Google
 

Friday, July 10, 2009

The Next Hacking Frontier


Hackers who commandeer your computer are bad enough. Now scientists worry that someday, they’ll try to take over your brain.

In the past year, researchers have developed technology that makes it possible to use thoughts to operate a computer, maneuver a wheelchair or even use Twitter — all without lifting a finger. But as neural devices become more complicated — and go wireless — some scientists say the risks of “brain hacking” should be taken seriously.

“Neural devices are innovating at an extremely rapid rate and hold tremendous promise for the future,” said computer security expert Tadayoshi Kohno of the University of Washington. “But if we don’t start paying attention to security, we’re worried that we might find ourselves in five or 10 years saying we’ve made a big mistake.”

Hackers tap into personal computers all the time — but what would happen if they focused their nefarious energy on neural devices, such as the deep-brain stimulators currently used to treat Parkinson’s and depression, or electrode systems for controlling prosthetic limbs? According to Kohno and his colleagues, who published their concerns July 1 in Neurosurgical Focus, most current devices carry few security risks. But as neural engineering becomes more complex and more widespread, the potential for security breaches will mushroom.

For example, the next generation of implantable devices to control prosthetic limbs will likely include wireless controls that allow physicians to remotely adjust settings on the machine. If neural engineers don’t build in security features such as encryption and access control, an attacker could hijack the device and take over the robotic limb.

“It’s very hard to design complex systems that don’t have bugs,” Kohno said. “As these medical devices start to become more and more complicated, it gets easier and easier for people to overlook a bug that could become a very serious risk. It might border on science fiction today, but so did going to the moon 50 years ago.”

Some might question why anyone would want to hack into someone else’s brain, but the researchers say there’s a precedent for using computers to cause neurological harm. In November 2007 and March 2008, malicious programmers vandalized epilepsy support websites by putting up flashing animations, which caused seizures in some photo-sensitive patients.

“It happened on two separate occasions,” said computer science graduate student Tamara Denning, a co-author on the paper. “It’s evidence that people will be malicious and try to compromise peoples’ health using computers, especially if neural devices become more widespread.”

In some cases, patients might even want to hack into their own neural device. Unlike devices to control prosthetic limbs, which still use wires, many deep brain stimulators already rely on wireless signals. Hacking into these devices could enable patients to “self-prescribe” elevated moods or pain relief by increasing the activity of the brain’s reward centers.

Despite the risks, Kohno said, most new devices aren’t created with security in mind. Neural engineers carefully consider the safety and reliability of new equipment, and neuroethicists focus on whether a new device fits ethical guidelines. But until now, few groups have considered how neural devices might be hijacked to perform unintended actions. This is the first time an academic paper has addressed the topic of “neurosecurity,” a term the group coined to describe their field.

“The security and privacy issues somehow seem to slip by,” Kohno said. “I would not be surprised if most people working in this space have never thought about security.”

Kevin Otto, a bioengineer who studies brain-machine interfaces at Purdue Universty, said he was initially skeptical of the research. “When I first picked up the paper, I don’t know if I agreed that it was an issue. But the paper gives a very compelling argument that this is important, and that this is the time to have neural engineers collaborate with security developers.”

It’s never too early to start thinking about security issues, said neural engineer Justin Williams of the University of Wisconsin, who was not involved in the research. But he stressed that the kinds of devices available today are not susceptible to attack, and that fear of future risks shouldn’t impede progress in the field. “These kinds of security issues have to proceed in lockstep with the technology,” Williams said.

History provides plenty of examples of why it’s important to think about security before it becomes a problem, Kohno said. Perhaps the best example is the internet, which was originally conceived as a research project and didn’t take security into account.

“Because the internet was not originally designed with security in mind,” the researchers wrote, “it is incredibly challenging — if not impossible — to retrofit the existing internet infrastructure to meet all of today’s security goals.” Kohno and his colleagues hope to avoid such problems in the neural device world, by getting the community to discuss potential security problems before they become a reality.

“The first thing is to ask ourselves is, ‘Could there be a security and privacy problem?’” Kohno said. “Asking ‘Is there a problem?’ gets you 90 percent there, and that’s the most important thing.”

Via Mind Hacks


Friday, July 3, 2009

Child Porn Is Apple’s Latest iPhone Headache

A photo ostensibly showing a 15-year-old nude girl has turned up in an iPhone app, highlighting Apple’s inability to safeguard its application store from prohibited content.

The image appears in the free app BeautyMeter, which enables people to upload photos that are then rated by others, who assign a star-rating to members’ body parts and clothing. It’s much like an iPhone version of Hot or Not and many similar sites.

On Thursday, Apple pulled the app from the iTunes store.

The photo to the right (censored by Wired.com) depicts a photo of a nude girl snapping a photo of her reflection in a mirror. In the screenshot, the girl, who is listed as a 15-year-old from the United States, is topless and partially nude at the bottom. Nearly 5,000 users of the app have rated the photo. iPhone app review site Krapps discovered the photo.

The appearance of nudity in BeautyMeter underscored Apple’s difficulties regulating content in its App Store, which has surpassed 50,000 pieces of software available for download. For example, last week, Wired.com reported on an app called Hottest Girls, which released an update for its app to include topless photos of women. Apple pulled the app hours later, saying porn is not allowed.

“Apple will not distribute applications that contain inappropriate content, such as pornography,” an Apple spokesman said regarding Hottest Girls on June 25. “The developer of this application added inappropriate content directly from their server after the application had been approved and distributed, and after the developer had subsequently been asked to remove some offensive content. This was a direct violation of the terms of the iPhone Developer Program. The application is no longer available on the App Store.”

Apple made no similar announcement regarding BeautyMeter. It simply disappeared from the App Store. But in theory people who already had the app can continue to use it, including the upload and rating functionality.

On its web site, BeautyMeter’s developer Funnymals says members of BeautyMeter are required to provide their iPhone device ID so illegal content can be traced back to the owner of that phone.

“We don’t review each uploaded photo exclusively but from time to time we will clean up,” Funnymals stated in BeautyMeter’s terms and conditions.

As of 1:30 p.m. PDT Wednesday the image of the purported 15-year-old was still in the app.

Funnymals and Apple did not immediately respond to requests for comment. Wired.com has not confirmed the photographed girl’s identity or her age.

Although U.S. federal and state laws prohibit child pornography, Funnymals and Apple will probably not be held liable for the content because they would be protected by the Communications Decency Act, according to Mark Rasch, a lawyer and founder of computer security consulting firm Secure IT Experts. That’s because when Apple approved the app, it did not contain the prohibited content. Instead, the app downloads images off the internet, thus placing the responsibility on the people who use the app.

However, Rasch said he expects Apple to remove the application, or the developer to remove the content, once made aware of it.

“They probably don’t have liability unless they have actual knowledge, in which case they have at least a legal or moral duty to act,” Rasch said.

WiredNews

Related Posts with Thumbnails

Wired Top Stories

world news

Top News

Africa News

Health News

Technology News

Business News

Movie News

Entertainment News

Sport News

Fashion and Style News

Sports Leisure News

Technology News

International News

Reuters News

TV News

Entertainment News

Entertainment News

TV: Business

Movie Reviews

Travelling News

Money Matters News

Middle East News

Asia Pacific News

Europe News

Labels

Pakistan Pregnancy US Iran Bhutto British China Dies NASA google Abstinence students no more likely to abstain from sex Anna Nicole Smith Benzir Bhutto Bush Fish For Healthy Iraq Mosques Motorola Russia deaths gay hate indian couple iphone men oil laws sunni women 5 ways to get your sex life going 70 Gigapixel Photo A suicide bomber AIDS Afghan Africa Ahmadinejad Airman spots jetliner fuel leak Amy Winehouse Anna Nicole Smith boyfriend and doctors charged Antioxidants Don’t Lower Heart RiskHealthy Arab-Israeli Assassinated Asteroid Belt Astronauts Back Batteries Beckham Beirut Bil Bipolar Disorder Diagnosis Up In Children Bird Flu Botox Breast-feeding Brings Britain Business CTIA Caffeine California Canada Cell phones Certain Veto Child Porn China Seeks to Calm Fears Amid Scandal China justifies sanctions veto Chinese Chlamydia Citigroup Clash in Combat Mission in Iraq Will End Aug 31 2010 Consumer Couple Sues Created Crossover Ball Dell Dems Disaster Disney backs star after nude scandal E.Coli in Beef Linked to 19 Illnesses in Ohio Early-stage Sperm Cells Earthquake Earthquake China Edmund Hillary Elections Electric Fish Everest Experts F1 FDA Families of Columbia Federal Reserve Florida Food Crisis Former From Human Bone G.M G8 Gates Gene Therapy Cures Color-Blind Monkeys Georgia Georgia governor leads prayer for rain Golfer Killing Hawk Grand Canyon Grand Entrance Guinea prime minister HIV Heart Attack In Youth IMF Indonesian Infants International Atomic Energy Agency (IAEA) Iowa River Falls Iran Cyber Battle Iran Leader Iranian Iraqis Israel Jamie Lynn Spears Jennifer Hudson Jennifer Lopez Karadzic Kashmir route Keeping In Touch In A Wired World LONDON Lebanese Lily Allen Lindsay Lohan Malaysian Grand Prix Man's Marriage Marrow Massive Mogadishu Mouseless Mr. Bush Mugabe Musharraf Myanmar N Korea NASA plants the seeds of space exploration NEW YORK NIU North Carolina Over PCs Pakistan Army Moves Against Pro-Taliban Militants Palestinian Paris Hilton Pentagon Police Portable Office Possible President Mugabe Pressures mount on new Thai PM Protesters RIYADH Racy MySpace Pics Rally Removing a Champagne Cork Robots Sex Life Rodney Romney Russia defies ceasefire Russian President Security Council Sepang Sex Diseases Shanghai faces direct hit from Typhoon Wipha Skittish Skype Solomon Islands Sparks Spacecraft Sri Lanka TB Taiwan Strait Taliban Technology Teen Teenager unlocks iPhone's secret Terminator Salvation Thai-Cambodia The Next Hacking Frontier Torture Troop-Withdrawal Tropical Storm Gustav Intensifies Tropical Storm Hanna/Hannah is Born Tsunami Alert U.S. UK captives UM Universal Studios in LA Very low risk Veto Virus Vonage War-scarred Web Attacks West Nile Wired Bird of Paradise Wireless 2007 Wolfowitz World leaders XP Yahoo Yeltsin Zimbabwe abyss air crash anti-anxiety anti-depressant attack ban bed beef recall bookshop brain cancer britney spears burma bus blast calls climate change countries cut damage diabetes divorce eBay epidemic fall fire fire burning food fresign gadget lab hulk hogan human organ humans in Massachusetts investigated japanese jobs k-fed leaders lebanon linda hogan melamine middle east miscarriage missile mp3 mumbai muslim american myspace mystery napster nigeria obesity oil price on online auction opec patient's pet food pressure psychological quake relief reactor recession reconciliation relative religious saudi arabia seven shia shooting slavery sleep society soldier spiderman stricke study says tanks enter Georgian city teenager arrested to shut to speed up toothpaste trafficking unesco vehicles viacom virus kill honeybees in usa war warming warn web ad spending will wired video wonder world bank wresler youtube