Fulltext search in archive
Results 151 to 180 of 649:
The Shift in Character of Future Operations: Joint Doctrine Publication 3-40Military artVojenské rozhledy / Czech Military Review Nr. 2/2011, Vol. XX. (LII.): 69-70 The document "Security and Stabilization: the Military Contribution UK revision of Joint COIN doctrine" was created by the team of authors of DCDC (Development, Concepts and Doctrine Centre), Defence Ministry, Great Britain. The publication was similarly as other JDP series written as an instruction manual for members of armed forces to solve at general level the tasks in missions abroad, in disintegrated countries: security, stabilisation and insecurity, strengthening the capacity within armed forces to work alongside civilians for certain specific, short-term reconstruction, development tasks in hostile environments, and to provide a stabilisation presence in the immediate aftermath of a military operation while sufficient security is put in place to enable civilians to deploy. It is highly recommendable literature for members at the level of join staffs, participants in stabilization operations, or for attenders of Higher General Staff Courses. |
The Assessment of Political Risks in the Selected Countries: Multivariate Statistical MethodsInformational pagesIng. Jakub Odehnal, por. Bc. Ladislav DudekVojenské rozhledy / Czech Military Review Nr. 3/2011, Vol. XX. (LII.): 111-119 The paper deals with the data were obtained from the set of variables published in the International Country Risk Guide. The variables were as follows: Government Stability, Socio-economic Conditions, Investment Profile, Internal Conflict, External Conflict, Corruption, and Military in Politics, Religious Tensions, Law and Order, Ethnic Tensions, Democratic Accountability, Bureaucracy Quality. To analyse the current situation in selected 140 countries, authors employ multivariate statistical techniques. They classify the analysed countries by means of cluster analysis to prove the existence of differentiated groups. The results were evaluated with the help of a dendrogram. The conclusions indicate that traditional NATO member countries achieve above-average values in the selected variables. |
WikiLeaks Case and Its Reflections in World's Security CommunityInformational pagesPhDr. Antonín RAŠEKVojenské rozhledy / Czech Military Review Nr. 4/2011, Vol. XX. (LII.): 129-137 Czech dailies and weeklies publicised their analyses of the diplomatic dispatches released by WikiLeaks. Some were concerned in world's politics, but higher attention was paid to 1,271 dispatches from Prague. According to the dispatches, the U.S. Navy wanted to purchase 23 Russian anti-ship missiles to obtain the weapons from Belarus through Ukraine, with a Czech arms dealer. However, the Czech government decided to derail the plan by not granting the Czech middleman the needed permission to export weapons from a dictatorship like Belarus. Various cables also detailed a dispute in the area of arms technology. Some observations from the dispatches dealing with characteristics of Czech prominent politicians are amusing. Overall, the United States evaluated the CzechRepublic positively, as an economically mature country and as an ally. |
Two Monographs on Security from SlovakiaBook reviewVojenské rozhledy / Czech Military Review Nr. 1/2011, Vol. XX. (LII.): 137-143 Prof. Dr. Štefan Volner, CSc., is a very diligent and prolific author. He is the author of many monographs, books, papers and articles in the field of security and defence policy published worldwide. Now we have his latest two books: Security of Mankind (Bezpečnosť ĺudstva) and Security for the 21st Century (Bezpečnosť 21. storočí). In the former one, he comes out of a broad concept of security. Dr. Volner regards the theory of securitization as a lingual and socially determined construct, and so does analyses of security topics. The purpose of his first monograph is to familiarize experts and students with new theoretical concepts, ideas, methodological approaches and paradigms. The latter monograph has a classical structure tied with security studies; it contains theoretical fundaments, dealing with global risks and classifies wars of 21st century. He regards human security as a multifaceted phenomenon, at macro- and micro- levels. |
Private Military Companies (New Elements in Operational Environment)Military artIng. Jaroslav KulíšekVojenské rozhledy / Czech Military Review Nr. 2/2011, Vol. XX. (LII.): 71-96 This article deals with PMSCs as a relatively new phenomenon in warfare areas. It is open to discussion whether private military companies and the private contractors that they employ, should be treated just like any other transnational industry, or whether they should be treated like mercenaries under international law. As it happened in many countries, private companies and private contractors operate in a legal vacuum. From a strictly legal point of view individuals employed by private military companies are not to be considered as mercenaries. The private military industry offers a wide range of services. Procurement of military services by individuals and private firms has developed in a direction that had probably not been anticipated in previous years. Some military analysts say that the exclusive role of the state in the domain of defence and security is outdated and should be re-examined. |
Starting Points for the Preparation of Updated Security Strategy of the Czech Republic 2011ReviewedPhDr. Miloš Balabán, Ph.D., PhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 2/2011, Vol. XX. (LII.): 3-19 In our country, existing strategical documents related to security used to be compiled very carefully, but proved to be not very effective, as they did not fit to practical everyday security policy, they did not comply with day-to-day requirements. The only exception was the 1991 doctrine dealing with the creation of Integrated Rescue System and the implementation of professional armed forces. At present, there is a tendency to rewrite those strategy documents again, namely in the field of security. The preparation of a new version of Czech security strategy is taking place in time marked with new trends in world politics and economy. The main attention is attracted by crisis management, arms control, disarmament, WMD non-proliferation, cooperation with non-NATO nations, and international organizations, last but not least counterterrorism and cyberspace security strategy. In short the study mentions Czech political-military ambitions, defence strategy, defence capacity and resources, it appreciates in value knowledge gained by the Centre of Security Policy, Faculty of Social Science, Charles University Prague, and it contains conclusions and recommendations for the preparation the 2011 Czech National Security Strategy. |
Command and Control as an Important Part of Military Science (Getting on for Information Age)Reviewed - ReviewIng. Petr Ryp, plk. Ing. Robert BielenýVojenské rozhledy / Czech Military Review Nr. 3/2011, Vol. XX. (LII.): 29-33 The specification of terminology related to terms command and control (C2) is quite important for further scholarly examination of military science. The command and control area is nowadays under the constant impact of the influx of information technology, as well as it is affected by the changes in the contemporary security environment. This article is dedicated to the military, its history, and its contributions to current military operations. It provides an attempt to specify terms "command and control" in both general and military levels. Finally, it provides clarification of the terminology within command and control systems, as their terminology has been changing. In a simple way, the C2 could be characterized as the execution of authority by the commander, via communication and information systems, with the use of current standard operational procedures, under present laws and rules, to act in the interest of forces to meet assigned orders and intentions. |
Jan Eichler: Terrorism and Wars in Era of Globalisation. (Is it possible to prevent wars?)Book reviewVojenské rozhledy / Czech Military Review Nr. 2/2011, Vol. XX. (LII.): 172-174 The author Jan Eichler works at the Institution of International Relations Prague, so those are the themes he is professionally involved in. His publication deals with security threats and their assessments at the beginning of 21st century. This second edition of his book is amended by several wars taking place since the first edition was released. They were wars between Russia and Georgia 2008-2009, Israel vs. the Palestinians 2008-2009, several conflicts in Africa, Columbia, and Sri Lanka; ISAF operations in Afghanistan; in Iraq the new attitude of the USA towards conflict solution. Somalia represents a typical failed state with warlords, criminal gangs, Somalia and sea piracy is a mutually tied problem the word community was not able to solve. Last but not least, there are dangerous activities of Islamists in North Africa. Even though those mentioned conflicts are only regional, their consequences are global. They therefore need the involvement of international organizations, the EU and the UN respectively. |
New Global and Regional Actors and World and European SecurityReviewedPhDr. Miloš Balabán, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 2/2011, Vol. XX. (LII.): 30-37 Taking into account the prepared 2011 Security Strategy and the White Paper on Defence in our country, due attention ought to be paid to political ambitions and economy influence of emerging actors, both world and regional. In ten or twenty years to come we shall face basic transformation of international system. Today, there are four main global power centres: North America (United States, Canada), the European Union, China and Japan. The author of this study concentrates predominantly on their economy strength that is also a base of all sources spent on armed forces. Among emerging powers belongs above all India, regional power in South Asia, Brazil in Latin America, followed by Indonesia, Turkey, and Mexico. They together cover 52 per cent of word's economy production. Different interests give rise to various disputes, but they are able to act cohesively against e.g. decisions by G-20. Among other's the article is accompanied by the table comparing military powers of the USA and Russia. |
Present-day Notions on Military DeceptionsMilitary artDoc. Ing. Milan Kubeša, CSc.Vojenské rozhledy / Czech Military Review Nr. 3/2011, Vol. XX. (LII.): 60-65 In the previous Military Review we introduced the article "Will Military Deception Pass Away?" by the same author. In the Army of the Czech Republic we have no manual dealing with military deception (MILDEC). The only manual concerning MILDEC was abolished without any substitute. But military art can't be further developed without similar documents. Today we take MILDEC as a complex set of provisions misleading enemy's commanders and staff, by means of false information and counterfeit data that deliberately deceive adversary decision-makers and planners. Use of MILDEC during any phase of an operation also helps to mislead adversaries as to the strength, readiness, locations, and intended missions of friendly forces. The MILDEC could contribute to the successful accomplishment of the assigned mission by many ways. |
Peace OperationsMilitary artPlk. gšt. Ing. Jaromír Zůna, MSc.Vojenské rozhledy / Czech Military Review Nr. 2/2007, Vol. XVI. (XLVIII.): 41-50 The end of the Cold War was the most important factor determinating political and security realities in the world. Consequent development has gradually led to the significant reengagement of the former Warsaw Pact member states and other military alliances, especially into all form of peace operations. The Czech Republic is following the path common for the other countries in Euroatlantic region, being motivated by common struggle for enlargement this area of stability, security, democracy and peaceful resolution of crises. Hand in hand, with growing experiences from peace operations, the Czech Republic reflects specificities of national security and military strategies, as well as the level of declared military ambitions. Principal changes the Czech forces undergoing now are aiming at fulfilment basic principles of the Security Strategy of the Czech Republic. Participation of the Czech Republic in peace operations and operations outside the republic is becoming the most predominant form of deployment of our armed forces. Therefore, peace operations studies are more pressing today than ever before in the past. |
New Phenomena in Armed Forces Activities: Deployment of PMC and PSC in Armed Missions (Private Military Company, Private Security CompanyNonreviewed - OtherDr. Jindřich Nový, Ph.D., Bc. Pavlína ZapletalováVojenské rozhledy / Czech Military Review Nr. ZC/2007, Vol. XVI. (XLVIII.): 139-144 Even though they are not discussed in public, private military and security companies play more and more important role in the world. They have shape and image of modern corporative companies; they are highly structuralized, well supported. They do not resemble the old band of soldiers of fortune. They offer broad spectrum services and utilities, ranging from fight to computer-supported analyses ...167 |
Operation Artemis (A Reference Model for the Development of Battle Groups)Informational pagesPplk. Ing. Jaroslav KulíšekVojenské rozhledy / Czech Military Review Nr. 2/2007, Vol. XVI. (XLVIII.): 95-105 EU Battle Group CZE/SVK was formed as the part of a long-term strategy to turn the Czech Army from static defence, garrison force, to mobile, expeditionary formations capable to participate in EU common security and defence policy operations. In June 2003, the first EU autonomous military crisis management operation Artermis was launched. It successfully demonstrated EU ability to operate with quite a small Interim Emergency Multinational Force (IEMF) in a highly hostile environment. The IEMF, dispatched 6,500 km from Brussels, operated under the UNSC mandate, in cooperation with UN forces (MONUC) in the Ituri District, Democratic Republic of the Congo. Operation Artermis demonstrated the need for further development of rapid response capabilities. Subsequently, it has become a reference model for the development of Battle Groups, with rapid response capability. Lessons learned are valuable for Czech army planners being involved in force planning, or building the first EU Battle Group CZE/SVK. All information and sources for this paper were drawn from unclassified sources. |
The Strategy of DisinformationInformational pagesVojenské rozhledy / Czech Military Review Nr. 4/2007, Vol. XVI. (XLVIII.): 143-145 The article is based mostly upon an essay Composants et caractéristiques de la stratégie de désinformation by Gula Csurgai. published in Revue Militaire Suisse, March, April, 2007. Disinformation is the deliberate dissemination of false information. It may include the distribution of forged documents, manuscripts, and photographs, or propagation of malicious rumours and fabricated intelligence. In the context of espionage or military intelligence, it is the deliberate spreading of false information to mislead an enemy as to one's position or course of action. It also includes the distortion of true information in such a way as to render it useless. Disinformation is used for preparing public opinion before military operations are opened, the conflict must be "personalized" (the fight of Good against Evil), arousing emotions, sustaining ignorance and confusion, targeting information flows, omitting pieces of information and pushing redundant information. It is necessary to emphasize the role of used language. This phenomenon is described in the famous novel 1984 by George Orwell. The words are capable to arouse concrete images that consequently influence people's behaviour. Disinformation should not be confused with misinformation, which is not deliberate. |
The First and the Second Russian's Military Campaign in Chechnya: An Attempt to CompareInformational pagesJan JindřichVojenské rozhledy / Czech Military Review Nr. 2/2007, Vol. XVI. (XLVIII.): 106-116 This work consists of analysis of differences in chain of command, tactics, weaponry and equipment used by Russian Army during the first and the second Chechen war. Main theme is searching for the answer to what degree were Russian generals able to learn from their own tragic mistakes, being done in the first war, and what are the main reasons of Russian relative success in the second. In simplification, the key factors are as follows: new joint command, at the beginning delegated to the Ministry of Defence; detailed planning of combat operations; and respect to enemy combat abilities. In addition: increased effectiveness of Russian ground forces, artillery and air force cooperation, massive deployment of new weapon systems such as Precisely Guided Ammunition and ammunition with Thermobaric effect, last but not least rather unusual effort of the Russian Army to minimize human casualties of its own forces. The reasons mentioned above with many others lead us to the conclusion that Russia is bound for a military victory in Chechnya, nevertheless a long journey remains to be covered. |
Effects of Climate Change Threatens SecurityInformational pagesVojenské rozhledy / Czech Military Review Nr. 4/2007, Vol. XVI. (XLVIII.): 151 Climate change, national security and energy dependence are a related set of global challenges. They together will add to tensions even in stable regions of the world. Anticipated climate change poses a serious threat to security. It will act as a threat multiplier for instability in some of the most volatile regions of the world, Africa Asia, some of the Middle East regions. The potential consequences of climate change are so significant that the prudent course of action is to begin now to assess how these changes may potentially affect our national security, and what courses of action, if any, our nation should take. Armed forces must should limit emissions to prevent the greenhouse effect, global warming. They also must be prepared to be sent do regions disorganized by mass migration, brought about by humanitarian catastrophes tied with calamity, caused by climate change. The case was predicted by analyses drived by projection of "worst case" scenarios, something the military must train. "Threat Multiplier: Military panel deems climate-change effects as a growing national security challenge" by Frank Morning, Jr., Aviation Week & Space Technology, No. 16/2007. |
Lessons from the War of Israel with HezbollahMilitary artIng. Josef NastoupilVojenské rozhledy / Czech Military Review Nr. 1/2007, Vol. XVI. (XLVIII.): 59-64 Israeli Defence Forces currently evaluates information collected during recent fighting in Lebanon. Although the war was assessed as successful, there are some deficiencies that are to be improved. (a) Aviation and air defence systems. Israel is prepared against ballistic missiles, it was not prepared against short distance ones. Attack helicopters AH-64 were for the first time deployed for tactical (close) combat support of ground forces. One of them crashed down, other two collided in the air; (b) Armour. Also Israel's Merkava Mk4 was used for the first time in combat. More than 50 of the 350 Merkava Mk2, 3 and 4 tanks used in the military operations in Lebanon were damaged by Hezbollah, resulting in the death of 23 crewmen. During the last year the IDF was constantly engaged in high-intensity urban counterterrorist warfare. The regular forces, including tank crews, were retrained for small unit infantry policing activities. As a result, among others, several tanks lost tracks due to driver's inexperience. The article widely drew from several reputable magazines and reviews: Aviation Week, No. 12/2006, Jane's Defence Weekly, No. 41/2006, Defense News, No. 38, 39/2006. |
The Post-Conflict Stabilization: Iraqi ExampleBook reviewVojenské rozhledy / Czech Military Review Nr. 4/2007, Vol. XVI. (XLVIII.): 193-196 The reviewed book analyses the local wars of the last decades and demonstrates that the problem number one is not their military solutions, but consequent peace arrangement. It is not only a case of Iraq, the authors mention the role of France/US in Vietnam, Russian activities in Chechnya and Afghanistan, Israel in Lebanon, Allied forces in Kosovo. For that reason we can welcome this publication, written and published by the team of authors from the Institute for Strategic Studies, University of Defence, Brno. The book summarizes the experiences from conflicts above, namely the lessons from Iraq. The end of armed conflict in 2003 meant simply the transition to another conflict. A very serious and open problem is the question, whether the system of democracy is suitable for Muslim world. The situation in this country could be openly labelled as a civil war. The authors predict even the desintegration of Iraq into three independent countries. Iraqi conflict is an example of asymmetric warfare, in which more soldiers died in time of "peace" (to this date 3,600 soldiers) than during military operations (139 American soldiers). |
Theory of SurpriseMilitary artIng. Josef NastoupilVojenské rozhledy / Czech Military Review Nr. 1/2007, Vol. XVI. (XLVIII.): 65-70 This article contains main ideas from the essay by James J. Wirtz published in anthology Paradoxes of Strategic Intelligence, Frank Cass 2003. This theory is a unifying explanation of why states, for example, attempt to surprise their opponents with diplomatic or military initiatives. Surprise often is described as a force multiplier; something that increases the effectiveness of one's forces in combat. The prospect of surprise can prompt political leaders of the weaker side to believe that they can nullify that disparity and achieve their objectives. In other words, if strong parties began to view conflict from the weaker party's perspective, while weak actors kept war's dialectic in mind, then surprise would become less likely. The theory of surprise can identify when it is likely to occur, who is likely to find the element of surprise attractive as a basis of policy or strategy, and who is likely to be its victim. The trick now lies in making operational use of the theory of surprise. |
Jan Eichler: International Security in the Era of Globalization. (Informative review)Book reviewVojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 191-195 This is another publication by Mr. Jan Eichler. It consits of three parts: the fi rst one defines nearly three dozens of basic terms in the field of security, the second one deals with wars in the 90?s, and finally third part concentrates on terrorism. The book has evidently pedagogical bias, with explanatory character. Under the influence of foremost sociologist Ulrich Beck, Jan Eichler interprets risks as ?social phenomena? derived from threats. The author also evaluates wars in Africa, Asia and Latin America, in Serbia or the Persian Gulf, which took place in 1990-2001. There were 120 armed confl icts, with 94 % victims from among civil population (compared with 50 % of WWII and 15 % WWI). In those wars bellingerent parties deployed weapons of all sorts, with the exception of WMD. As far as international terrorism is concerned, the author sees as its primary characterists the absence of warning before terrorist attacks are accomplished. |
Afghanistan: True RealityInformational pagesPodpraporčík Jan SmetanaVojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 100-107 The deteriorating situation in the Afghanistan region poses a security threat not just to the United States, but to every single nation. It was from that remote area of the world that Al Qai'da plotted 9/11 and subsequent attacks in Europe and elsewhere. Reading news about Afghanistan today gives rise to the question why the situation in this country is such as now really is. Ordinary mass media depict the country often in a confusing manner: Afghanistan as "a country, full of terrorists and uneducated barbarians, longing to destroy western civilization and kill". The author describes bad security situation which presents problem for both coalition soldiers and local Afghanistan population. At the same time we must realize that involved soldiers are exposed every day to asymmetric enemy forces, they stand face to face to mortar danger that could be hidden in for example in every car passing by. |
The Animals and TerrorismInformational pagesIng. Hana VlachováVojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 155-163 Animals have been used for military purposes from the ancient world to nowadays. Horses, elephants, mules and camels were carrying supplies and took part in battles. Dogs were trained for securing livestock and military camps. Soviet army used them as live mines during World War II. The U.S. Army explored the possibility of using bats as live incendive devices. Even the terrorists could use animals for destroying chosen targets in the same way armies used to do. The deployment of animals would be advantageous for any terrorist group because security forces would not expect this kind of attack. Up to now, there have been just a few cases of abusing animals by terrorists, e.g. for bomb laden mules or dogs carcasses which hide explosive devices. But animals could also help with the fight against terrorism, for example dogs or bluegill fish. |
Alliance's New Strategic Concept (Discussion Continues)ReviewedPhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 3-15 The NATO's New Strategic Concept is only starting point to open discussion on a wide range of security problems. At the beginning there is a description of Czech home politics, attitudes of Czech political parties toward NATO alliance. The author explores the history of NATO's identity crisis. In recent years, different security optics of the members splintered NATO. The US wants an expeditionary alliance with a global reach, the Western Europeans hold to a vision of a regional club of liberal democracies, the Central Europeans have a wish so that Washington would stand by them when they will find themselves pressured by Russia. NATO is divided on how to reform its decision-making processes and how to fund and resource its home and away missions. In Afghanistan, the Alliance faces the most difficult operational challenge to date, with a real possibility of strategic failure. The overarching problem is how to define the core business of NATO: cyber defence, energy security, WMD proliferation, stability and reconstruction missions, out-of-area missions, territorial security, enlargement, partnership-building. The discussion over the New Strategic Concept needs to reorder the question how to define NATO's appropriate roles and go from there. |
Obama's First Year in the White HouseReviewedPhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 3-23 President Barack Obama came to power at a difficult time in America's history. Home and foreign policies are hard to manage, among others, as we are on the threshold of post-ethnic society, and in the war with terrorisms. Obama does not give up American leadership, but he is seeking to find the balance between security and liberty, between power and freedom in the world, broadly speaking. As the consequence, Mr. Rašek presumes emerging the new global security situation: the rise of multipolar world, divided into several new political spheres. This author's opinion is backed by comments by reputable world's political analysts. As far as Euro-Atlantic relations are concerned, or relations with Russia, there are excellent prospects, namely there is the progress with Russia on arms control-part of Obama's determination to put the world on a path toward nuclear disarmament. The author ascribes the drop in Obama's popularity to failed healthcare reform; outside the US, to the fact that Obama is not able to define clear goals and missions in Afghanistan. |
Critical Looks at Hybrid Wars ConceptMilitary artIng. Pavel Zůna, MSSVojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 33-45 The term "hybrid war" is frequently used today within the military community, but the term does not bring something new in the view of the terminology of the stability operations, comprehensive approach or compound wars. This concept is based on the destructive threats to the military components of international community. It does not help in delimiting reasons of violent confl ict and from that point it is harmful, as it does not explain soldiers why they are fi ghting the "just war", why they should sacrifi ce their lives in confl icts far away from their homeland. We should not use terms of hybrid wars, hybrid confl icts, hybrid enemies or forces. Only "hybrid warfare" could find some legitimacy, but only when used with the correct definition of the conflict typology, backed by the political objectives of the war. Confl icts typology, as used, forms the framework for the mission analysis orientation at all command & control levels and it guides the informational support to the military decision making processes. |
The Preparation of NATO's New Strategic ConceptNonreviewedJUDr. Miroslav TůmaVojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 24-28 The article deals with the Declaration on Alliance Security issued in Strasbourg on 4 April 2009. The author enumerates its main items: reform of NATO structures, improving ability to meet the security challenges, strengthening cooperation with other international actors. Today we are facing global threats, such as terrorism, the proliferation of weapons of mass destruction; our security is increasingly tied to that of other regions. Deterrence, based on an appropriate mix of nuclear and conventional capabilities, remains a core element of Alliance overall strategy. NATO will continue to play its part in reinforcing arms control and promoting nuclear and conventional disarmament in accordance with the Nuclear Non-Proliferation Treaty, as well as non-proliferation efforts. The author is a strong supporter of Obama's idea of world without nuclear weapons; he hopes that this notion will be also reflected in preparing NATO strategic concept. They are also further points to be stressed, e.g., a cooperative partnership between NATO and Russia. |
Employing CALS in Acquisition Process of the ACRMilitary professionalIng. Petra ButorováVojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 141-148 Computer-Aided Logistic Support (CALS) appeared for the first time in 1984 in a common study of US government and American defence industry. The study recommended using technical data in digital form. Further it was changed into Computer-Aided Acquisition and Logistic Support and in 1994 the acronym CALS was changed into Continuous Acquisition and Life-Cycle Support. At present we interpret CALS as the support to all automatized processes with fully digitalized data processing. Among its important tools belong LCC (Life-Cycle Costs) and risk management. It is a vast standardization strategy, covering the whole life cycle, via acquisition process, its support, innovation and product disposal. CALS is supposed to make acquisition procedures in the ACR more effective. |
NATO's Strategic Concept: An Important Step Towards Military and Political Qualification of AllianceReviewedKpt. Mgr. Karel Zetocha, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 3-14 The main Alliance mission is to "safeguard the freedom and security of its member countries" and to "deter and defend against any threat of aggression against any of them". Those general tasks are tailored today to changed international security surroundings. In May this year, a report by the experts group was released, forming the basis for further negotiations over the new strategical concept of NATO. The experts produced a document of first-rate quality identifying main tasks NATO is facing today. At the same time this document redefines prospective directions the Alliance should follow in the years to come. Without a broad popular support NATO's engagements namely off European territory couldn't be vindicated and justified. The same is true as far allocation of sources for NATO missions and developing military capabilities are concerned. So, the communication with public thus becomes a further dimension of this highest strategic document. |
Criminalization and Religious Radicalization in Chechnya as Two Main Streams of Development after 1996 and their Influence on Terrorism in Subsequent ConflictInformational pagesBc. Martin JankůVojenské rozhledy / Czech Military Review Nr. 1/2010, Vol. XIX. (LI.): 123-137 The article deals with the disintegration and erosion of originally cohesive Chechen resistance movement during the First Chechen War and following inter-war period. According to the author, the main reasons of this process are criminality and religious fundamental radicalisation. They together produced inner confl icts between fi eld commanders; some of them attacked Russian security forces in neighbouring regions (Dagestan, Ingushetia), even after war had ended. Disintegration processes were encouraged by social deprivation after the first war, by strategical position of Chechnya in relation to smuggling drugs and weapons, stealing rude oil, and fi nally activities of foreign Islamic solidarity fi ghters. All those factors signifi cantly contributed to the outbreak of the Second Chechnya War. |
Clarifying the Notion of Direct Participation in Hostilities (The Protection of Civilians)Military lawRNDr. Marek Jukl, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 168-180 International humanitarian law hinges on the principle of the distinction between combatants, whose function is to conduct hostilities during armed confl ict, and civilians, who are presumed not to be directly participating in the hostilities and, therefore, entitled to full protection from attack. They lose this protection only if, and for as long as they "directly participate in hostilities". After several years of expert discussions and research, the International Committee of the Red Cross (ICRC) has published the Interpretive Guidance, which aims to clarify the meaning and consequences of direct participation in hostilities under international humanitarian law (IHL). This article is devoted to the explanation of this notion. The presented interpretation follows the Interpretative Guidance published this year. |

