scispace - formally typeset
Search or ask a question
Author

Fred Kaplan

Bio: Fred Kaplan is an academic researcher. The author has contributed to research in topics: Single Integrated Operational Plan & Cyberwarfare. The author has an hindex of 8, co-authored 13 publications receiving 851 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The untold story of the small group of men who have devised the plans and shaped the policies on how to use the bomb is explored in this article, which explores the secret world of these strategists of the nuclear age and brings to light a chapter in American political and military history never before revealed.
Abstract: This is the untold story of the small group of men who have devised the plans and shaped the policies on how to use the Bomb. The book (first published in 1983) explores the secret world of these strategists of the nuclear age and brings to light a chapter in American political and military history never before revealed.

283 citations

Book
01 Jan 1983
TL;DR: The untold story of the small group of men who have devised the plans and shaped the policies on how to use the bomb is explored in this paper, which explores the secret world of these strategists of the nuclear age and brings to light a chapter in American political and military history never before revealed.
Abstract: This is the untold story of the small group of men who have devised the plans and shaped the policies on how to use the Bomb. The book (first published in 1983) explores the secret world of these strategists of the nuclear age and brings to light a chapter in American political and military history never before revealed.

252 citations

Book
02 Jan 2013
TL;DR: In this paper, the authors show how a small group of soldiers and scholars did have a plan for fighting these kinds of wars, people like General David Petraeus and Colonels John Nagl, David Kilcullen, and H.R. McMaster.
Abstract: THE INSURGENTS unfolds against the backdrop of two wars waged against insurgencies-- wars which the Pentagon's top generals didn't know how to fight. But a small group of soldiers and scholars did have a plan for fighting these kinds of wars, people like General David Petraeus and Colonels John Nagl, David Kilcullen, and H.R. McMaster. In order to push the idea of "counterinsurgency" warfare, they behaved like insurgents within their own army-and very self-consciously so. Fred Kaplan explains where this idea came from, and how the men and women who latched onto this idea created a community (some would refer to themselves as a "cabal") that maneuvered the idea through the highest echelons of power. But this is also a cautionary tale about how even creative ideas can harden into dogma, how smart strategists-the "best and the brightest" of our times-can sometimes sway politicians but don't always win wars. The Insurgents made their military more adaptive to the conflicts of the post-Cold War era, but their self-confidence led us deeper into wars that we shouldn't have been fighting and perhaps couldn't have been won.

90 citations

Book
01 Mar 2016
TL;DR: The Secret History of Cyber War as discussed by the authors is a history of cyber-war that explores the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the information warfare squads of the military services, and the national security debates in the White House.
Abstract: A book that grips, informs, and alarms, finely researched and lucidly related. John le Carr As cyber-attacks dominate front-page news, as hackers join terrorists on the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War, by Slate columnist and Pulitzer Prizewinning journalist Fred Kaplan. Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the "information warfare" squads of the military services, and the national security debates in the White House, to tell this never-before-told story of the officers, policymakers, scientists, and spies who devised this new form of warfare and who have been planningand (more often than people know) fightingthese wars for decades. From the 1991 Gulf War to conflicts in Haiti, Serbia, Syria, the former Soviet republics, Iraq, and Iran, where cyber warfare played a significant role, Dark Territory chronicles, in fascinating detail, a little-known past that shines an unsettling light on our future.

77 citations

Journal ArticleDOI

55 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: Through a human centered design project focused on an information science problem, students will gain experience and a better understanding of the process to develop an innovative solution addressing a societal need.
Abstract: Courses IS 100 Exploring the iSchool with a Human-Centered Lens credit: 1 Hour. (https://courses.illinois.edu/schedule/terms/IS/100/) This course introduces students to the School of Information Sciences (iSchool). Students will explore career and professional development within information sciences, building their leadership and collaborative skills, and building a network within and beyond the iSchool. Through a human centered design project focused on an information science problem, students will gain experience and a better understanding of the process to develop an innovative solution addressing a societal need. Prerequisite: Restricted to Majors Only; First Semester Freshman, Intercollegiate and Off-Campus Transfer Students Only.

1,029 citations

Journal ArticleDOI
TL;DR: A survey of the evolution of security studies, focusing on recent developments in the field can be found in this article, which provides a guide to the current research agenda and some practical lessons for managing the field in the years ahead.
Abstract: This article examines the evolution of security studies, focusing on recent developments in the field. It provides a survey of the field, a guide to the current research agenda, and some practical lessons for managing the field in the years ahead. Security studies remains an interdisciplinary enterprise, but its earlier preoccupation with nuclear issues has broadened to include topics such as grand strategy, conventional warfare, and the domestic sources of international conflict, among others. Work in the field is increasingly rigorous and theoretically inclined, which reflects the marriage between security studies and social science and its improved standing within the academic world. Because national security will remain a problem for states and because an independent scholarly community contributes to effective public policy in this area, the renaissance of security studies is an important positive development for the field of international relations.

842 citations

01 Jan 2008
TL;DR: LaRonde as mentioned in this paper analyzes the conflict in Xinjiang and concludes that the Chinese continue to defeat the separatist movement through a strategy that counters Mao's seven fundamentals of revolutionary warfare, concluding that Mao, as well as the communist leaders who followed him, was also successful at waging protracted counterinsurgency.
Abstract: PROTRACED COUNTERINSURGENCY: CHINESE COIN STRATEGY IN XINJIANG by MAJ J. Scott LaRonde, USA, 95 pages. In 1949, following the conclusion of its revolutionary war against the Chinese Nationalist forces, the People’s Liberation Army (PLA) peacefully occupied China’s western most province of Xinjiang. For nearly sixty years, the PLA has conducted a counterinsurgency against several, mostly Uyghur-led, separatist movements. Despite periods of significant violence, particularly in the early 1950s and again in the 1990s, the separatist forces have not gained momentum and remained at a level one insurgency. Mao ZeDeng is revered as a master insurgent and the father of Fourth Generation Warfare. Strategists in armies worldwide study his writings on revolutionary and guerilla warfare. This monograph concludes that Mao, as well as the communist leaders who followed him, was also successful at waging protracted counterinsurgency. For nearly sixty years, separatist movements in Xinjiang, Tibet, and Taiwan have all failed. This monograph analyzes the conflict in Xinjiang and concludes that the Chinese continue to defeat the separatist movement in Xinjiang through a strategy that counters Mao’s seven fundamentals of revolutionary warfare.

773 citations

Book
01 Jan 2009
TL;DR: A survey of the literature and institutions of International Security Studies (ISS) can be found in this paper, along with a detailed institutional account of ISS in terms of its journals, departments, think tanks and funding sources.
Abstract: International Security Studies (ISS) has changed and diversified in many ways since 1945. This book provides the first intellectual history of the development of the subject in that period. It explains how ISS evolved from an initial concern with the strategic consequences of superpower rivalry and nuclear weapons, to its current diversity in which environmental, economic, human and other securities sit alongside military security, and in which approaches ranging from traditional Realist analysis to Feminism and Post-colonialism are in play. It sets out the driving forces that shaped debates in ISS, shows what makes ISS a single conversation across its diversity, and gives an authoritative account of debates on all the main topics within ISS. This is an unparalleled survey of the literature and institutions of ISS that will be an invaluable guide for all students and scholars of ISS, whether traditionalist, ‘new agenda’ or critical. • The first book to tell the post-1945 story of International Security Studies and offer an integrated historical sociology of the whole field • Opens the door to a long-overdue conversation about what ISS is and where it should be going • Provides a detailed institutional account of ISS in terms of its journals, departments, think tanks and funding sources

579 citations

Book
01 Jan 1999
TL;DR: Weldes as discussed by the authors analyzes the 1962 Cuban missile crisis as a means to rethink the idea of national interest, a notion central to both the study and practice of international relations, and shows how this process allowed for a redefining of the identities, interests and likely actions of various states, so that it seemed to logically serve the U.S. national interest in removing the missiles from Cuba.
Abstract: Not simply an "event" or merely an "incident, " the 1962 standoff between the United States and the Soviet Union over missiles in Cuba was a crisis, which subsequently has achieved almost mythic significance in the annals of U.S. foreign policy. Jutta Weldes asks why this occurrence in particular should be cast as a crisis, and how this so significantly affected "the national interest." Here, Weldes analyzes the so-called Cuban missile crisis as a means to rethink the idea of national interest, a notion central to both the study and practice of international relations.Why did the presence of Soviet missiles in Cuba constitute a crisis for U.S. state officials and thus a dire threat to U.S. national interests? It was, Weldes suggests, more a matter of discursive construction than of objective facts or circumstances. Drawing on social theory and on concepts from cultural studies, she exposes the "realities" of the crisis as social creations in the service of a particular and precarious U.S. state identity defined within the Cold War U.S. "security imaginary." Constructing National Interests shows how this process allowed for a redefining of the identities, interests, and likely actions of various states, so that it seemed to logically serve the U.S. national interest in removing the missiles from Cuba.

301 citations