Content uploaded by Ali Ghazizadeh
Author content
All content in this area was uploaded by Ali Ghazizadeh on Apr 02, 2021
Content may be subject to copyright.
RECLAIMING THE UTOPIA: ALTERNATE ECOSYSTEMS FOR
SAFEGUARDING HUMAN RIGHTS IN THE HIGH-PERFORMANCE
BRAIN MACHINE INTERFACE ERA
Soroush Meghdadi Zanjani2and Ali Ghazizadeh1, 2
1Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran
2School of Cognitive Sciences, Institute for Research in Fundamental Sciences (IPM), Tehran, Iran
February 22, 2021
ABS TRAC T
Brain-machine interface (BMI) has long been a candidate for treating neurological conditions and
for enhancing mental faculties in humans. Recently, the riveting advances in neuroscience and
neurotechnology fueled by large-scale global investments in research and development are giving
rise to high performance BMI solutions that are poised to enter every aspect of human life. Yet
the landscape of IT hardware and software infrastructures raises serious concerns about the ethical
violations in an era when human brains are to be exposed to contentious intentions by powerful
players in the ecosystem. The impeding risks are particularly heightened by the conveniences offered
by proprietary BMI solutions and the attractions of higher productivity especially with the general
public oblivious to the implications of the forthcoming BMI era. Here, we argue that despite the
rapidly closing window of opportunity, an alternate ecosystem based on four principles of openness,
modularity, offline deployability and least privilege can be implemented to create a safer playfield
with naturally implemented safe-guards for neuroprivacy, neurosecurity and agency while at the same
time facilitating a bright future with commercial high-performance BMI applications.
1 Preamble
The fact that the human brain is the seat of his intelligence and (at least) a contributory cause to all of his perceptions,
memories, thoughts and actions is agreed upon by all scientists and all philosophers of mind including dualists and
monists (barring fringe idealists). In a little more than a century, neuroscience, the modern science of studying the brain
guided by the neuron theory, has made great strides in understanding the human nervous system despite the astonishing
complexity of human brain structure and function. The recent decade has witnessed a renewed wave of organized effort
with brain initiatives across the world and with nations working in partnerships spending hundreds of millions of dollars
each year giving much needed impetus to spearhead development of new technologies for probing brain structure and
function [1
–
3]. As a result, unprecedented amounts of data on brain architecture and activity from macroscopic [4] to
microscopic [5] resolutions are generated and the causal roles of specific neuronal populations are now being deciphered
at ever increasing levels of spatio-temporal resolutions [6] and with improved behavioral specificities [7].
This riveting progress in neuroscience is probably only matched by another area of intellectual endeavour, the information
technology (IT), this one purely artificial and related to computers. At the hardware level, ever shrinking transistor
sizes and increased memory capacity have sustained exponential increase in computational power right at the finger
tips of the average user [8] and just as the conventional transistor technologies were about to loose steam, the recent
rise of quantum computing promises to enhance computational capacity by multiple orders of magnitudes at least for
a certain class of problems [9] even without requiring extreme conditions [10]. Similarly on the software side, fast
paced advances in machine learning and deep neural networks have already created a paradigm shift in data driven
technologies across the board [11–13] including in neuroscience research [14, 15].
APREPRINT - FE BRUARY 22, 2021
It is not hard to imagine the supernova that will result when these two bodies of knowledge and technology from brains
and machines become fully entangled. Indeed, as far back as 1970s prototypical brain-computer interfaces (BCIs)
were envisioned and implemented starting from electroencephalography (EEG) signals to control simple computer
functions [16, 17]. In the years that followed, extensive research in animals [18
–
21] have succeeded in controlling more
complex functions such as robotics arms using using single cell electrophysiology. In humans, the main focus has
been on neurological disorders by directly recording and stimulating the nervous system to restore normal functionality.
This has resulted in significant progress in making neuro-prosthetic devices including bionic arms, cochlear implants
and retinal implants [22
–
25]. In addition to sensorimotor applications, closed loop neuro-feedback setups are also
becoming widely used for modifying cognitive functions in disorders such as depression, attentional disorders and
addiction [26, 27].
However, it is the emergence of high resolution invasive implants that allow for longitudinal recordings and even
selective stimulation of a large population of neurons in humans [24,28
–
30] that is about to exponentially expand
the repertoire of BMI capabilities. The list of currently realized possibilities that can get a boost from the high-
performance BMI, goes on from controlling real-world objects such as high-performance robotic arms, flying drones
and cyborged animals to immersive virtual realities created and navigated by mere thoughts [31
–
39] to generating
speech and text from brain signals as well as detecting attention, perceptions, emotions and lies [40
–
44]. There are
even proof of principle demonstrations for implicit skill transfer into the brain [45] and cooperative problem solving by
networked brains [46,47].Therefore, it is well conceivable that given reasonable effort and sufficient funding, non-verbal
communication between people, readout and induction of memories, knowledge and skills as well as direct interfacing
with artificial intelligence become right-around-the-corner realities [48] as the result of high-performance commercial
BMIs. Indeed, such a game changer prospect have already garnered the attention of diverse and powerful players from
the governments to business sectors alike.
While the possibilities born out of the marriage of brains and machines promise an unprecedented and exciting chapter
in the human history, a closer look at the IT landscape creates a pause in ones unconditional excitement. Despite the
exquisite advances, fundamental vulnerabilities and potentials for violation of human rights to privacy and agency
in the IT sector are aplenty [49]. Currently, many of such vulnerabilities are tolerated in return for the productivity
and conveniences offered, but the extension of the status quo to mental processes, ones most private asset, is highly
alarming. Notably, the concern for human right risks associated with BMI is not new. Indeed a number of groups have
previously voiced concern with regard to issues related to “neuroprivacy”, “neurosecurity” and “agency” [50
–
54] and
have even produced recommendations on regulatory safeguards and legal aspects arising from BMI usage. Recently
there have been some comprehensive surveys of security risks in BMI and proposals for countermeasures in different
scenerios [55] or data processing anonymizers to reduce privacy risks related to “brain fingerprinting” [56]. However,
little attention is paid to providing alternative and wholesome ecosystems to the risk-prone IT establishment itself that
are compatible with internationally accepted ethical values and standards.
In what follows, we will briefly expand on the rather grim prospects of the current social and technological IT ecosystem
with respect to the end-users rights, examining the major players and factual vulnerabilities along with a glimpse of
actual violations to date. Then, we propose an alternative ecosystem based on a set of principles to better safeguard
the end-users rights. We argue that while the proposed principles do not eliminate the risks completely, they can
nevertheless bring the related processes and products under self correcting checks and balances. We also argue that
these principles, have to be embarked upon at grassroots with urgency. In fact, we may be only a few years away from
the point of no return for protecting the end-user rights.
2
APREPRINT - FE BRUARY 22, 2021
2 State of the Union
2.1 Ownership and Control
A critical component that has been progressively compromised in the past couple of decades in the IT industry is the
extent of end-user ownership over devices and services s/he legally owns. People are increasingly barred from full
control of the behavior of applications they own especially with respect to the way personal information is accessed and
used. Many applications gain access to personal hardware, data and network with little control over possible misuses.
This is not only true at the software level but also at hardware level where hidden back-doors by device manufacturers
and operating systems or privilege escalation by third party applications may breach agency and privacy [57] or take
control and turn a personal devices into a remote snooping gadget [58,59] or a dysfunctional “brick” [60].
In addition, many people are increasingly relying on exclusive and proprietary products and services, which trap them
into closed ecosystems. Such walled gardens while productive and convenient in many cases, often restrict the users
access to other platforms not deemed kosher by the owners of the ecosystem (e.g. airdrop , nearby share [61, 62])
turning their rights to privileges that can be revoked at the whim of the service provider (e.g. purchased products purged
from user’s “local” library after being removed from the store [63–65])
The end-user ownership is further compromised by the recent trends and the gradual paradigm shifts toward cloud based
computation and storage and the growing trend of network based “as a service” (aaS) products. Such trends reduce
the capacity for oversight, control and flexibility by the end-user. In extreme cases, such scenarios enable power term
dictation and denial of service at the discretion of a “big brother” [66]. More subtly, such violations can be engineered
to be practically indiscernible within the design of the systems, procedures and protocols. This could be especially
alarming as the repercussions of such violations often do not remain confined to the technological aspects per se but
grants the "real owners of products and services" the power to manipulate the environment in ways that can jeopardize
agency and freedom of end-user as evidenced by numerous records of such misuse in the past [67]. In the case of BMI
applications, such loose ownership can have catastrophic consequences for one’s most private asset i.e his mind, with
violations that can be as subtle as performing subliminal brain queries and brain fingerprinting ( [68–70]) to electrical
or magnetic stimulation delivered right into perceptual, motivational or decision making centers of one’s brain.
2.2 Transparency and Complification
The potential violations of end-user rights do not only stem from lack of sufficient control over products and applications
but also from lack of transparency [71]. In most cases the user is not aware of the other entities who share control
of the product, the extent of their control and the way personal information is being used by the trusted entities. As
for information misuse, it is practically impossible for an average user to monitor the inner workings of applications
or to inspect the network packets that are transmitted and received for the content and destinations. Indeed, tracking
and inspection of information access and transmission by applications and devices are hard enough that in many cases
violations of users privacy may go unnoticed for many months or even years.
As a measure to implement the users "right to know", today in most cases elaborate end-user license agreements (EULA)
and terms-of-service (ToS) are prepared for the users prior to service initiation. However, in most cases the complexity
of these legal forms prevents any reasonable understanding of the terms one is consenting to. The difficulty in EULA
comprehension is observed even in law students [72] raising the possibility of intentional "complifications" in ToS
terminology. Aside from the esoteric language, the sheer length of these documents make them impractical to even
be fully browsed [73]. A study shows that only 1 out of 3000 users read a representative EULA document to find a
secret $1000 prize that was embedded in its text [74]. This shows how critical information can be easily missed by
many users if say a BMI application decided to "retain your EEG Data and Experiment Data for scientific or historical
research purposes" while "your user Account will be de-activated and you will lose access to the Service" in response to
a request for erasure of personal information from the vendors server [75].
It is needless to say that having "unwarranted" access to someone’s neural data allows extraction of all sorts of private
or sensitive information. In fact the feasibility of extracting personal information such as credit card pin codes and
choice preferences has been already demonstrated even with EEG signals that do not normally have a high signal to
noise ratio [76]. Given the rapid progress in neuroscience hardware and software technologies and the recent FDA
designations for more invasive high-performance BMI technologies (e.g. Synchron and Neuralink [77]) which provides
access to much richer neural signals, the range of potentials and risks can simultaneously grow to unimaginable levels
compared to current state of affairs. The addition of causal manipulation of the neural processes to the mix has the
potential to close the BMI loop around the windpipe of people’s remaining privacy and agency.
3
APREPRINT - FE BRUARY 22, 2021
2.3 Imposing Stakeholders
The commoditization of high performance BMIs as a consumer-level product will not only attract isolated small-game
hacking and phishing attempts, but also larger players with more menacing intentions equipped with well-thought plans
and trumping resources. Most notable among these players are the governments and rich high-tech corporations.
As for the governments, keeping law and order often creates an insatiable appetite for gathering intelligence domestically
and internationally and tightening control over ones own constituency. The recent history is replete with leaked or
declassified reports that document such organized data gathering and surveillance schemes which were in many cases
coordinated with large well-known tech companies. Attempts that ranged from mass surveillance, collection of metadata,
embedding backdoors for well-trusted encryptions, unlimited access to smartphones for implementation of "great
firewalls" just to name a few [67,78].
The corporations are also in a maddening race to dominate markets and increase profits. Once again the history shows
that ethical considerations and safeguarding values appear as mere sentimentalities when confronted with brutal business
realities. The worrisome and recurring list of violations of privacy and agency of users by corporations also range from
buying, selling and exploiting users data for various questionable purposes even to the extent of shaping the public
opinion to determine the outcome of democratic elections [79] by capitalizing on addictive social media [80].
It is needless to say that all of the above mentioned infringements will have orders of magnitude larger repercussions
once people’s remaining private space is opened up to abuse by linking the modern marvels of information technology
with ever accumulating wisdoms of neuroscience.
2.4 Mind Reading and Manipulation: The Lure
The attraction of being able to decipher other people’s thoughts and to manipulate them is not new and can be traced
back to antiquity. In the modern times, there are convincing examples of such organized attempts at least back to the
cold war era [81]. While the degree of success of these past attempts may be unknown, the resurgence of new machine
learning technologies along with the rise of neuroscience and biotechnology is poised to give a new thrust to such
ambitions [82, 83] with a potential of turning BMI into a new battle zone for the global and local powerhouses with the
laypeople caught in the crossfire.
The unsettling fact here is the high likelihood of translation of the current IT mindset to the emerging BMI sector. A
mindset with powerful contingencies and conveniences built without regard to end-users ownership and the "right to
know" as discussed previously. An honest deliberation on the extension of the current IT landscape to technologies
involving the brain portraits a dystopic picture of a future with spying daemons delivered as beautifully packaged
updates that instead of webcams, hijack eyes and thoughts or with neuro-marketing Nazis controlling and paying people
by electrical signals delivered directly to the brain reward centers. What is most alarming in these scenarios is that the
very same BMI technologies can be used to detect and snooze any thoughts of opting out of such gimmicks by the
user [84].
3 Toward a Safer Solution
In what follows, we will put forward a set of general principles that could provide a safe route for development and
commercialization of BMI products. The proposed guidelines are not in any ways claimed to be final or all-inclusive but
rather they should be construed as a starting point for further discussion and critique by those concerned with preserving
the public’s rights and values in the high-performance BMI era.
3.1 Open Design and Transparency
A direct neural interface for humans should have an open design in both software and hardware architecture that is freely
available for the scrutiny of the general public including the experts in line with Linus’s law (i.e. “given enough eyeballs,
all bugs are shallow”) [85]. The critical point here is that no single or group of entities should be unconditionally
trusted to uphold values like security, privacy, independence, agency and freedom of users. The open design principle
vaccinates the BMI services against accidental or engineered bugs. Furthermore, the open design enables organic
growth and improvement in functionality through the participation of the large community. The open ecosystem also
sustains a constant flow of creativity from the melting pot of ideas and diversity of contributions. The open design
principle addresses both the ownership and transparency issues, ultimately satisfying security in the best way possible.
Closed ecosystems are repeatedly shown to sacrifice consumer rights with a false promise of security in spite of the fact
that “security through obscurity is no security at all”.
4
APREPRINT - FE BRUARY 22, 2021
As for the processing hardware the architecture most widely used today (x86, basically, nearly all desktop processors!)
has many hidden undocumented instruction sets (isa) [86]. Such hidden instructions pose a risk if misused in BMI
applications. Indeed many of the currently available platforms have hardware level vulnerabilities that allows attackers
to execute commands with unprivileged access below the level of applications and the operating system allowing them
to get access to user’s private data. (privilege escalation) [57, 87].
The ideal plan here would be to design a set of standard specifications (similar to IEEE 802 for networks) through
an open committee to collect and suggest standard design protocols for BMI solutions and to check commercial
products for compliance. The proposed guidelines should allow for different internal architectures (e.g. hardware based
architectures for artificial neural networks [88]) so long as they are compatible with the open design specifications. Use
of reduced instruction set processors (RISC), which are becoming more popular these days, are certainly a practical
alternative to complex instruction set computers of today. If enterprise hardware are to be used, they should be inspected
to ensure compliance and to be free from hidden isas.
On the software side, the design should also follow an open source, transparent and interpretable structure. The source
code should be reviewable by the public to check for vulnerabilities, suspicious activity or bugs. The building blocks for
a BMI system should be envisioned and plans for creating a transparent system should be devised such that users with
reasonable effort could monitor all outgoing and incoming signals from and to their nervous system. Obviously, such a
comprehensive outlook, requires serious joint effort from both neuroscience and engineering communities to create
an API that would take commands in a user friendly and reviewable format. Signals that are ready to be transmitted
from the brain or the ones arriving from outside should rely on users permission for the final transmission. Similar
to the hardware design, an open committee comprised of experts in relevant fields should be responsible for devising
approved protocols and for ensuring compliance with the open transparent standards in collaboration with the public
and expert communities.
BMI commands range from simple ones such as moving an actuator to more complex ones such as a certain neural
code that is to be transferred in a communication session. Creative solutions that maximize efficiency and convenience
for review prior to transmission may be implemented in this regard. For instance in case of motor commands, using
augmented or virtual realities before actual execution of the interpreted command can easily and quickly show the user
the consequences of an action in the environment. In the case of a neural code, decoding the pattern and showing it in
the modality that best represents that concept can help with the verification process.
3.2 Modularity and Isolation
Another important principle for protecting consumers agency and freedom is the modular design. Indeed many of
the processes that have to be done on the neural signals including denoising, filtering, analogue to digital conversion,
spectral analysis, basic pre-processing, spike sorting, etc have highly optimized and standard hardware designs that can
be implemented using special purpose modules with application specific integrated circuits (ASICs). Consequently,
custom designed hardware can be designed for each processing steps in the form of replaceable vendor-nonspecific
components. Such a modular design allows one to mix and match components according to specific requirements along
with standards and protocols to ensure compatibility between components.
The application layer which needs more complex operations and higher programmability can be implemented with
open instruction set architectures (RISC-V). The classification and decoding can be done using state of the art machine
learning techniques and neural net architectures using open source GPU like instructions that support matrix arithmetic.
The modular design also allows for parallel processing that increases throughput.
Such modular and application specific design also supports information isolation across the various modules. One may
choose to set aside separate isolated memory spaces to control what information should or should not be accessible
by other modules or applications. This is in contrast to the usual default in which applications can access information
registered under a given user globally. While the information isolation can be done in the software level, implementing
isolation at the hardware level by having physically separated memory spaces and rerouting access according to users
preferences to apps and sockets ensures much higher reliability.
The communication between components, regardless of the internal architectures, can be done through proper application
programming interfaces (APIs). Of course, the components themselves should be designed to receive and support
such APIs (it could be in their architecture, whether by being supported natively at the hardware level or via command
translation to the native software language via the interface)
5
APREPRINT - FE BRUARY 22, 2021
3.3 Local Processing and Offline Deployability
BMI applications can be riskier when their functionality depends on data transmission and computations on the cloud.
Consider the scenario of having a chip in your brain that belongs to a closed ecosystem on which you rely for processing
neural data online to deliver services to you and your customers. While very convenient, the BMI company enacts a
new policy requiring you to increase their cut from the profit you make, otherwise you will be downgraded to their
free version which includes occasional advertisements played right into your head that you cannot skip. Terminating
your service is also made unattractive since your neurally processed information is being stored under a proprietary
format that you cannot legally use or transfer to other ecosystems. Another scenario could involve authoritative policy
makers deciding that you need a limited “cleaner” version of your BMI service by openly banning your access to the
“full” version or even worse sneak in and manipulate the computations on the cloud to their liking. Dependence on
online processing make it easier to impose functionality limitations either accidentally or intentionally by power term
dictations, thus threatening end-user agency and privacy.
In order to protect consumer rights, BMI setups should be deployable offline and should allow for local and peer to
peer configurations, rather than a client-server only format with third-party corporations. It is true that doing things
locally would be more expensive than doing them centralized somewhere remotely. However, given the fact that
there is no stringent hard limits for increasing local processing power, we believe that with reasonable investments in
financial and human resources most processing needs are addressable by appropriate local architectures in an open,
modular and offline depolyable format. Indeed given the sensitivity of the issue and what is at stake, the additional
costs and investments for development of powerful local solutions of even common BMI applications are well justified.
Furthermore, it is expected that mass production and improvements in technology can contribute to lowering the costs
by economy of scale.
3.4 Least Privilege
Since data comunication between BMI modules within and across systems cannot be zero, principle of least privilege
which in about sharing the least amount of information that is required for a particular job is proposed similar to
previous suggestions [55, 56]. Unfortunately, when it comes to exchanging data with other systems, the dominant
paradigm today involves applications freely opening sockets, accessing to data and freely communicating with the
outside world, which provides great flexibility but makes it equally potent for abuse.
There are some solutions with attempts to remove personal information and “anonymize” [56] data. Along we such
schemes we propose that the data sent over the net should be as qualitative as possible and have the least amount of
information for the exact purposes requested by the API and devoid of unnecessary details. Ultimately however, there
seems to be no method to remove all private information since one cannot predict every possible misuse of neural
data as new methods may be discovered for discrimination of features from a seemingly anonymized brain signals (or
new computational power unleashed to nullify today’s most robust anonymization and encryptions, think quantum
computing). Nevertheless, when combined with previous principles, the concept of least privilege when dealing with
neural data, should be considered to further minimize chances of misuse.
4 Closing Remarks
The current rate of progress in the know-how and technologies related to BMI, is thrusting the human society into an
unprecedented era of interconnection between man and machines. We have argued that the current state of affairs and
the IT landscape gives one many reasons to be worried about an apocalyptic future especially with commercialized high
performance BMI. We have argued that the window of opportunity for changing the course of events is rapidly closing
and have proposed a set of principles that if correctly implemented would minimize the risk to people’s agency and
privacy in the coming BMI era. However, as with any other technologies, the suggested principles are not a foolproof
guarantee against the risks and should not be construed as an alternative to the individual’s due diligence in their
interactions with BMI applications. Furthermore, openness and rejection of proprietary and closed ecosystems comes
with certain costs and some degree of uncertainty about the behavior of BMI systems which should probably should be
dealt with as the lesser of the two evils.
The key point here is that given the current state of affairs and the projection of advances in BMI technologies, we may
only be a few years away from the "point of no return". That is unless a wholesome and forward looking alternate
solution is devised and implemented soon, the current tenets in the IT sector will naturally swamps the consumer BMI
enterprise resulting in an ecosystem for which patches and ad-hoc fixes could no longer restore long-lost end-user
rights and ethical values. Note that the pressure caused by mass migration of middle-class to BMI solutions and the
6
APREPRINT - FE BRUARY 22, 2021
apparent ease and enrichment they bring to daily life will put non-adopters at great disadvantage and weakened and
thus irrelevant in the long run.
Obviously, our proposed guidelines do not preclude a person from using a BMI solution to harm himself or use it in
addictive ways for instance by directly stimulating reward centers in his brain. From an authoritative perspective, the
potential for such misuse, justifies a closed and controlled ecosystem with only limited people or entities having access
to know or modify what is behind the curtain. While this argument may seem sound in theory, in reality the most
frequent and dangerous abuses are often conducted by the same authoritative entities that are entrusted with ensuring
safety, privacy and agency of the people. On the other hand, transparency allows the community to detect violations of
protocols and openness allows them to fight back the abusers (without claims to a silver bullet [89]). Thus the problem
of dealing with misguided decisions of people with regards to BMI are not specific to this technology and should be
countered by agreed upon checks and balances enacted by the general public.
Furthermore, the principle of local deployability will certainly have to deal with the challenge of mass migration toward
cloud computing in terms of price tag and processing power. We would like to argue that given the sensitivity of
the subject matter and what is at stake a more costly yet a safer alternative should be the preferred route of action
similar to the reasoning behind choosing more expensive alternatives for high risk medical treatments. Furthermore, it
is very likely that with enough demand for local deployability, future advances in storage and processing power can
make offline implementation of most common BMI applications feasible. On the other hand, it is conceivable that
given limited resources and promoted by the convenience of current proprietary and closed ecosystems among other
practical reasons, open BMI solutions become a fringe but nevertheless a viable alternative to the established and widely
supported enterprise solutions
We argue that despite some skepticism [90] the upcoming BMI era is a new turning point in human history. The marriage
of brains and machines might as well be the true realization of the long imagined artificial intelligence singularity [91].
Indeed, the emergence of super-intelligence [92] may not be of a pure human or artificial intelligence form per se
but of a hybrid between humans and machines. Unlike previous technological revolutions however this one is about
conquering the innermost citadel of our individuality, our brains and minds. As of to-date there are no strong alternatives
that can guarantee the public agency and privacy in the BMI era. This shall prompt all who care about preserving the
free societies to get actively engaged in proposing safe protocols and creating BMI solutions that respect human rights
and abide by internationally accepted ethical standards.
References
[1]
Lyric A Jorgenson, William T Newsome, David J Anderson, Cornelia I Bargmann, Emery N Brown, Karl
Deisseroth, John P Donoghue, Kathy L Hudson, Geoffrey SF Ling, Peter R MacLeish, et al. The brain initiative:
developing technology to catalyse neuroscience discovery. Philosophical Transactions of the Royal Society B:
Biological Sciences, 370(1668):20140164, 2015.
[2] Rafael Yuste and Cori Bargmann. Toward a global brain initiative. Cell, 168(6):956–959, 2017.
[3]
Christopher L Martin and Miyoung Chun. The brain initiative: building, strengthening, and sustaining. Neuron,
92(3):570–573, 2016.
[4]
David C Van Essen, Stephen M Smith, Deanna M Barch, Timothy EJ Behrens, Essa Yacoub, Kamil Ugurbil,
Wu-Minn HCP Consortium, et al. The wu-minn human connectome project: an overview. Neuroimage, 80:62–79,
2013.
[5]
Susan M Sunkin, Lydia Ng, Chris Lau, Tim Dolbeare, Terri L Gilbert, Carol L Thompson, Michael Hawrylycz,
and Chinh Dang. Allen brain atlas: an integrated spatio-temporal portal for exploring the central nervous system.
Nucleic acids research, 41(D1):D996–D1008, 2012.
[6]
John Peter Rickgauer, Karl Deisseroth, and David W Tank. Simultaneous cellular-resolution optical perturbation
and imaging of place cell firing fields. Nature neuroscience, 17(12):1816–1824, 2014.
[7]
Joshua H Jennings, Dennis R Sparta, Alice M Stamatakis, Randall L Ung, Kristen E Pleil, Thomas L Kash, and
Garret D Stuber. Distinct extended amygdala circuits for divergent motivational states. Nature, 496(7444):224–228,
2013.
[8] David Lammers. Moore’s law milestones. IEEE Spectrum, 2015.
[9] Travis S Humble and Erik P DeBenedictis. Quantum realism. Computer, 52(6):13–17, 2019.
[10]
Bálint Náfrádi, Mohammad Choucair, Klaus-Peter Dinse, and László Forró. Room temperature manipulation of
long lifetime spins in metallic-like carbon nanospheres. Nature communications, 7(1):1–8, 2016.
[11] Pandu Nayak. Understanding searches better than ever before. Google Blog, 2019.
7
APREPRINT - FE BRUARY 22, 2021
[12]
Lonnie Shekhtman. Nasa takes a cue from silicon valley to hatch artificial intelligence technologies. NASA, 2019.
[13]
Kai Zheng, Zhu-Hong You, Lei Wang, Yong Zhou, Li-Ping Li, and Zheng-Wei Li. Mlmda: a machine learning
approach to predict and validate microrna–disease associations by integrating of heterogenous information sources.
Journal of translational medicine, 17(1):260, 2019.
[14]
Martin Schrimpf, Jonas Kubilius, Ha Hong, Najib J Majaj, Rishi Rajalingham, Elias B Issa, Kohitij Kar, Pouya
Bashivan, Jonathan Prescott-Roy, Kailyn Schmidt, et al. Brain-score: Which artificial neural network for object
recognition is most brain-like? BioRxiv, page 407007, 2018.
[15]
Markus Marks, Jin Qiuhan, Oliver Sturman, Lukas von Ziegler, Sepp Kollmorgen, Wolfger von der Behrens,
Valerio Mante, Johannes Bohacek, and Mehmet Fatih Yanik. Sipec: the deep-learning swiss knife for behavioral
data analysis. bioRxiv, 2020.
[16]
Jacques J Vidal. Toward direct brain-computer communication. Annual review of Biophysics and Bioengineering,
2(1):157–180, 1973.
[17] J. J. Vidal. Real-time detection of brain events in eeg. Proceedings of the IEEE, 65(5):633–641, 1977.
[18]
Mijail D Serruya, Nicholas G Hatsopoulos, Liam Paninski, Matthew R Fellows, and John P Donoghue. Instant
neural control of a movement signal. Nature, 416(6877):141–142, 2002.
[19]
Jose M Carmena, Mikhail A Lebedev, Roy E Crist, Joseph E O’Doherty, David M Santucci, Dragan F Dimitrov,
Parag G Patil, Craig S Henriquez, and Miguel AL Nicolelis. Learning to control a brain–machine interface for
reaching and grasping by primates. PLoS biol, 1(2):e42, 2003.
[20]
Meel Velliste, Sagi Perel, M Chance Spalding, Andrew S Whitford, and Andrew B Schwartz. Cortical control of a
prosthetic arm for self-feeding. Nature, 453(7198):1098–1101, 2008.
[21]
Arjun Ramakrishnan, Peter J Ifft, Miguel Pais-Vieira, Yoon Woo Byun, Katie Z Zhuang, Mikhail A Lebedev, and
Miguel AL Nicolelis. Computing arm movements with a monkey brainet. Scientific reports, 5:10767, 2015.
[22]
Graeme M Clark, Brian C Pyman, and Quentin R Bailey. The surgery for multiple-electrode cochlear implantations.
Scientific publications, vol. 2, 1978-1983, no. 83, 1979.
[23]
Richard A Normann, Edwin M Maynard, Patrick J Rousche, and David J Warren. A neural interface for a cortical
vision prosthesis. Vision research, 39(15):2577–2587, 1999.
[24]
Leigh R Hochberg, Mijail D Serruya, Gerhard M Friehs, Jon A Mukand, Maryam Saleh, Abraham H Caplan,
Almut Branner, David Chen, Richard D Penn, and John P Donoghue. Neuronal ensemble control of prosthetic
devices by a human with tetraplegia. Nature, 442(7099):164–171, 2006.
[25]
Jennifer L Collinger, Brian Wodlinger, John E Downey, Wei Wang, Elizabeth C Tyler-Kabara, Douglas J
Weber, Angus JC McMorland, Meel Velliste, Michael L Boninger, and Andrew B Schwartz. High-performance
neuroprosthetic control by an individual with tetraplegia. The Lancet, 381(9866):557–564, 2013.
[26]
Rodney J Anderson, Mark A Frye, Osama A Abulseoud, Kendall H Lee, Jane A McGillivray, Michael Berk, and
Susannah J Tye. Deep brain stimulation for treatment-resistant depression: efficacy, safety and mechanisms of
action. Neuroscience & Biobehavioral Reviews, 36(8):1920–1933, 2012.
[27]
J vd Luigjes, W Van Den Brink, M vd Feenstra, P Van Den Munckhof, PR Schuurman, R Schippers, A Mazaheri,
TJ De Vries, and D Denys. Deep brain stimulation in addiction: a review of potential brain targets. Molecular
psychiatry, 17(6):572–583, 2012.
[28]
James J Jun, Nicholas A Steinmetz, Joshua H Siegle, Daniel J Denman, Marius Bauza, Brian Barbarits, Albert K
Lee, Costas A Anastassiou, Alexandru Andrei, Ça˘
gatay Aydın, et al. Fully integrated silicon probes for high-density
recording of neural activity. Nature, 551(7679):232–236, 2017.
[29]
Elon Musk et al. An integrated brain-machine interface platform with thousands of channels. Journal of medical
Internet research, 21(10):e16194, 2019.
[30]
Thomas J Oxley, Peter E Yoo, Gil S Rind, Stephen M Ronayne, C M Sarah Lee, Christin Bird, Victoria Hampshire,
Rahul P Sharma, Andrew Morokoff, Daryl L Williams, Christopher MacIsaac, Mark E Howard, Lou Irving,
Ivan Vrljic, Cameron Williams, Sam E John, Frank Weissenborn, Madeleine Dazenko, Anna H Balabanski,
David Friedenberg, Anthony N Burkitt, Yan T Wong, Katharine J Drummond, Patricia Desmond, Douglas Weber,
Timothy Denison, Leigh R Hochberg, Susan Mathers, Terence J O’Brien, Clive N May, J Mocco, David B
Grayden, Bruce C V Campbell, Peter Mitchell, and Nicholas L Opie. Motor neuroprosthesis implanted with
neurointerventional surgery improves capacity for activities of daily living tasks in severe paralysis: first in-human
experience. Journal of NeuroInterventional Surgery, 2020.
[31]
Jianjun Meng, Shuying Zhang, Angeliki Bekyo, Jaron Olsoe, Bryan Baxter, and Bin He. Noninvasive electroen-
cephalogram based control of a robotic arm for reach and grasp tasks. Scientific Reports, 6:38565, 2016.
8
APREPRINT - FE BRUARY 22, 2021
[32]
Christian Enzinger, Stefan Ropele, Franz Fazekas, Marisa Loitfelder, Faton Gorani, Thomas Seifert, Gudrun
Reiter, Christa Neuper, Gert Pfurtscheller, and Gernot Müller-Putz. Brain motor system function in a patient with
complete spinal cord injury following extensive brain–computer interface training. Experimental brain research,
190(2):215–223, 2008.
[33]
Tom Carlson and Jose del R Millan. Brain-controlled wheelchairs: a robotic architecture. IEEE Robotics &
Automation Magazine, 20(1):65–73, 2013.
[34]
Peter J Ifft, Solaiman Shokur, Zheng Li, Mikhail A Lebedev, and Miguel AL Nicolelis. A brain-machine interface
enables bimanual arm movements in monkeys. Science translational medicine, 5(210):210ra154–210ra154, 2013.
[35]
Bin Xia, Oladazimi Maysam, Sandra Veser, Lei Cao, Jie Li, Jie Jia, Hong Xie, and Niels Birbaumer. A combination
strategy based brain–computer interface for two-dimensional movement control. Journal of neural engineering,
12(4):046021, 2015.
[36]
Audrey S Royer, Alexander J Doud, Minn L Rose, and Bin He. Eeg control of a virtual helicopter in 3-dimensional
space using intelligent control strategies. IEEE Transactions on neural systems and rehabilitation engineering,
18(6):581–589, 2010.
[37]
Karl LaFleur, Kaitlin Cassady, Alexander Doud, Kaleb Shades, Eitan Rogin, and Bin He. Quadcopter control in
three-dimensional space using a noninvasive motor imagery-based brain–computer interface. Journal of neural
engineering, 10(4):046003, 2013.
[38]
Guangye Li and Dingguo Zhang. Brain-computer interface controlled cyborg: establishing a functional information
transfer pathway from human brain to cockroach brain. PloS one, 11(3):e0150667, 2016.
[39]
Shaomin Zhang, Sheng Yuan, Lipeng Huang, Xiaoxiang Zheng, Zhaohui Wu, Kedi Xu, and Gang Pan. Human
mind control of rat cyborg’s continuous locomotion with wireless brain-to-brain interface. Scientific reports,
9(1):1–12, 2019.
[40]
Brian N Pasley, Stephen V David, Nima Mesgarani, Adeen Flinker, Shihab A Shamma, Nathan E Crone, Robert T
Knight, and Edward F Chang. Reconstructing speech from human auditory cortex. PLoS biology, 10(1), 2012.
[41] Francisco Pereira, Greg Detre, and Matthew Botvinick. Generating text from functional brain images. Frontiers
in human neuroscience, 5:72, 2011.
[42]
Shinji Nishimoto, An T Vu, Thomas Naselaris, Yuval Benjamini, Bin Yu, and Jack L Gallant. Reconstructing
visual experiences from brain activity evoked by natural movies. Current Biology, 21(19):1641–1646, 2011.
[43]
Chai Tong Yuen, Woo San San, Tan Ching Seong, and Mohamed Rizon. Classification of human emotions from
eeg signals using statistical features and neural network. International Journal of Integrated Engineering, 1(3),
2009.
[44]
Paul Root Wolpe, Kenneth R Foster, and Daniel D Langleben. Emerging neurotechnologies for lie-detection:
promises and perils. The American Journal of Bioethics, 5(2):39–49, 2005.
[45]
Kazuhisa Shibata, Takeo Watanabe, Yuka Sasaki, and Mitsuo Kawato. Perceptual learning incepted by decoded
fmri neurofeedback without stimulus presentation. science, 334(6061):1413–1415, 2011.
[46]
Linxing Jiang, Andrea Stocco, Darby M Losey, Justin A Abernethy, Chantel S Prat, and Rajesh PN Rao. Brainnet:
a multi-person brain-to-brain interface for direct collaboration between brains. Scientific reports, 9(1):1–11, 2019.
[47]
Carles Grau, Romuald Ginhoux, Alejandro Riera, Thanh Lam Nguyen, Hubert Chauvat, Michel Berg, Julià L
Amengual, Alvaro Pascual-Leone, and Giulio Ruffini. Conscious brain-to-brain communication in humans using
non-invasive technologies. PloS one, 9(8):e105225, 2014.
[48] Elon Musk. Elon musk reveals new details about neuralink, his brain implant technology. JRE Clips, 2020.
[49] Tom Scott. 2030: Privacy’s dead. what happens next. Tom Scott, 2014.
[50]
Tamara Denning, Yoky Matsuoka, and Tadayoshi Kohno. Neurosecurity: security and privacy for neural devices.
Neurosurgical Focus, 27(1):E7, 2009.
[51]
Committee on Science and Law. Are your thoughts your own?"" neuroprivacy" and the legal implications of brain
imaging. RECORD-ASSOCIATION OF THE BAR OF THE CITY OF NEW YORK, 60(2):407, 2005.
[52]
Marcello Ienca, Pim Haselager, and Ezekiel J Emanuel. Brain leaks and consumer neurotechnology. Nature
biotechnology, 36(9):805–810, 2018.
[53]
Elisabeth Hildt. What will this do to me and my brain? ethical issues in brain-to-brain interfacing. Frontiers in
Systems Neuroscience, 9:17, 2015.
[54]
Allen Coin, Megan Mulder, and Veljko Dubljevi´
c. Ethical aspects of bci technology: What is the state of the art?
Philosophies, 5(4):31, 2020.
9
APREPRINT - FE BRUARY 22, 2021
[55]
Sergio López Bernal, Alberto Huertas Celdrán, Gregorio Martínez Pérez, Michael Taynnan Barros, and Sasitha-
ran Balasubramaniam. Cybersecurity in brain-computer interfaces: State-of-the-art, opportunities, and future
challenges. arXiv preprint arXiv:1908.03536, 2019.
[56]
Howard Jay Chizeck and Tamara Bonaci. Brain-computer interface anonymizer, August 14 2014. US Patent App.
14/174,818.
[57]
Moritz Lipp, Michael Schwarz, Daniel Gruss, Thomas Prescher, Werner Haas, Anders Fogh, Jann Horn, Stefan
Mangard, Paul Kocher, Daniel Genkin, et al. Meltdown: Reading kernel memory from user space. In 27th
{USENIX}Security Symposium ({USENIX}Security 18), pages 973–990, 2018.
[58]
Marcel Rosenbach, Hilmar Schmundt, and Christian Stocker. Experts unmask ‘reign’trojan as nsa tool. Spiegel
Online, 1:27, 2015.
[59] Daniel Soar. Incendiary devices.
[60] Zak Doffman. Apple warns looters with stolen iphones: You are being tracked. Forbes.
[61] the apple ecosystem: The walled-garden ecosystem.
[62] Napier Lopez. Android’s airdrop rival, nearby share, is finally here.
[63] John Archer. Apple responds to disappearing itunes movie purchases issue. Forebs, 2018.
[64] Brad Stone. Amazon erases orwell books from kindle. The New York Times, 2009.
[65] Emily Berg. Access & ownership in the subscription era of entertainment. HER CAMPUS, 2020.
[66] Nick Statt. Apple just kicked fortnite off the app store, Aug 2020.
[67]
Paul Szoldra. This is everything edward snowden revealed in one year of unprecedented top-secret leaks. Business
Insider, 2016.
[68] Tamara Bonaci. Security and Privacy of Biomedical Cyber-Physical Systems. PhD thesis, 2015.
[69]
R. Palaniappan and K. V. R. Ravi. A new method to identify individuals using signals from the brain. In Fourth
International Conference on Information, Communications and Signal Processing, 2003 and the Fourth Pacific
Rim Conference on Multimedia. Proceedings of the 2003 Joint, volume 3, pages 1442–1445 vol.3, 2003.
[70]
Alejandro Riera, Aureli Soria-Frisch, Marco Caparrini, Carles Grau, and Giulio Ruffini. Unobtrusive biomet-
ric system based on electroencephalogram analysis. EURASIP Journal on Advances in Signal Processing,
2008(1):143728, 2007.
[71]
Timothy Morey, Theodore Forbath, and Allison Schoop. Customer data: Designing for transparency and trust.
Harvard Business Review, 93(5):96–105, 2015.
[72]
Rishab Bailey, Smriti Parsheera, Faiza Rahman, and Renuka Sane. Disclosures in privacy policies: Does’ notice
and consent’work? 2018.
[73] Aleecia M McDonald and Lorrie Faith Cranor. The cost of reading privacy policies. Isjlp, 4:543, 2008.
[74]
Jonathan A Obar and Anne Oeldorf-Hirsch. The biggest lie on the internet: Ignoring the privacy policies and
terms of service policies of social networking services. Information, Communication & Society, 23(1):128–147,
2020.
[75] EMOTIV. Emotiv privacy policy. 2018.
[76]
Ivan Martinovic, Doug Davies, Mario Frank, Daniele Perito, Tomas Ros, and Dawn Song. On the feasibility
of side-channel attacks with brain-computer interfaces. In Presented as part of the 21st
{
USENIX
}
security
symposium ({USENIX}Security 12), pages 143–158, 2012.
[77]
[78] Reporters Without Borders. Era of the digital mercenaries. Reporters Without Borders, 2013.
[79]
Carole Cadwallad and Emma Graham-Harrison. Revealed: 50 million facebook profiles harvested for cambridge
analytica in major data breach. Guardian News, 2018.
[80]
Olivia Solon. Ex-facebook president sean parker: site made to exploit human ’vulnerability’. Guardian News,
2017.
[81]
George Andrews. MKULTRA: The CIA’s Top Secret Program in Human Experimentation and Behavior Modifica-
tion. Healthnet Press, 2001.
[82] Megan Scudellari. Darpa funds ambitious brain-machine interface program. IEEE Spectrum, 2019.
[83] Chris Young. Us army developing mind-reading tech for the battlefield. INTERESTING ENGINEERING, 2020.
10
APREPRINT - FE BRUARY 22, 2021
[84]
Bruce Luber, Carl Fisher, Paul S Appelbaum, Marcus Ploesser, and Sarah H Lisanby. Non-invasive brain
stimulation in the detection of deception: Scientific challenges and ethical consequences. Behavioral sciences &
the law, 27(2):191–208, 2009.
[85]
Eric S Raymond. The cathedral and the bazaar: Musings on linux and open source by an accidental revolutionary.
sebastopol, ca: Oreilly media, 2001.
[86] Christopher Domas. Breaking the x86 isa. Black Hat, 2017.
[87]
Paul Kocher, Jann Horn, Anders Fogh, Daniel Genkin, Daniel Gruss, Werner Haas, Mike Hamburg, Moritz
Lipp, Stefan Mangard, Thomas Prescher, et al. Spectre attacks: Exploiting speculative execution. In 2019 IEEE
Symposium on Security and Privacy (SP), pages 1–19. IEEE, 2019.
[88]
Shaoli Liu, Zidong Du, Jinhua Tao, Dong Han, Tao Luo, Yuan Xie, Yunji Chen, and Tianshi Chen. Cambricon:
An instruction set architecture for neural networks. In 2016 ACM/IEEE 43rd Annual International Symposium on
Computer Architecture (ISCA), pages 393–405. IEEE, 2016.
[89]
Zakir Durumeric, Frank Li, James Kasten, Johanna Amann, Jethro Beekman, Mathias Payer, Nicolas Weaver,
David Adrian, Vern Paxson, Michael Bailey, et al. The matter of heartbleed. In Proceedings of the 2014 conference
on internet measurement conference, pages 475–488, 2014.
[90] Anna Wexler. Separating neuroethics from neurohype. Nature Biotechnology, 37(9):988–990, 2019.
[91] John Von Neumann and Ray Kurzweil. The computer and the brain. Yale University Press, 2012.
[92] Nick Bostrom. Superintelligence: Paths, dangers, strategies. 2014.
11