China Wants To Use AI To Predict Civil Disorder

China’s domestic security and intelligence chief has called on the country’s police to use artificial intelligence to improve their ability to predict and prevent terrorism and social unrest.

Meng Jianzhu (pictured) head of the Communist Party’s central commission for political and legal affairs in charge of the country’s massive security and intelligence systems, pledged at a meeting in Beijing on Tuesday 19th September to use AI through machine learning, data mining and computer modelling to help stamp out risks to stability.

“Artificial intelligence can complete tasks with a precision and speed unmatchable by humans, and will drastically improve the predictability, accuracy and efficiency of social management,” Meng was quoted by Chinese news website Thepaper.cn.

Meng said security forces should study patterns that might be spotted in cases of terrorist attacks and public security incidents and build a data analysis model to improve the authorities’ ability to predict and stop such events taking place.

The idea has echoes of Steven Spielberg’s science fiction thriller Minority Report, in which the authorities use technology and genetic mutation to predict when and where crimes will take place.

Meng said the security services should break down any barriers in data sharing to enable the smooth integration of various systems.

He also called for renewed efforts to integrate all the footage from surveillance cameras around the country.

It is not the first time the security chief has stressed the need for high technology to strengthen the country’s sprawling surveillance network to help combat crime.

Meng said last month during a five-day inspection in the restive Xinjiang Uygur autonomous region in western China that large-scale use of cloud computing and AI, as well as analysis of “big data”, should be used to fight terrorism.

Zunyou Zhou, a counterterrorism law expert at Germany’s Max Planck Institute for Foreign and International Criminal Law, said Xinjiang – where the government has vowed to combat what it calls the rising threat of terrorism and extremism – could provide a testing ground for cutting edge technologies.

However, he warned that the government’s unbridled access to massive amounts of personal data could lead to abuse.

“China has no specific data protection law. The government can use personal data in any way they like, which could pose a huge threat to its citizens’ privacy,” he said, adding that legislation on the issue was urgently needed.

Maintaining social stability is one of the key tasks Beijing has set for its fledging AI industry.

The State Council unveiled a national artificial intelligence development plan in July, with the aim to raise the value of its core AI industries to 150 billion yuan (US$22.8 billion) by 2020 and 400 billion yuan by 2025.

The blueprint explicitly lays out AI’s role in helping to manage public security, such as developing products that can analyse video footage and identify suspects from the biometrics of their faces and bodies.

Some technologies, such as facial recognition, have already been put into use, albeit for detecting the perpetrators of only minor crimes. Mainland Chinese media reported this week that traffic police in Shanghai were now using facial recognition technology to identify cyclists and pedestrians caught on surveillance cameras violating traffic regulations.

The government has also directed one of the country’s largest state-run defence contractors, China Electronics Technology Group, to develop software to collate data on citizens’ jobs, hobbies, consumption habits and other behaviour to help predict terrorist acts before they occur, Bloomberg reported last year.

“It’s crucial to examine the cause after an act of terror, but what is more important is to predict upcoming activities.” Wu Manqing, the chief engineer for the military contractor, was quoted as saying.

SCMP.com

You Might Also Read: 

China Postpones Implementing New Cybersecurity Law:

Here Comes China’s Crypto-Currency:

« N.Korea's Cyber Threats To S.Korea
Iranian Hackers Linked To Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Voyager Networks

Voyager Networks

Voyager Networks is an IT solutions business with a focus on Enterprise Networks, Security and Collaborative Communications.

Planit Testing

Planit Testing

Planit is a leader in Quality Assurance and a specialist in software testing and training services.

Attivo Networks

Attivo Networks

Attivo Networks is an award winning provider of deception for in-network threat detection, attack forensic analysis, and continuous threat response.

Ground Labs

Ground Labs

Ground Labs is a security software company dedicated to making sensitive data discovery products that help organisations prevent sensitive data loss.

Cyber Security National Lab (CINI)

Cyber Security National Lab (CINI)

The Cyber Security National Lab brings together Italian academic excellence in Cyber Security research.

Cimcor

Cimcor

Cimcor’s flagship software product, CimTrak, helps organizations to monitor and protect a wide range of physical, network and virtual IT assets in real-time.

Cortado Mobile Solutions

Cortado Mobile Solutions

Cortado Mobile Solutions creates enterprise mobility and file sharing solutions for companies, teams and freelancers.

GM Security Technologies

GM Security Technologies

GM Security Technologies provides leading managed security services of the highest quality to every type of individual and organization in Puerto Rico, Caribbean and Latin America.

MagiQ Technologies

MagiQ Technologies

MagiQ produced the world’s first commercial quantum cryptography product that delivered advanced, future-proof network security.

BitNinja

BitNinja

BitNinja provides full-stack server security in one easy-to-use protection suite. Enjoy real-time protection, automatic false positive handling and threat analysis for more in-depth insights.

A&O IT Group

A&O IT Group

A&O IT Group provide IT support and services including IT Managed Services, IT Project Services, IT Engineer Services and Cyber Security.

Clear Skye

Clear Skye

Clear Skye, an Identity Access and Management (IAM) software company, reimagines enterprise identity access and risk management software to make a complicated problem easier to manage.

Trojan Horse Security

Trojan Horse Security

Trojan Horse Security are specialists in corporate security. Our services include: Comprehensive Cyber Security Analysis, Penetration Testing, Network Security and Security Audits.

OxCyber

OxCyber

OxCyber's mission is to ignite and encourage cybersecurity and technology growth in the Thames Valley through meetings, webinars, in person events, workshops and mentorship programs.

True North Solutions

True North Solutions

True North Solutions provides a wide range of fully customized, vendor-neutral industrial engineering and OT automation solutions to companies across North America and around the world.

Bureau

Bureau

Bureau is a no-code, identity decisioning platform that offers businesses the complete range of risk, compliance and ongoing fraud monitoring solutions innovated with AI.