Posts

The Top 10 Space Opera books or series of all time

Well, we did it, folks. Together with votes on this blog and on the Discover Sci-Fi Facebook group you nominated, discussed, and voted for the top Space Opera books (or series). This poll had some heated debate over on the Facebook group about what books should count as Space Opera!

Now, ordered from 10th to the very top Space Opera book, we present the top 10 selections for the best Space Opera books and series of all time.

Click on the links to check out the books featuring these favorites to add to your collection, and then add your comments at the bottom of this post (or in our Facebook group) to let us know if you agree (or not!).

Want to see who didn't make the cut? Click here to view the original poll that inspired this list.

*The results were decided by you based on votes tallied up between our Facebook group and on our blog.


10. Hyperion Cantos by Dan Simmons

The title of this series comes from the first two books, Hyperion and The Fall of Hyperion. It now refers to the 4 book series, and some short stories. Several of the books have won awards, including the Hugo, Locus, and British Science Fiction Association Awards, and the series has been nominated for various science fiction awards.

The story arc of the series at first follows the stories of travelers on a pilgrimage to the Time Tombs on Hyperion to a creature called Shrike. Some worship it, some want to destroy it. It is Armageddon, and the entire galaxy is at war.

The first two books are influenced by The Canterbury Tales and the poetry of John Keats (in the form of dreams of John Keats), respectively. Later, in the third and then fourth book, the story jumps forward in time and deals more focusedly on a few characters as they encounter various futuristic religious complications.

Click here to find Hyperion on Amazon.


9. Old Mans War by John Scalzi

Old Man's War is a six-book, military space opera series and an extra short fiction. Each book is set in the same world, but follows a different main character.

It starts with John Perry, a 75-year old whose wife has just passed and he has become a volunteer recruit for the Colonial Defense Forces who protect human interplanetary colonists. He joins other retirees who all obtain souped-up bio-tech younger bodies to fight the war. The story follows Perry's tale from recruit through battles and challenges to his eventual promotion as captain.

Although each book is unique, the world-building links the tales together and is really phenomenal at developing a vivid world out there.

Click here to find the first book in the series, Old Man's War, on Amazon.


8. The Culture Series by Iain M. Banks

The Culture series gets its name from an extremely advanced, post-scarcity society called The Culture comprised of various humanoid races and AIs. There is little need for laws or enforcement since there are no dramatic needs such as food, or work. The members live in spaceships and other off-planet constructs. However, The Culture is just one of several “Involved” civilizations that take an active part in galactic affairs. And the differences between these civilizations has landed them in inter-galactic warfare.

The first book in the series, Consider Phlebas introduces readers to the utopian conglomeration of human and alien races that explores the nature of war, morality, and the limitless bounds of mankind's imagination. The book follows the story of a shapechanging agent of the Iridans during the Culture-Iridan war, who undertakes a clandestine mission to a forbidden planet in search of an intelligent, fugitive machine whose actions could alter the course of the conflict.

Click here to find the first book in the series, Consider Phlebas, on Amazon.


7. The Vorkosigan Saga by Lois McMaster Bujold

The Vorkosigan Saga is a series of 30-publications and counting, including novels and a few shorter stories. While it is a series, each book is written intended to be a stand-alone piece, so a reader could theoretically jump in anywhere. Works in the series have received numerous awards and nominations, including five Hugo award wins including one for Best Series. The order of recommended reading is a bit up for debate since the chronology of publication does not follow the internal chronology of the Vorkosigan world. The author recommends reading the books in order of the internal chronology. So that's probably the best place to start!

The stories feature different planetary systems in the “Vorkosiverse,” a galaxy colonized by humans. The stories feature several planetary systems, each with its own political organization, including government by corporate democracy, rule by criminal corporations, monarchies, empires and direct democracies. The main character viewpoints include a diverse set of characters including several women, a gay man, a pair of brothers, one of whom is physically handicapped and the other a clone, and others.

According to the internal chronology, the first book is Falling Free. It has about four to five character points of view, but mainly follows Leo, a teaching engineer, and his students, the Quaddies (who have an extra set of arms instead of legs), a genetically modified species of humans designed to function in zero gravity environments. The students are not treated as full humans, and have been raised as such. When the company that owns the Quaddies abandons them, Leo has to decide how, and whether to, save them.

For the first book in the internal chronology of the Vorkosigan Saga, Falling Free, click here.


6. The Expanse series, by James S.A. Corey

The Expanse is a series of (so far…) eight science fiction novels (and related novellas and short stories) by James S. A. Corey, the joint pen name of authors Daniel Abraham and Ty Franck. The first novel, Leviathan Wakes, was nominated for a Hugo Award and Locus Award and the series as a whole was nominated for the Best Series Hugo Award in 2017.

Leviathan Wakes introduces Captain James Holden, his crew, and Detective Miller. When they are confronted with a case of a single missing girl they realize it leads to a solar-system-wide conspiracy. With fantastic character development and truly Space Opera-tic levels of adventure, it seems almost cinematic. And indeed, the book was turned into an Amazon Prime Original series!

Click here to find the first book in the Expanse series, Leviathan Wakes on Amazon.


5. Ender's Game by Orson Scott Card

Ender's Game is the first book in a quartet, but can definitely be read as a stand-alone book. It actually originated as a short story by the same name, in 1977, and became a book in 1985, updated again in 1991 to reflect contemporary political events. It has won the Hugo and Nebula awards and has been developed into a somewhat controversial film, as well as into two comic book series.

The first book, Ender's Game, follows the story of a boy, Ender, who is selected to go up into space for a the training program, Battle School. He, and other boys, are put through a variety of technically challenging “games” during which Ender's prowess as an analyzing and creative leader is revealed. Battle School prepares them to fight the war against the “Buggers,” an undergoing war which they might be close to losing…

Click here to find Ender's Game on Amazon.


4. Lensman series by E.E. “Doc” Smith

The Lensman series, written by Edward Elmer “Doc” Smith, is a six-book series (plus sequel) that was a runner-up for the 1966 Hugo award for Best All-Time Series.

E.E. “Doc” Smith is sometimes referred to as “the father of space opera” because of this series. It is a truly remarkable world-building saga. It opens with the book Tripleplanetary in which a inhabitants of the planet Nevia descend on earth to loot it of iron. After destroying the city of Pittsburgh the Nevians head home with with three human specimens in its hold. Among them is Conway Costigan, an undercover intelligence operative for the Triplanetary Patrol. From deep within the bowels of the enemy ship, Costigan must do the impossible: find a way to defeat the Nevians before every man, woman, and child on Earth is annihilated.

Find Tripleplanetary, and the rest of the Lensman series here on Amazon.


3. Dune by Frank Herbert

The Hugo and Nebula award-winning book Dune is the first of many Dune books (you can find the full list and order here). It started in 1965, and after the original author, Frank Herbert, died in in 1986, his son, Brian Herbert, and science fiction author Kevin J. Anderson published a number of prequel novels, as well as two which complete the original Dune series. It has been adapted to film and TV multiple times, and is currently under development as a film by Warner Bros. which will be released in November 2020.

In the first novel, Dune, noble families of the distant future control fiefs of an inhopsitable planet, Arrakis, covered in sand dunes. A drug called “spice melange” is the only substance of value and is coveted across the universe. Through sabotage and treachery some nobles cast young Duke Paul Atreides out into the planet's harsh environment to die. He doesn't die, however, and grows up with a tribe of desert dwellers who become the basis of the army with which he will reclaim what's rightfully his. As he grows up, he realizes he has unique powers, and appears to be the end product of a very long-term genetic experiment designed to breed a super human. He might even be a messiah…

You can find the start of the Dune saga on Amazon here.


2. Blood on the Stars series by Jay Allan

The most recent Blood on the Stars book, The Colossus, was just released in April 2019, and the next one, The Others is coming out this month!

One of the best things about this series is that the cast of characters is so well developed that even some of the “bad guys” are characters you want to root for. The series opens with Duel in the Dark which introduces the leaders of opposing captains of space battleships. It is a heavy, gritty, emotional read. When the exhausted crew of the Confederation battleship Dauntless are sent to the Far Rim as the sole assistance to a distress call out there, captain Barron knows it is his sole responsibility to stop the attack at the disputed border and to win victory to prove his worth as the lineage of a family of heroes.

You can find book one of the Blood on the Stars book Duel in the Dark on Amazon here, or the first three books in a three box set, here.


1. Honor Harrington series by David Weber

And the number one, all time best space opera as selected by DiscoverSciFi readers is the Honor Harrington series! Otherwise known as The Honorverse, most of the more than 20 novels and anthology collections cover events between 4000 and 4022 AD. Much of the series' political drama follows that of Europe's political scene from the 1500's to 2000's.

The first book, On Basilisk Station, follows Commander Honor Harrington and Her Majesty’s light cruiser Fearless during their assignment to the Basilisk system. Actually, Honor Harrington has been essentially exiled to the Basilisk, her crew is annoyed with her, and her ship is aged and can hardly be expected to police an entire star system. As much as the Basilisk system was supposed to be a less-than-interesting punishment assignment, it turns out to be a bit of a linch pin in a the aggressive plans of the Haven Republic. And the only one in position to stop them is Honor Harrington and her crew.

You can find book one of the Honor Harrington series, On Basilisk Station on Amazon here.


The space opera genre is full of great, mainly military series, and not everyone agrees on what exactly fits into the category. What do you think? Did you agree with all of the books chosen on this list? Join us here in our Facebook group to chime in on the debate, and then check out our most recent poll while you're there. Don't have Facebook? You can share your views in the comments below.

*Some book-related copy in this post was pulled from Amazon & Wikipedia.

How Space and Cyberspace are Merging in the 21st Century Battlefield

CYBERSPACE AND OUTER space are merging to become the primary battlefield for global power in the 21st century. Both space and cyberspace systems are critical in enabling modern warfare—for strike precision, navigation, communication, information gathering—and it therefore makes sense to speak of a new, combined space-cyberspace military high-ground. From the moment Sputnik was launched in 1957, and everyone’s head turned skyward, space has occupied the military high-ground, defining much of the next fifty years of global geopolitics. Space-based systems, for the first time, broke the link between a nation’s physical territory and its global ability to gather information, communicate, navigate, and project power.

In the 1980’s, the rise of information and communications technology enabled the creation of the internet and what we’ve come to call cyberspace, a loosely-defined term that encompasses the global patchwork collection of civilian, government and military computer systems and networks. For the same reasons that space came to occupy the military high-ground—information gathering, navigation, communication—cyberspace is now taking center stage.

From a terrestrial point of view, space-based systems operate in a distant realm, but from a cyber point of view, space systems are no different than terrestrial ones. In the last decade, there has been a seamless integration of the internet into space systems, and communications satellites are increasingly internet-based. One can make the case that that space systems are now a part of cyberspace, and thus that space doctrine in the future will be heavily dependent upon cyber doctrine. The argument can also be made that cyberspace, in part, exists and rests upon space-based systems. Cyberspace is still based in the physical world, in the data processing and communications systems that make it possible. In the military domain, cyberspace is heavily reliant on the physical infrastructure of space-based systems, and is therefore subject to some of the same threats.

Space and cyberspace have many similarities. Both are entirely technological domains that only exist due to advanced technology. They are new domains of human activity created by, and uniquely accessible through, sophisticated technology. Both are vigorous arenas for international competition, the outcomes of which will affect the global distribution of power. It is no coincidence that aspiring powers are building space programs at the same time as they are building advanced cyber programs.

Space and cyberspace are both seen as a global commons, domains that are shared between all nations. For most of human history, the ability of one group of humans to influence another was largely tied to control of physical territory. Space and cyberspace both break this constraint, and while there is a general common interest to work cooperatively in peace, there has inevitably been a militarization in both domains. As with any commons, over time they will become congested, and new rules will have to be implemented to deal with this.

Congestion and disruption are problems in both space and cyberspace. Ninety percent of email is spam, and a large proportion of traffic over any network is from malware, which clogs up and endangers cyberspace. Cyberattacks are now moving from email as the primary vector, to using customized web applications using tools such as the Blackhole automated attack toolkit. Cyberattack by nation-states is now joining the criminal use of spam, viruses, Trojans and worms as deliberate attempts to attack and disrupt cyberspace.

The congestion analogy in space is that entire orbital regions can become clogged with debris. Tens of thousands of objects, from satellites and booster rockets to smaller items as nuts and bolts, now clog the orbital space around Earth. The danger of this was dramatically illustrated when an Iridium satellite was destroyed when it was hit by a discarded Russian booster in February of 2009. The situation can be made dramatically worse by purposely creating debris fields, as the Chinese did when they conducted an anti-satellite test in 2007 using a kinetic kill. Over time, entire orbital regions could become unusable.

Another similarity is that while traditional the air-sea-land domains are covered under the UN—Law of the Sea, Arctic, Biodiversity—outer space and cyberspace still operate under ad-hoc agreements mostly outside of UN frameworks. They both expand the range of human activity far in advance of laws and rules to cover the new areas being used and explored. Because space can be viewed as a sub-domain of cyberspace, any new rules brought into effect to govern cyberspace, will also affect outer space.

If there are many similarities between space and cyberspace, there are some critical differences, the most important being that space-based systems require massive capital outlays, while in comparison, cyberspace requires very little. As James Oberg points out in his book Space Power Theory, the most obvious limitation on the exercise of space power is cost, with the astronomical cost of launch first among these. Cyberspace, on the other hand, has a low threshold for entry, giving rise to the reality that governance of an extremely high-cost domain, space systems, will be dictated by rules derived from the comparatively low-cost domain of cyberspace. Space power resides on assumption of exceptionalism, that it is difficult to achieve, giving nations possessing it a privileged role in determining the balance of global power. In contrast, cyberspace, and the ability to conduct cyberwar, is accessible to any nation, or even private organizations or individuals, which have the intent.

Cyberwar has already started, and is beginning to gain in frequency and intensity. To most people, the term cyberwar still has a metaphorical quality, like the War on Obesity, probably because there hasn’t yet been a cyberattack that directly resulted in a large loss of life. Another important defining characteristic of cyberwarfare is the difficulty with attribution. Deterrence is only effective as a military strategy if you can know, with certainty, who it was that attacked you, but in a cyberattack, there is purposeful obfuscation that makes attribution very difficult.

The first cyberattack can be traced back to the alleged 1982 sabotage of the Soviet Urengoy–Surgut–Chelyabinsk natural gas pipeline by the CIA—as a part of a policy to counter Soviet theft of Canadian technology—that resulted in a three-kiloton explosion, comparable to a small nuclear device. Titan Rain is the name the US government gave a series of coordinated cyberattacks against it over a three-year period from 2003 to 2006, and in 2007 Estonia was subject to an intense cyberattack that swamped the information systems of its parliament, banks, ministries, newspapers and broadcasters. In 2011 a series of cyberattacks called Night Dragon were waged against energy grid companies in America. This is significant because of the Aurora Test conducted by Idaho National Laboratory in 2007, where a 21-line package of software code, injected remotely, caused a large commercial electrical generator to self-destruct by rapidly recycling its circuit breakers, demonstrating that cyberattack can destroy electrical infrastructure.

A new breed of sophisticated cyberweapon was revealed when the Stuxnet worm attacked Iran’s Natanz uranium enrichment facilities in June of 2010. It was not the first time that hackers targeted industrial systems, but it was the first discovered malware that subverted industrial systems. Another game-changer was the 2012 Shamoon virus that knocked out 30,000 computers at Saudi Aramco, forcing that company to spend weeks restoring global services. Shamoon was significant because it was specifically design to inflict damage, and was one of the first examples of a military cyberweapon being used against a civilian target. The more recent Wannacry malware attacks in 2017  were reportedly initiated by North Korea and directed to disrupt Western commercial and logistics networks. It is only a matter of time before a cyberweapon targeting space-based systems is unleashed, if it already hasn’t happened.

It is worth it to back up and explore the core issues surrounding internet security. The internet was originally designed as a redundant, self-healing network, the sort of thing that is purposely hard to centrally control. In the late 80’s it evolved into an information-sharing tool for universities and researchers, and in the 90’s it morphed into America’s shopping mall. Now it has become something that is hard, even impossible, to define—so we just call it cyberspace, and leave it at that.

First and foremost, there is the issue that while everyone runs the internet, nobody is really in charge of it. ICANN— The Internet Corporation for Assigned Names and Numbers—exerts some control, but the World Summit on the Information Society (WSIS), convened by UN in 2001, was created because nations around world have become increasingly uneasy that their critical infrastructures, and economies, are dependent on the internet, a medium that they had little control over and no governance oversight. The issue has still not been resolved. To the libertarian-minded creators of the internet, decentralized control is a feature, but to governments trying to secure nuclear power stations and space-based assets, it is a serious flaw. A large part of the problem is that we are trying to use the same internet-based technology for social networking and digital scrap-booking, and use this same technology to control power stations and satellites. Not that long ago, critical systems—space systems, power grid, water systems, nuclear power plants, dams—had their own proprietary technologies that were used to control them, but many of these have been replaced these with internet-based technologies as a cost-savings measure. The consequence is that as a result, now nearly everything can be attacked via the internet.

When it comes to software producers, while they would like their products to be secure from hackers, they have a competing interest in wanting to able to access their software installed on customers’ machines. They want to be able to collect as much information as possible, to sell to third parties or use in their own marketing, and also to want to update new features into their software remotely. Often, this is to install patches to discovered security vulnerabilities, precisely because code is poorly written to begin with, because they realize they can update it later. This backdoor into software is a huge security flaw—one that companies purposely build into their products—and is one that has been regularly exploited by hackers.

There are many consequences to all this.

The first is that, because we use the same internet-based technology to support both the private lives of individuals and operate critical infrastructure, there will be a perpetual balancing act between these two competing interests when it comes to security. Another is that until the general public really sees cybersecurity as a threat, many of the fixable problems will not be addressed, such as setting international prohibitions on cyberespionage—making them comparable in severity to physical incursions into the physical sovereign space of a nation-state—or forcing software companies to get serious about secure coding practices and eliminating backdoors into their products.

Because of the extremely high value of space-based assets, and because they are already a seamless part of cyberspace, when a major cyber conflict does emerge, space systems will be primary targets for cyberattack. Even if space systems are not directly attacked, they may be affected. There can be no known blast radius to a cyberweapon when it is unleashed. Even the Stuxnet worm, which was highly targeted in several ways, still infected other industrial control systems around the world, causing untold collateral damage.

A more difficult threat to consider than simply denying access or service to a space system through cyberattack is the problem of integrity. In the cybersecurity world, the three things to protect are confidentiality (keeping something secret, and being able to verify this), availability, and integrity of data. Integrity is by far the hardest to protect and ensure. If a cyberattacker, for example, decided on a slow (over time) modification of data in a critical space junk database, they could influence moving satellites into harm’s way or worse, drop satellites from orbit into populated areas.

Over the last fifty years, a comprehensive strategy based around deterrence was developed in conjunction with the idea of space power theory. In the future, a comparable framework and space-cyberspace power theory will need to be developed. Many questions need to be answered, most especially regarding how the international community will establish rules for cyberspace, the definition of rules for cyberwar, proportionality of response, and how to deal with the problem of attribution. Exactly how the developing cyberwar doctrine will affect the way outer space is governed remains to be seen.


Matthew Mather is author of a fictional account of the first major cyberattack, CyberStorm, which has sold close to a million copies, been translated in 23 countries and is in development for film by 20th Century Fox. You can find CyberStorm on Amazon.