Cyberpower and National Security


Cyberpower and National Security

Edited by Franklin Kramer, Stuart H. Starr, and Larry Wentz

664 pages


April 2009


$39.95 Add to Cart
eBook (PDF)

(Requires Adobe Digital Editions)

March 2011


$39.95 Add to Cart

About the Book

The cyber domain is undergoing extraordinary changes that present both exceptional opportunities to and major challenges for users of cyberspace. The challenges arise from the malevolent actors who use cyberspace and the many security vulnerabilities that plague this sphere. Exploiting opportunities and overcoming challenges will require a balanced body of knowledge on the cyber domain. Cyberpower and National Security assembles a group of experts and discusses pertinent issues in five areas.

The first section provides a broad foundation and overview of the subject by identifying key policy issues, establishing a common vocabulary, and proposing an initial version of a theory of cyberpower. The second section identifies and explores possible changes in cyberspace over the next fifteen years by assessing cyber infrastructure and security challenges. The third section analyzes the potential impact of changes in cyberspace on the military and informational levers of power. The fourth section addresses the extent to which changes in cyberspace serve to empower key entities such as transnational criminals, terrorists, and nation-states. The final section examines key institutional factors, which include issues concerning governance, legal dimensions, critical infrastructure protection, and organization.

Cyberpower and National Security frames the key issues concerned and identifies the important questions involved in building the human capacity to address cyber issues, balancing civil liberties with national security considerations, and developing the international partnerships needed to address cyber challenges. With more than two dozen contributors, Cyberpower and National Security covers it all.

Author Bio

Franklin D. Kramer is a distinguished research fellow in the Center for Technology and National Security Policy at the National Defense University. He served as the assistant secretary of defense for international security affairs from 1996 to 2001.


"Cyberpower security is now one of the major national security problems facing the United States. This book recognizes and emphasizes the need for the government to develop a holistic approach to cyberpower; without this awareness and commitment, our national security is in jeopardy."—Lieutenant General Harry D. Raduege, Jr., USAF (Ret.), Chairman, Deloitte Center for Network Innovation

"It's about time! After nearly 20 years, finally, a well-thought-out, analytical compendium of the current state of the art. The challenge is implementing these ideas in a meaningful manner that provides true cybernational security against a world of asymmetric actors. This is going to be one of my primary references for years to come."—Winn Schwartau, Founder, InfowarCon

"National Defense University [NDU] is the trailblazer in thinking about cyberpower. This book and the workshops NDU convened while it was drafted provide some of the absolutely best thinking around on how cyber is reshaping the exercise of power and what that will mean for American security."—Dr. James A. Lewis, Technical Director, Center for Strategic and International Studies Commission on Cybersecurity for the 44th Presidency

"This book not only offers an inside look at military cyberpower, tactics, and strategies, but also gives a unique look at cyber deterrence, cyber law, and opportunities for future research. In today's cyber environment, the United States must work diligently to not only keep up with our near-peer competitors, but to stay one step ahead of them. Cyberpower and National Security explores policy issues, theories, trends, and future technologies that can give the United States that edge in the cyber domain"—Major General William T. Lord, USAF, Commander, Air Force Cyberspace Command (Provisional)

“Experts in the field of ‘cyberpower’ address a range of issues arising from the use of cyberspace by malevolent actors and ‘the many security vulnerabilities that plague this sphere.’ Both the theory and practical application of cyberpower are discussed.”—Survival