Facebook Twitter Google+ LinkedIn Email App

China’s New Style Warfare

Call for Papers


(Photo by Manuel Joseph at Pexels; flag graphic courtesy of Wikimedia Commons)

Download the PDF

Military Review invites the submission of articles that discuss China as a peacetime competitor and adversary, as well as a potential wartime enemy of the United States. Author guidelines and instructions for submission can be found at https://www.armyupress.army.mil/Journals/Military-Review/MR-Article-Submission-Guide/. This call for papers supports concerns articulated in the National Security Strategy of the United States of America, December 2017 at https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf.

Call for papers submission deadline is 30 April 2019

Suggested Writing Topics:

  • Does China have a “hundred-year” strategic plan to achieve global political and economic hegemony?
  • Chinese communism revisited: chances of democratization?
  • Chinese military build-up. Why? Where? What?
  • China’s long-term global socio-political and economic objectives
  • Case study: How do Chinese “New Silk Road” activities and efforts to expand claims over the South China Sea compare to Japan’s pre-World War II efforts to establish the “Greater East Asia Co-Prosperity Sphere?”
  • China’s “new colonialism” in Africa, Central Asia, or elsewhere
  • China’s strategic efforts to control global maritime trade routes and ports
  • Money as a weapon system: China’s use of economic measures to advance policy objectives
  • China’s measures to achieve totalitarian control of its citizenry, with emphasis on control through technology; contributions of Google and other international information consortia to this effort
  • China’s diaspora: how China employs ethnic-Chinese populations in foreign countries to advance policy objectives
  • China’s exploitation of the U.S. and Western European education systems
  • China’s program to steal U.S. and Western technology; how it can be stopped
  • The method and purpose of Chinese cyberattacks against the United States and its allies
  • Effectiveness of China’s use of lobbyists to achieve policy ends

Articles on topics of similar salience are also welcome.