As any neuroscientist or
psychologist knows, calling the human brain “flawed” would be an
understatement. Brains can be distracted easily, reject information they
disagree with, and convinced to make rather stupid decisions not in their self-interest.
Just Google the term “cognitive bias” for some clear examples. The brain is an
impulsive, ad hoc massively parallel system, if we wish to view it as a
computer system.
Like other computers, the
brain can be hacked. That is, its vulnerabilities can be exploited for someone
else’s motives or curiosity. Eating sweetened foods or watching TV are common “hacks”
for the pleasure centers of the brain. However, as neurotechnology advances, they
may also be hacked. It is already possible to hack invasive implants (such as
pacemakers, cochlear implants, etc.), so hacking a brain implant (especially a
wireless one) is not outside the realm of possibility. Personal information
could be placed at risk.
More interestingly, brain-hacking
is possible even by non-invasive venues. Even EEG, an older technology, can beused for neural hacking. EEG headsets are becoming commercialized and cheaper
(about 200-300 USD). One use for these is brain computer interface (BCI). Brain
computer interface (BCI) is a technology which allows an individual’s brain
signals to control a computer or prosthetic device. There are applications for medicine
(e.g. assisting disabled persons) and for entertainment (e.g. computer and
video games).
Interestingly, a simple EEG-based
BCI system was used to unknowingly steal information from participants in a
study. The types of information included house locations, bank account and
credit card numbers, PINs, and the like. The study had a ~10-40% success rate
on its 28 participants. None of them knew they were being hacked. Imagine if
hackers disguised such an information-stealing program as a computer game, or
embedded such a system with a popular computer game.
Imagine if the personal data
harvested by such an endeavor was encrypted, cached, and stored online for
later retrieval. For instance, imagine if any a small amount of cash from compromised
bank accounts was converted into an encrypted, online currency (e.g. BitCoin)
and then vanishes into the underground economy. Such a process could easily be
automated and be implemented at a low cost.
There are possible defenses
and countermeasures that could be used. For example, tagging suspicious
transactions with online banking could be one. Another could be allowing open
access to code to check for any hacks or tweaks of the sort. Some people may
have “natural defenses” in the form of forgetfulness and absent-mindedness. Still,
the low success rate (<50%) means that in order to be profitable, such a
hack would need to target large numbers of people or specifically target
wealthy people. Social engineering may also be combined to prevent people from
realizing anything is amiss, as well.
No comments:
Post a Comment