Don’t Let American Allies Go Nuclear

President Trump is moving quickly to push U.S. allies to invest even more in their own defense. NATO allies have already committed to spend 3% of their GDP on defense, yet the U.S. is now calling for them to spend at least 5%. It is likely that U.S. allies in East Asia will soon face similar calls to do more. Greater investments in conventional capabilities make a lot of sense. However, there are some U.S. policy experts, officials and academics calling for more U.S. allies to go nuclear to reduce U.S. defense requirements. These calls are dangerously misguided and ignore the threat any proliferation – including by U.S. allies – poses to American security interests. They must be rejected wholesale by the Trump Administration.  

One of the most enduring successes of U.S. national security policy has been its effort to limit the number of states with nuclear weapons. Predictions that dozens of countries might possess nuclear weapons did not materialize because of concerted U.S. actions. The risks include the reality that U.S. allies can and often do experience internal instability or even regime collapse, that any state with nuclear weapons creates a risk that those materials or knowhow can be stolen or diverted, that any state with nuclear weapon in a crisis might actually use those weapons, and lastly the reality that states with their nuclear weapons are less susceptible open to U.S. influence. There may be reasons why a state may want to go nuclear from their own perspective but there are few if any lasting benefits to American security that comes from proliferation to friends and allies.

Nine countries currently have nuclear weapons, but perhaps 40 additional states are technically advanced enough to build nuclear weapons if they chose to do so. Many of these states are U.S. allies or partners, including in Europe as well as Japan, South Korea, and even the island of Taiwan. That these states never went nuclear (although some tried) is due to a combination of factors, including the credibility of U.S. defense commitments to their security, the pressure America brought to bear when these states indicated a potential interest in building independent nuclear arsenals, and the recognition that if the world was serious about getting rid of all nuclear weapons then their spread was a step in the wrong direction.

The re-election of Donald Trump has understandably spooked many U.S. allies, renewing doubts that America will come to their aid. The growth of China’s military and economic power relative to the United States is adding to these concerns. More allies are asking now, just as they did during the Cold War if America would really risk Boston to protect Berlin, or Seattle to protect Seoul. As this question festers and as America’s relative power over China and other states ebbs, the lure to encourage U.S. friends to develop nuclear weapons of their own to deter or defeat an attack will grow. After all, the theory goes, why should the United States worry if its friends go nuclear?

In the real world, however, the spread of nuclear weapons anywhere complicates and undermines U.S. security. One reason is states are not always stable. In the 1970s, the U.S. supported its Treaty partner Iran acquiring nuclear reactors and advanced technology but in 1979, that regime was overthrown by the Islamic Revolution. Pakistan went nuclear when the U.S. needed its help fighting the Soviets in Afghanistan, and has faced wave after wave of instability and crisis. And South Korea is a more recent challenge. For the last few decades, South Korea was considered a stable and vibrant democracy – even hosting a Summit for Democracy last year. Under President Yoon, South Korea has voiced increasing interest in an independent nuclear arsenal. And just last year, a former Trump official, Elbridge Colby, expected to serve in a senior policy role at the Pentagon publicly encouraged South Korea to build their own nuclear weapons to deter North Korea and enable the U.S. to focus more on China. The situation in South Korea, with an impeached President and no clear sense of who controls the country’s military, would be a lot more dangerous if Seoul had nuclear weapons. 

This is not just an issue for newer nuclear weapons states. Prior to the Soviet Union’s collapse in 1991, a coup created confusion for days over exactly who had the ability to control Soviet nuclear weapons.  Following the USSR’s demise, nuclear weapons and materials remained at risk of theft and diversion for years and required massive U.S. efforts and investments to prevent their loss. And even the United States is not immune from these risks. The 2021 insurrection raised nuclear risk to the point that the Speaker of the House had to publicly ask the Chairman of the Joint Chiefs about the risk that President Trump might use nuclear weapons in a gambit to remain in power, and Chairman Milley took extraordinary steps to insert himself into the nuclear chain of command to preempt that risk. Any nuclear arsenal anywhere is a potential danger if political circumstances change.

And states with nuclear weapons create a nuclear risk if nuclear technology, materials and knowhow are stolen or diverted. Five of today’s nuclear weapon states – America, Russia, China, France, and Pakistan – have either knowingly or unwittingly helped other states go nuclear.  Even if theft or transfer were not an issue, when new states have gone nuclear in the past, others have followed. America’s nuclear success led the Soviet Union to build them as well. This in turn led the UK and France to follow suit. These four nuclear weapon programs fueled China’s desire to join the club. Beijing having the bomb drove India to do the same, which then led Pakistan to follow suit.  

And any nuclear state might decide one day to use those weapons. Every nuclear leader must get every nuclear decision right, every time or boom. The history of U.S. and Soviet nuclear deterrence is marked as much by nuclear misunderstandings and potential accidents as by stable deterrence. India and Pakistan have the same problem. It is reasonable to assume new nuclear states with nuclear weapons would encounter many of the same risks.

And finally, from a very direct Americentric point of view, each state that acquires their own nuclear weapons lessens the ability of the United States to influence, control or dictate security outcomes in that state and region. While not the message U.S. diplomats use openly when trying to work diplomatically to stop proliferation, the issue of influence is as relevant to U.S. allies as adversaries. To the extent that the U.S. security is enhanced by being able to heavily influence how states around the world act, then enabling the spread of nuclear weapons undermines that ability.

It is and will continue to be tempting for the next Administration to find rapid and easy solutions to long-standing security challenges. Empowering U.S. allies to do more so Washington can do and spend less, or focus more effectively on fewer challenges is an understandable policy outcome. But enabling, or looking the other way at the spread of nuclear weapons is not in America’s interests anymore today than it was in the 20th century.  

Energy Dominance (Already) Starts at the DOE

Earlier this week, the Senate confirmed Chris Wright as the Secretary of Energy, ushering in a new era of the Department of Energy (DOE). In his opening statement before Congress, Wright laid out his vision for the DOE under his leadership—to unleash American energy and restore “energy dominance”, lead the world in innovation by accelerating the work of the National Labs, and remove barriers to building energy projects domestically. Prior to Wright’s nomination, there have already been a range of proposals circulating for how, exactly, to do this.

Of these, a Trump FERC commissioner calls for the reorganization – a complete overhaul – of the DOE as-is. This proposed reorganization would eliminate DOE’s Office of Infrastructure, remove all applied energy programs, strip commercial technology and deployment funding, and rename the agency to be the Department of Energy Security and Advanced Science (DESAS). 

This proposal would eliminate crucial DOE offices that are accomplishing vital work across the country, and would give the DOE an unrecognizable facelift. Like other facelifts, the effort would be very costly – paid for by the American taxpayer, unnecessary, and a waste of public resources. Further, reorganizing DOE will waste the precious time and money of the Federal government, and mean that DOE’s incoming Secretary, Chris Wright, will be less effective in accomplishing the goals the President campaigned on – energy reliability, energy affordability, and winning the competition with China. The good news for the Trump Administration is that DOE’s existing organization structure is already well-suited and well-organized to pursue its “energy dominance” agenda. 

The Cost of Reorganizing

Since its inception in 1977, the Department of Energy has evolved several times in scope and focus to meet the changing needs of the nation. Each time, there was an intent and purpose behind the reorganization of the agency. For example, during the Clinton Administration, Congress restructured the nuclear weapons program into the semi-autonomous National Nuclear Security Administration (NNSA) to bolster management and oversight. 

More recently, in 2022, another reorganization was driven by the need to administer major new Congressionally-authorized programs and taxpayer funds effectively. With the enactment of the Bipartisan Infrastructure Law (BIL) and the Inflation Reduction Act (IRA), DOE combined existing programs, like the Loan Programs Office, with newly-authorized offices, like the Office of Clean Energy Demonstrations (OCED). This structure allows DOE to hone a new Congressionally-mandated skill set – demonstration and deployment – while not diluting its traditional competency in managing fundamental research and development.

Even when they make sense, reorganizations have their risks, especially in a complex agency like the DOE. Large-scale changes to agencies inherently disrupt operations, threaten a loss of institutional knowledge, impair employee productivity, and create their own legal and bureaucratic complexities. These inherent risks are exacerbated even further with rushed or unwarranted reorganizations.

The financial costs of reorganizing a large Federal agency alone can be staggering. Lost productivity alone is estimated in the millions, as employees and leadership divert time and focus from mission-critical projects to logistical changes, including union negotiations. These efforts often drag on longer than anticipated, especially when determining how to split responsibilities and reassign personnel. Studies have shown that large-scale reorganizations within government agencies often fail to deliver promised efficiencies, instead introducing unforeseen costs and delays. 

These disruptions would be compounded by the impacts an unnecessary reorganization would have on billions of dollars in existing DOE projects already driving economic growth, particularly in rural and often Republican-led districts, which depend on the DOE’s stability to maintain these investments. Given the high stakes, policymakers have consistently recognized the importance of a stable DOE framework to achieve the nation’s energy goals. The bipartisan passage of the 2020 Energy Act in the Senate reflects a shared understanding that DOE needs a well-equipped demonstration and deployment team to advance energy security and achieve American energy dominance. 

DOE’s Existing Structure is Already Optimized to Pursue the Energy Dominance Agenda

In President Trump’s second campaign for office, he ran on a platform of setting up the U.S. to compete with China, to improve energy affordability and reliability for Americans, and to address the strain of rising electricity demand on the grid by using artificial intelligence (AI). DOE’s existing organization structure is already optimized to pursue President Trump’s ‘energy dominance’ agenda, most of which being implemented in Republican-represented districts. 

Competition with China

As mentioned above, in response to the 2021 Bipartisan Infrastructure Law (BIL), DOE created several new offices, including the Manufacturing and Energy Supply Chains Office (MESC) and the Office of Clean Energy Demonstrations (OCED). Both of these offices are positioning the U.S. to compete with China by focusing on strengthening domestic manufacturing, supply chains, and workforce development for critical energy technologies right here at home. 

MESC is spearheading efforts to establish a secure battery manufacturing supply chain within the U.S. In September 2024, the Office announced plans to deliver over $3 billion in investments to more than 25 battery projects across 14 states. The portfolio of selected projects, once fully contracted, are projected to support over 8,000 construction jobs and over 4,000 operating jobs domestically. These projects encompass essential critical mineral processing, battery production, and recycling efforts. By investing in domestic battery infrastructure, the program reduces reliance on foreign sources, particularly China, and enhances the U.S.’s ability to compete and lead on a global scale. 

In passing BIL, Congress understood that to compete with China, R&D alone is not sufficient. The United States needs to be building large-scale demonstrations of the newest energy technologies domestically. OCED is ensuring that these technologies, and their supply chains, reach commercial scale in the U.S. to directly benefit American industry and energy consumers. OCED catalyzes private capital by sharing the financial risk of early-stage technologies which speeds up domestic innovation and counters China’s heavy state-backed funding model. In 2024 alone, OCED awarded 91 projects, in 42 U.S. states, to over 160 prize winners. By supporting first-of-a-kind or next-generation projects, OCED de-risks emerging technologies for private sector adoption, enabling quicker commercialization and global competitiveness. With additional or existing funding, OCED could create next-generation geothermal and/or advanced nuclear programs that could help unlock the hundreds of gigawatts of potential domestic energy from each technology area. 

Energy Affordability and Reliability

Another BIL-authorized DOE office, the Grid Deployment Office (GDO), is playing a crucial role in improving energy affordability and reliability for Americans through targeted investments to modernize the nation’s power grid. GDO manages billions of dollars in funding under the BIL to improve grid resilience against wildfires, extreme weather, cyberattacks, and other disruptions. Programs like the Grid Resilience and Innovation Partnerships (GRIP) Program aim to enhance the reliability of the grid by supporting state-of-the-art grid infrastructure upgrades and developing new solutions to prevent outages and speed up restoration times in high-risk areas. The U.S. is in dire need of new transmission to keep costs low and maintain reliability for consumers. GDO is addressing the financial, regulatory, and technical barriers that are standing in the way of building vital transmission infrastructure.  

The Office of State and Community Energy Programs (SCEP), also part of the Office of Infrastructure, supports energy projects that help upgrade local government and residential infrastructure and lower household energy costs. Investments from BIL and IRA funding have already been distributed to states and communities, and SCEP is working to ensure that this taxpayer money is used as effectively as possible. For example, SCEP administers the Weatherization Assistance Program (WAP), which helps Americans in all 50 states improve energy efficiency by funding upgrades like insulation, window replacements, and modern heating systems. This program typically saves households $283 or more per year on energy costs.

Addressing Load Growth by Using AI

The DOE’s newest office, the Office of Critical and Emerging Tech (CET), leads the Department’s work on emerging areas important to national security like biotechnology, quantum, microelectronics, and artificial intelligence (AI). In April, CET partnered with several of DOE’s National Labs to produce an AI for Energy report. This report outlines DOE’s ongoing activities and the near-term potential to “safely and ethically implement AI to enable a secure, resilient power grid and drive energy innovation across the economy, while providing a skilled AI-ready energy workforce.” 

In addition to co-authoring this publication, CET partners with national labs to deploy AI-powered predictive analytics and simulation tools for addressing long-term load growth.

By deploying AI to enhance forecasting, manage grid performance, and integrate innovative energy technologies, CET ensures that the U.S. can handle our increasing energy demands while advancing grid reliability and resiliency.

The Path Forward 

DOE is already very well set up to pursue an energy dominance agenda for America. There’s simply no need to waste time conducting a large-scale agency reorganization. 

In a January 2024 Letter from the CEO, Chris Wright discusses his “straightforward business philosophy” for leading a high-functioning company. As a leader, he strives to “Hire great people and treat them like adults…” which makes Liberty Energy, his company, “successful in attracting and retaining exceptional people who together truly shine.” Secretary Wright knows how to run a successful business. He knows the “secret sauce” lies in employee satisfaction and retention. 

To apply this approach in his new role, Wright should resist tinkering with DOE’s structure, and instead, give employees a vision, and get off to the races of achieving the American energy dominance agenda without wasting time, the public’s money, and morale. Instead of redirecting resources to reorganizations, the DOE’s ample resources and existing program infrastructure should be harnessed to pursue initiatives that bolster the nation’s energy resilience and cut costs. Effective governance demands thoughtful consideration and long-term strategic alignment rather than hasty or superficial reorganizations.

Trump Jr: “Declassify Everything!!!”

On November 8 Donald J. Trump Jr., the President’s oldest son, tweeted: “DECLASSIFY EVERYTHING!!!” adding “We can’t let the bad actors get away with it.”

This was not an actual policy proposal and it was not seriously intended for classification officials or even for Trump’s own father, who as President is the one ultimately responsible for classification policy.

Rather, it was directed at Trump Jr.’s 6.4 million Twitter followers, telling them that classification is a corrupt process that protects “bad actors” and that must therefore be discredited and dismantled. It’s a juvenile notion but not, given the size and malleability of Trump’s audience, an inconsequential one.

To the extent that national security classification is in fact required, for example, to protect advanced military technologies, the conduct of diplomacy or the collection of intelligence, it is important to establish and maintain the legitimacy of classification policy. For the same reason, abuse of classification authority can itself be a threat to national security.

The current executive order on classification policy (sect. 1.7a(1)) directs that “in no case shall information be classified . . . in order to conceal violations of law.”

But this is merely a limitation on the classifier’s mental state — which is unverifiable — and not on classification itself. It is entirely permissible for classified information to conceal violations of law, according to a judicial interpretation of the executive order, as long as the information is not classified with that specific purpose (“in order to”) in mind. This is a standard that has never been enforced and that is probably unenforceable.

So one step that the incoming Biden Administration could take to enhance the integrity and accountability of classification policy would be to direct that classification may not conceal violations of US law at all, whether or not that is the intent of classifying. (It is probably necessary to specify “US” law since classified intelligence collection may often involve the violation of foreign laws.)

Donald Trump is the first president since George H.W. Bush who made no formal changes to the executive order on classification policy.

Instead, Trump often defied or disregarded existing classification and declassification policies, withholding previously public information (e.g. the number of nuclear warheads dismantled each year) and disclosing normally classified information (e.g. an actual application for counterintelligence surveillance) when it advanced his political interests to do so.

But it seems that arbitrary secrecy combined with selective declassification is not the way to stop “bad actors.”

Personal Debt and National Security

Last June the Department of Defense denied an application for security clearance for access to classified information because the applicant had “delinquent debts totaling about $24,000.”

In May, a defense contractor was denied a security clearance based on delinquent debts totaling $87,517.

In fact, excessive personal debt is among the most commonly cited reasons for denying or revoking access to classified information.

The rationale for linking personal financial behavior with national security is spelled out in the National Security Adjudicative Guidelines for Determining Eligibility for Access to Classified Information that are published in Security Executive Agent Directive 4 (Guideline F: Financial Considerations):

“Failure to live within one’s means, satisfy debts, and meet financial obligations may indicate poor self-control, lack of judgment, or unwillingness to abide by rules and regulations, all of which can raise questions about an individual’s reliability, trustworthiness, and ability to protect classified or sensitive information. . . . An individual who is financially overextended is at greater risk of having to engage in illegal or otherwise questionable acts to generate funds. Affluence that cannot be explained by known sources of income is also a security concern insofar as it may result from criminal activity, including espionage.”

“Conditions that could raise a security concern and may be disqualifying include:
(a) inability to satisfy debts;
(b) unwillingness to satisfy debts regardless of the ability to do so;
(c) a history of not meeting financial obligations;
(d) deceptive or illegal financial practices such as embezzlement, employee theft, check fraud, expense account fraud, mortgage fraud, filing deceptive loan statements and other intentional financial breaches of trust;
(e) consistent spending beyond one’s means or frivolous or irresponsible spending, which may be indicated by excessive indebtedness, significant negative cash flow, a history of late payments or of non-payment, or other negative financial indicators;” and so on.

See the entire Guideline F in Security Executive Agent Directive 4.

The subject arises, of course, because of reporting from the New York Times that President Trump has personal debt totaling hundreds of millions of dollars.

The concern is not so much the blatant unfairness of the dual standard by which thousands of individuals are denied a clearance for a minuscule fraction of the financial irresponsibility displayed by the President.

The problem is that the entire apparatus of security clearances is being mooted and undermined by the President who controls it. It does little good to try to ensure the integrity of each individual member of the massive defense and intelligence bureaucracies if their chief executive is himself potentially vulnerable to overwhelming financial pressure.

According to the latest government quarterly report on security clearance policy, around 2.3 million cleared individuals (out of perhaps 4 million or so) are now subject to “continuous evaluation” to promptly detect financial irregularities or other activity of security concern.

In the new fiscal year, the Defense Counterintelligence and Security Agency says it will “expand the number of individuals covered by continuous high-value checks, including providing alert management and real-time threat analysis and reporting, for the national security sensitive population.” The President is not among the covered individuals.

White House Rebuffs Declassification, Disclosure Requirements

Congress adopted numerous new disclosure and reporting requirements in the government spending bill that was signed into law last week. But the Trump White House said that many of them encroach on executive authority and that they may not be implemented as written.

Several provisions of the FY2020 Consolidated Appropriations Act “purport to mandate or regulate the submission of certain executive branch information to the Congress or the public, including by mandating the declassification of certain information,” the White House said in a December 20 signing statement.

“My Administration will treat these provisions consistent with the President’s constitutional authority to control the disclosure of information that could impair foreign relations, national security, law enforcement, the deliberative processes of the executive branch, or the performance of the President’s constitutional duties,” the statement said.

Among the provisions that the White House specifically objected to was a requirement to declassify information regarding Saudi government assistance to Saudi nationals in the U.S. suspected of committing crimes (HR 1865, Sect. 902). That provision, introduced by Sen. Ron Wyden, had passed the Senate by voice vote and was incorporated in the final legislation (with an added exemption for intelligence sources and methods). Now it is unclear whether it will be acted upon at all.

The Trump White House expressed criticism not only of declassification and other public disclosure requirements. It also took exception to dozens of provisions that involve sharing information with Congress, even on a classified basis.

Thus, a provision in the FY2020 defense authorization act (S. 1790, section 1650) directs the President to allow congressional defense committees to review (but not retain) classified National Security Presidential Memorandums on DoD operations in cyberspace. After being read at a secure facility, the classified documents are to be collected and returned to the President, the legislation stated.

No, said the White House.

This and other provisions on sharing of information “purport to mandate or regulate the dissemination of information that may be protected by executive privilege, including by interfering with Presidential control of the process for making a determination that information is protected,” according to another December 20 signing statement.

“My Administration will treat these provisions consistent with the President’s constitutional authority to control information, the disclosure of which could impair national security, foreign relations, law enforcement, or the performance of the President’s constitutional duties.”

The obvious defect in the White House posture is that Congress has constitutional duties of its own. Many of these duties require congressional access to information that is in the possession of the executive branch. Congress must fund (or decline to fund) the national security operations of the government. It alone possesses the authority to declare war. It has a duty to perform oversight. Importantly, it also has tools at its disposal to compel disclosure of the information it needs.

While the latest White House signing statements convey a rhetorical sense of defiance, they do not by themselves defy or modify the law. But neither do they do anything to advance a resolution of the competing interests at stake.

The significance of signing statements was considered in a 2012 report by the Congressional Research Service. See Presidential Signing Statements: Constitutional and Institutional Implications, January 4, 2012.

White House Issues a “National” Science & Tech Agenda

A new White House budget memo presents science and technology as a distinctly American-led enterprise in which U.S. dominance is to be maintained and reinforced. The document is silent on the possibility or the necessity of international scientific cooperation.

“The five R&D budgetary priorities in this memorandum ensure that America remains at the forefront of scientific progress, national and economic security, and personal wellbeing, while continuing to serve as the standard-bearer for today’s emerging technologies and Industries of the Future,” wrote Acting OMB Director Russell T. Vought and White House science advisor Dr. Kelvin K. Droegemeier in the August 30 memo.

The document, which is intended to inform executive branch budget planning for fiscal year 2021, contains no acknowledgment that many scientific challenges are global in scope, that foreign countries lead the U.S. in some areas of science and technology, or that the U.S. could actually benefit from international collaboration.

*    *    *

The White House memo begins by designating the entire post-World War II period until now as America’s “First Bold Era in S&T [Science & Technology].” It goes on to proclaim that the “Second Bold Era in S&T” has now begun under President Trump.

“The Trump Administration continues to prioritize the technologies that power Industries of the Future (IotF),” the memo declares.

Many of the proposed technology priorities are already in progress — including artificial intelligence, robotics, and gene therapy. Some are controversial or disputed — such as the purported need to invest in protection against electromagnetic pulse attacks.

Meanwhile, the memo takes pains to avoid even mentioning the term “climate change,” which is disfavored by this White House. Instead, it speaks of “Earth system predictability” and “knowing the extent to which components of the Earth system are practically predictable.”

Today’s Second Bold Era is “characterized by unprecedented knowledge, access to data and computing resources, ubiquitous and instant communication,” and so on. “Unfortunately, this Second Bold Era also features new and extraordinary threats which must be confronted thoughtfully and effectively.”

The White House guidance suggests vaguely that the Second Bold Era could require a recalibration of secrecy policy in science and technology. “[Success] will depend upon striking a balance between the openness of our research ecosystem and the protection of our ideas and research outcomes.”

This may or may not augur a change in the longstanding policy of openness in basic research that was formally adopted in President Reagan’s 1985 National Security Decision Directive 189. That directive stated that “It is the policy of this Administration that, to the maximum extent possible, the products of fundamental research remain unrestricted.”

*    *    *

The context for the concern about protecting U.S. ideas and research outcomes is an assessment that U.S. intellectual property is being aggressively targeted and illicitly acquired by China, among other countries.

“China has expansive efforts in place to acquire U.S. technology to include sensitive trade secrets and proprietary information,” according to a 2018 report from the National Counterintelligence and Security Center. “Chinese companies and individuals often acquire U.S. technology for commercial and scientific purposes.”

Perceived Chinese theft of U.S. intellectual property is one of the factors that led to imposition of U.S. tariffs on Chinese imports. See U.S.-China Relations, Congressional Research Service, August 29, 2019.

*    *    *

At an August 30 briefing on artificial intelligence in the Department of Defense, Air Force Lt. General Jack Shanahan discussed the need to protect military data in the context of AI.

But unlike the new White House memo, Gen. Shanahan recognized the need for international cooperation even (or especially) in national security matters:

“We’re very interested in actively engaging a number of international partners,” he said, “because if you envision a future of which the United States is employing A.I. in its military capabilities and other nations are not, what does that future look like? Does the commander trust one and not the other?”

By analogy, however, the same need for international collaboration arises in many other areas of science and technology which cannot be effectively addressed solely on a national basis, from mitigating climate change to combating disease. In such cases, everyone needs to be “at the forefront” together.

*    *    *

One way to bolster U.S. scientific and intellectual leadership that the White House memo does not contemplate is to encourage foreign students at American universities to remain in this country. Too often, they are discouraged from doing so, wrote Columbia University Lee C. Bollinger in the Washington Post.

“Many of these international scholars, especially in the fields of science, technology, engineering and mathematics, would, if permitted, prefer to remain in the United States and work for U.S.-based companies after graduation, where they could also contribute to the United States’ economic growth and prosperity. But under the present rules, when their academic studies are completed, we make it difficult for them to stay. They return to their countries with the extraordinary knowledge they acquired here, which can inform future commercial strategies deployed against U.S. competitors,” Bollinger wrote on August 30.

*    *    *

As for the Trump Administration’s pending FY2020 budget request for research and development, it does not convey much in the way of boldness (or Boldness).

“Under the President’s FY2020 budget request, most federal agencies would see their R&D funding decline. The primary exception is the Department of Defense,” according to the Congressional Research Service.

“The President’s FY2020 budget request would reduce funding for basic research by $1.5 billion (4.0%), applied research by $4.3 billion (10.5%), and facilities and equipment by $0.5 billion (12.8%), while increasing funding for development by $4.5 billion (8.3%).” See Federal Research and Development (R&D) Funding: FY2020, updated August 13, 2019.

Election Interference Emergency Order Nets No Culprits

Last September, President Trump issued an executive order declaring a national emergency “to deal with the threat of foreign interference in United States elections.” Executive Order 13848 authorized sanctions against foreign individuals and entities determined to have engaged in election interference.

Six months later, no such individuals or entities have been identified.

“No entities or individuals have been designated pursuant to E.O. 13848,” according to the first semi-annual report on the national emergency issued by the Secretary of the Treasury. As a result, no sanctions were imposed and no civil penalties were assessed. (However, approximately $310,000 was spent to implement the executive order, “most of which represent wage and salary costs for federal personnel.”)

See Periodic Report on the National Emergency With Respect to the Threat of Foreign Interference in United States Elections, September 12, 2018 through March 5, 2019, Department of the Treasury, which was released this week under the Freedom of Information Act.

In a classified report earlier this year, the Departments of Justice and Homeland Security said they found no evidence that a foreign government or foreign agent had a material impact on the integrity or security of the 2018 midterm elections.

Trump Says DoD IG Reports Should Be “Private”

The recurring dispute over the appropriate degree of secrecy in the Department of Defense arose in a new form last week when President Trump said that certain audits and investigations that are performed by the DoD Inspector General should no longer be made public.

“We’re fighting wars, and they’re doing reports and releasing it to the public? Now, the public means the enemy,” the President said at a January 2 cabinet meeting. “The enemy reads those reports; they study every line of it. Those reports should be private reports. Let him do a report, but they should be private reports and be locked up.”

It is not clear what the President had in mind. Did he have reason to think that US military operations had been damaged by publication of Inspector General reports? Was he now directing the Secretary of Defense to classify such reports, regardless of their specific contents? Was he suggesting the need for a new exemption from the Freedom of Information Act to prevent their disclosure?

Or was this simply an expression of presidential pique with no practical consequence? Thus far, there has been no sign of any change to DoD publication policy in response to the President’s remarks.

Meanwhile, Rep. Adam Smith, the incoming chairman of the House Armed Services Committee, reiterated his view to the contrary that the Pentagon needs to be more forthcoming with information, not less.

“As Chairman, I will work with my colleagues to promote transparency and Congressional oversight, enhance military readiness, combat inefficiency and waste at DOD, advance green technology in defense and address the threat climate change poses to our national security, fight for an inclusive military, and move towards a responsible approach to nuclear weapons,” he said on January 4. (And, he wrote earlier, “Constant misinformation from the president is a real problem in a democratic society.”)

There are indications that some Pentagon officials may be receptive to Chairman Smith’s concerns.

After reporters complained about the growing use of “For Official Use Only” markings to restrict access to information, Under Secretary of Defense (acquisition and sustainment) Ellen Lord responded that “I understand the need, the requirement” for transparency, “and I will put out guidance to make everything open to the public to the degree we can.” See “Pentagon’s Chief Weapons Buyer Promises Less Secrecy in Reports” by Anthony Capaccio, Bloomberg, January 4.

While secrecy in the Department of Defense has increased noticeably in the Trump Administration, the Pentagon remains an astonishingly prolific publisher of military information, issuing dozens or hundreds of directives, manuals, reports and other publications each day. Most are the product of routine bureaucratic churning, and are of little if any significance, but some have broader interest or appeal. Here are a few that caught our eye.

Techniques for Visual Information Operations, ATP 6-02.40, US Army, January 3, 2019

Military Diving Operations: Multi-Service Tactics, Techniques, and Procedures, ATP 3-34.84, January 2, 2019

DoD support to non-contiguous States and territories in response to disasters, threats, and emergencies, report to Congress, n.d. (Nov. 2018)

The U.S. Army in Multi-Domain Operations 2028, TRADOC Pamphlet 525-3-1, 6 December 2018

DoD Scientific and Technical Information Program (STIP), DoD Instruction 3200.12, August 22, 2013, Incorporating Change 3, Effective December 17, 2018

The latter document directs that “DoD will maximize the free flow of scientific and engineering information developed by or for DoD to the public.”

Some “Acting” Officials Will Soon Lose Authority

Some government officials who are serving on an “acting” basis because a permanent replacement has not yet been named will lose their ability to function this month when their legal authority is nullified under the terms of the Vacancies Act.

In the Trump Administration there are hundreds of government agency positions requiring Senate confirmation that have gone unfilled. In many cases, their responsibilities have been assumed by “acting” officials.

But by law, that arrangement can only be temporary. The Federal Vacancies Reform Act of 1998 specifies that “acting” officers can fill positions requiring confirmation for no more than 210 days. If the position is vacant at the start of a new Administration, an extension of 90 days is allowed, for a total of 300 days.

The 300 day period from Inauguration Day last January 20 will end on November 16, 2017. After that, certain acting officials will no longer be able to carry out their duties.

“If the acting officer remains in office and attempts to perform a nondelegable function or duty — one that a statute or regulation expressly assigns to that office — that action will ‘have no force or effect’,” according to a new brief from the Congressional Research Service.

See Out of Office: Vacancies, Acting Officers, and Day 301, CRS Legal Sidebar, November 1, 2017. See also The Vacancies Act: A Legal Overview, October 30, 2017.

President Trump does not appear to be concerned about the matter. Asked about high level vacancies in the State Department last week, he told Laura Ingraham of Fox that most of the government positions awaiting confirmed nominees were superfluous. “I’m the only one that matters,” he said.

Can the President Pardon Himself?

The Congressional Research Service has prepared a summary overview of the presidential pardon power, addressing various legal questions such as: “whether the President can issue ‘prospective’ pardons; whether the President can pardon himself; and the extent to which Congress can regulate or respond to the exercise of the President’s pardon authority.”

So can the President pardon himself?

“The Framers did not debate this question at the Convention, and it unclear whether they considered whether the pardon power could be applied in this manner. No President has attempted to pardon himself. . . Accordingly, this is an unsettled constitutional question, unlikely to be resolved unless a President acts to pardon himself for a criminal offense.”

See Presidential Pardons: Frequently Asked Questions (FAQs)CRS Legal Sidebar, August 28, 2017.

Other new and updated reports from the Congressional Research Service include the following:

Allowances and Office Staff for Former Presidents, FY2016-FY2018 AppropriationsCRS Insight, August 28, 2017

Transport Agencies Withdraw Proposed Sleep Apnea RulesCRS Insight, August 24, 2017

Kurds in Iraq Propose Controversial Referendum on IndependenceCRS Insight, August 25, 2017

China’s Economic Rise: History, Trends, Challenges, and Implications for the United States, updated August 26, 2017

China-U.S. Trade Issues, updated August 26, 2017

Trump Budget Would Reduce Most Federal R&D

The Trump Administration budget request would cut federal spending on research and development in every major agency except for the Department of Defense and Veterans Affairs, the Congressional Research Service said yesterday in a new report.

“Nearly every federal agency would see its R&D funding decrease under the President’s FY2018 request compared to their FY2016 levels,” the CRS report said.

“The largest declines (as measured in dollars) would occur in the budgets of HHS (down $6.099 billion, 18.9%), DOE (down $1.809 billion, 11.9%), USDA (down $666 million, 25.1%), NSF (down $639 million, 10.6%), and the EPA (down $239 million, 46.3%).”

Federal R&D is generally understood to provide support for scientific, medical, military and other research of economic, social, security or other value that would not normally be undertaken by the private sector. Reducing R&D therefore means foregoing the benefits that might otherwise accrue from such investment.

CRS noted that the Trump budget request is “largely silent” on funding for existing multiagency R&D initiatives such as the National Nanotechnology Initiative, Networking and Information Technology Research and Development program, U.S. Global Change Research Program, Brain Research through Advancing Innovative Neurotechnologies (BRAIN) initiative, Precision Medicine Initiative, Cancer Moonshot, Materials Genome Initiative, National Robotics Initiative, and National Network for Manufacturing Innovation. The future of these programs, some of which have a statutory basis, is left uncertain in the Administration budget request.

However, the budget request is the first word, not the last word, in the budgeting process.

“Congress may opt to agree with none, part, or all of the request, and it may express different priorities through the appropriations process,” CRS said. “In particular, Congress will play a central role in determining the allocation of the federal R&D investment in a period of intense pressure on discretionary spending.”

See Federal Research and Development Funding: FY2018, July 31, 2017.

Other new or updated reports from the Congressional Research Service include the following.

Bail: An Overview of Federal Criminal Law, updated July 31, 2017

The Federal Communications Commission: Current Structure and Its Role in the Changing Telecommunications Landscape, updated July 28, 2017

Ongoing Section 232 Steel and Aluminum InvestigationsCRS Insight, July 28, 2017

In Brief: Highlights of FY2018 Defense Appropriations Actions, July 31, 2017

NAFTA and Motor Vehicle Trade, July 28, 2017

Rwanda’s August 4 Presidential ElectionCRS Insight, July 31, 2017

Honduras: Background and U.S. Relations, updated July 28, 2017

U.S. Petroleum Trade with Venezuela: Financial and Economic Considerations Associated with Possible SanctionsCRS Insight, July 27, 2017

Afghanistan: Post-Taliban Governance, Security, and U.S. Policy, updated July 24, 2017

Legality of Presidential Disclosures, Continued

“There is no basis” for suggesting that President Trump’s disclosure of classified intelligence to Russian officials was illegal, wrote Morton Halperin this week.

To the contrary, “senior U.S. government officials in conversations with foreign officials decide on a daily basis to provide them with information that is properly classified and that will remain classified,” wrote Halperin, who is himself a former senior official.

“We should not let our desire to confront President Trump lead us to espouse positions that violate his rights and that would constrain future presidents in inappropriate ways.” See “Trump’s Disclosure Did Not Break the Law” by Morton H. Halperin, Just Security, May 23, 2017.

But constraints on presidential disclosure were on the minds of Rep. Stephanie Murphy (D-FL) and 17 House colleagues. They introduced legislation on May 24 “that would require the President to notify the intelligence committees when a U.S. official, including the President, intentionally or inadvertently discloses top-secret information to a nation that sponsors terrorism or, like Russia, is subject to U.S. sanctions.”

Yesterday, Rep. Dutch Ruppersberger (D-MD) introduced a bill “to ensure that a mitigation process and protocols are in place in the case of a disclosure of classified information by the President.”

Rep. Mike Thompson (D-CA) and five colleagues introduced a resolution “disapproving of the irresponsible actions and negligence of President Trump which may have caused grave harm to United States national security.”

For related background, see The Protection of Classified Information: The Legal Framework, Congressional Research Service, updated May 18, 2017, and Criminal Prohibitions on Leaks and Other Disclosures of Classified Defense Information, Congressional Research Service, updated March 7, 2017.