Neurosecurity Explained
Neurosecurity has been defined as "a version of computer science security principles and methods applied to neural engineering", or more fully, as "the protection of the confidentiality, integrity, and availability of neural devices from malicious parties with the goal of preserving the safety of a person’s neural mechanisms, neural computation, and free will".[1] Simply put, Neurosecurity is, at least in principle, an antivirus and firewall for the mind. Neurosecurity also refers to the application of neuroscience to behavioral information security to better understand and improve users' security behaviors.[2] Neurosecurity is a distinct concept from neuroethics; neurosecurity is effectively a way of enforcing a set of neuroethical principles for a neural device. Neurosecurity is also distinct from the application of neuroscience to national security, a topic that is addressed in Mind Wars: Brain Research and National Defense[3] by Jonathan D. Moreno.
The Center for Neurotechnology Studies[4] of the Potomac Institute for Policy Studies, in Arlington, VA, US works with a number of university and governmental partners on issues, problems and protocols for neurosecurity. James Giordano, Director of the Center, defines neurosecurity as "concepts, practices, guidelines and policies dedicated to identifying threats to, and preserving the integrity of neuro-psychiatric information about persons, groups and populations obtained in neuroscientific research and/or through the use of neurotechnologies (such as neuroimaging, neurofeedback, neurogenetics, and neuro-computational data banks) in medicine, the social sphere, and national intelligence and defense".[5] [6] [7] [8]
Popular culture
- The anime series (2002–2003) prominently features hackers manipulating neural implants. One example is the Laughing Man's use of hacking to interfere with the reports of eyewitnesses. In another example, Major Kusanagi makes a point by taking control of some of Batou's implants and forcing him to punch himself.
- Neal Stephenson's book The Diamond Age (1995) briefly refers to corporations hacking neural implants in order to superimpose advertisements onto a user's field of vision.
- The world in video game Remember Me is set in the world where memory manipulation is commonplace.
See also
Notes and References
- Denning . Tamara . Matsuoka . Yoky . Kohno . Tadayoshi . Neurosecurity: security and privacy for neural devices . July 1, 2009 . Neurosurgical Focus . 27 . 1 . 10.3171/2009.4.FOCUS0985 . 19569895 . E7. free .
- Anderson . Bonnie Brinton . Kirwan . Brock . Eargle . David . Howard . Seth . Vance . Anthony . How Polymorphic Warnings Reduce Habituation in the Brain – Insights from an fMRI Study . April 18, 2015 . Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI).
- Book: Moreno, Jonathan D. . 978-1-932594-16-4 . November 17, 2006 . Dana Press . Mind Wars: Brain Research and National Defense . registration .
- http://www.potomacinstitute.org/index.php?Itemid=71&id=49&layout=blog&option=com_content&view=category Center for Neurotechnology Studies
- Giordano J. Integrative convergence in neuroscience: trajectories, problems and the need for a progressive neurobioethics. In: Vaseashta A, Braman E, Sussman, P. (eds.) Technological Innovation in Sensing and Detecting Chemical, Biological, Radiological, Nuclear Threats and Ecological Terrorism. (NATO Science for Peace and Security Series), NY: Springer, 2011.
- http://www.synesisjournal.com/vol2_no2_t1/Forsythe_Giordano_2011_2_1.pdf Forsythe C, Giordano J. On the need for neurotechnology in national intelligence and defense agenda: Scope and trajectory. Synesis 2011; 2(1): 5–8.
- http://www.synesisjournal.com/vol2_no2_t1/vol2_t1.html Synesis: A Journal of Science, Technology, Ethics, and Policy – Volume 2: Neurotechnology in National Security, Intelligence and Defense
- Giordano J, Forsythe C, Olds J. Neuroscience, neurotechnology and national security: The need for preparedness and an ethics of responsible action. Am J Bioethics Neurosci 2010, 1(2): 35–36.