{"id":68164,"date":"2016-06-12T20:20:59","date_gmt":"2016-06-13T00:20:59","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/sentient-developments-future-terror-neurohacking-a\/"},"modified":"2016-06-12T20:20:59","modified_gmt":"2016-06-13T00:20:59","slug":"sentient-developments-future-terror-neurohacking-a","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/neurohacking\/sentient-developments-future-terror-neurohacking-a\/","title":{"rendered":"Sentient Developments: Future terror: neurohacking &#8211; A &#8230;"},"content":{"rendered":"<p><p>In the 1995 anime sci-fi classic, Ghost in the  Shell, a futuristic world was envisioned in which cybernetic  individuals routinely operate in the virtual world as easily as  in the real one. Transhuman cybernetic minds are inextricably  connected to the cyber-realm, leaving them vulnerable to attacks.  <\/p>\n<p>    In this projected future people are subjected to 'ghost    hacking' in which their minds are taken over by computer    hackers without their knowing it. Their 'ghost' or essence, or    soul, or self, or whatever descriptor you want to give for    self-identity, is manipulated and controlled from a remote    source.  <\/p>\n<p>    As disturbing as this sounds, it's not beyond the realm of    plausibility. When considering the Church-Turing    thesis of computational compatability, and given recent    insight into cognitive computationalism (or     functionalism), one can make the assumption that future    human minds will be indelibly linked to extraneous computer    systems.  <\/p>\n<p>    And as a frightening precursor to 'ghost hacking', also known    as neurohacking, a recent     article in Technology Review    reveals that the first generation of invasive neurohacking may    be only years away.  <\/p>\n<p>    In her article, titled \"Could    Terrorists Hijack Your Brain?\" Emily Singer reports on how    security experts are warning that we need to prepare for a much    broader spectrum of potential bioterror agents -- this    according to a report    released this week by the Washington, DC-based National    Academies.  <\/p>\n<p>    While most bioweapons research is focused on the usual    suspects, namely such agents as anthrax and smallpox, it is now    thought that emerging technologies in biotechnology and the    life sciences could be usurped to take control of genes, immune    systems, and even brains.  <\/p>\n<p>    Terrorists, or even state-actors for that matter, could also    co-opt relatively new technologies, such as synthetic    biology (which aims to build organisms that can detect or    produce chemicals or perform other functions) or RNA    interference (a technique that allows scientists to easily    control gene expression).  <\/p>\n<p>    There is also concern about the potential of bioregulators --    small, biologically active organic compounds that can regulate    different systems in the body. Newer technologies such as    targeted delivery methods that zero in on the immune or    neuroendocrine systems could make it easier to use    bioregulators in evil ways.  <\/p>\n<p>    Such is the double-edged sword of technological development.    For each advancement, someone can twist it for self-serving and    nefarious purposes. Consequently, in order to prepare for the    ever-changing \"threat spectrum,\" the advisors recommend that    technologies with dual-use potential -- those that can be used    to either help or harm humanity -- be continually reassessed to    take account of rapid advances in biotechnology.  <\/p>\n<p>    Additionally, it is suggested that a scientific advisory board    be developed to assist the national security community and to    ensure that teams monitoring these threats have the most    up-to-date scientific expertise. It was also advised that    public health infrastructures be strengthened and that    incentives be put into place for the creation of broadly active    vaccines and other products that can protect against diverse    agents.  <\/p>\n<p>        \"It's like the transition from trench warfare to    mobilized warfare between World War I and World War II,\" notes    one of the report authors. \"How do we begin to defend ourselves    against that dynamic threat landscape? How do we adapt our    health, medical, and biodefense systems to respond to that?\"  <\/p>\n<p>    Interestingly, the advisors also endorsed an open exchange of    information in the life sciences as much as possible,    emphasizing that the best means of protecting against future    threats is further advances in technology.  <\/p>\n<p>    So, are we indelibly headed for a Ghost in the    Shell like future? Quite possibly yes, but it appears    that we may have the safeguards, firewalls, and prophylaxis in    place to deal with the problems as they arise.  <\/p>\n<p>    As a final aside, humans have had to deal with 'neurohacking'    for quite some time now, but not in such invasive ways. Ever    since propaganda was    developed, people have had their minds influenced by external    sources. And memes themselves,    whether they be autonomous or created and directed by    individuals or groups, are impacting on their hosts, directing    the human sense of self and how decisions are formulated.  <\/p>\n<p>    It looks, however, that keeping control of our minds is about    to get harder by an order of magnitude.  <\/p>\n<p>    This article was orginally published on February 1,    2006.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Visit link:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.sentientdevelopments.com\/2009\/02\/future-terror-neurohacking-sentdev.html\" title=\"Sentient Developments: Future terror: neurohacking - A ...\">Sentient Developments: Future terror: neurohacking - A ...<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> In the 1995 anime sci-fi classic, Ghost in the Shell, a futuristic world was envisioned in which cybernetic individuals routinely operate in the virtual world as easily as in the real one. Transhuman cybernetic minds are inextricably connected to the cyber-realm, leaving them vulnerable to attacks <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/neurohacking\/sentient-developments-future-terror-neurohacking-a\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187754],"tags":[],"class_list":["post-68164","post","type-post","status-publish","format-standard","hentry","category-neurohacking"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/68164"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=68164"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/68164\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=68164"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=68164"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=68164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}