{"id":31744,"date":"2019-12-05T13:45:09","date_gmt":"2019-12-05T18:45:09","guid":{"rendered":"https:\/\/www.kaspersky.com\/blog\/?post_type=emagazine&#038;p=31744"},"modified":"2022-03-17T06:47:47","modified_gmt":"2022-03-17T10:47:47","slug":"privacy-thought","status":"publish","type":"emagazine","link":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/privacy-thought\/31744\/","title":{"rendered":"What does neural implant technology mean for digital privacy?"},"content":{"rendered":"<p>This October, French researchers revealed a <a href=\"https:\/\/www.newscientist.com\/article\/2218863-a-mind-controlled-exoskeleton-helped-a-man-with-paralysis-walk-again\/\" target=\"_blank\" rel=\"noopener nofollow\">mind-controlled exoskeleton<\/a> that let a man, who developed quadriplegia after an accident, walk again, for the first time in four years. With two surgically implanted devices, comprising 64 electrodes, brainwaves were translated by a computer into instructions that controlled the exoskeleton. Just thinking about walking allowed the patient to move his legs in a physical environment.<\/p>\n<p>While neurotechnology is in its infancy (this involved 65 kg of robotic equipment and a safety harness tethered to the ceiling), it\u2019s a milestone that can bring hope to people of restricted mobility everywhere. But, like every new technology, there\u2019s also no denying it has some more safety implications to improve.<\/p>\n<p>In theory, these developments have profound implications in the field of transhumanism, too; one day people could become more machine than person to enhance human abilities. An exciting proposition, perhaps, for fans of cyberpunk fiction. But let\u2019s not forget that every digital device is a potential target for hackers.<\/p>\n<h2>From proof of concept to widespread usability and hackability<\/h2>\n<p>As promising as this new tech is for helping patients with severe spinal injuries, it\u2019s important to remember that it\u2019s still a long way from becoming clinically viable. But it does show where we\u2019re heading, and it\u2019s not going to be exclusively about revolutionizing medical technology. With exoskeletons controlled by neural implants, the next goal is to improve the reaction time to make the exoskeleton more responsive and self-balancing. Other factors, such as reducing weight and maximizing the lifespan of the electrodes without risking tissue damage, are areas of active research.<\/p>\n<p>It might be decades before such technology ends up in the wild, but that day is coming. Neural implants no longer exist solely in the realms of science fiction \u2013 they\u2019re now a reality. Once this technology moves out of the lab, there\u2019ll be a possibility of it ending up in the wrong hands \u2013 both hackers and corrupt governments and their military. Steps will need to be taken to safeguard and implement security and privacy by design. And, like all digitally connected devices, reduce the chances of brain implants getting hacked \u2013 a more immediate \u201creal-world\u201d concern.<\/p>\n<p>As soon as brain-computer interfaces become widely available, hackers and unscrupulous private companies alike will no doubt be quick to jump on the bandwagon. Invasive methods aren\u2019t all we have to worry about either; the more immediate risk comes from non-invasive <a href=\"https:\/\/www.mayoclinic.org\/tests-procedures\/eeg\/about\/pac-20393875\" target=\"_blank\" rel=\"noopener nofollow\">electroencephalograms<\/a> (EEG), which are attached externally to the scalp. And it\u2019s coming sooner than you think.<\/p>\n<h2>Would you let companies read your thoughts?<\/h2>\n<p><img decoding=\"async\" class=\"aligncenter size-large wp-image-31745\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/92\/2019\/12\/05131529\/071_privacy_of_thought_inline-1024x576.png\" alt=\"privacy of thought\" width=\"1024\" height=\"576\"><br>\nFew would answer \u201cyes\u201d to such a question, but private companies are already developing the means to let people control their services with their minds alone. Facebook, which hardly has an excellent track record when it comes to privacy, is one of them. <a href=\"https:\/\/futurism.com\/facebook-brain-computer-interface-zuckerberg\" target=\"_blank\" rel=\"noopener nofollow\">Recent comments<\/a> by Facebook CEO Mark Zuckerberg at Harvard University revealed the company\u2019s aims to develop technology that would allow people to use their services with their minds alone \u2013 no navigating menus or even typing. This begs the question: would you let a company have access to your state of mind so they can deliver more relevant ads, if, in exchange, you could order a pizza just by thinking about your favorite toppings?<\/p>\n<p>While that might sound far-fetched, it\u2019s important to remember that digital data, rather than oil or precious metals, is now the most <a href=\"https:\/\/www.economist.com\/leaders\/2017\/05\/06\/the-worlds-most-valuable-resource-is-no-longer-oil-but-data\" target=\"_blank\" rel=\"noopener nofollow\">sought-after commodity on the planet<\/a>. And if we translate the capacity of the human mind into digital data, <a href=\"https:\/\/www.scientificamerican.com\/article\/what-is-the-memory-capacity\/\" target=\"_blank\" rel=\"noopener nofollow\">estimates are as high as 2.5 petabytes<\/a>, which is equivalent to three-million hours of streaming TV. Other estimates are somewhat lower: if the state-run media of North Korea can be believed, South Korea\u2019s president <a href=\"https:\/\/slate.com\/technology\/2012\/04\/north-koreas-2-mb-of-knowledge-taunt-how-many-megabytes-does-the-human-brain-hold.html\" target=\"_blank\" rel=\"noopener nofollow\">only has a paltry 2 MB<\/a> of storage.<\/p>\n<p>Though claims range from woefully absurd to impractically abstract, Zuckerberg also reminded us that the fastest way we can currently get information out into the world is by speech. That\u2019s equivalent in bandwidth to a 14.4k modem. With a brain-to-computer interface, it\u2019s possible to transmit data almost as fast as we can think about it \u2013 or about <a href=\"https:\/\/www.wired.com\/story\/zuckerberg-wants-facebook-to-build-mind-reading-machine\/\" target=\"_blank\" rel=\"noopener nofollow\">five times faster than speech<\/a>. If you\u2019re starving, you could get that pizza delivered a whole minute faster.<\/p>\n<h2>Will cybercriminals ever be able to hack into your mind?<\/h2>\n<p>It\u2019s a common trope of science fiction and one that\u2019s been explored in <a href=\"https:\/\/www.businessinsider.com\/black-mirror-predictions-reality-2016-10#the-entire-history-of-you-3\" target=\"_blank\" rel=\"noopener nofollow\">disturbingly realistic TV shows<\/a> like Black Mirror and <a href=\"https:\/\/www.livescience.com\/37938-how-human-brain-could-be-hacked.html\" target=\"_blank\" rel=\"noopener nofollow\">Hacking the Brain<\/a> with Morgan Freeman. And in the real tech world, we\u2019re edging ever closer to a world where technology-enabled mind-reading and brain modification could become a reality.<\/p>\n<p>Where there\u2019s data, there are people who want to use it, and where there\u2019s connectivity, there are the means to harness it. While legitimate organizations may face heavy restrictions over how they implement and maintain neural interfaces thanks to legislation like <a href=\"http:\/\/www.kaspersky.com\/gdpr\" target=\"_blank\" rel=\"noopener nofollow\">GDPR<\/a>, cybercrime follows no such standards. And to make matters worse, technological evolution has a habit of outpacing our ability to mitigate the risks. If, or perhaps when, cybercriminals get their hands on such tech, they might be able to steal or implant thoughts., and hold people to ransom, or take social engineering scams to a whole new level.<\/p>\n<h2>What can we do to assume control over our thoughts?<\/h2>\n<p>Although reading people\u2019s thoughts to deliver ultra-targeted advertisements or turning them into mind-controlled zombies might sound absurd, the implications of neurotechnology are real enough to have sparked the attention of regulators and human rights groups. In April 2017, neuro-ethicist Marcello Ienca of the University of Basel and human rights lawyer Roberto Adorno of the University of Zurich put together a <a href=\"https:\/\/lsspjournal.biomedcentral.com\/articles\/10.1186\/s40504-017-0050-1\" target=\"_blank\" rel=\"noopener nofollow\">study exploring ways to mitigate the risks<\/a>. In the UK, the Royal Society recently urged the government to <a href=\"https:\/\/royalsociety.org\/news\/2019\/09\/neural-interface-report-released\/\" target=\"_blank\" rel=\"noopener nofollow\">launch an investigation<\/a> into neural interface technology.<\/p>\n<p>We can only hope that ethics and the law catch up before it\u2019s too late. It\u2019s never been more critical for people and businesses to think carefully about how they use new technology and ensure that privacy and security are <em>always<\/em> implemented, by design and default.<\/p>\n<p><em>Article reflects the opinions of the author. Published in 2019.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Thanks to brain-computer interfaces, telepathic communication could soon become a reality, but what does that mean for individual privacy?<\/p>\n","protected":false},"author":2703,"featured_media":31746,"template":"","coauthors":[4311],"class_list":{"0":"post-31744","1":"emagazine","2":"type-emagazine","3":"status-publish","4":"has-post-thumbnail","6":"emagazine-category-data-and-privacy","7":"emagazine-category-future-tech","8":"emagazine-tag-privacy"},"hreflang":[{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/secure-futures-magazine\/privacy-thought\/31744\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/secure-futures-magazine\/privacy-thought\/16386\/"}],"acf":[],"_links":{"self":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine\/31744","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/emagazine"}],"about":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/emagazine"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/2703"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/31746"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=31744"}],"wp:term":[{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.kaspersky.com\/blog\/wp-json\/wp\/v2\/coauthors?post=31744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}