Fulltext search in archive
Results 61 to 90 of 171:
Extremism and Terrorism as Destabilizing Factors of SocietyReviewed - ReviewDoc. JUDr. PhDr. Ivo Svoboda, Ph.D., Ing. Michael Hrbata, MPAVojenské rozhledy / Czech Military Review Nr. 1/2014, Vol. XXIII. (LV.): 33-41 The article defines extremisms and terrorism as eventual destabilizing moments in society. The paper decomposes possible reasons and grounds of their manifestation, the authors point out that certain signs indicate the penetration of extremisms and terrorism into armed forces structures and civil service, by means of concrete persons. At the end they propose general rules and approaches to keep up this topical phenomenon of the present day. |
European Naval Strategy: Analysis of Selected Issues in EU Member StatesReviewed - ReviewMgr. Tereza ŠafářováVojenské rozhledy / Czech Military Review Nr. 4/2014, Vol. XXIII. (LV.): 25-39 Europe is a maritime continent whose economic concerns and security could be backed only by the power of navy forces. The Czech Republic is not a maritime state, but it is a member country of both NATO and the EU, it participates in the formation of common security policy. Czech soldiers could take part in combined joint military operations, where one of forces is also a Navy. Dozens of Czech citizens are employed in common international institutes and staffs; they all need a broader view, including the knowledge of Integrated European Naval Strategy. Their activities promote the status of the Czech Republic at international level. |
Iran's Nuclear Program: An Important Tool of Domestic and Foreign PolicyReviewed - ReviewIrena KalhousováVojenské rozhledy / Czech Military Review Nr. 4/2013, Vol. XXII. (LIV.): 42-57 Its own nuclear program is an important instrument of Iran's domestic and foreign policy. In foreign policy it is used for promotion of its regional interests and it also serves as a guarantee against foreign actor's interference in Iranian domestic affairs. So far, the negotiations between Iran and the international community have not brought about any tangible results. Among other reasons, there are different expectations of both parties. The international community is ready to lift sanctions, supposing Iran accepts the UN resolutions. Iran, by contrast, demands to be recognized as an internationally recognized regional power, with legitimate rights and interests. |
Information Operations on the Background of Contemporary Armed ConflictsReviewed - ReviewMjr. Ing. Tomáš NovákVojenské rozhledy / Czech Military Review Nr. 4/2014, Vol. XXIII. (LV.): 51-62 The article presents the theory of information operations on the background of contemporary armed conflicts in Ukraine, Iraq and Syria. In the introduction, information is presented as a phenomenon and the accelerator of social development. It outlines basic information channels that deliver security information to their recipients. Furthermore, the article discusses security and operational environment and also vulnerabilities being caused by increasing dependence on information. The core of the article are information operations presented in theory with the author's commentary on real application in military practice and in terms of the Czech Armed Forces. As part of information operations are subsequently introduced psychological operations, computer network operations and electronic warfare. The article ends with real examples of information and psychological operations in modern warfare, and conditions of their management in the Czech Armed Forces. The conclusion summarizes the general idea of the security environment and information operations, and stresses the importance of information operations in current and future conflicts. |
The Big Data Phenomenon as a Trend Influencing Technical Intelligence DisciplinesReviewed - OtherMjr. Ing. Martin Havlík, MBA, MSc.Vojenské rozhledy / Czech Military Review Nr. 4/2014, Vol. XXIII. (LV.): 124-132 This specialised article deals with Big Data and the exploitation of this current day phenomenon in the field of intelligence disciplines, based on technical methods of data gathering and its relevant assessments. The introduction deals with the issue of development of the security environment and gives general overview on the current trends in the field of technical branches. The following chapter analyses the main trends, especially the digitalisation of the battlefield, rise in data volume and the development of new technologies. The next chapter is focused on the basic terminology description of the Big Data issue, which leads into final assessment and certain prediction of future development in this field and the rise of importance of this trend for the intelligence disciplines in future. |
Czech Armed Forces Doctrine - New Facets of Operational ArtReviewed - ReviewIng. Ján Spišák, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 4/2013, Vol. XXII. (LIV.): 124-131 The article deals with some aspects of military art in connection with the forthcoming Doctrine of the Army of the Czech Republic. Its aim is to contribute to discussion on the issue of operational art and highlight the major benefits in military terminology. The author describes some specific doctrinal terms and briefly suggests their possible application during the planning and conduct of military operations. |
Perception of Security Threats in the CBRN Sphere: History and ChallengesReviewed - Reviewpplk. Ing. Pavel Otřísal, Ph.D., MBAVojenské rozhledy / Czech Military Review Nr. 1/2013, Vol. XXII. (LIV.): 46-64 The period of the beginning of the 21st century is typical for the situation characterized by minimization of a global conflict and by decreasing risks of a direct aggression among neighbouring countries. Nonetheless, the occurrence and permanent existence of mass destruction weapons and industrial accidents caused by human beings, natural disasters produced by leakages of toxic industrial materials, are considered as a global problem that determinates not only the activities of national armies, but also activities of civil population. The danger of WMD deployment is especially high at time of danger, when forces are to be used or misused, and terrorist activities might multiply in some world's regions, even in technologically underdeveloped countries. |
Long-term planning - theory and practiceNonreviewed - OtherIng. Vladimír KARAFFA, CSc.Vojenské rozhledy / Czech Military Review Nr. 3/2013, Vol. XXII. (LIV.): 3-14 The article deals with some aspects of long-term planning in the sector of theMinistry of Defence. Its aim is to stimulate discussion about the methods and processes of long-term planning, to point out some shortcomings in the development of strategic documents in the past. The text also describes the basis for long-term planning process and particularly the role of long-term foresight. The author analyses lessons learned from the developing and implementation of Long-Term Vision of the Ministry of Defence document (2008) and tries to aply them in drafting a new document, The Long-Term Vision for Defence in 2030, is now being prepared under the leadership of the Ministry of Defence of the Czech Republic. He also highlights some of the theoretical principles for developing documents in the process of strategic management. |
Civil-Military Cooperation: Its Changing Role in Combined NATO Operations and Under National CommandReviewed - ReviewIng. Pavel Zona, Ph.D., Ing. Vlastimil Galatík, CSc.Vojenské rozhledy / Czech Military Review Nr. 1/2013, Vol. XXII. (LIV.): 76-88 The role of civil-military cooperation (CIMIC) is increasing in the post-modern wars (operations). CIMIC is a significant element at the coordination of military and civilian participant activities over current military operations. New tasks for actors are as result from new NATO concept and outline new tasks dimension. The armed forces as well as the Army of the Czech Republic (ACR), have to solve many problems associated with this new dimension. The article outlines a possible set of activities associated with the new approach to CIMIC in crisis management in the context of the Alliance operation. |
Reflections over Syrian Conflict in the Czech RepublicReviewed - ResearchDoc. JUDr. PhDr. Miroslav Mareš, Ph.D., Mgr. Michael MuradVojenské rozhledy / Czech Military Review Nr. 3/2013, Vol. XXII. (LIV.): 132-142 This study deals with the responses to recent Syrian conflict in the Czech Republic. The authors introduce particularly activities inside Syrian diaspora, actually formed during the time of communism. Syrians citizens living in the Czech Republic are not homogeneous, which is similar to the situation in Syria. In our country we can find both people loyal to the regime of Ba'ath Party and Bashar al-Assad, and also members of opposition that in fact has divided into two groups, since the mid-2012. The authors introduce reactions of various subjects from the Czech Republic. |
Operational Concept: Reflections over Solving Military ProblemReviewed - ReviewIng. Ján SpišákVojenské rozhledy / Czech Military Review Nr. 2/2013, Vol. XXII. (LIV.): 88-93 There exists a variety of deployment strategies, visions and concepts for armed forces, how they will operate in the future horizon. The key part of operational concepts consists of several key characteristics, which include e.g. the account of military problem, its military solution describing in broad terms how military forces will operate across the wide range of military operations in pursuit of strategic objectives and thereby consequent requirements for military capabilities development. The article does not provide a comprehensive answer to all the problems associated with the concept development. Rather, its purpose is to point out some aforementioned aspects crucial not only for operational concepts developers, responsible individuals and organizations, but it may be beneficial even for commanders in terms of their operational thinking and drafting an appropriate operational approach to solving day-to-day acitivities. |
Controlling Implementation in Defence DepartmentReviewed - ReviewDoc. Ing. Roman Horák, CSc., mjr. Ing. Blanka Adámková, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 4/2013, Vol. XXII. (LIV.): 91-104 The article deals with controlling implementation into the mechanism of central institutions and state administrative management of the CzechRepublic (CR), hereinafter state administration. The purpose of this article is to present state administration controlling as an effective control tool, backed by best experiences and practice in the Germany. The authors explain and determine theoretical bases and circumstances to put controlling into practice. They comment the effecitivity of controlling implementation in Czech state administration, using as an example the Defence Ministry of the CR. |
Updating Security Strategy Czech Republic 2011 (Inspirational Power of Security Community)Opinions, controversyPhDr. Antonín RAŠEKVojenské rozhledy / Czech Military Review Nr. 1/2012, Vol. XXI. (LIII.): 99-121 In September 2011 the government approved the new Security Strategy of the Czech Republic. It was important that this document was discussed and elaborated with the participation of the security community, security professionals both from the army and civil institutions or schools; among others we must state the CEVRO institute or the CESES centre, Charles University Prague. The author familiarizes readers with its contents and the history of its genesis by means of polemics with individual items of this document. In addition to general statements, there should be concrete proposals, the authors supposes, for tangible precautions, which might help readers to comprehend proposed measures, and thus to open way to deeper understanding among wide public to security problems, i.e. impending threats and dangers. |
The Conceptualization of CyberterrorismReviewed - ReviewBc. Jakub DrmolaVojenské rozhledy / Czech Military Review Nr. 2/2013, Vol. XXII. (LIV.): 94-102 The purpose of this paper is to define cyberterrorism phenomenon with the use of available documents, reports, and expert texts, and to evaluate its role and occurrence in contemporary world's events. The cyberterrorism is very often discussed nowadays, but there is a total lack of any consensus as far as a precision definition is concerned. The critique of current state is summarized at the end of the final chapter, describing leading causes of present situation, i.e. a situation when the cyberterrorism is discussed, politicised, all repeatedly underline its dangerousness, but in practice no cyber attract has occurred. |
Up-to-date Trends and Shifts in Global Security EnvironmentReviewed - ReviewPhDr. Miloš Balabán, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 2/2012, Vol. XXI. (LIII.): 17-25 The beginning of the second decade of 21st century is tied with distinctive dynamics and changes in global security environment. Among those changes belong security re-orientations of the United States from Transatlantic area to that of Pacific, East and Southeast Asia resulting from a new American military strategy proclaimed in January 2012. The US drew down from Iraq and Afghanistan, political and security movement in Arab world, after decades of "status quo" were awaking. The author concludes that the EU should be prepared for negative scenarios in the development of security situation, or to have at its disposal effective police and military forces with proper humanitarian background to counter possible instability, e.g. massive migration influxes, economy disorders. |
Strategic Culture: Concept PresentationReviewed - ReviewIng. Tomáš PospíšilVojenské rozhledy / Czech Military Review Nr. 2/2012, Vol. XXI. (LIII.): 26-33 Studies of the importance of culture have gained greater attention in the post-Cold War era. In present world, there are many fenomena that can't be explained in terms of neorealism. There is the consensus in national security policy studies that culture may significantly affect grand strategy and state behaviour. It limits behavioural choices, from which we could derive predictions about our strategic choice. This study is based among others upon Johnston's strategic culture concept related to three generations. The study is divided into five parts: at first the author introduces general concept of strategic culture, the second, third and fourth parts correspond to individual generations. In closing part the author explains his own understanding to this concept. |
Security Threats from Inside: Scenario "Extremism in Being and Coexistence with Romany Ethnic Group and Migrants"Military sociologyPhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 2/2012, Vol. XXI. (LIII.): 143-154 At first, we are familiarised with terms of extremism, Romanies (Gypsies), anarchists, neo-Nazis, then the author introduces possible picture of security situation at the turn of second and third decades of 21st century. He believes that in every country there is a limited ability to integrate ethnic groups by majority. As soon as the limits are exceeded, problems begin. His scenario ends with a pessimistic vision: increasing tensions will ask army deployment, but even local armed forces are not able to enforce law and order, therefore the government must ask for help neighbouring states. |
The Cyber War ContinuesInformational pagesPhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 4/2012, Vol. XXI. (LIII.): 73-89 The author summarizes present-day knowledge of this problem. Worms and viruses have transformed to serious security challenges and perfect instruments of cyber espionage. They have become a tool in information warfare. Cyberattacks transformed to risks calling only for technical responses. The growing awareness of the seriousness of the cyber-threat is enhanced by incidents, e.g. the malware "Stuxnet" attacking the Iranian nuclear programme. Actually, cyber space is regarded as a fifth dimension of military deployment, apart for land, air, water, and cosmos. Some nations are already investing massively in cyber capabilities that can be used for military purposes. Most Western nations have considerably stepped up their defences in recent years and are forming special units for cyber warfare. |
Complex Security Management in the Czech Republic: Starting Point for Upgrading (Themes for Security Review)Reviewed - ResearchPhDr. Antonín RAŠEKVojenské rozhledy / Czech Military Review Nr. 1/2012, Vol. XXI. (LIII.): 21-41 Our new stance to comprehensive control of security in the international context is based upon the so-called "wider security concept". Despite various definitions,there is the consensus that a national state is not the only security subject, the classical paradigm was extended to other areas, outside military one: political, economy, financial, banking, environmental, and social. They are endorsed by security problems related to technology, energy, raw material sources, ethnical disputes, religion, together with humane rights and cultural aspects. To win the war is easy, to establish peace is difficult. Last but not least, we now have to fight and win the war of public opinion. |
Command and Control as the Ability of CommandersInformational pagesIng. Pavel Zůna, MSS, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 3/2012, Vol. XXI. (LIII.): 72-79 The French "Centre de Doctrine d'Emploi des Forces" (CDEF) has published new doctrine FT-05 The Tactical Commander's Guide to Command and Control in Operations. The global action of land forces is now carried out within a strategic environment that has dramatically changed for 15 years. In this new environment, the French Army asserts and implements a double requirement: that of power and the control of force. The article presents the fundamental conclusions of this doctrine and compares them with the Czech national doctrinal documents. Author concludes that in comparison with the French doctrine, Czech doctrines are much more focused on the procedural and technological part of the Command and Control Systems than the ability of commanders to command. |
The Fragmentarization of Europe as a Security Threat Europe 2010: Predictions and RealityMilitary sociologyPhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 3/2012, Vol. XXI. (LIII.): 148-164 Unlike the real state of affairs, the scenarios for Europe 2010 did not presuppose the rise of financial and economy crises. Political scientists did not perceive the series of terrorist attacks, namely in Great Britain, Spain and Russia. Security questions, home security and defence, came to the foreground more then was originally expected. There are hubs of future power blocks of divided Europe. It is impossible to incorporate all the results and consequences of our presuppositions. Since we want to look into individual, particularly interesting developments, the author recommends to create several teams for individual scenarios, instead of drawing several scenarios by one scholarly team. |
The Place and Role of Private Companies in Securing Defence Means in GermanyInformational pagesProf. PhDr. Miroslav Krč, CSc., por. Ing. Martin KlusáčekVojenské rozhledy / Czech Military Review Nr. 3/2008, Vol. XVII. (XLIX.): 85-106 The very modern trends in the forces of advanced countries are hiring private civilian companies, private enterprises, in everyday performance of armed forces. As this phenomenon is very frequent, the authors decided to go into its roots, to find a common cause of this fact. In the past, armies were closed societies, self-sufficient, independent from states. Today, gradually, soldiers became more concentrated on key military tasks and supporting functions are transferred to private companies. The German Armed Forces (Bundeswehr) takes over mechanics used in private sector: it integrates economy dimension. Above all, it is transparency of bookkeeping, which ought to give evidence on savings in everyday life of forces. The Bundeswehr uses the so-called Market Testing, as a means of practical cooperation for engaging private capital. All those fact are cited as thoughprovoking. |
Fourth Generation Warfare Evolves, Fifth EmergesNonreviewed - OtherJ. NastoupilVojenské rozhledy / Czech Military Review Nr. 1/2008, Vol. XVII. (XLIX.): 15-23 The key fact is that changes in the political, economic, social, and technical spheres are making it possible for a small group bound together by a cause to use new technologies to challenge nation-states. 4GW (Fourth Generation Warfare) uses all the shifts from a mechanical to an information/electronic society to maximize the power of insurgency. Fifth-generation warfare (5GW) will result from the continued shift of political and social loyalties to causes rather than nations. It will be marked by the increasing power of smaller and smaller entities and the explosion of biotechnology. The purpose of this article is to widen the discussion on what forms 4GW may take and to offer a possible model for the next generation of war: 5GW. Adapted from Military Review, May-June 2007. |
Emerging New Threats in Unstable WorldReviewedPhDr. Miloš Balabán, Ph.D., prof. PhDr. Martin Potůček, CSc., MSc., PhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 4/2011, Vol. XX. (LII.): 3-21 The article identifies new threats of global character influencing global security and quality of life. The inspiration is drawn from the debate over proposed updated Czech security strategy 2011, where several security scenarios were drafted. It is a free sequel to the study "Wild Cards in Future Development of World Security" published in this review in No. 2, 2008. The titles of some chapters are as follows: The Collapse of World's Monetary System and Global Economic Warfare, Crisis of Global Government, The Shortage of Key Commodities (oil, gas, coal, raw materials, water, foodstuffs), Migration, Organized Crime, European Union prior to Disintegration, The Crisis of NATO, New Religions, Will Rich People Live Longer?, etc. |
Global Security: System Approach (Barack Obama's First Midterm)PhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 1/2011, Vol. XX. (LII.): 9-37 This extended essay is based upon various sources, among others on May 2010 President Obama's speech at the U.S. Military Academy at West Point, where President Obama described his national security objectives. The highest priorities of U.S. national security are the safety of Americans at home and abroad and achieving a peaceful, stable world through global cooperation despite a flawed international system. The Obama's security strategy relies heavily on diplomacy and engagement, economic development and other methods of influence, along with U.S. military capabilities with global reach and unsurpassed resources. As we face multiple threats, from nations, non-state actors and failed states, America will maintain the military superiority that has secured country, and underpinned global security, for decades. The security strategy is global, and identifies an array of real or potential security challenges that include: countering violent extremism and insurgency; stopping the spread of nuclear weapons and securing nuclear materials, resolving and preventing conflict; and reducing destabilizing risks to economic interdependence. |
A History of the Use of Private Military ForcesInformational pagesDoc. Mgr. Oldřich Bureš, M.A., Ph.D., PhDr. Vendula NedvědickáVojenské rozhledy / Czech Military Review Nr. 3/2011, Vol. XX. (LII.): 76-93 Although private military companies like the former Blackwater were regarded as a relatively new phenomenon in international security, their history is not new. The participation of private individuals, and /or groups of private individuals, soldiers of fortune, in "foreign" armed conflicts is at least as old as the history of wars by itself. It is impossible to open a debate about the scope and possible impact of the current use of private military and security companies without knowing and evaluating their long-term historical developments. The goal of this study is therefore to map the history of the use of private military forces, their involvement in various conflicts, services they offer, among others, from the point of international law. |
Forming Security Culture of the European Union (European Security Strategy)Reviewed - ResearchDoc. PhDr. Jan Eichler, CSc.Vojenské rozhledy / Czech Military Review Nr. 4/2011, Vol. XX. (LII.): 22-36 The Document ESS 2003 laid down foundations of our present-day security and strategy culture. It was formed as a summary of several historical and political factors that are introduced in two starting chapters, followed by the more detailed analysis into ESS 2003, its main characteristics influencing EU security and strategic culture. The ESS 2003 is compared with the American doctrinal document NSS 2002. The European security strategy of 2003 is not compared with following American strategical documents, as they were unknown in time of its drafting. The author comes into the conclusion that in spite of indisputable differences, the EU shares the same values as the US, and the EU as an American strategical ally is facing the same threats and challenges as the US does, and in case of need, there is a possibility of combined military actions. |
Two Monographs on Security from SlovakiaBook reviewVojenské rozhledy / Czech Military Review Nr. 1/2011, Vol. XX. (LII.): 137-143 Prof. Dr. Štefan Volner, CSc., is a very diligent and prolific author. He is the author of many monographs, books, papers and articles in the field of security and defence policy published worldwide. Now we have his latest two books: Security of Mankind (Bezpečnosť ĺudstva) and Security for the 21st Century (Bezpečnosť 21. storočí). In the former one, he comes out of a broad concept of security. Dr. Volner regards the theory of securitization as a lingual and socially determined construct, and so does analyses of security topics. The purpose of his first monograph is to familiarize experts and students with new theoretical concepts, ideas, methodological approaches and paradigms. The latter monograph has a classical structure tied with security studies; it contains theoretical fundaments, dealing with global risks and classifies wars of 21st century. He regards human security as a multifaceted phenomenon, at macro- and micro- levels. |
Does China Conquer Also Europe? (Reflections over Security Analyses and Prognoses)Informational pagesPhDr. Miloš Balabán, Ph.D., PhDr.Antonín RašekVojenské rozhledy / Czech Military Review Nr. 3/2011, Vol. XX. (LII.): 94-102 The gravity of this article is laid down on the present-day state of affairs. China bought Spanish, Portuguese, and Greek obligations, i.e. China lent a hand to those countries (so did the European Union). In this way, China increased its influence in Europe. Stabilized Europe is necessary for Chinese export, it was not mere charity. Defence expenditures of People's China has reached 100 billions USED a year. Supposing the Chinese are intended to reach world's domination, they should stick to this kind of policy and they should not try to acquire the dominance by armed force. China behaves like an asymmetric power, knowing well that it can't surpass the U.S. by arms. China does not want to repent Russian mistake to be "over-armed" by America in futile arms race. Still, there is plenty of free space to compete with the U.S., e.g. cosmic or space competition, computer and Internet technologies. |
Prospective Attitudes to the Reform of Security SystemMilitary artIng. Vladimír KrulíkVojenské rozhledy / Czech Military Review Nr. 4/2011, Vol. XX. (LII.): 48-64 Potential improvements of our security system depend above all on the governmental concern to really implement the reform, as a complicated, laborious and sensitive process. The preparing work being done in 2001-2002 proved deficiency in Czech security system. The author says that it is practicable to set rules by issuing clear directives, further it is necessary to prevent unreasoned manoeuvring within boundaries of implementation programmes, whatever manoeuvring could be motivated, by political, local, regional or subjective interests. This essay places emphasis on the presentation of various methods by which the security system could be changed for the better, explaining them in rather non-traditional ways, from more broad angle, embedded into a wide frame of knowledge, experiences and recommendations. |

