Iris Lingyu Zhang

             


CSI;’‘’‘’‘’‘;’;/;;‘’/;‘;

2023Experimental video 3’00’’Speculative with the fear of the authority




In a future dominated by electronic surveillance, our daily routines, even as simple as drinking water, are no longer private acts but are monitored and analyzed by advanced systems like CSI (Cup Surveillance Intelligence). Introduced in 2053, CSI is a speculative government tool that uses the cameras and sensors embedded in everyday electronic devices to detect and analyze individual drinking behaviors. This surveillance system observes, records, and interprets seemingly mundane actions, such as how frequently we drink and what we drink, using data patterns to assess potential risks.
Through a color-coded alert system, CSI categorizes behavior into three levels: green for normal patterns, yellow for behaviors that require further observation, and red for significant deviations that trigger reports to authorities. This algorithmic oversight of individual consumption highlights the growing power of surveillance in shaping and controlling personal habits.
CSI is an experimental video work that imagines a future where every sip of water is scrutinized, which based on the short novel SI (Iris Lingyu Zhang,2023). The system, using advanced behavioral detection technologies, categorizes individual drinking habits into safe, suspicious, or dangerous patterns based on data analysis. It creates a narrative in which the simple act of drinking from a cup becomes a key point of surveillance—a metaphor for how capitalist systems in consumer societies analyze and interpret the behaviors of targeted groups. Just as corporations use algorithms to track consumer choices, CSI envisions a world where personal consumption is constantly watched, ranked, and judged.
This work critiques how surveillance systems and capitalist interests encroach on everyday life, suggesting that people, under such scrutiny, may feel compelled to conform to “safe” patterns of behavior to avoid being reported. In this speculative future, individuals control their drinking habits to align with what the system deems acceptable, further illustrating how societal norms are dictated by the interplay of surveillance and authority. CSI reflects on how capitalist power dynamics invisibly manipulate personal choices in the name of safety and security.
SI (Iris Lingyu Zhang,2023)

In the year 2130, AI has evolved into a highly autonomous information integration tool capable of complete self-iteration. Amid ongoing debates about relinquishing individual privacy for public safety and freedom, a new type of SI (Surveillant intelligent) has addressed this major challenge.

SI employs highly iterative Seed code to encrypt citizen data and information, ensuring that no one can access any data regarding the surveillance of citizens. This revolution has reassured many skeptics. SI holds camera permissions for all electronic devices, overseeing the daily activities of all citizens. Through intensive observation and analysis, it identifies individual behavior routines. Based on behavior analysis theory (attitude, cognition, and behavior—interactions between individuals and groups), SI accurately reports unusual behaviors without any false alarms, collaborating with public security agencies to achieve public deterrence, crime supervision, and assistance in solving cases.

When an alert is generated, SI observes to confirm whether the behavior has a collective impact or constitutes a sustained change. If the behavior is deemed an isolated incident, SI proceeds to the second step of data sample analysis, searching for matching patterns in large databases of daily behaviors and criminal samples to determine the nature of the event. If the behavior is defined as a potential criminal act or victimization, SI reports it to the public security agencies for further investigation.


This disruptive technological development has transformed the world of criminal investigation. While debates persist about the feasibility of relinquishing freedom to artificial intelligence, the final result of a public vote indicates that 74% of the population agrees with this resolution.

As an independent detective under the public security department, you experienced the first shock in your work. It seemed like layoffs might be imminent for you. However, your concerns quickly vanished—approximately three months after the enactment of the law, you received an assignment from SI to assist in investigating a missing person case:

An employee who has never been absent from work suddenly missed five consecutive days, and it continues.

SI reported as follows:

::: The monitored individual has never shown any signs of tardiness, early departure, or absenteeism. No evidence of collective behavioral influences was found, and the social circle remains stable. Determined to be an isolated incident, further analysis is underway. :::

::: Out of 1,839,231 absenteeism samples, various reasons such as traffic accidents, running away from home, and social escape were identified, but no corresponding clues were found in the monitored samples of the individual. Analysis of 209,319 screened criminal samples suggests a probable classification as a missing person case, with no recent surveillance evidence related to criminal activities. :::

::: It is judged to be related to missing person crimes. Please assist in the investigation. :::

First, you visited the residence of the monitored person and were shocked to find the room immaculately clean, with no signs of anyone visiting after the person went missing. Could the monitored person have cleaned the room themselves before leaving? You pondered. But why didn't SI detect any travel trajectory of the monitored person?

Confused, you gained access to the SI assistant program, which, under ethical considerations, allows targeted investigations through keywords. You chose to use SI's refined screening function to search for the possibility of dismemberment. This investigative approach shifted from identifying unusual behaviors to recognizing unusual objects.

During the screening process, you also reported this bizarre case to the public security department. Surprisingly, within the public security department, a faction revealed the case, which SI couldn't solve, to the media. The event quickly escalated, sparking widespread discussions among the public.

Numerous images were reported by the public—many claimed to have seen different degrees of disturbing unidentified organizations in various virtual spaces. They appeared in the rooms of online celebrities, live streaming sessions, online classrooms, virtual courtrooms, rooms of psychological counselors, canvases, stages of virtual singers... Holding the ground meat you were about to process, you suddenly lost your appetite—similar human tissue seemed to be scattered across various professions worldwide, which was too bizarre. You decided to have SI investigate the correlation of this massive dismemberment case.

After days of data analysis, SI came to an unsettling conclusion. Despite their altered appearance, through the investigation of organizational volume and human features, all these human tissues originated from the same person, with missing parts still present. Could it be the monitored person?

You reported this result to the public security department, and they immediately sent you to investigate the whereabouts of these related suspects. After nearly a few months of investigation, an even more shocking conclusion was drawn—all these related individuals disappeared like the monitored person, or rather, not only disappeared but seemed to have never existed in life.

You reported this frustrating result, and after several days of meetings, the public security department announced the suspension of the investigation but opened the collection of public clues for this case. Satisfied, you closed the computer of the online meeting, picked up your luggage, and left.








Relevant Works