Crony Attack: Strategic Attack's Silver Bullet? Targeting Key Elite Supporters of an Enemy Leader - Operation Allied Force, Slobodan Milosevic, Yugoslavia, RICO, Kleptocracies, Coercive Air Strategy

Nonfiction, History, Asian, Former Soviet Republics, Military, Aviation
Cover of the book Crony Attack: Strategic Attack's Silver Bullet? Targeting Key Elite Supporters of an Enemy Leader - Operation Allied Force, Slobodan Milosevic, Yugoslavia, RICO, Kleptocracies, Coercive Air Strategy by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370818471
Publisher: Progressive Management Publication: September 23, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370818471
Publisher: Progressive Management
Publication: September 23, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. As a strategy, crony attack targets key elite supporters of an enemy leader to effect policy change in the attacker's favor. It is also one of a set of tools used in coercive diplomacy. Other tools include economic sanctions and information operations. To properly and efficiently leverage the potentially powerful mechanism of crony attack demands coordination among those responsible for wielding the military, diplomatic, economic, and informational instruments of national power.
This thesis describes crony attack, comments on requirements for successful development of crony attack methodology, and investigates a prominent case where the United States apparently used this strategy. This thesis treats crony attack primarily as a form of strategic attack, carried out during the air campaign portion of military operations. It also outlines a theoretical foundation for such a targeting strategy. While acknowledging that current policy and practice regarding ongoing and recent crony attacks are properly mired in secrecy, this paper investigates the case of crony attack against the Slobodan Milosevic regime during Operation Allied Force in 1999. The damage to capital-producing facilities, controlled by key political supporters of Milosevic and his wife, eventually incited those supporters to push for policy change and an end to the war.
Chapter 1 - Introduction * Chapter 2 - Background * Chapter 3 - Theory of Crony Attack * Chapter 4 - Strategy of Crony Attack * Chapter 5 - Operation Allied Force: A Case Study * Chapter 6 - Conclusions

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. As a strategy, crony attack targets key elite supporters of an enemy leader to effect policy change in the attacker's favor. It is also one of a set of tools used in coercive diplomacy. Other tools include economic sanctions and information operations. To properly and efficiently leverage the potentially powerful mechanism of crony attack demands coordination among those responsible for wielding the military, diplomatic, economic, and informational instruments of national power.
This thesis describes crony attack, comments on requirements for successful development of crony attack methodology, and investigates a prominent case where the United States apparently used this strategy. This thesis treats crony attack primarily as a form of strategic attack, carried out during the air campaign portion of military operations. It also outlines a theoretical foundation for such a targeting strategy. While acknowledging that current policy and practice regarding ongoing and recent crony attacks are properly mired in secrecy, this paper investigates the case of crony attack against the Slobodan Milosevic regime during Operation Allied Force in 1999. The damage to capital-producing facilities, controlled by key political supporters of Milosevic and his wife, eventually incited those supporters to push for policy change and an end to the war.
Chapter 1 - Introduction * Chapter 2 - Background * Chapter 3 - Theory of Crony Attack * Chapter 4 - Strategy of Crony Attack * Chapter 5 - Operation Allied Force: A Case Study * Chapter 6 - Conclusions

More books from Progressive Management

Cover of the book The Soviet Biological Weapons Program and Its Legacy in Today's Russia: Innovation Using Recombinant DNA Technology and Genetic Engineering, the Biopreparat BW Program, Biography of Smirnov by Progressive Management
Cover of the book 21st Century Climate Change and Global Warming Reports: U.S. Climate Action Report 2010 - Fifth National Communication Under the UN Framework Convention on Climate Change by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Chemical Operations Principles and Fundamentals - FM 3-100 (Value-Added Professional Format Series) by Progressive Management
Cover of the book A Game of Simon Says: Latin America's Left Turn and Its Effects on U.S. Security - Trend Toward Communism, Venezuela's Chavez and Bolivia's Morales, LAC, Mexico, Need for Fairer Trade Agreements, Aid by Progressive Management
Cover of the book 21st Century U.S. Military Documents: Operations Security (OPSEC) Air Force Instruction 10-701 - Signature Management, Analyze Threats, Education and Training by Progressive Management
Cover of the book Explosive Accident Summary: World War II - Foundation of Ordnance Safety Program, Log of Major Accidents in Second World War, Plant Disasters, Ship Explosions, Reporting Future by Progressive Management
Cover of the book Improving the U.S. Military's Adaptability Against the Salafist-Jihadi Threat: Counterterrorism and COIN, Death-Terror Management Theory, Leader Decapitation Effect on Terrorist Organizations by Progressive Management
Cover of the book Special Operations Forces (SOF) Guide: Leadership, Theory, Strategic Art, Joint Special Operations University (JSOU) Factbook, Essays and Research Topics by Progressive Management
Cover of the book Innovative Practices for Special Warfare: Army Special Operations Forces, Collaboration, Structure, Incentives, Acceptance, Case Analyses of Google, Joint Special Operations Command, Silicon Valley by Progressive Management
Cover of the book 2013 Pentagon Report on Progress Toward Security and Stability in Afghanistan: Afghan Security Forces, Governance, Reconstruction and Development, Regional Engagement by Progressive Management
Cover of the book America's Space Shuttle: Electrical Power System NASA Astronaut Training Manual (EPS 2102) by Progressive Management
Cover of the book Long-Term Effects of Targeted Killings by Unmanned Aerial Vehicles (UAVs) – Weaponized Drones Against Islamic Extremists in Afghanistan and Iraq, Just War Theory and International Humanitarian Law by Progressive Management
Cover of the book Ready Seapower: A History of the U.S. Seventh Fleet - MacArthur's Navy, Korean War, Arabian Gulf to Mount Pinatubo, Terrorists and Pirates by Progressive Management
Cover of the book Britain's Nuclear Deterrent Force and the U.S. - U.K. Special Relationship: History of Atomic Weapons with Manhattan Project, Trident Submarine-launched Ballistic Missiles (SLBM) Replacement Decision by Progressive Management
Cover of the book The Impact of Middle-Class Consumption on Democratization in China and Northeast Asia: Korea, Taiwan, Consumerism, Appeasing the Wealthy, Aspirational Lifestyles, Party Corruption, Inequality by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy