Prof. Dr. Cebo Daniel
10 min readMay 23, 2023

--

YOUR BODY, HACKED. HACKING HUMANS

Do you worry about cyber criminals hacking your computers and other digital devices? You should. Connect a new computer to the Internet and the average time before there is a hacking attempt is less than a minute. But you may not be aware that hacking the human mind is far easier than hacking any computer system — if you know how to do it. What’s even scarier is that both criminals and legitimate organizations engage in human hacking.

The human body is a complex system of cells, tissues, organs, and functions that work together to maintain life. But what if someone could manipulate or interfere with these processes using technology? Could someone hack into a human body and alter its behavior, health, or perception?

WHAT IS BODY HACKING?

Body hacking is the application of the hacker ethic in pursuit of enhancement or change to the body’s functions through technological means, such as do-it-yourself cybernetic devices or by introducing biochemicals. Body hackers, also known as grinders, are a self-identified community of people who experiment with various forms of body modification, such as magnetic implants, RFID chips, bioluminescent tattoos, or sensory augmentation.

Some body hackers aim to expand the boundaries of human perception and even create new senses, such as echolocation or infrared vision. Others seek to improve their physical or mental performance, such as memory, cognition, strength, or endurance. Some body hackers are motivated by curiosity, aesthetics, or personal expression.

Body hacking can also refer to managing one’s own biology using a combination of medical, nutritional, and electronic techniques. This may include the use of nootropics, nontoxic substances, and/or cybernetic devices for recording biometric data (as in the quantified self movement).

HOW CAN SOMEONE HACK A HUMAN BODY?

There are different ways that someone can hack a human body, depending on the target and the goal. Some examples are:

Hacking the brain: The brain is the central processing unit of the human body and controls all its functions. By manipulating the brain’s electrical signals or chemical balance, someone can affect a person’s mood, thoughts, emotions, memories, or behavior. For instance, someone can use a device that stimulates certain brain regions with electrical currents to induce pleasure, pain, fear, or relaxation. Alternatively, someone can use drugs or hormones to alter the brain’s neurotransmitters and influence a person’s mood or motivation.

Hacking the senses: The senses are the channels through which we perceive the world and interact with it. By interfering with the sensory input or output, someone can distort a person’s perception of reality or create illusions. For example, someone can use a device that emits sounds or lights that are imperceptible to others but can trigger certain responses in a person’s brain. Or someone can use a device that hijacks a person’s visual system and projects images onto their retina.

Hacking the communication: The communication is the way we exchange information and messages with others. By intercepting or modifying the communication signals, someone can manipulate a person’s social interactions or influence their decisions. For example, someone can use a device that mimics a person’s voice or facial expressions and impersonate them in a phone call or video chat Or someone can use a device that alters a person’s speech or writing and makes them say or write things they don’t intend to.

WHAT ARE THE RISKS AND BENEFITS OF BODY HACKING?

Body hacking can have both positive and negative consequences for individuals and society. Some of the potential risks and benefits are:

Risks: Body hacking can pose various risks to a person’s health, safety, privacy, or autonomy. For instance, body hacking can cause physical harm or infection if done improperly or without medical supervision³. Body hacking can also expose a person to cyberattacks or surveillance if their devices are hacked or compromised by malicious actors³. Body hacking can also affect a person’s identity or sense of self if they lose control over their own body or mind.

Benefits: Body hacking can also offer various benefits to a person’s well-being, performance, or creativity. For instance, body hacking can enhance a person’s abilities or experiences by expanding their sensory range or improving their cognitive functions. Body hacking can also empower a person to express themselves or explore their potential by customizing their appearance or functionality³. Body hacking can also foster a sense of community or collaboration among people who share similar interests or goals.

Soon, your brain will be connected to a computer. Can we stop hackers breaking in?

As advancements in neuroscience and technology continue to progress, the idea of connecting the human brain directly to computers is becoming a topic of increasing interest and exploration. This integration, known as brain-computer interfaces (BCIs), holds great potential for medical, scientific, and technological advancements. However, with this promising technology comes the need to address potential vulnerabilities and security concerns to ensure the safety and privacy of individuals. If we’re soon to be plugging computers directly into our brains, how can we protect that connection from those who want to attack them?

SECURITY CONCERNS AND VULNERABILITIES

Unauthorized Access: As BCIs become more advanced and interconnected, there is a potential risk of unauthorized access to the neural data or control mechanisms. Malicious actors gaining unauthorized access could compromise an individual’s privacy, manipulate neural signals, or extract sensitive information from the brain.

Data Privacy: BCIs generate and transmit highly personal and sensitive neural data. Protecting this data from unauthorized access, interception, or misuse is crucial. Robust encryption methods and secure data transmission protocols need to be implemented to safeguard the privacy of individuals.

Malware and Exploits: Like any computer system, BCIs could be susceptible to malware, viruses, or software exploits. Malicious software could potentially manipulate or interfere with the signals transmitted between the brain and external devices, leading to unintended consequences or even physical harm.

Ethical Implications: BCIs raise important ethical considerations, such as informed consent, data ownership, and potential cognitive augmentation disparities. Ensuring that individuals are fully informed and have control over their neural data and the extent of BCI usage is essential.

THE WORST SCENARIO

Here’s an analogy between virus transmission to the human body and computer viruses:

Transmission Medium: In both scenarios, there is a transmission medium through which the viruses spread. In the case of the human body, viruses can be transmitted through physical contact, respiratory droplets, contaminated surfaces, or other bodily fluids. Similarly, in the digital realm, computer viruses spread through email attachments, infected websites, malicious downloads, or compromised networks.

Infectious Agent:In both cases, there is an infectious agent that causes the transmission. In the human body, viruses are biological entities composed of genetic material that can infect and replicate within host cells. Computer viruses, on the other hand, are malicious software programs or code that can replicate and spread within computer systems.

Entry Points: To infect a body or a computer system, viruses need entry points. In the human body, entry points can include the respiratory system, open wounds, or mucous membranes. In the digital world, computer viruses exploit vulnerabilities in operating systems, software, or network connections to gain access to a computer system.

Replication and Spread:Both types of viruses have the ability to replicate and spread further. In the human body, viruses can enter cells, hijack the host’s cellular machinery, and replicate, which can lead to the virus spreading to other organs or individuals through various means. Similarly, computer viruses can replicate within infected systems, attach themselves to files or programs, and spread to other computers, networks, or devices through shared files, network connections, or removable media.

Impact and Damage: Viruses in both scenarios can cause harm and damage. In the human body, viruses can cause a range of health issues, from mild symptoms to severe illnesses, depending on the specific virus and the individual’s immune response. Computer viruses can disrupt computer operations, corrupt files, steal sensitive information, or even render a system unusable.

Prevention and Protection: In both cases, preventative measures are crucial. In the human body, measures like vaccination, practicing good hygiene, and maintaining a healthy immune system can help prevent virus transmission and reduce the severity of infections. Similarly, in the digital realm, antivirus software, firewalls, software updates, secure browsing habits, and user awareness can help protect against computer viruses and minimize the risk of infection.

QUESTION OVER ALL QUESTION IS:

Can Computer virus be transmitted to human body?

AND THIS IS NOT ANYMORE SCIENCE-FICTION MOVIE!

Computer viruses are malicious software programs that are designed to infect and damage computer systems, but they could be capable of infecting biological organisms such as humans.

It is possible for a computer virus to indirectly affect a human by causing damage to critical computer systems that are essential for the functioning of infrastructure, such as hospitals or power grids. In such cases, the virus can cause disruptions that affect human health and safety.

There have been several instances where computer viruses have caused disruptions to human health and safety by infecting critical computer systems. Here are some examples:

1. Stuxnet: Stuxnet was a sophisticated computer worm that was discovered in 2010. It was designed to target industrial control systems, specifically those used in the Iranian nuclear program. Stuxnet caused physical damage to the centrifuges used in uranium enrichment, which could have potentially led to a radiation leak.

2. WannaCry: WannaCry is a ransomware attack that started in May 2017. It infected over 200,000 computers in 150 countries, including several hospitals in the UK. The attack caused widespread disruption to hospital operations, with some hospitals having to cancel appointments and divert emergency patients to other facilities.

3. NotPetya: NotPetya is a malware attack that started in June 2017. It was designed to target Ukrainian businesses, but it quickly spread to other countries and infected several multinational corporations. NotPetya caused significant disruption to several industries, including shipping, pharmaceuticals, and logistics.

4. Triton: Triton is a malware attack that was discovered in 2017. It specifically targets industrial control systems used in oil and gas facilities. Triton is capable of causing physical damage to the equipment, which could potentially lead to explosions or other safety hazards.

There are other examples of computer viruses that have caused disruptions to human health and safety. Here are a few more:

1. MyDoom: MyDoom is a computer worm that was discovered in 2004. It was one of the fastest-spreading worms at the time, and it caused significant disruption to email and internet services. MyDoom was also used to launch distributed denial-of-service (DDoS) attacks on several websites, including the website of the SCO Group, a software company involved in a legal dispute with the open-source community. The attack caused significant disruption to the company’s operations.

2. Morris Worm: The Morris Worm is one of the earliest known computer worms, and it was released in 1988 by a graduate student named Robert Tappan Morris. The worm was designed to exploit vulnerabilities in the UNIX operating system and spread to other computers connected to the internet. The worm quickly spread, causing significant disruption to internet services at the time. It is estimated that the worm caused between $10 million and $100 million in damages.

3. Code Red: Code Red is a computer worm that was discovered in 2001. It exploited a vulnerability in Microsoft’s IIS web server software and caused significant disruption to internet services. The worm infected hundreds of thousands of computers and caused an estimated $2.6 billion in damages.

These examples demonstrate that computer viruses and worms can cause significant disruptions to human health and safety, as well as to the functioning of critical infrastructure and services.

There are several common signs that a human body may be infected with a computer virus:

Disruption to critical infrastructure: If a computer virus affects critical infrastructure such as power grids or transportation systems, it may cause disruptions that can affect human health and safety. For example, a power outage caused by a virus could lead to a loss of heating or cooling, which could be harmful to individuals who are vulnerable to extreme temperatures.

Malfunction of medical devices: If a computer virus affects a medical device such as a pacemaker or insulin pump, it may cause the device to malfunction, which could be life-threatening for the individual. Signs of a malfunction may include abnormal heart rhythms, changes in blood sugar levels, or other symptoms associated with the underlying medical condition.

Data breaches: If a computer virus causes a data breach that exposes sensitive personal or medical information, it could put individuals at risk of identity theft or other forms of harm.

Disrupting emergency services: Computer viruses can also affect emergency services such as police, fire, and ambulance services. This can hinder their ability to respond to emergencies and potentially put lives at risk.

Disrupting financial systems: Computer viruses can also affect financial systems such as banks and stock exchanges, potentially causing disruptions that can lead to financial losses and harm to individuals and businesses.

Disrupting communication systems: Computer viruses can also affect communication systems such as phone and internet networks, potentially causing disruptions that can hinder communication in emergency situations.

These are just a few examples of how computer viruses can indirectly affect human health and safety. It is important to take measures to prevent and detect computer viruses, such as using antivirus software, keeping software and security systems up to date, using strong passwords, and being vigilant for suspicious activity on computer networks.

SCIENCE FICTION MOVIE BECOME REALITY. BE PLUGED AND UPDATED!

--

--

Prof. Dr. Cebo Daniel
Prof. Dr. Cebo Daniel

Written by Prof. Dr. Cebo Daniel

🌟 Life Scientist 🧬 | Author 📚 | Inspiring Lecturer 🎓 | Smart Living 🤖 | Believer in Transhumanism & AI 🚀 | Eclectic 🔍 | Social Influence Strategist 🌐

No responses yet