Top | 7 | |
Newsletter 8/17/2025 | If you find this article of value, please help keep the blog going by making a contribution at GoFundMe or Paypal |
Back to Contents |
Riddle Me This: When Is a Tattoo Not a Tattoo?
Part 2: The Inherent Risks of Bio-Connectivity Technology It seems axiomatic that Bio-Connectivity Technology comes with several inherent risk factors. Beyond the obvious assimilation of all of humanity into a Borg like collective hive, the technology itself relies on systems that are themselves not secure. As noted in an article titled, "Brain-computer interfaces (BCI) are vulnerable to cyber attacks and need security and safety measures," published March 12, 2023, author Rajesh Uppal posits that the entities developing this technology intended for a mass market are increasingly employing wireless technology within their various BCI applications. Thus, a compromised wireless device could well become the attack vector for a connected BCI. First on this list of vulnerable wireless technologies is the Bluetooth technology upon which rests the connection between the Brain Computer Interface and the human user.
An article appeared in
Forbes, Febuary 20, 2025, titled, "11 Types Of Bluetooth Attacks
And How To Protect Your Devices." Author Alex Vakulov
lists several vulnerabilities of Bluetooth that could directly impact a
user with a BCI. Among them are: Vakulov lists 18 steps Bluetooth users can employ to protect their devices. None of these steps, however, would apply to a BCI interface. For instance, how does one "Regularly update your devices to ensure they have the latest security patches against known vulnerabilities," when the device is embedded inside a human body? In the research for this series, although the importance of keeping BCI applications current is frequently mentioned, I had read nothing about how to actually update the software. Another step suggested by Vakulov to protect Bluetooth users is to "Use security software on your devices to detect and block Bluetooth-related malware or worms." Again, there is no mention in the literature about antivirus software or firewalls for BCI devices. A term often given for the compromise of BCI systems is neural hacking. In the literature of BCI technologies, the acknowledgement of neural hacking is coming into clearer focus. An undated article published in Presence Secure offers an excellent primer of the subject of neural hacking. Titled, "The Rise of Neural Hacking: Ethical Dilemmas in Brain-Computer Interface Security," author Faith Peter defines neural hacking as, "the unauthorized access or manipulation of neural data through BCIs." Peter also states what anyone who has been involved with computer technology for the last several years instinctually knows. Like all technologies, BCIs are not without their loopholes. As much as they promise to revolutionize lives, they also introduce vulnerabilities that could lead to neural hacking—a threat unlike anything humanity has faced before.
Lying at the heart of securing private data accessed though BCIs is that
fact that "Neural data is unique to each individual, making it
difficult to detect and prevent unauthorized access. Peter
lists five areas of concern with neural hacking. So, although the technologies surrounding BCIs might be novel, the application of this new technology faces risks very similar to traditional computing. Security professionals in traditional computing often focus on the risks associated with what are called backdoors. As defined by Crowdstrike, "A backdoor attack is a clandestine method of sidestepping normal authentication procedures to gain unauthorized access to a system." The backdoor attack "involves exploiting system weaknesses or installing malicious software that creates an entry point for the attacker." In BCI technology, a neural backdoor could interfere with a person's perception of reality, and thus the victim's behavior. In a bio-integrated system, the outcome of a neural backdoor might might well be external manipulation of what a victim sees, hears, or experiences. Typically, a backdoor attack on BCI technology is a two stage attack. As explained in "The Hidden Risks of Brain-Computer Interfaces," published in Simple Science, March 23, 2025, an attacker must first somehow insert a "small number of contaminated EEG signals" into the data set. These contaminated signals hold a hidden pattern that acts as a key. The data set will then recognize this pattern as a legitimate part of its data set. This creates the secret backdoor that allows the attacker access to the BCI and the potential to manipulate the data set. In the second stage of the backdoor attack, any normal EEG signal can be compromised by application of the hidden key. The system will now recognize the attacker's signal as legitimate, giving control of the BCI and its output over to the attacker. In its section titled, "Challenges related to BCI data," the GAO reported cited in Part 1 of this two part series, noted that security risks associated with BCI technology are greater when BCIs are not employed in "a controlled laboratory environment." In other words, when BCI technology becomes a Consumer oriented product as ubiquitous as the smartphone is today. Conclusion I have longed maintained that as any new technology is adopted by a greater percentage of the consumer public, that technology soon devolves down to the lowest common denominator. Cory Doctorow has coined a term that describes the downward spiral of technical innovation strangled by wanton consumerism with one word: "Enshittification." The process of Enshittification also describes "How Platforms Die." Doctorow summarized his thesis in a Wired magazine article, titled, "The ‘Enshittification’ of TikTok: Or how, exactly, platforms die," dated January 23, 2023. Using TikTok as his example, Doctorow states his central thesis: For many years, even TikTok's critics grudgingly admitted that no matter how surveillant and creepy it was, it was really good at guessing what you wanted to see. But TikTok couldn't resist the temptation to show you the things it wants you to see rather than what you want to see. The enshittification has begun, and now it is unlikely to stop.
A succinct summary of the inevitable process of Enshittification is offered as a handout by Pat
Hocking. Its title is, "Enshittification: How
Modern Platforms Decline." Hocking synthesizes the
process down to four steps.
In our present time, we see Artificial Intelligence accelerating through the Enshittification process. Currently, I see AI at stage two of the process with stage three on a not too distant horizon. Almost inevitably, AI has increasingly become a security threat to its users.
Of course, Brain Computer Interface technology is nowhere near a
Consumer orientated mass market product. Yet, as stated in the
Introduction of this series, Bill Gates believes we all soon be
liberated (or encumbered) by BCI products. That may well be a new bright
future, but the inevitability of Enshittification argues otherwise.
I'd
sacrifice anything come what might |
¯\_(ツ)_/¯¯ Gerald Reiff |
Back to Top | ← previous post | next post TBA → |
If you find this article of value, please help keep the blog going by making a contribution at GoFundMe or Paypal |