Security policy
1 Security policy is a definition of what it means to be secure for a system, organization or
other entity. For an organization, it addresses the constraints on behavior of its members as well as constraints imposed on adversaries by
mechanisms such as doors, locks, keys and walls. For systems, the security policy
addresses constraints on functions and flow among them, constraints on access by
external systems and adversaries including programs and access to data by people.
https://store.theartofservice.com/the-security-policy-toolkit.html
Security policy - Significance
1 Consequently, a top level security policy is essential to any serious
security scheme and sub-policies and rules of operation are meaningless
without it.
https://store.theartofservice.com/the-security-policy-toolkit.html
Peter A. Diamond - Social Security policy
1 Social Security (United States)|Social Security policy as well as its analogs
in other countries, such as China
https://store.theartofservice.com/the-security-policy-toolkit.html
Content Security Policy
1 'Content Security Policy' ('CSP') is a computer security concept, to
prevent cross-site scripting (XSS) and related attacks
https://store.theartofservice.com/the-security-policy-toolkit.html
Content Security Policy - Status
1 CSP was originally developed by the Mozilla Foundation and was first
implemented in Firefox 4. As of 2012 the CSP is a W3C candidate. The
following header names are in use as part of an experimental CSP
implementations:
https://store.theartofservice.com/the-security-policy-toolkit.html
Content Security Policy - Status
1 * Content-Security-Policy — standard header name proposed by the W3C document. Google Chrome supports
this as of version 25. Firefox supports this as of version 23, released on 6
August 2013.
https://store.theartofservice.com/the-security-policy-toolkit.html
Content Security Policy - Status
1 * X-WebKit-CSP — experimental header introduced into Google
Chrome and other WebKit-based browsers (Safari (web browser)|
Safari) in 2011.
https://store.theartofservice.com/the-security-policy-toolkit.html
Content Security Policy - Status
1 * X-Content-Security-Policy — experimental header introduced in
Gecko (layout engine)|Gecko 2 based browsers (Firefox 4 to Firefox 22,
Thunderbird 3.3, SeaMonkey 2.1).
https://store.theartofservice.com/the-security-policy-toolkit.html
Content Security Policy - Status
1 Support for the sandbox directive is also available in Internet Explorer 10 using the experimental X-Content-
Security-Policy header.
https://store.theartofservice.com/the-security-policy-toolkit.html
Content Security Policy - Status
1 There's initial support for CSP in some web frameworks such as
AngularJS and Django (web framework)|Django. Instructions for Ruby on Rails have been posted by
GitHub.
https://store.theartofservice.com/the-security-policy-toolkit.html
Content Security Policy - Mode of operation
1 If the Content-Security-Policy header is present in the server response, a
compliant client enforces the declarative whitelist policy. One
example goal of a policy is a more strict execution mode for JavaScript in order to prevent certain cross-site
scripting attacks. In practice this means that a number of features are
disabled by default:https://store.theartofservice.com/the-security-policy-toolkit.html
Content Security Policy - Mode of operation
1 * inline JavaScript (e.g. , DOM event attributes like onclick, and anchor tags with an href value that starts with javascript:) are blocked - all
script code must reside in separate files, served from a whitelisted
domain (can be enabled by unsafe-inline),
https://store.theartofservice.com/the-security-policy-toolkit.html
Content Security Policy - Mode of operation
1 * dynamic code evaluation (via eval() and string arguments for both
setTimeout and setInterval) are blocked (can be enabled by unsafe-
eval)
https://store.theartofservice.com/the-security-policy-toolkit.html
Content Security Policy - Mode of operation
1 Recommended coding practices for CSP-compatible web applications is to load code from external source
files (), parse JSON instead of evaluating it and use inline functions
for other statements.
https://store.theartofservice.com/the-security-policy-toolkit.html
Content Security Policy - Mode of operation
1 In addition to restricting execution of JavaScript, a policy can specify where
resources can be loaded from for a given page. This includes CSS, JavaScript, images, frames, applets, Ajax (programming)|Ajax, etc.https://docs.google.com/presentation/d/15fx5XLR289_JVG0kQ__WzS1lIU3aNGuZCoQ
XqLo8sKo/pub?start=falseloop=falsedelayms=3000#slide
=id.gc729aa5e_1101
https://store.theartofservice.com/the-security-policy-toolkit.html
Content Security Policy - Mode of operation
1 If the Content-Security-Policy-Report-Only header is present in the server
response, a compliant client monitors and reports only without enforcing the declarative whitelist policy. This
is useful during development.
https://store.theartofservice.com/the-security-policy-toolkit.html
Content Security Policy - Reporting
1 Anytime a requested resource or script execution violates the policy, the browser will fire a POST (HTTP)|POST request to the value specified
in report-urihttp://www.w3.org/TR/CSP/#sample-violation-report containing
details of the violation.
https://store.theartofservice.com/the-security-policy-toolkit.html
Content Security Policy - Reporting
1 CSP reports are standard JSON structures and can be captured
either by application's own APIFor example in Django (web framework)|Django a CSP receiver is available in [https://github.com/sdelements/django-security django-security] module.
or public CSP report receivers.
https://store.theartofservice.com/the-security-policy-toolkit.html
Content Security Policy - Browser Add-Ons and Extensions Exemption
1 According to the CSP Processing Model, CSP should not interfere with the operation of browser add-ons or
extensions installed by the user
https://store.theartofservice.com/the-security-policy-toolkit.html
Munich Conference on Security Policy
1 The 'Munich Security Conference' () is an annual Meeting|conference on international security policy that is held in the Hotel Bayerischer Hof, Munich|Hotel Bayerischer Hof in
Munich, Germany.
https://store.theartofservice.com/the-security-policy-toolkit.html
Munich Conference on Security Policy - Overview
1 Over the past four decades the Munich Security Conference (MSC) has become the most important
independent forum for the exchange of views by international security
policy decision-makers. Each year it brings together about 350 senior
figures from more than 70 countries around the world to engage in an intensive debate on current and
future security challenges.https://store.theartofservice.com/the-security-policy-toolkit.html
Munich Conference on Security Policy - Overview
1 The list of attendees includes Heads of States, Governments and
International Organizations, Minister (government)|Ministers, Member of Parliament|Members of Parliament, high-ranking representatives of the
Armed Forces, Scientists, representatives of the Mass media|Media as well as representatives of
the Civil society.https://store.theartofservice.com/the-security-policy-toolkit.html
Munich Conference on Security Policy - Overview
1 The intention of the conference is to address the topical main security issues
and to debate and analyze the main security challenges in the presence and the future in line with the concept of networked security. A focal point of the conference is the discussion and the exchange of views
on the development of the wikt:transatlantic|transatlantic relations as well as European and global security in the
21st century.https://store.theartofservice.com/the-security-policy-toolkit.html
Munich Conference on Security Policy - Overview
1 The conference was founded in 1962 by German publisher Ewald-Heinrich von Kleist-
Schmenzin under the title Wehrkundetagung. He was succeeded in
1998 by a former vice-head of the German Chancellery who chaired the conference
under the title Munich Conference on Security Policy until 2008. Since 2008 Ambassador Wolfgang Ischinger is the
chairman of the Munich Security Conference.
https://store.theartofservice.com/the-security-policy-toolkit.html
Munich Conference on Security Policy - Overview
1 From February 6–8, 2009, the 45th Munich Security Conference was
attended by over 50 ministers and more than a dozen heads of state and
government from all over the world, including US-Vice-President Joe Biden,
French President Nicolas Sarkozy, German Chancellor Angela Merkel, Polish Prime Minister Donald Tusk and Afghan
President Hamid Karzai.
https://store.theartofservice.com/the-security-policy-toolkit.html
Munich Conference on Security Policy - Overview
1 The idea is to invite a number of distinguished and high-ranking
participants to changing capitals and give them the opportunity to confidentially discuss current
international security policy issues and develop sustainable solutions
https://store.theartofservice.com/the-security-policy-toolkit.html
Munich Conference on Security Policy - Overview
1 The 47th Munich Security Conference was held from February 4–6, 2011 and has again assembled top-level decision makers from all
over the world, including UN Secretary General Ban Ki Moon, German Chancellor
Angela Merkel, British Prime Minister David Cameron U.S. Secretary of State Hillary
Clinton and Russian Foreign Minister Sergey Lavrov whilst Belarus has been excluded from
the circle of MSC attendees because of the country’s human rights situation.
https://store.theartofservice.com/the-security-policy-toolkit.html
Munich Conference on Security Policy - Overview
1 In 2011 two special features marked the growing role of the Munich Security Conference as center of attention of international security
policy: European Union's High Representative of the Union for Foreign Affairs and Security Policy Catherine Ashton called for the Quartet on the Middle East, consisting of the EU, Russia, the USA and the UN, to meet within the setting of
the 2011 Munich Security Conference and during a ceremony on the sidelines of the
conference Russia’s Foreign Minister Sergey Lavrov and U.S
https://store.theartofservice.com/the-security-policy-toolkit.html
Munich Conference on Security Policy - Overview
1 The 48th Munich Security Conference was held from February 2–5,
2012.
https://store.theartofservice.com/the-security-policy-toolkit.html
Munich Conference on Security Policy - Overview
1 The 49th Munich Security Conference featured talks concerning the Syrian civil war. Attendees included former
Syrian opposition leader Moaz al-Khatib, who offered Bashar al-Assad and his aides safe passage out of the
country in exchange for their resignations.
https://store.theartofservice.com/the-security-policy-toolkit.html
Munich Conference on Security Policy - Overview
1 The 50th Munich Security Conference took place on January, 31 - February, 2 2014. The main
topics were the Syrian civil war and the Ukrainian Euromaidan protests. Attendees
included UN Secretary General Ban Ki Moon, German President Joachim Gauck, John Kerry
and Sergey Lavrov. Zbigniew Brzezinski, Leonid Kozhara, Vitali Klychko, Leonid Slutsky
(politician)|Leonid Slutsky, Irakli Garibashvili, Traian Basescu and Štefan Füle participated in a
discussion panel regarding the situation in Ukraine.
https://store.theartofservice.com/the-security-policy-toolkit.html
Computer security policy
1 A 'computer security policy' defines the goals and elements of an organization's computer
systems
https://store.theartofservice.com/the-security-policy-toolkit.html
Computer security policy - Formal description
1 If a system is regarded as a Finite state automaton|finite-state
automaton with a set of transitions (operations) that change the
system's state, then a security policy can be seen as a statement that
partitions these states into authorized and unauthorized ones.
https://store.theartofservice.com/the-security-policy-toolkit.html
Computer security policy - Formal description
1 Given this simple definition one can define a secure system as one that
starts in an authorized state and will never enter an unauthorized state.
https://store.theartofservice.com/the-security-policy-toolkit.html
Computer security policy - Hybrid policy model
1 * Chinese_wall#Computer_science|Chinese Wall (Also known as Brewer and Nash model)
https://store.theartofservice.com/the-security-policy-toolkit.html
Computer security policy - Policy languages
1 To represent a concrete policy especially for automated
enforcement of it, a language representation is needed. There exist a lot of application specific languages
that are closely coupled with the security mechanisms that enforce
the policy in that application.
https://store.theartofservice.com/the-security-policy-toolkit.html
Computer security policy - Policy languages
1 Compared with this abstract policy languages, e.g. the Type
enforcement|Domain Type Enforcement-Language, are independent of the concrete
mechanism.
https://store.theartofservice.com/the-security-policy-toolkit.html
Trusted Computing Base - Predicated upon the security policy
1 It should be pointed out that as a consequence of the above Orange
Book definition, the boundaries of the TCB depend closely upon the
specifics of how the security policy is fleshed out
https://store.theartofservice.com/the-security-policy-toolkit.html
Trusted Computing Base - Predicated upon the security policy
1 This fundamental relativity of the boundary of the TCB is exemplifed by
the concept of the 'target of evaluation' (TOE) in the Common Criteria security process: in the
course of a Common Criteria security evaluation, one of the first decisions that must be made is the boundary of the audit in terms of the list of
system components that will come under scrutiny.
https://store.theartofservice.com/the-security-policy-toolkit.html
Rajiv Gandhi - Security policy
1 Rajiv authorised an extensive police and army campaign to contain terrorism in Punjab
https://store.theartofservice.com/the-security-policy-toolkit.html
Rajiv Gandhi - Security policy
1 With his speech while addressing the Joint Session of the US Congress and India, he said,
https://store.theartofservice.com/the-security-policy-toolkit.html
Rajiv Gandhi - Security policy
1 India is an old country, but a young nation; and like the young
everywhere, we are impatient. I am young and I too have a dream. I
dream of an India, strong, independent, self reliant and in the forefront of the front ranks of the
nations of the world in the service of mankind.
https://store.theartofservice.com/the-security-policy-toolkit.html
Skype security - Security policy
1 The company's security policy
includes:
https://store.theartofservice.com/the-security-policy-toolkit.html
Skype security - Security policy
1 #Callers must present a username and password or other authentication credential.
https://store.theartofservice.com/the-security-policy-toolkit.html
Skype security - Security policy
1 #Messages transmitted are encrypted from caller to caller. No intermediate node
(router (computing)|router) has access to the meaning of these messages. This claim
has been undermined in May 2013 by evidence that Microsoft (owner of Skype) has pinged unique URL's embedded in a
Skype conversation; this could only happen if Microsoft has access to the unencrypted
form of these messages.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013
1 'National Cyber Security Policy' is a proposed law by Department of
Electronics and Information Technology (DeitY), Ministry of
Communications and Information Technology (India)|Ministry of
Communication and Information Technology, Government of India
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Reason for Cyber Security
1 India had no Cyber security policy before 2013. In 2013, The Hindu newspaper, citing
documents leaked by NSA whistleblower Edward Snowden, has alleged that much of
the US National Security Agency|NSA surveillance was focused on India's domestic
politics and its strategic and commercial interests. This leads to spark furor among
people. Under pressure, Government unveiled a National Cyber Security Policy
2013 on 2 July 2013.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Vision
1 To build a secure and resilient cyberspace for citizens, business and government.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Mission
1 To protect information and information infrastructure in
cyberspace, build capabilities to prevent and respond to cyber threat, reduce vulnerabilities and minimize
damage from cyber incidents through a combination of institutional
structures, people, processes, technology and cooperation.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Objective
1 *To create a secure cyber ecosystem in the country, generate adequate
trust and confidence in IT system and transactions in cyberspace and
thereby enhance adoption of IT in all sectors of the economy.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Objective
1 *To create an assurance framework for design of security policies and
promotion and enabling actions for compliance to global security
standards and best practices by way of conformity assessment (Product,
process, technology people).
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Objective
1 *To strengthen the Regulatory Framework for ensuring a SECURE CYBERSPACE ECOSYSTEM.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Objective
1 *To enhance and create National and Sectoral level 24X7 mechanism for
obtaining strategic information regarding threats to ICT
infrastructure, creating scenarios for response, resolution and crisis management through effective
predictive, preventive, protective response and recovery actions.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Objective
1 *To improve visibility of integrity of ICT products and services by
establishing infrastructure for testing validation of security of such
product.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Objective
1 *To create workforce for 5,00,000 professionals skilled in next 5 years
through capacity building skill development and training.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Objective
1 *To provide fiscal benefit to businesses for adoption of standard security practices and
processes.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Objective
1 *To enable Protection of information while in process, handling, storage transit so as to safeguard privacy of citizen's data and reducing economic
losses due to cyber crime or data theft.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Objective
1 *To enable effective prevention, investigation and prosecution of
cybercrime and enhancement of law enforcement capabilities through
appropriate legislative intervention.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Strategies
1 * Creating a secure Ecosystem.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Strategies
1 * Creating an assurance framework.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Strategies
1 * Encouraging Open Standards.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Strategies
1 * Strengthening The regulatory Framework.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Strategies
1 * Creating mechanism for Security Threats Early Warning, Vulnerability
management and response to security threat.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Strategies
1 * Securing E-Governance services.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Strategies
1 * Protection and resilience of Critical
Information Infrastructure.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Strategies
1 * Promotion of Research and Development in cyber security.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Strategies
1 * Human Resource Development (fostering education and training
programs both in formal and informal sectors to support Nation's cyber security needs and build capacity.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Strategies
1 * Developing effective Public Private Partnership.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Strategies
1 * To develop bilateral and multilateral relationship in the area of cyber
security with other country. ('Information sharing and
cooperation')
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Shortcomings
1 (1) The declared cyber security policy has proved to be a paper work alone
with no actual implementation till date.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Shortcomings
1 (2) The cyber security trends and developments in India 2013 (Pdf) provided by Perry4Law’s Techno Legal Base (PTLB) has listed the
shortcomings of Indian cyber security policy in general and Indian cyber security initiatives in particular.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Shortcomings
1 (3) Indian cyber security policy has failed to protect civil liberties of Indians including privacy rights.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Shortcomings
1 (4) Civil liberties protection in cyberspace has been blatantly
ignored by Indian government and e-surveillance projects have been kept
intact by the Narendra Modi government.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Shortcomings
1 (5) The offensive and defensive cyber security capabilities of India are still missing.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Shortcomings
1 (6) India is considered to be a sitting duck in cyberspace and cyber
security field and the proposed cyber security policy has failed to change
this position.
https://store.theartofservice.com/the-security-policy-toolkit.html
National Cyber Security Policy 2013 - Shortcomings
1 despite the contrary claims and declared achievements and the
cyber security policy is just another policy document with no actual
implementation and impact.
https://store.theartofservice.com/the-security-policy-toolkit.html
Treaty establishing a Constitution for Europe - Common foreign and security policy
1 The EU is charged with defining and implementing a 'common foreign and
security policy' in due time. The wording of this article is taken from
the existing Treaty on European Union.
https://store.theartofservice.com/the-security-policy-toolkit.html
Klaus Scharioth - Security Policy
1 Scharioth was Director of the Private Office to the Secretary General of NATO|NATO Secretary General in Brussels, Belgium, from 1993 to 1996. In the Foreign Ministry he
thereafter held posts as Head of the Defense and Security Policy Division
(1996–1997), and as Head of the International Security and North
America Directorate (1998–1999).https://store.theartofservice.com/the-security-policy-toolkit.html
Catherine Ashton - Foreign Affairs and Security Policy
1 On 19 November 2009, Ashton was appointed the EU's first High Representative of the Union for Foreign Affairs and Security
Policy. Her appointment was agreed by a summit of 27 European Union leaders in
Brussels. Having initially pushed for former British Prime Minister Tony Blair to become President of the European Council, Gordon Brown eventually relented on the condition
that the High Representative position be awarded to a Briton.
https://store.theartofservice.com/the-security-policy-toolkit.html
Catherine Ashton - Foreign Affairs and Security Policy
1 Ashton's relative obscurity prior to her appointment occasioned comment in the
media
https://store.theartofservice.com/the-security-policy-toolkit.html
Catherine Ashton - Foreign Affairs and Security Policy
1 Nile Gardiner of the Heritage Foundation, who is on record as
opposed to a European Union role in foreign and security policy on
principle,See, for example, Four Key Principles for a Conservative British Foreign Policy, Web Memo 2911, The Heritage Foundation, 21 May 2010
https://store.theartofservice.com/the-security-policy-toolkit.html
Catherine Ashton - Foreign Affairs and Security Policy
1 By contrast, former Home Secretary Charles Clarke said: I have seen Cathy in action
https://store.theartofservice.com/the-security-policy-toolkit.html
Catherine Ashton - Foreign Affairs and Security Policy
1 After a confirmation hearing by the Trade Committee of the European
Parliament, Ashton was approved by the Parliament on 22 October 2008
by 538 to 40 votes, with 63 abstentions. She took office on 1
December 2009 for a five-year-term.
https://store.theartofservice.com/the-security-policy-toolkit.html
Felipe Calderon - Security policy
1 Despite imposing a cap on salaries of high-ranking public servants,
Calderón ordered a raise on the salaries of the Federal Police
(Mexico)|Federal Police and the Military of Mexico|Mexican armed
forces on his first day as president.
https://store.theartofservice.com/the-security-policy-toolkit.html
Felipe Calderon - Security policy
1 Calderón's government also ordered massive raids on drug cartels upon
assuming office in December 2006 in response to an increasingly deadly
spate of violence in his home state of Michoacán. The decision to intensify drug enforcement operations has led
to an Mexican Drug War|ongoing conflict between the federal
government and the Mexican drug cartels.
https://store.theartofservice.com/the-security-policy-toolkit.html
Felipe Calderon - Security policy
1 On January 19, 2007, Mexico captured the leader of one of its
seven major drug cartels, the Diaz Parada gang, five weeks into an army crackdown on narco gangs. Mexican
soldiers and federal police jointly arrested Pedro Diaz Parada, whose
cartel has operated across southern Mexico, on Tuesday in the southern city of Oaxaca, a spokeswoman for the attorney general's office said.
https://store.theartofservice.com/the-security-policy-toolkit.html
Felipe Calderon - Security policy
1 The next day, in a controversial move, the government announced the extradition to
the United States of several drug gang leaders.[http://www.dallasnews.com/sharedc
ontent/dws/dn/latestnews/stories/012207dnintlmexdrugs.8234538.html
Mexico vows to keep fighting drug trade] A day after Mexico extradited four top drug kingpins to the U.S., Mexico's top security
officials denied that the extraditions were a result of U.S. pressure
https://store.theartofservice.com/the-security-policy-toolkit.html
Felipe Calderon - Security policy
1 The Mexican government has also ordered Mexican soldiers and Federal Police into several cities, most notably, Tijuana and Ciudad Juárez. In Tijuana and also Ciudad
Juárez, the army ordered that all local police officers surrender their weapons, as it is
suspected that many officers have ties with drug cartels. Other states where actions
have been taken include Michoacán, Tamaulipas, Tabasco, and Guerrero.
https://store.theartofservice.com/the-security-policy-toolkit.html
Felipe Calderon - Security policy
1 In a January 2007 interview with the Financial Times, Calderón said, We have received very encouraging
results
https://store.theartofservice.com/the-security-policy-toolkit.html
Felipe Calderon - Security policy
1 On April 9, 2007, the Secretariat of National Defense (Mexico)|
Secretariat of Defense announced in a report the results of the first four months of Calderón's presidency
https://store.theartofservice.com/the-security-policy-toolkit.html
Felipe Calderon - Security policy
1 On December 16, 2009, the Mexican Navy killed Arturo Beltran-Leyva, a
once important drug trafficker.[http://www.csmonitor.com/World/200
9/1217/Mexican-drug-lord-Why-Arturo-Beltran-Levya-s-death-
matters]Christian Science Monitor
https://store.theartofservice.com/the-security-policy-toolkit.html
Felipe Calderon - Security policy
1 The government is relatively successful in detaining drug lords;
however, drug-related violence remains high in contested area along the US border such as Ciudad Juárez,
Tijuana, and Matamoros
https://store.theartofservice.com/the-security-policy-toolkit.html
Felipe Calderon - Security policy
1 2011 showed higher homicides and 2012 shows a similar rate as 2011, with 2012 also
being a Presidential transition year and a year with high security spending nationwide
it could indicate a temporary pause or a plateau in violence. Each of the last two years homicides were in the 20,000 to
27,000 range.[http://www.kpbs.org/news/2013/feb/06/drug-violence-mexico-dropped-2012/ KPBS
article of Mexican drug violence]
https://store.theartofservice.com/the-security-policy-toolkit.html
Enrique Peña Nieto - Security policy
1 The security policy of Peña Nieto prioritizes the reduction of violence rather than attacking Mexico's drug trafficking organizations head-on,
marking a departure from the strategy of the past six years during
Felipe Calderón's administration
https://store.theartofservice.com/the-security-policy-toolkit.html
Enrique Peña Nieto - Security policy
1 Critics of Peña Nieto's security strategy, however, say that he has
offered little sense in exactly how he will reduce the violence
https://store.theartofservice.com/the-security-policy-toolkit.html
Andrés Manuel López Obrador - Security policy
1 López Obrador had been a firm critic of Felipe Calderón's military
approach, and promised a further application of the law, proposing to
take care of the victims of the Mexican Drug War and an emphasis on the protection of human rights in
the country
https://store.theartofservice.com/the-security-policy-toolkit.html
Andrés Manuel López Obrador - Security policy
1 He also stated that if he elected, he would firmly reject any intelligence activity from the United States, including money and weapons in aid. This policy would put a stop to the operations in Mexico of the
Central Intelligence Agency and the Drug Enforcement Administration, including the use of unmanned drones. But it could also discourage U.S. aid to Mexico ($1.6 billion
since 2008).
https://store.theartofservice.com/the-security-policy-toolkit.html
Andrés Manuel López Obrador - Security policy
1 This proposal was intended to appeal to popular resentment over U.S.
actions in ATF gunwalking scandal|Operation Fast and Furious, in which
U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives|ATF agents allegedly engaged in gunwalking.
https://store.theartofservice.com/the-security-policy-toolkit.html
Andrés Manuel López Obrador - Security policy
1 López Obrador promised to reactivate the economy and social
growth so more Mexicans could have access to a better life without having to join the cartels and abandon the
rule of law
https://store.theartofservice.com/the-security-policy-toolkit.html
Andrés Manuel López Obrador - Security policy
1 López Obrador summed up his security policy as Abrazos, no
balazos. (Hugs, not bullets). At the start of his campaign, he said that he would remove Army personnel from
the streets, but then said on May 2012 that he would use the military until Mexico has a trained, skilled
and moralized police force.
https://store.theartofservice.com/the-security-policy-toolkit.html
Democratic security policy
1 'Democratic security' or 'Democratic security policy' refers to a Colombian security policy implemented during the
administration of President Álvaro Uribe (2002-2010). It was unveiled in
June 2003.
https://store.theartofservice.com/the-security-policy-toolkit.html
Democratic security policy - Objectives
1 *Consolidate State control throughout Colombia to deny
sanctuary to terrorists and perpetrators of violence.
https://store.theartofservice.com/the-security-policy-toolkit.html
Democratic security policy - Objectives
1 *Protect the population through the increase of State presence and a reduction in violence.
https://store.theartofservice.com/the-security-policy-toolkit.html
Democratic security policy - Objectives
1 *Destroy the illegal drug trade in Colombia to eliminate the revenues
which finance terrorism and generate corruption and crime
https://store.theartofservice.com/the-security-policy-toolkit.html
Democratic security policy - Objectives
1 *Transparently and efficiently manage resources as a means to
reform and improve the performance of government.
https://store.theartofservice.com/the-security-policy-toolkit.html
Democratic security policy - Objectives
1 Several of theses objectives stem from a belief in that the Colombian government should protect Colombian
society from the effects of terrorism and the illegal drug trade, and in turn society as a whole should have a
more active and comprehensive role in the government's struggle against illegal armed groups
such as the Revolutionary Armed Forces of Colombia|FARC and National Liberation Army (Colombia)|ELN
guerrilla warfare|guerrillas or the paramilitary Autodefensas Unidas de Colombia|AUC, in order to ensure the defense and continued existence of the opportunity for both leftwing and rightwing political
parties to engage in free and open debate, along with all the other aspects of democratic life.
https://store.theartofservice.com/the-security-policy-toolkit.html
Democratic security policy - Application
1 The previously mentioned objectives would be achieved
through:
https://store.theartofservice.com/the-security-policy-toolkit.html
Democratic security policy - Application
1 #engaging the civilian population more actively
https://store.theartofservice.com/the-security-policy-toolkit.html
Democratic security policy - Application
1 #demobilizing illegal groups
https://store.theartofservice.com/the-security-policy-toolkit.html
Democratic security policy - Results
1 According to official government statistical information from August
2004, the application of the democratic security policy has
achieved the following results: within two years, homicides, kidnappings, and terrorist attacks in Colombia
decreased by as much as 50% - their lowest levels in almost twenty years
https://store.theartofservice.com/the-security-policy-toolkit.html
Democratic security policy - Results
1 The Colombian Embassy in Washington states that, as a result of this policy, the Colombian
armed forces would now have: 60% more combat ready soldiers than four years ago;
Helicopters which have significantly improved the mobility of Armed Forces throughout the national territory; Attack helicopters ensuring
means to be more aggressive in the fight against FARC and AUC; Increased basic combat supplies, including rifles and ammunition; and
[has received] significant less human rights complaints against them
https://store.theartofservice.com/the-security-policy-toolkit.html
Democratic security policy - Controversy
1 The democratic security policy has become controversial inside and
outside Colombia since the beginning of its application
https://store.theartofservice.com/the-security-policy-toolkit.html
Democratic security policy - Controversy
1 Several critical analysts have accepted that there have been some factual improvements in the areas of
security (for the most part) and human rights (to a lesser degree),
[http://www.hchr.org.co/documentoseinformes/informes/altocomisionado/
informes.php3?cod=8cat=11 Informes] but they also question the
exact validity and application of some of the statements, pointing out serious problems, in particular (but
not only) paramilitary related, which remain a source of grave concern
https://store.theartofservice.com/the-security-policy-toolkit.html
Democratic security policy - Controversy
1 Several of the critics also argue that, due to the increased degree of
involvement of the civilian population, that this policy
overexposes civilians to the dangers of the conflict, becoming potential targets for any abuses committed
both by the illegal armed groups and the government's security forces
https://store.theartofservice.com/the-security-policy-toolkit.html
Democratic security policy - Controversy
1 Supporters of the policy (and most other critics) tend to not consider the previous
argument to be accurate, arguing that there are several differences between both
policies, in particular that the democratic security policy is being implemented by a
legally elected government, in an environment where a number of democratic
and political liberties are guaranteed, despite the continuing conflict.
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy
1 :This article deals with the workings of European Union foreign policy. For the relations between the European
Union and third countries, see Foreign relations of the European
Union.
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy
1 Foreign policy is chaired and represented by the EU's High
Representative of the Union for Foreign Affairs and Security Policy|
High Representative.
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy
1 The CFSP sees the NATO responsible for the territorial defence of Europe and peace-
making
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - 1957–1993
1 Co-operation in international trade negotiations, under the Common
Commercial Policy, dates back to the establishment of the community in
1957
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - 1993–2009: pillar system
1 The weaknesses evident in EPC—apparent for example during the Yugoslav wars—led to a desire to
strengthen foreign policy
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - 1993–2009: pillar system
1 The Amsterdam Treaty created the office of the High Representative for the Common Foreign and Security Policy (held by Javier Solana until 1 December 2009) to co-ordinate and
represent the EU's foreign policy.
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - 2009–present: Consolidation
1 Furthermore, in an effort to ensure greater co-ordination and
consistency in EU foreign policy, the Treaty of Lisbon created a High Representative of the Union for
Foreign Affairs and Security Policy, de facto merging the post of High
Representative for the Common Foreign and Security Policy and
European Commissioner for External Relations and European Neighbourhood Policy
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Objectives
1 According to Article J.1 of title V of the Maastricht Treaty, the European
Union defines and implements a common foreign and security policy that covers all areas of foreign and
security policy, the objectives of which are to:
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Objectives
1 * Safeguard the common values, fundamental interests, independence and integrity of the European Union|
Union in conformity with the principles of the United Nations
Charter;
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Objectives
1 * Strengthen the security of the Union in
all ways;
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Objectives
1 * Preserve peace and strengthen international security, in accordance
with the principles of the United Nations Charter, as well as the
principles of the Helsinki Final Act and the objectives of the Paris
Charter, including those on external borders;
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Objectives
1 * Develop and consolidate democracy and the rule of law, and
respect for human rights and fundamental Freedom (political)|
freedoms.
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Types of policy
1 The European Council defines the principles and general guidelines for
the CFSP as well as common strategies to be implemented by the
EU
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - High Representative
1 The Common Foreign and Security Policy requires unanimity among the
now 28 member states on the appropriate policy to follow on any
particular policy
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - High Representative
1 The High Representative also coordinates the work of the European Union Special
Representatives
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Bodies
1 There are a number of bodies set up within the context of the CFSP. Within
the Council, there is the Foreign Affairs Council (FAC) configuration,
essentially a meeting of foreign ministers and the Political and
Security Committee or PSC, which monitors the international situation
in the areas covered by the CFSP and contributes by delivering opinions to the Council of Ministers, either at its request or its own initiative, and also
monitors the implementation of agreed policies.
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Bodies
1 The European Defence Agency (EDA) encourages increase in defence
capabilities, military research and the establishment of a European
internal market for military technology. Two bodies carried over from the Western European Union
(see defence, below) are the European Union Institute for Security
Studies (EUISS) and the European Union Satellite Centre (EUSC).
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Bodies
1 The EUISS is the European Union's in-house think tank. Its mission is to find a common security culture for the EU, to help develop and project
the CFSP, and to enrich Europe's strategic debate.
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Bodies
1 The EUSC is providing analysis of
satellite imagery and collateral data.
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Defence policy
1 Since the List of European Councils#Cologne 1999|Cologne European Council in 1999, the Common Security and
Defence Policy (or CSDP) has become a significant part of the CFSP. The EU itself has limited military capability, member
states are responsible for their own territorial defence and a majority of EU
members are also members of NATO, which is responsible for the defence of Europe.
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Defence policy
1 There was also the Western European Union (WEU), which was a European security organisation related to the
EU
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Defence policy
1 Following the Kosovo war in 1999, the European Council agreed that the
Union must have the capacity for autonomous action, backed by
credible military forces, the means to decide to use them, and the
readiness to do so, in order to respond to international crises
without prejudice to actions by NATO
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Political and Security Committee
1 The Political and Security Committee (PSC or COPS from its French
acronym) first established as an interim body in 2000 is described by
the Nice European Council Conclusions as the linchpin of the European Security and Defence
Policy and the Common Foreign and Security Policy
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Anti-Terrorism policy
1 The European Union considers to be 'terrorist organisations' those groups or those entities that are controlled directly or indirectly by persons who
commit or attempt to commit terrorist acts, participating in these groups, or facilitating the execution
of terrorist plans
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Anti-Terrorism policy
1 The European Union gives a definition of terrorism as Common
Position 2001/931/CFSP of 27 December 2001,[http://eur-
lex.europa.eu/LexUriServ/LexUriServ.do?
uri=OJ:L:2001:344:0093:0096:EN:PDF COUNCIL COMMON POSITION of 27 December 2001 on the application of
specific measures to combat terrorism] also referred to by
successive acts
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Anti-Terrorism policy
1 * seriously intimidating a population
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Anti-Terrorism policy
1 * unduly compelling a Government or international organization to perform or abstain from performing any act
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Anti-Terrorism policy
1 * seriously destabilizing or destroying the fundamental political,
constitutional, economic or social constructs
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 The list of terrorist organisations was started in 2001 with the 13
organisations listed on 27 December of Common Position 2001/931/CFSP
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 Common Position 2005/847/CFSP of the European Council of 29
November 2005 updated the list of these organizations,[http://eur-
lex.europa.eu/LexUriServ/LexUriServ.do?
uri=OJ:L:2005:314:0041:0045:EN:PDF COUNCIL COMMON POSITION
2005/847/CFSP]
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 of 29 November 2005 updating Common Position 2001/931/CFSP on the application of specific measures to combat terrorism and repealing Common Position 2005/725/CFSP]
which are as follows:
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 *Communist Party of the Philippines , including
the New People's Army
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 *Continuity Irish Republican Army
(CIRA)
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 *ETA / Bath Tierra y Libertad / Basque Fatherland and Freedom (ETA), which
includes organizations: KAS, Xaki, Ekin, Jarrai-Haika-Segi and Gestoras
pro Amnistía
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 *Grupos de Resistencia Anti-Fascist Primero de Octubre / October 1, anti-
fascist resistance group (GRAPO)
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 *Holy Land Foundation for Relief and Development
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 *International Sikh Youth Federation
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 *Kurdistan Workers' Party (PKK)
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 *Loyalist Volunteer Force (LVF)
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 *Mujahedin-e Khalq (MKO or MEC), except for the National Council of Resistance of Iran
(NCRI)
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 *Popular Front for the Liberation of Palestine -
General Command (PFLP-GC)
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 *Red Brigades for the Construction of
the Communist Party Fighter (BR-
PCC)https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 *Revolutionary Armed Forces of Colombia (FARC)
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 *Revolutionary Nuclei / Epanastatiki
Pirines
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 *Revolutionary Organization November
17 / Dekati Evdomi Noemvri
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 *Devrimci Sol or Army / Front / Revolutionary People's Liberation Party (DHKP / C)
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 *Revolutionary Popular Struggle / Epanastatikos Laikos
Agonas (ELA)
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 *Partido Comunista Peruano - Sendero Luminoso / Shining
Path (SL)
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 *Stichting Al Aqsa Mosque (aka Stichting Al Aqsa Nederland, aka Al Aqsa Nederland)
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 *Brigade XX Luglio
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 *Ulster Defence Association / Ulster Freedom Fighters
(UDA / UFF)
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 *United Self-Defense of Colombia (AUC)
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 *Core initiative proletarian revolutionary (results Inactive)
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - List of terrorist organisations
1 *Informal Anarchist Federation including cell cooperative artisan fire,
natural - occasionally spectacular
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Outside the CFSP
1 Representation in international bodies is previously through the
European Commissioner for External Relations, who worked alongside the High Representative, but now with
the High Representative of the Union for Foreign Affairs and Security
Policy|High Representative directly as a Vice President of the European Commission|Commission Vice-
Presidenthttps://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Outside the CFSP
1 The influence of the EU is also felt through the Enlargement of the European Union|
enlargement
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Outside the CFSP
1 The European Union's influential economic status and its nation-like
characteristics has been acknowledged by the United States' Central Intelligence Agency (CIA) in
their publication The World Factbook. The EU was included in the Factbook
in December 2004.
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Humanitarian aid
1 The ECHO (European Commission)|European Community humanitarian
aid office, or ECHO, provides humanitarian aid from the EU to developing countries. In 2006 its budget amounted to 671 million
euro, 48% of which went to the ACP countries. Counting the EU's own
contributions and those of its member states together, the EU is the largest aid donor in the world.
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Humanitarian aid
1 The EU's aid has previously been criticised by the think-tank Open Europe for being inefficient, mis-targeted and linked to economic
objectives
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Neutrality
1 Although the Irish people were reassured of their neutrality before
agreeing to the Nice Treaty, the Finnish Prime Minister, Matti
Vanhanen, on 5 July 2006, while speaking to the European Parliament as President of the European Council|
Council President declared:[http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//
TEXT+CRE+20060705+ITEM-002+DOC+XML+V0//
ENlanguage=EN European Parliament Debate (English
Translation)] europarl.europa.eu
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Neutrality
1 Nevertheless, a similar guarantee on neutrality in relation to the Treaty of Lisbon was granted to Ireland at the
European Council of 18/19 June 2009:
https://store.theartofservice.com/the-security-policy-toolkit.html
Common Foreign and Security Policy - Neutrality
1 The European Council also agreed that other concerns of the Irish
people, as presented by the Taoiseach, relating to taxation policy,
the right to life, education and the family, and Ireland's traditional policy
of military neutrality, would be addressed to the mutual satisfaction
of Ireland and the other Member States, by way of the necessary legal
guarantees.https://store.theartofservice.com/the-security-policy-toolkit.html
Political positions of Barack Obama - Law enforcement and security policy
1 United States electronic surveillance has reached an all-time high under
Obama, with increased monitoring of emails, text messages and phone
conversations.[http://www.globalsecurity.org/intell/library/news/2012/intell-
120929-rianovosti01.htm Surge in U.S. Govt Electronic Surveillance.] RIA Novosti, September 29, 2012.
https://store.theartofservice.com/the-security-policy-toolkit.html
Federica Mogherini - European Union High Representative for Foreign Affairs and Security Policy
1 In July 2014, given the large number of Italian MEPs belonging to the
Progressive Alliance of Socialists and Democrats|SD group following the
European election, 2014, the European Council gave consideration to her name as a candidate for the position of High Representative of the Union for Foreign Affairs and Security Policy, in Jean-Claude
Juncker's new European Commission|Commission
https://store.theartofservice.com/the-security-policy-toolkit.html
Federica Mogherini - European Union High Representative for Foreign Affairs and Security Policy
1 Nonetheless, on 2 August 2014, Italian Prime Minister Matteo Renzi formally nominated her by letter to
EC President-elect Jean-Claude Juncker|Juncker, as Italy's official candidate for EU Commissioner.
https://store.theartofservice.com/the-security-policy-toolkit.html
Federica Mogherini - European Union High Representative for Foreign Affairs and Security Policy
1 On 30 August, Europe's socialist Prime Ministers met prior to the
convening of the European Council, at which she received the approval of the Party of European Socialists. On the same day the President Herman
Van Rompuy announced that the European Council has decided to
appoint the Italian Minister as its new High Representative, effective from 1
November 2014.https://store.theartofservice.com/the-security-policy-toolkit.html
Federica Mogherini - European Union High Representative for Foreign Affairs and Security Policy
1 At her first press conference she declared her efforts will be devoted to establishing discussions between
Russia and Ukraine to solve the crisis between the two countries.
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy
1 The 'High Representative of the Union for Foreign Affairs and Security Policy' ('HR') is the chief co-ordinator and representative of the Common Foreign and Security Policy (CFSP)
within the European Union (EU). The position is currently held by Federica
Mogherini.
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy
1 The post was created under the Treaty of Amsterdam as the High
Representative for Common Foreign and Security Policy; it then was occupied by Javier Solana for ten
years until it was aggrandised following the Lisbon Treaty providing a seat on the European Commission and chair of the General Affairs and External Relations Council|council of
EU foreign ministershttps://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Titles
1 This post was previously styled as 'High Representative of the Common
Foreign and Security Policy' and, under the Treaty establishing a
Constitution for Europe|European Constitution, had been designated to
be titled the 'Union Minister for Foreign Affairs'
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Role
1 Where foreign policy is agreed between Member state of the
European Union|EU member states, the High Representative can speak
for the EU in that area, such as negotiating on behalf of the member
states. The Representative co-ordinates the work of the European Union Special Representatives as
well as other appointments such as anti-terrorist co-ordinator.
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Role
1 Beside representing the EU at international fora and co-ordinating the Common Foreign and Security
Policy and the Common Security and Defence Policy, the High
Representative is:
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Role
1 * List of Latin phrases: E|ex-officio Vice-President of the European Commission
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Role
1 * participant in the meetings of the
European Council
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Role
1 * responsible of the European Union Special Representatives
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Role
1 * head of the External Action Service of the European Union|External Action Service and the Foreign
relations of the European Union#Diplomatic representation|
delegations
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Role
1 * President of the Foreign Affairs Council
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Role
1 * Secretary-General of the Western European Union (prior to the
abolition of the WEU on 30 June 2011)
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Role
1 * President of the European Defence
Agency
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Role
1 * Chairperson of the board of the European Union Institute for Security Studies
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Role
1 According to proposals made in 2009 by the Swedish EU presidency, the High Representative will control the staffing and budget of the EEAS, and
propose the size of budget to be allocated
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Role
1 While there has been some criticism of the vague division of powers between the EU's top players,
Ukraine|Ukrainian ambassador to the EU Andriy Veselovsky praised the
framework and clarified it in his own terms: The President of the European
Commission speaks as the EU's government while the President of the European Council is a strategist
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Role
1 With the growth in role of the High Representative, and their exclusion
from the European Council, the national foreign ministers are now uncertain of their role vs the High
Representative
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Appointment
1 The High Representative is appointed by the European Council acting by qualified majority. However to take up their role in the Commission, in particular as a vice-president, the High Representative has to appear before Parliament for questioning
and then be subject to Parliament's vote of approval on the proposed
Commission.https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Appointment
1 The basic monthly salary of the High Representative is fixed at 130%[http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2009:322:0036:01:EN:HTML Council Decision of 1
December 2009 laying down the conditions of employment of the High Representative of the Union for Foreign Affairs and
Security Policy], EurLex (higher than a vice-president but less than the Commission President) of the highest grade of the
European Civil Service|EU civil service (grade 16, step 3),Base salary of grade 16, third step is €17,697.68:
[http://ec.europa.eu/civil_service/docs/salary_officials_en.pdf European Commission: Officials' salaries] – accessed 19 March
2010[http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CONSLEG:1967R0422:20040501:EN:PDF REGULATION No 422/67/EEC, 5/67/EURATOM OF THE COUNCIL], EurLex which
works out at €23,006.98
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - History
1 The post was introduced under the Amsterdam Treaty|Treaty of
Amsterdam and was occupied by Javier Solana. Initially the post was
much more limited in scope than the present one created in 2009 by the
Lisbon treaty|Lisbon Treaty. The current holder of the position is
Federica Mogherini.
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Solana
1 The Treaty of Amsterdam introduced the post of High Representative of the Common Foreign and Security Policy to represent the EU on the
world stage. It was decided that the Secretary-General of the Council of
the European Union|Secretary-General of the Council would be the
High Representative. This meant that the Secretary-General at the time, Jürgen Trumpf was the first High
Representative, although he would only serve a few months.
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Solana
1 From 25 November 1999 he was also appointed Secretary-General of Western European Union (WEU),
overseeing the transfer of responsibilities from that
organisation to the Common Foreign and Security Policy|CFSP
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Solana
1 On 25 March 2004 Solana appointed Gijs de Vries as the anti-terrorist co-ordinator for the Common Foreign
and Security Policy|CFSP, and outlined his duties as being to
streamline, organise and co-ordinate the EU's fight against terrorism.
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Solana
1 He has negotiated numerous Treaties of Association between the European
Union and various Middle Eastern and Latin American countries, including Bolivia and Colombia
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Solana
1 The so-called Vilnius letter, a declaration of support by eastern European countries for the United
States' aim of régime change in Iraq, and the letter of the eight, a similar
letter from the UK, Italy, and six second-tier countries, are generally
seen as a low-water mark of the Common Foreign and Security Policy|
CFSPhttps://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Solana
1 Solana has played an important role working toward a resolution to the
Israeli-Palestinian conflict, and continues to be a primary architect of the Road Map for Peace, along
with the UN, Russia, and the United States in the Quartet on the Middle
East
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Solana
1 In November 2004 he assisted the United Kingdom, France and
Germany in negotiating a nuclear material enrichment freeze with Iran
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Lisbon Treaty
1 The new High Representative of the Union for Foreign Affairs and Security Policy would still merge the External Relations Commissioner with the High Representative and, like the
Constitution, would have it backed up by an External Action Service of the European Union|External Action
Service.[http://europa.eu/scadplus/constitution/minister_en.htm The Minister for Foreign Affairs]Honor Mahony:
[http://euobserver.com/9/24343 EU leaders scrape treaty deal at 11th hour], EU Observer, 23 June 2007 The new role also
took over other foreign affairs roles, such as chairing the Foreign Affairs Council and representing the EU in international
fora, roles which were previously exercised by the foreign minister of the country holding the presidency of the European
Union (along with the foreign minister of the country previously holding the presidency and the one to take it next).
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Lisbon Treaty
1 Despite the name change, many parts of the media still referred to it as a foreign
minister and in negotiations it was decided that the High Representative would no long
also be the Secretary-General of the European Council|Council's Secretary-
General but would be a Vice-President of the European Commission, filling the now merged Commission post. The merger of
the two posts has been seen as furthering the answer to Kissinger's question:
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Ashton
1 Although Javier Solana was originally selected to be the first Foreign
Minister the delays in introducing the post meant after 10 years of service he stood aside for a new candidate
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Ashton
1 In October 2010 most major appointments to the European
External Action Service|EEAS were made, including Pierre Vimont
(France) as Secretary General, Helga Schmid (Germany) and Maciej Popowski (Poland) as Deputy Secretary Generals and David O'Sullivan (civil servant)|David
O'Sullivan (Ireland) as chief operating officer
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Ashton
1 Following the 2010 Haiti earthquake Ashton chaired a meeting of the
foreign relations, development and environment DGs and experts from the Council and the Situation Centre
(the EU intelligence-gathering agency)
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Ashton
1 Criticism continued to mount, including complaints that she skipped a defence meeting to attend the inauguration of Prime Minister of Ukraine|Ukraine's Prime MinisterBanks, Martin (19
March 2010) [http://www.theparliament.com/no_cache/latestnews/news-article/newsarticle/criticism-of-ashton-is-unfair/ Criticism of
Ashton is 'unfair'], theParliament.com alleged bias towards British officials, lack of language skills and risking a UK-French feud over
creating an EU military planning headquarters.Traynor, Ian (10 March 2010) [http://www.guardian.co.uk/world/2010/mar/10/lady-ashton-military-headquarters-brussels Ashton defends start in EU
foreign policy role], the Guardian She has been defended by some, including Commissioner Günther Oettinger, on the ground that she has had to take on a job that combines three previous jobs and is working on establishing the EEAS so she is unable to
take on everything at once, nor please everyone
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Ashton
1 Secretary General Pierre Vimont joined those defending Ashton from
criticism; praising her work in opening the EEAS office in Benghazi,
Libya as making the EEAS very popular in Libya
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Ashton
1 However, Former European Commission adviser Dr Fraser
Cameron argued that the criticism one hears of Ashton is pretty strong and it will be difficult to overcome
the bad press she has
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Ashton
1 The tone of public comment on Aston's performance in office was
subsequently to be influenced especially by her contributions to negotiations over Kosovo and the
normalization of its relationship with Serbia, and over Iran over its nuclear
program. In October 2013, Der Spiegel wrote of her:
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Ashton
1 But now the 57-year-old baroness is suddenly at the center of world diplomacy
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Ashton
1 After the November 2013 negotiation of an interim agreement with Iran
over its nuclear program, the Financial Times wrote that Ashton
was no longer the diplomatic dilettante
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Treaty basis
1 The Treaty on European Union, as amended by the Treaty of Lisbon,
provides in s:Consolidated version of the Treaty on European Union/Title III: Provisions on the Institutions#Article
15|Article 15(2):
https://store.theartofservice.com/the-security-policy-toolkit.html
High Representative of the Union for Foreign Affairs and Security Policy - Treaty basis
1 and in s:Consolidated version of the Treaty on European Union/Title III:
Provisions on the Institutions#Article 18|Article 18:
https://store.theartofservice.com/the-security-policy-toolkit.html
For More Information, Visit:
• https://store.theartofservice.com/the-security-policy-toolkit.html
The Art of Servicehttps://store.theartofservice.com