InterAgency Journal 9-1

InterAgency Journal 9-1

Inside this issue:


U.S. Northern Command Counterterrorism
Response Force Requirement

by Matthew D. Bartels

Partnering to End Corruption through Security Cooperation
and Defense Institution Building
by Adam Bushey

The Syrian Refugee Crisis: A Moral and Ethical Obligation of
Resettlement or
 “I’ll Pass on the Poisoned Skittles”
by Joel D. Funk

Searching for a Win-Win-Win: Rethinking Energy Crisis
Solutions in West Africa
by Johnny J. Wandasan, Karie Hawk and Michael J. Cheatham

New Foreign Policy Capability
by Robert D. Payne III

Why We Can’t All Just Get Along: Overcoming Personal Barriers to
Inter-Organizational Effectiveness and Finding Your Personal Coupler for Success
by William J. Davis, Jr.

Adaptive Leadership: The Leader’s Advantage
by Bill McCollum and Kevin P. Shea

Avoiding a New Berlin Conference: A Framework for U.S. – Chinese Economic Cooperation in West Africa
by Kevin Peel, Justin Reddick, John Hoeck and Cynthia Dehne

Book Review

A Life in Code: Pioneer Cryptanalyst Elizebeth Smith Friedman

Code Warriors: NSA’s Codebreakers and the Secret Intelligence War Against the Soviet Union

War and the Art of Governance: Consolidating Success into Political Victory

Worth Noting

National Defense Strategy released
Brown-Bag lectures feature State, FEB, CIA
Interagency Counterterrorism Task Force bill moves to Senate
CALL highlights lessons learned from State personnel
Africom tool helps advance women, peace, and security
National Security Strategy released
Ambassador McCarthy visits Fort Leavenworth
DHS cyber bill approved by House
USAID Administrator testifies before House Subcommittee
Interagency response needed for opioid crisis
New office at DHS to counter WMDs
Interagency task force created to combat illicit opioids

Download the complete edition

IAJ 9-1 (2018) pdf
IAJ 9-1 (2018) ePub

Opt In Image
Get Simons Center News & Information Delivered to Your Inbox

Simply enter your email address below and click the subscribe button...

We 100% respect your privacy

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>