Vojenské Rozhledy

Czech Military Review

Fulltext search in archive



« advanced mode »

    1  2   3   4   5   6   7   8   9   10   11   ...    next 

Results 1 to 30 of 2971:

Internet of Things Vulnerabilities in Military Environments

Reviewed - Review

Andras Toth

Vojenské rozhledy / Czech Military Review Nr. 3/2021, Vol. XXX. (LXII.): 45-58 | DOI: 10.3849/2336-2995.30.2021.03.045-058

IoT devices (sensors, drones, cameras) are gaining more and more emphasis on military operations. The application of IoT elements in the military environment increases situational awareness and supports the acquisition and maintenance of information superiority. The information they provide about the enemy, the area of operations, and the location and status of our soldiers and assets can contribute to the successful execution of operations at the tactical, operational and strategic levels. However, they can also pose serious threats if their vulnerabilities allow the data they collected to leak or they provide access to the info-communication networks used for the enemy. In this article, the author examined the vulnerabilities of these IoT devices using keyword analysis. After drawing conclusions from the analysis of the relevant literature, he compared the results with the general-purpose IoT threats and attacks typical of today, like distributed denial of service attacks, security, software, security and privacy issues.

The Internet as a Tool of "Sacred War"

Informational pages

Vojenské rozhledy / Czech Military Review Nr. 3/2008, Vol. XVII. (XLIX.): 81-84

It is said that at present, all means and knowledge necessary for any terrorist attacks are aviable on Internet network. Islamists regard Internet as a university of a special sort, without territorial boundaries, suitable for schooling and preparation of "sacred war". Internet users are decentralized, which is suitable for guerrilla fighters. By studying Qur?an (Koran), people are opened to indoctrination with global jihad. The Qur'an states that those who die in this type of jihad automatically become martyrs of the faith and are awarded a special place in heaven. Islamic law alleges that all nations 174 must surrender to Islamic rule. Indoctrinated terrorists could be and are united in their beliefs via electronic Internet pages, anywhere in the world, into one global cyber space. Electronic jihadists use notebooks and small electronic cameras to view and study suicide bomb attacks. The fight against such threat is endless, marked only by partial victories. Original article by Rolf Tophoven, Österreichische Militärische Zeitschrift, No 2, 2008


Military or Militancy: How to Navigate Media Objectivity in Reporting on National Security

Reviewed

Sidra Agha

Vojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 37-54 | DOI: 10.3849/2336-2995.34.2025.01.037-054


This study aimed to explore the media’s perception of the military and militant activities, focusing on journalists’ professional conduct and their commitment to the national cause. In-depth interviews were conducted with Pakistani journalists reporting from conflict zones. The findings suggest that Pakistan is engaged in a war on terror and that the media plays a key role in glorifying the security forces in their fight against militants who challenge the authority of the state. Journalists expressed the view that the government and military should take realistic measures to combat this threat. While journalists described militants as terrorists, they also noted that their professionalism is often influenced by patriotism and a national duty to serve the country. However, objectivity remained a key element of their reporting. The media, considered the fourth pillar of the state, should have the necessary freedom to report on conflicts. At the same time, self-censorship was considered necessary to prevent content that could lead to radicalization.

Islamists Online

Informational pages

Jiří Hodný, Ph.D.

Vojenské rozhledy / Czech Military Review Nr. 2/2009, Vol. XVIII. (L.): 70-78

Like hundreds of millions of other people, Islamic terrorists and their supporters use the Internet. In many ways, the Internet is a tool tailor-made for these Islamic extremists, who use it covertly and overtly to plan attacks, raise money, and spread anti-Semitic and anti-American propaganda written in English, Arabic, and other languages. There is sufficient information to believe that in the future, terrorists may even turn the Internet itself into a weapon, using it to wreak havoc on America's critical infrastructure. Because these militants are global, rather than being located in a single geographical area (Pakistan, Indonesia, Somalia, Iraq), the Internet provides them with a new and effective way to attain their goals. It may be difficult to catch extremists planning or coordinating an attack if they are using encryption, steganography, or some other method of hiding their online activities.

Are There Real Global Catastrophic Biological Risks?

Reviewed

Aleš Macela, Vanda Boštíková

Vojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 55-69 | DOI: 10.3849/2336-2995.34.2025.01.055-069


Biosafety and biodefense (i.e. all countermeasures preventing the spread of biological agents in the environment and population) are on the regular agenda of states and their militaries. Somewhat aside are global catastrophic biological risks (GCBR), which can destroy human society as a biological species. Although a precise definition of what constitutes a global catastrophic biological risk is still being sought, it can be considered the impact of potential global catastrophic risks (GCR) on the social, economic and biological structure of human existence. This implies that GCBRs are a subset of GCRs. It is also open to discussion whether in the case of GCBRs the risk must necessarily be biological agents, from viruses to humans, or whether anthropogenic threats can also be accepted as risk factors, or what the impact must be for a risk to be included under the designation GCBR.


Cognitive Resilience Education in the Czech Military: SWOT Analysis

Reviewed - Research

Vladimír Bízik, Dominika Kosárová, Vendula Divišová, Adam Potočňák

Vojenské rozhledy / Czech Military Review Nr. 2/2025, Vol. XXXIV. (LXVI.): 98-116 | DOI: 10.3849/2336-2995.34.2025.02.098-116


This article presents the first systematic analysis of cognitive resilience education within the Czech Ministry of Defence, which is growing in importance in the context of contemporary hybrid threats. Through methodological triangulation (document analysis, questionnaires, interviews), the research maps the coverage of relevant topics across all levels of formal military education. The SWOT analysis reveals both existing foundations for cognitive resilience development and the absence of a systematic approach to this issue. The results highlight three main challenges for transforming the educational system: systematisation of the approach, personnel resources, and infrastructure modernisation. The study establishes an empirical basis for strategic recommendations to strengthen military personnel resilience against information and psychological operations.

Social Media as a Tool for Profiling Potential Intelligence Service Sources. How are the Military Students Doing?

Reviewed

Libor Kutěj

Vojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 24-36 | DOI: 10.3849/2336-2995.34.2025.01.024-036


The article addresses the use of social media intelligence (SOCMINT) as a tool for recruiting and selecting souces by foreign intelligence services, with an emphasis on the risks it poses to students in military studies at national military universitiy. It analyzes the specific ways in which SOCMINT enables foreign intelligence agencies to effectively gather personal data and profile potential collaborators from both public and private information shared online. Research conducted among students of the University of Defense and other institutions revealed that military students share comparable types of information on social networks as their civilian peers, making them equally vulnerable to the activities of foreign intelligence services. However, military students are preparing for careers in defense and security, making them a significantly more attractive target for foreign intelligence agencies than other categories of employees.

Cognitive Warfare as a New Dimension of Security. A Fictional Concept or a Real Silent Threat?

Reviewed - Review

Kristýna Drmotová, Libor Kutěj

Vojenské rozhledy / Czech Military Review Nr. 1/2024, Vol. XXXIII. (LXV.): 63-83 | DOI: 10.3849/2336-2995.33.2024.01.063-083

Cognitive warfare is a new phenomenon that differs from any forms of action previously used in the information space aiming to affect the thinking of target groups. The main difference consists in the targeted and sophisticated use of scientific knowledge from neuroscience, with special attention on consciousness and perception of reality. This deeper understanding of how the human mind works has impacted distributed narratives and the choice of the most suitable technological platforms for their distribution to the target audience. This article presents a conceptual classification of cognitive warfare and defines its three core segments: neuroscience, technology and aspects of social science.

Perspectives of Clausewitz’s Center of Gravity

Reviewed

Ján Spišák

Vojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 70-84 | DOI: 10.3849/2336-2995.34.2025.01.070-084

The center of gravity in military affairs represents a dominant element of military art, used in the planning and conduct of military operations. The doctrine defines it as the main source of power that provides the actor with his strength, freedom of action and/or the will to fight. This article examines Clausewitz’s concept of center of gravity through selected philosophical perspectives and clarifies its significance in military theory and practice. It presents the doctrinal development of the concept, discusses its context, and concludes that the concept of the center of gravity remains a key doctrinal and practical element of operational art.

Is the Transatlantic Bond a Permanent Constant for our Security?

Opinions, controversy

Zdeněk Petráš

Vojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 159-165

Resistance Operating Concept as a Tool for Increasing the Resilience of the State

Reviewed

Radek Dubec, Eva Nezvalová, Markéta Licková

Vojenské rozhledy / Czech Military Review Nr. 4/2024, Vol. XXXIII. (LXV.): 3-19 | DOI: 10.3849/2336-2995.33.2024.04.003-019

The article describes the issue of implementing the Resistance Operating Concept as part of a comprehensive approach to ensuring the defense of the state and its resilience. The basic conditions necessary for the introduction of that instrument are sought, and a comparative analysis of selected European countries that started to build a resistance movement is carried out. The article further describes the strategic definition of the resistance movement in the conditions of the Czech Republic, the legislative definition of the resistance movement and its anchoring in the framework of mental law, and the connection of the resistance movement to individual phases of the conflict. It analyzes the relationship of the resistance movement to individual phases of the conflict and categorizes the actors of the resistance movement, their roles and the methods used. In conclusion, it defines the necessary conditions for the implementation of the resistance movement into the security and defense system of the state.

Arson Attacks in Israel - History and Options for the Elimination of Inincendiary Balloons

Reviewed - Review

Alena Slavíková, Martin Křepský, František Racek, Antonín Novotný

Vojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 130-146 | DOI: 10.3849/2336-2995.33.2024.02.130-146

The article concerns the issue of arson attacks in Israel.The issue of terrorism in Israel is quite broad, given that it is a very common phenomenon here and Israel deals with terrorism on a daily basis. The paper therefore focuses on incendiary balloons, a weapon that repeatedly caused fires around the Gaza Strip between 2018-2023. It examines their history, their design, outlines the possibilities of their elimination, the advantages and disadvantages of possible technical solutions, and a reflection on the future of their usage.

Liability for Health Damage - Public vs Private Area

Reviewed - Review

Ondřej Horák, Leopold Skoruša, Radim Vičar, Tomáš Zbořil

Vojenské rozhledy / Czech Military Review Nr. 3/2024, Vol. XXXIII. (LXV.): 110-128 | DOI: 10.3849/2336-2995.33.2024.03.110-128

The article deals with the comparison of refunds of non-material damage in public and private area. In the public area is analyzed legal regulation on health injuries in service relations, in private area is discussed legal regulation on health injuries in civil law and labour law. Particular attention will be focused on the transfer of compensation in the event of injury to the heirs - while in service relationships, such claims are extinguished by death (not transferred on the heirs), which was taken over from the 1960s legislation, in current private law, do not cease if they have been recognized or at least brought in court. The aim of the paper is a critical analysis for the current state of legal regulation and the proposals de lege ferenda (approximation to labour law regulation). The issue has increased importance for public finances and functioning of public sector and enforcement of the rule of law.

Active Measures Concept Deconstruction Through the Lenses of Information Influence

Reviewed - Research

Miroslava Pačková

Vojenské rozhledy / Czech Military Review Nr. 1/2024, Vol. XXXIII. (LXV.): 40-62 | DOI: 10.3849/2336-2995.33.2024.01.040-062

This study deconstructs the concept of active measures through the prism of information influence. It understands it as sophisticated methods of influencing public opinion and political decisions, originally used by the Soviet Union and now adapted to cyberspace by the Russian Federation. In the analysis, the concept is contrasted with the general abstraction of information influence. This helps to better understand the proximity of active measures to similar concepts. We conclude that abstractions of information influence are also valid for conceptual understanding and practical examples of contemporary Russian active measures. Active measures are subsidiary to information influence, serving as tactical means to achieve the latter's strategic goals. Furthermore, the author states that the information environment is the operational theatre for active operations, cyber operations can be its manifestation, information operations support as a key component of a broader information operations strategy, and psychological operations are its critical element.

The UN and NATO as the Main Pillars of the International Security Architecture with a Focus on the Middle East Region

Reviewed - Research

Yvona Novotná-Šabacká

Vojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 18-35 | DOI: 10.3849/2336-2995.33.2024.02.018-035

This study provides a summary overview of the creation and the activities of the international security architecture in the form of their two main pillars, i.e. the United Nations and the North Atlantic Treaty Organization in the Near and Middle East region. Within the framework of international security relations, this is a very unstable and conflictual region, where this instability has lasted practically since the establishment of the State of Israel in 1948. The global UN, its overall activity and importance, especially humanitarian and peace-building activities not only for the Near and Middle East region, is very beneficial, through out the Cold War period up to the present day. As a security organization, NATO is among the most important global actors influencing current international security relations. Through their activities, both of these organizations represent a essential means of ensuring world peace and security.

Strategic Surprise and Implications for State Defense

Reviewed - Research

Radek Dubec, Roman Janda

Vojenské rozhledy / Czech Military Review Nr. 4/2023, Vol. XXXII. (LXIV.): 140-154 | DOI: 10.3849/2336-2995.32.2023.04.140-154

The article is based on a study carried out as part of the Long-Term Organizational Development Plan project by the Center for Security and Military-Strategic Studies of the University of Defense entitled "Armed Conflict". As part of the study, the issue of strategic surprise was analyzed and assessed, the aim of which was to find causal mechanisms and connections between the security of state defense and the phenomenon of surprise in the conditions of the 21st century. The article deals with the issue of surprise and its impact on state defense security. It describes strategic surprise as a principled aspect with implications and impacts on state defense. It examines the issue of surprise as a principle of military art in the context of contemporary strategic thinking.

Threats and Hazards of Grey Rhino Paradigm

Reviewed - Research

Olga Burianová, Jiří F. Urbánek

Vojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 85-96 | DOI: 10.3849/2336-2995.33.2024.02.085-096

Grey Rhino is a metaphor for security threat, which is unkept irrational for large extent also high probability of harmful effect on a subject of risk owner. Business continuity management system is assessed in a diagram as controlling instrument aimed at operational hazard mitigation of continuity disturbance of affected subject. A ´from Operations´ Value Added - O´VA is established as qualitative dynamic information about productivity of activities. The measures are designed in crisis scenario for quality improvement of subject´s crisis readiness. An indicator of business risk continuity slip is defined. In a connection with war conflict on Ukraine is assessed if it is Grey Rhino manifestation.

Crowdsourcing as an Element of Strategic-Operational Intelligence. How NATO Used it and Changed the Game

Reviewed - Review

Karel Pešek, Jozef Vojtek, Libor Kutěj

Vojenské rozhledy / Czech Military Review Nr. 1/2024, Vol. XXXIII. (LXV.): 84-104 | DOI: 10.3849/2336-2995.33.2024.01.084-104

The article focuses on the concept of crowdsourcing in the social networking environment as a new phenomenon involving civilians in the intelligence process, enabling the use of their intelligence potential during armed conflict. Crowdsourcing of the civilian population is introduced by the example of NATO intervention during the first civil war in Libya. The article presents its use during the intelligence process at the strategic-operational level of command and control of the armed forces. It establishes its possible definition as a collection method of the intelligence process, and as a collection method which is disjunctively separable from similar intelligence collection methods.

Proposal of Legal Status of the Expert Valuation Institute Objectifying the Acquisition Process

Reviewed - Research

Jan Hak, Pavel Foltin, Dagmar Pospíšilová, Karel Pospíšil

Vojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 97-115 | DOI: 10.3849/2336-2995.33.2024.02.097-115

The process of procuring military equipment, technology, material, and associated services (VM) is frequently shrouded in concerns about cost-effectiveness and, in some instances, even becomes the focus of law enforcement investigations. This often leads to delays in strategic investments and exposes involved individuals to the risk of criminal charges. Additionally, there is a notable lack of capacity to impartially evaluate the overall investment's efficacy. Consequently, the "Znalec" (Expert Witness) project was initiated as a part of the defense research program. Its objective is to explore the feasibility of establishing an expert institute that could impartially assess the value of the military procurements, set a standard for evaluating these assets, and outline a training program for relevant experts. This paper specifically addresses the first objective of the project, proposing a legal framework for the expert institute based on an extensive systems analysis.

Yomkippur War from the Perspective of Czechoslovak Diplomacy

Reviewed - Review

Eva Taterová

Vojenské rozhledy / Czech Military Review Nr. 4/2023, Vol. XXXII. (LXIV.): 3-23 | DOI: 10.3849/2336-2995.32.2023.04.003-023

This study presents the perspective of Czechoslovak diplomacy on the events of the Yom Kippur War (1973) in the context Czechoslovak foreign policy towards the Arab-Israeli conflict in early 1970s. The research is based on so far rather underexplored archival sources. Despite Czechoslovakia's declared unequivocal support for the Arab side of the conflict, Czechoslovak Middle Eastern policy since the mid-1950s was not entirely unconditional in relation to the Arab countries. Internal documents of Czechoslovak government occasionally revealed criticisms of Arab representatives. The Yom Kippur War represented a significant moment in this regard, as it was a military confrontation initiated not by Israel but by the Arab coalition, posing a challenge for Czechoslovak propaganda. Simultaneously, this armed conflict presented an opportunity for Communist Czechoslovakia to further deepen its relations with its Arab allies.

Military Will in the Czech Civil Code

Reviewed - Review

Pavel Salák

Vojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 116-129 | DOI: 10.3849/2336-2995.33.2024.02.116-129

The text is dedicated to the analysis of the legal regulation of military wills in the new Civil Code (Law No. 89/2012 Coll.). It places it in a historical legal context. However, priority attention is paid to a detailed analysis of the current legal regulation and potential issues that this regulation brings. It also briefly mentions other options for last dispositions that a soldier could use. The legal regulation of military wills in the Civil Code can be characterized as very well conceived, reflecting the reality of foreign missions. The fact that it takes the form of a public document is also significant if the relevant requirements are met. However, the question is how the application practice of the courts will approach the adjustment.

A Special Military Operation in the Context of Russia's Interpretation

Reviewed - Review

Jaroslav Galba, Ján Spišák

Vojenské rozhledy / Czech Military Review Nr. 1/2023, Vol. XXXII. (LXIV.): 50-68 | DOI: 10.3849/2336-2995.32.2023.01.050-068

The Russia has presented the ongoing war in Ukraine by the term special military operation, whose goals were declared by Russian President Putin in terms of demilitarization and denazification of Ukraine. In the wider context, there is an imperial effort of Russia to enforce its power and influence in the region by an offensive and aggressive war. The authors define the fundamental difference between a special operation and the so-called special military operation in the context of contemporary interpretation of the Kremlin. They further argue the way in which Russia is trying to justify the war and discuss its reality in terms of international law.

The "Women, Peace and Security" Agenda and Integrating Gender Perspective in the Environment of the Armed Forces of the Slovak Republic

Reviewed - Research

Mária Blehová

Vojenské rozhledy / Czech Military Review Nr. 3/2023, Vol. XXXII. (LXIV.): 96-110 | DOI: 10.3849/2336-2995.32.2023.03.096-110

The measures adopted on the soil of the North Atlantic Alliance to support the integration of gender perspective are discussed in the article, as well as the way in which these were subsequently reflected in the legislative measures of the Ministry of Defense of the Slovak Republic and examines the approach of the Armed Forces of the Slovak Republic (hereinafter referred to as "OS SR" ) to the integration of gender perspective. The article further focuses on how the OS SR integrate and support these principles in the real life of professional soldiers. The analysis of available statistical data as well as of research previously conducted in this area serves as a basis for formulating conclusions on whether the Slovak Republic fulfills its obligations regarding the integration of gender perspective towards the North Atlantic Alliance, and at the same time formulates starting points for possible future research.

From Plan Gideon to Plan Tnufa: Israeli defense strategy and the buildup of the Israeli Defense Forces in the wider context of the Middle East after the Arab Spring

Reviewed - Research

Ľubomír Zvada, Jiří Lach

Vojenské rozhledy / Czech Military Review Nr. 4/2023, Vol. XXXII. (LXIV.): 24-44 | DOI: 10.3849/2336-2995.32.2023.04.024-044

Based on the content analysis method, this study analyzes the first ever published security strategy of the Israel Defense Forces, which was published in 2015. The main objective of the paper is not only to present the circumstances of its creation and discuss the main objectives of this strategic security document, but also to outline the broader geopolitical context from which it emerged. The authors argue that the document primarily emphasized two areas - the use of force and capacity building of the Israeli military. Among other things, the publication of the strategy was intended to have a deterrent effect. In the conclusion, the authors compare the Gideon Plan and its follow-up, the Tnufa Plan, and point to the considerable importance that consensus among political and military elites has in the implementation of such a document and reflect on what lessons and inspiration can be drawn from this case in our geographic space in the process of formulating or reformulating strategic security documents.

The use of modeling and simulation in the development process optimization of the Armed Forces of the Czech Republic

Reviewed - Research

Jan Mazal, Jan Zezula, Josef Procházka, Dalibor Procházka

Vojenské rozhledy / Czech Military Review Nr. 4/2022, Vol. XXXI. (LXIII.): 140-158 | DOI: 10.3849/2336-2995.31.2022.04.140-158

The article contributes to a more efficient use of the theoretical, technological and application base, especially to the improvement of decision-making processes at the strategic level. It offers a methodological framework for solving the armed forces capability optimization problem by implementing modeling, simulation and operations research tools and theories.

Possibilities of Developing Medical Support Capabilities in the Area of Chemical, Biological Radiological and Nuclear Defence

Reviewed - Review

Aleš Tichý, Richard Saibert

Vojenské rozhledy / Czech Military Review Nr. 1/2023, Vol. XXXII. (LXIV.): 98-117 | DOI: 10.3849/2336-2995.32.2023.01.098-117

The article deals with the evaluation of current possibilities of medical support capabilities in the area of Chemical, Biological, Radiological and Nuclear Defence. The evaluation of national strategic documents shows that the area of providing care in the event of chemical and biological hazards is significantly more developed than in the area of radiation, while the security threats associated with radiation are constantly growing. Analysis of NATO standardization documents in the field of medical support and relevant Czech doctrinal documents was carried out, based on which the diagnostics and triage of irradiated persons, called biological dosimetry, was identified as a potential capability. Using the capability planning methodology and based on the evaluation of the functional areas, a conceptual approach to the development of biological dosimetry capabilities was defined. The presented recommendations also include a proposal for the organizational structure of the Czech Armed Forces biodosimetric network.

Does the government's defence funding bill really only create an unenforceable political commitment?

Reviewed - Review

Jan Kudrna

Vojenské rozhledy / Czech Military Review Nr. 2/2023, Vol. XXXII. (LXIV.): 23-34 | DOI: 10.3849/2336-2995.32.2023.02.023-034

The article is devoted to the draft law on defence financing, which aims to oblige the government to allocate an amount of at least 2% of GDP to defence in every draft law on the state budget. During the inter-ministerial comment procedure, the Supreme Audit Office expressed doubts whether the draft means anything more than an unenforceable political commitment in relation to the Chamber of Deputies". The article convincingly demonstrates, with the help of legal argumentation and interpretation of the Constitution of the Czech Republic, the Rules of Procedure of the Chamber of Deputies, as well as the established case law of the Constitutional Court of the Czech Republic, that if approved, the Chamber of Deputies will also be bound by the Defence Financing Act when approving the state budget. To do otherwise would violate constitutionality.

Assesment of the Development of European Air Forces in the Context of US-China Competition

Reviewed - Research

Jan Feryna, Libor Kutěj

Vojenské rozhledy / Czech Military Review Nr. 4/2023, Vol. XXXII. (LXIV.): 123-139 | DOI: 10.3849/2336-2995.32.2023.04.123-139

The air force plays an important role in armed conflicts. It was no different in the Odyssey Dawn and Unified Protector operations in Libya in 2011. The European dependence on the US became fully apparent during those operations. After 2011, US attention has been shifted to Asia. This article focuses on the evaluation of the development of European air forces from 2011 to 2021 in the context of the shift of US attention to Asia. The article uses a dataset to compare the number of aircraft in specific categories in 2011 and 2021. The research shows that European states maintain a fleet of around 2,000 fighter jets, while compared to 2011, the number of ISR aircraft decreased from 183 to 122 and the number of air-to-air refuelling aircraft from 70 to 67. In contrast, the number of MALE unmanned vehicles has doubled from 45 to 91. However, in the context of the US shift Asia, those numbers are insufficient, and European states are still dependent on US support.

The Armed Forces in Institutional and Functional Concept

Reviewed - Review

Leopold Skoruša, Ondřej Horák, Radim Vičar, Tomáš Zbořil

Vojenské rozhledy / Czech Military Review Nr. 4/2022, Vol. XXXI. (LXIII.): 3-22 | DOI: 10.3849/2336-2995.31.2022.04.003-022

The article deals with the interpretation of the term "armed forces" in the context of the current legal system of the Czech Republic. The authors propose to distinguish between the armed forces in the institutional concept and in the functional concept. The essence of the solution is the interpretation of Section 3(1) of the Armed Forces Act (No. 219/1999 Coll.) in the functional concept, i.e. in such a way that the armed forces are understood to include soldiers assigned to the Ministry of Defence, military schools, the Military Police and the Military Intelligence. Another solution could be to add a paragraph to the Armed Forces Act stating that "The provisions on members of the armed forces shall apply mutatis mutandis to soldiers on active service assigned to the Ministry of Defence, military schools, the Military Police and the Military Intelligence." The aim of the article is initiation professional discussions about the issue in question, as well as indications of directions as to how it would be appropriate to solve the matter.

The C5ISR System Integrated with Unmanned Aircraft in the Large-Scale Combat Operations

Reviewed - Review

Marko Radovanović, Aleksandar Petrovski, Vinko Žnidaršič

Vojenské rozhledy / Czech Military Review Nr. 2/2023, Vol. XXXII. (LXIV.): 98-118 | DOI: 10.3849/2336-2995.32.2023.02.098-118

The manner of conducting modern large-scale combat operations (LSCOs) is characterized by the increasingly frequent and diverse use of unmanned aerial vehicles (UAVs) integrated into the Command, Control, Computers, Communications, Intelligence, Surveillance and Reconnaissance (C4IRS) system. These aircraft are one of the most important types of weapons in modern LSCOs. Anyone that has the technology can process the latest information from the field and safely passes that information to the command center has a great advantage and a chance to cause great damage to units whose goal is to prevent further operational work. What is important is that UAVs must have some degree of self-protection through site selection action to reconnaissance and retreat routes. The paper presents the possibility of using UAVs for various missions in LSCOs, as well as a case study of their use in previous modern armed conflicts.

    1  2   3   4   5   6   7   8   9   10   11   ...    next