Crony Attack: Strategic Attack's Silver Bullet? Targeting Key Elite Supporters of an Enemy Leader - Operation Allied Force, Slobodan Milosevic, Yugoslavia, RICO, Kleptocracies, Coercive Air Strategy

Nonfiction, History, Asian, Former Soviet Republics, Military, Aviation
Cover of the book Crony Attack: Strategic Attack's Silver Bullet? Targeting Key Elite Supporters of an Enemy Leader - Operation Allied Force, Slobodan Milosevic, Yugoslavia, RICO, Kleptocracies, Coercive Air Strategy by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370818471
Publisher: Progressive Management Publication: September 23, 2016
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370818471
Publisher: Progressive Management
Publication: September 23, 2016
Imprint: Smashwords Edition
Language: English

This important report has been professionally converted for accurate flowing-text e-book format reproduction. As a strategy, crony attack targets key elite supporters of an enemy leader to effect policy change in the attacker's favor. It is also one of a set of tools used in coercive diplomacy. Other tools include economic sanctions and information operations. To properly and efficiently leverage the potentially powerful mechanism of crony attack demands coordination among those responsible for wielding the military, diplomatic, economic, and informational instruments of national power.
This thesis describes crony attack, comments on requirements for successful development of crony attack methodology, and investigates a prominent case where the United States apparently used this strategy. This thesis treats crony attack primarily as a form of strategic attack, carried out during the air campaign portion of military operations. It also outlines a theoretical foundation for such a targeting strategy. While acknowledging that current policy and practice regarding ongoing and recent crony attacks are properly mired in secrecy, this paper investigates the case of crony attack against the Slobodan Milosevic regime during Operation Allied Force in 1999. The damage to capital-producing facilities, controlled by key political supporters of Milosevic and his wife, eventually incited those supporters to push for policy change and an end to the war.
Chapter 1 - Introduction * Chapter 2 - Background * Chapter 3 - Theory of Crony Attack * Chapter 4 - Strategy of Crony Attack * Chapter 5 - Operation Allied Force: A Case Study * Chapter 6 - Conclusions

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important report has been professionally converted for accurate flowing-text e-book format reproduction. As a strategy, crony attack targets key elite supporters of an enemy leader to effect policy change in the attacker's favor. It is also one of a set of tools used in coercive diplomacy. Other tools include economic sanctions and information operations. To properly and efficiently leverage the potentially powerful mechanism of crony attack demands coordination among those responsible for wielding the military, diplomatic, economic, and informational instruments of national power.
This thesis describes crony attack, comments on requirements for successful development of crony attack methodology, and investigates a prominent case where the United States apparently used this strategy. This thesis treats crony attack primarily as a form of strategic attack, carried out during the air campaign portion of military operations. It also outlines a theoretical foundation for such a targeting strategy. While acknowledging that current policy and practice regarding ongoing and recent crony attacks are properly mired in secrecy, this paper investigates the case of crony attack against the Slobodan Milosevic regime during Operation Allied Force in 1999. The damage to capital-producing facilities, controlled by key political supporters of Milosevic and his wife, eventually incited those supporters to push for policy change and an end to the war.
Chapter 1 - Introduction * Chapter 2 - Background * Chapter 3 - Theory of Crony Attack * Chapter 4 - Strategy of Crony Attack * Chapter 5 - Operation Allied Force: A Case Study * Chapter 6 - Conclusions

More books from Progressive Management

Cover of the book The Declaration of War: One for the History Books? War Powers Resolution (WPR), Constitutional Provisions, War in Iraq, Modern Warfare and Conflicts, Commitment of U.S. Troops, War-Making Powers by Progressive Management
Cover of the book The Necessity for the Military Assistance Command: Vietnam Studies and Observations Group - MACVSOG Psychological Warfare, Maritime Interdiction, Recon Patrols, and Personnel Recovery Missions by Progressive Management
Cover of the book Nuclear Weapons: Containment of Underground Nuclear Explosions, Seismic Verification of Nuclear Testing Treaties, Environmental Monitoring to Verify Nuclear Nonproliferation Treaties by Progressive Management
Cover of the book Creating Paths of Change: Under What Conditions Can Special Operations be the Supported Command? Irregular and Unconventional Warfare Command and Control Involving SOF Special Forces by Progressive Management
Cover of the book The Story of Davis-Monthan Air Force Base 1940: 1976, Strategic Air Command, B-29, B-50, U-2, A-10, Lucky Lady II, Tactical Air Command, F-4C Fighter, Tucson Arizona Community, Aircraft Storage by Progressive Management
Cover of the book Al-Qaida, the Tribes, and the Government: Lessons and Prospects for Iraq's Unstable Triangle, Middle East Studies Paper, al-Qaeda, the Awakening by Progressive Management
Cover of the book Reclamation: Managing Water in the West - The Bureau of Reclamation: Origins and Growth to 1945, Volume 1 - Part 2 - Great Depression, Glen Canyon Dam, Colorado River, Hoover Dam, Indian Land by Progressive Management
Cover of the book U.S. Military Deployments to Africa: Lessons from the Hunt for Joseph Kony and the Lord's Resistance Army (LRA) - Uganda, Sub-Saharan Africa, Special Operations (SOF), People's Liberation Army (SPLA) by Progressive Management
Cover of the book Historical and Architectural Overview of Aircraft Hangars of the Reserves and National Guard Installations from World War I through the Cold War: History of Aviation in National Guard, Vietnam by Progressive Management
Cover of the book 2015 Complete Guide to al-Qaeda in Yemen: Al Qaida in the Arabian Peninsula, AQAP, Anwar al-Awlaki, Online Radicalization, U.S. Strategy, Drones, Tribal Militias, Yemeni Government, Ansar al-Sharia by Progressive Management
Cover of the book A-10 Thunderbolt II (Warthog) Systems Engineering Case Study - Close Air Support (CAS) Aircraft by Progressive Management
Cover of the book Keeping Special Forces Special: Regional Proficiency in Special Forces (SOF) - Evolution of Commando and Warrior Diplomat Roles, Language and Culture Needs Assessment, Foreign Area Officer Standard by Progressive Management
Cover of the book Pursuit of Power: NASA's Propulsion Systems Laboratory (PSL) No. 1 and 2 - NACA, Aircraft Engine Research, Cold War Research, Nuclear Navaho, Rockets, Missiles, RL-10 Hydrogen Engine, Supersonic by Progressive Management
Cover of the book Programmatic Integration of Cyber into the Institutional Domain of Leader Development: Cyberspace and Computer Curriculum in Army Learning Institutions, Comparing Cyber to Armor or Aviation by Progressive Management
Cover of the book Air Force Doctrine Document 3-05, Special Operations - USAF Special Operations Forces (AFSOF), Special Ops Legacy, Air Commandos, Agile Combat Support, Mayaguez Incident by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy