Fulltext search in archive
Results 1 to 30 of 744:
Threats and Hazards of Grey Rhino ParadigmReviewed - ResearchOlga Burianová, Jiří F. UrbánekVojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 85-96 Grey Rhino is a metaphor for security threat, which is unkept irrational for large extent also high probability of harmful effect on a subject of risk owner. Business continuity management system is assessed in a diagram as controlling instrument aimed at operational hazard mitigation of continuity disturbance of affected subject. A ´from Operations´ Value Added - O´VA is established as qualitative dynamic information about productivity of activities. The measures are designed in crisis scenario for quality improvement of subject´s crisis readiness. An indicator of business risk continuity slip is defined. In a connection with war conflict on Ukraine is assessed if it is Grey Rhino manifestation. |
Scenarios, Development, Internal Structure Scenarios and Security ThreatsReviewed - ReviewJosef MelicharVojenské rozhledy / Czech Military Review Nr. 2/2017, Vol. XXVI. (LVIII.): 18-32 The article deals with the topic of scenarios in relation to their significance, internal structure development and the way of elaborating scenarios following links to security threats and mission types. Article describes possible way of structuring set of scenarios reflecting security threats stated in The Security strategy of the Czech Republic and corresponding mission types. Main methodology exploited during the work with the topic of scenarios was document analysis, which resulted in finding, that scenarios don't enjoy appropriate attention in the defence resort of the Czech Republic, scenarios are not elaborated and thus not exploited. The article deals in the conclusion with propositions aiming at elaborating scenarios with purposefull internal structure, elaborating security threats and reflecting mission types. |
Reviewed - Research |
Security, Threats, and Risk in the 21st CenturyNonreviewed - OtherVojenské rozhledy / Czech Military Review Nr. 3/2014, Vol. XXIII. (LV.): 146-148 After the year 1989 many presumed that "the end of history" came about, after the end of cold war no international security risks would arise. Nowadays we see that everything is different. Risks and threats are an inseparable component of humane existence. A working state must be prepared for those risks, which covers even the field of training citizens. The reviewed publication will certainly contribute to better understanding the complexity of present-day world and its security. The book has two independent parts; the first one is politological by Peter Rožňák, the second part deals with professional arms by Ludvík Juříček. |
Impact of the New Technologies on CBRN Terrorist Threats: General Perspective and Perspective of Republic of CroatiaReviewed - ReviewIvana Cetina, Jugoslav JozićVojenské rozhledy / Czech Military Review Nr. 4/2022, Vol. XXXI. (LXIII.): 119-139 Although the level of the overall CBRN threat in the world is currently considered to be low, there is a trend of a growing concern about CBRN terrorism. Various terrorist groups have shown interest in using CBRN materials to disrupt the global order and economy. The motivation and factors that influence the potential use of CBRN agents in terrorist attacks arise from the fact that CBRN agents have potentially high mortality and can cause serious consequences. A large number of potential dual-use (military and civilian) items as well as the introduction of new technologies in use can be utilized for the CBRN attacks and create a wide range of new possible terrorist (and military) threats. This paper provides a general overview of the past and current situations regarding CBRN terrorism, analyses some of current widely known new technologies that can be utilized for CBRN terrorist attacks and analyses the biggest potential threats from CBRN hazards. |
Czech Defense Policy in the Light of Strategic CultureReviewed - ResearchVladimír Karaffa, Cyril SvobodaVojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 3-23 The article analyzes key aspects of the development of the Czech Republic‘s defense policy since 1989, with a focus on the role of strategic culture. It examines historical, political, and social factors that have shaped the Czech Republic‘s approach to defense and security issues. Special attention is given to the transformation of the Czech Armed Forces, the transition to a professional military model, and responses to changing geopolitical threats. The analysis also considers public perceptions of the military, the influence of historical narratives on strategic culture, and the attitudes of political elites toward defense matters. The article highlights the importance of strategic culture as an analytical framework for understanding long-term trends and the evolution of defense policy, while suggesting potential avenues for future research in the Czech context. |
Are There Real Global Catastrophic Biological Risks?ReviewedAleš Macela, Vanda BoštíkováVojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 55-69
|
Internal Conflicts in Works of Thucydides and MachiavelliReviewed - ReviewJakub ŠedoVojenské rozhledy / Czech Military Review Nr. 1/2020, Vol. XXIX. (LXI.): 85-101 Hybrid threats are considered among the most serious risks that Western societies currently face. The aim of actors using such threats is to influence decision-making processes, and in order to do so they use a rich spectrum of methods to instigate conflict in society, seeking to undermine trust in institutions, abet radicalisation, and so on. Activities aimed at creating internal conflict, and the prevention of such activities, are not, of course, a new phenomenon; they differ only in their extent, intensity and the techniques used. The aim of this paper is to investigate how classic strategists - Thucydides and Machiavelli - described in their works how internal conflict is fomented among the enemy and how it can be prevented. The paper describes and analyses various ways of instigating and mitigating internal conflict as noted in their works, and assesses their relevance for the current debate. |
Jihadist Foreign Terrorist Fighters: Contemporary Threats and Challenges in East Central EuropeReviewed - ReviewMiroslav MarešVojenské rozhledy / Czech Military Review Nr. 3/2019, Vol. XXVIII. (LX.): 3-15 This paper deals with the phenomenon of Jihadist foreign terrorist fighters from the perspective of East Central European countries. Over the past decade, the term 'foreign terrorist fighter' has become established in scholarly literature, international law and the popular consciousness. Today, Jihadist foreign terrorist fighters are closely watched globally for the security threat they pose. Although the greatest danger in Europe is seen to be to nations in the west, several cases in East Central Europe - involving terrorists travelling through the region and attempting to radicalise local jihadists - have led Poland, Hungary, Slovakia and the Czech Republic to adopt important legislation to eliminate this threat. |
Contemporary Terrorism Manifestations (Simple Causal Model Analysis)Nonreviewed - OtherTomáš NovotnýVojenské rozhledy / Czech Military Review Nr. 4/2019, Vol. XXVIII. (LX.): 94-105 The editorial board of Vojenské rozhledy Journal presents an article by General Staff Colonel (plk. gšt.) Tomáš Novotný, currently the Chief of the Department of Strategic Planning (J-5) of the General Staff of the Armed Forces of the Slovak Republic. This article was published in HORYZONTY BEZPIECZEŃSTWA Nr 8 (3) 2017 and it is available online at http://www.prawo.uni.opole.pl/horyzonty_bezp/Nr_8(3)_2017.pdf. The article is very closely linked to the subject of the contribution published in Vojenské rozhledy 3/2019, entitled "Religious Extremism as a Cause of Armed Conflicts: Indicators and Early Warning Systems", and in a certain way it defines its theoretical foundations. |
Czech Defence Policy Assessment in 2017/2018Reviewed - ReviewLukáš Dyčka, Josef ProcházkaVojenské rozhledy / Czech Military Review Nr. 4/2018, Vol. XXVII. (LIX.): 3-19 The research described in this paper was conducted in the framework of institutional research project Strategic Alternatives (STRATAL) within the Centre for Security and Military Strategic Studies of University of Defence, The Czech Republic. Article assesses the development of Czech Defence policy in 2017 and first half of 2018. Authors analyse key change drivers in external environment (security threats, EU strategic autonomy, transatlantic link). In second step authors evaluate measures taken in political, military, administrative, economical and societal domain in response to key change drivers and highlight related risks to effective defence policy formulation and implementation. |
Integrating Emerging Technologies in Military Maintenance and Repairs: An Overview of Current Status, Opportunities and ChallengesReviewed - ReviewMilan Vábek, Ondřej Novosad, Miroslav Pecina, Jan KotisaVojenské rozhledy / Czech Military Review Nr. 3/2024, Vol. XXXIII. (LXV.): 62-75 Maintenance and repair (M&R) of military equipment are crucial for operational readiness. The article highlights challenges faced by military forces, particularly in the US, with significant equipment non-operable due to inefficient M&R. It emphasizes modernizing M&R through Predictive Maintenance (PM) and 3D Printing (AM). PM employs AI and data analytics for real-time monitoring and foreseeing malfunctions, signifying a strategic shift in M&R. AM significantly curtails downtime by enabling on-demand spare parts production, presenting a solution to traditional military M&R challenges. The article also underscores the economic advantages and potential for operational efficiency improvements through these technologies. However, it points out hurdles in implementing PM and AM, including high initial costs, lack of trained personnel, and the threat of counterfeit production in AM. |
Situation Analysis of the Security Education and Training System in the Republic of BulgariaReviewed - ResearchStoyko Stoykov, Elitsa PetrovaVojenské rozhledy / Czech Military Review Nr. 2/2023, Vol. XXXII. (LXIV.): 67-82 The purpose of the article is to present a situational analysis of the education and training system in the field of security in the Republic of Bulgaria in 2021, in which internal and external threats, strengths and weaknesses, problem areas and possible solutions will be highlighted. The subject of the article is the education and training system, as the specific subject is the education and training system in the field of security in the Republic of Bulgaria. |
Hybridni hrozby - vcera, dnes a zitra - pohled z PrahyNonreviewed - OtherVojenské rozhledy / Czech Military Review Nr. 4/2018, Vol. XXVII. (LIX.): 161-166 |
Security Threats from Inside: Scenario "Extremism in Being and Coexistence with Romany Ethnic Group and Migrants"Military sociologyPhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 2/2012, Vol. XXI. (LIII.): 143-154 At first, we are familiarised with terms of extremism, Romanies (Gypsies), anarchists, neo-Nazis, then the author introduces possible picture of security situation at the turn of second and third decades of 21st century. He believes that in every country there is a limited ability to integrate ethnic groups by majority. As soon as the limits are exceeded, problems begin. His scenario ends with a pessimistic vision: increasing tensions will ask army deployment, but even local armed forces are not able to enforce law and order, therefore the government must ask for help neighbouring states. |
The UN and NATO as the Main Pillars of the International Security Architecture with a Focus on the Middle East RegionReviewed - ResearchYvona Novotná-ŠabackáVojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 18-35 This study provides a summary overview of the creation and the activities of the international security architecture in the form of their two main pillars, i.e. the United Nations and the North Atlantic Treaty Organization in the Near and Middle East region. Within the framework of international security relations, this is a very unstable and conflictual region, where this instability has lasted practically since the establishment of the State of Israel in 1948. The global UN, its overall activity and importance, especially humanitarian and peace-building activities not only for the Near and Middle East region, is very beneficial, through out the Cold War period up to the present day. As a security organization, NATO is among the most important global actors influencing current international security relations. Through their activities, both of these organizations represent a essential means of ensuring world peace and security. |
Present Trends, Emergencies and Their Impact on Supply Chain SecurityReviewed - ResearchDušan Repík, Natálie Hanáková, Jan Kotisa, Pavel FoltinVojenské rozhledy / Czech Military Review Nr. 3/2023, Vol. XXXII. (LXIV.): 63-81 The article examines the impact of recent geopolitical, economic, and security changes on logistics support capabilities in EU and NATO member states. The study analyzes the effects of the COVID-19 pandemic and the armed conflict in Ukraine on logistics supply chains, considering environmental, social, and security concerns. The research questions focus on identifying the main changes and assessing their implications for commercial, military, and humanitarian logistics. The prolongation of the conflict in Ukraine and the economic sanctions imposed on Russia have been found to have a significant impact on logistics capabilities, perceptions of the structure of supply chains and the risks arising from this. The impact of these events is also producing third-country poverty and dehumanizing the UN SDG goals. On the other hand, improvements in NATO troop readiness and weaponry have been noted. The study highlights the need for further research to investigate specific threats for different types of supply chains and to consider the complex and evolving nature of the issue. Ultimately, this research provides insights into the challenges and opportunities facing logistics capabilities in the context of ongoing geopolitical and environmental changes. |
Update on the United States Nuclear Strategy: from NPR 2018 to NPR 2022Reviewed - ResearchAdam PotočňákVojenské rozhledy / Czech Military Review Nr. 2/2023, Vol. XXXII. (LXIV.): 3-22 The article follows the author's comparative analysis of American and Russian nuclear doctrines and armaments from the fall of 2021. It presents the current nuclear strategy of the United States of America based on a content analysis of three specific areas of the updated version of the Nuclear Posture Review. Applying interpretive analysis and a rich secondary sources apparatus, the author also reflects on his 2021-formulated assumptions and expectations about the further development of American nuclear strategy under President Joe Biden. The author analyzes the influence of the presidential administration's ideological and political ambitions together with the decisive geopolitical events of 2022 and concludes that mainly due to the second factor, the current shape of American nuclear strategy has not undergone any revolutionary changes and continues to maintain a long-standing continuity and consensus about its basic principles. |
Reviewed |
Social Media as a Tool for Profiling Potential Intelligence Service Sources. How are the Military Students Doing?ReviewedLibor KutějVojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 24-36
|
Security Preconditions and Threats (Economy, Religious and Cybernetic Menaces)PhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 2/2011, Vol. XX. (LII.): 38-52 One of main task while preparing new security documents is to identify, analyze and evaluate newly emerging, self-generating security threats. They menace cybernetic, economy, bank, and religious security. The special menace, as for inner security it is lobbyism. Cybernetic threat is today regarded as more dangerous than nuclear strike. The American lived through those experiences in Iraq. Another example is cyber attacks on Estonia in 2007 that swamped websites of Estonian organizations, including Estonian parliament, banks, ministries, newspapers and broadcasters.The attacks triggered a number of military organisations around the world (including NATO) to reconsider the importance of network security to modern military doctrine. There is a paradigm: the more modern country, the more risks are opened. The situation is complicated by the fact that in sophisticated society there is hard to identify attacking enemy. The author underlines that we are the last member nation in the EU that has no official CSIRT (Computer Security Incident Response Team) to react cyber /terrorist attracts. |
Arson Attacks in Israel - History and Options for the Elimination of Inincendiary BalloonsReviewed - ReviewAlena Slavíková, Martin Křepský, František Racek, Antonín NovotnýVojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 130-146 The article concerns the issue of arson attacks in Israel.The issue of terrorism in Israel is quite broad, given that it is a very common phenomenon here and Israel deals with terrorism on a daily basis. The paper therefore focuses on incendiary balloons, a weapon that repeatedly caused fires around the Gaza Strip between 2018-2023. It examines their history, their design, outlines the possibilities of their elimination, the advantages and disadvantages of possible technical solutions, and a reflection on the future of their usage. |
Reviewed - Research |
Internet of Things Vulnerabilities in Military EnvironmentsReviewed - ReviewAndras TothVojenské rozhledy / Czech Military Review Nr. 3/2021, Vol. XXX. (LXII.): 45-58 IoT devices (sensors, drones, cameras) are gaining more and more emphasis on military operations. The application of IoT elements in the military environment increases situational awareness and supports the acquisition and maintenance of information superiority. The information they provide about the enemy, the area of operations, and the location and status of our soldiers and assets can contribute to the successful execution of operations at the tactical, operational and strategic levels. However, they can also pose serious threats if their vulnerabilities allow the data they collected to leak or they provide access to the info-communication networks used for the enemy. In this article, the author examined the vulnerabilities of these IoT devices using keyword analysis. After drawing conclusions from the analysis of the relevant literature, he compared the results with the general-purpose IoT threats and attacks typical of today, like distributed denial of service attacks, security, software, security and privacy issues. |
The New Wars: Terrorism and "Asymmetric" WarfareReviewed - ReviewAlexander TreiblmajerVojenské rozhledy / Czech Military Review Nr. 4/2021, Vol. XXX. (LXII.): 93-108 The term "new wars" is often used to describe how terrorist groups achieve objectives in addition to the "classic" means of intervention by states. Terrorist organizations use asymmetric methods of warfare to target the weaknesses of Western states. Consequently, conventional wars have also changed into hybrid wars. The legal status of terrorist organizations is a major problem for the rule of law. In responding to terrorist attacks, the distinction between crime and terrorism is difficult. The "war on terror" is governed by different rules and principles and is extremely difficult to wage. Conflicts last a long time and victory against terrorism is rarely possible due to the networked structure of terrorist organizations and the way they intermingle with the population. In addition to an alliance-wide approach, there is a national solution to answer these new threats in form of the comprehensive national defense in Austria. |
From Plan Gideon to Plan Tnufa: Israeli defense strategy and the buildup of the Israeli Defense Forces in the wider context of the Middle East after the Arab SpringReviewed - ResearchĽubomír Zvada, Jiří LachVojenské rozhledy / Czech Military Review Nr. 4/2023, Vol. XXXII. (LXIV.): 24-44 Based on the content analysis method, this study analyzes the first ever published security strategy of the Israel Defense Forces, which was published in 2015. The main objective of the paper is not only to present the circumstances of its creation and discuss the main objectives of this strategic security document, but also to outline the broader geopolitical context from which it emerged. The authors argue that the document primarily emphasized two areas - the use of force and capacity building of the Israeli military. Among other things, the publication of the strategy was intended to have a deterrent effect. In the conclusion, the authors compare the Gideon Plan and its follow-up, the Tnufa Plan, and point to the considerable importance that consensus among political and military elites has in the implementation of such a document and reflect on what lessons and inspiration can be drawn from this case in our geographic space in the process of formulating or reformulating strategic security documents. |
Palestine in a Vicious Circle of Violence, Wars and Terror (1948-2023)Reviewed - ResearchJan EichlerVojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 36-55 This article deals with one of the most explosive areas of the world today, which is the Near and Middle East (NMEA) and especially the territory of historical Palestine, where the Israeli-Palestinian conflict (IPC) has been going on for a long time. The text deals primarily with historical and military factors and is written as a historical explanatory analysis. It focuses on the most significant historical events and explains the ways of functioning and the consequences of the processes that have been taking place there for a long time. |
Deepfake as an Advanced Manipulative Technique for Spreading PropagandaReviewed - ReviewMartin HavlíkVojenské rozhledy / Czech Military Review Nr. 1/2023, Vol. XXXII. (LXIV.): 3-16 The article describes the basic foundations and significance of the manipulative technique called Deepfake, which in the environment of technological and informational expansion is also becoming a widely used tool for spreading propaganda. This advanced manipulation complements a wider spectrum of forms of disinformation and is increasingly being used as a means of conducting information operations, often as part of wider hybrid warfare. Effectively combating this kind of manipulation places high demands on consumers of information, both on the part of the detection tools used and on the part of the cognitive human approach based on critical thinking. The expansion and sophistication of similar manipulative techniques will continue, in connection with the development of modern technologies and the interconnectedness of the information environment. Although the Deepfake technique is not only associated with security-military aspects, its influence on information operations and hybrid warfare cannot be neglected. |
Strategic Surprise and Implications for State DefenseReviewed - ResearchRadek Dubec, Roman JandaVojenské rozhledy / Czech Military Review Nr. 4/2023, Vol. XXXII. (LXIV.): 140-154 The article is based on a study carried out as part of the Long-Term Organizational Development Plan project by the Center for Security and Military-Strategic Studies of the University of Defense entitled "Armed Conflict". As part of the study, the issue of strategic surprise was analyzed and assessed, the aim of which was to find causal mechanisms and connections between the security of state defense and the phenomenon of surprise in the conditions of the 21st century. The article deals with the issue of surprise and its impact on state defense security. It describes strategic surprise as a principled aspect with implications and impacts on state defense. It examines the issue of surprise as a principle of military art in the context of contemporary strategic thinking. |
Black Sea Dimension of Ukraine WarReviewed - Reviewdoc. PhDr. Jan Eichler, CSc.Vojenské rozhledy / Czech Military Review Nr. 1/2016, Vol. XXV. (LVII.): 6-23 The article is based on the positions of neo-realism, namely in the works by S. Walt and J. Mearsheimer. It characterizes the key actors of the war in Ukraine, which is a result of a long-term geopolitical competition between the USA and RF in the Black Sea region. The NATO enlargement in the area is classified as a non-coercive Expansion by Invitation (articulated by the elites of the former member states of the USSR and Warsaw Pact), which has provoked growing irritation of Russian political and military elites and the following hybrid war with dramatic international consequences. Last but not least, the article analyses military incidents and resulting security threats and challenges. |

