Add Bookmark | Recommend this book | Back to the book page | My bookshelf | Mobile Reading

Free Web Novel,Novel online - All in oicq.net -> Sci-fi -> Quick Travel Guide: Attack!  cannon fodder

Chapter 912 Hands in the Crowd (50)

Previous page        Return to Catalog        Next page

    ?

    When Mr. Ma heard this, he was overjoyed.

    When he reported the hidden message to his subordinates, he was full of joys and sorrows, and he was so worried that he didn't fall asleep all night.

    These days of waiting for the results of the investigation, I was even more restless. I always felt that there was a sword hanging above my head, and I didn't know when it would fall.

    What the little girl submitted was a general description of the monitoring system.

    Speaking of the monitoring system is an underestimation of the other party.

    Once this project is rolled out across the country, it will be equivalent to bringing together all the information in public places, and will automatically connect to the police files.

    If there are fugitives outside, no matter how disguised they are, the monitoring system will automatically capture the morphological characteristics under the skin, and compare them with the internal video data.  When the results reach a high probability of coincidence, the police will be quietly notified to investigate.

    This has greatly improved the efficiency of handling cases, which is far more powerful than the specious and extremely high error rate reports of the masses.

    Existence such as human traffickers is even more difficult to carry on.

    Those abducted people, whether women or children, or laborers who are going to be abducted, will be monitored and searched across the country immediately after the family members of the missing person report and enter the information, and they will immediately be aware of the other party's location.

    There is even a real-time reporting function.

    Once someone is attacked outside or encounters other bullying, they can immediately call the police through the app shortcut key equipped on the mobile phone.

    The monitoring will immediately scan the scene around the person concerned, upload it to the nearest patrol officer, notify the police mission, and issue instructions to other people around, either for self-protection, or when the value of force is guaranteed.  During the period when the police arrive, they can choose to help the victim turn around.

    Not to mention behaviors like touching porcelain.

    Like an automatic investigation system, it is very convenient for eliminating all kinds of crimes.

    If there are any foreign forces secretly intruding, they usually need to send people to take precautions, check in multiple ways, and confirm the results through various ideological reports.

    There is still the possibility of mistakes in the middle.

    It is much easier to have this, and it is simply impossible to do something to their country secretly!

    This is to directly protect the information security of the entire country.

    The searched data will also be strictly encrypted. Except for the operator who owns the key, others have no right to retrieve it, so there is no need to worry about information leakage.

    More importantly, the most expensive part of this project is the operating system itself, and the equipment laid out has been deliberately simplified, and the cost is not even as high as the existing cameras.

    It can be said that it is a good thing that benefits the country and the people.

    This is certainly something to be happy about.

    But Mr. Ma had to worry a little more.

    What if such a thing is in the hands of some criminal?  When the designer contacted them, did he want to cooperate or threaten?

    In addition, although ordinary people are in this modern information society, information privacy is almost difficult to preserve in the use of various smart apps.

    However, this kind of comprehensive monitoring, even if it is stated in advance that even leaders like them cannot watch it, as long as they do not commit crimes, it will have no effect, and they will not have no opinion, right?

    Another point.

    If someone outside is more skilled than the designer, exploits a loophole to crack the key, and steals the data inside

    That would really bring disaster to the country and the people.  (Remember the site URL: www.hlnovel.com
Didn't finish reading? Add this book to your favoritesI'm a member and bookmarked this chapterCopy the address of this book and recommend it to your friends for pointsChapter error? Click here to report