dkrause on DSKHT7XVN1PROD with $$_JOB228101. Matthew Penning<strong>to</strong>n, ‘‘Amid South <strong>China</strong> Sea Tensions US Says Committed<strong>to</strong> Protect Philippines,’’ Associated Press, June 23, <strong>2011</strong>. http://www.660news.com/news/world/article/245086—amid-south-china-sea-tensions-us-says-it-is-committed-<strong>to</strong>defence-of-the-philippines.102. U.S.-<strong>China</strong> <strong>Economic</strong> <strong>and</strong> <strong>Security</strong> <strong>Review</strong> Commission, Hearing on <strong>China</strong>’sActive Defense Strategy <strong>and</strong> its Regional Impacts, written testimony of Stacy A.Pedrozo, January 27, <strong>2011</strong>.103. Michael D. Swaine <strong>and</strong> M. Taylor Fravel, ‘‘<strong>China</strong>’s Assertive Behavior PartTwo: The Maritime Periphery, <strong>China</strong> Leadership Moni<strong>to</strong>r 35 (Summer <strong>2011</strong>): 6.http://web.mit.edu/ssp/people/fravel/SwainelFravellCLMl35l0624111.pdf.104. Kyodo News (Japan), ‘‘Chinese fishery vessel sets sail for disputed waters,’’ September 2, <strong>2011</strong>. http://english.kyodonews.jp/news/<strong>2011</strong>/09/112598.html.105. Shi Jiangtao, ‘‘<strong>China</strong> charts course <strong>to</strong> project marine power,’’ South <strong>China</strong>Morning Post, June 9, <strong>2011</strong>.106. People’s Daily, ‘‘<strong>China</strong> <strong>to</strong> beef up maritime forces amid disputes,’’ June 17,<strong>2011</strong>. http://english.people.com.cn/90001/90776/90883/7412388.html#; Grace Ng,‘‘<strong>China</strong> Beefs Up Maritime Patrol Force,’’ Straits Times Indonesia, May 3, <strong>2011</strong>.http://www.thejakartaglobe.com/asia/china-beefs-up-maritime-patrol-force/438869.107. Grace Ng, ‘‘<strong>China</strong> Beefs Up Maritime Patrol Force,’’ Straits Times Indonesia,May 3, <strong>2011</strong>. http://www.thejakartaglobe.com/asia/china-beefs-up-maritime-patrolforce/438869.108. Open Source Center Graphic, ‘‘Military-Related Events in South <strong>China</strong> Sea,13 <strong>to</strong> 21 June <strong>2011</strong>,’’ June 21, <strong>2011</strong>. CPP<strong>2011</strong>0622017001. www.opensource.gov.109. BBC, ‘‘Singapore urges <strong>China</strong> <strong>to</strong> clarify South <strong>China</strong> Sea claim,’’ June 20,<strong>2011</strong>. http://www.bbc.co.uk/news/world-asia-pacific-13838462.110. Ben Bl<strong>and</strong> <strong>and</strong> Girija Shivakumar, ‘‘<strong>China</strong> confronts Indian vessel,’’ August31, <strong>2011</strong>. http://www.ft.com/cms/s/0/883003ec-d3f6-11e0-b7eb-00144feab49a.html#axzz1WdFprBsj.111. James Rupert <strong>and</strong> Daniel Ten Kate, ‘‘<strong>China</strong> Pushing for Binding S. <strong>China</strong>Sea Code, Aquino Says,’’ Bloomberg News, September 1, <strong>2011</strong>. http://www.bloomberg.com / news/<strong>2011</strong>-08-31/china-wants-binding-conduct-code-in-s-chinasea-aquino-says.html.112. U.S.-<strong>China</strong> <strong>Economic</strong> <strong>and</strong> <strong>Security</strong> <strong>Review</strong> Commission, Hearing on <strong>China</strong>’sActive Defense Strategy <strong>and</strong> its Regional Impacts, written testimonies of Stacy A.Pedrozo <strong>and</strong> Jim Thomas, January 27, <strong>2011</strong>.113. U.S.-<strong>China</strong> <strong>Economic</strong> <strong>and</strong> <strong>Security</strong> <strong>Review</strong> Commission, Hearing on <strong>China</strong>’sActive Defense Strategy <strong>and</strong> its Regional Impacts, written testimonies of Stacy A.Pedrozo <strong>and</strong> Jim Thomas, January 27, <strong>2011</strong>.114. Agence France-Presse, ‘‘<strong>China</strong> Stages Military Drills in South <strong>China</strong> Sea,’’June 17, <strong>2011</strong>. http://www.straitstimes.com/BreakingNews/Asia/S<strong>to</strong>ry/STIS<strong>to</strong>ryl680861.html.115. Xinhua, ‘‘PLA’s Operation in S <strong>China</strong> routine drill: Ministry,’’ August 9,<strong>2011</strong>. http://www.chinadaily.com.cn/china/<strong>2011</strong>-08/09/contentl13080729.htm.116. U.S.-<strong>China</strong> <strong>Economic</strong> <strong>and</strong> <strong>Security</strong> <strong>Review</strong> Commission, Hearing on <strong>China</strong>’sActive Defense Strategy <strong>and</strong> its Regional Impact, written testimony of Jim Thomas,January 27, <strong>2011</strong>.117. Philippine Star, ‘‘Manila Protests Presence of Chinese Navy Vessels in PhilippineWaters,’’ June 2, <strong>2011</strong>.118. Philippines Department of Foreign Affairs, ‘‘Statement of the Department ofForeign Affairs on Developments in the West Philippine Sea (South <strong>China</strong> Sea)’’(Pasay City, Philippines: June 1, <strong>2011</strong>). http://www.dfa.gov.ph/main/index.php/officeof-the-undersecretary-for-policy/3111-statement-of-the-department-of-foreign-affairs-on-developments-in-the-west-philippine-sea-south-china-sea.119. Association of Southeast Asian Nations, Declaration on the Conduct of Partiesin the South <strong>China</strong> Sea, 2002. http://www.aseansec.org/13163.htm.120. Ian S<strong>to</strong>rey, ‘‘Recent Developments in the South <strong>China</strong> Sea’’ (Center for Strategic<strong>and</strong> International Studies conference, ‘‘Maritime <strong>Security</strong> in the South <strong>China</strong>Sea,’’ Washing<strong>to</strong>n, DC, June 20–21, <strong>2011</strong>).121. Representatives of the Singaporean Ministry of Foreign Affairs, <strong>and</strong> Singaporeanacademics, meetings with Commissioners, Singapore, December 13, 2010;Representatives of the Indonesian Ministry of Foreign Affairs, meetings with Commissioners,Jakarta, Indonesia, December 15, 2010.122. Representatives of the Singaporean government, meetings with Commissioners,Singapore, December 13, 2010; Representatives of the Indonesian government,meetings with Commissioners, Jakarta, Indonesia, December 15, 2010; U.S.-<strong>China</strong> <strong>Economic</strong> <strong>and</strong> <strong>Security</strong> <strong>Review</strong> Commission, 2010 Annual Report <strong>to</strong> Congress(Washing<strong>to</strong>n, DC: U.S. Government Printing Office, 2010), p. 139.VerDate Nov 24 2008 13:46 Nov 10, <strong>2011</strong> Jkt 067464 PO 00000 Frm 00240 Fmt 6601 Sfmt 6621 G:\GSDD\USCC\<strong>2011</strong>\067464.XXX 067464
dkrause on DSKHT7XVN1PROD with $$_JOB229123. Representatives of the Singaporean government, meeting with Commissioners,Singapore, December 13, 2010; Ian S<strong>to</strong>rey, ‘‘<strong>China</strong>’s Missteps in SoutheastAsia: Less Charm, More Offensive’’ <strong>China</strong> Brief 10:25 (December 17, 2010). http://www.james<strong>to</strong>wn.org/single/?nolcache=1&txlttnews[ttlnews]=37294.124. Representatives of the Singaporean government, meeting with Commissioners,Singapore, December 13, 2010.125. Jim Gomez, ‘‘SE Asia risks <strong>China</strong>’s ire <strong>to</strong> discuss sea dispute,’’ AssociatedPress, September 22, <strong>2011</strong>. http://my.news.yahoo.com/se-asia-risks-chinas-ire-discusssea-dispute-062157276.html;Xinhua, ‘‘<strong>China</strong> opposes attempts <strong>to</strong> internationalizeSouth <strong>China</strong> Sea disputes,’’ September 28, <strong>2011</strong>. http://news.xinhuanet.com/english2010/china/<strong>2011</strong>-09/28/cl131165615.htm.126. Long Tao, ‘‘Time <strong>to</strong> teach those around the South <strong>China</strong> Sea a lesson,’’ GlobalTimes, September 29, <strong>2011</strong>. http://www.globaltimes.cn/NEWS/tabid/99/ID/677717/Time-<strong>to</strong>-teach-those-around-South-<strong>China</strong>-Sea-a-lesson.aspx.127. U.S.-<strong>China</strong> <strong>Economic</strong> <strong>and</strong> <strong>Security</strong> <strong>Review</strong> Commission, Hearing on <strong>China</strong>’sActive Defense Strategy <strong>and</strong> its Regional Impacts, written testimonies of Jim Thomas,January 27, <strong>2011</strong>.128. U.S.-<strong>China</strong> <strong>Economic</strong> <strong>and</strong> <strong>Security</strong> <strong>Review</strong> Commission, Hearing on <strong>China</strong>’sActive Defense Strategy <strong>and</strong> its Regional Impacts, written testimonies of Stacy A.Pedrozo, January 27, <strong>2011</strong>.129. U.S.-<strong>China</strong> <strong>Economic</strong> <strong>and</strong> <strong>Security</strong> <strong>Review</strong> Commission, Hearing on <strong>China</strong>’sActive Defense Strategy <strong>and</strong> its Regional Impacts, written testimonies of BalbinaHwang, January 27, <strong>2011</strong>.130. U.S.-<strong>China</strong> <strong>Economic</strong> <strong>and</strong> <strong>Security</strong> <strong>Review</strong> Commission, Hearing on <strong>China</strong>’sActive Defense Strategy <strong>and</strong> its Regional Impacts, written testimonies of Stacy A.Pedrozo, January 27, <strong>2011</strong>.131. U.S.-<strong>China</strong> <strong>Economic</strong> <strong>and</strong> <strong>Security</strong> <strong>Review</strong> Commission, Hearing on <strong>China</strong>’sActive Defense Strategy <strong>and</strong> its Regional Impacts, written testimonies of Stacy A.Pedrozo, January 27, <strong>2011</strong>; People’s Daily, ‘‘<strong>China</strong> <strong>to</strong> strengthen maritime forcesamid dispute,’’ June 17, <strong>2011</strong>. http://english.people.com.cn/90001/90776/90883/7412388.html#.132. Elinor Mills, ‘‘<strong>China</strong> linked <strong>to</strong> new breaches tied <strong>to</strong> RSA,’’ CNET News InsecurityComplex, June 6, <strong>2011</strong>. http://news.cnet.com/8301-27080l3-20068836-245/china-linked-<strong>to</strong>-new-breaches-tied-<strong>to</strong>-rsa/#ixzz1WY7QASTd; <strong>and</strong> Chris<strong>to</strong>pher Drew,‘‘S<strong>to</strong>len Data Is Tracked <strong>to</strong> Hacking at Lockheed,’’ New York Times, June 3, <strong>2011</strong>.http://www.nytimes.com/<strong>2011</strong>/06/04/technology/04security.html.133. For example, the ‘‘Shadows in the Cloud’’ case study documented 131 compromisedinformation systems in 31 countries. Information Warfare Moni<strong>to</strong>r <strong>and</strong>Shadowserver Foundation, ‘‘Shadows in the Cloud: Investigating Cyber Espionage2.0,’’ April 6, 2010, p. 27. http://shadows-in-the-cloud.net.134. Dmitri Alperovitch, Revealed: Operation Shady RAT (Santa Clara, CA:McAfee, August <strong>2011</strong>), p. 4. http://www.mcafee.com/us/resources/white-papers/wpoperation-shady-rat.pdf.135. Dmitri Alperovitch, Revealed: Operation Shady RAT (Santa Clara, CA:McAfee, August <strong>2011</strong>), p. 6. http://www.mcafee.com/us/resources/white-papers/wpoperation-shady-rat.pdf.136. Zhao Huanxin, ‘‘<strong>China</strong> names key industries for absolute state control,’’<strong>China</strong> Daily, December 19, 2006. http://www.chinadaily.com.cn/china/2006-12/19/contentl762056.htm.137. McAfee Founds<strong>to</strong>ne Professional Services/McAfee Labs, Global EnergyCyberattacks: ‘Night Dragon’ (Santa Clara, CA: McAfee, February 10, <strong>2011</strong>). http://www.mcafee.com/us/resources/white-papers/wp-global-energy-cyberattacks-night-dragon.pdf.138. McAfee Founds<strong>to</strong>ne Professional Services/McAfee Labs, Global EnergyCyberattacks: ‘Night Dragon’ (Santa Clara, CA: McAfee, February 10, <strong>2011</strong>). http://www.mcafee.com/us/resources/white-papers/wp-global-energy-cyberattacks-night-dragon.pdf.139. The Official Google Blog, ‘‘Ensuring your information is safe online,’’ June1, <strong>2011</strong>. http://googleblog.blogspot.com/<strong>2011</strong>/06/ensuring-your-information-issafe.html.140. U.S.-<strong>China</strong> <strong>Economic</strong> <strong>and</strong> <strong>Security</strong> <strong>Review</strong> Commission, 2009 Annual Report<strong>to</strong> Congress (Washing<strong>to</strong>n, D.C.: U.S. Government Printing Office, November 2009),p. 172. http://www.uscc.gov/annual/<strong>report</strong>/2009/annual/<strong>report</strong>/full/09.pdf; <strong>and</strong> NorthropGrumman Corporation, ‘‘Capability of the People’s Republic of <strong>China</strong> <strong>to</strong> ConductCyber Warfare <strong>and</strong> Computer Network Exploitation’’ (contracted researchpaper for the U.S.-<strong>China</strong> <strong>Economic</strong> <strong>and</strong> <strong>Security</strong> <strong>Review</strong> Commission, June 2009),p. 32. http://www.uscc.gov/researchpapers/2009/NorthropGrumman/PRC/Cyber/Paper/FINAL/Approved%20Report/16Oct2009.pdf.VerDate Nov 24 2008 13:46 Nov 10, <strong>2011</strong> Jkt 067464 PO 00000 Frm 00241 Fmt 6601 Sfmt 6621 G:\GSDD\USCC\<strong>2011</strong>\067464.XXX 067464
- Page 1 and 2:
12011REPORT TO CONGRESSof theU.S.-C
- Page 3 and 4:
U.S.-CHINA ECONOMIC AND SECURITY RE
- Page 5 and 6:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 7 and 8:
CONTENTSPageTRANSMITTAL LETTER TO T
- Page 9 and 10:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 11 and 12:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 13 and 14:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 15 and 16:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 17 and 18:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 19 and 20:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 21 and 22:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 23 and 24:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 25 and 26:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 27 and 28:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 29 and 30:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 31 and 32:
23Figure 1:China’s Share of the U
- Page 33 and 34:
25The weakness in U.S. exports of a
- Page 35 and 36:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 37 and 38:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 39 and 40:
31Table 3:RMB Bond Issuances by Mul
- Page 41 and 42:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 43 and 44:
35of bilateral negotiations under t
- Page 45 and 46:
37Stonewalling the WTO: A Case Stud
- Page 47 and 48:
39that China’s existing system of
- Page 49 and 50:
41now. Because the structures of th
- Page 51 and 52:
43How Big Is China’s State Sector
- Page 53 and 54:
45Fortune Global 500, compared to j
- Page 55 and 56:
47panies are less profitable, after
- Page 57 and 58:
49erate primarily within state-cont
- Page 59 and 60:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 61 and 62:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 63 and 64:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 65 and 66:
57Figure 1: Chinese FDI Stock in th
- Page 67 and 68:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 69 and 70:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 71 and 72:
63U.S. firms with sensitive technol
- Page 73 and 74:
65Addendum I: SASAC Companies, Larg
- Page 75 and 76:
67Addendum I: SASAC Companies, Larg
- Page 77 and 78:
69dkrause on DSKHT7XVN1PROD with $$
- Page 79 and 80:
71January 2010, the heads of 19 U.S
- Page 81 and 82:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 83 and 84:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 85 and 86:
77cause Beijing had sought to exclu
- Page 87 and 88:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 89 and 90:
81China in Search of Western Techno
- Page 91 and 92:
83scious policy seeking to drive Ch
- Page 93 and 94:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 95 and 96:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 97 and 98:
89Like previous plans, the 12th Fiv
- Page 99 and 100:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 101 and 102:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 103 and 104:
95Consultative Conference National
- Page 105 and 106:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 107 and 108:
99panies account[ed] for fully 7 pe
- Page 109 and 110:
101Dr. Shih has testified before th
- Page 111 and 112:
103ment subsidies, which in turn wi
- Page 113 and 114:
105Addendum II: Figures 1-2Figure 1
- Page 115 and 116:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 117 and 118:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 119 and 120:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 121 and 122:
113drivers cited increased fuel pri
- Page 123 and 124:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 125 and 126:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 127 and 128:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 129 and 130:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 131 and 132:
123uating from college and hoping t
- Page 133 and 134:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 135 and 136:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 137 and 138:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 139 and 140:
131unfairly or unjustifiably harm U
- Page 141 and 142:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 143 and 144:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 145 and 146:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 147 and 148:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 149 and 150:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 151 and 152:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 153 and 154:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 155 and 156:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 157 and 158:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 159 and 160:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 161 and 162:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 163 and 164:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 165 and 166:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 167 and 168:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 169 and 170:
161gress, the DoD noted that China
- Page 171 and 172:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 173 and 174:
165eral U.S. military policies, inc
- Page 175 and 176:
167Figure 1:Territorial Disputes in
- Page 177 and 178:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 179 and 180:
171provides guidelines for dealing
- Page 181 and 182:
173network exploitations to facilit
- Page 183 and 184:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 185 and 186: dkrause on DSKHT7XVN1PROD with $$_J
- Page 187 and 188: dkrause on DSKHT7XVN1PROD with $$_J
- Page 189 and 190: 181ligence, surveillance, and recon
- Page 191 and 192: dkrause on DSKHT7XVN1PROD with $$_J
- Page 193 and 194: dkrause on DSKHT7XVN1PROD with $$_J
- Page 195 and 196: 187Therefore, the PLA maintains the
- Page 197 and 198: 189Of import, the PLA’s geographi
- Page 199 and 200: dkrause on DSKHT7XVN1PROD with $$_J
- Page 201 and 202: dkrause on DSKHT7XVN1PROD with $$_J
- Page 203 and 204: dkrause on DSKHT7XVN1PROD with $$_J
- Page 205 and 206: 197ther moves toward independence,
- Page 207 and 208: 199trates the depth of China’s sp
- Page 209 and 210: 201Figure 2:Representation of Beido
- Page 211 and 212: dkrause on DSKHT7XVN1PROD with $$_J
- Page 213 and 214: 205ganization, modeled on the Europ
- Page 215 and 216: 207China’s leadership also places
- Page 217 and 218: dkrause on DSKHT7XVN1PROD with $$_J
- Page 219 and 220: 211[General Armaments Department] p
- Page 221 and 222: 213Table 2: Select Chinese Satellit
- Page 223 and 224: 215weapons or coorbital satellite w
- Page 225 and 226: 217Malicious Cyber ActivitiesDirect
- Page 227 and 228: dkrause on DSKHT7XVN1PROD with $$_J
- Page 229 and 230: RECOMMENDATIONSChina’s ‘‘Area
- Page 231 and 232: dkrause on DSKHT7XVN1PROD with $$_J
- Page 233 and 234: dkrause on DSKHT7XVN1PROD with $$_J
- Page 235: dkrause on DSKHT7XVN1PROD with $$_J
- Page 239 and 240: dkrause on DSKHT7XVN1PROD with $$_J
- Page 241 and 242: dkrause on DSKHT7XVN1PROD with $$_J
- Page 243 and 244: dkrause on DSKHT7XVN1PROD with $$_J
- Page 245 and 246: dkrause on DSKHT7XVN1PROD with $$_J
- Page 247 and 248: 239320. Chang Xianqi, Military Astr
- Page 249 and 250: dkrause on DSKHT7XVN1PROD with $$_J
- Page 251 and 252: 243woman Jiang Yu simply expressed
- Page 253 and 254: 245Table 1:Timeline of Sino-North K
- Page 255 and 256: dkrause on DSKHT7XVN1PROD with $$_J
- Page 257 and 258: 249China also provides economic sup
- Page 259 and 260: 251economic and social strains woul
- Page 261 and 262: dkrause on DSKHT7XVN1PROD with $$_J
- Page 263 and 264: 255Iran’s South Pars Gas Field af
- Page 265 and 266: 257When asked by Commissioners abou
- Page 267 and 268: dkrause on DSKHT7XVN1PROD with $$_J
- Page 269 and 270: dkrause on DSKHT7XVN1PROD with $$_J
- Page 271 and 272: dkrause on DSKHT7XVN1PROD with $$_J
- Page 273 and 274: dkrause on DSKHT7XVN1PROD with $$_J
- Page 275 and 276: dkrause on DSKHT7XVN1PROD with $$_J
- Page 277 and 278: dkrause on DSKHT7XVN1PROD with $$_J
- Page 279 and 280: dkrause on DSKHT7XVN1PROD with $$_J
- Page 281 and 282: dkrause on DSKHT7XVN1PROD with $$_J
- Page 283 and 284: dkrause on DSKHT7XVN1PROD with $$_J
- Page 285 and 286: dkrause on DSKHT7XVN1PROD with $$_J
- Page 287 and 288:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 289 and 290:
281trade, and dispute settlement. 2
- Page 291 and 292:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 293 and 294:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 295 and 296:
287of Request to the United States
- Page 297 and 298:
289fense, since its current fleet o
- Page 299 and 300:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 301 and 302:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 303 and 304:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 305 and 306:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 307 and 308:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 309 and 310:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 311 and 312:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 313 and 314:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 315 and 316:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 317 and 318:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 319 and 320:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 321 and 322:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 323 and 324:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 325 and 326:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 327 and 328:
3190aRCRD&ss=Hong+Kong&s=News; Pete
- Page 329 and 330:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 331 and 332:
323mation Office. Day-to-day superv
- Page 333 and 334:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 335 and 336:
327Although the slogans change over
- Page 337 and 338:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 339 and 340:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 341 and 342:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 343 and 344:
335What Constitutes a ‘‘Core In
- Page 345 and 346:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 347 and 348:
339Selected CAIFC/CPD Track Two Exc
- Page 349 and 350:
341disseminated through diplomatic
- Page 351 and 352:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 353 and 354:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 355 and 356:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 357 and 358:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 359 and 360:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 361 and 362:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 363 and 364:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 365 and 366:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 367 and 368:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 369 and 370:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 371 and 372:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 373 and 374:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 375 and 376:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 377 and 378:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 379 and 380:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 381 and 382:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 383 and 384:
375ecutive Schedule under section 5
- Page 385 and 386:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 387 and 388:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 389 and 390:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 391 and 392:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 393 and 394:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 395 and 396:
APPENDIX IIIPUBLIC HEARINGS OF THE
- Page 397 and 398:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 399 and 400:
APPENDIX IIIALIST OF WITNESSES TEST
- Page 401 and 402:
393Alphabetical Listing of Panelist
- Page 403 and 404:
dkrause on DSKHT7XVN1PROD with $$_J
- Page 405 and 406:
397In TaiwanU.S. Government• Amer
- Page 407 and 408:
APPENDIX VLIST OF RESEARCH MATERIAL
- Page 409 and 410:
401The National Security Implicatio
- Page 411 and 412:
APPENDIX VIACRONYMS AND ABBREVIATIO
- Page 413 and 414:
dkrause on DSKHT7XVN1PROD with $$_J