首页> 外军国防科技报告 >The U.S. Government’s Approach to Civilian Security: Focus on Campaign Activities > National Defense University Press > News Article View
【2h】

The U.S. Government’s Approach to Civilian Security: Focus on Campaign Activities > National Defense University Press > News Article View

机译:美国政府的民间安全方法:关注运动活动>国防大学出版社>新闻文章观点

代理获取
代理获取并翻译 | 示例

摘要

USAID Assistant Administrator for Democracy, Conflict, and Humanitarian Assistance Nancy Lindborg meets with Syrian refugees at Islahiye Refugee Camp in Turkey, January 24, 2013 (State Department)USAID Assistant Administrator for Democracy, Conflict, and Humanitarian Assistance Nancy Lindborg meets with Syrian refugees at Islahiye Refugee Camp in Turkey, January 24, 2013 (State Department)USAID Assistant Administrator for Democracy, Conflict, and Humanitarian Assistance Nancy Lindborg meets with Syrian refugees at Islahiye Refugee Camp in Turkey, January 24, 2013 (State Department)SHARE IMAGE:Photo By: State DepartmentVIRIN: 181106-D-BD104-013 In an effort to cross-reference U.S. Government policies, practices, and joint doctrine with human security,1 this article completes the discussion2 on its most relevant dimensions—health, food, environmental, and economic security—with a combatant commander campaign activity focus on civilian security (personal, community, political).3Protection from violence is crucial for people, especially vulnerable populations. The inability to establish and maintain safe and secure environments through effective governance may result in population dislocation or displacement.4 These conditions can overwhelm institutional capacities and disturb regional norms, resulting in assistance or intervention from security providers such as the United Nations (UN), North Atlantic Treaty Organization (NATO), or the U.S. Government. For civilians who remain in place, the pursuit of desperate or questionable measures to steady a favorable environment or attain a better standard of living may also result in counterproductive stabilization practices and weaken the foundation of civilian security and society as a whole. Therefore, viable security institutions and their active role in providing civilian security are central to U.S. national security interests.Both governmental and nongovernmental documentation provide insight through definitions and descriptions on current protection practices in order to present a better understanding of civilian security as an element of effective governance. For the U.S. Government, the White House defines protection as capabilities necessary to secure the homeland against acts of terrorism and manmade or natural disasters.5 Within the executive branch, the Department of Homeland Security (DHS) defines protection as actions or measures taken to cover or shield from exposure, injury, or destruction including those needed to ensure protective reactions that do not unnecessarily interfere with citizen’s freedoms and liberties.6 The Department of Defense (DOD) adds another definition of protection: to preserve the effectiveness and survivability of mission-related military and nonmilitary personnel, equipment, facilities, information, and infrastructure deployed or located within or outside the boundaries of a given operational area.7 DOD policies further discuss protection as peacekeeping forces that employ active and passive measures to protect themselves against adversaries, accidents, diseases, and other threats to mission success.8Outside of the government, international organizations such as the UN use the terms protection and protection of civilians when addressing issues related to civilian security. Based on mandate language in UN Security Council Resolutions (UNSCRs), descriptions focus on preventing or responding to threats of physical violence against civilians by the host government. Other definitions in UN workforce documentation include protecting civilians under imminent threat of physical violence and also acknowledge state obligations under international humanitarian law (IHL), international human rights law (IHRL), and refugee law.9 Regional organizations such as NATO define protecting civilians as activities conducted with the intent to safeguard noncombatants from physical violence, secure their rights to access essential services and resources, and contribute to a secure and stable environment for civilians over the long term.10 This approach informs the understanding of operational environments including efforts that alleviate harm, facilitate access to basic needs, and contribute to safe and secure environments.11 Additionally, NATO descriptions include avoiding, minimizing, and mitigating negative effects that might arise from military operations, conflict-related physical violence, or threats of physical violence by other actors.12 The International Committee of the Red Cross (ICRC) defines protection as all activities aimed at obtaining full respect for the rights of the individual in accordance with the letter and spirit of the relevant bodies of law, while the concept as a whole ensures authorities and other constituted groups comply with their obligations under IHL, IHRL, and refugee law.13For purposes here, civilian security includes supporting law and order, the rule of law, and establishing security through effective governance (for example, viable police, justice, and defense systems). These measures contribute to addressing policy issues on sheltering civilians from physical and systematic violence (personal security), providing family and culture protection from identity-based tensions (community security), and protecting from oppressive governing practices such as repression and human rights abuses (political security).14U.S. legislative and judicial efforts address civilian security concerns within the boundaries of the Constitution. Per legislative action, Congress develops Federal laws in support of issues such as national defense and protection from oppressive domestic governing. For the latter, the Constitution contains provisions that protect civilians from unlawful imprisonment or detention, punishment for conduct not illegal at the time performed, punishment focused on individuals or groups, states favoring their own citizens over others, and unreasonable searches per the Bill of Rights. Constitutional amendments passed after the Civil War acknowledge citizenship rights, legal and equal protections under the law, and voting rights. Congress can also limit the Federal Government and executive power such as preventing Federal military personnel from enforcing domestic policies at home.15 More recently, Congress authorized the use of military force against nations, organizations, or persons that plan, authorize, commit, or aid in terrorist attacks in order to prevent any future acts of international terrorism against the United States.16Regarding governmental functions, Congress can create, eliminate, or restructure executive branch entities and agencies. In the first year of George Washington’s Presidency, Congress created the position of Attorney General that now leads the Department of Justice. After World War II, Congress established the Central Intelligence Agency, National Security Council, U.S. Agency for International Development (USAID), and DHS.17 For significant judicial decisions, the Supreme Court is the final arbiter of legal issues to be resolved under Federal law. After the Civil War, some rights codified in constitutional amendments were not observed, as subsequent Supreme Court decisions undermined civilian security protections that could have extended under state law.18 However, by the mid-20th century these rights were eventually enforced by subsequent court decisions and new legislation.19For over a century, the United States has been involved in protecting civilians outside national borders. After World War I, the United States joined the League of Nations to mitigate future conflict between nations. By the end of World War II, the UN replaced the league and broadened its purpose over time to protect civilians beyond the effects of conflict. In 1949, the United States became a signatory to a set of international treaties and protocols known as the Geneva Conventions to protect civilian victims during armed conflict and internal violence. Building on the Geneva Conventions, the Nation ratified the 1954 Hague Convention for the Protection of Cultural Property in the Event of Armed Conflict. In the years following World War II, a body of law was created around IHL (also known as the Law of Armed Conflict) to limit the effects of perpetrator actions against stability and further codify noncombatant legal protection. More recently, IHRL developed as a broader body of law where nations are determined to have a collective duty to protect their own civilian populations against genocide, war crimes, ethnic cleansing, and crimes against humanity.In the spirit of IHRL, UNSCR mandates contain modern “responsibility to protect” language that holds individual national authorities accountable for civilian protection violations.20 In support of both IHL and IHRL, the International Red Cross and Red Crescent Movement supports civilian security through its components: the ICRC (humanitarian protection and assistance in armed conflict and violent situations), International Federation of Red Cross and Red Crescent Societies (coordinates efforts of national societies to provide humanitarian assistance primarily in disaster relief and public health), and National Red Cross/Red Crescent Societies (auxiliary entities to national governments).U.S. Army captain, 1st Security Force Assistance Brigade, advises Afghan National Army major about security in Logar Province, Pul-e Alam, Afghanistan, August 7, 2018 (NATO/U.S. Navy/Aubrey Page)U.S. Army captain advises Afghan National Army major about securityU.S. Army captain, 1st Security Force Assistance Brigade, advises Afghan National Army major about security in Logar Province, Pul-e Alam, Afghanistan, August 7, 2018 (NATO/U.S. Navy/Aubrey Page)SHARE IMAGE:Photo By: Lt. Aubrey PageVIRIN: 180807-N-QJ088-1005
Civilian security fosters confidence in effective governance. Under Article II of the Constitution, the President is granted authority to cultivate that confidence through executive power to protect the people from internal and external threats. As such, the President approves the National Security Strategy to articulate strategic policy goals and national power direction on matters related to civilian security. Subsequently, executive branch departments produce organizational strategies and plans in support of the President’s strategy. In furtherance of setting a political agenda, the President can issue multipurpose policy direction through executive orders to the executive branch on topics such as combating the trafficking of persons and minimizing civilian casualties when applying military force.21 Executive orders issued specifically for national security purposes are called Presidential directives. Relevant directives include combatting terrorism, counternarcotic activities, and mass atrocity prevention. The following overview captures governmental civilian security efforts within the executive branch in three cascading categories: significant, additional, and remaining.Significant Efforts. Two departments and their agencies partake in significant civilian security efforts through varying degrees of assistance: the Department of State and Department of Justice. State manages foreign diplomatic affairs for the President while its development component (USAID) implements economic initiatives and facilitates disaster assistance abroad.22 Through diplomacy and development, State and USAID provide a competitive, forward-deployed political capability that can also facilitate security-sector assistance abroad in support of national security objectives.23 At State, many department bureaus lead efforts to develop partner capabilities and build institutional capacities of nations or other organizations that may eventually contribute troops, police, or security forces to future stabilization missions. Bureaus also advance efforts to mitigate conflict; support law and order and police force establishment, maintenance, or reforms; and provide solutions for the displaced. For development and relief purposes, USAID bureaus and offices promote human rights, democratic governance initiatives, and coordinate responses to overseas disasters.Justice is another entity that supports civilian security. Managed by the Attorney General, Justice preserves confidence in the U.S. judicial system; administers Federal law enforcement entities; and establishes, enables, or reforms justice systems abroad through security sector assistance. Justice components such as its Federal Bureau of Investigation uphold the Constitution and protect the American people from threats. Other entities confine criminal offenders, enforce laws and regulations that bring perpetrators to justice, and consolidate operations such as counterterrorism, counterintelligence, and export control. To support crisis response mechanisms at home, Justice manages the National Response Framework’s Emergency Support Function #13 Public Safety and Protection that facilitates Federal public safety and security assistance to local, state, tribal, and territorial organizations overwhelmed by an actual or anticipated disaster or act of terrorism.24Additional Efforts. Other departments make substantial contributions to civilian security. DHS identifies vulnerabilities to U.S. security and develops protective measures through coordinated responses to emergencies, Presidential direction, and critical infrastructure and key resource protection.25 Via its Federal Emergency Management Agency, DHS manages Federal assistance to help populations in state, local, tribal, territorial, and organizational entities.26 Through the Coast Guard, DHS facilitates legitimate usage of waterways subject to U.S. jurisdiction.27 Moreover, its Customs and Border Protection and Immigration and Customs Enforcement agencies monitor border crossing, immigration, and illegal entry issues.DOD supports civilian security efforts primarily through its military workforce.28 Besides providing territorial and physical security, DOD assists governmental efforts to disrupt and prevent adversarial and competitor practices that negatively impact national interests such as stability, security, and democratic systems across the globe. Abroad, DOD defense institution-building efforts increase partner-nation abilities to meet security needs and contribute to regional and international security more effectively.29 At home, DOD leads homeland defense missions and supports civilian authorities.Remaining Efforts. Outstanding departments also impact civilian security. Efforts include the Department of Energy’s role in nuclear safety, Labor’s enforcement of child labor laws and human-trafficking prevention, Interior’s focus on Native American safety, Treasury’s strategic threat disruption efforts to deter financial practices that threaten stability, and Health and Human Services management of refugee centers that assist in American society integration.30 As governmental entities continue to develop plans in support of national security policy objectives, the future is uncertain on how these entities will protect civilians during international systems disruption and complete collapse or from the effects of aggressive competitor measures and severe population displacement.Civilians who are neither part of an armed group nor engaged in hostilities are protected under the law of war. Threats to civilian security that nations and state-like entities encounter or generate may involve a response from security institutions such as DOD. In support of governmental activities, combatant commanders and their staffs integrate force protection as well as civilian security considerations into plans, preparation, training, and missions. To socialize DOD’s role in the pursuit of civilian security, discussions and implications appear in joint doctrine, including traditional and irregular approaches that earn population support and the mitigation of civilian casualties in military operations.31 While many terms describe DOD support to civilian security efforts (investments, deployments, operations, cooperation, assistance), this discussion refers to them as campaign activities.Campaign activities involve offense, defense, and stability components. Offensive actions can neutralize threats, defensive actions can reduce vulnerabilities, and contributions to stabilization efforts can influence political dynamics, all in support of protecting civilians.32 At the international level, DOD can provide support to peacekeeping, security-sector, and stabilization commitments through individual expertise and workforce contributions. At the regional level, DOD participates in security and stabilization efforts normally with contributions to a regional military workforce. At the national level, DOD conducts or supports activities to achieve national objectives and enable civilian authorities to build or strengthen institutional systems (police, justice, defense).U.S. military resources used for civilian security may be independent conventional forces, conventional forces that leverage capabilities of U.S. special operations forces, or independent special operations forces. Depending on the rules of engagement and operational environment, campaign activities in support of civilian security may not always be feasible to implement due to competing operational interests that a commander must assess, such as the inherent right of self-defense and combat. For DOD, civilian security can decrease the threats that cause civilians and vulnerable populations (identity-based groups, women, children) to relocate, thus mitigating the need for future U.S. military deployment. At home, DOD leads the homeland defense mission and provides defense support to civil authorities. The following sections articulate DOD contributions to civilian security efforts by, with, and through international stakeholders and host-nation partners.Effective Governance. DOD conducts short- and long-term campaign activities in support or in place of civilian administration. Through a range of military operations, effective governance can result in protecting civilians against physical violence, crime, terrorism, and other harm in locations where security forces occupy or operate. For security recipients, ministry or security institution development is better conducted simultaneously and not under different time horizons.33 For nations and state-like entities, institutional development and reform may be conducted either through a transitional military authority to exercise executive, legislative, and judicial authority, or a transitional civilian authority to establish legitimate and effective governance. Both can transition to a viable national or state-like entity authority or institution. DOD campaign activities include instituting political reform and supporting elections, restoring basic essential services, and creating effective civil administrative frameworks to protect civilians.Police force and institution development strengthens law and order efforts and is usually conducted by the United States or by, with, and through a ministry of interior. When a central authority is weak or ceases to exist, perpetrators of violence can target civilians to pursue power. Campaign activities can ensure basic law enforcement, public order, training and education, and counter perpetrator violence. When the rule of law has broken down or is nonexistent, DOD can provide transitional public security to enforce the rule of law until efforts are transitioned to competent, viable, and responsible forces and institutions. Campaign activities include persistent efforts in areas secured and held usually through intensive patrolling and checkpoints, targeted search or strike operations against adversaries, population control measures such as curfews and vehicle restrictions, biometrics collection and vetting, and integration of indigenous ex-combatants into newly formed host-nation police forces. In Iraq in 2003, U.S. Central Command (USCENTCOM) supported international efforts to create a competent and responsible Iraqi police service that could maintain law and order, enforce the rule of law, and build confidence in the population that effective governance would protect them. DOD’s continued involvement includes training, advising, and assisting recruits and police forces in areas including integration of former fighters into the force and forensic science development.34 In 2009 in Afghanistan, USCENTCOM assumed responsibility from the State Department to train, advise, and mentor members of the Afghan National Police and, in 3 years, led 8 of 23 NATO training program sites.35Judicial frameworks strengthen the rule of law most likely under a ministry of justice. With central authority turnover and subsequent governance challenges, perpetrators of violence can target civilians to undermine effective governance and the rule of law. Beyond providing security, DOD can protect administrators of justice such as judges and their families as well as build courts and jails. In support of building or upholding an effective judicial system, a military governing authority may operate military commissions and provost courts, establish and provide security to courts and tribunals, support investigations, and arrest war criminals.During 2007 in Iraq, USCENTCOM personnel assisted Iraqi authorities to create and operate the Baghdad Rule of Law Complex that combined courts, jails, and an academy where personnel and faculties were protected from harassment and threats. Subsequent complexes were built in other cities across Iraq, sending the signal that administering the rule of law was foundational in rebuilding civil administration and providing civilian security.36 In Afghanistan from 2002, DOD assisted efforts to build or renovate courthouses and facilities and established the Rule of Law Field Force Afghanistan to improve judicial infrastructure in provinces, train on evidence-based operations for judicial actors and law enforcement, and public outreach efforts on Afghan law and trials.37Defense or security support can strengthen a ministry of defense system and force capacity. With central authority turnover and subsequent security challenges, perpetrators of violence can challenge national sovereignty, civil administration, and governmental institutions and target civilians to undermine effective governance in pursuit of power and influence. In support of defending a nation’s sovereignty, a competent, viable, and responsible defense or security force can deny access or safe havens to individuals or groups that present a threat to civilian security. In Iraq, USCENTCOM personnel trained Iraqi Security Forces to include the Iraqi army and assisted in counterterrorism, civilian protection, and border security missions. Targeted action was brought against violent extremist organizations such as the so-called Islamic State and its ability to hold onto Iraqi territory.38 In Afghanistan, USCENTCOM leads efforts to train and equip the Afghan National Security Forces, including the Afghan National Army, to combat threats from the Taliban and al Qaeda and continues to provide support to the NATO International Security Assistance Force in the capital region of Bagram.39 At home, U.S. Northern Command and U.S. Pacific Command provide support to civil authorities that can augment existing capacity and assist in the restoration of essential basic services.Coalition advisor plays game with child during tour of Manbij, Syria, June 21, 2018, to document how safe and prosperous it has become since SyrianDemocratic Forces defeated so-called Islamic State (U.S. Army/Timothy R. Koster)Coalition advisor plays game with child during tour of Manbij, Syria, June 21, 2018, to document how safe and prosperous it has become since Syrian Democratic Forces defeated so-called Islamic State (U.S. Army/Timothy R. Koster)Coalition advisor plays game with child during tour of Manbij, Syria, June 21, 2018, to document how safe and prosperous it has become since SyrianDemocratic Forces defeated so-called Islamic State (U.S. Army/Timothy R. Koster)SHARE IMAGE:Photo By: Staff Sgt. Timothy KosterVIRIN: 180621-A-UQ901-138
Oppressive Governing and Perpetrators of Violence. DOD campaign activities can support the coercion of uncooperative governing authorities and other entities into protecting citizens. Campaign activities include a range of military operations from armed conflict to competition that may improve conditions for populations and prevail against threats generated by a central authority, its security forces, or perpetrators of violence that operate autonomously within a country’s borders.40 Through campaign activities, U.S. forces can assist in enforcing and upholding societal norms in the face of regime repression, human rights abuses, improper detention and imprisonment, torture, mass atrocities, corruption, human-trafficking, and child labor. This includes the protection of cultural, ethnic, and religious identity; religious locations and shrines; family systems; women and children; personal values; static protection of key sites (market places or refugee camps); and human rights.Offensive efforts to protect civilians are normally authorized by an international political body such as the UN to target a central authority or perpetrators of violence within a country’s borders. One element is regime change where a central authority is removed in order to deter or neutralize negative treatment such as mass atrocity, political or state repression, or other harm to civilians. In 2011, U.S. Africa Command (USAFRICOM) provided air strikes under UN authority that was followed up by NATO operations against an oppressive Libyan regime.41 In this action the central governing authority was removed. More recently, campaign activities with Iraqi and Afghan forces were able to counter sectarian and other forms of violence.42 Other campaign activities include safe area designations that can marginalize advisories or threats to civilians.However, armed conflict also involves unintended consequences such as civilian casualties and key site vulnerabilities during and after military operations. Civilian deaths caused by U.S. military operations often fuel narratives that support resistance to U.S. influence and even energize the targeting of Americans. Additionally, key sites such as the National Museum of Baghdad, libraries, or religious properties make “no target” lists, but the buildings’ security may not be immediately provided to prevent looting. Nevertheless, recent emphasis on civilian casualty mitigation and key site vulnerability practices confirm the importance of civilian security to the chain of command from the top down.43Other defensive and stabilization efforts support civilian security and can increase confidence in a state’s ability to protect daily life. Campaign activities include a variety of human security elements captured in this five-part series (health, food, environmental, economic, civilian) that protect individuals and populations from negative treatment such as torture, ill treatment, unlawful detention and imprisonment, human rights abuses, and free election disruption. International security providers can establish a safe area to provide direct protection to civilians within a nation’s borders in a temporary and designated geographic area. Normally authorized through UNSCRs, safe areas involve safe zones (large areas that physically protect civilians where they normally live) and safe havens (protecting displaced or dislocated civilians in specific places) where civilians are protected by denying belligerents access through the threat or use of military force. In safe areas, organizations such as the UN and nongovernmental organizations usually authorize no-fly zones, build and administer camps, and provide basic assistance and services.Recent campaign activities include USCENTCOM’s support of northern and southern Iraq no-fly zones and USAFRICOM’s no-fly zone efforts in Libya. DOD built and administered camps in northern Iraq to feed ethnic Kurds and in Albania to protect Kosovar refugees in the 1990s.44 Today, campaign activities support displaced civilians through the transportation of supplies from one stop to another en route to a final camp destination.45 Safe havens are also ungoverned, undergoverned, or ill-governed physical and virtual areas where U.S. adversaries believe they can operate without harassment. Whether most recently in southeastern Afghanistan or northern Iraq and eastern Syria, extremist organization safe havens are used to terrorize civilian populations into submission but can be removed with active offensive measures. At home, DOD can support civilian authorities through an Active-duty base commander’s immediate response authority or command over federalized National Guard forces for emergency response. Presently, federalized National Guard forces are deployed to the southern borders for defensive purposes;46 however, Federal military personnel are prevented from enforcing domestic policies at home per the Posse Comitatus Act.Campaign activities can enhance efforts to improve conditions for effective governance, alleviate population concerns that cause displacement or counterproductive activity, and prevent the need for future or extended employment of U.S. forces. Still, aggressive competitors and perpetrators of violence find opportunities to impose their own version of civilian security when confidence in governance erodes or disappears. Therefore, it is critical to keep viable security institution establishment and reinforcement central to government efforts in the pursuit of productive civilian stabilization practices and civilian security. JFQ1 United Nations General Assembly (UNGA), 66th Session, “Follow-Up to Paragraph 143 on Human Security of the 2005 World Summit Outcome” (A/RES/66/290), October 25, 2012; UNGA, 66th Session, “Follow-Up to General Assembly Resolution 64/291 on Human Security” (A/66/763), April 5, 2012; Human Security: Report of the Secretary-General, A/64/701 (New York: United Nations [UN], March 8, 2010).2 George E. Katsos, “The U.S. Government’s Approach to Health Security: Focus on Medical Campaign Activities,” Joint Force Quarterly 85 (2nd Quarter 2017), 66–75; George E. Katsos, “The U.S. Government’s Approach to Food Security: Focus on Campaign Activities,” Joint Force Quarterly 87 (4th Quarter 2017), 112–121; George E. Katsos, “The U.S. Government’s Approach to Environmental Security: Focus on Campaign Activities,” Joint Force Quarterly 89 (2nd Quarter 2018), 130–139; and George E. Katsos, “The U.S. Government’s Approach to Economic Security: Focus on Campaign Activities,” Joint Force Quarterly 90 (3rd Quarter 2018), 106–112.3 Human Development Report 1994 (New York: Oxford University Press, 1994), 24–25, available at <http://hdr.undp.org/sites/default/files/reports/255/hdr_1994_en_complete_nostats.pdf>.4 Joint Publication (JP) 3-29, Foreign Humanitarian Assistance (Washington, DC: The Joint Staff, January 3, 2014), IV-20.5 Presidential Policy Directive 8, National Preparedness (Washington, DC: The White House, March 30, 2011), 6.6 United States Government Glossary of Interagency and Associated Terms (Washington, DC: Department of Defense [DOD], July 2017), 750.7 JP 3-0, Joint Operations (Washington, DC: The Joint Staff, January 17, 2018), GL-14; George E. Katsos, “Department of Defense Terminology Program,” Joint Force Quarterly 88 (1st Quarter 2018), 124–127.8 JP 3-07.3, Peace Operations (Washington, DC: The Joint Staff, March 1, 2018), xi.9 Department of Peacekeeping Operations/Department of Field Support Policy, The Protection of Civilians in United Nations Peacekeeping, Ref. 2015.07 (New York: UN, June 1, 2017), 5; IASC Operational Guidelines on the Protection of Persons in Situations of Natural Disasters (New York: UN Inter-Agency Standing Committee, January 2011), 58; Glossary of Humanitarian Terms in Relation to the Protection of Civilians in Armed Conflict (New York: UN, 2003), 21.10 See “NATOTerm,” online database, available at <.11 Sarah Williamson et al., “Overcoming Protection of Civilian Failures: The Case for an Evolutionary Approach within NATO,” OPEN Publication 1, no. 4 (Spring 2017).12 “NATO Policy for Protection of Civilians,” fact sheet, July 2016, available at <.13 “Protection of the Civilian Population: 29-10-2010 Overview,” International Committee of the Red Cross, available at <; and Urban Reichhold and Andrea Binder, Scoping Study: What Works in Protection and How Do We Know? (Berlin: Global Public Policy Institute, March 2013), available at <.14 Human Development Report 1994, 30–33.15 The Posse Comitatus Act, Pub. L. 45-2363, 18 U.S. Code § 1385, original at 20 Stat. 152, 45th Cong., 2nd sess., June 18, 1878. This does not apply to the Army National Guard or Air National Guard acting under state authority in a law enforcement capacity. The Homeland Security Act of 2002, Pub. L. 107-296, 116 Stat. 2135, 107th Cong. 2nd sess., November 25, 2002.16 Authorization for the Use of Military Force, Pub. L. 107-40, 115 Stat. 224 (2001), § 2(a); The Homeland Security Act of 2002.17 Jonathan Masters, “U.S. Foreign Policy Powers: Congress and the President,” Council on Foreign Relations, March 2, 2017, available at <; The Homeland Security Act of 2002.18 Slaughter-House Cases, 83 U.S. (16 Wall.) 36 (1872), which prevented rights guaranteed under the Fourteenth Amendment’s privileges or immunities clause from being extended to rights under state law; and Plessy v. Ferguson, 163 U.S. 537 (1896), which originated the phrase “separate but equal” and gave Federal approval to Jim Crow laws.19 Brown v. Board of Education of Topeka, 347 U.S. 483 (1954), and laws such as the Civil Rights Act of 1964, Pub. L. 88-352, 78 Stat. 241, 88th Cong., 2nd sess., July 2, 1964; and the Voting Rights Act of 1965, Pub. L. 89-110, 79 Stat. 437, 89th Cong., 1st sess., August 6, 1965.20 UNGA, 6498th Meeting, “Resolution 1973 (2011),” March 17, 2011; UNGA, 6942nd Meeting, “Security Council Resolution 1325 (2000) [on Women, Peace, and Security],” October 31, 2000; UNGA, 4037th Session, “Resolution 1261 (1999),” August 30, 1999; UNGA, 5235th Meeting, “Resolution 1612 (2005),” July 26, 2005; UNGA, 4046th Session, “Resolution 1265 (1999),” September 17, 1999; UNGA, 5430th Meeting, “Resolution 1674 (2006),” April 28, 2006; UNGA, 6903rd Meeting, “Resolution 2086 (2013),” January 21, 2013.21 See Executive Order (EO) 13257, President’s Interagency Task Force to Monitor and Combat Trafficking in Persons (Washington, DC: The White House, February 13, 2002); and EO 13732, United States Policy on Pre- and Post-Strike Measures to Address Civilian Casualties in U.S. Operations Involving the Use of Force (Washington, DC: The White House, July 1, 2016).22 Pub. L. 105-277, div. G, subdiv. A, title XV, § 1522, October 21, 1998, 112 Stat. 2681-794), 22 U.S. Code § 6592, “Administrator of AID Reporting to Secretary of State.”23 FY 2018–2022 Department of State and USAID Joint Strategic Plan (Washington, DC: Department of State, 2018), 11, 23, 35, 40; and FY 2014–2017 Department of State and USAID Strategic Plan (Washington, DC: Department of State, 2014).24 “Emergency Support Function #13: Public Safety and Security Annex,” Federal Emergency Management Agency, available at <.25 United States Government Compendium of Interagency and Associated Terms (Washington, DC: The Joint Staff, July 2018), 706, available at <; National Infrastructure Protection Plan 2013: Partnering for Critical Infrastructure Security and Resilience (Washington, DC: Department of Homeland Security, 2013).26 Fiscal Years 2014–2018 Strategic Plan (Washington, DC: Department of Homeland Security, 2014), 13, 21, 22; Department of Homeland Security Strategic Plan Fiscal Years 2012–2016 (Washington, DC: Department of Homeland Security, 2012), 19; and “Emergency Support Function #13.”27 Maritime Law Enforcement Program, U.S. Coast Guard, available at <; Fiscal Years 2014–2018 Strategic Plan, 7, 8, 13, 14, 20, 28.28 National Defense Strategy (Washington, DC: DOD, 2018); National Military Strategy (Washington, DC: The Joint Staff, 2016).29 DOD Directive 5205.82, Defense Institution Building (Washington, DC: DOD, May 4, 2017), 3.30 U.S. Department of Housing and Urban Development Strategic Plan 2014–2018 (Washington, DC: Department of Housing and Urban Development, 2014), 34; U.S. Department of Energy Strategic Plan 2014–2018 (Washington, DC: Department of Energy, 2014), 1, 3, 13, 15, 16; U.S. Department of Labor Strategic Plan Fiscal Years 2014–2018 (Washington, DC: Department of Labor, 2014), 28, 29; U.S. Department of the Interior Strategic Plan for Fiscal Years 2014–2018 (Washington, DC: Department of the Interior, 2014), 26, 42; Department of the Treasury FY 2014–2017 Strategic Plan (Washington, DC: Department of the Treasury, 2014), 28, 33; Treasury Strategic Plan 2018–2022 (Washington, DC: Department of the Treasury, 2018), 24–27.31 DOD Directive 3000.07, Irregular Warfare (Washington, DC: DOD, August 28, 2014), 1.32 JP 3-0, Joint Operations (Washington, DC: The Joint Staff, January 17, 2017), V-15.33 Seth G. Jones et al., Establishing Law and Order after Conflict (Santa Monica, CA: RAND, 2005), 3.34 Ibid., 105; Dustin Roberts, “DDR Continues to Educate Iraqi Workers, Army.mil, July 31, 2009, available at <; “Troops Train Iraqis in Forensic Techniques,” American Forces Press Service, April 16, 2009, available at <.35 Afghanistan Security: Department of Defense Effort to Train Afghan Police Relies on Contractor Personnel to Fill Skill and Resource Gaps, GAO-12-293R (Washington, DC: Government Accountability Office, January 2011), 3, 6.36 Peter R. Mansoor, Surge: My Journey with General David Petraeus and the Remaking of the Iraq War (New Haven, CT: Yale University Press, 2013), 212–213.37 Rule of Law in Afghanistan: U.S. Agencies Lack a Strategy and Cannot Fully Determine the Effectiveness of Programs Costing More Than $1 Billion, SIGAR 15-68-AR/Rule of Law (Washington DC: Special Inspector General for Afghanistan Reconstruction, July 2015).38 Cheryl Pellerin, “Centcom Commander to Focus on Partnerships, Complexities During AOR Visit,” Defense.gov, May 18, 2016, available at <; and Jeff Schogol, “The Pentagon Is Shifting U.S. Combat Power from Iraq to Afghanistan, Task & Purpose blog, February 5, 2018, available at <.39 Afghanistan Security: Afghan Army Growing, but Additional Trainers Needed; Long-Term Costs Not Determined, GAO-11-66 (Washington DC: Government Accountability Office, January 2011); and Nick Simeone, “U.S. Military Begins Training Iraqi Forces to Take on ISIL,” Defense.gov, January 5, 2015, available at <http://archive.defense.gov/news/newsarticle.aspx?id=49867>.40 Fiscal Years 2014–2018 Strategic Plan, 13, 21, 22; Department of Homeland Security Strategic Plan Fiscal Years 2012–2016, 19; “Emergency Support Function #13.”41 Bruce R. Pirnie and Edward O’Connell, Counterinsurgency in Iraq (2003–2006), RAND Counterinsurgency Study, vol. 2 (Santa Monica, CA: RAND, 2008), xv, 2, 22.42 Hugh Breakey, Charles Sampford, and Ramesh Thakur, “Protecting Civilians: How It Works,” Pass Blue, December 10, 2012, available at <.43 David Hodge, “Soldiers Secure Piece of Iraqi Religious History,” Defense.gov, May 14, 2008, available at <http://archive.defense.gov/news/newsarticle.aspx?id=49867>; and Matthew D. Thurlow, “Protecting Cultural Property in Iraq: How American Military Policy Comports with International Law,” Yale Human Rights and Development Journal 8, no. 1 (February 2014), available at <http://digitalcommons.law.yale.edu/cgi/viewcontent.cgi?article=1050&context=yhrdlj>.44 Air Force Handbook 10-222, vol. 22, Camp Planning for Displaced Persons (Washington, DC: Headquarters Department of the Air Force, April 20, 2011), 16.45 JP 3-29, Foreign Humanitarian Assistance, IV-20.46 David S. Cloud and Joseph Tanfani, “Mattis Authorizes Up to 4,000 National Guard Troops for U.S. Border with Mexico, Los Angeles Times, April 7, 2018, available at <.

著录项

  • 作者

  • 作者单位
  • 年(卷),期 2018(),
  • 年度 2018
  • 页码
  • 总页数 8
  • 原文格式 PDF
  • 正文语种
  • 中图分类
  • 网站名称 美国国防大学出版社
  • 栏目名称 所有文件
  • 关键词

  • 入库时间 2022-08-19 17:00:20
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号