Fulltext search in archive
Results 31 to 60 of 186:
Reflections over Syrian Conflict in the Czech RepublicReviewed - ResearchDoc. JUDr. PhDr. Miroslav Mareš, Ph.D., Mgr. Michael MuradVojenské rozhledy / Czech Military Review Nr. 3/2013, Vol. XXII. (LIV.): 132-142 | DOI: 10.3849/2336-2995.22.2013.03.132-142 This study deals with the responses to recent Syrian conflict in the Czech Republic. The authors introduce particularly activities inside Syrian diaspora, actually formed during the time of communism. Syrians citizens living in the Czech Republic are not homogeneous, which is similar to the situation in Syria. In our country we can find both people loyal to the regime of Ba'ath Party and Bashar al-Assad, and also members of opposition that in fact has divided into two groups, since the mid-2012. The authors introduce reactions of various subjects from the Czech Republic. |
The White Paper and my Alliance ExperienceNonreviewed - OtherJiří ŠedivýVojenské rozhledy / Czech Military Review Nr. 2/2013, Vol. XXII. (LIV.): 15-22 At the time of forming the team around a designated defence minister Alexander Vondra, in the early summer 2010, there was no doubt that we need a complex concept document, able to analyze and describe the then situation, to readjust directions and goals for defence department, so that it could stimulate the follow-up transformation of Czech Army. The author, who used to be one of the leading Defence Ministry officials, thus made use of his experiences he gained in NATO structures. He gives an apt, well-founded, and first hand description of key points of this very fresh military history. |
The New Role of IntelligenceMilitary artPlk. Ing. Miroslav Šuhaj, Ph.D., doc. Ing. Oldřich Horák, CSc.Vojenské rozhledy / Czech Military Review Nr. 3/2009, Vol. XVIII. (L.): 37-42 The article points out the altered role of intelligence and counterintelligence under the conditions of new security threats and relevant problems of intelligence analysis. Authors compare the theories of the orthodox and revisionist intelligence schools dealing with the detection of surprise attacks and finally outlines solutions related to the training of intelligence analytics. Orthodox views are as follows: surprising attacks are inevitable, such attacks will succeed as they are unpredictable, complex and sophisticated; reformists say that too much attention is paid to various failures, there are many cases in which intelligence prevention was successful. Threat analyses are very complicated; hints are not clear, ambiguous. New threats must be examined and eliminated with cooperation with other force branches, police, integrated rescue system, and others. Last but not least, there is indispensable role of preparation and schooling of intelligence officers. |
The Application of Fuel Dopes for ACR Cars, Material and EquipmentsMilitary professionalProf. Ing. Aleš Komár, CSc.Vojenské rozhledy / Czech Military Review Nr. 4/2012, Vol. XXI. (LIII.): 94-98 | DOI: 10.3849/2336-2995.21.2012.04.094-098 The article presents the results of advanced defence research for the higher economy and security support of military cars and vehicles. The Czech national programme to cut or lower exhaust fumes belongs among our eminent and foremost tasks. Exhaust gases form 20 per cent of total volume of harmful emissions. The newly developed dopes supplemented to fuels, namely to solid fuels, polluting a lot our atmosphere, significantly contribute to the fulfilment of this national task. The article is accompanied by relevant charts and tablets. |
The Fragmentarization of Europe as a Security Threat Europe 2010: Predictions and RealityMilitary sociologyPhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 3/2012, Vol. XXI. (LIII.): 148-164 Unlike the real state of affairs, the scenarios for Europe 2010 did not presuppose the rise of financial and economy crises. Political scientists did not perceive the series of terrorist attacks, namely in Great Britain, Spain and Russia. Security questions, home security and defence, came to the foreground more then was originally expected. There are hubs of future power blocks of divided Europe. It is impossible to incorporate all the results and consequences of our presuppositions. Since we want to look into individual, particularly interesting developments, the author recommends to create several teams for individual scenarios, instead of drawing several scenarios by one scholarly team. |
Strategic Culture: Concept PresentationReviewed - ReviewIng. Tomáš PospíšilVojenské rozhledy / Czech Military Review Nr. 2/2012, Vol. XXI. (LIII.): 26-33 Studies of the importance of culture have gained greater attention in the post-Cold War era. In present world, there are many fenomena that can't be explained in terms of neorealism. There is the consensus in national security policy studies that culture may significantly affect grand strategy and state behaviour. It limits behavioural choices, from which we could derive predictions about our strategic choice. This study is based among others upon Johnston's strategic culture concept related to three generations. The study is divided into five parts: at first the author introduces general concept of strategic culture, the second, third and fourth parts correspond to individual generations. In closing part the author explains his own understanding to this concept. |
Swarming: Basic Aspects, Development and Prospects of its ApplicationMilitary artMgr. Ľubomír Lupták, Ph.D., Bc. Petr KaliničVojenské rozhledy / Czech Military Review Nr. 2/2012, Vol. XXI. (LIII.): 59-68 | DOI: 10.3849/2336-2995.21.2012.02.059-068 The information revolution is affecting the whole spectrum of conflict. Here the authors advance an ambicous idea of "swarming" that may emerge as a definitive doctrine that will encompass and enliven both cyberwar and netwar. Swarming is seemingly amorphous, but it is a deliberately structured, coordinated, strategic way to strike from all directions, by means of a sustainable pulsing of force and/or fire, close-in as well as from stand-off positions. Swarming depends on a devolution of power to small units and a capacity to interconnect those units that has only recently become feasible, due to the information revolution. The idea of swarming stands for engaging an adversary from all directions simultaneously, either with fire or in force. |
Legitimate and Illegitimate Wars after 1990 (Persian Gulf, Afghanistan, the Balkans)Reviewed - ResearchDoc. PhDr. Jan Eichler, CSc.Vojenské rozhledy / Czech Military Review Nr. 4/2012, Vol. XXI. (LIII.): 12-24 | DOI: 10.3849/2336-2995.21.2012.04.012-024 This treatise is a follow-up to an article by the same author in Military Review No. 2, 2012, dealing with legal and illegal war after 1990. Now the author concentrates on another key question: the legitimacy and the unlawfulness of force deployments in internationalrelations. The paper is grounded on fundamental works by the former Australian foreign secretary Gareth Evans, setting international rules or criteria determining when it is right to fight. The effectiveness of the global security system is not only on the legality of its security decisions, military actions, but the common perception of their legitimacy-whether they are made on solid evidentiary grounds, for the right reasons, morally as well as legally. |
Security Threats from Inside: Scenario "Extremism in Being and Coexistence with Romany Ethnic Group and Migrants"Military sociologyPhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 2/2012, Vol. XXI. (LIII.): 143-154 | DOI: 10.3849/2336-2995.21.2012.02.143-154 At first, we are familiarised with terms of extremism, Romanies (Gypsies), anarchists, neo-Nazis, then the author introduces possible picture of security situation at the turn of second and third decades of 21st century. He believes that in every country there is a limited ability to integrate ethnic groups by majority. As soon as the limits are exceeded, problems begin. His scenario ends with a pessimistic vision: increasing tensions will ask army deployment, but even local armed forces are not able to enforce law and order, therefore the government must ask for help neighbouring states. |
Operational Art: Theory for PracticeMilitary artIng. Ján SpišákVojenské rozhledy / Czech Military Review Nr. 4/2012, Vol. XXI. (LIII.): 45-54 The aim of the article is to provide the readers information related to the theory of fundamental elements and tools of operational art, which are for the preparation and conduct of military operations, particularly at the operational level of war, critical. The operational level of war depends on methods that will create appropriate conditions to achieve the closing state, set by a superior commander, in accordance with the complex strategy of military and non-military instruments of state power. Although the methods of application of specific operational art components rest mainly in the mind of the English Annotations and with several acts tied with civil emergency preparation. |
Intelligence Support to Psychological OperationsInformational pagesMgr. Jiří HodnýVojenské rozhledy / Czech Military Review Nr. 2/2008, Vol. XVII. (XLIX.): 113-117 Intelligence activity is an essential part of psychological operations (PSYOPS). Intelligence data are collected, treated, and assessed by intelligence officers together with analytical specialists in cooperation with intelligence authorities from other services. Two basic documents are made. First, in British Army, it is called Country Area Study; in US forces it is labelled as PSYOP Basic Study. The second type of studies represents the assessment of target audience, called in British Army Basic Psychological Study, in US Special PSYOP Assessment. Gathered information are integrated into special electronic bases, e.g. SOCRATES (Special Operations Command, Research, Analysis and Threat Evaluation Data System), or POADS (Psychological Operations Automated Data System) used by the US Army. The rating of effectiveness of psychological campaigns is extremely difficult and consists of several phases. Even enemy's propaganda is analyzed. This process is of specific structure, categorized as SCAME (Source, Content, Audience, Media, and Effect). For PSYOPS operations is extreme important their precise timing. Legal Aspects of "Consciousness and Religion" |
The Hazard of Humane Capital Losses during the Transformation of our Security System: An Example of Czech Intelligence ServicesOpinions, controversyMjr. Ing. Bohuslav Pernica, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 1/2008, Vol. XVII. (XLIX.): 64-67 Among others, the transformation of an institution is determined by its human capital. Gains and losses of this transformation depend on the acceptation of organisational changes in the institution by its employees, working staffs that behave above all economically (expediency). The salary and benefit system, compensation packages, play a key role in transformation. The underestimation of this role could precipitate the situation that employees simply quit the institution, and thus endanger the whole process of transformation. The state of affairs in Czech Intelligence Services proves this author's view. Its adaptability is lowered, there is a danger the system will become less effective in key domains of their activities. |
Civil-Military Reflections: Does the Army Need Its Own Value Code? (Military Culture, Professionalism, and Constabulary Force)Informational pagesMgr. Tomáš KučeraVojenské rozhledy / Czech Military Review Nr. 1/2011, Vol. XX. (LII.): 71-82 Relations between a military and a civilian society belong to the core issue of civil-military studies. This article reflects main ideas and concepts used in theoretical and analytical literature, including seminar works by Samuel Huntington and Morris Janowitz. A military culture, military ethics and influence of new technologies, full-volunteer army and new missions on military culture are discussed. An abstract term "military" can change very significantly in accordance with actual military culture, perceptible to the fact how civilian society accepts military values. Therefore, not only size and equipment determine how particular armed forces look like. The author introduces the term Constabulary Force reflecting the idea that primary purpose of forces today are low-intensity conflicts and operations other than war. |
Islamism as a Security Threat to the Czech RepublicInformational pagesDoc. PhDr. JUDr. Miroslav Mareš, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 4/2011, Vol. XX. (LII.): 118-128 This paper deals with various forms of Islamist threats to the Czech Republic, with specific attention paid to military issues. It defines the basic terms and describes the role of the Czech Republic in Islamist strategies. Threats of terrorism and jihadism, extremism and riots, violation of women's rights, including the so-called "honour crimes", and internal clashes within the Muslim community are analyzed. Contemporary situation of the Czech Republic can be characterized mostly as "logistic area" to Islamism. Even thought there is not an eminent danger, the intensity of several Islamist threats could be higher in the future. The primary purpose of this article is to form a basic frame for identification of prospective terrorist attacks by means of extrapolation. |
Food Terrorism and AgroterrorismMilitary professionalIng. Hana Vlachová, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 4/2011, Vol. XX. (LII.): 160-168 People commonly imagine terrorist attack as hijacking or improvised explosive device hidden in crowded place. However terrorists can also attack against food, cattle, farm crops or water resources. These kinds of attacks can be ranked among agroterrorism or food terrorism, whereas agroterrorists attack against cattle, farm crops or water resources; food terrorists attack against foodstuffs. This paper is intended to provide information about agroterrorism and food terrorism as possible forms of wilful violence. Food security became discussed issue especially after anthrax incidents in 2001. There are many authorities that deal with these issues, for example EU, NATO or World Health Organization. |
Security Preconditions and Threats (Economy, Religious and Cybernetic Menaces)PhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 2/2011, Vol. XX. (LII.): 38-52 One of main task while preparing new security documents is to identify, analyze and evaluate newly emerging, self-generating security threats. They menace cybernetic, economy, bank, and religious security. The special menace, as for inner security it is lobbyism. Cybernetic threat is today regarded as more dangerous than nuclear strike. The American lived through those experiences in Iraq. Another example is cyber attacks on Estonia in 2007 that swamped websites of Estonian organizations, including Estonian parliament, banks, ministries, newspapers and broadcasters.The attacks triggered a number of military organisations around the world (including NATO) to reconsider the importance of network security to modern military doctrine. There is a paradigm: the more modern country, the more risks are opened. The situation is complicated by the fact that in sophisticated society there is hard to identify attacking enemy. The author underlines that we are the last member nation in the EU that has no official CSIRT (Computer Security Incident Response Team) to react cyber /terrorist attracts. |
Private Military Companies (New Elements in Operational Environment)Military artIng. Jaroslav KulíšekVojenské rozhledy / Czech Military Review Nr. 2/2011, Vol. XX. (LII.): 71-96 This article deals with PMSCs as a relatively new phenomenon in warfare areas. It is open to discussion whether private military companies and the private contractors that they employ, should be treated just like any other transnational industry, or whether they should be treated like mercenaries under international law. As it happened in many countries, private companies and private contractors operate in a legal vacuum. From a strictly legal point of view individuals employed by private military companies are not to be considered as mercenaries. The private military industry offers a wide range of services. Procurement of military services by individuals and private firms has developed in a direction that had probably not been anticipated in previous years. Some military analysts say that the exclusive role of the state in the domain of defence and security is outdated and should be re-examined. |
Forming Security Culture of the European Union (European Security Strategy)Reviewed - ResearchDoc. PhDr. Jan Eichler, CSc.Vojenské rozhledy / Czech Military Review Nr. 4/2011, Vol. XX. (LII.): 22-36 The Document ESS 2003 laid down foundations of our present-day security and strategy culture. It was formed as a summary of several historical and political factors that are introduced in two starting chapters, followed by the more detailed analysis into ESS 2003, its main characteristics influencing EU security and strategic culture. The ESS 2003 is compared with the American doctrinal document NSS 2002. The European security strategy of 2003 is not compared with following American strategical documents, as they were unknown in time of its drafting. The author comes into the conclusion that in spite of indisputable differences, the EU shares the same values as the US, and the EU as an American strategical ally is facing the same threats and challenges as the US does, and in case of need, there is a possibility of combined military actions. |
Some Aspects of the Development of Intelligence Branches inside Strategic Military Intelligence ServiceMilitary artPlk. gšt. Ing. Libor Kutěj, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 4/2007, Vol. XVI. (XLVIII.): 51-58 Military Intelligence plays important part in national defence, indicating particular kinds of potential threats to the Republic or Allied partners. Its effectiveness mainly consists in evaluating the security situation continuously and in exchanging of intelligence information between our services and the Allies, with the aim to detect any potential threats and to eliminate a possibility of surprise in time. According to Act No. 153/1994, concerning the intelligence services, its activities are strictly limited by law. It gains information from open sources (OSINT), by means of signal intelligence (SIGINT), human intelligence (HUMINT), and by using intelligence equipment and tools (IMINT, imagery intelligence). The author proposes to establish central organizational unit, in order to organize, assess, and evaluate individual intelligence branches, their intelligence support to individual target addressees. It should be allowed to reallocate both material and financial sources in form of proposals, reflecting developments of individual intelligence branches. |
Open Sources IntelligenceMilitary artDoc. Ing. Oldřich Horák, CSc., pplk. Ing. Ivo PiknerVojenské rozhledy / Czech Military Review Nr. 3/2007, Vol. XVI. (XLVIII.): 35-42 Intelligence services collect data from various sources: SIGINT (intelligence obtained by listening to the enemy's radio transmissions), HUMINT (information about the enemy obtained from people, e.g. friendly forces, agents, civilians, prisons of war), and the very latest it is the so-called OSINT - Open Sources Intelligence. Its description is not unequivocal. In the intelligence community, the term "open" refers to overt, publicly available sources, as opposed to covert or classified sources. OSINT includes a wide variety of information and sources: media, public data, observation and reporting. It is defined as produced from publicly available information that is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence requirement. |
Intelligence Analysis in Asymmetric OperationsMilitary artDoc. Ing. Oldřich Horák, CSc.Vojenské rozhledy / Czech Military Review Nr. 1/2007, Vol. XVI. (XLVIII.): 52-58 Asymmetric operations lack some linear qualifications at operational levels and split themselves into dozens of tactical warfares. This type of warfare demands quick analytical thinking tied with intelligence preparation of the battlefield, formulating specific information requirement to fill in the missing elements in information requests. As to technological potential, military intelligence is developing very fast. So, the intelligence analysts transfer the main information burden on various information systems, e.g. JSTARS (Joint Deployable Intelligence Support System), AWACS (Airborne Warning and Control System), ASAS (All Source Analysis System), or JDISS (Joint Deployable Intelligence Support System). But large capacities of those systems gave rise to another logical judgement that leads to different interpretation of intelligence data, i.e. the judgements corresponding to higher levels (operational and above) of analytical thinking. Nevertheless, tactical warfare represents operations of small tactical units and this fact puts the main burden on an intelligence analyst who must very quickly cover the gaps in intelligence reports and adopt appropriate decisions. |
Obama's First Year in the White HouseReviewedPhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 3-23 President Barack Obama came to power at a difficult time in America's history. Home and foreign policies are hard to manage, among others, as we are on the threshold of post-ethnic society, and in the war with terrorisms. Obama does not give up American leadership, but he is seeking to find the balance between security and liberty, between power and freedom in the world, broadly speaking. As the consequence, Mr. Rašek presumes emerging the new global security situation: the rise of multipolar world, divided into several new political spheres. This author's opinion is backed by comments by reputable world's political analysts. As far as Euro-Atlantic relations are concerned, or relations with Russia, there are excellent prospects, namely there is the progress with Russia on arms control-part of Obama's determination to put the world on a path toward nuclear disarmament. The author ascribes the drop in Obama's popularity to failed healthcare reform; outside the US, to the fact that Obama is not able to define clear goals and missions in Afghanistan. |
Clarifying the Notion of Direct Participation in Hostilities (The Protection of Civilians)Military lawRNDr. Marek Jukl, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 168-180 International humanitarian law hinges on the principle of the distinction between combatants, whose function is to conduct hostilities during armed confl ict, and civilians, who are presumed not to be directly participating in the hostilities and, therefore, entitled to full protection from attack. They lose this protection only if, and for as long as they "directly participate in hostilities". After several years of expert discussions and research, the International Committee of the Red Cross (ICRC) has published the Interpretive Guidance, which aims to clarify the meaning and consequences of direct participation in hostilities under international humanitarian law (IHL). This article is devoted to the explanation of this notion. The presented interpretation follows the Interpretative Guidance published this year. |
Theory of Gravity in War on International TerrorismMilitary artIng. Ján SpišákVojenské rozhledy / Czech Military Review Nr. 2/2010, Vol. XIX. (LI.): 47-64 Official objectives of war on terrorism are as follows: we must face theorist threats, prevent terrorist strikes; suppress the power of terrorist groups such as al-Qaeda. War on terrorism is not a classical or conventional warfare; the term is wide-ranging, covering longterm strategies of national importance. The war on terrorism and employed means are also a source of controversy. It is a question of adequacy of used tools. It is necessary to implement the new strategy of improving conditions in Muslim countries to eliminate their background supporting negative religious and political attitudes towards democracy. Outlined ways of "smoothing edges" in economical, social spheres can noticeably change hateful attitudes of Muslim population towards values of Western democratic society. |
The Czechs in AfghanistanInformational pagesRNDr. Nikola Hynek, M.A., doc. PhDr. Jan Eichler, CSc.Vojenské rozhledy / Czech Military Review Nr. 2/2010, Vol. XIX. (LI.): 88-100 The Provincial Reconstruction Team of Czech Republic operates in very complicated conditions and environment that are in fact hostile. It can't be excluded that growing scepticism, today common among Afghanistan security experts, more or less could affects even Czech members of ISAF missions. This study deals with existing knowledge end experiences of Czech PRT in Afghanistan. It is divided into two parts. The fi rst one concerns with outside and inside factors infl uencing ISAF missions. It brings in details characteristics of geographical, historic ambiances in which ISAF mission are performed. The second part concentrates on tangible experiences of Czech PRT members, both in political and military spheres. Here the authors summarize conclusions and upon them they outline challenges for the future. |
Risk Management in the Food Service OperationMilitary professionalProf. Ing. Aleš Komár, CSc., Ing. Boris Šroll, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 2/2010, Vol. XIX. (LI.): 133-148 The aim of this work was to make an analysis of current state of catering services in the forces, to define risks of possible harms, damages, losses, or another prospective disasters, in order to propose a systematic approach to the risk management. Identified risks are being completely analysed. Author's team drafted a risks catalogue to make their identification easier. Among others, upon this analysis, they compiled the chart of risks in catering process within the section of the Ministry of Defence of the Czech Republic. A user manual for monitoring and risk control was created, so that we can adopt suitable procurement measures for avoiding or minimizing risks, their occurrences, eventually lowering unwanted results generated by the above mentioned analysed risks. |
Will Europe Defend Itself without Americans? Reflections over Europe Security "Twenty Years" AfterReviewedPhDr. Miloš Balabán, Ph.D., PhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 4/2009, Vol. XVIII. (L.): 61-70 There are many items in American foreign policy the Europeans do not agree, namely its tendency towards "strong world leadership". On the other hand, the Americans would prefer stronger Europe, namely in time of world's economic crisis when US defence expenditures are practically frozen, and when pre-emptive strategy by president Bush exhausted most of American sources. Even the Europeans feel that they should profile themselves as independent, strong power, but their Common Foreign and Security Policy is still more political declaration than really military strategy. Many security experts suggest that the Lisbon Treaty excludes NATO membership as far as questions concerning defence are concerned. NATO alliance still expects new strategy that ought to be approved in December 2010. The authors predict the necessity to strengthen the so-called Second Pillar of the EU, as the United States are going to be more oriented towards cooperation with Japan, South Korea and Australia. We must bear it in mind, drawing up long-term visions of Czech Security policy. |
Pacifism and Manning Armed Forces of the Czech Republic by Reserve Soldiers in Time of Threat or WarMilitary sociologyMjr. Ing. Bohuslav Vlček, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 1/2009, Vol. XVIII. (L.): 159-161 Pacifism, opposition to war and other violence, is both organized political movement and individual ideology. Pacifism varies from a form that is absolute and doctrinal to a relative and more practical form. Absolute pacifists are against all wars and against violence in any form whatsoever; relative pacifists are selective of the wars and violence they oppose. Most absolute pacifists stress the immorality of the taking of one person's life by another person. The philosophy of pacifism has been propounded throughout history on grounds of morality, divine will, or economic and social utility. The probable impact of pacifist theories on the Armed Forces is discussed in this article, as service in our forces is set by the law and inner normative acts of the Ministry of Defence. |
Recruitment Process in Time of Impending Danger or WarMilitary professionalMjr. Ing. Milan ŽilínekVojenské rozhledy / Czech Military Review Nr. 3/2008, Vol. XVII. (XLIX.): 136-144 One of most important tasks of the Army of the Czech Republic is the preparation for country defence, be prepared to defend the republic against attacks from outside, with the use of Allied defence system. The core of manning in time of danger or war is recruitment of all people coming under compulsory conscription and those with the duty of extra service. Even though the compulsory military service (national service) was abolished in 2004 and the ACR became fully professionalized, Czech population is obliged to conscription/draft. All men/women over the age of 18 till 60 could be conscripted. The difference is that this legal obligation is realized only after the government has proclaimed the state of danger or declares war. This selection, namely the activities of recruiting boards, must be prepared well ahead, in time of peace, in cooperation with municipal authorities, state and regional administration. The author also deals with ?extra service?, which might come into existence in case we are short of conscripts. |
Do We Really Understand the Current Epidemic of Suicide Terrorist Attacks? (An attempt at systemization of terrorism concept)Nonreviewed - OtherDoc. Ing. Štefan Danics, Ph.D., PaedMgr. et ThMgr. Leoš TučekVojenské rozhledy / Czech Military Review Nr. 2/2008, Vol. XVII. (XLIX.): 18-30 Terrorism threatens to attack and destroy the open democracy, but what is terrorism? The main aim of this essay is to formulate some proposals of a minimal operational definition tied with terrorism, as well as a definition of terrorist attack with the ambition to surpass a possibility of an ambiguous construction in the field of semantical research. Terrorism is usually described as unlawful violent activism targeted against civilians or against civilian targets with the aim of achieving political, religious, ideological and other goals. It presents wellconsidered ways of production and fructification of fear that are applied on civilian targets. A terrorist attack communicates devastatingly as a pure act of violence inside the psychosomatic structure of its recipients (victims). The new terrorism after 9/11 attacks could be characterized by fanaticism and the impending danger of arms of mass destruction. It is a culture of death. |

