CSI;’‘’‘’‘’‘;’;/;;‘’/;‘;
In the year 2130, AI has evolved into a highly autonomous information integration tool capable of complete self-iteration. Amid ongoing debates about relinquishing individual privacy for public safety and freedom, a new type of SI (Surveillant intelligent) has addressed this major challenge.
SI employs highly iterative Seed code to encrypt citizen data and information, ensuring that no one can access any data regarding the surveillance of citizens. This revolution has reassured many skeptics. SI holds camera permissions for all electronic devices, overseeing the daily activities of all citizens. Through intensive observation and analysis, it identifies individual behavior routines. Based on behavior analysis theory (attitude, cognition, and behavior—interactions between individuals and groups), SI accurately reports unusual behaviors without any false alarms, collaborating with public security agencies to achieve public deterrence, crime supervision, and assistance in solving cases.
When an alert is generated, SI observes to confirm whether the behavior has a collective impact or constitutes a sustained change. If the behavior is deemed an isolated incident, SI proceeds to the second step of data sample analysis, searching for matching patterns in large databases of daily behaviors and criminal samples to determine the nature of the event. If the behavior is defined as a potential criminal act or victimization, SI reports it to the public security agencies for further investigation.
This disruptive technological development has transformed the world of criminal investigation. While debates persist about the feasibility of relinquishing freedom to artificial intelligence, the final result of a public vote indicates that 74% of the population agrees with this resolution.
As an independent detective under the public security department, you experienced the first shock in your work. It seemed like layoffs might be imminent for you. However, your concerns quickly vanished—approximately three months after the enactment of the law, you received an assignment from SI to assist in investigating a missing person case:
An employee who has never been absent from work suddenly missed five consecutive days, and it continues.
SI reported as follows:
::: The monitored individual has never shown any signs of tardiness, early departure, or absenteeism. No evidence of collective behavioral influences was found, and the social circle remains stable. Determined to be an isolated incident, further analysis is underway. :::
::: Out of 1,839,231 absenteeism samples, various reasons such as traffic accidents, running away from home, and social escape were identified, but no corresponding clues were found in the monitored samples of the individual. Analysis of 209,319 screened criminal samples suggests a probable classification as a missing person case, with no recent surveillance evidence related to criminal activities. :::
::: It is judged to be related to missing person crimes. Please assist in the investigation. :::
First, you visited the residence of the monitored person and were shocked to find the room immaculately clean, with no signs of anyone visiting after the person went missing. Could the monitored person have cleaned the room themselves before leaving? You pondered. But why didn't SI detect any travel trajectory of the monitored person?
Confused, you gained access to the SI assistant program, which, under ethical considerations, allows targeted investigations through keywords. You chose to use SI's refined screening function to search for the possibility of dismemberment. This investigative approach shifted from identifying unusual behaviors to recognizing unusual objects.
During the screening process, you also reported this bizarre case to the public security department. Surprisingly, within the public security department, a faction revealed the case, which SI couldn't solve, to the media. The event quickly escalated, sparking widespread discussions among the public.
Numerous images were reported by the public—many claimed to have seen different degrees of disturbing unidentified organizations in various virtual spaces. They appeared in the rooms of online celebrities, live streaming sessions, online classrooms, virtual courtrooms, rooms of psychological counselors, canvases, stages of virtual singers... Holding the ground meat you were about to process, you suddenly lost your appetite—similar human tissue seemed to be scattered across various professions worldwide, which was too bizarre. You decided to have SI investigate the correlation of this massive dismemberment case.
After days of data analysis, SI came to an unsettling conclusion. Despite their altered appearance, through the investigation of organizational volume and human features, all these human tissues originated from the same person, with missing parts still present. Could it be the monitored person?
You reported this result to the public security department, and they immediately sent you to investigate the whereabouts of these related suspects. After nearly a few months of investigation, an even more shocking conclusion was drawn—all these related individuals disappeared like the monitored person, or rather, not only disappeared but seemed to have never existed in life.
You reported this frustrating result, and after several days of meetings, the public security department announced the suspension of the investigation but opened the collection of public clues for this case. Satisfied, you closed the computer of the online meeting, picked up your luggage, and left.