The Cusp Of Merging Human With Machine

We are at the point where computers and machines are no longer going to be simply tools. Computers are becoming, literally, part of us.

"There are a couple of very interesting things happening as we speak facilitating humans and machines working together in a very different way," said Justin Sanchez, director of the Biological Technologies Office at DARPA.

Smart exoskeletons help people with paralysis walk again, give soldiers extra strength and endurance, and implanted computer chips help the blind see again or help others feel a sense of touch in a prosthetic foot.

It might not be a sci-fi vision of cyborgs, but a near future where soldiers might have implanted chips that help them communicate in the battlefield or receive information from GPS systems or drones.

According to Sanchez, we are on the cusp of seeing the merging of humans and machines.

"I think the recent science and technology developments we're making at DARPA, as well as the embracing of physiology and AI, is enabling us to set up the conditions for profound changes on how humans and machines can work together," said Sanchez, a biomedical engineer who also holds a doctor of philosophy degree.

"We are giving our physiology the opportunity to work with machines in a different way," he added.

For several years now scientists have been working to combine machines with living, organic material, creating a hybrid system.

In 2008, scientists, hoping to one day allow people with paralysis to walk again by using their brain waves to control exoskeletons, were able to control a robot using a monkey's brain activity.

Four years later, another group of researchers developed a device that delivered brain signals to a paralysed hand by skipping over the regular route through the spinal cord.

Ten years ago, researchers at the University of Arizona in Tucson used a moth's eyes and brain to guide a robot. At the time, project researcher Charles Higgins said he thought in 10 to 15 years we'd have hybrid computers, running a combination of living tissue and technology. He wasn't the only one making that kind of prediction.

Andrew Chien, who was then director of future technologies research at Intel Labs, said in 2009 that by 2020, an Internet user would be able to bypass her keyboard and mouse and control her computer with her brain waves.

These might sound like outlandish predictions, but DARPA's Sanchez said it's not as crazy as it might have sounded several years ago.

Sanchez said we're at the point where wearables could easily be made to communicate with smart thermostats so heat could be turned up or the AC turned on automatically, depending on the user's needs.

Dan Olds, an analyst with OrionX, said he too thinks scientists are at a tipping point when it comes to linking biology and machines.

"The fact that we're getting so much experience in building sensors and interpreting the output from them with very small devices makes me think we're on the cusp of something," he said. "Look at advances in AI, advances in processing capability. It's all coming together."

In the near term, there's a lot happening in the medical area.

Within three to five years, researchers could have a device that helps people with brain injuries form and recall memories.

With these powerful implantable devices and chips, researchers could help people with paralysis move and feel again by allowing them to control a prosthetic limb with their thoughts.

Since this is DARPA, which is a research arm of the US Department of Defense, there obviously is going to be a military focus to this research, as well.

Sanchez said, for instance, that enabling humans and machines to work together better might mean having a device or implantable chip that could help a soldier to learn a new language much more easily.

Olds suggested that one possible scenario could have a soldier wearing a contact lens to help him to see what a drone is seeing from above.

Sanchez is fully aware that some people will be frightened by the thought of smart lenses or chips being implanted in someone's brain, a soldier or a civilian.

"We deeply feel that we can't do this work in a vacuum," he said. "We need to consider all aspects... the moment we try to even start thinking about science and technology in this space. There's a responsibility that goes along with this."

As for Olds, he's not nervous about the advances that are coming.

"Not yet," he said. "You could get nervous later on when we are talking about augmenting the brain, but the abilities we're talking about now are pretty benign. Right now, the pace of advances is really exciting."

Computerworld:

Google AI Invents Its Own Cryptographic Algorithm:

Artificial Brains to Protect Against Cyberattacks:

From A Distance: Robot Remote Control:

 

 

« Hackers targeted Banks and 100 organisations
AI Art - Electronic Rembrandt Creation »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Pondurance

Pondurance

Pondurance is an IT Security and Compliance company providing services in Cyber Security, Continuity, Compliance and Threat Management.

Vertical Structure

Vertical Structure

Vertical Structure services include Security & Penetration Testing, Information Assurance, Bespoke Training Programs and Secure Hosting.

Duane Morris LLP

Duane Morris LLP

Duane Morris is a global law firm with offices in the USA, UK and Asia. Practice areas include Cybersecurity.

Direct Recruiters Inc

Direct Recruiters Inc

Direct Recruiters is a relationship-focused search firm that assists IT Security and Cybersecurity companies with recruiting high-impact talent.

Hogan Lovells

Hogan Lovells

Hogan Lovells is an international business law firm with offices across Europe, Asia and the USA. Practice areas include Privacy & Cybersecurity.

Jetico

Jetico

Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle. Solutions include data encryption and secure data erasure.

QuillAudits

QuillAudits

QuillAudits offers advanced Ethereum, EOS, TRON smart contract audit, blockchain protocol security and formal verification to ensure your platform’s integrity.

Have I Been Pwned (HIBP)

Have I Been Pwned (HIBP)

Have I Been Pwned is a free resource for anyone to quickly assess if they may have been put at risk due to an online account of theirs having been compromised or "pwned" in a data breach.

HiScout

HiScout

HiScout is your integrated management system for IT governance, risk & compliance.

Private Client Cyber Security (PCCS)

Private Client Cyber Security (PCCS)

PCCS provides enterprise-grade cybersecurity consulting and services to professional practices, executives, athletes, and high net worth families.

NSI Global

NSI Global

NSI Global is a specialist Global Risk and Intelligence Advisory Firm that has built a reputation for consistently managing complex projects.

AirDroid Business

AirDroid Business

AirDroid Business is an efficient mobile device management solution for Android devices, helping businesses to remotely control and access devices in large quantities using a centralized approach.

MS Tech Solutions

MS Tech Solutions

MS Tech Solutions is a Jamaican-based, multinational consulting company that specializes in the architecture, implementation and management of key network and Information technologies.

U2opia Technology

U2opia Technology

U2opia is a consortium with a proven track record of delivering groundbreaking technology, cybersecurity, and innovative business solutions.

Stacklok

Stacklok

Stacklok are an Open Source first security company enabling safe Open Source Software consumption.

Walacor

Walacor

Walacor’s secure data platform represents the next generation of secure data and blockchain storage with a trust-first approach that revolutionizes enterprise data, and database management systems.