Big data abstracts
On the evening of April 7th, Zhang Xueyou’s concert of 60,000 people was being held at the Nanchang International Sports Center in Jiangxi Province.
At 7:38 pm, the concert didn’t take long. The police came to the center stand and took away a man. According to the police, the man surnamed Yu, 31, Yushu, is a net escape suspect.
In order to see Jacky Cheung, he and his wife and friends drove nearly 100 kilometers the morning before. At a 10,000-person concert, he thought that no one would notice him.
Indeed, locking in a target among 60,000 people is not easy for people, but it is AI that he noticed.
This seems to be the scene in “Suspect Tracker” or “Black Mirror”, but it does happen.
American drama “Suspect Trailer” stills
It is understood that this concert added several cameras in the place opposite the ticket gate. Through the face recognition system, the information captured by the camera can be connected to the relevant database. This system counts the number of people entering and leaving the ticket gate, and at the same time, identifies and controls the identity of the personnel, and directly compares and compares the stored personnel data in the database.
According to media interviews with the on-site security police Li Jin, he said that on the day of the concert, he was informed by the control center that one of the controllers had entered the venue for the event.
“Because there are more on-site personnel, there are stands, there are also infields, there are more than 60,000 people, we are looking for people in the sea. Through the mobile phone terminal that comes with it, the face features of the suspects are inquired, and the photos are compared, roughly The characteristics of the face, we have been identified by the staff on duty. During the inspection, we saw him in the third zone. After repeated comparisons, we determined that he is the net escape person we are looking for.”
Live video of the concert (picture from China Daily)
The primary purpose of Nanchang’s use of this mobile portrait identity inspection system is to prevent stamping from happening and reduce criminal cases. This time, it was a very successful application case to be able to arrest suspects who were at large during the concert.
The police showed the mobile portrait identity verification system.
(Source: China Daily)
In addition, it has been reported earlier that the Zhengzhou police in China began to equip sunglasses with facial recognition to identify suspects. The sunglasses are connected to the police suspect database, which means the police can quickly scan the crowd and identify fugitives. According to official Chinese media reports, the new sunglasses have helped the police capture seven suspects.
Chinese citizens have always had a very high degree of tolerance for the placement of data to obtain private data. China has also been building “the world’s largest camera security network system.” According to the BBC, there are currently an estimated 170 million cameras in place in China, and it is expected that about 400 million new cameras will be installed in the next three years. Many of these cameras use artificial intelligence to perform facial recognition.
“The Chinese people still believe in the government. So whether it is our data collection capabilities or data control capabilities will be better than the West. “Yin Zhi, executive vice president of the China New Urbanization Research Institute of Tsinghua University, told Big Data Digest, “So at this level of excavation, we rely on the data chain to advance the progress of social governance far higher than any American democracy system. This is definitely visible. ”
According to the US Federal Bureau of Investigation, there are more than 789,000 unfinished felony warrants in the United States. The figures in China are no different. If you can identify criminals through the camera on the street and help the police catch them, this will Greatly reduce the number of wanted orders. In theory, this does provide social benefits.
Although for this purpose, we may have to pay some privacy.
The Facebook user data breach incident pushed the topic of “data privacy” to the cusp of public opinion. What kind of data can be used? How to use it is appropriate?
Yin Zhi said that through the use of big data to explore some of the laws, after the regularity of data cleaning, in fact, the interference and infringement of personal privacy is minimal.
Compared with the United States, Han Yizhen, deputy dean of the Tsinghua Data Science Research Institute, believes that the privacy concept of China and foreign countries is different. Han Yizhen said that “The Chinese emphasize more subjective, The characteristics of Chinese privacy protection are: I don’t think you know this, if you know it, privacy will be violated. Foreign emphasis is more objective, If the calm of life is disturbed or causes other inconveniences, then this is a violation of privacy. ”