Crony Attack: Strategic Attack's Silver Bullet? Targeting Key Elite Supporters of an Enemy Leader - Operation Allied Force, Slobodan Milosevic, Yugoslavia, RICO, Kleptocracies, Coercive Air Strategy

Nonfiction, History, Asian, Former Soviet Republics, Military, Aviation
Cover of the book Crony Attack: Strategic Attack's Silver Bullet? Targeting Key Elite Supporters of an Enemy Leader - Operation Allied Force, Slobodan Milosevic, Yugoslavia, RICO, Kleptocracies, Coercive Air Strategy by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370818471
Publisher: Progressive Management Publication: September 23, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370818471
Publisher: Progressive Management
Publication: September 23, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. As a strategy, crony attack targets key elite supporters of an enemy leader to effect policy change in the attacker's favor. It is also one of a set of tools used in coercive diplomacy. Other tools include economic sanctions and information operations. To properly and efficiently leverage the potentially powerful mechanism of crony attack demands coordination among those responsible for wielding the military, diplomatic, economic, and informational instruments of national power.
This thesis describes crony attack, comments on requirements for successful development of crony attack methodology, and investigates a prominent case where the United States apparently used this strategy. This thesis treats crony attack primarily as a form of strategic attack, carried out during the air campaign portion of military operations. It also outlines a theoretical foundation for such a targeting strategy. While acknowledging that current policy and practice regarding ongoing and recent crony attacks are properly mired in secrecy, this paper investigates the case of crony attack against the Slobodan Milosevic regime during Operation Allied Force in 1999. The damage to capital-producing facilities, controlled by key political supporters of Milosevic and his wife, eventually incited those supporters to push for policy change and an end to the war.
Chapter 1 - Introduction * Chapter 2 - Background * Chapter 3 - Theory of Crony Attack * Chapter 4 - Strategy of Crony Attack * Chapter 5 - Operation Allied Force: A Case Study * Chapter 6 - Conclusions

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. As a strategy, crony attack targets key elite supporters of an enemy leader to effect policy change in the attacker's favor. It is also one of a set of tools used in coercive diplomacy. Other tools include economic sanctions and information operations. To properly and efficiently leverage the potentially powerful mechanism of crony attack demands coordination among those responsible for wielding the military, diplomatic, economic, and informational instruments of national power.
This thesis describes crony attack, comments on requirements for successful development of crony attack methodology, and investigates a prominent case where the United States apparently used this strategy. This thesis treats crony attack primarily as a form of strategic attack, carried out during the air campaign portion of military operations. It also outlines a theoretical foundation for such a targeting strategy. While acknowledging that current policy and practice regarding ongoing and recent crony attacks are properly mired in secrecy, this paper investigates the case of crony attack against the Slobodan Milosevic regime during Operation Allied Force in 1999. The damage to capital-producing facilities, controlled by key political supporters of Milosevic and his wife, eventually incited those supporters to push for policy change and an end to the war.
Chapter 1 - Introduction * Chapter 2 - Background * Chapter 3 - Theory of Crony Attack * Chapter 4 - Strategy of Crony Attack * Chapter 5 - Operation Allied Force: A Case Study * Chapter 6 - Conclusions

More books from Progressive Management

Cover of the book 21st Century U.S. Military Documents: Space Air Force Policy Directives and Instructions - Space Launch Operations, Space Test Program (STP), Launch Vehicle Return to Flight by Progressive Management
Cover of the book Aces and Aerial Victories: U.S. Air Force in Southeast Asia 1965-1973 - Detailed History of Vietnam Air War, Dramatic Aerial Combat Tales of Heroes, F-4, F-105, Enemy MIG Fighter Planes, B-52 Gunners by Progressive Management
Cover of the book The Spoken Word III: Recollections of Dryden's History - The Space Shuttle Years - Oral Histories from Major NASA Figures including Gordon Fullerton, Joseph Engle, Kenneth Szalai by Progressive Management
Cover of the book Lord's Resistance Army (LRA) and Joseph Kony: American Efforts to Counter the LRA in Central Africa, Uganda, Central African Republic (CAR), Congo, and South Sudan by Progressive Management
Cover of the book CIA Sherman Kent Center for Intelligence Analysis Papers: Practice of Analytic Tradecraft in the Directorate of Intelligence, Transnational Threats, Profession of Intelligence Analysis by Progressive Management
Cover of the book Histories of the Soviet / Russian Space Program: Volume 2: Soviet Space Programs 1971 - Kosmos, Lunokhod, Salyut, Soyuz, Zond, FOBS, Military Satellites, Mars Attempts, Tracking Ships by Progressive Management
Cover of the book Deliberate Force: A Case Study in Effective Air Campaigning - Final Report of the Air University Balkans Air Campaign Study - Demise of Yugoslavia, Destruction of Bosnia, Tactics, Aircraft, Weapons by Progressive Management
Cover of the book Project Gemini: A Technical Summary and Report - Extraordinary Detail of the Spacecraft, Test Program, Flight Performance, Systems, Mission Planning, and Experiments of America's Second Manned Program by Progressive Management
Cover of the book Sustainment of Expeditionary Forces in the Pacific Theater During the Second World War: The Development of the Advanced Base and Mobile Base Programs and Their Relevance Today - Sea Basing, Logistics by Progressive Management
Cover of the book Iraq Handbook: Provincial Reconstruction Team (PRT) - Observations, Insights, and Lessons, including Provincial Data and Guide to Provinces by Progressive Management
Cover of the book India in Perspective: Orientation Guide and Gujarati, Hindi, Kashmiri, Punjabi, Telegu Cultural Orientation: Geography, History, Economy, Security, Sikh, Gandhi, Nehru, Ganges, Delhi, Mumbai, Indus by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: The Manual for Military Commissions (MMC) - Prosecution of Alien Unlawful Enemy Combatants, Rules of Evidence, Crimes (Value-added Professional Format Series) by Progressive Management
Cover of the book 21st Century Hepatitis C (HCV) Sourcebook: Clinical Data for Patients, Families, and Physicians - Cirrhosis, Hepatocellular Carcinoma (HCC), Liver Transplants, New Medications by Progressive Management
Cover of the book Counterinsurgency Leadership in Afghanistan, Iraq, and Beyond: David Petraeus, Paula Broadwell, COIN, Commands, Officer Development, Generalship, Winning in Afghanistan by Progressive Management
Cover of the book Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy