IEEE Technology and Society Magazine - September 2015 - 45

Brain-computer interfaces are a fast-growing class of
non-fictional exocortices. A large variety of BCIs are currently being proposed and developed for various applications ranging from medical to commercial, including
advertising, marketing, and gaming. For example, the
Nielsen Company acquired NeuroFocus in 2008, "for the
development of neural engineering technologies aimed at
better understanding customer needs and preferences"
[6]. In May 2013, Samsung, in collaboration with the University of Texas, demonstrated how BCIs could be used to
control mobile devices [10]. In the same month, the first
neurogaming conference was held [7].
Several consumer-grade BCIs and software development
kits, developed by, for example, Emotiv Systems [5] and
NeuroSky [8] currently exist on the market. In addition, the
same companies have recently introduced the concept of
app stores for BCIs, in order to facilitate expansion of BCI
applications (as described in [15]). Future BCIs will likely be
simpler to use and will require less training time and user
effort, while enabling faster and more accurate decoding of
users' intentions. It is easy to see that Wiener was correct
when he predicted that information technology will give rise
to prostheses for able-bodied people which will "give them
powers that humans never had before" [16], [43].
To paraphrase Wiener's concerns, this progress poses
not only new possibilities for the future, but raises questions about users' privacy. In the recent security literature, researchers introduced several BCI-enabled
malicious applications, referring to them as brain spyware [23], [34]. These applications can be used to
extract users' private information, such as credit card
PINs, from recorded neural signals.
As BCIs become widespread, more sophisticated
spying applications become easy to imagine. Leveraging
recent results in neuroscience, it is possible to extract
private information about users' memories, prejudices,
religious and political beliefs, as well as about their possible neurophysiological disorders [15]. The extracted
information could be used for marketing purposes, or
to manipulate or coerce users, or otherwise harm them.
The impact of BCI malware could be severe in terms of
privacy and other important values.
This work is inspired by Wiener's Information Ethics
methodology, which can be summarized by the following steps [16]:
1) Identify an ethical problem or positive opportunity
regarding the integration of technology into society.
2) If possible, apply existing policies, using precedent
and traditional interpretations to resolve the problem
or to benefit from the opportunity.
3) If existing policies appear to be ambiguous or vague
when applied to the new problem or opportunity,
clarify ambiguities and vagueness.

september 2015

∕

4) If precedent and existing interpretations, including
the new clarifications, are insufficient to resolve the
problem or to benefit from the opportunity, revise the
old policies or create new ones.
5) Apply the new or revised policies to resolve the problem or to benefit from the opportunity.
We take a Value Sensitive Design approach to understanding and designing privacy-preserving brain-computer technology. We start from the hypothesis that the
time to identify and address privacy and security challenges arising from uses of exocortices is now.

Preliminaries
The initial development of BCIs was motivated by the
needs of individuals having certain physical disabilities,
and the recognition of the potential benefits these systems might offer. A variety of BCI platforms exist (and
are being developed) for assistance, augmentation, and
repair of cognitive and sensorimotor capabilities in conditions such as spinal cord injuries and amyotrophic lateral
sclerosis. In addition, BCIs are increasingly being used
in non-medical applications, such as gaming, entertainment, and marketing. For example, researchers have proposed a method of predicting success of online games by
analyzing a user's electromyographic (EMG) signals (electrical signals produced by a user's skeletal muscles) over
the first 45 minutes of the game [17].

Components of a BCI
From an engineering perspective, a BCI is a communication system between the brain and the external environment, consisting of inputs (user's neural activity), outputs
(external world commands), and components - translating inputs to outputs, referred to as signal acquisition
and signal processing. For an image of a high-level block
diagram of a typical BCI, please refer to [15, fig. 1] in the
June issue of this magazine.
In this system, communication messages between the
brain and the environment are typically encoded as electrophysiological signals [45], [46]. Based on the type of communication signal (and recording location), BCIs can range
from completely implanted devices, where electrode arrays
are surgically implanted into the brain; to partially invasive,
such as electrocorticography (ECoG), where electrodes are
typically implanted inside the skull and on top of the dura;
to non-invasive devices. Most non-invasive BCIs are based
on electroencephalography (EEG), but other biosignals,
such as EMG or electrooculograms (EOG) can also be used
to control devices. While known to be susceptible to noise
and signal distortion, EEG signals are easy to measure. In
addition, EEG-based BCIs have relatively low cost and risk,
which makes them the most widely used BCI devices [44].
In this article, we focus on non-invasive BCIs.

IEEE TEchnology and SocIETy MagazInE

45



Table of Contents for the Digital Edition of IEEE Technology and Society Magazine - September 2015

IEEE Technology and Society Magazine - September 2015 - Cover1
IEEE Technology and Society Magazine - September 2015 - Cover2
IEEE Technology and Society Magazine - September 2015 - 1
IEEE Technology and Society Magazine - September 2015 - 2
IEEE Technology and Society Magazine - September 2015 - 3
IEEE Technology and Society Magazine - September 2015 - 4
IEEE Technology and Society Magazine - September 2015 - 5
IEEE Technology and Society Magazine - September 2015 - 6
IEEE Technology and Society Magazine - September 2015 - 7
IEEE Technology and Society Magazine - September 2015 - 8
IEEE Technology and Society Magazine - September 2015 - 9
IEEE Technology and Society Magazine - September 2015 - 10
IEEE Technology and Society Magazine - September 2015 - 11
IEEE Technology and Society Magazine - September 2015 - 12
IEEE Technology and Society Magazine - September 2015 - 13
IEEE Technology and Society Magazine - September 2015 - 14
IEEE Technology and Society Magazine - September 2015 - 15
IEEE Technology and Society Magazine - September 2015 - 16
IEEE Technology and Society Magazine - September 2015 - 17
IEEE Technology and Society Magazine - September 2015 - 18
IEEE Technology and Society Magazine - September 2015 - 19
IEEE Technology and Society Magazine - September 2015 - 20
IEEE Technology and Society Magazine - September 2015 - 21
IEEE Technology and Society Magazine - September 2015 - 22
IEEE Technology and Society Magazine - September 2015 - 23
IEEE Technology and Society Magazine - September 2015 - 24
IEEE Technology and Society Magazine - September 2015 - 25
IEEE Technology and Society Magazine - September 2015 - 26
IEEE Technology and Society Magazine - September 2015 - 27
IEEE Technology and Society Magazine - September 2015 - 28
IEEE Technology and Society Magazine - September 2015 - 29
IEEE Technology and Society Magazine - September 2015 - 30
IEEE Technology and Society Magazine - September 2015 - 31
IEEE Technology and Society Magazine - September 2015 - 32
IEEE Technology and Society Magazine - September 2015 - 33
IEEE Technology and Society Magazine - September 2015 - 34
IEEE Technology and Society Magazine - September 2015 - 35
IEEE Technology and Society Magazine - September 2015 - 36
IEEE Technology and Society Magazine - September 2015 - 37
IEEE Technology and Society Magazine - September 2015 - 38
IEEE Technology and Society Magazine - September 2015 - 39
IEEE Technology and Society Magazine - September 2015 - 40
IEEE Technology and Society Magazine - September 2015 - 41
IEEE Technology and Society Magazine - September 2015 - 42
IEEE Technology and Society Magazine - September 2015 - 43
IEEE Technology and Society Magazine - September 2015 - 44
IEEE Technology and Society Magazine - September 2015 - 45
IEEE Technology and Society Magazine - September 2015 - 46
IEEE Technology and Society Magazine - September 2015 - 47
IEEE Technology and Society Magazine - September 2015 - 48
IEEE Technology and Society Magazine - September 2015 - 49
IEEE Technology and Society Magazine - September 2015 - 50
IEEE Technology and Society Magazine - September 2015 - 51
IEEE Technology and Society Magazine - September 2015 - 52
IEEE Technology and Society Magazine - September 2015 - 53
IEEE Technology and Society Magazine - September 2015 - 54
IEEE Technology and Society Magazine - September 2015 - 55
IEEE Technology and Society Magazine - September 2015 - 56
IEEE Technology and Society Magazine - September 2015 - 57
IEEE Technology and Society Magazine - September 2015 - 58
IEEE Technology and Society Magazine - September 2015 - 59
IEEE Technology and Society Magazine - September 2015 - 60
IEEE Technology and Society Magazine - September 2015 - 61
IEEE Technology and Society Magazine - September 2015 - 62
IEEE Technology and Society Magazine - September 2015 - 63
IEEE Technology and Society Magazine - September 2015 - 64
IEEE Technology and Society Magazine - September 2015 - 65
IEEE Technology and Society Magazine - September 2015 - 66
IEEE Technology and Society Magazine - September 2015 - 67
IEEE Technology and Society Magazine - September 2015 - 68
IEEE Technology and Society Magazine - September 2015 - 69
IEEE Technology and Society Magazine - September 2015 - 70
IEEE Technology and Society Magazine - September 2015 - 71
IEEE Technology and Society Magazine - September 2015 - 72
IEEE Technology and Society Magazine - September 2015 - 73
IEEE Technology and Society Magazine - September 2015 - 74
IEEE Technology and Society Magazine - September 2015 - 75
IEEE Technology and Society Magazine - September 2015 - 76
IEEE Technology and Society Magazine - September 2015 - 77
IEEE Technology and Society Magazine - September 2015 - 78
IEEE Technology and Society Magazine - September 2015 - 79
IEEE Technology and Society Magazine - September 2015 - 80
IEEE Technology and Society Magazine - September 2015 - 81
IEEE Technology and Society Magazine - September 2015 - 82
IEEE Technology and Society Magazine - September 2015 - 83
IEEE Technology and Society Magazine - September 2015 - 84
IEEE Technology and Society Magazine - September 2015 - 85
IEEE Technology and Society Magazine - September 2015 - 86
IEEE Technology and Society Magazine - September 2015 - 87
IEEE Technology and Society Magazine - September 2015 - 88
IEEE Technology and Society Magazine - September 2015 - Cover3
IEEE Technology and Society Magazine - September 2015 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2013
https://www.nxtbookmedia.com