09TBILISI652, PANDEMIC INFLUENZA TRIPWIRES

WikiLeaks Link

To understand the justification used for the classification of each cable, please use this WikiSource article as reference.
Discussing cables
If you find meaningful or important information in a cable, please link directly to its unique reference number. Linking to a specific paragraph in the body of a cable is also possible by copying the appropriate link (to be found at theparagraph symbol).Please mark messages for social networking services like Twitter with the hash tags #cablegate and a hash containing the reference ID e.g. #09TBILISI652.
Reference ID Created Released Classification Origin
09TBILISI652 2009-04-01 11:39 2011-08-30 01:44 UNCLASSIFIED Embassy Tbilisi

VZCZCXRO6250
RR RUEHAG RUEHAST RUEHDA RUEHDBU RUEHDF RUEHFL RUEHIK RUEHKW RUEHLA
RUEHLN RUEHLZ RUEHNP RUEHPOD RUEHROV RUEHSK RUEHSR RUEHVK RUEHYG
DE RUEHSI #0652 0911139
ZNR UUUUU ZZH
R 011139Z APR 09
FM AMEMBASSY TBILISI
TO RUEHC/SECSTATE WASHDC 1298
INFO RUEHZL/EUROPEAN POLITICAL COLLECTIVE

UNCLAS TBILISI 000652 
 
SIPDIS 
 
DEPT FOR EUR/CARC, EEB 
 
 
E.O. 12958: N/A 
TAGS: AMGT AMED CASC TBIO ASEC KFLU KSAF KSEO KPAO GG
SUBJECT:  PANDEMIC INFLUENZA TRIPWIRES 
 
REF: STATE 013929 
 
1.  Per guidance and request we have reviewed and updated our 
Pandemic Influenza Tripwires.  They have been submitted to our EAP 
via the Crisis and Emergency Planning Application system. They are 
now pending DS/SPP/EP review prior to inclusion in the published 
online version. 
Tefft

Wikileaks

Advertisements
Post a comment or leave a trackback: Trackback URL.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: