Bulletin of Chinese Academy of Sciences (Chinese Version)
Keywords
science and technology security, key technology, intelligence perception, threat response, weak signal
Abstract
The purpose of the study is to analyze the operation mechanism of the key technology control signal perception system, and reveal the deep logic and basic procedures of the United States’ external technical containment. Through literature review and information mining, this study analyzes the structural features of the U.S. key technology control signal perception system, such as “front-end technical perception and technology locking”, “mid-end technical evaluation and risk identification”, and “back-end technical control response and dynamic sanctions”. It further explores the participating subjects and role positioning of the United States in key technology control signal perception, the sources and mechanisms of intelligence perception of weak signals, the models and methods of technical assessment, as well as the means of technical sanctions. The research on the U.S. key technology control signal perception system provides a reference for China to deal with the risks of the technology decoupling led by the United States and build an independent and controllable technology governance system.
First page
617
Last Page
629
Language
Chinese
Publisher
Bulletin of Chinese Academy of Sciences
Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.
References
1. 傅晋华. 科技安全概念演化、问题辨析与体系构建研究. 科学学研究, 2024, 42(9): 1824-1832. Fu J H. Research on concept evolution, issues analysis and system construction of science and technology security. Studies in Science of Science, 2024, 42(9): 1824-1832. (in Chinese)
2. 刘昊, 张志强, 武瑞敏. 建设适应科技竞争与国家安全的科技情报发展体系. 图书与情报, 2022, (1): 39-48. Liu H, Zhang Z Q, Wu R M. Building a scientific and technological intelligence development system suitable for scientific and technological competition and national security. Library & Information, 2022, (1): 39-48. (in Chinese)
3. 刘晓峰, 胡高强, 范兆媛, 等. 科技安全风险监测预警体系构建研究. 中国工程科学, 2024, 26(3): 186-195. Liu X F, Hu G Q, Fan Z Y, et al. Construction of a technological security risk monitoring and early warning system. Strategic Study of CAE, 2024, 26(3): 186-195. (in Chinese)
4. 李维思, 邬亭玉, 毛进, 等. 面向国家科技人才安全服务的情报态势感知研究. 情报理论与实践, 2025, 48(6): 20-28. Li W S, Wu T Y, Mao J, et al. Research on intelligence situation awareness for national scientific and technological talent security service. Information Studies: Theory & Application, 2025, 48(6): 20-28. (in Chinese)
5. Jonker M, Romijn H, Szirmai A. Technological effort, technological capabilities and economic performance. Technovation, 2006, 26(1): 121-134.
6. Porter A L, Roessner J D, Jin X Y, et al. Measuring national “emerging technology” capabilities. Science and Public Policy, 2002, 29(3): 189-200.
7. Evans S W, Leese M, Rychnovská D. Science, technology, security: Towards critical collaboration. Social Studies of Science, 2021, 51(2): 189-213.
8. AlDaajeh S, Saleous H, Alrabaee S, et al. The role of national cybersecurity strategies on the improvement of cybersecurity education. Computers & Security, 2022, 119: 102754.
9. 李品. 统筹科技发展与科技安全的情报体系框架研究. 情报学报, 2024, 43(3): 357-368. Li P. Constructing the framework of an intelligence theory system for coordinating science and technology development and science and technology security. Journal of the China Society for Scientific and Technical Information,2024, 43(3): 357-368. (in Chinese)
10. 肖冬梅, 王良晨. 美国技术民族主义制度对中国产业发展的挑战及应对. 科技进步与对策, 2025, 42(17): 44-54. Xiao D M, Wang L C. Challenges and countermeasures of U.S. techno-nationalism system on the development of China’s industries. Science & Technology Progress and Policy, 2025, 42(17): 44-54. (in Chinese)
11. 李琪, 叶继元. 面向美国出口管制的关键核心技术竞争情报服务体系构建.情报杂志, 2025, 44(1): 81-87. Li Q, Ye J Y. Construction of key core technology competitive intelligence service system oriented to U.S. export controls. Journal of Intelligence, 2025, 44(1): 81-87. (in Chinese)
12. 贺德方, 李广建, 汤富强, 等. 国外技术出口管制演进分析与应对策略研究. 中国科学院院刊, 2024, 39(1): 79-94. He D F, Li G J, Tang F Q, et al. Research on evolution and countermeasures of international technology export controls. Bulletin of Chinese Academy of Sciences, 2024, 39(1): 79-94. (in Chinese)
13. 姜辉. 美国出口管制的政策体系及协调机制研究. 情报杂志, 2024, 43(12): 88-94. Jiang H. Research on the policy system and coordination mechanism of U. S. export control. Journal of Intelligence, 2024, 43(12): 88-94. (in Chinese)
14. 窦超, 李峥, 刘巍. 制裁冲击与企业风险:基于美国对华单边管制清单的研究. 金融评论, 2024, 16(4): 58-86. Dou C, Li Z, Liu W. Sanctions shock and corporate risk: A study based on the US control list against China. Chinese Review of Financial Studies, 2024, 16(4): 58-86. (in Chinese)
15. Gilpin R, War and Change in World Politics. Cambridge: Cambridge University Press, 1981.
16. 尹小平, 郭懿萦, 李天琦. 美国贸易制裁下日本半导体产业的由盛转衰及其启示. 现代日本经济, 2023, 42(3): 35-49. Yin X P, Guo Y Y, Li T Q. Japan’s semiconductor industry’s transition from strength to weakness under U.S. trade sanctions and its enlightenment. Contemporary Economy of Japan, 2023, 42(3): 35-49. (in Chinese)
17. 赵明昊. 技术鹰派、国家安全与美国对华战略竞争. 国际安全研究, 2025, 43(1): 115-132. Zhao M H. Technology hawks, national security and the U.S. strategic competition against China. Journal of International Security Studies, 2025, 43(1): 115-132. (in Chinese)
18. Bureau of Industry and Security, Department of Commerce. Revisions to the Entity List. Washington DC: BIS, 2024.
19. 张美云, 宋宇. 国家经济安全思想:马克思主义经济学和西方经济学的比较. 改革与战略, 2023, 39(3): 34-45. Zhang M Y, Song Y. National economic security thought: A comparison between marxist economics and western economics. Reformation & Strategy, 2023, 39(3): 34-45. (in Chinese)
20. 余辉, 吕星仪, 夏文蕾, 等. 科技竞争态势下的技术需求弱信号感知研究. 情报杂志, 2024, 43(12): 106-116. Yu H, Lyu X Y, Xia W L, et al. Research on weak signal perception for technology demand under the intense trend of technological competition. Journal of Intelligence, 2024, 43(12): 106-116. (in Chinese)
21. Dohmen D, Feldgoise J, Weinstein E S, et al. Controlling Access to Advanced Compute via the Cloud: Options for US. Policymakers, Part I. (2023-05-16)[2025-09-22]. https://www.cnas.org/publications/commentary/controlling-access-to-advanced-compute-via-the-cloud-options-for-u-s-policymakers-part-i.
22. Dohmen D, Feldgoise J, Weinstein E S, et al. Controlling Access to Advanced Compute via the Cloud: Options for US. Policymakers, Part II. (2023-06-05)[2025-09-22]. https://cset.georgetown.edu/article/controlling-access-to-compute-via-the-cloud-options-for-u-s-policymakers-part-ii/.
23. Crawford S. China will likely corner the 5G market—and the US has no plan. (2019-02-20)[2025-03-12]. https://www.wired.com/story/china-will-likely-corner-5g-market-us-no-plan/.
24. MedinM, Louie G. The 5G ecosystem: risks & opportunities for DoD. (2019-04-03)[2025-03-12]. https://media.defense.gov/2019/Apr/03/2002109302/-1/1/0/DIB_5G_STUDY_04.03.19.PDF.
25. CNN. Huawei connects rural America. Could it threaten the country’s most sensitive military sites?. (2019-03-11)[2025-03-12]. https://edition.cnn.com/2019/03/11/politics/huawei-cell-towers-missile-silos/.
26. Parkinson J, Bariyo N, Chin J. Huawei technicians helped African governments spy on political opponents. (2019-08-15)[2025-03-12]. https://www.wsj.com/articles/huawei-technicians-helped-african-governments-spy-on-political-opponents-11565793017.
27. OpenAI. OpenAI’s proposals for the U.S. AI action plan. (2025-03-13)[2025-03-29]. https://openai.com/global-affairs/openai-proposals-for-the-us-ai-action-plan/.
28. 张宇燕, 冯维江. 如何理解中美贸易摩擦. 光明日报. 2018-04-24(15). Zhang Y Y, Feng W J. How to understand the trade friction between China and the United States. Guangming Daily. 2018-04-24(15). (in Chinese)
29. Rasser M, Riikonen A, Wu H. Edge networks, core policy securing America’s 6G future. Washington DC: Center for a New American Security, 2021.
30. 韩秋明. 美国国家关键技术选择的组织过程和主要方法研究. 全球科技经济瞭望, 2023, 38(2): 1-8. Han Q M. Research on the organization process and major methods of the U.S. national key technology selection. Global Science, Technology and Economy Outlook, 2023, 38(2): 1-8. (in Chinese)
31. 互联网新闻研究中心. 美国是如何监视中国的:美国全球监听行动纪录. 北京: 人民出版社, 2014. Internet News Research Center. How the United States Monitors China: A Record of Global Surveillance Operations by the United States. Beijing: People’s Publishing House, 2014.
32. 陈峰, 彭俊玲. 美国商务部工业与安全局情报工作透视. 情报杂志, 2024, 43(11): 1-10. Chen F, Peng J L. Research on intelligence work of the bureau of industry and security of U.S. department of commerce. Journal of Intelligence, 2024, 43(11): 1-10. (in Chinese)
33. Office of Public Affairs, U.S. Department of Justice. Justice and commerce departments announce creation of disruptive technology strike force. (2023-02-16)[2025-03-29]. https://www.justice.gov/archives/opa/pr/justice-and-commerce-departments-announce-creation-disruptive-technology-strike-force.
34. 陈喆, 陈佳贝, 张子鸢. 新安全格局下中国技术安全管制立法的检视与完善. 世界科技研究与发展, 2023, 45(6): 679-692. Chen Z, Chen J B, Zhang Z Y. Examination and improvement of China’s technology safety control legislation under the new security pattern. World Sci-Tech R & D, 2023, 45(6): 679-692. (in Chinese)
35. 罗兰. 美国的全球经济制裁——跨境合规视角. (2022-11-28)[2025-03-29]. https://www.deheheng.com/yjy/lssd/28012.html. Luo L. Global economic sanctions by the United States: A cross-border compliance perspective. (2022-11-28)[2025-03-29]. https://www.deheheng.com/yjy/lssd/28012.html.
36. 李玲. 中国应对美国长臂管辖的法律路径. 中国外资, 2025, (1): 100-103. Li L. The legal path for China to respond to the long arm jurisdiction of the United States. Foreign Investment in China, 2025, (1): 100-103. (in Chinese)
37. 蔡翠红. 大变局时代的技术霸权与“超级权力”悖论. 人民论坛·学术前沿, 2019, (14): 17-31. Cai C H. Technological hegemony and the paradox of “superpower” in the age of great change. Frontiers, 2019, (14): 17-31. (in Chinese)
38. 唐新华. 西方“技术联盟”:构建新科技霸权的战略路径. 现代国际关系, 2021, (1): 38-46. Tang X H. Techno democratic alliances: Strategic path for new technological hegemony. Contemporary International Relations, 2021, (1): 38-46. (in Chinese)
Recommended Citation
WANG, Kaile; LIU, Hao; and CHEN, Yunwei
(2026)
"Research on signal perception system of key technology regulation in the United States,"
Bulletin of Chinese Academy of Sciences (Chinese Version): Vol. 41
:
Iss.
3
, Article 17.
DOI: https://doi.org/10.3724/j.issn.1000-3045.20250418001
Available at:
https://bulletinofcas.researchcommons.org/journal/vol41/iss3/17
Included in
Defense and Security Studies Commons, Information Security Commons, Science and Technology Policy Commons


