Vojenské Rozhledy

Czech Military Review

Fulltext search in archive



« advanced mode »

    1  2   3   4   5   6   7   8   9   10   11   ...    next 

Results 1 to 30 of 746:

Threats and Hazards of Grey Rhino Paradigm

Reviewed - Research

Olga Burianová, Jiří F. Urbánek

Vojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 85-96

Grey Rhino is a metaphor for security threat, which is unkept irrational for large extent also high probability of harmful effect on a subject of risk owner. Business continuity management system is assessed in a diagram as controlling instrument aimed at operational hazard mitigation of continuity disturbance of affected subject. A ´from Operations´ Value Added - O´VA is established as qualitative dynamic information about productivity of activities. The measures are designed in crisis scenario for quality improvement of subject´s crisis readiness. An indicator of business risk continuity slip is defined. In a connection with war conflict on Ukraine is assessed if it is Grey Rhino manifestation.

Scenarios, Development, Internal Structure Scenarios and Security Threats

Reviewed - Review

Josef Melichar

Vojenské rozhledy / Czech Military Review Nr. 2/2017, Vol. XXVI. (LVIII.): 18-32

The article deals with the topic of scenarios in relation to their significance, internal structure development and the way of elaborating scenarios following links to security threats and mission types. Article describes possible way of structuring set of scenarios reflecting security threats stated in The Security strategy of the Czech Republic and corresponding mission types. Main methodology exploited during the work with the topic of scenarios was document analysis, which resulted in finding, that scenarios don't enjoy appropriate attention in the defence resort of the Czech Republic, scenarios are not elaborated and thus not exploited. The article deals in the conclusion with propositions aiming at elaborating scenarios with purposefull internal structure, elaborating security threats and reflecting mission types.


Cognitive Resilience Education in the Czech Military: SWOT Analysis

Reviewed - Research

Vladimír Bízik, Dominika Kosárová, Vendula Divišová, Adam Potočňák

Vojenské rozhledy / Czech Military Review Nr. 2/2025, Vol. XXXIV. (LXVI.): 98-116


This article presents the first systematic analysis of cognitive resilience education within the Czech Ministry of Defence, which is growing in importance in the context of contemporary hybrid threats. Through methodological triangulation (document analysis, questionnaires, interviews), the research maps the coverage of relevant topics across all levels of formal military education. The SWOT analysis reveals both existing foundations for cognitive resilience development and the absence of a systematic approach to this issue. The results highlight three main challenges for transforming the educational system: systematisation of the approach, personnel resources, and infrastructure modernisation. The study establishes an empirical basis for strategic recommendations to strengthen military personnel resilience against information and psychological operations.

Security, Threats, and Risk in the 21st Century

Nonreviewed - Other

Vojenské rozhledy / Czech Military Review Nr. 3/2014, Vol. XXIII. (LV.): 146-148

After the year 1989 many presumed that "the end of history" came about, after the end of cold war no international security risks would arise. Nowadays we see that everything is different. Risks and threats are an inseparable component of humane existence. A working state must be prepared for those risks, which covers even the field of training citizens. The reviewed publication will certainly contribute to better understanding the complexity of present-day world and its security. The book has two independent parts; the first one is politological by Peter Rožňák, the second part deals with professional arms by Ludvík Juříček.

Ludvík Juříček, Petr Rožňák. Bezpečnost, hrozby a rizika v 21. století. 1. vydání. Brno: Key Publishing, 2014, 324 str., ISBN 978-80-7418-201-3.

Impact of the New Technologies on CBRN Terrorist Threats: General Perspective and Perspective of Republic of Croatia

Reviewed - Review

Ivana Cetina, Jugoslav Jozić

Vojenské rozhledy / Czech Military Review Nr. 4/2022, Vol. XXXI. (LXIII.): 119-139

Although the level of the overall CBRN threat in the world is currently considered to be low, there is a trend of a growing concern about CBRN terrorism. Various terrorist groups have shown interest in using CBRN materials to disrupt the global order and economy. The motivation and factors that influence the potential use of CBRN agents in terrorist attacks arise from the fact that CBRN agents have potentially high mortality and can cause serious consequences. A large number of potential dual-use (military and civilian) items as well as the introduction of new technologies in use can be utilized for the CBRN attacks and create a wide range of new possible terrorist (and military) threats. This paper provides a general overview of the past and current situations regarding CBRN terrorism, analyses some of current widely known new technologies that can be utilized for CBRN terrorist attacks and analyses the biggest potential threats from CBRN hazards.

Czech Defense Policy in the Light of Strategic Culture

Reviewed - Research

Vladimír Karaffa, Cyril Svoboda

Vojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 3-23

The article analyzes key aspects of the development of the Czech Republic‘s defense policy since 1989, with a focus on the role of strategic culture. It examines historical, political, and social factors that have shaped the Czech Republic‘s approach to defense and security issues. Special attention is given to the transformation of the Czech Armed Forces, the transition to a professional military model, and responses to changing geopolitical threats. The analysis also considers public perceptions of the military, the influence of historical narratives on strategic culture, and the attitudes of political elites toward defense matters. The article highlights the importance of strategic culture as an analytical framework for understanding long-term trends and the evolution of defense policy, while suggesting potential avenues for future research in the Czech context.

Are There Real Global Catastrophic Biological Risks?

Reviewed

Aleš Macela, Vanda Boštíková

Vojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 55-69


Biosafety and biodefense (i.e. all countermeasures preventing the spread of biological agents in the environment and population) are on the regular agenda of states and their militaries. Somewhat aside are global catastrophic biological risks (GCBR), which can destroy human society as a biological species. Although a precise definition of what constitutes a global catastrophic biological risk is still being sought, it can be considered the impact of potential global catastrophic risks (GCR) on the social, economic and biological structure of human existence. This implies that GCBRs are a subset of GCRs. It is also open to discussion whether in the case of GCBRs the risk must necessarily be biological agents, from viruses to humans, or whether anthropogenic threats can also be accepted as risk factors, or what the impact must be for a risk to be included under the designation GCBR.

Internal Conflicts in Works of Thucydides and Machiavelli

Reviewed - Review

Jakub Šedo

Vojenské rozhledy / Czech Military Review Nr. 1/2020, Vol. XXIX. (LXI.): 85-101

Hybrid threats are considered among the most serious risks that Western societies currently face. The aim of actors using such threats is to influence decision-making processes, and in order to do so they use a rich spectrum of methods to instigate conflict in society, seeking to undermine trust in institutions, abet radicalisation, and so on. Activities aimed at creating internal conflict, and the prevention of such activities, are not, of course, a new phenomenon; they differ only in their extent, intensity and the techniques used. The aim of this paper is to investigate how classic strategists - Thucydides and Machiavelli - described in their works how internal conflict is fomented among the enemy and how it can be prevented. The paper describes and analyses various ways of instigating and mitigating internal conflict as noted in their works, and assesses their relevance for the current debate.

Jihadist Foreign Terrorist Fighters: Contemporary Threats and Challenges in East Central Europe

Reviewed - Review

Miroslav Mareš

Vojenské rozhledy / Czech Military Review Nr. 3/2019, Vol. XXVIII. (LX.): 3-15

This paper deals with the phenomenon of Jihadist foreign terrorist fighters from the perspective of East Central European countries. Over the past decade, the term 'foreign terrorist fighter' has become established in scholarly literature, international law and the popular consciousness. Today, Jihadist foreign terrorist fighters are closely watched globally for the security threat they pose. Although the greatest danger in Europe is seen to be to nations in the west, several cases in East Central Europe - involving terrorists travelling through the region and attempting to radicalise local jihadists - have led Poland, Hungary, Slovakia and the Czech Republic to adopt important legislation to eliminate this threat.

Contemporary Terrorism Manifestations (Simple Causal Model Analysis)

Nonreviewed - Other

Tomáš Novotný

Vojenské rozhledy / Czech Military Review Nr. 4/2019, Vol. XXVIII. (LX.): 94-105

The editorial board of Vojenské rozhledy Journal presents an article by General Staff Colonel (plk. gšt.) Tomáš Novotný, currently the Chief of the Department of Strategic Planning (J-5) of the General Staff of the Armed Forces of the Slovak Republic. This article was published in HORYZONTY BEZPIECZEŃSTWA Nr 8 (3) 2017 and it is available online at http://www.prawo.uni.opole.pl/horyzonty_bezp/Nr_8(3)_2017.pdf. The article is very closely linked to the subject of the contribution published in Vojenské rozhledy 3/2019, entitled "Religious Extremism as a Cause of Armed Conflicts: Indicators and Early Warning Systems", and in a certain way it defines its theoretical foundations.
This article briefly describes and puts together conclusions of the Copenhagen Peace Research Institute' key publications, which were released within the transformation of the Security Studies at the turn of the millennium, with conclusions of the UN Human Security Concept that was successfully institutionalized in 2012. Afterwards, the "Copenhagen School" methodology was applied on the UN Human Security Concept to identify a set of human security challenges and threats, which have been - after analysis of their causal relationship - supplemented by a causal classification. Most security threats create a causal link with one or more other security threats. This fact implies that there is a possibility to create a causal model (mental, graphic, etc.) of any security threat to simulate or to predict the consequences and successfulness / efectivity of a suggested security solution (securitizating or de-securitizating). As a practical subject of a security threat causal analysis was used the model of processes on the way "from a state failure to a terrorism manifestation" adapted to contemporaty situation in the European Union.

Czech Defence Policy Assessment in 2017/2018

Reviewed - Review

Lukáš Dyčka, Josef Procházka

Vojenské rozhledy / Czech Military Review Nr. 4/2018, Vol. XXVII. (LIX.): 3-19

The research described in this paper was conducted in the framework of institutional research project Strategic Alternatives (STRATAL) within the Centre for Security and Military Strategic Studies of University of Defence, The Czech Republic. Article assesses the development of Czech Defence policy in 2017 and first half of 2018. Authors analyse key change drivers in external environment (security threats, EU strategic autonomy, transatlantic link). In second step authors evaluate measures taken in political, military, administrative, economical and societal domain in response to key change drivers and highlight related risks to effective defence policy formulation and implementation.

Integrating Emerging Technologies in Military Maintenance and Repairs: An Overview of Current Status, Opportunities and Challenges

Reviewed - Review

Milan Vábek, Ondřej Novosad, Miroslav Pecina, Jan Kotisa

Vojenské rozhledy / Czech Military Review Nr. 3/2024, Vol. XXXIII. (LXV.): 62-75

Maintenance and repair (M&R) of military equipment are crucial for operational readiness. The article highlights challenges faced by military forces, particularly in the US, with significant equipment non-operable due to inefficient M&R. It emphasizes modernizing M&R through Predictive Maintenance (PM) and 3D Printing (AM). PM employs AI and data analytics for real-time monitoring and foreseeing malfunctions, signifying a strategic shift in M&R. AM significantly curtails downtime by enabling on-demand spare parts production, presenting a solution to traditional military M&R challenges. The article also underscores the economic advantages and potential for operational efficiency improvements through these technologies. However, it points out hurdles in implementing PM and AM, including high initial costs, lack of trained personnel, and the threat of counterfeit production in AM.

Situation Analysis of the Security Education and Training System in the Republic of Bulgaria

Reviewed - Research

Stoyko Stoykov, Elitsa Petrova

Vojenské rozhledy / Czech Military Review Nr. 2/2023, Vol. XXXII. (LXIV.): 67-82

The purpose of the article is to present a situational analysis of the education and training system in the field of security in the Republic of Bulgaria in 2021, in which internal and external threats, strengths and weaknesses, problem areas and possible solutions will be highlighted. The subject of the article is the education and training system, as the specific subject is the education and training system in the field of security in the Republic of Bulgaria.

Hybridni hrozby - vcera, dnes a zitra - pohled z Prahy

Nonreviewed - Other

Vojenské rozhledy / Czech Military Review Nr. 4/2018, Vol. XXVII. (LIX.): 161-166

The UN and NATO as the Main Pillars of the International Security Architecture with a Focus on the Middle East Region

Reviewed - Research

Yvona Novotná-Šabacká

Vojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 18-35

This study provides a summary overview of the creation and the activities of the international security architecture in the form of their two main pillars, i.e. the United Nations and the North Atlantic Treaty Organization in the Near and Middle East region. Within the framework of international security relations, this is a very unstable and conflictual region, where this instability has lasted practically since the establishment of the State of Israel in 1948. The global UN, its overall activity and importance, especially humanitarian and peace-building activities not only for the Near and Middle East region, is very beneficial, through out the Cold War period up to the present day. As a security organization, NATO is among the most important global actors influencing current international security relations. Through their activities, both of these organizations represent a essential means of ensuring world peace and security.

Security Threats from Inside: Scenario "Extremism in Being and Coexistence with Romany Ethnic Group and Migrants"

Military sociology

PhDr. Antonín Rašek

Vojenské rozhledy / Czech Military Review Nr. 2/2012, Vol. XXI. (LIII.): 143-154

At first, we are familiarised with terms of extremism, Romanies (Gypsies), anarchists, neo-Nazis, then the author introduces possible picture of security situation at the turn of second and third decades of 21st century. He believes that in every country there is a limited ability to integrate ethnic groups by majority. As soon as the limits are exceeded, problems begin. His scenario ends with a pessimistic vision: increasing tensions will ask army deployment, but even local armed forces are not able to enforce law and order, therefore the government must ask for help neighbouring states.

Present Trends, Emergencies and Their Impact on Supply Chain Security

Reviewed - Research

Dušan Repík, Natálie Hanáková, Jan Kotisa, Pavel Foltin

Vojenské rozhledy / Czech Military Review Nr. 3/2023, Vol. XXXII. (LXIV.): 63-81

The article examines the impact of recent geopolitical, economic, and security changes on logistics support capabilities in EU and NATO member states. The study analyzes the effects of the COVID-19 pandemic and the armed conflict in Ukraine on logistics supply chains, considering environmental, social, and security concerns. The research questions focus on identifying the main changes and assessing their implications for commercial, military, and humanitarian logistics. The prolongation of the conflict in Ukraine and the economic sanctions imposed on Russia have been found to have a significant impact on logistics capabilities, perceptions of the structure of supply chains and the risks arising from this. The impact of these events is also producing third-country poverty and dehumanizing the UN SDG goals. On the other hand, improvements in NATO troop readiness and weaponry have been noted. The study highlights the need for further research to investigate specific threats for different types of supply chains and to consider the complex and evolving nature of the issue. Ultimately, this research provides insights into the challenges and opportunities facing logistics capabilities in the context of ongoing geopolitical and environmental changes.

Starting Points for the Preparation of Updated Security Strategy of the Czech Republic 2011

Reviewed

PhDr. Miloš Balabán, Ph.D., PhDr. Antonín Rašek

Vojenské rozhledy / Czech Military Review Nr. 2/2011, Vol. XX. (LII.): 3-19

In our country, existing strategical documents related to security used to be compiled very carefully, but proved to be not very effective, as they did not fit to practical everyday security policy, they did not comply with day-to-day requirements. The only exception was the 1991 doctrine dealing with the creation of Integrated Rescue System and the implementation of professional armed forces. At present, there is a tendency to rewrite those strategy documents again, namely in the field of security. The preparation of a new version of Czech security strategy is taking place in time marked with new trends in world politics and economy. The main attention is attracted by crisis management, arms control, disarmament, WMD non-proliferation, cooperation with non-NATO nations, and international organizations, last but not least counterterrorism and cyberspace security strategy. In short the study mentions Czech political-military ambitions, defence strategy, defence capacity and resources, it appreciates in value knowledge gained by the Centre of Security Policy, Faculty of Social Science, Charles University Prague, and it contains conclusions and recommendations for the preparation the 2011 Czech National Security Strategy.

Up-to-date Trends and Shifts in Global Security Environment

Reviewed - Review

PhDr. Miloš Balabán, Ph.D.

Vojenské rozhledy / Czech Military Review Nr. 2/2012, Vol. XXI. (LIII.): 17-25

The beginning of the second decade of 21st century is tied with distinctive dynamics and changes in global security environment. Among those changes belong security re-orientations of the United States from Transatlantic area to that of Pacific, East and Southeast Asia resulting from a new American military strategy proclaimed in January 2012. The US drew down from Iraq and Afghanistan, political and security movement in Arab world, after decades of "status quo" were awaking. The author concludes that the EU should be prepared for negative scenarios in the development of security situation, or to have at its disposal effective police and military forces with proper humanitarian background to counter possible instability, e.g. massive migration influxes, economy disorders.

One World, Many Problems (Obama in the Second Half of his Term)

Reviewed - Review

PhDr. Antonín RAŠEK

Vojenské rozhledy / Czech Military Review Nr. 1/2012, Vol. XXI. (LIII.): 3-20

In the middle of Obama's first presidency, several waves of criticism turned up. According to some analysts, Barrack Obama's first presidency introduces the beginning of new world's era, the so-called "post-ethnical society". The latest discussions prove that the United States have been no longer the only world's superpower, they will remain in the position of world's leader, but still aregoing to substantionally influence global arrangement. Unsuccessful and protracted wars, reflecting serious economic depression with successive debts, effect military budget cuts, even though the American Armed forces are still powerful, potent and mighty power, all around the world, influencing word's events as a stabilising force. The study depicts political and security layout against American domestic political background.


Possibilities of Using Ground Robotic Systems as an Element of Protection of Static Military Objects

Reviewed - Research

Jan Nohel, Daniel Srb, Jan Hrdinka, Michal Hrnčiar

Vojenské rozhledy / Czech Military Review Nr. 2/2025, Vol. XXXIV. (LXVI.): 179-200


The article deals with the possibilities of protecting the outer perimeter of static military facilities using ground-based unmanned systems that can complement the already existing protective elements. The conclusions reached and theoretical assumptions were experimentally verified in the field during the protection of a small base, using UGS Taros Furbo and Tactical Decision Support System calculations. The protection routes calculated by the system were then practically implemented by dismounted patrols and autonomous UGS Taros Furbo, focusing on terrain traversability and time of overcoming. The main objective of the paper is to present to the military public the current possibilities of deploying UGS Taros Furbo in the protection of static military facilities such as command posts or bases. Their use can significantly reduce the requirements for the deployment of dismounted patrols to protect the outer perimeter.

Update on the United States Nuclear Strategy: from NPR 2018 to NPR 2022

Reviewed - Research

Adam Potočňák

Vojenské rozhledy / Czech Military Review Nr. 2/2023, Vol. XXXII. (LXIV.): 3-22

The article follows the author's comparative analysis of American and Russian nuclear doctrines and armaments from the fall of 2021. It presents the current nuclear strategy of the United States of America based on a content analysis of three specific areas of the updated version of the Nuclear Posture Review. Applying interpretive analysis and a rich secondary sources apparatus, the author also reflects on his 2021-formulated assumptions and expectations about the further development of American nuclear strategy under President Joe Biden. The author analyzes the influence of the presidential administration's ideological and political ambitions together with the decisive geopolitical events of 2022 and concludes that mainly due to the second factor, the current shape of American nuclear strategy has not undergone any revolutionary changes and continues to maintain a long-standing continuity and consensus about its basic principles.

Security Preconditions and Threats (Economy, Religious and Cybernetic Menaces)

PhDr. Antonín Rašek

Vojenské rozhledy / Czech Military Review Nr. 2/2011, Vol. XX. (LII.): 38-52

One of main task while preparing new security documents is to identify, analyze and evaluate newly emerging, self-generating security threats. They menace cybernetic, economy, bank, and religious security. The special menace, as for inner security it is lobbyism. Cybernetic threat is today regarded as more dangerous than nuclear strike. The American lived through those experiences in Iraq. Another example is cyber attacks on Estonia in 2007 that swamped websites of Estonian organizations, including Estonian parliament, banks, ministries, newspapers and broadcasters.The attacks triggered a number of military organisations around the world (including NATO) to reconsider the importance of network security to modern military doctrine. There is a paradigm: the more modern country, the more risks are opened. The situation is complicated by the fact that in sophisticated society there is hard to identify attacking enemy. The author underlines that we are the last member nation in the EU that has no official CSIRT (Computer Security Incident Response Team) to react cyber /terrorist attracts.


Military or Militancy: How to Navigate Media Objectivity in Reporting on National Security

Reviewed

Sidra Agha

Vojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 37-54


This study aimed to explore the media’s perception of the military and militant activities, focusing on journalists’ professional conduct and their commitment to the national cause. In-depth interviews were conducted with Pakistani journalists reporting from conflict zones. The findings suggest that Pakistan is engaged in a war on terror and that the media plays a key role in glorifying the security forces in their fight against militants who challenge the authority of the state. Journalists expressed the view that the government and military should take realistic measures to combat this threat. While journalists described militants as terrorists, they also noted that their professionalism is often influenced by patriotism and a national duty to serve the country. However, objectivity remained a key element of their reporting. The media, considered the fourth pillar of the state, should have the necessary freedom to report on conflicts. At the same time, self-censorship was considered necessary to prevent content that could lead to radicalization.

Arson Attacks in Israel - History and Options for the Elimination of Inincendiary Balloons

Reviewed - Review

Alena Slavíková, Martin Křepský, František Racek, Antonín Novotný

Vojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 130-146

The article concerns the issue of arson attacks in Israel.The issue of terrorism in Israel is quite broad, given that it is a very common phenomenon here and Israel deals with terrorism on a daily basis. The paper therefore focuses on incendiary balloons, a weapon that repeatedly caused fires around the Gaza Strip between 2018-2023. It examines their history, their design, outlines the possibilities of their elimination, the advantages and disadvantages of possible technical solutions, and a reflection on the future of their usage.

Social Media as a Tool for Profiling Potential Intelligence Service Sources. How are the Military Students Doing?

Reviewed

Libor Kutěj

Vojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 24-36


The article addresses the use of social media intelligence (SOCMINT) as a tool for recruiting and selecting souces by foreign intelligence services, with an emphasis on the risks it poses to students in military studies at national military universitiy. It analyzes the specific ways in which SOCMINT enables foreign intelligence agencies to effectively gather personal data and profile potential collaborators from both public and private information shared online. Research conducted among students of the University of Defense and other institutions revealed that military students share comparable types of information on social networks as their civilian peers, making them equally vulnerable to the activities of foreign intelligence services. However, military students are preparing for careers in defense and security, making them a significantly more attractive target for foreign intelligence agencies than other categories of employees.

The New Wars: Terrorism and "Asymmetric" Warfare

Reviewed - Review

Alexander Treiblmajer

Vojenské rozhledy / Czech Military Review Nr. 4/2021, Vol. XXX. (LXII.): 93-108

The term "new wars" is often used to describe how terrorist groups achieve objectives in addition to the "classic" means of intervention by states. Terrorist organizations use asymmetric methods of warfare to target the weaknesses of Western states. Consequently, conventional wars have also changed into hybrid wars. The legal status of terrorist organizations is a major problem for the rule of law. In responding to terrorist attacks, the distinction between crime and terrorism is difficult. The "war on terror" is governed by different rules and principles and is extremely difficult to wage. Conflicts last a long time and victory against terrorism is rarely possible due to the networked structure of terrorist organizations and the way they intermingle with the population. In addition to an alliance-wide approach, there is a national solution to answer these new threats in form of the comprehensive national defense in Austria.

Emerging New Threats in Unstable World

Reviewed

PhDr. Miloš Balabán, Ph.D., prof. PhDr. Martin Potůček, CSc., MSc., PhDr. Antonín Rašek

Vojenské rozhledy / Czech Military Review Nr. 4/2011, Vol. XX. (LII.): 3-21

The article identifies new threats of global character influencing global security and quality of life. The inspiration is drawn from the debate over proposed updated Czech security strategy 2011, where several security scenarios were drafted. It is a free sequel to the study "Wild Cards in Future Development of World Security" published in this review in No. 2, 2008. The titles of some chapters are as follows: The Collapse of World's Monetary System and Global Economic Warfare, Crisis of Global Government, The Shortage of Key Commodities (oil, gas, coal, raw materials, water, foodstuffs), Migration, Organized Crime, European Union prior to Disintegration, The Crisis of NATO, New Religions, Will Rich People Live Longer?, etc.

Internet of Things Vulnerabilities in Military Environments

Reviewed - Review

Andras Toth

Vojenské rozhledy / Czech Military Review Nr. 3/2021, Vol. XXX. (LXII.): 45-58

IoT devices (sensors, drones, cameras) are gaining more and more emphasis on military operations. The application of IoT elements in the military environment increases situational awareness and supports the acquisition and maintenance of information superiority. The information they provide about the enemy, the area of operations, and the location and status of our soldiers and assets can contribute to the successful execution of operations at the tactical, operational and strategic levels. However, they can also pose serious threats if their vulnerabilities allow the data they collected to leak or they provide access to the info-communication networks used for the enemy. In this article, the author examined the vulnerabilities of these IoT devices using keyword analysis. After drawing conclusions from the analysis of the relevant literature, he compared the results with the general-purpose IoT threats and attacks typical of today, like distributed denial of service attacks, security, software, security and privacy issues.

Strategic Defence Analysis and Setting the Future Defence Strategy: A Comparison of the Czech Republic and Norway

Reviewed - Research

Josef Melichar, Fabian Baxa, Vladimír Vyklický, Josef Procházka

Vojenské rozhledy / Czech Military Review Nr. 1/2024, Vol. XXXIII. (LXV.): 21-39

The article brings a comparison of the approaches to the strategic defence analysis (SDA) and developing future Defence Concepts (DFDC) of the Czech Republic and Norway. The countries are in a different geopolitical situation, NOR being a country with borders that are part of the outer border of the Alliance, the Czech Republic being a country surrounded by three member countries of the Alliance and one PfP country. On the basis of the comparison of the two approaches, the authors identified differences and common points of the two. Based on the findings, the discussion provides inspiration for possible enhancements in the approach of the Czech Republic to SDA to ensure the future defence of the country. All that in context of current Security developments in Europe, that have an impact on how NATO member countries might deal with Article 3 and Article 5 of the Washington Treaty.

    1  2   3   4   5   6   7   8   9   10   11   ...    next