ABSTRACT

Before getting down to the brass tacks of this paper, a case description of concrete experience in implementing what may be called social engineering in a military setting, I would like to make two general introductory comments.