SlideShare a Scribd company logo
1 of 18
The Implications ofThe Implications of
Interfacing In-The BodyInterfacing In-The Body
Technologies to the OuterTechnologies to the Outer
World-World-
The Impending Era ofThe Impending Era of
Human-cyborgsHuman-cyborgs
Joseph R. CarvalkoJoseph R. Carvalko
BSEE, MFA, JDBSEE, MFA, JD
May 20, 2013May 20, 2013
Quinnipiac University, School of LawQuinnipiac University, School of Law
This paper discusses aspects of the technical and
consequential legal implications of the proliferation
of implantable in-the-body technologies and their
telemetric connection to commercial, medical and
governmental networks.
Keywords: cyborg-assisted life, implantable
technology; in-the-body technology; cyborgization
law
Today’s Presentation will address:Today’s Presentation will address:
 A society whose dependence on in-the-bodyA society whose dependence on in-the-body
technology will create virtual human-cyborgs.technology will create virtual human-cyborgs.
 An overview of technology that will have aAn overview of technology that will have a
major impact on health and non-health relatedmajor impact on health and non-health related
Apps to enhance lives and augment connectivity.Apps to enhance lives and augment connectivity.
 A legal perspective about the consequences ofA legal perspective about the consequences of
connecting in-the-body technology to telemetry.connecting in-the-body technology to telemetry.
A Boundary Not Too FarA Boundary Not Too Far
Proof of ConceptProof of Concept
 Presently in-the-body medical devices bi-directionally radioPresently in-the-body medical devices bi-directionally radio
communicate with remote computers utilizing the Medicalcommunicate with remote computers utilizing the Medical
Implant Communication Service frequency band betweenImplant Communication Service frequency band between
401 MHz and 406 MHz.401 MHz and 406 MHz.
 The maximum power transmission is 25 microwatts, a rangeThe maximum power transmission is 25 microwatts, a range
of a couple of meters.of a couple of meters.
 The maximum bandwidth is 300 kHz, (low bit-rate systems),The maximum bandwidth is 300 kHz, (low bit-rate systems),
compared with WiFi or Bluetooth.compared with WiFi or Bluetooth.
 Nonetheless these devices can transmit to a receiverNonetheless these devices can transmit to a receiver
connected via USB to any computer ready device throughconnected via USB to any computer ready device through
local area networks (LAN), wide area networks (WAN), andlocal area networks (LAN), wide area networks (WAN), and
access the Internet.access the Internet.
Technology ApplicationsTechnology Applications
Available NowAvailable Now
 Computer stimulators and suppressors for alleviating e.g., pain,Computer stimulators and suppressors for alleviating e.g., pain,
depression, neurological diseases, such as Parkinson’s, heart, diabetes,depression, neurological diseases, such as Parkinson’s, heart, diabetes,
incontinence;incontinence;
 Artificial organ processors to replace any one of nearly two dozenArtificial organ processors to replace any one of nearly two dozen
major body organs;major body organs;
 Internal computer processors will enhance knowledge, skills,Internal computer processors will enhance knowledge, skills,
countervail against environmental challenges (e.g., climate);countervail against environmental challenges (e.g., climate);
 Prosthetics to replace malfunctioning, missing, or damaged bodyProsthetics to replace malfunctioning, missing, or damaged body
parts;parts;
 Implanted analytical and diagnostic tools drawn from an array ofImplanted analytical and diagnostic tools drawn from an array of
bioinformatics technologies;bioinformatics technologies;
 RFID chips to be embedded beneath the skin for personalRFID chips to be embedded beneath the skin for personal
identification and for integrating humans into the supply/demandidentification and for integrating humans into the supply/demand
chain.chain.
The Computerized Anatomy Is A MatterThe Computerized Anatomy Is A Matter
Of When, Not IfOf When, Not If
 The 2010 global market for microelectronic medical implants,The 2010 global market for microelectronic medical implants,
accessories and supplies has been estimated at US$15.4 billionaccessories and supplies has been estimated at US$15.4 billion
and by 2016 forecasted at US$24.8 billion.and by 2016 forecasted at US$24.8 billion.
 Ray Kurzweil recently opined that implantable health relatedRay Kurzweil recently opined that implantable health related
devices would be seen by 2020 and a decade or two later will godevices would be seen by 2020 and a decade or two later will go
beyond medical appliances.beyond medical appliances.
Major MilestonesMajor Milestones
 The three drivers behind increasing computer implantation are bioengineersThe three drivers behind increasing computer implantation are bioengineers
have reached a critical mass in converting computer technology into lifesavinghave reached a critical mass in converting computer technology into lifesaving
and life enhancing products;and life enhancing products;
 Computers and their software, the backbone for these products are becomingComputers and their software, the backbone for these products are becoming
ever more computationally sophisticated based on the accumulation of scientificever more computationally sophisticated based on the accumulation of scientific
knowledge;knowledge;
 Between 2012 and 2020 processor speeds will increase from an alreadyBetween 2012 and 2020 processor speeds will increase from an already
astounding 40 billion operations per second to 330 billion operations per second;astounding 40 billion operations per second to 330 billion operations per second;
 Substrates, that is the material part of the computer, now measured inSubstrates, that is the material part of the computer, now measured in
micrometers or the size of blood cells, will dive deeply into the realm of wafer-micrometers or the size of blood cells, will dive deeply into the realm of wafer-
thin graphene (carbon) and MoS2 (molybdenum disulfide) measured inthin graphene (carbon) and MoS2 (molybdenum disulfide) measured in
nanometers, just a few atoms thick.nanometers, just a few atoms thick.
It’s a Small, Small WorldIt’s a Small, Small World
 Nano-stimulators/suppressors, artificial organ processors, metabolicNano-stimulators/suppressors, artificial organ processors, metabolic
and cognitive enhancers, and permanent diagnostic tools to ensureand cognitive enhancers, and permanent diagnostic tools to ensure
our physical and psychological well-being as we head toward aour physical and psychological well-being as we head toward a
practically interminable lifetime.practically interminable lifetime.
 Computational devices down-sized through via synthetic DNA,Computational devices down-sized through via synthetic DNA,
molecular computers (nano-sized processors), deployed alongside,molecular computers (nano-sized processors), deployed alongside,
and within cells and organs as permanent non-organic, internaland within cells and organs as permanent non-organic, internal
adjuncts to our anatomy.adjuncts to our anatomy.
 Applications will be in the realm of nano-prosthetics.Applications will be in the realm of nano-prosthetics.
 Nano-bots ( MEMS), such as nano-sized motors will range in sizeNano-bots ( MEMS), such as nano-sized motors will range in size
from 10from 10-9-9
(a few hundred atoms across) to 10(a few hundred atoms across) to 10-5-5
—the diameter of a white—the diameter of a white
blood cell will course through arteries and cellular membranes toblood cell will course through arteries and cellular membranes to
deliver drugs and destroy pathogens.deliver drugs and destroy pathogens.
 These will carry processors equipped to communicate with the anThese will carry processors equipped to communicate with the an
internal server that in turn communicates to the outer world.internal server that in turn communicates to the outer world.
Shrinking ComputerShrinking Computer
Operating Faster than LightOperating Faster than Light
 During the next two decades, computer processors will continueDuring the next two decades, computer processors will continue
to shrink to the size of a bacterium, 2 microns or micrometersto shrink to the size of a bacterium, 2 microns or micrometers
(μm) long and 0.5 μm in diameter, with a cell volume of 0.6 - 0.7(μm) long and 0.5 μm in diameter, with a cell volume of 0.6 - 0.7
μmμm33
..
 Processing speeds to upwards of 10Processing speeds to upwards of 101616
(10 quadrillion) operations(10 quadrillion) operations
per second, referred to as flops/sec or FPS.per second, referred to as flops/sec or FPS.
 This small size will allow computers to live both within andThis small size will allow computers to live both within and
alongside the human cell. The level of 10 trillion FPS exceeds thealongside the human cell. The level of 10 trillion FPS exceeds the
processing rate at roughly 10processing rate at roughly 101515
FPS of the human brain.FPS of the human brain.
Future Cyborg/TelemetryFuture Cyborg/Telemetry
 4G networks and successors, with gigabit bandwidth backbones, robust4G networks and successors, with gigabit bandwidth backbones, robust
networking infrastructure, high-speed relays and unlimited power withnetworking infrastructure, high-speed relays and unlimited power with
recharging capabilities will serve as the medium through which feature-recharging capabilities will serve as the medium through which feature-
rich anatomical smart prosthetics operate creating a explosion of datarich anatomical smart prosthetics operate creating a explosion of data
that will be used for cyber social programming.that will be used for cyber social programming.
 Cybersecurity will become a subject alongside the list of diseases forCybersecurity will become a subject alongside the list of diseases for
agencies such as NIH, the CDC or the FDA, as they look foragencies such as NIH, the CDC or the FDA, as they look for
prescriptions for thwarting network attacks, fraud, and physical injuryprescriptions for thwarting network attacks, fraud, and physical injury
to those that have implantable technology. Concerns may take manyto those that have implantable technology. Concerns may take many
forms, some yet to be discovered: surveillance, denial of service attacks.forms, some yet to be discovered: surveillance, denial of service attacks.
 Advances in computing, communications, software, and anatomicallyAdvances in computing, communications, software, and anatomically
embedded hardware will transform an individual’s relationship toembedded hardware will transform an individual’s relationship to
business and government where there will be as great a dependence onbusiness and government where there will be as great a dependence on
digital infrastructure as there will be for food and water.digital infrastructure as there will be for food and water.
Anticipated Effects on theAnticipated Effects on the
PopulationPopulation
 Individuals with knowledge-based and skills-based enhancementsIndividuals with knowledge-based and skills-based enhancements
will be the new expert class, cognoscenti and leaders that have awill be the new expert class, cognoscenti and leaders that have a
built-in ability for superior analysis, judgment and timely decisions.built-in ability for superior analysis, judgment and timely decisions.
 In the far future cloud computing will be how population-wideIn the far future cloud computing will be how population-wide
management and control will be carried out with competingmanagement and control will be carried out with competing
paradigms vying for an individual’s portfolio of enhanced abilitiesparadigms vying for an individual’s portfolio of enhanced abilities
and health related processes, not different from how one might todayand health related processes, not different from how one might today
choose everything from a stock broker to a physician.choose everything from a stock broker to a physician.
 Physicians of the future will be versed in cyber-topics includingPhysicians of the future will be versed in cyber-topics including
algorithmic and application formulations, programming models andalgorithmic and application formulations, programming models and
systems, runtime systems, middleware, and end-to-end applicationsystems, runtime systems, middleware, and end-to-end application
workflows, concerns of today’s system engineers.workflows, concerns of today’s system engineers.
Transformed MedicineTransformed Medicine
 A router/modem feature embedded in the anatomy can access medical careA router/modem feature embedded in the anatomy can access medical care
day or night through a wireless connection.day or night through a wireless connection.
 An expert computer process will narrowed symptoms to a range of maladies,An expert computer process will narrowed symptoms to a range of maladies,
patients will participate in their own diagnosis.patients will participate in their own diagnosis.
 To the extent a doctor’s intervention is required, a doctor best equipped toTo the extent a doctor’s intervention is required, a doctor best equipped to
deal with the intake diagnosis will be either contacted or a referral made bydeal with the intake diagnosis will be either contacted or a referral made by
the computer.the computer.
 A worldwide grid will tune in on millions of individuals feeding searchableA worldwide grid will tune in on millions of individuals feeding searchable
public health databases using a patient’s anatomical data to update an expertpublic health databases using a patient’s anatomical data to update an expert
system.system.
 At this stage public health service will be completely “predictive, preventive,At this stage public health service will be completely “predictive, preventive,
personalized, and participatory”—, in most cases without the patient beingpersonalized, and participatory”—, in most cases without the patient being
aware of data being transmitted and collected.aware of data being transmitted and collected.
Situating the RiskSituating the Risk
A Real World ExampleA Real World Example
 The Medical Device Security Center operates as a private partnership between BethThe Medical Device Security Center operates as a private partnership between Beth
Israel Deaconess Medical Center, Harvard Medical School, the University ofIsrael Deaconess Medical Center, Harvard Medical School, the University of
Massachusetts Amherst, and the University of Washington mission the balancingMassachusetts Amherst, and the University of Washington mission the balancing
security, privacy, safety, and effectiveness for next-generation medical healthcaresecurity, privacy, safety, and effectiveness for next-generation medical healthcare
devices.devices.
 In one study researchers investigated whether hackers could gain wireless access toIn one study researchers investigated whether hackers could gain wireless access to
combination heart defibrillator/pacemakers that allow doctors to monitor and adjustcombination heart defibrillator/pacemakers that allow doctors to monitor and adjust
operating parameters remotely.operating parameters remotely.
 The experiment simulated the effects of a “hacker” using a readily availableThe experiment simulated the effects of a “hacker” using a readily available
commercial programmer and a software radio that can be purchased on eBay,commercial programmer and a software radio that can be purchased on eBay,
reprogram the device, shut it down, deplete its battery, or deliver jolts of electricity thatreprogram the device, shut it down, deplete its battery, or deliver jolts of electricity that
could be potentially fatal to a would-be patient.could be potentially fatal to a would-be patient.
Legal Considerations dealing withLegal Considerations dealing with
Protection of the PublicProtection of the Public
 Regulatory considerations to insure efficacy andRegulatory considerations to insure efficacy and
safety, through testing, licensing, enforcement.safety, through testing, licensing, enforcement.
 Criminal law to deter crimes, such as hacking,Criminal law to deter crimes, such as hacking,
that jeopardize safety of individuals, and thethat jeopardize safety of individuals, and the
systems that “wire” classes of subscribingsystems that “wire” classes of subscribing
individuals into servers and databases.individuals into servers and databases.
 Civil actions that allow individuals and classes toCivil actions that allow individuals and classes to
seek redress for negligence, product liability, andseek redress for negligence, product liability, and
warranty.warranty.
Legal Considerations dealing withLegal Considerations dealing with
PropertyProperty
 Whether the systems that operate large scale networks thatWhether the systems that operate large scale networks that
telemeter to individuals will be subject to business methodtelemeter to individuals will be subject to business method
patenting.patenting.
 Whether open sourcing of software that runs the internal andWhether open sourcing of software that runs the internal and
external software processes will become the preferred paradigm.external software processes will become the preferred paradigm.
 Who will own/operate the servers and databases, pricing, access.Who will own/operate the servers and databases, pricing, access.
 What licensing restrictions will be allowed, internal software?What licensing restrictions will be allowed, internal software?
Distributive Justice IssuesDistributive Justice Issues
 Future computational/telemetry processing therapies might go beyondFuture computational/telemetry processing therapies might go beyond
health-related purposes to provide a greater level of intellectual quickness orhealth-related purposes to provide a greater level of intellectual quickness or
greater access to commercial opportunities, who will be the beneficiaries?greater access to commercial opportunities, who will be the beneficiaries?
 Part of what will distinguish the future human population having implantedPart of what will distinguish the future human population having implanted
computational devices connected to the world-wide-web from a populationcomputational devices connected to the world-wide-web from a population
that does not, will be the enhancements that open vast benefits for thethat does not, will be the enhancements that open vast benefits for the
“haves” and consequent potential detriments for the “have nots.”.“haves” and consequent potential detriments for the “have nots.”.
 Society, the world over needs to decide if any corporation, institution, orSociety, the world over needs to decide if any corporation, institution, or
individual should have the right to private ownership of certain forms ofindividual should have the right to private ownership of certain forms of
cyborgized property—most notably, life saving devices and selected methodscyborgized property—most notably, life saving devices and selected methods
of extending life and enhancing intelligence or skills.of extending life and enhancing intelligence or skills.
CARVALKO COPYRIGHT 2007

More Related Content

Viewers also liked (14)

Faktor yang Mempengaruhi Perkembangan Pendidikan
Faktor yang Mempengaruhi Perkembangan PendidikanFaktor yang Mempengaruhi Perkembangan Pendidikan
Faktor yang Mempengaruhi Perkembangan Pendidikan
 
Perencanaan Poros Pisau Mesin Pemarut Kelapa
Perencanaan Poros Pisau Mesin Pemarut KelapaPerencanaan Poros Pisau Mesin Pemarut Kelapa
Perencanaan Poros Pisau Mesin Pemarut Kelapa
 
Nsna power point information
Nsna power point informationNsna power point information
Nsna power point information
 
Laporan Observasi PLTMH dan PLTS
Laporan Observasi PLTMH dan PLTSLaporan Observasi PLTMH dan PLTS
Laporan Observasi PLTMH dan PLTS
 
Modul Dasar Otomasi
Modul Dasar OtomasiModul Dasar Otomasi
Modul Dasar Otomasi
 
Perawatan Mesin Bubut
Perawatan Mesin Bubut Perawatan Mesin Bubut
Perawatan Mesin Bubut
 
KONSEPSI PELAKSANAAN HAM SEBELUM DAN SESUDAH AMANDEMEN UUD 1945
KONSEPSI PELAKSANAAN HAM SEBELUM DAN SESUDAH AMANDEMEN UUD 1945KONSEPSI PELAKSANAAN HAM SEBELUM DAN SESUDAH AMANDEMEN UUD 1945
KONSEPSI PELAKSANAAN HAM SEBELUM DAN SESUDAH AMANDEMEN UUD 1945
 
PESAWAT ANGKAT : Derek Uap, Alat Pengangkat Mobil, dan Kran Hidrolik
PESAWAT ANGKAT : Derek Uap, Alat Pengangkat Mobil, dan Kran HidrolikPESAWAT ANGKAT : Derek Uap, Alat Pengangkat Mobil, dan Kran Hidrolik
PESAWAT ANGKAT : Derek Uap, Alat Pengangkat Mobil, dan Kran Hidrolik
 
Makalah Jangka Sorong dan Mikrometer
Makalah Jangka Sorong dan MikrometerMakalah Jangka Sorong dan Mikrometer
Makalah Jangka Sorong dan Mikrometer
 
Rencana Pelaksanaan Pembelajaran_Dasar Kompetensi Kejuruan
Rencana Pelaksanaan Pembelajaran_Dasar Kompetensi KejuruanRencana Pelaksanaan Pembelajaran_Dasar Kompetensi Kejuruan
Rencana Pelaksanaan Pembelajaran_Dasar Kompetensi Kejuruan
 
Makalah Tes dan Nontes
Makalah Tes dan NontesMakalah Tes dan Nontes
Makalah Tes dan Nontes
 
Laporan Praktikum Kerja Bangku
Laporan Praktikum Kerja BangkuLaporan Praktikum Kerja Bangku
Laporan Praktikum Kerja Bangku
 
MAKALAH Mesin Pendingin
MAKALAH Mesin PendinginMAKALAH Mesin Pendingin
MAKALAH Mesin Pendingin
 
Intégration OpenErp par Targa
 Intégration OpenErp par Targa Intégration OpenErp par Targa
Intégration OpenErp par Targa
 

Similar to Conferencepresentationtoronto

What will the world be like 50 years 20 (1)
What will the world be like 50 years 20 (1)What will the world be like 50 years 20 (1)
What will the world be like 50 years 20 (1)nitut1
 
Medical facilities using Nanobots - RECONCEPTUALIZING
Medical facilities using Nanobots - RECONCEPTUALIZINGMedical facilities using Nanobots - RECONCEPTUALIZING
Medical facilities using Nanobots - RECONCEPTUALIZINGMathankumar S
 
Convergence of Transitioning Technologies
Convergence of Transitioning TechnologiesConvergence of Transitioning Technologies
Convergence of Transitioning TechnologiesKariappa Bheemaiah
 
Looking into the Crystal Ball: From Transistors to the Smart Earth
Looking into the Crystal Ball: From Transistors to the Smart EarthLooking into the Crystal Ball: From Transistors to the Smart Earth
Looking into the Crystal Ball: From Transistors to the Smart EarthThe Innovation Group
 
Innovation book.pptx
Innovation book.pptxInnovation book.pptx
Innovation book.pptxsenguldeniz
 
Security Concerns of Future Technology Arriving Today - Gregory Carpenter
Security Concerns of Future Technology Arriving Today - Gregory CarpenterSecurity Concerns of Future Technology Arriving Today - Gregory Carpenter
Security Concerns of Future Technology Arriving Today - Gregory CarpenterEC-Council
 
Emerging trends in robotics using neural network
Emerging trends in robotics using neural networkEmerging trends in robotics using neural network
Emerging trends in robotics using neural networkDeva Johnson
 
Creating self-aware and smart healthy cities
Creating self-aware and smart healthy citiesCreating self-aware and smart healthy cities
Creating self-aware and smart healthy citiesMaged N. Kamel Boulos
 
Disruptive technologies - Session 4 - Biochip Digital twin Smart Fabrics
Disruptive technologies - Session 4 - Biochip Digital twin Smart FabricsDisruptive technologies - Session 4 - Biochip Digital twin Smart Fabrics
Disruptive technologies - Session 4 - Biochip Digital twin Smart FabricsBohitesh Misra, PMP
 
Amazing Breakthrough Technologies That Can Potentially Change the World
Amazing Breakthrough Technologies That Can Potentially Change the WorldAmazing Breakthrough Technologies That Can Potentially Change the World
Amazing Breakthrough Technologies That Can Potentially Change the WorldMarie Weaver
 
Nanotechnology in surgery
Nanotechnology in surgeryNanotechnology in surgery
Nanotechnology in surgeryLouizos Louizos
 
Cyborg cybernetic organism
Cyborg cybernetic organismCyborg cybernetic organism
Cyborg cybernetic organismJackzJacky
 
Robotics in Medical Science
Robotics in Medical ScienceRobotics in Medical Science
Robotics in Medical ScienceVashuGupta8
 
10 New Modern Technologies PPT [Computer Project]
10 New Modern Technologies PPT [Computer Project]10 New Modern Technologies PPT [Computer Project]
10 New Modern Technologies PPT [Computer Project]AssHMA
 

Similar to Conferencepresentationtoronto (20)

Bioethics Uvt2008
Bioethics Uvt2008Bioethics Uvt2008
Bioethics Uvt2008
 
What will the world be like 50 years 20 (1)
What will the world be like 50 years 20 (1)What will the world be like 50 years 20 (1)
What will the world be like 50 years 20 (1)
 
(GCF2010) Dr. Michio Kako :" Future of Health Care "
(GCF2010) Dr. Michio Kako :" Future of Health Care "(GCF2010) Dr. Michio Kako :" Future of Health Care "
(GCF2010) Dr. Michio Kako :" Future of Health Care "
 
Medical facilities using Nanobots - RECONCEPTUALIZING
Medical facilities using Nanobots - RECONCEPTUALIZINGMedical facilities using Nanobots - RECONCEPTUALIZING
Medical facilities using Nanobots - RECONCEPTUALIZING
 
The future of medicine
The future of medicineThe future of medicine
The future of medicine
 
The future of medicine
The future of medicineThe future of medicine
The future of medicine
 
Convergence of Transitioning Technologies
Convergence of Transitioning TechnologiesConvergence of Transitioning Technologies
Convergence of Transitioning Technologies
 
Looking into the Crystal Ball: From Transistors to the Smart Earth
Looking into the Crystal Ball: From Transistors to the Smart EarthLooking into the Crystal Ball: From Transistors to the Smart Earth
Looking into the Crystal Ball: From Transistors to the Smart Earth
 
Beekman5 std ppt_17
Beekman5 std ppt_17Beekman5 std ppt_17
Beekman5 std ppt_17
 
Innovation book.pptx
Innovation book.pptxInnovation book.pptx
Innovation book.pptx
 
Security Concerns of Future Technology Arriving Today - Gregory Carpenter
Security Concerns of Future Technology Arriving Today - Gregory CarpenterSecurity Concerns of Future Technology Arriving Today - Gregory Carpenter
Security Concerns of Future Technology Arriving Today - Gregory Carpenter
 
Emerging trends in robotics using neural network
Emerging trends in robotics using neural networkEmerging trends in robotics using neural network
Emerging trends in robotics using neural network
 
Creating self-aware and smart healthy cities
Creating self-aware and smart healthy citiesCreating self-aware and smart healthy cities
Creating self-aware and smart healthy cities
 
Disruptive technologies - Session 4 - Biochip Digital twin Smart Fabrics
Disruptive technologies - Session 4 - Biochip Digital twin Smart FabricsDisruptive technologies - Session 4 - Biochip Digital twin Smart Fabrics
Disruptive technologies - Session 4 - Biochip Digital twin Smart Fabrics
 
Amazing Breakthrough Technologies That Can Potentially Change the World
Amazing Breakthrough Technologies That Can Potentially Change the WorldAmazing Breakthrough Technologies That Can Potentially Change the World
Amazing Breakthrough Technologies That Can Potentially Change the World
 
Nanotechnology in surgery
Nanotechnology in surgeryNanotechnology in surgery
Nanotechnology in surgery
 
Cyborg cybernetic organism
Cyborg cybernetic organismCyborg cybernetic organism
Cyborg cybernetic organism
 
Robotics in Medical Science
Robotics in Medical ScienceRobotics in Medical Science
Robotics in Medical Science
 
BDPA IT Showcase: Robotics and Bioinformatics in Healthcare Industry
BDPA IT Showcase: Robotics and Bioinformatics in Healthcare IndustryBDPA IT Showcase: Robotics and Bioinformatics in Healthcare Industry
BDPA IT Showcase: Robotics and Bioinformatics in Healthcare Industry
 
10 New Modern Technologies PPT [Computer Project]
10 New Modern Technologies PPT [Computer Project]10 New Modern Technologies PPT [Computer Project]
10 New Modern Technologies PPT [Computer Project]
 

Recently uploaded

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Conferencepresentationtoronto

  • 1. The Implications ofThe Implications of Interfacing In-The BodyInterfacing In-The Body Technologies to the OuterTechnologies to the Outer World-World- The Impending Era ofThe Impending Era of Human-cyborgsHuman-cyborgs Joseph R. CarvalkoJoseph R. Carvalko BSEE, MFA, JDBSEE, MFA, JD May 20, 2013May 20, 2013 Quinnipiac University, School of LawQuinnipiac University, School of Law
  • 2. This paper discusses aspects of the technical and consequential legal implications of the proliferation of implantable in-the-body technologies and their telemetric connection to commercial, medical and governmental networks. Keywords: cyborg-assisted life, implantable technology; in-the-body technology; cyborgization law
  • 3. Today’s Presentation will address:Today’s Presentation will address:  A society whose dependence on in-the-bodyA society whose dependence on in-the-body technology will create virtual human-cyborgs.technology will create virtual human-cyborgs.  An overview of technology that will have aAn overview of technology that will have a major impact on health and non-health relatedmajor impact on health and non-health related Apps to enhance lives and augment connectivity.Apps to enhance lives and augment connectivity.  A legal perspective about the consequences ofA legal perspective about the consequences of connecting in-the-body technology to telemetry.connecting in-the-body technology to telemetry.
  • 4.
  • 5. A Boundary Not Too FarA Boundary Not Too Far Proof of ConceptProof of Concept  Presently in-the-body medical devices bi-directionally radioPresently in-the-body medical devices bi-directionally radio communicate with remote computers utilizing the Medicalcommunicate with remote computers utilizing the Medical Implant Communication Service frequency band betweenImplant Communication Service frequency band between 401 MHz and 406 MHz.401 MHz and 406 MHz.  The maximum power transmission is 25 microwatts, a rangeThe maximum power transmission is 25 microwatts, a range of a couple of meters.of a couple of meters.  The maximum bandwidth is 300 kHz, (low bit-rate systems),The maximum bandwidth is 300 kHz, (low bit-rate systems), compared with WiFi or Bluetooth.compared with WiFi or Bluetooth.  Nonetheless these devices can transmit to a receiverNonetheless these devices can transmit to a receiver connected via USB to any computer ready device throughconnected via USB to any computer ready device through local area networks (LAN), wide area networks (WAN), andlocal area networks (LAN), wide area networks (WAN), and access the Internet.access the Internet.
  • 6. Technology ApplicationsTechnology Applications Available NowAvailable Now  Computer stimulators and suppressors for alleviating e.g., pain,Computer stimulators and suppressors for alleviating e.g., pain, depression, neurological diseases, such as Parkinson’s, heart, diabetes,depression, neurological diseases, such as Parkinson’s, heart, diabetes, incontinence;incontinence;  Artificial organ processors to replace any one of nearly two dozenArtificial organ processors to replace any one of nearly two dozen major body organs;major body organs;  Internal computer processors will enhance knowledge, skills,Internal computer processors will enhance knowledge, skills, countervail against environmental challenges (e.g., climate);countervail against environmental challenges (e.g., climate);  Prosthetics to replace malfunctioning, missing, or damaged bodyProsthetics to replace malfunctioning, missing, or damaged body parts;parts;  Implanted analytical and diagnostic tools drawn from an array ofImplanted analytical and diagnostic tools drawn from an array of bioinformatics technologies;bioinformatics technologies;  RFID chips to be embedded beneath the skin for personalRFID chips to be embedded beneath the skin for personal identification and for integrating humans into the supply/demandidentification and for integrating humans into the supply/demand chain.chain.
  • 7. The Computerized Anatomy Is A MatterThe Computerized Anatomy Is A Matter Of When, Not IfOf When, Not If  The 2010 global market for microelectronic medical implants,The 2010 global market for microelectronic medical implants, accessories and supplies has been estimated at US$15.4 billionaccessories and supplies has been estimated at US$15.4 billion and by 2016 forecasted at US$24.8 billion.and by 2016 forecasted at US$24.8 billion.  Ray Kurzweil recently opined that implantable health relatedRay Kurzweil recently opined that implantable health related devices would be seen by 2020 and a decade or two later will godevices would be seen by 2020 and a decade or two later will go beyond medical appliances.beyond medical appliances.
  • 8. Major MilestonesMajor Milestones  The three drivers behind increasing computer implantation are bioengineersThe three drivers behind increasing computer implantation are bioengineers have reached a critical mass in converting computer technology into lifesavinghave reached a critical mass in converting computer technology into lifesaving and life enhancing products;and life enhancing products;  Computers and their software, the backbone for these products are becomingComputers and their software, the backbone for these products are becoming ever more computationally sophisticated based on the accumulation of scientificever more computationally sophisticated based on the accumulation of scientific knowledge;knowledge;  Between 2012 and 2020 processor speeds will increase from an alreadyBetween 2012 and 2020 processor speeds will increase from an already astounding 40 billion operations per second to 330 billion operations per second;astounding 40 billion operations per second to 330 billion operations per second;  Substrates, that is the material part of the computer, now measured inSubstrates, that is the material part of the computer, now measured in micrometers or the size of blood cells, will dive deeply into the realm of wafer-micrometers or the size of blood cells, will dive deeply into the realm of wafer- thin graphene (carbon) and MoS2 (molybdenum disulfide) measured inthin graphene (carbon) and MoS2 (molybdenum disulfide) measured in nanometers, just a few atoms thick.nanometers, just a few atoms thick.
  • 9. It’s a Small, Small WorldIt’s a Small, Small World  Nano-stimulators/suppressors, artificial organ processors, metabolicNano-stimulators/suppressors, artificial organ processors, metabolic and cognitive enhancers, and permanent diagnostic tools to ensureand cognitive enhancers, and permanent diagnostic tools to ensure our physical and psychological well-being as we head toward aour physical and psychological well-being as we head toward a practically interminable lifetime.practically interminable lifetime.  Computational devices down-sized through via synthetic DNA,Computational devices down-sized through via synthetic DNA, molecular computers (nano-sized processors), deployed alongside,molecular computers (nano-sized processors), deployed alongside, and within cells and organs as permanent non-organic, internaland within cells and organs as permanent non-organic, internal adjuncts to our anatomy.adjuncts to our anatomy.  Applications will be in the realm of nano-prosthetics.Applications will be in the realm of nano-prosthetics.  Nano-bots ( MEMS), such as nano-sized motors will range in sizeNano-bots ( MEMS), such as nano-sized motors will range in size from 10from 10-9-9 (a few hundred atoms across) to 10(a few hundred atoms across) to 10-5-5 —the diameter of a white—the diameter of a white blood cell will course through arteries and cellular membranes toblood cell will course through arteries and cellular membranes to deliver drugs and destroy pathogens.deliver drugs and destroy pathogens.  These will carry processors equipped to communicate with the anThese will carry processors equipped to communicate with the an internal server that in turn communicates to the outer world.internal server that in turn communicates to the outer world.
  • 10. Shrinking ComputerShrinking Computer Operating Faster than LightOperating Faster than Light  During the next two decades, computer processors will continueDuring the next two decades, computer processors will continue to shrink to the size of a bacterium, 2 microns or micrometersto shrink to the size of a bacterium, 2 microns or micrometers (μm) long and 0.5 μm in diameter, with a cell volume of 0.6 - 0.7(μm) long and 0.5 μm in diameter, with a cell volume of 0.6 - 0.7 μmμm33 ..  Processing speeds to upwards of 10Processing speeds to upwards of 101616 (10 quadrillion) operations(10 quadrillion) operations per second, referred to as flops/sec or FPS.per second, referred to as flops/sec or FPS.  This small size will allow computers to live both within andThis small size will allow computers to live both within and alongside the human cell. The level of 10 trillion FPS exceeds thealongside the human cell. The level of 10 trillion FPS exceeds the processing rate at roughly 10processing rate at roughly 101515 FPS of the human brain.FPS of the human brain.
  • 11. Future Cyborg/TelemetryFuture Cyborg/Telemetry  4G networks and successors, with gigabit bandwidth backbones, robust4G networks and successors, with gigabit bandwidth backbones, robust networking infrastructure, high-speed relays and unlimited power withnetworking infrastructure, high-speed relays and unlimited power with recharging capabilities will serve as the medium through which feature-recharging capabilities will serve as the medium through which feature- rich anatomical smart prosthetics operate creating a explosion of datarich anatomical smart prosthetics operate creating a explosion of data that will be used for cyber social programming.that will be used for cyber social programming.  Cybersecurity will become a subject alongside the list of diseases forCybersecurity will become a subject alongside the list of diseases for agencies such as NIH, the CDC or the FDA, as they look foragencies such as NIH, the CDC or the FDA, as they look for prescriptions for thwarting network attacks, fraud, and physical injuryprescriptions for thwarting network attacks, fraud, and physical injury to those that have implantable technology. Concerns may take manyto those that have implantable technology. Concerns may take many forms, some yet to be discovered: surveillance, denial of service attacks.forms, some yet to be discovered: surveillance, denial of service attacks.  Advances in computing, communications, software, and anatomicallyAdvances in computing, communications, software, and anatomically embedded hardware will transform an individual’s relationship toembedded hardware will transform an individual’s relationship to business and government where there will be as great a dependence onbusiness and government where there will be as great a dependence on digital infrastructure as there will be for food and water.digital infrastructure as there will be for food and water.
  • 12. Anticipated Effects on theAnticipated Effects on the PopulationPopulation  Individuals with knowledge-based and skills-based enhancementsIndividuals with knowledge-based and skills-based enhancements will be the new expert class, cognoscenti and leaders that have awill be the new expert class, cognoscenti and leaders that have a built-in ability for superior analysis, judgment and timely decisions.built-in ability for superior analysis, judgment and timely decisions.  In the far future cloud computing will be how population-wideIn the far future cloud computing will be how population-wide management and control will be carried out with competingmanagement and control will be carried out with competing paradigms vying for an individual’s portfolio of enhanced abilitiesparadigms vying for an individual’s portfolio of enhanced abilities and health related processes, not different from how one might todayand health related processes, not different from how one might today choose everything from a stock broker to a physician.choose everything from a stock broker to a physician.  Physicians of the future will be versed in cyber-topics includingPhysicians of the future will be versed in cyber-topics including algorithmic and application formulations, programming models andalgorithmic and application formulations, programming models and systems, runtime systems, middleware, and end-to-end applicationsystems, runtime systems, middleware, and end-to-end application workflows, concerns of today’s system engineers.workflows, concerns of today’s system engineers.
  • 13. Transformed MedicineTransformed Medicine  A router/modem feature embedded in the anatomy can access medical careA router/modem feature embedded in the anatomy can access medical care day or night through a wireless connection.day or night through a wireless connection.  An expert computer process will narrowed symptoms to a range of maladies,An expert computer process will narrowed symptoms to a range of maladies, patients will participate in their own diagnosis.patients will participate in their own diagnosis.  To the extent a doctor’s intervention is required, a doctor best equipped toTo the extent a doctor’s intervention is required, a doctor best equipped to deal with the intake diagnosis will be either contacted or a referral made bydeal with the intake diagnosis will be either contacted or a referral made by the computer.the computer.  A worldwide grid will tune in on millions of individuals feeding searchableA worldwide grid will tune in on millions of individuals feeding searchable public health databases using a patient’s anatomical data to update an expertpublic health databases using a patient’s anatomical data to update an expert system.system.  At this stage public health service will be completely “predictive, preventive,At this stage public health service will be completely “predictive, preventive, personalized, and participatory”—, in most cases without the patient beingpersonalized, and participatory”—, in most cases without the patient being aware of data being transmitted and collected.aware of data being transmitted and collected.
  • 14. Situating the RiskSituating the Risk A Real World ExampleA Real World Example  The Medical Device Security Center operates as a private partnership between BethThe Medical Device Security Center operates as a private partnership between Beth Israel Deaconess Medical Center, Harvard Medical School, the University ofIsrael Deaconess Medical Center, Harvard Medical School, the University of Massachusetts Amherst, and the University of Washington mission the balancingMassachusetts Amherst, and the University of Washington mission the balancing security, privacy, safety, and effectiveness for next-generation medical healthcaresecurity, privacy, safety, and effectiveness for next-generation medical healthcare devices.devices.  In one study researchers investigated whether hackers could gain wireless access toIn one study researchers investigated whether hackers could gain wireless access to combination heart defibrillator/pacemakers that allow doctors to monitor and adjustcombination heart defibrillator/pacemakers that allow doctors to monitor and adjust operating parameters remotely.operating parameters remotely.  The experiment simulated the effects of a “hacker” using a readily availableThe experiment simulated the effects of a “hacker” using a readily available commercial programmer and a software radio that can be purchased on eBay,commercial programmer and a software radio that can be purchased on eBay, reprogram the device, shut it down, deplete its battery, or deliver jolts of electricity thatreprogram the device, shut it down, deplete its battery, or deliver jolts of electricity that could be potentially fatal to a would-be patient.could be potentially fatal to a would-be patient.
  • 15. Legal Considerations dealing withLegal Considerations dealing with Protection of the PublicProtection of the Public  Regulatory considerations to insure efficacy andRegulatory considerations to insure efficacy and safety, through testing, licensing, enforcement.safety, through testing, licensing, enforcement.  Criminal law to deter crimes, such as hacking,Criminal law to deter crimes, such as hacking, that jeopardize safety of individuals, and thethat jeopardize safety of individuals, and the systems that “wire” classes of subscribingsystems that “wire” classes of subscribing individuals into servers and databases.individuals into servers and databases.  Civil actions that allow individuals and classes toCivil actions that allow individuals and classes to seek redress for negligence, product liability, andseek redress for negligence, product liability, and warranty.warranty.
  • 16. Legal Considerations dealing withLegal Considerations dealing with PropertyProperty  Whether the systems that operate large scale networks thatWhether the systems that operate large scale networks that telemeter to individuals will be subject to business methodtelemeter to individuals will be subject to business method patenting.patenting.  Whether open sourcing of software that runs the internal andWhether open sourcing of software that runs the internal and external software processes will become the preferred paradigm.external software processes will become the preferred paradigm.  Who will own/operate the servers and databases, pricing, access.Who will own/operate the servers and databases, pricing, access.  What licensing restrictions will be allowed, internal software?What licensing restrictions will be allowed, internal software?
  • 17. Distributive Justice IssuesDistributive Justice Issues  Future computational/telemetry processing therapies might go beyondFuture computational/telemetry processing therapies might go beyond health-related purposes to provide a greater level of intellectual quickness orhealth-related purposes to provide a greater level of intellectual quickness or greater access to commercial opportunities, who will be the beneficiaries?greater access to commercial opportunities, who will be the beneficiaries?  Part of what will distinguish the future human population having implantedPart of what will distinguish the future human population having implanted computational devices connected to the world-wide-web from a populationcomputational devices connected to the world-wide-web from a population that does not, will be the enhancements that open vast benefits for thethat does not, will be the enhancements that open vast benefits for the “haves” and consequent potential detriments for the “have nots.”.“haves” and consequent potential detriments for the “have nots.”.  Society, the world over needs to decide if any corporation, institution, orSociety, the world over needs to decide if any corporation, institution, or individual should have the right to private ownership of certain forms ofindividual should have the right to private ownership of certain forms of cyborgized property—most notably, life saving devices and selected methodscyborgized property—most notably, life saving devices and selected methods of extending life and enhancing intelligence or skills.of extending life and enhancing intelligence or skills.