Keep Us Strong WikiLeaks logo

Currently released so far... 97115 / 251,287

Articles

Browse latest releases

Browse by creation date

Browse by origin

A B C D F G H I J K L M N O P Q R S T U V W Y Z

Browse by tag

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
ETRD EAGR ETTC EAID ECON EFIN ECIN EINV ELAB EAIR ENRG EPET EWWT ECPS EIND EMIN ELTN EC ETMIN EUC EZ ET ELECTIONS ENVR EU EUN EG EINT ER ECONOMICS ES EMS ENIV EEB EN ECE ECOSOC EK ENVIRONMENT EFIS EI EWT ENGRD ECPSN EXIM EIAD ERIN ECPC EDEV ENGY ECTRD EPA ESTH ECCT EINVECON ENGR ERTD EUR EAP EWWC ELTD EL EXIMOPIC EXTERNAL ETRDEC ESCAP ECO EGAD ELNT ECONOMIC ENV ETRN EIAR EUMEM ENRGPARMOTRASENVKGHGPGOVECONTSPLEAID EREL ECOM ECONETRDEAGRJA ETCC ETRG ECONOMY EMED ETR ENERG EITC EFINOECD EURM EENG ERA EXPORT ENRD ECONEINVETRDEFINELABETRDKTDBPGOVOPIC EGEN EBRD EVIN ETRAD ECOWAS EFTA ECONETRDBESPAR EGOVSY EPIN EID ECONENRG EDRC ESENV ETT EB ENER ELTNSNAR ECHEVARRIA ETRC EPIT EDUC ESA EFI ENRGY ESCI EE EAIDXMXAXBXFFR EETC ECIP EIAID EIVN EBEXP ESTN EING EGOV ETRA EPETEIND ELAN ETRDGK EAIDRW ETRDEINVECINPGOVCS EPEC ENVI ELN EAG EPCS EPRT EPTED ETRB EUM EAIDS EFIC EFINECONEAIDUNGAGM EAIDAR ESF EIDN ELAM EDU EV EAIDAF ECN EDA EXBS EINTECPS ENRGTRGYETRDBEXPBTIOSZ EPREL EAC EINVEFIN ETA EAGER EINDIR ECA ECLAC ELAP EITI EUCOM ECONEFINETRDPGOVEAGRPTERKTFNKCRMEAID EARG ELDIN EINVKSCA ENNP EFINECONCS EFINTS ECCP ETC EAIRASECCASCID EINN ETRP EAIDNI EFQ ECOQKPKO EGPHUM EBUD ECONEINVEFINPGOVIZ ENERGY ELB EINDETRD EMI ECONEFIN EIB EURN ETRDEINVTINTCS EIN EFIM ETIO ELAINE EMN EATO EWTR EIPR EINVETC ETTD ETDR EIQ ECONCS EPPD ENRGIZ EISL ESPINOSA ELEC EAIG ESLCO EUREM ENTG ERD EINVECONSENVCSJA EEPET EUNCH ECINECONCS ETRO ETRDECONWTOCS ECUN EFND EPECO EAIRECONRP ERGR ETRDPGOV ECPN ENRGMO EPWR EET EAIS EAGRE EDUARDO EAGRRP EAIDPHUMPRELUG EICN ECONQH EVN EGHG ELBR EINF EAIDHO EENV ETEX ERNG ED
KMDR KPAO KPKO KJUS KCRM KGHG KFRD KWMN KDEM KTFN KHIV KGIC KIDE KSCA KNNP KHUM KIPR KSUM KISL KIRF KCOR KRCM KPAL KWBG KN KS KOMC KSEP KFLU KPWR KTIA KSEO KMPI KHLS KICC KSTH KMCA KVPR KPRM KE KU KZ KFLO KSAF KTIP KTEX KBCT KOCI KOLY KOR KAWC KACT KUNR KTDB KSTC KLIG KSKN KNN KCFE KCIP KGHA KHDP KPOW KUNC KDRL KV KPREL KCRS KPOL KRVC KRIM KGIT KWIR KT KIRC KOMO KRFD KUWAIT KG KFIN KSCI KTFIN KFTN KGOV KPRV KSAC KGIV KCRIM KPIR KSOC KBIO KW KGLB KMWN KPO KFSC KSEAO KSTCPL KSI KPRP KREC KFPC KUNH KCSA KMRS KNDP KR KICCPUR KPPAO KCSY KTBT KCIS KNEP KFRDCVISCMGTCASCKOCIASECPHUMSMIGEG KNNB KGCC KINR KPOP KMFO KENV KNAR KVIR KDRG KDMR KFCE KNAO KDEN KGCN KICA KIMMITT KMCC KLFU KMSG KSEC KUM KCUL KMNP KSMT KCOM KOMCSG KSPR KPMI KRAD KIND KCRP KAUST KWAWC KTER KCHG KRDP KPAS KITA KTSC KPAOPREL KWGB KIRP KJUST KMIG KLAB KTFR KSEI KSTT KAPO KSTS KLSO KWNN KPOA KHSA KNPP KPAONZ KBTS KWWW KY KJRE KPAOKMDRKE KCRCM KSCS KWMNCI KESO KWUN KPLS KIIP KEDEM KPAOY KRIF KGICKS KREF KTRD KFRDSOCIRO KTAO KJU KWMNPHUMPRELKPAOZW KEN KO KNEI KEMR KKIV KEAI KWAC KRCIM KWCI KFIU KWIC KCORR KOMS KNNO KPAI KBWG KTTB KTBD KTIALG KILS KFEM KTDM KESS KNUC KPA KOMCCO KCEM KRCS KWBGSY KNPPIS KNNPMNUC KWN KERG KLTN KALM KCCP KSUMPHUM KREL KGH KLIP KTLA KAWK KWMM KVRP KVRC KAID KSLG KDEMK KX KIF KNPR KCFC KFTFN KTFM KPDD KCERS KMOC KDEMAF KMEPI KEMS KDRM KEPREL KBTR KEDU KNP KIRL KNNR KMPT KISLPINR KTPN KA KJUSTH KPIN KDEV KTDD KAKA KFRP KWNM KTSD KINL KJUSKUNR KWWMN KECF KWBC KPRO KVBL KOM KFRDKIRFCVISCMGTKOCIASECPHUMSMIGEG KEDM KFLD KLPM KRGY KNNF KICR KIFR KM KWMNCS KAWS KLAP KPAK KDDG KCGC KID KNSD KMPF KPFO KDP KCMR KRMS KNPT KNNNP KTIAPARM KDTB KNUP KPGOV KNAP KNNC KUK KSRE KREISLER KIVP KQ KTIAEUN KPALAOIS KRM KISLAO KWM KFLOA
PHUM PINR PTER PGOV PREL PREF PL PM PHSA PE PARM PINS PK PUNE PO PALESTINIAN PU PBTS PROP PTBS POL POLI PA PGOVZI POLMIL POLITICAL PARTIES POLM PD POLITICS POLICY PAS PMIL PINT PNAT PV PKO PPOL PERSONS PING PBIO PH PETR PARMS PRES PCON PETERS PRELBR PT PLAB PP PAK PDEM PKPA PSOCI PF PLO PTERM PJUS PSOE PELOSI PROPERTY PGOVPREL PARP PRL PNIR PHUMKPAL PG PREZ PGIC PBOV PAO PKK PROV PHSAK PHUMPREL PROTECTION PGOVBL PSI PRELPK PGOVENRG PUM PRELKPKO PATTY PSOC PRIVATIZATION PRELSP PGOVEAIDUKNOSWGMHUCANLLHFRSPITNZ PMIG PREC PAIGH PROG PSHA PARK PETER POG PHUS PPREL PS PTERPREL PRELPGOV POV PKPO PGOVECON POUS PGOVPRELPHUMPREFSMIGELABEAIDKCRMKWMN PWBG PMAR PREM PAR PNR PRELPGOVEAIDECONEINVBEXPSCULOIIPBTIO PARMIR PGOVGM PHUH PARTM PN PRE PTE PY POLUN PPEL PDOV PGOVSOCI PIRF PGOVPM PBST PRELEVU PGOR PBTSRU PRM PRELKPAOIZ PGVO PERL PGOC PAGR PMIN PHUMR PVIP PPD PGV PRAM PINL PKPAL PTERE PGOF PINO PHAS PODC PRHUM PHUMA PREO PPA PEPFAR PGO PRGOV PAC PRESL PORG PKFK PEPR PRELP PREFA PNG PGOVPHUMKPAO PRELECON PINOCHET PFOR PGOVLO PHUMBA PRELC PREK PHUME PHJM POLINT PGOVPZ PGOVKCRM PGOVE PHALANAGE PARTY PECON PEACE PROCESS PLN PRELSW PAHO PEDRO PRELA PASS PPAO PGPV PNUM PCUL PGGV PSA PGOVSMIGKCRMKWMNPHUMCVISKFRDCA PGIV PRFE POGOV PEL PBT PAMQ PINF PSEPC POSTS PHUMPGOV PVOV PHSAPREL PROLIFERATION PENA PRELTBIOBA PIN PRELL PGOVPTER PHAM PHYTRP PTEL PTERPGOV PHARM PROTESTS PRELAF PKBL PRELKPAO PKNP PARMP PHUML PFOV PERM PUOS PRELGOV PHUMPTER PARAGRAPH PERURENA PBTSEWWT PCI PETROL PINSO PINSCE PQL PEREZ PBS

Browse by classification

Community resources

courage is contagious

Viewing cable 04ABUJA484, NIGERIA AND GTC PROPOSAL

If you are new to these pages, please read an introduction on the structure of a cable as well as how to discuss them with others. See also the FAQs

Understanding cables
Every cable message consists of three parts:
  • The top box shows each cables unique reference number, when and by whom it originally was sent, and what its initial classification was.
  • The middle box contains the header information that is associated with the cable. It includes information about the receiver(s) as well as a general subject.
  • The bottom box presents the body of the cable. The opening can contain a more specific subject, references to other cables (browse by origin to find them) or additional comment. This is followed by the main contents of the cable: a summary, a collection of specific topics and a comment section.
To understand the justification used for the classification of each cable, please use this WikiSource article as reference.

Discussing cables
If you find meaningful or important information in a cable, please link directly to its unique reference number. Linking to a specific paragraph in the body of a cable is also possible by copying the appropriate link (to be found at theparagraph symbol). Please mark messages for social networking services like Twitter with the hash tags #cablegate and a hash containing the reference ID e.g. #04ABUJA484.
Reference ID Created Released Classification Origin
04ABUJA484 2004-03-22 10:17 2011-08-25 00:00 UNCLASSIFIED Embassy Abuja
This record is a partial extract of the original cable. The full text of the original cable is not available.
UNCLAS SECTION 01 OF 02 ABUJA 000484 
 
SIPDIS 
 
STATE FOR IIP/T/TP PEN AGNEW AND AF/PD 
 
E.O. 12958: N/A 
TAGS: OIIP KPAO NI
SUBJECT:  NIGERIA AND GTC PROPOSAL 
 
REFTEL:  STATE 033002 
 
1.  Overview:  The U.S. Mission in Nigeria proposes 
that GTC and the Mission partner with NITDA (National 
Information Technology Development Agency) to combat 
cybercrime, a well-known threat both inside and outside 
of Nigeria through 419 emails.  Increasingly, the 
Government of Nigeria is concerned about the potential 
destabilizing effect of cybercrime to Nigeria's banking 
and commercial sectors.  As a basis for combating 
cybercrime, Nigeria's criminal laws must conform to the 
newly emergent threat.  Current laws did not foresee 
information and communications technology (ICT) and its 
possible criminal use.  While Nigeria's private sector 
in ICT has generated immense foreign and domestic 
investment in this key sector, there are no laws or 
enforcement institutions created specifically to 
prohibit and enforce actions directed at these ICT 
infrastructures. 
 
2.  In addition, no country parallels Nigeria in 
electronically generated 419 scams.  While the Nigerian 
Economic and Financial Crimes Commission (EFCC) is 
statutorily empowered to enforce Nigeria's financial 
crimes laws, under which 419 falls, Nigeria's laws only 
contemplate the traditional non-ICT environment. 
Internet-based 419 scams are not legally covered at 
present.  Further, if a criminal is apprehended using 
cyber-tracking means, evidence of his/her activities 
may be inadmissible in Nigerian courts as the current 
laws are mute on this subject.  A recent judgment by 
the Kaduna State Court of Appeals denied evidential 
admissibility of a computer-generated accounts 
statement on the grounds that the statement did not 
meet the definition of a "book" as stipulated under the 
Nigerian Evidence Act. 
 
3.  Recently, the GON - at NITDA's urging - established 
a Presidential Committee on Cybercrime to examine the 
need for cybercrime laws in Nigeria and what mechanism 
is best suited for enforcing such laws.  The 
Committee's recommendations included the drafting of 
new legislation dealing with cybercrime, formation of a 
Nigerian Cybercrime Working Group (NCWG) to do public 
education and gain National Assembly support for such 
legislation, and the establishment of a separate agency 
for enforcing new cybercrime laws.  Two of the three 
recommendations have been carried out; law enforcement 
elements and the EFCC have resisted the establishment 
of a separate enforcement agency for cybercrime.  The 
NCWG has drafted a Cybercrime Act, but it has not yet 
been reviewed within the GON nor submitted to the 
National Assembly.  Relevant sectors of the GON 
(primarily judicial, law enforcement, and intelligence 
officials) as well as the National Assembly will 
require technical assistance to understand the draft 
law and its ramifications, as well as how it 
articulates with traditional criminal law.  Private 
sector consultation and training is also necessary so 
that telecommunications officials and related service 
providers, Internet Service Providers (ISPs) and 
cybercafe owners are also adequately informed.  The 
NCWG is inadequately staffed to provide such technical 
training. 
 
4.  Project Description:  The Mission seeks USGTC 
professional(s) to assist the NCWG to brief GON 
stakeholders on the draft Cybercrime Act (Phase 1), and 
once approved, brief National Assembly legislators on 
the Act (Phase 2) to ensure its passage.  USGTC 
partner(s) should be familiar with cybercrime laws in 
the United States, Europe, and the developing world, 
and be able to brief legislative bills concerning ICT 
to non-experts.  A combination of legal expertise and 
computer/ICT skills is desired.  Post would also want 
the professional(s) to work with the NCWG to develop an 
appropriate public education strategy for explaining 
the issue of cybercrime and the enacted legislation to 
Nigeria's ICT community and the media (Phase 3).  As 
part of Phase 3, we would also ask that USGTC 
investigate if any of the current anti-spam software 
might be used to assist in identifying and screening 
out 419 emails - such information and software would be 
useful to share with stakeholders here. 
 
5.  Timeframe:  Post would anticipate conducting the 
Phase 1 training in the last quarter of FY 04, and the 
Phase 2 training in the first quarter of FY 05.  Phase 
3 would take place during FY 05. 
 
6.  Project Purpose/MPP Goals:  Assisting the GON in 
the area of cybercrime falls under International Crime. 
 
7.  Primary Contact:  Primary contact for the proposal 
is Margaret McKean, Information Officer, U.S. Embassy 
Abuja, 234-9-523-2018, McKeanMB@state.gov 
 
8.  Audiences:  The audiences for the proposal are 
relevant stakeholders within the GON whose offices will 
be concerned with cybercrime and enacted legislation, 
members of the National Assembly who will debate and 
vote the draft Cybercrime Act into law, and members of 
the public - particularly those sectors most concerned 
with ICT.  NITDA is the GON's chief agency for ICT 
issues, and has strong support from President Obasanjo. 
 
9.  Cost Sharing:  PAS does not have 04 funds to 
contribute to this project; we may have limited funds 
for local per diem and travel in FY 05, but another 
continuing resolution would likely negate this 
probability.  INL has some funding for cybercrime, 
which is primarily slated for law enforcement training 
and assistance.  The USGTC proposal is meant to 
complement INL initiatives; however, INL funding will 
not be able to contribute to the current proposal. 
 
10.  Follow-on:  Through the EDDI initiative, the 
Mission has already established a strong partnership 
with NITDA; INL has a broad assistance program with law 
enforcement and security agencies in Nigeria, and USAID 
has a multi-year project with the court system.  These 
partnerships will dovetail in the Mission's efforts to 
assist the GON deal with cybercrime, and particularly 
Internet-based 419 scams. 
 
11.  Language requirements:  English. 
 
ROBERTS