China Wants To Use AI To Predict Civil Disorder

China’s domestic security and intelligence chief has called on the country’s police to use artificial intelligence to improve their ability to predict and prevent terrorism and social unrest.

Meng Jianzhu (pictured) head of the Communist Party’s central commission for political and legal affairs in charge of the country’s massive security and intelligence systems, pledged at a meeting in Beijing on Tuesday 19th September to use AI through machine learning, data mining and computer modelling to help stamp out risks to stability.

“Artificial intelligence can complete tasks with a precision and speed unmatchable by humans, and will drastically improve the predictability, accuracy and efficiency of social management,” Meng was quoted by Chinese news website Thepaper.cn.

Meng said security forces should study patterns that might be spotted in cases of terrorist attacks and public security incidents and build a data analysis model to improve the authorities’ ability to predict and stop such events taking place.

The idea has echoes of Steven Spielberg’s science fiction thriller Minority Report, in which the authorities use technology and genetic mutation to predict when and where crimes will take place.

Meng said the security services should break down any barriers in data sharing to enable the smooth integration of various systems.

He also called for renewed efforts to integrate all the footage from surveillance cameras around the country.

It is not the first time the security chief has stressed the need for high technology to strengthen the country’s sprawling surveillance network to help combat crime.

Meng said last month during a five-day inspection in the restive Xinjiang Uygur autonomous region in western China that large-scale use of cloud computing and AI, as well as analysis of “big data”, should be used to fight terrorism.

Zunyou Zhou, a counterterrorism law expert at Germany’s Max Planck Institute for Foreign and International Criminal Law, said Xinjiang – where the government has vowed to combat what it calls the rising threat of terrorism and extremism – could provide a testing ground for cutting edge technologies.

However, he warned that the government’s unbridled access to massive amounts of personal data could lead to abuse.

“China has no specific data protection law. The government can use personal data in any way they like, which could pose a huge threat to its citizens’ privacy,” he said, adding that legislation on the issue was urgently needed.

Maintaining social stability is one of the key tasks Beijing has set for its fledging AI industry.

The State Council unveiled a national artificial intelligence development plan in July, with the aim to raise the value of its core AI industries to 150 billion yuan (US$22.8 billion) by 2020 and 400 billion yuan by 2025.

The blueprint explicitly lays out AI’s role in helping to manage public security, such as developing products that can analyse video footage and identify suspects from the biometrics of their faces and bodies.

Some technologies, such as facial recognition, have already been put into use, albeit for detecting the perpetrators of only minor crimes. Mainland Chinese media reported this week that traffic police in Shanghai were now using facial recognition technology to identify cyclists and pedestrians caught on surveillance cameras violating traffic regulations.

The government has also directed one of the country’s largest state-run defence contractors, China Electronics Technology Group, to develop software to collate data on citizens’ jobs, hobbies, consumption habits and other behaviour to help predict terrorist acts before they occur, Bloomberg reported last year.

“It’s crucial to examine the cause after an act of terror, but what is more important is to predict upcoming activities.” Wu Manqing, the chief engineer for the military contractor, was quoted as saying.

SCMP.com

You Might Also Read: 

China Postpones Implementing New Cybersecurity Law:

Here Comes China’s Crypto-Currency:

« N.Korea's Cyber Threats To S.Korea
Iranian Hackers Linked To Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Council of European Professional Informatics Societies (CEPIS)

Council of European Professional Informatics Societies (CEPIS)

CEPIS is the representative body of national informatics associations throughout Europe and represent over 450,000 ICT and informatics professionals in 32 countries.

Hewlett Packard Enterprise (HPE)

Hewlett Packard Enterprise (HPE)

HPE is an information technology company focused on Enterprise networking, Services and Support.

We Watch Your Website

We Watch Your Website

We Watch Your Website provide website monitoring, protection, malware removal and root cause analysis services to help you keep your website secure.

Secure Recruiting International (SRI)

Secure Recruiting International (SRI)

SRI is an industry leader in Information Security , Networking, Wireless and Storage recruitment.

Cyber Akademie (CAk)

Cyber Akademie (CAk)

Cyber Akademie is a training and education center providing high-quality training and information events on information security and data protection.

Conceptivity +360 Cybersecurity

Conceptivity +360 Cybersecurity

Conceptivity +360 Security addresses advanced cybersecurity and supply chain security issues in policy, regulatory, legislation, standardisation, compliance and project management areas.

Resilience First

Resilience First

Resilience First is a not-for-profit organisation, led and funded by business to strengthen collective business resilience in all areas, including cyber security.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

Sayata Labs

Sayata Labs

Sayata delivers a streamlined solution for processing cyber policies. Increase profitability with an easy and intuitive platform.

Conquest Cyber

Conquest Cyber

Conquest Cyber builds adaptive risk management programs where innovation is most needed – within defense, intelligence, federal civilian agencies and the industrial base that supports them.

DTS Systeme

DTS Systeme

DTS Systeme is an IT service provider with a focus on the core areas of datacenter, technologies and IT security.

North East Business Resilience Centre (NEBRC)

North East Business Resilience Centre (NEBRC)

The North East Business Resilience Centre is a non-profit organisation here to support businesses in the North East of England in protecting themselves from cyber crimes and fraud.

UM6P Ventures

UM6P Ventures

UM6P Ventures is an African based early-stage ventures firm operating two funds; a Digital Transformation fund and a Deeptech Ventures fund.

Crypto Legal

Crypto Legal

Crypto Legal is a leading UK-based law firm specialising in blockchain forensics and legal services.

Fingerprints

Fingerprints

Fingerprints is the world-leading biometrics company. Our solutions are found in millions of devices providing safe and convenient identification and authentication with a human touch.

Quotient

Quotient

Quotient builds digital experiences that empower and inspire the American people by understanding their needs, simplifying complex technical solutions and adapting to how they work, live and learn.