Under Siege: Counter-Terrorism and Civil Society in Hungary critically examines the effects of Hungary’s counterterrorism and security policies on civil society organizations since the Fidesz party’s sweeping victory in 2010. It explores the historical and political depths of the government’s security apparatus, including the formation and implementation of its counter-terrorism laws, polices, and institutions, as well as the terrorism landscape. The author draws upon survey research conducted across four categories of civil society organizations, including peacebuilding, development, human rights advocacy, and humanitarianism, and extensive data collected through semi-structured interviews with members of the civil society community, security actors, legal experts, politicians, and scholars. This book argues that the Hungarian government’s counterterrorism and security regime has significantly altered the autonomous space in which civil society organizations operate and severely strained state-society relations.
This book provides an interdisciplinary analysis of the future of US warfare, including its military practices and the domestic and global challenges it faces. The need to undertake a comprehensive analysis about the future of warfare for the US is more pressing today than ever before. New technologies and adversaries, both old and new, have the potential to revolutionize how wars are fought, and it is imperative that policy makers, military planners, and scholars engage with the latest analyses regarding these new threats and weapon systems. The primary aim of this book is to provide a clear and comprehensive depiction of the types of conflict that the United States is likely to become involved with in the future, as well as the methods of warfare that it may employ within these struggles. While a number of scholarly books have previously considered some of the potential features of US warfare in the future, many of these writings are either outdated or have limited their focus to just one or two of the main types of warfare that may occur and omitted consideration of the others. This book intends to remedy this deficiency in the literature. The volume consists of thematic chapters which address the key issues relevant to the future of US warfare, including cyber warfare, asymmetric conflicts, drone warfare, and nuclear strategy. Through the provision of a series of analyses by leading international academics, the volume provides an important interdisciplinary examination of the different areas of warfare that the United States is expected to use or encounter in the future. This book will be of great interest to students of US foreign policy, military studies, strategic studies and International Relations in general.
Al Qaeda's deadly assaults against the American homeland on September 11, 2001 deeply altered regional security architectures the world over. Religious extremists responsible for having coordinated and implemented the 9/11 attacks have brought state and non-state actors to radically reconsider traditional concepts of security, including responses and the need for tactical and strategic preemption in the face of growing conventional and asymmetric threats to communities at home and abroad. Drawing upon critical new research, the analyses presented by the contributors of this volume challenge and even shatter previously held ideas about domestic and international terrorism and state-sanctioned violence. They shed light upon new conceptions of security as well as the need for actors to address existing and emerging cultures of fear and critical susceptibilities in the face of wanton violence and security of the state in the 21st century.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.