Superhuman Brain-Hacking Device

Elon Musk is due to demonstrate a working brain-to-machine interface as part of his ambitious plans to give people superhuman powers. Neuralink, his company, is currently developing a new feature on their brain chip that enables humans merge with AI. There will be a demonstration which will involve a robot and "neurons firing in real time". The interface could allow people with neurological conditions to control phones or computers with their mind.

The company founded by Elon Musk, Neuralink, is working on their current project, the brain-implanted chip, that is capable of controlling a human's emotion and mood by emitting waves that are beyond the usual or natural frequency and amplitude. 

The long-term ambition is to usher in an age of what Mr Musk calls "superhuman cognition". People need to merge with artificial intelligence, he says, in part to avoid a scenario where AI becomes so powerful it destroys the human race. Neuralink has worked hard to recruit scientists, something Mr Musk was still advertising for on Twitter. 

The device the company is developing consists of a tiny probe containing more than 3,000 electrodes attached to flexible threads thinner than a human hair, which can monitor the activity of 1,000 brain neurons.

Neuralink has said it had carried out tests on a monkey that had been able to control a computer with its brain.It has also built a "neurosurgical robot" that it says can insert 192 electrodes into the brain every minute. University of Pittsburgh assistant professor of physical medicine and rehabilitation Jennifer Collinger described what Mr Musk was trying to do as "truly disruptive technology in a difficult space of medical technology.... Neuralink has significant resources and critically a team of scientists, engineers and clinicians working towards a common goal, which gives them a great chance of success," she said.

Ari Benjamin, at the University of Pennsylvania's Kording Lab, told BBC News the real stumbling block for the technology could be the sheer complexity of the human brain. "Once they have the recordings, Neuralink will need to decode them and will someday hit the barrier that is our lack of basic understanding of how the brain works, no matter how many neurons they record from....Decoding goals and movement plans is hard when you don't understand the neural code in which those things are communicated."

Musk's companies SpaceX and Tesla have captured the public imagination with his attempts to drive progress in spaceflight and electric vehicles respectively.

Neuralink's promising technology makes use of flexible threads that are believing it to be safe and effective for a brain implant. This technology will cause less of the supposed or expected harm that befalls the implant on a person's brains. This technology is capable of connecting the human brain to a computer if it emerges successful and able to produce a working prototype. A chunk load of data bandwidth will be available for streaming and use for the human brain.

Researchers worry about the potential impacts of Neuralink and other brain-computer interfaces, speculating that memory hacking might be possible.

The concerns regarding the potential for invasive brain-computer interfaces remain highly theoretical, however, experts have produced numerous studies regarding other more concrete claims about the security risks of human machine integration. Some more likely scenarios include spoofing, jamming, and hijacking attacks.

BBC:      TechTimes:     Yahoo:    Screenrant

You Might Also Read:

DARPA Attempt Telepathic Communication With Drones:

 

« US Ransomware Conspiracy Indictment
The US Steps Up Its Cyberwar Capability »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Lakeside Software

Lakeside Software

Lakeside Software is how organizations with large, complex IT environments can finally get visibility across their entire digital estates and see how to do more with less.

CloudHesive

CloudHesive

CloudHesive provides cloud solutions through consulting and managed services with a focus on security, reliability, availability and scalability.

European Cybercrime Training and Education Group (ECTEG)

European Cybercrime Training and Education Group (ECTEG)

The primary aim of ECTEG is to enhance the coordination of cybercrime training, by identifying opportunities to build the capacity of countries to combat cybercrime

AML Solutions

AML Solutions

AML Solutions offer a full range of Anti-Money Laundering and Countering the Financing of Terrorism (AML/CFT) services.

ACI Solutions

ACI Solutions

ACI Solutions is a managed IT services and network security provider working with diverse global commercial, government and public sector clients.

Crypta Labs

Crypta Labs

Crypta Labs is an Award Winning IOT Security startup that is developing a quantum-based encryption chip to secure the Internet of Things.

ERNW

ERNW

ERNW is an independent IT Security service provider with a focus on consulting and testing in all areas of IT security.

Circadence

Circadence

Circadence offer the only fully immersive, AI-powered, patent-pending, proprietary cybersecurity training platform in the market today.

SecureAppbox

SecureAppbox

SecureAppbox provide solutions that protects the communication of sensitive data as well as advice on data security and compliance with GDPR.

CSIRT-NQN

CSIRT-NQN

CSIRT-NQN is the Computer Incident Response Team for the Argentine province of Neuquen.

Inter-American Cooperation Portal on Cyber-Crime

Inter-American Cooperation Portal on Cyber-Crime

The Inter-American Cooperation Portal on Cyber-Crime was created to facilitate and streamline cooperation and information exchange among government experts from OAS member states.

Cytelligence

Cytelligence

Cytelligence is a cyber security consulting company with deep expertise in Cyber Breach Response, Cyber Breach Investigations, and Digital Forensics.

Strategic Cyber Ventures (SCV)

Strategic Cyber Ventures (SCV)

SCV grow cybersecurity companies that disrupt advanced cyber adversaries and revolutionize the cyber product marketplace.

Guardio

Guardio

Guardio develop tools and products to combat modern web and browser threats.

Goldilock

Goldilock

Goldilock is redefining how sensitive data, devices, networks and critical infrastructure can be secured.

DV Cyber Security

DV Cyber Security

DV Cyber (formerly A76) is an innovative cyber security company vertically focused on Threat Intelligence and Cyber Security Research.