Fulltext search in archive
Results 571 to 600 of 4948:
Military Keynesianism, Defence Expenditures and the Growth of Economy Militarization in Advanced Countries of WorldInformational pagesIng. Vendula Hynková, Ph.D., doc. dr. Luboš Štancl, CSc.Vojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 108-120 Keynesian economics argues that private sector decisions sometimes lead to inefficient macroeconomic outcomes and therefore advocates active policy responses by the public sector, including monetary policy actions and fiscal policy actions by the government to stabilize output over the business cycle. This paper defines the core of Keynesian economics in the mirror of defence expenditures and their influence on country's economy growth. The main attention is paid to the analysis of military-industrial complex and its pressure on armed forces, as one of most important factors introducing a danger of the so-called militarization of both state economy of advanced industrial countries and their social life. |
Jan Eichler: Terrorism and Wars in Era of Globalisation. (Is it possible to prevent wars?)Book reviewVojenské rozhledy / Czech Military Review Nr. 2/2011, Vol. XX. (LII.): 172-174 The author Jan Eichler works at the Institution of International Relations Prague, so those are the themes he is professionally involved in. His publication deals with security threats and their assessments at the beginning of 21st century. This second edition of his book is amended by several wars taking place since the first edition was released. They were wars between Russia and Georgia 2008-2009, Israel vs. the Palestinians 2008-2009, several conflicts in Africa, Columbia, and Sri Lanka; ISAF operations in Afghanistan; in Iraq the new attitude of the USA towards conflict solution. Somalia represents a typical failed state with warlords, criminal gangs, Somalia and sea piracy is a mutually tied problem the word community was not able to solve. Last but not least, there are dangerous activities of Islamists in North Africa. Even though those mentioned conflicts are only regional, their consequences are global. They therefore need the involvement of international organizations, the EU and the UN respectively. |
Analytical Thinking and Team Leadership in Intelligence AnalysisMilitary artDoc. Ing. Oldřich Horák, CSc.Vojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 49-54 This paper deals with aspects of intelligence analysis that very often influence the quality of intelligence information utilized by end users. Such analysis requires not only analytical thinking, but also specific experiences of all personnel exploiting collected information. The same body of information may result in multiple analytic products, with different security classifications, time scales, and level of detail. The result of this process is an analytical product - evaluation without any idle speculation and pseudo prophecy. Evaluation and interpretation must describe up-to-date conditions and demonstrate the clusters of future images with alternative developments. Reasonable evaluation reduces uncertainty and makes user's decision easier. At the end the author concentrates on rules of analytical team control and management. |
Combined Joint Exercise (CJEX) 09 "COMBINED DESTINY": Knowledge and ExperiencesMilitary artPlk. gšt. Ing. Ján SpišákVojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 83-92 The Combined Joint Exercise was focused on the European approach to crisis management operations and involved an annual exchange of students and directing staffs between of the Higher Command and Staff Colleges from France, Germany, Italy, the United Kingdom and Spain. The aim of this article is to provide knowledge and personal experience of its author based on his own participation in this exercise at the Escuela Superior de las Fuerzas Armadas (ESFAS) Madrid. The purpose of the exercise was to foster the understanding, mutual knowledge and dialogue among the offi cers of the aforementioned colleges through the practice of operational planning. Among general information describing the character of the exercise, the article defines some areas of the operational art, namely Operational Planning Process, Operational Design, Decisive Point Concept and Centre of Gravity Analysis. |
Defence Research and Development in 1989-2009ReviewedDoc. Ing. Josef Janošec, CSc.Vojenské rozhledy / Czech Military Review Nr. 4/2009, Vol. XVIII. (L.): 71-86 After a short review of defence R&D history, the author concludes that our country used to reach world's level in some fields: passive warning systems, NBC protection, military surgery, explosives. After the change of political system in 1989 we began to dispose Czech military industries. The only scientific place to left is Defence University Brno, but it is an institution more or less concentrated on education. It is almost impossible to maintain pace with foreign defence industry. In the article there is an exhaustive list of military plants, institutions after 1989, together with the date of their closing down. It is followed by research orientation of defence industry, set according to time periods. The special chapter concentrates on financing defence research, the closing part deals with the period of our membership in NATO. Although there are same positive aspects, such as international cooperation, exploiting sources from abroad, strategical control declined. We see unwise reductions in personnel, abolishing accredited institutions, etc. |
Sovereignty, Integrity, Political Independence (Forming Strategical and Security Documents)ReviewedPhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 1/2009, Vol. XVIII. (L.): 3-22 This leading article deals with the sphere of strategy and defence policy. The essay is an output of scholarly work and therefore it is summarizing and evaluating problems in question with professional recommendations. First, the author draws our attention to various concepts of security and underlines national differences backed by national histories. Security concepts have their sources in deep analyses of potential threats and corresponding scenarios, with specific bias to Czech environment. He openly expresses his critical opinions on contemporary security documents, for lack of political security directions, as politicians in general have little knowledge of security and defence problems. In his opinion, the possible outcome lies in a partnership and cooperation with academics outside military and government structures, experts and members of security community, whose expert opinions could help namely to form long-term security concepts. |
Two Monographs on Security from SlovakiaBook reviewVojenské rozhledy / Czech Military Review Nr. 1/2011, Vol. XX. (LII.): 137-143 Prof. Dr. Štefan Volner, CSc., is a very diligent and prolific author. He is the author of many monographs, books, papers and articles in the field of security and defence policy published worldwide. Now we have his latest two books: Security of Mankind (Bezpečnosť ĺudstva) and Security for the 21st Century (Bezpečnosť 21. storočí). In the former one, he comes out of a broad concept of security. Dr. Volner regards the theory of securitization as a lingual and socially determined construct, and so does analyses of security topics. The purpose of his first monograph is to familiarize experts and students with new theoretical concepts, ideas, methodological approaches and paradigms. The latter monograph has a classical structure tied with security studies; it contains theoretical fundaments, dealing with global risks and classifies wars of 21st century. He regards human security as a multifaceted phenomenon, at macro- and micro- levels. |
Predictive Methodology in Intelligence ServicesReviewedBc. Petr ZelinkaVojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 29-39 This article aims at building a bridge upon a gap, which separates academic sphere and intelligence community in the issue of predictive methodology. The author tries to accomplish this objective by presenting intelligence predictive methods based on open-source literature research. First, the question of uncertainty and probability in prediction is introduced (Cynefin template). Then follows basic introduction to predictive methods in civil and military intelligences, so that the reader might grasp the fundamentals of early warning systems. The academics and above all journalists should know the risks and perils in forming intelligence forecasts, estimates, foresight and warning scenarios, e.g. the so-called Black Swan scenario, the author explains potentials failures of the Delphi method. This study ought to be regarded as an introductory to predictive intelligence concurrently done by governmental agencies for purposes of national security and defence. |
The Czech Fiscal Policy for Internal and External Security after 1998Opinions, controversyPodplukovník Ing. Bohuslav Pernica, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 3/2011, Vol. XX. (LII.): 66-75 When the Czech Republic joined NATO, some structural changes in the national security sector were expected. Actually, changes in national defence strategy were declared by national strategic documents, such as military and security strategies. In addition to it, since 2002 the Czech Republic has been taking part in Global War on Terrorism and, generally speaking, it implies higher expenditures spent on security purposes. Surprisingly, many things have remained the same. The strategic documents were mostly ignored, deep changes did not happen due to fiscal policy based on a traditional incremental budgeting. Proportions between expenditures for internal and external security were only fluctuating. |
The Evaluation of Development in the Institutional Area of LogisticsMilitary professionalPlukovník Ing. Oskar KovaříkVojenské rozhledy / Czech Military Review Nr. 2/2010, Vol. XIX. (LI.): 126-132 The idea of this enquiry into Czech Army logistics was to prove that even under hard conditions originated in permanently changing army concepts, the army logistics still keeps its high standard and responsibility. During transformation, an appropriate organization structure has been created, with working mechanism of logistics support, using motivated and rationale source exploitation. The purpose of an array of transformation in defence sector was to introduce not only new and effective army structure, compatible with NATO armies, but also to change the system of fi nancing forces. The funding ought to be more economical. The article is backed by a longterm study and observation of logistics development in defence sector. |
The Various Ways of Civil-Military Development (Concepts and Doctrines)ReviewedIng. Pavel Zona, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 2/2011, Vol. XX. (LII.): 20-29 With the running changes in methods of modern operations within NATO framework, there are also changes in demands and tasks in the scope of civil-military operations-CIMIC. They are incorporated in many documents, such as the Comprehensive Political Guidance, New Concept of Civil-Military Cooperation or Field Manual 3-07 Stability Operations. The CIMIC capacities ought to be used for active impact on impending security situation, crisis development, impact implemented more sooner then crises might escalate to conflicts, eventually they could be used to halt the conflicts, in the places where they are a threat to Alliance security. We must create new rules of co-operations between civil and military sections, with the use of Alliance materials, resources and documents from conferences, seminars and field working shops. Today we have also abundant experiences that the Army of the Czech Republic, its CIMIC section, have acquired in preceding ten years. |
Chapters on Security for the Second Time (Prognosis of World's Development)Book reviewVojenské rozhledy / Czech Military Review Nr. 2/2011, Vol. XX. (LII.): 184-185 International situation lies still in the middle of our attention. Public is still interested in current security situation. The publications dealing with security threats are sold out, that's why the Karolinum Publishing House issued the second edition of this reviewed book, Chapters on Security. Nineteen security analysts amended and brought up to date their original papers; the book was enlarged by fifty pages. The monograph covers both inner politics and international organizations. Inseparable are prediction of world's development till the year 2020. The book is also involved with the so-called humane security and the system of complex security control in the Czech Republic. |
Al Qai'da Hybridisation in North Africa and its Implication for EuropeMilitary artBc. Martin JankůVojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 55-70 The article is focused on issue of hybridisation of Al Qai'da in Islamic Maghreb (AQIM), in North Africa, and its implications for European countries. The process of hybridisation is being conceived as growing nexus and convergence between violent non-state actors, while these processes could be in this case identified mainly in issues of use of kidnappings and secondary also reported involvement of AQIM in regional smuggling, mainly drugs, activities through Sahel and Saharan region to Europe. Regarding GSPC background, AQIM could be in long term theoretically able to re-establish its financial and supporting networks in Europe via cooperation with organized crime, which were largely disrupted after major crackdowns by security forces between 2004-2007. Event though a direct Al Qai'da attack in Europe is-according to the author-excluded, the purpose of this article to draw our attention to an eventuality of rebirth of European operation network of AQIM operational predecessor, i.e. GSPC. |
Information Process as a Part of Command and Control System Part IIMilitary artPplk. Ing. Petr RypVojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 93-100 The Command and Control process may be defined as an ability to determine what to do and implement effective actions. With the use of the Standard Operating Procedures, the commander must be able to realize set tasks in defined time. The C2 system must be able to monitor and collect data on the situation, to develop an understanding of the situation, to develop a course(s) of action and select one, to develop a plan to execute the selected course of action, to execute the plan, to include providing direction and leadership to subordinates, to monitor execution of the plan and adapt as necessary. The commander draws the picture of situation on the base of surveillance and data collection from various sources, classified and unclassified. The context of information is formed by means of paradigm of personal experiences of commander and his intuition. |
Security System Reforms: Support to Comprehensive Approaches of EU Crisis Management is also Czech CauseMilitary artPlk. gšt. Ing. Jaromír Zůna, MSc.Vojenské rozhledy / Czech Military Review Nr. 4/2009, Vol. XVIII. (L.): 87-100 In spite of the fact that it is a new concept, it presents one of key methods of international engagement in crisis areas the EU prefers. Its main components are crises prevention and securing stabilization. Security tasks are composite problems solving one of main state functions: to guard external and internal security together with principles of civil control. This essay among others aims to explain practicability of the EU's concept of preventive engagement as a tool of implementation of the European Security Strategy, further it describes European concept for crisis management missions in the field of civilian administration supporting security and justice. At the end there are some recommendations for the Czech Republic how to form capacities for EU missions and for the transformation of Czech security sectors. |
WikiLeaks Case and Its Reflections in World's Security CommunityInformational pagesPhDr. Antonín RAŠEKVojenské rozhledy / Czech Military Review Nr. 4/2011, Vol. XX. (LII.): 129-137 Czech dailies and weeklies publicised their analyses of the diplomatic dispatches released by WikiLeaks. Some were concerned in world's politics, but higher attention was paid to 1,271 dispatches from Prague. According to the dispatches, the U.S. Navy wanted to purchase 23 Russian anti-ship missiles to obtain the weapons from Belarus through Ukraine, with a Czech arms dealer. However, the Czech government decided to derail the plan by not granting the Czech middleman the needed permission to export weapons from a dictatorship like Belarus. Various cables also detailed a dispute in the area of arms technology. Some observations from the dispatches dealing with characteristics of Czech prominent politicians are amusing. Overall, the United States evaluated the CzechRepublic positively, as an economically mature country and as an ally. |
NATO's Strategic Concept: An Important Step Towards Military and Political Qualification of AllianceReviewedKpt. Mgr. Karel Zetocha, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 3-14 The main Alliance mission is to "safeguard the freedom and security of its member countries" and to "deter and defend against any threat of aggression against any of them". Those general tasks are tailored today to changed international security surroundings. In May this year, a report by the experts group was released, forming the basis for further negotiations over the new strategical concept of NATO. The experts produced a document of first-rate quality identifying main tasks NATO is facing today. At the same time this document redefines prospective directions the Alliance should follow in the years to come. Without a broad popular support NATO's engagements namely off European territory couldn't be vindicated and justified. The same is true as far allocation of sources for NATO missions and developing military capabilities are concerned. So, the communication with public thus becomes a further dimension of this highest strategic document. |
Risk Catalogue: Software Instrument for Risk Management in Defence DepartmentReviewedIng. David Řehák, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 40-44 Risk management covers the identification, assessment, and prioritisation of risks, which is followed by coordinated preventive operations to minimize negative impacts on society. The most demanding is the so-called risk assessment (risk identification, risk analysis, risk evaluation). The Risk Catalogue consists of introductory page, and twenty cards for risks register. With the assistance of this catalogue, defence analysts acquire general knowledge about number of risks and their frequency. The level of risk is calculated by summation according to its probability, gravity, and unwanted effects. In case of defence department, actual tasks are assigned to manage to Defence Ministry, Division, Branch, and Section accordingly. Possible risks are represented at a chart accompanying the article. The purpose of Risk Catalogue, its principles, guidelines for implementation, is to make the work of analysts easier. |
Will Military Deception Pass Away?Opinions, controversyDoc. Ing. Milan Kubeša, CSc.Vojenské rozhledy / Czech Military Review Nr. 2/2011, Vol. XX. (LII.): 97-100 There are no military conflicts without deception, as it is among others a very cheap method how to contribute to the successful accomplishment of the assigned mission. Military deception (MILDEC) is applicable across a wide range of military operations. MILDEC can be conducted during all phases of military operations at strategic, operational, and tactical levels. It is defined as being those actions executed to deliberately mislead adversary decision makers as to friendly military capabilities, intentions, and operations, thereby causing the adversary to take specific actions (or inactions) that will contribute to the accomplishment of the friendly mission. According to he author, the operational deception is to be explained in more detail, basic rules are to be outlined, including fundamental principles and methods of deception for operational planning. |
Civil-Military Reflections: Does the Army Need Its Own Value Code? (Military Culture, Professionalism, and Constabulary Force)Informational pagesMgr. Tomáš KučeraVojenské rozhledy / Czech Military Review Nr. 1/2011, Vol. XX. (LII.): 71-82 Relations between a military and a civilian society belong to the core issue of civil-military studies. This article reflects main ideas and concepts used in theoretical and analytical literature, including seminar works by Samuel Huntington and Morris Janowitz. A military culture, military ethics and influence of new technologies, full-volunteer army and new missions on military culture are discussed. An abstract term "military" can change very significantly in accordance with actual military culture, perceptible to the fact how civilian society accepts military values. Therefore, not only size and equipment determine how particular armed forces look like. The author introduces the term Constabulary Force reflecting the idea that primary purpose of forces today are low-intensity conflicts and operations other than war. |
Organizational Culture within Armed ForcesMilitary sociologyMgr. Nataša BallováVojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 150-162 The article summarizes the results of sociological research into organizational culture in the ACR. It should create the picture of military organization, perhaps point at potential dysfunctions and thus to help to their correction. Respondents's opinions on remunerations were detected, in respondents places of work, in combination with their expectancy, anticipations what military service might bring to them. Two thirds professional soldiers have positive attitudes towards interpersonal relations at their working places. The worst position on the scale had the chance to work with the latest technologies and to start a professional career, i.e. to reach important positions. The culture of sustenance, sports facilities were evaluated positively. The lowest rating was allocated to arms equipment, furnishing and quality of garrison quarters. Respondents were also unsatisfied with high level of bureaucratic procedures and formalization. |
Employing CALS in Acquisition Process of the ACRMilitary professionalIng. Petra ButorováVojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 141-148 Computer-Aided Logistic Support (CALS) appeared for the first time in 1984 in a common study of US government and American defence industry. The study recommended using technical data in digital form. Further it was changed into Computer-Aided Acquisition and Logistic Support and in 1994 the acronym CALS was changed into Continuous Acquisition and Life-Cycle Support. At present we interpret CALS as the support to all automatized processes with fully digitalized data processing. Among its important tools belong LCC (Life-Cycle Costs) and risk management. It is a vast standardization strategy, covering the whole life cycle, via acquisition process, its support, innovation and product disposal. CALS is supposed to make acquisition procedures in the ACR more effective. |
Risk Management in the Food Service OperationMilitary professionalProf. Ing. Aleš Komár, CSc., Ing. Boris Šroll, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 2/2010, Vol. XIX. (LI.): 133-148 The aim of this work was to make an analysis of current state of catering services in the forces, to define risks of possible harms, damages, losses, or another prospective disasters, in order to propose a systematic approach to the risk management. Identified risks are being completely analysed. Author's team drafted a risks catalogue to make their identification easier. Among others, upon this analysis, they compiled the chart of risks in catering process within the section of the Ministry of Defence of the Czech Republic. A user manual for monitoring and risk control was created, so that we can adopt suitable procurement measures for avoiding or minimizing risks, their occurrences, eventually lowering unwanted results generated by the above mentioned analysed risks. |
Strong and Week Features of "Responsible Ownership of Technology" ConceptMilitary professionalIng. Marie PoláchováVojenské rozhledy / Czech Military Review Nr. 4/2011, Vol. XX. (LII.): 138-144 There is an urgent need to recognize changed priorities and evolve new approaches to non-proliferation and disarmament objectives for a sharper focus on the real and present dangers to international peace and stability. The focus must now shift to more effective monitoring and verification of compliance at various levels. The proposed ROOT system (Responsible Ownership of Technology) might be one of such means to meet above mentioned challenges that could eliminate present-day dangers and contribute to international peace and stability. It is the technology for security in the 21st century. |
The Report by Madeleine Albright's Team and Its Wide-ranging Contexts ("Council of Wise Men" and Drawing up the Alliance's New Strategic Concept)ReviewedPhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 15-30 This concept has been preparing since the early 2009. In short, the North Atlantic Treaty Organisation must be increasingly prepared to intervene far beyond its borders. In the coming decade, NATO will have four central inter-related military missions. The first requirement is to "deter, prevent and defend" against aggression, so as to ensure the political independence and territorial integrity of NATO member states. The report insists on the need to send out military missions beyond the treaty area "when required to prevent an attack on the treaty area or to protect the legal rights and other vital interests of Alliance members". Any expeditionary mission must be based on the principles of the UN charter. Another key item is to cooperate better with those partners, and others worldwide, in order to tackle the new threats posed by cyber attacks, piracy, arms proliferation and energy supply insecurity and climate change. However, in order to achieve the new goals, NATO "must halt the precipitous decline in national defence spending", and to introduce reforms to make spending more efficient. |
Main Methods of Intelligence Analysis and Ways of its EvaluatingMilitary artMgr. Miroslav KalousVojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 24-32 The article presents six more or less structured analytical methods that are or could be employed in intelligence analysis. This type of analysis, one part of the intelligence cycle, is understood as "the process of evaluating data for reliability, validity, and relevance; integrating and analysing it; converting the product of this effort into a meaningful whole, which includes assessment of events and implications of the information collected". The set of presented methods includes: link analysis, opportunity analysis, analogy, linchpin analysis, analysis of competing hypothesis and alternative scenarios. The study doesn't stop with presenting those methods; it also explains which type of reasoning (inductive, deductive or abductive) is used when working with each particular method. In broad terms, the article tries to shed light on intelligence analysis and its specifics. The reader should obtain better understanding their usefulness in the daily work of intelligence analyst. |
Does China Conquer Also Europe? (Reflections over Security Analyses and Prognoses)Informational pagesPhDr. Miloš Balabán, Ph.D., PhDr.Antonín RašekVojenské rozhledy / Czech Military Review Nr. 3/2011, Vol. XX. (LII.): 94-102 The gravity of this article is laid down on the present-day state of affairs. China bought Spanish, Portuguese, and Greek obligations, i.e. China lent a hand to those countries (so did the European Union). In this way, China increased its influence in Europe. Stabilized Europe is necessary for Chinese export, it was not mere charity. Defence expenditures of People's China has reached 100 billions USED a year. Supposing the Chinese are intended to reach world's domination, they should stick to this kind of policy and they should not try to acquire the dominance by armed force. China behaves like an asymmetric power, knowing well that it can't surpass the U.S. by arms. China does not want to repent Russian mistake to be "over-armed" by America in futile arms race. Still, there is plenty of free space to compete with the U.S., e.g. cosmic or space competition, computer and Internet technologies. |
The Participation of Civilians in Military Activities: Military-Governmental and Military-Industrial ComplexInformational pagesPodplukovník Ing. Bohuslav Pernica, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 2/2011, Vol. XX. (LII.): 101-113 The article deals with the problem of a certain militarization of a society, supposing country's military establishment is expanding its scope of activities to government or economy. From this point of view, the military and their civilian counterparts could be seen as "imperium in imperio" and such a model of military as a state within a state. There are a military-governmental complex and a military-industrial one in each state and both ought to be under civilian authorities' control, in order to prevent the democratic state from being fallen under influence of this complex. Although the notion was sketched more than fifty years ago, the military-industrial complex theory has been still living, and author gives some examples of the evolution of military-governmental and military-industrial complex. |
Internal Auditing as an Effective Management Tool Introduced into Slovak MoDMilitary professionalIng. Soňa JiráskováVojenské rozhledy / Czech Military Review Nr. 4/2006, Vol. XV. (XLVII.): 147-153 Internal auditing is an independent, objective assurance and consulting activity designed to add value and improve an organization's operations. It helps an organization to accomplish its objectives by bringing a systematic, disciplined approach, so that we are able to evaluate and improve the effectiveness of risk management, command and control, or other processes. Internal auditing is a tool of Ministry of Defence management that is used for increasing effectiveness both in departmental and public sector administration. The article is supplemented by two schemes of the position of audition authorities within the Slovak MoD. |
Development and Preparation of Battle Groups EUMilitary artPplk. Ing. Jaroslav KulíšekVojenské rozhledy / Czech Military Review Nr. 4/2007, Vol. XVI. (XLVIII.): 30-50 The CPX Battle Group 2007 was the Strategic and Operational Studies Institute key exercise in the field of CZe/sVK Battle Group EU. It was aimed at increasing operational capability of the Higher Officers Courses attendants in conducting integrated expeditionary and network centric operations in asymmetric environment, in a rapid, mobile, flexible and versatile manner. The exercise was held in May and June, 2007, at the University of Defence Campus, Brno. The aim of this article is to present the latest developments of the rapidly deployable EU Battle Groups and provide better understanding to the complexities of setting up a multinational high-readiness unit for peace-support and crisis management. The author discusses some issues and problem of the concept, similarities and differences between the Battle Group Concept and the NRF, Headline Goal 2010, and some tactical issues related to the operations. Some alternative options on how to further develop this Battle Group Concept are proposed at the end of the study. |

