China Wants To Use AI To Predict Civil Disorder

China’s domestic security and intelligence chief has called on the country’s police to use artificial intelligence to improve their ability to predict and prevent terrorism and social unrest.

Meng Jianzhu (pictured) head of the Communist Party’s central commission for political and legal affairs in charge of the country’s massive security and intelligence systems, pledged at a meeting in Beijing on Tuesday 19th September to use AI through machine learning, data mining and computer modelling to help stamp out risks to stability.

“Artificial intelligence can complete tasks with a precision and speed unmatchable by humans, and will drastically improve the predictability, accuracy and efficiency of social management,” Meng was quoted by Chinese news website Thepaper.cn.

Meng said security forces should study patterns that might be spotted in cases of terrorist attacks and public security incidents and build a data analysis model to improve the authorities’ ability to predict and stop such events taking place.

The idea has echoes of Steven Spielberg’s science fiction thriller Minority Report, in which the authorities use technology and genetic mutation to predict when and where crimes will take place.

Meng said the security services should break down any barriers in data sharing to enable the smooth integration of various systems.

He also called for renewed efforts to integrate all the footage from surveillance cameras around the country.

It is not the first time the security chief has stressed the need for high technology to strengthen the country’s sprawling surveillance network to help combat crime.

Meng said last month during a five-day inspection in the restive Xinjiang Uygur autonomous region in western China that large-scale use of cloud computing and AI, as well as analysis of “big data”, should be used to fight terrorism.

Zunyou Zhou, a counterterrorism law expert at Germany’s Max Planck Institute for Foreign and International Criminal Law, said Xinjiang – where the government has vowed to combat what it calls the rising threat of terrorism and extremism – could provide a testing ground for cutting edge technologies.

However, he warned that the government’s unbridled access to massive amounts of personal data could lead to abuse.

“China has no specific data protection law. The government can use personal data in any way they like, which could pose a huge threat to its citizens’ privacy,” he said, adding that legislation on the issue was urgently needed.

Maintaining social stability is one of the key tasks Beijing has set for its fledging AI industry.

The State Council unveiled a national artificial intelligence development plan in July, with the aim to raise the value of its core AI industries to 150 billion yuan (US$22.8 billion) by 2020 and 400 billion yuan by 2025.

The blueprint explicitly lays out AI’s role in helping to manage public security, such as developing products that can analyse video footage and identify suspects from the biometrics of their faces and bodies.

Some technologies, such as facial recognition, have already been put into use, albeit for detecting the perpetrators of only minor crimes. Mainland Chinese media reported this week that traffic police in Shanghai were now using facial recognition technology to identify cyclists and pedestrians caught on surveillance cameras violating traffic regulations.

The government has also directed one of the country’s largest state-run defence contractors, China Electronics Technology Group, to develop software to collate data on citizens’ jobs, hobbies, consumption habits and other behaviour to help predict terrorist acts before they occur, Bloomberg reported last year.

“It’s crucial to examine the cause after an act of terror, but what is more important is to predict upcoming activities.” Wu Manqing, the chief engineer for the military contractor, was quoted as saying.

SCMP.com

You Might Also Read: 

China Postpones Implementing New Cybersecurity Law:

Here Comes China’s Crypto-Currency:

« N.Korea's Cyber Threats To S.Korea
Iranian Hackers Linked To Malware »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Virtual Security

Virtual Security

Virtual Security provides solutions in the field of managed security services, network security, secure remote work, responsible internet, application security, encryption, BYOD and compliance.

International Conference on Information Systems Security & Privacy (ICISSP)

International Conference on Information Systems Security & Privacy (ICISSP)

The ICISSP event is a meeting point for researchers and practitioners to address security and privacy challenges concerning information systems.

Combitech

Combitech

Combitech is the Nordic region’s leading cyber security consultancy firm, with about 260 certified security consultants helping companies and authorities prevent and manage cyber threats.

CSIS Security Group

CSIS Security Group

CSIS provide actionable threat intelligence, prevention, incident response and 24/7 managed security services.

Center for Identity - University of Texas at Austin

Center for Identity - University of Texas at Austin

The mission of the Center is to deliver the highest-quality discoveries, applications, education, and outreach for excellence in identity management, privacy, and security.

CyberWarrior

CyberWarrior

CyberWarrior deliver training and consulting for some of the world’s top brands and also partner with national systems integrators to augment their teams with our expertise.

Lynx

Lynx

Lynx provides high added value services in the area of information systems security and ICT infrastructure building.

Lineal Services

Lineal Services

Lineal supports clients in meeting their digital forensics, cyber security and eDiscovery needs by providing bespoke solutions to complex problems.

certSIGN

certSIGN

certSIGN develop innovative software for information security and information systems protection.

Sponge

Sponge

Cybersecurity Sorted by Sponge is a seriously engaging training game to make your staff the first line of defence against cyber threats.

Cybersecurity Coalition

Cybersecurity Coalition

The mission of the Cybersecurity Coalition is to bring together leading companies to help policymakers develop consensus-driven policy solutions to achieve improvements in cybersecurity.

Liquid Intelligent Technologies

Liquid Intelligent Technologies

Liquid Intelligent Technologies is a leading communications solutions provider across Africa, providing reliable connectivity, hosting, co-location, and digital services including cyber security.

Fastcomcorp

Fastcomcorp

Fastcomcorp offers a world-class proactive cyber security defense and risk management consulting. Including Darkweb monitoring and posture assessments.

ITTAS

ITTAS

ITTAS is a multidisciplinary company specializing in information security and software and hardware protection software.

MyCena

MyCena

MyCena has developed a complete system of security, control and management for decentralised credentials.

Regtank Technology

Regtank Technology

Regtank is a one-stop compliance solution for fintechs, navigating compliance, security and risk management.

at-yet (@-yet)

at-yet (@-yet)

at-yet are an interdisciplinary team of experts. We are all about achieving results, whatever the situation – an acute incident, risk minimisation, safeguarding or data protection.