Secrecy Is in the Air

On buckshot and other matters where silence has been less than golden.

The press always has complained about the Bush administration's penchant for secrecy. So when Vice President Cheney and the White House press office delayed nearly a day before letting on about what Arlo Guthrie might have called the Great South Texas Birdshot Massacree, reporters, editorialists and comedians were loaded for bear.

Dick Cheney's felling of a 6-foot hunting companion who got in the way of a 6-inch quail on the wing was a hot story. The vice president wheeled while sighting on that quail and peppered 78-year-old lawyer Harry Whittington with 28-gauge birdshot from about 30 yards. Whittington survived the pellets and consequent heart problems, but is destined to carry Cheney's load for the rest of his life. He would leave the hospital "with most of the pellets in him," the attending doctor said, putting the number at six to 200.

Cheney thus broke a record for vice presidential shootings that had lasted for more than two centuries-one set on July 11, 1804, by Aaron Burr, who needed just one shot from his .56-caliber dueling pistol to kill Alexander Hamilton. Burr was indicted for murder in New York, but wasn't prosecuted. Cheney apparently will escape indictment, but he has received a warning from Texas wildlife authorities for failing to have an upland hunting stamp-and has mailed his $7 to obtain one for future use.

Might we hope that Whittington will file suit? Under the precedent set in the Supreme Court's Clinton v. Jones case, our elected leaders cannot escape the reach of the law. Depositions might reveal much about Cheney's state of mind on matters of guns and war and such, useful information for historians deconstructing the course of events in this administration.

Of course, Duck! (as one wag called him) Cheney's penalty is the ignominy that he's engendered. David Letterman, for example: "Good news! We have finally located weapons of mass destruction. It's Dick Cheney! Here is the sad part-before the trip, Donald Rumsfeld had denied the guy's request for body armor . . . We can't get bin Laden, but we nailed a 78-year-old attorney."

Scott McClellan, the president's press secretary, took a heap of abuse from the White House press corps about the delay before news of the shooting got out. So did the Veep-who, said The New York Times, "appears to have behaved like a teenager who thinks that if he keeps quiet about the wreck, no one will notice that the car is missing its right door."

Indeed, secrecy and censorship are in the air. Here we read that NASA's top climate scientist was told he couldn't speak or write publicly without prior approval (which he declined to obtain). Then we learn that NASA's censor (who later "resigned") also ordered an agency official to add the word "theory" at every mention of the Big Bang. Veteran Congressional Research Service official Louis Fisher was taken to the woodshed for telling Government Executive's Chris Strohm that Congress has deferred too much as the Bush administration has punished whistleblowers and suppressed information.

Perhaps we should send all these blabbermouths for indoctrination by you-know-who at his undisclosed location.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Sponsored by One Identity

    One Nation Under Guard: Securing User Identities Across State and Local Government

    In 2016, the government can expect even more sophisticated threats on the horizon, making it all the more imperative that agencies enforce proper identity and access management (IAM) practices. In order to better measure the current state of IAM at the state and local level, Government Business Council (GBC) conducted an in-depth research study of state and local employees.

  • Sponsored by Aquilent

    The Next Federal Evolution of Cloud

    This GBC report explains the evolution of cloud computing in federal government, and provides an outlook for the future of the cloud in government IT.

  • Sponsored by LTC Partners, administrators of the Federal Long Term Care Insurance Program

    Approaching the Brink of Federal Retirement

    Approximately 10,000 baby boomers are reaching retirement age per day, and a growing number of federal employees are preparing themselves for the next chapter of their lives. Learn how to tackle the challenges that today's workforce faces in laying the groundwork for a smooth and secure retirement.

  • Sponsored by Hewlett Packard Enterprise

    Cyber Defense 101: Arming the Next Generation of Government Employees

    Read this issue brief to learn about the sector's most potent challenges in the new cyber landscape and how government organizations are building a robust, threat-aware infrastructure

  • Sponsored by Aquilent

    GBC Issue Brief: Cultivating Digital Services in the Federal Landscape

    Read this GBC issue brief to learn more about the current state of digital services in the government, and how key players are pushing enhancements towards a user-centric approach.


When you download a report, your information may be shared with the underwriters of that document.