Part I: U.S. Security Cooperation and Assistance

What is It?

The U.S. government distinguishes among a number of different programs that fall under the umbrella of security cooperation, including security force assistance, foreign internal defense (FID), and security sector assistance.1 While this terminology may be useful at the technical level, at the policy level, it tends to obscure the broader picture. This section considers programs that provide militiary training, advising, and equipment to allied and partner militaries, using terms like security cooperation and security assistance interchangeably to refer to such programs.2

According to Security Assistance Monitor, in 2019 the United States had 167 security aid programs with 87 recipients with a total of $18.81 billion in funding.3 The United States also had 20 training programs in 137 countries with a total of more than 14,000 trainees. Since 2013, these U.S. training programs have produced more than 485,000 trainees.4 Funding for foreign security assistance has more than doubled in the budget since 9/11, reflecting how these programs were ramped up in the context of the Global War on Terror.5

Title 22 authorities fall under State Department auspices, while Title 10 authorities are controlled by the Department of Defense (DoD).6

For each program, this report includes a short description of what it does, the stated purpose of the program, how the program is authorized, which agencies are involved in implementation of the program, and Fiscal Year 2020 (FY20) funding levels.

The Washington Office on Latin America’s (WOLA) Defense Oversight Research Database provides an up-to-date guide on all authorities and programs through which the United States provides assistance to foreign military, police, or paramilitary forces.7

Key Title 22 Security Cooperation and Assistance Programs:

  • International Military Education and Training (IMET):
    • Description: IMET provides training and education on a grant basis to students from allied and security partner countries.8 IMET funds training for non-U.S. personnel at U.S. facilities and outside of the United States for professional military education and technical training.9
    • Purpose: IMET is intended to strengthen partner forces’ capabilities and enhance interoperability for joint operation, enhance mil-mil relations, provide professional military education, increase understanding and communication between the United States and its security partners, and provide training to foreign personnel around human rights and the importance of democratic values such as the military’s role in a civilian-led government.10
    • Authorization/Implementation: Authorized by Section 541 of the Foreign Assistance Act (FAA) of 1961. The State Department determines which countries will have IMET programs, but programs are implemented by DoD.11
    • FY20 Funding: $100 million12

  • International Narcotics and Law Enforcement (INCLE):
    • Description: INCLE “provides equipment, training and services to foreign countries for counternarcotics and anti-crime efforts,” including law enforcement training and in limited instances, weaponry to provide defensive arms to aircraft used in counternarcotics operations, although a 15-day congressional notification is required in these instances. INCLE funds may also provide economic development assistance.13
    • Purpose: To support country- and global-level law enforcement programs to counteract transnational crime including money laundering, narcotics trafficking, and terrorism-related issues. INCLE funds support programs like the Partnership for East Africa Counterterrorism and the Trans-Sahara Counterterrorism Partnership.14
    • Authorization/Implementation: Authorized by section 481 of the FAA of 1961. Overseen by the State Department.
    • FY20 Funding: $945.35 million15

  • Foreign Military Financing (FMF) (see Part II for more):
    • Description: FMF provides other countries with grants and loans to make government-to-government purchases of U.S-made defense articles and defense-related services via the Foreign Military Sales (FMS) program (see Part II). FMF also less frequently funds Direct Commercial Sales (DCS) between other countries and private U.S. companies.16
    • Purpose: FMF is intended to enhance the military capabilities of security partners; promote coalition efforts, especially in counter-terrorism and enhance interoperability; and support the U.S. industrial base.17
    • Appropriation/Implementation: Authorized by the Arms Export Control Act, as amended. The State Department determines which countries have an FMF program; FMF is implemented by DoD’s Defense Security Cooperation Agency (DSCA).18
    • FY20 Funding: $5,370.9 million19

  • Peacekeeping Operations (PKO):
    • Description: Supports regional stability operations and multilateral peacekeeping that is not funded through the UN.20
    • Purpose: In spite of its name, this program is often used to support East African forces conducting counter-terrorism operations, for example against al-Shabaab in Somalia.21
    • Authorization/Implementation: Authorized under section 551 of the FAA.22
    • FY20 Funding: $291,435 million

  • Non-Proliferation, Anti-Terrorism, Demining & Related Programs (NADR):
    • Description: NADR provides support for U.S. security assistance efforts to police, military, and civilian government actors.
    • Purpose: NADR provides assistance in four areas: counter-terrorism, nonproliferation, regional stability, and humanitarian assistance. Programs supported by NADR include the Humanitarian Demining Program and the Antiterrorism Assistance Program, which provides CT training to law enforcement agencies in other countries.
    • Authorization/Implementation: Authorized by section 571 of the FAA;23 overseen by the State Department.24
    • FY20 Funding: $707.15 million25

Key Title 10 Security Cooperation and Assistance:

  • Train and Equip Authority (section 1206/section 2282)—availability of these funds expired in late 2017; these authorities have been subsumed by Section 333 (see below):
    • Description: Section 1206/2282 authority provided DoD the authority to provide equipment, training, and transportation to foreign military and security forces to perform counter-terrorism operations or participate in stability operations with U.S. armed forces. Section 1206 train and equip funding was appropriated through the DoD Operations and Maintenance account.26
    • Purpose: From 2005 through 2009, train and equip funds were primarily allocated towards counter-terrorism equipment and training. Starting in FY12, some funds shifted towards cooperation in stability operations with U.S. forces, especially for the International Security Assistance Force (ISAF) in Afghanistan.
    • Appropriation/Implementation: Temporary authority consistently renewed by Congress since 2005. Implemented by DoD, but the Secretary of State must provide concurrence.27

  • Building Partner Capacity (Section 333):
    • Description: Replacing section 1206, section 333 train and equip authorities allow for training and equipping partner country security forces for counter-terrorism operations, counter-transnational crime operations, and other security operations including international coalition operations in the interests of the United States.
    • Authority/Implementation: Authorized under Title 10. Programs require the concurrence of DoD and the State Department.28
    • FY20 Funding: $1,208.729 million

  • Combatant Commander Initiative Fund (CCIF):
    • Description: The CCIF allows the Chairman of the Joint Chiefs to provide funds to combatant commanders upon request for unforeseen contingencies, prioritizing “activities that would enhance the war fighting capability, readiness, and sustainability of the forces assigned to the commander requesting the funds.” Authorized activities related to foreign forces include joint exercises and military education and training.29
    • Purpose: CCIF is intended to build U.S. Special Operations Forces (SOF) capabilities in partner countries, build interoperability with partner forces, enhance partner countries’ counter-terrorism capabilities, and build mil-mil contacts.30
    • Funding/Implementation: Authorized by Section 166a. Implemented by DoD/combatant commanders.

  • Global Security Contingency Fund (GSCF):
    • Description: GSCF provides the State and DoD with flexible funding pooled across the agencies to support capacity building for allies and security partners. GSCF “provides train and equip assistance to enhance the capabilities” of partner militaries and security forces and to participate in military operations consistent with U.S. policy objectives.
    • Purpose: Increase U.S. flexibility to respond to security challenges; build partner capacity to confront shared challenges; develop independent security partners.31
    • Authority/Implementation: Authorized in the FY12 NDAA; a joint program with DoD managed by the State Department. State transfers appropriations to the GSCF from FMF, INCLE, and peacekeeping operations programs. DoD transfers its share of appropriations to GSCF from the operations and maintenance account. Per the authorizing legislation, DoD can contribute no more than 80 percent of the annual GSCF budget, while the State Department must contribute at least 20 percent.32

  • Section 127E:
    • Description: Formerly known as Section 1208 funding, Section 127E authorizes DoD to support foreign forces, irregular groups, or individuals engaged in supporting counter-terrorism operations conducted by U.S. SOF.33
    • Purpose: Section 127E funding has reportedly been used to fund classified special operations programs.34

  • Section 1202:
    • Description: Section 1202 funding authorizes DoD support to foreign forces, irregular forces, or individuals supporting irregular warfare operations by U.S. SOF.35
    • Purpose: This authority is intended to build capacity to counter U.S. adversaries in “grey zone” conflicts.36

  • Joint Combined Exchange Trainings (JCET):
    • Description: JCET authorizes training deployments for U.S. SOF to train alongside the armed forces of partner countries, which typically “resemble joint exercises, with some coursework.”37 JCET has received criticism for human rights abuses allegedly carried out by foreign troops who received training.38
    • Purpose: The main purpose of JCET trainings must be to train U.S. forces, but JCET funds can also cover the expenses incurred by the partner country’s forces as a result of the training.
    • Authorization/Implementation: Authorized by section 322 of Title 10, U.S. Code, as amended.39 Implemented by DoD.
    • FY20 Funding: $59.006 million40

There are several country- and region-specific funds authorized under Title 10 as well. Examples of such funds include:41

  • Indo-Pacific Maritime Security Initiative (MSI)
  • Pakistan Counterinsurgency Capability Fund (PCCF)
  • PKO/African Peacekeeping Rapid Response Partnership (APRRP)
  • Ukraine Security Assistance Initiative (USAI)

Other DoD Programs: Acquisition and Cross-Service Agreements (ACSAs)

Formerly known as the “NATO Mutual Support Act,” the ACSA statute allows DoD to “acquire logistics support, supplies, and services directly from or provide them to a foreign government or organization.”42 ACSAs therefore allow for the transfer of military supplies and logistics support to partner country militaries outside of the security force assistance programs listed above, and instead fall within DoD’s appropriated budget.

According to the Office of the Secretary of Defense, “Such logistics support ‘transfers’ come into play primarily during wartime, combined exercises, training, deployments, contingency operations, humanitarian or foreign disaster relief operations, certain peace operations under the UN Charter, or for unforeseen or exigent circumstances. As a result, ACSA authority is almost always exercised by the Unified Combatant Commands.”43

ACSAs are negotiated on a bilateral basis between the United States and its NATO allies or other security partners. The agreement must be negotiated and signed before a partner may receive U.S. transfers. ACSAs are not intended to be a grant program; rather, they “must primarily benefit the interest of DoD forward deployed commands and forces.” They are not supposed to be a routine source of supply and may not be used when the desired service or materiel is available via U.S. commercial services.44 As of the end of FY18, the United States had 118 ACSAs.45

The United States provided aerial refueling to Saudi-led coalition aircraft in Yemen under an ACSA, although DoD later said that refueling occurred for at least a year before an ACSA with Saudi Arabia was formally in place.46

Other Relevant Legislation: Section 502B of the 1961 Foreign Assistance Act (FAA)

The 1961 Foreign Assistance Act (FAA) is the legislative cornerstone of U.S. foreign assistance programs and policies.47 Section 502B of the FAA directs that “no security assistance may be provided to any country the government of which engages in a consistent pattern of gross violations of internationally recognized human rights.”48

As part of the annual budget proposal, section 502B directs the Secretary of State to provide Congress with “a full and complete report… regarding the observance of and respect for internationally recognized human rights in each country proposed as a recipient of security assistance.”49 Congress can also request reporting from the State Department under 502B. After requesting such reporting, Congress can “adopt a joint resolution terminating, restricting, or continuing security assistance for such a country.”50

The Leahy Law

The Leahy Law consists of two statutory provisions—one that applies to the State Department (section 620M of the 1961 FAA) and one to the Department of Defense (Section 362, Title 10 of the U.S. Code)—that prohibit funding to units of foreign security forces where there is credible information that implicates the unit in gross violations of human rights (GVHRs).51

GVHRs include:

  • Torture or cruel, inhuman, or degrading treatment or punishment;
  • Prolonged detention without charges or trial;
  • Disappearing persons;
  • War crimes;
  • Crimes against humanity
  • Evidence of acts that may constitute genocide; and,
  • “Other flagrant denial of the right of life, liberty, or the security of the person.”52

The Department of State is tasked with vetting a unit and its commander when the unit is designated to receive assistance. The U.S. embassy in the unit’s home country is in charge of initial vetting, while the Department of State typically conducts an additional analysis, using both open source and classified documents.

Exceptions that allow the resumption of assistance to a unit under the DoD statute include:

  • If the Secretary of Defense in consultation with the Secretary of State determines that a country is taking remedial steps; or,
  • If U.S. assistance is needed to assist in national security or humanitarian emergencies.

What Can Congress Do?

  1. Recommendation: Reporting Requirements and Hearings on SFA Programs

Congress has periodically written “reporting requirements” into the National Defense Authorization Act (NDAA) and other relevant legislation that require agencies like the State Department and DoD to submit reports to Congress on specified topics. The annual NDAA is considered a “must-pass,” meaning it “provides a vehicle for mandating what committees otherwise seek through informal means.”53 While reporting requirements do not directly alter how security assistance programs are implemented, they can provide Congress and the public with important information on the management and effectiveness of U.S. security cooperation.

Congress can also hold public hearings with public officials to elicit information about the implementation and effectiveness of security assistance programs and to identify and bring public attention to potential issues.54 Congress can use hearings, requests for information, and other mechanisms of informal influence to change the public narrative, test political assumptions, and more transparently define the costs and benefits of these programs.55

ACSA Reporting Requirements. Congress may include reporting requirements for ACSAs. A recent GAO report found that the DoD’s poor recordkeeping and late notifications from the State Department “have limited the accuracy and timeliness of information provided by Congress on ACSA.”56 Management weaknesses mean that DoD has not been able to obtain reimbursement from security partners for “thousands of orders…valued at more than $1 billion as of November 2019.”57 The GAO recommended that Congress require DoD to improve oversight and seek payment from foreign partners for overdue orders.

For example, as of September 2019, Saudi Arabia reportedly had not paid back $181 million that it owed for aerial refueling services that facilitated airstrikes in Yemen. Pentagon attorneys told Congress that United States Central Command (USCENTCOM) provision of aerial refueling services for Saudi Arabian aircraft was operating under a provisional ACSA that had not been finalized and therefore Congress had not been notified.58 Congress could require detailed reporting on such cases and hold public hearings.

Measuring the Effectiveness of Security Assistance. Several analysts have noted that there is little analytical clarity around whether security assistance is actually effective in achieving its stated goals. In part, this is a question of priorities: Policymakers have associated a number of objectives with security force assistance, from inducement to promote cooperation and interoperability with U.S. forces to building partner capabilities and ability to deal with mutually shared threats. Often these priorities are in tension. Furthermore, the success of these programs is empirically difficult to measure.59

Congress could include a requirement for security assistance programs that the relevant agency must clearly lay out what the program is intended to achieve and a set of corresponding metrics of effectiveness. Congress could include funding in each program’s budget that is explicitly earmarked for assessment, monitoring, and evaluation (AM&E). AM&E should specifically evaluate whether programs and transfers meet their stated goals. This would increase transparency around these programs and give members of Congress the ability to eliminate programs that aren’t working without jeopardizing U.S. policy objectives.

For example, the FY16 NDAA added requirements that DoD must establish a monitoring and evaluation framework.60 In response, DoD released its Instruction on Monitoring and Evaluation the following year.61 Some have noted that while these requirements are a good first step, they still fall short of the more stringent requirements placed on U.S. foreign aid.62 Additionally, military advising and other forms of operational support are not subjected to the same level of evaluation.63

2. Recommendation: Conditions/Restrictions on Security Assistance

Congress can restrict or place conditions on how U.S. security assistance is used by allies and security partners. Such conditions can discourage allies or security partners from pursuing particular policies. To take one example, Sen. Chris Van Hollen (D-Md.) filed an amendment to the FY21 NDAA that would prohibit Israel from using U.S. security assistance funding to facilitate the annexation of territory in the West Bank.64

3. Recommendation: Use Section 502B of the FAA and the Leahy Law to Enforce Human Rights Provisions

The president must make a declaration in order for Section 502B of the FAA to take effect, cutting off aid to a country in the case of human rights violations. However, the executive branch has never complied with this provision.65 The Leahy Law was written because section 502B was seen as too expansive and rarely implemented.

However, 502B does provide an expedited route for Congress to request reporting on human rights violations from the State Department. Section 502B(c) authorizes either the House or Senate, or HFAC or SFRC, to request a report laying out a country’s record on human rights, the steps the United States has taken to promote rights in the country, and whether “in the opinion of the Secretary of State… extraordinary circumstances exist which necessitate a continuation of security assistance” for the country.66 If Congress does not receive the report within the 30-day window, “no security assistance shall be delivered” to that country until the report is submitted. Once Congress has received the report, Congress can “adopt a joint resolution terminating, restricting, or continuing security assistance” for the country.67 Congress can write the restrictions in this legislation as broadly or narrowly as it likes. The joint resolution is considered privileged—privileged matters interrupt the normal course of business, and therefore come up through the relevant committees for a floor vote in a more expedited manner. Because it is guaranteed to receive a floor vote, privileged legislation can be useful because it requires members of Congress to go on the record on their position via their vote—this, in turn, means that each member will need to learn about the issue and gives constituents the opportunity to weigh in. Additionally, floor votes tend to generate more media coverage and public awareness of the issue.

Holding a vote on such legislation can be useful even if it fails to pass or is vetoed by the president, by registering Congress’s disapproval and shining light on an issue. For example, in June 2019, Sens. Chris Murphy (D-Conn.) and Todd Young (R-Ind.) introduced a privileged resolution to request such a report on Saudi Arabia after Secretary of State Pompeo declared an emergency in order to sell arms to Saudi Arabia and the UAE.68 The senators hoped to use the legislation to force a vote in accordance with 502B(c).69

While other members of Congress have recently introduced similar legislation, Section 502B(c) does not “appear to have been used to any meaningful effect in recent years,” according to Lawfare’s Scott Anderson.70 Notably, this may be because 502B(c) “raises constitutional concerns.”71

Finally, via the appropriations process, Congress can increase funding for Leahy vetting through funding for Diplomacy and Consular Programs (D&CP) funds for the State Department Bureau of Democracy, Human Rights, and Labor.72

4. Recommendation: Shift Focus from Equipment to Training

One of the primary goals of U.S. security force assistance is to build partners’ capacity. Yet U.S. security force assistance has tended to emphasize the provision of materiel over training. On the demand side, many partner governments want access to cutting-edge military equipment as a mark of status and prestige.73 At the same time, on the supply side, the military-industrial complex creates incentives for Congress to facilitate weapons sales abroad. However, training may be relatively more effective in professionalizing partner militaries, ensuring that they actually have the technical capability to effectively use the weapons they acquire, and discouraging human rights violations.

In order to shift the relative emphasis in U.S. security force towards training, Congress can appropriate more funding to IMET rather than FMF, and can include line-items in appropriations bills requiring assistance to be non-lethal or focused on training.

Citations
  1. Taylor P. White, “Security Cooperation: How It All Fits,” Joint Force Quarterly 72 (1st Quarter, January 2014), source.
  2. Definition from Stephen Biddle, Julia Macdonald, and Ryan Baker. "Small Footprint, Small Payoff: The Military Effectiveness of Security Force Assistance." Journal of Strategic Studies 41.1-2 (2018): 89-142.
  3. Security Aid Dashboard, Security Assistance Monitor, source; Recipients are individual countries, groups of countries, and international organizations.
  4. Ibid.
  5. Miller and Mahanty, “U.S. Security Aid Is a Faith-Based Policy.”
  6. Rand and Tankel, Security Cooperation & Assistance.
  7. WOLA, “WOLA Defense Oversight Research Database,” source.
  8. “International Military Education and Training,” Security Assistance Monitor, source.
  9. “International Military Education and Training (IMET),” Federation of American Scientists, source.
  10. Defense Security Cooperation Agency, “International Military Education & Training (IMET)”, source Military Education and Training, Security Assistance Monitor; “International Military Education and Training (IMET),” Federation of American Scientists.
  11. Defense Security Cooperation Agency, “International Military Education & Training (IMET).”
  12. Security Assistance Monitor, source.
  13. “International Narcotics Control and Law Enforcement,” Security Assistance Monitor, source
  14. Annie Shiel, A CIVIC Quick Reference Guide: US Law & Policy on the Use of Military Force and Lethal Operations – Part II (Partnered Operations), Center for Civilians in Conflict, August 29, 2018, source.
  15. Security Assistance Monitor, source.
  16. “Foreign Military Financing,” Security Assistance Monitor, source.
  17. “Foreign Military Financing (FMF),” Bureau of Political-Military Affairs, Washington, DC, U.S. Department of State Archive, source.
  18. “Foreign Military Financing,” Defense Security Cooperation Agency, source.
  19. Security Assistance Monitor, source.
  20. Shiel, A CIVIC Quick Reference Guide — Part II.
  21. “Statement of Lauren Ploch Blanchard, Specialist in African Affairs, Congressional Research Service, Before the Senate Foreign Relations Committee Subcommittee on Africa and Global Health Hearing: U.S. Security Assistance in Africa, June 4, 2015,” source.
  22. Security Assistance Management Manual, Defense Security Cooperation Agency, Table C15.T2. BPC Programs and Authorities, source.
  23. Ibid.
  24. Shiel, A CIVIC Quick Reference Guide — Part II.
  25. Security Assistance Monitor, source.
  26. Section 1206 was authorized by the National Defense Authorization Act for Fiscal Year 2006 (NDAA FY06). Section 1206 was subsequently codified as Section 2282, with different and expanded provisions, in December 2014. The FY17 NDAA later incorporated this authority into a similar global train and equip authority, Section 1241(c). However, “Section 1206” is still sometimes used as a shorthand title to denote train and equip authority.
  27. “Section 1206 Train and Equip Authority,” Security Assistance Monitor, source.
  28. Shiel, A CIVIC Quick Reference Guide — Part II.
  29. 10 U.S. Code § 166a – Combatant commands: funding through the Chairman of Joint Chiefs of Staff, source.
  30. Office of the Secretary of Defense, “Fiscal Year (FY) 2019 President’s Budget Security Cooperation Consolidated Budget Display,” February 2018, source.
  31. “The Global Security Contingency Fund: Fact Sheet,” Bureau of Political-Military Affairs, April 26, 2019, source.
  32. “The Global Security Contingency Fund,” U.S. Department of State Archive, source.
  33. Shiel, A CIVIC Quick Reference Guide — Part II.
  34. Wesley Morgan, “Behind the secret U.S. war in Africa,” Politico, July 2, 2018, source.
  35. Shiel, A CIVIC Quick Reference Guide — Part II.
  36. Title XII-Matters Relating to Foreign Nations, Subtitle A—Assistance and Training, Support of special operations for irregular warfare (sec. 1201), source.
  37. “Putting the Pieces Together: a Global Guide to U.S. Security Aid Programs,” WOLA Defense Oversight Research Database, source.
  38. John Rudy and Ivan Eland, Special Operations Military Training Abroad and Its Dangers, Cato Institute, Foreign Policy Briefing No. 53, June 22, 1999, source; “Exchange Training,” Security Assistance Monitor, source.
  39. Putting the Pieces Together, WOLA.
  40. Security Assistance Monitor, source.
  41. For a longer list of programs and authorities, see: source.
  42. “Acquisition and Cross-Service Agreements,” Office of the Under Secretary of Defense for Acquisition and Sustainment, source.
  43. Ibid.
  44. Ibid.
  45. Interview with author.
  46. Samuel Oakford and Ryan Goodman, “The U.S. is Paying More Than it Bargained for in the Yemen War,” The Atlantic, December 8, 2018, source.
  47. Dianne E. Rennack and Susan G. Chesser, Foreign Assistance Act of 1961: Authorizations and Corresponding Appropriations, Congressional Research Service, July 29, 2011, source, p. i.
  48. Foreign Assistance Act of 1961 (P.L. 87-195), Legislation on Foreign Relations Through 2002, July 2003, Volume I-A of Volumes I-A and I-B, U.S. Government Printing Office, Washington, DC, source, p. 230.
  49. Ibid, pp. 231-232.
  50. Ibid, p. 233.
  51. “Leahy Law Fact Sheet,” Bureau of Democracy, Human Rights, and Labor, U.S. State Department, January 22, 2019, source.
  52. 22 U.S. C. 2304(b).
  53. Fontaine and Schulman, Congress’s Hidden Strengths.
  54. Interview with author.
  55. Fontaine and Schulman, Congress’s Hidden Strengths.
  56. Defense Logistics Agreements: DOD Should Improve Oversight and Seek Payment from Foreign Partners for Thousands of Orders It Identifies as Overdue, Government Accountability Office, March 4, 2020, source.
  57. Ibid.
  58. Joe Gould, “Facing Iran, Saudi Arabia still owes US $181 million for Yemen refueling,” Defense News, September 20, 2019, source.
  59. Rand and Tankel, US Security Cooperation & Assistance.
  60. Miller and Mahanty, “U.S. Security Aid Is a Faith-Based Policy.”
  61. DoD Instruction 5132.14, Assessment, Monitoring, and Evaluation Policy for the Security Cooperation Enterprise, Office of the Under Secretary of Defense for Policy, January 13, 2017, source.
  62. Miller and Mahanty, “U.S. Security Aid Is a Faith-Based Policy.”
  63. Ibid.
  64. source.
  65. Daniel R. Mahanty, “The ‘Leahy Law’ Prohibiting US Assistance to Human Rights Abusers: Pulling Back the Curtain,” Just Security, June 27, 2017, source.
  66. Foreign Assistance Act of 1961 (P.L. 87-195), pp. 232-233.
  67. Security Assistance Monitor, Applying the Leahy Law to U.S. Military and Police Aid, December 2014, source.
  68. S.Res. 243, 116th Congress (2019), source.
  69. Ibid; “Murphy, Young Announce Privileged Resolution to Force Vote on U.S.-Saudi Security Relationship, Recent Arms,” Office of Senator Chris Murphy, June 9, 2019, source.
  70. Scott R. Anderson, “Untangling the Yemen Arms Sales Debate,” Lawfare, June 14, 2019, source.
  71. For a longer discussion of these constitutional concerns, see: Anderson, “Untangling the Yemen Arms Sales Debate.”
  72. Liana W. Rosen, Human Rights Issues: Security Forces Vetting (‘Leahy Law’), Congressional Research Service, January 3, 2017, source.
  73. Jennifer Spindel, 2018. Beyond Military Power: The Symbolic Politics of Conventional Weapons Transfers (unpublished dissertation), source.
Part I: U.S. Security Cooperation and Assistance

Table of Contents

Close