- Brainwave Computing
- Thought Controlled Computing
- Mind Controlled Computing
- Brain Controlled Computing
- Thought Interpreting Computer Software and Programming
As the 2025-2030 period is less than 2 decades away from the present time, its implications warrant consideration starting from the present day.The subject of Cyber Security in the Present Day
Cyber security is an important subject within the broadest spectrum of security in the present day, with the threat of hackers stealing information or spying on computer or Information Systems users. This threat arises from the ability of a hacker or group hackers being able to remotely access a machine or platform or system without permission to view or obtain information on it, passing through it or being relayed through it for communication.
The same methods used for stealing or obtaining information as such, can potentially also be employed to plant information, to sabotage, hijack or abuse a computer, system or platform. For example, hi-tech monetary thefts where illicitly, money is transferred out of a victim’s account by a criminal perpetrator.
How will Cyber Security be different in the era of the Brain Computer Interface?
With increased ease and benefits of computing, where users only have to think to interface with any system built with the Brain Computer Interface capability or function, the risks will also increase.
Where hacking limits a perpetrator to access data or information that is stored or passing through a device or system today, future hackers may or likely will figure a way, if not checked against, to manipulate or hijack systems, programmes or devices, to read or identify or detect thoughts of users, directly, without the users’ knowledge. Think of phone tapping or computer tapping in the present day and compare that with the prospect of direct brain tapping. One would ask how would it be possible? The same hardware or programme used to detect or read brainwaves or signals to enable a user to instruct or interact with the technological tool by thought, can be hacked, hijacked or manipulated to read the brainwaves or signals without the users’ knowledge by hackers, to virtually steal thoughts or knowledge.
Possible Repercussions of the heightened Security Threat posed by the Brain Computer Interface
A hacker in the year 2025 can easily, if successful, decipher and acquire knowledge of who the user he or she is targeting knows, how they are connected, the intimate information that others should not be privy to for various reasons or that which can be used against the target, the target’s associates, the target’s organisation or a target’s country.
With the Brain Computer Interface, the hacker is no longer limited in access to machines and systems, but rather has the potential, to access the minds of living individuals.
When it comes to government or state employees, the Brain Computer Interface era hacking will be a national security nightmare, because a strategic security network of key personnel can be unravelled, personal passwords to security assets deciphered from minds of personnel using computers (what are the chances that they will not is a question that must be realistically asked) and the extent of knowledge an individual has of a nation’s security apparatus. Potential hackers will also be able to decipher thought trains and thought patterns, that may allow enemies of states to have an upper-hand and adversarial strategies.
When it comes to commercial employees, ideas can be stolen from users, if they simply think of them while connected to a Brain Computer Interface device that happens to be compromised, before those ideas are implemented, with significant implications in terms of loss to competition. In terms of Intellectual Property rights, it will be a challenge to prove who the originator is, if a person acquired thought hacked information uses an ideal, model or design first claiming it to be his or her own. The most strategic information, that a corporation or a business would want to guard, could potentially be lost through any individual associated with it, via any number of devices collectively used by them, through such hacking. Imagine that your best and most strategic innovation being disrupted before it is pursued, because someone is able to out-think you, for unfairly having access to the thoughts of your people through hacking.
These are but some examples of possible repercussions. As efforts are unceasing today to deter or counter security threats of present, it is undoubted that similarly, efforts will be unceasing in future to deter or counter threats in new forms or of new nature arising with changing technological realities. However, it is important to anticipate and pre-empt threats before they arise, to best counter or avoid them. And hence the necessity for foresight in the subject area