This should shock exactly nobody. China has been using the small amount of Uyghur terrorism they have been experiencing as an excuse to dramatically upgrade their surveillance technology.
It’s being sold to the public with the same slick semi-usefulness that Apple, Amazon and Google used to sell Americans on installing at-home surveillance systems. It’s convenient! [wapo]
For 40-year-old Mao Ya, the facial recognition camera that allows access to her apartment house is simply a useful convenience.
Again, we have a weird epistemology: “Bad Guys” are the problem.
But for the police, the cameras that replaced the residents’ old entry cards serve quite a different purpose.
Now they can see who’s coming and going, and by combining artificial intelligence with a huge national bank of photos, the system in this pilot project should enable police to identify what one police report, shared with The Washington Post, called the “bad guys” who once might have slipped by.
What if there are no “Bad Guys”? What if the object of control is control? What if the object of power is power? Surely no government would use such capabilities against its citizens, right?
It is past time to ask “who are the Bad Guys”?
When the US police state tried to build this, it was called “Total Information Awareness” and there was a mild public outcry and journalists covered it, until the program changed its name – or, more precisely, the inputs continued to collect their pieces, but the process of integrating it all into one gigantic data-swamp didn’t happen. It’s probably a good thing because it would have mostly implemented the biggest Big Data Boondoggle, ever.
The pilot in Chongqing forms one tiny part of an ambitious plan, known as “Xue Liang,” which can be translated as “Sharp Eyes.” The intent is to connect the security cameras that already scan roads, shopping malls and transport hubs with private cameras on compounds and buildings, and integrate them into one nationwide surveillance and data-sharing platform.
It will use facial recognition and artificial intelligence to analyze and understand the mountain of incoming video evidence; to track suspects, spot suspicious behaviors and even predict crime; to coordinate the work of emergency services; and to monitor the comings and goings of the country’s 1.4 billion people, official documents and security industry reports show.
At the back end, these efforts merge with a vast database of information on every citizen, a “Police Cloud” that aims to scoop up such data as criminal and medical records, travel bookings, online purchase and even social media comments – and link it to everyone’s identity card and face.
In both cases, AI is the presumed panacea for looking through billions and billions of records and trying to find patterns. AIs are good at that, if you train them with the right behavior-set. Message to former Stasi investigators: you can probably get a good job in China, training AIs, for a while. Basically, we’re heading into the territory where Black Mirror starts to look like a documentary: what happens when the AI decides you’re a subversive and cuts off your money, locks your apartment, refuses to let you board transportation, and you’ve just become one of the digitally disappeared? John Brunner’s The Shockwave Rider [wik] may not be dystopian; it may be optimistic. If you work in IT, now, you may want to think about how to get a job in the department that manages identities; you’re going to need backdoors in those systems.
If you follow this blog, you already know that the US has a similar system, [stderr] they’ve just had to conceal it (a bit) behind public/private industry partnerships and classified mumbo-jumbo. But really, it’s a linear story-trajectory from J. Edgar Hoover’s file cabinets to the “radicals list” to COINTELPRO and vacuuming up mobile phone contact lists from protesters “kettled” at a rally. China is going at it a bit more overtly because they just don’t care quite as much.
In the showrooms of three facial-recognition start-ups in Chongqing and Beijing, video feeds roll past on big screens, with faces picked out from crowds and matched to images of wanted men and women. Street cameras automatically classify passersby according to gender, clothes and even hair length, and software allows people to be tracked from one surveillance camera to the next, by their faces alone.
Remember those blockheads who were going to sell “personality detection” AI to work on face recognition systems? [stderr] They have their counterparts in China, too. [business standard]
Security checkpoints with identification scanners guard the train station and roads in and out of town. Facial scanners track comings and goings at hotels, shopping malls and banks. Police use hand-held devices to search smartphones for encrypted chat apps, politically charged videos and other suspect content. To fill up with gas, drivers must first swipe their ID cards and stare into a camera.
China’s efforts to snuff out a violent separatist movement by some members of the predominantly Muslim Uighur ethnic group have turned the autonomous region of Xinjiang, of which Urumqi is the capital, into a laboratory for high-tech social controls that civil-liberties activists say the government wants to roll out across the country.
When fruit vendor Parhat Imin swiped his card at a telecommunications office this summer to pay an overdue phone bill, his photo popped up with an “X.” Since then, he says, every scan of his ID card sets off an alarm. He isn’t sure what it signifies, but figures he is on some kind of government watch list because he is a Uighur and has had intermittent run-ins with the police.
He says he is reluctant to travel for fear of being detained. “They blacklisted me,” he says. “I can’t go anywhere.”
If the Chinese can make this system halfway work, they’re going to have a good customer in Israel (though I believe that Israel is already building their own version) and with the US currently in thrall to racist ultra-nationalists, I think we are looking at an unwelcome glimpse into our future.
During an October road trip into Xinjiang along a modern highway, two Wall Street Journal reporters encountered a succession of checkpoints that turned the ride into a strange and tense journey.
At Xingxing Gorge, a windswept pass used centuries ago by merchants plying the Silk Road, police inspected incoming traffic and verified travelers’ identities. The Journal reporters were stopped, ordered out of their car and asked to explain the purpose of their visit. Drivers, mostly those who weren’t Han Chinese, were guided through electronic gateways that scanned their ID cards and faces. [my emphasis]
Farther along, at the entrance to Hami, a city of a half-million, police had the Journal reporters wait in front of a bank of TV screens showing feeds from nearby surveillance cameras while recording their passport numbers.
Surveillance cameras loomed every few hundred feet along the road into town, blanketed street corners and kept watch on patrons of a small noodle shop near the main mosque. The proprietress, a member of the Muslim Hui minority, said the government ordered all restaurants in the area to install the devices earlier this year “to prevent terrorist attacks.”
The US system will be simple: it’ll check if you’re white.
“Racist ultra-nationalists” – as it has been, since the beginning.
“Most of whom weren’t Han Chinese” – what, exactly, is a “Han Chinese”? [stderr] Not to mention the Mongols, there was a lot of mixing with Japanese and Russians during the recent unpleasantness in the late 1930s and the 1940s. I suspect that the Chinese have no more idea what a Han Chinese is, than I do.
A prediction, if I may: these technologies amount to centralization and automation of the reins of political control. They make it easier for the few to control and manipulate the many. The end result is not more stable politics, it’s more palace coups. Look at Russia, which transitioned from a dictatorship to a pseudo-democracy, then was “flipped” by an intelligence service apparatchnik. In China, the central party has operated this way since Mao’s death. The US does not have a “deep state” but the power that is centralizing in the intelligence community and law enforcement apparatus – a revolution is not the danger; a palace coup, is.
smariam says
This is frankly horrifying. Isn’t there any way to escape this surveillance and growing encroachment on civil liberties?
Marcus Ranum says
smariam@#1:
Isn’t there any way to escape this surveillance and growing encroachment on civil liberties?
Nope.
The establishment has discovered that its power is less limited than they thought; why on Earth would they pull back? They’re going to push their control all the way to ’11’. The only hope is that it may collapse under its own weight, but if China – with 1/4 of the world’s population – can make it work, all the other countries in the world can, too.
Roj Blake says
The Surveillance State is being normalised in day to day life.
The faces of customers at Sydney’s Bahista Cafe are scanned by an iPad as they approach the barista at the coffee machine. Instantly the customer’s name, favourite order and whether they are due for a loyalty reward flashes up on another iPad facing staff.
(…)
“Customers overwhelmingly love it,” Cropley says. “They say they come to the cafe because it is so personal.”
http://www.theage.com.au/small-business/smallbiz-tech/facial-recognition-with-your-takeaway-coffee-20171221-h08qb5.html
My customers get a personal welcome because I take the time to remember their names, their likes, their interests, their football team (or not, as the case may be). It is called “personal” because it is performed by a person, not a machine.
The people who find this use of impersonal technology “personal” are those who justify the Surveillance State with the old trope “If you’ve done nothing wrong, you’ve nothing to hide”, to which I usually reply “I have done nothing wrong, therefore I have nothing to prove”.
Marcus Ranum says
Roj Blake@#3:
The Surveillance State is being normalised in day to day life.
Apple Pay and other systems like it really worry me; they bring in the potential that someone’s finances can be “frozen” not just tracked. That’s the end-game: they can “un-person” you with a mouse-click (and all your friends based on your coffee-buying time-synchrony map)
The people who find this use of impersonal technology “personal” are those who justify the Surveillance State with the old trope “If you’ve done nothing wrong, you’ve nothing to hide”, to which I usually reply “I have done nothing wrong, therefore I have nothing to prove”.
Well said. I’m heading to a point where I think “if you’ve done nothing wrong, you’re probably on the wrong side.”
Dunc says
If this was being proposed in the UK, I’d be fairly sanguine, on the grounds that there’s no way in hell it would ever actually get off the ground (although I’ve no doubt we could waste astronomical sums of money trying). However, I’ve no idea what the Chinese state’s record is like when it comes to IT projects of this scale…
Do you by any chance recall a British sci-fi dystopia from the ’80s called Max Headroom? That was a fairly significant element. (If you don’t, dig it up if you have the time, it’s well worth a watch…)
Marcus Ranum says
Dunc@#5:
However, I’ve no idea what the Chinese state’s record is like when it comes to IT projects of this scale…
It’s … interesting. One of the confusing factors is that nothing can ever be called a “failure” because that would mean admitting things didn’t work quite right. So you have to very carefully parse outcomes and, even then, it’s hard to know what’s going on. For example, the “Great Firewall of China” works but there were years where there were great big holes you could easily fling a moose through. But the Chinese didn’t just give up and tear it down – they kept working at it and it’s getting more effective. They have access to 1/4 of the world’s talent pool and we should not assume that Silicon Valley is the place where all the great programmers are, anymore (I mean, look: James Damore) But basically this stuff is all problems of scale and Baidu, Renren, Alibaba, and TaoBao – they all work fine. Alibaba spun up its own AWS equivalent after Amazon got pushed out of that market (same routine they used to push Google out of the market)
It would be quite like the Chinese to field a system that didn’t work very well, then keep hammering on it until it did. I would not be at all surprised if this big brother system isn’t fairly ironed out in the next decade. It sounds like it already works at least as well as the FBI’s disfunctional “fusion centers” and databases. The US’ big brother solution has been significantly hampered by inter-agency pissing contests more than by the fact that it’s unconstitutional and illegal.
Do you by any chance recall a British sci-fi dystopia from the ’80s called Max Headroom?
I remember it, but at that time I was on a media blackout (1985-1999 or so) and I didn’t see anything that came in over TV or cable. I’ll look around for some.
jrkrideau says
@ 6 Marcus
It strikes me that the new systems are extremely powerful but could be really fragile.
What if someone, perhaps a disgruntled person on the inside, simply hacks the system?
Something simple, such as wiping out the credit ratings of the 80 million members of the Communist Party of China, or, a dream of mine, adding the names of all the members of Parliament/US Senate/Russian Duma to the no-fly lists.
Marcus Ranum says
jrkrideau@#7:
It strikes me that the new systems are extremely powerful but could be really fragile.
Yes, the centralizing of the reins of power means that it’s easier to damage, deflect, or destroy them where they are centralized. If I had a re-do on my career/life I’d go back and take the generous offer I was tendered by one of the three-letter agencies, to build exactly the kind of systems I am worrying about. In retrospect, such systems need to be backdoored and rigged for self-destruction. The only way to defeat this stuff is from the inside. Unfortunately, the people building those systems also know that (in part because of nattering nabobs of negativity like yours truly warning them about system integrity…!) and perhaps the systems are resilient and cross-check themselves. The one ray of hope I saw was when Snowden pwn’d the NSA so hard, it demonstrated that their systems were designed and implemented by idiots.
There’s hope. But not much.
adding the names of all the members of Parliament/US Senate/Russian Duma to the no-fly lists.
The problem is you gotta think through the time-horizon of your attack. Basically, you need a full-up disambiguation cost attack. [cyb]
EnlightenmentLiberal says
I for one welcome our new Shadowrun Megacorps overlords.
/s