Key fingerprint 9EF0 C41A FBA5 64AA 650A 0259 9C6D CD17 283E 454C

-----BEGIN PGP PUBLIC KEY BLOCK-----
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=5a6T
-----END PGP PUBLIC KEY BLOCK-----

		

Contact

If you need help using Tor you can contact WikiLeaks for assistance in setting it up using our simple webchat available at: https://wikileaks.org/talk

If you can use Tor, but need to contact WikiLeaks for other reasons use our secured webchat available at http://wlchatc3pjwpli5r.onion

We recommend contacting us over Tor if you can.

Tor

Tor is an encrypted anonymising network that makes it harder to intercept internet communications, or see where communications are coming from or going to.

In order to use the WikiLeaks public submission system as detailed above you can download the Tor Browser Bundle, which is a Firefox-like browser available for Windows, Mac OS X and GNU/Linux and pre-configured to connect using the anonymising system Tor.

Tails

If you are at high risk and you have the capacity to do so, you can also access the submission system through a secure operating system called Tails. Tails is an operating system launched from a USB stick or a DVD that aim to leaves no traces when the computer is shut down after use and automatically routes your internet traffic through Tor. Tails will require you to have either a USB stick or a DVD at least 4GB big and a laptop or desktop computer.

Tips

Our submission system works hard to preserve your anonymity, but we recommend you also take some of your own precautions. Please review these basic guidelines.

1. Contact us if you have specific problems

If you have a very large submission, or a submission with a complex format, or are a high-risk source, please contact us. In our experience it is always possible to find a custom solution for even the most seemingly difficult situations.

2. What computer to use

If the computer you are uploading from could subsequently be audited in an investigation, consider using a computer that is not easily tied to you. Technical users can also use Tails to help ensure you do not leave any records of your submission on the computer.

3. Do not talk about your submission to others

If you have any issues talk to WikiLeaks. We are the global experts in source protection – it is a complex field. Even those who mean well often do not have the experience or expertise to advise properly. This includes other media organisations.

After

1. Do not talk about your submission to others

If you have any issues talk to WikiLeaks. We are the global experts in source protection – it is a complex field. Even those who mean well often do not have the experience or expertise to advise properly. This includes other media organisations.

2. Act normal

If you are a high-risk source, avoid saying anything or doing anything after submitting which might promote suspicion. In particular, you should try to stick to your normal routine and behaviour.

3. Remove traces of your submission

If you are a high-risk source and the computer you prepared your submission on, or uploaded it from, could subsequently be audited in an investigation, we recommend that you format and dispose of the computer hard drive and any other storage media you used.

In particular, hard drives retain data after formatting which may be visible to a digital forensics team and flash media (USB sticks, memory cards and SSD drives) retain data even after a secure erasure. If you used flash media to store sensitive data, it is important to destroy the media.

If you do this and are a high-risk source you should make sure there are no traces of the clean-up, since such traces themselves may draw suspicion.

4. If you face legal action

If a legal action is brought against you as a result of your submission, there are organisations that may help you. The Courage Foundation is an international organisation dedicated to the protection of journalistic sources. You can find more details at https://www.couragefound.org.

WikiLeaks publishes documents of political or historical importance that are censored or otherwise suppressed. We specialise in strategic global publishing and large archives.

The following is the address of our secure site where you can anonymously upload your documents to WikiLeaks editors. You can only access this submissions system through Tor. (See our Tor tab for more information.) We also advise you to read our tips for sources before submitting.

http://ibfckmpsmylhbfovflajicjgldsqpc75k5w454irzwlh7qifgglncbad.onion

If you cannot use Tor, or your submission is very large, or you have specific requirements, WikiLeaks provides several alternative methods. Contact us to discuss how to proceed.

WikiLeaks
Press release About PlusD
 
AMBASSADOR'S MEETING WITH ATT: MALI'S SECURITY NEEDS IN AN ERA OF UNHELPFUL NEIGHBORS
2009 May 12, 14:58 (Tuesday)
09BAMAKO288_a
CONFIDENTIAL
CONFIDENTIAL
-- Not Assigned --

10993
-- Not Assigned --
TEXT ONLINE
-- Not Assigned --
TE - Telegram (cable)
-- N/A or Blank --

-- N/A or Blank --
-- Not Assigned --
-- Not Assigned --


Content
Show Headers
d) 1. (C) Summary: The Ambassador met with President Amadou Toumani Toure (ATT) on May 8 to inquire about Mali's plans for addressing northern security in a theoretical post-hostage situation future and his views of how the U.S. might best assist these efforts. ATT spoke of the dynamics surrounding the ongoing hostage crises, rejecting "financial transactions" to secure hostage releases, but nevertheless questioning the efficacy of "trapping oneself in useless principles." Referring to his oft-renewed attempts to hold a Sahel regional summit on security and counter-terrorism cooperation, ATT expressed disappointment at the continued unavailability of various regional leaders which suggested a lack of commitment on their part. He claimed to have largely resigned himself to the fact that Mali would have to address these problems alone despite them being clearly regional problems with regional solutions. He outlined a list, consistent with previous requests, of training, equipment, intelligence, and infrastructure requirements to increase Malian capacity and facilitate any such actions. What he outlined was capacity building over the medium term to re-establish the government's presence and authority in the North and reduce the freedom to maneuver of traffickers, criminal bands, and AQIM, rather than a near-term strategy to pursue AQIM. ATT welcomed news of a DOD/NASA plane to produce better maps of northern Mali. End summary. --------------------------------------------- ------- The Troubled North - and No Help from the Neighbors --------------------------------------------- ------- 2. (C) Recalling earlier requests at various levels for help in being better able to view their own country as a first step to better exercise national control, particularly in Mali's undermapped north, the Ambassador shared recent news passed earlier to the Minister of Defense, that we had been able to secure the services of a NASA plane leased by the Department of Defense that will overfly Mali to produce maps that we can share with the GOM. ATT welcomed this news, and began a discussion of the still-fragile nature of Mali's northern zones. Calling the Tuareg rebellion distressing and continued stability uncertain given ever-present banditry and contraband flows, ATT wished aloud for rapid development projects to reassure people of better prospects. He lamented the continuing presence of terrorists, and his inability to organize regional cooperation among a group of neighbors who all viewed instilling better security as someone else's job. 3. (C) Reacting to recent vitriolic exchanges in Algerian and Malian media, he was particularly harsh on Algeria. He said the Algerians had taken neither responsibility for a problem that originated in Algeria nor action. For example, they had done nothing with information Mali had gleaned from the Canadian hostages' Nigerien chauffeur, despite possessing both the military means to do so and Malian permission for Algerian cross-border hot pursuit "even to Timbuktu." He concluded that while Mali would continue to talk to its neighbors, Sahelian cooperation was not going to produce anything effective, so Mali needed to be able to act alone on its own behalf. Before turning to that list of requirements, he recalled that Mali had arrested four terrorists including a significant cache of materiel and computers. The detainees included AQIM's chief of operations in the zone. He observed that the composition of the group, including a Ghanaian in addition to the more expected one Algerian and two Mauritanians, underscored the frighteningly expanding reach of AQIM in West Africa. 4. (C) ATT said that as Mali attempted to navigate the hostage situation the scope of the terrorism problem had become more apparent. A group that formerly numbered fewer than 30 now seemed closer to 100. He said he had warned Mali's neighbors that if they didn't act to solve this problem, "others would do it for us," another theme from his recent interview in Algerian media. He summarized Mali's needs as training, logistic support, equipment and intelligence. He linked these first three elements to the daunting vastness and harsh terrain of northern Mali, observing that Malian security forces could not succeed without the same mobility - and security - enjoyed by AQIM. This required not only training and equipment, including items such as adapted vehicles for the punishing desert environment, but the establishment/reinforcement of small strategic locations in the north from which Malian forces could patrol into the farther flung interior. He cited the need to set up a few small remote outposts and to rehabilitate the base and air field at Tessalit(including its 3000 meter runway) toward those ends. Currently, forces deployed in the north work only from 4 am to 10 am, forced by the lack of the most rudimentary shelter to spend sunlight hours in the shade of their vehicles. 5. (C) To illustrate his point about the difficulty of maneuvering successfully in these zones, ATT cited the struggle against the Tuareg rebel bandit Bahanga. The Malian armed forces had been unable to best him until they brought in irregulars used to, equipped for, and effective in the desert environment. ATT praised the importance of intelligence cooperation, and stressed that he had asked Mali's director for external security to share any and all information related to the four new detainees. The Ambassador thanked ATT for that information and cooperation, and recalled that there is an anti-terrorism judicial track in addition to the intelligence one. She noted that the FBI would like to have access to, or at least pose questions to, the four detainees in hopes that their information might bolster the legal case for U.S. indictments or extradition requests for specific AQIM members. ATT accepted this suggestion, without further comment on how such access would be facilitated. He was equally supportive but non-specific in response to the Ambassador's reference to her discussions with the Minister of Internal Security on beginning to develop police capacity. ----------------------- How to Handle Hostages? ----------------------- 6. (C) Turning to the remaining hostages, ATT said that Mali was "not naive" about various parties' preferred strategies. Even as he said that Mali found it difficult to refuse a donor's request for assistance, he said that Mali opposed any financial exchange for hostages, a position the Ambassador said we strongly shared. The ambassador added that we hoped the four detainees would not wind up as... which ATT himself completed with the words "bargaining chips." ATT expanded on the hostage subject, saying he hoped to be in a situation to prevent the future taking of hostages, which put Mali and others in a situation of being trapped in "useless principles" while there were human concerns at stake. Military action was too risky, leaving the exchange of money or people. He expressed concern that the British hostage would be killed, calling the hostage takers crazed and eager to show off and prove their franchise's worth to central Al Qaeda figures. Meanwhile, Mali would continue patrols and look into the information seized from the detainees to see what it contributed. The Ambassador stressed that although Mali's situation is quite complicated, the ceding of important principles will only embolden AQIM and incite others to take even more hostages in a rapidly developing cottage industry. Picking up her reference to the petty bandits who had faciliated the transfer of the four Europeans to AQIM, ATT said Mali had arrested some of them, and would prosecute them. 7. (C) As ATT again reiterated the cycle of Mali's needs for mapping, intelligence, training/logistics, and infrastructure, he drew a picture of a more medium than short term process. The Ambassador used this opportunity to discuss current training in connection with JCETs, highlighting that these exercises represent a substantial U.S. financial and personnel investment. A core of Malian military personnel needed to be made available for successive JCETS, subsequent exercises needed to again focus on those previously trained, and a means needed to be devised between engagements to keep skills honed as well as share acquired knowledge with other Malian elements. ATT agreed continuity was important, although he added that substitutions were sometimes inevitable as forces were deployed on maneuvers. He undertook to talk with the Minister of Defense to ensure the maximum reasonable number of Malian soldiers would be repeat participants. 8. (C) ATT's parting messages for the Ambassador were threefold. First, he greatly appreciates our training, which is very important to his largely young and inexperienced military. Second, Mali realizes it can no longer rely on its neighbors on counter-terrorism, and thus needs to improve its own forces and capacities with our help. Third, ATT renewed his expression of friendship with the U.S. He acknowledged the embarassment of the ongoing hostage crises in Mali's north, and while he recognized the correctness of the principles governing these situations, he said he could not ignore the human dimension involved. -------- Comment -------- 9. (C) ATT's basic list of requests for empowering Malian forces to better patrol the north is not new. This is not surprising since the needs remain unchanged and there has been no significant injection of equipment or tailored systematic training in response to these earlier requests. The list, including intelligence, vehicles, equipment, and physical reinforcement of northern outpost bases dates at least to mid-2007. We hope that our long-delayed delivery of vehicles, communications equipment, and physical barriers can be brought to fruition soon. While the Algiers Accords contain some reservations about increased militarization of the north, the scope of his proposed reinforcements is in fact within the boundaries of the agreement which calls for the refurbishment of airports in Tessalit, Gao, and Kidal and instructs Mali to relocate military bases away from urbanized areas. While we have seen ATT frustrated with Algeria and other neighbors before, the intensity of his reaction was new. Where ATT previously saw regional consultation as preceding concerted regional action, his plans now, if not necessarily in a short term, are more solitary. MILOVANOVIC

Raw content
C O N F I D E N T I A L BAMAKO 000288 E.O. 12958: DECL: 05/10/2024 TAGS: PREL, PTER, ML SUBJECT: AMBASSADOR'S MEETING WITH ATT: MALI'S SECURITY NEEDS IN AN ERA OF UNHELPFUL NEIGHBORS Classified By: Ambassador Gillian A. Milovanovic, reasons 1.4 (b) and ( d) 1. (C) Summary: The Ambassador met with President Amadou Toumani Toure (ATT) on May 8 to inquire about Mali's plans for addressing northern security in a theoretical post-hostage situation future and his views of how the U.S. might best assist these efforts. ATT spoke of the dynamics surrounding the ongoing hostage crises, rejecting "financial transactions" to secure hostage releases, but nevertheless questioning the efficacy of "trapping oneself in useless principles." Referring to his oft-renewed attempts to hold a Sahel regional summit on security and counter-terrorism cooperation, ATT expressed disappointment at the continued unavailability of various regional leaders which suggested a lack of commitment on their part. He claimed to have largely resigned himself to the fact that Mali would have to address these problems alone despite them being clearly regional problems with regional solutions. He outlined a list, consistent with previous requests, of training, equipment, intelligence, and infrastructure requirements to increase Malian capacity and facilitate any such actions. What he outlined was capacity building over the medium term to re-establish the government's presence and authority in the North and reduce the freedom to maneuver of traffickers, criminal bands, and AQIM, rather than a near-term strategy to pursue AQIM. ATT welcomed news of a DOD/NASA plane to produce better maps of northern Mali. End summary. --------------------------------------------- ------- The Troubled North - and No Help from the Neighbors --------------------------------------------- ------- 2. (C) Recalling earlier requests at various levels for help in being better able to view their own country as a first step to better exercise national control, particularly in Mali's undermapped north, the Ambassador shared recent news passed earlier to the Minister of Defense, that we had been able to secure the services of a NASA plane leased by the Department of Defense that will overfly Mali to produce maps that we can share with the GOM. ATT welcomed this news, and began a discussion of the still-fragile nature of Mali's northern zones. Calling the Tuareg rebellion distressing and continued stability uncertain given ever-present banditry and contraband flows, ATT wished aloud for rapid development projects to reassure people of better prospects. He lamented the continuing presence of terrorists, and his inability to organize regional cooperation among a group of neighbors who all viewed instilling better security as someone else's job. 3. (C) Reacting to recent vitriolic exchanges in Algerian and Malian media, he was particularly harsh on Algeria. He said the Algerians had taken neither responsibility for a problem that originated in Algeria nor action. For example, they had done nothing with information Mali had gleaned from the Canadian hostages' Nigerien chauffeur, despite possessing both the military means to do so and Malian permission for Algerian cross-border hot pursuit "even to Timbuktu." He concluded that while Mali would continue to talk to its neighbors, Sahelian cooperation was not going to produce anything effective, so Mali needed to be able to act alone on its own behalf. Before turning to that list of requirements, he recalled that Mali had arrested four terrorists including a significant cache of materiel and computers. The detainees included AQIM's chief of operations in the zone. He observed that the composition of the group, including a Ghanaian in addition to the more expected one Algerian and two Mauritanians, underscored the frighteningly expanding reach of AQIM in West Africa. 4. (C) ATT said that as Mali attempted to navigate the hostage situation the scope of the terrorism problem had become more apparent. A group that formerly numbered fewer than 30 now seemed closer to 100. He said he had warned Mali's neighbors that if they didn't act to solve this problem, "others would do it for us," another theme from his recent interview in Algerian media. He summarized Mali's needs as training, logistic support, equipment and intelligence. He linked these first three elements to the daunting vastness and harsh terrain of northern Mali, observing that Malian security forces could not succeed without the same mobility - and security - enjoyed by AQIM. This required not only training and equipment, including items such as adapted vehicles for the punishing desert environment, but the establishment/reinforcement of small strategic locations in the north from which Malian forces could patrol into the farther flung interior. He cited the need to set up a few small remote outposts and to rehabilitate the base and air field at Tessalit(including its 3000 meter runway) toward those ends. Currently, forces deployed in the north work only from 4 am to 10 am, forced by the lack of the most rudimentary shelter to spend sunlight hours in the shade of their vehicles. 5. (C) To illustrate his point about the difficulty of maneuvering successfully in these zones, ATT cited the struggle against the Tuareg rebel bandit Bahanga. The Malian armed forces had been unable to best him until they brought in irregulars used to, equipped for, and effective in the desert environment. ATT praised the importance of intelligence cooperation, and stressed that he had asked Mali's director for external security to share any and all information related to the four new detainees. The Ambassador thanked ATT for that information and cooperation, and recalled that there is an anti-terrorism judicial track in addition to the intelligence one. She noted that the FBI would like to have access to, or at least pose questions to, the four detainees in hopes that their information might bolster the legal case for U.S. indictments or extradition requests for specific AQIM members. ATT accepted this suggestion, without further comment on how such access would be facilitated. He was equally supportive but non-specific in response to the Ambassador's reference to her discussions with the Minister of Internal Security on beginning to develop police capacity. ----------------------- How to Handle Hostages? ----------------------- 6. (C) Turning to the remaining hostages, ATT said that Mali was "not naive" about various parties' preferred strategies. Even as he said that Mali found it difficult to refuse a donor's request for assistance, he said that Mali opposed any financial exchange for hostages, a position the Ambassador said we strongly shared. The ambassador added that we hoped the four detainees would not wind up as... which ATT himself completed with the words "bargaining chips." ATT expanded on the hostage subject, saying he hoped to be in a situation to prevent the future taking of hostages, which put Mali and others in a situation of being trapped in "useless principles" while there were human concerns at stake. Military action was too risky, leaving the exchange of money or people. He expressed concern that the British hostage would be killed, calling the hostage takers crazed and eager to show off and prove their franchise's worth to central Al Qaeda figures. Meanwhile, Mali would continue patrols and look into the information seized from the detainees to see what it contributed. The Ambassador stressed that although Mali's situation is quite complicated, the ceding of important principles will only embolden AQIM and incite others to take even more hostages in a rapidly developing cottage industry. Picking up her reference to the petty bandits who had faciliated the transfer of the four Europeans to AQIM, ATT said Mali had arrested some of them, and would prosecute them. 7. (C) As ATT again reiterated the cycle of Mali's needs for mapping, intelligence, training/logistics, and infrastructure, he drew a picture of a more medium than short term process. The Ambassador used this opportunity to discuss current training in connection with JCETs, highlighting that these exercises represent a substantial U.S. financial and personnel investment. A core of Malian military personnel needed to be made available for successive JCETS, subsequent exercises needed to again focus on those previously trained, and a means needed to be devised between engagements to keep skills honed as well as share acquired knowledge with other Malian elements. ATT agreed continuity was important, although he added that substitutions were sometimes inevitable as forces were deployed on maneuvers. He undertook to talk with the Minister of Defense to ensure the maximum reasonable number of Malian soldiers would be repeat participants. 8. (C) ATT's parting messages for the Ambassador were threefold. First, he greatly appreciates our training, which is very important to his largely young and inexperienced military. Second, Mali realizes it can no longer rely on its neighbors on counter-terrorism, and thus needs to improve its own forces and capacities with our help. Third, ATT renewed his expression of friendship with the U.S. He acknowledged the embarassment of the ongoing hostage crises in Mali's north, and while he recognized the correctness of the principles governing these situations, he said he could not ignore the human dimension involved. -------- Comment -------- 9. (C) ATT's basic list of requests for empowering Malian forces to better patrol the north is not new. This is not surprising since the needs remain unchanged and there has been no significant injection of equipment or tailored systematic training in response to these earlier requests. The list, including intelligence, vehicles, equipment, and physical reinforcement of northern outpost bases dates at least to mid-2007. We hope that our long-delayed delivery of vehicles, communications equipment, and physical barriers can be brought to fruition soon. While the Algiers Accords contain some reservations about increased militarization of the north, the scope of his proposed reinforcements is in fact within the boundaries of the agreement which calls for the refurbishment of airports in Tessalit, Gao, and Kidal and instructs Mali to relocate military bases away from urbanized areas. While we have seen ATT frustrated with Algeria and other neighbors before, the intensity of his reaction was new. Where ATT previously saw regional consultation as preceding concerted regional action, his plans now, if not necessarily in a short term, are more solitary. MILOVANOVIC
Metadata
O 121458Z MAY 09 FM AMEMBASSY BAMAKO TO SECSTATE WASHDC IMMEDIATE 0315 INFO AMEMBASSY ALGIERS AMEMBASSY NIAMEY AMEMBASSY NOUAKCHOTT AMEMBASSY OUAGADOUGOU AMEMBASSY PARIS HQ USAFRICOM STUTTGART GE
Print

You can use this tool to generate a print-friendly PDF of the document 09BAMAKO288_a.





Share

The formal reference of this document is 09BAMAKO288_a, please use it for anything written about this document. This will permit you and others to search for it.


Submit this story


Help Expand The Public Library of US Diplomacy

Your role is important:
WikiLeaks maintains its robust independence through your contributions.

Please see
https://shop.wikileaks.org/donate to learn about all ways to donate.


e-Highlighter

Click to send permalink to address bar, or right-click to copy permalink.

Tweet these highlights

Un-highlight all Un-highlight selectionu Highlight selectionh

XHelp Expand The Public
Library of US Diplomacy

Your role is important:
WikiLeaks maintains its robust independence through your contributions.

Please see
https://shop.wikileaks.org/donate to learn about all ways to donate.