Vojenské Rozhledy

Czech Military Review

Fulltext search in archive



« advanced mode »

 previous    ...   10   11   12   13   14  15   16   17   18   19   ...    next 

Results 391 to 420 of 3124:

Geospatial Support to NATO Strategic Headquarters

Informational pages

Mjr. Ing. Jan Marša, Ph.D.

Vojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 116-126

First, the author, who works at the Supreme Headquarters Allied Powers Europe, Mons, briefly describes the contribution of Geographic Service of Czech Forces in terms of geospatial support for NATO. He also mentions current allocation of personnel in military missions and NATO/EU international structures. The article deals with tasks fulfilled by the Geospatial Section within Supreme Headquarters (SHAPE). One of the main section's responsibilities is Geospatial Data Management and Distribution, in line, with releasability conditions, and overall coordination of geo-cells within subordinate HQs. This section widely cooperates in the field of research and development, namely Core GIS project and Geospatial Standardization. Direct Geospatial Support is shortly mentioned, as well as variety smaller assignments.

Agencies under the Terms of the Former "Second Pillar" of the European Union

Informational pages

Mgr. Miloslav Havlín, Ph.D.

Vojenské rozhledy / Czech Military Review Nr. 2/2010, Vol. XIX. (LI.): 114-118

Between 1993 and 2009, the EU consisted of three pillars. This structure was introduced with the Treaty of Maastricht in 1993, and was eventually abandoned in 2009, with the entry into force of the Treaty of Lisbon, which among others abolished the so-called second pillar of the EU "Common Foreign and Security Policy". Today this role was taken over by several institutions and agencies, established for solving relevant questions, for examle the European Union Institute for Security Studies (EUISS), the European Union Satellite Centre (EUSC) and the European Defence Agency (EDA). The difference is that national acencies solve problems separately, whereas EU agency take into account commont foreign and security policy, under the supervision of the EU.

The Current Reality of Nuclear Threat

Reviewed

Mgr. Jan Ludvík

Vojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 16-23

This article addresses vital issues of possible threat of nuclear weapons in contemporary world. First, the general nuclear order-particularly the NPT regime-is briefly examined. Analysis proceeds to a critical exploration of the prospective use of nuclear weapons by small nuclear states and the so-called rogue states. Some attention is also paid to the conflict between India and Pakistan, since these two states are often considered as the most dangerous from perspective of possible use of nuclear weapons. The author considers the threat of nuclear war between great powers and then the threat of nuclear terrorism. His analysis suggests that deterrence between great powers is reliably working. The threat from rogue states is limited by technological difficulties in process of development and production of nuclear weapons and limits of small nuclear arsenals. Even though threat of nuclear terrorism should not be underestimated, this paper argues that technical obstacles and availability of other comparatively cheap methods effectively reduce the terrorists' desire to acquire nuclear weapons.

The Implementation of Defence/Military Policy in the Czech Republic: Little Stability of Governance and Unsuitable Management Concept

Opinions, controversy

Pplk. Ing. Bohuslav Pernica, Ph.D., pplk. Mgr. Pavel Balvín

Vojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 101-113

The article deals with persistent problems of Czech military policy within 1993-2009, its achievements and failures. A new managerial concept, system planning, programming and budgeting, which superseded a communist central control, was not implemented fully because of governance instability. The office of Defence Minister was held by 11 persons within 1993-2009 (Czech Republic). Among others, it aroused the return of a concept of central planning in 2004, which was not successful, because it was not supported by institutions outside the MoD. The authors propose more transparency in military matters and better cooperation with academic community to prevent the repetition of concepts supporting short-term goals instead of long-term visions.

Afghanistan: True Reality

Informational pages

Podpraporčík Jan Smetana

Vojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 100-107

The deteriorating situation in the Afghanistan region poses a security threat not just to the United States, but to every single nation. It was from that remote area of the world that Al Qai'da plotted 9/11 and subsequent attacks in Europe and elsewhere. Reading news about Afghanistan today gives rise to the question why the situation in this country is such as now really is. Ordinary mass media depict the country often in a confusing manner: Afghanistan as "a country, full of terrorists and uneducated barbarians, longing to destroy western civilization and kill". The author describes bad security situation which presents problem for both coalition soldiers and local Afghanistan population. At the same time we must realize that involved soldiers are exposed every day to asymmetric enemy forces, they stand face to face to mortar danger that could be hidden in for example in every car passing by.

Risk Catalogue: Software Instrument for Risk Management in Defence Department

Reviewed

Ing. David Řehák, Ph.D.

Vojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 40-44

Risk management covers the identification, assessment, and prioritisation of risks, which is followed by coordinated preventive operations to minimize negative impacts on society. The most demanding is the so-called risk assessment (risk identification, risk analysis, risk evaluation). The Risk Catalogue consists of introductory page, and twenty cards for risks register. With the assistance of this catalogue, defence analysts acquire general knowledge about number of risks and their frequency. The level of risk is calculated by summation according to its probability, gravity, and unwanted effects. In case of defence department, actual tasks are assigned to manage to Defence Ministry, Division, Branch, and Section accordingly. Possible risks are represented at a chart accompanying the article. The purpose of Risk Catalogue, its principles, guidelines for implementation, is to make the work of analysts easier.

Information Process as a Part of Command and Control System (Parti)

Military professional

Pplk. Ing. Petr Ryp

Vojenské rozhledy / Czech Military Review Nr. 4/2009, Vol. XVIII. (L.): 149-153

The change of security situation in the world, international ties and last but not least changes in operational environment, exploitation of new technologies are reflected by changes in defence planning, military organization, forces engagement and operational assessment. Time, flexibility, cooperation in coalition operations, interoperability in technology spheres play incommutable roles together with trained personnel. Command and control (C2) is self-contained system depending on many factors provided by the so-called System of Communication and Information. At present it is the very base for information collection, decision-making process, preparing variants of operation for both commander and his staff. Among others the author writes about Network Enabled Capability system introduced into Czech armed forces. C2 programme is also a part of educational curriculum at Defence University Brno.

NATO's Strategic Concept: An Important Step Towards Military and Political Qualification of Alliance

Reviewed

Kpt. Mgr. Karel Zetocha, Ph.D.

Vojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 3-14

The main Alliance mission is to "safeguard the freedom and security of its member countries" and to "deter and defend against any threat of aggression against any of them". Those general tasks are tailored today to changed international security surroundings. In May this year, a report by the experts group was released, forming the basis for further negotiations over the new strategical concept of NATO. The experts produced a document of first-rate quality identifying main tasks NATO is facing today. At the same time this document redefines prospective directions the Alliance should follow in the years to come. Without a broad popular support NATO's engagements namely off European territory couldn't be vindicated and justified. The same is true as far allocation of sources for NATO missions and developing military capabilities are concerned. So, the communication with public thus becomes a further dimension of this highest strategic document.

The Evaluation of Development in the Institutional Area of Logistics

Military professional

Plukovník Ing. Oskar Kovařík

Vojenské rozhledy / Czech Military Review Nr. 2/2010, Vol. XIX. (LI.): 126-132

The idea of this enquiry into Czech Army logistics was to prove that even under hard conditions originated in permanently changing army concepts, the army logistics still keeps its high standard and responsibility. During transformation, an appropriate organization structure has been created, with working mechanism of logistics support, using motivated and rationale source exploitation. The purpose of an array of transformation in defence sector was to introduce not only new and effective army structure, compatible with NATO armies, but also to change the system of fi nancing forces. The funding ought to be more economical. The article is backed by a longterm study and observation of logistics development in defence sector.

Main Methods of Intelligence Analysis and Ways of its Evaluating

Military art

Mgr. Miroslav Kalous

Vojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 24-32

The article presents six more or less structured analytical methods that are or could be employed in intelligence analysis. This type of analysis, one part of the intelligence cycle, is understood as "the process of evaluating data for reliability, validity, and relevance; integrating and analysing it; converting the product of this effort into a meaningful whole, which includes assessment of events and implications of the information collected". The set of presented methods includes: link analysis, opportunity analysis, analogy, linchpin analysis, analysis of competing hypothesis and alternative scenarios. The study doesn't stop with presenting those methods; it also explains which type of reasoning (inductive, deductive or abductive) is used when working with each particular method. In broad terms, the article tries to shed light on intelligence analysis and its specifics. The reader should obtain better understanding their usefulness in the daily work of intelligence analyst.

Extremism from the Point of Views of Soldiers (Analysis of Sociological Investigation into Extremism in the Czech Armed Forces)

Military sociology

Doc. JUDr. PhDr. Miroslav Mareš, PhD., PhDr. Josef Smolík, PhD., Mgr. Petra Vejvodová

Vojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 163-173

The paper deals with the relation between political extremism and regular soldiers of the Czech armed forces (from the point of view of military staff). The threat of presence of extremists in the army is conceptualized in this paper. After that there are presented methodology, outcomes and interpretations of research sociological investigation, which was realized in February and March 2009 at Czech armed forces. As a risk should be assessed mostly information about contacts with extremists in the army and information about very different attitudes in relation to the importance of the issue "extremism in the army".

Additional Protocol to the Geneva Conventions Adopting Another Distinct Emblem (The Red Crystal)

Military law

Ing. Mgr. Rostislav Richter

Vojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 181-190

There are three protective emblems in use: the Red Cross, the Red Crescent, and the Red Crystal. As protection symbols, they are used in armed conflicts to mark persons and objects (buildings, vehicles, etc.) which are working in compliance with the rules of the Geneva Conventions. The cross, crescent or crystal must be used alone for what is termed "protective" use, to safeguard relief workers. The article predominantly deals with the third protocol emblem also known as the Red Crystal. In short it summarizes its history. Because of the controversy over Israel's national society Magen David Adom and a number of other disputes, the introduction of an additional neutral protection symbol had been under discussion for a number of years. In fact, this symbol is quite unknown in our country.

"Fog of War" in Pieces of Classical Authors: Clausewitz a Tolstoy (Problems of Uncertainty and Chance Events In War)

Military art

Bc. Tomáš Kučera

Vojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 51-59

The proponents of Revolution in Military Affairs claim that modern military technology will lift a "fog of war". In this article the term "fog of war" is described and illustrated in a work of Carl von Clausewitz who is supposed to introduce this term, used also in the famous novel War and Peace by Leo Tolstoy. These classics show us that uncertainty and chance, in other words fogs of war, are essential to human mentality. They will be present as long as war remains within a scope human endeavour. Emphasizing that military technology is equal to lifting the "fog of war" can lead to situation in which only trained commanders are supposed be able perfectly address problems in "chessboard" of war or computer simulators, but they will unable to manage a real world full of chaos, as they not used to count with uncertainties.

The Report by Madeleine Albright's Team and Its Wide-ranging Contexts ("Council of Wise Men" and Drawing up the Alliance's New Strategic Concept)

Reviewed

PhDr. Antonín Rašek

Vojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 15-30

This concept has been preparing since the early 2009. In short, the North Atlantic Treaty Organisation must be increasingly prepared to intervene far beyond its borders. In the coming decade, NATO will have four central inter-related military missions. The first requirement is to "deter, prevent and defend" against aggression, so as to ensure the political independence and territorial integrity of NATO member states. The report insists on the need to send out military missions beyond the treaty area "when required to prevent an attack on the treaty area or to protect the legal rights and other vital interests of Alliance members". Any expeditionary mission must be based on the principles of the UN charter. Another key item is to cooperate better with those partners, and others worldwide, in order to tackle the new threats posed by cyber attacks, piracy, arms proliferation and energy supply insecurity and climate change. However, in order to achieve the new goals, NATO "must halt the precipitous decline in national defence spending", and to introduce reforms to make spending more efficient.

Leadership Styles and Mistakes of Junior Commanders-Managers When Entering their Profession

Military professional

Podplukovník Ing. Miroslav Mašlej, Ph.D.

Vojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 135-140

The author summarises most common and repeated mistakes of graduated officers after leaving military schools. Junior officers are practically in the same position as young manager in civil life, so we can find some analogies in civil managerial leadership. Civil manager face practically the same problems and situations. There are various mistakes that junior officers ought to be warned. Such educational instructions and leadership should be implemented into military schools' curricula. Backed by a vast amount of studied literature, the author offers his own solution. He makes use of five myths by Linda Hill, professor at Harvard Business School. The problem is to avoid extreme leadership styles: dictatorlike and benevolent ones.

Defence Research and Development in 1989-2009

Reviewed

Doc. Ing. Josef Janošec, CSc.

Vojenské rozhledy / Czech Military Review Nr. 4/2009, Vol. XVIII. (L.): 71-86

After a short review of defence R&D history, the author concludes that our country used to reach world's level in some fields: passive warning systems, NBC protection, military surgery, explosives. After the change of political system in 1989 we began to dispose Czech military industries. The only scientific place to left is Defence University Brno, but it is an institution more or less concentrated on education. It is almost impossible to maintain pace with foreign defence industry. In the article there is an exhaustive list of military plants, institutions after 1989, together with the date of their closing down. It is followed by research orientation of defence industry, set according to time periods. The special chapter concentrates on financing defence research, the closing part deals with the period of our membership in NATO. Although there are same positive aspects, such as international cooperation, exploiting sources from abroad, strategical control declined. We see unwise reductions in personnel, abolishing accredited institutions, etc.

Where Are You Going, Defence Department?

Opinions, controversy

Pplk. Ing. Karel Vávra

Vojenské rozhledy / Czech Military Review Nr. 1/2009, Vol. XVIII. (L.): 68-75

The autor responds to several articles published in our Military Review, namely by Prof. František Ochrana, Prof. František Božek, Brigadier Rudolf Urban, Prof. Miroslav Krč, in No. 4/2008, with special appreciation to critical articles by Ing. Jiří Dušek and Lt.Col. Ing František Růžička in the same issue. He tries to find out common denominators of those essays. There are three of them: economization tied with rationalization, risk management, and information compatibility. As necessary he regards to unite those denominators both at the level of decision making officials and at the level of their subordinated elements, by means of e.g. working teams as a guarantee of coordination, so that the adopted Long-term Vision of Defence Department could be actually realized.

NATO is Preparing a New Strategical Concept

Nonreviewed

PhDr. Antonín Rašek

Vojenské rozhledy / Czech Military Review Nr. 2/2010, Vol. XIX. (LI.): 3-21

The primary purpose for NATO enlargement, covering first three countries of the so-called Visegrad Four and later Slovakia, was the necessity to fulfil "security vacuum" in Central and subsequently in Eastern Europe which came into existence after the fall of Soviet empire. Membership of those countries helped to fix criteria for admission of other states to the Alliance. Today, the NATO alliance stands in front of new important challenge: to work out a New Strategic Concept agreement in late 2010, based upon the idea saying that the security of Euro-Atlantic region is tied with and depends on the safety of the whole world. This safety concept will able to be realized only by means of global strategical governance. More then predicting expected security and defence ideas, the author reopens a broader discussion about the real meaning of NATO membership. He also repeats and enumerates risks and threats we are facing today.

A Look at Our Army Ten Years Ago

History pages

PhDr. Antonín Rašek

Vojenské rozhledy / Czech Military Review Nr. 4/2009, Vol. XVIII. (L.): 173-184

At that time, the base for plural societies in Eastern Europe was founded. Poland, the Czech Republic and Hungary joined NATO defence alliance. Serious global threats of economic, military, ecology, social, ethnic, religious, criminal characters were lasting. The important question of proliferation of mass destruction weapons was raised. The analyses of security situations in Europe and the World respectively proved that armed conflicts were mostly internal, in a form of civic wars, but demographically endangering bordering countries. Those threats were only discussed, namely nobody fully realized the threat of terrorism. Defence budgets were reduced, all people wanted to profit from the so-called peace dividends. Czech army was loyal to the state; it was not misused in inner political conflicts, which was regarded as something normal by the majority of Czech public. But there were many problems left, especially the role and engagement of the ACR in the following century.

Threat of Extremism from the Point of View of the Czech Armed Forces

Military sociology

Doc. JUDr. PhDr. Miroslav Mareš, Ph.D.

Vojenské rozhledy / Czech Military Review Nr. 2/2009, Vol. XVIII. (L.): 138-151

The paper deals with the assessment of extremism in connection with the Czech Armed Forces. It analyses attitudes of various forms of Czech domestic extremist movements to the military sphere and possible impacts of the infiltration of extremists into the army, namely in time of danger (training militant activities, including paramilitarism, subversion, espionage, etc). The most important problem of the contemporary Czech counter-extremist policy in this area is the rise of neo-Nazi activities in the armed forces and the establishing of extreme right paramilitary units which take interest in the engagement of soldiers. Even though these activities are limited in our country, the author offers overall survey various obscure organizations, having connections to foreign groups sponsoring their Czech counterparts.

Employing CALS in Acquisition Process of the ACR

Military professional

Ing. Petra Butorová

Vojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 141-148

Computer-Aided Logistic Support (CALS) appeared for the first time in 1984 in a common study of US government and American defence industry. The study recommended using technical data in digital form. Further it was changed into Computer-Aided Acquisition and Logistic Support and in 1994 the acronym CALS was changed into Continuous Acquisition and Life-Cycle Support. At present we interpret CALS as the support to all automatized processes with fully digitalized data processing. Among its important tools belong LCC (Life-Cycle Costs) and risk management. It is a vast standardization strategy, covering the whole life cycle, via acquisition process, its support, innovation and product disposal. CALS is supposed to make acquisition procedures in the ACR more effective.

Obama's First Year in the White House

Reviewed

PhDr. Antonín Rašek

Vojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 3-23

President Barack Obama came to power at a difficult time in America's history. Home and foreign policies are hard to manage, among others, as we are on the threshold of post-ethnic society, and in the war with terrorisms. Obama does not give up American leadership, but he is seeking to find the balance between security and liberty, between power and freedom in the world, broadly speaking. As the consequence, Mr. Rašek presumes emerging the new global security situation: the rise of multipolar world, divided into several new political spheres. This author's opinion is backed by comments by reputable world's political analysts. As far as Euro-Atlantic relations are concerned, or relations with Russia, there are excellent prospects, namely there is the progress with Russia on arms control-part of Obama's determination to put the world on a path toward nuclear disarmament. The author ascribes the drop in Obama's popularity to failed healthcare reform; outside the US, to the fact that Obama is not able to define clear goals and missions in Afghanistan.

Islamists Online

Informational pages

Jiří Hodný, Ph.D.

Vojenské rozhledy / Czech Military Review Nr. 2/2009, Vol. XVIII. (L.): 70-78

Like hundreds of millions of other people, Islamic terrorists and their supporters use the Internet. In many ways, the Internet is a tool tailor-made for these Islamic extremists, who use it covertly and overtly to plan attacks, raise money, and spread anti-Semitic and anti-American propaganda written in English, Arabic, and other languages. There is sufficient information to believe that in the future, terrorists may even turn the Internet itself into a weapon, using it to wreak havoc on America's critical infrastructure. Because these militants are global, rather than being located in a single geographical area (Pakistan, Indonesia, Somalia, Iraq), the Internet provides them with a new and effective way to attain their goals. It may be difficult to catch extremists planning or coordinating an attack if they are using encryption, steganography, or some other method of hiding their online activities.

Targeted Budgeting: Its State, Prospects and Implementation in Defence Ministry Department

Informational pages

Prof. PhDr. František Ochrana, DrSc.

Vojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 98-108

At present, MoD department prepares a new method of economic control: budgeting by objectives. The process has two levels. The fi rst level covers all sources control, the second one is restricted to budgeting methods. Our defence department is under the pressured of continual budget cuts, so the leading defence representatives should welcome this new technique which will clearly and distinctly present results of limited defence budgets, both for the army by itself and for country defence. Targeted budgeting will be oriented towards outward institutions (parliament) and inside activities (within defence department). Departmental objectives are to be taken as integrative, supported by IT system linked up with state treasury, offering reliable data about costs and expenses within the Chapter of the Ministry of Defence.

The Deployment of Bundeswehr Logistics in Afghanistan

Informational pages

Ing. Vladislav Vincenec, Ph.D., doc. Ing. Miroslav Cempírek, CSc.

Vojenské rozhledy / Czech Military Review Nr. 2/2010, Vol. XIX. (LI.): 101-108

The article depicts the methods of logistical support to combat units of the German Federal Forces (Bundeswehr), deployed in Afghanistan. Professionally trained and prepared personnel are capable to meet requirements of forces in ISAF operations. The centralizations of composite logistical services can guarantee the lowering of payments and expenses in logistics. Such arrangement makes logistic activities more economical, namely by taking over of mechanisms used in civilian economy sphere. This method is called "focused logistics". It is used for logistical support of small contingents. Its characteristic feature is interconnection of logistical data and transport technologies, rapid crisis response, and the ability of logistical support during all combat and non-combat activities.

Homage to Eightieth Birthday of Miroslav Purkrábek

Personal data

PhDr. Antonín Rašek

Vojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 197-201

Had PhDr. Miroslav Purkrábek, CSc. was still alive today, he would be 80 years old. It was on September 8, 2005, that Miroslav Purkrábek, suffered a stroke. This year it has been fi ve years since he died. He was a person who contributed to social sciences on three distinctive fi elds: military sociology, sociology of military health, and sociology of public policy. As a gifted scholar he expected that alongside with disarmament talks and preparing collective defence, especially after the fall of world?s socialist system, that task of the army would shift towards preventive, threatening role. But he even lived to see the moments when military professionals were engaged in real combat, in preemptive conflicts, against non-traditional, assymetric forces of guerrilla character. At the same time he could see that another hypothesis of transition to all professional forces was going be fulfi lled. Unfortunately, the Czech Army was not prepared for this important process, as political and MoD leaders at were occupied by this theme of professionalization only marginally.

Military Decision-making Process and Advanced Methods of Managerial Decisions

Military art

Ing. Pavel Zůna, MSS

Vojenské rozhledy / Czech Military Review Nr. 2/2010, Vol. XIX. (LI.): 22-37

The problem of forming military decisions lies in the very core of this article. Among others, there are a lot of highly unpredictable impact factors; there are many assessment criteria for individual variants of solving problems. Criteria of qualitative characters, and various interpretations of data information demand quality decisions; they are sometimes difficult to understand and even contradictory. The commanders and their staffs must be well educated, trained and experienced. To meet this precondition we must ensure quality of career training, supported by practical experiences. The staff work must be practiced regularly, with the use of various scenarios, supplemented by historical studies of past or recent fi ghts and battles.

Sovereignty, Integrity, Political Independence (Forming Strategical and Security Documents)

Reviewed

PhDr. Antonín Rašek

Vojenské rozhledy / Czech Military Review Nr. 1/2009, Vol. XVIII. (L.): 3-22

This leading article deals with the sphere of strategy and defence policy. The essay is an output of scholarly work and therefore it is summarizing and evaluating problems in question with professional recommendations. First, the author draws our attention to various concepts of security and underlines national differences backed by national histories. Security concepts have their sources in deep analyses of potential threats and corresponding scenarios, with specific bias to Czech environment. He openly expresses his critical opinions on contemporary security documents, for lack of political security directions, as politicians in general have little knowledge of security and defence problems. In his opinion, the possible outcome lies in a partnership and cooperation with academics outside military and government structures, experts and members of security community, whose expert opinions could help namely to form long-term security concepts.

Intelligence in Asymmetric Operation of US Army

Informational pages

Doc. Ing. Oldřich Horák, CSc.

Vojenské rozhledy / Czech Military Review Nr. 4/2006, Vol. XV. (XLVII.): 81-86

In today's conflicts, such as the Global War on Terrorism in Iraq and Afghanistan, the threat is more difficult to define; in fact, there are often multiple threats working against our forces concurrently. Our army lacks first-hand information from current battlefields, so that the author must make use of mediated experiences. The paper is therefore based upon articles from foreign military magazines, namely Intelligence Synchronization on a Nonlinear Battlefield (Military Intelligence Professional Bulletin 4/2004) and Intelligence in Peacekeeping Operation (International Journal of Intelligence and Counterintelligence 1/1997). It is not a mere translation or compilation, but ingenious summing up of discussed ideas. In this study, the author thinks over intelligence synchronization and proposes a new way of looking at it. Methodology heads from priority intelligence requirements towards specific information requirements, via indicators, and so on. The purpose of intelligence synchronization is to focus efforts to build, refine, or clarify the commander's understanding of the battlefield and the threat.

Open Sources Intelligence

Military art

Doc. Ing. Oldřich Horák, CSc., pplk. Ing. Ivo Pikner

Vojenské rozhledy / Czech Military Review Nr. 3/2007, Vol. XVI. (XLVIII.): 35-42

Intelligence services collect data from various sources: SIGINT (intelligence obtained by listening to the enemy's radio transmissions), HUMINT (information about the enemy obtained from people, e.g. friendly forces, agents, civilians, prisons of war), and the very latest it is the so-called OSINT - Open Sources Intelligence. Its description is not unequivocal. In the intelligence community, the term "open" refers to overt, publicly available sources, as opposed to covert or classified sources. OSINT includes a wide variety of information and sources: media, public data, observation and reporting. It is defined as produced from publicly available information that is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence requirement.

 previous    ...   10   11   12   13   14  15   16   17   18   19   ...    next