The Cusp Of Merging Human With Machine

We are at the point where computers and machines are no longer going to be simply tools. Computers are becoming, literally, part of us.

"There are a couple of very interesting things happening as we speak facilitating humans and machines working together in a very different way," said Justin Sanchez, director of the Biological Technologies Office at DARPA.

Smart exoskeletons help people with paralysis walk again, give soldiers extra strength and endurance, and implanted computer chips help the blind see again or help others feel a sense of touch in a prosthetic foot.

It might not be a sci-fi vision of cyborgs, but a near future where soldiers might have implanted chips that help them communicate in the battlefield or receive information from GPS systems or drones.

According to Sanchez, we are on the cusp of seeing the merging of humans and machines.

"I think the recent science and technology developments we're making at DARPA, as well as the embracing of physiology and AI, is enabling us to set up the conditions for profound changes on how humans and machines can work together," said Sanchez, a biomedical engineer who also holds a doctor of philosophy degree.

"We are giving our physiology the opportunity to work with machines in a different way," he added.

For several years now scientists have been working to combine machines with living, organic material, creating a hybrid system.

In 2008, scientists, hoping to one day allow people with paralysis to walk again by using their brain waves to control exoskeletons, were able to control a robot using a monkey's brain activity.

Four years later, another group of researchers developed a device that delivered brain signals to a paralysed hand by skipping over the regular route through the spinal cord.

Ten years ago, researchers at the University of Arizona in Tucson used a moth's eyes and brain to guide a robot. At the time, project researcher Charles Higgins said he thought in 10 to 15 years we'd have hybrid computers, running a combination of living tissue and technology. He wasn't the only one making that kind of prediction.

Andrew Chien, who was then director of future technologies research at Intel Labs, said in 2009 that by 2020, an Internet user would be able to bypass her keyboard and mouse and control her computer with her brain waves.

These might sound like outlandish predictions, but DARPA's Sanchez said it's not as crazy as it might have sounded several years ago.

Sanchez said we're at the point where wearables could easily be made to communicate with smart thermostats so heat could be turned up or the AC turned on automatically, depending on the user's needs.

Dan Olds, an analyst with OrionX, said he too thinks scientists are at a tipping point when it comes to linking biology and machines.

"The fact that we're getting so much experience in building sensors and interpreting the output from them with very small devices makes me think we're on the cusp of something," he said. "Look at advances in AI, advances in processing capability. It's all coming together."

In the near term, there's a lot happening in the medical area.

Within three to five years, researchers could have a device that helps people with brain injuries form and recall memories.

With these powerful implantable devices and chips, researchers could help people with paralysis move and feel again by allowing them to control a prosthetic limb with their thoughts.

Since this is DARPA, which is a research arm of the US Department of Defense, there obviously is going to be a military focus to this research, as well.

Sanchez said, for instance, that enabling humans and machines to work together better might mean having a device or implantable chip that could help a soldier to learn a new language much more easily.

Olds suggested that one possible scenario could have a soldier wearing a contact lens to help him to see what a drone is seeing from above.

Sanchez is fully aware that some people will be frightened by the thought of smart lenses or chips being implanted in someone's brain, a soldier or a civilian.

"We deeply feel that we can't do this work in a vacuum," he said. "We need to consider all aspects... the moment we try to even start thinking about science and technology in this space. There's a responsibility that goes along with this."

As for Olds, he's not nervous about the advances that are coming.

"Not yet," he said. "You could get nervous later on when we are talking about augmenting the brain, but the abilities we're talking about now are pretty benign. Right now, the pace of advances is really exciting."

Computerworld:

Google AI Invents Its Own Cryptographic Algorithm:

Artificial Brains to Protect Against Cyberattacks:

From A Distance: Robot Remote Control:

 

 

« Hackers targeted Banks and 100 organisations
AI Art - Electronic Rembrandt Creation »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Security Mentor

Security Mentor

Security Mentor provides innovative, online security awareness training designed for how people learn and work.

Virtual Security

Virtual Security

Virtual Security provides solutions in the field of managed security services, network security, secure remote work, responsible internet, application security, encryption, BYOD and compliance.

Code42

Code42

Code42 CrashPlan, is an enterprise SaaS solution that backs up all distributed end-user data on a single, secure platform.

PubNub

PubNub

PubNub enables developers to build secure realtime Mobile, Web, and IoT Apps.

Cyberia Group

Cyberia Group

Cyberia is a leading Internet and Security services provider with operations in Saudi Arabia, Lebanon and Jordan.

Ultratec

Ultratec

Ultratec provide a range of data centric services and solutions including data recovery, data erasure, data destruction and full IT Asset Disposal (ITAD).

Findcourses.com

Findcourses.com

Findcourses is a dedicated education search engine designed to make it easy for our learners to search and find exactly what they need from our community of trusted training providers.

Tactical Network Systems (TNS)

Tactical Network Systems (TNS)

Tactical Network Solutions helps you discover hidden attack vectors in IoT and connected devices before someone else does.

SightGain

SightGain

SightGain is the only integrated risk management solution focused on cybersecurity readiness using real-world attack simulations in your live environment.

Sontiq

Sontiq

Sontiq is committed to providing best-in-class, highly scalable, award-winning identity security solutions to consumers, businesses and government agencies.

AdEPT Technology Group

AdEPT Technology Group

AdEPT are a managed services and telecommunications provider offering award-winning, proven and uncomplicated technical solutions for over 12,000 organisations across the UK.

Talion

Talion

Talion aim to reduce the complexity involved in securing your organisation and to give security teams unrivalled visibility into their security operations, so they can make optimal decisions, fast.

Sevco Security

Sevco Security

Sevco Delivers Real-time Asset Intelligence to Identify and Close Unknown Security Gaps.

Control D

Control D

Control D is a modern and customizable DNS service that blocks threats, unwanted content and ads - on all devices.

CovertSwarm

CovertSwarm

Since 2020 CovertSwarm have been radically redefining how enterprise security risks are discovered. We outpace the cyber threats faced by our clients using a constant cyber attack methodology.

ioSENTRIX

ioSENTRIX

ioSENTRIX offers tailored, risk-focused assessments that reduce true business risk.