Crony Attack: Strategic Attack's Silver Bullet? Targeting Key Elite Supporters of an Enemy Leader - Operation Allied Force, Slobodan Milosevic, Yugoslavia, RICO, Kleptocracies, Coercive Air Strategy

Nonfiction, History, Asian, Former Soviet Republics, Military, Aviation
Cover of the book Crony Attack: Strategic Attack's Silver Bullet? Targeting Key Elite Supporters of an Enemy Leader - Operation Allied Force, Slobodan Milosevic, Yugoslavia, RICO, Kleptocracies, Coercive Air Strategy by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370818471
Publisher: Progressive Management Publication: September 23, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370818471
Publisher: Progressive Management
Publication: September 23, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. As a strategy, crony attack targets key elite supporters of an enemy leader to effect policy change in the attacker's favor. It is also one of a set of tools used in coercive diplomacy. Other tools include economic sanctions and information operations. To properly and efficiently leverage the potentially powerful mechanism of crony attack demands coordination among those responsible for wielding the military, diplomatic, economic, and informational instruments of national power.
This thesis describes crony attack, comments on requirements for successful development of crony attack methodology, and investigates a prominent case where the United States apparently used this strategy. This thesis treats crony attack primarily as a form of strategic attack, carried out during the air campaign portion of military operations. It also outlines a theoretical foundation for such a targeting strategy. While acknowledging that current policy and practice regarding ongoing and recent crony attacks are properly mired in secrecy, this paper investigates the case of crony attack against the Slobodan Milosevic regime during Operation Allied Force in 1999. The damage to capital-producing facilities, controlled by key political supporters of Milosevic and his wife, eventually incited those supporters to push for policy change and an end to the war.
Chapter 1 - Introduction * Chapter 2 - Background * Chapter 3 - Theory of Crony Attack * Chapter 4 - Strategy of Crony Attack * Chapter 5 - Operation Allied Force: A Case Study * Chapter 6 - Conclusions

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. As a strategy, crony attack targets key elite supporters of an enemy leader to effect policy change in the attacker's favor. It is also one of a set of tools used in coercive diplomacy. Other tools include economic sanctions and information operations. To properly and efficiently leverage the potentially powerful mechanism of crony attack demands coordination among those responsible for wielding the military, diplomatic, economic, and informational instruments of national power.
This thesis describes crony attack, comments on requirements for successful development of crony attack methodology, and investigates a prominent case where the United States apparently used this strategy. This thesis treats crony attack primarily as a form of strategic attack, carried out during the air campaign portion of military operations. It also outlines a theoretical foundation for such a targeting strategy. While acknowledging that current policy and practice regarding ongoing and recent crony attacks are properly mired in secrecy, this paper investigates the case of crony attack against the Slobodan Milosevic regime during Operation Allied Force in 1999. The damage to capital-producing facilities, controlled by key political supporters of Milosevic and his wife, eventually incited those supporters to push for policy change and an end to the war.
Chapter 1 - Introduction * Chapter 2 - Background * Chapter 3 - Theory of Crony Attack * Chapter 4 - Strategy of Crony Attack * Chapter 5 - Operation Allied Force: A Case Study * Chapter 6 - Conclusions

More books from Progressive Management

Cover of the book The Archer's Tale: An Examination of English Archers During the Hundred Years War and Their Impact on Warfare and Society - Medieval England's Use of Large Infantry Formations with Longbows by Progressive Management
Cover of the book Air National Guard (ANG) Structure for the Twenty-first Century: The Multimission Framework for Total Force Integration - ANG History and Culture, Why Does the Governor Need Fighter Airplanes by Progressive Management
Cover of the book The Big L: American Logistics in World War II - Industrial Mobilization, Acquisition, Infrastructure Building Victory's Foundation, Lend Lease, Pacific Theater, European Materiel Battle, War History by Progressive Management
Cover of the book Haiti in Perspective - Orientation Guide and Cultural Orientation: Geography, History, Economy, Religion, Customs, Duvalier, Vodou (Voodoo), Aristide, Catholicism, Port-au-Prince, Windward Passage by Progressive Management
Cover of the book Case Studies in the Use of Land-Based Aerial Forces in Maritime Operations, 1939-1990: Battle of the Atlantic, Arctic Convoys, Dunkirk, Pacific, Repulse Sinking, Falklands War, Cold War, Tanker War by Progressive Management
Cover of the book 21st Century FEMA Course Manuals - Emergency Operation Center (EOC) Design, Operations, Management (IS-275) Policies, Procedures, Glossary, Guide by Progressive Management
Cover of the book Deterrence During Hostilities: A New "Triad" for the Middle East - Strategic Deterrence, Retaliatory, Preemptive, Nuclear, Chemical, Deception, Psychological Operations, Shaping Enemy Expectations by Progressive Management
Cover of the book U.S. Army Medical Correspondence Course: Dairy - Milk, Cream, Fresh Dairy, Yogurt, Homogenization, Pasteurization, Raw Milk, Cheese, Ice Cream, Butter, Manufactured Products by Progressive Management
Cover of the book Bitcoin Digital Currency and Blockchain Technology: Disruptive Computer Technology, Movement of Money, Tokenization of Assets, Mt. Gox, Advanced Cryptographic Signatures, Cyber Security, Banking by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Tactical Employment of Nonlethal Weapons - NLW - FM 90-40 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Analysis of Health Service Support with Frontier Surgeons and Ambulance Corps to 1876 Centennial Campaign: Sheridan's War Against the Sioux and Cheyenne Native American on Indian Hunting Grounds by Progressive Management
Cover of the book Georgia After the Rose Revolution: Geopolitical Predicament and Implications for U.S. Policy - South Ossetia, Central Asia, Transcaucasus, Abkhazia, Transnistria by Progressive Management
Cover of the book Memories of the Golden Age of American Space Flight (Mercury, Gemini, Apollo, Skylab) - Oral Histories of Managers, Engineers, and Workers (Set 2) - Including Lunney, Haney, Kleinknecht, and Kraft by Progressive Management
Cover of the book Mars Wars: The Rise and Fall of the Space Exploration Initiative - President George H. W. Bush, Quayle, Truly, NASA's 90-Day Study, Washington Space Policy Power Struggle over the Moon - Mars Program by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Military Intelligence, Army Lineage Series, Narrative Content - World War I and II, Korea War, Vietnam War, and Beyond by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy