It seems that some disclosures of classified information can lead a person to poverty, ignominy and a jail sentence, while others provide a royal road to fame and fortune. Some leaks are relentlessly investigated, while others are tolerated or encouraged.
This apparent inconsistency, as notably illustrated once again in the phenomenon of author Bob Woodward, was examined by Michael Isikoff in “‘Double standard’ in White House leak inquiries?”, NBC News, October 18.
In the wake of an earlier Woodward book in 2007, Rep. Henry Waxman noted a similar discrepancy in the Bush Administration’s response to leaks.
“The administration seems to be inconsistent in their approach in these cases, and it’s troubling,” Rep. Waxman said at a March 16, 2007 hearing. “They raise very serious questions about whether White House policies on sensitive information are driven by political considerations. If it’s a critic [who discloses classified information] they are going to investigate, they’re going to really stop it. When it comes to people in-house, people they like, people they trust, well, the investigation hasn’t even started with regard to those people.”
While it seems that the current political climate may not incentivize the use of evidence-based data sources for decision making, those of us who are passionate about ensuring results for the American people will continue to firmly stand on the belief that learning agendas are a crucial component to successfully navigate a changing future.
In recent months, we’ve seen much of these decades’ worth of progress erased. Contracts for evaluations of government programs were canceled, FFRDCs have been forced to lay off staff, and federal advisory committees have been disbanded.
This report outlines a framework relying on “Cooperative Technical Means” for effective arms control verification based on remote sensing, avoiding on-site inspections but maintaining a level of transparency that allows for immediate detection of changes in nuclear posture or a significant build-up above agreed limits.
At a recent workshop, we explored the nature of trust in specific government functions, the risk and implications of breaking trust in those systems, and how we’d known we were getting close to specific trust breaking points.