Feeds

Boffin snatches control of colleague's BODY with remote control BRAIN HAT

No rude gestures, though, this is SCIENCE

  • alert
  • submit to reddit

Beginner's guide to SSL certificates

In an announcement that's going to be a boon to the tin-foil haberdashery business, scientists at the University of Washington (UW) have successfully built a non-invasive system to remotely control the actions of humans.

Brain to Brain communications at the University of Washington

Mind control from the Ministry of Silly Hats

On August 12, Professor Rajesh Rao, wearing an black and green EEG skullcap set to monitor the left motor cortex of the brain, which coordinates hand movement, mentally moved a finger to fire a cannon in a video game. He made no physical movement; he just thought about the action.

The results were recorded and pinged across campus to the UW's Institute for Learning and Brain Sciences, where fellow researcher Andrea Stocco was wearing a rather fetching purple swimming cap containing a transcranial magnetic stimulation coil. Stocco wore earplugs to reduce outside stimuli and his hand rested on top of a standard keyboard.

The magnetic coil, operating at 69 per cent power, induced current in a spot on his brain that controls the wrist and fingers and caused a finger on Stucco's right hand to twitch and hit the keyboard, a movement the scientist described as like "a nervous tic".

Researchers cheer as mind meld completed

"Brain-computer interface is something people have been talking about for a long, long time," said Professor Chantel Prat, Stocco's wife and research partner, who helped conduct the experiment. "We plugged a brain into the most complex computer anyone has ever studied, and that is another brain."

Four test sessions were carried out, with five to seven transmissions per session. Although the first try was abbreviated due to network connectivity issues, the team got the brain-to-brain control signal to work in over 90 per cent of the experiments.

That said, the team was keen to stress that the technology couldn't be used to force action against a person's will. While Stocco made the obligatory 'Vulcan mind meld" joke, Prat stressed that this was being managed by state-of-the-art equipment under strict laboratory conditions.

"I think some people will be unnerved by this because they will overestimate the technology," she said. "There's no possible way the technology that we have could be used on a person unknowingly or without their willing participation."

Mind-to-computer interfaces are nothing new, and UW has already had some success in implanting electronics directly into the brain to control epileptic seizures. But by transmitting brain-to-brain, the team thinks they can open up a whole new field of personal networking.

"It was both exciting and eerie to watch an imagined action from my brain get translated into actual action by another brain," Rao said. "This was basically a one-way flow of information from my brain to his. The next step is having a more equitable two-way conversation directly between the two brains." ®

Internet Security Threat Report 2014

More from The Register

next story
Antarctic ice THICKER than first feared – penguin-bot boffins
Robo-sub scans freezing waters, rocks warming models
Your PHONE is slowly KILLING YOU
Doctors find new Digitillnesses - 'text neck' and 'telepressure'
SEX BEAST SEALS may be egging each other on to ATTACK PENGUINS
Boffin: 'I think the behaviour is increasing in frequency'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
The next big thing in medical science: POO TRANSPLANTS
Your brother's gonna die, kid, unless we can give him your, well ...
NASA launches new climate model at SC14
75 days of supercomputing later ...
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.