Scientists HACKED A Human By Controlling A Person With Another Person's Brain (Video)
Aug 28, 2013 19:56
Here's a scary piece of science: Researchers at the University of Washington have figured out how to send commands from one person's brain to control a different person's muscle movement. Are we at the era of HUMAN HACKING?
Computational neuroscientist Rajesh Rao sat wearing an electroencephalography cap. Dr Rao watched a simple computer game, firing a cannon at a target, and that moment, he imagined moving his right hand to hit the fire button. He did not actually move his hand,
Across the campus, his colleague, Professor Andrea Stocco, wore a cap holding a transcranial magnetic stimulation coil. It stimulates muscle control regions of the brain with a magnetic impulse and wore noise blocking earplugs and faced away from the video screen.
The signals sent from Dr. Rao's cap to Dr. Stocco's cap triggered Dr. Stocco's finger hitting the "fire" button on Dr. Rao's command.
This is so Ghost in the Shell concept. And it's surreal that its already happening. The tools used were the electroencephalogram cap that picked up the brain activity, and the transcranial coil that transmitted it, and they've been used in scientific experiments for years.
The University of Washington team claims this is the first human-to-human brain interface.
Dr. Rao points out that this only reads muscle signals, and not thoughts, and it can't make you move against your own will.
“I think some people will be unnerved by this because they will overestimate the technology. There’s no possible way the technology that we have could be used on a person unknowingly or without their willing participation.”
But either way, this is really just the beginning. The applications are endless, not to mention, some may be malicious too in the future. It could someday be used by a pilot on the ground to help land an aircraft. Or it could help immobile patients to express themselves physically.
Organizations continue to reside under substantial pressure to provide security and compliance with data in the current-day complex regulatory ambiance. Enter endpoint management — a strategic approach to managing and securing devices, that has become a key tool for achieving these objectives. Endpoint management solutions assist organizations with stringent compliance requirements by establishing a single interface for monitoring, controlling, and securing devices. Read more
Application security is the face of organizational success in today's digital transformation era. It has been brought about by rising cyberattacks against applications that are forcing businesses to choose strong security solutions. With application security software, one is capable of protecting sensitive data, regulating compliance, and maintaining trust with customers. In this blog, we will review how to evaluate and pick the best application security testing tools, with a spotlight on the capabilities of HCL AppScan. Read more
Investing in recent IPOs has become a popular way for people to grow their wealth while participating in the journey of emerging companies. In the Indian market, the number of IPOs has surged in recent years, offering exciting opportunities. However, for both seasoned and new investors, understanding the nuances of IPO investments is crucial. Read more