- volume: 2010
- number: 3
- type: Ostatní / Other
The article presents six more or less structured analytical methods that are or could be employed in intelligence analysis. This type of analysis, one part of the intelligence cycle, is understood as "the process of evaluating data for reliability, validity, and relevance; integrating and analysing it; converting the product of this effort into a meaningful whole, which includes assessment of events and implications of the information collected". The set of presented methods includes: link analysis, opportunity analysis, analogy, linchpin analysis, analysis of competing hypothesis and alternative scenarios. The study doesn't stop with presenting those methods; it also explains which type of reasoning (inductive, deductive or abductive) is used when working with each particular method. In broad terms, the article tries to shed light on intelligence analysis and its specifics. The reader should obtain better understanding their usefulness in the daily work of intelligence analyst.
Read more: Main Methods of Intelligence Analysis and Ways of its Evaluating
- volume: 2024
- number: 2
- type: Vědecký / Research
Grey Rhino is a metaphor for security threat, which is unkept irrational for large extent also high probability of harmful effect on a subject of risk owner. Business continuity management system is assessed in a diagram as controlling instrument aimed at operational hazard mitigation of continuity disturbance of affected subject. A ´from Operations´ Value Added – O´VA is established as qualitative dynamic information about productivity
of activities. The measures are designed in crisis scenario for quality improvement of subject´s crisis readiness. An indicator of business risk continuity slip is defined. In a connection with war conflict on Ukraine is assessed if it is Grey Rhino manifestation.
- volume: 2019
- number: 3
- status: Recenzované / Reviewed
- type: Přehledový / Peer-reviewed
The article focuses on information and psychological operations as a challenge for the security and defence establishments of NATO member states. A conceptualisation of the terms ‘information operations’ and ‘psychological operations’ is discussed in the contexts of reshaping the war-and-peace dichotomy, and of resilience and deterrence. It is suggested that these terms suffer from a normative approach to the paradigm of war and peace, and to the use of non-military means. This may lead to the greater vulnerability of security and defence systems in confrontation with an adversary. Also, special attention is paid to the vulnerabilities of security and armed forces, being overlooked in concepts of resilience.
Read more: Information and Psychological Operations as a Challenge to Security and Defence
- volume: 2014
- number: 4
- type: Přehledový / Peer-reviewed
The article presents the theory of information operations on the background of contemporary armed conflicts in Ukraine, Iraq and Syria. In the introduction, information is presented as a phenomenon and the accelerator of social development. It outlines basic information channels that deliver security information to their recipients. Furthermore, the article discusses security and operational environment and also vulnerabilities being caused by increasing dependence on information. The core of the article are information operations presented in theory with the author's commentary on real application in military practice and in terms of the Czech Armed Forces. As part of information operations are subsequently introduced psychological operations, computer network operations and electronic warfare. The article ends with real examples of information and psychological operations in modern warfare, and conditions of their management in the Czech Armed Forces. The conclusion summarizes the general idea of the security environment and information operations, and stresses the importance of information operations in current and future conflicts.
Read more: Information Operations on the Background of Contemporary Armed Conflicts
- volume: 2009
- number: 4
- type: Přehledový / Peer-reviewed
The change of security situation in the world, international ties and last but not least changes in operational environment, exploitation of new technologies are reflected by changes in defence planning, military organization, forces engagement and operational assessment. Time, flexibility, cooperation in coalition operations, interoperability in technology spheres play incommutable roles together with trained personnel. Command and control (C2) is self-contained system depending on many factors provided by the so-called System of Communication and Information. At present it is the very base for information collection, decision-making process, preparing variants of operation for both commander and his staff. Among others the author writes about Network Enabled Capability system introduced into Czech armed forces. C2 programme is also a part of educational curriculum at Defence University Brno.
Read more: Information Process as a Part of Command and Control System (Part I)