1. Amped 2 Daniel H. Wilson, Amped (2012) & Benedict Carey, Probing Brain’s Depth, Trying to Aid Memory. New York Times, July 9, 2014Trying to Aid Memory.

Slides:



Advertisements
Similar presentations
Research Methods in Crime and Justice Chapter 3 The Ethical Principles that Guide Researchers.
Advertisements

McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved CHAPTER 4 ETHICS AND INFORMATION SECURITY Business Driven Information Systems 2e.
1. 2 Sooner than you think, a new client will arrive at your office. She'll be wearing Google Glass and will tell you she's had a chip implanted in her.
THE ETHICS OF HUMAN PARTICIPANT RESEARCH Office for Research Protections The Pennsylvania State University.
Security Controls – What Works
OPM Cybersecurity Competencies by Occupation (Technical Competencies) Information Technology Management Series Electronics Engineering.
Security of Computerized Medical Information: Threats from Authorized Users James G. Anderson, Ph.D. Purdue University.
Are Large Scale Data Breaches Inevitable? Douglas E. Salane Center for Cybercrime Studies John Jay College of Criminal Justice Cyber Infrastructure Protection.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
© Fraunhofer ISI Dara Hallinan & Philip Schütz Fraunhofer Institute for Systems and Innovation Research NEURODATA AND SURVEILLANCE Source:
Microsoft Internet Safety Enforcement: A worldwide team of lawyers, investigators, technical analysts and other specialists whose mission it is to make.
2002 Symantec Corporation, All Rights Reserved The dilemma European Security Policy and Privacy Ilias Chantzos Government Relations EMEA Terena Conference,
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Anonymity, Security, Privacy and Civil Liberties
“ Technology Working For People” Intro to HIPAA and Small Practice Implementation.
McGraw-Hill/Irwin ©2009 The McGraw-Hill Companies, All Rights Reserved Marketing Research, Primary Data, Secondary Data, Qualitative Research, Quantitative.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
Frankfurt (Germany), 6-9 June 2011 IT COMPLIANCE IN SMART GRIDS Martin Schaefer – Sweden – Session 6 – 0210.
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.
Privacy, Confidentiality, Security, and Integrity of Electronic Data
Smart Machines, Smart Privacy: Rules of the Road and Challenges Ahead The views expressed are those of the speaker and not necessarily those of the FTC.
International Cyber Warfare and Security Conference Cyber Defence Germany's Analysis of Global Threats 19th November 2013, Ankara.
Institute for Ethics and Emerging Technologies We Can Be Smarter and Happier: The Future of Neurotechnology James J. Hughes Ph.D. Executive Director, Institute.
By: Brenna Langham. Netiquette: Some Basic Rules Be careful of the words chosen when writing a statement for others to read! The other person might misinterpret.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
LeToia Crozier, Esq., CHC Vice President, Compliance & Regulatory Affairs Corey Wilson Director of Technical Services & Security Officer Interactive Think.
© Siemens AG, 2002 s CP RS Agenda The Role of IT for Accident-free Driving Interaction with driver’s physical condition Interaction with the roadside environment.
Information Systems Ethics (Cyberethics) Dr. Robert Chi Department of Information Systems California State University, Long Beach.
LESSON 2: Internet, Computer Ethics and Security
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
CYBERWARFARE LAW AND POLICY PROPOSALS FOR U.S. AND GLOBAL GOVERNANCE By Stuart S. Malawer, J.D., Ph.D. Distinguished Service Professor of Law & International.
Ali Alhamdan, PhD National Information Center Ministry of Interior
1 NYSBA Leadership in Human Enhancement and Artificial Intelligence Committee on Medical Research and Biotechnology Health Law Section New York State Bar.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
1. 2 Is damage to an advanced prosthesis property damage or a personal injury?
Scott Charney Cybercrime and Risk Management PwC.
The Internet of Things and Consumer Protection
111 © 2005 EMC Corporation. All rights reserved. Achieving Business Resilience 2005 Business Continuity and Corporate Security Show & Conference Stephen.
DRAFT 1 Belfast th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology.
Csci5233 computer security & integrity 1 An Overview of Computer Security.
Lee young man. 1) What is the definition of the Financial law ? 2) The definition of insurance fraud 3) Type of insurance fraud 4) Detecting.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts.
A) Reliability, validity, from group data to the individual Do we know enough about individuals and their actual behavioural traits to interpret brain.
Copyright © Allyn and Bacon 2007 Chapter 6 Social Control In Conflict and Order: Understanding Society, 11 th edition This multimedia product and its contents.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
© Plan Plan’s Security Framework – A Refresher. © Plan Understanding Ourselves Values - Child Rights, Impartial, Neutral, Sensitive Mandate - Child Centred,
International Business in an Age of Globalization
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Uses of brain imaging data: privacy and governance implications Dr. Hester Ward Medical Director, Information Services Division, (ISD) Consultant in Public.
Chap5: Designing Trusted Operating Systems.  What makes an operating system “secure”? Or “trustworthy”?  How are trusted systems designed, and which.
Cyber Insurance Risk Transfer Alternatives Heather Soronen - Operations Director Rocky Mountain Insurance Information Association.
Principles Identified - UK DfT -
Cyber Insurance Risk Transfer Alternatives
Cyber Security – An Existential Threat? (IIC, Singapore)
“Introduction to Azure Security Center”
Security of In-Vehicle Software
Information Technology Sector
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
Competition, Regulation, The Digital Marketplace Session: Disruptive Technologies and Economic Regulations Dr. Derek Ireland : Policy Consultant and Lecturer.
CIS 333Competitive Success/tutorialrank.com
Ethical Issues in Speech Language Pathology
An Urgent National Imperative
Cybercrime in the election process:
Cybersecurity compliance for attorneys
Ethical Issues in Speech Language Pathology
5/6/2019 Information Warfare Trends, Dangers, and the Impact for European Research Policy Dipl. Pol. Ralf Bendrath, Berlin FoG:IS ReG:IS Forschungsgruppe.
Law Education.
Anatomy of a Common Cyber Attack
Presentation transcript:

1

Amped 2 Daniel H. Wilson, Amped (2012) & Benedict Carey, Probing Brain’s Depth, Trying to Aid Memory. New York Times, July 9, 2014Trying to Aid Memory

3 Neuroprostheses | Neuroenhancement

4 Neuroimaging | Neurodiagnostics

5 What Neurodata Makes Possible

6 Neuromarketing

7 Neuropolitics

8 Neurosurveillance | Intention Algorithms

9 Neurowarfare

Beyond cyberwarfare, looms mind warfare, targeting brain, cognition, emotion, behavior 10 Neurotechnology | National Security

11 ‘Neuroflage’

Physical Enhancement Cognitive Enhancement Radical Life Extension 12 Neurotechnology | Transhumanism?

13 Transjewelry

14 Four Pillars of Transhuman Law

15 Cognitive Liberty

Meninges as Last Privacy Barrier Neuroimaging used to study aspects of personality & intelligence. Use of neuroimaging to elicit psychological information is already possible, but to limited extent Neuroprivacy is privacy of mental and cerebral functioning elicited by brain imaging & other neurodiagnostic techniques Some researchers claim to discern certain unconscious preferences or to detect deception based on neuroimaging 16 Neuroprivacy

17 Neurohacking | Medical Neurosecurity

18  Medical hardware vulnerable to life-threatening security breaches  Vulnerability increases as hardware connected to Internet of Things Neurosecurity |Medical Cybersecurity | Internet of Things

Companies assess dangers of device misuse in design stage medical devices & systems detect, log & react to malware attacks Companies justify security choices in premarket submissions Companies report cybersecurity issues & incidents FDA guidance nonbinding FDA on Medical Cybersecurity

Neurotechnology: to access, manipulate & control neuropsychiatric structures & functions for national defense or military objective to identify political & military threats to neuropsychiatric information & function to preserve integrity of neuropsychiatric information & function 20 Expanded Neurosecurity

Military Neuroenhancement Uniform Code of Military Justice: no autonomy to decline enhancement NeuroRx to reduce fatigue and enhance alertness Brain-computer interfaces for controlling vehicles; detecting battlefield dangers; operating exoskeletons 21 National Security I

Military Neuromodulation Portable neurotech to detect neuro processes & feed information to in-helmet transcranial magnetic stimulation to suppress or enhance brain function 22 National Security II

Neurointerrogation Are there cognitive liberty limits to use of neurotech in these situations? Neurotech also being marketed for advertising, insurance fraud, and criminal justice, e.g., fMRI-based lie detection services Neurotech and neuroRx being investigated for lie detection; e.g., EEG ‘brain fingerprinting’ to confirm deception 23 National Security III

Neuroprivacy No law for cognitive liberty, neuroprivacy, neurosecurity in medicine, national security, employment, insurance, etc. Inadequate legal framework to protect privacy of brain imaging data & interpretation No case law holdings on neuroprivacy 24 State of the Law

25 Default Future: Laissez Faire | Created Future: Rule of Law

26

What kind of legal infrastructure is needed to receive, nurture, and regulate positively disruptive technologies? 27 Law that Anticipates Law that Thinks Ahead

MEDICAL NEUROSECURITY: Require cyberprotection and Preemptive designMEDICAL NEUROSECURITY: Require hardware to software life cycle matchingMEDICAL NEUROSECURITY: Create international cybersecurity standardsNEUROENHANCEMENT: Regulation |Children | Enforceability | CriminalizationDEFENSE NEUROSECURITY: Neurotech R&D | Neurotech global surveillanceDEFENSE NEUROSECURITY: Transparent preparation, resilience, preemptionDEFENSE NEUROSECURITY: Policies and laws sensitive ethical issuesDEFENSE NEUROSECURITY: Create criteria for neurotech interrogations Positive Legal Infrastructure Principles

Sander Rabin MD JD The Center for Transhuman Jurisprudence An NPO for Law and Human Enhancement Enabling Technology legal #heet The Future of our Minds, Bodies, and Genomes