SlideShare a Scribd company logo
InterAgency Cooperation


    Daniel W. Sutherland
Why?


• Cross-cutting

• “InterAgency” is the future
•   Legislative/lobbying
•   Public Affairs/comms
•   Law
•   Intel
•   Navy
•   Army
•   Vampire hunting
•   Intel
•   Ops
•   Military
•   Political
•   Public Affairs/comms
•   Multi-national
•   Diplomatic
•   Intel
•   Multi-national
•   Military
•   Transportation/logistics
• Gun Violence

• Immigration

• Economic Issues
Elements of InterAgency Cooperation
• Understanding the Culture(s) of the I/A
• Understanding How Various Components of the
  I/A Approach Strategy Development
• Understanding How Various Components of the
  I/A Approach Intelligence
• Understanding Technology and the I/A
• Understanding Third Parties and the I/A
• Understanding Evaluation/Assessments and the
  I/A
Foundations
Definitions           Models
• InterAgency         • Global, National, Local
                      • CT
• Cooperation         • Law Enforcement
                      • Emergency
                        Preparedness/Response
                      • Border Security
                      • Cyber
“One issue that demands particular attention in the
contemporary security environment is how best to
apply whole-of-government approaches to complex
national missions, ranging from combating terrorism
and trafficking in persons to securing cyberspace. These
and many other twenty-first-century security
challenges require an agile and integrated response[.]”



  Daniel Langberg, “Organizational Innovations in Counterterrorism,”
  Homeland Security Affairs, Vol. VI, No. 3 (Sept. 2010)

More Related Content

What's hot

Natioanal Security Challenges and provision of Civil Engineering Infrastructures
Natioanal Security Challenges and provision of Civil Engineering InfrastructuresNatioanal Security Challenges and provision of Civil Engineering Infrastructures
Natioanal Security Challenges and provision of Civil Engineering Infrastructures
Ezekiel Adelere Adeniran
 
Mobile privacy in Zambia
Mobile privacy in ZambiaMobile privacy in Zambia
Mobile privacy in Zambia
Francesca Kabaso
 
Brett Solomon: Transparency - the new norm
Brett Solomon: Transparency - the new normBrett Solomon: Transparency - the new norm
Brett Solomon: Transparency - the new norm
Global Utmaning
 
Digital access
Digital accessDigital access
Digital access
DMFANE02
 
Digital Tech, New Media, and the Internet in Nonviolent Struggle
Digital Tech, New Media, and the Internet in Nonviolent StruggleDigital Tech, New Media, and the Internet in Nonviolent Struggle
Digital Tech, New Media, and the Internet in Nonviolent Struggle
daryncambridge
 
10 tactics press release
10 tactics press release10 tactics press release
10 tactics press release
ict4devwg
 
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
APNIC
 
Privacy In Emerging Technology
Privacy In Emerging TechnologyPrivacy In Emerging Technology
Privacy In Emerging Technology
orrenprunckun
 

What's hot (8)

Natioanal Security Challenges and provision of Civil Engineering Infrastructures
Natioanal Security Challenges and provision of Civil Engineering InfrastructuresNatioanal Security Challenges and provision of Civil Engineering Infrastructures
Natioanal Security Challenges and provision of Civil Engineering Infrastructures
 
Mobile privacy in Zambia
Mobile privacy in ZambiaMobile privacy in Zambia
Mobile privacy in Zambia
 
Brett Solomon: Transparency - the new norm
Brett Solomon: Transparency - the new normBrett Solomon: Transparency - the new norm
Brett Solomon: Transparency - the new norm
 
Digital access
Digital accessDigital access
Digital access
 
Digital Tech, New Media, and the Internet in Nonviolent Struggle
Digital Tech, New Media, and the Internet in Nonviolent StruggleDigital Tech, New Media, and the Internet in Nonviolent Struggle
Digital Tech, New Media, and the Internet in Nonviolent Struggle
 
10 tactics press release
10 tactics press release10 tactics press release
10 tactics press release
 
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
2nd ICANN APAC-TWNIC Engagement Forum: Internet Governance: Trends and Opport...
 
Privacy In Emerging Technology
Privacy In Emerging TechnologyPrivacy In Emerging Technology
Privacy In Emerging Technology
 

Viewers also liked

Inter agency
Inter agencyInter agency
Inter agency
Owabor Emmanuel
 
Multi agency working
Multi agency workingMulti agency working
Multi agency working
Nathan Loynes
 
Leeds trinity multiagency working and the influence of the eyfs
Leeds trinity  multiagency working and the influence of the eyfsLeeds trinity  multiagency working and the influence of the eyfs
Leeds trinity multiagency working and the influence of the eyfs
Nathan Loynes
 
WMD Countermeasures ::: A Preventative Mission
WMD Countermeasures ::: A Preventative MissionWMD Countermeasures ::: A Preventative Mission
WMD Countermeasures ::: A Preventative Mission
George Washington University College of Professional Studies
 
The tragic case of victoria climbie revised 2011
The tragic case of victoria climbie revised 2011The tragic case of victoria climbie revised 2011
The tragic case of victoria climbie revised 2011
ProCEEd Nottinghamshire's Early Years Consultancy
 
туристическая поездка в украину
туристическая поездка в украинутуристическая поездка в украину
туристическая поездка в украинуSmutkoOlesya
 
USGCRP Education Interagency Working Group
USGCRP Education Interagency Working GroupUSGCRP Education Interagency Working Group
USGCRP Education Interagency Working Group
Aaron Smith
 
Joining Forces: Interagency Collaboration and "Smart Power"
Joining Forces: Interagency Collaboration and "Smart Power"Joining Forces: Interagency Collaboration and "Smart Power"
Joining Forces: Interagency Collaboration and "Smart Power"
Booz Allen Hamilton
 
Power & Politics
Power & PoliticsPower & Politics
Power & Politics
Krishna Kant
 
Professor Mike Nash: Vulnerability and public protection - have we got the ba...
Professor Mike Nash: Vulnerability and public protection - have we got the ba...Professor Mike Nash: Vulnerability and public protection - have we got the ba...
Professor Mike Nash: Vulnerability and public protection - have we got the ba...
CSSaunders
 
Working together to safeguard children 2013
Working together to safeguard children 2013Working together to safeguard children 2013
Working together to safeguard children 2013
Nathan Loynes
 
Multi agency working in Leicestershire - Liz Clark, Leicestershire County Cou...
Multi agency working in Leicestershire - Liz Clark, Leicestershire County Cou...Multi agency working in Leicestershire - Liz Clark, Leicestershire County Cou...
Multi agency working in Leicestershire - Liz Clark, Leicestershire County Cou...
CentreOf Excellence
 
Isaf State Of The Insurgency 231000 Dec
Isaf State Of The Insurgency 231000 DecIsaf State Of The Insurgency 231000 Dec
Isaf State Of The Insurgency 231000 Dec
Claes Krantz
 
Insurgency(m)
Insurgency(m)Insurgency(m)
Insurgency(m)
manoj kumar sood
 
Disarmamentarms
DisarmamentarmsDisarmamentarms
Disarmamentarms
Uzair Shaikh
 
INCLUSIVE EDUCATION
INCLUSIVE EDUCATIONINCLUSIVE EDUCATION
INCLUSIVE EDUCATION
ABUL HASAN
 
Arms Control and Disarmament
Arms Control and DisarmamentArms Control and Disarmament
Arms Control and Disarmament
Anikesh Sinha
 
War on terror - BrassTacks Presentation
War on terror - BrassTacks PresentationWar on terror - BrassTacks Presentation
War on terror - BrassTacks Presentation
Zaid Hamid
 
Disarmament & Arms Control
Disarmament & Arms ControlDisarmament & Arms Control
Disarmament & Arms Control
gueste59d722
 
Arms Control AND Disarmament
Arms Control AND DisarmamentArms Control AND Disarmament
Arms Control AND Disarmament
Ultraspectra
 

Viewers also liked (20)

Inter agency
Inter agencyInter agency
Inter agency
 
Multi agency working
Multi agency workingMulti agency working
Multi agency working
 
Leeds trinity multiagency working and the influence of the eyfs
Leeds trinity  multiagency working and the influence of the eyfsLeeds trinity  multiagency working and the influence of the eyfs
Leeds trinity multiagency working and the influence of the eyfs
 
WMD Countermeasures ::: A Preventative Mission
WMD Countermeasures ::: A Preventative MissionWMD Countermeasures ::: A Preventative Mission
WMD Countermeasures ::: A Preventative Mission
 
The tragic case of victoria climbie revised 2011
The tragic case of victoria climbie revised 2011The tragic case of victoria climbie revised 2011
The tragic case of victoria climbie revised 2011
 
туристическая поездка в украину
туристическая поездка в украинутуристическая поездка в украину
туристическая поездка в украину
 
USGCRP Education Interagency Working Group
USGCRP Education Interagency Working GroupUSGCRP Education Interagency Working Group
USGCRP Education Interagency Working Group
 
Joining Forces: Interagency Collaboration and "Smart Power"
Joining Forces: Interagency Collaboration and "Smart Power"Joining Forces: Interagency Collaboration and "Smart Power"
Joining Forces: Interagency Collaboration and "Smart Power"
 
Power & Politics
Power & PoliticsPower & Politics
Power & Politics
 
Professor Mike Nash: Vulnerability and public protection - have we got the ba...
Professor Mike Nash: Vulnerability and public protection - have we got the ba...Professor Mike Nash: Vulnerability and public protection - have we got the ba...
Professor Mike Nash: Vulnerability and public protection - have we got the ba...
 
Working together to safeguard children 2013
Working together to safeguard children 2013Working together to safeguard children 2013
Working together to safeguard children 2013
 
Multi agency working in Leicestershire - Liz Clark, Leicestershire County Cou...
Multi agency working in Leicestershire - Liz Clark, Leicestershire County Cou...Multi agency working in Leicestershire - Liz Clark, Leicestershire County Cou...
Multi agency working in Leicestershire - Liz Clark, Leicestershire County Cou...
 
Isaf State Of The Insurgency 231000 Dec
Isaf State Of The Insurgency 231000 DecIsaf State Of The Insurgency 231000 Dec
Isaf State Of The Insurgency 231000 Dec
 
Insurgency(m)
Insurgency(m)Insurgency(m)
Insurgency(m)
 
Disarmamentarms
DisarmamentarmsDisarmamentarms
Disarmamentarms
 
INCLUSIVE EDUCATION
INCLUSIVE EDUCATIONINCLUSIVE EDUCATION
INCLUSIVE EDUCATION
 
Arms Control and Disarmament
Arms Control and DisarmamentArms Control and Disarmament
Arms Control and Disarmament
 
War on terror - BrassTacks Presentation
War on terror - BrassTacks PresentationWar on terror - BrassTacks Presentation
War on terror - BrassTacks Presentation
 
Disarmament & Arms Control
Disarmament & Arms ControlDisarmament & Arms Control
Disarmament & Arms Control
 
Arms Control AND Disarmament
Arms Control AND DisarmamentArms Control AND Disarmament
Arms Control AND Disarmament
 

Similar to Inter agency introduction

Counter Narco-Terrorism and Drug Interdiction
Counter Narco-Terrorism and Drug InterdictionCounter Narco-Terrorism and Drug Interdiction
Counter Narco-Terrorism and Drug Interdiction
mariaidga
 
Confrance presntstation
Confrance presntstationConfrance presntstation
Confrance presntstation
Technical Advisor at Iraqi Government
 
Comparative police system2015
Comparative police system2015Comparative police system2015
Comparative police system2015
monde24836
 
2013 workshop-on-intelligence
2013 workshop-on-intelligence2013 workshop-on-intelligence
2013 workshop-on-intelligence
Robert David Steele Vivas
 
The Sendai Framework for Action
The Sendai Framework for ActionThe Sendai Framework for Action
The Sendai Framework for Action
Prof. David E. Alexander (UCL)
 
Tim Midgley, Saferworld (UK )
Tim Midgley, Saferworld (UK )Tim Midgley, Saferworld (UK )
Tim Midgley, Saferworld (UK )
Geneva Declaration
 
Terrorisim and Role of Security organizations
Terrorisim and Role of Security organizationsTerrorisim and Role of Security organizations
Terrorisim and Role of Security organizations
Doç. Dr.Samih Teymur
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
Hinne Hettema
 
2006 multinational intelligence (centcom ccc)
2006 multinational intelligence (centcom ccc)2006 multinational intelligence (centcom ccc)
2006 multinational intelligence (centcom ccc)
Robert David Steele Vivas
 
Internal Security Challenges of Nepal and Intregated Efforts
Internal Security Challenges of Nepal and Intregated EffortsInternal Security Challenges of Nepal and Intregated Efforts
Internal Security Challenges of Nepal and Intregated Efforts
Sudip Pandit
 
US-Mexico Border Security 2007-2008
US-Mexico Border Security 2007-2008US-Mexico Border Security 2007-2008
US-Mexico Border Security 2007-2008
cristiannmartinez
 
Force Protection Detachment Indonesia - Setting the Standard for Security in ...
Force Protection Detachment Indonesia - Setting the Standard for Security in ...Force Protection Detachment Indonesia - Setting the Standard for Security in ...
Force Protection Detachment Indonesia - Setting the Standard for Security in ...
Scott Bernat
 
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...
SP. Zems Mathias, PhD.
 
Presentation1
Presentation1Presentation1
Presentation1
SP. Zems Mathias, PhD.
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
Shojan Jacob
 
C3 Cyber
C3 CyberC3 Cyber
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber NasionalID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
IGF Indonesia
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
Shiva Bissessar
 
002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes
Michalis Mavis, MSc, MSc
 
United states cyber security policy (Eric Winn)
United states cyber security policy (Eric Winn)United states cyber security policy (Eric Winn)
United states cyber security policy (Eric Winn)
ericwinn
 

Similar to Inter agency introduction (20)

Counter Narco-Terrorism and Drug Interdiction
Counter Narco-Terrorism and Drug InterdictionCounter Narco-Terrorism and Drug Interdiction
Counter Narco-Terrorism and Drug Interdiction
 
Confrance presntstation
Confrance presntstationConfrance presntstation
Confrance presntstation
 
Comparative police system2015
Comparative police system2015Comparative police system2015
Comparative police system2015
 
2013 workshop-on-intelligence
2013 workshop-on-intelligence2013 workshop-on-intelligence
2013 workshop-on-intelligence
 
The Sendai Framework for Action
The Sendai Framework for ActionThe Sendai Framework for Action
The Sendai Framework for Action
 
Tim Midgley, Saferworld (UK )
Tim Midgley, Saferworld (UK )Tim Midgley, Saferworld (UK )
Tim Midgley, Saferworld (UK )
 
Terrorisim and Role of Security organizations
Terrorisim and Role of Security organizationsTerrorisim and Role of Security organizations
Terrorisim and Role of Security organizations
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
2006 multinational intelligence (centcom ccc)
2006 multinational intelligence (centcom ccc)2006 multinational intelligence (centcom ccc)
2006 multinational intelligence (centcom ccc)
 
Internal Security Challenges of Nepal and Intregated Efforts
Internal Security Challenges of Nepal and Intregated EffortsInternal Security Challenges of Nepal and Intregated Efforts
Internal Security Challenges of Nepal and Intregated Efforts
 
US-Mexico Border Security 2007-2008
US-Mexico Border Security 2007-2008US-Mexico Border Security 2007-2008
US-Mexico Border Security 2007-2008
 
Force Protection Detachment Indonesia - Setting the Standard for Security in ...
Force Protection Detachment Indonesia - Setting the Standard for Security in ...Force Protection Detachment Indonesia - Setting the Standard for Security in ...
Force Protection Detachment Indonesia - Setting the Standard for Security in ...
 
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...
Normalcy of Crime as a Requirement for Intelligence Analysis:Case Study of Ni...
 
Presentation1
Presentation1Presentation1
Presentation1
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber NasionalID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
ID IGF 2016 - Hukum 3 - Kedaulatan dan Ketahanan Cyber Nasional
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes002-MAVIS - International agreements to combat electronic crimes
002-MAVIS - International agreements to combat electronic crimes
 
United states cyber security policy (Eric Winn)
United states cyber security policy (Eric Winn)United states cyber security policy (Eric Winn)
United states cyber security policy (Eric Winn)
 

Inter agency introduction

  • 1. InterAgency Cooperation Daniel W. Sutherland
  • 3. Legislative/lobbying • Public Affairs/comms • Law • Intel • Navy • Army • Vampire hunting
  • 4. Intel • Ops • Military • Political • Public Affairs/comms • Multi-national
  • 5. Diplomatic • Intel • Multi-national • Military • Transportation/logistics
  • 6. • Gun Violence • Immigration • Economic Issues
  • 7. Elements of InterAgency Cooperation • Understanding the Culture(s) of the I/A • Understanding How Various Components of the I/A Approach Strategy Development • Understanding How Various Components of the I/A Approach Intelligence • Understanding Technology and the I/A • Understanding Third Parties and the I/A • Understanding Evaluation/Assessments and the I/A
  • 8. Foundations Definitions Models • InterAgency • Global, National, Local • CT • Cooperation • Law Enforcement • Emergency Preparedness/Response • Border Security • Cyber
  • 9. “One issue that demands particular attention in the contemporary security environment is how best to apply whole-of-government approaches to complex national missions, ranging from combating terrorism and trafficking in persons to securing cyberspace. These and many other twenty-first-century security challenges require an agile and integrated response[.]” Daniel Langberg, “Organizational Innovations in Counterterrorism,” Homeland Security Affairs, Vol. VI, No. 3 (Sept. 2010)

Editor's Notes

  1. You probably have 2 questions: Why is GW teaching this subject? Why is GW requiring this of all of the students in this master’s program?By the way, this sounds really interesting – this is a real page-turner?There are two answers: (1) The students take this course because the material cuts across all of the other courses that they take. Helps them tie things together. It cuts across all of the disciplines – budget, cyber, homeland security, border security, planning, foreign policy, domestic policy, etc.Second, Interagency is the future. (a) “Joint Duty” is something that is increasingly required of federal employees if they want to get promotions, particularly to the senior ranks. (b) Moreover, the solution sets to the problems facing us require multi-disciplinary, cross-jurisdictional, cross-cultural actions.You need look no further than the recent Oscars …
  2. Gun ViolencePolitical Law enforcement/security Legal Educational (both K-12 and university) International (US and Brevik)Immigration; law enforcement/security; civil rights law; social workers; tech sector; business community more broadly; international relationsEconomic issues: banking, tax policy, business/private sector, international, political/lobbying/Hill
  3. We look in depth at 6 elements of the interagency
  4. Interagency:Global (includes transnational) National (includes various agencies of the USG) State/Local (mayors, sheriffs, emergency management agencies) Private sector (hospitals, businesses, chambers of commerce) Third parties (Congress, judiciary, media, think tanks)