Fulltext search in archive
Results 241 to 270 of 1314:
Strong and Week Features of "Responsible Ownership of Technology" ConceptMilitary professionalIng. Marie PoláchováVojenské rozhledy / Czech Military Review Nr. 4/2011, Vol. XX. (LII.): 138-144 There is an urgent need to recognize changed priorities and evolve new approaches to non-proliferation and disarmament objectives for a sharper focus on the real and present dangers to international peace and stability. The focus must now shift to more effective monitoring and verification of compliance at various levels. The proposed ROOT system (Responsible Ownership of Technology) might be one of such means to meet above mentioned challenges that could eliminate present-day dangers and contribute to international peace and stability. It is the technology for security in the 21st century. |
Partnership for Learning Program: Online Drill with Native Speaker As a Supplement to Full-time Study of English at the Defence UniversityLanguage preparationPhDr. Ivana Čechová Ph.D., Mgr. Radek Nedoma, RNDr. Oldřich Kříž, Jiří MrenkaVojenské rozhledy / Czech Military Review Nr. 1/2011, Vol. XX. (LII.): 128-136 Making use of multimedia, ICT, in a foreign language teachinglearning process is the effective way how to influence motivation and results of the educational process. Based upon the Czech-Canadian Partnership for Learning Program, the project provides synchronous communication between a native speaker and a student during language training, regardless the distance. Mutual communication is an opportunity when the students/learners can use their second language not only in professional discussions, but also in solving problem matters, relevant to their study branch, interests, current events or hobbies. The authors' experience and its analysis form also a part of this paper. |
The Security System of the CR and the Necessity of its Adaptation to Cumulative Effects of ThreatsReviewed - ReviewPhDr. Libor StejskalVojenské rozhledy / Czech Military Review Nr. 4/2011, Vol. XX. (LII.): 37-47 The term of "growing complex of threats" covers higher and higher probability of concatenation of various intercommoned, mutually tied factors reflecting structured technological and informational reality of global society, making their solving by traditional means of security system extremely difficult. "Crisis situation" represents more general problem of natural disasters or technology breakdowns that are influencing one another, that cause great distress or destruction, in an unexpected manner, activating subsequent threats of so far unforeseen threats. For that reason we must adapt Czech security system to new liquid, instant and indivisible complex threats. |
Nine Memories for the Czech Future (Illustrations Instead of Critiques)Book reviewVojenské rozhledy / Czech Military Review Nr. 2/2011, Vol. XX. (LII.): 175-183 The book consists of papers by eleven authors, members and fellow members of the Centre for Social and Economy Strategy, Faculty of Social Sciences, Charles University Prague. At present, we must prepare to face socially unwelcome phenomena. We must arrange preventive projects, so that we could solve prospective crises. The authors therefore pay their attention to methodology of crisis scenarios, or how they are to be prepared. Predicted nine worst-case scenarios anticipate prolonged crises, failure in education policy, rise of extremism, climate changes, energy collapse, lack of international balance, and separation of the Czech Republic from Europe. |
Language Training within the MoD in the Context of the MoD Order 1/2007Language preparationPodplukovník Mgr. Jan ŠmídVojenské rozhledy / Czech Military Review Nr. 3/2011, Vol. XX. (LII.): 162-166 The most frequent word in language preparation is successfulness. This term could be quantified, defined, examined from the point of growth or rating decrease. Our language preparation sticks to Defence Minister Order No 1/2007 (effective from September 2010) on language training. It abolished integrated language courses, teaching units for SLP 1, 2 were decreased. The author examines the situation before and after the publication of the said order and provides possible explanations of the current state, showing slow descent. He supports his explanations with empirical data gathered in foregoing years, through surveys, statistical analyses of test results, in-class observations, and oral feedback from course learners. |
Food Terrorism and AgroterrorismMilitary professionalIng. Hana Vlachová, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 4/2011, Vol. XX. (LII.): 160-168 People commonly imagine terrorist attack as hijacking or improvised explosive device hidden in crowded place. However terrorists can also attack against food, cattle, farm crops or water resources. These kinds of attacks can be ranked among agroterrorism or food terrorism, whereas agroterrorists attack against cattle, farm crops or water resources; food terrorists attack against foodstuffs. This paper is intended to provide information about agroterrorism and food terrorism as possible forms of wilful violence. Food security became discussed issue especially after anthrax incidents in 2001. There are many authorities that deal with these issues, for example EU, NATO or World Health Organization. |
Global Security: System Approach (Barack Obama's First Midterm)PhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 1/2011, Vol. XX. (LII.): 9-37 This extended essay is based upon various sources, among others on May 2010 President Obama's speech at the U.S. Military Academy at West Point, where President Obama described his national security objectives. The highest priorities of U.S. national security are the safety of Americans at home and abroad and achieving a peaceful, stable world through global cooperation despite a flawed international system. The Obama's security strategy relies heavily on diplomacy and engagement, economic development and other methods of influence, along with U.S. military capabilities with global reach and unsurpassed resources. As we face multiple threats, from nations, non-state actors and failed states, America will maintain the military superiority that has secured country, and underpinned global security, for decades. The security strategy is global, and identifies an array of real or potential security challenges that include: countering violent extremism and insurgency; stopping the spread of nuclear weapons and securing nuclear materials, resolving and preventing conflict; and reducing destabilizing risks to economic interdependence. |
Starting Points for the Preparation of Updated Security Strategy of the Czech Republic 2011ReviewedPhDr. Miloš Balabán, Ph.D., PhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 2/2011, Vol. XX. (LII.): 3-19 In our country, existing strategical documents related to security used to be compiled very carefully, but proved to be not very effective, as they did not fit to practical everyday security policy, they did not comply with day-to-day requirements. The only exception was the 1991 doctrine dealing with the creation of Integrated Rescue System and the implementation of professional armed forces. At present, there is a tendency to rewrite those strategy documents again, namely in the field of security. The preparation of a new version of Czech security strategy is taking place in time marked with new trends in world politics and economy. The main attention is attracted by crisis management, arms control, disarmament, WMD non-proliferation, cooperation with non-NATO nations, and international organizations, last but not least counterterrorism and cyberspace security strategy. In short the study mentions Czech political-military ambitions, defence strategy, defence capacity and resources, it appreciates in value knowledge gained by the Centre of Security Policy, Faculty of Social Science, Charles University Prague, and it contains conclusions and recommendations for the preparation the 2011 Czech National Security Strategy. |
Strategic Aspects of Actions Taken to Destroy an InsurgencyMilitary professionalIng. Josef NastoupilVojenské rozhledy / Czech Military Review Nr. 2/2007, Vol. XVI. (XLVIII.): 221-228 Conventional military strategists did not hold counterinsurgency (COIN) and irregular warfare with high esteem. In fact, strategists often marginalized COIN and irregular warfare, never regarding irregular warfare as worthy of strategic-level discussions. But true strategic thinking on the subject of COIN and irregular warfare consider time and space and long strategic view. Now we must consider critical areas for the global war on terrorism (GWOT), including changing nature of the threat environment. Sources: Principles, Imperatives and Paradoxes of Counterinsurgency, by E. Cohen, Lt.Col. C. Crane, Lt.Col. J. Horvath, Lt.Col. J. Nagl; Strategic Aspects of Counterinsurgency by Col. J. B. Celeski in Military Review March-April 2006. |
ISAF Mission: Determinants, Threats, Challenges and RecommendationsMilitary artDoc. PhDr. Jan Eichler, CSc.Vojenské rozhledy / Czech Military Review Nr. 3/2007, Vol. XVI. (XLVIII.): 70-79 This thoroughly elaborated paper deals with the International Security Assistance Force in Afghanistan (ISAF). Similar missions represent NATO's global interests in problems of word's security. Afghanistan is the very place where new warfare methods are tested, new ways of combat come into existence. After September 11, 2001, American administration declared the war to global terrorism - GWOT (Global War on Terror), the first theatre of GWOT became Afghanistan. From military point of view, it was unambiguous success, to a large degree, it succeeded even politically. But Afghanistan was negatively affected by the situation in Iraq. Afghanistan is far off being stabilized. Local warlords, tribal chiefs, called anti-coalition militants (ACMs), avoid regular warfare, they use raids, sabotages, acts of terror, provocations. Coalition units use e.g. PSYOP operations, as a way how to implement norms based deterrence. |
Critical Evaluation of State Defence EconomyNonreviewed - OtherPlk. prof. Ing. Aleš Komár, CSc.Vojenské rozhledy / Czech Military Review Nr. ZC/2007, Vol. XVI. (XLVIII.): 103-106 The defence of country is demanded, but as far as monetary resources are concerned (the effectiveness of which is mostly not transparent), the civilian public takes them as a mistake, as superfluous expenditures. The military economy is an interdisciplinary branch of knowledge, it is a broad subject that can?t be reduced for mere controlling expenses. Still, it is very difficult to assess its recoverability, in comparison with its importance for state defence. |
The Ways of TransformationNonreviewed - OtherIng. Vladimír Karaffa, CSc.Vojenské rozhledy / Czech Military Review Nr. 1/2007, Vol. XVI. (XLVIII.): 3-8 There is a substantional difference between reformation and transformation. The latter represents a qualitative change or the re-creation; while the former is only a change, redressing, correction of errors or faults. In Czech military press, the basic principles of NATO transformation were described several times. Since 2004, when the document "Strategic Vision: The Military Vision" was published, many other documents have been released: Comprehensive Political Guidance (CPG), Guidance for Military Implementation of CPG, Concept for Alliance Future Joint Operations, NATO Task List. Every operational concept has to evaluate all factors from various fields. The method is expressed by the short DOTMLPF, which stands for Doctrine, Organization, Training, Materiel, Leadership and education, Personnel and Facilities. The Concept Development and Experimentation is of multinational character and is the most successful transformation tool within NATO countries, namely in the U.S., Canada, Great Britain, Norway, etc. Lessons Learned system supplies feedback between national forces experiences and concepts, via DOTMLPF. The key role is played by the Joint Analysis and Lessons Learned Centre in Lisbon, Portugal. |
Operational SurroundingMilitary artIng. Antonín Krásný, CSc., plk. gšt. Ing. Oldřich SochaVojenské rozhledy / Czech Military Review Nr. 2/2007, Vol. XVI. (XLVIII.): 51-65 The term "security", originally used for the defence of state/national territory, was surpassed by "global security", ranging from world's security situation to monitoring foreign conflicts with the deployment of pre-emptive actions in places with tides of violence, instability. This article describes mentioned complexity of current and future military operational environment dilemma: generally, armed forces are affected by multifaceted circumstances that have to be taken into account and mustn't be ignored or neglected during the preparation and performance of their mission. At present, threat spectrum is characterized by three key characteristics: dynamics, complexity, and lower importance of geographical area. The socalled Long Term Vision EU describes the future military environment which is divided into three components: humane (social), cybernetic (informational, computer, communication), physical (natural, geographic) and is bridging the gap between strategy and capabilities of forces. |
Intelligence Analysis in Asymmetric OperationsMilitary artDoc. Ing. Oldřich Horák, CSc.Vojenské rozhledy / Czech Military Review Nr. 1/2007, Vol. XVI. (XLVIII.): 52-58 Asymmetric operations lack some linear qualifications at operational levels and split themselves into dozens of tactical warfares. This type of warfare demands quick analytical thinking tied with intelligence preparation of the battlefield, formulating specific information requirement to fill in the missing elements in information requests. As to technological potential, military intelligence is developing very fast. So, the intelligence analysts transfer the main information burden on various information systems, e.g. JSTARS (Joint Deployable Intelligence Support System), AWACS (Airborne Warning and Control System), ASAS (All Source Analysis System), or JDISS (Joint Deployable Intelligence Support System). But large capacities of those systems gave rise to another logical judgement that leads to different interpretation of intelligence data, i.e. the judgements corresponding to higher levels (operational and above) of analytical thinking. Nevertheless, tactical warfare represents operations of small tactical units and this fact puts the main burden on an intelligence analyst who must very quickly cover the gaps in intelligence reports and adopt appropriate decisions. |
Impacts of Warfare in Urbanized Terrain on Inexperienced Young SoldiersMilitary artDoc. Ing. Dušan Sabolčík, CSc.Vojenské rozhledy / Czech Military Review Nr. 2/2007, Vol. XVI. (XLVIII.): 66-76 New technologies influence not only social advance, but also the development of armed forces. Present-time warfare is resolute, dynamic. In the 21st century, both low and high intensity conflicts, counterterrorist or stabilization operations might take place in urbanized areas, where casualties and material damages are high. New weaponry and technology make demands on military and professional training, self-control, psychic preparedness. In advance we must set rules governing the firing of weapons and use of force namely by soldiers involved in peacekeeping and counter-insurgency situations. Mental stress, emotional, or physical strain or tension of soldiers are manifested by fanaticism, looting, killing non-combatants, desertions or going away from military units without permission (AWOLs), depressed soldiers inflict wound on themselves, they misuse drugs or alcohol. The author cites factors increasing soldiers' resistance: high cohesion of units, tough training, relaxation, courageousness, high awareness of objectives of operations and war aims. |
Theoretical Background of Security Science and Medium Range Theory (Discussion Supplement)Opinions, controversyPhDr. Antonín RašekVojenské rozhledy / Czech Military Review Nr. 4/2007, Vol. XVI. (XLVIII.): 90-100 Recently, on pages of this Military Review, several authors wrote about new scholarly discipline, the securitology (Josef Janošec, MR 3/2007). The author would like to add several ideas to this new discipline, inspired among others, D. Meadows, Limits to Growth, P. Kennedy, The Rise and Fall of the Great Powers, R. Robertson, Globalization: Social Theory and Global Culture, Albrow, M. The Global Age, and many others. Today's world actors, the U.S., People's China, Russia, India, Iran, are in their roles accompanied by institutions, such as the Unites Nations, European Union, NATO, International Monetary Fund, the World Bank, multinational monopolies, etc. Among key actors also belong established international terrorism, international crime. The common outlet of those megatrends is emerging New Multipolarity, new picture of world's configuration. Among others, at the end, the author calls for good relations with Russia, otherwise we might face energetic crisis (energy aspect of security). |
Theory of SurpriseMilitary artIng. Josef NastoupilVojenské rozhledy / Czech Military Review Nr. 1/2007, Vol. XVI. (XLVIII.): 65-70 This article contains main ideas from the essay by James J. Wirtz published in anthology Paradoxes of Strategic Intelligence, Frank Cass 2003. This theory is a unifying explanation of why states, for example, attempt to surprise their opponents with diplomatic or military initiatives. Surprise often is described as a force multiplier; something that increases the effectiveness of one's forces in combat. The prospect of surprise can prompt political leaders of the weaker side to believe that they can nullify that disparity and achieve their objectives. In other words, if strong parties began to view conflict from the weaker party's perspective, while weak actors kept war's dialectic in mind, then surprise would become less likely. The theory of surprise can identify when it is likely to occur, who is likely to find the element of surprise attractive as a basis of policy or strategy, and who is likely to be its victim. The trick now lies in making operational use of the theory of surprise. |
Unmanned AircraftMilitary professionalIng. Josef NastoupilVojenské rozhledy / Czech Military Review Nr. 2/2007, Vol. XVI. (XLVIII.): 213-217 The article deals with the question of unmanned aircraft generally, it doesn't discuss their individual types. Unmanned aircraft (UAVs) are designed to fly without a pilot (that is by remote control), their combat engagements are less risky and potentially less costly. Army officials say that UAVs will serve better, as they will carry more weapons and sturdier avionics, use the same fuel as other service aircraft, and could be operated by soldiers in theatre. Avionics and weapons might be controlled even by a conventional link with ground control stations. One "land pilot" can control several UAVs simultaneously. The running programmes will produce mature technologies and stable designs, making use of critical technologies, control abilities. The other critical technologies are: an engine that uses heavy fuel and an automatic take-off and landing system. As a part of coalition forces, the UAVs had proved their usefulness and serviceability in the Middle East. |
Securitology-Teaching about Security and Non-SecurityNonreviewed - OtherDoc. Ing. Josef Janošec, CSc.Vojenské rozhledy / Czech Military Review Nr. 3/2007, Vol. XVI. (XLVIII.): 3-14 The term "securitology" seems to be appropriate for nomenclative scientific discipline dealing with a research subject, security reality. This article proposes to use Yin- Yang principle and its applications to a philosophy of approach, holistic understanding contrapositive security forces. The classification of selected philosophical and methodological approaches to theme of securitology, the formalization of wide problems of securitology research, are the main items to be done first. The author presents his own approach to measurement in securitology, proposes theoretical models for description of problems connected with security questions, applications of various scenarios. He recapitulates traditional theories and practices of securitology and offers some new information on imaginable problems connected with multiparadigmatic sciences. Finally, he summarises contemporary state of research, including original draft of mathematical formulas to localize security threats. There are also some recommendations for future research in the field of securitology. |
Military Profession and Psychology of LabourInformational pagesPhDr. Mgr. Bohumil PtáčekVojenské rozhledy / Czech Military Review Nr. 1/2007, Vol. XVI. (XLVIII.): 128-130 Contemporary military psychology tries to augment psychic resistance to various forms of stress arising during carrying out the tasks of military profession. Generally speaking, there is both quantitative aspect to labour (military profession), i.e. amount, effort and time, and a qualitative one, i.e. intelligence and skill. The availability of particular types of labour can influence the location of their activities. From the point of military professionals, the soldier is exposed to three factors: sensorial, mental and emotional loads. Modern military psychology defines basis schemes and methods for psychological preparation of servicemen, it uses psychological experiments that lately enable to predict behaviour of military personnel and serve as a guideline to realize manpower's potential in the most effective ways. Proper preparedness and training help to prolong high soldiers' deployment even in high demanding surroundings. |
The Air Force in the Urban FightMilitary professionalIng. Josef NastoupilVojenské rozhledy / Czech Military Review Nr. 2/2007, Vol. XVI. (XLVIII.): 218-220 As the world grows ever more urbanized, the Air Force prepares airmen to fight in cities. They are complex domains where military operations are congested by terrain and by the danger of collateral damage and the risk to non-combatants. The Air Force supports the joint force by providing valuable airspace control, command and control, communications and psychological operations support, close-air support, terminal attack control, intelligence, surveillance and reconnaissance, and combat search and rescue. But Air Force capabilities in the urban are not just the supporting force for urban operations, it has ability to provide strategic attack against critical urban area. Based upon an article by Lt.Col. Brian M. Newberry in Armed Forces Journal, September 2006. |
Battle GroupMilitary artPplk. Ing. Jaroslav KulíšekVojenské rozhledy / Czech Military Review Nr. 3/2007, Vol. XVI. (XLVIII.): 52-69 This article presents the findings of the survey being done during the evaluation and assessment of EU Battle Groups, their missions, roles, tasks, stemming from the requirements set by the EU Crisis Management Concept. The paper does not discuss in detail variants EU Battle Groups, but concentrates on their historical background, basic characteristics, structure, EU political-military ambitions, scenarios, reaction time, tasks, standards, training and certification, Battle Groups commitments, concept and implementation, achievements. The article also includes recommendations for the Czech Armed Forces that are currently involved in the formation of the EU Battle Group CZE/SVK. This article aims to record progress to date and to indicate challenges ahead. All information and data for this paper were drawn from unclassified sources. |
Selected Problems of "Soldier of 21st Century" Project and its Economy AspectsNonreviewed - OtherPplk. doc. Ing. Bedřich Rýznar, CSc., kpt. Ing. Jan Mazal, Ph.D.Vojenské rozhledy / Czech Military Review Nr. ZC/2007, Vol. XVI. (XLVIII.): 93-102 Main focus of this article is laid on the digitalization of battlefield, command and control, Network-Enabled Capability (NEC) implementation, organization structures transformation brought about by the 21st Century Soldier concept and its economic implications. Based on this topic, the authors present mobile sensor system as a result of research being done in the Military Management and Tactics Department, University of Defence Brno. |
A Meritable Step in Understanding to the Presence and the Future of the ACRBook reviewPhDr. Antonín Rašek.Vojenské rozhledy / Czech Military Review Nr. 1/2007, Vol. XVI. (XLVIII.): 177-179 This article presents a letter of introduction for the book by the recent director of Brno Institute for Strategic Studies, Josef Janošec, "Security and Defence of the Czech Republic 2015-2025", composed together with other authors from this institute. This deed is even more rewarding owning to the fact that in our country we lack an advanced cultivation of military sciences. Since the beginning of our pre-war Republic, we've only taken over ready-made military doctrines: at first it was the French doctrine of defensive lines of fortresses and forts, after WWII it used to be the Soviet Offensive Doctrine. Only in 1968 there was an attempt to draw up Czech national military doctrine in the so-called Memorandum of Military Political Academy (a military school of university type), but after the invasion of Soviet Army in the same year all such efforts faded in vain. The book by Ing. Janošec and his team is a brave attempt to establish the starting point for our own genuine Czech security policy, based upon broadly conceived security analyses ...190 |
The Current Reality of Nuclear ThreatReviewedMgr. Jan LudvíkVojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 16-23 This article addresses vital issues of possible threat of nuclear weapons in contemporary world. First, the general nuclear order-particularly the NPT regime-is briefly examined. Analysis proceeds to a critical exploration of the prospective use of nuclear weapons by small nuclear states and the so-called rogue states. Some attention is also paid to the conflict between India and Pakistan, since these two states are often considered as the most dangerous from perspective of possible use of nuclear weapons. The author considers the threat of nuclear war between great powers and then the threat of nuclear terrorism. His analysis suggests that deterrence between great powers is reliably working. The threat from rogue states is limited by technological difficulties in process of development and production of nuclear weapons and limits of small nuclear arsenals. Even though threat of nuclear terrorism should not be underestimated, this paper argues that technical obstacles and availability of other comparatively cheap methods effectively reduce the terrorists' desire to acquire nuclear weapons. |
Scientific Support of Strategical Decision-Making not only in Department of DefenceOpinions, controversyIng. Vlastimil Galatík, CSc., doc. Ing. Milan Kubeša, CSc.Vojenské rozhledy / Czech Military Review Nr. 2/2010, Vol. XIX. (LI.): 82-87 The article is a polemical expression of authors' opinion over this problem. It is related to the orientation of society, political coalitions, and single states towards higher goals. If we admit that the sustainable development of society is the base for securing a peace and stability, then we can state that the question of security or consecutively country defence cover problems of the whole social system, subsystems and system elements. Strategical decision-making ought to be the highest priority in our society. It is indisputable that such decisionmaking deserves scientifi c support. At the end of this article the authors propose a short algorithmic program for Czech military strategy that is planned for the year 2014 and the concept of Czech army development planned for 2015. |
The Professionalization of Armed Forces of the Czech Republic as an Open Project and InnovationOpinions, controversyPodplukovník Ing. Bohuslav Pernica, Ph.D.Vojenské rozhledy / Czech Military Review Nr. 4/2010, Vol. XIX. (LI.): 71-80 The shift from vocational military service to all-volunteer force (AVF) could be regarded and treated as any other scholarly assignment of project management, so we can get a better look at its bugs and risks. The author applied the Valentas classification of innovation upon this AVF project in the Czech Republic and demonstrates what are main risks for its sustainability. He sees the first cause and effect in the reality that this shift lacks sufficient support by social sciences and humanities. Since 2003, only six per cent of scientists/scholars employed by the Czech Ministry of Defence have been supporting this great change. It is not enough and it makes certain incompetence within defence ministry to reach the factual aim of this move and AVF produces more and more difficulties. According to the author, the professionalization of forces in our country has not meet its main purpose--to raise professional qualities of military personnel, in spite of the fact it originally used to be the prime objective of this process. |
European Legislation and its Role in the Fight against CBRNE (Introductory to Problems)Military lawPoručík Ing. Martin KlusáčekVojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 156-167 Nowadays, with the potential employment of Chemical, Biological, Radiological, Nuclear Explosives (CBRNE), terrorism poses a threat to all countries over the world, it becomes scary phenomenon at a global scale. The author introduces key agreements dealing with this subject: Chemical Weapons Convention, European Agreement concerning the international carriage of Dangerous goods by Road, European Agreement concerning the International Carriage of Dangerous Goods by Inland Waterways, Regulations concerning the International carriage of Dangerous Goods by rail, and so on. The main objective of the EU is to introduce such legal measures so that it would be extremely difficult for terrorist groups to legally gain CBRNE materials. The purpose of this essay is to analyse legal frame of CBRNE materials and to stress the protection against their misusing within an authority of the ACR. |
Main Methods of Intelligence Analysis and Ways of its EvaluatingMilitary artMgr. Miroslav KalousVojenské rozhledy / Czech Military Review Nr. 3/2010, Vol. XIX. (LI.): 24-32 The article presents six more or less structured analytical methods that are or could be employed in intelligence analysis. This type of analysis, one part of the intelligence cycle, is understood as "the process of evaluating data for reliability, validity, and relevance; integrating and analysing it; converting the product of this effort into a meaningful whole, which includes assessment of events and implications of the information collected". The set of presented methods includes: link analysis, opportunity analysis, analogy, linchpin analysis, analysis of competing hypothesis and alternative scenarios. The study doesn't stop with presenting those methods; it also explains which type of reasoning (inductive, deductive or abductive) is used when working with each particular method. In broad terms, the article tries to shed light on intelligence analysis and its specifics. The reader should obtain better understanding their usefulness in the daily work of intelligence analyst. |
The Deployment of Bundeswehr Logistics in AfghanistanInformational pagesIng. Vladislav Vincenec, Ph.D., doc. Ing. Miroslav Cempírek, CSc.Vojenské rozhledy / Czech Military Review Nr. 2/2010, Vol. XIX. (LI.): 101-108 The article depicts the methods of logistical support to combat units of the German Federal Forces (Bundeswehr), deployed in Afghanistan. Professionally trained and prepared personnel are capable to meet requirements of forces in ISAF operations. The centralizations of composite logistical services can guarantee the lowering of payments and expenses in logistics. Such arrangement makes logistic activities more economical, namely by taking over of mechanisms used in civilian economy sphere. This method is called "focused logistics". It is used for logistical support of small contingents. Its characteristic feature is interconnection of logistical data and transport technologies, rapid crisis response, and the ability of logistical support during all combat and non-combat activities. |

