Scientists HACKED A Human By Controlling A Person With Another Person's Brain (Video)
Aug 28, 2013 19:56
Here's a scary piece of science: Researchers at the University of Washington have figured out how to send commands from one person's brain to control a different person's muscle movement. Are we at the era of HUMAN HACKING?
Computational neuroscientist Rajesh Rao sat wearing an electroencephalography cap. Dr Rao watched a simple computer game, firing a cannon at a target, and that moment, he imagined moving his right hand to hit the fire button. He did not actually move his hand,
Across the campus, his colleague, Professor Andrea Stocco, wore a cap holding a transcranial magnetic stimulation coil. It stimulates muscle control regions of the brain with a magnetic impulse and wore noise blocking earplugs and faced away from the video screen.
The signals sent from Dr. Rao's cap to Dr. Stocco's cap triggered Dr. Stocco's finger hitting the "fire" button on Dr. Rao's command.
This is so Ghost in the Shell concept. And it's surreal that its already happening. The tools used were the electroencephalogram cap that picked up the brain activity, and the transcranial coil that transmitted it, and they've been used in scientific experiments for years.
The University of Washington team claims this is the first human-to-human brain interface.
Dr. Rao points out that this only reads muscle signals, and not thoughts, and it can't make you move against your own will.
“I think some people will be unnerved by this because they will overestimate the technology. There’s no possible way the technology that we have could be used on a person unknowingly or without their willing participation.”
But either way, this is really just the beginning. The applications are endless, not to mention, some may be malicious too in the future. It could someday be used by a pilot on the ground to help land an aircraft. Or it could help immobile patients to express themselves physically.
The HONOR Magic 7 Pro price in ksa makes it an appealing option for those looking for a high-end smartphone. This advanced device stands out with its sleek design and robust build quality. This blog delves into the details, examining what makes the HONOR Magic 7 Pro unique, from the materials used to its overall durability and user experience. If you’re considering purchasing a high-end smartphone that balances aesthetics and functionality, this review of the HONOR Magic 7 Pro’s design and build quality will provide you with all the information you need. Read more
Organizations continue to reside under substantial pressure to provide security and compliance with data in the current-day complex regulatory ambiance. Enter endpoint management — a strategic approach to managing and securing devices, that has become a key tool for achieving these objectives. Endpoint management solutions assist organizations with stringent compliance requirements by establishing a single interface for monitoring, controlling, and securing devices. Read more
Application security is the face of organizational success in today's digital transformation era. It has been brought about by rising cyberattacks against applications that are forcing businesses to choose strong security solutions. With application security software, one is capable of protecting sensitive data, regulating compliance, and maintaining trust with customers. In this blog, we will review how to evaluate and pick the best application security testing tools, with a spotlight on the capabilities of HCL AppScan. Read more