security policy

223
• Security Policy https://store.theartofservice.com/the-security-policy- toolkit.html

Upload: jayson-douglas

Post on 26-Dec-2015

229 views

Category:

Documents


0 download

TRANSCRIPT

• Security Policy

https://store.theartofservice.com/the-security-policy-toolkit.html

Security policy

1 Security policy is a definition of what it means to be secure for a system, organization or

other entity. For an organization, it addresses the constraints on behavior of its members as well as constraints imposed on adversaries by

mechanisms such as doors, locks, keys and walls. For systems, the security policy

addresses constraints on functions and flow among them, constraints on access by

external systems and adversaries including programs and access to data by people.

https://store.theartofservice.com/the-security-policy-toolkit.html

Security policy - Significance

1 Consequently, a top level security policy is essential to any serious

security scheme and sub-policies and rules of operation are meaningless

without it.

https://store.theartofservice.com/the-security-policy-toolkit.html

Peter A. Diamond - Social Security policy

1 Social Security (United States)|Social Security policy as well as its analogs

in other countries, such as China

https://store.theartofservice.com/the-security-policy-toolkit.html

Content Security Policy

1 'Content Security Policy' ('CSP') is a computer security concept, to

prevent cross-site scripting (XSS) and related attacks

https://store.theartofservice.com/the-security-policy-toolkit.html

Content Security Policy - Status

1 CSP was originally developed by the Mozilla Foundation and was first

implemented in Firefox 4. As of 2012 the CSP is a W3C candidate. The

following header names are in use as part of an experimental CSP

implementations:

https://store.theartofservice.com/the-security-policy-toolkit.html

Content Security Policy - Status

1 * Content-Security-Policy — standard header name proposed by the W3C document. Google Chrome supports

this as of version 25. Firefox supports this as of version 23, released on 6

August 2013.

https://store.theartofservice.com/the-security-policy-toolkit.html

Content Security Policy - Status

1 * X-WebKit-CSP — experimental header introduced into Google

Chrome and other WebKit-based browsers (Safari (web browser)|

Safari) in 2011.

https://store.theartofservice.com/the-security-policy-toolkit.html

Content Security Policy - Status

1 * X-Content-Security-Policy — experimental header introduced in

Gecko (layout engine)|Gecko 2 based browsers (Firefox 4 to Firefox 22,

Thunderbird 3.3, SeaMonkey 2.1).

https://store.theartofservice.com/the-security-policy-toolkit.html

Content Security Policy - Status

1 Support for the sandbox directive is also available in Internet Explorer 10 using the experimental X-Content-

Security-Policy header.

https://store.theartofservice.com/the-security-policy-toolkit.html

Content Security Policy - Status

1 There's initial support for CSP in some web frameworks such as

AngularJS and Django (web framework)|Django. Instructions for Ruby on Rails have been posted by

GitHub.

https://store.theartofservice.com/the-security-policy-toolkit.html

Content Security Policy - Mode of operation

1 If the Content-Security-Policy header is present in the server response, a

compliant client enforces the declarative whitelist policy. One

example goal of a policy is a more strict execution mode for JavaScript in order to prevent certain cross-site

scripting attacks. In practice this means that a number of features are

disabled by default:https://store.theartofservice.com/the-security-policy-toolkit.html

Content Security Policy - Mode of operation

1 * inline JavaScript (e.g. , DOM event attributes like onclick, and anchor tags with an href value that starts with javascript:) are blocked - all

script code must reside in separate files, served from a whitelisted

domain (can be enabled by unsafe-inline),

https://store.theartofservice.com/the-security-policy-toolkit.html

Content Security Policy - Mode of operation

1 * dynamic code evaluation (via eval() and string arguments for both

setTimeout and setInterval) are blocked (can be enabled by unsafe-

eval)

https://store.theartofservice.com/the-security-policy-toolkit.html

Content Security Policy - Mode of operation

1 Recommended coding practices for CSP-compatible web applications is to load code from external source

files (), parse JSON instead of evaluating it and use inline functions

for other statements.

https://store.theartofservice.com/the-security-policy-toolkit.html

Content Security Policy - Mode of operation

1 In addition to restricting execution of JavaScript, a policy can specify where

resources can be loaded from for a given page. This includes CSS, JavaScript, images, frames, applets, Ajax (programming)|Ajax, etc.https://docs.google.com/presentation/d/15fx5XLR289_JVG0kQ__WzS1lIU3aNGuZCoQ

XqLo8sKo/pub?start=falseloop=falsedelayms=3000#slide

=id.gc729aa5e_1101

https://store.theartofservice.com/the-security-policy-toolkit.html

Content Security Policy - Mode of operation

1 If the Content-Security-Policy-Report-Only header is present in the server

response, a compliant client monitors and reports only without enforcing the declarative whitelist policy. This

is useful during development.

https://store.theartofservice.com/the-security-policy-toolkit.html

Content Security Policy - Reporting

1 Anytime a requested resource or script execution violates the policy, the browser will fire a POST (HTTP)|POST request to the value specified

in report-urihttp://www.w3.org/TR/CSP/#sample-violation-report containing

details of the violation.

https://store.theartofservice.com/the-security-policy-toolkit.html

Content Security Policy - Reporting

1 CSP reports are standard JSON structures and can be captured

either by application's own APIFor example in Django (web framework)|Django a CSP receiver is available in [https://github.com/sdelements/django-security django-security] module.

or public CSP report receivers.

https://store.theartofservice.com/the-security-policy-toolkit.html

Content Security Policy - Browser Add-Ons and Extensions Exemption

1 According to the CSP Processing Model, CSP should not interfere with the operation of browser add-ons or

extensions installed by the user

https://store.theartofservice.com/the-security-policy-toolkit.html

Munich Conference on Security Policy

1 The 'Munich Security Conference' () is an annual Meeting|conference on international security policy that is held in the Hotel Bayerischer Hof, Munich|Hotel Bayerischer Hof in

Munich, Germany.

https://store.theartofservice.com/the-security-policy-toolkit.html

Munich Conference on Security Policy - Overview

1 Over the past four decades the Munich Security Conference (MSC) has become the most important

independent forum for the exchange of views by international security

policy decision-makers. Each year it brings together about 350 senior

figures from more than 70 countries around the world to engage in an intensive debate on current and

future security challenges.https://store.theartofservice.com/the-security-policy-toolkit.html

Munich Conference on Security Policy - Overview

1 The list of attendees includes Heads of States, Governments and

International Organizations, Minister (government)|Ministers, Member of Parliament|Members of Parliament, high-ranking representatives of the

Armed Forces, Scientists, representatives of the Mass media|Media as well as representatives of

the Civil society.https://store.theartofservice.com/the-security-policy-toolkit.html

Munich Conference on Security Policy - Overview

1 The intention of the conference is to address the topical main security issues

and to debate and analyze the main security challenges in the presence and the future in line with the concept of networked security. A focal point of the conference is the discussion and the exchange of views

on the development of the wikt:transatlantic|transatlantic relations as well as European and global security in the

21st century.https://store.theartofservice.com/the-security-policy-toolkit.html

Munich Conference on Security Policy - Overview

1 The conference was founded in 1962 by German publisher Ewald-Heinrich von Kleist-

Schmenzin under the title Wehrkundetagung. He was succeeded in

1998 by a former vice-head of the German Chancellery who chaired the conference

under the title Munich Conference on Security Policy until 2008. Since 2008 Ambassador Wolfgang Ischinger is the

chairman of the Munich Security Conference.

https://store.theartofservice.com/the-security-policy-toolkit.html

Munich Conference on Security Policy - Overview

1 From February 6–8, 2009, the 45th Munich Security Conference was

attended by over 50 ministers and more than a dozen heads of state and

government from all over the world, including US-Vice-President Joe Biden,

French President Nicolas Sarkozy, German Chancellor Angela Merkel, Polish Prime Minister Donald Tusk and Afghan

President Hamid Karzai.

https://store.theartofservice.com/the-security-policy-toolkit.html

Munich Conference on Security Policy - Overview

1 The idea is to invite a number of distinguished and high-ranking

participants to changing capitals and give them the opportunity to confidentially discuss current

international security policy issues and develop sustainable solutions

https://store.theartofservice.com/the-security-policy-toolkit.html

Munich Conference on Security Policy - Overview

1 The 47th Munich Security Conference was held from February 4–6, 2011 and has again assembled top-level decision makers from all

over the world, including UN Secretary General Ban Ki Moon, German Chancellor

Angela Merkel, British Prime Minister David Cameron U.S. Secretary of State Hillary

Clinton and Russian Foreign Minister Sergey Lavrov whilst Belarus has been excluded from

the circle of MSC attendees because of the country’s human rights situation.

https://store.theartofservice.com/the-security-policy-toolkit.html

Munich Conference on Security Policy - Overview

1 In 2011 two special features marked the growing role of the Munich Security Conference as center of attention of international security

policy: European Union's High Representative of the Union for Foreign Affairs and Security Policy Catherine Ashton called for the Quartet on the Middle East, consisting of the EU, Russia, the USA and the UN, to meet within the setting of

the 2011 Munich Security Conference and during a ceremony on the sidelines of the

conference Russia’s Foreign Minister Sergey Lavrov and U.S

https://store.theartofservice.com/the-security-policy-toolkit.html

Munich Conference on Security Policy - Overview

1 The 48th Munich Security Conference was held from February 2–5,

2012.

https://store.theartofservice.com/the-security-policy-toolkit.html

Munich Conference on Security Policy - Overview

1 The 49th Munich Security Conference featured talks concerning the Syrian civil war. Attendees included former

Syrian opposition leader Moaz al-Khatib, who offered Bashar al-Assad and his aides safe passage out of the

country in exchange for their resignations.

https://store.theartofservice.com/the-security-policy-toolkit.html

Munich Conference on Security Policy - Overview

1 The 50th Munich Security Conference took place on January, 31 - February, 2 2014. The main

topics were the Syrian civil war and the Ukrainian Euromaidan protests. Attendees

included UN Secretary General Ban Ki Moon, German President Joachim Gauck, John Kerry

and Sergey Lavrov. Zbigniew Brzezinski, Leonid Kozhara, Vitali Klychko, Leonid Slutsky

(politician)|Leonid Slutsky, Irakli Garibashvili, Traian Basescu and Štefan Füle participated in a

discussion panel regarding the situation in Ukraine.

https://store.theartofservice.com/the-security-policy-toolkit.html

Computer security policy

1 A 'computer security policy' defines the goals and elements of an organization's computer

systems

https://store.theartofservice.com/the-security-policy-toolkit.html

Computer security policy - Formal description

1 If a system is regarded as a Finite state automaton|finite-state

automaton with a set of transitions (operations) that change the

system's state, then a security policy can be seen as a statement that

partitions these states into authorized and unauthorized ones.

https://store.theartofservice.com/the-security-policy-toolkit.html

Computer security policy - Formal description

1 Given this simple definition one can define a secure system as one that

starts in an authorized state and will never enter an unauthorized state.

https://store.theartofservice.com/the-security-policy-toolkit.html

Computer security policy - Hybrid policy model

1 * Chinese_wall#Computer_science|Chinese Wall (Also known as Brewer and Nash model)

https://store.theartofservice.com/the-security-policy-toolkit.html

Computer security policy - Policy languages

1 To represent a concrete policy especially for automated

enforcement of it, a language representation is needed. There exist a lot of application specific languages

that are closely coupled with the security mechanisms that enforce

the policy in that application.

https://store.theartofservice.com/the-security-policy-toolkit.html

Computer security policy - Policy languages

1 Compared with this abstract policy languages, e.g. the Type

enforcement|Domain Type Enforcement-Language, are independent of the concrete

mechanism.

https://store.theartofservice.com/the-security-policy-toolkit.html

Trusted Computing Base - Predicated upon the security policy

1 It should be pointed out that as a consequence of the above Orange

Book definition, the boundaries of the TCB depend closely upon the

specifics of how the security policy is fleshed out

https://store.theartofservice.com/the-security-policy-toolkit.html

Trusted Computing Base - Predicated upon the security policy

1 This fundamental relativity of the boundary of the TCB is exemplifed by

the concept of the 'target of evaluation' (TOE) in the Common Criteria security process: in the

course of a Common Criteria security evaluation, one of the first decisions that must be made is the boundary of the audit in terms of the list of

system components that will come under scrutiny.

https://store.theartofservice.com/the-security-policy-toolkit.html

Rajiv Gandhi - Security policy

1 Rajiv authorised an extensive police and army campaign to contain terrorism in Punjab

https://store.theartofservice.com/the-security-policy-toolkit.html

Rajiv Gandhi - Security policy

1 With his speech while addressing the Joint Session of the US Congress and India, he said,

https://store.theartofservice.com/the-security-policy-toolkit.html

Rajiv Gandhi - Security policy

1 India is an old country, but a young nation; and like the young

everywhere, we are impatient. I am young and I too have a dream. I

dream of an India, strong, independent, self reliant and in the forefront of the front ranks of the

nations of the world in the service of mankind.

https://store.theartofservice.com/the-security-policy-toolkit.html

Skype security - Security policy

1 The company's security policy

includes:

https://store.theartofservice.com/the-security-policy-toolkit.html

Skype security - Security policy

1 #Callers must present a username and password or other authentication credential.

https://store.theartofservice.com/the-security-policy-toolkit.html

Skype security - Security policy

1 #Messages transmitted are encrypted from caller to caller. No intermediate node

(router (computing)|router) has access to the meaning of these messages. This claim

has been undermined in May 2013 by evidence that Microsoft (owner of Skype) has pinged unique URL's embedded in a

Skype conversation; this could only happen if Microsoft has access to the unencrypted

form of these messages.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013

1 'National Cyber Security Policy' is a proposed law by Department of

Electronics and Information Technology (DeitY), Ministry of

Communications and Information Technology (India)|Ministry of

Communication and Information Technology, Government of India

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Reason for Cyber Security

1 India had no Cyber security policy before 2013. In 2013, The Hindu newspaper, citing

documents leaked by NSA whistleblower Edward Snowden, has alleged that much of

the US National Security Agency|NSA surveillance was focused on India's domestic

politics and its strategic and commercial interests. This leads to spark furor among

people. Under pressure, Government unveiled a National Cyber Security Policy

2013 on 2 July 2013.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Vision

1 To build a secure and resilient cyberspace for citizens, business and government.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Mission

1 To protect information and information infrastructure in

cyberspace, build capabilities to prevent and respond to cyber threat, reduce vulnerabilities and minimize

damage from cyber incidents through a combination of institutional

structures, people, processes, technology and cooperation.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Objective

1 *To create a secure cyber ecosystem in the country, generate adequate

trust and confidence in IT system and transactions in cyberspace and

thereby enhance adoption of IT in all sectors of the economy.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Objective

1 *To create an assurance framework for design of security policies and

promotion and enabling actions for compliance to global security

standards and best practices by way of conformity assessment (Product,

process, technology people).

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Objective

1 *To strengthen the Regulatory Framework for ensuring a SECURE CYBERSPACE ECOSYSTEM.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Objective

1 *To enhance and create National and Sectoral level 24X7 mechanism for

obtaining strategic information regarding threats to ICT

infrastructure, creating scenarios for response, resolution and crisis management through effective

predictive, preventive, protective response and recovery actions.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Objective

1 *To improve visibility of integrity of ICT products and services by

establishing infrastructure for testing validation of security of such

product.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Objective

1 *To create workforce for 5,00,000 professionals skilled in next 5 years

through capacity building skill development and training.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Objective

1 *To provide fiscal benefit to businesses for adoption of standard security practices and

processes.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Objective

1 *To enable Protection of information while in process, handling, storage transit so as to safeguard privacy of citizen's data and reducing economic

losses due to cyber crime or data theft.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Objective

1 *To enable effective prevention, investigation and prosecution of

cybercrime and enhancement of law enforcement capabilities through

appropriate legislative intervention.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Strategies

1 * Creating a secure Ecosystem.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Strategies

1 * Creating an assurance framework.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Strategies

1 * Encouraging Open Standards.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Strategies

1 * Strengthening The regulatory Framework.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Strategies

1 * Creating mechanism for Security Threats Early Warning, Vulnerability

management and response to security threat.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Strategies

1 * Securing E-Governance services.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Strategies

1 * Protection and resilience of Critical

Information Infrastructure.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Strategies

1 * Promotion of Research and Development in cyber security.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Strategies

1 * Human Resource Development (fostering education and training

programs both in formal and informal sectors to support Nation's cyber security needs and build capacity.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Strategies

1 * Developing effective Public Private Partnership.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Strategies

1 * To develop bilateral and multilateral relationship in the area of cyber

security with other country. ('Information sharing and

cooperation')

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Shortcomings

1 (1) The declared cyber security policy has proved to be a paper work alone

with no actual implementation till date.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Shortcomings

1 (2) The cyber security trends and developments in India 2013 (Pdf) provided by Perry4Law’s Techno Legal Base (PTLB) has listed the

shortcomings of Indian cyber security policy in general and Indian cyber security initiatives in particular.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Shortcomings

1 (3) Indian cyber security policy has failed to protect civil liberties of Indians including privacy rights.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Shortcomings

1 (4) Civil liberties protection in cyberspace has been blatantly

ignored by Indian government and e-surveillance projects have been kept

intact by the Narendra Modi government.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Shortcomings

1 (5) The offensive and defensive cyber security capabilities of India are still missing.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Shortcomings

1 (6) India is considered to be a sitting duck in cyberspace and cyber

security field and the proposed cyber security policy has failed to change

this position.

https://store.theartofservice.com/the-security-policy-toolkit.html

National Cyber Security Policy 2013 - Shortcomings

1 despite the contrary claims and declared achievements and the

cyber security policy is just another policy document with no actual

implementation and impact.

https://store.theartofservice.com/the-security-policy-toolkit.html

Treaty establishing a Constitution for Europe - Common foreign and security policy

1 The EU is charged with defining and implementing a 'common foreign and

security policy' in due time. The wording of this article is taken from

the existing Treaty on European Union.

https://store.theartofservice.com/the-security-policy-toolkit.html

Klaus Scharioth - Security Policy

1 Scharioth was Director of the Private Office to the Secretary General of NATO|NATO Secretary General in Brussels, Belgium, from 1993 to 1996. In the Foreign Ministry he

thereafter held posts as Head of the Defense and Security Policy Division

(1996–1997), and as Head of the International Security and North

America Directorate (1998–1999).https://store.theartofservice.com/the-security-policy-toolkit.html

Catherine Ashton - Foreign Affairs and Security Policy

1 On 19 November 2009, Ashton was appointed the EU's first High Representative of the Union for Foreign Affairs and Security

Policy. Her appointment was agreed by a summit of 27 European Union leaders in

Brussels. Having initially pushed for former British Prime Minister Tony Blair to become President of the European Council, Gordon Brown eventually relented on the condition

that the High Representative position be awarded to a Briton.

https://store.theartofservice.com/the-security-policy-toolkit.html

Catherine Ashton - Foreign Affairs and Security Policy

1 Ashton's relative obscurity prior to her appointment occasioned comment in the

media

https://store.theartofservice.com/the-security-policy-toolkit.html

Catherine Ashton - Foreign Affairs and Security Policy

1 Nile Gardiner of the Heritage Foundation, who is on record as

opposed to a European Union role in foreign and security policy on

principle,See, for example, Four Key Principles for a Conservative British Foreign Policy, Web Memo 2911, The Heritage Foundation, 21 May 2010

https://store.theartofservice.com/the-security-policy-toolkit.html

Catherine Ashton - Foreign Affairs and Security Policy

1 By contrast, former Home Secretary Charles Clarke said: I have seen Cathy in action

https://store.theartofservice.com/the-security-policy-toolkit.html

Catherine Ashton - Foreign Affairs and Security Policy

1 After a confirmation hearing by the Trade Committee of the European

Parliament, Ashton was approved by the Parliament on 22 October 2008

by 538 to 40 votes, with 63 abstentions. She took office on 1

December 2009 for a five-year-term.

https://store.theartofservice.com/the-security-policy-toolkit.html

Felipe Calderon - Security policy

1 Despite imposing a cap on salaries of high-ranking public servants,

Calderón ordered a raise on the salaries of the Federal Police

(Mexico)|Federal Police and the Military of Mexico|Mexican armed

forces on his first day as president.

https://store.theartofservice.com/the-security-policy-toolkit.html

Felipe Calderon - Security policy

1 Calderón's government also ordered massive raids on drug cartels upon

assuming office in December 2006 in response to an increasingly deadly

spate of violence in his home state of Michoacán. The decision to intensify drug enforcement operations has led

to an Mexican Drug War|ongoing conflict between the federal

government and the Mexican drug cartels.

https://store.theartofservice.com/the-security-policy-toolkit.html

Felipe Calderon - Security policy

1 On January 19, 2007, Mexico captured the leader of one of its

seven major drug cartels, the Diaz Parada gang, five weeks into an army crackdown on narco gangs. Mexican

soldiers and federal police jointly arrested Pedro Diaz Parada, whose

cartel has operated across southern Mexico, on Tuesday in the southern city of Oaxaca, a spokeswoman for the attorney general's office said.

https://store.theartofservice.com/the-security-policy-toolkit.html

Felipe Calderon - Security policy

1 The next day, in a controversial move, the government announced the extradition to

the United States of several drug gang leaders.[http://www.dallasnews.com/sharedc

ontent/dws/dn/latestnews/stories/012207dnintlmexdrugs.8234538.html

Mexico vows to keep fighting drug trade] A day after Mexico extradited four top drug kingpins to the U.S., Mexico's top security

officials denied that the extraditions were a result of U.S. pressure

https://store.theartofservice.com/the-security-policy-toolkit.html

Felipe Calderon - Security policy

1 The Mexican government has also ordered Mexican soldiers and Federal Police into several cities, most notably, Tijuana and Ciudad Juárez. In Tijuana and also Ciudad

Juárez, the army ordered that all local police officers surrender their weapons, as it is

suspected that many officers have ties with drug cartels. Other states where actions

have been taken include Michoacán, Tamaulipas, Tabasco, and Guerrero.

https://store.theartofservice.com/the-security-policy-toolkit.html

Felipe Calderon - Security policy

1 In a January 2007 interview with the Financial Times, Calderón said, We have received very encouraging

results

https://store.theartofservice.com/the-security-policy-toolkit.html

Felipe Calderon - Security policy

1 On April 9, 2007, the Secretariat of National Defense (Mexico)|

Secretariat of Defense announced in a report the results of the first four months of Calderón's presidency

https://store.theartofservice.com/the-security-policy-toolkit.html

Felipe Calderon - Security policy

1 On December 16, 2009, the Mexican Navy killed Arturo Beltran-Leyva, a

once important drug trafficker.[http://www.csmonitor.com/World/200

9/1217/Mexican-drug-lord-Why-Arturo-Beltran-Levya-s-death-

matters]Christian Science Monitor

https://store.theartofservice.com/the-security-policy-toolkit.html

Felipe Calderon - Security policy

1 The government is relatively successful in detaining drug lords;

however, drug-related violence remains high in contested area along the US border such as Ciudad Juárez,

Tijuana, and Matamoros

https://store.theartofservice.com/the-security-policy-toolkit.html

Felipe Calderon - Security policy

1 2011 showed higher homicides and 2012 shows a similar rate as 2011, with 2012 also

being a Presidential transition year and a year with high security spending nationwide

it could indicate a temporary pause or a plateau in violence. Each of the last two years homicides were in the 20,000 to

27,000 range.[http://www.kpbs.org/news/2013/feb/06/drug-violence-mexico-dropped-2012/ KPBS

article of Mexican drug violence]

https://store.theartofservice.com/the-security-policy-toolkit.html

Enrique Peña Nieto - Security policy

1 The security policy of Peña Nieto prioritizes the reduction of violence rather than attacking Mexico's drug trafficking organizations head-on,

marking a departure from the strategy of the past six years during

Felipe Calderón's administration

https://store.theartofservice.com/the-security-policy-toolkit.html

Enrique Peña Nieto - Security policy

1 Critics of Peña Nieto's security strategy, however, say that he has

offered little sense in exactly how he will reduce the violence

https://store.theartofservice.com/the-security-policy-toolkit.html

Andrés Manuel López Obrador - Security policy

1 López Obrador had been a firm critic of Felipe Calderón's military

approach, and promised a further application of the law, proposing to

take care of the victims of the Mexican Drug War and an emphasis on the protection of human rights in

the country

https://store.theartofservice.com/the-security-policy-toolkit.html

Andrés Manuel López Obrador - Security policy

1 He also stated that if he elected, he would firmly reject any intelligence activity from the United States, including money and weapons in aid. This policy would put a stop to the operations in Mexico of the

Central Intelligence Agency and the Drug Enforcement Administration, including the use of unmanned drones. But it could also discourage U.S. aid to Mexico ($1.6 billion

since 2008).

https://store.theartofservice.com/the-security-policy-toolkit.html

Andrés Manuel López Obrador - Security policy

1 This proposal was intended to appeal to popular resentment over U.S.

actions in ATF gunwalking scandal|Operation Fast and Furious, in which

U.S. Bureau of Alcohol, Tobacco, Firearms and Explosives|ATF agents allegedly engaged in gunwalking.

https://store.theartofservice.com/the-security-policy-toolkit.html

Andrés Manuel López Obrador - Security policy

1 López Obrador promised to reactivate the economy and social

growth so more Mexicans could have access to a better life without having to join the cartels and abandon the

rule of law

https://store.theartofservice.com/the-security-policy-toolkit.html

Andrés Manuel López Obrador - Security policy

1 López Obrador summed up his security policy as Abrazos, no

balazos. (Hugs, not bullets). At the start of his campaign, he said that he would remove Army personnel from

the streets, but then said on May 2012 that he would use the military until Mexico has a trained, skilled

and moralized police force.

https://store.theartofservice.com/the-security-policy-toolkit.html

Democratic security policy

1 'Democratic security' or 'Democratic security policy' refers to a Colombian security policy implemented during the

administration of President Álvaro Uribe (2002-2010). It was unveiled in

June 2003.

https://store.theartofservice.com/the-security-policy-toolkit.html

Democratic security policy - Objectives

1 *Consolidate State control throughout Colombia to deny

sanctuary to terrorists and perpetrators of violence.

https://store.theartofservice.com/the-security-policy-toolkit.html

Democratic security policy - Objectives

1 *Protect the population through the increase of State presence and a reduction in violence.

https://store.theartofservice.com/the-security-policy-toolkit.html

Democratic security policy - Objectives

1 *Destroy the illegal drug trade in Colombia to eliminate the revenues

which finance terrorism and generate corruption and crime

https://store.theartofservice.com/the-security-policy-toolkit.html

Democratic security policy - Objectives

1 *Transparently and efficiently manage resources as a means to

reform and improve the performance of government.

https://store.theartofservice.com/the-security-policy-toolkit.html

Democratic security policy - Objectives

1 Several of theses objectives stem from a belief in that the Colombian government should protect Colombian

society from the effects of terrorism and the illegal drug trade, and in turn society as a whole should have a

more active and comprehensive role in the government's struggle against illegal armed groups

such as the Revolutionary Armed Forces of Colombia|FARC and National Liberation Army (Colombia)|ELN

guerrilla warfare|guerrillas or the paramilitary Autodefensas Unidas de Colombia|AUC, in order to ensure the defense and continued existence of the opportunity for both leftwing and rightwing political

parties to engage in free and open debate, along with all the other aspects of democratic life.

https://store.theartofservice.com/the-security-policy-toolkit.html

Democratic security policy - Application

1 The previously mentioned objectives would be achieved

through:

https://store.theartofservice.com/the-security-policy-toolkit.html

Democratic security policy - Application

1 #engaging the civilian population more actively

https://store.theartofservice.com/the-security-policy-toolkit.html

Democratic security policy - Application

1 #demobilizing illegal groups

https://store.theartofservice.com/the-security-policy-toolkit.html

Democratic security policy - Results

1 According to official government statistical information from August

2004, the application of the democratic security policy has

achieved the following results: within two years, homicides, kidnappings, and terrorist attacks in Colombia

decreased by as much as 50% - their lowest levels in almost twenty years

https://store.theartofservice.com/the-security-policy-toolkit.html

Democratic security policy - Results

1 The Colombian Embassy in Washington states that, as a result of this policy, the Colombian

armed forces would now have: 60% more combat ready soldiers than four years ago;

Helicopters which have significantly improved the mobility of Armed Forces throughout the national territory; Attack helicopters ensuring

means to be more aggressive in the fight against FARC and AUC; Increased basic combat supplies, including rifles and ammunition; and

[has received] significant less human rights complaints against them

https://store.theartofservice.com/the-security-policy-toolkit.html

Democratic security policy - Controversy

1 The democratic security policy has become controversial inside and

outside Colombia since the beginning of its application

https://store.theartofservice.com/the-security-policy-toolkit.html

Democratic security policy - Controversy

1 Several critical analysts have accepted that there have been some factual improvements in the areas of

security (for the most part) and human rights (to a lesser degree),

[http://www.hchr.org.co/documentoseinformes/informes/altocomisionado/

informes.php3?cod=8cat=11 Informes] but they also question the

exact validity and application of some of the statements, pointing out serious problems, in particular (but

not only) paramilitary related, which remain a source of grave concern

https://store.theartofservice.com/the-security-policy-toolkit.html

Democratic security policy - Controversy

1 Several of the critics also argue that, due to the increased degree of

involvement of the civilian population, that this policy

overexposes civilians to the dangers of the conflict, becoming potential targets for any abuses committed

both by the illegal armed groups and the government's security forces

https://store.theartofservice.com/the-security-policy-toolkit.html

Democratic security policy - Controversy

1 Supporters of the policy (and most other critics) tend to not consider the previous

argument to be accurate, arguing that there are several differences between both

policies, in particular that the democratic security policy is being implemented by a

legally elected government, in an environment where a number of democratic

and political liberties are guaranteed, despite the continuing conflict.

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy

1 :This article deals with the workings of European Union foreign policy. For the relations between the European

Union and third countries, see Foreign relations of the European

Union.

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy

1 Foreign policy is chaired and represented by the EU's High

Representative of the Union for Foreign Affairs and Security Policy|

High Representative.

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy

1 The CFSP sees the NATO responsible for the territorial defence of Europe and peace-

making

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - 1957–1993

1 Co-operation in international trade negotiations, under the Common

Commercial Policy, dates back to the establishment of the community in

1957

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - 1993–2009: pillar system

1 The weaknesses evident in EPC—apparent for example during the Yugoslav wars—led to a desire to

strengthen foreign policy

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - 1993–2009: pillar system

1 The Amsterdam Treaty created the office of the High Representative for the Common Foreign and Security Policy (held by Javier Solana until 1 December 2009) to co-ordinate and

represent the EU's foreign policy.

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - 2009–present: Consolidation

1 Furthermore, in an effort to ensure greater co-ordination and

consistency in EU foreign policy, the Treaty of Lisbon created a High Representative of the Union for

Foreign Affairs and Security Policy, de facto merging the post of High

Representative for the Common Foreign and Security Policy and

European Commissioner for External Relations and European Neighbourhood Policy

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Objectives

1 According to Article J.1 of title V of the Maastricht Treaty, the European

Union defines and implements a common foreign and security policy that covers all areas of foreign and

security policy, the objectives of which are to:

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Objectives

1 * Safeguard the common values, fundamental interests, independence and integrity of the European Union|

Union in conformity with the principles of the United Nations

Charter;

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Objectives

1 * Strengthen the security of the Union in

all ways;

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Objectives

1 * Preserve peace and strengthen international security, in accordance

with the principles of the United Nations Charter, as well as the

principles of the Helsinki Final Act and the objectives of the Paris

Charter, including those on external borders;

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Objectives

1 * Develop and consolidate democracy and the rule of law, and

respect for human rights and fundamental Freedom (political)|

freedoms.

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Types of policy

1 The European Council defines the principles and general guidelines for

the CFSP as well as common strategies to be implemented by the

EU

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - High Representative

1 The Common Foreign and Security Policy requires unanimity among the

now 28 member states on the appropriate policy to follow on any

particular policy

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - High Representative

1 The High Representative also coordinates the work of the European Union Special

Representatives

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Bodies

1 There are a number of bodies set up within the context of the CFSP. Within

the Council, there is the Foreign Affairs Council (FAC) configuration,

essentially a meeting of foreign ministers and the Political and

Security Committee or PSC, which monitors the international situation

in the areas covered by the CFSP and contributes by delivering opinions to the Council of Ministers, either at its request or its own initiative, and also

monitors the implementation of agreed policies.

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Bodies

1 The European Defence Agency (EDA) encourages increase in defence

capabilities, military research and the establishment of a European

internal market for military technology. Two bodies carried over from the Western European Union

(see defence, below) are the European Union Institute for Security

Studies (EUISS) and the European Union Satellite Centre (EUSC).

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Bodies

1 The EUISS is the European Union's in-house think tank. Its mission is to find a common security culture for the EU, to help develop and project

the CFSP, and to enrich Europe's strategic debate.

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Bodies

1 The EUSC is providing analysis of

satellite imagery and collateral data.

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Defence policy

1 Since the List of European Councils#Cologne 1999|Cologne European Council in 1999, the Common Security and

Defence Policy (or CSDP) has become a significant part of the CFSP. The EU itself has limited military capability, member

states are responsible for their own territorial defence and a majority of EU

members are also members of NATO, which is responsible for the defence of Europe.

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Defence policy

1 There was also the Western European Union (WEU), which was a European security organisation related to the

EU

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Defence policy

1 Following the Kosovo war in 1999, the European Council agreed that the

Union must have the capacity for autonomous action, backed by

credible military forces, the means to decide to use them, and the

readiness to do so, in order to respond to international crises

without prejudice to actions by NATO

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Political and Security Committee

1 The Political and Security Committee (PSC or COPS from its French

acronym) first established as an interim body in 2000 is described by

the Nice European Council Conclusions as the linchpin of the European Security and Defence

Policy and the Common Foreign and Security Policy

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Anti-Terrorism policy

1 The European Union considers to be 'terrorist organisations' those groups or those entities that are controlled directly or indirectly by persons who

commit or attempt to commit terrorist acts, participating in these groups, or facilitating the execution

of terrorist plans

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Anti-Terrorism policy

1 The European Union gives a definition of terrorism as Common

Position 2001/931/CFSP of 27 December 2001,[http://eur-

lex.europa.eu/LexUriServ/LexUriServ.do?

uri=OJ:L:2001:344:0093:0096:EN:PDF COUNCIL COMMON POSITION of 27 December 2001 on the application of

specific measures to combat terrorism] also referred to by

successive acts

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Anti-Terrorism policy

1 * seriously intimidating a population

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Anti-Terrorism policy

1 * unduly compelling a Government or international organization to perform or abstain from performing any act

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Anti-Terrorism policy

1 * seriously destabilizing or destroying the fundamental political,

constitutional, economic or social constructs

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 The list of terrorist organisations was started in 2001 with the 13

organisations listed on 27 December of Common Position 2001/931/CFSP

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 Common Position 2005/847/CFSP of the European Council of 29

November 2005 updated the list of these organizations,[http://eur-

lex.europa.eu/LexUriServ/LexUriServ.do?

uri=OJ:L:2005:314:0041:0045:EN:PDF COUNCIL COMMON POSITION

2005/847/CFSP]

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 of 29 November 2005 updating Common Position 2001/931/CFSP on the application of specific measures to combat terrorism and repealing Common Position 2005/725/CFSP]

which are as follows:

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 *Communist Party of the Philippines , including

the New People's Army

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 *Continuity Irish Republican Army

(CIRA)

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 *ETA / Bath Tierra y Libertad / Basque Fatherland and Freedom (ETA), which

includes organizations: KAS, Xaki, Ekin, Jarrai-Haika-Segi and Gestoras

pro Amnistía

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 *Grupos de Resistencia Anti-Fascist Primero de Octubre / October 1, anti-

fascist resistance group (GRAPO)

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 *Holy Land Foundation for Relief and Development

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 *International Sikh Youth Federation

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 *Kurdistan Workers' Party (PKK)

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 *Loyalist Volunteer Force (LVF)

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 *Mujahedin-e Khalq (MKO or MEC), except for the National Council of Resistance of Iran

(NCRI)

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 *Popular Front for the Liberation of Palestine -

General Command (PFLP-GC)

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 *Red Brigades for the Construction of

the Communist Party Fighter (BR-

PCC)https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 *Revolutionary Armed Forces of Colombia (FARC)

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 *Revolutionary Nuclei / Epanastatiki

Pirines

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 *Revolutionary Organization November

17 / Dekati Evdomi Noemvri

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 *Devrimci Sol or Army / Front / Revolutionary People's Liberation Party (DHKP / C)

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 *Revolutionary Popular Struggle / Epanastatikos Laikos

Agonas (ELA)

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 *Partido Comunista Peruano - Sendero Luminoso / Shining

Path (SL)

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 *Stichting Al Aqsa Mosque (aka Stichting Al Aqsa Nederland, aka Al Aqsa Nederland)

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 *Brigade XX Luglio

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 *Ulster Defence Association / Ulster Freedom Fighters

(UDA / UFF)

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 *United Self-Defense of Colombia (AUC)

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 *Core initiative proletarian revolutionary (results Inactive)

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - List of terrorist organisations

1 *Informal Anarchist Federation including cell cooperative artisan fire,

natural - occasionally spectacular

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Outside the CFSP

1 Representation in international bodies is previously through the

European Commissioner for External Relations, who worked alongside the High Representative, but now with

the High Representative of the Union for Foreign Affairs and Security

Policy|High Representative directly as a Vice President of the European Commission|Commission Vice-

Presidenthttps://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Outside the CFSP

1 The influence of the EU is also felt through the Enlargement of the European Union|

enlargement

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Outside the CFSP

1 The European Union's influential economic status and its nation-like

characteristics has been acknowledged by the United States' Central Intelligence Agency (CIA) in

their publication The World Factbook. The EU was included in the Factbook

in December 2004.

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Humanitarian aid

1 The ECHO (European Commission)|European Community humanitarian

aid office, or ECHO, provides humanitarian aid from the EU to developing countries. In 2006 its budget amounted to 671 million

euro, 48% of which went to the ACP countries. Counting the EU's own

contributions and those of its member states together, the EU is the largest aid donor in the world.

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Humanitarian aid

1 The EU's aid has previously been criticised by the think-tank Open Europe for being inefficient, mis-targeted and linked to economic

objectives

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Neutrality

1 Although the Irish people were reassured of their neutrality before

agreeing to the Nice Treaty, the Finnish Prime Minister, Matti

Vanhanen, on 5 July 2006, while speaking to the European Parliament as President of the European Council|

Council President declared:[http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//

TEXT+CRE+20060705+ITEM-002+DOC+XML+V0//

ENlanguage=EN European Parliament Debate (English

Translation)] europarl.europa.eu

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Neutrality

1 Nevertheless, a similar guarantee on neutrality in relation to the Treaty of Lisbon was granted to Ireland at the

European Council of 18/19 June 2009:

https://store.theartofservice.com/the-security-policy-toolkit.html

Common Foreign and Security Policy - Neutrality

1 The European Council also agreed that other concerns of the Irish

people, as presented by the Taoiseach, relating to taxation policy,

the right to life, education and the family, and Ireland's traditional policy

of military neutrality, would be addressed to the mutual satisfaction

of Ireland and the other Member States, by way of the necessary legal

guarantees.https://store.theartofservice.com/the-security-policy-toolkit.html

Political positions of Barack Obama - Law enforcement and security policy

1 United States electronic surveillance has reached an all-time high under

Obama, with increased monitoring of emails, text messages and phone

conversations.[http://www.globalsecurity.org/intell/library/news/2012/intell-

120929-rianovosti01.htm Surge in U.S. Govt Electronic Surveillance.] RIA Novosti, September 29, 2012.

https://store.theartofservice.com/the-security-policy-toolkit.html

Federica Mogherini - European Union High Representative for Foreign Affairs and Security Policy

1 In July 2014, given the large number of Italian MEPs belonging to the

Progressive Alliance of Socialists and Democrats|SD group following the

European election, 2014, the European Council gave consideration to her name as a candidate for the position of High Representative of the Union for Foreign Affairs and Security Policy, in Jean-Claude

Juncker's new European Commission|Commission

https://store.theartofservice.com/the-security-policy-toolkit.html

Federica Mogherini - European Union High Representative for Foreign Affairs and Security Policy

1 Nonetheless, on 2 August 2014, Italian Prime Minister Matteo Renzi formally nominated her by letter to

EC President-elect Jean-Claude Juncker|Juncker, as Italy's official candidate for EU Commissioner.

https://store.theartofservice.com/the-security-policy-toolkit.html

Federica Mogherini - European Union High Representative for Foreign Affairs and Security Policy

1 On 30 August, Europe's socialist Prime Ministers met prior to the

convening of the European Council, at which she received the approval of the Party of European Socialists. On the same day the President Herman

Van Rompuy announced that the European Council has decided to

appoint the Italian Minister as its new High Representative, effective from 1

November 2014.https://store.theartofservice.com/the-security-policy-toolkit.html

Federica Mogherini - European Union High Representative for Foreign Affairs and Security Policy

1 At her first press conference she declared her efforts will be devoted to establishing discussions between

Russia and Ukraine to solve the crisis between the two countries.

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy

1 The 'High Representative of the Union for Foreign Affairs and Security Policy' ('HR') is the chief co-ordinator and representative of the Common Foreign and Security Policy (CFSP)

within the European Union (EU). The position is currently held by Federica

Mogherini.

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy

1 The post was created under the Treaty of Amsterdam as the High

Representative for Common Foreign and Security Policy; it then was occupied by Javier Solana for ten

years until it was aggrandised following the Lisbon Treaty providing a seat on the European Commission and chair of the General Affairs and External Relations Council|council of

EU foreign ministershttps://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Titles

1 This post was previously styled as 'High Representative of the Common

Foreign and Security Policy' and, under the Treaty establishing a

Constitution for Europe|European Constitution, had been designated to

be titled the 'Union Minister for Foreign Affairs'

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Role

1 Where foreign policy is agreed between Member state of the

European Union|EU member states, the High Representative can speak

for the EU in that area, such as negotiating on behalf of the member

states. The Representative co-ordinates the work of the European Union Special Representatives as

well as other appointments such as anti-terrorist co-ordinator.

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Role

1 Beside representing the EU at international fora and co-ordinating the Common Foreign and Security

Policy and the Common Security and Defence Policy, the High

Representative is:

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Role

1 * List of Latin phrases: E|ex-officio Vice-President of the European Commission

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Role

1 * participant in the meetings of the

European Council

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Role

1 * responsible of the European Union Special Representatives

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Role

1 * head of the External Action Service of the European Union|External Action Service and the Foreign

relations of the European Union#Diplomatic representation|

delegations

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Role

1 * President of the Foreign Affairs Council

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Role

1 * Secretary-General of the Western European Union (prior to the

abolition of the WEU on 30 June 2011)

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Role

1 * President of the European Defence

Agency

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Role

1 * Chairperson of the board of the European Union Institute for Security Studies

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Role

1 According to proposals made in 2009 by the Swedish EU presidency, the High Representative will control the staffing and budget of the EEAS, and

propose the size of budget to be allocated

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Role

1 While there has been some criticism of the vague division of powers between the EU's top players,

Ukraine|Ukrainian ambassador to the EU Andriy Veselovsky praised the

framework and clarified it in his own terms: The President of the European

Commission speaks as the EU's government while the President of the European Council is a strategist

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Role

1 With the growth in role of the High Representative, and their exclusion

from the European Council, the national foreign ministers are now uncertain of their role vs the High

Representative

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Appointment

1 The High Representative is appointed by the European Council acting by qualified majority. However to take up their role in the Commission, in particular as a vice-president, the High Representative has to appear before Parliament for questioning

and then be subject to Parliament's vote of approval on the proposed

Commission.https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Appointment

1 The basic monthly salary of the High Representative is fixed at 130%[http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2009:322:0036:01:EN:HTML Council Decision of 1

December 2009 laying down the conditions of employment of the High Representative of the Union for Foreign Affairs and

Security Policy], EurLex (higher than a vice-president but less than the Commission President) of the highest grade of the

European Civil Service|EU civil service (grade 16, step 3),Base salary of grade 16, third step is €17,697.68:

[http://ec.europa.eu/civil_service/docs/salary_officials_en.pdf European Commission: Officials' salaries] – accessed 19 March

2010[http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CONSLEG:1967R0422:20040501:EN:PDF REGULATION No 422/67/EEC, 5/67/EURATOM OF THE COUNCIL], EurLex which

works out at €23,006.98

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - History

1 The post was introduced under the Amsterdam Treaty|Treaty of

Amsterdam and was occupied by Javier Solana. Initially the post was

much more limited in scope than the present one created in 2009 by the

Lisbon treaty|Lisbon Treaty. The current holder of the position is

Federica Mogherini.

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Solana

1 The Treaty of Amsterdam introduced the post of High Representative of the Common Foreign and Security Policy to represent the EU on the

world stage. It was decided that the Secretary-General of the Council of

the European Union|Secretary-General of the Council would be the

High Representative. This meant that the Secretary-General at the time, Jürgen Trumpf was the first High

Representative, although he would only serve a few months.

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Solana

1 From 25 November 1999 he was also appointed Secretary-General of Western European Union (WEU),

overseeing the transfer of responsibilities from that

organisation to the Common Foreign and Security Policy|CFSP

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Solana

1 On 25 March 2004 Solana appointed Gijs de Vries as the anti-terrorist co-ordinator for the Common Foreign

and Security Policy|CFSP, and outlined his duties as being to

streamline, organise and co-ordinate the EU's fight against terrorism.

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Solana

1 He has negotiated numerous Treaties of Association between the European

Union and various Middle Eastern and Latin American countries, including Bolivia and Colombia

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Solana

1 The so-called Vilnius letter, a declaration of support by eastern European countries for the United

States' aim of régime change in Iraq, and the letter of the eight, a similar

letter from the UK, Italy, and six second-tier countries, are generally

seen as a low-water mark of the Common Foreign and Security Policy|

CFSPhttps://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Solana

1 Solana has played an important role working toward a resolution to the

Israeli-Palestinian conflict, and continues to be a primary architect of the Road Map for Peace, along

with the UN, Russia, and the United States in the Quartet on the Middle

East

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Solana

1 In November 2004 he assisted the United Kingdom, France and

Germany in negotiating a nuclear material enrichment freeze with Iran

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Lisbon Treaty

1 The new High Representative of the Union for Foreign Affairs and Security Policy would still merge the External Relations Commissioner with the High Representative and, like the

Constitution, would have it backed up by an External Action Service of the European Union|External Action

Service.[http://europa.eu/scadplus/constitution/minister_en.htm The Minister for Foreign Affairs]Honor Mahony:

[http://euobserver.com/9/24343 EU leaders scrape treaty deal at 11th hour], EU Observer, 23 June 2007 The new role also

took over other foreign affairs roles, such as chairing the Foreign Affairs Council and representing the EU in international

fora, roles which were previously exercised by the foreign minister of the country holding the presidency of the European

Union (along with the foreign minister of the country previously holding the presidency and the one to take it next).

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Lisbon Treaty

1 Despite the name change, many parts of the media still referred to it as a foreign

minister and in negotiations it was decided that the High Representative would no long

also be the Secretary-General of the European Council|Council's Secretary-

General but would be a Vice-President of the European Commission, filling the now merged Commission post. The merger of

the two posts has been seen as furthering the answer to Kissinger's question:

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Ashton

1 Although Javier Solana was originally selected to be the first Foreign

Minister the delays in introducing the post meant after 10 years of service he stood aside for a new candidate

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Ashton

1 In October 2010 most major appointments to the European

External Action Service|EEAS were made, including Pierre Vimont

(France) as Secretary General, Helga Schmid (Germany) and Maciej Popowski (Poland) as Deputy Secretary Generals and David O'Sullivan (civil servant)|David

O'Sullivan (Ireland) as chief operating officer

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Ashton

1 Following the 2010 Haiti earthquake Ashton chaired a meeting of the

foreign relations, development and environment DGs and experts from the Council and the Situation Centre

(the EU intelligence-gathering agency)

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Ashton

1 Criticism continued to mount, including complaints that she skipped a defence meeting to attend the inauguration of Prime Minister of Ukraine|Ukraine's Prime MinisterBanks, Martin (19

March 2010) [http://www.theparliament.com/no_cache/latestnews/news-article/newsarticle/criticism-of-ashton-is-unfair/ Criticism of

Ashton is 'unfair'], theParliament.com alleged bias towards British officials, lack of language skills and risking a UK-French feud over

creating an EU military planning headquarters.Traynor, Ian (10 March 2010) [http://www.guardian.co.uk/world/2010/mar/10/lady-ashton-military-headquarters-brussels Ashton defends start in EU

foreign policy role], the Guardian She has been defended by some, including Commissioner Günther Oettinger, on the ground that she has had to take on a job that combines three previous jobs and is working on establishing the EEAS so she is unable to

take on everything at once, nor please everyone

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Ashton

1 Secretary General Pierre Vimont joined those defending Ashton from

criticism; praising her work in opening the EEAS office in Benghazi,

Libya as making the EEAS very popular in Libya

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Ashton

1 However, Former European Commission adviser Dr Fraser

Cameron argued that the criticism one hears of Ashton is pretty strong and it will be difficult to overcome

the bad press she has

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Ashton

1 The tone of public comment on Aston's performance in office was

subsequently to be influenced especially by her contributions to negotiations over Kosovo and the

normalization of its relationship with Serbia, and over Iran over its nuclear

program. In October 2013, Der Spiegel wrote of her:

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Ashton

1 But now the 57-year-old baroness is suddenly at the center of world diplomacy

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Ashton

1 After the November 2013 negotiation of an interim agreement with Iran

over its nuclear program, the Financial Times wrote that Ashton

was no longer the diplomatic dilettante

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Treaty basis

1 The Treaty on European Union, as amended by the Treaty of Lisbon,

provides in s:Consolidated version of the Treaty on European Union/Title III: Provisions on the Institutions#Article

15|Article 15(2):

https://store.theartofservice.com/the-security-policy-toolkit.html

High Representative of the Union for Foreign Affairs and Security Policy - Treaty basis

1 and in s:Consolidated version of the Treaty on European Union/Title III:

Provisions on the Institutions#Article 18|Article 18:

https://store.theartofservice.com/the-security-policy-toolkit.html