Human Enhancement: Could you become infected with a computer virus?

  title={Human Enhancement: Could you become infected with a computer virus?},
  author={M. Gasson},
  journal={2010 IEEE International Symposium on Technology and Society},
  • M. Gasson
  • Published 2010
  • Engineering, Computer Science
  • 2010 IEEE International Symposium on Technology and Society
Experiments demonstrating human enhancement through the implantation of technology in healthy humans have been performed for over a decade by some academic research groups. More recently, technology enthusiasts have begun to realize the potential of implantable technology such as glass capsule RFID transponders. In this paper it is argued that implantable RFID devices have evolved to the point whereby we should consider the devices themselves as simple computers. Presented here is the infection… Expand
Attacking Human Implants: A New Generation of Cybercrime
Human ICT implants, such as RFID implants, cochlear implants, cardiac pacemakers, Deep Brain Stimulation, bionic limbs connected to the nervous system, and networked cognitive prostheses, areExpand
Science Fiction Twenty Years Ago, a Nanotechnology Reality Today: Human Microchip Implants
In recent years, Radio-Frequency Identification (RFID) technology has been on the rise with implementing new uses of the technology. This paper will start with examining the history of RFID chip andExpand
Human ICT Implants: From Restorative Application to Human Enhancement
This chapter makes the case that with the desire of technology enthusiasts and self-experimenters to push boundaries, increasing familiarity driving cultural and societal changes, advances in medical technology and the inevitable drift of medical technology to non-medical application, this is clearly just the beginning for human enhancement using ICT implants. Expand
RFID in Healthcare – Current Trends and the Future
RFID technology is deployed in a wide range of industries such as supply chain management, inventory control, farming, farming (to track animals), e-Passports, the tracking of humans (in prisons and hospitals) and in healthcare. Expand
Implantable Medical Devices : Device security and emergency access
markdownabstractImplantable Medical Devices (IMDs) are battery-powered devices that are implanted in the human body and which employ local (electric) stimulation to treat a wide range of medicalExpand
A system architecture, processor, and communication protocol for secure implants
A new implant system architecture is proposed, where security and main-implant functionality are made completely decoupled by running the tasks onto two separate cores, achieving high security levels at 56% energy savings and at an area overhead of less than 15%. Expand
Go 'Get Chipped': A Brief Overview of Non-Medical Implants between 1997-2013 (Part 1)
  • K. Michael
  • Computer Science
  • IEEE Technol. Soc. Mag.
  • 2017
The social implications of microchipping people and how this technology could be used for everyday banking and telecommunications applications as a blackbox implant­ able in the arm or upper torso are researched. Expand
Cheating with implants : Implications of the hidden information advantage of bionic ears and eyes
Medical technology advances rapidly. As of 2009, about 188.000 people worldwide had received cochlear implants, and promising trials have been conducted with retinal and subretinal implants. TheseExpand
Is Human Enhancement also a Personal Matter?
It is suggested that a comprehensive approach to define human enhancement could constitute a useful premise to appropriately address the complexity of the ethical and social issues it generates. Expand
Twenty Legal Considerations for Clouds of Things
This paper provides a survey of key legal questions arising in the EU at the intersection of cloud computing and the Internet of Things, which we term “Clouds of Things”. We consider implications forExpand


Is your cat infected with a computer virus?
This paper presents the first self-replicating RFID virus, which uses RFID tags as a vector to compromise backend RFID middleware systems, via a SQL injection attack. Expand
Hands On
This paper discusses the idea of a hobbyist having a radiofrequency identification (RFID) tag implanted in him. In an RFID "lock" system, each RFID tag, which is essentially a minitransmitter, sendsExpand
The Disappearing Computer
" The most profound technologies are those that disappear. They weave themselves into the fabric of everyday life until they are indistinguishable from it. " Embedded systems The personal computer asExpand
Becoming Borg to Become Immortal: Regulating Brain Implant Technologies
Describing advances in hybrid brain–machine interfaces, offers some likely hypotheses concerning future developments, reflects on the implications of combining cloning and transplanted brain chips, and suggests some potential methods of regulating these technologies. Expand
Security and Privacy for Implantable Medical Devices
The latest IMDs support delivery of telemetry for remote monitoring over long-range, high-bandwidth wireless links, and emerging devices will communicate with other interoperating IMDs. Expand
Invasive neural prosthesis for neural signal detection and nerve stimulation
The aim of the study was to assess the efficacy, compatibility, and long term operability of the neural implant in allowing the subject to perceive feedback stimulation and for neural activity to be detected and processed such that the subject could interact with remote technologies. Expand
The application of implant technology for cybernetic systems.
The response to stimulation improved considerably during the trial, suggesting that the subject learned to process the incoming information more effectively, and may allow recipients to have abilities they would otherwise not possess. Expand
The basis of the FDA's decision on breast implants.
  • D. Kessler
  • Medicine
  • The New England journal of medicine
  • 1992
On April 16, 1992, the Food and Drug Administration announced that breast implants filled with silicone gel would be available only through controlled clinical studies and that women who need suchExpand
Wearable Computing: A First Step Toward Personal Imaging
The wearable personal imaging system was designed and built to explore new concepts in imaging and lighting, and differed from present-day laptops and personal digital assistants in that it could keep an eye on the screen while walking around and doing other things. Expand
Innovative Automatic Identification and Location-Based Services: From Bar Codes to Chip Implants
Automatic identification has evolved to use mechanisms that can identify an object without direct human intervention. Such devices are the bar code, magnetic-stripe, integrated circuit, and biometricExpand