Skip to main content

Keeping Our Thoughts Private in the Age of Mind-Reading

Keeping Our Thoughts Private in the Age of Mind-Reading

Manahel Thabet, PhD
Brain expert
With brain computer interfaces (BCIs) having become commercially available after extensive use in the medical sector, recent research has found that they can be used to hack our brains for PINs or mine our minds for data.

What is an EEG, and what have studies concerning its security found?

Two new studies by the University of Alabama and the University of Washington have revealed the malicious possibilities lurking in the shadows of impressive promises of brain-computer interface (BCI) developers: the ability to access PINs and other private information.
Electroencephalograms (EEG) are tests that detect electrical activity in your brain using a skullcap studded with electrodes. This technology has been used in the medical sector for years — for example, to diagnose schizophrenia as far back as 1998. However it is now due to be used for far more commercial enterprises. Rudimentary versions, such as Emotiv’s Epoc+ have been released with the promise of far more sophisticated versions just around the corner, including examples being developed by Elon Musk and Facebook.
https://youtu.be/c7FMVb_5SBM
The University of Alabama’s study discovered that hacking into a BCI could increase the chances of guessing a PIN from 1 in 10,000 to 1 in 20; it could shorten the odds of guessing a six-letter password by roughly 500,000 times to around 1 in 500. Emotiv has dismissed the criticisms, stating that all software using its headsets is vetted and that users would find the activity of inputting codes suspicious; but Alejandro Hernández, a security researcher with IOActive, claimed that the Alabama case is “100 percent feasible.”

The test involved people entering random pins and passwords while wearing the headset, allowing software to establish a link between what was typed and brain activity. After data from entering 200 characters was gathered, algorithms could then make educated guesses what characters they would enter next. Nitesh Saxena, Research Director of the department of Computer and Information Sciences at the University of Alabama, detailed a situation in which someone still logged on to a gaming session while checking their bank details could be at risk.
The University of Washington test focused on gathering data. In their study, subliminal messages flashed up in the corner of a gaming screen while EEG gauged the participant’s response. Tamara Bonaci, a University of Washington Electrical Engineer, said that “300 milliseconds after they saw a stimulus there is going to be a positive peak hidden within their EEG signal” if they have a strong emotional reaction to it. Howard Chizeck, Bonaci’s fellow electrical engineer who was also involved with the project, said, “This is kind of like a remote lie detector; a thought detector.” Potential uses of data could stretch from more targeted advertising than ever before to determining sexual orientation or other such personal information that could be used to coerce users.
“This is kind of like a remote lie detector; a thought detector.”

How serious is the threat?

While some BCIs are being used in extremely positive ways, like diagnosing concussions or allowing people with severe motor disabilities control over robotic aids, the threat to security and privacy posed by commercially available and mainstream BCIs is huge.
Experts have advised that we begin to think of means of protection now, rather than after the technology has become more widespread. Howard Chizeck told Motherboard over Skype that “There’s actually very little time. If we don’t address this quickly, it’ll be too late,” while scientists from the University of Basal and the University from Zurich have called for a “right to mental privacy” in response to the developments.
As with many technologies, the novelty and potential of BCI is headily seductive, but we must beware of the practical consequences their use may give rise to.Worryingly, there has been very little work towards providing protection against such attacks. The BCI Anonymizer, still in its propositional stages, aims to “extract information corresponding to a user’s intended BCI commands, while filtering out any potentially private information.” But aside from this, there is very little else.

Comments

Popular posts from this blog

3 ways to get more done with less time & less stress

3 ways to get more done with less time & less stress April 4th, 2013 by iMindMap Getting organised with Mind Maps The past two decades have seen meteoric advances in the way we communicate and work; with emails, Facebook, SMS, Twitter, Skype, Ping, blogs, feeds and a vast array of other indispensable forms of ‘connecting’ and absorbing information. With such resources at our disposal productivity should be soaring, shouldn’t it? But whilst the world is now at your fingertips, you are, unfortunately, equally within reach of the world. Using Mind Maps can help you to cut out that background noise and is proven to improve productivity by 20% – that means you can gain an extra working day every week! Here are 3 ways to get started in your productivity overhaul using iMindMap… 1. Plan Your Day This practice will take you just 5 minutes at the start of the day, and can end up saving you a lot of time and hassle. Begin with your Central Idea as today and create a main bra...

7 ways to use iMindMap as a teacher

www.thinkbuzan.com December 2nd, 2014 by iMindMap Teaching effectively centres around the ability to plan and deliver effective, engaging lessons throughout the entire school year. As a teacher, we know that time is often in short supply, and so here are seven ways in which  iMindMap  can help you find a little bit more of it, by improving your lesson planning, preparation and delivery. 1. Curriculum Planning Mind Mapping your curriculum plans can save you time, as well as vastly improve the structure and clarity of your teaching. Having a visual overview of your plan will also allow you to easily spot the gaps where you have forgotten something, ensuring you have everything covered. A good place to start is by brainstorming ideas. With iMindMap’s  Brainstorm View* , you can add everything about a topic to the infinite cork-board canvas. Type away on the coloured sticky notes and group your ideas together. When you have finished, select the Mind Map Vie...

Mind Mapping for Memory: Why is it useful?

April 29th, 2013 by iMindMap In this guest post, Thomas Jones, a Psychology student who spent some time working with us at the ThinkBuzan Headquarters, applies his know-how to Mind Mapping and the cognitive processes and theories behind the technique… Mind mapping is one of the most powerful tools in anyone’s arsenal when it comes to remembering vast quantities of information; it provides the user with their own personal tree of knowledge on a subject of their choice. Semantic Network Model One of the ideas behind Mind Maps is Semantic Network Models (Collins & Quillian, 1969) which says that everyone has their own personal spider’s web, connecting everything they know about objects together, e.g. Red is connected to fire, blood, love. If one section of the networking models is activated, the surrounding links are activated. Our own personal experiences shape these connections and everybody’s semantic network models are different. Mind Mapping takes a certain subject an...