> >*** Someone will "game" the system, for > >example, to move forward a technical proposal by telling > >each group that "the other group wants this". > > One solution to this one might be to close the loop: if a WG is going to > act on a claim that the ITU wants such-and-so, then the WG chair checks > with the ITU (somehow...). And vice versa, of course. But, as we've established, it's hard to "check with the ITU" when the liaisons are the ones playing the game; and folks with an agenda are the ones most likely to volunteer for such roles. Just as with protocol security, you can design all of the feedback you want, but there may need to be some kind of "intrusion detection" to decide if you're being hacked.