IEEE Technology and Society Magazine - June 2015 - 36

As depicted in Fig. 1, a typical BCI system consists
of three main components: an acquisition system, an
application, and a signal processing system, where
the signal processing system consists of feature extraction and decoding (translation) algorithm components.
The existing BCI open-development platforms typically
grant every application developer full control over all of
these components. For the purposes of discussion here,
we will assume an attacker has an access to all of these
resources. We next consider how an attacker uses these
resources to develop malicious applications.

Types of Attackers
In Fig. 2, two types of attackers are shown (as described
in the caption). We distinguish between these types based
on the way an attacker analyzes recorded neural signals.
The first type of attacker extracts users' private information by hijacking the legitimate components of a BCI
system. Such an attacker exploits for malicious purposes
those feature extraction and decoding algorithms that are
intended for the legitimate BCI applications.
The second type of attacker extracts users' private
information by adding or replacing the legitimate BCI
components. Such an attacker implements additional
feature extraction and decoding algorithms, and either
replaces or supplements the existing BCI components
with additional malicious code. As can be observed from
Fig. 2, the difference between the two attacker types is
only in the structure of the "brain malware" component.

Methods of Extracting Private Information
We consider scenarios where an attacker interacts with
users by presenting them with specific sets of stimuli,
and recording their responses to the presented stimuli.
In the current literature, there are several well-established methods of presenting stimuli to users:
■ Oddball paradigm - a technique where users are
asked to react to specific stimuli, referred to as
target stimuli, hidden as rare occurrences in a
sequence of more common, non-target stimuli [37].
■ Guilty knowledge test - a technique based on the
hypothesis that a familiar stimulus evokes a different
response when viewed in the context of similar, but
unfamiliar items [38].
■ Priming - a technique that uses an implicit memory
effect where one stimulus may have an influence on
a person's response to a later stimulus [39].
We assume an attacker can use any of these methods to facilitate extraction of private information. In
addition, an attacker can present malicious stimuli in
an overt (conscious) fashion, as well as in a subliminal
(unconscious) way, with subliminal stimulation defined
as the process of affecting people by visual or audio
stimuli of which they are completely unaware [40]. Ways

36

of achieve unawareness typically include reducing a
stimulus intensity or duration below the required level
of conscious awareness.

Examples of "Brain Malware" Information Misuse
Private information about BCIs users, extracted using
"brain malware," may be of interest to multiple parties,
those using it for greater good and potential improvement of the quality of human lives, but also to those
using it to increase their own (financial) gains, as well
as those using it simply to harm others. One can easily
imagine the following examples of concerning BCIs use:
Example 1: As exemplified in Farahaney's work [21],
an access to an individual's memories and emotional
responses might be used by police enforcement and
government agencies during criminal investigation, as
well as for crime and terrorism prevention.
Example 2: BCI-recorded neural signals may be used
in a variety of entertainment and relaxation applications. A person's emotional response and satisfaction/
annoyment level may, for example, be used to provide
better (more accurate) music and/or movie recommendations. Similarly, information about a person's activity
and anxiety levels may be used to tailor a more personalized training routine or a relaxation session.
Example 3: Personal information, extracted from neural
signals, could also be used for targeted advertisement,
where in addition to (or instead of) information about a
person's activities on the Internet, an advertiser/retailer
would have a real-time access to a person's level of interest, satisfaction, or frustration with the presented material.
Example 4: On the other end of the spectrum, however,
extracted information about a person's memories, prejudices, beliefs, or possible disorders could be used to manipulate a person or coerce her/him into doing something.
Example 5: Finally, extracted neural information
could also be used to cause physical or emotional harm
to a person. Examples of such actions have already
been observed in the literature. Denning et al. [35],
presented the case of individuals who placed flashing
animations on epilepsy support webpages, eliciting seizures in some patients with photosensitive epilepsy.

Need for a Coordinated Prevention Approach
Issues arising from inappropriate use of BCI technology
most likely do not pose a critical concern yet, considering their limited use outside of research communities.
However, existing and emerging privacy and security
threats may be viewed as an attack on human rights to
privacy and dignity [41]. Thus, they deserve immediate
attention and careful consideration.
We suggest that methods to prevent and mitigate BCIenabled privacy and security threats must be developed
now, in the early design phase. Doing so will allow us

IEEE Technology and Society Magazine

∕

june 2015



Table of Contents for the Digital Edition of IEEE Technology and Society Magazine - June 2015

IEEE Technology and Society Magazine - June 2015 - Cover1
IEEE Technology and Society Magazine - June 2015 - Cover2
IEEE Technology and Society Magazine - June 2015 - 1
IEEE Technology and Society Magazine - June 2015 - 2
IEEE Technology and Society Magazine - June 2015 - 3
IEEE Technology and Society Magazine - June 2015 - 4
IEEE Technology and Society Magazine - June 2015 - 5
IEEE Technology and Society Magazine - June 2015 - 6
IEEE Technology and Society Magazine - June 2015 - 7
IEEE Technology and Society Magazine - June 2015 - 8
IEEE Technology and Society Magazine - June 2015 - 9
IEEE Technology and Society Magazine - June 2015 - 10
IEEE Technology and Society Magazine - June 2015 - 11
IEEE Technology and Society Magazine - June 2015 - 12
IEEE Technology and Society Magazine - June 2015 - 13
IEEE Technology and Society Magazine - June 2015 - 14
IEEE Technology and Society Magazine - June 2015 - 15
IEEE Technology and Society Magazine - June 2015 - 16
IEEE Technology and Society Magazine - June 2015 - 17
IEEE Technology and Society Magazine - June 2015 - 18
IEEE Technology and Society Magazine - June 2015 - 19
IEEE Technology and Society Magazine - June 2015 - 20
IEEE Technology and Society Magazine - June 2015 - 21
IEEE Technology and Society Magazine - June 2015 - 22
IEEE Technology and Society Magazine - June 2015 - 23
IEEE Technology and Society Magazine - June 2015 - 24
IEEE Technology and Society Magazine - June 2015 - 25
IEEE Technology and Society Magazine - June 2015 - 26
IEEE Technology and Society Magazine - June 2015 - 27
IEEE Technology and Society Magazine - June 2015 - 28
IEEE Technology and Society Magazine - June 2015 - 29
IEEE Technology and Society Magazine - June 2015 - 30
IEEE Technology and Society Magazine - June 2015 - 31
IEEE Technology and Society Magazine - June 2015 - 32
IEEE Technology and Society Magazine - June 2015 - 33
IEEE Technology and Society Magazine - June 2015 - 34
IEEE Technology and Society Magazine - June 2015 - 35
IEEE Technology and Society Magazine - June 2015 - 36
IEEE Technology and Society Magazine - June 2015 - 37
IEEE Technology and Society Magazine - June 2015 - 38
IEEE Technology and Society Magazine - June 2015 - 39
IEEE Technology and Society Magazine - June 2015 - 40
IEEE Technology and Society Magazine - June 2015 - 41
IEEE Technology and Society Magazine - June 2015 - 42
IEEE Technology and Society Magazine - June 2015 - 43
IEEE Technology and Society Magazine - June 2015 - 44
IEEE Technology and Society Magazine - June 2015 - 45
IEEE Technology and Society Magazine - June 2015 - 46
IEEE Technology and Society Magazine - June 2015 - 47
IEEE Technology and Society Magazine - June 2015 - 48
IEEE Technology and Society Magazine - June 2015 - 49
IEEE Technology and Society Magazine - June 2015 - 50
IEEE Technology and Society Magazine - June 2015 - 51
IEEE Technology and Society Magazine - June 2015 - 52
IEEE Technology and Society Magazine - June 2015 - 53
IEEE Technology and Society Magazine - June 2015 - 54
IEEE Technology and Society Magazine - June 2015 - 55
IEEE Technology and Society Magazine - June 2015 - 56
IEEE Technology and Society Magazine - June 2015 - 57
IEEE Technology and Society Magazine - June 2015 - 58
IEEE Technology and Society Magazine - June 2015 - 59
IEEE Technology and Society Magazine - June 2015 - 60
IEEE Technology and Society Magazine - June 2015 - 61
IEEE Technology and Society Magazine - June 2015 - 62
IEEE Technology and Society Magazine - June 2015 - 63
IEEE Technology and Society Magazine - June 2015 - 64
IEEE Technology and Society Magazine - June 2015 - 65
IEEE Technology and Society Magazine - June 2015 - 66
IEEE Technology and Society Magazine - June 2015 - 67
IEEE Technology and Society Magazine - June 2015 - 68
IEEE Technology and Society Magazine - June 2015 - 69
IEEE Technology and Society Magazine - June 2015 - 70
IEEE Technology and Society Magazine - June 2015 - 71
IEEE Technology and Society Magazine - June 2015 - 72
IEEE Technology and Society Magazine - June 2015 - 73
IEEE Technology and Society Magazine - June 2015 - 74
IEEE Technology and Society Magazine - June 2015 - 75
IEEE Technology and Society Magazine - June 2015 - 76
IEEE Technology and Society Magazine - June 2015 - 77
IEEE Technology and Society Magazine - June 2015 - 78
IEEE Technology and Society Magazine - June 2015 - 79
IEEE Technology and Society Magazine - June 2015 - 80
IEEE Technology and Society Magazine - June 2015 - Cover3
IEEE Technology and Society Magazine - June 2015 - Cover4
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2023
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2022
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2021
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2020
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2019
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_december2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_september2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_june2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_march2018
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2017
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2016
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2015
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2014
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_winter2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_fall2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_summer2013
https://www.nxtbook.com/nxtbooks/ieee/technologysociety_spring2013
https://www.nxtbookmedia.com