journals.sagepub.com Open in urlscan Pro
104.18.26.122  Public Scan

Submitted URL: https://journals.sagepub.com/doi/10.1177/00223433211047715#_i2
Effective URL: https://journals.sagepub.com/doi/10.1177/00223433211047715
Submission Tags: falconsandbox
Submission: On May 22 via api from US — Scanned from DE

Form analysis 7 forms found in the DOM

Name: sageDoLoginPOST /action/doLogin

<form action="/action/doLogin" id="frmLogin" name="sageDoLogin" method="post"><input type="hidden" name="id" value="31cd2b6a-0532-43f7-a669-f27ad84bf45e" onfocus="hideSubmenu();">
  <input type="hidden" name="submitViaAJAX" value="true" onfocus="hideSubmenu();">
  <input type="hidden" name="redirectUri" value="/doi/10.1177/00223433211047715" onfocus="hideSubmenu();">
  <span role="alert" class="useAJAX_error" style="display: none;">The email address and/or password entered does not match our records, please check and try again. </span>
  <span role="alert" class="error useAJAX_error_notVerified ajaxError" style="display: none;">
  </span>
  <div class="input-group">
    <div class="label">
      <label class="required" for="login">Email (required):<span class="required-marker" aria-hidden="true">*</span></label>
      <span role="alert" class="error useAJAX_error_emptyEmail ajaxError" style="display: none;">
      </span>
    </div>
    <input id="login" class="login textInput" aria-invalid="false" aria-required="true" type="text" name="login" value="" size="15" placeholder="Email address" onfocus="hideSubmenu();">
  </div>
  <div class="input-group">
    <div class="label">
      <label class="required" for="password">Password (required):<span class="required-marker" aria-hidden="true">*</span></label>
      <span role="alert" class="error useAJAX_error_emptyPassword ajaxError" style="display: none;">
      </span>
    </div>
    <input id="password" class="password textInput" aria-invalid="false" aria-required="true" type="password" name="password" value="" autocomplete="off" placeholder="Password" showarearequired="true" onfocus="hideSubmenu();">
  </div>
  <div class="actions raa-requestResetPassword">
    <a href="/action/requestResetPassword" class="link show-request-reset-password" onfocus="hideAuthor();">Forgotten your password?</a>
  </div>
  <div class="remember">
    <div class="keepMeLogin">
      <input id="31cd2b6a-0532-43f7-a669-f27ad84bf45e-remember" class="cmn-toggle cmn-toggle-round-flat" type="checkbox" name="remember" value="true" onfocus="hideSubmenu();">
      <label class="tgl-btn" for="31cd2b6a-0532-43f7-a669-f27ad84bf45e-remember"></label>
      <span class="label">Remember me</span>
    </div>
  </div>
  <div class="submit" disabled="disabled">
    <input class="formbutton defButton" type="submit" name="loginSubmit" value="Sign in" data-item-name="sign-in" aria-label="Sign In to my profile" onfocus="hideSubmenu();">
  </div>
</form>

Name: frmYMDoLoginPOST /action/ymDoLogin

<form action="/action/ymDoLogin" id="frmYMDoLogin" name="frmYMDoLogin" method="post">
  <div class="sage-sso-label">Members of _ can log in with their society credentials below</div>
  <div class="richTextDropZone" data-pb-dropzone="richTextDropZone">
  </div>
  <table class="loginForm" summary="">
  </table>
  <table class="loginForm" summary="">
    <tbody>
      <tr>
        <th><label for="sso-login" class="userNameLoginLabel">Username <span class="required-field">(required)</span></label></th>
        <td>
          <input id="sso-login" class="textInput" type="text" name="login" value="" size="15" onfocus="hideSubmenu();">
        </td>
      </tr>
      <tr>
        <th><label for="sso-password" class="passwordLoginLabel">Password <span class="required-field">(required)</span></label></th>
        <td>
          <input id="sso-password" class="textInput" type="password" name="password" value="" autocomplete="off" onfocus="hideSubmenu();">
        </td>
      </tr>
      <tr>
        <th><label for="society" class="memberSSOSocietiesList">Society <span class="required-field">(required)</span></label></th>
        <td>
          <select name="society" class="sso-select-society" id="society-token-f2fc11e2-1981-45c8-a8b9-54b2f83b9a3c">
            <option value="ISREAPI">The Int Society for Research on Emotion</option>
            <option value="ACV">American College of Veterinary Pathologists</option>
          </select>
        </td>
      </tr>
    </tbody>
  </table>
  <input type="hidden" name="redirectUri" value="/doi/10.1177/00223433211047715" onfocus="hideSubmenu();">
  <input type="hidden" name="loginUri" value="/doi/10.1177/00223433211047715" onfocus="hideSubmenu();">
  <input type="hidden" name="submitViaAJAX" value="true" onfocus="hideSubmenu();">
  <span class="useAJAX_SSO_error error" style="display: none;" role="alert">Login failed. Please check you selected the correct society from the list and entered the user name and password you use to log in to your society website.</span>
  <input class="sso-submit-button defButton" role="button" type="submit" name="submit" value="Sign in" tabindex="0" aria-label="Sign In via a society" onfocus="hideSubmenu();"><br>
</form>

Name: quickSearchGET /action/doSearch

<form action="/action/doSearch" id="quickSearch" name="quickSearch" class="quickSearchForm " style="padding-left: 0px" title="Quick Search" method="get">
  <div class="qsFilterOption-div">
    <select class="filterOption" name="filterOption">
      <option value="allJournal" data-item-name="search-all-journals">Search all journals</option>
      <option value="thisJournal" data-item-name="search-this-journal" selected="">Search this journal</option>
    </select>
  </div>
  <input id="sKey" type="hidden" name="SeriesKey" value="jpra">
  <span class="simpleSearchBoxContainer" id="meme">
    <input name="AllField" class="searchText main-search-field autocomplete ui-autocomplete-input" value="" type="search" id="searchText" title="Type search term here" placeholder="Search: keywords, title, authors, DOI" autocomplete="off"
      data-history-items-conf="0" data-publication-titles-conf="3" data-publication-items-conf="4" data-topics-conf="0" data-contributors-conf="3" data-display-labels="true" data-fuzzy-suggester="true">
  </span>
  <input class="mainSearchButton searchButtons pointer" title="search" type="submit" value="Search">
</form>

POST /action/doUpdateAlertSettings

<form method="post" action="/action/doUpdateAlertSettings" onsubmit="return publicationBrowser.alertDialog.setAction($('.journalHomeAlerts'))">
  <input class="alerts-action" type="hidden" value="addJournal" name="action">
  <input type="hidden" name="referrer" value="/doi/10.1177/00223433211047715">
  <table>
    <thead>
      <tr>
        <th> Journal</th>
        <th> New Content </th>
        <th> Announcements </th>
      </tr>
    </thead>
    <tbody>
      <tr class="journal-row">
        <td>Journal of Peace Research</td>
        <td>
          <input class="new-content-alerts" type="checkbox" value="jpra" name="journalCode" data-alert-type="new-content-alerts" onchange="checkedChanged(this)">
        </td>
        <td>
          <input class="announcements-alerts" type="checkbox" value="L753,jpra" name="code" data-alert-type="announcements-alerts" onchange="checkedChanged(this)">
        </td>
      </tr>
    </tbody>
  </table>
  <input type="submit" data-item-name="create-email-alert" value="Add Alerts" aria-disabled="true">
  <input type="button" data-item-name="cancel-email-alert" class="cancel close-add-alerts-dialog" value="cancel" onclick="panelToggleFixed('journalHomeAlerts,journalHomeAlerts2', 'journalHomeAlerts'); return false;">
</form>

Name: frmCitmgrPOST /action/downloadCitation

<form action="/action/downloadCitation" name="frmCitmgr" method="post" target="_blank"><input type="hidden" name="doi" value="10.1177/00223433211047715">
  <input type="hidden" name="downloadFileName" value="sage_jpra59_286"><input type="hidden" name="include" value="abs">
  <table summary="">
    <tbody>
      <tr>
        <td>
          <span class="copy-cite-label">How to cite this article</span>
        </td>
      </tr>
      <tr class="formats">
        <th>Style</th>
        <td>
          <span>
            <fieldset class="format-select">
              <span class="select-container">
                <select data-csl-doi="10.1177/00223433211047715" id="select_citation_style" name="format">
                  <option value="" selected="selected">Select style</option>
                  <option value="ama">AMA</option>
                  <option value="apa">APA</option>
                  <option value="chicago">Chicago</option>
                  <option value="mla">MLA</option>
                  <option value="harvard">Harvard</option>
                </select>
              </span>
            </fieldset>
          </span>
        </td>
      </tr>
      <tr class="cls-res">
        <td>
          <span id="cls-response" class="cls-response"></span>
        </td>
      </tr>
      <tr>
        <td class="submit" colspan="2">
          <a href="javascript:;" id="copyToClipBoard" class="formbutton" data-item-name="copy-citation" onfocus="hideAuthor();">Copy to Clipboard</a>
          <div id="copy-notice" style="display:none">Citation copied to clipboard.</div>
        </td>
      </tr>
      <tr class="formats">
        <th>Format</th>
        <td>
          <span>
            <fieldset class="format-select">
              <span class="select-container">
                <select id="slct_format" name="format">
                </select>
              </span>
            </fieldset>
          </span>
        </td>
      </tr>
      <input type="hidden" name="direct" value="true">
      <tr>
        <td class="helpLink" colspan="2">
          <a href="/help?context=citationManager" onclick="popupHelp(this.href); return false;" class="link downloadCitationTipsLink" title="Opens new window" target="_blank" onfocus="hideAuthor();">Tips on citation download</a>
        </td>
      </tr>
      <tr>
        <td>
          <span class="download-label">Download Citation</span>
        </td>
      </tr>
      <tr>
        <td class="submit" colspan="2">
          <input onclick="download()" class="formbutton" type="submit" name="submit" value="Download Citation" data-item-name="download-citation">
        </td>
      </tr>
    </tbody>
  </table>
</form>

Name: frmCitmgrPOST /action/downloadCitation

<form action="/action/downloadCitation" name="frmCitmgr" method="post" target="_blank"><input type="hidden" name="doi" value="10.1177/00223433211047715">
  <input type="hidden" name="downloadFileName" value="sage_jpra59_286"><input type="hidden" name="include" value="abs">
  <table summary="">
    <tbody>
      <tr class="formats">
        <th>Format</th>
        <td>
          <span>
            <fieldset class="format-select">
              <span class="select-container">
                <select id="slct_format1" name="format">
                  <option value="ris" selected="selected">RIS (ProCite, Reference Manager)</option>
                  <option value="endnote">EndNote</option>
                  <option value="bibtex">BibTeX</option>
                  <option value="medlars">Medlars</option>
                  <option value="refworks">RefWorks</option>
                </select>
              </span>
            </fieldset>
          </span>
        </td>
      </tr>
      <input type="hidden" name="direct" value="true">
      <tr>
        <td class="helpLink" colspan="2">
          <a href="/help?context=citationManager" onclick="popupHelp(this.href); return false;" class="link downloadCitationTipsLink" title="Opens new window" target="_blank" onfocus="hideAuthor();">Tips on citation download</a>
        </td>
      </tr>
      <tr>
        <td>
          <span class="download-label">Download Citation</span>
        </td>
      </tr>
      <tr>
        <td class="submit" colspan="2">
          <input onclick="download()" class="formbutton" type="submit" name="submit" value="Download Citation" data-item-name="download-citation">
        </td>
      </tr>
    </tbody>
  </table>
</form>

POST /action/showMailPage

<form action="/action/showMailPage" id="showMailPage" method="post">
  <p> Email a link to the following content: <a href="" onfocus="hideAuthor();"></a>
  </p>
  <br>
  <br>
  <label for="mailTo" accesskey="t"><span style="color: red">*</span>Recipient's Email Address:</label>
  <br>
  <input id="mailTo" type="text" name="mailTo" value="" size="50">
  <br>
  <br>
  <label for="mailFrom"><span style="color: red">*</span>Your Email:</label>
  <br>
  <input id="mailFrom" type="text" name="mailFrom" value="" size="50">
  <br>
  <br>
  <label for="name">Your Name:</label>
  <br>
  <input id="name" type="text" name="name" value="" size="50">
  <br>
  <br>
  <label for="subject" accesskey="s"><span style="color: red">*</span>Subject:</label>
  <br>
  <input id="subject" type="text" name="subject" value="Interesting article from SAGE Journals" size="50">
  <br>
  <br>
  <input id="sendCopy" style="float:left;" type="checkbox" name="sendCopy" value="true"><label for="sendCopy" accesskey="c" class="checkBox">Send me a copy of this email</label>
  <br>
  <br>
  <br>
  <div class="clearfix"></div>
  <div class="label">
    <label for="captchaCode" class="prompt required" style="white-space: nowrap">Retype the code from the picture:</label>
  </div>
  <link type="text/css" rel="stylesheet" href="/botdetectcaptcha?get=layoutStyleSheet">
  <div class="LBD_CaptchaDiv" id="sampleCaptcha" style="width: 280px !important; height: 50px !important">
    <div class="LBD_CaptchaImageDiv" id="sampleCaptcha_CaptchaImageDiv" style="width: 250px !important; height: 50px !important">
      <a target="_blank" href="http://captcha.com/java-captcha-info.html" onclick="sampleCaptcha.OnHelpLinkClick(); return sampleCaptcha.FollowHelpLink;" rel="noopener" onfocus="hideAuthor();"><img class="LBD_CaptchaImage" id="sampleCaptcha_CaptchaImage" src="/botdetectcaptcha?get=image&amp;c=sampleCaptcha&amp;t=1e80a163e16b40fd831556d2adb78fed" alt="CAPTCHA"></a>
    </div>
    <div class="LBD_CaptchaIconsDiv" id="sampleCaptcha_CaptchaIconsDiv" style="width: 24px !important;">
      <a class="LBD_ReloadLink" id="sampleCaptcha_ReloadLink" href="#" onclick="sampleCaptcha.ReloadImage(); this.blur(); return false;" title="Change the CAPTCHA code" onfocus="hideAuthor();" style="display: inline-block !important;"> <img class="LBD_ReloadIcon" id="sampleCaptcha_ReloadIcon" src="/botdetectcaptcha?get=ReloadIcon" alt="Change the CAPTCHA code"></a><a id="sampleCaptcha_SoundLink" class="LBD_SoundLink" href="/botdetectcaptcha?get=sound&amp;c=sampleCaptcha&amp;t=1e80a163e16b40fd831556d2adb78fed" onclick="sampleCaptcha.PlaySound(); this.blur(); return false;" title="Speak the CAPTCHA code" onfocus="hideAuthor();"> <img class="LBD_SoundIcon" id="sampleCaptcha_SoundIcon" src="/botdetectcaptcha?get=SoundIcon" alt="Speak the CAPTCHA code"></a>
      <div class="LBD_Placeholder" id="sampleCaptcha_AudioPlaceholder">&nbsp;</div>
    </div>
    <script type="text/javascript" src="/botdetectcaptcha?get=clientScriptInclude"></script>
    <script type="text/javascript">
      //<![CDATA[
      BotDetect.Init('sampleCaptcha', '1e80a163e16b40fd831556d2adb78fed', 'captchaCode', true, true, true, true, 1200, 7200, 0);
      //]]>
    </script>
    <script type="text/javascript">
      //<![CDATA[
      try {
        (function() {
          var bdrsn = document.createElement('script');
          bdrsn.type = 'text/javascript';
          bdrsn.async = true;
          bdrsn.src = document.location.protocol + '//remote.captcha.com/include.js?i=ATABMwExATMBMAJBMhQ_dj8qPz9gPwk_P0U_Rj8_Lz8_Pw';
          var fsn = document.getElementsByTagName('script')[0];
          fsn.parentNode.insertBefore(bdrsn, fsn);
        })();
      } catch (err) {}
      //]]>
    </script>
    <input type="hidden" id="LBD_VCID_sampleCaptcha" name="LBD_VCID_sampleCaptcha" value="1e80a163e16b40fd831556d2adb78fed">
  </div>
  <input type="hidden" value="1" id="LBD_BackWorkaround_sampleCaptcha">
  <div class="validationDiv">
    <input type="hidden" name="loginBotCaptcha" value="">
    <input id="captchaCode" aria-invalid="false" type="text" name="captchaCode" aria-required="true" style="text-transform: uppercase;">
  </div>
  <input type="hidden" name="type" value=""><input type="hidden" name="href" value="/doi/10.1177/00223433211047715"><input type="hidden" name="title"
    value="Tracking the rise of United States foreign military training: IMTAD-USA, a new dataset and research agenda">
  <br>
  <br>
  <input class="blueButton defButton" type="submit" name="submitForm" value="Send" data-item-name="share-email">
</form>

Text Content

WE VALUE YOUR PRIVACY

We and our partners store and/or access information on a device, such as cookies
and process personal data, such as unique identifiers and standard information
sent by a device for personalised ads and content, ad and content measurement,
and audience insights, as well as to develop and improve products.
With your permission we and our partners may use precise geolocation data and
identification through device scanning. You may click to consent to our and our
partners’ processing as described above. Alternatively you may click to refuse
to consent or access more detailed information and change your preferences
before consenting.
Please note that some processing of your personal data may not require your
consent, but you have a right to object to such processing. Your preferences
will apply to this website only. You can change your preferences at any time by
returning to this site or visit our privacy policy.
DECLINE ALLMORE OPTIONSACCEPT ALL

Skip to main content
Intended for healthcare professionals

0 Cart


MENU

 * Search
 * Browse
 * Resources
   * Authors
   * Librarians
   * Editors
   * Societies
   * Reviewers
 * Advanced Search

IN THIS JOURNAL

 * Journal Home
 * Browse Journal
   * Current Issue
   * OnlineFirst
   * Browse by Special Issue
   * All Issues
   * Replication Datasets
   * Free Sample
   * JPR Best Visualization Awards
   * JPR Article of the Year Awards
   * Editors Picks
 * Journal Info
   * Journal Description
   * Aims and Scope
   * Editorial Board
   * Submission Guidelines
   * Abstracting/Indexing
   * Reprints
   * Journal Permissions
   * Subscribe
   * Recommend to Library
   * Advertising & Promotion
 * Stay Connected
   * Email Alerts
   * RSS Feed
   * Feedback / Contact SAGE
 * Submit Paper

Advanced Search
 * Search
 * Browse
 * Resources
   * Authors
   * Librarians
   * Editors
   * Societies
   * Reviewers
 * Advanced Search

0 View Cart
Access Options:
Sign In
Institution
Society


ACCESS OPTIONS

You can be signed in via any or all of the methods shown below at the same time.


MY PROFILE

Sign in here to access free tools such as favourites and alerts, or to access
personal subscriptions

The email address and/or password entered does not match our records, please
check and try again.
Email (required):*
Password (required):*
Forgotten your password?
Remember me


I don't have a profile

Create Profile

I am signed in as:

View My Account

Logout


With my free profile I can:

 * Set up favourite journals and register for email alerts
 * List saved searches
 * Edit account details
 * Activate personal subscriptions and access content


INSTITUTIONAL LOGIN

If you have access to journal content via a university, library or employer,
sign in here

Loading institutional login options...



If you have access to journal content via a university, library or employer,
sign in here

Access through your institution
Add or Change Institution
Recommend to your library

Research off-campus without worrying about access issues. Find out about Lean
Library here

With institutional access I can:

 * View or download all content the institution has subscribed to.


SOCIETY

If you have access to journal via a society or associations, read the
instructions below

Members of _ can log in with their society credentials below




Username (required) Password (required) Society (required) The Int Society for
Research on Emotion American College of Veterinary Pathologists

Login failed. Please check you selected the correct society from the list and
entered the user name and password you use to log in to your society website.


Access to society journal content varies across our titles.

If you have access to a journal via a society or association membership, please
browse to your society journal, select an article to view, and follow the
instructions in this box.

Contact us if you experience any difficulty logging in.

Need Help?

Some society journals require you to create a personal profile, then activate
your society account

Activate my Society Account

I am signed in via:

Institution

my society or association

Logout


With society access I can:

 * View or download all the content the society has access to.

Research off-campus without worrying about access issues. Find out more and
recommend Lean Library.

Need Help? Contact SAGE

Need Help? Contact SAGE
0 Cart




Journal of Peace Research

4.054
Impact Factor
5-Year Impact Factor 5.035
Journal Indexing & Metrics »
 * Journal Home
 * Browse Journal
   * Current Issue
   * OnlineFirst
   * Browse by Special Issue
   * All Issues
   * Replication Datasets
   * Free Sample
   * JPR Best Visualization Awards
   * JPR Article of the Year Awards
   * Editors Picks
 * Journal Info
   * Journal Description
   * Aims and Scope
   * Editorial Board
   * Submission Guidelines
   * Abstracting/Indexing
   * Reprints
   * Journal Permissions
   * Subscribe
   * Recommend to Library
   * Advertising & Promotion
 * Stay Connected
   * Email Alerts
   * RSS Feed
   * Feedback / Contact SAGE
 * Submit Paper

Search
Search all journals Search this journal
Advanced Search




ADD EMAIL ALERTS

close Add Email Alerts Dialog

You are adding the following journals to your email alerts

Journal New Content Announcements Journal of Peace Research

Contents


FULL ARTICLE

Content List

 * Abstract
 * Introduction
 * The IMTAD-USA dataset
 * Comparison with existing data
 * Trends and patterns in US training activities
 * Empirical application: A new perspective on military training and coups
   d’état
 * Discussion and avenues of further research
 * Acknowledgments
 * Notes
 * References

Article Menu

Download PDF
Open EPUB

Did you struggle to get access to this article? This product could help you

Accessing resources off campus can be a challenge. Lean Library can solve it


 * FULL ARTICLE
   
   Content List
   
    * Abstract
    * Introduction
    * The IMTAD-USA dataset
    * Comparison with existing data
    * Trends and patterns in US training activities
    * Empirical application: A new perspective on military training and coups
      d’état
    * Discussion and avenues of further research
    * Acknowledgments
    * Notes
    * References


 * FIGURES & TABLES


 * ARTICLE METRICS


   CITE
   
   
   CITATION TOOLS
   
   
   HOW TO CITE THIS ARTICLE
   
   If you have the appropriate software installed, you can download article
   citation data to the citation manager of your choice. Simply select your
   manager software from the list below and click on download.
   
   How to cite this article Style Select styleAMAAPAChicagoMLAHarvard Copy to
   Clipboard
   Citation copied to clipboard.
   Format Tips on citation download Download Citation
   
   
   Download article citation data for:
   
   --------------------------------------------------------------------------------
   
   Tracking the rise of United States foreign military training: IMTAD-USA, a
   new dataset and research agenda
   Theodore McLauchlin, Lee JM Seymour, and Simon Pierre Boulanger Martel
   Journal of Peace Research 2022 59:2, 286-296
   
   
   --------------------------------------------------------------------------------
   
   
   DOWNLOAD CITATION
   
   If you have the appropriate software installed, you can download article
   citation data to the citation manager of your choice. Simply select your
   manager software from the list below and click on download.
   
   Format RIS (ProCite, Reference Manager)EndNoteBibTeXMedlarsRefWorks Tips on
   citation download Download Citation
   
   
   Download article citation data for:
   
   --------------------------------------------------------------------------------
   
   Tracking the rise of United States foreign military training: IMTAD-USA, a
   new dataset and research agenda
   Theodore McLauchlin, Lee JM Seymour, and Simon Pierre Boulanger Martel
   Journal of Peace Research 2022 59:2, 286-296
   
   
   --------------------------------------------------------------------------------
   
   
   SHARE
   
   
   SHARE
   
    * Social Media
    * Email
    * Share Access
   
   Share this article via social media.
   
   Twitter Facebook LinkedIn WeChat AddThis
   
   
   The e-mail addresses that you supply to use this service will not be used for
   any other purpose without your consent.
   
   
   RECOMMEND TO A FRIEND
   
   Email a link to the following content:
   
   
   
   *Recipient's Email Address:
   
   
   *Your Email:
   
   
   Your Name:
   
   
   *Subject:
   
   
   Send me a copy of this email
   
   
   
   
   Retype the code from the picture:
    
   
   
   
   
   
   Sharing links are not available for this article.
   
   For more information view the SAGE Journals Article Sharing page.
   
   Create a link to share a read only version of this article with your
   colleagues and friends. For more information view the SAGE Journals Sharing
   page.
   
   Please read and accept the terms and conditions and check the box to generate
   a sharing link.
   
   I have read and accept the terms and conditions
   
   
   Copy to clipboard
   Share URL copied to clipboard
   
   
   REQUEST PERMISSIONS
   
   View permissions information for this article
   
    * View


 * RELATED ARTICLES

 * Comments



Explore More

Download PDF
Open EPUB


TRACKING THE RISE OF UNITED STATES FOREIGN MILITARY TRAINING: IMTAD-USA, A NEW
DATASET AND RESEARCH AGENDA



Show all authors
Theodore McLauchlin
Theodore McLauchlin
Department of Political Science, Centre d’études sur la paix et la sécurité
internationale, Université de Montréal
View ORCID profile
See all articles by this author
Search Google Scholar for this author
, Lee JM Seymour
Lee JM Seymour
Department of Political Science, Université de Montréal
See all articles by this author
Search Google Scholar for this author
, Simon Pierre Boulanger Martel
Simon Pierre Boulanger Martel
Department of Political Science, Université de Montréal
View ORCID profile
See all articles by this author
Search Google Scholar for this author

First Published February 20, 2022 Research Article
https://doi.org/10.1177/00223433211047715
https://doi.org/10.1177/00223433211047715

Article information 






ARTICLE INFORMATION

Volume: 59 issue: 2, page(s): 286-296
Article first published online: February 20, 2022; Issue published: March 1,
2022

Theodore McLauchlin
Department of Political Science, Centre d’études sur la paix et la sécurité
internationale, Université de Montréal
Lee JM Seymour
Department of Political Science, Université de Montréal
Simon Pierre Boulanger Martel
Department of Political Science, Université de Montréal

Corresponding Author:

theodore.mclauchlin@umontreal.ca
https://creativecommons.org/licenses/by-nc/4.0/This article is distributed under
the terms of the Creative Commons Attribution-NonCommercial 4.0 License
(https://creativecommons.org/licenses/by-nc/4.0/) which permits non-commercial
use, reproduction and distribution of the work without further permission
provided the original work is attributed as specified on the SAGE and Open
Access pages (https://us.sagepub.com/en-us/nam/open-access-at-sage).


 * Abstract
 * Full Text
 * References
 * PDF
 * 


ABSTRACT

Training other countries’ armed forces is a go-to foreign policy tool for the
United States and other states. A growing literature explores the effects of
military training, but researchers lack detailed data on training activities. To
assess the origins and consequences of military training, as well as changing
patterns over time, this project provides a new, global dataset of US foreign
military training. This article describes the scope of the data along with the
variables collected, coding procedures, and spatial and temporal patterns. We
demonstrate the added value of the data in their much greater coverage of
training activities, showing differences from both existing datasets and
aggregate foreign military aid data. Reanalyzing prior research findings linking
US foreign military training to the risk of coups d’état in recipient states, we
find that this effect is limited to a single US program representing a small
fraction of overall US training activities. The data show comprehensively how
the United States attempts to influence partner military forces in a wide
variety of ways and suggest new avenues of research.

Keywords
aid, coups, military training, security assistance, security cooperation, United
States


INTRODUCTION

Training other countries’ armed forces is an increasingly important foreign
policy tool for the United States and other states. Between 1999 and 2016,
across 34 different programs, the USA trained some 2,395,272 trainees from
virtually every country in the world, peaking at 292,753 in 2008. Iraq and
Afghanistan accounted for over half of these trainees, but even leaving these
two countries aside, the total figure was 971,054, with as many as 78,722
individuals in a single year (2016). The United States spent some $14.8 billion
worldwide on its training efforts and sold training worth another $4.9 billion,
leaving aside the larger expenses of equipping and paying client forces in
countries like Iraq and Afghanistan. The increase in training activities appears
to reflect a concern for state building in a context of transnational security
threats like terrorism, insurgency, and drug trafficking. It also comes as the
USA, in the wake of Afghanistan and Iraq, seeks to limit its own direct costs by
offloading them to local partners. As opposed to other elements of security
assistance, training focuses on human capital. In doing so, in theory it
addresses a critical element of contemporary military power (Talmadge, 2015).
But it impacts not just military capability, but how recipient militaries choose
to use that capacity – a key problem of civil–military relations and governance
(Atkinson, 2006; Savage & Caverley, 2017). By influencing recipient armed
forces’ norms and practices, it aims to improve local partners’ military
capacity while avoiding the dangers of simply sending arms or cash.

To assess the origins and consequences of security assistance, as well as
changing patterns over time, we provide a new, global dataset of US foreign
military training efforts: the International Military Training Activities
Database-USA (IMTAD-USA). This dataset goes beyond existing work by adopting a
global scope and by covering the full array of US training programs, including
key details such as: objectives; activities such as train-and-equip; the
location of training; and characteristics of the forces trained. These
complementary variables allow researchers to go beyond the raw training inputs
to examine specific features that potentially lead to different outcomes. In
other words, IMTAD-USA is a dataset on a key foreign policy tool that has both
comprehensive scope and considerable depth.

These data document a remarkable increase in training over the past two decades,
and efforts directed towards a wider variety of objectives. We trace these
developments and discuss their larger implications, not least the fact that the
expansion over the past two decades suggests a highly general, everyday tool of
international hierarchy. The overall portrait is consistent with the USA seeking
to maintain influence and confront security problems throughout the world while
limiting its commitments by standing up other countries’ armed forces.

Yet training is controversial. We discuss one important debate in reanalyzing
Savage & Caverley’s (2017) finding that training through the International
Military Education & Training (IMET) program increases coup risk. While we
validate this result for IMET specifically, our comprehensive dataset shows that
there is little evidence of an overall relationship between US training and coup
risk. However, the ubiquity of training suggests the potential for worldwide
political impacts and for the broad diffusion of norms. Whether such norm
transmission has in fact occurred, whether training is effective, how the USA
allocates training to partner military forces, why recipient governments enter
such partnerships, and the implications of the scale and bureaucratic complexity
of training activities for accountability, are important questions for future
research.


THE IMTAD-USA DATASET

The dataset covers US foreign military training from 1999 to 2016, building on
the annual Department of Defense and Department of State Foreign Military
Training Report (FMTR), submitted annually to Congress since 1999, covering
worldwide training with the exception of NATO allies, Japan, Australia and New
Zealand (see e.g. US DOS & DOD, 2019).1 The FMTR provides the most comprehensive
information on US training in terms of costs and the number of trainees
(McNerney et al., 2014: 44). We go well beyond the FMTR data, however, relying
on other government documents and secondary sources to supplement missing
information and reconcile discrepancies. Above all, FMTR only covers the
Afghanistan Security Forces Fund (ASFF) as of 2016, and never covers the Iraq
Security Forces Fund (ISFF), but these are the two largest US training
activities by a significant margin. IMTAD-USA includes data for these programs
from a variety of official documents.


DEFINING MILITARY TRAINING

Different government agencies variously refer to training in terms of military
assistance, security assistance, security cooperation, building partner
capacity, and train-and-equip. For the purposes of the FMTR, and thus for our
dataset, military training is defined as:

formal or informal instruction of foreign students in the United States or
overseas by officers or employees of the United States, contract technicians,
contractors (including instruction at civilian institutions), or by
correspondence courses, technical, educational, or information publications and
media of all kinds, training aids, orientation, and military advice to foreign
military units and forces. (1961 Foreign Assistance Act, Section 644(n), 22 USC.
2403(n))




UNIT OF ANALYSIS, CODING PROCEDURE AND VARIABLES

The most disaggregated unit of analysis in the dataset is the
program-country-year: characteristics of US training programs as they operate in
a given country in a given year. Almost all of the 34 programs in the dataset
operate across multiple countries, and most recipient countries have training
activities operating simultaneously through a variety of programs. This most
disaggregated level includes data on the number of trainees and the expense of
training. Where unclassified, we include binary variables for whether particular
types of forces received training, with indicators for armed forces, police,
others, and ‘counterweight’ forces. For the latter, often used to defend
regimes, we link with De Bruin’s (2021) State Security Forces dataset, which
defines counterweights as armed forces under state control but outside the
regular army, deployed with access to the capital city. Finally, this level
includes a variable for the location of training activities, whether in the
United States, the recipient country, or elsewhere.

At the level of the program we coded binary variables for overall program
objectives including military performance, counterterrorism, counternarcotics,
human rights, gender, civil–military relations, democratization, and good
governance. To gather information on program objectives, we consulted program
descriptions in FMTR, Defense Security Cooperation Agency budget estimates, and
program-specific documents, complemented by secondary sources. A sample coding,
as well as a full list of sources, is available in the Online appendix.

IMTAD-USA’s variables permit us to analyze the mechanisms through which training
influences politics and security. Coding program objectives allows for an
explicit measure of US efforts at military norms transmission, for instance.
Whether training occurs in the United States, the recipient country, or a third
country potentially shapes the avenues available for both norms transmission and
the formation of transnational networks. Finally, the nature of forces trained
can shape civil–military relations – favoring coup-proofing forces for example
(De Bruin, 2021).


LIMITATIONS

The FMTR source data have several limitations. First, the reports do not
systematically identify the use of military contractors. Second, FMTR includes
total budgets and trainees for both classified and unclassified activities, but
excludes additional details on classified activities and omits training by the
Central Intelligence Agency. This creates biases. Considerable US assistance
goes under the radar in order to provide plausible deniability for training the
security forces of unsavory regimes, or to limit escalation in adversarial
relationships (McManus & Yarhi-Milo, 2017). IMTAD-USA may therefore omit
training activities in authoritarian states or in strategically sensitive areas.
Analysts using these data may wish to introduce controls for regime type or for
the type of strategic situation in which the United States has an interest in
limiting escalation. These variables would then have to be interpreted as
reflecting, in part at least, an interest in conducting training overtly or
covertly.

Third, training objectives can vary across countries, which we do not capture
with these data. The training objective data were instead uniformly applied to
each country where a specific program was active for a given year. This
simplification is necessary given the large number of countries where the USA
carries out foreign military training activities. Future work could attempt to
disaggregate country-specific training objectives.


COMPARISON WITH EXISTING DATA

With the exception of classified data, and within the limits of sometimes
contradictory and incomplete reporting, our dataset contains as full coverage as
possible of US training activities. Past work has focused on military training
and security assistance in the contexts of specific countries, such as Somalia
(Williams, 2019), Iraq (Biddle, Macdonald & Baker, 2018), or Colombia (Dube &
Naidu, 2015), or region-specific activities such as the School of the Americas
(Gill, 2004; Scharpf, 2020). While these intensive programs merit close
attention, they do not represent the ongoing, networked nature of much foreign
military training and its truly global reach. Other studies comparing global
training efforts have generally focused on single programs, notably IMET
(Atkinson, 2006; Savage & Caverley, 2017) and officer exchanges (Ruby & Gibler,
2010). US training activities, however, go well beyond these programs. Martinez
Machain (2021) and Omelicheva, Carter & Campbell (2017) cover nearly the full
array of programs using the FMTR, but exclude Afghanistan (ASFF) Iraq (ISFF), by
far the two largest programs, and lack IMTAD’s complementary data.

Another data source is the Security Assistance Monitor (SAM), which researchers
have used to explore military aid (Boutton, 2021).2 Covering training and arms
transfers, SAM’s training component also uses FMTR data. However, unlike
IMTAD-USA, SAM includes neither spending related to training alone, nor
complementary information concerning training objectives, locations and types of
recipients. Similarly, Security Force Monitor uses FMTR, digitizing it to
provide raw, uncoded data about individual trainings, including course names and
specific locations.3 However, unlike IMTAD-USA, it does not include spending and
trainees for many classified training activities or training objectives.

Download
Open in new tab
Download in PowerPoint

Figure 1. Total military training activities. Training expenses (millions of
constant 2012 dollars); number of trainees (individuals).



Training correlates with other forms of US assistance but is significantly
distinct. Comparing IMTAD-USA to USAID (2020) data, but excluding Iraq and
Afghanistan, there is a correlation between training expenditures4 and total
economic aid (0.334) and with total military aid (0.290). The correlation is
stronger with major arms transfers (0.498) according to SIPRI (2020). Moreover,
there is a pronounced difference when examining trainees versus expenditures:
the number of trainees correlates at only 0.246 with economic aid, 0.098 with
military aid, and 0.177 with major arms transfers. Other data fail to capture
the scope of training in terms of the number of military personnel who pass
through it. There is, in other words, a key divergence in the types of security
assistance the USA offers in different places and times.


TRENDS AND PATTERNS IN US TRAINING ACTIVITIES

The data reveal important patterns. The first is the expansion of training
activities over the past two decades (Figure 1). This is most obvious in Iraq
and Afghanistan, but the increase is general. Outside these two countries, there
was a threefold rise from an annual average of $305 million in 1999–2001 (about
half in aid, half in sales) to $672 million in 2014–2016, 40% in aid, 60% in
sales (in constant 2012 dollars). There was, however, a real decline in the
2004–2006 period as training ramped up in Iraq and Afghanistan. Training is also
an increasingly

Download
Open in new tab
Download in PowerPoint

Figure 2. Training expenditures as a percentage of total US military aid
expenditures over time

Source: IMTAD (for training expenditures); USAID, 2020 (for total US military
aid expenditures). Training expenditures exclude the Foreign Military Sales
program, which is paid for by the recipient state.


significant share of US military aid over time (Figure 2), though this is
largely accounted for by Afghanistan alone. Thus, while the focus on Iraq and
Afghanistan is justified, training is a much more general policy.



Second, while the geography of US training has changed, the web of training
relationships is truly global (Figure 3). Almost all countries experienced some
US training since 1999. The exceptions, visible in the maps, are problematic
adversaries such as Myanmar, Cuba and North Korea. Others closely track changes
in bilateral relations; for example, note the decline in training in Russia,
Venezuela or Zimbabwe, or the increase in Libya. Focusing on regional patterns,
the Middle East,

Download
Open in new tab
Download in PowerPoint

Figure 3. Geographic scope of US training activities, by nominal expenses

For legibility, we compare two five-year periods. See Online appendix for
additional maps. Countries whose outlines do not appear at all (NATO, Japan,
Australia, New Zealand) do not appear in the dataset because training is not
reported for these recipients in FMTR after 2001. Countries that could have
training reported but did not (e.g. North Korea) are outlined but have a white
fill. Shapefile source: Weidmann, Kuse & Gleditsch (2010).


Latin America and key allies in East Asia have been constant areas of focus. In
contrast, training in other regions fluctuates, with Africa experiencing large
increases with the war on terror.



A related pattern contrasts expenditures with trainees (Figure 4). The
difference is striking in sub-Saharan Africa, a region with modest US spending
relative to the number of trainees. This suggests a focus on building broad
military capacity in the rank and file, with whole units participating in major
exercises, in contrast with an officer focus for other regions. In other words,
training operates differently from place to place.

These regional trends mask the high degree of concentration of training
activities in certain countries – and notably the yawning gap between
Afghanistan, Iraq, and the rest (Tables I and II). Key US allies in the Middle
East figure prominently in spending. The picture changes, however, when
examining the top recipients by number of trainees. Colombia, with extensive
focus under Plan Colombia, is a third

Download
Open in new tab
Download in PowerPoint

Figure 4. Regional distribution of US training over time, excluding Iraq and
Afghanistan for clarity

Training expenses (millions of constant 2012 dollars); number of trainees
(individuals).



Table I. Top ten recipients in training spending, 1999–2016

Table I. Top ten recipients in training spending, 1999–2016

View larger version

Table II. Top 10 recipients in individuals trained, 1999–2016

Table II. Top 10 recipients in individuals trained, 1999–2016

View larger version
outlier beyond Afghanistan and Iraq. Otherwise, this list mirrors the
discrepancy in Figure 4 between spending inputs and trainee outputs. Finally,
the difference between aid and sales unsurprisingly reflects income to a large
degree.



Ultimately, then, training is both broad and deep: it is something the USA does
both globally and in critical cases of counterinsurgency and state building. The
focus on Iraq and Afghanistan should not obscure the ubiquity of US training
activities, and we should be wary of generalizing findings from these
large-scale missions to the wider web of relationships.

Broad geographic scope is matched by administrative complexity. A recent RAND
report refers to the

Download
Open in new tab
Download in PowerPoint

Figure 5. Spending on training programs, by program objective (excluding ASFF
and ISFF), millions of constant 2012 dollars


‘complex patchwork’ of security cooperation since 2001, identifying over 160
different Congressional statutes authorizing security cooperation between the
USA and its foreign partners (Thaler et al., 2016). A recipient will typically
receive training through multiple programs. This diversity in part reflects a
wide array of objectives for training.



However, this administrative complexity has several ramifications. First, US
personnel often stitch together different sources of funding, with myriad
administrative procedures, reporting requirements, deadlines and objectives.
This makes tracing the full extent of activities difficult. Consequently, the
transparency provided by the FMTR is not as useful as it might otherwise be,
with implications for oversight and accountability. Second, it also makes the
administration of programs less effective, augmenting transaction costs and
continuity problems.

We code each program’s objectives under eight broad headings (accounting for how
programs change objectives over time). On average, each program focuses on
between two and three objectives. Figure 5 shows how objectives have changed
over time, with total funding for programs that include each objective.
Importantly, because programs can have multiple objectives, these figures are
not mutually exclusive, and they do not indicate, within a given program, how
much money was spent on specific objectives (e.g. counterterrorism vs.
governance). Figure 5 also excludes ASFF and ISFF, since these outliers throw
off a general assessment of objectives. Military performance was,
unsurprisingly, the most-funded objective. However, most other objectives
increase in prominence over time, with training becoming more multidimensional.

One caveat follows from this administrative complexity. The ways US officials
navigate this system mean potential gaps between what the program says it does
and what it actually does. For example, as hybrid and cyber warfare increased in
prominence, US officers stretched existing counterterrorism programs to cover
security cooperation in this domain, rather than waiting for formal
Congressional authorization (Thaler et al., 2016: 12–16). This suggests inherent
limitations to IMTAD-USA’s coding of objectives: authorizations in Washington
may not match the practical purposes on the ground.


EMPIRICAL APPLICATION: A NEW PERSPECTIVE ON MILITARY TRAINING AND COUPS D’ÉTAT

Underscoring how IMTAD-USA’s more extensive coverage of US training can
significantly alter existing findings, we revisit Savage & Caverley’s (2017)
analysis of the relationship between training and coups. With data on IMET
(1970–2009) and the Counterterrorism Fellowship Program (CTFP) (2002–2009),5 the
authors find that ‘any US FMT [foreign military training] corresponds to a
doubling of the probability of a military-backed coup attempt in the recipient
country’ (Savage & Caverley, 2017: 543). They further speculate that because
IMET focuses on liberal norms of human rights and civilian control, ‘IMET
trainees are therefore the population where we are most likely to see the effect
of norms (i.e. the easy case). If we discover more coups in countries with a
large number of IMET trainees, this relationship will likely be stronger in
less-scrutinized programs with less focus on liberal values’ (2017: 548).
Despite conceding that the focus on IMET is a limitation in their empirical
analysis, they ‘find a robust relationship between US training of foreign
militaries and military-backed coup attempts’, explaining this in terms of the
human capital training vests in the military and the ways this changes the
balance of power between the military and the regime (Savage & Caverley, 2017:
553). Frequent academic and media references to this work also cite it as
indicating that US training provokes coups (e.g. Henke, 2019: 165; Dieng, 2019:
493, Economist, 2019).

By applying IMTAD-USA to this puzzle, we can replicate the findings concerning
IMET and assess whether coup risk generalizes to the full array of programs. We
reanalyze their time-series cross-section logit

Table III. Replication of Savage & Caverley (2017) with IMTAD-USA: US military
training and coups

Table III. Replication of Savage & Caverley (2017) with IMTAD-USA: US military
training and coups

View larger version
models for coup incidence, with the same control variables and statistical
procedures (Table III). It is important to note that the time period is much
shorter in our data since the FMTR reports do not start until 1999, whereas
Savage & Caverley (2017) draw on the Defense Security Cooperation Agency
Historical Facts Book, which provides numbers of trainees and expenditures for
IMET for 1970 onward. However, the first three rows of Table III replicate their
finding about the increased coup risks associated with IMET in recipient
countries for this overlapping 1999–2009 time period, using our IMTAD data.6 Any
differences that emerge are not merely a consequence of different timeframes.



Indeed, there are differences. In extending the analysis to encompass the other
non-sales programs outside of ISFF and ASFF as well (rows 4–6), the result
disappears. IMET represents 30% of expenditures and 13% of trainees when also
leaving aside sales of training (and 14% and 11% when including sales). It is
also unrepresentative of the total; the correlation coefficients between IMET
and non-IMET aid programs are, for expenditures, 0.248; for trainees, 0.227 (and
0.090 and 0.222 when including sales).7 IMET is focused on junior and senior
officers, unlike programs training rank-and-file soldiers. But we also find a
null result when examining the Regional Centers for Security Studies (RCSS)
(rows 7–9), a ‘most similar’ comparison. This program, like IMET, focuses on
officers and seeks explicitly to cultivate leaders and develop US military
networks abroad, and should therefore impact civil–military relations via
similar mechanisms. Conversely, it differs from IMET insofar as RCSS focuses on
senior rather than junior officers and conducts seminars and short courses on
broad strategic issues, while IMET supports a much wider variety of activities.
In sum, IMTAD-USA’s comprehensive coverage suggests that while Savage & Caverley
are correct to point to the dangers of IMET, their hypothesis that this effect
is likely to be even stronger in other programs appears unsupported – at least
for those programs for which we have publicly-available data.


DISCUSSION AND AVENUES OF FURTHER RESEARCH

Beyond implications for existing research, IMTAD-USA opens up new lines of
inquiry. First, the scale of the phenomenon suggests a transmission belt for
ideas and capabilities that shape US power and global security. The US military
is the most important agent in diffusing a particular global ‘military culture’
shaping norms and ideas (Farrell, 2005) and technologies of counter-rebellion
(Kalyvas & Balcells, 2010). What are the consequences of transmitting particular
forms of knowledge with specific objectives (Savage & Scharpf, 2020)? Does human
rights training, for example, foster compliance? Similar questions concern
civil–military relations, anticorruption efforts, gender training and other
normative objectives. Relatedly, US security assistance shapes the capabilities
of security forces and state institutions. To what extent and how does US
training boost counterterrorism capabilities (Bapat, 2011), change
counterinsurgency outcomes (Lyall & Wilson, 2009), deter civil war onset
(Cunningham, 2016), or impact post-conflict conditions (Sullivan, Blanken &
Rice, 2020)? Recent case-study work is almost unanimously negative in assessing
the effectiveness of large-scale training missions, past (Ladwig, 2017; Karlin,
2018) and present (Biddle, Macdonald & Baker, 2018; Reno, 2018; Jowell, 2018;
Matisek, 2018). But we know little about the impacts of smaller-scale,
routinized activities outside the context of active insurgency. The dataset can
provide both a macro-level take on these questions and guide case selection for
micro-level analysis. Research could, in particular, apply these data to other
dependent variables, such as repression (Sullivan, Blanken & Rice, 2020) and
instability (Boutton, 2021).

A second avenue of research concerns the ways training manifests security
hierarchy. The global reach of security and economic hierarchies controlled by
the United States is, as Lake observes, ‘the most striking fact about the
pattern of authority in the modern world system’ (2009: 82). Do training
relationships reinforce a US-centric military system? Do they increase US
influence and access to recipient states (Blankenship & Miles Joyce, 2020;
Martinez Machain, 2021)? Do they impact how the USA mobilizes military
coalitions (Henke, 2019)? Training, after all, is a way of creating military
power (Brooks & Stanley, 2007) and signaling support for recipients (McManus &
Yarhi-Milo, 2017). In light of the enormous expense of maintaining US military
presence in Iraq and Afghanistan, training relationships represent an attempt to
outsource hegemony and square commitments with capabilities.

This raises a third set of questions about whether training accomplishes this
objective. Do partners do what the USA wants them to do? Does training help to
contain security challenges at lower expense than direct intervention? And does
it do so with fewer agency problems than other forms of security cooperation,
such as financing and arms transfers (Sullivan, Tessman & Li, 2011)? As
researchers disaggregate forms of external support in civil war (Sawyer,
Cunningham & Reed, 2017; Sullivan & Karreth, 2019), how does knowledge- and
human-centric training compare with material security assistance (e.g. McNerny
et al., 2014)? Training may be subject to similar principal-agent problems as
other forms of security assistance, with recipients using it for their own ends
(Byman, 2006; Ladwig, 2017; Savage & Caverley, 2017; Biddle, Macdonald & Baker,
2018). In addition, as the Vietnam, Iraq and Afghanistan cases illustrate,
training can sometimes express waning US commitment, sending a perverse signal
that the USA cannot be relied upon in the long term.

Fourth, we know little about the foreign military training of other states and
organizations. Despite increased Russian and Chinese activity, we know little
about their training and how it impacts alignments, access and influence. Much
training occurs in multilateral contexts, most notably through NATO in
Afghanistan, with the European Union and African Union also playing important
roles. Divergent providers of training may lead to divergent outcomes, even when
the trainers are allies. Grewal (2019), for example, has found that Tunisian
officers differ in their attitudes about civil–military relations depending on
whether they trained in the United States or in France. The USA frequently works
through private military companies whose role merits further research, as do
regional powers such as Turkey and the Gulf states who are actively training
partners in places like Somalia and Libya.

Fifth, the attractiveness of ‘working by, with, and through’ local partners
suggests that US foreign military training is likely to continue. But why do
some countries rather than others receive training, why does the USA work with
particular units in partner states, and why does training takes particular
forms? How well do past security relationships, common threats, cost
sensitivity, and concerns for democracy and human rights explain who gets
training, in what domains, and how much? Conversely: Why and how do governments
choose to partner with the USA (Scharpf, 2020), or designate particular units to
receive training?

Finally, there are important questions about accountability and democratic
control against the backdrop of a liberal international order under intense
pressure. The deaths of four US Special Forces trainers and five of their
Nigerien counterparts in an ambush in Niger in October 2017, or the Trump
administration’s politicization of security assistance to Ukraine, represent
important controversies. How does training influence democracy and
civil–military relations in the USA? By compiling data on US training and making
it publicly available, we hope to further research into the normative
implications of security assistance.

Replication data
The dataset and Online appendix, including the codebook, can be found at
http://www.prio.no/jpr/datasets/.


ACKNOWLEDGMENTS

Sincere thanks to Marianne Bergeron, Ines Butler, Laurie Chartrand, Emmanuel
Méthot-Jean, Raphaël Scarborough, and Ludwine Tchatat. We kindly thank
participants at the Workshop on Foreign Military Training Activities and the
Inter-University Seminar on Armed Forces and Society for advice and feedback.

Funding
This research was supported by the Social Sciences and Humanities Research
Council of Canada, with a supplement from the Department of National Defence,
Canada (award no. 435-2017-0726).

ORCID iDs
Theodore McLauchlin https://orcid.org/0000-0003-3759-2241

Simon Pierre Boulanger Martel https://orcid.org/0000-0002-4612-6069


NOTES

1
FMTR includes NATO allies in 1999 and 2000, and Japan, Australia and New Zealand
from 1999 to 2001. For the sake of comparability, we exclude these countries for
the entire period.

2
Available at http://securityassistance.org.

3
Available at https://trainingdata.securityforcemonitor.org.

4
Correlations with aid figures exclude sales of training, to improve
comparability; correlations with arms transfers include them.

5
Savage & Caverley (2017) only analyze CTFP as a robustness check and only when
pooled with IMET, rather than separately. Therefore, we do not analyze its
relationship to coups here.

6
There are differences between the figures for IMET from IMTAD’s source and from
Savage & Caverley’s source; the correlation between the two is 0.926 for
expenditures and 0.798 for the number of students. There is no obvious pattern
to the difference; see the Online appendix for more detail. The results are
substantially the same using their data.

7
All analyses and correlations exclude the Afghanistan and Iraq Security Forces
Funds (ASFF and ISFF, respectively) since these are very large outliers focusing
on just two countries.


REFERENCES

Atkinson, Carol (2006) Constructivist implications of material power: Military
engagement and the socialization of states, 1972–2000. International Studies
Quarterly 50(3): 509–537.
Google Scholar | Crossref | ISI

--------------------------------------------------------------------------------

Bapat, Navin A (2011) Transnational terrorism, US military aid, and the
incentive to misrepresent. Journal of Peace Research 48(3): 303–318.
Google Scholar | SAGE Journals | ISI

--------------------------------------------------------------------------------

Biddle, Stephen, Macdonald, Julia, Baker, Ryan (2018) Small footprint, small
payoff: The military effectiveness of security force assistance. Journal of
Strategic Studies 41(1–2): 89–142.
Google Scholar | Crossref

--------------------------------------------------------------------------------

Blankenship, Brian, Miles Joyce, Renanah (2020) Purchasing power: US overseas
defense spending and military statecraft. Journal of Conflict Resolution
64(2–3): 545–573.
Google Scholar | SAGE Journals | ISI

--------------------------------------------------------------------------------

Boutton, Andrew (2021) Military aid, regime vulnerability, and the escalation of
political violence. British Journal of Political Science 51(2): 507–525.
Google Scholar | Crossref

--------------------------------------------------------------------------------

Brooks, Risa, Stanley, Elizabeth (2007) Creating Military Power. Stanford, CA:
Stanford University Press.
Google Scholar

--------------------------------------------------------------------------------

Byman, Daniel (2006) Friends like these: Counterinsurgency and the war on
terrorism. International Security 31(2): 79–115.
Google Scholar | Crossref | ISI

--------------------------------------------------------------------------------

Cunningham, David (2016) Preventing civil war: How the potential for
international intervention can deter conflict onset. World Politics 68(2):
307–340.
Google Scholar | Crossref

--------------------------------------------------------------------------------

De Bruin, Erica (2021) Mapping coercive institutions: The state security forces
dataset, 1960–2010. Journal of Peace Research 58(2): 315–325.
Google Scholar | SAGE Journals | ISI

--------------------------------------------------------------------------------

Dieng, Moda (2019) The multi-national joint task force and the G5 Sahel Joint
Force: The limits of military capacity-building efforts. Contemporary Security
Policy 40(4): 481–501.
Google Scholar | Crossref

--------------------------------------------------------------------------------

Dube, Oeindrila, Naidu, Suresh (2015) Bases, bullets, and ballots: The effect of
US military aid on political conflict in Colombia. Journal of Politics 77(1):
249–267.
Google Scholar | Crossref | ISI

--------------------------------------------------------------------------------

Economist (2019) Friendly fire: A shooting puts the spotlight on military
training for allies. The Economist 12 December
(https://www.economist.com/united-states/2019/12/12/a-shooting-puts-the-spotlight-on-military-training-for-allies).
Google Scholar

--------------------------------------------------------------------------------

Farrell, Theo (2005) World culture and military power. Security Studies 14(3):
448–488.
Google Scholar | Crossref | ISI

--------------------------------------------------------------------------------

Gill, Lesley (2004) The School of the Americas: Military Training and Political
Violence in the Americas. Durham, NC: Duke University Press.
Google Scholar | Crossref

--------------------------------------------------------------------------------

Grewal, Sharan (2019) Military defection during localized protests: The case of
Tataouine. International Studies Quarterly 63(2): 259–269.
Google Scholar | Crossref

--------------------------------------------------------------------------------

Henke, Marina E (2019) Constructing Allied Cooperation: Diplomacy, Payments and
Power in Multilateral Military Coalitions. Ithaca, NY: Cornell University Press.
Google Scholar

--------------------------------------------------------------------------------

Jowell, Marco (2018) The unintended consequences of foreign military assistance
in Africa: An analysis of peacekeeping training in Kenya. Journal of Eastern
African Studies 12(1): 102–119.
Google Scholar | Crossref

--------------------------------------------------------------------------------

Kalyvas, Stathis, Balcells, Laia (2010) International system and technologies of
rebellion: How the end of the Cold War shaped internal conflict. American
Political Science Review 104(3): 415–429.
Google Scholar | Crossref | ISI

--------------------------------------------------------------------------------

Karlin, Mara (2018) Building Militaries in Fragile States: Challenges for the
United States. Philadelphia, PA: University of Pennsylvania Press.
Google Scholar | Crossref

--------------------------------------------------------------------------------

Ladwig III, Walter C (2017) The Forgotten Front: Patron–Client Relationships in
Counterinsurgency. Cambridge: Cambridge University Press.
Google Scholar | Crossref

--------------------------------------------------------------------------------

Lake, David (2009) Hierarchy in International Relations. Ithaca, NY: Cornell
University Press.
Google Scholar

--------------------------------------------------------------------------------

Lyall, Jason, Wilson, Isaiah (2009) Rage against the machines: Explaining
outcomes in counterinsurgency wars. International Organization 63(1): 67–106.
Google Scholar | Crossref | ISI

--------------------------------------------------------------------------------

Martinez Machain, Carla (2021) Exporting influence: US military training as soft
power. Journal of Conflict Resolution 65(3): 313–341.
Google Scholar | SAGE Journals

--------------------------------------------------------------------------------

Matisek, Jahara (2018) The crisis of American military assistance: Strategic
dithering and Fabergé Egg armies. Defense & Security Analysis 34(3): 267–290.
Google Scholar | Crossref

--------------------------------------------------------------------------------

McManus, Roseanne, Yarhi-Milo, Keren (2017) The logic of “offstage” signaling:
Domestic politics, regime type, and major power-protégé relations. International
Organization 71(4): 701–733.
Google Scholar | Crossref

--------------------------------------------------------------------------------

McNerney, Michael, O’Mahony, Angela, Szayna, Thomas S, Eaton, Derek, Baxter,
Caroline, Clarke, Colin P, Cutrufello, Emma, McGee, Michael, Peterson, Heather,
Payne, Leslie Adrienne, Trenkov-Wermuth, Calin (2014) Assessing Security
Cooperation as a Preventive Tool. Santa Monica, CA: RAND.
Google Scholar

--------------------------------------------------------------------------------

Omelicheva, Mariya, Carter, Brittnee, Campbell, Luke B (2017) Military aid and
human rights: Assessing the impact of US security assistance programs. Political
Science Quarterly 132(1): 119–145.
Google Scholar | Crossref

--------------------------------------------------------------------------------

Reno, William (2018) The politics of security assistance in the horn of Africa.
Defence Studies 18(4): 498–513.
Google Scholar | Crossref

--------------------------------------------------------------------------------

Ruby, Tomislav Z, Gibler, Douglas (2010) US professional military education and
democratization abroad. European Journal of International Relations 16(3):
339–364.
Google Scholar | SAGE Journals | ISI

--------------------------------------------------------------------------------

Savage, Jesse Dillon, Caverley, Jonathan D (2017) When human capital threatens
the Capitol: Foreign aid in the form of military training and coups. Journal of
Peace Research 54(4): 542–557.
Google Scholar | SAGE Journals | ISI

--------------------------------------------------------------------------------

Savage, Jesse Dillon, Scharpf, Adam (2020) Security assistance and political
militarization. Working paper, Trinity College Dublin.
Google Scholar

--------------------------------------------------------------------------------

Sawyer, Katherine, Cunningham, Kathleen Gallagher, Reed, William (2017) The role
of external support in civil war termination. Journal of Conflict Resolution
61(6): 1174–1202.
Google Scholar | SAGE Journals | ISI

--------------------------------------------------------------------------------

Scharpf, Adam (2020) Why governments have their troops trained abroad: Evidence
from Latin America. International Studies Quarterly 64(3): 734–747.
Google Scholar | Crossref

--------------------------------------------------------------------------------

SIPRI – Stockholm International Peace Research Institute (2020) SIPRI arms
transfers database (https://www.sipri.org/databases/armstransfers).
Google Scholar

--------------------------------------------------------------------------------

Sullivan, Patricia, Karreth, Johannes (2019) Strategies and tactics in armed
conflict: How governments and foreign interveners respond to insurgent threats.
Journal of Conflict Resolution 63(9): 2207–2232.
Google Scholar | SAGE Journals | ISI

--------------------------------------------------------------------------------

Sullivan, Patricia, Blanken, Leo, Rice, Ian (2020) Arming the peace: Foreign
security assistance and human rights conditions in post-conflict countries.
Defence and Peace Economics 31(2): 177–200.
Google Scholar | Crossref

--------------------------------------------------------------------------------

Sullivan, Patricia L, Tessman, Brock F, Li, Xiaojun (2011) US military aid and
recipient state cooperation. Foreign Policy Analysis 7(3): 275–294.
Google Scholar | Crossref | ISI

--------------------------------------------------------------------------------

Talmadge, Caitlin (2015) The Dictator’s Army: Battlefield Effectiveness in
Authoritarian Regimes. Ithaca, NY: Cornell University Press.
Google Scholar | Crossref

--------------------------------------------------------------------------------

Thaler, David, McNerney, Michael J, Grill, Beth, Marquis, Jefferson P, Kadlec,
Amanda (2016) From Patchwork to Framework: A Review of Title 10 Authorities for
Security Cooperation. Santa Monica, CA: RAND Corporation.
Google Scholar | Crossref

--------------------------------------------------------------------------------

USAID – United States Agency for International Development (2020) Foreign aid
explorer (https://explorer.usaid.gov/data).
Google Scholar

--------------------------------------------------------------------------------

US DOS & DOD – United States Department of Defense & Department of State (2019)
Foreign military training report, fiscal years 2018 and 2019
(https://www.state.gov/wp-content/uploads/2019/12/FMT_Volume-I_FY2018_2019.pdf).
Google Scholar

--------------------------------------------------------------------------------

Weidmann, Nils B, Kuse, Doreen, Gleditsch, Kristian Skrede (2010) The geography
of the international system: The CShapes dataset. International Interactions
36(1): 86–106.
Google Scholar | Crossref | ISI

--------------------------------------------------------------------------------

Williams, Paul (2019) Fighting for Peace in Somalia: A History and Analysis of
the African Union Mission (AMISOM), 2007–2017. Oxford: Oxford University Press.
Google Scholar



THEODORE McLAUCHLIN, b. 1983, PhD in Political Science (McGill University,
Montréal, 2013); Associate Professor at the Université de Montréal (2013– );
research focuses on civil war and military affairs. Most recent book: Desertion
(Cornell, 2020).

LEE JM SEYMOUR, b. 1977, PhD in Political Science (Northwestern University,
Evanston, 2008); Associate Professor at the Université de Montréal (2015– );
research focuses on civil war and political violence.

SIMON PIERRE BOULANGER MARTEL, b. 1989, MSS in Peace and Conflict Studies
(Uppsala University, 2014); PhD Candidate in Political Science at the Université
de Montréal (2019– ); research focuses on civil war and armed groups.


View Abstract

ARTICLE AVAILABLE IN:

Vol 59, Issue 2, 2022



RELATED ARTICLES

Similar Articles:

SIMILAR ARTICLES:

View all >

--------------------------------------------------------------------------------

When human capital threatens the Capitol: Foreign aid in the form of military
training and coups
Jesse Dillon Savage and more...
Journal of Peace Research
Jul 2017
Show details Hide details

--------------------------------------------------------------------------------

National Interests and US Foreign Aid: The Carter and Reagan Years
James H. Lebovic
Journal of Peace Research
Jun 1988
Show details Hide details

--------------------------------------------------------------------------------

Military Dependency: Thailand and the Philippines
Bjorn Hagelin
Journal of Peace Research
Dec 1988
Show details Hide details

--------------------------------------------------------------------------------

full-text

ARTICLES CITING THIS ONE: 0


full-text


articlebookdataexternal-linkinfo-round
SAGE Recommends
Close
Sort byRelevanceDate
What is this? 
Scroll to top
 * Fetching related content...

Scroll to bottom




ALSO FROM SAGE PUBLISHING

 * CQ Press Library American political resources opens in new tab
 * Data Planet A universe of data opens in new tab
 * Lean Library Increase the visibility of your library opens in new tab
 * SAGE Business Cases Real-world cases at your fingertips opens in new tab
 * SAGE Campus Online skills and methods courses opens in new tab
 * SAGE Knowledge The ultimate social science library opens in new tab
 * SAGE Research Methods The ultimate methods library opens in new tab
 * SAGE Video Streaming video collections opens in new tab


SAGE JOURNALS

About
Privacy Policy
Terms of Use
Contact Us
Help
Historical Content
Accessibility



BROWSE

Health Sciences
Life Sciences
Materials Science & Engineering
Social Sciences & Humanities
Journals A-Z
Discipline Hubs



RESOURCES

Authors
Editors
Reviewers
Librarians
Researchers
Societies



OPPORTUNITIES

Advertising
Reprints
Content Sponsorships
Permissions
Microsites
Advertising Disclaimer



JOURNAL OF PEACE RESEARCH

ISSN: 0022-3433
Online ISSN: 1460-3578

Copyright © 2022 by Peace Research Institute Oslo




Top