Выбрать главу

28 “ ‘On terrain from which’ ”: Sun-Tzu, The Art of Warfare, trans. Roger T. Ames, chapter 11.

28 “PLA National Defense University”: “National Defense University PLA China,” ASEAN Regional Forum, November 17, 2011, accessed August 19, 2014, http://aseanregionalforum.asean.org/files/Archive/13th/9th%20ARF%20Heads%20of%20Defence%20UniversitiesCollegesInstitutions%20Meeting/NDU%20China.pdf.

29 “Alfred Thayer Mahan”: “Biographies in Naval History: Rear Admiral Alfred Thayer Mahan, US Navy,” U.S. Naval History and Heritage Command, accessed August 19, 2014, http://www.history.navy.mil/bios/mahan_alfred.htm.

29 “ ‘Americans must now’ ”: “The Price of Freedom: Americans at War — Spanish American War,” Smithsonian National Museum of American History, accessed August 19, 2014, http://amhistory.si.edu/militaryhistory/printable/section.asp?id=7.

30 “daring us to act”: Bernhard Zand, “Power in the Pacific: Stronger Chinese Navy Worries Neighbors and US,” Der Spiegel Online International, September 14, 2012, accessed March 18, 2014, http://www.spiegel.de/international/world/strengthening-of-chinese-navy-sparks-worries-in-region-and-beyond-a-855622.html.

30 “However deep the water”: Jane Cai and Verna Yu, “Xi Jinping Outlines His Vision of ‘Dream and Renaissance,’ ” South China Morning Post, March 18, 2013, accessed August 17, 2014, http://www.scmp.com/news/china/article/1193273/xi-jinping-outlines-his-vision-chinas-dream-and-renaissance.

31 “ ‘Those who know’ ”: Sun-Tzu, The Art of Warfare, trans. Roger T. Ames.

32 the 788th Regiment: John Pike, “8341 Unit — Central Security Regiment,” FAS.org, May 22, 1998, accessed August 17, 2014, http://fas.org/irp/world/china/pla/8341.htm; fictional unit.

32 “Our population demographics are not optimal”: Andrea den Boer and Valerie M. Hudson, “The Security Risks of China’s Abnormal Demographics,” Monkey Cage (blog), Washington Post, April 30, 2014, accessed August 19, 2014, http://www.washingtonpost.com/blogs/monkey-cage/wp/2014/04/30/the-security-risks-of-chinas-abnormal-demographics/.

32 “Our trade routes”: Sean Mirski, “How to Win a War with China,” National Interest, November 1, 2013, accessed August 19, 2014. http://nationalinterest.org/commentary/how-win-war-china-9346.

32 “Our need for outside energy”: “China: Analysis,” U.S. Energy Information Administration, February 4, 2014, accessed August 19, 2014, http://www.eia.gov/countries/cab.cfm?fips=ch.

Part 2

37 Defense Intelligence Agency: “Defense Intelligence Agency — About,” U.S. Defense Intelligence Agency, accessed August 19, 2014, http://www.dia.mil/About.aspx.

38 A compact HK G48: “G36C — Das ultrakurze Sturmgewehr,” Heckler and Koch, accessed August 17, 2014, http://www.heckler-koch.com/de/produkte/militaer/sturmgewehre/g36/g36c/produktbeschreibung.html; fictional version.

38 using covert radio signals: Geoffrey Ingersoll, “The NSA Has Secretly Developed the ‘Bigfoot’ of Computer Hacks,” BusinessInsider.com, January 15, 2014, accessed August 19, 2014, http://www.businessinsider.com/nsa-has-the-bigfoot-of-computer-hacks-2014-1.

39 SIPRNet classified network: Sharon Weinberger, “What Is SIPRNet?” Popular Mechanics, December 1, 2010, accessed August 19, 2014, http://www.popularmechanics.com/technology/how-to/computer-security/what-is-siprnet-and-wikileaks-4085507.

39 air-gapped: Peter W. Singer and Allan Friedman, Cybersecurity and Cyberwar: What Everyone Needs to Know (New York: Oxford University Press, 2014).

39 three faintly glowing metallic smart-rings: Darren Quick, “Ring Puts the Finger on Gesture Control,” Gizmag, March 4, 2014, accessed August 19, 2014, http://www.gizmag.com/logbar-smart-ring-bluetooth/31080/.

39 nicknamed the Eastern MIT: “Shanghai Jiao Tong University,” Times Higher Education World University Rankings 2012–2013, accessed August 19, 2014, http://www.timeshighereducation.co.uk/world-university-rankings/2012-13/world-ranking/institution/shanghai-jiao-tong-university.

39 Hainan Island incident: “Interview with Lt. Shane Osborn, U.S. Navy,” Frontline, accessed August 19, 2014, http://www.pbs.org/wgbh/pages/frontline/shows/china/interviews/osborn.html.

40 hacker militias became crucial hubs: Singer and Friedman, Cybersecurity and Cyberwar.

40 China’s J-20 fighter: Feng Cao, “China Unveils More Capable Stealth Fighter Prototype,” U.S. Naval Institute, March 19, 2014, accessed August 20, 2014, http://news.usni.org/2014/03/19/china-unveils-capable-stealth-fighter-prototype.

41 her circulatory system: David Axe, “This Scientist Wants Tomorrow’s Troops to Be Mutant-Powered,” Danger Room (blog), Wired, December 26, 2012, http://www.wired.com/2012/12/andrew-herr/all/.

42 randomize signals: Ryan W. Neal, “GPS Terrorism: Hackers Could Exploit Location Technology to Hijack Ships, Airplanes,” International Business Times, July 29, 2013, accessed August 19, 2014, http://www.ibtimes.com/gps-terrorism-hackers-could-exploit-location-technology-hijack-ships-airplanes-1362937.

43 Tiangong (“Heavenly Palace”): “China’s First Space Lab — Tiangong 1,” China.org.cn, accessed August 19, 2014, http://www.china.org.cn/china/special_coverage/node_7125458.htm.

44 chemical oxygen iodine laser: William H. Possel, “Lasers and Missile Defense: New Concepts for Space-Based and Ground-Based Laser Weapons, Occasional Paper No. 5,” Center for Strategy and Technology, Air War College, Air University, Maxwell Air Force Base, U.S. Air Force, July 1998, accessed August 19, 2014, http://www.au.af.mil/au/awc/awcgate/cst/csat5.pdf.

44 converted 747 jumbo jet: “Airborne Laser Test Bed,” Missile Defense Agency, accessed August 19, 2014, http://www.mda.mil/news/gallery_altb.html.

45 The first target was WGS-4: “Fact Sheet: Wideband Global SATCOM (WGS),” Los Angeles Air Force Base, U.S. Air Force, February 11, 2014, accessed August 19, 2014, http://www.losangeles.af.mil/library/factsheets/factsheet.asp?id=5333.

46 known as the X-37: David Axe, “A Year Later, Mysterious Space Plane Is Still in Orbit,” Danger Room (blog), Wired, March 7, 2012, accessed March 7, 2012, http://www.wired.com/dangerroom/2012/03/spaceplane-year/?utm_source=feedburner&utm_medium=email&utm_campaign=Feed%3A+WiredDangerRoom+%28Blog+-+Danger+Room%29.

46 Geosynchronous Space Situational Awareness: Amy Butler, “USAF Chief Outs Classified Spy Sat Program,” Aviation Week and Space Technology, February 21, 2012, accessed August 19, 2014, http://aviationweek.com/defense/usaf-space-chief-outs-classified-spy-sat-program.

47 Ultra High Frequency Follow-On: “Ultra High Frequency Follow-On (UFO),” Program Executive Office Space Systems, U.S. Navy, accessed August 19, 2014, http://www.public.navy.mil/spawar/PEOSpaceSystems/ProductsServices/Pages/UHFGraphics.aspx.

48 sipped his awful coffee: “Don’t Wash That Coffee Mug,” Naval Historical Foundation, November 25, 2013, accessed August 19, 2014, http://www.navyhistory.org/2013/11/dont-wash-that-coffee-mug/.

49 “Deploy REMUS”: “Autonomous Underwater Vehicle — Remus 100,” Kongsberg Maritime, accessed August 17, 2014, http://www.km.kongsberg.com/ks/web/nokbg0240.nsf/AllWeb/D241A2C835DF40B0C12574AB003EA6AB?OpenDocument.

49 The handheld video-game-style controller: Jacqui Barker, “Navy PCD Designs UxV Controllers with Users in Mind,” Naval Surface Warfare Center, Panama City Division, March 16, 2012, accessed August 17, 2014, http://www.navy.mil/submit/display.asp?story_id=65928.

50 submitted the required DNA: Axe, “This Scientist Wants Tomorrow’s Troops.”

51 They had said Tokyo was big: Visible Earth catalog, “Tokyo at Night,” NASA, accessed August 17, 2014, http://visibleearth.nasa.gov/view.php?id=8683.