Vojenské Rozhledy

Czech Military Review

Fulltext search in archive



« advanced mode »

Results 1 to 14 of 14:

Situational Awareness and Current Information Environment

Reviewed - Review

Fiebich Marek

Vojenské rozhledy / Czech Military Review Nr. 3/2020, Vol. XXIX. (LXI.): 25-40 | DOI: 10.3849/2336-2995.29.2020.03.025-040

The article deals with providing situational awareness in operations at the operational level of command in the context of the information environment, the current nature of which significantly affects the execution of this capability. It examines the influence of three selected aspects - information overload, the expansion of advanced information technology and the growing importance of the cyber domain - on generating, maintaining and sharing situational awareness in planning and conduct of operations. It identifies and characterizes the respective sub-capabilities within the information area, necessary for operational headquarters to effectively provide situational awareness, and outline possible ways to develop these capabilities in terms of internal processes, technical equipment and personnel.

Resistance Operating Concept as a Tool for Increasing the Resilience of the State

Reviewed

Radek Dubec, Eva Nezvalová, Markéta Licková

Vojenské rozhledy / Czech Military Review Nr. 4/2024, Vol. XXXIII. (LXV.): 3-19 | DOI: 10.3849/2336-2995.33.2024.04.003-019

The article describes the issue of implementing the Resistance Operating Concept as part of a comprehensive approach to ensuring the defense of the state and its resilience. The basic conditions necessary for the introduction of that instrument are sought, and a comparative analysis of selected European countries that started to build a resistance movement is carried out. The article further describes the strategic definition of the resistance movement in the conditions of the Czech Republic, the legislative definition of the resistance movement and its anchoring in the framework of mental law, and the connection of the resistance movement to individual phases of the conflict. It analyzes the relationship of the resistance movement to individual phases of the conflict and categorizes the actors of the resistance movement, their roles and the methods used. In conclusion, it defines the necessary conditions for the implementation of the resistance movement into the security and defense system of the state.

Cyberspace as a "Fifth Domain"?

Reviewed - Review

Mgr. Martin Bastl, Ph.D., Zuzana Gruberová

Vojenské rozhledy / Czech Military Review Nr. 4/2013, Vol. XXII. (LIV.): 10-21 | DOI: 10.3849/2336-2995.22.2013.04.010-021

The aim of the article is to present an up-to-date discussion on cyberspace as a new, fifth domain of warfare. The reader is provided with the concept of cyberspace, its current interpretation, primarily in American doctrines and military theory. The army mission is contextually mentioned as well, explicitly the limits of Czech forces capacity. The paper deals with the form of cyberspace and its characteristics in the context of military operations. It advocates the idea of cyberspace as a war domain, which is presented together with the criticism to such approach. The article concludes with the summary and evaluation of both sides' arguments, taking into account the specific role and abilities of armed forces.

Czech Foreign Fighters in the Ukrainian Conflict: Legal Aspects and Propagandist Use

Reviewed - Review

Miroslav Mareš

Vojenské rozhledy / Czech Military Review Nr. MC/2017, Vol. XXVI. (LVIII.): 71-82 | DOI: 10.3849/2336-2995.26.2017.05.071-082

This article deals with the phenomenon of Czech foreign fighters in the Ukrainian conflict, mostly from the point of view of the propagandist use and from the point of view of the Czech penal law. Both issues are interconnected, because according to the Czech law, service in foreign armies or in terrorist entities can be penalised. On the other hand, foreign fighters can be assessed as an important propagandist element and their participation in the conflict can strengthen the political position of the warring party. This tension between these legal impacts and the propagandist use creates the main theme of this article. The concept of hybrid warfare frames the current development. The author comes to the conclusion that the legal consequences pose only a limited obstacle for the propagandist use.

Major Trends in the Military Budgets of the United States and the Russian Federation in the 21st century

Reviewed - Review

Jana Stehlíková

Vojenské rozhledy / Czech Military Review Nr. 1/2021, Vol. XXX. (LXII.): 3-20 | DOI: 10.3849/2336-2995.30.2021.01.003-020

Government expenditures allocated for defence are one of the categories comparable between countries to observe and analyse long-term trends. The paper compares the defence budgets of the USA and the Russian Federation between 2000 to 2019 with the aim to analyse potential causes of fluctuations in defence spending. The purpose of the paper is to demonstrate that military budgets are dependent on a combination of various factors such as current domestic policy, the economic cycle and global security and economic issues. The work uses significant as historical milestones to analyses their impacts on the dependent variable of military budget. As these, Operation Enduring Freedom (2001), Iraq war (2003), the inauguration of the US Presidents Barack Obama and Donald Trump, the economic crisis (2007-2008), the Russian currency crisis (2014) and the Russian annexation of Crimea (2014) were identified.

Concepts of the Hybrid Warfare and the Czech Armed Forces

Reviewed - Review

Martin Havlík

Vojenské rozhledy / Czech Military Review Nr. 1/2021, Vol. XXX. (LXII.): 38-51 | DOI: 10.3849/2336-2995.30.2021.01.038-051

The goal of this review article is to briefly describe the development trends in the conceptualization of the phenomenon of hybrid warfare and to try a basic comparison of the key features of twenty important concepts with emphasis on selected Western, Russian and Chinese theoretical concepts. A substantial part of the article also deals with a closer characterization of hybrid warfare with the intention of clarifying the possible relationship of this type of warfare to the activities of the Czech Armed Forces. In connection with the importance of hybrid warfare and hybrid threats, the article is supplemented with essential recommendations that the Czech Republic and the Czech Armed Forces should reflect. The emphasis on content and the above arguments confirm that looking at the phenomenon of hybrid action and warfare as a novelty is very debatable. Rather than a new concept of warfare, it is a newly accentuated term "hybrid" describing long-known combinations of power tools used.

Analysis and model of Cyber security corps professional development

Reviewed - Review

Petr Františ, Jan Hodický

Vojenské rozhledy / Czech Military Review Nr. 3/2019, Vol. XXVIII. (LX.): 97-116 | DOI: 10.3849/2336-2995.28.2019.03.097-116

The paper deals with the professional development of cyber security corps. In the introduction the individual elements that are active in cyber security are described. Strategic analysis of the education is carried out to define the initial state. The main part of the paper is devoted to the design of the education system. The individual elements are defined in the paper, and the model of relationships between these elements is shaped. The attachment contains complete set of topics and their classification into the strands to fulfil the profile of the cyber security expert.

Recent Objectives of Cyber Defence in the Department of Defence

Reviewed - Review

Miroslav Feix, Salibor Procházka

Vojenské rozhledy / Czech Military Review Nr. 3/2017, Vol. XXVI. (LVIII.): 31-50 | DOI: 10.3849/2336-2995.26.2017.03.031-050

The paper deals with cyber security, cyber defence and operations in cyber space focusing on the department of defence. Tasks implied from the Czech Republic's, NATO's and European Union strategic documents and roles of participating subjects have been analysed. Four scenarios as another source of identified tasks were created and used to describe possible situations requiring cyber defence capabilities. The presented analysis is a prerequisite for specifying required capabilities, and a proposal how to assign roles, responsibilities and required capabilities.

Military Deception in the Information Age

Reviewed - Review

Doc. Ing. Milan Kubeša, CSc.

Vojenské rozhledy / Czech Military Review Nr. 1/2013, Vol. XXII. (LIV.): 160-164 | DOI: 10.3849/2336-2995.22.2013.01.160-164

Infomantion era could be characterized as a period of steem qualitative and quantitative information raise, aroused namely by sharp development of information and comunication technologies (ICT) . Military deception thus acquires new dimensions, wider chances to be employed in armed forces operations. This article concludes a free series of essays dealing with military deceiving. It is thinking over questions resulting from deception-information age relations, the beginnig of which could be situated into the 80s last century.

Virtual University of Jihad: Training and Schooling Islamic Terrorists in Cyberspace

Informational pages

Mgr. Jiří Hodný

Vojenské rozhledy / Czech Military Review Nr. 1/2009, Vol. XVIII. (L.): 115-120

This article is discussing the role of the Internet in the Islamic terrorist movement. It describes how the nature of the Internet provides the perfect medium for terrorism. Major terrorist organizations now have their own production capability, ranging from video capture, to video editing, to distribution, but, these organizations also have an advanced understanding of the concepts of influence, information warfare, and the power of targeted messages. This is further highlighted by the fact that among al Qaeda's original organizational structure was a committee dedicated to publicity and the media. The internet plays the role as a means of propaganda for recruitment and fund-raising, shaping public opinion in the Muslim world, terrorist training and instruction, operational planning for attacks, communication and open source information.

The Cyber War Continues

Informational pages

PhDr. Antonín Rašek

Vojenské rozhledy / Czech Military Review Nr. 4/2012, Vol. XXI. (LIII.): 73-89

The author summarizes present-day knowledge of this problem. Worms and viruses have transformed to serious security challenges and perfect instruments of cyber espionage. They have become a tool in information warfare. Cyberattacks transformed to risks calling only for technical responses. The growing awareness of the seriousness of the cyber-threat is enhanced by incidents, e.g. the malware "Stuxnet" attacking the Iranian nuclear programme. Actually, cyber space is regarded as a fifth dimension of military deployment, apart for land, air, water, and cosmos. Some nations are already investing massively in cyber capabilities that can be used for military purposes. Most Western nations have considerably stepped up their defences in recent years and are forming special units for cyber warfare.

Islamists Online

Informational pages

Jiří Hodný, Ph.D.

Vojenské rozhledy / Czech Military Review Nr. 2/2009, Vol. XVIII. (L.): 70-78

Like hundreds of millions of other people, Islamic terrorists and their supporters use the Internet. In many ways, the Internet is a tool tailor-made for these Islamic extremists, who use it covertly and overtly to plan attacks, raise money, and spread anti-Semitic and anti-American propaganda written in English, Arabic, and other languages. There is sufficient information to believe that in the future, terrorists may even turn the Internet itself into a weapon, using it to wreak havoc on America's critical infrastructure. Because these militants are global, rather than being located in a single geographical area (Pakistan, Indonesia, Somalia, Iraq), the Internet provides them with a new and effective way to attain their goals. It may be difficult to catch extremists planning or coordinating an attack if they are using encryption, steganography, or some other method of hiding their online activities.

Security in the Year 2020 with the Prospects to 2050 (Summary of Security Community Views) - Part One

Military sociology

PhDr. Antonín Rašek

Vojenské rozhledy / Czech Military Review Nr. 1/2006, Vol. XV. (XLVII.): 121-138

Summary of Security Com174 munity Views - Part One. Despite the fact that most of the predictions made in the early 20th century did not realized, there are still plenty of arguments for drawing security prognoses as the only method assessing synthetic alternatives of future progress. The future is not unequivocally determined, as the all comprising development is strongly influenced by subjective motives. We must have scenarios upon which we can act, operate, namely in the field of security. The government ought to set clearly our security agenda, where and why we are going to make possible military engagement. All further actions are developing from those prognoses, i.e. buying tanks, helicopters, parachutes, armoured vehicles, etc. The first part of this security study covers several predictions containing even some controversial visions. They are based upon the opinion survey done among members of Czech military community. The field of investigation comprises EU, US, North Korea, Iran, Iraq, Africa, Asia, even hypothetic Russia-China conflict, terrorism, weapons of mass destruction, and the like.

Vojenstvi jako vyznamny fenomen 21. stoleti

Doc. PhDr. Miroslav Krč, CSc.

Vojenské rozhledy / Czech Military Review Nr. 1/2002, Vol. XI. (XLIII.): 35-46