2 THE CURRENT APPLICATION
STATUS OF AI IN CRIMINAL
INVESTIGATION
2.1 Typical Application Scenarios
2.1.1 Cross Border Crime Warning
With the development of technology, police work has
gradually shifted from combating crime to focusing
on crime prevention. Therefore, determining which
type of person is a potential criminal before a crime
occurs is called crime warning (Blount, 2024). AI
integrates global data sources such as international
flights, hotel stays, and financial transactions,
combined with technologies such as facial
recognition and voiceprint comparison, to track the
biometric trajectory of suspects in real time. For
example, the Deep Seek platform covers a data
network of over 200 countries and can predict the
hiding preferences of fugitives, such as in Chinese
communities or remote areas. Machine learning
models can also analyze historical cases, construct
behavioral profiles of fugitives, and provide early
warning of potential criminal pathways.
Meanwhile, by utilizing blockchain analysis and
cross-border payment network monitoring, AI can
track the hidden asset paths of virtual currencies,
offshore companies, and other entities. For example,
using on-chain transaction graph analysis tools to
trace the money laundering behavior of privacy coins
such as Monero, and even crack anonymous identities
on the dark web.
In addition, AI can also perform sentiment
analysis and topic mining on social media content to
identify criminal threats. For example, extracting
geographical location clues from the dialect accent or
street view information in the background of short
videos to assist in locating suspects.
2.1.2 Collection of Electronic Evidence
AI can process large amounts of text, images, audio
and video data, extract key information, and classify
them (Barbir & Stankovic,2024). For example,
natural language processing (NLP) technology
analyzes chat records and email content, while image
recognition technology restores crime scenes or
identifies malware features. Multimodal models can
also mine hidden evidence from unstructured data,
such as encrypted files and deleted records.
At the same time, AI can construct personnel
relationship graphs, transaction networks, or time-
series logs through association analysis to discover
criminal patterns. For example, analyzing variables
such as customer education level and debt ratio in
loan fraud cases to identify risk points. Blockchain
technology ensures the integrity and immutability of
electronic evidence.
In addition, AI models such as Deep Seeker R1
can automatically generate case summaries, extract
elements such as involved personnel and fund flows,
and support parallel analysis of similar cases.
2.1.3 Judicial Cooperation
Intelligent systems (such as the artificial intelligence-
assisted trial system launched by Shenzhen Court)
unify the judgment scale, provide case
recommendations and sentencing recommendations,
and reduce the deviation of discretionary power. For
example, by analyzing key case data
comprehensively and generating judicial
recommendations to assist in social governance.
China and the "Belt and Road" countries have
combined satellite maps and other intelligent means
to solve the problem of monitoring blind areas. At the
same time, we will promote multilateral data security
cooperation mechanisms and promote the unification
of international judicial standards.
2.2 Focus on Legal Disputes
2.2.1 Data Sovereignty Conflict Issues
In cross-border criminal investigation, AI relies on
multi-source data such as biometric features, financial
transaction chains, and communication records,
which often involve data sovereignty disputes in
different jurisdictions. For example, the localization
requirement of the EU GDPR, which requires that
member states' data should not be transferred across
borders to countries that have not passed the
adequacy determination, has led to the need for
Chinese AI systems to establish localized data centers
in EU law enforcement cooperation, but may be
questioned for data sovereignty transfer. In addition,
the United States unilaterally requires companies to
provide overseas storage data through the Cloud Act,
which directly conflicts with the European Union's
Data Governance Act and forces cross-border
criminal investigation cooperation into a trade-off
between sovereignty first and technical efficiency.
There is a clear divergence in the positions of
China, the United States, and Europe regarding the
flow of cross-border data. China advocates data
sovereignty priority, that is, cross-border data flow
needs to be approved by the source country, and the
The Application of Artificial Intelligence in the Process of Intelligent Criminal Justice: From the Perspective of Cross-Border Data