Keep Us Strong WikiLeaks logo

Currently released so far... 143912 / 251,287

Articles

Browse latest releases

Browse by creation date

Browse by origin

A B C D F G H I J K L M N O P Q R S T U V W Y Z

Browse by tag

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
AORC AS AF AM AJ ASEC AU AMGT APER ACOA ASEAN AG AFFAIRS AR AFIN ABUD AO AEMR ADANA AMED AADP AINF ARF ADB ACS AE AID AL AC AGR ABLD AMCHAMS AECL AINT AND ASIG AUC APECO AFGHANISTAN AY ARABL ACAO ANET AFSN AZ AFLU ALOW ASSK AFSI ACABQ AMB APEC AIDS AA ATRN AMTC AVIATION AESC ASSEMBLY ADPM ASECKFRDCVISKIRFPHUMSMIGEG AGOA ASUP AFPREL ARNOLD ADCO AN ACOTA AODE AROC AMCHAM AT ACKM ASCH AORCUNGA AVIANFLU AVIAN AIT ASECPHUM ATRA AGENDA AIN AFINM APCS AGENGA ABDALLAH ALOWAR AFL AMBASSADOR ARSO AGMT ASPA AOREC AGAO ARR AOMS ASC ALIREZA AORD AORG ASECVE ABER ARABBL ADM AMER ALVAREZ AORCO ARM APERTH AINR AGRI ALZUGUREN ANGEL ACDA AEMED ARC AMGMT AEMRASECCASCKFLOMARRPRELPINRAMGTJMXL ASECAFINGMGRIZOREPTU ABMC AIAG ALJAZEERA ASR ASECARP ALAMI APRM ASECM AMPR AEGR AUSTRALIAGROUP ASE AMGTHA ARNOLDFREDERICK AIDAC AOPC ANTITERRORISM ASEG AMIA ASEX AEMRBC AFOR ABT AMERICA AGENCIES AGS ADRC ASJA AEAID ANARCHISTS AME AEC ALNEA AMGE AMEDCASCKFLO AK ANTONIO ASO AFINIZ ASEDC AOWC ACCOUNT ACTION AMG AFPK AOCR AMEDI AGIT ASOC ACOAAMGT AMLB AZE AORCYM AORL AGRICULTURE ACEC AGUILAR ASCC AFSA ASES ADIP ASED ASCE ASFC ASECTH AFGHAN ANTXON APRC AFAF AFARI ASECEFINKCRMKPAOPTERKHLSAEMRNS AX ALAB ASECAF ASA ASECAFIN ASIC AFZAL AMGTATK ALBE AMT AORCEUNPREFPRELSMIGBN AGUIRRE AAA ABLG ARCH AGRIC AIHRC ADEL AMEX ALI AQ ATFN AORCD ARAS AINFCY AFDB ACBAQ AFDIN AOPR AREP ALEXANDER ALANAZI ABDULRAHMEN ABDULHADI ATRD AEIR AOIC ABLDG AFR ASEK AER ALOUNI AMCT AVERY ASECCASC ARG APR AMAT AEMRS AFU ATPDEA ALL ASECE ANDREW
EAIR ECON ETRD EAGR EAID EFIN ETTC ENRG EMIN ECPS EG EPET EINV ELAB EU ECONOMICS EC EZ EUN EN ECIN EWWT EXTERNAL ENIV ES ESA ELN EFIS EIND EPA ELTN EXIM ET EINT EI ER EAIDAF ETRO ETRDECONWTOCS ECTRD EUR ECOWAS ECUN EBRD ECONOMIC ENGR ECONOMY EFND ELECTIONS EPECO EUMEM ETMIN EXBS EAIRECONRP ERTD EAP ERGR EUREM EFI EIB ENGY ELNTECON EAIDXMXAXBXFFR ECOSOC EEB EINF ETRN ENGRD ESTH ENRC EXPORT EK ENRGMO ECO EGAD EXIMOPIC ETRDPGOV EURM ETRA ENERG ECLAC EINO ENVIRONMENT EFIC ECIP ETRDAORC ENRD EMED EIAR ECPN ELAP ETCC EAC ENEG ESCAP EWWC ELTD ELA EIVN ELF ETR EFTA EMAIL EL EMS EID ELNT ECPSN ERIN ETT EETC ELAN ECHEVARRIA EPWR EVIN ENVR ENRGJM ELBR EUC EARG EAPC EICN EEC EREL EAIS ELBA EPETUN EWWY ETRDGK EV EDU EFN EVN EAIDETRD ENRGTRGYETRDBEXPBTIOSZ ETEX ESCI EAIDHO EENV ETRC ESOC EINDQTRD EINVA EFLU EGEN ECE EAGRBN EON EFINECONCS EIAD ECPC ENV ETDR EAGER ETRDKIPR EWT EDEV ECCP ECCT EARI EINVECON ED ETRDEC EMINETRD EADM ENRGPARMOTRASENVKGHGPGOVECONTSPLEAID ETAD ECOM ECONETRDEAGRJA EMINECINECONSENVTBIONS ESSO ETRG ELAM ECA EENG EITC ENG ERA EPSC ECONEINVETRDEFINELABETRDKTDBPGOVOPIC EIPR ELABPGOVBN EURFOR ETRAD EUE EISNLN ECONETRDBESPAR ELAINE EGOVSY EAUD EAGRECONEINVPGOVBN EINVETRD EPIN ECONENRG EDRC ESENV EB ENER ELTNSNAR EURN ECONPGOVBN ETTF ENVT EPIT ESOCI EFINOECD ERD EDUC EUM ETEL EUEAID ENRGY ETD EAGRE EAR EAIDMG EE EET ETER ERICKSON EIAID EX EAG EBEXP ESTN EAIDAORC EING EGOV EEOC EAGRRP EVENTS ENRGKNNPMNUCPARMPRELNPTIAEAJMXL ETRDEMIN EPETEIND EAIDRW ENVI ETRDEINVECINPGOVCS EPEC EDUARDO EGAR EPCS EPRT EAIDPHUMPRELUG EPTED ETRB EPETPGOV ECONQH EAIDS EFINECONEAIDUNGAGM EAIDAR EAGRBTIOBEXPETRDBN ESF EINR ELABPHUMSMIGKCRMBN EIDN ETRK ESTRADA EXEC EAIO EGHG ECN EDA ECOS EPREL EINVKSCA ENNP ELABV ETA EWWTPRELPGOVMASSMARRBN EUCOM EAIDASEC ENR END EP ERNG ESPS EITI EINTECPS EAVI ECONEFINETRDPGOVEAGRPTERKTFNKCRMEAID ELTRN EADI ELDIN ELND ECRM EINVEFIN EAOD EFINTS EINDIR ENRGKNNP ETRDEIQ ETC EAIRASECCASCID EINN ETRP EAIDNI EFQ ECOQKPKO EGPHUM EBUD EAIT ECONEINVEFINPGOVIZ EWWI ENERGY ELB EINDETRD EMI ECONEAIR ECONEFIN EHUM EFNI EOXC EISNAR ETRDEINVTINTCS EIN EFIM EMW ETIO ETRDGR EMN EXO EATO EWTR ELIN EAGREAIDPGOVPRELBN EINVETC ETTD EIQ ECONCS EPPD ESS EUEAGR ENRGIZ EISL EUNJ EIDE ENRGSD ELAD ESPINOSA ELEC EAIG ESLCO ENTG ETRDECD EINVECONSENVCSJA EEPET EUNCH ECINECONCS
KPKO KIPR KWBG KPAL KDEM KTFN KNNP KGIC KTIA KCRM KDRG KWMN KJUS KIDE KSUM KTIP KFRD KMCA KMDR KCIP KTDB KPAO KPWR KOMC KU KIRF KCOR KHLS KISL KSCA KGHG KS KSTH KSEP KE KPAI KWAC KFRDKIRFCVISCMGTKOCIASECPHUMSMIGEG KPRP KVPR KAWC KUNR KZ KPLS KN KSTC KMFO KID KNAR KCFE KRIM KFLO KCSA KG KFSC KSCI KFLU KMIG KRVC KV KVRP KMPI KNEI KAPO KOLY KGIT KSAF KIRC KNSD KBIO KHIV KHDP KBTR KHUM KSAC KACT KRAD KPRV KTEX KPIR KDMR KMPF KPFO KICA KWMM KICC KR KCOM KAID KINR KBCT KOCI KCRS KTER KSPR KDP KFIN KCMR KMOC KUWAIT KIPRZ KSEO KLIG KWIR KISM KLEG KTBD KCUM KMSG KMWN KREL KPREL KAWK KIMT KCSY KESS KWPA KNPT KTBT KCROM KPOW KFTN KPKP KICR KGHA KOMS KJUST KREC KOC KFPC KGLB KMRS KTFIN KCRCM KWNM KHGH KRFD KY KGCC KFEM KVIR KRCM KEMR KIIP KPOA KREF KJRE KRKO KOGL KSCS KGOV KCRIM KEM KCUL KRIF KCEM KITA KCRN KCIS KSEAO KWMEN KEANE KNNC KNAP KEDEM KNEP KHPD KPSC KIRP KUNC KALM KCCP KDEN KSEC KAYLA KIMMITT KO KNUC KSIA KLFU KLAB KTDD KIRCOEXC KECF KIPRETRDKCRM KNDP KIRCHOFF KJAN KFRDSOCIRO KWMNSMIG KEAI KKPO KPOL KRD KWMNPREL KATRINA KBWG KW KPPD KTIAEUN KDHS KRV KBTS KWCI KICT KPALAOIS KPMI KWN KTDM KWM KLHS KLBO KDEMK KT KIDS KWWW KLIP KPRM KSKN KTTB KTRD KNPP KOR KGKG KNN KTIAIC KSRE KDRL KVCORR KDEMGT KOMO KSTCC KMAC KSOC KMCC KCHG KSEPCVIS KGIV KPO KSEI KSTCPL KSI KRMS KFLOA KIND KPPAO KCM KRFR KICCPUR KFRDCVISCMGTCASCKOCIASECPHUMSMIGEG KNNB KFAM KWWMN KENV KGH KPOP KFCE KNAO KTIAPARM KWMNKDEM KDRM KNNNP KEVIN KEMPI KWIM KGCN KUM KMGT KKOR KSMT KISLSCUL KNRV KPRO KOMCSG KLPM KDTB KFGM KCRP KAUST KNNPPARM KUNH KWAWC KSPA KTSC KUS KSOCI KCMA KTFR KPAOPREL KNNPCH KWGB KSTT KNUP KPGOV KUK KMNP KPAS KHMN KPAD KSTS KCORR KI KLSO KWNN KNP KPTD KESO KMPP KEMS KPAONZ KPOV KTLA KPAOKMDRKE KNMP KWMNCI KWUN KRDP KWKN KPAOY KEIM KGICKS KIPT KREISLER KTAO KJU KLTN KWMNPHUMPRELKPAOZW KEN KQ KWPR KSCT KGHGHIV KEDU KRCIM KFIU KWIC KNNO KILS KTIALG KNNA KMCAJO KINP KRM KLFLO KPA KOMCCO KKIV KHSA KDM KRCS KWBGSY KISLAO KNPPIS KNNPMNUC KCRI KX KWWT KPAM KVRC KERG KK KSUMPHUM KACP KSLG KIF KIVP KHOURY KNPR KUNRAORC KCOG KCFC KWMJN KFTFN KTFM KPDD KMPIO KCERS KDUM KDEMAF KMEPI KHSL KEPREL KAWX KIRL KNNR KOMH KMPT KISLPINR KADM KPER KTPN KSCAECON KA KJUSTH KPIN KDEV KCSI KNRG KAKA KFRP KTSD KINL KJUSKUNR KQM KQRDQ KWBC KMRD KVBL KOM KMPL KEDM KFLD KPRD KRGY KNNF KPROG KIFR KPOKO KM KWMNCS KAWS KLAP KPAK KHIB KOEM KDDG KCGC
PGOV PREL PK PTER PINR PO PHUM PARM PREF PINF PRL PM PINS PROP PALESTINIAN PE PBTS PNAT PHSA PL PA PSEPC POSTS POLITICS POLICY POL PU PAHO PHUMPGOV PGOG PARALYMPIC PGOC PNR PREFA PMIL POLITICAL PROV PRUM PBIO PAK POV POLG PAR POLM PHUMPREL PKO PUNE PROG PEL PROPERTY PKAO PRE PSOE PHAS PNUM PGOVE PY PIRF PRES POWELL PP PREM PCON PGOVPTER PGOVPREL PODC PTBS PTEL PGOVTI PHSAPREL PD PG PRC PVOV PLO PRELL PEPFAR PREK PEREZ PINT POLI PPOL PARTIES PT PRELUN PH PENA PIN PGPV PKST PROTESTS PHSAK PRM PROLIFERATION PGOVBL PAS PUM PMIG PGIC PTERPGOV PSHA PHM PHARM PRELHA PELOSI PGOVKCMABN PQM PETER PJUS PKK POUS PTE PGOVPRELPHUMPREFSMIGELABEAIDKCRMKWMN PERM PRELGOV PAO PNIR PARMP PRELPGOVEAIDECONEINVBEXPSCULOIIPBTIO PHYTRP PHUML PFOV PDEM PUOS PN PRESIDENT PERURENA PRIVATIZATION PHUH PIF POG PERL PKPA PREI PTERKU PSEC PRELKSUMXABN PETROL PRIL POLUN PPD PRELUNSC PREZ PCUL PREO PGOVZI POLMIL PERSONS PREFL PASS PV PETERS PING PQL PETR PARMS PNUC PS PARLIAMENT PINSCE PROTECTION PLAB PGV PBS PGOVENRGCVISMASSEAIDOPRCEWWTBN PKNP PSOCI PSI PTERM PLUM PF PVIP PARP PHUMQHA PRELNP PHIM PRELBR PUBLIC PHUMKPAL PHAM PUAS PBOV PRELTBIOBA PGOVU PHUMPINS PICES PGOVENRG PRELKPKO PHU PHUMKCRS POGV PATTY PSOC PRELSP PREC PSO PAIGH PKPO PARK PRELPLS PRELPK PHUS PPREL PTERPREL PROL PDA PRELPGOV PRELAF PAGE PGOVGM PGOVECON PHUMIZNL PMAR PGOVAF PMDL PKBL PARN PARMIR PGOVEAIDUKNOSWGMHUCANLLHFRSPITNZ PDD PRELKPAO PKMN PRELEZ PHUMPRELPGOV PARTM PGOVEAGRKMCAKNARBN PPEL PGOVPRELPINRBN PGOVSOCI PWBG PGOVEAID PGOVPM PBST PKEAID PRAM PRELEVU PHUMA PGOR PPA PINSO PROVE PRELKPAOIZ PPAO PHUMPRELBN PGVO PHUMPTER PAGR PMIN PBTSEWWT PHUMR PDOV PINO PARAGRAPH PACE PINL PKPAL PTERE PGOVAU PGOF PBTSRU PRGOV PRHUM PCI PGO PRELEUN PAC PRESL PORG PKFK PEPR PRELP PMR PRTER PNG PGOVPHUMKPAO PRELECON PRELNL PINOCHET PAARM PKPAO PFOR PGOVLO PHUMBA POPDC PRELC PHUME PER PHJM POLINT PGOVPZ PGOVKCRM PAUL PHALANAGE PARTY PPEF PECON PEACE PROCESS PPGOV PLN PRELSW PHUMS PRF PEDRO PHUMKDEM PUNR PVPR PATRICK PGOVKMCAPHUMBN PRELA PGGV PSA PGOVSMIGKCRMKWMNPHUMCVISKFRDCA PGIV PRFE POGOV PBT PAMQ

Browse by classification

Community resources

courage is contagious

Viewing cable 09STATE122215, CIVAIR INDIA: REQUEST TO SEEK CLARIFICATION FROM THE

If you are new to these pages, please read an introduction on the structure of a cable as well as how to discuss them with others. See also the FAQs

Understanding cables
Every cable message consists of three parts:
  • The top box shows each cables unique reference number, when and by whom it originally was sent, and what its initial classification was.
  • The middle box contains the header information that is associated with the cable. It includes information about the receiver(s) as well as a general subject.
  • The bottom box presents the body of the cable. The opening can contain a more specific subject, references to other cables (browse by origin to find them) or additional comment. This is followed by the main contents of the cable: a summary, a collection of specific topics and a comment section.
To understand the justification used for the classification of each cable, please use this WikiSource article as reference.

Discussing cables
If you find meaningful or important information in a cable, please link directly to its unique reference number. Linking to a specific paragraph in the body of a cable is also possible by copying the appropriate link (to be found at theparagraph symbol). Please mark messages for social networking services like Twitter with the hash tags #cablegate and a hash containing the reference ID e.g. #09STATE122215.
Reference ID Created Released Classification Origin
09STATE122215 2009-11-27 21:51 2011-08-26 00:00 UNCLASSIFIED//FOR OFFICIAL USE ONLY Secretary of State
VZCZCXRO1844
RR RUEHBI RUEHCI
DE RUEHC #2215/01 3312157
ZNR UUUUU ZZH
R 272151Z NOV 09
FM SECSTATE WASHDC
TO RUEHNE/AMEMBASSY NEW DELHI 8114
INFO RUEHCG/AMCONSUL CHENNAI 9921
RUEHCI/AMCONSUL KOLKATA 3474
RUEHBI/AMCONSUL MUMBAI 3009
RHEFHLC/DEPT OF HOMELAND SECURITY WASHINGTON DC
RHMCSUU/FAA NATIONAL HQ WASHINGTON DC
RHMFIUU/TSA HQ WASHINGTON DC
RULSDMK/TRANSPORTATION DEPT WASHINGTON DC 0813
UNCLAS SECTION 01 OF 04 STATE 122215 
 
SENSITIVE 
SIPDIS 
 
E.O. 12958: N/A 
TAGS: EAIR PREL PTER IN
SUBJECT: CIVAIR INDIA: REQUEST TO SEEK CLARIFICATION FROM THE 
MINISTRY OF CIVIL AVIATION ON SECURITY SCREENINGS 
 
1. This is an action request.  See paras. 12-14. 
 
2. (SBU) Summary:  Due to recent statements made by Indian Bureau of 
Civil Aviation Security (BCAS) officials in correspondence with a 
U.S. air carrier, as well as comments made by a BCAS official in an 
August 2009 meeting, the Transportation Security Administration (TSA) 
of the U.S. Department of Homeland Security would like to verify that 
Indian air carriers are conducting security screening as required by 
TSA for non-stop flights to the United States.  TSA requests that 
Post meet with senior-level officials at the Ministry of Civil 
Aviation (MOCA) to seek clarification about procedures for security 
screening of flights to the United States, and to request approval 
from the Government of India (GOI) for TSA to conduct inspections of 
host country air carrier non-stop flights operating between India and 
the United States.  MOCA should be informed that if TSA is unable to 
confirm the adequacy of security screening for these flights, the USG 
may be compelled to request consultations under the U.S.-India Air 
Transport Agreement of April 14, 2005 (referred to as the 
"Agreement"), and, if those consultations are not successful at 
resolving the issue, to contemplate additional measures to ensure the 
security of passengers traveling between the United States and India. 
 Given the sensitivity of this issue, the Department urges Post to 
ensure that appropriate officials in the Ministry of External Affairs 
(MEA) also are informed.  Post is also requested to obtain an update 
from GOI officials on the status of the Airport Technical Visit 
Memorandum of Understanding (MOU) proposed by TSA.  End Summary. 
 
Background 
---------- 
 
3.  (SBU) In September 2007, TSA attempted to conduct inspections of 
host country air carriers that operate non-stop flights from India's 
New Delhi-Indira Gandhi International Airport (DEL) and 
Mumbai-Chhatrapati Shivaji International Airport (BOM) to the United 
States.  However, the GOI refused to permit the inspection team to 
complete the inspections.  Since that time, the GOI has continued to 
deny TSA requests to carry out Indian air carrier inspections at DEL 
and BOM. 
 
4.  (SBU) Although TSA could not perform complete airport assessments 
and air carrier inspections in 2007, TSA was able to determine that 
there were serious security inadequacies at DEL and BOM. 
 
5.  (SBU) In response to the extraordinary level of threat in India, 
coupled with weak (or undetermined) security measures being carried 
out at India's last point of departure (LPD) airports, on March 17, 
2009, TSA issued a Security Directive (SD) to U.S. air carriers 
operating to and from India and an Emergency Amendment (EA) to host 
country carriers operating flights to the United States.  The SD and 
EA contain additional security requirements that must be implemented 
by air carriers in order for flights to continue operating to the 
United States.  It had been TSA's understanding, until recently, that 
all air carriers operating flights from India to the United States 
were adhering to TSA's SD or EA, as appropriate. 
 
6. (SBU) In late 2007, TSA began negotiations with the GOI for a 
non-binding Airport Technical Visit Memorandum of Understanding with 
the Bureau of Civil Aviation Security (BCAS MOU) that, among other 
things, would allow the United States and India to conduct reciprocal 
airport inspections.  The BCAS MOU has not been completed, though it 
appeared during August 4-7, 2009 meetings in New Delhi between the 
TSA Representative to India and MOCA and BCAS officials that the MOU 
would be concluded in the near term. 
 
7.  (SBU) At a meeting on August 7 at BCAS Headquarters, a BCAS 
official told the TSA Representative to India that BCAS had directed 
host country air carriers to disregard U.S. regulations for 
operations to the United States.  TSA confirmed, through discussions 
with Indian air carriers, that this instruction was in fact issued. 
However, the air carriers claim that they have been implementing TSA 
security procedures despite the BCAS instruction. 
 
8.  (SBU) On October 28, BCAS issued a Show Cause Notice to 
Continental Airlines (CO) challenging the screening of former 
President Kalam, as well as CO's performance of secondary screening 
measures (as required by the TSA SD issued to CO) not approved by 
BCAS.  The Show Cause Notice raises the concern that the GOI may 
impose legal sanctions on U.S. carriers or their employees that 
implement TSA regulations for U.S.-bound flights and/or that the GOI 
may attempt to prevent CO and other U.S. air carriers from conducting 
 
STATE 00122215  002 OF 004 
 
 
secondary screening or any other additional security measure for 
direct flights to the United States. 
 
9.  (SBU) The Show Cause Notice, coupled with the August 7 BCAS 
official's statement (and confirmed by at least one host country air 
carrier, in writing), compels TSA to seek clarification about 
security screening procedures for flights to the United States, and 
to again request approval from the GOI to conduct inspections of host 
country air carrier non-stop flights operated between India and the 
United States. 
 
TSA's Possible Courses of Action 
-------------------------------- 
 
10.  Under Article 7 (Security) of the Agreement, each Party has 
agreed to observe the security provisions required by the other Party 
for aircraft to entry into, departure from, or operation in the 
territory of the other Party.  Article 7 further states that if one 
Party has reasonable grounds to believe that the other Party is not 
observing these provisions, and if consultations do not resolve the 
issue, then the first Party can withhold, revoke, limit, or impose 
conditions on the authority of the airlines of that other Party. 
Further, if required by an emergency, a Party may take interim action 
prior to the expiration of the period for consultations. 
 
11.  (SBU) TSA's security regulations are promulgated to protect the 
traveling public, the movement of commerce, and the security of U.S. 
airspace.  Therefore, if TSA cannot verify that Indian air carriers 
are conducting necessary secondary screening on non-stop flights to 
the United States as required by U.S. regulations, the USG may be 
compelled to request consultations under the U.S.-India Air Transport 
Agreement and, if those consultations are not successful at resolving 
the issue, may have to consider: 1) posting public notices at U.S. 
international airports advising the public of TSA's inability to 
adequately assess security measures for flights from India to the 
United States; 2) suspending those non-stop flights; 3) requiring 
Indian air carriers to make intermediate stops at airports in a third 
country where more robust security procedures may be carried out 
rather than flying on a non-stop basis to the United States; and/or 
4) requiring Indian air carriers to stop at a more secluded U.S. 
airport for full aircraft off-loading and re-screening before the 
flight may proceed to its final destination. 
 
Action Request 
-------------- 
 
12.  (U) TSA requests that Post use the talking points at para 15 
with senior-level officials at MOCA and MEA to seek clarification 
about security screening procedures for flights to the United States, 
to request approval from the GOI to conduct inspections of host 
country air carrier non-stop flights operated between India and the 
United States, and to request approval from the GOI to conduct 
airport inspections at Indian airports serving as last points of 
departure to the United States.   The talking points may also be left 
behind as a non-paper. 
 
13.  (U) Post should also inform GOI officials of the actions the USG 
may consider taking if TSA cannot verify the adequacy of security 
screening on flights to the United States as required by U.S. 
regulations. 
 
14.  (U) TSA additionally requests that Post inquire about the status 
of the BCAS MOU. 
 
15.  (SBU) Begin Talking Points: 
 
-- It is critical that U.S. and Indian civil aviation security 
officials maintain a cooperative working relationship as our 
countries work to meet the difficult challenge of ensuring civil 
aviation security. 
 
-- The United States and India share a commitment to the safety and 
security of international air transport, and the prevention of acts 
or threats against the security of aircraft, which jeopardize the 
safety of persons or property and undermine public confidence in the 
safety of civil aviation.  This shared concern is reflected in the 
safety and security provisions of the U.S.-India Air Transport 
Agreement of 2005 (the Agreement). 
 
-- Under Article 7 (Security) of the Agreement, each Party has agreed 
to observe the security provisions required by the other Party for 
aircraft to entry into, departure from, or operation in the territory 
of the other Party.  Article 7 further states that if one Party has 
reasonable grounds to believe that the other Party is not observing 
these provisions, and if consultations do not resolve the issue, then 
 
STATE 00122215  003 OF 004 
 
 
the first Party can withhold, revoke, limit, or impose conditions on 
the authority of the airlines of that other Party. Further, if 
required by an emergency, a Party may take interim action prior to 
the expiration of the period for consultations. 
 
-- The Transportation Security Administration (TSA) directly 
regulates air carriers, and requires each air carrier operating to 
the United States to carry out a TSA-approved security program. 
Additionally, each such air carrier may, via Emergency Amendments 
(EAs) and Security Directives (SDs), be required to implement certain 
security measures in addition to what is contained in its security 
program in order to address specific emergencies, threats, 
vulnerabilities or other security concerns. 
 
-- Mandatory air carrier security programs, and supplemental EAs and 
SDs, are part of TSA's regulatory scheme, and therefore have the 
force and effect of regulations.  It is the responsibility of the air 
carrier to ensure that the measures contained in an SD or EA are 
adequately implemented.  SDs and EAs are issued to air carriers and 
not foreign governments, and TSA ordinarily does not expect that 
foreign governments would implement the measures contained in these 
documents. 
 
-- If an air carrier is not in compliance with TSA requirements, it 
faces various TSA enforcement actions (administrative action, civil 
penalty, etc.).  Where a country refuses to allow one of its air 
carriers to comply with TSA requirements, then the United States may 
invoke the consultations provision under the security article of an 
air transport agreement (Article 7 of the Agreement). Where 
consultations fail to result in a satisfactory resolution, the 
security article provides that the United States may refuse the air 
carrier entry to U.S. airspace or place other limitations on the air 
carrier's ability to continue operate to the United States. 
 
-- During an August 7, 2009, meeting in New Delhi, a senior official 
of the Indian Bureau of Civil Aviation Security (BCAS) told the TSA 
Representative for India that BCAS had directed host country air 
carriers to disregard U.S. regulations for their operations to the 
United States.  Independently, TSA was able to corroborate this 
statement in discussions with at least one host country air carrier, 
in writing.  However, the carriers claimed to be implementing 
security procedures required in TSA regulations despite the BCAS 
instruction. 
 
-- On October 28, BCAS issued a Show Cause Notice to Continental 
Airlines (CO) challenging the April pre-flight screening of former 
President Kalam and the secondary screening CO conducts that is not 
approved by BCAS.  This raises the concern that the Government of 
India (GOI) may seek to impose legal sanctions on U.S. carriers that 
follow TSA regulations and/or attempt to prevent CO, and other U.S. 
carriers, from conducting secondary screening for flights to the 
United States. 
 
-- As part of its mandate to protect the traveling public and the 
safety and security of U.S. airspace, TSA seeks clarification about 
security screening procedures for flights to the United States, and 
renews its requests for approval from the GOI to conduct inspections 
of Indian air carrier non-stop flights operated between India and the 
United States, and to request approval from the GOI to conduct 
airport inspections at Indian Airports serving as last points of 
departure to the United States, specifically at New Delhi-Indira 
Gandhi International Airport and at Mumbai-Chhatrapati Shivaji 
International Airport. 
 
-- Because of the grave security concerns, if TSA cannot verify the 
adequacy of security screening for flights to the United States, the 
USG may be compelled to request consultations under the Agreement 
and, if those consultations are not successful at resolving the 
issue, may consider the following actions: posting public notices at 
U.S. international airports advising the public of TSA's inability to 
adequately assess security measures for flights from India to the 
United States; suspending Indian carrier non-stop flights between 
India and the United States; requiring Indian carriers to make 
intermediate stops at airports where more robust security procedures 
may be carried out, rather than being permitted to continue flying 
non-stop to the United States; and/or requiring Indian carriers to 
stop at a more secluded U.S. airport for full aircraft off-loading 
and re-screening before the flight may proceed to its final 
destination. 
 
-- TSA also seeks clarification on the status of BCAS consideration 
of the Airport Technical Visit Memorandum of Understanding (MOU) 
proposed by TSA.  This MOU would not only allow reciprocal airport 
inspections, but also would more generally raise the level of 
cooperation between U.S. and Indian civil aviation security 
 
STATE 00122215  004 OF 004 
 
 
officials. 
 
-- Given the serious security concerns faced by the United States, 
TSA has only exempted current Heads of State and Heads of Government 
from the screening process for such flights.  TSA screening 
requirements apply universally to all airports serving as the last 
point of departure into the United States.  However, TSA has 
established discrete and respectful screening protocols for 
non-exempt VIPs.  With prior coordination, these individuals will be 
afforded all due courtesies as appropriate to their former or current 
positions. 
 
End Talking Points. 
CLINTON