Keep Us Strong WikiLeaks logo

Currently released so far... 251287 / 251,287

Articles

Browse latest releases

Browse by creation date

Browse by origin

A B C D F G H I J K L M N O P Q R S T U V W Y Z

Browse by tag

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
AEMR ASEC AMGT AE AS AMED AVIAN AU AF AORC AGENDA AO AR AM APER AFIN ATRN AJ ABUD ARABL AL AG AODE ALOW ADANA AADP AND APECO ACABQ ASEAN AA AFFAIRS AID AGR AY AGS AFSI AGOA AMB ARF ANET ASCH ACOA AFLU AFSN AMEX AFDB ABLD AESC AFGHANISTAN AINF AVIATION ARR ARSO ANDREW ASSEMBLY AIDS APRC ASSK ADCO ASIG AC AZ APEC AFINM ADB AP ACOTA ASEX ACKM ASUP ANTITERRORISM ADPM AINR ARABLEAGUE AGAO AORG AMTC AIN ACCOUNT ASECAFINGMGRIZOREPTU AIDAC AINT ARCH AMGTKSUP ALAMI AMCHAMS ALJAZEERA AVIANFLU AORD AOREC ALIREZA AOMS AMGMT ABDALLAH AORCAE AHMED ACCELERATED AUC ALZUGUREN ANGEL AORL ASECIR AMG AMBASSADOR AEMRASECCASCKFLOMARRPRELPINRAMGTJMXL ADM ASES ABMC AER AMER ASE AMGTHA ARNOLDFREDERICK AOPC ACS AFL AEGR ASED AFPREL AGRI AMCHAM ARNOLD AN ANATO AME APERTH ASECSI AT ACDA ASEDC AIT AMERICA AMLB AMGE ACTION AGMT AFINIZ ASECVE ADRC ABER AGIT APCS AEMED ARABBL ARC ASO AIAG ACEC ASR ASECM ARG AEC ABT ADIP ADCP ANARCHISTS AORCUN AOWC ASJA AALC AX AROC ARM AGENCIES ALBE AK AZE AOPR AREP AMIA ASCE ALANAZI ABDULRAHMEN ABDULHADI AINFCY ARMS ASECEFINKCRMKPAOPTERKHLSAEMRNS AGRICULTURE AFPK AOCR ALEXANDER ATRD ATFN ABLG AORCD AFGHAN ARAS AORCYM AVERY ALVAREZ ACBAQ ALOWAR ANTOINE ABLDG ALAB AMERICAS AFAF ASECAFIN ASEK ASCC AMCT AMGTATK AMT APDC AEMRS ASECE AFSA ATRA ARTICLE ARENA AISG AEMRBC AFR AEIR ASECAF AFARI AMPR ASPA ASOC ANTONIO AORCL ASECARP APRM AUSTRALIAGROUP ASEG AFOR AEAID AMEDI ASECTH ASIC AFDIN AGUIRRE AUNR ASFC AOIC ANTXON ASA ASECCASC ALI AORCEUNPREFPRELSMIGBN ASECKHLS ASSSEMBLY ASECVZ AI ASECPGOV ASIR ASCEC ASAC ARAB AIEA ADMIRAL AUSGR AQ AMTG ARRMZY ANC APR AMAT AIHRC AFU ADEL AECL ACAO AMEMR ADEP AV AW AOR ALL ALOUNI AORCUNGA ALNEA ASC AORCO ARMITAGE AGENGA AGRIC AEM ACOAAMGT AGUILAR AFPHUM AMEDCASCKFLO AFZAL AAA ATPDEA ASECPHUM ASECKFRDCVISKIRFPHUMSMIGEG
ETRD ETTC EU ECON EFIN EAGR EAID ELAB EINV ENIV ENRG EPET EZ ELTN ELECTIONS ECPS ET ER EG EUN EIND ECONOMICS EMIN ECIN EINT EWWT EAIR EN ENGR ES EI ETMIN EL EPA EARG EFIS ECONOMY EC EK ELAM ECONOMIC EAR ESDP ECCP ELN EUM EUMEM ECA EAP ELEC ECOWAS EFTA EXIM ETTD EDRC ECOSOC ECPSN ENVIRONMENT ECO EMAIL ECTRD EREL EDU ENERG ENERGY ENVR ETRAD EAC EXTERNAL EFIC ECIP ERTD EUC ENRGMO EINZ ESTH ECCT EAGER ECPN ELNT ERD EGEN ETRN EIVN ETDR EXEC EIAD EIAR EVN EPRT ETTF ENGY EAIDCIN EXPORT ETRC ESA EIB EAPC EPIT ESOCI ETRB EINDQTRD ENRC EGOV ECLAC EUR ELF ETEL ENRGUA EVIN EARI ESCAP EID ERIN ELAN ENVT EDEV EWWY EXBS ECOM EV ELNTECON ECE ETRDGK EPETEIND ESCI ETRDAORC EAIDETRD ETTR EMS EAGRECONEINVPGOVBN EBRD EUREM ERGR EAGRBN EAUD EFI ETRDEINVECINPGOVCS EPEC ETRO ENRGY EGAR ESSO EGAD ENV ENER EAIDXMXAXBXFFR ELA EET EINVETRD EETC EIDN ERGY ETRDPGOV EING EMINCG EINVECON EURM EEC EICN EINO EPSC ELAP ELABPGOVBN EE ESPS ETRA ECONETRDBESPAR ERICKSON EEOC EVENTS EPIN EB ECUN EPWR ENG EX EH EAIDAR EAIS ELBA EPETUN ETRDEIQ EENV ECPC ETRP ECONENRG EUEAID EWT EEB EAIDNI ESENV EADM ECN ENRGKNNP ETAD ETR ECONETRDEAGRJA ETRG ETER EDUC EITC EBUD EAIF EBEXP EAIDS EITI EGOVSY EFQ ECOQKPKO ETRGY ESF EUE EAIC EPGOV ENFR EAGRE ENRD EINTECPS EAVI ETC ETCC EIAID EAIDAF EAGREAIDPGOVPRELBN EAOD ETRDA EURN EASS EINVA EAIDRW EON ECOR EPREL EGPHUM ELTM ECOS EINN ENNP EUPGOV EAGRTR ECONCS ETIO ETRDGR EAIDB EISNAR EIFN ESPINOSA EAIDASEC ELIN EWTR EMED ETFN ETT EADI EPTER ELDIN EINVEFIN ESS ENRGIZ EQRD ESOC ETRDECD ECINECONCS EAIT ECONEAIR ECONEFIN EUNJ ENRGKNNPMNUCPARMPRELNPTIAEAJMXL ELAD EFIM ETIC EFND EFN ETLN ENGRD EWRG ETA EIN EAIRECONRP EXIMOPIC ERA ENRGJM ECONEGE ENVI ECHEVARRIA EMINETRD EAD ECONIZ EENG ELBR EWWC ELTD EAIDMG ETRK EIPR EISNLN ETEX EPTED EFINECONCS EPCS EAG ETRDKIPR ED EAIO ETRDEC ENRGPARMOTRASENVKGHGPGOVECONTSPLEAID ECONEINVEFINPGOVIZ ERNG EFINU EURFOR EWWI ELTNSNAR ETD EAIRASECCASCID EOXC ESTN EAIDAORC EAGRRP ETRDEMIN ELABPHUMSMIGKCRMBN ETRDEINVTINTCS EGHG EAIDPHUMPRELUG EAGRBTIOBEXPETRDBN EDA EPETPGOV ELAINE EUCOM EMW EFINECONEAIDUNGAGM ELB EINDETRD EMI ETRDECONWTOCS EINR ESTRADA EHUM EFNI ELABV ENR EMN EXO EWWTPRELPGOVMASSMARRBN EATO END EP EINVETC ECONEFINETRDPGOVEAGRPTERKTFNKCRMEAID ELTRN EIQ ETTW EAI ENGRG ETRED ENDURING ETTRD EAIDEGZ EOCN EINF EUPREL ENRL ECPO ENLT EEFIN EPPD ECOIN EUEAGR EISL EIDE ENRGSD EINVECONSENVCSJA EAIG ENTG EEPET EUNCH EPECO ETZ EPAT EPTE EAIRGM ETRDPREL EUNGRSISAFPKSYLESO ETTN EINVKSCA ESLCO EBMGT ENRGTRGYETRDBEXPBTIOSZ EFLU ELND EFINOECD EAIDHO EDUARDO ENEG ECONEINVETRDEFINELABETRDKTDBPGOVOPIC EFINTS ECONQH ENRGPREL EUNPHUM EINDIR EPE EMINECINECONSENVTBIONS EFINM ECRM EQ EWWTSP ECONPGOVBN
KFLO KPKO KDEM KFLU KTEX KMDR KPAO KCRM KIDE KN KNNP KG KMCA KZ KJUS KWBG KU KDMR KAWC KCOR KPAL KOMC KTDB KTIA KISL KHIV KHUM KTER KCFE KTFN KS KIRF KTIP KIRC KSCA KICA KIPR KPWR KWMN KE KGIC KGIT KSTC KACT KSEP KFRD KUNR KHLS KCRS KRVC KUWAIT KVPR KSRE KMPI KMRS KNRV KNEI KCIP KSEO KITA KDRG KV KSUM KCUL KPET KBCT KO KSEC KOLY KNAR KGHG KSAF KWNM KNUC KMNP KVIR KPOL KOCI KPIR KLIG KSAC KSTH KNPT KINL KPRP KRIM KICC KIFR KPRV KAWK KFIN KT KVRC KR KHDP KGOV KPOW KTBT KPMI KPOA KRIF KEDEM KFSC KY KGCC KATRINA KWAC KSPR KTBD KBIO KSCI KRCM KNNB KBNC KIMT KCSY KINR KRAD KMFO KCORR KW KDEMSOCI KNEP KFPC KEMPI KBTR KFRDCVISCMGTCASCKOCIASECPHUMSMIGEG KNPP KTTB KTFIN KBTS KCOM KFTN KMOC KOR KDP KPOP KGHA KSLG KMCR KJUST KUM KMSG KHPD KREC KIPRTRD KPREL KEN KCSA KCRIM KGLB KAKA KWWT KUNP KCRN KISLPINR KLFU KUNC KEDU KCMA KREF KPAS KRKO KNNC KLHS KWAK KOC KAPO KTDD KOGL KLAP KECF KCRCM KNDP KSEAO KCIS KISM KREL KISR KISC KKPO KWCR KPFO KUS KX KWCI KRFD KWPG KTRD KH KLSO KEVIN KEANE KACW KWRF KNAO KETTC KTAO KWIR KVCORR KDEMGT KPLS KICT KWGB KIDS KSCS KIRP KSTCPL KDEN KLAB KFLOA KIND KMIG KPPAO KPRO KLEG KGKG KCUM KTTP KWPA KIIP KPEO KICR KNNA KMGT KCROM KMCC KLPM KNNPGM KSIA KSI KWWW KOMS KESS KMCAJO KWN KTDM KDCM KCM KVPRKHLS KENV KCCP KGCN KCEM KEMR KWMNKDEM KNNPPARM KDRM KWIM KJRE KAID KWMM KPAONZ KUAE KTFR KIF KNAP KPSC KSOCI KCWI KAUST KPIN KCHG KLBO KIRCOEXC KI KIRCHOFF KSTT KNPR KDRL KCFC KLTN KPAOKMDRKE KPALAOIS KESO KKOR KSMT KFTFN KTFM KDEMK KPKP KOCM KNN KISLSCUL KFRDSOCIRO KINT KRG KWMNSMIG KSTCC KPAOY KFOR KWPR KSEPCVIS KGIV KSEI KIL KWMNPHUMPRELKPAOZW KQ KEMS KHSL KTNF KPDD KANSOU KKIV KFCE KTTC KGH KNNNP KK KSCT KWNN KAWX KOMCSG KEIM KTSD KFIU KDTB KFGM KACP KWWMN KWAWC KSPA KGICKS KNUP KNNO KISLAO KTPN KSTS KPRM KPALPREL KPO KTLA KCRP KNMP KAWCK KCERS KDUM KEDM KTIALG KWUN KPTS KPEM KMEPI KAWL KHMN KCRO KCMR KPTD KCROR KMPT KTRF KSKN KMAC KUK KIRL KEM KSOC KBTC KOM KINP KDEMAF KTNBT KISK KRM KWBW KBWG KNNPMNUC KNOP KSUP KCOG KNET KWBC KESP KMRD KEBG KFRDKIRFCVISCMGTKOCIASECPHUMSMIGEG KPWG KOMCCO KRGY KNNF KPROG KJAN KFRED KPOKO KM KWMNCS KMPF KJWC KJU KSMIG KALR KRAL KDGOV KPA KCRMJA KCRI KAYLA KPGOV KRD KNNPCH KFEM KPRD KFAM KALM KIPRETRDKCRM KMPP KADM KRFR KMWN KWRG KTIAPARM KTIAEUN KRDP KLIP KDDEM KTIAIC KWKN KPAD KDM KRCS KWBGSY KEAI KIVP KPAOPREL KUNH KTSC KIPT KNP KJUSTH KGOR KEPREL KHSA KGHGHIV KNNR KOMH KRCIM KWPB KWIC KINF KPER KILS KA KNRG KCSI KFRP KLFLO KFE KNPPIS KQM KQRDQ KERG KPAOPHUM KSUMPHUM KVBL KARIM KOSOVO KNSD KUIR KWHG KWBGXF KWMNU KPBT KKNP KERF KCRT KVIS KWRC KVIP KTFS KMARR KDGR KPAI KDE KTCRE KMPIO KUNRAORC KHOURY KAWS KPAK KOEM KCGC KID KVRP KCPS KIVR KBDS KWOMN KIIC KTFNJA KARZAI KMVP KHJUS KPKOUNSC KMAR KIBL KUNA KSA KIS KJUSAF KDEV KPMO KHIB KIRD KOUYATE KIPRZ KBEM KPAM KDET KPPD KOSCE KJUSKUNR KICCPUR KRMS KWMNPREL KWMJN KREISLER KWM KDHS KRV KPOV KWMNCI KMPL KFLD KWWN KCVM KIMMITT KCASC KOMO KNATO KDDG KHGH KRF KSCAECON KWMEN KRIC
PREL PINR PGOV PHUM PTER PE PREF PARM PBTS PINS PHSA PK PL PM PNAT PHAS PO PROP PGOVE PA PU POLITICAL PPTER POL PALESTINIAN PHUN PIN PAMQ PPA PSEC POLM PBIO PSOE PDEM PAK PF PKAO PGOVPRELMARRMOPS PMIL PV POLITICS PRELS POLICY PRELHA PIRN PINT PGOG PERSONS PRC PEACE PROCESS PRELPGOV PROV PFOV PKK PRE PT PIRF PSI PRL PRELAF PROG PARMP PERL PUNE PREFA PP PGOB PUM PROTECTION PARTIES PRIL PEL PAGE PS PGO PCUL PLUM PIF PGOVENRGCVISMASSEAIDOPRCEWWTBN PMUC PCOR PAS PB PKO PY PKST PTR PRM POUS PRELIZ PGIC PHUMS PAL PNUC PLO PMOPS PHM PGOVBL PBK PELOSI PTE PGOVAU PNR PINSO PRO PLAB PREM PNIR PSOCI PBS PD PHUML PERURENA PKPA PVOV PMAR PHUMCF PUHM PHUH PRELPGOVETTCIRAE PRT PROPERTY PEPFAR PREI POLUN PAR PINSF PREFL PH PREC PPD PING PQL PINSCE PGV PREO PRELUN POV PGOVPHUM PINRES PRES PGOC PINO POTUS PTERE PRELKPAO PRGOV PETR PGOVEAGRKMCAKNARBN PPKO PARLIAMENT PEPR PMIG PTBS PACE PETER PMDL PVIP PKPO POLMIL PTEL PJUS PHUMNI PRELKPAOIZ PGOVPREL POGV PEREZ POWELL PMASS PDOV PARN PG PPOL PGIV PAIGH PBOV PETROL PGPV PGOVL POSTS PSO PRELEU PRELECON PHUMPINS PGOVKCMABN PQM PRELSP PRGO PATTY PRELPGOVEAIDECONEINVBEXPSCULOIIPBTIO PGVO PROTESTS PRELPLS PKFK PGOVEAIDUKNOSWGMHUCANLLHFRSPITNZ PARAGRAPH PRELGOV POG PTRD PTERM PBTSAG PHUMKPAL PRELPK PTERPGOV PAO PRIVATIZATION PSCE PPAO PGOVPRELPHUMPREFSMIGELABEAIDKCRMKWMN PARALYMPIC PRUM PKPRP PETERS PAHO PARMS PGREL PINV POINS PHUMPREL POREL PRELNL PHUMPGOV PGOVQL PLAN PRELL PARP PROVE PSOC PDD PRELNP PRELBR PKMN PGKV PUAS PRELTBIOBA PBTSEWWT PTERIS PGOVU PRELGG PHUMPRELPGOV PFOR PEPGOV PRELUNSC PRAM PICES PTERIZ PREK PRELEAGR PRELEUN PHUME PHU PHUMKCRS PRESL PRTER PGOF PARK PGOVSOCI PTERPREL PGOVEAID PGOVPHUMKPAO PINSKISL PREZ PGOVAF PARMEUN PECON PINL POGOV PGOVLO PIERRE PRELPHUM PGOVPZ PGOVKCRM PBST PKPAO PHUMHUPPS PGOVPOL PASS PPGOV PROGV PAGR PHALANAGE PARTY PRELID PGOVID PHUMR PHSAQ PINRAMGT PSA PRELM PRELMU PIA PINRPE PBTSRU PARMIR PEDRO PNUK PVPR PINOCHET PAARM PRFE PRELEIN PINF PCI PSEPC PGOVSU PRLE PDIP PHEM PRELB PORG PGGOC POLG POPDC PGOVPM PWMN PDRG PHUMK PINB PRELAL PRER PFIN PNRG PRED POLI PHUMBO PHYTRP PROLIFERATION PHARM PUOS PRHUM PUNR PENA PGOVREL PETRAEUS PGOVKDEM PGOVENRG PHUS PRESIDENT PTERKU PRELKSUMXABN PGOVSI PHUMQHA PKISL PIR PGOVZI PHUMIZNL PKNP PRELEVU PMIN PHIM PHUMBA PUBLIC PHAM PRELKPKO PMR PARTM PPREL PN PROL PDA PGOVECON PKBL PKEAID PERM PRELEZ PRELC PER PHJM PGOVPRELPINRBN PRFL PLN PWBG PNG PHUMA PGOR PHUMPTER POLINT PPEF PKPAL PNNL PMARR PAC PTIA PKDEM PAUL PREG PTERR PTERPRELPARMPGOVPBTSETTCEAIRELTNTC PRELJA POLS PI PNS PAREL PENV PTEROREP PGOVM PINER PBGT PHSAUNSC PTERDJ PRELEAID PARMIN PKIR PLEC PCRM PNET PARR PRELETRD PRELBN PINRTH PREJ PEACEKEEPINGFORCES PEMEX PRELZ PFLP PBPTS PTGOV PREVAL PRELSW PAUM PRF PHUMKDEM PATRICK PGOVKMCAPHUMBN PRELA PNUM PGGV PGOVSMIGKCRMKWMNPHUMCVISKFRDCA PBT PIND PTEP PTERKS PGOVJM PGOT PRELMARR PGOVCU PREV PREFF PRWL PET PROB PRELPHUMP PHUMAF PVTS PRELAFDB PSNR PGOVECONPRELBU PGOVZL PREP PHUMPRELBN PHSAPREL PARCA PGREV PGOVDO PGON PCON PODC PRELOV PHSAK PSHA PGOVGM PRELP POSCE PGOVPTER PHUMRU PINRHU PARMR PGOVTI PPEL PMAT PAN PANAM PGOVBO PRELHRC

Browse by classification

Community resources

courage is contagious

Viewing cable 06NEWDELHI93, PRODUCTIVE PREP TALKS POINT TO A SUCCESSFUL

If you are new to these pages, please read an introduction on the structure of a cable as well as how to discuss them with others. See also the FAQs

Understanding cables
Every cable message consists of three parts:
  • The top box shows each cables unique reference number, when and by whom it originally was sent, and what its initial classification was.
  • The middle box contains the header information that is associated with the cable. It includes information about the receiver(s) as well as a general subject.
  • The bottom box presents the body of the cable. The opening can contain a more specific subject, references to other cables (browse by origin to find them) or additional comment. This is followed by the main contents of the cable: a summary, a collection of specific topics and a comment section.
To understand the justification used for the classification of each cable, please use this WikiSource article as reference.

Discussing cables
If you find meaningful or important information in a cable, please link directly to its unique reference number. Linking to a specific paragraph in the body of a cable is also possible by copying the appropriate link (to be found at theparagraph symbol). Please mark messages for social networking services like Twitter with the hash tags #cablegate and a hash containing the reference ID e.g. #06NEWDELHI93.
Reference ID Created Released Classification Origin
06NEWDELHI93 2006-01-05 12:38 2011-08-30 01:44 UNCLASSIFIED//FOR OFFICIAL USE ONLY Embassy New Delhi
VZCZCXRO3357
PP RUEHBI RUEHCI
DE RUEHNE #0093/01 0051238
ZNR UUUUU ZZH
P 051238Z JAN 06
FM AMEMBASSY NEW DELHI
TO RUEHC/SECSTATE WASHDC PRIORITY 8212
INFO RUEHRL/AMEMBASSY BERLIN 0444
RUEHBY/AMEMBASSY CANBERRA 0822
RUEHIL/AMEMBASSY ISLAMABAD 5510
RUEHBUL/AMEMBASSY KABUL 2183
RUEHLO/AMEMBASSY LONDON 7641
RUEHMO/AMEMBASSY MOSCOW 6010
RUEHOT/AMEMBASSY OTTAWA 0513
RUEHFR/AMEMBASSY PARIS 0751
RUEHRO/AMEMBASSY ROME 1117
RUEHUL/AMEMBASSY SEOUL 0851
RUEHKO/AMEMBASSY TOKYO 2533
RUEHWL/AMEMBASSY WELLINGTON 0134
RUEHCI/AMCONSUL CALCUTTA 0684
RUEHCG/AMCONSUL CHENNAI 0346
RUEHBI/AMCONSUL MUMBAI 9601
RUEAWJA/DEPT OF JUSTICE WASHDC
RHEHNSC/NSC WASHDC
RUEHGV/USMISSION GENEVA 0496
RUEIDN/DNI WASHINGTON DC
RUEKJCS/JOINT STAFF WASHDC
RUCNDT/USMISSION USUN NEW YORK 8356
RUEKJCS/SECDEF WASHDC
RUEHNO/USMISSION USNATO 0078
RHMFISS/HQ USCENTCOM MACDILL AFB FL
RHHMUNA/HQ USPACOM HONOLULU HI
RHMFISS/CDR USCENTCOM MACDILL AFB FL
UNCLAS SECTION 01 OF 04 NEW DELHI 000093 
 
SIPDIS 
 
SENSITIVE 
SIPDIS 
 
STATE FOR PM ERUSSELL, MMARKOFF 
JUSTICE FOR ATEELUCKSINGH 
 
E.O. 12958: N/A 
TAGS: PGOV PINR KCIP TINT PTER EFIN ECPS KTFN EAIR
ELTN, IN 
SUBJECT: PRODUCTIVE PREP TALKS POINT TO A SUCCESSFUL 
JANUARY CYBERSECURITY EXCHANGE 
 
REF: NEW DELHI 9249 
 
1.  (SBU) Summary: A well-organized and highly motivated 
National Security Council Secretariat (NSCS) Information 
Security Specialist and head of the National Information 
Security Coordination Cell Commander Mukesh Saini met on 
December 20 with PM/PPA Deputy Coordinator for International 
Critical Infrastructure Protection Policy Erica Russell to 
block out the agenda for the January 16-17, 2006, 
Cybersecurity Forum in New Delhi.  MEA Director (Americas) 
Gaitri Kumar also attended but offered no substantial inputs. 
 In 90 minutes Saini and Russell reviewed the status and 
expected progress of the five working groups (WGs), discussed 
GOI proposals for additional WGs to address transportation 
and financial sector issues, and fleshed out GOI thinking on 
additional structures to advance the cybersecurity 
relationship (joint training, a joint operations fund, and a 
statement of principles.)  The discussion was later joined by 
PolCouns and NSCS Joint Secretary Arvind Gupta; all sides 
reported satisfaction with the meeting and predict a 
productive exchange in January.  End Summary. 
 
Where We Are, Where We're Going 
------------------------------- 
 
2.  (SBU) Saini described the US-India cybersecurity 
relationship as evolving in the right direction: "The first 
plenary (in 2002) was a political statement, the second (in 
2004) was getting to know each other and grasping the subject 
and its contours.  Now, the third (January 2006) should be 
moving into exchanges of experts, documents, and technology." 
 He recalled that the Cybersecurity Forum predates the 
Information and Communications Technology (ICT) WG and the 
High Technology Cooperative Group (HTCG).  Russell reported 
that the WG co-chairs found the bilateral workshops and 
seminars held from April-September 2005 to be very useful, 
and that the USG interlocutors look forward to the January 
plenary. 
 
Structure for the January Plenary 
--------------------------------- 
 
3.  (SBU) Saini and Russell agreed that the Cybersecurity 
Forum would convene at Vigyan Bhawan (a large, modern, 
GOI-owned conference facility in central Delhi), which 
reflects the priority New Delhi attaches to this exchange. 
The group would meet in plenary on January 16; NSA Narayanan 
or D/NSA Nambiar will provide the opening address, followed 
by opening remarks from the GOI and USG delegation heads. 
For January 17, the WGs would meet for the first half of the 
day, and report their progress at the plenary's conclusion. 
Russell and Saini agreed that the focus of presentations 
should be on the way ahead, not on recapping past 
accomplishments. 
 
Three WGs Ready to Go 
--------------------- 
 
4.  (SBU) Russell passed Saini a list from Anthony 
 
NEW DELHI 00000093  002 OF 004 
 
 
Teelucksingh of DOJ's Computer Crime and Intellectual 
Property Section outlining the topics DOJ wants to cover in 
January, and relayed that Teelucksingh was pleased with the 
progress to date.  Saini responded that the list of topics 
appears to meet GOI's expectations. 
 
5.  (SBU) Russell told Saini that DHS Director for 
International Affairs and Public Policy (National 
Cybersecurity Division) Liesyl Franz and a US-CERT technical 
expert would attend in January.  She added that Franz had 
difficulty contacting the Indian co-chair for the Watch & 
Warning/Critical Infrastructure Protection WG, but the two 
were now coordinating for the plenary. 
 
6.  (SBU) Saini reported "reasonably good progress" from the 
Standards & Software Assurance WG (which he proposed, and 
Russell agreed, to rename "Standards & Assurances WG"). 
Russell told Saini that WG co-chair Dr. Ron Ross of NIST's 
Computer Security Division could not attend the January 
Forum, but a DOC colleague -- Dan Hurley of NTIA -- who is 
well versed in Ross's portfolio would fill in. 
 
R&D WG on Hold but Long-Term Health Assured 
------------------------------------------- 
 
7.  (SBU) Russell reported that there was no immediate 
successor to R&D co-chair Dr. Stan Riveles to attend the 
plenary, but a PM/PPA detailee, Dr. Bruce Averill, would come 
on board in early 2006 with the responsibility to revive the 
WG and to implement measurable initiatives with his 
counterpart.  Saini was pleased that Riveles' replacement 
would have a two-year tenure.  (NOTE: Saini's one abiding 
concern in recent months has been that frequent turnover in 
the GOI and USG would retard progress, forcing meetings to be 
postponed and the WGs to have to constantly get to know each 
other repeatedly.  End Note.) 
 
Industry-Industry Dialogue, "Offshoring the Offshoring" 
--------------------------------------------- ---------- 
 
8.  (SBU) Saini and Russell agreed on the importance of 
increasing industry's role, with Saini highlighting that 
industry is where the innovation lies, and Russell noting 
that US industry owns and operates most of the country's 
critical infrastructure.  Russell asked Saini if the topic of 
data protection in "offshoring the offshoring" (Indian BPOs 
farming out their business to third-country firms) would be 
too sensitive to include during the plenary, or if it should 
be discussed in private.  Saini readily suggested having an 
Indian BPO firm speak on the topic during the plenary, and 
Gupta later seconded the approval.  Saini requested a 
presentation on the role of the USG in Industry Sector 
Advisory Committees (ISACs). 
 
GOI Proposals for Financial, Transport WGs Moving Slowly 
--------------------------------------------- ----------- 
 
9.  (SBU) Saini outlined that the GOI's proposed Financial 
Sector WG would address both securing legitimate financial 
 
NEW DELHI 00000093  003 OF 004 
 
 
transactions and tracking illicit finances (Reftel).  Russell 
offered support for the proposal and is making the case to 
relevant USG agencies, but lining up appropriate partners is 
a slow process.  Saini admitted he was having the same 
difficulty enlisting the Finance Ministry.  The two agreed to 
invite US Treasury and Finance Ministry to the plenary as an 
educational exercise, and to work toward a Financial Sector 
WG later in 2006. (NOTE: US Treasury asked to meet with 
PM/PPA before the end of December to discuss possible 
participation in the Forum and international cyber security 
and CIP engagements in general.  Russell will advise of the 
outcome of these discussions afterwards.  End Note.) 
 
10.  (SBU) Saini acknowledged to Russell that the GOI had the 
greater need for transportation sector cybersecurity 
assistance.  Both agreed that, as US-India direct air links 
expand, the importance of securing airline passenger and 
cargo data grows rapidly; however, Saini nodded to the 
enormous volume of Indian rail traffic that presents in his 
view a more likely target for a cyber attack.  "Imagine if 
our national railway reservation system were locked for just 
one hour, the result would be chaos," he predicted.  Saini 
stated the Railways Ministry is beginning to stand up a CERT, 
but he doubted if either it or Civil Aviation Ministry could 
actively participate in the January Forum.  Saini and Russell 
agreed to encourage government and corporate transportation 
stakeholders to attend the plenary and the GOI-proposed 
January 20-21 seminar on Cybersecurity in the Civil Aviation 
Sector (Reftel) with an eye to forming a WG later in 2006. 
(NOTE: Upon return to D.C., Russell advised that she now has 
TSA contacts with whom she is discussing the administration's 
 
SIPDIS 
possible participation in the Forum and the subsequent GOI 
proposed Civil Aviation workshop.) 
 
GOI Joint Fund/Joint Institute Proposal: Looking for $$ 
--------------------------------------------- ---------- 
 
11.  (SBU) Russell told Saini that her office has been unable 
to locate funds in either the Department or DHS to support 
the GOI proposal for a Cybersecurity Joint Fund (Reftel), but 
they are still looking.  Saini suggested the two sides first 
agree to the concept, and secure funds (at a 50-50 split) 
further down the road.  He explained that the fund would help 
protect cybersecurity travel and training from the budget 
cycle.  Russell replied that she would have an answer on 
conceptual agreement by January.  On the Joint Institute, 
Saini reported that he would formally present a proposal 
after he fully clears the concept within the GOI. 
 
Something to Sign, Seal and Deliver 
----------------------------------- 
 
12.  (SBU) To Saini's request to enshrine our cybersecurity 
relationship in an agreement or protocol as a post-Forum 
deliverable, Russell suggested a declaration of principles -- 
which creates no new obligations, retains flexibility, and 
would be much faster to clear through the inter-agency 
process than a Letter of Agreement or Memorandum of 
Understanding.  Saini agreed to draft such a declaration. 
 
NEW DELHI 00000093  004 OF 004 
 
 
Subsequent discussions with PolCouns and Gupta indicated the 
desire to announce the declaration during POTUS's upcoming 
visit in early 2006. 
 
January Follow-Up: NSCS Doing its Homework 
------------------------------------------ 
 
13.  (SBU) In a January 5 follow-up conversation, Gupta 
informed PolCouns that the WG co-chairs would complete their 
draft agendas in the next 1-2 days.  He expects 8-10 Indian 
participants for each WG, and requests that the US side field 
at least 3-4 to ensure productive exchanges.  Characterizing 
the forthcoming event as an "open forum with a large GOI and 
industry presence," Gupta queried PolCouns to ensure a 
sizable delegation to represent US industry.  A draft of the 
proposed POTUS deliverable should also be ready before the 
plenary opens, to allow the USG side sufficient time to 
consider the language. 
 
Comment: Cooperation at the Speed of Thought 
-------------------------------------------- 
 
14.  (SBU) It is clear that this relationship is progressing 
well and shows excellent potential for further growth.  In 
many respects the only drags on the cybersecurity 
relationship are the constraints of money and bodies.  The 
NSCS and most of the WGs are firmly on board, if not leading 
the way, and Saini and Gupta appear willing to push any 
lagging GOI elements to maintain the momentum.  Saini's 
expansion plans for sector-specific interactions are 
generally of mutual interest, and he freely admits where 
Indian interests outweigh USG's (as in railways security). 
It is also noteworthy that NSCS clearly has the pen on this 
issue, with MEA along for the ride -- the Foreign Ministry 
simply does not have the expertise on this topic, although 
they are supporting it as best they can.  The GOI is focusing 
on what is achievable, and is for now avoiding USG redlines 
(such as steganography) to avoid any bottlenecks.  All signs 
point to mutually beneficial progress continuing in this area 
of our relationship. 
BLAKE