Crony Attack: Strategic Attack's Silver Bullet? Targeting Key Elite Supporters of an Enemy Leader - Operation Allied Force, Slobodan Milosevic, Yugoslavia, RICO, Kleptocracies, Coercive Air Strategy

Nonfiction, History, Asian, Former Soviet Republics, Military, Aviation
Cover of the book Crony Attack: Strategic Attack's Silver Bullet? Targeting Key Elite Supporters of an Enemy Leader - Operation Allied Force, Slobodan Milosevic, Yugoslavia, RICO, Kleptocracies, Coercive Air Strategy by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370818471
Publisher: Progressive Management Publication: September 23, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370818471
Publisher: Progressive Management
Publication: September 23, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. As a strategy, crony attack targets key elite supporters of an enemy leader to effect policy change in the attacker's favor. It is also one of a set of tools used in coercive diplomacy. Other tools include economic sanctions and information operations. To properly and efficiently leverage the potentially powerful mechanism of crony attack demands coordination among those responsible for wielding the military, diplomatic, economic, and informational instruments of national power.
This thesis describes crony attack, comments on requirements for successful development of crony attack methodology, and investigates a prominent case where the United States apparently used this strategy. This thesis treats crony attack primarily as a form of strategic attack, carried out during the air campaign portion of military operations. It also outlines a theoretical foundation for such a targeting strategy. While acknowledging that current policy and practice regarding ongoing and recent crony attacks are properly mired in secrecy, this paper investigates the case of crony attack against the Slobodan Milosevic regime during Operation Allied Force in 1999. The damage to capital-producing facilities, controlled by key political supporters of Milosevic and his wife, eventually incited those supporters to push for policy change and an end to the war.
Chapter 1 - Introduction * Chapter 2 - Background * Chapter 3 - Theory of Crony Attack * Chapter 4 - Strategy of Crony Attack * Chapter 5 - Operation Allied Force: A Case Study * Chapter 6 - Conclusions

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. As a strategy, crony attack targets key elite supporters of an enemy leader to effect policy change in the attacker's favor. It is also one of a set of tools used in coercive diplomacy. Other tools include economic sanctions and information operations. To properly and efficiently leverage the potentially powerful mechanism of crony attack demands coordination among those responsible for wielding the military, diplomatic, economic, and informational instruments of national power.
This thesis describes crony attack, comments on requirements for successful development of crony attack methodology, and investigates a prominent case where the United States apparently used this strategy. This thesis treats crony attack primarily as a form of strategic attack, carried out during the air campaign portion of military operations. It also outlines a theoretical foundation for such a targeting strategy. While acknowledging that current policy and practice regarding ongoing and recent crony attacks are properly mired in secrecy, this paper investigates the case of crony attack against the Slobodan Milosevic regime during Operation Allied Force in 1999. The damage to capital-producing facilities, controlled by key political supporters of Milosevic and his wife, eventually incited those supporters to push for policy change and an end to the war.
Chapter 1 - Introduction * Chapter 2 - Background * Chapter 3 - Theory of Crony Attack * Chapter 4 - Strategy of Crony Attack * Chapter 5 - Operation Allied Force: A Case Study * Chapter 6 - Conclusions

More books from Progressive Management

Cover of the book The Politics of Naval Innovation: Studies of Historical Cases of How Technologically Advanced Systems Went From the Drawing Board to the Fleet, Tomahawk Cruise Missile, AEGIS Combat System by Progressive Management
Cover of the book A History of Suction-Type Laminar-Flow Control with Emphasis on Flight Research: From the 1930s to the X-21 and the Boeing 757, Swept Wings, Noise, Insect Contamination, Ice Particles, Supersonic by Progressive Management
Cover of the book Baseball Caps and Beards: The Perception of U.S. Special Forces by Conventional Forces and Its Impact on Interdependence - History from Eagle Claw and Urgent Fury to Desert Storm and War on Terrorism by Progressive Management
Cover of the book Biodiesel Fuel Handling and Use Guidelines for Users, Blenders, Distributors: Quality Specifications, Benefits and Drawbacks, Issues and Questions, Definitions, MSDS by Progressive Management
Cover of the book Operation Ranch Hand: The Air Force and Herbicides in Southeast Asia - 1961-1971 - Agent Orange, C-123, South Vietnam Defoliation Operations, Viet Cong, Crop Destruction, Health Effects, Mekong Delta by Progressive Management
Cover of the book Partners of Choice and Necessity: Special Operations Forces and National Security Imperatives of Building Partner Capacity – Security Force Assistance and Irregular Warfare in Undergoverned Spaces by Progressive Management
Cover of the book Countering Weapons of Mass Destruction: A Preliminary Field Study in Improving Collaboration - WMD Counterproliferation and the Risk of Improvised Nuclear Devices (IND), Use of Additive Manufacturing by Progressive Management
Cover of the book The Role of Veterans Affairs (VA) in Support of the Department of Defense (DoD) in Biodefense – Preparing for Bioterrorism, Bioterrorist Attack, Global Biological Weapons Usage and Anthrax Threat by Progressive Management
Cover of the book Rearming for the Cold War 1945-1960: History of Acquisition in the Department of Defense - Nuclear Weapons, Missiles and Rockets, Nuclear Navy, Air Force Bombers, Atomic Army by Progressive Management
Cover of the book The U.S. Response to China's ASAT Test: An International Security Space Alliance for the Future, Anti-Satellite Capabilities and China's Space Weapons Strategy by Progressive Management
Cover of the book Journalists or Criminals? Attorney General Eric Holder's Testimony before the Committee and the Justice Department's National Security Leak Investigative Techniques by Progressive Management
Cover of the book Dead on Arrival? The Development of the Aerospace Concept, 1944-58: Space Age After Sputnik, Debates About Aerospace, Truman and Eisenhower, Air Force, ORDCIT, von Braun, von Karman, Schriever by Progressive Management
Cover of the book Within Our Reach: A National Strategy to Eliminate Child Abuse and Neglect Fatalities - 2016 Report of the Commission to Eliminate Child Abuse and Neglect Fatalities, Special Populations, Support by Progressive Management
Cover of the book Guideline for Isolation Precautions: Preventing Transmission of Infectious Agents in Healthcare Settings (2007) - Stopping the Spread of Infections by Progressive Management
Cover of the book 21st Century Peacekeeping and Stability Operations Institute (PKSOI) Papers - The American Military Advisor: Dealing With Senior Foreign Officials in the Islamic World by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy