Inhofe Says There’s Not Enough Support to Override a Veto on Iran Sanctions

J. Scott Applewhite/AP

AA Font size + Print

President Obama says he will veto any measure to slap new sanctions on Iran. He may have just gotten his way. By Sara Sorcher

President Obama used his State of the Union address Tuesday to threaten a veto of any congressional plan to slap Iran with new sanctions, and he just might have gotten his way.

The top Republican on the Senate Armed Services Committee thinks Obama is “naive” to believe the U.S. is having any “great success” in persuading Iran to curb parts of its nuclear program—but he is not optimistic there’s enough momentum in the Senate, all told, to ram through new sanctions against the wishes of the president.

[Obama] said last night he would veto any [new sanctions],” Sen. Jim Inhofe said in an interview. “The question is, is there support to override a veto on that? I say, ‘No.’ ”

The Nuclear Weapon Free Iran Act, authored by two senators, Illinois Republican Mark Kirk and New Jersey Democrat Robert Menendez, has 59 cosponsors, and includes measures to punish Iran’s oil industry if it breaches diplomatic commitments. Inhofe does not believe a vote now would result in the majority necessary to override a presidential veto, because enough Democrats would still side with their president.

Even some of the Senate bill’s Democratic cosponsors, including Joe Manchin of West Virginia and Christopher Coons of Delaware, have also backed away from the sanctions bill since Obama’s speech, The Hill reported.

(Read more Defense One coverage of Iran here)

In his address Tuesday night, Obama defended the interim deal, which he said “has halted the progress of Iran’s nuclear program—and rolled parts of that program back—for the very first time in a decade.” Iran has started eliminating its stockpile of higher levels of enriched uranium, Obama said, and is no longer installing advanced centrifuges. If diplomacy fails, then all options—presumably even military force—remain on the table, Obama promised. “I will be the first to call for more sanctions, and stand ready to exercise all options to make sure Iran does not build a nuclear weapon.”

Inhofe, though, isn’t buying it. New Iranian President Hassan Rouhani is not to be trusted; inspections won’t be enough, he said. “They,” Inhofe said, referring to the Obama administration, “seem to think, for some reason, that this new president is a president they can talk to, and negotiate with…. This guy, I don’t think we can trust him more than anybody else, [even former President Mahmoud] Ahmadinejad.”

Even though the momentum may be slipping, Inhofe said, Democrats loyal to Obama are quickly becoming “endangered species.” So if talks between world powers and Iran fall apart, or new revelations emerge that Iran is breaking its diplomatic commitments, it’s possible the political winds could shift.

For now, though, Obama may be in the clear.

Close [ x ] More from DefenseOne
 
 

Thank you for subscribing to newsletters from DefenseOne.com.
We think these reports might interest you:

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • GBC Issue Brief: Supply Chain Insecurity

    Federal organizations rely on state-of-the-art IT tools and systems to deliver services efficiently and effectively, and it takes a vast ecosystem of organizations, individuals, information, and resources to successfully deliver these products. This issue brief discusses the current threats to the vulnerable supply chain - and how agencies can prevent these threats to produce a more secure IT supply chain process.

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Information Operations: Retaking the High Ground

    Today's threats are fluent in rapidly evolving areas of the Internet, especially social media. Learn how military organizations can secure an advantage in this developing arena.

    Download

When you download a report, your information may be shared with the underwriters of that document.