0% found this document useful (0 votes)
34 views

The Next Hacking Frontier

Researchers are concerned about potential security issues as neural devices become more advanced and widespread. As devices that can control prosthetic limbs and manipulate brain activity become more complex and wireless, there is a risk of hackers being able to hijack these devices. While current devices have few security risks, future generations that are more interconnected could be vulnerable if security features like encryption are not implemented. Researchers are calling for neuroengineers to work with security experts to address these potential issues proactively before problematic vulnerabilities emerge, as was the case with early internet infrastructure.

Uploaded by

iloveglenn
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views

The Next Hacking Frontier

Researchers are concerned about potential security issues as neural devices become more advanced and widespread. As devices that can control prosthetic limbs and manipulate brain activity become more complex and wireless, there is a risk of hackers being able to hijack these devices. While current devices have few security risks, future generations that are more interconnected could be vulnerable if security features like encryption are not implemented. Researchers are calling for neuroengineers to work with security experts to address these potential issues proactively before problematic vulnerabilities emerge, as was the case with early internet infrastructure.

Uploaded by

iloveglenn
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

The Next Hacking Frontier: Your Brain?

Categories: Biotech, Brains and Behavior By Hadley Leggett July 9, 2009

Hackers who commandeer your computer are bad enough. Now scientists worry that someday, theyll try to take over your brain. In the past year, researchers have developed technology that makes it possible to use thoughts to operate a computer, maneuver a wheelchair or even use Twitter all without lifting a finger. But as neural devices become more complicated and go wireless some scientists say the risks of brain hacking should be taken seriously. Neural devices are innovating at an extremely rapid rate and hold tremendous promise for the future, said computer security expert Tadayoshi Kohno of the University of Washington. But if we dont start paying attention to security, were worried that we might find ourselves in five or 10 years saying weve made a big mistake. Hackers tap into personal computers all the time but what would happen if they focused their nefarious energy on neural devices, such as the deep-brain stimulators currently used to treat Parkinsons and depression, or electrode systems for controlling prosthetic limbs? According to Kohno and his colleagues, who published their concerns July 1 in Neurosurgical Focus, most current devices carry few security risks. But as neural engineering becomes more complex and more widespread, the potential for security breaches will mushroom. For example, the next generation of implantable devices to control prosthetic limbs will likely include wireless controls that allow physicians to remotely adjust settings on the machine. If neural engineers dont build in security features such as encryption and access control, an attacker could hijack the device and take over the robotic limb. Its very hard to design complex systems that dont have bugs, Kohno said. As these medical devices start to become more and more complicated, it gets easier and easier for people to overlook a bug that could become a very serious risk. It might border on science fiction today, but so did going to the moon 50 years ago. Some might question why anyone would want to hack into someone elses brain, but the researchers say theres a precedent for using computers to cause neurological harm. In November 2007 and March 2008, malicious programmers vandalized epilepsy support websites by putting up flashing animations, which caused seizures in some photo-sensitive patients. It happened on two separate occasions, said computer science graduate student Tamara Denning, a co-author on the paper. Its evidence that people will be malicious and try to

compromise peoples health using computers, especially if neural devices become more widespread. In some cases, patients might even want to hack into their own neural device. Unlike devices to control prosthetic limbs, which still use wires, many deep brain stimulators already rely on wireless signals. Hacking into these devices could enable patients to self-prescribe elevated moods or pain relief by increasing the activity of the brains reward centers. Despite the risks, Kohno said, most new devices arent created with security in mind. Neural engineers carefully consider the safety and reliability of new equipment, and neuroethicists focus on whether a new device fits ethical guidelines. But until now, few groups have considered how neural devices might be hijacked to perform unintended actions. This is the first time an academic paper has addressed the topic of neurosecurity, a term the group coined to describe their field. The security and privacy issues somehow seem to slip by, Kohno said. I would not be surprised if most people working in this space have never thought about security. Kevin Otto, a bioengineer who studies brain-machine interfaces at Purdue Universty, said he was initially skeptical of the research. When I first picked up the paper, I dont know if I agreed that it was an issue. But the paper gives a very compelling argument that this is important, and that this is the time to have neural engineers collaborate with security developers. Its never too early to start thinking about security issues, said neural engineer Justin Williams of the University of Wisconsin, who was not involved in the research. But he stressed that the kinds of devices available today are not susceptible to attack, and that fear of future risks shouldnt impede progress in the field. These kinds of security issues have to proceed in lockstep with the technology, Williams said. History provides plenty of examples of why its important to think about security before it becomes a problem, Kohno said. Perhaps the best example is the internet, which was originally conceived as a research project and didnt take security into account. Because the internet was not originally designed with security in mind, the researchers wrote, it is incredibly challenging if not impossible to retrofit the existing internet infrastructure to meet all of todays security goals. Kohno and his colleagues hope to avoid such problems in the neural device world, by getting the community to discuss potential security problems before they become a reality. The first thing is to ask ourselves is, Could there be a security and privacy problem? Kohno said. Asking Is there a problem? gets you 90 percent there, and thats the most important thing.
Youtube / RFID CHIPS FUSE WITH HUMAN BRAIN CELLS AND CAN BE CONTROLLED (WATCH THIS seriously, 3 minutes)

You might also like