Fulltext search in archive
Results 751 to 780 of 10700:
Evaluation and Certification CZE/SVK Battle Group EUMilitary artIng. Jaroslav KulíšekVojenské rozhledy / Czech Military Review Nr. 2/2009, Vol. XVIII. (L.): 11-40 To fulfil Czech obligation as an EU Battle Group Framework Nation according to the regulating document EU BG Training and Certification, the Czech Army is to certify that the CZE/SVK Battle Group EU meet the standards and criteria stated in Standards and Criteria for EU BG. It is recommended that the CZE/SVK Battle Group EU certification process should be analogous with NATO Response Force (NRF) certification procedure and practical methods. Further it is suggested that the CZE/SVK Battle Group EU certification procedure is divided into several evaluation procedures: preparation planning evaluation, war-fighting evaluation, and technical evaluation. Each procedure will be developed by specialized teams with representatives in the sub-working group to ensure that the different procedures harmonize. The views expressed in this assessment are those of the author and do not reflect the official policy or position of EU Military Structure or the Czech Ministry of Defence. All information and data for this paper were drawn from unclassified sources. The written sources are listed in the matrix above. |
Theory of Peace as a Contradiction to War ScienceReviewed - OtherDoc. PhDr. Felix Černoch, CSc.Vojenské rozhledy / Czech Military Review Nr. 4/2014, Vol. XXIII. (LV.): 133-141 | DOI: 10.3849/2336-2995.23.2014.04.133-141 The peace is a state of affairs among states, nations and mankind, characterized by a friendly coexistence, solving matters in dispute by means of negotiations and accords, without use of armed and physical forces or psychological coercion. For preserving peace it is important to respect state sovereignty, independence, the right of nations to define their own courses. The theory of peace, dealing with those items, being introduced by the following article, is called paxology. |
Defining Militant Democracy in Central EuropeNonreviewed - OtherVojenské rozhledy / Czech Military Review Nr. 3/2014, Vol. XXIII. (LV.): 149-151 The authors analyze the implementation of militant democracy concept in Central Europe, i.e. Germany, Austria, the Czech Republic, Slovakia, Poland, Hungary, as those are nations having experiences both with Nazi and communist regimes. The opening part covers a short history of this concepts and mechanisms used to suppress extremist subjects; subsequently the book compares practical instruments of counter-extremist policies, their individual principles and arrangements. This is the comparison that constitutes the main asset to the problem. |
Generalmajor Josef BursikNonreviewed - Otherplukovník PhDr. Eduard StehlíkVojenské rozhledy / Czech Military Review Nr. 2/2013, Vol. XXII. (LIV.): 219-223 |
President as the Commander-in-ChiefInformational pagesDoc. JUDr. Zdeněk Koudelka, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 1/2012, Vol. XXI. (LIII.): 122-131 | DOI: 10.3849/2336-2995.21.2012.01.122-131 This paper depicts the position of the Czech President as the head of state and the commander-in-chief of the Czech Armed Forces, including his special relation to Defence Minister who actually runs defence department. The President is superior to all members of armed forces of the Czech Republic; the Chief of General Staff is superior to all members of the Army of the Czech Republic.The President formally and officially controls all the military organizations in a country. But we have no tradition of independent of armed deployment in war conflicts. Our forces operated always as a part of higher multinational coalitions, in joined combined groupings, operationally subordinated to friendly, but alien highest command. |
Security Preconditions and Threats (Economy, Religious and Cybernetic Menaces)PhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 2/2011, Vol. XX. (LII.): 38-52 One of main task while preparing new security documents is to identify, analyze and evaluate newly emerging, self-generating security threats. They menace cybernetic, economy, bank, and religious security. The special menace, as for inner security it is lobbyism. Cybernetic threat is today regarded as more dangerous than nuclear strike. The American lived through those experiences in Iraq. Another example is cyber attacks on Estonia in 2007 that swamped websites of Estonian organizations, including Estonian parliament, banks, ministries, newspapers and broadcasters.The attacks triggered a number of military organisations around the world (including NATO) to reconsider the importance of network security to modern military doctrine. There is a paradigm: the more modern country, the more risks are opened. The situation is complicated by the fact that in sophisticated society there is hard to identify attacking enemy. The author underlines that we are the last member nation in the EU that has no official CSIRT (Computer Security Incident Response Team) to react cyber /terrorist attracts. |
Czech White Paper of Defence: Shall We Learn from History?NonreviewedIng. Vlastimil Galatík, CSc., Mgr. Richard Stojar, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 31-37 At the beginning of August, Defence Minister Alexander Vondra announced his intention to give rise to the White Report of Defence as a document constituting clear vision of country's defence. The Paper will constitute a major overhaul of Czech defence and security policy and will set out the path to more modern, compact and reactive security and defence forces. By cutting the overall number of defence personnel, restructuring the defence estate will achieve cost reductions allowing to address more effectively the challenges and threats of the globalized world. It will allocate a substantial budget for defence, in line with the priorities and choices made for her defence capabilities. It will further reflect themes not mentioned before, such as relations between Common European Defence Policy and NATO alliance, new dimensions of civic security in cases of natural disasters, pandemic, or last but not least - terrorist attacks. The Czech White Report is going to make good use of similar documents of Allied nations. |
European Security in Global Context (Reflections over Security Analyses and Prognoses in the World, the EU and the CR in 2003-2008)ReviewedPhDr. Miloš Balabán, Ph.D., PhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 1/2009, Vol. XVIII. (L.): 23-30 The document "A Secure Europe in a Better World" approved in 2003 has introduced the so-called the European Security Strategy. The authors use this framework to refer to the whole set of organisations, people and activities, both military and civilian, to ensure capabilities to be delivered effectively and efficiently, both in current surroundings and in preparation for the future. They are members of the Centre for Social and Economic Strategies, Faculty of Social Sciences, Charles University Prague, which has conducted a wide-ranging research work to detect the long-term trends, factors and actors shaping the position of the Czech Republic in European environment. The article illustrates the evolution of the key structural factors affecting change over the two decades to come-demography, the economy, energy, the environment, science and technology-and addresses some of the main questions concerning the future of the international system. |
Facilities for Battalion Task Force Augmentation with Artillery Pieces, with the Use of Automated System of Artillery Support ControlMilitary professionalProf. ing. Ladislav Potužák, CSc., pplk. Ing. Josef Vondrák, kpt. Ing. Michal Sobarňa, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 132-144 The artillery of the Army of the CR is indispensable part of Czech armed forces. It will take part in operational activities, in the frame of EBAO concept (Effect Based Approach to Operations), acting in contact with various task forces. To meet those objectives, it must reach highest level of modulability. The article depicts all variants of effective augmentation by artillery firepower, artillery reconnaissance, and close artillery support. It enumerates all possible combinations of this reinforcement. Backed by those acquired specifics, the authors further extrapolate demands for automated control system of artillery fire support. |
"Fog of War" in Pieces of Classical Authors: Clausewitz a Tolstoy (Problems of Uncertainty and Chance Events In War)Military artBc. Tomáš KučeraVojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 51-59 The proponents of Revolution in Military Affairs claim that modern military technology will lift a "fog of war". In this article the term "fog of war" is described and illustrated in a work of Carl von Clausewitz who is supposed to introduce this term, used also in the famous novel War and Peace by Leo Tolstoy. These classics show us that uncertainty and chance, in other words fogs of war, are essential to human mentality. They will be present as long as war remains within a scope human endeavour. Emphasizing that military technology is equal to lifting the "fog of war" can lead to situation in which only trained commanders are supposed be able perfectly address problems in "chessboard" of war or computer simulators, but they will unable to manage a real world full of chaos, as they not used to count with uncertainties. |
Military Missions Abroad and Partnership Life (FindingsfromArmySociologicalResearch)Military sociologyMgr. Nataša Ballová, Radomír Saliger, Ph.D., Jiří Hodný, Ph.D., pplk. PhDr. Ing. Jiří PavlátVojenské rozhledy / Czech Military Review Nr. 4/2009, Vol. XVIII. (L.): 154-167 It is an information study about sociological research completed among Czech servicemen, former members of military missions abroad, under the aegis of the rector of the University of Defence. The research goal consisted in finding causal relationship between missions and breakup rates. Among others it was determined that for breakups were predispositions even before partners went to missions abroad. A total of 3 % stated they wanted to escape from family problems. Partnership after returning home broke up in 15.6 % of questioned veterans. Research should provide cornerstone data for a proposal of concrete measures for reducing divorces and partings. The stratified sample consists of 348 respondents from the ACR who took part at least in one mission abroad and were married, or lived in long-term partnership. Data collection lasted from July to October 2008. |
New Military Grades and Rank CorpsOpinions, controversyMgr. Havlín Miloslav Ph.D.Vojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 82-88 In April and May this year, several articles or essays appeared in civilian media, introducing misleading information that in the near future, the ranks of ordinary servicemen (privates, corporals, sergeants) are coming back, as they were abolished after introducing professional forces. Such proclamations are not quite true, because ranks of private, corporal and sergeant, were earmarked by legal rules above all for soldiers in their compulsory or compensatory military services, i.e. they were not abolished after 2004. There are a lot of similar uncleanlinesses as far rank corps are concerned and therefore the main attention of this article is concentrated on changes that in connection with Act No. 221/1999, Coll., Professional Soldiers, amended and updated in 2009, has come into being. |
The Evaluation of Health Risks of Exposure to Electromagnetic Fields Generated by Radars - PartiMilitary professionalProf. Ing. František Božek, CSc., por. Ing. Lukáš Kubiček, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 2/2009, Vol. XVIII. (L.): 99-110 The paper deals with the risk assessment of professional exposure to the non-ionizing electromagnetic fields caused by radars in the selected military unit. The measured values of electric field or power density in the indication zones where the staff is exposed to the effects of the radar's non-ionizing electromagnetic field was used for the risk assessment with the acceptance of national and European standards. The principle of preliminary precaution was applied concurrently with the risk assessment according to the valid standards. The authors discuss the values of measured outcomes. They used the Checklist Analysis for qualifications of risks and for quantitative risk specifications they use the so-called brainstorming. |
The Evaluation of Development in the Institutional Area of LogisticsMilitary professionalPlukovník Ing. Oskar KovaříkVojenské rozhledy / Czech Military Review Nr. 2/2010, Vol. XIX. (LI.): 126-132 The idea of this enquiry into Czech Army logistics was to prove that even under hard conditions originated in permanently changing army concepts, the army logistics still keeps its high standard and responsibility. During transformation, an appropriate organization structure has been created, with working mechanism of logistics support, using motivated and rationale source exploitation. The purpose of an array of transformation in defence sector was to introduce not only new and effective army structure, compatible with NATO armies, but also to change the system of fi nancing forces. The funding ought to be more economical. The article is backed by a longterm study and observation of logistics development in defence sector. |
Security in the Year 2020 with the Prospects to 2050 (Summary of Security Community Views) - Part OneMilitary sociologyPhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 1/2006, Vol. XV. (XLVII.): 121-138 Summary of Security Com174 munity Views - Part One. Despite the fact that most of the predictions made in the early 20th century did not realized, there are still plenty of arguments for drawing security prognoses as the only method assessing synthetic alternatives of future progress. The future is not unequivocally determined, as the all comprising development is strongly influenced by subjective motives. We must have scenarios upon which we can act, operate, namely in the field of security. The government ought to set clearly our security agenda, where and why we are going to make possible military engagement. All further actions are developing from those prognoses, i.e. buying tanks, helicopters, parachutes, armoured vehicles, etc. The first part of this security study covers several predictions containing even some controversial visions. They are based upon the opinion survey done among members of Czech military community. The field of investigation comprises EU, US, North Korea, Iran, Iraq, Africa, Asia, even hypothetic Russia-China conflict, terrorism, weapons of mass destruction, and the like. |
Crossing Ability of VehiclesMilitary professionalDoc. Ing. Šárka Sobotková, CSc.Vojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 145-149 Problems of crossing abilities are most often defined as the ability of wheeled and tracked vehicles to move on damaged, unrepaired communications or terrain. This ability is determined by the construction of vehicle, terrain qualities, and their classes. Less known are problems of reverse driving. In this case, we do not examine crossing ability, but investigate the capacity of terrain to decompose an overall load of moving vehicle. It is a part of tasks performed by engineer reconnaissance for force movements, as troops make use not only neat communications, but also rough terrains, off main routes. Diagnoses of this kind are performed by the Department of Engineer Technologies, Defence University Brno. Many examples are presented in the American Field Manual "Planning and Design of Roads, Airfields, and Heliports in the Theater of Operations-Road Design". |
RTO Study: Joint Operations 2030Military professionalIng. Miroslav Švejda, MAVojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 127-134 NATO's Research and Technology Organization covers six panels dealing with technology. System Analysis and Studies panel drafted a long-term scientific study "Joint Operations 2030" that was performed for three years under the direction of CNAD (Conference of National Armaments Directors). This study identifies system approaches of NATO further development. Its purpose is recommend remedies for eliminating potential defects in future Alliance capabilities, in the frame of anticipated security surrounding and emerging new technologies. The work was divided into five states: evaluating previous studies, evaluating basic potential, setting priorities, new technologies and the last stage evaluated results reached by means of Multinational Exercise. The final version of this document (Final Report) will be released in next half. By joining JO2030 the Czech Republic underlined its resolution to contribute to the advance of NATO defence potential. |
ABM a SALT I: Security Dilemma, Cooperation and Rational ChoiceInformational pagesMgr. Jan LudvíkVojenské rozhledy / Czech Military Review Nr. 3/2009, Vol. XVIII. (L.): 73-77 The SALT agreements seem to be outdated, nonetheless the current discussion on the U.S. missile defence systems must be perceived in its complexity and theoretical framework, with AMB treaty as a cornerstone. The article suggests that ABM treaty and Interim Agreement, forming together the outcome of SALT negotiations, demonstrate that rational decisions are fully compatible with arms control system and realist approaches to the international relations. The author supposes that cooperation and mutual trust can be achieved through negotiations and perception of other participants. He also takes into account the impact of Soviet nuclear build-up in 1960s is and its consequences. The important conclusion can be derived from this fact: arms control should be expected more in times of military balance rather that the domination of one world's actor. Key words: disarmament, arms control, mutual assured destruction, and antiballistic missile systems. |
Up to Law Family Tree of Public ContractsInformational pagesJUDr. Ing. Dalibor NovýVojenské rozhledy / Czech Military Review Nr. 1/2009, Vol. XVIII. (L.): 100-109 Evaluating offers of contestants for public contracts belong to key and critical moments of public tenders and the whole acquisition process at all. Variety and comprehensibility of numerical and rating methods shouldn't prevent applicants from understanding conditions and terms of contract/agreement. The transparency principle of evaluating is only slowly pushing forward in our legal system. We move from mere subjectivistic and unverifiable impressions to the unbiased comparing of best offers, together with the requirement of transparency, as a part of the process of comparing, ranking, and assessing offers, by the use of specific qualitative or quantitative factors, such as prices, feasibility, collateral risks, time plan or other conditions. The final step is called amalgamation, when we merge individual classifications in one complex appraisal. |
Cataclysm Scenario 2050-Imagining the UnthinkableNonreviewed - OtherProf. Ing. Josef Říha, DrSc.Vojenské rozhledy / Czech Military Review Nr. 3/2008, Vol. XVII. (XLIX.): 3-10 The purpose of this report is to imagine the unthinkable of the worst case scenario for the global future post-modern society. The analysis addresses the main features of global risk society, human suffering, and loss of life from natural catastrophes, man-made catastrophes, economic losses, peak-oilcrises impacts, threat of terrorism, radical Islam, fragile states, etc. Important are the consequences of the end of the Vestfal system and global climate change. There is substantial evidence to indicate that significant global warming will occur during the 21st century. The research suggests that once temperature rises above some threshold, adverse weather conditions could develop relatively abruptly. Drought persists for most of the decade in critical agricultural regions and in the water resource regions for major population centres in Europe. As fertility shrivels, societies get older-and much of Europe are set to get older than any functioning societies have ever been. To avoid collapse, European nations will need to take immigrants at a rate no stable society ever attempted. Europe will be significantly more Islamic. |
Analytical Thinking and Team Leadership in Intelligence AnalysisMilitary artDoc. Ing. Oldřich Horák, CSc.Vojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 49-54 This paper deals with aspects of intelligence analysis that very often influence the quality of intelligence information utilized by end users. Such analysis requires not only analytical thinking, but also specific experiences of all personnel exploiting collected information. The same body of information may result in multiple analytic products, with different security classifications, time scales, and level of detail. The result of this process is an analytical product - evaluation without any idle speculation and pseudo prophecy. Evaluation and interpretation must describe up-to-date conditions and demonstrate the clusters of future images with alternative developments. Reasonable evaluation reduces uncertainty and makes user's decision easier. At the end the author concentrates on rules of analytical team control and management. |
Additional Protocol to the Geneva Conventions Adopting Another Distinct Emblem (The Red Crystal)Military lawIng. Mgr. Rostislav RichterVojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 181-190 There are three protective emblems in use: the Red Cross, the Red Crescent, and the Red Crystal. As protection symbols, they are used in armed conflicts to mark persons and objects (buildings, vehicles, etc.) which are working in compliance with the rules of the Geneva Conventions. The cross, crescent or crystal must be used alone for what is termed "protective" use, to safeguard relief workers. The article predominantly deals with the third protocol emblem also known as the Red Crystal. In short it summarizes its history. Because of the controversy over Israel's national society Magen David Adom and a number of other disputes, the introduction of an additional neutral protection symbol had been under discussion for a number of years. In fact, this symbol is quite unknown in our country. |
Leadership Styles and Mistakes of Junior Commanders-Managers When Entering their ProfessionMilitary professionalPodplukovník Ing. Miroslav Mašlej, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 135-140 The author summarises most common and repeated mistakes of graduated officers after leaving military schools. Junior officers are practically in the same position as young manager in civil life, so we can find some analogies in civil managerial leadership. Civil manager face practically the same problems and situations. There are various mistakes that junior officers ought to be warned. Such educational instructions and leadership should be implemented into military schools' curricula. Backed by a vast amount of studied literature, the author offers his own solution. He makes use of five myths by Linda Hill, professor at Harvard Business School. The problem is to avoid extreme leadership styles: dictatorlike and benevolent ones. |
A European Way of "Humane Security"ReviewedIng. Vladimír Karaffa, CSc.Vojenské rozhledy / Czech Military Review Nr. 2/2009, Vol. XVIII. (L.): 3-10 Many people in the world lead intolerably insecure lives. In many cases insecurity is the consequence of armed conflicts in which civilians are deliberately targeted, sometimes, their insecurity has natural causes, like earthquakes, hurricane, tsunami or disease, they suffer from famine. Security is a broader term, covering not only military threats. Human rather than nation-state security should be at the heart of European policy. Instead of defeating enemies or pacifying warring parties, EU missions should focus on protecting civilians, through law enforcement with the occasional use of force. EU member states ought to support a new framework for the European Security and Defence Policy (ESDP). The following seven principles are underlined: (i) the primacy of Human Rights, (ii) clear political authority, (iii) multilateralism, (iv) a bottom-approach, (v) regional focus; (vi) the use of legal instruments, (vii) the appropriate use of force. In fact, underlines Mr. Karaffa, humane security concept forms the very base of common European culture and identity. |
Afghanistan: True RealityInformational pagesPodpraporčík Jan SmetanaVojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 100-107 The deteriorating situation in the Afghanistan region poses a security threat not just to the United States, but to every single nation. It was from that remote area of the world that Al Qai'da plotted 9/11 and subsequent attacks in Europe and elsewhere. Reading news about Afghanistan today gives rise to the question why the situation in this country is such as now really is. Ordinary mass media depict the country often in a confusing manner: Afghanistan as "a country, full of terrorists and uneducated barbarians, longing to destroy western civilization and kill". The author describes bad security situation which presents problem for both coalition soldiers and local Afghanistan population. At the same time we must realize that involved soldiers are exposed every day to asymmetric enemy forces, they stand face to face to mortar danger that could be hidden in for example in every car passing by. |
Decision-making and Planning in Defence DepartmentMilitary artPplk. Ing. Radek DubecVojenské rozhledy / Czech Military Review Nr. 2/2010, Vol. XIX. (LI.): 38-46 The article familiarizes readers with theoretical assumptions of planning and strategical decisionmaking in Defence Department and Czech armed forces. The author finds connections and similarities among others with public sector and civilian structures tied with budget spending. The strategical level of planning is a highly complicated and expert procedure. At present, planning process in defence department, within MoD sector, is specifi ed by the Order of Defence Minister No. 33, 2004. In this document, there are highly elaborated principles and rules of planning of activities and development implemented in defence sector. The article is based upon papers and reports presented at the Defence Sources Course, MIDMC 2001-06, Resources Management Institute, USA, held at the Military Academy Brno in 2001, and documents dealing with managerial problems. |
Predictive Methodology in Intelligence ServicesReviewedBc. Petr ZelinkaVojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 29-39 This article aims at building a bridge upon a gap, which separates academic sphere and intelligence community in the issue of predictive methodology. The author tries to accomplish this objective by presenting intelligence predictive methods based on open-source literature research. First, the question of uncertainty and probability in prediction is introduced (Cynefin template). Then follows basic introduction to predictive methods in civil and military intelligences, so that the reader might grasp the fundamentals of early warning systems. The academics and above all journalists should know the risks and perils in forming intelligence forecasts, estimates, foresight and warning scenarios, e.g. the so-called Black Swan scenario, the author explains potentials failures of the Delphi method. This study ought to be regarded as an introductory to predictive intelligence concurrently done by governmental agencies for purposes of national security and defence. |
The Current Reality of Nuclear ThreatReviewedMgr. Jan LudvíkVojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 16-23 This article addresses vital issues of possible threat of nuclear weapons in contemporary world. First, the general nuclear order-particularly the NPT regime-is briefly examined. Analysis proceeds to a critical exploration of the prospective use of nuclear weapons by small nuclear states and the so-called rogue states. Some attention is also paid to the conflict between India and Pakistan, since these two states are often considered as the most dangerous from perspective of possible use of nuclear weapons. The author considers the threat of nuclear war between great powers and then the threat of nuclear terrorism. His analysis suggests that deterrence between great powers is reliably working. The threat from rogue states is limited by technological difficulties in process of development and production of nuclear weapons and limits of small nuclear arsenals. Even though threat of nuclear terrorism should not be underestimated, this paper argues that technical obstacles and availability of other comparatively cheap methods effectively reduce the terrorists' desire to acquire nuclear weapons. |
Jan Eichler: International Security in the Era of Globalization. (Informative review)Book reviewVojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 191-195 This is another publication by Mr. Jan Eichler. It consits of three parts: the fi rst one defines nearly three dozens of basic terms in the field of security, the second one deals with wars in the 90?s, and finally third part concentrates on terrorism. The book has evidently pedagogical bias, with explanatory character. Under the influence of foremost sociologist Ulrich Beck, Jan Eichler interprets risks as ?social phenomena? derived from threats. The author also evaluates wars in Africa, Asia and Latin America, in Serbia or the Persian Gulf, which took place in 1990-2001. There were 120 armed confl icts, with 94 % victims from among civil population (compared with 50 % of WWII and 15 % WWI). In those wars bellingerent parties deployed weapons of all sorts, with the exception of WMD. As far as international terrorism is concerned, the author sees as its primary characterists the absence of warning before terrorist attacks are accomplished. |
The Animals and TerrorismInformational pagesIng. Hana VlachováVojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 155-163 Animals have been used for military purposes from the ancient world to nowadays. Horses, elephants, mules and camels were carrying supplies and took part in battles. Dogs were trained for securing livestock and military camps. Soviet army used them as live mines during World War II. The U.S. Army explored the possibility of using bats as live incendive devices. Even the terrorists could use animals for destroying chosen targets in the same way armies used to do. The deployment of animals would be advantageous for any terrorist group because security forces would not expect this kind of attack. Up to now, there have been just a few cases of abusing animals by terrorists, e.g. for bomb laden mules or dogs carcasses which hide explosive devices. But animals could also help with the fight against terrorism, for example dogs or bluegill fish. |

