06.02.2015 Views

US-China Commission Report - Fatal System Error

US-China Commission Report - Fatal System Error

US-China Commission Report - Fatal System Error

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

179<br />

173. U.S.-<strong>China</strong> Economic and Security Review <strong>Commission</strong>, Hearing on <strong>China</strong>’s<br />

Proliferation Practices, and Development of its Cyber and Space Warfare Capabilities,<br />

testimony of Ashley Tellis, May 20, 2008.<br />

174. Sinodefense.com.<br />

175. Also referred to as Beidou.<br />

176. U.S.-<strong>China</strong> Economic and Security Review <strong>Commission</strong>, Hearing on <strong>China</strong>’s<br />

Proliferation Practices, and Development of its Cyber and Space Warfare Capabilities,<br />

testimony of Ashley Tellis, May 20, 2008.<br />

177. Grace Xingxin Gao et al., Compass-M1 Broadcast Codes and Their Application<br />

to Acquisition and Tracking, ION National Technical Meeting 2008 (San Diego,<br />

CA: January 2008).<br />

178. U.S.-<strong>China</strong> Economic and Security Review <strong>Commission</strong>, Hearing on <strong>China</strong>’s<br />

Proliferation Practices, and Development of its Cyber and Space Warfare Capabilities,<br />

testimony of Ashley Tellis, May 20, 2008.<br />

179. Office of the Secretary of Defense, Annual <strong>Report</strong> to Congress: Military<br />

Power of the People’s Republic of <strong>China</strong>, 2008 (Washington, DC: 2008), p. 28.<br />

180. An electronic attack can include activities such as jamming, deception, active<br />

cancellation, and use of electromagnetic pulse.<br />

181. U.S.-<strong>China</strong> Economic and Security Review <strong>Commission</strong>, Hearing on <strong>China</strong>’s<br />

Proliferation Practices, and Development of its Cyber and Space Warfare Capabilities,<br />

testimony of Ashley Tellis, May 20, 2008; Nie Yubao, ‘‘Combat Methods for<br />

Electronic Warfare Attacks on Heavily Fortified Enemy Naval Formations’’ (Military<br />

Science Editorial Group, National Defense University Press, Beijing: 1999), pp. 183–<br />

187.<br />

182. Wang Pufeng, ‘‘Xinxizhan Yanjiu zhong Ruogan Wenti de Wo Jian’’ [My<br />

Views on Basic Questions on Research on Informationalized Warfare], eds. Shen<br />

Weiguang et al. (Xinhua Press, Beijing: 2005), pp. 42–43.<br />

183. Kevin Pollpeter, Building for the Future: <strong>China</strong>’s Progress in Space Technology<br />

During the Tenth 5–year Plan and the U.S. Response (Strategic Studies Institute,<br />

Carlisle Barracks, PA: 2008), pp. 44–45.<br />

184. U.S.-<strong>China</strong> Economic and Security Review <strong>Commission</strong>, Hearing on <strong>China</strong>’s<br />

Proliferation Practices, and Development of its Cyber and Space Warfare Capabilities,<br />

testimony of Ashley Tellis, May 20, 2008.<br />

185. Craig Covault, ‘‘Transparency Crucial to Chinese International Space Role,’’<br />

Aviation Week, May 4, 2008.<br />

186. State Council Information Office, People’s Republic of <strong>China</strong>, ‘‘<strong>China</strong> National<br />

Defense in 2000.’’<br />

187. State Council Information Office, People’s Republic of <strong>China</strong>, ‘‘<strong>China</strong> National<br />

Defense in 2000.’’<br />

188. <strong>China</strong> Brief, ‘‘<strong>China</strong>’s Ascendancy to a Space Power,’’ Jing-dong Yuan, Vol.<br />

VIII, Iss. 8, April 14, 2008, 4–5.<br />

189. ‘‘LTG [Lieutenant General] Xiong Guangkai Visits the Outer Space Technology<br />

Exhibition,’’ September 9, 2008. www.ycwb.com.<br />

190. Ministry of Foreign Affairs, People’s Republic of <strong>China</strong>, ‘‘Treaty on the {Prevention}<br />

of the Placement of Weapons in Outer Space, the Threat or Use of Force<br />

Against Outer Space Objects.’’ www.fmprc.cn.<br />

191. Hu Jintao, ‘‘Promoting Sound and Rapid Development of the National Economy,’’<br />

<strong>Report</strong> to the 17th Party Congress, October 15, 2007. www.xinhuanet.com.<br />

192. Chen Zhou, ‘‘A Military Strategy for Active defense for the New Era,’’ Xuexi<br />

Shibao online, March 18, 2008.<br />

193. Chen Zhou, ‘‘A Military Strategy for Active defense for the New Era,’’ Xuexi<br />

Shibao online, March 18, 2008.<br />

194. U.S.-<strong>China</strong> Economic and Security Review <strong>Commission</strong>, Hearing on <strong>China</strong>’s<br />

Proliferation Practices, and Development of its Cyber and Space Warfare Capabilities,<br />

testimony of Ashley Tellis, May 20, 2008.<br />

195. U.S.-<strong>China</strong> Economic and Security Review <strong>Commission</strong>, Hearing on <strong>China</strong>’s<br />

Proliferation Practices, and Development of its Cyber and Space Warfare Capabilities,<br />

testimony of Jeffery Horne, May 20, 2008.<br />

196. U.S.-<strong>China</strong> Economic and Security Review <strong>Commission</strong>, Hearing on <strong>China</strong>’s<br />

Proliferation Practices, and Development of its Cyber and Space Warfare Capabilities,<br />

testimony of Jeffery Horne, May 20, 2008.<br />

197. The Evolved Expendable Launch Vehicle (EELV) comprises two families of<br />

launch vehicles, infrastructure, support systems, interfaces, mission integration, and<br />

launch operations activities. Evolved from current systems and new applications of<br />

existing technology, EELV will support U.S. military, intelligence, civil, and commercial<br />

mission requirements using contractor-provided commercial launch services.<br />

The two are the Lockheed Martin Atlas V and the Boeing Delta IV, both designed<br />

to meet the full range of government launch requirements.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!