*** Someone will "game" the system, for
example, to move forward a technical proposal by telling
each group that "the other group wants this".
One solution to this one might be to close the loop: if a WG is going
act on a claim that the ITU wants such-and-so, then the WG chair
with the ITU (somehow...). And vice versa, of course.
But, as we've established, it's hard to "check with the ITU"
when the liaisons are the ones playing the game; and folks with
an agenda are the ones most likely to volunteer for such roles.
Just as with protocol security, you can design all of the
feedback you want, but there may need to be some kind of "intrusion
detection" to decide if you're being hacked.