Crony Attack: Strategic Attack's Silver Bullet? Targeting Key Elite Supporters of an Enemy Leader - Operation Allied Force, Slobodan Milosevic, Yugoslavia, RICO, Kleptocracies, Coercive Air Strategy

Nonfiction, History, Asian, Former Soviet Republics, Military, Aviation
Cover of the book Crony Attack: Strategic Attack's Silver Bullet? Targeting Key Elite Supporters of an Enemy Leader - Operation Allied Force, Slobodan Milosevic, Yugoslavia, RICO, Kleptocracies, Coercive Air Strategy by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370818471
Publisher: Progressive Management Publication: September 23, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370818471
Publisher: Progressive Management
Publication: September 23, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. As a strategy, crony attack targets key elite supporters of an enemy leader to effect policy change in the attacker's favor. It is also one of a set of tools used in coercive diplomacy. Other tools include economic sanctions and information operations. To properly and efficiently leverage the potentially powerful mechanism of crony attack demands coordination among those responsible for wielding the military, diplomatic, economic, and informational instruments of national power.
This thesis describes crony attack, comments on requirements for successful development of crony attack methodology, and investigates a prominent case where the United States apparently used this strategy. This thesis treats crony attack primarily as a form of strategic attack, carried out during the air campaign portion of military operations. It also outlines a theoretical foundation for such a targeting strategy. While acknowledging that current policy and practice regarding ongoing and recent crony attacks are properly mired in secrecy, this paper investigates the case of crony attack against the Slobodan Milosevic regime during Operation Allied Force in 1999. The damage to capital-producing facilities, controlled by key political supporters of Milosevic and his wife, eventually incited those supporters to push for policy change and an end to the war.
Chapter 1 - Introduction * Chapter 2 - Background * Chapter 3 - Theory of Crony Attack * Chapter 4 - Strategy of Crony Attack * Chapter 5 - Operation Allied Force: A Case Study * Chapter 6 - Conclusions

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. As a strategy, crony attack targets key elite supporters of an enemy leader to effect policy change in the attacker's favor. It is also one of a set of tools used in coercive diplomacy. Other tools include economic sanctions and information operations. To properly and efficiently leverage the potentially powerful mechanism of crony attack demands coordination among those responsible for wielding the military, diplomatic, economic, and informational instruments of national power.
This thesis describes crony attack, comments on requirements for successful development of crony attack methodology, and investigates a prominent case where the United States apparently used this strategy. This thesis treats crony attack primarily as a form of strategic attack, carried out during the air campaign portion of military operations. It also outlines a theoretical foundation for such a targeting strategy. While acknowledging that current policy and practice regarding ongoing and recent crony attacks are properly mired in secrecy, this paper investigates the case of crony attack against the Slobodan Milosevic regime during Operation Allied Force in 1999. The damage to capital-producing facilities, controlled by key political supporters of Milosevic and his wife, eventually incited those supporters to push for policy change and an end to the war.
Chapter 1 - Introduction * Chapter 2 - Background * Chapter 3 - Theory of Crony Attack * Chapter 4 - Strategy of Crony Attack * Chapter 5 - Operation Allied Force: A Case Study * Chapter 6 - Conclusions

More books from Progressive Management

Cover of the book Learning Technology Adoption: Navy Barriers and Resistance - Naval Student and Faculty Survey Findings and Recommendations to Foster an Innovative Culture and Support Implementation Efforts by Progressive Management
Cover of the book Analysis of Health Service Support with Frontier Surgeons and Ambulance Corps to 1876 Centennial Campaign: Sheridan's War Against the Sioux and Cheyenne Native American on Indian Hunting Grounds by Progressive Management
Cover of the book 20th Century NASA Space History: Mir Mission Chronicle - Modules, Configuration Changes, Major Events of the Russian/Soviet Space Station by Progressive Management
Cover of the book 21st Century Peacekeeping and Stability Operations Institute (PKSOI) Papers - Mass Atrocity: Prevention and Response - A Mass Atrocity Response Operations (MARO) Workshop Report by Progressive Management
Cover of the book U.S. Strategic Interests and Georgia's Prospects for NATO Membership: Russian Aggression in Georgia and Ukraine, Fear in Central and Eastern European Nations, Georgia Geostrategic Importance by Progressive Management
Cover of the book Myths and Crises: American Masculinity in 1980s Vietnam War Films - Analysis of Five Films (Platoon, Full Metal Jacket, Hamburger Hill, Casualties of War, and Born on the Fourth of July) by Progressive Management
Cover of the book Once in a Blue Moon: Airmen in Theater Command: Lauris Norstad, Albrecht Kesselring, and Their Relevance to the Twenty-First Century Air Force - Historical Analysis of Rise to Regional CINC by Progressive Management
Cover of the book U.S. Marines in Afghanistan, 2001-2002: From the Sea - U.S. Marines in the Global War on Terrorism, Tora Bora, Enduring Freedom, Osama bin Laden, al-Qaeda, Taliban, Operations at Kandahar by Progressive Management
Cover of the book 21st Century FEMA Study Course: Emergency Support Function #5 Emergency Management (IS-805) - NRF, Support Agencies, Incident Management, National Response Coordination Center (NRCC) by Progressive Management
Cover of the book NASA's Efforts to Identify Near-Earth Objects (NEOs) and Mitigate Hazards - Asteroids, Meteors, Comets, Chelyabinsk-type Events, Problems with NEO Program, Management Issues by Progressive Management
Cover of the book History of American Weather and Climate Modification: Hurricane Modification Attempts with Project Stormfury, Project Skyfire, Whitetop, Skywater, Cloud Seeding, Hail Suppression, Ionosphere by Progressive Management
Cover of the book U.S. Joint Forces Army Command Commander's Handbook for Strategic Communication and Communication Strategy (Joint Warfighting Center), Afghanistan, Iraq, al-Qaeda, War on Terror, Petraeus, Media by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Salivary Gland Cancer - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book Art of War Paper: The Rhodesian African Rifles - The Growth and Adaptation of a Multicultural Regiment through the Rhodesian Bush War, 1965-1980 - Mugabe, Nkomo, Kissinger by Progressive Management
Cover of the book Hidden Dragon, Crouching Lion: How China's Advance in Africa is Underestimated and Africa's Potential Underappreciated - Emerging Markets, Mineral Resources, BRICs by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy