The Forgery Detectives
The Siku compilers encountered hundreds of texts claiming ancient authorship. They developed a systematic methodology for detecting fakes—vocabulary analysis, citation chain verification, bibliographic cross-referencing—that anticipated Western textual criticism by a century. Here is how they caught the forgers.
Part 7 of The Emperor's Library — how China reviewed all knowledge.
A Civilization of Forgeries
Chinese textual forgery was an ancient and widespread practice. Attributing a text to a famous sage—Confucius, Laozi, the Yellow Emperor, the Duke of Zhou—gave it authority that the actual author could never claim in their own name. A medical text by an anonymous Song dynasty physician is just another medical text. A medical text attributed to the Yellow Emperor is the foundation of a tradition. A military manual by a minor official is forgettable. A military manual attributed to Jiang Ziya, the legendary advisor who helped the Zhou overthrow the Shang, is scripture.
By the time the Siku compilers began their work in 1773, the accumulated forgeries numbered in the hundreds. Some were ancient and well-established—texts whose false attributions had been accepted for so long that challenging them required taking on centuries of scholarly consensus. Others were crude recent fabrications, products of the Ming dynasty's flourishing commercial publishing industry, where booksellers routinely attached famous names to unremarkable texts to improve sales.
The compilers approached this landscape with what can only be called professional enthusiasm. Detecting forgeries was not a side activity. It was central to their mission. The catalog's authority depended on correctly sorting the genuine from the fake, and the compilers devoted enormous scholarly energy to the task.
Method 1: Vocabulary Analysis
The most powerful tool in the compilers' detective kit was linguistic analysis. Classical Chinese changed over time—not as dramatically as European languages, but enough that a trained reader could distinguish pre-Qin prose from Han prose, Han prose from Tang prose, and Tang prose from Song prose. The compilers exploited this systematically.
When a text claimed to date from the Spring and Autumn period (770–476 BC) but used vocabulary that only appeared in the Han dynasty or later, the compilers flagged the anachronism. The technical terms of government, the names of institutions, the formulae of philosophical argument—all of these evolved over time, and a forger who did not know the linguistic conventions of the period they were imitating inevitably left traces.
The review of the Liu Tao (六韜) in the military section provides a textbook example. The text claims to be a record of conversations between King Wen of Zhou and Jiang Ziya—placing it in the eleventh century BC. But the compilers found anachronistic terminology throughout:
“The title ‘general’ (將軍) first appears in the Zuo Zhuan—it did not exist in the early Zhou.”
If the word for the military rank being discussed did not exist when the conversation supposedly took place, the conversation is fabricated. This is simple, devastating, and characteristic of the compilers' approach: find the one detail the forger got wrong, and the entire edifice collapses.
Method 2: Bibliographic Cross-Referencing
The Chinese dynasty system provided a unique tool for forgery detection: the dynastic bibliographies. Each major dynasty compiled a bibliography (藝文志 or 經籍志) listing every known text. These bibliographies—the Han Shu Yiwen Zhi, the Sui Shu Jingji Zhi, the Old and New Tang Shu bibliographies, and the Song Shi Yiwen Zhi—formed a chain of evidence stretching from the first century BC to the fourteenth century AD.
The compilers used this chain systematically. If a text claimed ancient origins but was not listed in the relevant dynastic bibliographies, the absence was treated as strong evidence of forgery. The formula appears throughout the catalog:
隋唐志皆不著錄。
“Not listed in either the Sui or Tang dynastic bibliographies.”
The argument is probabilistic. A genuinely ancient text might have escaped the notice of dynastic bibliographers. But the dynastic bibliographies were compiled by government officials with access to the imperial library and provincial collections—the most comprehensive information networks of their time. If a supposedly ancient text was unknown to every bibliographer for five hundred years, the simpler explanation is that it did not yet exist.
This method was applied to the Guan Shi Yi Zhuan (關氏易傳), a Yijing commentary attributed to a post-Han figure but suspiciously absent from the historical record:
隋唐志皆不著錄,其為偽託明矣。
“Not listed in either the Sui or Tang dynastic bibliographies—that it is a forgery is self-evident.”
Method 3: Citation Archaeology
The compilers tracked citation chains with forensic precision. If a text quoted a source that did not exist when the supposed author was alive, the text was exposed. If a text claimed to be ancient but was first cited only in a much later period, the gap was suspicious. If two texts cited each other in ways that were chronologically impossible, at least one was forged.
This method caught forgeries that vocabulary analysis alone might have missed. A skilled forger could imitate archaic language. But imitating an entire intellectual ecosystem—knowing which texts existed at a given historical moment and which did not—was far harder. The compilers' deep knowledge of the Chinese bibliographic tradition gave them an advantage that no individual forger could match.
Method 4: Transmission Gap Analysis
Some texts had suspicious histories: they claimed ancient origin, disappeared for centuries, and then resurfaced in a later period with no explanation of where they had been. The compilers treated these transmission gaps as evidence requiring explanation.
A text that was continuously cited from the Han through the Song had a verified chain of custody. A text that supposedly dated from the Zhou but was first mentioned in the Ming had a thousand-year gap to explain. The compilers asked: where was this text for a millennium? Who preserved it? Through what chain of transmission did it reach its current form? If no answers were available, the gap itself was evidence of fabrication.
This approach was particularly effective against the class of forgeries that claimed to be “secret transmissions” (秘傳)—texts allegedly passed down through private lineages outside the official bibliographic record. The compilers were unimpressed by claims of secret transmission. If a text was so secret that no bibliographer, no encyclopedia compiler, and no scholar in any surviving source had ever mentioned it, the compilers concluded that it was secret because it did not exist.
The Star Case: Zixia's Commentary
The compilers' most exasperated forgery investigation involved the Zixia Yi Zhuan (子夏易傳), a Yijing commentary attributed to Zixia (子夏), one of Confucius's disciples. The text had been forged, debunked, re-forged, and re-debunked so many times that the compilers' review reads like a detective report on a cold case with too many suspects:
未有如此書之偽中出偽,層層造作而不已者。
“None has generated forgery upon forgery, layer upon layer of fabrication without end, like this text.”
The original Zixia commentary, if it ever existed, was lost in the Han dynasty. At some point, someone forged a replacement and attributed it to Zixia. This forgery was detected. Then someone else forged a different version. Then a third person forged yet another. Each successive forgery claimed to be the genuine ancient text, and each accumulated its own tradition of commentary and citation. By the Qing dynasty, the accumulated strata of fabrication had produced a bibliographic mess that the compilers needed a full paragraph of archaeological analysis to untangle.
The case illustrates both the depth of the forgery problem and the compilers' method for handling it. They did not simply declare the text fake. They traced the entire history of its fakery—who forged what, when, and how each successive forgery related to its predecessors. The result is not just a verdict but a case study in how forged texts propagate.
Why Forgery Was So Common
The incentive structure was straightforward. In a civilization that venerated antiquity and treated the words of ancient sages as authoritative, attributing a text to an ancient sage was the most effective way to ensure it would be read, copied, and preserved. A commentary on the Yijing attributed to a minor Song scholar would circulate among specialists. The same commentary attributed to Zixia, Confucius's disciple, would be studied as a window into the original meaning of the Classic.
The commercial publishing industry of the Ming dynasty amplified the problem. Woodblock printing made it cheap to produce books, and booksellers discovered that famous attributions sold better than honest ones. A military manual attributed to Zhuge Liang or Jiang Ziya commanded a higher price than one by an unknown author. Fortune-telling guides attributed to Gui Guzi or Chen Tuan sold better than anonymous ones. The result was an explosion of pseudo-ancient texts that the Siku compilers had to sort through two centuries later.
The compilers understood these incentives clearly. Their reviews frequently note that a text was probably forged for commercial reasons or to lend authority to a particular school of practice. They did not treat forgery as a mystery. They treated it as an expected feature of the textual landscape—a predictable consequence of a system that valued antiquity above originality.
Proto-Modern Scholars
The Siku compilers' methods anticipate Western textual criticism in striking ways. The systematic use of linguistic analysis to date texts, the cross-referencing of bibliographic records, the tracking of citation chains, the analysis of transmission histories—all of these methods were independently developed in European classical scholarship in the eighteenth and nineteenth centuries. The German philologists who developed the tools of modern textual criticism— Friedrich August Wolf on Homer, Karl Lachmann on the New Testament—were working with different materials but remarkably similar logic.
The comparison is not exact. The Siku compilers worked within a tradition that assumed certain texts (the Classics) were genuine and could not be questioned. They would not have applied their forgery-detection methods to the Yijing itself, or to the Analects, or to the Spring and Autumn Annals. Their skepticism had institutional limits. But within those limits, their methods were rigorous, systematic, and effective. They caught genuine forgeries that had fooled scholars for centuries.
The rejected occult texts and the one-paragraph demolitions scattered throughout the catalog are the fruit of these methods. Every dismissal rests on evidence. Every forgery verdict is argued, not asserted. The compilers were building a body of critical scholarship that would serve as the foundation for all subsequent work on Chinese textual authenticity. Two and a half centuries later, their verdicts remain the starting point for any investigation into whether a classical Chinese text is what it claims to be.
References
Primary Sources
四庫全書總目提要 (Siku Quanshu Zongmu Tiyao). Ji Yun et al., compiled 1773–1782. 200 juan. Forgery investigations appear across all four divisions but are concentrated in the Yijing section (juan 1–10), the military section (juan 99–100), and the divination section (juan 108–111). Chinese Text Project
Secondary Scholarship
Elman, Benjamin A. From Philosophy to Philology: Intellectual and Social Aspects of Change in Late Imperial China. Harvard University Asia Center, 2001. On the evidential scholarship movement and its methods.
Nylan, Michael. The Five “Confucian” Classics. Yale University Press, 2001. On the textual history and authenticity questions surrounding the canonical texts.
Guy, R. Kent. The Emperor's Four Treasuries: Scholars and the State in the Late Ch'ien-lung Era. Harvard University Press, 1987.
