- Table View
- List View
In the face of Islam's own internal struggles, it is not easy to see who we should support and how. This report provides detailed descriptions of subgroups, their stands on various issues, and what those stands may mean for the West. Since the outcomes can matter greatly to international community, that community might wish to influence them by providing support to appropriate actors. The author recommends a mixed approach of providing specific types of support to those who can influence the outcomes in desirable ways.
In the region of Central Asia and South Caucasus, what is the potential for armed conflict, and how might such outbreaks escalate to a level that could involve U.S. forces? The authors evaluate the key political, economic, and societal faultlines underlying the likelihood of conflict in the region, assessing their implications for regional stability and for U.S. interests and potential involvement over the next 10 to 15 years.
In the coming decade, NATO faces growing fiscal austerity and declining defense budgets. This study analyzes the impact of planned defense budget cuts on the capabilities of seven European members of NATO:the United Kingdom, France, Germany, Italy, Spain, the Netherlands, and Poland. The authors assess the implications of the cuts for NATO capabilities and strategy and for U. S. policy.
Future U.S. national security strategy is likely to be profoundly affected by the ongoing, rapid evolution of cyberspace--the global information infrastructure--and in particular by the growing dependence of the U.S. military and other national institutions and infrastructures on potentially vulnerable elements of the U.S. national information infrastructure. To examine these effects, the authors conducted a series of exercises employing a methodology known as the Day After ... in which participants are presented with an information warfare crisis scenario and asked to advise the president on possible responses. Participants included senior national security community members and representatives from security-related telecommunications and information-systems industries. The report synthesizes the exercise results and presents the instructions from the exercise materials in their entirety.