352:
it is also necessary to have this type of composite force to become the means which can be utilized for actual operations. This should be a "grand warfare method" that combines all of the dimensions and methods in the two major areas of military and non-military affairs so as to carry out warfare. This is the opposite of the formula for warfare methods brought forth in past wars."
287:, all of these greatly exceed the frequency of bandwidth understood by the American military. The American military is naturally inadequately prepared to deal with this type of enemy psychologically, in terms or measure, and especially as regard military thinking and the methods of operation derived from this."
351:
The authors note that an old-fashioned mentality that considers military action the only offensive action is inadequate given the new range of threats. Instead, the authors advocate forming a "composite force in all aspects related to national interest. Moreover, given this type of composite force,
302:
Reducing one's opponent, the book notes, can be accomplished in a number of ways other than direct military confrontation. The book notes that these alternative methods "have the same and even greater destructive force than military warfare, and they have already produced serious threats different
266:
The book argues that the primary weakness of the United States in military matters is that the US views revolution in military thought solely in terms of technology. The book further argues that to the US, military doctrine evolves because new technology allows new capabilities. As such, the book
224:
pointed out a common distortion in translation of the subtitle of the book. While it was translated and understood in the West by many as "China’s Master Plan to
Destroy America", the actual subtitle was "Two Air Force Senior Colonels on Scenarios for War and the Operational Art in an Era of
1089:
256:
enjoyed the support of some elements of the PLA leadership. The
Western press quoted various sensational passages from the book and described it in terms that verged on hyperbole. The book was not a blueprint for a “dirty war” against the West but a call for innovative thinking on future
1184:
267:
argues that the United States does not consider the wider picture of military strategy, which includes legal, economic, information, technological and biological factors, making the case that the United States is vulnerable to attack along asymmetric lines.
201:
can defeat a technologically superior opponent (such as the United States) through a variety of means. Rather than focusing on direct military confrontation, this book instead examines a variety of other means such as
252:, a book written by two PLA air force political officers, Senior Col Qiao Liang and Senior Col Wang Xiangsui. The venue for publication and the laudatory reviews of the book in official publications suggested that
1346:
1027:
274:
as a form of asymmetric warfare in order to weaken technologically superior enemies such as the United States. Additionally, analysts have also praised the book for seemingly prescient predictions of
393:
Contents of the book has also been cited as the source of inspiration for hardline US policies towards the People's
Republic of China by former chief strategist to the president of the United States
360:
Originally published as a work of military theory, the book has recently garnered renewed interest amongst the backdrop of deteriorating US-China relations and the trade war initiated by the
402:
The whole strategy is to avoid kinetic warfare and focus on information and economic ....I told him China has been engaging in an economic war against us for the past 20 or 25 years.
237:
in 1999. The book was then published in
English by a previously unknown Panamanian publisher, with the subtitle "China's Master Plan to Destroy America" and a picture of the burning
427:
364:. The book is the subject of extensive study by both current and former members of the US military establishment with numerous papers and articles published on the subject by the
1146:
1019:
732:
1237:
1216:
1125:
1331:
956:
691:
642:
601:
234:
1341:
1266:
38:
238:
915:
474:
118:
1336:
1326:
1321:
106:
526:
373:
164:
24:
1005:
781:
152:
Unrestricted
Warfare: Two Air Force Senior Colonels on Scenarios for War and the Operational Art in an Era of Globalization
797:
156:
432:
466:
365:
186:
85:
361:
138:
716:
1285:
1351:
1242:
1208:
547:
Commin, G; Filiol, E (2015). "Unrestricted
Warfare versus Western Traditional Warfare: A Comparative Study".
498:
213:) and economic means as leverage over one's opponent and circumvent the need for direct military action.
437:
369:
1115:
1050:
275:
1295:
503:
244:
The text has been cited by the US government, e.g. on a military website by James Perry who states:
190:
55:
882:
839:
656:
648:
564:
422:
997:
989:
962:
952:
921:
911:
874:
831:
724:
697:
687:
638:
607:
597:
556:
470:
203:
178:
113:
907:
866:
823:
630:
142:
1280:
929:
801:
677:
589:
387:
19:
This article is about book on military strategy. For a type of unrestricted warfare, see
270:
Certain passages of the book have aroused controversy, specifically sections suggesting
1120:
37:
1315:
886:
843:
660:
221:
194:
51:
408:
394:
1065:
518:
981:
901:
777:
460:
1170:
681:
378:
794:
925:
870:
827:
701:
611:
993:
878:
835:
728:
560:
376:. The book is also the source of inspiration for many separate books such as
285:
a major explosion at the World Trade Center, or a bombing attack by Bin Laden
1001:
966:
933:
271:
20:
652:
814:
Bunker, Robert J. (March 2000). "Unrestricted warfare: Review essay I".
634:
568:
1303:
209:
182:
248:
In
February 1999, the PLA Literature and Arts Publishing House issued
129:
Unrestricted
Warfare and Countering Unrestricted Warfare (2016)
233:
The
English translation of the book was first made available by the
857:
Cheng, Dean (March 2000). "Unrestricted warfare: Review essay II".
903:
Unrestricted warfare : China's master plan to destroy
America
198:
1048:
Bolander, Jeffery W. (February 2001). "The Dragon's New Claws".
411:, Former Chief Strategist to the President of the United States
303:
from the past and in many directions for...national security."
1238:"Steve Bannon and the Chinese book that made him a China hawk"
778:"Unrestricted Warfare: A Chinese doctrine for future warfare?"
16:
1999 book on military strategy by Qiao Liang and Wang Xiangsui
495:
People's Liberation Army Literature and Arts Publishing House
1171:
Unrestricted Warfare: A Chinese Doctrine for Future Warfare?
683:
Stealth War: How China Took Over While America's Elite Slept
493:
Liang, Qiao; Xiangsui, Wang (1999). "Unrestricted Warfare".
241:
on the cover. A French translation was published in 2003.
594:
War Without Rules: China's Playbook for Global Domination
278:, 3 years before the date of actual events taking place:
1066:"Unrestricted warfare - The Institute of World Politics"
1347:
Chinese information operations and information warfare
428:
Chinese information operations and information warfare
42:
The cover to the original Simplified Chinese edition
197:(王湘穗). Its primary concern is how a nation such as
134:
124:
112:
102:
92:
81:
73:
61:
47:
947:Qiao, Liang; Wang, Xiangsui; Denès, Hervé (2003).
771:
769:
1090:"Unrestricted Warfare is Not China's Master Plan"
900:Qiao, Liang; Santoli, Al; Wang, Xiangsui (2000).
767:
765:
763:
761:
759:
757:
755:
753:
751:
749:
454:
452:
982:"Operation Allied Force: The View from Beijing"
672:
670:
584:
582:
580:
578:
400:
281:
177:'warfare beyond bounds') is a book on
292:— Qiao Liang, Unrestricted Warfare p.344 - 45
65:
8:
488:
486:
30:
172:
1209:"A New Generation of Unrestricted Warfare"
1185:"Sun Tzu in Contemporary Chinese Strategy"
36:
29:
502:
283:"Whether it be the intrusion of hackers,
721:Proceedings & Naval History Magazine
206:. Such means include using legal tools (
448:
235:Foreign Broadcast Information Service
7:
776:Van Messel, John A. (January 2005).
347:Defense against unrestricted warfare
88:Literature and Arts Publishing House
459:McReynolds, Joe (10 January 2017).
1008:from the original on June 8, 2020.
462:China's Evolving Military Strategy
386:by US Air Force Brigadier General
14:
1189:National Defense University Press
627:21st Century Chinese Cyberwarfare
1116:"China Doesn't Compartmentalize"
980:Perry, James D. (January 2000).
1219:from the original on 2024-01-04
1128:from the original on 2023-08-24
1030:from the original on 2023-11-06
784:from the original on 2020-06-08
735:from the original on 2020-06-08
529:from the original on 2023-08-24
523:The Institute of World Politics
262:Weaknesses of the United States
1147:"Précis: Unrestricted Warfare"
549:Journal of Information Warfare
374:School of Advanced Warfighting
168:
160:
25:Unrestricted submarine warfare
1:
859:Small Wars & Insurgencies
816:Small Wars & Insurgencies
717:"Managing China's Transition"
715:Adams, David A. (July 2003).
625:Hagestad, William T. (2012).
298:Alternative methods of attack
1332:International law literature
1286:Resources in other libraries
629:. IT Governance Publishing.
596:. Penguin Publishing Group.
433:United Front Work Department
1114:Hong, Taehwa (2023-08-17).
951:(in French). Paris: Payot.
686:. Penguin. pp. 12–13.
467:Brookings Institution Press
366:National Defense University
1368:
107:People’s Republic of China
18:
1281:Resources in your library
1020:"To Win without Fighting"
871:10.1080/09592310008423266
828:10.1080/09592310008423265
342:international law warfare
307:List of methods of attack
66:
35:
1342:People's Liberation Army
1243:South China Morning Post
187:People's Liberation Army
86:People's Liberation Army
1337:Military strategy books
986:Aerospace Power Journal
181:written in 1999 by two
1327:Chinese-language books
1322:1999 non-fiction books
949:La guerre hors limites
519:"Unrestricted warfare"
404:
289:
259:
23:. For other uses, see
1151:Army University Press
438:Thirty-Six Stratagems
370:Army University Press
327:technological warfare
312:psychological warfare
246:
31:Unrestricted Warfare
1306:Unrestricted Warfare
1298:Unrestricted Warfare
1272:Unrestricted Warfare
1051:Marine Corps Gazette
362:Trump Administration
356:Impact and reception
336:economic aid warfare
254:Unrestricted Warfare
250:Unrestricted Warfare
139:Unrestricted Warfare
1094:Air University (AU)
635:10.2307/j.ctt5hh5nz
330:fabrication warfare
165:traditional Chinese
62:Original title
32:
800:2023-08-24 at the
239:World Trade Center
157:simplified Chinese
1267:Library resources
958:978-2-7436-1149-1
693:978-0-593-08434-2
644:978-1-84928-334-2
603:978-0-593-33104-0
384:War Without Rules
333:resources warfare
315:smuggling warfare
204:political warfare
179:military strategy
175:
148:
147:
103:Publication place
1359:
1255:
1254:
1252:
1251:
1234:
1228:
1227:
1225:
1224:
1213:War on the Rocks
1205:
1199:
1198:
1196:
1195:
1181:
1175:
1174:
1167:
1161:
1160:
1158:
1157:
1143:
1137:
1136:
1134:
1133:
1111:
1105:
1104:
1102:
1101:
1086:
1080:
1079:
1077:
1076:
1062:
1056:
1055:
1045:
1039:
1038:
1036:
1035:
1016:
1010:
1009:
977:
971:
970:
944:
938:
937:
908:Internet Archive
897:
891:
890:
854:
848:
847:
811:
805:
792:
790:
789:
773:
744:
743:
741:
740:
712:
706:
705:
680:(October 2019).
678:Spalding, Robert
674:
665:
664:
622:
616:
615:
590:Spalding, Robert
586:
573:
572:
544:
538:
537:
535:
534:
515:
509:
508:
506:
490:
481:
480:
456:
412:
339:cultural warfare
293:
225:Globalization".
176:
173:
170:
162:
143:Internet Archive
125:Followed by
94:Publication date
77:Chinese, English
69:
68:
40:
33:
1367:
1366:
1362:
1361:
1360:
1358:
1357:
1356:
1352:Warfare by type
1312:
1311:
1292:
1291:
1290:
1275:
1274:
1270:
1263:
1258:
1249:
1247:
1236:
1235:
1231:
1222:
1220:
1207:
1206:
1202:
1193:
1191:
1183:
1182:
1178:
1169:
1168:
1164:
1155:
1153:
1145:
1144:
1140:
1131:
1129:
1113:
1112:
1108:
1099:
1097:
1088:
1087:
1083:
1074:
1072:
1064:
1063:
1059:
1047:
1046:
1042:
1033:
1031:
1018:
1017:
1013:
979:
978:
974:
959:
946:
945:
941:
918:
899:
898:
894:
856:
855:
851:
813:
812:
808:
802:Wayback Machine
787:
785:
775:
774:
747:
738:
736:
714:
713:
709:
694:
676:
675:
668:
645:
624:
623:
619:
604:
588:
587:
576:
546:
545:
541:
532:
530:
517:
516:
512:
504:10.1.1.169.7179
492:
491:
484:
477:
458:
457:
450:
446:
423:Assassin's Mace
419:
414:
406:
388:Robert Spalding
358:
349:
324:network warfare
309:
300:
295:
291:
264:
231:
219:
95:
54:
43:
28:
17:
12:
11:
5:
1365:
1363:
1355:
1354:
1349:
1344:
1339:
1334:
1329:
1324:
1314:
1313:
1310:
1309:
1301:
1289:
1288:
1283:
1277:
1276:
1265:
1264:
1262:
1261:External links
1259:
1257:
1256:
1229:
1215:. 2016-04-19.
1200:
1176:
1162:
1138:
1121:Foreign Policy
1106:
1081:
1057:
1040:
1011:
972:
957:
939:
916:
892:
865:(1): 122–123.
849:
822:(1): 114–121.
806:
745:
707:
692:
666:
643:
617:
602:
592:(2022-04-19).
574:
539:
525:. 2002-08-22.
510:
482:
475:
469:. p. 41.
447:
445:
442:
441:
440:
435:
430:
425:
418:
415:
399:
357:
354:
348:
345:
344:
343:
340:
337:
334:
331:
328:
325:
322:
319:
316:
313:
308:
305:
299:
296:
280:
263:
260:
230:
229:Source of text
227:
218:
215:
146:
145:
136:
132:
131:
126:
122:
121:
116:
110:
109:
104:
100:
99:
96:
93:
90:
89:
83:
79:
78:
75:
71:
70:
63:
59:
58:
49:
45:
44:
41:
15:
13:
10:
9:
6:
4:
3:
2:
1364:
1353:
1350:
1348:
1345:
1343:
1340:
1338:
1335:
1333:
1330:
1328:
1325:
1323:
1320:
1319:
1317:
1308:
1307:
1302:
1300:
1299:
1296:Full text of
1294:
1293:
1287:
1284:
1282:
1279:
1278:
1273:
1268:
1260:
1245:
1244:
1239:
1233:
1230:
1218:
1214:
1210:
1204:
1201:
1190:
1186:
1180:
1177:
1172:
1166:
1163:
1152:
1148:
1142:
1139:
1127:
1123:
1122:
1117:
1110:
1107:
1095:
1091:
1085:
1082:
1071:
1067:
1061:
1058:
1053:
1052:
1044:
1041:
1029:
1025:
1024:www.usmcu.edu
1021:
1015:
1012:
1007:
1003:
999:
995:
991:
987:
983:
976:
973:
968:
964:
960:
954:
950:
943:
940:
935:
931:
927:
923:
919:
917:9780971680722
913:
909:
905:
904:
896:
893:
888:
884:
880:
876:
872:
868:
864:
860:
853:
850:
845:
841:
837:
833:
829:
825:
821:
817:
810:
807:
803:
799:
796:
783:
779:
772:
770:
768:
766:
764:
762:
760:
758:
756:
754:
752:
750:
746:
734:
730:
726:
722:
718:
711:
708:
703:
699:
695:
689:
685:
684:
679:
673:
671:
667:
662:
658:
654:
650:
646:
640:
636:
632:
628:
621:
618:
613:
609:
605:
599:
595:
591:
585:
583:
581:
579:
575:
570:
566:
562:
558:
554:
550:
543:
540:
528:
524:
520:
514:
511:
505:
500:
496:
489:
487:
483:
478:
476:9780985504595
472:
468:
464:
463:
455:
453:
449:
443:
439:
436:
434:
431:
429:
426:
424:
421:
420:
416:
413:
410:
403:
398:
396:
391:
389:
385:
381:
380:
375:
371:
367:
363:
355:
353:
346:
341:
338:
335:
332:
329:
326:
323:
320:
318:media warfare
317:
314:
311:
310:
306:
304:
297:
294:
288:
286:
279:
277:
273:
268:
261:
258:
255:
251:
245:
242:
240:
236:
228:
226:
223:
222:Taylor Fravel
216:
214:
212:
211:
205:
200:
196:
195:Wang Xiangsui
192:
188:
184:
180:
166:
158:
154:
153:
144:
141: at the
140:
137:
133:
130:
127:
123:
120:
119:9787540318871
117:
115:
111:
108:
105:
101:
98:February 1999
97:
91:
87:
84:
80:
76:
72:
64:
60:
57:
53:
52:Wang Xiangsui
50:
46:
39:
34:
26:
22:
1305:
1304:Full PDF of
1297:
1271:
1248:. Retrieved
1246:. 2018-10-04
1241:
1232:
1221:. Retrieved
1212:
1203:
1192:. Retrieved
1188:
1179:
1165:
1154:. Retrieved
1150:
1141:
1130:. Retrieved
1119:
1109:
1098:. Retrieved
1096:. 2022-04-25
1093:
1084:
1073:. Retrieved
1069:
1060:
1049:
1043:
1032:. Retrieved
1023:
1014:
985:
975:
948:
942:
902:
895:
862:
858:
852:
819:
815:
809:
786:. Retrieved
737:. Retrieved
720:
710:
682:
626:
620:
593:
555:(1): 14–23.
552:
548:
542:
531:. Retrieved
522:
513:
494:
461:
409:Steve Bannon
405:
401:
395:Steve Bannon
392:
383:
377:
359:
350:
321:drug warfare
301:
290:
284:
282:
269:
265:
253:
249:
247:
243:
232:
220:
207:
151:
150:
149:
128:
1070:www.iwp.edu
653:j.ctt5hh5nz
379:Stealth War
1316:Categories
1250:2024-01-04
1223:2024-01-04
1194:2024-01-22
1156:2024-01-22
1132:2023-08-24
1100:2023-08-24
1075:2024-01-22
1034:2023-08-24
926:1035666615
788:2020-08-23
739:2020-05-09
702:1119746281
612:1333782936
533:2023-08-24
444:References
191:Qiao Liang
56:Qiao Liang
1173:(Report).
994:2169-2246
934:18168579W
887:144355000
879:0959-2318
844:145170451
836:0959-2318
795:full text
729:0041-798X
661:265579729
561:1445-3312
499:CiteSeerX
272:terrorism
217:Etymology
193:(乔良) and
82:Publisher
21:Total war
1217:Archived
1126:Archived
1028:Archived
1006:Archived
1002:44432584
967:63131359
798:Archived
782:Archived
733:Archived
569:26487515
527:Archived
417:See also
372:and the
257:warfare.
183:colonels
74:Language
210:lawfare
189:(PLA),
185:in the
135:Website
48:Authors
1269:about
1000:
992:
965:
955:
932:
924:
914:
885:
877:
842:
834:
727:
700:
690:
659:
651:
641:
610:
600:
567:
559:
501:
473:
167::
159::
883:S2CID
840:S2CID
657:S2CID
649:JSTOR
565:JSTOR
199:China
998:OCLC
990:ISSN
963:OCLC
953:ISBN
922:OCLC
912:ISBN
875:ISSN
832:ISSN
725:ISSN
698:OCLC
688:ISBN
639:ISBN
608:OCLC
598:ISBN
557:ISSN
471:ISBN
382:and
276:9/11
208:see
174:lit.
114:ISBN
867:doi
824:doi
793:. (
631:doi
169:超限戰
161:超限战
67:超限战
1318::
1240:.
1211:.
1187:.
1149:.
1124:.
1118:.
1092:.
1068:.
1026:.
1022:.
1004:.
996:.
988:.
984:.
961:.
930:OL
928:.
920:.
910:.
906:.
881:.
873:.
863:11
861:.
838:.
830:.
820:11
818:.
804:).
780:.
748:^
731:.
723:.
719:.
696:.
669:^
655:.
647:.
637:.
606:.
577:^
563:.
553:14
551:.
521:.
497:.
485:^
465:.
451:^
407:—
397:.
390:.
368:,
171:;
163:;
1253:.
1226:.
1197:.
1159:.
1135:.
1103:.
1078:.
1054:.
1037:.
969:.
936:.
889:.
869::
846:.
826::
791:.
742:.
704:.
663:.
633::
614:.
571:.
536:.
507:.
479:.
155:(
27:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.