Vojenské Rozhledy

Czech Military Review

Fulltext search in archive



« advanced mode »

    1  2   3   4   5   6   7   8   9   10   11   ...    next 

Results 1 to 30 of 3049:

Cognitive Hierarchy and Intelligence

Reviewed - Review

Jozef Vojtek, Josef Říha, Miroslav Šuhaj

Vojenské rozhledy / Czech Military Review Nr. 2/2022, Vol. XXXI. (LXIII.): 88-105 | DOI: 10.3849/2336-2995.31.2022.02.088-105

The article deals with the issue of the cognitive pyramid and the possible use of intelligence analysis in the context of gaining the understanding and wisdom of users of information using this pyramid. The cognitive pyramid is used to define the terms date, information, knowledge, understanding and wisdom that make up the various levels of the pyramid. The paper attempts to discuss concepts in different models of the pyramid. It briefly describes intelligence in the context of the use of intelligence by means of a cognitive pyramid. Intelligence is a special kind of knowledge. This article also seeks to explore how intelligence creation can be explained using a cognitive analytical pyramid model.

Threats and Hazards of Grey Rhino Paradigm

Reviewed - Research

Olga Burianová, Jiří F. Urbánek

Vojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 85-96 | DOI: 10.3849/2336-2995.33.2024.02.085-096

Grey Rhino is a metaphor for security threat, which is unkept irrational for large extent also high probability of harmful effect on a subject of risk owner. Business continuity management system is assessed in a diagram as controlling instrument aimed at operational hazard mitigation of continuity disturbance of affected subject. A ´from Operations´ Value Added - O´VA is established as qualitative dynamic information about productivity of activities. The measures are designed in crisis scenario for quality improvement of subject´s crisis readiness. An indicator of business risk continuity slip is defined. In a connection with war conflict on Ukraine is assessed if it is Grey Rhino manifestation.

Weapon System Acquisition Process Utilizing Design Simulation as Decision Support

Reviewed

Jan Drozd, Josef Procházka

Vojenské rozhledy / Czech Military Review Nr. 4/2024, Vol. XXXIII. (LXV.): 37-50 | DOI: 10.3849/2336-2995.33.2024.04.037-050

The selection of optimal weapon systems is crucial for national defense. Traditional empirical methods struggle to address the complexities of modern warfare. This article explores the potential of constructive simulation for informed decision-making in this domain. Simulating tactical operations with complex variables, such as terrain, enemy actions, and system interoperability, provides valuable insights into weapon effectiveness. This enables the optimization of acquisitions in line with strategic goals. Design simulation allows for the exploration of factors difficult to test comparison of armament configurations, analysis of enemy tactics, and optimization of unit composition and deployment, saving costs and time. Simulation enables the safe exploration of even high-risk scenarios.

Deepfake as an Advanced Manipulative Technique for Spreading Propaganda

Reviewed - Review

Martin Havlík

Vojenské rozhledy / Czech Military Review Nr. 1/2023, Vol. XXXII. (LXIV.): 3-16 | DOI: 10.3849/2336-2995.32.2023.01.003-017

The article describes the basic foundations and significance of the manipulative technique called Deepfake, which in the environment of technological and informational expansion is also becoming a widely used tool for spreading propaganda. This advanced manipulation complements a wider spectrum of forms of disinformation and is increasingly being used as a means of conducting information operations, often as part of wider hybrid warfare. Effectively combating this kind of manipulation places high demands on consumers of information, both on the part of the detection tools used and on the part of the cognitive human approach based on critical thinking. The expansion and sophistication of similar manipulative techniques will continue, in connection with the development of modern technologies and the interconnectedness of the information environment. Although the Deepfake technique is not only associated with security-military aspects, its influence on information operations and hybrid warfare cannot be neglected.

The C5ISR System Integrated with Unmanned Aircraft in the Large-Scale Combat Operations

Reviewed - Review

Marko Radovanović, Aleksandar Petrovski, Vinko Žnidaršič

Vojenské rozhledy / Czech Military Review Nr. 2/2023, Vol. XXXII. (LXIV.): 98-118 | DOI: 10.3849/2336-2995.32.2023.02.098-118

The manner of conducting modern large-scale combat operations (LSCOs) is characterized by the increasingly frequent and diverse use of unmanned aerial vehicles (UAVs) integrated into the Command, Control, Computers, Communications, Intelligence, Surveillance and Reconnaissance (C4IRS) system. These aircraft are one of the most important types of weapons in modern LSCOs. Anyone that has the technology can process the latest information from the field and safely passes that information to the command center has a great advantage and a chance to cause great damage to units whose goal is to prevent further operational work. What is important is that UAVs must have some degree of self-protection through site selection action to reconnaissance and retreat routes. The paper presents the possibility of using UAVs for various missions in LSCOs, as well as a case study of their use in previous modern armed conflicts.

Review of the Authors´ Monography - Dušan Vičar, Ivan Princ, Ivan Mašek, Jiří Otakar Mika

Nonreviewed - Other

Daniel Sas

Vojenské rozhledy / Czech Military Review Nr. 1/2023, Vol. XXXII. (LXIV.): 135-136

Innovative view of the methodical process of facing disinformation

Reviewed - Research

Martin Havlík

Vojenské rozhledy / Czech Military Review Nr. 4/2022, Vol. XXXI. (LXIII.): 23-36 | DOI: 10.3849/2336-2995.31.2022.04.023-036

The article describes an innovative view of a possible methodical process of access and protection against disinformation. The ever-increasing digitization and use of cyberspace to disseminate all kinds of data and information provides users with an indisputable number of associated benefits associated with rapid access, distribution or sharing of current knowledge. However, this development trend also reciprocally generates a number of related threats that need to be faced. Our own resilience and effective tools against information campaigns and information actions of all relevant actors play the key role here. The critical thinking itself and the process mechanisms used to access information are the focus of overall resilience to this type of security threats. Thus, the methodical process can help a wide range of readers broaden their view of the complexity of the problem and partially minimize the associated security risks.

Perspectives of Clausewitz’s Center of Gravity

Reviewed

Ján Spišák

Vojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 70-84 | DOI: 10.3849/2336-2995.34.2025.01.070-084

The center of gravity in military affairs represents a dominant element of military art, used in the planning and conduct of military operations. The doctrine defines it as the main source of power that provides the actor with his strength, freedom of action and/or the will to fight. This article examines Clausewitz’s concept of center of gravity through selected philosophical perspectives and clarifies its significance in military theory and practice. It presents the doctrinal development of the concept, discusses its context, and concludes that the concept of the center of gravity remains a key doctrinal and practical element of operational art.

Proposal of Legal Status of the Expert Valuation Institute Objectifying the Acquisition Process

Reviewed - Research

Jan Hak, Pavel Foltin, Dagmar Pospíšilová, Karel Pospíšil

Vojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 97-115 | DOI: 10.3849/2336-2995.33.2024.02.097-115

The process of procuring military equipment, technology, material, and associated services (VM) is frequently shrouded in concerns about cost-effectiveness and, in some instances, even becomes the focus of law enforcement investigations. This often leads to delays in strategic investments and exposes involved individuals to the risk of criminal charges. Additionally, there is a notable lack of capacity to impartially evaluate the overall investment's efficacy. Consequently, the "Znalec" (Expert Witness) project was initiated as a part of the defense research program. Its objective is to explore the feasibility of establishing an expert institute that could impartially assess the value of the military procurements, set a standard for evaluating these assets, and outline a training program for relevant experts. This paper specifically addresses the first objective of the project, proposing a legal framework for the expert institute based on an extensive systems analysis.

Yomkippur War from the Perspective of Czechoslovak Diplomacy

Reviewed - Review

Eva Taterová

Vojenské rozhledy / Czech Military Review Nr. 4/2023, Vol. XXXII. (LXIV.): 3-23 | DOI: 10.3849/2336-2995.32.2023.04.003-023

This study presents the perspective of Czechoslovak diplomacy on the events of the Yom Kippur War (1973) in the context Czechoslovak foreign policy towards the Arab-Israeli conflict in early 1970s. The research is based on so far rather underexplored archival sources. Despite Czechoslovakia's declared unequivocal support for the Arab side of the conflict, Czechoslovak Middle Eastern policy since the mid-1950s was not entirely unconditional in relation to the Arab countries. Internal documents of Czechoslovak government occasionally revealed criticisms of Arab representatives. The Yom Kippur War represented a significant moment in this regard, as it was a military confrontation initiated not by Israel but by the Arab coalition, posing a challenge for Czechoslovak propaganda. Simultaneously, this armed conflict presented an opportunity for Communist Czechoslovakia to further deepen its relations with its Arab allies.

Possibility of Supporting the Activity of Infantry Units with Combat Unmanned Ground Systems During an Attack Operation

Reviewed

Jan Hrdinka, Jan Nohel, Jan Zezula, Jan Mazal

Vojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 120-135 | DOI: 10.3849/2336-2995.34.2025.01.120-135

The article discusses the possibilities of joint deployment of combat unmanned ground vehicles with combat infantry units. It summarizes the deployment of these assets in past and present military operations, including the presentation of deployment experiences available from public sources, and examines the joint deployment of an infantry squad with an unmanned ground combat platform during an attack operation. Using a constructive simulation, it presents the results of the deployment of an infantry squad during an attack operation with and without the support of a combat unmanned ground vehicle. As part of the discussion, he develops the ideas necessary for the cooperation of the unit with an unmanned vehicle. The aim of the article is, among other things, to open a debate in the professional community about the possibilities of effective use of unmanned ground systems to support the activity of combat units in military operations.


Cognitive Resilience Education in the Czech Military: SWOT Analysis

Reviewed - Research

Vladimír Bízik, Dominika Kosárová, Vendula Divišová, Adam Potočňák

Vojenské rozhledy / Czech Military Review Nr. 2/2025, Vol. XXXIV. (LXVI.): 98-116 | DOI: 10.3849/2336-2995.34.2025.02.098-116


This article presents the first systematic analysis of cognitive resilience education within the Czech Ministry of Defence, which is growing in importance in the context of contemporary hybrid threats. Through methodological triangulation (document analysis, questionnaires, interviews), the research maps the coverage of relevant topics across all levels of formal military education. The SWOT analysis reveals both existing foundations for cognitive resilience development and the absence of a systematic approach to this issue. The results highlight three main challenges for transforming the educational system: systematisation of the approach, personnel resources, and infrastructure modernisation. The study establishes an empirical basis for strategic recommendations to strengthen military personnel resilience against information and psychological operations.


Effectiveness of Training Using Simulation Technologies in the Training of Students of the University of Defence in Tactical Training

Reviewed - Research

Ľudovít Hradský, Luděk Rak, Jan Nohel

Vojenské rozhledy / Czech Military Review Nr. 2/2025, Vol. XXXIV. (LXVI.): 155-178 | DOI: 10.3849/2336-2995.34.2025.02.155-178


The article deals with the possibility of using simulation technologies in the training of students of the University of Defence in tactical training and seeks to answer the question whether the use of these means brings demonstrable effectiveness by means of an experiment. First-year students in a Field Training course were randomly divided into 42 sections of approximately equal numbers and then assigned to 3 categories based on their use of live and virtual simulation. All groups were assigned points for a specific tactical activity during the final exercise. The total scores of all groups were subjected to a subsequent statistical investigation using a one-factor analysis of variance on the data to examine whether there were statistically significant differences between the groups. Although students' use of modern simulation technology had a perceived positive effect on improving the quality of training, there was no evidence of statistically significant differences between the groups studied using statistical methods. However, the results of the experiment do show to some extent that some differences do exist between the groups and therefore leaves some opportunity to conduct similar, or more extensive research, in an effort to promote the attractiveness of the training process to military school students.

Requirements for engineer information in water crossing

Reviewed - Review

Martin Sedláček, Jaroslav Zelený

Vojenské rozhledy / Czech Military Review Nr. 4/2019, Vol. XXVIII. (LX.): 44-62 | DOI: 10.3849/2336-2995.28.2019.04.044-062

The work deals with the issue of engineer information, which is necessary for the planning of water crossing, and which can facilitate and speed up the proces of operation planning with the assistance of the staff members of engineer specialization. At present (2019) there is no application software development of engineer support tasks (hereinafter APV ŽEN) within the engineer command and control subsystem AČR, which would take into account the problem of water crossing by troops. The aim of the article is: to analyze the gathering of engineer information for water crossing and to describe it on a specific example of the Morava river, to identify the possibilities of water crossing by forces of AČR, to propose a map base for APV ŽEN, which will be supplemented by engineer information from Povodí s.p. and Motorway and Highway Directorate (hereinafter ŘSD) and to define measures that will support the availability of engineer information in water crossing.


Possibilities of Using Ground Robotic Systems as an Element of Protection of Static Military Objects

Reviewed - Research

Jan Nohel, Daniel Srb, Jan Hrdinka, Michal Hrnčiar

Vojenské rozhledy / Czech Military Review Nr. 2/2025, Vol. XXXIV. (LXVI.): 179-200 | DOI: 10.3849/2336-2995.34.2025.02.179-200


The article deals with the possibilities of protecting the outer perimeter of static military facilities using ground-based unmanned systems that can complement the already existing protective elements. The conclusions reached and theoretical assumptions were experimentally verified in the field during the protection of a small base, using UGS Taros Furbo and Tactical Decision Support System calculations. The protection routes calculated by the system were then practically implemented by dismounted patrols and autonomous UGS Taros Furbo, focusing on terrain traversability and time of overcoming. The main objective of the paper is to present to the military public the current possibilities of deploying UGS Taros Furbo in the protection of static military facilities such as command posts or bases. Their use can significantly reduce the requirements for the deployment of dismounted patrols to protect the outer perimeter.

Crowdsourcing as an Element of Strategic-Operational Intelligence. How NATO Used it and Changed the Game

Reviewed - Review

Karel Pešek, Jozef Vojtek, Libor Kutěj

Vojenské rozhledy / Czech Military Review Nr. 1/2024, Vol. XXXIII. (LXV.): 84-104 | DOI: 10.3849/2336-2995.33.2024.01.084-104

The article focuses on the concept of crowdsourcing in the social networking environment as a new phenomenon involving civilians in the intelligence process, enabling the use of their intelligence potential during armed conflict. Crowdsourcing of the civilian population is introduced by the example of NATO intervention during the first civil war in Libya. The article presents its use during the intelligence process at the strategic-operational level of command and control of the armed forces. It establishes its possible definition as a collection method of the intelligence process, and as a collection method which is disjunctively separable from similar intelligence collection methods.

Social Media as a Tool for Profiling Potential Intelligence Service Sources. How are the Military Students Doing?

Reviewed

Libor Kutěj

Vojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 24-36 | DOI: 10.3849/2336-2995.34.2025.01.024-036


The article addresses the use of social media intelligence (SOCMINT) as a tool for recruiting and selecting souces by foreign intelligence services, with an emphasis on the risks it poses to students in military studies at national military universitiy. It analyzes the specific ways in which SOCMINT enables foreign intelligence agencies to effectively gather personal data and profile potential collaborators from both public and private information shared online. Research conducted among students of the University of Defense and other institutions revealed that military students share comparable types of information on social networks as their civilian peers, making them equally vulnerable to the activities of foreign intelligence services. However, military students are preparing for careers in defense and security, making them a significantly more attractive target for foreign intelligence agencies than other categories of employees.

Comparison of Approaches Towards Electronic Warfare

Reviewed - Review

Petr Hlavizna

Vojenské rozhledy / Czech Military Review Nr. 4/2018, Vol. XXVII. (LIX.): 78-104 | DOI: 10.3849/2336-2995.27.2018.04.078-104

The article examines the different approaches of the North Atlantic Treaty Organization and the United States Armed Forces towards Electronic Warfare, the military activity in the Electromagnetic Environment. All reference materials used for this analysis, including the specifics of the Army of the Czech Republic's approach toward the subject area, were obtained from unclassified military sources. It describes, explains and visualizes the individual approaches, and by their comparison it identifies and subsequently emphasizes cases of divergence, including non-compliance in established Czech terms, definitions and abbreviations. It highlights the obsolescence of the still valid military publication Electronic Warfare in the Army of the Czech Republic, the use of which, in its current form, has already been deemed as unfounded and counterproductive. It presents proposals and recommendations for unification of approach towards the Electronic Warfare issues within the Army of the Czech Republic, in order to ensure consistency with the current North Atlantic Treaty Organization policy related to activities in the Electromagnetic Environment. It contributes to better understanding of doctrinal views on the role of Electronic Warfare in execution of combat support tasks in contemporary military operations, thus creating preconditions for elimination of associated misunderstandings in terms of the Army of the Czech Republic.

Internet of Things Vulnerabilities in Military Environments

Reviewed - Review

Andras Toth

Vojenské rozhledy / Czech Military Review Nr. 3/2021, Vol. XXX. (LXII.): 45-58 | DOI: 10.3849/2336-2995.30.2021.03.045-058

IoT devices (sensors, drones, cameras) are gaining more and more emphasis on military operations. The application of IoT elements in the military environment increases situational awareness and supports the acquisition and maintenance of information superiority. The information they provide about the enemy, the area of operations, and the location and status of our soldiers and assets can contribute to the successful execution of operations at the tactical, operational and strategic levels. However, they can also pose serious threats if their vulnerabilities allow the data they collected to leak or they provide access to the info-communication networks used for the enemy. In this article, the author examined the vulnerabilities of these IoT devices using keyword analysis. After drawing conclusions from the analysis of the relevant literature, he compared the results with the general-purpose IoT threats and attacks typical of today, like distributed denial of service attacks, security, software, security and privacy issues.

Testing of Pilots Abilities on Flight Simulators

Reviewed - Research

Rudolf Jalovecký

Vojenské rozhledy / Czech Military Review Nr. 1/2024, Vol. XXXIII. (LXV.): 127-144 | DOI: 10.3849/2336-2995.33.2024.01.127-144

The article presents more than ten years of experience in testing the abilities of pilots during flight control on flight simulators. A hypothesis is stated about the possibilities of finding common features in flight control, the basic mathematical apparatus for evaluation is presented, the flight simulators used and, of course, the achieved results are presented. 110 pilots have already been tested and a total of 2360 missions - test flights - have been simulated. Subsequent mathematical analysis provided approximately 40,000 results suitable for further statistical processing. This amount of data obtained from realistically simulated flights provides a prerequisite for defining applicable conclusions to the proposed mortgages. For the needs of subsequent certification, a proposal for the pile measurement methodology was also prepared, which summarizes both the theoretical approach to pile testing and the procedure for carrying out tests on individual simulators. Part of the proposed methodology includes an overview of the software created to facilitate the recording of data from individual missions, as well as software for own analysis of the measured data from the missions.

A Special Military Operation in the Context of Russia's Interpretation

Reviewed - Review

Jaroslav Galba, Ján Spišák

Vojenské rozhledy / Czech Military Review Nr. 1/2023, Vol. XXXII. (LXIV.): 50-68 | DOI: 10.3849/2336-2995.32.2023.01.050-068

The Russia has presented the ongoing war in Ukraine by the term special military operation, whose goals were declared by Russian President Putin in terms of demilitarization and denazification of Ukraine. In the wider context, there is an imperial effort of Russia to enforce its power and influence in the region by an offensive and aggressive war. The authors define the fundamental difference between a special operation and the so-called special military operation in the context of contemporary interpretation of the Kremlin. They further argue the way in which Russia is trying to justify the war and discuss its reality in terms of international law.

Resistance Operating Concept as a Tool for Increasing the Resilience of the State

Reviewed

Radek Dubec, Eva Nezvalová, Markéta Licková

Vojenské rozhledy / Czech Military Review Nr. 4/2024, Vol. XXXIII. (LXV.): 3-19 | DOI: 10.3849/2336-2995.33.2024.04.003-019

The article describes the issue of implementing the Resistance Operating Concept as part of a comprehensive approach to ensuring the defense of the state and its resilience. The basic conditions necessary for the introduction of that instrument are sought, and a comparative analysis of selected European countries that started to build a resistance movement is carried out. The article further describes the strategic definition of the resistance movement in the conditions of the Czech Republic, the legislative definition of the resistance movement and its anchoring in the framework of mental law, and the connection of the resistance movement to individual phases of the conflict. It analyzes the relationship of the resistance movement to individual phases of the conflict and categorizes the actors of the resistance movement, their roles and the methods used. In conclusion, it defines the necessary conditions for the implementation of the resistance movement into the security and defense system of the state.

Arson Attacks in Israel - History and Options for the Elimination of Inincendiary Balloons

Reviewed - Review

Alena Slavíková, Martin Křepský, František Racek, Antonín Novotný

Vojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 130-146 | DOI: 10.3849/2336-2995.33.2024.02.130-146

The article concerns the issue of arson attacks in Israel.The issue of terrorism in Israel is quite broad, given that it is a very common phenomenon here and Israel deals with terrorism on a daily basis. The paper therefore focuses on incendiary balloons, a weapon that repeatedly caused fires around the Gaza Strip between 2018-2023. It examines their history, their design, outlines the possibilities of their elimination, the advantages and disadvantages of possible technical solutions, and a reflection on the future of their usage.

Characteristics of Forcible Entries into Objects and an Experimental Assessment of the Potential Impact of Fragments Scattering on Training Safety when Using Fence Charge

Reviewed - Research

Ota Rolenec, Pavel Maňas, Tibor Palasiewicz

Vojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 147-166 | DOI: 10.3849/2336-2995.33.2024.02.147-166

The article focuses on the characteristics of forcible entries into objects and the term "breaching", which is often used interchangeably with this activity. The article further addresses the issue of fragments scattering when using a charge to overcome chain-link fences. The introductory chapter describes the execution of training in this field using the exercise facilities that are built for this purpose in military training areas. When conducting explosive forcible entry training, the safe distance for intervening teams and non-participants is determined using given formulas. The purpose of the simulation, mathematical calculations and experiment was to assess the extent to which fragments scattering occurs during explosive overcoming of these fences and whether the procedures used to determine the safe distance for non-participants are sufficient.

The Modern War Veteran: Identifying Needs, Problems and Risky Factors

Reviewed

Marcela Trávníčková, Jitka Laštovková, Benjamin Petruželka, Miroslav Barták

Vojenské rozhledy / Czech Military Review Nr. 4/2024, Vol. XXXIII. (LXV.): 70-90 | DOI: 10.3849/2336-2995.33.2024.04.070-090

This article examines the needs and problems of the modern war veterans and identifies factors that may contribute to making them a  high-risk group. It uses data from two questionnaire surveys. The respondents were war veterans leaving active service and war veterans who left active service less than ten years ago. The analysis shows that participation in the mission has a negative impact mainly on the family and relationships, and that the most common problems on leaving active service are related to finances and finding a new job. Further, few factors have been identified that may contribute to a high-risky group: less than nineteen years of service, age under forty, having health restrictions due to active service and leaving service as a decision of the employer.

NATO Support and Procurement Agency: a Powerful Instrument of Collaborative Logistics

Reviewed - Research

Radka Lopourová, Richard Funiok, Josef Procházka

Vojenské rozhledy / Czech Military Review Nr. 3/2024, Vol. XXXIII. (LXV.): 44-61 | DOI: 10.3849/2336-2995.33.2024.03.044-061

The paper evaluates the level of cooperation between the Ministry of Defence and the NATO Support and Procurement Agency (NSPA) in the field of procurement of military equipment. In the practical part, the results of the research on the level of participation of Czech-based suppliers in NSPA activities between 2018 and 2022 are presented. Pareto analysis comparing the participation of the Czech and international companies in contracts implemented by NSPA in terms of their subject, quantity and financial value is used. Qualitative case studies from three different areas illustrate in which NSPA projects the Czech Republic has already been involved in and which benefits and risks are associated with this cooperation for the MoD. Positives and drawbacks in the process of acquiring military equipment in-house and opportunities and threats that may arise from the acquisition of military equipment through the NSPA are summarised in the form of the SWOT analysis. Finally, recommendations are presented on how to improve the cooperation between the MoD and the NSPA in the field of acquisition.

The Operating Environment and Selected Functionalities of Intelligence Support in the Czech Armed Forces - Opportunities and Challenges

Reviewed - Research

Petr Hlavizna, Radovan Vašíček, Daniele Brugioni

Vojenské rozhledy / Czech Military Review Nr. 4/2023, Vol. XXXII. (LXIV.): 155-170 | DOI: 10.3849/2336-2995.32.2023.04.155-170

The article presents selected functionalities of intelligence support in the Czech Armed Forces, which are addressed in the context of opportunities and challenges of the future operating environment. Its aim is to formulate, in parallel reflection with the current approaches of the North Atlantic Treaty Organization, the possibilities of implementing intelligence, surveillance, reconnaissance and electromagnetic warfare in national conditions. Military practice is presented with a direction on how to respond to changes in the nature of the operational environment, including changes in the physical and non-physical domains of the battlespace to which all components of modern military forces must adapt while maintaining the necessary interoperability. The article is a response to differing and often not entirely correct understandings of the issue, which can be found even among specialists. It summarizes what has been learned so far and suggests where the discussed functionalities should go.

The formation of artillery in the Czechoslovak legions in Russia

Nonreviewed - Other

Vojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 183-196

The article deals with the formation of artillery in the Czechoslovak legions in Russia. Using information drawn from contemporary sources and books from the 1930s, it presents the basic milestones that were at the birth of this important part of the Czechoslovak legions.

Civil War in Myanmar. Causes, Actors, Development

Reviewed

Miroslav Nožina

Vojenské rozhledy / Czech Military Review Nr. 4/2024, Vol. XXXIII. (LXV.): 91-104 | DOI: 10.3849/2336-2995.33.2024.04.091-104

The civil war in Myanmar has been going on for more than seven decades. After the military coup in February 2021, it has undergone significant structural changes and gained new momentum. The causes of the conflict lie in the inability of different ethnic and political groups to find a way to coexist within a single state entity and the autonomisation of the military. The main actors in the war in Myanmar today are the military junta and its supporters, the democratic opposition and ethnic organisations. After the coup, the strength of the resistance movement and its operational capabilities are growing. However, this growth has its limits, given the continued disunity of opposition forces, the technical superiority of the Myanmar army and the strengthening of its numbers through compulsory conscription.

Liability for Health Damage - Public vs Private Area

Reviewed - Review

Ondřej Horák, Leopold Skoruša, Radim Vičar, Tomáš Zbořil

Vojenské rozhledy / Czech Military Review Nr. 3/2024, Vol. XXXIII. (LXV.): 110-128 | DOI: 10.3849/2336-2995.33.2024.03.110-128

The article deals with the comparison of refunds of non-material damage in public and private area. In the public area is analyzed legal regulation on health injuries in service relations, in private area is discussed legal regulation on health injuries in civil law and labour law. Particular attention will be focused on the transfer of compensation in the event of injury to the heirs - while in service relationships, such claims are extinguished by death (not transferred on the heirs), which was taken over from the 1960s legislation, in current private law, do not cease if they have been recognized or at least brought in court. The aim of the paper is a critical analysis for the current state of legal regulation and the proposals de lege ferenda (approximation to labour law regulation). The issue has increased importance for public finances and functioning of public sector and enforcement of the rule of law.

    1  2   3   4   5   6   7   8   9   10   11   ...    next