Superhuman Brain-Hacking Device

Elon Musk is due to demonstrate a working brain-to-machine interface as part of his ambitious plans to give people superhuman powers. Neuralink, his company, is currently developing a new feature on their brain chip that enables humans merge with AI. There will be a demonstration which will involve a robot and "neurons firing in real time". The interface could allow people with neurological conditions to control phones or computers with their mind.

The company founded by Elon Musk, Neuralink, is working on their current project, the brain-implanted chip, that is capable of controlling a human's emotion and mood by emitting waves that are beyond the usual or natural frequency and amplitude. 

The long-term ambition is to usher in an age of what Mr Musk calls "superhuman cognition". People need to merge with artificial intelligence, he says, in part to avoid a scenario where AI becomes so powerful it destroys the human race. Neuralink has worked hard to recruit scientists, something Mr Musk was still advertising for on Twitter. 

The device the company is developing consists of a tiny probe containing more than 3,000 electrodes attached to flexible threads thinner than a human hair, which can monitor the activity of 1,000 brain neurons.

Neuralink has said it had carried out tests on a monkey that had been able to control a computer with its brain.It has also built a "neurosurgical robot" that it says can insert 192 electrodes into the brain every minute. University of Pittsburgh assistant professor of physical medicine and rehabilitation Jennifer Collinger described what Mr Musk was trying to do as "truly disruptive technology in a difficult space of medical technology.... Neuralink has significant resources and critically a team of scientists, engineers and clinicians working towards a common goal, which gives them a great chance of success," she said.

Ari Benjamin, at the University of Pennsylvania's Kording Lab, told BBC News the real stumbling block for the technology could be the sheer complexity of the human brain. "Once they have the recordings, Neuralink will need to decode them and will someday hit the barrier that is our lack of basic understanding of how the brain works, no matter how many neurons they record from....Decoding goals and movement plans is hard when you don't understand the neural code in which those things are communicated."

Musk's companies SpaceX and Tesla have captured the public imagination with his attempts to drive progress in spaceflight and electric vehicles respectively.

Neuralink's promising technology makes use of flexible threads that are believing it to be safe and effective for a brain implant. This technology will cause less of the supposed or expected harm that befalls the implant on a person's brains. This technology is capable of connecting the human brain to a computer if it emerges successful and able to produce a working prototype. A chunk load of data bandwidth will be available for streaming and use for the human brain.

Researchers worry about the potential impacts of Neuralink and other brain-computer interfaces, speculating that memory hacking might be possible.

The concerns regarding the potential for invasive brain-computer interfaces remain highly theoretical, however, experts have produced numerous studies regarding other more concrete claims about the security risks of human machine integration. Some more likely scenarios include spoofing, jamming, and hijacking attacks.

BBC:      TechTimes:     Yahoo:    Screenrant

You Might Also Read:

DARPA Attempt Telepathic Communication With Drones:

 

« US Ransomware Conspiracy Indictment
The US Steps Up Its Cyberwar Capability »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

California Cybersecurity Institute (CCI) - Cal poly

California Cybersecurity Institute (CCI) - Cal poly

The CCI provides a hands-on research and learning environment to explore new cyber technologies and train and test tactics alongside law enforcement and cyberforensics experts.

Shift Technology

Shift Technology

Shift Technology provides insurance companies with an innovative SaaS solution to improve and scale fraud detection.

Cybertron

Cybertron

Cybertron services include real-time monitoring and incident response and a cyber range for competency development.

NSEIT

NSEIT

NSEIT offers end-to-end Information Technology products, solutions and services including cybersecurity to organizations in the financial sector.

ThreadStone Cyber Security

ThreadStone Cyber Security

ThreadStone Cyber Security offer reliable, practical and affordable cyber security solutions for both large and smaller organizations that we develop and deliver ourselves from Europe.

Secure Blockchain Technologies (SBT)

Secure Blockchain Technologies (SBT)

SBT is a team of Enterprise IT Security Professionals weaving security and Blockchain Technology into our customer’s operational fabric.

Measured Insurance

Measured Insurance

Measured Insurance are bridging the gap between technology and Insurance using AI-Powered analytics that track clients’ exposure in real time to create smarter insurance products.

Shevirah

Shevirah

Shevirah specializes in products for automated mobile and IoT device vulnerability assessment, penetration testing, and mobile security awareness training.

riskmethods

riskmethods

riskmethods helps you proactively identify, assess and mitigate supply chain risk. You need to master supply chain risk management—we can help.

Kalima Systems

Kalima Systems

Kalima’s mission is to securely collect, transport, store and share Industrial IoT (IIoT) trusted data in real time with devices, services and mobile workers.

FortifyIQ

FortifyIQ

FortifyIQ's mission is to advance maximum security against side-channel attacks across the entire computing spectrum.

TWC IT Solutions

TWC IT Solutions

Since 2011, TWC IT Solutions has offered managed IT Support, Cybersecurity, Disaster Recovery, Contact Centre and Business Connectivity services to clients across 24 countries globally.

Mutare

Mutare

For three decades, Mutare has been empowering organizations to re-imagine a better way to connect through our transformative voice security, digital voice and text messaging solutions.

Telesign

Telesign

Telesign connect, protect, and defend online experiences with sophisticated digital identity and programmable communications solutions.

Quantum Security Services

Quantum Security Services

Quantum Security Services is a specialist information security firm providing a range of risk, compliance and technical security services.

Clumio

Clumio

Clumio provides autonomous backup and recovery for critical cloud data.