Vojenské Rozhledy

Czech Military Review

Fulltext search in archive



« advanced mode »

    1  2    next 

Results 1 to 30 of 37:

Contemporary Security Policy of the European Union in Mali

Reviewed - Review

Marek Rechtik

Vojenské rozhledy / Czech Military Review Nr. 3/2018, Vol. XXVII. (LIX.): 93-104

The European Union is interested in ensuring the security of African countries in the region of Sahel because some of the threats originating from this region can potentially endanger its member states. With the deteriorating situation in northern Mali, the EU has decided to become more active in this country through Common Security and Defence Policy missions. The aim of this article is to introduce and subsequently assess the contemporary policy of EU in Mali. Particular attention will be paid to the European Union Training Mission in Mali and European Union Capacity Building Mission in Mali, which have so far produced rather mixed results. The article will also focus on the EU strategy in the Sahel region and partly on the EU counterterrorist and counterinsurgency activities in Mali.

The Fight of France against ISIS in Iraq and Syria since Summer 2014 until March 2016

Nonreviewed - Other

Iveta Kupková

Vojenské rozhledy / Czech Military Review Nr. 2/2016, Vol. XXV. (LVII.): 53-65

This article discusses political and military issue of Islamic State, since establishment of the anti­IS alliance in summer 2014 until March 2016 in Iraq and Syria. The article describes each step made during this period separately or in alliance, while the terrorist attacks in Paris are considered as a turning point. That is the reason why the article is the comparison of French policy before and after the attacks. Furthermore, the crucial part is to resolve Syrian crisis in which France is actively involved in order to settle down the events in Syria and transform it into democratic country without President Assad.This article discusses political and military issue of Islamic State, since establishment of the anti­IS alliance in summer 2014 until March 2016 in Iraq and Syria. The article describes each step made during this period separately or in alliance, while the terrorist attacks in Paris are considered as a turning point. That is the reason why the article is the comparison of French policy before and after the attacks. Furthermore, the crucial part is to resolve Syrian crisis in which France is actively involved in order to settle down the events in Syria and transform it into democratic country without President Assad.

Warfare and its Forms

Reviewed - Review

Ján Spišák, Jan Gireth, Marek Fiebich

Vojenské rozhledy / Czech Military Review Nr. 1/2020, Vol. XXIX. (LXI.): 20-35

The article deals with the issue of warfare. Its aim is to describe and clarify the character of warfare in its contemporary doctrinal context. The authors of the article focused on the specifics of individual forms of warfare and its complexity within the annexation of Crimea by the armed forces of the Russian Federation in 2014. Description, content and comparative analysis of used sources and doctrinal publications were used. The authors conclude that the complexity of contemporary warfare creates appropriate conditions for the nation and its armed forces to enforce its interests and achieve strategic goals. The main contribution of the article is to provide information that is not available in professional literature or it is not part of doctrinal or other national military publications.

Slovak Armed Forces and Military Operation ISAF

Nonreviewed - Other

Mgr. Lenka Tomášeková

Vojenské rozhledy / Czech Military Review Nr. 2/2015, Vol. XXIV. (LVI.): 131-137

The main goal of the article is to present the activities of members of the Slovak Armed Forces in the military operation ISAF and familiarize the reader with the main facts involving the Slovak Republic as a member of the Alliance in this operation. The text outlines the genesis of the ISAF and structure of the components of the Slovak contingent. SAF members during their tenure at ISAF gain valuable experiences that make up their professional competence and achieve greater compatibility with other members of the Alliance. In conclusion, the most important awards are presented by the coalition partners for professional use, so competence and commitment of the SAF to assist and defend basic human rights and freedom of the Afghan people, to help them take responsibility for themselves and their country.

Slovakia and Germany - partners in defence and security area

Reviewed - Review

Stanislava Brajerčíková

Vojenské rozhledy / Czech Military Review Nr. 4/2018, Vol. XXVII. (LIX.): 64-77

The paper analyses goals of the Slovak and German foreign and security policy focused on their role in NATO as well as on the role by forming European security and defence policy. The paper deals with potential and opportunities for more intensive and effective cooperation between Slovakia and Germany regarding their security and defence policy orientation. It finds out that there are some important NATO and EU projects and initiatives, such as "out of area" missions engagement, battle groups building, Framework Nations Concept or a new announced project Permanent Structured Cooperation (PESCO) to be used in the deepening process of Slovak-German security and defence relations.

Financing of Terrorism

Reviewed - Review

Josef Smolík, Veronika Svatošová

Vojenské rozhledy / Czech Military Review Nr. 2/2017, Vol. XXVI. (LVIII.): 73-88

The issue of terrorism is becoming increasingly important on the level of social, economic, political and security. The threat of terrorism affects at the same time, societal and cultural events. Professional and academic discussion addresses the causes and possible consequences of this phenomenon. To understand the implications of terrorism, it is necessary to look at this issue from the perspective of terms of its financing. This review study aims to define the term financing of terrorism on the one hand, but also to identify possible sources of financing of terrorism, including the most used payment methods by terrorist organizations. This study also leads a discussion on the efforts and effectiveness of the various authorities in the fight for detecting terrorism, especially in relation to the detection of its financial flows. The study also defines the possible pitfalls in the fight against terrorism and detecting its sources of financing and attempts to outline possible alternatives while increasing success in this fight.

Threat of CBRN Agents, Biological Class

Military professional

Ing. Daniel Maršálek, doc. Mgr. Ing. Radomír Ščurek, Ph.D.

Vojenské rozhledy / Czech Military Review Nr. 3/2012, Vol. XXI. (LIII.): 119-130

This article describes the question of CBRN and their possible abuses in civil aviation. The problem includes security analysis identified by the Civil Aviation as the most significant class of this group-biological agents. The authors pay them special attention. The second part of paper contains model situation in case of emergency: virus variola (smallpox) attack in a terminal of medium-size international airport. Depending on the detailed properties of virus, transport hub and afflicted area, there are two versions of attack- for summer and winter timetable, according to expected progress of virus extension, and follow-up arrangements.

Psychology of Terrorism and the Staircase Mataphor

Reviewed - Review

PhDr. Josef Smolík, Ph.D.

Vojenské rozhledy / Czech Military Review Nr. 3/2015, Vol. XXIV. (LVI.): 82-101

The article deals with the contemporary form of terrorism, introduces selected issues and discusses the psychology of terrorism. Various forms and typologies of contemporary terrorism which occurs in different geographical and cultural areas and uses large scale of methods and tactical and strategic approaches are introduced as well.The main goal of this article is to describe psychological aspects of terrorism with the emphasis on the motivation and group dynamics of terrorist organizations. The staircase metaphor which allows thinking about the process of recruitment of terrorists is introduced as well. The article derives especially from theoretical socio-psychological and political findings.

Food Terrorism and Agroterrorism

Military professional

Ing. Hana Vlachová, Ph.D.

Vojenské rozhledy / Czech Military Review Nr. 4/2011, Vol. XX. (LII.): 160-168

People commonly imagine terrorist attack as hijacking or improvised explosive device hidden in crowded place. However terrorists can also attack against food, cattle, farm crops or water resources. These kinds of attacks can be ranked among agroterrorism or food terrorism, whereas agroterrorists attack against cattle, farm crops or water resources; food terrorists attack against foodstuffs. This paper is intended to provide information about agroterrorism and food terrorism as possible forms of wilful violence. Food security became discussed issue especially after anthrax incidents in 2001. There are many authorities that deal with these issues, for example EU, NATO or World Health Organization.

Islamism as a Security Threat to the Czech Republic

Informational pages

Doc. PhDr. JUDr. Miroslav Mareš, Ph.D.

Vojenské rozhledy / Czech Military Review Nr. 4/2011, Vol. XX. (LII.): 118-128

This paper deals with various forms of Islamist threats to the Czech Republic, with specific attention paid to military issues. It defines the basic terms and describes the role of the Czech Republic in Islamist strategies. Threats of terrorism and jihadism, extremism and riots, violation of women's rights, including the so-called "honour crimes", and internal clashes within the Muslim community are analyzed. Contemporary situation of the Czech Republic can be characterized mostly as "logistic area" to Islamism. Even thought there is not an eminent danger, the intensity of several Islamist threats could be higher in the future. The primary purpose of this article is to form a basic frame for identification of prospective terrorist attacks by means of extrapolation.

Strong and Week Features of "Responsible Ownership of Technology" Concept

Military professional

Ing. Marie Poláchová

Vojenské rozhledy / Czech Military Review Nr. 4/2011, Vol. XX. (LII.): 138-144

There is an urgent need to recognize changed priorities and evolve new approaches to non-proliferation and disarmament objectives for a sharper focus on the real and present dangers to international peace and stability. The focus must now shift to more effective monitoring and verification of compliance at various levels. The proposed ROOT system (Responsible Ownership of Technology) might be one of such means to meet above mentioned challenges that could eliminate present-day dangers and contribute to international peace and stability. It is the technology for security in the 21st century.

The Current Reality of Nuclear Threat

Reviewed

Mgr. Jan Ludvík

Vojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 16-23

This article addresses vital issues of possible threat of nuclear weapons in contemporary world. First, the general nuclear order-particularly the NPT regime-is briefly examined. Analysis proceeds to a critical exploration of the prospective use of nuclear weapons by small nuclear states and the so-called rogue states. Some attention is also paid to the conflict between India and Pakistan, since these two states are often considered as the most dangerous from perspective of possible use of nuclear weapons. The author considers the threat of nuclear war between great powers and then the threat of nuclear terrorism. His analysis suggests that deterrence between great powers is reliably working. The threat from rogue states is limited by technological difficulties in process of development and production of nuclear weapons and limits of small nuclear arsenals. Even though threat of nuclear terrorism should not be underestimated, this paper argues that technical obstacles and availability of other comparatively cheap methods effectively reduce the terrorists' desire to acquire nuclear weapons.

European Legislation and its Role in the Fight against CBRNE (Introductory to Problems)

Military law

Poručík Ing. Martin Klusáček

Vojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 156-167

Nowadays, with the potential employment of Chemical, Biological, Radiological, Nuclear Explosives (CBRNE), terrorism poses a threat to all countries over the world, it becomes scary phenomenon at a global scale. The author introduces key agreements dealing with this subject: Chemical Weapons Convention, European Agreement concerning the international carriage of Dangerous goods by Road, European Agreement concerning the International Carriage of Dangerous Goods by Inland Waterways, Regulations concerning the International carriage of Dangerous Goods by rail, and so on. The main objective of the EU is to introduce such legal measures so that it would be extremely difficult for terrorist groups to legally gain CBRNE materials. The purpose of this essay is to analyse legal frame of CBRNE materials and to stress the protection against their misusing within an authority of the ACR.

NATO's Strategic Concept: An Important Step Towards Military and Political Qualification of Alliance

Reviewed

Kpt. Mgr. Karel Zetocha, Ph.D.

Vojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 3-14

The main Alliance mission is to "safeguard the freedom and security of its member countries" and to "deter and defend against any threat of aggression against any of them". Those general tasks are tailored today to changed international security surroundings. In May this year, a report by the experts group was released, forming the basis for further negotiations over the new strategical concept of NATO. The experts produced a document of first-rate quality identifying main tasks NATO is facing today. At the same time this document redefines prospective directions the Alliance should follow in the years to come. Without a broad popular support NATO's engagements namely off European territory couldn't be vindicated and justified. The same is true as far allocation of sources for NATO missions and developing military capabilities are concerned. So, the communication with public thus becomes a further dimension of this highest strategic document.

Theory of Gravity in War on International Terrorism

Military art

Ing. Ján Spišák

Vojenské rozhledy / Czech Military Review Nr. 2/2010, Vol. XIX. (LI.): 47-64

Official objectives of war on terrorism are as follows: we must face theorist threats, prevent terrorist strikes; suppress the power of terrorist groups such as al-Qaeda. War on terrorism is not a classical or conventional warfare; the term is wide-ranging, covering longterm strategies of national importance. The war on terrorism and employed means are also a source of controversy. It is a question of adequacy of used tools. It is necessary to implement the new strategy of improving conditions in Muslim countries to eliminate their background supporting negative religious and political attitudes towards democracy. Outlined ways of "smoothing edges" in economical, social spheres can noticeably change hateful attitudes of Muslim population towards values of Western democratic society.

Changes of U.S. National Security at the Beginning of 21st Century

Military art

Doc. PhDr. Jan Eichler, CSc.

Vojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 38-48

The new American doctrinal document called National Security Strategy (NSS 2010) was released in May 2010. Generally, NSS documents outline major national security concerns and plans. The NSS 2010 lays out a strategic approach for advancing American interests, including the security of the American people, growing U.S. economy, and international order that can address 21st century challenges. President Obama is stressing global leadership, dependent on strong and responsible American leadership directing it to ensure other nations follow. He urged Americans to revitalize their own economic, moral and innovative strength to continue to lead the world. The essay by Mr. Eichler is divided into two parts: first one deals with Bush's security policy, and second one deals with documents issued during Obama's presidency. There is a departure from Bush's security strategy that had led to two asymmetric wars in Afghanistan and Iraq. There are interesting nuances. The NSS 2010 for example declares the intention to build deeper and more effective partnerships with key centres of influence-including China, India, which represents among others Obama's retreat from policy of unilateralism.

Criminalization and Religious Radicalization in Chechnya as Two Main Streams of Development after 1996 and their Influence on Terrorism in Subsequent Conflict

Informational pages

Bc. Martin Janků

Vojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 123-137

The article deals with the disintegration and erosion of originally cohesive Chechen resistance movement during the First Chechen War and following inter-war period. According to the author, the main reasons of this process are criminality and religious fundamental radicalisation. They together produced inner confl icts between fi eld commanders; some of them attacked Russian security forces in neighbouring regions (Dagestan, Ingushetia), even after war had ended. Disintegration processes were encouraged by social deprivation after the first war, by strategical position of Chechnya in relation to smuggling drugs and weapons, stealing rude oil, and fi nally activities of foreign Islamic solidarity fi ghters. All those factors signifi cantly contributed to the outbreak of the Second Chechnya War.

Al Qai'da Hybridisation in North Africa and its Implication for Europe

Military art

Bc. Martin Janků

Vojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 55-70

The article is focused on issue of hybridisation of Al Qai'da in Islamic Maghreb (AQIM), in North Africa, and its implications for European countries. The process of hybridisation is being conceived as growing nexus and convergence between violent non-state actors, while these processes could be in this case identified mainly in issues of use of kidnappings and secondary also reported involvement of AQIM in regional smuggling, mainly drugs, activities through Sahel and Saharan region to Europe. Regarding GSPC background, AQIM could be in long term theoretically able to re-establish its financial and supporting networks in Europe via cooperation with organized crime, which were largely disrupted after major crackdowns by security forces between 2004-2007. Event though a direct Al Qai'da attack in Europe is-according to the author-excluded, the purpose of this article to draw our attention to an eventuality of rebirth of European operation network of AQIM operational predecessor, i.e. GSPC.

The Animals and Terrorism

Informational pages

Ing. Hana Vlachová

Vojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 155-163

Animals have been used for military purposes from the ancient world to nowadays. Horses, elephants, mules and camels were carrying supplies and took part in battles. Dogs were trained for securing livestock and military camps. Soviet army used them as live mines during World War II. The U.S. Army explored the possibility of using bats as live incendive devices. Even the terrorists could use animals for destroying chosen targets in the same way armies used to do. The deployment of animals would be advantageous for any terrorist group because security forces would not expect this kind of attack. Up to now, there have been just a few cases of abusing animals by terrorists, e.g. for bomb laden mules or dogs carcasses which hide explosive devices. But animals could also help with the fight against terrorism, for example dogs or bluegill fish.

Afghanistan: True Reality

Informational pages

Podpraporčík Jan Smetana

Vojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 100-107

The deteriorating situation in the Afghanistan region poses a security threat not just to the United States, but to every single nation. It was from that remote area of the world that Al Qai'da plotted 9/11 and subsequent attacks in Europe and elsewhere. Reading news about Afghanistan today gives rise to the question why the situation in this country is such as now really is. Ordinary mass media depict the country often in a confusing manner: Afghanistan as "a country, full of terrorists and uneducated barbarians, longing to destroy western civilization and kill". The author describes bad security situation which presents problem for both coalition soldiers and local Afghanistan population. At the same time we must realize that involved soldiers are exposed every day to asymmetric enemy forces, they stand face to face to mortar danger that could be hidden in for example in every car passing by.

Theoretical and Sociocultural Context of Suicide Attacks: The Proliferation of Martyr Subculture

Informational pages

Doc. Ing. Štefan Danics, Ph.D., PaedMgr. et ThMgr. Leoš Tuček

Vojenské rozhledy / Czech Military Review Nr. 2/2009, Vol. XVIII. (L.): 52-69

Suicide bombing represents a low-cost, low-tech weapon that is readily available, requires little training, leaves little forensic trace, and strikes fear into the general population. Almost exclusively, suicide bombers emanate from distinct ethnicities and religions; furthermore, recent history indicates that they come from the Arab/Muslim or East Asian cultures. As important as the suicide bombers are the activists and sympathizers who offer them support and comfort. These activists may recoil from committing acts of violence themselves but may sympathize with those who do, and offer moral and material support. This article explores the psychosocial aspects and methods of suicide bombers in general, but with particular focus on those operating in Palestine, Moscow (Chechen guerrillas, 2002), Singar (Iraq 2007).

Islamists Online

Informational pages

Jiří Hodný, Ph.D.

Vojenské rozhledy / Czech Military Review Nr. 2/2009, Vol. XVIII. (L.): 70-78

Like hundreds of millions of other people, Islamic terrorists and their supporters use the Internet. In many ways, the Internet is a tool tailor-made for these Islamic extremists, who use it covertly and overtly to plan attacks, raise money, and spread anti-Semitic and anti-American propaganda written in English, Arabic, and other languages. There is sufficient information to believe that in the future, terrorists may even turn the Internet itself into a weapon, using it to wreak havoc on America's critical infrastructure. Because these militants are global, rather than being located in a single geographical area (Pakistan, Indonesia, Somalia, Iraq), the Internet provides them with a new and effective way to attain their goals. It may be difficult to catch extremists planning or coordinating an attack if they are using encryption, steganography, or some other method of hiding their online activities.

Virtual University of Jihad: Training and Schooling Islamic Terrorists in Cyberspace

Informational pages

Mgr. Jiří Hodný

Vojenské rozhledy / Czech Military Review Nr. 1/2009, Vol. XVIII. (L.): 115-120

This article is discussing the role of the Internet in the Islamic terrorist movement. It describes how the nature of the Internet provides the perfect medium for terrorism. Major terrorist organizations now have their own production capability, ranging from video capture, to video editing, to distribution, but, these organizations also have an advanced understanding of the concepts of influence, information warfare, and the power of targeted messages. This is further highlighted by the fact that among al Qaeda's original organizational structure was a committee dedicated to publicity and the media. The internet plays the role as a means of propaganda for recruitment and fund-raising, shaping public opinion in the Muslim world, terrorist training and instruction, operational planning for attacks, communication and open source information.

Terrorism and Wars in the Early 21st Century

Book review

PhDr. Antonín Rašek

Vojenské rozhledy / Czech Military Review Nr. 3/2008, Vol. XVII. (XLIX.): 155-166

It is not too often we could meet such a comprehensive monograph, dealing with security problems. Among such books belongs a book by Jan Eichler, with the same title, published by Charles University Prague, 2007. The most relevant chapter, Wars waged by the U.S. and its allies after the start of global terrorism, offers a provocative question, whether democratic nations, indirectly and unintentionally, gave rise to the upsurge of antipathy amongst the states with different political constitution, resulting in acts of terror? The ambiguous assessments of American wars in Afghanistan and Iraq seem to support author?s view. According to the reviewer, dr. A. Rašek, the author is wrong about the role land forces after the RMA?Revolution in Military Affairs. Without ground forces we are not able to win today?s asymmetrical warfare. The large part of book deals with conflicts not very familiar in the Czech Republic: Ethiopian-Eritrean war, disturbances in Somalia (operation Restore Hope), Burundi, Rwanda, Congo, Sierra Leone, Srí Lanka, Cashmere, Nepal, Haiti, Bolivia, and Colombia.

Monograph on Present-day Terrorism

Book review

Vojenské rozhledy / Czech Military Review Nr. 3/2008, Vol. XVII. (XLIX.): 167-169

The basic change in world's security situation after the September 11, 2001, Attacks is accompanied by raising numbers of security studies, dealing namely with the subject of terrorism. The monograph written by three authors of Defence University Brno defines categories of terrorism, its historical development, psychology, methods of attacks, their forms, consequences. The special part is consecrated to the fight against individual types of terrorism. We must value highly the general summary of literature dealing with theme of terrorism, including electronic sources. Last but not least, we must also appreciate the chronological list of the worst terrorist attacks, starting with assassinated Francis Ferdinand in Sarajevo, Bosnia (1914); short characteristics of representative terrorist groups: Action Directe (France), a Basque separatist group known as the ETA, Irish Republican Army (IRA), Aum Shinrikyo (Supreme Truth) in Japan, Hamas (Islamic Resistance Movement), Hezbollah guerrillas, or al-Qaeda, etc. Selected Aspects of Contemporary Terrorism, MoD CR-AVIS 2008.

Do We Really Understand the Current Epidemic of Suicide Terrorist Attacks? (An attempt at systemization of terrorism concept)

Nonreviewed - Other

Doc. Ing. Štefan Danics, Ph.D., PaedMgr. et ThMgr. Leoš Tuček

Vojenské rozhledy / Czech Military Review Nr. 2/2008, Vol. XVII. (XLIX.): 18-30

Terrorism threatens to attack and destroy the open democracy, but what is terrorism? The main aim of this essay is to formulate some proposals of a minimal operational definition tied with terrorism, as well as a definition of terrorist attack with the ambition to surpass a possibility of an ambiguous construction in the field of semantical research. Terrorism is usually described as unlawful violent activism targeted against civilians or against civilian targets with the aim of achieving political, religious, ideological and other goals. It presents wellconsidered ways of production and fructification of fear that are applied on civilian targets. A terrorist attack communicates devastatingly as a pure act of violence inside the psychosomatic structure of its recipients (victims). The new terrorism after 9/11 attacks could be characterized by fanaticism and the impending danger of arms of mass destruction. It is a culture of death.

Security Forum '08

Book review

PhDr. Antonín Rašek.

Vojenské rozhledy / Czech Military Review Nr. 4/2008, Vol. XVII. (XLIX.): 173-175

In February 2008 the Security Forum took place in Slovakian city Banská Bystrica. The collection of 32 presented papers was issued by Matěj Bél University. This review summarizes main ideas of those papers, in a form of cross-section study. The reviewer finds most inspirative Maersheimer?s neorealistic theory of stability, classifying bipolarity above multipolarity, which is reflected in consequent evaluation of security threats. New security threats ask for the transformation of NATO alliance, in the background of political Islam or the recent Russian-Georgian conflict. The contents analysis of presented papers points to main hidden problem lying behind all security questions: whether the U.S. would be able to continue in its role as a world leader, explicitly owing to American economy difficulties, e.g. today?s financial and mortgage crisis.

Europe and Radical Islam: Islamisation of Europe

Informational pages

Pavel Krčílek

Vojenské rozhledy / Czech Military Review Nr. 3/2008, Vol. XVII. (XLIX.): 68-80

The major topic of this article is the problem of radical Islam in the context of contemporary as well as historical development in Europe. In the course of several chapters the author describes basic facts of the modern phenomenon of Islamisation, impending over Europe. His study is supported from several sources, e.g. Gadhafi M., Islam taking over Europe (2006); or reports issued by the Netherlands Security and Intelligence Service (2005); Swiss Country Report on Islamisation (2007), etc. There are over 50 million Muslims in Europe, if Turkey is added to the EU, Europe will have another 50 million Muslims. When terrorism can be considered as a danger, Islam should be considered as a risk to generate such a danger. The democratic state is fully entitled to diagnose any kind of "side effects" as a result of Islamic preaching. This is not judging the religion but its effects on the system. The solution is long-lasting: to support cultural integration, because only a few European Muslims are involved politically, or take part in terrorist attacks.

The Internet as a Tool of "Sacred War"

Informational pages

Vojenské rozhledy / Czech Military Review Nr. 3/2008, Vol. XVII. (XLIX.): 81-84

It is said that at present, all means and knowledge necessary for any terrorist attacks are aviable on Internet network. Islamists regard Internet as a university of a special sort, without territorial boundaries, suitable for schooling and preparation of "sacred war". Internet users are decentralized, which is suitable for guerrilla fighters. By studying Qur?an (Koran), people are opened to indoctrination with global jihad. The Qur'an states that those who die in this type of jihad automatically become martyrs of the faith and are awarded a special place in heaven. Islamic law alleges that all nations 174 must surrender to Islamic rule. Indoctrinated terrorists could be and are united in their beliefs via electronic Internet pages, anywhere in the world, into one global cyber space. Electronic jihadists use notebooks and small electronic cameras to view and study suicide bomb attacks. The fight against such threat is endless, marked only by partial victories. Original article by Rolf Tophoven, Österreichische Militärische Zeitschrift, No 2, 2008

Strategic Aspects of Actions Taken to Destroy an Insurgency

Military professional

Ing. Josef Nastoupil

Vojenské rozhledy / Czech Military Review Nr. 2/2007, Vol. XVI. (XLVIII.): 221-228

Conventional military strategists did not hold counterinsurgency (COIN) and irregular warfare with high esteem. In fact, strategists often marginalized COIN and irregular warfare, never regarding irregular warfare as worthy of strategic-level discussions. But true strategic thinking on the subject of COIN and irregular warfare consider time and space and long strategic view. Now we must consider critical areas for the global war on terrorism (GWOT), including changing nature of the threat environment. Sources: Principles, Imperatives and Paradoxes of Counterinsurgency, by E. Cohen, Lt.Col. C. Crane, Lt.Col. J. Horvath, Lt.Col. J. Nagl; Strategic Aspects of Counterinsurgency by Col. J. B. Celeski in Military Review March-April 2006.

    1  2    next