The Cusp Of Merging Human With Machine

We are at the point where computers and machines are no longer going to be simply tools. Computers are becoming, literally, part of us.

"There are a couple of very interesting things happening as we speak facilitating humans and machines working together in a very different way," said Justin Sanchez, director of the Biological Technologies Office at DARPA.

Smart exoskeletons help people with paralysis walk again, give soldiers extra strength and endurance, and implanted computer chips help the blind see again or help others feel a sense of touch in a prosthetic foot.

It might not be a sci-fi vision of cyborgs, but a near future where soldiers might have implanted chips that help them communicate in the battlefield or receive information from GPS systems or drones.

According to Sanchez, we are on the cusp of seeing the merging of humans and machines.

"I think the recent science and technology developments we're making at DARPA, as well as the embracing of physiology and AI, is enabling us to set up the conditions for profound changes on how humans and machines can work together," said Sanchez, a biomedical engineer who also holds a doctor of philosophy degree.

"We are giving our physiology the opportunity to work with machines in a different way," he added.

For several years now scientists have been working to combine machines with living, organic material, creating a hybrid system.

In 2008, scientists, hoping to one day allow people with paralysis to walk again by using their brain waves to control exoskeletons, were able to control a robot using a monkey's brain activity.

Four years later, another group of researchers developed a device that delivered brain signals to a paralysed hand by skipping over the regular route through the spinal cord.

Ten years ago, researchers at the University of Arizona in Tucson used a moth's eyes and brain to guide a robot. At the time, project researcher Charles Higgins said he thought in 10 to 15 years we'd have hybrid computers, running a combination of living tissue and technology. He wasn't the only one making that kind of prediction.

Andrew Chien, who was then director of future technologies research at Intel Labs, said in 2009 that by 2020, an Internet user would be able to bypass her keyboard and mouse and control her computer with her brain waves.

These might sound like outlandish predictions, but DARPA's Sanchez said it's not as crazy as it might have sounded several years ago.

Sanchez said we're at the point where wearables could easily be made to communicate with smart thermostats so heat could be turned up or the AC turned on automatically, depending on the user's needs.

Dan Olds, an analyst with OrionX, said he too thinks scientists are at a tipping point when it comes to linking biology and machines.

"The fact that we're getting so much experience in building sensors and interpreting the output from them with very small devices makes me think we're on the cusp of something," he said. "Look at advances in AI, advances in processing capability. It's all coming together."

In the near term, there's a lot happening in the medical area.

Within three to five years, researchers could have a device that helps people with brain injuries form and recall memories.

With these powerful implantable devices and chips, researchers could help people with paralysis move and feel again by allowing them to control a prosthetic limb with their thoughts.

Since this is DARPA, which is a research arm of the US Department of Defense, there obviously is going to be a military focus to this research, as well.

Sanchez said, for instance, that enabling humans and machines to work together better might mean having a device or implantable chip that could help a soldier to learn a new language much more easily.

Olds suggested that one possible scenario could have a soldier wearing a contact lens to help him to see what a drone is seeing from above.

Sanchez is fully aware that some people will be frightened by the thought of smart lenses or chips being implanted in someone's brain, a soldier or a civilian.

"We deeply feel that we can't do this work in a vacuum," he said. "We need to consider all aspects... the moment we try to even start thinking about science and technology in this space. There's a responsibility that goes along with this."

As for Olds, he's not nervous about the advances that are coming.

"Not yet," he said. "You could get nervous later on when we are talking about augmenting the brain, but the abilities we're talking about now are pretty benign. Right now, the pace of advances is really exciting."

Computerworld:

Google AI Invents Its Own Cryptographic Algorithm:

Artificial Brains to Protect Against Cyberattacks:

From A Distance: Robot Remote Control:

 

 

« Hackers targeted Banks and 100 organisations
AI Art - Electronic Rembrandt Creation »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TunnelBear

TunnelBear

TunnelBear is a Virtual Private Network services provider offering secure encrypted access to the internet.

Emsisoft

Emsisoft

Emsisoft protects your devices against all types of malware, ransomware and other threats with no-bloat anti-malware & antivirus solutions.

Infosec (T) Ltd

Infosec (T) Ltd

Infosec (T) Limited is an independent Tanzania based consultancy specializing in IT governance, information security and IT audit.

Cylus

Cylus

Cylus, a global leader in rail cybersecurity, helps rail and metro companies avoid safety incidents and service disruptions caused by cyber-attacks.

Industry IoT Consortium (IIC)

Industry IoT Consortium (IIC)

The Industry IoT Consortium is the world's leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT).

Cyan Securiy Group

Cyan Securiy Group

Cyan provide best-in-class cyber security solutions for mobile Internet and mobile devices that are extremely effective and highly intuitive in their use.

Exire Technologies

Exire Technologies

Exire Technologies is comprised of a team of professionals who are specialised in cybersecurity and a value added reseller and integrator of ICT security systems.

Echosec Systems

Echosec Systems

Echosec Systems is a data discovery company delivering social media and dark web threat intelligence. Our web based security software delivers critical information for situational awareness.

ePLDT

ePLDT

ePLDT delivers best-in-class digital business solutions that include Cloud, Cyber Security, purpose-built Data Center facilities and Managed IT Services.

CyberClan

CyberClan

CyberClan’s carefully selected team of experts is capable of solving complex cyber security challenges – keeping your data secure and your businesses running as usual.

White Hawk Software

White Hawk Software

White Hawk provides code tamper-proofing solutions to protect mission critical software applications from malicious and Zero day attacks and reverse engineering at run time.

Internet 2.0

Internet 2.0

Internet 2.0 is a Cyber Security technology company with a core focus on developing affordable but sophisticated cyber security solutions.

Cigent Technology

Cigent Technology

Cigent keeps the most valuable asset in your organization safe—your data. Our advanced endpoint and managed network security solutions prevent ransomware and data theft.

Votiro

Votiro

Votiro is an award-winning cybersecurity company that specializes in file sanitization, ensuring every organization is safe from zero-day and undisclosed attacks.

Anonos

Anonos

Anonos is a global software company that provides the only technology capable of protecting data in use with 100% accuracy, even in untrusted environments.

Two99

Two99

Two99 provide tailored excellence in the areas of E-Commerce, Marketing, Consulting, and Cyber Security.