R&L Logo R&L Logo
  • GENERAL
    • Browse by Subjects
    • New Releases
    • Coming Soon
    • Chases's Calendar
  • ACADEMIC
    • Textbooks
    • Browse by Course
    • Instructor's Copies
    • Monographs & Research
    • Reference
  • PROFESSIONAL
    • Education
    • Intelligence & Security
    • Library Services
    • Business & Leadership
    • Museum Studies
    • Music
    • Pastoral Resources
    • Psychotherapy
  • FREUD SET
Cover Image
Paperback
share of facebook share on twitter
Add to GoodReads

Competing without Fighting

China's Strategy of Political Warfare

Seth G. Jones; Emily Harding; Catrina Doxsee; Jake Harrington and Riley McCabe

China is conducting an unprecedented campaign below the threshold of armed conflict to expand the influence of the Chinese Communist Party and weaken the United States and its partners. The scale of China’s actions in the United States is unparalleled. This CSIS report offers one of the most comprehensive analyses to date of Chinese political warfare activities and examines China’s main actions, primary goals, and options for the United States and its partners.

  • Details
  • Details
  • Author
  • Author
  • TOC
  • TOC
Rowman & Littlefield Publishers / Center for Strategic & International Studies
Pages: 145 • Trim: 8½ x 11¼
978-1-5381-7070-0 • Paperback • September 2023 • $45.00 • (£35.00)
Series: CSIS Reports
Subjects: Political Science / Security (National & International)

Seth G. Jones is senior vice president, Harold Brown Chair, and director of the International Security Program at the Center for Strategic and International Studies. Emily Harding is deputy director and senior fellow with the International Security Program at CSIS. Catrina Doxsee is an associate director and associate fellow for the Transnational Threats Project at CSIS. Jake Harrington was the intelligence fellow in the International Security Program at CSIS. Riley McCabe is a program coordinator and research assistant for the Transnational Threats Project at CSIS.

Executive Summary

1. Introduction

2. The Strategic Logic of Chinese Political Warfare

3. Intelligence Operations

4. Cyber Operations

5. Information and Disinformation Operations

6. The United Front

7. Irregular Military Actions

8. Economic Coercion

9. Countering China

About the Authors

Appendix

Endnotes

Competing without Fighting

China's Strategy of Political Warfare

Cover Image
Paperback
Summary
Summary
  • China is conducting an unprecedented campaign below the threshold of armed conflict to expand the influence of the Chinese Communist Party and weaken the United States and its partners. The scale of China’s actions in the United States is unparalleled. This CSIS report offers one of the most comprehensive analyses to date of Chinese political warfare activities and examines China’s main actions, primary goals, and options for the United States and its partners.

Details
Details
  • Rowman & Littlefield Publishers / Center for Strategic & International Studies
    Pages: 145 • Trim: 8½ x 11¼
    978-1-5381-7070-0 • Paperback • September 2023 • $45.00 • (£35.00)
    Series: CSIS Reports
    Subjects: Political Science / Security (National & International)
Author
Author
  • Seth G. Jones is senior vice president, Harold Brown Chair, and director of the International Security Program at the Center for Strategic and International Studies. Emily Harding is deputy director and senior fellow with the International Security Program at CSIS. Catrina Doxsee is an associate director and associate fellow for the Transnational Threats Project at CSIS. Jake Harrington was the intelligence fellow in the International Security Program at CSIS. Riley McCabe is a program coordinator and research assistant for the Transnational Threats Project at CSIS.

Table of Contents
Table of Contents
  • Executive Summary

    1. Introduction

    2. The Strategic Logic of Chinese Political Warfare

    3. Intelligence Operations

    4. Cyber Operations

    5. Information and Disinformation Operations

    6. The United Front

    7. Irregular Military Actions

    8. Economic Coercion

    9. Countering China

    About the Authors

    Appendix

    Endnotes

ALSO AVAILABLE

  • Cover image for the book Communicating with Intelligence: Writing and Briefing for National Security, Third Edition
  • Cover image for the book Counterintelligence Theory and Practice, Second Edition
  • Cover image for the book Human Security: Theory and Action, Second Edition
  • Cover image for the book The Handbook of Cross-Border Ethnic and Religious Affinities
  • Cover image for the book Constructive Conflicts: From Emergence to Transformation, Sixth Edition
  • Cover image for the book Dr. Seuss and the Art of War: Secret Military Lessons
  • Cover image for the book Introduction to Conflict Resolution: Discourses and Dynamics
  • Cover image for the book North Korea, Nuclear Risk-Taking, and the United States: Kim Il Sung, Kim Jong Il, and Kim Jong Un
  • Cover image for the book What Do We Know about Civil Wars?, Second Edition
  • Cover image for the book Food Supply Protection and Homeland Security, Second Edition
  • Cover image for the book The Handbook of African Intelligence Cultures
  • Cover image for the book Nuclear Weapons and American Grand Strategy
  • Cover image for the book The Indian Ocean Region: A Strategic Net Assessment
  • Cover image for the book The Centaur's Dilemma: National Security Law for the Coming AI Revolution
  • Cover image for the book Truth and Reconciliation Commission Processes: Learning from the Solomon Islands
  • Cover image for the book Money for Mayhem: Mercenaries, Private Military Companies, Drones, and the Future of War
  • Cover image for the book Understanding Cybersecurity: Emerging Governance and Strategy
  • Cover image for the book Reasoning for Intelligence Analysts: A Multidimensional Approach of Traits, Techniques, and Targets
  • Cover image for the book Energy Infrastructure Protection and Homeland Security, Second Edition
  • Cover image for the book U.S. Department of Defense Contract Spending and the Industrial Base, 2000-2013
  • Cover image for the book Strategic Cyber Deterrence: The Active Cyber Defense Option
  • Cover image for the book Overcoming Intractable Conflicts: New Approaches to Constructive Transformations
  • Cover image for the book Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
  • Cover image for the book Asia’s Trouble Spots: The Leadership Question in Conflict Resolution
  • Cover image for the book National, International, and Human Security: Protection against Violence, Third Edition
  • Cover image for the book Conflict Intervention and Transformation: Theory and Practice
  • Cover image for the book The Future of National Intelligence: How Emerging Technologies Reshape Intelligence Communities
  • Cover image for the book The Handbook of Asian Intelligence Cultures
  • Cover image for the book The Handbook of Latin American and Caribbean Intelligence Cultures
  • Cover image for the book Drug Trafficking and International Security
  • Cover image for the book Intelligence and the National Security Strategist: Enduring Issues and Challenges
  • Cover image for the book Gender, Global Health, and Violence: Feminist Perspectives on Peace and Disease
  • Cover image for the book Understanding Dark Networks: A Strategic Framework for the Use of Social Network Analysis
  • Cover image for the book Terrorist Organizations and Weapons of Mass Destruction: U.S. Threats, Responses, and Policies
  • Cover image for the book Creative Methods in Military Studies
  • Cover image for the book Dynamics of the Changing Global Security Order: Emerging Trends and Key Issues in Asia
  • Cover image for the book Principles of Maritime Power
  • Cover image for the book The Academic-Practitioner Divide in Intelligence Studies
  • Cover image for the book U.S. National Security Law: An International Perspective
  • Cover image for the book The Ecology of Violent Extremism: Perspectives on Peacebuilding and Human Security
  • Cover image for the book Communicating with Intelligence: Writing and Briefing for National Security, Third Edition
  • Cover image for the book Counterintelligence Theory and Practice, Second Edition
  • Cover image for the book Human Security: Theory and Action, Second Edition
  • Cover image for the book The Handbook of Cross-Border Ethnic and Religious Affinities
  • Cover image for the book Constructive Conflicts: From Emergence to Transformation, Sixth Edition
  • Cover image for the book Dr. Seuss and the Art of War: Secret Military Lessons
  • Cover image for the book Introduction to Conflict Resolution: Discourses and Dynamics
  • Cover image for the book North Korea, Nuclear Risk-Taking, and the United States: Kim Il Sung, Kim Jong Il, and Kim Jong Un
  • Cover image for the book What Do We Know about Civil Wars?, Second Edition
  • Cover image for the book Food Supply Protection and Homeland Security, Second Edition
  • Cover image for the book The Handbook of African Intelligence Cultures
  • Cover image for the book Nuclear Weapons and American Grand Strategy
  • Cover image for the book The Indian Ocean Region: A Strategic Net Assessment
  • Cover image for the book The Centaur's Dilemma: National Security Law for the Coming AI Revolution
  • Cover image for the book Truth and Reconciliation Commission Processes: Learning from the Solomon Islands
  • Cover image for the book Money for Mayhem: Mercenaries, Private Military Companies, Drones, and the Future of War
  • Cover image for the book Understanding Cybersecurity: Emerging Governance and Strategy
  • Cover image for the book Reasoning for Intelligence Analysts: A Multidimensional Approach of Traits, Techniques, and Targets
  • Cover image for the book Energy Infrastructure Protection and Homeland Security, Second Edition
  • Cover image for the book U.S. Department of Defense Contract Spending and the Industrial Base, 2000-2013
  • Cover image for the book Strategic Cyber Deterrence: The Active Cyber Defense Option
  • Cover image for the book Overcoming Intractable Conflicts: New Approaches to Constructive Transformations
  • Cover image for the book Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
  • Cover image for the book Asia’s Trouble Spots: The Leadership Question in Conflict Resolution
  • Cover image for the book National, International, and Human Security: Protection against Violence, Third Edition
  • Cover image for the book Conflict Intervention and Transformation: Theory and Practice
  • Cover image for the book The Future of National Intelligence: How Emerging Technologies Reshape Intelligence Communities
  • Cover image for the book The Handbook of Asian Intelligence Cultures
  • Cover image for the book The Handbook of Latin American and Caribbean Intelligence Cultures
  • Cover image for the book Drug Trafficking and International Security
  • Cover image for the book Intelligence and the National Security Strategist: Enduring Issues and Challenges
  • Cover image for the book Gender, Global Health, and Violence: Feminist Perspectives on Peace and Disease
  • Cover image for the book Understanding Dark Networks: A Strategic Framework for the Use of Social Network Analysis
  • Cover image for the book Terrorist Organizations and Weapons of Mass Destruction: U.S. Threats, Responses, and Policies
  • Cover image for the book Creative Methods in Military Studies
  • Cover image for the book Dynamics of the Changing Global Security Order: Emerging Trends and Key Issues in Asia
  • Cover image for the book Principles of Maritime Power
  • Cover image for the book The Academic-Practitioner Divide in Intelligence Studies
  • Cover image for the book U.S. National Security Law: An International Perspective
  • Cover image for the book The Ecology of Violent Extremism: Perspectives on Peacebuilding and Human Security
facebook icon twitter icon instagram icon linked in icon NEWSLETTERS
ABOUT US
  • Mission Statement
  • Employment
  • Privacy
  • Accessibility Statement
CONTACT
  • Company Directory
  • Publicity and Media Queries
  • Rights and Permissions
  • Textbook Resource Center
AUTHOR RESOURCES
  • Royalty Contact
  • Production Guidelines
  • Manuscript Submissions
ORDERING INFORMATION
  • Rowman & Littlefield
  • National Book Network
  • Ingram Publisher Services UK
  • Special Sales
  • International Sales
  • eBook Partners
  • Digital Catalogs
IMPRINTS
  • Rowman & Littlefield
  • Lexington Books
  • Hamilton Books
  • Applause Books
  • Amadeus Press
  • Backbeat Books
  • Bernan
  • Hal Leonard Books
  • Limelight Editions
  • Co-Publishing Partners
  • Globe Pequot
  • Down East Books
  • Falcon Guides
  • Gooseberry Patch
  • Lyons Press
  • Muddy Boots
  • Pineapple Press
  • TwoDot Books
  • Stackpole Books
PARTNERS
  • American Alliance of Museums
  • American Association for State and Local History
  • Brookings Institution Press
  • Center for Strategic & International Studies
  • Council on Foreign Relations
  • Fairleigh Dickinson University Press
  • Fortress Press
  • The Foundation for Critical Thinking
  • Lehigh University Press
  • United States Holocaust Memorial Museum
  • Other Partners...