Dr. Michael Spencer, Dean, School of Engineering, Morgan State University
igital technology is rapidly changing the world as we know it. Data and data consumption are doubling every few years. We are now at a point of technological advancement when it is possible to have direct brain-to- computer communication with simple gestures and literal blinks of an eye. Innovation in skull cap-based sensors, in conjunction with sophisticated signal processing, allows us to pinpoint the origin of signals in the brain and determine the content. It is not so much of a stretch to envision a day when you will be able to “think” a command—a command decoded by a chip implanted underneath the skull. Information decoded by that chip will be sent to another semiconductor chip, a microelectronic transmitter/receiver implanted under your skin, that will transmit data wirelessly. A receiver implanted in another individual would receive the signal encoded into “brain language.” This essentially creates a new technology: mental telepathy. Mental telepathy, or reading someone’s thoughts from a distance, has always been fascinating to scientists and engineers. It is often considered to be the stuff of Harry Potter and various futuristic movies. But as the famous science fi ction writer Arthur C. Clark once stated, “Any suffi ciently advanced technology is indistinguishable from magic.” Think for a moment about the signifi cance and magnitude of this new technology: We would be able to know and communicate our thoughts via microelectronics. Using the Internet, these thoughts could be transmitted all over the world. Literally anyone with compatible technology could access our thoughts! Of course, since we would only
want to communicate with specifi c people, we would put cybersecurity systems and boundaries in place. However, the digital world in which we exist would make mental telepathy technology susceptible to hacking, much like any other technology. This presents an ethical dilemma regarding your last secured boundary: your
80 USBE&IT | WINTER 2017
The Last Firewall D
Leading Voices
mind. The development of mental telepathy applications and technology is at a theoretical stage where that can be intruded upon. This is why it is important to seriously consider all implications of exposing and securing access to someone’s brain, which is the last true protector of individual privacy, or the last fi rewall. There are some great applications
of mental telepathy that can positively impact our global society. In the simplest implementation, it could help translate commands in the brain in order to move parts of the body, such as an arm or a fi nger. Artifi cial limbs and devices could be electronically and directly connected to the brain. That could be an amazing advancement for someone who, through war, an accident, or some other unforeseen event, has lost the function of an appendage. We are already moving quickly along the pathway of actuating body parts through mental commands such as eye blinks and gestures. This is clearly a wanted and desired step for society.
Along with the medical aspects of
mental telepathy, wouldn’t it be great to sit in your offi ce and simply think- and-send direct thoughts to someone you care about? Imagine communicating at the speed of thought! Mental contemplations directly transferred to someone else would be a tremendously rich experience. Those are just two of the uplifting possibilities that developing mental telepathy technology would bring to society. The question that needs to be
considered is if our ethics and humanity will follow that path of positivity. The expansion of data and the
centralization of information and discoveries yet to be made have both enhanced life and paradoxically left us much more vulnerable. That said, there is a critical need to educate, develop, and apply new methods of cybersecurity. Cybersecurity is one of the National Academy of Engineering’s Grand Challenges. We don’t truly understand the fundamentals necessary to implement an eff ective, all-
encompassing cybersecurity strategy. And since the rate at which civilizations absorb new technologies and create the necessary adjustments and security protocols is very slow, the educational cyber-engineering programs we develop are often made obsolete by cyber technologies and cyber threats that are advancing and changing by the moment. In other words, what is considered a best practice in cybersecurity today will be obsolete tomorrow. Therefore, an active research program is vital to abut advanced education eff orts. At Morgan State, we have a new
cyber security laboratory, the Center for Reverse Engineering and Assured Microelectronics (CREAM). This laboratory focuses on many hardware aspects of cyber security. Silicon chips are the backbone of personal computing, the Internet, and the Internet of Things (IoT). New silicon CPU chips contain 7.2 billion transistors. Most of the chips used commercially are manufactured off shore, usually in either Japan or China. As you can imagine, the challenges of verifying that there are now hidden malicious circuits in the maze of those 7.2 billion transistors is extremely daunting. CREAM is just one of the targeted research areas in the School of Engineering that is seeking to fulfi ll the new mission of Morgan State, which is to be the premier urban research university in the state of Maryland. The payoff from research does not
come solely from discovery. The act of doing research keeps the educational program current by exposing the teaching faculty to the latest discoveries. The fl ow of scientifi c information proceeds from the laboratory to archival journals to review articles and textbooks. It is through this process that new knowledge is introduced to students, and it is how we will train our next generation of cyber-engineers and protect the most critical tool we as humans have access to: our brains, the last fi rewall. S
www.blackengineer.com
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68 |
Page 69 |
Page 70 |
Page 71 |
Page 72 |
Page 73 |
Page 74 |
Page 75 |
Page 76 |
Page 77 |
Page 78 |
Page 79 |
Page 80 |
Page 81 |
Page 82 |
Page 83 |
Page 84 |
Page 85 |
Page 86 |
Page 87 |
Page 88 |
Page 89 |
Page 90 |
Page 91 |
Page 92 |
Page 93 |
Page 94 |
Page 95 |
Page 96