Vojenské Rozhledy

Czech Military Review

Fulltext search in archive



« advanced mode »

    1  2   3   4   5   6   7   8   9   10   11   ...    next 

Results 1 to 30 of 744:

Threats and Hazards of Grey Rhino Paradigm

Reviewed - Research

Olga Burianová, Jiří F. Urbánek

Vojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 85-96

Grey Rhino is a metaphor for security threat, which is unkept irrational for large extent also high probability of harmful effect on a subject of risk owner. Business continuity management system is assessed in a diagram as controlling instrument aimed at operational hazard mitigation of continuity disturbance of affected subject. A ´from Operations´ Value Added - O´VA is established as qualitative dynamic information about productivity of activities. The measures are designed in crisis scenario for quality improvement of subject´s crisis readiness. An indicator of business risk continuity slip is defined. In a connection with war conflict on Ukraine is assessed if it is Grey Rhino manifestation.

Scenarios, Development, Internal Structure Scenarios and Security Threats

Reviewed - Review

Josef Melichar

Vojenské rozhledy / Czech Military Review Nr. 2/2017, Vol. XXVI. (LVIII.): 18-32

The article deals with the topic of scenarios in relation to their significance, internal structure development and the way of elaborating scenarios following links to security threats and mission types. Article describes possible way of structuring set of scenarios reflecting security threats stated in The Security strategy of the Czech Republic and corresponding mission types. Main methodology exploited during the work with the topic of scenarios was document analysis, which resulted in finding, that scenarios don't enjoy appropriate attention in the defence resort of the Czech Republic, scenarios are not elaborated and thus not exploited. The article deals in the conclusion with propositions aiming at elaborating scenarios with purposefull internal structure, elaborating security threats and reflecting mission types.


Cognitive Resilience Education in the Czech Military: SWOT Analysis

Reviewed - Research

Vladimír Bízik, Dominika Kosárová, Vendula Divišová, Adam Potočňák

Vojenské rozhledy / Czech Military Review Nr. 2/2025, Vol. XXXIV. (LXVI.): 98-116


This article presents the first systematic analysis of cognitive resilience education within the Czech Ministry of Defence, which is growing in importance in the context of contemporary hybrid threats. Through methodological triangulation (document analysis, questionnaires, interviews), the research maps the coverage of relevant topics across all levels of formal military education. The SWOT analysis reveals both existing foundations for cognitive resilience development and the absence of a systematic approach to this issue. The results highlight three main challenges for transforming the educational system: systematisation of the approach, personnel resources, and infrastructure modernisation. The study establishes an empirical basis for strategic recommendations to strengthen military personnel resilience against information and psychological operations.

Security, Threats, and Risk in the 21st Century

Nonreviewed - Other

Vojenské rozhledy / Czech Military Review Nr. 3/2014, Vol. XXIII. (LV.): 146-148

After the year 1989 many presumed that "the end of history" came about, after the end of cold war no international security risks would arise. Nowadays we see that everything is different. Risks and threats are an inseparable component of humane existence. A working state must be prepared for those risks, which covers even the field of training citizens. The reviewed publication will certainly contribute to better understanding the complexity of present-day world and its security. The book has two independent parts; the first one is politological by Peter Rožňák, the second part deals with professional arms by Ludvík Juříček.

Ludvík Juříček, Petr Rožňák. Bezpečnost, hrozby a rizika v 21. století. 1. vydání. Brno: Key Publishing, 2014, 324 str., ISBN 978-80-7418-201-3.

Impact of the New Technologies on CBRN Terrorist Threats: General Perspective and Perspective of Republic of Croatia

Reviewed - Review

Ivana Cetina, Jugoslav Jozić

Vojenské rozhledy / Czech Military Review Nr. 4/2022, Vol. XXXI. (LXIII.): 119-139

Although the level of the overall CBRN threat in the world is currently considered to be low, there is a trend of a growing concern about CBRN terrorism. Various terrorist groups have shown interest in using CBRN materials to disrupt the global order and economy. The motivation and factors that influence the potential use of CBRN agents in terrorist attacks arise from the fact that CBRN agents have potentially high mortality and can cause serious consequences. A large number of potential dual-use (military and civilian) items as well as the introduction of new technologies in use can be utilized for the CBRN attacks and create a wide range of new possible terrorist (and military) threats. This paper provides a general overview of the past and current situations regarding CBRN terrorism, analyses some of current widely known new technologies that can be utilized for CBRN terrorist attacks and analyses the biggest potential threats from CBRN hazards.

Czech Defense Policy in the Light of Strategic Culture

Reviewed - Research

Vladimír Karaffa, Cyril Svoboda

Vojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 3-23

The article analyzes key aspects of the development of the Czech Republic‘s defense policy since 1989, with a focus on the role of strategic culture. It examines historical, political, and social factors that have shaped the Czech Republic‘s approach to defense and security issues. Special attention is given to the transformation of the Czech Armed Forces, the transition to a professional military model, and responses to changing geopolitical threats. The analysis also considers public perceptions of the military, the influence of historical narratives on strategic culture, and the attitudes of political elites toward defense matters. The article highlights the importance of strategic culture as an analytical framework for understanding long-term trends and the evolution of defense policy, while suggesting potential avenues for future research in the Czech context.

Are There Real Global Catastrophic Biological Risks?

Reviewed

Aleš Macela, Vanda Boštíková

Vojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 55-69


Biosafety and biodefense (i.e. all countermeasures preventing the spread of biological agents in the environment and population) are on the regular agenda of states and their militaries. Somewhat aside are global catastrophic biological risks (GCBR), which can destroy human society as a biological species. Although a precise definition of what constitutes a global catastrophic biological risk is still being sought, it can be considered the impact of potential global catastrophic risks (GCR) on the social, economic and biological structure of human existence. This implies that GCBRs are a subset of GCRs. It is also open to discussion whether in the case of GCBRs the risk must necessarily be biological agents, from viruses to humans, or whether anthropogenic threats can also be accepted as risk factors, or what the impact must be for a risk to be included under the designation GCBR.

Internal Conflicts in Works of Thucydides and Machiavelli

Reviewed - Review

Jakub Šedo

Vojenské rozhledy / Czech Military Review Nr. 1/2020, Vol. XXIX. (LXI.): 85-101

Hybrid threats are considered among the most serious risks that Western societies currently face. The aim of actors using such threats is to influence decision-making processes, and in order to do so they use a rich spectrum of methods to instigate conflict in society, seeking to undermine trust in institutions, abet radicalisation, and so on. Activities aimed at creating internal conflict, and the prevention of such activities, are not, of course, a new phenomenon; they differ only in their extent, intensity and the techniques used. The aim of this paper is to investigate how classic strategists - Thucydides and Machiavelli - described in their works how internal conflict is fomented among the enemy and how it can be prevented. The paper describes and analyses various ways of instigating and mitigating internal conflict as noted in their works, and assesses their relevance for the current debate.

Jihadist Foreign Terrorist Fighters: Contemporary Threats and Challenges in East Central Europe

Reviewed - Review

Miroslav Mareš

Vojenské rozhledy / Czech Military Review Nr. 3/2019, Vol. XXVIII. (LX.): 3-15

This paper deals with the phenomenon of Jihadist foreign terrorist fighters from the perspective of East Central European countries. Over the past decade, the term 'foreign terrorist fighter' has become established in scholarly literature, international law and the popular consciousness. Today, Jihadist foreign terrorist fighters are closely watched globally for the security threat they pose. Although the greatest danger in Europe is seen to be to nations in the west, several cases in East Central Europe - involving terrorists travelling through the region and attempting to radicalise local jihadists - have led Poland, Hungary, Slovakia and the Czech Republic to adopt important legislation to eliminate this threat.

Contemporary Terrorism Manifestations (Simple Causal Model Analysis)

Nonreviewed - Other

Tomáš Novotný

Vojenské rozhledy / Czech Military Review Nr. 4/2019, Vol. XXVIII. (LX.): 94-105

The editorial board of Vojenské rozhledy Journal presents an article by General Staff Colonel (plk. gšt.) Tomáš Novotný, currently the Chief of the Department of Strategic Planning (J-5) of the General Staff of the Armed Forces of the Slovak Republic. This article was published in HORYZONTY BEZPIECZEŃSTWA Nr 8 (3) 2017 and it is available online at http://www.prawo.uni.opole.pl/horyzonty_bezp/Nr_8(3)_2017.pdf. The article is very closely linked to the subject of the contribution published in Vojenské rozhledy 3/2019, entitled "Religious Extremism as a Cause of Armed Conflicts: Indicators and Early Warning Systems", and in a certain way it defines its theoretical foundations.
This article briefly describes and puts together conclusions of the Copenhagen Peace Research Institute' key publications, which were released within the transformation of the Security Studies at the turn of the millennium, with conclusions of the UN Human Security Concept that was successfully institutionalized in 2012. Afterwards, the "Copenhagen School" methodology was applied on the UN Human Security Concept to identify a set of human security challenges and threats, which have been - after analysis of their causal relationship - supplemented by a causal classification. Most security threats create a causal link with one or more other security threats. This fact implies that there is a possibility to create a causal model (mental, graphic, etc.) of any security threat to simulate or to predict the consequences and successfulness / efectivity of a suggested security solution (securitizating or de-securitizating). As a practical subject of a security threat causal analysis was used the model of processes on the way "from a state failure to a terrorism manifestation" adapted to contemporaty situation in the European Union.

Czech Defence Policy Assessment in 2017/2018

Reviewed - Review

Lukáš Dyčka, Josef Procházka

Vojenské rozhledy / Czech Military Review Nr. 4/2018, Vol. XXVII. (LIX.): 3-19

The research described in this paper was conducted in the framework of institutional research project Strategic Alternatives (STRATAL) within the Centre for Security and Military Strategic Studies of University of Defence, The Czech Republic. Article assesses the development of Czech Defence policy in 2017 and first half of 2018. Authors analyse key change drivers in external environment (security threats, EU strategic autonomy, transatlantic link). In second step authors evaluate measures taken in political, military, administrative, economical and societal domain in response to key change drivers and highlight related risks to effective defence policy formulation and implementation.

Integrating Emerging Technologies in Military Maintenance and Repairs: An Overview of Current Status, Opportunities and Challenges

Reviewed - Review

Milan Vábek, Ondřej Novosad, Miroslav Pecina, Jan Kotisa

Vojenské rozhledy / Czech Military Review Nr. 3/2024, Vol. XXXIII. (LXV.): 62-75

Maintenance and repair (M&R) of military equipment are crucial for operational readiness. The article highlights challenges faced by military forces, particularly in the US, with significant equipment non-operable due to inefficient M&R. It emphasizes modernizing M&R through Predictive Maintenance (PM) and 3D Printing (AM). PM employs AI and data analytics for real-time monitoring and foreseeing malfunctions, signifying a strategic shift in M&R. AM significantly curtails downtime by enabling on-demand spare parts production, presenting a solution to traditional military M&R challenges. The article also underscores the economic advantages and potential for operational efficiency improvements through these technologies. However, it points out hurdles in implementing PM and AM, including high initial costs, lack of trained personnel, and the threat of counterfeit production in AM.

Situation Analysis of the Security Education and Training System in the Republic of Bulgaria

Reviewed - Research

Stoyko Stoykov, Elitsa Petrova

Vojenské rozhledy / Czech Military Review Nr. 2/2023, Vol. XXXII. (LXIV.): 67-82

The purpose of the article is to present a situational analysis of the education and training system in the field of security in the Republic of Bulgaria in 2021, in which internal and external threats, strengths and weaknesses, problem areas and possible solutions will be highlighted. The subject of the article is the education and training system, as the specific subject is the education and training system in the field of security in the Republic of Bulgaria.

Hybridni hrozby - vcera, dnes a zitra - pohled z Prahy

Nonreviewed - Other

Vojenské rozhledy / Czech Military Review Nr. 4/2018, Vol. XXVII. (LIX.): 161-166

Security Threats from Inside: Scenario "Extremism in Being and Coexistence with Romany Ethnic Group and Migrants"

Military sociology

PhDr. Antonín Rašek

Vojenské rozhledy / Czech Military Review Nr. 2/2012, Vol. XXI. (LIII.): 143-154

At first, we are familiarised with terms of extremism, Romanies (Gypsies), anarchists, neo-Nazis, then the author introduces possible picture of security situation at the turn of second and third decades of 21st century. He believes that in every country there is a limited ability to integrate ethnic groups by majority. As soon as the limits are exceeded, problems begin. His scenario ends with a pessimistic vision: increasing tensions will ask army deployment, but even local armed forces are not able to enforce law and order, therefore the government must ask for help neighbouring states.

The UN and NATO as the Main Pillars of the International Security Architecture with a Focus on the Middle East Region

Reviewed - Research

Yvona Novotná-Šabacká

Vojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 18-35

This study provides a summary overview of the creation and the activities of the international security architecture in the form of their two main pillars, i.e. the United Nations and the North Atlantic Treaty Organization in the Near and Middle East region. Within the framework of international security relations, this is a very unstable and conflictual region, where this instability has lasted practically since the establishment of the State of Israel in 1948. The global UN, its overall activity and importance, especially humanitarian and peace-building activities not only for the Near and Middle East region, is very beneficial, through out the Cold War period up to the present day. As a security organization, NATO is among the most important global actors influencing current international security relations. Through their activities, both of these organizations represent a essential means of ensuring world peace and security.

Present Trends, Emergencies and Their Impact on Supply Chain Security

Reviewed - Research

Dušan Repík, Natálie Hanáková, Jan Kotisa, Pavel Foltin

Vojenské rozhledy / Czech Military Review Nr. 3/2023, Vol. XXXII. (LXIV.): 63-81

The article examines the impact of recent geopolitical, economic, and security changes on logistics support capabilities in EU and NATO member states. The study analyzes the effects of the COVID-19 pandemic and the armed conflict in Ukraine on logistics supply chains, considering environmental, social, and security concerns. The research questions focus on identifying the main changes and assessing their implications for commercial, military, and humanitarian logistics. The prolongation of the conflict in Ukraine and the economic sanctions imposed on Russia have been found to have a significant impact on logistics capabilities, perceptions of the structure of supply chains and the risks arising from this. The impact of these events is also producing third-country poverty and dehumanizing the UN SDG goals. On the other hand, improvements in NATO troop readiness and weaponry have been noted. The study highlights the need for further research to investigate specific threats for different types of supply chains and to consider the complex and evolving nature of the issue. Ultimately, this research provides insights into the challenges and opportunities facing logistics capabilities in the context of ongoing geopolitical and environmental changes.

Update on the United States Nuclear Strategy: from NPR 2018 to NPR 2022

Reviewed - Research

Adam Potočňák

Vojenské rozhledy / Czech Military Review Nr. 2/2023, Vol. XXXII. (LXIV.): 3-22

The article follows the author's comparative analysis of American and Russian nuclear doctrines and armaments from the fall of 2021. It presents the current nuclear strategy of the United States of America based on a content analysis of three specific areas of the updated version of the Nuclear Posture Review. Applying interpretive analysis and a rich secondary sources apparatus, the author also reflects on his 2021-formulated assumptions and expectations about the further development of American nuclear strategy under President Joe Biden. The author analyzes the influence of the presidential administration's ideological and political ambitions together with the decisive geopolitical events of 2022 and concludes that mainly due to the second factor, the current shape of American nuclear strategy has not undergone any revolutionary changes and continues to maintain a long-standing continuity and consensus about its basic principles.


Military or Militancy: How to Navigate Media Objectivity in Reporting on National Security

Reviewed

Sidra Agha

Vojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 37-54


This study aimed to explore the media’s perception of the military and militant activities, focusing on journalists’ professional conduct and their commitment to the national cause. In-depth interviews were conducted with Pakistani journalists reporting from conflict zones. The findings suggest that Pakistan is engaged in a war on terror and that the media plays a key role in glorifying the security forces in their fight against militants who challenge the authority of the state. Journalists expressed the view that the government and military should take realistic measures to combat this threat. While journalists described militants as terrorists, they also noted that their professionalism is often influenced by patriotism and a national duty to serve the country. However, objectivity remained a key element of their reporting. The media, considered the fourth pillar of the state, should have the necessary freedom to report on conflicts. At the same time, self-censorship was considered necessary to prevent content that could lead to radicalization.

Social Media as a Tool for Profiling Potential Intelligence Service Sources. How are the Military Students Doing?

Reviewed

Libor Kutěj

Vojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 24-36


The article addresses the use of social media intelligence (SOCMINT) as a tool for recruiting and selecting souces by foreign intelligence services, with an emphasis on the risks it poses to students in military studies at national military universitiy. It analyzes the specific ways in which SOCMINT enables foreign intelligence agencies to effectively gather personal data and profile potential collaborators from both public and private information shared online. Research conducted among students of the University of Defense and other institutions revealed that military students share comparable types of information on social networks as their civilian peers, making them equally vulnerable to the activities of foreign intelligence services. However, military students are preparing for careers in defense and security, making them a significantly more attractive target for foreign intelligence agencies than other categories of employees.

Security Preconditions and Threats (Economy, Religious and Cybernetic Menaces)

PhDr. Antonín Rašek

Vojenské rozhledy / Czech Military Review Nr. 2/2011, Vol. XX. (LII.): 38-52

One of main task while preparing new security documents is to identify, analyze and evaluate newly emerging, self-generating security threats. They menace cybernetic, economy, bank, and religious security. The special menace, as for inner security it is lobbyism. Cybernetic threat is today regarded as more dangerous than nuclear strike. The American lived through those experiences in Iraq. Another example is cyber attacks on Estonia in 2007 that swamped websites of Estonian organizations, including Estonian parliament, banks, ministries, newspapers and broadcasters.The attacks triggered a number of military organisations around the world (including NATO) to reconsider the importance of network security to modern military doctrine. There is a paradigm: the more modern country, the more risks are opened. The situation is complicated by the fact that in sophisticated society there is hard to identify attacking enemy. The author underlines that we are the last member nation in the EU that has no official CSIRT (Computer Security Incident Response Team) to react cyber /terrorist attracts.

Arson Attacks in Israel - History and Options for the Elimination of Inincendiary Balloons

Reviewed - Review

Alena Slavíková, Martin Křepský, František Racek, Antonín Novotný

Vojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 130-146

The article concerns the issue of arson attacks in Israel.The issue of terrorism in Israel is quite broad, given that it is a very common phenomenon here and Israel deals with terrorism on a daily basis. The paper therefore focuses on incendiary balloons, a weapon that repeatedly caused fires around the Gaza Strip between 2018-2023. It examines their history, their design, outlines the possibilities of their elimination, the advantages and disadvantages of possible technical solutions, and a reflection on the future of their usage.


Possibilities of Using Ground Robotic Systems as an Element of Protection of Static Military Objects

Reviewed - Research

Jan Nohel, Daniel Srb, Jan Hrdinka, Michal Hrnčiar

Vojenské rozhledy / Czech Military Review Nr. 2/2025, Vol. XXXIV. (LXVI.): 179-200


The article deals with the possibilities of protecting the outer perimeter of static military facilities using ground-based unmanned systems that can complement the already existing protective elements. The conclusions reached and theoretical assumptions were experimentally verified in the field during the protection of a small base, using UGS Taros Furbo and Tactical Decision Support System calculations. The protection routes calculated by the system were then practically implemented by dismounted patrols and autonomous UGS Taros Furbo, focusing on terrain traversability and time of overcoming. The main objective of the paper is to present to the military public the current possibilities of deploying UGS Taros Furbo in the protection of static military facilities such as command posts or bases. Their use can significantly reduce the requirements for the deployment of dismounted patrols to protect the outer perimeter.

Internet of Things Vulnerabilities in Military Environments

Reviewed - Review

Andras Toth

Vojenské rozhledy / Czech Military Review Nr. 3/2021, Vol. XXX. (LXII.): 45-58

IoT devices (sensors, drones, cameras) are gaining more and more emphasis on military operations. The application of IoT elements in the military environment increases situational awareness and supports the acquisition and maintenance of information superiority. The information they provide about the enemy, the area of operations, and the location and status of our soldiers and assets can contribute to the successful execution of operations at the tactical, operational and strategic levels. However, they can also pose serious threats if their vulnerabilities allow the data they collected to leak or they provide access to the info-communication networks used for the enemy. In this article, the author examined the vulnerabilities of these IoT devices using keyword analysis. After drawing conclusions from the analysis of the relevant literature, he compared the results with the general-purpose IoT threats and attacks typical of today, like distributed denial of service attacks, security, software, security and privacy issues.

The New Wars: Terrorism and "Asymmetric" Warfare

Reviewed - Review

Alexander Treiblmajer

Vojenské rozhledy / Czech Military Review Nr. 4/2021, Vol. XXX. (LXII.): 93-108

The term "new wars" is often used to describe how terrorist groups achieve objectives in addition to the "classic" means of intervention by states. Terrorist organizations use asymmetric methods of warfare to target the weaknesses of Western states. Consequently, conventional wars have also changed into hybrid wars. The legal status of terrorist organizations is a major problem for the rule of law. In responding to terrorist attacks, the distinction between crime and terrorism is difficult. The "war on terror" is governed by different rules and principles and is extremely difficult to wage. Conflicts last a long time and victory against terrorism is rarely possible due to the networked structure of terrorist organizations and the way they intermingle with the population. In addition to an alliance-wide approach, there is a national solution to answer these new threats in form of the comprehensive national defense in Austria.

From Plan Gideon to Plan Tnufa: Israeli defense strategy and the buildup of the Israeli Defense Forces in the wider context of the Middle East after the Arab Spring

Reviewed - Research

Ľubomír Zvada, Jiří Lach

Vojenské rozhledy / Czech Military Review Nr. 4/2023, Vol. XXXII. (LXIV.): 24-44

Based on the content analysis method, this study analyzes the first ever published security strategy of the Israel Defense Forces, which was published in 2015. The main objective of the paper is not only to present the circumstances of its creation and discuss the main objectives of this strategic security document, but also to outline the broader geopolitical context from which it emerged. The authors argue that the document primarily emphasized two areas - the use of force and capacity building of the Israeli military. Among other things, the publication of the strategy was intended to have a deterrent effect. In the conclusion, the authors compare the Gideon Plan and its follow-up, the Tnufa Plan, and point to the considerable importance that consensus among political and military elites has in the implementation of such a document and reflect on what lessons and inspiration can be drawn from this case in our geographic space in the process of formulating or reformulating strategic security documents.

Palestine in a Vicious Circle of Violence, Wars and Terror (1948-2023)

Reviewed - Research

Jan Eichler

Vojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 36-55

This article deals with one of the most explosive areas of the world today, which is the Near and Middle East (NMEA) and especially the territory of historical Palestine, where the Israeli-Palestinian conflict (IPC) has been going on for a long time. The text deals primarily with historical and military factors and is written as a historical explanatory analysis. It focuses on the most significant historical events and explains the ways of functioning and the consequences of the processes that have been taking place there for a long time.

Deepfake as an Advanced Manipulative Technique for Spreading Propaganda

Reviewed - Review

Martin Havlík

Vojenské rozhledy / Czech Military Review Nr. 1/2023, Vol. XXXII. (LXIV.): 3-16

The article describes the basic foundations and significance of the manipulative technique called Deepfake, which in the environment of technological and informational expansion is also becoming a widely used tool for spreading propaganda. This advanced manipulation complements a wider spectrum of forms of disinformation and is increasingly being used as a means of conducting information operations, often as part of wider hybrid warfare. Effectively combating this kind of manipulation places high demands on consumers of information, both on the part of the detection tools used and on the part of the cognitive human approach based on critical thinking. The expansion and sophistication of similar manipulative techniques will continue, in connection with the development of modern technologies and the interconnectedness of the information environment. Although the Deepfake technique is not only associated with security-military aspects, its influence on information operations and hybrid warfare cannot be neglected.

Strategic Surprise and Implications for State Defense

Reviewed - Research

Radek Dubec, Roman Janda

Vojenské rozhledy / Czech Military Review Nr. 4/2023, Vol. XXXII. (LXIV.): 140-154

The article is based on a study carried out as part of the Long-Term Organizational Development Plan project by the Center for Security and Military-Strategic Studies of the University of Defense entitled "Armed Conflict". As part of the study, the issue of strategic surprise was analyzed and assessed, the aim of which was to find causal mechanisms and connections between the security of state defense and the phenomenon of surprise in the conditions of the 21st century. The article deals with the issue of surprise and its impact on state defense security. It describes strategic surprise as a principled aspect with implications and impacts on state defense. It examines the issue of surprise as a principle of military art in the context of contemporary strategic thinking.

Black Sea Dimension of Ukraine War

Reviewed - Review

doc. PhDr. Jan Eichler, CSc.

Vojenské rozhledy / Czech Military Review Nr. 1/2016, Vol. XXV. (LVII.): 6-23

The article is based on the positions of neo-realism, namely in the works by S. Walt and J. Mearsheimer. It characterizes the key actors of the war in Ukraine, which is a result of a long-term geopolitical competition between the USA and RF in the Black Sea region. The NATO enlargement in the area is classified as a non-coercive Expansion by Invitation (articulated by the elites of the former member states of the USSR and Warsaw Pact), which has provoked growing irritation of Russian political and military elites and the following hybrid war with dramatic international consequences. Last but not least, the article analyses military incidents and resulting security threats and challenges.

    1  2   3   4   5   6   7   8   9   10   11   ...    next