
TA
TALAL
TRIO
TSPAM
TBIOEAGR
TPKO
THERESE
TER
TWL
TBIOZK
TWRO
TSRY
TNAR
THE
TDA
TRBY
TZBY
THOMMA
THOMAS
TRY
TRD
TCOR
TGRY
TSPAUV
TREASURY
TIBO
TIUZ
TPHYPA
TREL
TWCH
TRG
TTPGOV
TBI
THANH
TSRL
TM
TITI
TB
TBID
TERAA
TIA
TRYG
TRBIO
TSY
TWI
TREAS
TBKIO
UNGA
US
UNSC
USUN
USTR
UK
UN
UP
UZ
USAID
UNESCO
UV
USEU
UNMIK
UNCTAD
UG
UNEP
UNCHR
UNCRED
UNODC
UY
UNHCR
UNHRC
UNFICYP
UNRWA
UR
USTDA
UNREST
UNAUS
UNIFEM
USAU
USDA
UNDP
UA
UNCSD
UNIDO
UNRCR
UNIDROIT
UKXG
UNFPA
UNICEF
UNOPS
UNMIN
UNAIDS
UNDC
UE
UNCND
UNCRIME
UEU
UNO
UNOMIG
UNSCR
UNDOF
UNCITRAL
UNPUOS
UUNR
UNFIYCP
UAE
USNC
UNIFIL
UNION
UNAF
USTRUWR
USOAS
UNTERR
UNC
UNM
UNVIE
UNMIC
USCC
UNCOPUOS
UNUS
UNSCE
UNTAC
UNAORC
UNAMA
USEUBRUSSELS
UAM
USOSCE
UMIK
UNHR
UNMOVIC
UNCLASSIFIED
UNGAPL
USNATO
UGA
UNRCCA
UKR
USPS
USOP
UNA
UNFC
UNKIK
USSC
UNWRA
USPTO
UGNA
USDELFESTTWO
USTRD
USTA
UNIDCP
USCG
UNAMSIL
UNFCYP
UNSCD
UNPAR
USTRPS
UNECE
URBALEJO
UAID
UPU
UNSE
UNCC
UNBRO
UNMIL
UNEF
UNFF
UDEM
UNDOC
USG
UNG
UNYI
USDAEAID
UNGO
UX
UNCHC
UNDEF
UNESCOSCULPRELPHUMKPALCUIRXFVEKV
UEUN
UB
UNSCS
UM
UNSD
UNCDN
UNMIKV
UNUNSC
UNFA
UNECSO
UKRAINE
UNP
UNSCKZ
USTRIT
UNCDF
UNGAC
UNSCAPU
UPUO
UNTZ
UNSCER
UNMIKI
UNMEE
UNGACG
UNCSW
USMS
USTRRP
UNCHS
UNDESCO
USGS
VM
VE
VC
VZ
VT
VETTING
VN
VTPGOV
VPGOV
VTCH
VTPREL
VISIT
VIP
VEPREL
VTEAID
VTFR
VOA
VIS
VTEG
VA
VISAS
VTOPDC
VTIZ
VTKIRF
VTIT
VEN
VATICA
VY
VTPHUM
VTIS
VTEAGR
VILLA
VXY
VO
VARGAS
VTUNGA
VTWCAR
VAT
VI
VTTBIO
VELS
VANG
VANESSA
VENZ
VINICIO
WTO
WZ
WTRO
WS
WFP
WA
WHO
WI
WE
WILCOX
WEF
WBG
WAR
WHA
WILLIAM
WATKINS
WMD
WOMEN
WRTO
WIPO
WFPO
WMO
WEU
WSIS
WB
WCL
WHTI
WTRD
WETRD
WCAR
WWARD
WEET
WEBZ
WITH
WHOA
WTOEAGR
WFPAORC
WALTER
WWT
WAEMU
WMN
WMDT
WCI
WPO
WHITMER
WAKI
WM
WW
WGC
WFPOAORC
WCO
WWBG
WADE
WJRO
WET
WGG
WTOETRD
WARREN
WEOG
WTRQ
WBEG
WELCH
WFA
WEWWT
WIR
WEBG
WARD
XF
XA
XG
XW
XB
XL
XM
XR
XH
XK
XS
XC
XD
XV
XTAG
XE
XU
XI
XO
XX
XY
XT
XZ
XAAF
XJ
XP
XQ
XFNEA
XKJA
XLUM
XXX
ZI
ZU
ZP
ZO
ZL
ZA
ZR
ZF
ZK
ZANU
ZM
ZIM
ZOELLICK
ZB
ZJ
ZAEAGR
ZCTU
ZS
ZW
ZX
ZFR
ZEALAND
ZC
ZH
ZT
ZXA
ZKGM
ZN
Browse by classification
Community resources
courage is contagious
Viewing cable 04NEWDELHI7026, INDO-US CYBERSECURITY FORUM PREPARATORY
If you are new to these pages, please read an introduction on the structure of a cable as well as how to discuss them with others. See also the FAQs
Understanding cables
Every cable message consists of three parts:
- The top box shows each cables unique reference number, when and by whom it originally was sent, and what its initial classification was.
- The middle box contains the header information that is associated with the cable. It includes information about the receiver(s) as well as a general subject.
- The bottom box presents the body of the cable. The opening can contain a more specific subject, references to other cables (browse by origin to find them) or additional comment. This is followed by the main contents of the cable: a summary, a collection of specific topics and a comment section.
Discussing cables
If you find meaningful or important information in a cable, please link directly to its unique reference number. Linking to a specific paragraph in the body of a cable is also possible by copying the appropriate link (to be found at theparagraph symbol). Please mark messages for social networking services like Twitter with the hash tags #cablegate and a hash containing the reference ID e.g. #04NEWDELHI7026.
| Reference ID | Created | Released | Classification | Origin | 
|---|---|---|---|---|
| 04NEWDELHI7026 | 2004-11-04 04:02 | 2011-08-30 01:44 | UNCLASSIFIED//FOR OFFICIAL USE ONLY | Embassy New Delhi | 
This record is a partial extract of the original cable. The full text of the original cable is not available.
UNCLAS SECTION 01 OF 10 NEW DELHI 007026 
 
SIPDIS 
 
SENSITIVE 
 
STATE/PM FOR DAS KARA BUE 
STATE/PM FOR MICHELE MARKOFF 
DOD FOR OASD/NII TIM BLOECHL 
 
E.O. 12958: N/A 
TAGS: KCIP TINT PREL ECPS KCRM IN US
SUBJECT: INDO-US CYBERSECURITY FORUM PREPARATORY 
CONSULTATIONS IN NEW DELHI 
 
REF: A. NEW DELHI 5577 
     ¶B. NEW DELHI 6980 
 
¶1.  (SBU) Summary: On October 14-18, 2004, Department Senior 
Coordinator for International Critical Infrastructure 
Protection Policy Michele Markoff and DOD Director of 
International Information Assurance Programs Tim Bloechl 
participated in preparatory meetings with the GOI for the 
November 9-10 Cybersecurity Forum in Washington.  Arvind 
Gupta, Joint Secretary, National Security Council 
Secretariat, and Commander Mukesh Saini, Deputy Director 
 
SIPDIS 
(Information Security), NSCS, hosted the consultations and 
will lead the GOI delegation.  Discussions included the 
Cybersecurity Forum's (CSF's) overall structure; designating 
co-chairs and selecting agenda topics for the five working 
groups; industry participation; site visits; and training and 
capacity building.  The director of India's Computer 
Emergency Response Team (CERT-In) briefed on his 
organization's capabilities.  Markoff asked Gupta for GOI 
support for a US-drafted UNGA Resolution calling for all UN 
Member States to join the 24/7 Cybercrime Point of Contact 
Network, while Gupta and Saini shared their vision to 
"inculcate a culture of cybersecurity" in India's IT sector. 
End Summary. 
 
Getting to Know You (Again) 
--------------------------- 
 
¶2.  (SBU) Noting the long interval since the CSF last 
convened in April 29-30, 2002, Joint Director Gupta welcomed 
Markoff and Bloechl, and noted that much has changed in the 
field of cybersecurity technology, in the US and India's 
cybersecurity organizations, and in India's technical 
capabilities.  Markoff remarked on the successful 
ITAA-NASSCOM India-US Information Security Summit 2004, at 
which she delivered the closing keynote address.  Both 
Washington and New Delhi emphasized the importance of 
including the perspectives of both software developers and 
clients.  Markoff listed a few key industries that rely 
heavily on secure and reliable IT systems: banks, health 
care, utilities, and transportation.  Observing that the 
issue of cybersecurity is no longer "in the weeds," she said 
it is now recognized as an important part of US-India 
interdependence that is larger than the IT sector. 
 
WG1: Legal Cooperation and Law Enforcement 
------------------------------------------ 
 
¶3.  (SBU) Markoff began by listing topics the USG wants to 
discuss in the area of cybersecurity legal cooperation and 
law enforcement: 
 
-- How the GOI is organized to fight cybercrime; 
-- Updates on relevant legislation; 
-- Any plans to facilitate a Mutual Legal Assistance Treaty 
for computer crime; 
-- The Council of Europe model cybercrime legislation; 
-- How Indian law enforcement agencies approach cybercrime 
investigations and prosecutions; and 
-- If India participates in, or plans to participate in, the 
24/7 Cybercrime Point of Contact Network. 
 
¶4.  (SBU) Arguing for the inclusion of intrusion detection of 
Indian infrastructure to the agenda, MHA Joint Secretary 
Renuka Muttoo recalled a recent incident in which an American 
criminal/hacker allegedly misused an Indian proxy server to 
engage in credit card fraud and the printing of fraudulent 
certificates.  Noting that the incident was reported to the 
US DOJ, she asked how such reporting could be 
institutionalized. Markoff indicated that the 24/7 Cybercrime 
Point of Contact Network, of which India was already a 
member, was the conduit for cyber crime reporting.  Muttoo 
appeared unfamiliar with the 24/7 POC cybercrime network and 
Markoff promised to provide the name of the GOI contact. 
(NOTE: Embassy later passed GOI contact information via MEA.) 
 
¶5.  (SBU) Gupta queried whether this 24/7 network would be 
used to report all cyber incidents.  Markoff indicated that 
the U.S. has set up two separate 24/7 POCs -- one for watch 
and warning information sharing (US-CERT/NCSD), the other for 
law enforcement cooperation (DOJ) -- as a more effective way 
to ensure that information flows between professionals who 
understand each others priorities.  Of course, the US and 
Indian CERTs would also pass crime-relevant information to 
appropriate law enforcement contacts within their respective 
countries should they receive it. 
 
¶6.  (SBU) Gupta indicated that the U.S. had not been 
responsive to all past bilateral requests for law enforcement 
cooperation.  Markoff suggested that Gupta supply a list of 
unanswered requests.  It would be useful for the CSF to 
review India's status in cybercrime substantive law (what 
activities are criminalized) as well as cybercrime procedural 
law (how far Indian authorities are allowed to cooperate on 
cross-border incidents).  As an example, Markoff described a 
possible intrusion that could be routed through servers in 
several countries; in trying to trace back an attack, any gap 
in bilateral cybercrime cooperation would stop the 
investigation dead in its tracks. 
 
¶7.  (SBU) Gupta mentioned that the range of Indian law 
enforcement agencies with a potential role in cybercrime 
enforcement was larger than the delegation they could bring 
to the CSF, and offered to host a joint cybercrime law 
enforcement workshop in early 2005.  He envisioned a two-day 
workshop that would look at problems and possible 
collaboration in cyber-forensics, mutual legal assistance, 
and computer-based investigation, noting that this could be 
another venue for private industry to join the 
government-to-government dialogue.  Markoff responded that 
DOJ has participated in similar workshops, and suggested the 
proposal be discussed further at the CSF.  Gupta said that 
the issue could also be pursued in the Law Enforcement Joint 
Working Group, and that the GOI Department of Information 
Technology had already held one working group on cyber law 
and cyber-crime. 
 
¶8.  (SBU) Gupta requested that DOJ brief on how high-tech 
crime is pursued, "from the start, conducting the 
investigation, through convictions, a complete walk-through" 
at the November CSF.  Gupta's deputy, Commander Mukesh Saini, 
suggested that DOJ's Websnare Operation could be a useful 
case to profile. 
 
WG2: Research and Development 
----------------------------- 
 
¶9.  (SBU) Markoff asked that India's Working Group 2 
delegation report how New Delhi is poised for and can foster 
critical infrastructure protection research and development, 
outreach to industry and academia on CIP, and what 
cybersecurity issues the GOI sought to underline.  She told 
Gupta that the InfoSec Research Council prepared a "Hard 
Problems List" of the technical hurdles in cybersecurity that 
need to be overcome (NOTE: Embassy later delivered a copy of 
the "Hard Problems List" to Saini).  Markoff suggested that 
the USG and the GOI might partner in resolving some of these 
problems. 
 
¶10.  (SBU) In response, Gupta asked if the India-US Science 
and Technology Forum, which began in March 2000, might be a 
more appropriate venue for new R&D workshops in 
cybersecurity.  In such an eventuality, the S&TF could 
provide POCs for science collaboration in several research 
areas, such as systems-oriented research architecture for 
dependability and survivability, systems 
management/monitoring/control, human monitoring, 
authentication, communications protocols, network security, 
accountability, and foundational research (logical languages 
and tools to develop systems).  The most promising areas, 
Gupta said, were in applying cryptography for authentication 
and privacy, language-based security (i.e. voice 
recognition), diverse redundancy, and catastrophe-resistant 
architecture. 
 
¶11.  (SBU) Department of Information Technology Senior 
Director S. Basu said that working-level GOI R&D interests 
are focused on cryptography and crypto-analysis, network 
systems security, security architecture, operating system 
security, vulnerability detection and monitoring, and 
cyber-forensics.  He expressed interest in reviewing the 
"Hard Problems List."  Basu added that proposed topics for 
collaboration could include cyber forensic tools, 
authentication, speaker (voice) recognition, cryptography, 
and quantum cryptography. 
 
¶12.  (SBU) Dr. G. Athithan of the Defense Research and 
Development Organization (DRDO)/Center for Artificial 
Intelligence and Robotics said that DRDO and DIT had been 
working on IT security for 3-4 years.  They have access to 
software developers in Bangalore through the marriage of 
"government money and private sector brains," while critical 
tasks are handled by government-funded laboratories, which 
also conduct field-testing.  Athithan underlined the GOI 
desire for tools to help monitor network traffic and capture 
keywords.  He remarked that intercepting and reading 
Internet-based e-mail (webmail) was a difficult problem, and 
that webmail was developed by an Indian programmer to 
sidestep firewalls because it was more difficult to detect. 
After Athithan expressed his interest in "carnivore" software 
(to allow law enforcement agencies to read intercepted 
e-mails) Markoff and Bloechl -- as well as Gupta and Saini -- 
steered the conversation toward possible cooperation on 
cracking packet header data and session information, and away 
from reading intercepted text.  Athithan proffered additional 
GOI R&D priorities: intrusion detection, modeling 
statistically normal network behavior to create a baseline, 
hacker tracing, and, again, viewing electronic content, "to 
help infer the origin and identity of an attacker." 
 
¶13.  (SBU) Gupta suggested Internet traffic monitoring and 
database analysis as areas for possible cooperation, noting 
that the GOI wishes to be able to profile and summarize data 
and databases, as well as profiling online user sessions 
(e-mail traffic and clustered browsing) over multi-day 
periods.  Gupta then asked how the US monitors Internet 
traffic.  Markoff said that US law does not permit general 
monitoring of Internet traffic; instead, if there is evidence 
of a crime, a court order can permit law enforcement to 
investigate relevant e-mail traffic. 
 
¶14.  (SBU) Bloechl suggested that the defense cooperation 
working group could discuss the issue in a military context, 
and echoed Markoff's statement that the USG does not monitor 
content, instead focusing on analysis, such as the case of 
worms or viruses indicated by packet header data.  He 
explained that there is a great need to avoid violating US 
law by collecting information on US persons outside of a 
sanctioned law enforcement investigation. 
 
¶15.  (SBU) Gupta shared that the GOI,s interest was not in 
reading the data itself, but in technology to warehouse and 
analyze it.  The GOI was interested in unclassified 
technology, as classified data is handled under separate 
procedures.  Athithan interjected that he was interested in 
R&D, not law enforcement, and that the technology would be 
deployed toward a watch and warning function that would be in 
place prior to any legal permissions being sought for 
attempted intrusion or attack.  He restated his interests as 
summarizing and profiling data, traffic analysis, and cluster 
analysis; Gupta added that the Indo-US Counterterrorism Joint 
Working Group was the appropriate forum for tools that would 
support actionable intelligence, while Athithan pushed for 
the technology to implement watch, warning and emergency 
response functions, as well as handling and storing digital 
evidence. 
 
WG3: Critical Infrastructure Protection 
--------------------------------------- 
 
¶16.  (SBU) Markoff told Gupta that the Acting Director of 
DHS's National Cyber Security Division, Andy Purdy, will 
co-chair the Third Working Group, and will lead on watch and 
warning issues.  Its presentation will include an overview of 
the capabilities and activities of the US Computer Emergency 
Readiness Team (US-CERT, which NCSD oversees), its mandated 
mission, its watch-and-warning capabilities, and a review of 
its public/private/academic/international outreach and 
partnerships.  The USG sought a reciprocal briefing on the 
capabilities and activities of India's CERT-In.  The working 
group will also explore collaboration opportunities, and 
welcomed a discussion on the following issues: 
 
-- How was CERT-In created? 
-- What is its mandate? 
-- What alert and advisory systems are in place? 
-- Is CERT-In operating in a 24/7 capacity for emergency 
responses?  If not, will it do so in the future? 
-- What kinds of international outreach does CERT-In pursue? 
 
¶17.  (SBU) Markoff then listed some potential avenues for 
collaboration between the two CERTs: 
 
-- Designating POCs for bilateral communications; 
-- Coordinating on cybersecurity incident responses; 
-- Partnering on hard issues such as attribution and software 
assurance; 
-- Sharing watch and warning information; 
-- Fostering international cooperation beyond the bilateral 
relationship; and 
-- Technical training assistance. 
 
Other possibilities include exchanges of periodic reports on 
global Internet status, including trends, vulnerabilities, 
and incidents. 
 
¶18.  (SBU) Markoff reported that the USG has been considering 
architecture for an incident alert and management system, and 
is consulting with other allies in this regard.  The system 
would need to have real-time warning capabilities.  Because 
CERT-In is India's designated national CERT, the two teams 
could begin sharing basic cyber watch and warning information 
almost immediately, she added.  Markoff explained that 
CERT-In must be the government's authorized CERT and be able 
to share reciprocal information with US-CERT on a 24/7 basis, 
to qualify for this level of partnership. 
 
¶19.  (SBU) CERT-In Operations Manager Anil Sagar briefly 
presented on CERT-In's capabilities.  He stated that CERT-In 
is GOI funded, 24/7 capable, and provides both pull (website: 
http://www.cert-in.org.in) and push (e-mail) alert services. 
He confirmed that it is the GOI-designated national CERT for 
all computer security incidents, government and 
private-sector, and has been operating since January.  In 
response to Markoff's query as to CERT-In's membership in any 
regional agreements, Sagar said that CERT-In Director Dr. KK 
Bajaj was at that time engaged in membership consultations 
for the Asia-Pacific CERT (APCERT).  CERT-In,s "wish list," 
according to Sagar, includes: 
 
-- Knowledge-sharing with US-CERT of any discovered operating 
systems or applications vulnerabilities, 
-- Updates on viruses and worms in circulation; 
-- Assistance in vulnerability analysis; 
-- Capabilities of incident handling; 
-- Traffic monitoring; 
-- Intrusion trends and warnings; 
-- Hacker profiling; and 
-- Assistance in testing patches for upcoming software 
vulnerabilities (NOTE: Sagar explained that CERT-In tests 
commercially-available patches before posting them on their 
website, because, he explained, they are very careful about 
preserving CERT-In,s reputation and do not wish to be 
associated with faulty patches.) 
 
¶20.  (SBU) In exchange, Sagar said that CERT-In could share 
the following with US-CERT: best practices on systems 
hardening; co-development of security applications; and 
information-sharing on systems vulnerabilities information. 
 
WG4: Defense Cooperation 
------------------------ 
 
¶21.  (SBU) Bloechl explained that robust cybersecurity for 
the US Defense Department and the military is already in 
place, under the auspices of a four-star general at US 
Strategic Command.  A Joint Task Force (JTF) was created in 
1998 as the primary computer network defense organization for 
the Defense Department.  Other agency and military CERTs 
report to it, and it works in parallel with the US-CERT under 
the Department of Homeland Security as its defense sector 
counterpart.  Bloechl invited the Working Group 4 delegation 
to visit the CSF early and tour the JTF/Global Network 
Operations Center in Washington, at which time the two 
delegations could discuss common goals and objectives for 
bilateral cooperation.  Of key importance, he stressed, is 
that any organization the DOD partners with must be able to 
protect the information on its own networks. 
 
¶22.  (SBU) Bloechl then asked about the status of India's 
military CERT -- whether it has 24/7 intrusion detection, an 
R&D budget, details about its network security and if the 
military uses simulation modeling to test the security, 
indicators and warning capability, and pre-attack warning 
capability.  Saini responded that each service (Army, Navy, 
Air Force) currently maintains its own independent computer 
networks, each overseen by its own "semblance of a CERT." 
Over time Saini planned to "grow the existing CERTs until 
they are fully functioning," primarily by enlarging and 
training their staffs, a goal he hopes to reach by 2007.  Not 
even the Integrated Defense Staff yet possesses an integrated 
network -- the stress is to have adequate security in place 
before linking networks even at the IDS level.  Furthermore, 
beyond the three service networks, the military has only a 
relatively small number of separate, Internet-accessible 
workstations.  Despite pressure from within the military to 
expand Internet access, especially leading to broadband 
access, Saini's preference was to do so only after the 
military CERTs are fully functioning. 
 
¶23.  (SBU) Commodore J Jena of India's Integrated Defense 
Staff, who introduced himself by saying that "cybersecurity 
is my main activity," said the need for an expanded awareness 
of cybersecurity within the Indian military's Intranets 
remained acute.  He asked whether USG networks were secured 
with commercially-available products or were manufactured 
within the government.  Bloechl responded that classified 
systems are secured by USG agencies, including the NSA.  Jena 
then asked what algorithms US classified networks use, and 
how reliable they are considered to be.  Bloechl took the 
question and will pass to appropriate US offices for 
potential future action. 
 
¶24.  (SBU) In exchange for US-funded cybersecurity training, 
Jena said the Indian military was prepared to share the 
following with the US: 
 
-- Counterterrorism/low intensity conflict training and 
expertise; 
-- A mode to tap into India's pool of IT talent; and 
-- Its share in a bilateral cyberwarning function. 
 
¶25.  (SBU) Jena asked about adding additional areas to the 
discussion agenda, such as using endochromatic radioactive 
material-embedded hardware and software for security, cyber 
deterrence, and how to test for and sanitize malicious code. 
Markoff and Bloechl answered that the key to deterrence is 
cracking the attribution problem.  After Jena asked about 
hardening systems to withstand an electro-magnetic pulse and 
how to reconstitute after such an attack, Markoff advised 
that such issues might be better addressed in the CTJWG. 
Bloechl added that some elements in DOD might be looking at 
such problems, but not his office.  Bloechl and Jena agreed 
that data in languages other than English posed a hard 
problem, one that Markoff said was recognized at the World 
Summit on the Information Society (WSIS). 
 
WG5: Standards and Software Assurance 
------------------------------------- 
 
¶26.  (SBU) Markoff opened discussion on Working Group 5 by 
stating that Dr. Ron Ross of NIST would provide the CSF with 
a high-level overview of NIST's guidelines on security 
standards; show how the standards have international 
applicability; and outline the benefits of ongoing 
collaboration.  Dr. SL Sarnot (Director General, 
Standards/Testing/Quality Certification Directorate, Ministry 
of Communications and Information Technology) stated that he 
had held a prior discussion with Dr. Ross, on common criteria 
for software assurance, and that both sides of the working 
group should be able to work well together.  The GOI would 
seek cooperation in implementing NIST assurance protocols, 
and Sarnot said the US document is more "elaborate" than 
India's current program.  He also asked for assistance in 
assurance frameworks and training to implement the common 
framework. 
 
A Role for Private Industry 
--------------------------- 
 
¶27.  (SBU) Markoff and Gupta agreed that if the private 
sector and industry associations participate in the CSF, they 
would be included in the plenaries and could make their own 
presentations in that venue.  Markoff suggested that in 
addition to IT industry representation, IT clients and firms 
involved in critical infrastructure (banking, 
telecommunications, utilities, and transportation, for 
example) should be invited.  The delegation need not be huge, 
but American firms want to engage with their Indian 
counterparts, to foster deeper relations, but with a 
government component as the framework to facilitate an 
industry-to-industry dialogue, she stated.  Gupta replied 
that the 2004 NASSCOM-ITAA conference had set the stage, and 
cybersecurity awareness has risen dramatically since the 2002 
CSF.  Markoff observed that the private sector must be part 
of the solution, as states cannot legislate strong 
cybersecurity protections into existence. 
 
¶28.  (SBU) Gupta observed that once private firms realize how 
much business will be tied to firms that work in a secure 
environment, they might end up pressuring governments into 
action.  A few years ago there was marked resistance to 
adopting the common criteria for software assurance, he said, 
but now "all objections are gone."  Many firms are only now 
beginning to understand the difference between information 
technology and information security.  Markoff replied that as 
more firms lose productivity and business through 
cyber-attacks, worms, viruses, etc., fewer will require 
convincing. 
 
¶29.  (SBU) Markoff said that US industry participation would 
be based in part on the Indian list.  She also offered that 
there could be sector-based break-out sessions for the 
commercial delegates.  Specifically, Markoff said US firms 
would like to have Indian companies like TATA, WIPRO, and 
InfoSys represented, as well as national universities and 
research laboratories.  Gupta promised to forward an Indian 
private-sector list, but cautioned that if they were unable 
to form a good delegation, they may rely on CII or NASSCOM 
representatives who could then report back to their members. 
 
¶30.  (SBU) Markoff suggested a list of possible issues and 
topics that would interest private industry, and that private 
sector participants could brief on: 
 
-- E-signatures; 
-- Bilateral certification authority; 
-- Security procedures; 
-- Technical and language skills; 
-- Outsourcing; 
-- Business activity disruption/disaster recovery; 
-- Help desk/call center operations; 
-- E-security with handheld devices; 
-- Cybercrime laws; 
-- Enforcement of privacy laws/standards; 
-- Data privacy (including why India does not need to adopt 
the EU Privacy Law); 
-- Need to enforce IPR; 
-- Data protection laws; 
-- Online database protection; 
-- Physical security, including biometrics and closed circuit 
monitoring; 
-- GPS issues; 
-- Public safety concerns; 
-- Outreach to small and mid-sized firms; and 
-- Protecting financial data. 
 
Site Visits 
----------- 
 
¶31.  (SBU) Markoff, Bloechl and Gupta agreed that appropriate 
site visits would be of great value.  Bloechl suggested that 
the defense WG could visit the Joint Task Force on November 
8, before the plenary.  Markoff added that a visit to US-CERT 
could also be planned for some of the other working groups. 
Both parties agreed that site visits would take place on 
November 8, on the basis of a list of sites the Indian 
delegation would like to visit. 
 
Training Requests and Funding 
----------------------------- 
 
¶32.  (SBU) The most important item on New Delhi's training 
agenda is capacity building, Gupta reported.  He emphasized 
the desire for expert exchanges and hands-on, side-by-side 
training.  Admitting that funding, scheduling, and logistics 
for sending Indian cybersecurity professionals to the US were 
issues that needed to be worked out, Gupta offered to host 
American cybersecurity experts "for three days, or two 
months, or more" at Indian cybersecurity facilities and 
classes.  Markoff and Gupta agreed that this would be a good 
issue for the CSF working groups to firm up.  When Gupta 
pressed for working exchanges and hands-on training for 
CERT-In personnel at US-CERT, or vice versa, Bloechl 
cautioned him that most of the military CERTs, operations 
are at the top secret level, though there might be 
opportunities to observe operations at lower classifications. 
 
 
¶33.  (SBU) The US and Indian delegations briefly reviewed the 
September 3 GOI request for cyber forensics training (Ref A). 
When Gupta asked about funding, Markoff responded that there 
were few options due to budget constraints.  She remarked 
that there may be opportunities, however, and noted that INL 
had funded training in Mumbai in 2003, but there is no clear 
answer yet on USG funding for non-military cybersecurity 
training.  Markoff, Bloechl, Saini and Jena discussed the 
possibilities and limitations of funding via IMET, FMS and 
the DOD CT Fellowship Program.  Markoff reported that several 
military training facilities that offer the kinds of courses 
the GOI sought now qualify for IMET.  Markoff also suggested 
that the Monterey Naval Postgraduate School could customize 
senior-level courses for GOI groups.  ODC Maj. Greg Winston 
added that Mobile Training Teams were another option, which 
could be brought to India under defense cooperation programs. 
 He added that some IT-related courses are now covered under 
IMET.  Two important hurdles, however, were that India's 
total IMET allocation for 2005 will be $1.4 million, and that 
courses must be at least five weeks in duration.  Both 
delegations agreed to continue the discussion in Washington. 
 
Lobbying for 24/7 Cybercrime POC Resolution 
------------------------------------------- 
 
¶34.  (SBU) Markoff asked Gupta for GOI support for a 
US-drafted UNGA resolution calling for all UN Member States 
to join the 24/7 Cybercrime Point of Contact Network 
originally created by the G-8.  She said it would be the 
fifth resolution on cybersecurity.  Gupta reacted positively 
and asked for a copy of the draft resolution.  (NOTE: Embassy 
forwarded the draft resolution via the MEA.) 
 
GOI's Cybersecurity Vision 
-------------------------- 
 
¶35.  (SBU) Gupta's short-term vision for GOI,s cybersecurity 
posture is to have dedicated cybersecurity officers in all 
government sectors capable of handling all ministry-related 
aspects of cybersecurity, whether a cyber attack occurs 
within a ministry or in the private sector areas the ministry 
oversees.  This platform would then grow to include a fully 
functioning CERT for each sector, with all reporting to and 
deriving training from CERT-In.  Gupta acknowledged that a 
dearth of trained personnel was slowing progress, which was 
the impetus behind what he called "inculcating a culture of 
cybersecurity into the private sector," first by mandating a 
cybersecurity requirement in engineering college curricula. 
Saini elaborated that he would like to see cybersecurity 
training represent 5 percent of education within the IT 
sector, up from his estimate of 0.01 percent, by 2008. 
Eventually, he hoped that every IT professional would 
consider cybersecurity to be part of his bailiwick.  Saini 
acknowledged that this would represent a massive investment 
by both the government and private industry, and that it 
would have to be a joint effort and not two parallel tracks. 
 
High-Level Policy Support 
------------------------- 
 
¶36.  (SBU) Noting that cybersecurity enjoys high-level 
support from NSA Dixit, chairman of the National Information 
Board (NIB) which keeps cybersecurity as a top-level policy 
interest, Gupta described the NIB as "very big," comprising 
MEA, MHA, Finance, MOD, DIT, the economic sectoral 
ministries, and law enforcement agencies.  It meets every 
three months. 
 
Other Cybersecurity Relationships Pale In Comparison 
--------------------------------------------- ------- 
 
¶37.  (SBU) Gupta said that although cybersecurity is clearly 
an issue of international importance, the Indo-US CSF is New 
Delhi's only substantial bilateral cybersecurity 
relationship.  There had been some efforts at cooperation 
with Canada and Israel, "but they never took off."  He also 
dismissed GOI efforts to foment cybersecurity cooperation 
with Russia without elaborating on them. 
 
CSF Framework 
------------- 
 
¶38.  (SBU) Markoff and Gupta agreed on the following 
structure for the five working groups and their co-chairs as 
follows: 
 
Working Group 1: Legal Cooperation and Law Enforcement.  USG 
co-chair Anthony Teelucksingh (Computer Crime and 
Intellectual Property Section, DOJ), GOI co-chair Ms. Renuka 
Muttoo, Joint Director, Ministry of Home Affairs. 
 
Working Group 2: Research and Development.  USG co-chair Stan 
Riveles (Office of the S&T Advisor to the Secretary), GOI 
co-chair Dr. AK Chakravarti (Advisor, Department of 
Information Technology, Ministry of Communications and 
Information Technology) (NOTE: The GOI co-chair was later 
changed to Dr. N Sitaram, Director Defense Research and 
Development Organization (DRDO)/Center for Artificial 
Intelligence and Robotics (CAIR)  END NOTE.). 
 
Working Group 3: Critical Infrastructure Protection, Watch, 
Warning, and Emergency Response.  USG co-chair Andy Purdy 
(DHS National Cyber Security Division), GOI co-chair Dr. KK 
Bajaj (Director/CERT-In). (NOTE: "Emergency Response" was 
added to working group name to facilitate Bajaj's 
participation.  END NOTE.) 
 
Working Group 4: Defense Cooperation.  USG co-chair Tim 
Bloechl (DOD Director of International Information Assurance 
Programs), GOI co-chair Mr. SK Sharma (Joint Secretary, 
Ministry of Defense). 
 
Working Group 5: Standards.  USG co-chair Dr. Ron Ross 
(NIST), GOI co-chair Dr. SL Sarnot (Director General, 
Standards/Testing/Quality Certification Directorate, Ministry 
of Communications and Information Technology). 
 
¶39.  (SBU) The two-day government-to-government forum was 
tentatively agreed to be structured as follows: 
 
-- 11/9 morning: A comprehensive plenary session with all 
delegates attending.  Working groups give short presentations 
of key challenges and accomplishments in their fields. 
-- 11/9 afternoon: Plenary continues.  Working groups 
continue their briefings. 
-- 11/10 morning: Working groups break out into separate 
meetings. 
-- 11/10 afternoon: Plenary reconvenes for lunch.  Working 
groups report progress and road maps outlining next steps. 
Prepare joint statement. 
 
USG Participants 
---------------- 
 
¶40.  (SBU) The following USG personnel participated in the 
preparatory consultations: 
 
Michele Markoff, Senior Coordinator for International 
Critical Infrastructure Protection Policy, State/PM 
Tim Bloechl, Director of International Information Assurance 
Programs, DOD 
Linda Hall, US Embassy New Delhi, ORA 
Howard Madnick, US Embassy New Delhi, POL 
Maj. Greg Winston, US Embassy New Delhi, ODC 
 
GOI Participants 
---------------- 
 
¶41.  (SBU) The following GOI officials participated in the 
preparatory consultations: 
 
Arvind Gupta, Joint Secretary, NSCS (Ref B) 
Commander Mukesh Saini, Deputy Director (Information 
Security), NSCS (Ref B) 
Rajesh Mohan, Joint Director, National Security Council 
Secretariat 
 
SIPDIS 
Commodore J Jena, HQ Integrated Defense Staff/DACIDS 
(Information Warfare/Information Technology) 
Renuka Muttoo, Joint Director, Ministry of Home Affairs 
Dr. G Athithan, Defense Research and Development Organization 
(DRDO)/Center for Artificial Intelligence and Robotics 
Dr. SL Sarnot, Director General Standards/Testing/Quality 
Certification Directorate, Ministry of Communications and 
Information Technology, Department of Information Technology 
S Basu, Senior Director, DIT 
ASA Krishnan, Director R&D, DIT 
Anil Sagar, Operations Manager, CERT-In 
Sabyasachi Chakrabarty, Scientist B, CERT-In, DIT 
 
¶42.  (U) Senior Coordinator Michele Markoff cleared this 
message. 
MULFORD