Superhuman Brain-Hacking Device

Elon Musk is due to demonstrate a working brain-to-machine interface as part of his ambitious plans to give people superhuman powers. Neuralink, his company, is currently developing a new feature on their brain chip that enables humans merge with AI. There will be a demonstration which will involve a robot and "neurons firing in real time". The interface could allow people with neurological conditions to control phones or computers with their mind.

The company founded by Elon Musk, Neuralink, is working on their current project, the brain-implanted chip, that is capable of controlling a human's emotion and mood by emitting waves that are beyond the usual or natural frequency and amplitude. 

The long-term ambition is to usher in an age of what Mr Musk calls "superhuman cognition". People need to merge with artificial intelligence, he says, in part to avoid a scenario where AI becomes so powerful it destroys the human race. Neuralink has worked hard to recruit scientists, something Mr Musk was still advertising for on Twitter. 

The device the company is developing consists of a tiny probe containing more than 3,000 electrodes attached to flexible threads thinner than a human hair, which can monitor the activity of 1,000 brain neurons.

Neuralink has said it had carried out tests on a monkey that had been able to control a computer with its brain.It has also built a "neurosurgical robot" that it says can insert 192 electrodes into the brain every minute. University of Pittsburgh assistant professor of physical medicine and rehabilitation Jennifer Collinger described what Mr Musk was trying to do as "truly disruptive technology in a difficult space of medical technology.... Neuralink has significant resources and critically a team of scientists, engineers and clinicians working towards a common goal, which gives them a great chance of success," she said.

Ari Benjamin, at the University of Pennsylvania's Kording Lab, told BBC News the real stumbling block for the technology could be the sheer complexity of the human brain. "Once they have the recordings, Neuralink will need to decode them and will someday hit the barrier that is our lack of basic understanding of how the brain works, no matter how many neurons they record from....Decoding goals and movement plans is hard when you don't understand the neural code in which those things are communicated."

Musk's companies SpaceX and Tesla have captured the public imagination with his attempts to drive progress in spaceflight and electric vehicles respectively.

Neuralink's promising technology makes use of flexible threads that are believing it to be safe and effective for a brain implant. This technology will cause less of the supposed or expected harm that befalls the implant on a person's brains. This technology is capable of connecting the human brain to a computer if it emerges successful and able to produce a working prototype. A chunk load of data bandwidth will be available for streaming and use for the human brain.

Researchers worry about the potential impacts of Neuralink and other brain-computer interfaces, speculating that memory hacking might be possible.

The concerns regarding the potential for invasive brain-computer interfaces remain highly theoretical, however, experts have produced numerous studies regarding other more concrete claims about the security risks of human machine integration. Some more likely scenarios include spoofing, jamming, and hijacking attacks.

BBC:      TechTimes:     Yahoo:    Screenrant

You Might Also Read:

DARPA Attempt Telepathic Communication With Drones:

 

« US Ransomware Conspiracy Indictment
The US Steps Up Its Cyberwar Capability »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Security Weekly

Security Weekly

Security Weekly provides free content within the subject areas of IT security news, vulnerabilities, hacking, and research.

IBackup

IBackup

IBackup is a Web Based Online Backup service provider.

Cyber Together

Cyber Together

Cyber Together is dedicated to advancing the cyber security industry by giving businesses access to Israel’s leaders, innovators and great minds in the field of cyber security.

Cybonet

Cybonet

Cybonet provides easy to deploy, flexible and scalable security solutions that empower organizations of all sizes to actively safeguard their networks in the face of today’s evolving threats.

Neoteric Networks

Neoteric Networks

We deliver a no nonsense procedure to implementing technology. The technology selection process ensures that all customers enjoy an engineered methodology implementing technology.

Database Cyber Security Guard

Database Cyber Security Guard

Database Cyber Security Guard (aka Don't Be Breached) informs Security Professionals and DBAs of Zero Day, Ransomware and Data Breach attacks within milli-seconds

OneTrust

OneTrust

OneTrust is the largest and most widely used technology platform to operationalize privacy, security and third-party risk management.

Bedrock Systems

Bedrock Systems

BedRock Systems is on a mission to deliver a trusted computing base from edge to cloud, where safety and security isn’t just a perception, it’s a formally proven reality.

CoreStack

CoreStack

CoreStack helps enterprises overcome cloud challenges such as ever growing security risks, stringent regulatory compliance needs and operational complexities.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

CryptoDATA

CryptoDATA

CryptoDATA develops products and services based on Blockchain technology, that ensure user security and data encryption, applicable in various fields.

SolidityScan

SolidityScan

SolidityScan is an advanced smart contract scanning tool designed to uncover vulnerabilities and proactively address risks within your code.

Cyber Security Global

Cyber Security Global

Cyber Security Global is a leader in electronic security, consultancy, technology, cybersecurity solutions, training, and specialized products.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Luxembourg House of Cybersecurity (LHC)

Luxembourg House of Cybersecurity (LHC)

Luxembourg House of Cybersecurity (formerly SecurityMadeIn.lu) is the backbone of leading-edge cyber resilience in Luxembourg.