Neurosecurity

From HandWiki
Revision as of 17:30, 6 February 2024 by Steve2012 (talk | contribs) (over-write)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Neurosecurity has been defined as "a version of computer science security principles and methods applied to neural engineering", or more fully, as "the protection of the confidentiality, integrity, and availability of neural devices from malicious parties with the goal of preserving the safety of a person’s neural mechanisms, neural computation, and free will".[1] Simply put, Neurosecurity is, at least in principle, an antivirus and firewall for the mind. Neurosecurity also refers to the application of neuroscience to behavioral information security to better understand and improve users' security behaviors.[2] Neurosecurity is a distinct concept from neuroethics; neurosecurity is effectively a way of enforcing a set of neuroethical principles for a neural device. Neurosecurity is also distinct from the application of neuroscience to national security, a topic that is addressed in Mind Wars: Brain Research and National Defense[3] by Jonathan D. Moreno. The Center for Neurotechnology Studies of the Potomac Institute for Policy Studies, in Arlington, VA, USA works with a number of university and governmental partners on issues, problems and protocols for neurosecurity. James Giordano, Director of the Center, defines neurosecurity as "concepts, practices, guidelines and policies dedicated to identifying threats to, and preserving the integrity of neuro-psychiatric information about persons, groups and populations obtained in neuroscientific research and/or through the use of neurotechnologies (such as neuroimaging, neurofeedback, neurogenetics, and neuro-computational data banks) in medicine, the social sphere, and national intelligence and defense".[4][5][6][7]

Popular culture

  • The anime series Ghost in the Shell: Stand Alone Complex (2002–2003) prominently features hackers manipulating neural implants. One example is the Laughing Man's use of hacking to interfere with the reports of eyewitnesses. In another example, Major Kusanagi makes a point by taking control of some of Batou's implants and forcing him to punch himself.
  • Neal Stephenson's book The Diamond Age (1995) briefly refers to corporations hacking neural implants in order to superimpose advertisements onto a user's field of vision.
  • The world in video game Remember Me is set in the world where memory manipulation is commonplace.

See also

References

  1. Denning, Tamara; Matsuoka, Yoky; Kohno, Tadayoshi (July 1, 2009). "Neurosecurity: security and privacy for neural devices". Neurosurgical Focus 27 (1): E7. doi:10.3171/2009.4.FOCUS0985. PMID 19569895. http://thejns.org/doi/abs/10.3171/2009.4.FOCUS0985. 
  2. Anderson, Bonnie Brinton; Kirwan, Brock; Eargle, David; Howard, Seth; Vance, Anthony (April 18, 2015). "How Polymorphic Warnings Reduce Habituation in the Brain - Insights from an fMRI Study". Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI). 
  3. Moreno, Jonathan D. (November 17, 2006). Mind Wars: Brain Research and National Defense. Dana Press. ISBN 978-1-932594-16-4. https://archive.org/details/mindwarsbrainres00jona. 
  4. Giordano J. Integrative convergence in neuroscience: trajectories, problems and the need for a progressive neurobioethics. In: Vaseashta A, Braman E, Sussman, P. (eds.) Technological Innovation in Sensing and Detecting Chemical, Biological, Radiological, Nuclear Threats and Ecological Terrorism. (NATO Science for Peace and Security Series), NY: Springer, 2011.
  5. Forsythe C, Giordano J. On the need for neurotechnology in national intelligence and defense agenda: Scope and trajectory. Synesis 2011; 2(1): 5-8.
  6. Synesis: A Journal of Science, Technology, Ethics, and Policy - Volume 2: Neurotechnology in National Security, Intelligence and Defense
  7. Giordano J, Forsythe C, Olds J. Neuroscience, neurotechnology and national security: The need for preparedness and an ethics of responsible action. Am J Bioethics Neurosci 2010, 1(2): 35-36.