Keep Us Strong WikiLeaks logo

Currently released so far... 251287 / 251,287

Articles

Browse latest releases

Browse by creation date

Browse by origin

A B C D F G H I J K L M N O P Q R S T U V W Y Z

Browse by tag

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
AEMR ASEC AMGT AE AS AMED AVIAN AU AF AORC AGENDA AO AR AM APER AFIN ATRN AJ ABUD ARABL AL AG AODE ALOW ADANA AADP AND APECO ACABQ ASEAN AA AFFAIRS AID AGR AY AGS AFSI AGOA AMB ARF ANET ASCH ACOA AFLU AFSN AMEX AFDB ABLD AESC AFGHANISTAN AINF AVIATION ARR ARSO ANDREW ASSEMBLY AIDS APRC ASSK ADCO ASIG AC AZ APEC AFINM ADB AP ACOTA ASEX ACKM ASUP ANTITERRORISM ADPM AINR ARABLEAGUE AGAO AORG AMTC AIN ACCOUNT ASECAFINGMGRIZOREPTU AIDAC AINT ARCH AMGTKSUP ALAMI AMCHAMS ALJAZEERA AVIANFLU AORD AOREC ALIREZA AOMS AMGMT ABDALLAH AORCAE AHMED ACCELERATED AUC ALZUGUREN ANGEL AORL ASECIR AMG AMBASSADOR AEMRASECCASCKFLOMARRPRELPINRAMGTJMXL ADM ASES ABMC AER AMER ASE AMGTHA ARNOLDFREDERICK AOPC ACS AFL AEGR ASED AFPREL AGRI AMCHAM ARNOLD AN ANATO AME APERTH ASECSI AT ACDA ASEDC AIT AMERICA AMLB AMGE ACTION AGMT AFINIZ ASECVE ADRC ABER AGIT APCS AEMED ARABBL ARC ASO AIAG ACEC ASR ASECM ARG AEC ABT ADIP ADCP ANARCHISTS AORCUN AOWC ASJA AALC AX AROC ARM AGENCIES ALBE AK AZE AOPR AREP AMIA ASCE ALANAZI ABDULRAHMEN ABDULHADI AINFCY ARMS ASECEFINKCRMKPAOPTERKHLSAEMRNS AGRICULTURE AFPK AOCR ALEXANDER ATRD ATFN ABLG AORCD AFGHAN ARAS AORCYM AVERY ALVAREZ ACBAQ ALOWAR ANTOINE ABLDG ALAB AMERICAS AFAF ASECAFIN ASEK ASCC AMCT AMGTATK AMT APDC AEMRS ASECE AFSA ATRA ARTICLE ARENA AISG AEMRBC AFR AEIR ASECAF AFARI AMPR ASPA ASOC ANTONIO AORCL ASECARP APRM AUSTRALIAGROUP ASEG AFOR AEAID AMEDI ASECTH ASIC AFDIN AGUIRRE AUNR ASFC AOIC ANTXON ASA ASECCASC ALI AORCEUNPREFPRELSMIGBN ASECKHLS ASSSEMBLY ASECVZ AI ASECPGOV ASIR ASCEC ASAC ARAB AIEA ADMIRAL AUSGR AQ AMTG ARRMZY ANC APR AMAT AIHRC AFU ADEL AECL ACAO AMEMR ADEP AV AW AOR ALL ALOUNI AORCUNGA ALNEA ASC AORCO ARMITAGE AGENGA AGRIC AEM ACOAAMGT AGUILAR AFPHUM AMEDCASCKFLO AFZAL AAA ATPDEA ASECPHUM ASECKFRDCVISKIRFPHUMSMIGEG
ETRD ETTC EU ECON EFIN EAGR EAID ELAB EINV ENIV ENRG EPET EZ ELTN ELECTIONS ECPS ET ER EG EUN EIND ECONOMICS EMIN ECIN EINT EWWT EAIR EN ENGR ES EI ETMIN EL EPA EARG EFIS ECONOMY EC EK ELAM ECONOMIC EAR ESDP ECCP ELN EUM EUMEM ECA EAP ELEC ECOWAS EFTA EXIM ETTD EDRC ECOSOC ECPSN ENVIRONMENT ECO EMAIL ECTRD EREL EDU ENERG ENERGY ENVR ETRAD EAC EXTERNAL EFIC ECIP ERTD EUC ENRGMO EINZ ESTH ECCT EAGER ECPN ELNT ERD EGEN ETRN EIVN ETDR EXEC EIAD EIAR EVN EPRT ETTF ENGY EAIDCIN EXPORT ETRC ESA EIB EAPC EPIT ESOCI ETRB EINDQTRD ENRC EGOV ECLAC EUR ELF ETEL ENRGUA EVIN EARI ESCAP EID ERIN ELAN ENVT EDEV EWWY EXBS ECOM EV ELNTECON ECE ETRDGK EPETEIND ESCI ETRDAORC EAIDETRD ETTR EMS EAGRECONEINVPGOVBN EBRD EUREM ERGR EAGRBN EAUD EFI ETRDEINVECINPGOVCS EPEC ETRO ENRGY EGAR ESSO EGAD ENV ENER EAIDXMXAXBXFFR ELA EET EINVETRD EETC EIDN ERGY ETRDPGOV EING EMINCG EINVECON EURM EEC EICN EINO EPSC ELAP ELABPGOVBN EE ESPS ETRA ECONETRDBESPAR ERICKSON EEOC EVENTS EPIN EB ECUN EPWR ENG EX EH EAIDAR EAIS ELBA EPETUN ETRDEIQ EENV ECPC ETRP ECONENRG EUEAID EWT EEB EAIDNI ESENV EADM ECN ENRGKNNP ETAD ETR ECONETRDEAGRJA ETRG ETER EDUC EITC EBUD EAIF EBEXP EAIDS EITI EGOVSY EFQ ECOQKPKO ETRGY ESF EUE EAIC EPGOV ENFR EAGRE ENRD EINTECPS EAVI ETC ETCC EIAID EAIDAF EAGREAIDPGOVPRELBN EAOD ETRDA EURN EASS EINVA EAIDRW EON ECOR EPREL EGPHUM ELTM ECOS EINN ENNP EUPGOV EAGRTR ECONCS ETIO ETRDGR EAIDB EISNAR EIFN ESPINOSA EAIDASEC ELIN EWTR EMED ETFN ETT EADI EPTER ELDIN EINVEFIN ESS ENRGIZ EQRD ESOC ETRDECD ECINECONCS EAIT ECONEAIR ECONEFIN EUNJ ENRGKNNPMNUCPARMPRELNPTIAEAJMXL ELAD EFIM ETIC EFND EFN ETLN ENGRD EWRG ETA EIN EAIRECONRP EXIMOPIC ERA ENRGJM ECONEGE ENVI ECHEVARRIA EMINETRD EAD ECONIZ EENG ELBR EWWC ELTD EAIDMG ETRK EIPR EISNLN ETEX EPTED EFINECONCS EPCS EAG ETRDKIPR ED EAIO ETRDEC ENRGPARMOTRASENVKGHGPGOVECONTSPLEAID ECONEINVEFINPGOVIZ ERNG EFINU EURFOR EWWI ELTNSNAR ETD EAIRASECCASCID EOXC ESTN EAIDAORC EAGRRP ETRDEMIN ELABPHUMSMIGKCRMBN ETRDEINVTINTCS EGHG EAIDPHUMPRELUG EAGRBTIOBEXPETRDBN EDA EPETPGOV ELAINE EUCOM EMW EFINECONEAIDUNGAGM ELB EINDETRD EMI ETRDECONWTOCS EINR ESTRADA EHUM EFNI ELABV ENR EMN EXO EWWTPRELPGOVMASSMARRBN EATO END EP EINVETC ECONEFINETRDPGOVEAGRPTERKTFNKCRMEAID ELTRN EIQ ETTW EAI ENGRG ETRED ENDURING ETTRD EAIDEGZ EOCN EINF EUPREL ENRL ECPO ENLT EEFIN EPPD ECOIN EUEAGR EISL EIDE ENRGSD EINVECONSENVCSJA EAIG ENTG EEPET EUNCH EPECO ETZ EPAT EPTE EAIRGM ETRDPREL EUNGRSISAFPKSYLESO ETTN EINVKSCA ESLCO EBMGT ENRGTRGYETRDBEXPBTIOSZ EFLU ELND EFINOECD EAIDHO EDUARDO ENEG ECONEINVETRDEFINELABETRDKTDBPGOVOPIC EFINTS ECONQH ENRGPREL EUNPHUM EINDIR EPE EMINECINECONSENVTBIONS EFINM ECRM EQ EWWTSP ECONPGOVBN
KFLO KPKO KDEM KFLU KTEX KMDR KPAO KCRM KIDE KN KNNP KG KMCA KZ KJUS KWBG KU KDMR KAWC KCOR KPAL KOMC KTDB KTIA KISL KHIV KHUM KTER KCFE KTFN KS KIRF KTIP KIRC KSCA KICA KIPR KPWR KWMN KE KGIC KGIT KSTC KACT KSEP KFRD KUNR KHLS KCRS KRVC KUWAIT KVPR KSRE KMPI KMRS KNRV KNEI KCIP KSEO KITA KDRG KV KSUM KCUL KPET KBCT KO KSEC KOLY KNAR KGHG KSAF KWNM KNUC KMNP KVIR KPOL KOCI KPIR KLIG KSAC KSTH KNPT KINL KPRP KRIM KICC KIFR KPRV KAWK KFIN KT KVRC KR KHDP KGOV KPOW KTBT KPMI KPOA KRIF KEDEM KFSC KY KGCC KATRINA KWAC KSPR KTBD KBIO KSCI KRCM KNNB KBNC KIMT KCSY KINR KRAD KMFO KCORR KW KDEMSOCI KNEP KFPC KEMPI KBTR KFRDCVISCMGTCASCKOCIASECPHUMSMIGEG KNPP KTTB KTFIN KBTS KCOM KFTN KMOC KOR KDP KPOP KGHA KSLG KMCR KJUST KUM KMSG KHPD KREC KIPRTRD KPREL KEN KCSA KCRIM KGLB KAKA KWWT KUNP KCRN KISLPINR KLFU KUNC KEDU KCMA KREF KPAS KRKO KNNC KLHS KWAK KOC KAPO KTDD KOGL KLAP KECF KCRCM KNDP KSEAO KCIS KISM KREL KISR KISC KKPO KWCR KPFO KUS KX KWCI KRFD KWPG KTRD KH KLSO KEVIN KEANE KACW KWRF KNAO KETTC KTAO KWIR KVCORR KDEMGT KPLS KICT KWGB KIDS KSCS KIRP KSTCPL KDEN KLAB KFLOA KIND KMIG KPPAO KPRO KLEG KGKG KCUM KTTP KWPA KIIP KPEO KICR KNNA KMGT KCROM KMCC KLPM KNNPGM KSIA KSI KWWW KOMS KESS KMCAJO KWN KTDM KDCM KCM KVPRKHLS KENV KCCP KGCN KCEM KEMR KWMNKDEM KNNPPARM KDRM KWIM KJRE KAID KWMM KPAONZ KUAE KTFR KIF KNAP KPSC KSOCI KCWI KAUST KPIN KCHG KLBO KIRCOEXC KI KIRCHOFF KSTT KNPR KDRL KCFC KLTN KPAOKMDRKE KPALAOIS KESO KKOR KSMT KFTFN KTFM KDEMK KPKP KOCM KNN KISLSCUL KFRDSOCIRO KINT KRG KWMNSMIG KSTCC KPAOY KFOR KWPR KSEPCVIS KGIV KSEI KIL KWMNPHUMPRELKPAOZW KQ KEMS KHSL KTNF KPDD KANSOU KKIV KFCE KTTC KGH KNNNP KK KSCT KWNN KAWX KOMCSG KEIM KTSD KFIU KDTB KFGM KACP KWWMN KWAWC KSPA KGICKS KNUP KNNO KISLAO KTPN KSTS KPRM KPALPREL KPO KTLA KCRP KNMP KAWCK KCERS KDUM KEDM KTIALG KWUN KPTS KPEM KMEPI KAWL KHMN KCRO KCMR KPTD KCROR KMPT KTRF KSKN KMAC KUK KIRL KEM KSOC KBTC KOM KINP KDEMAF KTNBT KISK KRM KWBW KBWG KNNPMNUC KNOP KSUP KCOG KNET KWBC KESP KMRD KEBG KFRDKIRFCVISCMGTKOCIASECPHUMSMIGEG KPWG KOMCCO KRGY KNNF KPROG KJAN KFRED KPOKO KM KWMNCS KMPF KJWC KJU KSMIG KALR KRAL KDGOV KPA KCRMJA KCRI KAYLA KPGOV KRD KNNPCH KFEM KPRD KFAM KALM KIPRETRDKCRM KMPP KADM KRFR KMWN KWRG KTIAPARM KTIAEUN KRDP KLIP KDDEM KTIAIC KWKN KPAD KDM KRCS KWBGSY KEAI KIVP KPAOPREL KUNH KTSC KIPT KNP KJUSTH KGOR KEPREL KHSA KGHGHIV KNNR KOMH KRCIM KWPB KWIC KINF KPER KILS KA KNRG KCSI KFRP KLFLO KFE KNPPIS KQM KQRDQ KERG KPAOPHUM KSUMPHUM KVBL KARIM KOSOVO KNSD KUIR KWHG KWBGXF KWMNU KPBT KKNP KERF KCRT KVIS KWRC KVIP KTFS KMARR KDGR KPAI KDE KTCRE KMPIO KUNRAORC KHOURY KAWS KPAK KOEM KCGC KID KVRP KCPS KIVR KBDS KWOMN KIIC KTFNJA KARZAI KMVP KHJUS KPKOUNSC KMAR KIBL KUNA KSA KIS KJUSAF KDEV KPMO KHIB KIRD KOUYATE KIPRZ KBEM KPAM KDET KPPD KOSCE KJUSKUNR KICCPUR KRMS KWMNPREL KWMJN KREISLER KWM KDHS KRV KPOV KWMNCI KMPL KFLD KWWN KCVM KIMMITT KCASC KOMO KNATO KDDG KHGH KRF KSCAECON KWMEN KRIC
PREL PINR PGOV PHUM PTER PE PREF PARM PBTS PINS PHSA PK PL PM PNAT PHAS PO PROP PGOVE PA PU POLITICAL PPTER POL PALESTINIAN PHUN PIN PAMQ PPA PSEC POLM PBIO PSOE PDEM PAK PF PKAO PGOVPRELMARRMOPS PMIL PV POLITICS PRELS POLICY PRELHA PIRN PINT PGOG PERSONS PRC PEACE PROCESS PRELPGOV PROV PFOV PKK PRE PT PIRF PSI PRL PRELAF PROG PARMP PERL PUNE PREFA PP PGOB PUM PROTECTION PARTIES PRIL PEL PAGE PS PGO PCUL PLUM PIF PGOVENRGCVISMASSEAIDOPRCEWWTBN PMUC PCOR PAS PB PKO PY PKST PTR PRM POUS PRELIZ PGIC PHUMS PAL PNUC PLO PMOPS PHM PGOVBL PBK PELOSI PTE PGOVAU PNR PINSO PRO PLAB PREM PNIR PSOCI PBS PD PHUML PERURENA PKPA PVOV PMAR PHUMCF PUHM PHUH PRELPGOVETTCIRAE PRT PROPERTY PEPFAR PREI POLUN PAR PINSF PREFL PH PREC PPD PING PQL PINSCE PGV PREO PRELUN POV PGOVPHUM PINRES PRES PGOC PINO POTUS PTERE PRELKPAO PRGOV PETR PGOVEAGRKMCAKNARBN PPKO PARLIAMENT PEPR PMIG PTBS PACE PETER PMDL PVIP PKPO POLMIL PTEL PJUS PHUMNI PRELKPAOIZ PGOVPREL POGV PEREZ POWELL PMASS PDOV PARN PG PPOL PGIV PAIGH PBOV PETROL PGPV PGOVL POSTS PSO PRELEU PRELECON PHUMPINS PGOVKCMABN PQM PRELSP PRGO PATTY PRELPGOVEAIDECONEINVBEXPSCULOIIPBTIO PGVO PROTESTS PRELPLS PKFK PGOVEAIDUKNOSWGMHUCANLLHFRSPITNZ PARAGRAPH PRELGOV POG PTRD PTERM PBTSAG PHUMKPAL PRELPK PTERPGOV PAO PRIVATIZATION PSCE PPAO PGOVPRELPHUMPREFSMIGELABEAIDKCRMKWMN PARALYMPIC PRUM PKPRP PETERS PAHO PARMS PGREL PINV POINS PHUMPREL POREL PRELNL PHUMPGOV PGOVQL PLAN PRELL PARP PROVE PSOC PDD PRELNP PRELBR PKMN PGKV PUAS PRELTBIOBA PBTSEWWT PTERIS PGOVU PRELGG PHUMPRELPGOV PFOR PEPGOV PRELUNSC PRAM PICES PTERIZ PREK PRELEAGR PRELEUN PHUME PHU PHUMKCRS PRESL PRTER PGOF PARK PGOVSOCI PTERPREL PGOVEAID PGOVPHUMKPAO PINSKISL PREZ PGOVAF PARMEUN PECON PINL POGOV PGOVLO PIERRE PRELPHUM PGOVPZ PGOVKCRM PBST PKPAO PHUMHUPPS PGOVPOL PASS PPGOV PROGV PAGR PHALANAGE PARTY PRELID PGOVID PHUMR PHSAQ PINRAMGT PSA PRELM PRELMU PIA PINRPE PBTSRU PARMIR PEDRO PNUK PVPR PINOCHET PAARM PRFE PRELEIN PINF PCI PSEPC PGOVSU PRLE PDIP PHEM PRELB PORG PGGOC POLG POPDC PGOVPM PWMN PDRG PHUMK PINB PRELAL PRER PFIN PNRG PRED POLI PHUMBO PHYTRP PROLIFERATION PHARM PUOS PRHUM PUNR PENA PGOVREL PETRAEUS PGOVKDEM PGOVENRG PHUS PRESIDENT PTERKU PRELKSUMXABN PGOVSI PHUMQHA PKISL PIR PGOVZI PHUMIZNL PKNP PRELEVU PMIN PHIM PHUMBA PUBLIC PHAM PRELKPKO PMR PARTM PPREL PN PROL PDA PGOVECON PKBL PKEAID PERM PRELEZ PRELC PER PHJM PGOVPRELPINRBN PRFL PLN PWBG PNG PHUMA PGOR PHUMPTER POLINT PPEF PKPAL PNNL PMARR PAC PTIA PKDEM PAUL PREG PTERR PTERPRELPARMPGOVPBTSETTCEAIRELTNTC PRELJA POLS PI PNS PAREL PENV PTEROREP PGOVM PINER PBGT PHSAUNSC PTERDJ PRELEAID PARMIN PKIR PLEC PCRM PNET PARR PRELETRD PRELBN PINRTH PREJ PEACEKEEPINGFORCES PEMEX PRELZ PFLP PBPTS PTGOV PREVAL PRELSW PAUM PRF PHUMKDEM PATRICK PGOVKMCAPHUMBN PRELA PNUM PGGV PGOVSMIGKCRMKWMNPHUMCVISKFRDCA PBT PIND PTEP PTERKS PGOVJM PGOT PRELMARR PGOVCU PREV PREFF PRWL PET PROB PRELPHUMP PHUMAF PVTS PRELAFDB PSNR PGOVECONPRELBU PGOVZL PREP PHUMPRELBN PHSAPREL PARCA PGREV PGOVDO PGON PCON PODC PRELOV PHSAK PSHA PGOVGM PRELP POSCE PGOVPTER PHUMRU PINRHU PARMR PGOVTI PPEL PMAT PAN PANAM PGOVBO PRELHRC

Browse by classification

Community resources

courage is contagious

Viewing cable 07USEUBRUSSELS2208, EU NOTE VERBALE ON APPROVAL OF SECURITY AGREEMENT

If you are new to these pages, please read an introduction on the structure of a cable as well as how to discuss them with others. See also the FAQs

Understanding cables
Every cable message consists of three parts:
  • The top box shows each cables unique reference number, when and by whom it originally was sent, and what its initial classification was.
  • The middle box contains the header information that is associated with the cable. It includes information about the receiver(s) as well as a general subject.
  • The bottom box presents the body of the cable. The opening can contain a more specific subject, references to other cables (browse by origin to find them) or additional comment. This is followed by the main contents of the cable: a summary, a collection of specific topics and a comment section.
To understand the justification used for the classification of each cable, please use this WikiSource article as reference.

Discussing cables
If you find meaningful or important information in a cable, please link directly to its unique reference number. Linking to a specific paragraph in the body of a cable is also possible by copying the appropriate link (to be found at theparagraph symbol). Please mark messages for social networking services like Twitter with the hash tags #cablegate and a hash containing the reference ID e.g. #07USEUBRUSSELS2208.
Reference ID Created Released Classification Origin
07USEUBRUSSELS2208 2007-07-06 14:40 2011-08-30 01:44 UNCLASSIFIED USEU Brussels
VZCZCXYZ0046
OO RUEHWEB

DE RUEHBS #2208/01 1871440
ZNR UUUUU ZZH
O 061440Z JUL 07
FM USEU BRUSSELS
TO SECSTATE WASHDC IMMEDIATE
UNCLAS USEU BRUSSELS 002208 
 
SIPDIS 
 
SIPDIS 
 
FOR EUR/ERA (FAUCHER) 
 
E.O. 12958: N/A 
TAGS: PINR EUN
SUBJECT: EU NOTE VERBALE ON APPROVAL OF SECURITY AGREEMENT 
IMPLEMENTATION ARRANGEMENTS 
 
 
1. (U) This message contains an action request. Please see 
paragraph 4. 
 
2. (U) In accordance with the text of the US-EU Agreement on 
the Security of Information, signed April 30, 2007, USEU 
received a note verbale dated July 2 from the Council of the 
European Union. The note informs us that the security 
arrangements for implementation of the Security Agreement 
were approved by the Council Security Committee on June 29. 
The note requests confirmation that the text has been 
approved by the Department and that the necessary security 
measures have been put in place to implement the Security 
Arrangement. 
 
3. (U) Begin Text of the note Verbale (note internal 
paragraph numbering): 
 
 
SJ" 7/ 9638 
Brussels, 2 July 2007 
 
NOTE VERBALE 
The General Secretariat of the Council of the European Union 
presents its compliments to the Mission of the United States 
of America to the European Union and has the honor to refer 
to the Agreement between the European Union and the 
Government of the United States of America on the Security of 
Classified Information, which was signed at Washington on 30 
April 2007 (the Agreement), and to the technical Security 
Arrangement between the General Secretariat of the Council 
Security Office and the European Commission Security 
Directorate, and the United States Department of State, (the 
Security Arrangement) drawn up in accordance with Article 13 
of the Agreement. 
 
Pursuant to paragraph 2 of the Security Arrangement, the 
General Secretariat, on behalf of the General Secretariat of 
the Council Security Office and the European Commission 
Security Directorate, the EU authorities as provided for in 
Article 13 of the Agreement, informs the Mission that the 
enclosed text of the Security Arrangement has been approved 
by the Council Security Committee on 29 June 2007, and the 
necessary security measures have been put in place to 
implement the Security Arrangement. 
 
The General Secretariat of the Council of the European Union 
would be grateful to receive confirmation that the enclosed 
text has been approved by the United States Department of 
State, which is the U.S. authority as provided for in Article 
13 of the Agreement, and that the necessary security measures 
have been put in place to implement the Security Arrangement. 
 
The General Secretariat of the Council of the European Union 
avails itself of this opportunity to renew to the Mission of 
the United States of America to the European Union the 
expression of its highest consideration. 
 
DRAFT 
SECURITY ARRANGEMENT BETWEEN THE EU COUNCIL GENERAL 
SECRETARIAT SECURITY OFFICE (GSCSO) AND THE EUROPEAN 
 
SIPDIS 
COMMISSION SECURITY DIRECTORATE (ECSD) AND THE UNITED STATES 
DEPARTMENT OF STATE FOR THE PROTECTION OF CLASSIFIED 
INFORMATION EXCHANGED BETWEEN THE EU AND THE UNITED STATES 
OF AMERICA 
 
 
INTRODUCTION 
 
1. Pursuant to Article 13 of the Agreement between the 
Government of the United States of America (USG) and the 
European Union (EU) on security procedures for the exchange 
of classified information (the Agreement), reciprocal 
standards for the protection of classified information 
exchanged between USG and the EU are hereby mutually 
accepted. The United States Department of State, the GSCSO 
and the ECSD ("the participants") are responsible for the 
implementation and oversight of these standards. 
 
2. Each participant is to notify the other in writing that 
the necessary security measures have been put in place in 
accordance with this arrangement before any classified 
information is exchanged. 
 
3.    The participants will make their best effort to 
implement fully the elements contained in this Arrangement. 
 
PERSONNEL SECURITY CLEARANCE AND AUTHORISATION FOR ACCESS 
 
4.    Each facility or establishment that contains classified 
information released or exchanged by the other participant is 
to maintain an inventory of individuals at the facility or 
 
establishment who are authorised to have access to classified 
information. 
 
5.    Before being given access to classified information, 
all individuals who require access to classified information 
are to be briefed on the protective security regulations 
relevant to the classification of the information they are to 
access. Those individuals accessing classified information 
are to be made aware that any breach of the security 
regulations may result in disciplinary action and/or possible 
further legal action in accordance with the Parties' 
respective laws and regulations. 
 
CLASSIFICATION SYSTEM 
 
6.    Classification markings as set out in Article 3 of the 
Agreement, are to be used to indicate the sensitivity of the 
classified information and thus the security procedures and 
regulations which apply for its protection. 
 
7.    Within the USG, information classified RESTREINT UE is 
to be handled on a "need to know basis" and is to be afforded 
a level of protection at least equivalent to that foreseen in 
the Council's security regulations. The USG may apply 
appropriate procedures and caveats to ensure that such 
special handling instructions are observed. 
 
8.    All information originated by one of the participants 
and provided to the other(s) - is to include an express 
releasability marking, such as: 
 
SECRET 
 
SIPDIS 
RELEASABLE TO THE EU 
 
 
SECRET UE 
 
SIPDIS 
RELEASABLE TO THE USA 
 
 
REGISTRIES AND THE CONTROL OF CLASSIFIED INFORMATION 
 
Registries 
 
9.    A registry system is to be established in the U.S. 
Department of State, the General Secretariat of the Council 
and the European Commission for the receipt, dispatch, 
control and storage of classified information subject to the 
Agreement. 
 
10.   Registries are to be responsible for: 
 
(a) distribution and control of classified information in 
accordance with the following provisions: 
 
(i) Information classified CONFIDENTIEL UE or CONFIDENTIAL 
and above arriving at or leaving the designated registry 
acting as the point of entry and exit for classified 
information is to be recorded in a logbook or in a special 
protected computer media, indicating the date received, 
particulars of the document (date, reference and copy 
number), the subject of the document, the classification 
level, the title, the addressee's name or title, the date of 
return of the receipt and the date of return of the document 
to EU or the USG, its distribution to other registries or its 
destruction. 
 
(ii) Information classified CONFIDENTIEL UE or CONFIDENTIAL 
and above may only be handled, distributed and consulted in a 
special security area in such a way that it can be protected 
from access by unauthorised persons by means of internally 
established controls: e.g. premises containing offices in 
which CONFIDENTIEL UE or CONFIDENTIAL and above is regularly 
handled and stored. 
 
(iii) Around the security area an administrative area of 
lesser security may be established. Only RESTREINT UE 
information is to be handled and stored in administrative 
areas. 
 
(b) the storage of information classified CONFIDENTIEL UE or 
CONFIDENTIAL or above in a special area of the registry. The 
 
SIPDIS 
classified information is to be stored in security containers 
or locked security cabinets, the specifications of which are 
in accordance with the respective laws and regulations of the 
Parties to the Agreement. 
 
(c) the final disposition (including return if so requested) 
and/or downgrading and/or declassification of classified 
information, subject to the written consent of the 
originator, including the maintenance of destruction 
certificates for classified information from the USG or 
 
the EU. 
 
11. The U.S. Department of State, GSCSO and ECSD are to be 
responsible for the oversight and control of registries 
within their respective administrations and are to inform 
their counterparts of the establishment/disestablishment of 
registries containing each other's classified information. 
 
Storage 
 
12.   Information classified CONFIDENTIEL UE or CONFIDENTIAL 
and above is to be stored in security containers 
corresponding to the respective laws and regulations of the 
participants, in special security areas. 
 
13.   Information classified RESTREINT UE is to be handled in 
premises that are not accessible to unauthorised personnel 
and stored in locked containers. 
 
14.   All classified information, regardless of media, is to 
be stored in a secure manner. 
 
Copying 
 
15.   Information classified SECRET UE or SECRET and above 
may be reproduced or copied only with the releasing 
participant's prior written consent. 
 
16.   When classified documents or media containing 
classified information are reproduced, all original security 
markings thereon are also to be reproduced or marked on each 
copy. Such reproduced documents or media are to be placed 
under the same protection as the original document or media. 
The number of copies is to be limited to that required for 
official purposes 
 
17.   Copy machines are to be protected to avoid unauhorised 
reproducing of extra copies. The seurity classification on 
classified informatio reproduced or copied are to correspond 
to th security classification of the original information. 
 
Destruction 
 
18.   Classified documents or media containing classified 
information received from the releasing Participant are to be 
destroyed in an appropriate manner or returned to the 
releasing participant for destruction, to prevent 
reconstruction of the classified information contained 
therein. 
 
19.   Classified material, including equipment, containing 
classified information in whole or in part, is to be 
destroyed so that it is no longer recognisable and so as to 
preclude reconstruction of the transmitted classified 
information in whole or in part. 
 
20. In the case of CONFIDENTIEL UE or CONFIDENTIAL documents, 
an appropriate note is to be entered in the special 
registers. In the case of SECRET UE or SECRET and above 
documents, destruction certificates are to be issued and 
signed by two appropriately security cleared persons 
witnessing their destruction. These certificates are to be 
retained for at least three years. 
 
 
MANUAL TRANSMISSION OF CLASSIFIED INFORMATION BETWEEN THE 
PARTICIPANTS 
 
21. When exchanging information classified CONFIDENTIEL UE or 
CONFIDENTIAL and above, appropriately cleared couriers are to 
 
SIPDIS 
be used by both sides. Upon presentation of the appropriate 
security clearance certificate, such couriers are to be 
granted access badges to the building(s) they need to visit 
to deliver and collect the documents. 
 
22.   Documents 
 
(a) Documents or media containing classified information are 
to be transmitted in double, sealed envelopes, the innermost 
envelope bearing only the classification of the documents or 
other media and the organisational address of the intended 
recipient, and the outer envelope bearing the organisational 
address of the recipient, the organisational address of the 
sender, and the registry number, if applicable. 
 
(b) No indication of the classification of the enclosed 
documents or media is to be made on the outer envelope. The 
sealed envelope is then to be transmitted according to the 
prescribed procedures of the participants. 
 
(c) Receipts are to be prepared for packages containing 
 
classified documents or media that are transmitted between 
the participants, and a receipt for the enclosed documents or 
media is to be signed by the final recipient and returned to 
the sender. 
 
23.   Classified material 
 
(a)   Classified material, including equipment, is to be 
transported in sealed, covered vehicles, or be securely 
packagQ or protected in order to prevent identification of 
its details, and kept under continuous control to prevent 
access by unauthorised persons. 
 
(b)   Classified material, including equipment, which must be 
stored temporarily awaiting shipment is to be placed in 
protected storage areas. The areas are to be protected by 
intrusion-detection equipment or guards with security 
clearances who are to maintain continuous surveillance of the 
storage areas. Only authorised personnel with the requisite 
security clearance may have access to the storage areas. 
 
(c) Receipts are to be obtained on every occasion when 
classified material, including equipment, changes hands en 
route, and a receipt is to be signed by the final recipient 
and returned to the sender. 
 
LOSSES OR COMPROMISES OF SECURITY 
 
24.   For information classified RESTREINT UE, actual or 
suspected loss or compromises of security need to be reported 
only when they present unusual features and/or when it is 
assessed that actual damage resulted from the loss/compromise. 
 
25.   Whenever a loss/compromise of security affecting 
information classified CONFIDENTIEL UE or CONFIDENTIAL and 
above received from the other participant is discovered or 
suspected: 
 
(a)   a report giving details of the loss/compromise is to be 
sent: 
 
(i) by the GSCSO or ECSD to the U.S. Department of State, for 
US classified information; 
 
(ii) by the U.S. Department of State to the GSCSO or ECSD, as 
appropriate, for EU classified information 
 
(b) an investigation into the circumstances of the 
breach/compromise is to be made. When completed, a full 
report must be submitted to the office to which the initial 
report was addressed. At the conclusion of the investigation, 
remedial or corrective action, where appropriate, is to be 
taken. 
 
SECURITY VISITS 
 
26.   The U.S. Department of State, the GSCSO and the ECSD 
are to facilitate the reciprocal visits referred to in 
Article 11 of the Agreement to ensure that information 
released by their parent organisation is properly protected. 
Such visits are to be conducted as part of a mutually agreed 
process. 
 
27.   The U.S. Department of State, the GSCSO and the ECSD 
are responsible for the implementation of the standards 
described in these implementing arrangements. Each 
participant is to conduct internally the necessary checks to 
verify that the necessary security measures have been taken 
in accordance with this arrangement. 
 
LIAISON AND REVIEW 
 
28.   The U.S. Department of State, the GSCSO, and the ECSD 
are to maintain constant liaison to oversee the release and 
exchange of classified information under the terms of the 
Agreement. These Offices are to meet to discuss and review 
matters of common interest and assess the implementation of 
these standards. 
 
29.   Any modifications of this technical security 
arrangement are subject to the mutual approval by the U.S. 
Department of State, the GSCSO and the ECSD.  End note 
verbale text. 
 
4. (U) Action request: Mission requests confirmation of 
approval by the Department and authorization to convey a 
responding note verbale. 
 
McKinley 
.