Fulltext search in archive
Results 1 to 30 of 771:
Threats and Hazards of Grey Rhino ParadigmReviewed - ResearchOlga Burianová, Jiří F. UrbánekVojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 85-96 | DOI: 10.3849/2336-2995.33.2024.02.085-096 Grey Rhino is a metaphor for security threat, which is unkept irrational for large extent also high probability of harmful effect on a subject of risk owner. Business continuity management system is assessed in a diagram as controlling instrument aimed at operational hazard mitigation of continuity disturbance of affected subject. A ´from Operations´ Value Added - O´VA is established as qualitative dynamic information about productivity of activities. The measures are designed in crisis scenario for quality improvement of subject´s crisis readiness. An indicator of business risk continuity slip is defined. In a connection with war conflict on Ukraine is assessed if it is Grey Rhino manifestation. |
Recent Objectives of Cyber Defence in the Department of DefenceReviewed - ReviewMiroslav Feix, Salibor ProcházkaVojenské rozhledy / Czech Military Review Nr. 3/2017, Vol. XXVI. (LVIII.): 31-50 | DOI: 10.3849/2336-2995.26.2017.03.031-050 The paper deals with cyber security, cyber defence and operations in cyber space focusing on the department of defence. Tasks implied from the Czech Republic's, NATO's and European Union strategic documents and roles of participating subjects have been analysed. Four scenarios as another source of identified tasks were created and used to describe possible situations requiring cyber defence capabilities. The presented analysis is a prerequisite for specifying required capabilities, and a proposal how to assign roles, responsibilities and required capabilities. |
Scenarios, Development, Internal Structure Scenarios and Security ThreatsReviewed - ReviewJosef MelicharVojenské rozhledy / Czech Military Review Nr. 2/2017, Vol. XXVI. (LVIII.): 18-32 | DOI: 10.3849/2336-2995.26.2017.02.018-032 The article deals with the topic of scenarios in relation to their significance, internal structure development and the way of elaborating scenarios following links to security threats and mission types. Article describes possible way of structuring set of scenarios reflecting security threats stated in The Security strategy of the Czech Republic and corresponding mission types. Main methodology exploited during the work with the topic of scenarios was document analysis, which resulted in finding, that scenarios don't enjoy appropriate attention in the defence resort of the Czech Republic, scenarios are not elaborated and thus not exploited. The article deals in the conclusion with propositions aiming at elaborating scenarios with purposefull internal structure, elaborating security threats and reflecting mission types. |
Reviewed - Research |
Securing the Required Cyber Defence CapabilitiesReviewed - ReviewMiroslav Feix, Dalibor ProcházkaVojenské rozhledy / Czech Military Review Nr. 4/2017, Vol. XXVI. (LVIII.): 35-53 | DOI: 10.3849/2336-2995.26.2017.04.035-054 The paper deals with cyber security, cyber defence and operations in cyber space. It follows earlier performed analysis of cyber defence tasks and proposes distribution of competencies among key players. The required capabilities are derived from tasks determined by legislation, NATO and EU commitments and earlier developed strategic and operational scenarios. Comparing required capabilities and an actual state, a solution harmonizing defence in cyber space with defence of the Czech Republic and ensuring the cyber space defence and integration cyber capabilities into common operations conducting is proposed. |
Czech Defense Policy in the Light of Strategic CultureReviewed - ResearchVladimír Karaffa, Cyril SvobodaVojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 3-23 | DOI: 10.3849/2336-2995.34.2025.01.003-023 The article analyzes key aspects of the development of the Czech Republic‘s defense policy since 1989, with a focus on the role of strategic culture. It examines historical, political, and social factors that have shaped the Czech Republic‘s approach to defense and security issues. Special attention is given to the transformation of the Czech Armed Forces, the transition to a professional military model, and responses to changing geopolitical threats. The analysis also considers public perceptions of the military, the influence of historical narratives on strategic culture, and the attitudes of political elites toward defense matters. The article highlights the importance of strategic culture as an analytical framework for understanding long-term trends and the evolution of defense policy, while suggesting potential avenues for future research in the Czech context. |
Security, Threats, and Risk in the 21st CenturyNonreviewed - OtherVojenské rozhledy / Czech Military Review Nr. 3/2014, Vol. XXIII. (LV.): 146-148 After the year 1989 many presumed that "the end of history" came about, after the end of cold war no international security risks would arise. Nowadays we see that everything is different. Risks and threats are an inseparable component of humane existence. A working state must be prepared for those risks, which covers even the field of training citizens. The reviewed publication will certainly contribute to better understanding the complexity of present-day world and its security. The book has two independent parts; the first one is politological by Peter Rožňák, the second part deals with professional arms by Ludvík Juříček. |
Impact of the New Technologies on CBRN Terrorist Threats: General Perspective and Perspective of Republic of CroatiaReviewed - ReviewIvana Cetina, Jugoslav JozićVojenské rozhledy / Czech Military Review Nr. 4/2022, Vol. XXXI. (LXIII.): 119-139 | DOI: 10.3849/2336-2995.31.2022.04.119-139 Although the level of the overall CBRN threat in the world is currently considered to be low, there is a trend of a growing concern about CBRN terrorism. Various terrorist groups have shown interest in using CBRN materials to disrupt the global order and economy. The motivation and factors that influence the potential use of CBRN agents in terrorist attacks arise from the fact that CBRN agents have potentially high mortality and can cause serious consequences. A large number of potential dual-use (military and civilian) items as well as the introduction of new technologies in use can be utilized for the CBRN attacks and create a wide range of new possible terrorist (and military) threats. This paper provides a general overview of the past and current situations regarding CBRN terrorism, analyses some of current widely known new technologies that can be utilized for CBRN terrorist attacks and analyses the biggest potential threats from CBRN hazards. |
Security Preconditions and Threats (Economy, Religious and Cybernetic Menaces)PhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 2/2011, Vol. XX. (LII.): 38-52 One of main task while preparing new security documents is to identify, analyze and evaluate newly emerging, self-generating security threats. They menace cybernetic, economy, bank, and religious security. The special menace, as for inner security it is lobbyism. Cybernetic threat is today regarded as more dangerous than nuclear strike. The American lived through those experiences in Iraq. Another example is cyber attacks on Estonia in 2007 that swamped websites of Estonian organizations, including Estonian parliament, banks, ministries, newspapers and broadcasters.The attacks triggered a number of military organisations around the world (including NATO) to reconsider the importance of network security to modern military doctrine. There is a paradigm: the more modern country, the more risks are opened. The situation is complicated by the fact that in sophisticated society there is hard to identify attacking enemy. The author underlines that we are the last member nation in the EU that has no official CSIRT (Computer Security Incident Response Team) to react cyber /terrorist attracts. |
Analysis and model of Cyber security corps professional developmentReviewed - ReviewPetr Františ, Jan HodickýVojenské rozhledy / Czech Military Review Nr. 3/2019, Vol. XXVIII. (LX.): 97-116 | DOI: 10.3849/2336-2995.28.2019.03.097-116 The paper deals with the professional development of cyber security corps. In the introduction the individual elements that are active in cyber security are described. Strategic analysis of the education is carried out to define the initial state. The main part of the paper is devoted to the design of the education system. The individual elements are defined in the paper, and the model of relationships between these elements is shaped. The attachment contains complete set of topics and their classification into the strands to fulfil the profile of the cyber security expert. |
Are There Real Global Catastrophic Biological Risks?ReviewedAleš Macela, Vanda BoštíkováVojenské rozhledy / Czech Military Review Nr. 1/2025, Vol. XXXIV. (LXVI.): 55-69 | DOI: 10.3849/2336-2995.34.2025.01.055-069
|
Reviewed - Research |
WikiLeaks Case and Its Reflections in World's Security CommunityInformational pagesPhDr. Antonín RAŠEKVojenské rozhledy / Czech Military Review Nr. 4/2011, Vol. XX. (LII.): 129-137 Czech dailies and weeklies publicised their analyses of the diplomatic dispatches released by WikiLeaks. Some were concerned in world's politics, but higher attention was paid to 1,271 dispatches from Prague. According to the dispatches, the U.S. Navy wanted to purchase 23 Russian anti-ship missiles to obtain the weapons from Belarus through Ukraine, with a Czech arms dealer. However, the Czech government decided to derail the plan by not granting the Czech middleman the needed permission to export weapons from a dictatorship like Belarus. Various cables also detailed a dispute in the area of arms technology. Some observations from the dispatches dealing with characteristics of Czech prominent politicians are amusing. Overall, the United States evaluated the CzechRepublic positively, as an economically mature country and as an ally. |
Internal Conflicts in Works of Thucydides and MachiavelliReviewed - ReviewJakub ŠedoVojenské rozhledy / Czech Military Review Nr. 1/2020, Vol. XXIX. (LXI.): 85-101 | DOI: 10.3849/2336-2995.29.2020.01.085-101 Hybrid threats are considered among the most serious risks that Western societies currently face. The aim of actors using such threats is to influence decision-making processes, and in order to do so they use a rich spectrum of methods to instigate conflict in society, seeking to undermine trust in institutions, abet radicalisation, and so on. Activities aimed at creating internal conflict, and the prevention of such activities, are not, of course, a new phenomenon; they differ only in their extent, intensity and the techniques used. The aim of this paper is to investigate how classic strategists - Thucydides and Machiavelli - described in their works how internal conflict is fomented among the enemy and how it can be prevented. The paper describes and analyses various ways of instigating and mitigating internal conflict as noted in their works, and assesses their relevance for the current debate. |
Jihadist Foreign Terrorist Fighters: Contemporary Threats and Challenges in East Central EuropeReviewed - ReviewMiroslav MarešVojenské rozhledy / Czech Military Review Nr. 3/2019, Vol. XXVIII. (LX.): 3-15 | DOI: 10.3849/2336-2995.28.2019.03.003-015 This paper deals with the phenomenon of Jihadist foreign terrorist fighters from the perspective of East Central European countries. Over the past decade, the term 'foreign terrorist fighter' has become established in scholarly literature, international law and the popular consciousness. Today, Jihadist foreign terrorist fighters are closely watched globally for the security threat they pose. Although the greatest danger in Europe is seen to be to nations in the west, several cases in East Central Europe - involving terrorists travelling through the region and attempting to radicalise local jihadists - have led Poland, Hungary, Slovakia and the Czech Republic to adopt important legislation to eliminate this threat. |
Contemporary Terrorism Manifestations (Simple Causal Model Analysis)Nonreviewed - OtherTomáš NovotnýVojenské rozhledy / Czech Military Review Nr. 4/2019, Vol. XXVIII. (LX.): 94-105 The editorial board of Vojenské rozhledy Journal presents an article by General Staff Colonel (plk. gšt.) Tomáš Novotný, currently the Chief of the Department of Strategic Planning (J-5) of the General Staff of the Armed Forces of the Slovak Republic. This article was published in HORYZONTY BEZPIECZEŃSTWA Nr 8 (3) 2017 and it is available online at http://www.prawo.uni.opole.pl/horyzonty_bezp/Nr_8(3)_2017.pdf. The article is very closely linked to the subject of the contribution published in Vojenské rozhledy 3/2019, entitled "Religious Extremism as a Cause of Armed Conflicts: Indicators and Early Warning Systems", and in a certain way it defines its theoretical foundations. |
The Future of Military Cooperation in Central EuropeNonreviewed - OtherGunther HauserVojenské rozhledy / Czech Military Review Nr. MC/2017, Vol. XXVI. (LVIII.): 93-100 comprehensive cooperation within reliable security partnerships. Thus, regional tailored military cooperation has gained more importance than ever before in order to tackle various threats and challenges and to strengthen crisis management capabilities. Therefore, Austria launched the Central European Defence Cooperation (CEDC) in 2010 to foster regional security cooperation and to promote modernisation of military resources. Two years later, Austria co-founded the EU Mountain Training Initiative, which closely coordinates training and education with the NATO Mountain Warfare Centre of Excellence in Slovenia. This paper aims at analysing and discussing current initiatives and possible ways of improving Central European security cooperation between NATO member states and Austria. |
Integrating Emerging Technologies in Military Maintenance and Repairs: An Overview of Current Status, Opportunities and ChallengesReviewed - ReviewMilan Vábek, Ondřej Novosad, Miroslav Pecina, Jan KotisaVojenské rozhledy / Czech Military Review Nr. 3/2024, Vol. XXXIII. (LXV.): 62-75 | DOI: 10.3849/2336-2995.33.2024.03.062-075 Maintenance and repair (M&R) of military equipment are crucial for operational readiness. The article highlights challenges faced by military forces, particularly in the US, with significant equipment non-operable due to inefficient M&R. It emphasizes modernizing M&R through Predictive Maintenance (PM) and 3D Printing (AM). PM employs AI and data analytics for real-time monitoring and foreseeing malfunctions, signifying a strategic shift in M&R. AM significantly curtails downtime by enabling on-demand spare parts production, presenting a solution to traditional military M&R challenges. The article also underscores the economic advantages and potential for operational efficiency improvements through these technologies. However, it points out hurdles in implementing PM and AM, including high initial costs, lack of trained personnel, and the threat of counterfeit production in AM. |
Active Measures Concept Deconstruction Through the Lenses of Information InfluenceReviewed - ResearchMiroslava PačkováVojenské rozhledy / Czech Military Review Nr. 1/2024, Vol. XXXIII. (LXV.): 40-62 | DOI: 10.3849/2336-2995.33.2024.01.040-062 This study deconstructs the concept of active measures through the prism of information influence. It understands it as sophisticated methods of influencing public opinion and political decisions, originally used by the Soviet Union and now adapted to cyberspace by the Russian Federation. In the analysis, the concept is contrasted with the general abstraction of information influence. This helps to better understand the proximity of active measures to similar concepts. We conclude that abstractions of information influence are also valid for conceptual understanding and practical examples of contemporary Russian active measures. Active measures are subsidiary to information influence, serving as tactical means to achieve the latter's strategic goals. Furthermore, the author states that the information environment is the operational theatre for active operations, cyber operations can be its manifestation, information operations support as a key component of a broader information operations strategy, and psychological operations are its critical element. |
Situation Analysis of the Security Education and Training System in the Republic of BulgariaReviewed - ResearchStoyko Stoykov, Elitsa PetrovaVojenské rozhledy / Czech Military Review Nr. 2/2023, Vol. XXXII. (LXIV.): 67-82 | DOI: 10.3849/2336-2995.32.2023.02.067-082 The purpose of the article is to present a situational analysis of the education and training system in the field of security in the Republic of Bulgaria in 2021, in which internal and external threats, strengths and weaknesses, problem areas and possible solutions will be highlighted. The subject of the article is the education and training system, as the specific subject is the education and training system in the field of security in the Republic of Bulgaria. |
Hybridni hrozby - vcera, dnes a zitra - pohled z PrahyNonreviewed - OtherVojenské rozhledy / Czech Military Review Nr. 4/2018, Vol. XXVII. (LIX.): 161-166 |
Czech Defence Policy Assessment in 2017/2018Reviewed - ReviewLukáš Dyčka, Josef ProcházkaVojenské rozhledy / Czech Military Review Nr. 4/2018, Vol. XXVII. (LIX.): 3-19 | DOI: 10.3849/2336-2995.27.2018.04.003-019 The research described in this paper was conducted in the framework of institutional research project Strategic Alternatives (STRATAL) within the Centre for Security and Military Strategic Studies of University of Defence, The Czech Republic. Article assesses the development of Czech Defence policy in 2017 and first half of 2018. Authors analyse key change drivers in external environment (security threats, EU strategic autonomy, transatlantic link). In second step authors evaluate measures taken in political, military, administrative, economical and societal domain in response to key change drivers and highlight related risks to effective defence policy formulation and implementation. |
From Plan Gideon to Plan Tnufa: Israeli defense strategy and the buildup of the Israeli Defense Forces in the wider context of the Middle East after the Arab SpringReviewed - ResearchĽubomír Zvada, Jiří LachVojenské rozhledy / Czech Military Review Nr. 4/2023, Vol. XXXII. (LXIV.): 24-44 | DOI: 10.3849/2336-2995.32.2023.04.024-044 Based on the content analysis method, this study analyzes the first ever published security strategy of the Israel Defense Forces, which was published in 2015. The main objective of the paper is not only to present the circumstances of its creation and discuss the main objectives of this strategic security document, but also to outline the broader geopolitical context from which it emerged. The authors argue that the document primarily emphasized two areas - the use of force and capacity building of the Israeli military. Among other things, the publication of the strategy was intended to have a deterrent effect. In the conclusion, the authors compare the Gideon Plan and its follow-up, the Tnufa Plan, and point to the considerable importance that consensus among political and military elites has in the implementation of such a document and reflect on what lessons and inspiration can be drawn from this case in our geographic space in the process of formulating or reformulating strategic security documents. |
Issues of Resilience to Cyber-Enabled Psychological and Information OperationsReviewed - ReviewPetra MlejnkováVojenské rozhledy / Czech Military Review Nr. 1/2022, Vol. XXXI. (LXIII.): 38-50 | DOI: 10.3849/2336-2995.31.2022.01.038-050 This article discusses the transformation of the information environment, which allows an adversary to exploit cyber-enabled psychological and information operations. It presents the options currently available to an adversary to exploit the vulnerability of the information environment, chiefly the cognitive vulnerabilities of target groups. Thus, hostile interests are often pursued through manipulation, using disinformation, propaganda, algorithms and artificial intelligence. In the light of these developments, the article defines a society-centric approach, in which societal and human resilience are emphasised. |
Present Trends, Emergencies and Their Impact on Supply Chain SecurityReviewed - ResearchDušan Repík, Natálie Hanáková, Jan Kotisa, Pavel FoltinVojenské rozhledy / Czech Military Review Nr. 3/2023, Vol. XXXII. (LXIV.): 63-81 | DOI: 10.3849/2336-2995.32.2023.03.063-081 The article examines the impact of recent geopolitical, economic, and security changes on logistics support capabilities in EU and NATO member states. The study analyzes the effects of the COVID-19 pandemic and the armed conflict in Ukraine on logistics supply chains, considering environmental, social, and security concerns. The research questions focus on identifying the main changes and assessing their implications for commercial, military, and humanitarian logistics. The prolongation of the conflict in Ukraine and the economic sanctions imposed on Russia have been found to have a significant impact on logistics capabilities, perceptions of the structure of supply chains and the risks arising from this. The impact of these events is also producing third-country poverty and dehumanizing the UN SDG goals. On the other hand, improvements in NATO troop readiness and weaponry have been noted. The study highlights the need for further research to investigate specific threats for different types of supply chains and to consider the complex and evolving nature of the issue. Ultimately, this research provides insights into the challenges and opportunities facing logistics capabilities in the context of ongoing geopolitical and environmental changes. |
Arson Attacks in Israel - History and Options for the Elimination of Inincendiary BalloonsReviewed - ReviewAlena Slavíková, Martin Křepský, František Racek, Antonín NovotnýVojenské rozhledy / Czech Military Review Nr. 2/2024, Vol. XXXIII. (LXV.): 130-146 | DOI: 10.3849/2336-2995.33.2024.02.130-146 The article concerns the issue of arson attacks in Israel.The issue of terrorism in Israel is quite broad, given that it is a very common phenomenon here and Israel deals with terrorism on a daily basis. The paper therefore focuses on incendiary balloons, a weapon that repeatedly caused fires around the Gaza Strip between 2018-2023. It examines their history, their design, outlines the possibilities of their elimination, the advantages and disadvantages of possible technical solutions, and a reflection on the future of their usage. |
Current Approaches of the Czech Republic, the EU and NATO to Hybrid ThreatsReviewed - ResearchMartin HavlíkVojenské rozhledy / Czech Military Review Nr. 2/2022, Vol. XXXI. (LXIII.): 3-16 | DOI: 10.3849/2336-2995.31.2022.02.003-016 The article discusses the current approach of the Czech Republic to the phenomenon of hybrid threats and analyses the fundamental shortcomings that determine the effective management of these threats. As part of a comprehensive approach, the text is supplemented by the current view of the European Union and NATO on addressing the issue of hybrid action by hostile actors. A summary comparison of the approaches of the Czech Republic, the European Union and NATO points to the need for mutual institutional synergy among these entities. Although the current approaches of the mentioned subjects are relatively sufficiently doctrinally anchored, the absence of a complex and especially practically functioning apparatus and specific operational tools that would be able to face a wide range of hybrid threats persists. |
Reviewed - Research |
Reviewed |
Information Operations on the Background of Contemporary Armed ConflictsReviewed - ReviewMjr. Ing. Tomáš NovákVojenské rozhledy / Czech Military Review Nr. 4/2014, Vol. XXIII. (LV.): 51-62 | DOI: 10.3849/2336-2995.23.2014.04.051-062 The article presents the theory of information operations on the background of contemporary armed conflicts in Ukraine, Iraq and Syria. In the introduction, information is presented as a phenomenon and the accelerator of social development. It outlines basic information channels that deliver security information to their recipients. Furthermore, the article discusses security and operational environment and also vulnerabilities being caused by increasing dependence on information. The core of the article are information operations presented in theory with the author's commentary on real application in military practice and in terms of the Czech Armed Forces. As part of information operations are subsequently introduced psychological operations, computer network operations and electronic warfare. The article ends with real examples of information and psychological operations in modern warfare, and conditions of their management in the Czech Armed Forces. The conclusion summarizes the general idea of the security environment and information operations, and stresses the importance of information operations in current and future conflicts. |

