Introduction
Capacity-building missions in fragile states are risky investments because these states’ capacity to provide security and rule of law within their territories is undermined by corruption, a less visible yet more corrosive issue than training or equipment shortfalls.[1] However, U.S. capacity-building efforts have tended to focus on improving tactical proficiency without considering how corruption undermines recipients’ ability and incentives to provide security.[2] This results in U.S. personnel attempting to build effective security sectors on compromised foundations.
To address corruption, U.S. advisors and trainers must not only develop recipients’ capacity (ability to conduct operations), but also their professionalism (how they conduct operations).[3] This requires U.S. personnel to act as norm entrepreneurs within recipient security sectors, purposefully imparting U.S. norms of political professionalism and deference to civilian authority that strengthen institutions and foster stability in the long run.[4] Only once these norms are internalized by the members of recipient security sectors will their organizational cultures begin to complement, rather than hinder, U.S. training and material support.[5]
This is not an easy process because norms are rooted in deeply held worldviews and are shaped by various factors, only some of which can be leveraged by U.S. personnel involved in capacity-building missions.[6] By analyzing the dynamics and outcomes of Cold War and Global War on Terrorism (GWOT) capacity-building missions, this article attempts to derive insights on norm entrepreneurship applicable to current and future partnerships. If policymakers and practitioners fail to learn from these past successes and failures, their efforts will remain vulnerable to the pitfalls of corruption, increasing the likelihood that U.S. investments of blood and treasure will be squandered.
Corruption’s Corrosiveness
Norm entrepreneurship is only one variable in a complex geopolitical environment. The outcome of any capacity-building mission, and by extension the fate of a recipient state, is influenced by the foreign policies and domestic politics of the U.S., partners and allies, adversaries, and even third parties, in ways that are not easily discernible to policymakers, practitioners, or outside observers. Complexity notwithstanding, corruption’s deleterious effects cross the boundaries that separate foreign policy from domestic politics, and civilian affairs from military operations.
Corruption encourages the inefficient allocation of resources by diverting money meant for public goods to private pockets.[7] It hinders political development, since respect for laws and institutions is undermined when people know they can be circumvented for the right price.[8] Corruption discourages external investment, depriving developing states of the economic growth that could fund and strengthen their governments.[9]
For states facing existential threats, corruption is especially self-defeating. Strong and efficient administration is needed to manage their conflicts, but corruption prevents that administration from emerging.[10] More often than not, rampant corruption has metastasized domestic discontent into the conflicts that the U.S. is assisting recipient states with in the first place.[11] Conflict locks these states into a vicious cycle, as their ability to regulate corruption is further decreased, making corruption more widespread and entrenched.[12] The spread of corruption further undermines societal trust in the state and prompts citizens to align with competing sources of power that contribute to the further fragmentation of society.[13]
At the tactical level, corruption degrades recipient forces’ operational readiness due to mismanagement of funds and assets and undermines public trust in them.[14] U.S.-recipient rapport is also compromised because corruption conditions organizations to operate in secrecy and obfuscate their true intentions.[15] If practices that reinforce perceptions of corruption are not reformed, it is unlikely that recipient security sectors will earn the trust of their populations. Instead, they will continue exacerbating the grievances that fuel the conflicts the U.S. is attempting to quell through capacity-building efforts.
Security sector corruption is rarely an isolated issue and tends to be self-sustaining. In some cases, civilian governments politicize security sectors by dispensing economic rents.[16] In other cases, civilian authority is so weak that security officials can extort benefices from their erstwhile overseers.[17] Institutional reform is stymied by buying off or intimidating reformers, rewarding loyalists, and punishing waverers.[18] Each individual act of corruption cultivates a critical mass of loyalists with a vested interest in the status quo.[19]
Path to Reform
Reforms can take place at several levels, including operational, addressing how recipient security sectors carry out day-to-day duties; structural, addressing weak internal governance through new disciplinary regimes, oversight mechanisms, and promotion practices; and external oversight, where civilian officials or entities are given explicit authority to manage certain aspects of a security sector.[20] Within the Department of Defense’s (DoD) terminology regarding security partnerships, these reform activities are classified as Security Sector Reform (SSR) and Defense Institution Building (DIB).[21] SSR involves “transforming the security sector…which includes all the actors, their roles, responsibilities, and actions so that they…operate… in a manner that is more consistent with…sound principles of good governance.”[22] Policing activities are also included in the purview of SSR, which is relevant to conflicts within fragile states since the duties of external security actors (military) and internal security actors (police) become blurred.[23] SSR primarily occurs at the operational and structural levels. DIB occurs at the structural and external oversight levels, focusing on making national-level institutions “effective, transparent, and responsive,” as well as “improving civilian control of the military, building respect for the rule of law, and improving military professionalism.”[24]
By integrating SSR and DIB into capacity-building efforts, the U.S. would “enhance the ability of security forces to uphold state authority and provide justice and security to citizens,” which is a necessary condition for good governance and long-term development.[25] These activities require U.S. personnel to play the part of norm entrepreneurs, in addition to their roles as advisors and trainers. Norm entrepreneurship would facilitate organizational culture changes from old norms that permitted corrupt and predatory practices to norms that are conducive to “civilian control, accountability, transparency, and rule of law.”[26] Norm entrepreneurship is most often discussed in research concerning political corruption, but the field’s insights and considerations can be applied to U.S. capacity-building efforts. This compatibility is due to recurrent findings that political corruption adversely impacts recipient security sectors’ capacity to secure their territory and populations. Additionally, recommendations to counter corruption’s influence on recipient security sectors mirror the logic of norm entrepreneurship practices.
Norm Entrepreneurship
Fragile states are undergoing what could be described as a process of “modernization,” at least in the political sense, since more often than not they are also located in developing regions of the world like Africa and Latin America.[27] For these states’ security sectors, capacity-building missions serve as a form of modernization; therefore, U.S. personnel involved in the effort need to be cognizant of how modernization enables corruption. To start, “modernization involves a change in the basic values of the society,” which includes redefining what counts as acceptable behavior and redefining the difference between public welfare and private interest.[28] During this period of flux, both old and new norms lack legitimacy, giving individuals moral license to violate both sets of norms when it suits their self-interest.[29]
The transition between old and new norms can be further complicated if a state’s population is ethnically heterogeneous, since new norms will have to contend with a fragmented landscape of traditional norms where “grease money” may already be commonly employed to address ethnic frictions.[30] A related consideration is whether the U.S. is the recipient state’s sole partner. If multiple external actors are aiding a state, then the security sector will be influenced by other sets of military norms besides the U.S.’s, which makes the transition from old norms and operational doctrines more difficult. The last consideration regarding the transition between old and new norms is that although a society may accept a new set of norms, its tolerance for corruption may remain higher than U.S. standards.[31]
Modernization increases corruption by introducing new laws, regulations, and oversight mechanisms, which certain actors will attempt to avoid, circumvent, or distort for private or personal gain.[32] In addition to ‘creating’ new corruption by redrawing the boundaries of acceptable and legal behavior, increased transparency exposes previously hidden corruption, creating an impression that corruption is on the rise.[33] The perception of increased corruption, whether reflective of reality or not, is important to keep in mind since societies’ equilibrium between norms and corruption shifts depending on individuals’ perceptions of corruption’s frequency.[34] In fact, studies exploring the relationship between individuals’ perceptions and tolerances of corruption have repeatedly found that people are more likely to tolerate corruption if they believe it is widespread, irrespective of their personal ethics and experiences.[35]
While modernization inevitably creates new sources of corruption, which may never be eradicated, once the new set of norms has been internalized, the “modernized” society should settle into a corruption equilibrium that is hopefully lower than the previous one and exerts a less damaging effect on the development of the state and its security sector. However, this is not a quick process, since individuals within a society adopt new norms at an uneven pace and with varying levels of enthusiasm.[36] The norm diffusion process is best understood as an “S-curve” that begins slowly with a small number of early adopters, gains momentum after a “tipping point” is reached and the majority adopts the new norm, and then decelerates as holdouts adopt the new norm.[37] Although norms are rooted in deeply held worldviews, they are still influenced by “cultural structure” and agentic factors.[38] In theory, by working within the boundaries of a recipient’s cultural structure and wisely employing their leverage over military aid, the U.S. can improve the likelihood of recipient security sectors adopting U.S. military norms. The resulting organizational culture change will make them more effective at employing the tactical capabilities provided by the U.S., ideally in support of U.S. objectives.
Making Norms Stick
Assuming that norm diffusion in a security-partnership context follows the “slow-quick-slow” tempo described in corruption literature, there will not be an immediate “mass conversion” to U.S. military norms.[39] Because the new norms prescribe behavior that is opposed to their self-interests, most leaders within a recipient security sector will attempt to obstruct, if not reverse, this process. These attempts will have the greatest probability of success during the initial slow growth phase, when only a small cadre of early adopters champion the new norms. By mobilizing larger networks and superior resources, obstructionists can sideline or buy off early adopters, conveying to waverers the perils and benefits of pushing for reform or toeing the line, respectively.
The challenge for U.S. personnel is to use whatever leverage they have at their disposal to shield early adopters from obstructionist backlash long enough for adopters to achieve successes that can be clearly attributed to U.S. training, equipment, and norms, piquing waverers’ interest and calling old practices into question. Success must then be leveraged to get early adopters rewarded and promoted, while obstructionists are sidelined, signaling to waverers that the cost-benefit calculus has shifted in favor of reform. While the U.S. will never have complete leverage over recipient states, or their security sectors, the conduct and outcomes of seven capacity building efforts (Republic of Korea [“South Korea”], Philippines, Republic of Vietnam [“South Vietnam”], El Salvador, Afghanistan, Iraq, and Mali) provide useful insights into what factors could promote the diffusion of U.S. military norms to a recipient security sector. These factors are the presence of early adopters, comprehensiveness of U.S. oversight, conditionality, time/continuity, and concurrent civilian government reform.
Early Adopters
Although not a sufficient condition, the presence of early adopters is a necessary condition for U.S. military norms to be diffused to a recipient security sector. While U.S. personnel may act as examples and conduits of U.S. military norms at the start of a capacity-building effort, local reformers are better suited to anchoring the norms within the recipient state’s cultural precepts, making the norms more acceptable to the rest of the security sector.[40] After the new norms are accepted, these early adopters will also be essential to fostering a sense of local ownership so that reforms are properly implemented and sustained.[41]
Among the seven analyzed efforts, only three had a high-profile local leader who adopted U.S. military norms and acted as a rallying point for other reformers: South Korea, the Philippines, and El Salvador. Prior to the Korean War, President Syngman Rhee created a politicized officer corps whose loyalty he maintained through dispensing economic rents.[42] After the Republic of Korea’s Army (ROKA )’s disastrous performance in the first year of the war, U.S. advisors took over personnel policy, identifying and promoting promising officers who adopted U.S. military norms.[43] The most high-profile early adopter was Paek Sun Yup, who started the Korean War as a colonel and eventually became the first four-star general in the Korean Army.[44] His meteoric rise was due in no small part to the support of U.S. advisors, since Paek was regarded with suspicion by President Rhee and his loyalists.[45]
In the Philippines, the Joint U.S. Military Assistance Group (JUSMAG) supported the installation of reformer Ramon Magsaysay as Secretary of National Defense, and he improved the performance of the Armed Forces of the Philippines (AFP) by dismissing corrupt officers, streamlining chains of command, and increasing soldiers’ pay to disincentivize looting.[46] JUSMAG and the U.S. embassy prevented obstructionists from undermining Magsaysay’s authority or removing him from office, which bought time for the reformed AFP to gain the initiative and contain the Huk insurgency.[47]
Similarly, in El Salvador, the U.S. took advantage of a stand-off between reformist and right-wing factions in the Salvadoran Army to install the reformist Colonel Carlos Eugenio Vides Casanova as Defense Minister.[48] Vides Casanova ousted his predecessor’s loyalists, chose replacements based on merit instead of personal connections, streamlined chains of command, and condemned right-wing extremism within the officer corps.[49] Although his retirement resulted in a temporary right-wing resurgence, his tenure set conditions for reformist sentiment to spread within the officer corps and signaled the end of the “code of silence” around human rights violations.[50]
On the other hand, U.S. advisors in South Vietnam never found officers who would support reform, since they all shared the same religion, partisan affiliation, and regional ties as President Diem, and this loyalty system continued under President Thieu.[51] In Iraq, accession into the officer corps was based on sectarian loyalties, and as the U.S. footprint shrank, the Iraqi government sidelined apolitical officers, preventing early adopters from rising to prominence.[52] In Mali, early adopters never rose to prominence because the armed forces were polarized between supporters and opponents of the 2012 coup, with the opposing factions murdering and torturing each other’s partisans.[53] Meanwhile, the international community’s long-time cultivation of corrupt Afghan powerbrokers through direct monetary payments ensured that a desire for reform never manifested among the country’s senior leadership.[54]
U.S. Oversight
By monitoring a recipient security sector, the U.S. can coerce recipients to conform to U.S. norms, in theory. However, oversight incurs differing costs and benefits depending on its comprehensiveness. Findings from previous SSR efforts suggest that at the beginning of a partnership, “highly interventionist” tactics are necessary, as more aspects of a recipient security sector are identified as deficient, which increases the breadth of oversight needed to ensure recipients adhere to reforms.[55] Increased depth of oversight may also be required in decentralized bureaucracies where every level extracts bribes or diverts funds.[56] However, comprehensive oversight requires a larger U.S. presence, which contradicts the capacity-building mantra of “small footprints,” and may offend recipient states’ sense of sovereignty.[57]
Both South Korea and South Vietnam are classified as partnerships with a “high” level of oversight. After 1950, the Korean Military Advisory Group (KMAG) assumed command of all ROKA forces and managed their budgets, expenditures, and personnel policy.[58] In South Vietnam, the ratio of advisors to Vietnamese soldiers decreased from 1:202 in 1957 to 1:12 in 1963, with each battalion receiving two advisors, in addition to intelligence and development specialists being deployed to rural areas.[59]
U.S. partnerships with El Salvador and Iraq are classified as having a “medium” level of oversight. In El Salvador, the advisor ratio was maintained around 1:300, with advisors deployed at the brigade level even after the Salvadoran Army doubled in size.[60] A limiting factor was the prohibition on U.S. advisors accompanying Salvadoran units on patrol, but news media and NGOs filled the blind spot by reporting on human rights violations.[61] Military Transition Teams (MTTs) in Iraq were composed of 11 soldiers and embedded at the battalion level, achieving a 1:50 ratio on paper.[62] However, MTTs only visited their assigned units once or twice a week, and the Iraqi government prohibited them from partnering with politically sensitive units.[63]
The Philippines, Mali, and Afghanistan are considered cases of “low” oversight. Due to the doubling of the AFP’s size, the advisor ratio in the Philippines also doubled from 1:431 to 1:875 from 1947 to 1952.[64] In Mali, advisors focused on training select counterterrorism units before the 2012 coup, and this occurred only on an episodic basis. [65] After the return of democratic rule, the U.S. opted to delegate the training of Malian troops to France, the European Union, and the United Nations.[66] Findings from the Special Inspector General for Afghanistan Reconstruction found that the U.S. military command in Afghanistan’s oversight capacity was so limited that it could not even validate Afghan units’ personnel rosters.[67]
Conditionality
Related to the concept of oversight is conditionality. This describes a “carrot and stick” approach where aid is provided after reforms are implemented and sustained, or withheld if recipients continue engaging in corruption and resist reforms.[68] Conditionality is crucial during the norm diffusion process because failure to punish corruption cements the perception that corruption can be committed with impunity, making it less likely that reforms will be implemented or respected.[69] One drawback to conditionality is that it can undermine recipients’ confidence in U.S. commitments, making them less willing to implement reforms that could threaten their hold on power.[70] However, ironclad commitments on the U.S.’s part can invite moral hazard and undermine the credibility of threats to withhold aid if recipients do not conform to expected behaviors.[71]
South Korea, the Philippines, and Mali can be considered cases where conditionality was applied. Once it became clear that South Korea was utterly reliant on U.S. aid to prevent a North Korean takeover, the South Korean government assented to the professionalization of ROKA units under threat of U.S. advisors withholding equipment and training.[72] JUSMAG repeatedly delayed aid to force the Filipino government to authorize joint U.S.-AFP planning, reorganize the AFP, enact economic reforms, and prevent the ouster of reformers in the security sector.[73] After a military coup overthrew President Touré in 2012, the U.S. suspended all military aid to Mali.[74] When aid resumed two years later, it was severely restricted, with the U.S. preferring to work with neighboring countries instead.[75]
El Salvador is the only “mixed” case, with the U.S. alternating between unconditional support and enforcing conditionality. When the Carter, Reagan, and Bush administrations pursued conditional strategies, they were successful in changing the Salvadoran government and armed forces’ (ESAF) behavior in regard to human rights and democratic reform.[76] Conversely, unconditional aid resulted in the Salvadoran government reneging on reform agreements or declining to punish ESAF human rights violations.[77]
South Vietnam, Iraq, and Afghanistan are examples of the U.S. providing unconditional support. Despite 44 percent of South Vietnam’s GDP consisting of U.S. aid, conditions were rarely imposed, and even then, never on military aid.[78] This unwillingness to impose conditions was due to conflicting recommendations from U.S. embassy personnel and military advisors to cut or continue aid, respectively, when the Diem regime refused to enact reforms, as well as U.S. presidents’ public commitments to South Vietnam.[79] Besides selectively withholding logistical support to Iraqi National Police (INP) units to force the replacement of uncooperative INP commanders, the Iraq effort was characterized by a lack of conditionality.[80] Meanwhile, in Afghanistan, prior to 2014, the U.S. military headquarters, Combined Security Transition Command-Afghanistan (CSTC-A), provided funds to the Afghan defense and interior ministries with no conditions on how they should be used.[81]
Time/Continuity
Anti-corruption researchers have suggested that it takes around 25 years for societal norms to conform to anti-corruption legislation. SSR researchers also found that longer-duration reform initiatives were more likely to have domestic elites take ownership of the process.[82] The lengths of the analyzed case studies are as follows: South Korea, 4 years (1949–1953); Philippines, 6 years (1947–1953); Vietnam, 17 years (1957–1973); El Salvador, 14 years (1979–1992); Iraq, 12 years (2003–2014); Mali, 18 years (2001–2012; 2014–2020); Afghanistan, 20 years (2001–2021). One caveat to this list is that the Philippines was a U.S. colonial possession dating back to the Spanish-American War and was granted independence in 1946, making its U.S. tutelage almost five decades long before the Huk rebellion started.[83] Another consideration is the continuity of U.S. mentorship. Turnover may weaken oversight while newly arrived U.S. personnel become familiar with processes, procedures, and personalities. A metric that can provide some insight into continuity is tour length, since the more time an individual advisor or trainer spends with recipients, the more opportunities they have to influence recipients to adopt and adhere to U.S. norms, and for advisors to become knowledgeable about local corruption dynamics.
There is limited information on JUSMAG’s personnel turnover during the Huk Rebellion, but one of the key U.S. advisors who championed reformers like Ramon Magsaysay was Colonel Edward Lansdale, who was assigned to a three-year tour on the eve of the Huk rebellion.[84] Korean advisor tour lengths were 18 months unaccompanied or 24 months with family, although this changed to a points system during the Korean War, with frontline service garnering more points.[85] In Vietnam, tours were 12 months, but most advisors only served 11 months and typically only spent six months with a combat unit, while the remainder was spent on staff.[86] At first El Salvador tours were 89 or 179 days in length, but were eventually lengthened to 1 year.[87] At the start of the Global War on Terror (GWOT), tours to Iraq and Afghanistan could last up to 15 months, but toward the end, deployments were around 6–9 months, depending on the branch of service.[88] Whatever the length of the tours, the Special Inspector General for Afghanistan Reconstruction found that turnover among advisors “impaired the training mission’s institutional memory and hindered the relationship building required in Security Sector Reform missions,” an insight that may also be applicable to Iraq.[89] U.S. special operations forces (SOF) filled the advisor role to Malian forces, but their contact was episodic, and then nonexistent after training was delegated to France, the EU, and the UN.[90]
Civilian Reform
Usually, a state is beset with internal conflict because its government is flawed in some regard, such as rampant corruption.[91] This means that in addition to improving the capacity of recipient security sectors, the U.S. must also encourage civilian governments to enact reforms that address the grievances of the population. However, some governments will resist reform because it threatens elites’ political and economic prerogatives.[92] Civilian governments’ continued corruption can delay the norm diffusion “tipping point” by contributing to perceptions that corruption remains widespread and incentivizing security sectors to also resist reform.[93]
Only the South Korea, Philippines, and El Salvador cases included civilian reform. While the South Korean government under Syngman Rhee remained highly corrupt during and after the Korean War, it continued the U.S. military government’s land reform program to address peasant grievances and gradually increased the proportion of civil servants who were selected through the civil service examination.[94] The Quirino administration and its Liberal Party supermajority in the Filipino Congress opposed and delayed U.S. reform proposals but were eventually pressured into passing legislation that raised corporate income taxes and the minimum wage.[95] When the Quirino administration attempted to interfere with the 1953 presidential election, the U.S. again threatened to suspend aid, ensuring a relatively free and fair election that swept reformer Ramon Magsaysay into office.[96] In El Salvador, the far-right ARENA party was taken over by more moderate leadership and won the presidency on a platform of economic reform and a negotiated peace with the FMLN.[97] The Cristiani administration followed through on its promised economic reforms, negotiated a peace deal with the FMLN that integrated them into the political system, and then overhauled the ESAF by disbanding services associated with human rights violations and bringing other services under civilian control.[98]
In South Vietnam, the Diem regime never enacted meaningful political or economic reforms to shore up its popular support. [99] This failure to reform could be attributed to the Eisenhower and Kennedy administrations’ failure to condition military aid, which was the only support Diem considered necessary for his regime’s survival.[100] Contrary to U.S. expectations, elections in Iraq were distorted by sectarian tensions, with Iraq’s first two prime ministers sponsoring sectarian militias and politicizing the Iraqi officer corps to ensure their grip on power.[101] The U.S.-Mali security partnership was narrowly focused on improving Malian forces’ tactical proficiency, with no attention paid to Malian institutions’ weaknesses despite widespread knowledge of the civilian government’s corruption.[102] Ironically, to advance their own political interests, Malian elites had purposefully sown division and discord among the armed forces, undermining their cohesion and capacity.[103] U.S. officials purposefully turned a blind eye to Afghan government corruption, believing that security had to take precedence before corrupt actors could be held to account.[104] Additionally, Afghan civil servants obstructed and derailed U.S.-proposed economic reforms to preserve their rents.[105]
Analysis/Discussion
Table 1 below summarizes the outcomes of the seven analyzed cases and the factors that contributed to or detracted from recipients adopting U.S. military norms. For the purposes of this analysis, South Korea, the Philippines, and El Salvador are considered “successful” cases because their security sectors adopted U.S. military norms and effectively countered the threats that U.S. advisors had been deployed to assist with. The ROKA was professionalized, and its combat performance continually improved until the 1953 armistice.[106] The AFP improved its tactical proficiency and reformed its abusive behavior toward civilians, undercutting support for the Huk insurgency until its leaders surrendered in 1953.[107] The ESAF repeatedly relapsed to its old norms whenever the U.S. did not condition aid, but advances were made in breaking the “code of silence” surrounding human rights violations, and the ESAF managed to stave off FMLN advances until a negotiated settlement was reached.[108]
| Table 1: U.S. Norm Entrepreneurship – Factors & Outcomes | ||||||
| Recipient | Early Adopters? | Oversight | Conditionality | Time (Years) | Civilian Reform? | Outcome |
| South Korea (1949-1953) | Yes | High | Conditional | 4 | Yes | Success |
| Philippines (1946-1953) | Yes | Low | Conditional | 6* | Yes | Success |
| South Vietnam (1957-1973) | No | High | Unconditional | 17 | No | Failure |
| El Salvador (1979-1992) | Yes | Medium | Mixed | 14 | Yes | Success |
| Iraq (2003-2014) | No | Medium | Unconditional | 11 | No | Failure |
| Mali (2001-2020) | No | Low | Conditional | 18** | No | Failure |
| Afghanistan (2001-2021) | No | Low | Unconditional | 20 | No | Failure |
| *Under U.S. control from 1898-1946; **2001-2011; 2014-2020. | ||||||
Conversely, unsuccessful outcomes entail a continuation of corrupt practices and a failure to defeat the threat U.S. military aid was meant to address. The South Vietnamese Army remained mired in corruption, and two years after U.S. forces withdrew, North Vietnam conquered South Vietnam in 1975.[109] In 2014, the politicized Iraqi officer corps could not stop their units from dissolving when confronted by numerically inferior ISIS forces, necessitating the reentry of U.S. forces into Iraq.[110] Mali’s forces have continued their human rights violations, only to see Islamist groups gain territory and bring the state to the verge of collapse.[111] Rampant corruption left Afghan security forces under-equipped and undermanned, and without U.S. assistance, the state fell to the Taliban in a matter of weeks.[112]
While each case has a unique combination of factors, all successful cases contained early adopters and civilian reform; unsuccessful cases contained neither. This suggests that there may be merit to the supposition that early adopters are needed to anchor U.S. military norms in their states’ cultural precepts before others accept the norms.[113] The correlation of civilian reform with case success gives weight to the theory that if the civilian government is reforming, the security sector is more likely to follow suit, since corruption will be perceived to be in decline.[114] Conditionality was also present in successful cases, although El Salvador was labeled “mixed” due to the U.S.’s inconsistent enforcement. However, Mali also featured conditionality, the only unsuccessful case to do so. This conditionality was imposed in 2012 to comply with Section 7008 of U.S. foreign aid appropriations legislation, which restricts aid to states whose democratically elected governments are overthrown by a military coup.[115] Although Section 7008 can be waived for national security issues, the conditionality exercised in Mali’s case did not contain the same level of flexibility as the conditionality U.S. personnel leveraged in the three successful cases.[116]
Conclusion
The historic record suggests that security partnerships are not a surefire way to achieve U.S. objectives with minimal effort. Often, the U.S. finds itself partnered with corrupt governments whose security sectors are also corrupt and ineffective.[117] Although reforms are required, the will to reform is often lacking.[118] The desire to reform must be cultivated by diffusing U.S. military norms to recipients. Yet U.S. personnel are not best suited to effect this change. Instead, they should identify and empower early adopters to take local ownership of the process.
Additionally, the correlation of successful capacity building with civilian reform suggests that military norm entrepreneurship is more likely to succeed as part of a larger, whole-of-government norm entrepreneurship effort. It is reasonable to posit that a state is more likely to survive if its civilian officials are more focused on wielding their non-military elements of national power to advance the public welfare, rather than enriching themselves. The question of which U.S. agencies are best suited to act as norm entrepreneurs for recipient states’ civilian governments merits further exploration. What is clear from this analysis is that SSR and capacity building, more generally, cannot, and do not, occur in a vacuum.
Conditionality may also be required to change recipients’ incentive structures, since adoption of new norms is unlikely without an extrinsic motivator (aid, operational success, etc.) to entice the wavering majority. However, two issues affect the U.S.’s ability to employ conditionality in support of norm entrepreneurship. First, U.S. military doctrine emphasizes “rapport building and persuasion,” which encourages advisors to self-limit their range of options when dealing with intransigent recipients.[119] Second, legislation such as Section 7008 and Leahy vetting affects the conditionality that on-the-ground U.S. personnel can exercise in response to recipient violations.[120] Further study is needed to assess how current legislation affects the U.S.’s ability to elicit recipients’ compliance before recommendations can be made to pass a corruption-centric version of Section 7008 or the Leahy Amendment.
Endnotes
[1] Mara Karlin, Building Militaries in Fragile States: Challenges for the United States (Philadelphia: University of Pennsylvania Press, 2017), 5-6.
[2] R. Evan Ellis, “The U.S. Military in Support of Strategic Objectives in Latin America and the Caribbean,” Prism 8, no. 1 (2019): 26-39, https://ndupress.ndu.edu/Media/News/News-Article-View/Article/1943461/the-us-military-in-support-of-strategic-objectives-in-latin-america-and-the-car/; Karlin, Building Militaries in Fragile States, 4; Stephen Tankel, “US Counterterrorism in the Sahel: From Indirect to Direct Intervention,” International Affairs 96, no. 4 (2020): 875-93, https://doi.org/10.1093/ia/iiaa089.
[3] Nicolas Marsh and Øystein H. Rolandsen, “Fragmented We Fall: Security Sector Cohesion and the Impact of Foreign Security Force Assistance in Mali,” Journal of Intervention and Statebuilding 15, no. 5 (2021): 614-29, https://www.jstor.org/stable/24538969.
[4] Ellis, “In Support of Strategic Objectives in Latin America and the Caribbean,” 30; Risa Brooks, “Paradoxes of Professionalism: Rethinking Civil-Military Relations in the United States,” International Security 44, no. 4, (Spring 2020): 7–44.
[5] Ursula C. Schroeder, Fairlie Chappuis, and Deniz Kocak, “Security Sector Reform from a Policy Transfer Perspective: A Comparative Study of International Interventions in the Palestinian Territories, Liberia and Timor-Leste,” Journal of Intervention and Statebuilding 7, no. 3 (2013): 381–401, https://doi.org/10.1080/17502977.2013. Randell Yi and Edward J. O’Connell, “Making U.S. Security Cooperation in Fragile States Work: Organizational Capital in Aid Provision,” Journal of Strategic Security 17, no. 2 (2024): 44–60.
[6] Hun Joon Kim and J. C. Sharman, “Accounts and Accountability: Corruption, Human Rights, and Individual Accountability Norms,” International Organization 68, no. 2 (Spring 2014): 417–48.
[7] Kimberly Ann Elliott, “Corruption as an International Policy Problem,” in Political Corruption: Concepts and Contexts, 3rd ed., ed. Arnold J. Heidenheimer and Michael Johnston (New Brunswick, NJ: Transaction Publishers, 2002), 925–941; Dominic Scott and Mark Pyman, “Public Perceptions of Corruption in the Military in Europe and the Rest of the World,” European Security 14, no. 4 (2008): 495–515, https://doi.org/10.1080/09662830802568923.
[8] Susan Rose-Ackermann, “When Is Corruption Harmful?” in Political Corruption: Concepts and Contexts, 3rd ed., ed. Heidenheimer and Johnston, 353–71.
[9] Elliott, “Corruption as an International Policy Problem,” 926-36; Rajeev K. Goel and James W. Saunoris, “Military Buildups, Economic Development and Corruption,” Manchester School 84, no. 6 (2016): 697–722.
[10] Walter C. Ladwig III, The Forgotten Front: Patron-Client Relationships in Counterinsurgency (New York: Cambridge University Press, 2017), 21.
[11] Ladwig, The Forgotten Front, 29.
[12] Anna K. Schwickerath, “Anti-Corruption Norms in Training for United Nations Peacekeeping Operations,” Crime, Law and Social Change 70, no. 2 (2018): 275–92.
[13] Schwickerath, “Anti-Corruption Norms in Training for UN Peacekeeping Operations,” 277.
[14] Scott and Pyman, “Public Perceptions of Corruption,” 495-96.
[15] Tankel, “U.S. Counterterrorism in the Sahel,” 879; Yi and O’Connell, “Making U.S. Security Cooperation in Fragile States Work,” 47.
[16] Tudorel Andrei and Daniel Teodorescu, “The Link Between Corruption, Development, and Military Expenditures,” International Journal of Economic Development 7, no. 1 (2005): 1–24; Waziri B. Adisa, “Political Opportunism, Corruption and Underdevelopment in Africa,” Africa Insight 43, no. 3 (2013): 42–62.
[17] Yanilda María González, “Reforming to Avoid Reform: Strategic Policy Substitution and the Reform Gap in Policing,” Perspectives on Politics 21, no. 1 (2023): 59–77; Nazmus Sakib and Md Muhibbur Rahman, “Military in the Cabinet and Defense Spending of Civilian Governments,” International Interactions 49 (2023): 315–44.
[18] Gerald Bareebe, “Predators or Protectors? Military Corruption as a Pillar of Regime Survival in Uganda,” Civil Wars 22, nos. 2–3 (2020): 313–32; Scott and Pyman, “Public Perceptions,” 498.
[19] Bareebe, “Predators or Protectors,” 317.
[20] González, “Reforming to Avoid Reform,” 61.
[21] Yi and O’Connell, “Making U.S. Security Cooperation in Fragile States Work,” 45.
[22] Bernardo Venturi and Nana Toure, “The Great Illusion: Security Sector Reform in the Sahel,” International Spectator 55, no. 4 (2020): 54–68.
[23] Nina Wilén, “The Impact of Security Force Assistance in Niger,” International Affairs 98, no. 4 (2022): 1405–21; Yi and O’Connell, “Making U.S. Security Cooperation Work,” 45.
[24] Yi and O’Connell, “Making U.S. Security Cooperation in Fragile States Work,” 45.
[25] Marsh and Rolandsen, “Fragmented We Fall,” 614; Tankel, “U.S. Counterterrorism in the Sahel,” 880.
[26] Schroeder, Chappuis, and Kocak, “Security Sector Reform from a Policy Transfer Perspective,” 382.
[27] Samuel P. Huntington, “Modernization and Corruption,” in Political Corruption: Concepts and Contexts, ed. Heidenheimer and Johnston, 253–363.
[28] Huntington, “Modernization and Corruption,” 254.
[29] Huntington, “Modernization and Corruption,” 254.
[30] Goel and Saunoris, “Military Buildups, Economic Development and Corruption,” 703; Huntington, “Modernization and Corruption,” 257.
[31] Pranab Bardhan, “Corruption and Development: A Review of Issues,” in Political Corruption: Concepts and Contexts, ed. Heidenheimer and Johnston, 321–37.
[32] Huntington, “Modernization and Corruption,” 255.
[33] Elliott, “Corruption as an International Policy Problem,” 925.
[34] Bardhan, “Corruption and Development,” 333-34.
[35] Nils Köbis et al., “‘Who Doesn’t?’ The Impact of Descriptive Norms on Corruption,” PLoS One 10, no. 6 (2015); Sen Tian and Liangfo Zhao, “Tolerance for Corruption and Descriptive Social Norm,” PLoS One 19, no. 5 (2024).
[36] Huntington, “Modernization and Corruption,” 254.
[37] Kim, and Sharman, “Accounts and Accountability,” 443.
[38] Kim, and Sharman, “Accounts and Accountability,” 436-37.
[39] Kim, and Sharman, “Accounts and Accountability,” 443.
[40] Kim, and Sharman, “Accounts and Accountability,” 443.
[41] Schroeder, Chappuis, and Kocak, “Security Sector Reform from a Policy Transfer Perspective,” 383.
[42] Stephen Biddle, Julia Macdonald, and Ryan Baker, “Small Footprint, Small Payoff: The Military Effectiveness of Security Force Assistance,” Journal of Strategic Studies 41, nos. 1-2, (2018): 89–142, https://doi.org/10.1080/01402390.2017.1307745.
[43] Biddle, Macdonald, and Baker, “Small Footprint, Small Payoff: The Military Effectiveness of Security Force Assistance,” Journal of Strategic Studies 41, nos. 1–2 (2018): 142.
[44] “Remembering General Paik Sun-Yup,” Council on Foreign Relations, July 15, 2020, https://www.cfr.org/blog/remembering-general-paik-sun-yup.
[45] Jun Suk Hyun and William Stueck, “The U.S.-ROK Relationship into Full Bloom: From ‘Little Strategic Interest’ to Alliance Partner, 1947–1966,” Journal of American-East Asian Relations 26, no. 2 (2019): 103–40.
[46] Ladwig, The Forgotten Front, 114-16.
[47] Ladwig, The Forgotten Front, 129-30; 133.
[48] Ladwig, The Forgotten Front, 253-54.
[49] Ladwig, The Forgotten Front, 254-55.
[50] Ladwig, The Forgotten Front, 273; 277.
[51] Caitlin Talmadge, The Dictator’s Army: Battlefield Effectiveness in Authoritarian Regimes (Ithaca, NY: Cornell University Press, 2015), 54–55.
[52] Biddle, Macdonald, and Baker, “Small Footprint, Small Payoff,” 118.
[53] Marsh and Rolandsen, “Fragmented We Fall,” 619; Yi and O’Connell, “Making U.S. Security Cooperation in Fragile States Work,” 55.
[54] Abdul Rahman Yasa, “From Security Sector Reform to Endemic Corruption: The Case of Afghanistan.” Journal of Strategic Security 13, no. 3 (2020): 99-119, https://scholarcommons.usf.edu/jss/vol13/iss3/5.
[55] Schroeder, Chappuis, and Kocak, “Security Sector Reform from a Policy Transfer Perspective,” 382-83.
[56] Bardhan, “Corruption and Development,” 326.
[57] Biddle, Macdonald, and Baker, “Small Footprint, Small Payoff,” 89-90; Ladwig, The Forgotten Front, 49.
[58] Biddle, Macdonald, and Baker, “Small Footprint, Small Payoff,” 118.
[59] Ladwig, The Forgotten Front, 49; 70; 184.
[60] Ladwig, The Forgotten Front, 69-70; 255
[61] Biddle, Macdonald, and Baker, “Small Footprint, Small Payoff,” 110.
[62] Biddle, Macdonald, and Baker, “Small Footprint, Small Payoff,” 115.
[63] Biddle, Macdonald, and Baker, “Small Footprint, Small Payoff,” 115.
[64] Ladwig, The Forgotten Front, 70.
[65] Tankel, “U.S. Counterterrorism in the Sahel,” 886-87; 891.
[66] Marsh and Rolandsen, “Fragmented We Fall,” 620; 622; Tankel, “U.S. Counterterrorism in the Sahel,” 889.
[67] Special Inspector General for Afghanistan Reconstruction (SIGAR), What We Need to Learn: Lessons from Twenty Years of Afghanistan Reconstruction (Arlington, VA, 2021), 51.
[68] Ladwig, The Forgotten Front, 292; Schroeder, Chappuis, and Kocak, “Security Sector Reform from a Policy Transfer Perspective,” 385.
[69] Köbis et al., “’Who Doesn’t?’,” 12/14.
[70] Biddle, Macdonald, and Baker, “Small Footprint, Small Payoff,” 102.
[71] Biddle, Macdonald, and Baker, “Small Footprint, Small Payoff,” 102-3; Ladwig, The Forgotten Front, 292.
[72] Biddle, Macdonald, and Baker, “Small Footprint, Small Payoff,” 122.
[73] Ladwig, The Forgotten Front, 102; 114-15; 124-27; 133.
[74] Tankel, “U.S. Counterterrorism in the Sahel,” 875; 887.
[75] Tankel, “U.S. Counterterrorism in the Sahel,” 887-89.
[76] Ladwig, The Forgotten Front, 284-85.
[77] Ladwig, The Forgotten Front, 285-86.
[78] Ladwig, The Forgotten Front, 209; 211-12.
[79] Ladwig, The Forgotten Front, 211-12.
[80] Biddle, Macdonald, and Baker, “Small Footprint, Small Payoff,” 115; 129.
[81] Yasa, “From Security Sector Reform to Endemic Corruption,” 107.
[82] Schroeder, Chappuis, and Kocak, “Security Sector Reform from a Policy Transfer Perspective,” 383; 395-96.
[83] Ladwig, The Forgotten Front, 86-88; 142-43.
[84] Brian P. O’Lavin, “War on the Cheap: U.S. Military Advisors in Greece, Korea, the Philippines, and Vietnam” (PhD diss., Naval Postgraduate School, 2015), 134.
[85] Robert D. Ramsey III, Advising Indigenous Forces: American Advisors in Korea, Vietnam, and El Salvador (Fort Leavenworth, KS: Combat Studies Institute Press, 2008), 12.
[86] Ramsey III, Advising Indigenous Forces, 37-38.
[87] Ramsey III, Advising Indigenous Forces, 90.
[88] Meghann Myers, “1:3 Deployment-to-Dwell Ratio to Be Standardized under DoD Policy Starting in November,” Military Times, September 16, 2021, https://www.militarytimes.com/news/pentagon-congress/2021/09/16/13-deployment-to-dwell-ratio-to-be-standardized-under-dod-policy-starting-in-nov/.
[89] Yasa, “From Security Sector Reform to Endemic Corruption,” 102.
[90] Stephen Harmon, “Securitization Initiatives in the Sahara-Sahel Region in the Twenty-first Century,” African Security 8, no. 4 (October-December, 2015): 227-48, https://www.jstor.org/stable/10.2307/48598908; Marsh and Rolandsen, “Fragmented We Fall,” 620; Tankel, “U.S. Counterterrorism in the Sahel,” 889; 891.
[91] Ladwig, The Forgotten Front, 29.
[92] Ladwig, The Forgotten Front, 24-25.
[93] Köbis et al., “’Who Doesn’t?’,” 12/14.
[94] Eric Setzekorn, Arming East Asia: Deterring China in the Early Cold War (Annapolis, MD: Naval Institute Press, 2023), 66–68; Jong-sung You, “Land Reform, Inequality, and Corruption: A Comparative Historical Study of Korea, Taiwan, and the Philippines,” Korean Journal of International Studies 12, no. 1 (June 2014): 191–224, https://doi.org/10.14731/kjis.2014.06.12.1.191
[95] Ladwig, The Forgotten Front, 85; 105-10; 124-28.
[96] Ladwig, The Forgotten Front, 135-40.
[97] Ladwig, The Forgotten Front, 271-72.
[98] Ladwig, The Forgotten Front, 272; 280-82.
[99] Ladwig, The Forgotten Front, 209-12.
[100] Ladwig, The Forgotten Front, 159.
[101] Biddle, Macdonald, and Baker, “Small Footprint, Small Payoff,” 114-18.
[102] Mark Pyman, “Addressing Corruption in Military Institutions,” Public Integrity 19 (2017): 513-28, http://dx.doi.org/10.1080/10999922.2017.1285267; Tankel, “U.S. Counterterrorism in the Sahel,” 883; 885-86.
[103] Marsh and Rolandsen, “Fragmented We Fall,” 619; Yi and O’Connell, “Making U.S. Security Cooperation in Fragile States Work,” 55.
[104] SIGAR, What We Need To Learn, 30; 41.
[105] SIGAR, What We Need To Learn, 73.
[106] Biddle, Macdonald, and Baker, “Small Footprint, Small Payoff,” 123-25.
[107] Ladwig, The Forgotten Front, 85-86; 141.
[108] Ladwig, The Forgotten Front, 277; 284.
[109] Talmadge, The Dictator’s Army, 74.
[110] Biddle, Macdonald, and Baker, “Small Footprint, Small Payoff,” 92; 116-18.
[111] Pieter Van Ostaeyen, “CEP–KAS: Sahel Monitoring June 2024,” Counter Extremism Project, November 18, 2024, https://www.counterextremism.com/blog/cep-kas-sahel-monitoring-june-2024.
[112] Natasha Turak, Abigail Ng, and Amanda Macias, “‘Intelligence Failure of the Highest Order’—How Afghanistan Fell to the Taliban So Quickly,” CNBC, August 18, 2021, https://www.cnbc.com/2021/08/16/how-afghanistan-fell-to-the-taliban-so-quickly.html.
[113] Kim, and Sharman, “Accounts and Accountability,” 437.
[114] Köbis et al., “’Who Doesn’t?’,” 2/14.
[115] Alexis Arieff, Marian L. Lawson, and Susan G. Chesser, Coup-Related Restrictions in U.S. Foreign Aid Appropriations, IF11267 (Washington, DC: Congressional Research Service, 2022), 1.
[116] Alexis Arieff and Nick M. Brown, Coup-Related Restrictions in U.S. Foreign Aid Appropriations, IF11267 (Washington, DC: Congressional Research Service, 2023), 1.
[117] Ladwig, The Forgotten Front, 29-30.
[118] Mara Karlin, Building Militaries in Fragile States, 4.
[119] Biddle, Macdonald, and Baker, “Small Footprint, Small Payoff,” 92; 115-16.
[120] Michael A. Weber, Global Human Rights: Security Forces Vetting (“Leahy Laws”), IF10575 (Washington, DC: Congressional Research Service, 2024), 2, https://crsreports.congress.gov/product/pdf/IF/IF10575.
CONTACT Juan Quiroz | juan.j.quiroz.mil@army.mil
The views expressed in this article are solely those of the author(s) and do not necessarily reflect the views, policy, or position of the U.S. Army.© 2026 Arizona Board of Regents / Arizona State University