In the “Minority Report,” the police of the future were able to preventively arrest and the court sentenced a crime that had not yet occurred. The science-fiction story was used for this purpose by the minds of clairvoyants, but the Chinese government is enough for this mundane surveillance.
China Electronics Technology Group, a military contractor, has been tasked with developing a system that analyzes individual network behavior, financial transactions, contacts and location to predict potential terrorist acts.
What’s so special about this? In the end, China, unlike the West, is not trying to bustle freedom and civil liberties.
In addition to the services of the latter, many years have lagged behind informing the implementation of systems, such as catching specific phrases from telephone conversations and electronic correspondence. The authorities of the PRC are openly speaking of inspirations and learning from Western experiences, especially of American colleagues.
However, the differences are crucial
Firstly, the Central State may become the first to operate this system.
Second: the definition of terrorism in the PRC is so large that public assemblies can be counted in it.
The question: what will it lead to, will in the future certainly be the subject of many disputes. In the meantime, it is good to know how it will be possible at all.
For years, Chinese have been successfully encouraged to use native Internet services: from search engines, through email, to social networking sites and instant messengers. Western companies must adhere to the rules, otherwise they will be blocked on the firewall, which protects the entire Chinese network from unwanted (by the authorities) content.
The law introduced in December requires all companies involved in programming, encryption or maintenance to fully support security agencies as long as they are to prevent “terrorist activity.”
We can only guess that a similar rule applies to banking institutions, which store financial information.
The ministry also insists on introducing digital identity cards online that exclude any anonymous online activity. The latter, due to the fact that practically everyone is moving with the smartphone, will also easily provide location information, even without the hardships of mobile operators.
With live information on the Internet, financial transactions, location, and if the system is mass-based, interacting with others, it’s easy to imagine a system that catches “deviations from the norm”.