Report finds ambassador caused 'dysfunction' at embassy in Luxembourg

What makes a president turn his back on one of his biggest donors and allow her to resign from a plum diplomatic post she was offered in return for her generosity?

According to a State Department report on outgoing Luxembourg Ambassador Cynthia Stroum, an "abusive management style" and the purchase of $3,400 in wine and liquor using embassy funds, for starters.

Stroum -- who has donated tens of thousands of dollars to Democrats and bundled more than $500,000 for Obama's 2008 campaign -- spent just over a year in her post as ambassador before abruptly resigning effective January 31. According to reports in the Luxembourg media, she wanted to spend more time with her family and on her business in Seattle. She was nominated to the post in September 2009 as a reward for her financial prowess during the campaign, and was sworn in that December.

A report released Thursday by the State Department Office of Inspector General found her behavior to have left the embassy in a "state of dysfunction."

"Morale among Americans and local staff is very low, and stress levels are high. Most employees describe the Ambassador as aggressive, bullying, hostile, and intimidating, which has resulted in an extremely difficult, unhappy, and uncertain work environment," the report said.

Things were so bad, according to the report, that most of the senior staff in the embassy either curtailed their stays or volunteered for service in Afghanistan and Iraq.

And in order to use up funding before it expired at the end of fiscal 2010, the embassy reportedly bulk purchased $3,400 in wine and liquor on September 29, which is strictly forbidden because it was not a bona fide need for the fiscal year.

In a search for temporary housing while the ambassador's residence was undergoing renovation, a procurement/housing employee was forced to screen 200 residences and visit 30-40 houses and apartments in Luxembourg with the help of two staff members from the U.S. embassy in Brussels. "The end-of-year procurements consumed virtually all of the procurement/housing employee's time as well as that of the management officer," the report said.

And as a result of "internal problems" like these, the embassy now "plays no significant role in policy advocacy or reporting, though developments in Luxembourg are certainly of interest to Washington clients and other U.S. missions in the NATO and EU communities," the report said.

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
FROM OUR SPONSORS
JOIN THE DISCUSSION
Close [ x ] More from GovExec
 
 

Thank you for subscribing to newsletters from GovExec.com.
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download
  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download

When you download a report, your information may be shared with the underwriters of that document.