US-China Commission Report - Fatal System Error
US-China Commission Report - Fatal System Error
US-China Commission Report - Fatal System Error
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
179<br />
173. U.S.-<strong>China</strong> Economic and Security Review <strong>Commission</strong>, Hearing on <strong>China</strong>’s<br />
Proliferation Practices, and Development of its Cyber and Space Warfare Capabilities,<br />
testimony of Ashley Tellis, May 20, 2008.<br />
174. Sinodefense.com.<br />
175. Also referred to as Beidou.<br />
176. U.S.-<strong>China</strong> Economic and Security Review <strong>Commission</strong>, Hearing on <strong>China</strong>’s<br />
Proliferation Practices, and Development of its Cyber and Space Warfare Capabilities,<br />
testimony of Ashley Tellis, May 20, 2008.<br />
177. Grace Xingxin Gao et al., Compass-M1 Broadcast Codes and Their Application<br />
to Acquisition and Tracking, ION National Technical Meeting 2008 (San Diego,<br />
CA: January 2008).<br />
178. U.S.-<strong>China</strong> Economic and Security Review <strong>Commission</strong>, Hearing on <strong>China</strong>’s<br />
Proliferation Practices, and Development of its Cyber and Space Warfare Capabilities,<br />
testimony of Ashley Tellis, May 20, 2008.<br />
179. Office of the Secretary of Defense, Annual <strong>Report</strong> to Congress: Military<br />
Power of the People’s Republic of <strong>China</strong>, 2008 (Washington, DC: 2008), p. 28.<br />
180. An electronic attack can include activities such as jamming, deception, active<br />
cancellation, and use of electromagnetic pulse.<br />
181. U.S.-<strong>China</strong> Economic and Security Review <strong>Commission</strong>, Hearing on <strong>China</strong>’s<br />
Proliferation Practices, and Development of its Cyber and Space Warfare Capabilities,<br />
testimony of Ashley Tellis, May 20, 2008; Nie Yubao, ‘‘Combat Methods for<br />
Electronic Warfare Attacks on Heavily Fortified Enemy Naval Formations’’ (Military<br />
Science Editorial Group, National Defense University Press, Beijing: 1999), pp. 183–<br />
187.<br />
182. Wang Pufeng, ‘‘Xinxizhan Yanjiu zhong Ruogan Wenti de Wo Jian’’ [My<br />
Views on Basic Questions on Research on Informationalized Warfare], eds. Shen<br />
Weiguang et al. (Xinhua Press, Beijing: 2005), pp. 42–43.<br />
183. Kevin Pollpeter, Building for the Future: <strong>China</strong>’s Progress in Space Technology<br />
During the Tenth 5–year Plan and the U.S. Response (Strategic Studies Institute,<br />
Carlisle Barracks, PA: 2008), pp. 44–45.<br />
184. U.S.-<strong>China</strong> Economic and Security Review <strong>Commission</strong>, Hearing on <strong>China</strong>’s<br />
Proliferation Practices, and Development of its Cyber and Space Warfare Capabilities,<br />
testimony of Ashley Tellis, May 20, 2008.<br />
185. Craig Covault, ‘‘Transparency Crucial to Chinese International Space Role,’’<br />
Aviation Week, May 4, 2008.<br />
186. State Council Information Office, People’s Republic of <strong>China</strong>, ‘‘<strong>China</strong> National<br />
Defense in 2000.’’<br />
187. State Council Information Office, People’s Republic of <strong>China</strong>, ‘‘<strong>China</strong> National<br />
Defense in 2000.’’<br />
188. <strong>China</strong> Brief, ‘‘<strong>China</strong>’s Ascendancy to a Space Power,’’ Jing-dong Yuan, Vol.<br />
VIII, Iss. 8, April 14, 2008, 4–5.<br />
189. ‘‘LTG [Lieutenant General] Xiong Guangkai Visits the Outer Space Technology<br />
Exhibition,’’ September 9, 2008. www.ycwb.com.<br />
190. Ministry of Foreign Affairs, People’s Republic of <strong>China</strong>, ‘‘Treaty on the {Prevention}<br />
of the Placement of Weapons in Outer Space, the Threat or Use of Force<br />
Against Outer Space Objects.’’ www.fmprc.cn.<br />
191. Hu Jintao, ‘‘Promoting Sound and Rapid Development of the National Economy,’’<br />
<strong>Report</strong> to the 17th Party Congress, October 15, 2007. www.xinhuanet.com.<br />
192. Chen Zhou, ‘‘A Military Strategy for Active defense for the New Era,’’ Xuexi<br />
Shibao online, March 18, 2008.<br />
193. Chen Zhou, ‘‘A Military Strategy for Active defense for the New Era,’’ Xuexi<br />
Shibao online, March 18, 2008.<br />
194. U.S.-<strong>China</strong> Economic and Security Review <strong>Commission</strong>, Hearing on <strong>China</strong>’s<br />
Proliferation Practices, and Development of its Cyber and Space Warfare Capabilities,<br />
testimony of Ashley Tellis, May 20, 2008.<br />
195. U.S.-<strong>China</strong> Economic and Security Review <strong>Commission</strong>, Hearing on <strong>China</strong>’s<br />
Proliferation Practices, and Development of its Cyber and Space Warfare Capabilities,<br />
testimony of Jeffery Horne, May 20, 2008.<br />
196. U.S.-<strong>China</strong> Economic and Security Review <strong>Commission</strong>, Hearing on <strong>China</strong>’s<br />
Proliferation Practices, and Development of its Cyber and Space Warfare Capabilities,<br />
testimony of Jeffery Horne, May 20, 2008.<br />
197. The Evolved Expendable Launch Vehicle (EELV) comprises two families of<br />
launch vehicles, infrastructure, support systems, interfaces, mission integration, and<br />
launch operations activities. Evolved from current systems and new applications of<br />
existing technology, EELV will support U.S. military, intelligence, civil, and commercial<br />
mission requirements using contractor-provided commercial launch services.<br />
The two are the Lockheed Martin Atlas V and the Boeing Delta IV, both designed<br />
to meet the full range of government launch requirements.