{"id":7609,"date":"2017-04-04T17:17:53","date_gmt":"2017-04-05T00:17:53","guid":{"rendered":"https:\/\/www.zubairalexander.com\/stage\/?p=7609"},"modified":"2017-04-07T15:07:03","modified_gmt":"2017-04-07T22:07:03","slug":"uw-researcher-believes-the-next-hacking-frontier-is-likely-to-be-our-brain","status":"publish","type":"post","link":"https:\/\/www.zubairalexander.com\/blog\/uw-researcher-believes-the-next-hacking-frontier-is-likely-to-be-our-brain\/","title":{"rendered":"UW Researcher Believes the Next Hacking Frontier is Likely to Be Our Brain"},"content":{"rendered":"<p>By now, everybody and their brother-in-law knows about the Russian hacking\u00a0during the 2016 U.S. elections. To say it&#8217;s impact has been enormous would be an understatement. When we talk about hacking, we usually mean hacking into electronic devices and digital software.\u00a0The hackers have successfully hacked into smartphones, computers, refrigerators, and just about anything that&#8217;s been connected to the Internet. However, that\u00a0might change in the future. The University of Washington (UW) researcher Tamara Bonaci believes that hacking the brain is going to be the next frontier.<\/p>\n<p><img decoding=\"async\" class=\"size-medium wp-image-7578 alignleft\" src=\"https:\/\/www.zubairalexander.com\/blog\/wp-content\/uploads\/2017\/03\/Hacked2-300x195.png\" alt=\"\" width=\"300\" height=\"195\" srcset=\"https:\/\/www.zubairalexander.com\/blog\/wp-content\/uploads\/2017\/03\/Hacked2-300x195.png 300w, https:\/\/www.zubairalexander.com\/blog\/wp-content\/uploads\/2017\/03\/Hacked2-768x499.png 768w, https:\/\/www.zubairalexander.com\/blog\/wp-content\/uploads\/2017\/03\/Hacked2-1024x665.png 1024w, https:\/\/www.zubairalexander.com\/blog\/wp-content\/uploads\/2017\/03\/Hacked2.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>People often say that the human brain is like a computer. That&#8217;s true, especially when it comes to computing information. However, our brain is not digital and\u00a0is not connected to the Internet like an electronic device. So how do you hack into a brain? According to Bonaci, by extracting sensitive information from electrical signals in the brain. In\u00a0her presentation at the Enigma security conference, Bonaci used a video game to make her point. The video game had seven electrodes connected to a player&#8217;s head and measured certain signals in real time. These electrodes formed, what Bonaci called, a brain-connected interface (BCI). According to <a href=\"https:\/\/arstechnica.com\/security\/2017\/01\/in-not-too-distant-future-brain-hackers-could-steal-your-deepest-secrets\/\" target=\"_blank\">this article<\/a> in Ars Technica, the\u00a0UW research team was able to use the signals measured by BCI to get clues as to what the players were thinking and feeling.<\/p>\n<p><a href=\"https:\/\/arstechnica.com\/security\/2017\/01\/in-not-too-distant-future-brain-hackers-could-steal-your-deepest-secrets\/\" target=\"_blank\"><img decoding=\"async\" class=\"alignnone size-large wp-image-7611\" src=\"https:\/\/www.zubairalexander.com\/blog\/wp-content\/uploads\/2017\/04\/Compromised_BCI-1024x651.png\" alt=\"\" width=\"1024\" height=\"651\" srcset=\"https:\/\/www.zubairalexander.com\/blog\/wp-content\/uploads\/2017\/04\/Compromised_BCI-1024x651.png 1024w, https:\/\/www.zubairalexander.com\/blog\/wp-content\/uploads\/2017\/04\/Compromised_BCI-300x191.png 300w, https:\/\/www.zubairalexander.com\/blog\/wp-content\/uploads\/2017\/04\/Compromised_BCI-768x488.png 768w, https:\/\/www.zubairalexander.com\/blog\/wp-content\/uploads\/2017\/04\/Compromised_BCI.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p>The UW researcher even suggested that electrical signals in our brain should be declared as personally identifiable information (PII).\u00a0That&#8217;s a fascinating idea. According to the article:<\/p>\n<blockquote><p>&#8220;Bonaci said that electrical signals produced by the brain are so sensitive that they should be classified as personally identifiable information and subject to the same protections as names, addresses, ages, and other types of PII. She also suggested that researchers and game developers who want to measure the responses for legitimate reasons should develop measures to limit what&#8217;s collected instead of harvesting raw data. She said researchers and developers should be aware of the potential for &#8220;spillage&#8221; of potentially sensitive data inside responses that might appear to contain only mundane or innocuous information.&#8221;<\/p><\/blockquote>\n<p>If you are interested in security-related topics, you should check out Ars Technica&#8217;s Security Editor Dan Goodin&#8217;s complete <a href=\"https:\/\/arstechnica.com\/security\/2017\/01\/in-not-too-distant-future-brain-hackers-could-steal-your-deepest-secrets\/\" target=\"_blank\">article<\/a>\u00a0for the rest of this amazing story.<\/p>\n<hr \/>\n<p><span style=\"font-size: xx-small; font-family: Verdana;\">Copyright \u00a9 2017 SeattlePro Enterprises, LLC. All rights reserved.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By now, everybody and their brother-in-law knows about the Russian hacking\u00a0during the 2016 U.S. elections. To say it&#8217;s impact has been enormous would be an understatement. When we talk about hacking, we usually mean hacking into electronic devices and digital software.\u00a0The hackers have successfully hacked into smartphones, computers, refrigerators, and just about anything that&#8217;s been [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":6842,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[43,24],"tags":[],"class_list":["post-7609","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articles","category-security"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/www.zubairalexander.com\/blog\/wp-content\/uploads\/2016\/04\/BlackHat_featured_1100x800.png","_links":{"self":[{"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/posts\/7609","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/comments?post=7609"}],"version-history":[{"count":0,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/posts\/7609\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/media\/6842"}],"wp:attachment":[{"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/media?parent=7609"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/categories?post=7609"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.zubairalexander.com\/blog\/wp-json\/wp\/v2\/tags?post=7609"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}