China Wants To Use AI To Predict Civil Disorder

China’s domestic security and intelligence chief has called on the country’s police to use artificial intelligence to improve their ability to predict and prevent terrorism and social unrest.

Meng Jianzhu (pictured) head of the Communist Party’s central commission for political and legal affairs in charge of the country’s massive security and intelligence systems, pledged at a meeting in Beijing on Tuesday 19th September to use AI through machine learning, data mining and computer modelling to help stamp out risks to stability.

“Artificial intelligence can complete tasks with a precision and speed unmatchable by humans, and will drastically improve the predictability, accuracy and efficiency of social management,” Meng was quoted by Chinese news website Thepaper.cn.

Meng said security forces should study patterns that might be spotted in cases of terrorist attacks and public security incidents and build a data analysis model to improve the authorities’ ability to predict and stop such events taking place.

The idea has echoes of Steven Spielberg’s science fiction thriller Minority Report, in which the authorities use technology and genetic mutation to predict when and where crimes will take place.

Meng said the security services should break down any barriers in data sharing to enable the smooth integration of various systems.

He also called for renewed efforts to integrate all the footage from surveillance cameras around the country.

It is not the first time the security chief has stressed the need for high technology to strengthen the country’s sprawling surveillance network to help combat crime.

Meng said last month during a five-day inspection in the restive Xinjiang Uygur autonomous region in western China that large-scale use of cloud computing and AI, as well as analysis of “big data”, should be used to fight terrorism.

Zunyou Zhou, a counterterrorism law expert at Germany’s Max Planck Institute for Foreign and International Criminal Law, said Xinjiang – where the government has vowed to combat what it calls the rising threat of terrorism and extremism – could provide a testing ground for cutting edge technologies.

However, he warned that the government’s unbridled access to massive amounts of personal data could lead to abuse.

“China has no specific data protection law. The government can use personal data in any way they like, which could pose a huge threat to its citizens’ privacy,” he said, adding that legislation on the issue was urgently needed.

Maintaining social stability is one of the key tasks Beijing has set for its fledging AI industry.

The State Council unveiled a national artificial intelligence development plan in July, with the aim to raise the value of its core AI industries to 150 billion yuan (US$22.8 billion) by 2020 and 400 billion yuan by 2025.

The blueprint explicitly lays out AI’s role in helping to manage public security, such as developing products that can analyse video footage and identify suspects from the biometrics of their faces and bodies.

Some technologies, such as facial recognition, have already been put into use, albeit for detecting the perpetrators of only minor crimes. Mainland Chinese media reported this week that traffic police in Shanghai were now using facial recognition technology to identify cyclists and pedestrians caught on surveillance cameras violating traffic regulations.

The government has also directed one of the country’s largest state-run defence contractors, China Electronics Technology Group, to develop software to collate data on citizens’ jobs, hobbies, consumption habits and other behaviour to help predict terrorist acts before they occur, Bloomberg reported last year.

“It’s crucial to examine the cause after an act of terror, but what is more important is to predict upcoming activities.” Wu Manqing, the chief engineer for the military contractor, was quoted as saying.

SCMP.com

You Might Also Read: 

China Postpones Implementing New Cybersecurity Law:

Here Comes China’s Crypto-Currency:

« N.Korea's Cyber Threats To S.Korea
Iranian Hackers Linked To Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cloud Security Alliance (CSA)

Cloud Security Alliance (CSA)

The CSA is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing

Kaspersky Lab

Kaspersky Lab

Kaspersky Lab is one of the world’s largest privately held vendors of endpoint cybersecurity solutions.

AON

AON

Aon is a leading global provider of risk management (including cyber), insurance and reinsurance brokerage, human resources solutions and outsourcing services.

Lockton

Lockton

Lockton is the world’s largest privately owned insurance brokerage firm. Commercial services include Cyber Risk insurance.

Arsenal Insurance Company

Arsenal Insurance Company

Arsenal is an insurance provider based in Moscow, Russia. Services offered include Cyber Risk insurance.

Centripetal Networks

Centripetal Networks

Centripetal Networks was founded with one vision - to protect networks from advanced threats by simplifying intelligence-driven security.

GreatHorn

GreatHorn

GreatHorn offers the only cloud-native security platform that stops targeted social engineering and phishing attacks on communication tools like O365, G Suite, and Slack.

Intensity Analytics

Intensity Analytics

Intensity Analytics is a software firm that develops next-generation, physical user and entity behavioral authentication ("physical UEBA") security software technology.

EU Joint Research Centre

EU Joint Research Centre

JRC is the European Commission's science and knowledge service which employs scientists to carry out research in order to provide independent scientific advice and support to EU policy.

Qasky

Qasky

Anhui Qasky Quantum Technology Co. Ltd. (Qasky) is a new high-tech enterprise engaged in quantum information technology industrialization in China.

VLATACOM Institute

VLATACOM Institute

Vlatacom Institute is privately owned accredited research and development institute, system integrator and turn-key solution provider. Areas of expertise include encryption and authentication.

Cegeka

Cegeka

Cegeka is a family-owned IT company providing end-to-end IT solutions, services & consultancy.

Tech Seven Partners

Tech Seven Partners

At TechSeven Partners, we provide a full suite of cyber security solutions for your business including network monitoring, onsite and cloud backup solutions, HIPAA or PCI compliance.

Ontinue

Ontinue

Ontinue ION is an MXDR service that provides Nonstop SecOps through five key capabilities that enable your organization to respond to attacks and continuously reduce risk.

ITConnexion

ITConnexion

ITConnexion is an Australian-based Managed IT Service with over 20 years of experience. We offer a complete IT management service for non-profits, SMEs, and enterprises.

Digital & Intelligence Service (DIS)

Digital & Intelligence Service (DIS)

DIS is the fourth Service of the SAF, here to defend and dominate in the digital domain, and achieve peace and security for our land.