ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

cYberEthics: Hacking the Brain and Body

Updated on October 14, 2013

What if?

Imagine this. You are sitting in a public transportation vehicle, minding your own business. You glanced at the elderly gentleman reading a paper and the young person with the big antenna sticking out of their laptop nearby when you sat down, but didn't really pay much attention. Perhaps you paid a bit more attention when the attractive individual sat down next to the elderly gentleman. The vehicle makes another stop, then moves on.

Suddenly, the elderly gentlemen lashes out with his arm and strikes the attractive person next to him a vicious blow in the head. As they slump to the seat, he strikes them repeatedly, and begins shouting that he isn't doing this, that it's not his fault. People begin jumping up and screaming, and the vehicle shudders to a halt as the driver brakes. The young person jumps away from the elderly man, closes their laptop, and pushes their way out of the door.


Who did it?
Who did it? | Source

Fiction? Mystery? Or fact?

Expecting an insanity plea, or mental breakdown claim? Sound like a suspense drama? Or perhaps the beginning of a murder mystery?

Or just maybe you are looking at real life, the headlines of the very near future, just a few years or even mere months down the road. In our fictional story, the elderly man is most likely going to jail for murder, or attempted murder. Unless someone discovers that the elderly man is an amputee with a robotic prothesis in place of his arm, and that the young person with the laptop used the wireless to remote access the control device for the arm and feed it false signals... the elderly man will serve time, innocent of the crime he (or rather, his arm) was effectively made to commit.

At one time, this would have been science fiction. Now, it is merely fictional because the technology to accomplish this story is already here. As science progresses, we have reached the cusp of achieving true mind-machine interfaces (MMI). In fact, there already exist games and toys which depend upon scanning your brainwaves in order to control and use them(1). And in research and development labs today, prototype MMI devices have already been built, and are allowing humans to mentally control the limbs of living animals(2), as well as mentally control artificial limbs(3).


Who is to blame?

Who should be held responsible?

See results

Who is at fault?

Who should bear the blame for this heinous, if fictional, act? It may seem natural to think that the one who remotely controlled the artificial limb should bear the blame, but look at the current views being debated on weapons and responsibility. Gun activists would have you believe that only the person wielding the weapon should be held to blame, after all, most guns cannot shoot themselves. Anti-gun activists, however, seem to be seeking to make everyone involved with the gun responsible, from the shooter, to the seller of the gun and bullets... perhaps even the manufacturer of the pieces, as a way to curtail misuse of guns.

Regardless of one's views on that matter, it is only mentioned in order to illustrate the point that the laws have not been made yet that adequately cover real situations, currently happening today! And if we cannot agree on how to handle something which has been happening for decades, how then can we expect our laws and lawmakers to handle a complex situation with cutting edge technology as described in our fictional story above?


More people than ever before are using technologically advanced assistive devices.
More people than ever before are using technologically advanced assistive devices. | Source

The Reality

More people are using technologically assistive devices every day. Wheelchairs and powered scooters for mobility, artificial limbs for both mobility and manipulation, artificial organs to assist failing or weak organs, complete replacement of damaged or missing parts, artificial devices to communicate over great distances, store and recall data, play games, and even artificial enhancement or alteration of the body to change or normalize appearance.

However, most of these devices have little to no security whatsoever, nor do the medical machines which program said devices in the first place(4). The technologies used to access the controls of these medical devices is publicly accessible, the most common types of which are wireless access of various sorts, infra-red, ultrasonic, and direct connection.

For purely mechanical augmentations and those with direct wired access only, it is less of an issue; but with the increasing number of electronic and computerized assistive and corrective devices using non-invasive access methods, it is an unavoidable and inevitable issue which will soon become someone's deadly reality.


Times are changing, and so are we.
Times are changing, and so are we. | Source

Paradigm Shift

In fact, the attitude about artificial limbs is changing. In times past, many would automatically assume that a person with an artificial limb was somehow "less of a person", even the amputee themself. Whether it is an artifact of advancing technology, or because of greater societal awareness through social media, the way that amputees are viewed, and what is assumed that they can and cannot accomplish, is changing.

Through various sources of popular media, humans accomplishing incredible things are becoming widely known: a blind man learning echolocation and skateboarding freely around town, a man with no arms learning martial arts and accomplishing everything with his feet that others would with their hands, and many many more.

There are even people who find that artificial limbs are more convenient and look better than what they were born with, or lost through accident or injury5. Some would even volunteer to replace their natural limbs with artificial ones, if they were given the opportunity.



The (Very) Near Future...

Not only the body, but the brain is becoming more accessible. The technology is being developed today to read a person's mind, and decode their dreams while they sleep6. What will happen once your thoughts become accessible to a computer? Will you be able to read email with your mind? What happens if a cyber-virus, trojan, or malware advertisement gets into your head and rewrites your thoughts?

We literally stand at the threshold of a new movement, that of cyber-enhancement. What laws should we draft to protect those who wish to alter themselves, and those who wish to remain natural? How will differences in areas such as employment, race, beauty, ethnicity, and contests be adjudicated between those with enhancements and those without? How will societies and religions react to those who change what they started out with? How powerful will these enhancements be permitted to be - superhuman, or merely human? How will we protect people from having their body, or their brain, hacked and controlled by others?


Where do you stand on these issues?



References

References 1, 2, 3, 4, 5, 6 & other related links.
http://www.technologyreview.com/news/514066/what-happened-when-one-man-pinged-the-whole-internet/
http://www.wired.com/wiredscience/2009/07/neurosecurity/
http://www.wired.com/medtech/health/magazine/17-07/lbnp_knowthyself?currentPage=all
http://www.wired.com/threatlevel/2013/07/ipmi/
http://www.popsci.com/science/article/2009-11/if-hacks-could-kill-ultrasound-security-scheme-implantable-devices
http://www.slate.com/blogs/future_tense/2012/08/31/mind_controlled_artificial_limbs_could_a_robotic_leg_make_the_world_cup_s_first_kick_.html
http://www.fastcodesign.com/1514543/bionic-legs-i-limbs-and-other-super-human-prostheses-youll-envy
http://neurowear.com/projects_detail/necomimi.html

cYberEthics

Cast your vote for Hacking the Brain and Body

What are your views on enhancements?

    0 of 8192 characters used
    Post Comment

    No comments yet.

    working

    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, hubpages.com uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at: https://hubpages.com/privacy-policy#gdpr

    Show Details
    Necessary
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the googleapis.com or gstatic.com domains, for performance and efficiency reasons. (Privacy Policy)
    Features
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Marketing
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Statistics
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)