To Li Yalin, an experienced detective with an exceptional investigative instinct, the power of the AI model resembles the legendary golden hoop of the Monkey King and Poseidon’s mighty trident—truly, an extraordinary tool.
Often, criminal investigations hinge on a blend of experience and technology, or on the skill to gather and retrieve information.
When tracking a suspect from city A, if that individual leaves and the clues are deliberately severed, locating them can feel akin to searching for a needle in a haystack.
Yet, from a broader perspective, regardless of how immense the ocean may be where this needle has vanished, it still exists and retains the potential to be discovered.<fn7140> Fresh chapters posted on findnovel</fn7140>
The challenge lies in who possesses the resources tob through the entirety of that ocean.<h3 style="background-color:DodgerBlue">
Fortunately, AI now possesses that capability.
At the very least, the specialized AI model before us has this power.
It has analyzed all publicly avable content on the inte; theoretically, it knows every individual with a name and video presence online.
If provided with ample video footage and a bit of time, it can analyze every face in those videos and locate the person you seek.
From tens of thousands of videos, it can recognize hundreds, or even millions, of faces, homing in on the specific individual you’re after. If this task were done manually, it would require the continuous efforts of hundreds of people working for days or even weeks.
But for AI, this process might only take a matter of minutes.
The more Li Yalin pondered this, the more exhrated he became. He pulled Charlie Wade aside to a secluded spot and whispered, “Mr. Wade, if we could find a way to infiltrate the surveince systems of major airports worldwide and feed AI the face of someone from the Poqing Society, we would be able to track their movements every time they traveled by ne!”
Charlie Wade replied, “Is it feasible to hack into airport surveince?”
Li Yalin contemted for a moment before responding, “That depends on the security measures in ce at the airport or within the country. Hacking airport surveince in smaller, less developed countries might be rtively straightforward, but it would likely be much more challenging in developed nations, particrly those with advanced inte infrastructures.”
He continued, “However, I don’t believe it’spletely out of reach.”
Charlie Wade inquired, “Does Inspector Li have any strategies in mind?”
Li Yalin suggested, “Russian hackers are notoriously skilled. We could attempt to enlist their help to breach surveince cameras in various locations. If hacking fails, we can still gather data ourselves!”
“Gather it ourselves?” Charlie Wade asked. “Are you suggesting we set up our own surveince equipment at the airport or send people to film?”
Li Yalin shook his head and replied quietly, “We can utilize UGC big data!”
Charlie Wade looked puzzled. “UGC? What does that stand for?”
Li Yalin rified, “UGC stands for user-generated content. For instance, on your short video tform, millions of users upload their content and even live stream. This data constitutes UGC. Consider this: at any major airport or train station, a significant number of individuals will be capturing photos and videos. They post this content on social media, making it public. Atrge airports, there can be thousands or even tens of thousands of people present simultaneously, all using their phones to record each other, and uploading this footage. If the individual we’re searching for is at the airport, there’s a high likelihood they will be captured in someone else’s video.”
Charlie Wade nodded in agreement. “What Inspector Li says makes sense, but I can’t shake the feeling that this approach has some gaps. Perhaps 80% to 90% of people at the airport will be photographed by others, but whether that footage gets uploaded to social media is uncertain. If 80% do upload, then we might only capture 60% of our target, leaving 40% unounted for.”