Crony Attack: Strategic Attack's Silver Bullet? Targeting Key Elite Supporters of an Enemy Leader - Operation Allied Force, Slobodan Milosevic, Yugoslavia, RICO, Kleptocracies, Coercive Air Strategy

Nonfiction, History, Asian, Former Soviet Republics, Military, Aviation
Cover of the book Crony Attack: Strategic Attack's Silver Bullet? Targeting Key Elite Supporters of an Enemy Leader - Operation Allied Force, Slobodan Milosevic, Yugoslavia, RICO, Kleptocracies, Coercive Air Strategy by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370818471
Publisher: Progressive Management Publication: September 23, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370818471
Publisher: Progressive Management
Publication: September 23, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. As a strategy, crony attack targets key elite supporters of an enemy leader to effect policy change in the attacker's favor. It is also one of a set of tools used in coercive diplomacy. Other tools include economic sanctions and information operations. To properly and efficiently leverage the potentially powerful mechanism of crony attack demands coordination among those responsible for wielding the military, diplomatic, economic, and informational instruments of national power.
This thesis describes crony attack, comments on requirements for successful development of crony attack methodology, and investigates a prominent case where the United States apparently used this strategy. This thesis treats crony attack primarily as a form of strategic attack, carried out during the air campaign portion of military operations. It also outlines a theoretical foundation for such a targeting strategy. While acknowledging that current policy and practice regarding ongoing and recent crony attacks are properly mired in secrecy, this paper investigates the case of crony attack against the Slobodan Milosevic regime during Operation Allied Force in 1999. The damage to capital-producing facilities, controlled by key political supporters of Milosevic and his wife, eventually incited those supporters to push for policy change and an end to the war.
Chapter 1 - Introduction * Chapter 2 - Background * Chapter 3 - Theory of Crony Attack * Chapter 4 - Strategy of Crony Attack * Chapter 5 - Operation Allied Force: A Case Study * Chapter 6 - Conclusions

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. As a strategy, crony attack targets key elite supporters of an enemy leader to effect policy change in the attacker's favor. It is also one of a set of tools used in coercive diplomacy. Other tools include economic sanctions and information operations. To properly and efficiently leverage the potentially powerful mechanism of crony attack demands coordination among those responsible for wielding the military, diplomatic, economic, and informational instruments of national power.
This thesis describes crony attack, comments on requirements for successful development of crony attack methodology, and investigates a prominent case where the United States apparently used this strategy. This thesis treats crony attack primarily as a form of strategic attack, carried out during the air campaign portion of military operations. It also outlines a theoretical foundation for such a targeting strategy. While acknowledging that current policy and practice regarding ongoing and recent crony attacks are properly mired in secrecy, this paper investigates the case of crony attack against the Slobodan Milosevic regime during Operation Allied Force in 1999. The damage to capital-producing facilities, controlled by key political supporters of Milosevic and his wife, eventually incited those supporters to push for policy change and an end to the war.
Chapter 1 - Introduction * Chapter 2 - Background * Chapter 3 - Theory of Crony Attack * Chapter 4 - Strategy of Crony Attack * Chapter 5 - Operation Allied Force: A Case Study * Chapter 6 - Conclusions

More books from Progressive Management

Cover of the book Cyberterrorism After Stuxnet - Terrorist Cyberattacks, Distributed Denial of Service (DDoS), Motives, Critical U.S. Infrastructure Vulnerabilities, al-Qaeda Computer Capability, PC Attacks by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: Apollo 12 Technical Crew Debriefing with Unique Observations about the Second Lunar Landing - Astronauts Conrad, Gordon, Bean by Progressive Management
Cover of the book "Good Tuberculosis Men": The Army Medical Department's Struggle with Tuberculosis (TB) - Mycobacterium, Tubercular Troops, World War I and II, Heliotherapy, Hospitals, Antibiotics and Streptomycin by Progressive Management
Cover of the book Uplink - Downlink: A History of the Deep Space Network 1957-1997, Mariner, Viking, Voyager, Galileo, Cassini Eras, DSN as a Scientific Instrument (NASA SP-2001-4227) by Progressive Management
Cover of the book Stopping Mass Killings in Africa: Genocide, Airpower, and Intervention - Somalia, Rwanda, Hutus and Tutsis, Ivory Coast by Progressive Management
Cover of the book The Makara of Hizballah: Deception in the 2006 Summer War - History and Organization of Hizballah, Lebanon, Chain of Command, Hijacking the Internet, Bunkers, Denial Operations, Electronic Warfare by Progressive Management
Cover of the book 2012 DoD Report on Progress Toward Security and Stability in Afghanistan; U.S. Plan for Sustaining the Afghanistan National Security Forces by Progressive Management
Cover of the book The U. S. Army Officer Corps: Changing With the Times - Black Officers, Diversity Issues, Pre and Post-Vietnam, Officer Personnel Management System (OPMS), Career Field Designation (CFD) by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Army Handbook for Self-Development - Strengths, Weaknesses, Roles, Responsibilities, Learning and Motivation, Roadblocks, Milestones (Professional Format Series) by Progressive Management
Cover of the book Spy Satellite Encyclopedia: The Amazing History of the Early Photoreconnaissance Satellites by Progressive Management
Cover of the book Like a Thunderbolt: The Lafayette Escadrille and the Advent of American Pursuit in World War I - Sopwith Camel, American Pilots, Aces, William Thaw, Foulois by Progressive Management
Cover of the book Democratic Republic of the Congo (DRC) in Perspective - Orientation Guide: Geography, History, Cities, Economy, Society, Security, Military, Religion, Traditions, Mobutu Era, Congo Wars, Hazards by Progressive Management
Cover of the book Marshall Center Reports: Terrorism, WMD, NATO and Transatlantic Relations, Rumsfeld's Transformation Vision, Jihadist Communications Techniques, Bases in Romania and Bulgaria by Progressive Management
Cover of the book Review of Federal and State Definitions of the Terms "Gang," "Gang Crime," and "Gang Member" by Progressive Management
Cover of the book Toward a Theory of Spacepower: Selected Essays - Commercial Space, Launch Services, Tourism, Civil Space Authority, Moon, Mars, National Security, Warfare, Russia, China, India, Space Law, ASAT by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy