Vojenské Rozhledy

Czech Military Review

Fulltext search in archive



« advanced mode »

 previous    1   2   3   4  5   6   7   8   9   10   11   ...    next 

Results 91 to 120 of 2170:

The Operational Preparation of State Territory and a New System of Railroad Structure Reconstruction

Military professional

Ing. Jan Englich, doc. Ing. Radovan Soušek, Ph.D., Ing. Jan Strbačka, CSc., Ing. Pavel Viskup

Vojenské rozhledy / Czech Military Review Nr. 4/2011, Vol. XX. (LII.): 145-159

The paper offers new looks at the system of railroad reconstruction in crisis and emergency situations. It originates from The Operational Plan of State Territory Preparation that is implemented in harmony with The Plan of Technology Protection of Railroad. This article is a free sequel to information published in this Military Revue No. 4/2005 dealing with drafting the plan of railroad technology protection. The authors´ main purpose is to give readers basic knowledge on key changes in railroad security system and main security measurements till 2013. The protection system is intended to be more flexible and economic.

Priorities of Czech Army Logistics in Upcoming Period

Military professional

Prof. Ing. Petr Hajna, CSc., Ing. Jaroslav Linhart, Ph.D.

Vojenské rozhledy / Czech Military Review Nr. 2/2011, Vol. XX. (LII.): 136-141

The thing that authors regard as most important and that needs attention before anything else is the modernization of logistics in the Czech armed forces, as well as within the whole Sector of Defence, as we are facing now the topical problem-decreasing amount of financial resources from defence budget. This decrease has been enforcing logistics to find new and non-traditional approaches and ways how to solve tasks related to material and technical support. This article is aimed at the description of undertaken measures in the performance of logistics tasks in 2011 and following years. The conception and vision of the Czech Armed Forces future, including its logistics, should be involved in the White Defence Paper. The specification of the targets and the abilities in bigger detail will is involved in the White Paper on Defence.

Two Monographs on Security from Slovakia

Book review

Vojenské rozhledy / Czech Military Review Nr. 1/2011, Vol. XX. (LII.): 137-143

Prof. Dr. Štefan Volner, CSc., is a very diligent and prolific author. He is the author of many monographs, books, papers and articles in the field of security and defence policy published worldwide. Now we have his latest two books: Security of Mankind (Bezpečnosť ĺudstva) and Security for the 21st Century (Bezpečnosť 21. storočí). In the former one, he comes out of a broad concept of security. Dr. Volner regards the theory of securitization as a lingual and socially determined construct, and so does analyses of security topics. The purpose of his first monograph is to familiarize experts and students with new theoretical concepts, ideas, methodological approaches and paradigms. The latter monograph has a classical structure tied with security studies; it contains theoretical fundaments, dealing with global risks and classifies wars of 21st century. He regards human security as a multifaceted phenomenon, at macro- and micro- levels.

Emerging New Threats in Unstable World

Reviewed

PhDr. Miloš Balabán, Ph.D., prof. PhDr. Martin Potůček, CSc., MSc., PhDr. Antonín Rašek

Vojenské rozhledy / Czech Military Review Nr. 4/2011, Vol. XX. (LII.): 3-21

The article identifies new threats of global character influencing global security and quality of life. The inspiration is drawn from the debate over proposed updated Czech security strategy 2011, where several security scenarios were drafted. It is a free sequel to the study "Wild Cards in Future Development of World Security" published in this review in No. 2, 2008. The titles of some chapters are as follows: The Collapse of World's Monetary System and Global Economic Warfare, Crisis of Global Government, The Shortage of Key Commodities (oil, gas, coal, raw materials, water, foodstuffs), Migration, Organized Crime, European Union prior to Disintegration, The Crisis of NATO, New Religions, Will Rich People Live Longer?, etc.

Prospective Attitudes to the Reform of Security System

Military art

Ing. Vladimír Krulík

Vojenské rozhledy / Czech Military Review Nr. 4/2011, Vol. XX. (LII.): 48-64

Potential improvements of our security system depend above all on the governmental concern to really implement the reform, as a complicated, laborious and sensitive process. The preparing work being done in 2001-2002 proved deficiency in Czech security system. The author says that it is practicable to set rules by issuing clear directives, further it is necessary to prevent unreasoned manoeuvring within boundaries of implementation programmes, whatever manoeuvring could be motivated, by political, local, regional or subjective interests. This essay places emphasis on the presentation of various methods by which the security system could be changed for the better, explaining them in rather non-traditional ways, from more broad angle, embedded into a wide frame of knowledge, experiences and recommendations.

Strategic Aspects of Actions Taken to Destroy an Insurgency

Military professional

Ing. Josef Nastoupil

Vojenské rozhledy / Czech Military Review Nr. 2/2007, Vol. XVI. (XLVIII.): 221-228

Conventional military strategists did not hold counterinsurgency (COIN) and irregular warfare with high esteem. In fact, strategists often marginalized COIN and irregular warfare, never regarding irregular warfare as worthy of strategic-level discussions. But true strategic thinking on the subject of COIN and irregular warfare consider time and space and long strategic view. Now we must consider critical areas for the global war on terrorism (GWOT), including changing nature of the threat environment. Sources: Principles, Imperatives and Paradoxes of Counterinsurgency, by E. Cohen, Lt.Col. C. Crane, Lt.Col. J. Horvath, Lt.Col. J. Nagl; Strategic Aspects of Counterinsurgency by Col. J. B. Celeski in Military Review March-April 2006.

The Control of Surplus Military Materiel

Informational pages

Ing. Václav Kostelník, CSc.

Vojenské rozhledy / Czech Military Review Nr. 3/2007, Vol. XVI. (XLVIII.): 114-127

The term "military materiel" covers equipment and supplies, i.e. articles which soldiers need in order to carry out tasks (clothing, radios, tools, weapons, vehicles). Guarding, attendance, maintenance and preservation, transport, storage, cost a lot of money that could be used in another way, so the Czech Army must sell them out. The author quotes legal rules and military manual dealing with this matter. He differentiates between solely military items (weapon systems) and those that may be used for civilian purposes. Unfortunately, military manuals do not precisely specify those categories. At the end he demands developing legal norms giving a definition of military materiel, including the list of such materiel, in a form e.g. an amendment, which could be updated every year.

Potential Deployment of Snipers in ACR Operations

Military professional

Mjr. Ing. Josef Ručka, Ph.D.

Vojenské rozhledy / Czech Military Review Nr. 3/2007, Vol. XVI. (XLVIII.): 135-149

The article deals with duties of a sniper and a military observer, sharp shooting at long distances, movement at areas in which operations are being carried out. Snipers are trained marksmen who are specialized in sniping the enemy. They are usually sited away form the main force, so that they can concentrate on shooting at selected targets instead of being drawn into general firefight. They are also less likely to be affected when the main force comes under artillery fire. The modern sniper is not alone, he is usually employed in team of two. The author also describes rifles and other weapons and equipments snipers are armed. The article is supplemented by graphs and tablets.

The Rules of Fire Application of Arty Regt and Bty

Military professional

Prof. Ing. Ladislav Potužák, CSc.

Vojenské rozhledy / Czech Military Review Nr. 4/2007, Vol. XVI. (XLVIII.): 175-181

The purpose of this article is to explain methods of the application of artillery fire, according to the width and shape of targets by artillery regiment (without rocket battery) and by artillery battery, if components/data for effective fire are set by substitute means, without computer with respective SW. The assignment of optimal method of artillery fire and its professional implementation has a great influence on FFE (fire for effect). For the sake of economy, live firing practice is executed only to a limited extend. Most of activities are carried out only in the field of command skills, keeping documents, commanders' performance and training gun crews; their reactions to commands and orders. The article is accompanied by several tablets with data concerning application of artillery fire, variable data for aiming devices, adjusted ranges of fire, widths of target divided into several sheaves of fire (converge sheaf, sheaf for target width), their corrections.

Unmanned Aircraft

Military professional

Ing. Josef Nastoupil

Vojenské rozhledy / Czech Military Review Nr. 2/2007, Vol. XVI. (XLVIII.): 213-217

The article deals with the question of unmanned aircraft generally, it doesn't discuss their individual types. Unmanned aircraft (UAVs) are designed to fly without a pilot (that is by remote control), their combat engagements are less risky and potentially less costly. Army officials say that UAVs will serve better, as they will carry more weapons and sturdier avionics, use the same fuel as other service aircraft, and could be operated by soldiers in theatre. Avionics and weapons might be controlled even by a conventional link with ground control stations. One "land pilot" can control several UAVs simultaneously. The running programmes will produce mature technologies and stable designs, making use of critical technologies, control abilities. The other critical technologies are: an engine that uses heavy fuel and an automatic take-off and landing system. As a part of coalition forces, the UAVs had proved their usefulness and serviceability in the Middle East.

Environmental Aspects of Military Training and the Impacts Classification on Living Surroundings

Military professional

Kpt. Ing. David Řehák, Ph.D., mjr. Ing. Milan Haška, Ph.D.

Vojenské rozhledy / Czech Military Review Nr. 4/2007, Vol. XVI. (XLVIII.): 187-192

The main objective of the ACR is the most effective and best defence of the country, with the use of principles of collective defence. But the military activities are accompanied by damages, wastes in living environment. The classification of those effects is being done by the method called Hazard and Impact Index that enables to set probable damages in advance and to adopt preventive measures to prevent them. The process starts with evaluating objects that might be endanger, materials, vehicles, activities, energy, together with impact on environment. Impact groups are divided roughly into two groups: natural surrounding, and socio-cultural surrounding. Some are expected, other unexpected, frequently they are mixed. Most of military damages are unintended, accidental. The article is accompanied by the tables introducing figures of Hazard and Impact Index.

The Air Force in the Urban Fight

Military professional

Ing. Josef Nastoupil

Vojenské rozhledy / Czech Military Review Nr. 2/2007, Vol. XVI. (XLVIII.): 218-220

As the world grows ever more urbanized, the Air Force prepares airmen to fight in cities. They are complex domains where military operations are congested by terrain and by the danger of collateral damage and the risk to non-combatants. The Air Force supports the joint force by providing valuable airspace control, command and control, communications and psychological operations support, close-air support, terminal attack control, intelligence, surveillance and reconnaissance, and combat search and rescue. But Air Force capabilities in the urban are not just the supporting force for urban operations, it has ability to provide strategic attack against critical urban area. Based upon an article by Lt.Col. Brian M. Newberry in Armed Forces Journal, September 2006.

The Modelling of Technological Equipments of the Armed Forces of the Polish Republic (Theoretical Opening)

Informational pages

Brig. gen. dr. Ing. Andrzej Szymonik

Vojenské rozhledy / Czech Military Review Nr. 3/2007, Vol. XVI. (XLVIII.): 108-113

The Polish armed forces (Wojsko Polskie) are continuously redeveloped. This article written by Brig. Szymonik, the head of Science and School Department at the Ministry of National Defence, deals with general aspects of this process. The problem concerns not only of the Polish military by itself, it covers even all Polish defence industries. After entering the Polish Republic into common world's market, Polish defence industries must adapt themselves into this competitive environment. It is being done with the use of several international agencies, WEAG (Western European Armaments Group), IPC (NATO Industrial Planning Committee), and EAA (European Armaments Agency). He is a supporter of higher military expenditures, as the necessary prerequisite for introducing modern technologies into both defence plants and Polish armed forces.

Predictive Methodology in Intelligence Services

Reviewed

Bc. Petr Zelinka

Vojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 29-39

This article aims at building a bridge upon a gap, which separates academic sphere and intelligence community in the issue of predictive methodology. The author tries to accomplish this objective by presenting intelligence predictive methods based on open-source literature research. First, the question of uncertainty and probability in prediction is introduced (Cynefin template). Then follows basic introduction to predictive methods in civil and military intelligences, so that the reader might grasp the fundamentals of early warning systems. The academics and above all journalists should know the risks and perils in forming intelligence forecasts, estimates, foresight and warning scenarios, e.g. the so-called Black Swan scenario, the author explains potentials failures of the Delphi method. This study ought to be regarded as an introductory to predictive intelligence concurrently done by governmental agencies for purposes of national security and defence.

NATO Response Force

Military art

Ing. Jaroslav Kulíšek

Vojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 46-71

This article illustrates the troubles encountered with development of the NRF. The NATO Response Force is a highly ready and technologically advanced force made up of land, air, sea and special operations forces components that the Alliance can deploy quickly wherever needed. The NRF is intended to be a transformational force that will not only be able to meet the security needs of NATO in 21st century but also serve as an agent of change whereby all the member nations of NATO will be able to bring capabilities, and concepts of operations into their national forces. Undoubtedly, the NRF will not provide a basis for solving all of complex challenges. But it does offer an opportunity for experimentation and testing-the essence of military transformation-and the forging of creative solutions. The views expressed in this assessment are those of the author and do not reflect the official policy or position of NATO or EU.

War Game

Military art

Ing. Jaroslav Kulíšek

Vojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 60-82

War game is a simulation of military operations intended to train military commanders or to test a proposed strategy. It is a game in which model soldiers are used to create battles, in order to study tactics. This article illustrates the importance of War Game COAs (course of action). It was tested against opposing force COAs. Such exercise will help to identify advantages and disadvantages and the key elements of execution planning for each COA. The lesson learned during OHQ CZE/SVK BG EU Staff Exercises that took place in Olomouc from January 19th, to January 23rd, and from February 16th, to February 20th, 2009 is that war-gaming (although time consuming) is something closer to "reality" than the "theory" in doctrines. The war-gaming practices teamwork, facilitates team-building and enables to share mental model COA. Commanders and their staff ought to be engaged in simulations and war games more frequently. All information and sources for this paper were drawn from unclassified materials.

Employing CALS in Acquisition Process of the ACR

Military professional

Ing. Petra Butorová

Vojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 141-148

Computer-Aided Logistic Support (CALS) appeared for the first time in 1984 in a common study of US government and American defence industry. The study recommended using technical data in digital form. Further it was changed into Computer-Aided Acquisition and Logistic Support and in 1994 the acronym CALS was changed into Continuous Acquisition and Life-Cycle Support. At present we interpret CALS as the support to all automatized processes with fully digitalized data processing. Among its important tools belong LCC (Life-Cycle Costs) and risk management. It is a vast standardization strategy, covering the whole life cycle, via acquisition process, its support, innovation and product disposal. CALS is supposed to make acquisition procedures in the ACR more effective.

The Deployment of Capacities and Means of Czech Engineer Troops in Non-combat Operations

Military professional

Doc. Ing. Jaroslav Zelený, CSc., Ing. Jan Mazal, CSc., pplk. Ing. Lubomír Kroupa, CSc.

Vojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 164-178

The Engineers are specialist soldiers trained in the construction and demolition of bridges, field fortifications, obstacles, roads, etc. Their major task is to support Czech missions abroad, as a part of multinational peacekeeping forces. This article is a preliminary study into the current state of applying the Czech Engineer units in operations other than war as a part of Joint Forces Peace Support Operations. There are mentioned some aspects, for example basic engineer support tasks, possible demanded future capabilities of the Czech Engineer Troops, engineer support to movement and force protection engineering. The purpose of this article is to initiate a debate about the topic and to start the brainstorming process in a broad military environment.

European Legislation and its Role in the Fight against CBRNE (Introductory to Problems)

Military law

Poručík Ing. Martin Klusáček

Vojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 156-167

Nowadays, with the potential employment of Chemical, Biological, Radiological, Nuclear Explosives (CBRNE), terrorism poses a threat to all countries over the world, it becomes scary phenomenon at a global scale. The author introduces key agreements dealing with this subject: Chemical Weapons Convention, European Agreement concerning the international carriage of Dangerous goods by Road, European Agreement concerning the International Carriage of Dangerous Goods by Inland Waterways, Regulations concerning the International carriage of Dangerous Goods by rail, and so on. The main objective of the EU is to introduce such legal measures so that it would be extremely difficult for terrorist groups to legally gain CBRNE materials. The purpose of this essay is to analyse legal frame of CBRNE materials and to stress the protection against their misusing within an authority of the ACR.

Testing Technology of a Small Bakery

Military professional

Ing. Pavlína Vasická, Ph.D., prof. Ing. Aleš Komár, CSc.

Vojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 179-190

Bread has constituted a staple of man's diet for centuries. Modern armies have made bread a major part of their sustenance, portable ovens are carried on campaign to facilitate its ample provision. The provisional support of Czech missions abroad is our first priority, baked products belong among those most important. The article deals with results of specific research done within Defence University in this field. The research covered analysis of modern technologies used for baking, devices and appliances. It dealt with traditional materials (e.g. flour) and verified them from a point of chemical, microbiological and sensorial parameters. Actual costs were compared with prices of other methods of production. The research proved that container bakeries are effective device for bread production.

The Evaluation of Development in the Institutional Area of Logistics

Military professional

Plukovník Ing. Oskar Kovařík

Vojenské rozhledy / Czech Military Review Nr. 2/2010, Vol. XIX. (LI.): 126-132

The idea of this enquiry into Czech Army logistics was to prove that even under hard conditions originated in permanently changing army concepts, the army logistics still keeps its high standard and responsibility. During transformation, an appropriate organization structure has been created, with working mechanism of logistics support, using motivated and rationale source exploitation. The purpose of an array of transformation in defence sector was to introduce not only new and effective army structure, compatible with NATO armies, but also to change the system of fi nancing forces. The funding ought to be more economical. The article is backed by a longterm study and observation of logistics development in defence sector.

Alliance's New Strategic Concept (Discussion Continues)

Reviewed

PhDr. Antonín Rašek

Vojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 3-15

The NATO's New Strategic Concept is only starting point to open discussion on a wide range of security problems. At the beginning there is a description of Czech home politics, attitudes of Czech political parties toward NATO alliance. The author explores the history of NATO's identity crisis. In recent years, different security optics of the members splintered NATO. The US wants an expeditionary alliance with a global reach, the Western Europeans hold to a vision of a regional club of liberal democracies, the Central Europeans have a wish so that Washington would stand by them when they will find themselves pressured by Russia. NATO is divided on how to reform its decision-making processes and how to fund and resource its home and away missions. In Afghanistan, the Alliance faces the most difficult operational challenge to date, with a real possibility of strategic failure. The overarching problem is how to define the core business of NATO: cyber defence, energy security, WMD proliferation, stability and reconstruction missions, out-of-area missions, territorial security, enlargement, partnership-building. The discussion over the New Strategic Concept needs to reorder the question how to define NATO's appropriate roles and go from there.

Risk Management in the Food Service Operation

Military professional

Prof. Ing. Aleš Komár, CSc., Ing. Boris Šroll, Ph.D.

Vojenské rozhledy / Czech Military Review Nr. 2/2010, Vol. XIX. (LI.): 133-148

The aim of this work was to make an analysis of current state of catering services in the forces, to define risks of possible harms, damages, losses, or another prospective disasters, in order to propose a systematic approach to the risk management. Identified risks are being completely analysed. Author's team drafted a risks catalogue to make their identification easier. Among others, upon this analysis, they compiled the chart of risks in catering process within the section of the Ministry of Defence of the Czech Republic. A user manual for monitoring and risk control was created, so that we can adopt suitable procurement measures for avoiding or minimizing risks, their occurrences, eventually lowering unwanted results generated by the above mentioned analysed risks.

Main Methods of Intelligence Analysis and Ways of its Evaluating

Military art

Mgr. Miroslav Kalous

Vojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 24-32

The article presents six more or less structured analytical methods that are or could be employed in intelligence analysis. This type of analysis, one part of the intelligence cycle, is understood as "the process of evaluating data for reliability, validity, and relevance; integrating and analysing it; converting the product of this effort into a meaningful whole, which includes assessment of events and implications of the information collected". The set of presented methods includes: link analysis, opportunity analysis, analogy, linchpin analysis, analysis of competing hypothesis and alternative scenarios. The study doesn't stop with presenting those methods; it also explains which type of reasoning (inductive, deductive or abductive) is used when working with each particular method. In broad terms, the article tries to shed light on intelligence analysis and its specifics. The reader should obtain better understanding their usefulness in the daily work of intelligence analyst.

Changes in Public Sector Resources Management Systems and their Reflexions within Czech Armed Forces

Nonreviewed - Other

Ing. Aleš Olejníček

Vojenské rozhledy / Czech Military Review Nr. ZC/2007, Vol. XVI. (XLVIII.): 44-55

This essay describes management system as a factor that can increase effectiveness in defence sector. The author depicts relationship among new public management reforms, public expenditure reforms and defence sector management reform. The reform of defence sector in the Czech Republic is characterized as introducing new management tools. Author explains their inner substance and importance; draws our attention to the difficulty of its first implementation. He underlines some of the factors which shape their successful implementation into Czech armed forces.

Impacts of Warfare in Urbanized Terrain on Inexperienced Young Soldiers

Military art

Doc. Ing. Dušan Sabolčík, CSc.

Vojenské rozhledy / Czech Military Review Nr. 2/2007, Vol. XVI. (XLVIII.): 66-76

New technologies influence not only social advance, but also the development of armed forces. Present-time warfare is resolute, dynamic. In the 21st century, both low and high intensity conflicts, counterterrorist or stabilization operations might take place in urbanized areas, where casualties and material damages are high. New weaponry and technology make demands on military and professional training, self-control, psychic preparedness. In advance we must set rules governing the firing of weapons and use of force namely by soldiers involved in peacekeeping and counter-insurgency situations. Mental stress, emotional, or physical strain or tension of soldiers are manifested by fanaticism, looting, killing non-combatants, desertions or going away from military units without permission (AWOLs), depressed soldiers inflict wound on themselves, they misuse drugs or alcohol. The author cites factors increasing soldiers' resistance: high cohesion of units, tough training, relaxation, courageousness, high awareness of objectives of operations and war aims.

Identification FoF in Ground Forces

Military professional

Ing. Josef Nastoupil

Vojenské rozhledy / Czech Military Review Nr. 4/2006, Vol. XV. (XLVII.): 154-158

It is an age-old problem, how to identify someone or something, to prevent from incidents, in which friendly forces fire on their own troops or vehicles by mistake, because of tiredness, exhaustion, psychological stress, technological defects, unforeseen circumstances, etc. Although there exists a technology carried specifically in an aircraft, combat vehicles, that utilizes coded radio signals to identify other friendly units, adopted measures are not always successful. In NATO, we have standardized systems for such identification: BTID-Battlefield Target Identification Device (for identification of vehicles and helicopters, STANAG 4579); and DSID-Dismounted Soldier Identification Device (for identification soldiers, STANAG 4630). At present, Germany (together with the United States) is in the lead of development system IFF. Systems are conceptually, technologically and tactically synthesized into ZEFF (ZielErkennung Freund-Feind), common for vehicles, helicopters, soldiers, as well as vehicles beyond the area of forces deployment. Source: Europäische Sicherheit magazine, 4/2006.

The Expanding Role of China and India in Word Security Prognosis (Prognostic Scenarios)

Informational pages

PhDr. Antonín Rašek

Vojenské rozhledy / Czech Military Review Nr. 3/2009, Vol. XVIII. (L.): 54-64

The theme of this study is a prognostic reply to the anticipated rise of mentioned two Asian powers from the point of international relations. Their growing power will precipitate consecutive results-the end of American leading role and coming multiple world. Will it produce world's stability or security threats? The author presents several scenarios. All take note of 9/11 attacks and a possible crash of two form of capitalism, democratic in the West and authoritarian in China and Russia. India has a special position. The economic success of those systems is a great chance for humane rights and civil liberties. World's dominance will be divided among the U.S., China, partly the EU, with strong position of regional powers, India, Japan, Indonesia, Iran, South African Union, Egypt, Brazil, Mexico and others. Russia will lose his superpower position, its internal economic and ethnical problems make it weak, and therefore Russia will attempt to form military coalition with China, which will lead to new world's bipolarity.

Economic Aspects of the Acquisition in Defence Department

Informational pages

Ing. Aleš Olejníček

Vojenské rozhledy / Czech Military Review Nr. 1/2009, Vol. XVIII. (L.): 88-99

This essay depicts he alternative approach to investments in public sector. Author expresses his belief on evaluating and rating investments in public sector in the same way as in private sector. The simple theoretical analysis and foreign experiences give enough evidence about feasibility of such approach even in defence sector. Nowadays, in governments across the world, public-sector financial systems are being transformed more fundamentally than at any time in decades. The changes are taking place to respond to a number of deficiencies of government accounting and financial-management system. Foreign experience has proved that a system of output appropriation provides a workable alternative to the traditional input-based system and can yield substantial advantages for both departmental management and government decision makers.

This essay depicts he alternative approach to investments in public sector. Author expresses his belief on evaluating and rating investments in public sector in the same way as in private sector. The simple theoretical analysis and foreign experiences give enough evidence about feasibility of such approach even in defence sector. Nowadays, in governments across the world, public-sector financial systems are being transformed more fundamentally than at any time in decades. The changes are taking place to respond to a number of deficiencies of government accounting and financial-management system. Foreign experience has proved that a system of output appropriation provides a workable alternative to the traditional input-based system and can yield substantial advantages for both departmental management and government decision makers.

Islamists Online

Informational pages

Jiří Hodný, Ph.D.

Vojenské rozhledy / Czech Military Review Nr. 2/2009, Vol. XVIII. (L.): 70-78

Like hundreds of millions of other people, Islamic terrorists and their supporters use the Internet. In many ways, the Internet is a tool tailor-made for these Islamic extremists, who use it covertly and overtly to plan attacks, raise money, and spread anti-Semitic and anti-American propaganda written in English, Arabic, and other languages. There is sufficient information to believe that in the future, terrorists may even turn the Internet itself into a weapon, using it to wreak havoc on America's critical infrastructure. Because these militants are global, rather than being located in a single geographical area (Pakistan, Indonesia, Somalia, Iraq), the Internet provides them with a new and effective way to attain their goals. It may be difficult to catch extremists planning or coordinating an attack if they are using encryption, steganography, or some other method of hiding their online activities.

 previous    1   2   3   4  5   6   7   8   9   10   11   ...    next