Crony Attack: Strategic Attack's Silver Bullet? Targeting Key Elite Supporters of an Enemy Leader - Operation Allied Force, Slobodan Milosevic, Yugoslavia, RICO, Kleptocracies, Coercive Air Strategy

Nonfiction, History, Asian, Former Soviet Republics, Military, Aviation
Cover of the book Crony Attack: Strategic Attack's Silver Bullet? Targeting Key Elite Supporters of an Enemy Leader - Operation Allied Force, Slobodan Milosevic, Yugoslavia, RICO, Kleptocracies, Coercive Air Strategy by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370818471
Publisher: Progressive Management Publication: September 23, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370818471
Publisher: Progressive Management
Publication: September 23, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. As a strategy, crony attack targets key elite supporters of an enemy leader to effect policy change in the attacker's favor. It is also one of a set of tools used in coercive diplomacy. Other tools include economic sanctions and information operations. To properly and efficiently leverage the potentially powerful mechanism of crony attack demands coordination among those responsible for wielding the military, diplomatic, economic, and informational instruments of national power.
This thesis describes crony attack, comments on requirements for successful development of crony attack methodology, and investigates a prominent case where the United States apparently used this strategy. This thesis treats crony attack primarily as a form of strategic attack, carried out during the air campaign portion of military operations. It also outlines a theoretical foundation for such a targeting strategy. While acknowledging that current policy and practice regarding ongoing and recent crony attacks are properly mired in secrecy, this paper investigates the case of crony attack against the Slobodan Milosevic regime during Operation Allied Force in 1999. The damage to capital-producing facilities, controlled by key political supporters of Milosevic and his wife, eventually incited those supporters to push for policy change and an end to the war.
Chapter 1 - Introduction * Chapter 2 - Background * Chapter 3 - Theory of Crony Attack * Chapter 4 - Strategy of Crony Attack * Chapter 5 - Operation Allied Force: A Case Study * Chapter 6 - Conclusions

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. As a strategy, crony attack targets key elite supporters of an enemy leader to effect policy change in the attacker's favor. It is also one of a set of tools used in coercive diplomacy. Other tools include economic sanctions and information operations. To properly and efficiently leverage the potentially powerful mechanism of crony attack demands coordination among those responsible for wielding the military, diplomatic, economic, and informational instruments of national power.
This thesis describes crony attack, comments on requirements for successful development of crony attack methodology, and investigates a prominent case where the United States apparently used this strategy. This thesis treats crony attack primarily as a form of strategic attack, carried out during the air campaign portion of military operations. It also outlines a theoretical foundation for such a targeting strategy. While acknowledging that current policy and practice regarding ongoing and recent crony attacks are properly mired in secrecy, this paper investigates the case of crony attack against the Slobodan Milosevic regime during Operation Allied Force in 1999. The damage to capital-producing facilities, controlled by key political supporters of Milosevic and his wife, eventually incited those supporters to push for policy change and an end to the war.
Chapter 1 - Introduction * Chapter 2 - Background * Chapter 3 - Theory of Crony Attack * Chapter 4 - Strategy of Crony Attack * Chapter 5 - Operation Allied Force: A Case Study * Chapter 6 - Conclusions

More books from Progressive Management

Cover of the book Ten Propositions Regarding Spacepower: Theories, Global Access and Presence, Coercive Force, Commercial Assets, Career-long Specialization, Weaponization, Central Control by Space Professional by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Legal Support to Operations (FM 27-100) Capstone Legal Doctrinal Manual for JAG Legal Services, Plus Bonus IED Book (Value-added Professional Format Series) by Progressive Management
Cover of the book U.S. Army War College Guide to National Security Issues: Volume II: National Security Policy and Strategy, 5th Edition - Securing America from Attack, Transnational Threats by Progressive Management
Cover of the book 2011 After the Nuclear Meltdown: Crucial Survival and Medical Data for Nuclear Power Plant and Radiation Accidents and Terrorism - Essential Emergency Information for You and Your Family by Progressive Management
Cover of the book The U.S. Air Service in World War I: Volume II - Early Concepts of Military Aviation, 1913 to 1919, Foulois, Mitchell, Meuse-Argonne Offensive, Observation Balloons, Area and Precision Bombing by Progressive Management
Cover of the book U.S. Army Medical Correspondence Course: Poultry I - Chicken, Poultry Processing, Destination and Surveillance Inspection by Progressive Management
Cover of the book 2010 Report to Congress of the U.S. and China Economic And Security Review Commission: Internet Censorship, Hacking Attacks, Trade, WTO, Security, Missiles, Aviation, Taiwan, Hong Kong, Green Energy by Progressive Management
Cover of the book 21st Century Pocket Guide to the U.S. Military Academy at West Point: USMA Programs, Admissions, Cadet Life, History by Progressive Management
Cover of the book Technology and Military Doctrine: Essays on a Challenging Relationship - Weapons, Technology, Escort Fighters, Spacecraft, Space Doctrine by Progressive Management
Cover of the book Information Assurance: Trends in Vulnerabilities, Threats, and Technologies - Electromagnetic Pulse Attack (EMP), Countermeasures, Warfighter Cyber Security, Network Centric Warfare by Progressive Management
Cover of the book Globalness: Toward a Space Power Theory - Military Spaceflight, Strategic Theory, Weaponization, ASAT Anti-Satellite, GPS, Prompt Global Strike, Global Connectivity, Weapons Delivery by Progressive Management
Cover of the book Deception, Disinformation, and Strategic Communications: How One Interagency Group Made a Major Difference - Cold War, COINTELPRO, CHAOS, Reagan, Soviet Active Measures, KGB, Gorbachev by Progressive Management
Cover of the book Hydrogen from Coal and Natural Gas: Research, Development, and Demonstration Program, Polygeneration, Production Pathways, FutureGen by Progressive Management
Cover of the book U.S. Marines History: Marine Advisors with the Vietnamese Provincial Reconnaissance Units, 1966-1970 - Phoenix Program, Counterinsurgency, PRU, Advisors Tell Their Stories by Progressive Management
Cover of the book Protecting America: Cold War Defensive Sites - Concise History of the Cold War and U.S. Military Sites, Extensive Bibliography and Source Information - Nuclear Weapons, Missiles by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy