Search This Blog

Sunday, February 17, 2019

Neuroprosthetics

From Wikipedia, the free encyclopedia

Neuroprosthetics (also called neural prosthetics) is a discipline related to neuroscience and biomedical engineering concerned with developing neural prostheses. They are sometimes contrasted with a brain–computer interface, which connects the brain to a computer rather than a device meant to replace missing biological functionality.

Neural prostheses are a series of devices that can substitute a motor, sensory or cognitive modality that might have been damaged as a result of an injury or a disease. Cochlear implants provide an example of such devices. These devices substitute the functions performed by the ear drum and stapes while simulating the frequency analysis performed in the cochlea. A microphone on an external unit gathers the sound and processes it; the processed signal is then transferred to an implanted unit that stimulates the auditory nerve through a microelectrode array. Through the replacement or augmentation of damaged senses, these devices intend to improve the quality of life for those with disabilities. 

These implantable devices are also commonly used in animal experimentation as a tool to aid neuroscientists in developing a greater understanding of the brain and its functioning. By wirelessly monitoring the brain's electrical signals sent out by electrodes implanted in the subject's brain, the subject can be studied without the device affecting the results. 

Accurately probing and recording the electrical signals in the brain would help better understand the relationship among a local population of neurons that are responsible for a specific function. 

Neural implants are designed to be as small as possible in order to be minimally invasive, particularly in areas surrounding the brain, eyes or cochlea. These implants typically communicate with their prosthetic counterparts wirelessly. Additionally, power is currently received through wireless power transmission through the skin. The tissue surrounding the implant is usually highly sensitive to temperature rise, meaning that power consumption must be minimal in order to prevent tissue damage.

The neuroprosthetic currently undergoing the most widespread use is the cochlear implant, with over 300,000 in use worldwide as of 2012.

History

The first known cochlear implant was created in 1957. Other milestones include the first motor prosthesis for foot drop in hemiplegia in 1961, the first auditory brainstem implant in 1977 and a peripheral nerve bridge implanted into the spinal cord of an adult rat in 1981. In 1988, the lumbar anterior root implant and functional electrical stimulation (FES) facilitated standing and walking, respectively, for a group of paraplegics.

Regarding the development of electrodes implanted in the brain, an early difficulty was reliably locating the electrodes, originally done by inserting the electrodes with needles and breaking off the needles at the desired depth. Recent systems utilize more advanced probes, such as those used in deep brain stimulation to alleviate the symptoms of Parkinson's disease. The problem with either approach is that the brain floats free in the skull while the probe does not, and relatively minor impacts, such as a low speed car accident, are potentially damaging. Some researchers, such as Kensall Wise at the University of Michigan, have proposed tethering 'electrodes to be mounted on the exterior surface of the brain' to the inner surface of the skull. However, even if successful, tethering would not resolve the problem in devices meant to be inserted deep into the brain, such as in the case of deep brain stimulation (DBS).

Visual prosthetics

A visual prosthesis can create a sense of image by electrically stimulating neurons in the visual system. A camera would wirelessly transmit to an implant, the implant would map the image across an array of electrodes. The array of electrodes has to effectively stimulate 600-1000 locations, stimulating these optic neurons in the retina thus will create an image. The stimulation can also be done anywhere along the optic signal's path way. The optical nerve can be stimulated in order to create an image, or the visual cortex can be stimulated, although clinical tests have proven most successful for retinal implants. 

A visual prosthesis system consists of an external (or implantable) imaging system which acquires and processes the video. Power and data will be transmitted to the implant wirelessly by the external unit. The implant uses the received power/data to convert the digital data to an analog output which will be delivered to the nerve via micro electrodes. 

Photoreceptors are the specialized neurons that convert photons into electrical signals. They are part of the retina, a multilayer neural structure about 200 um thick that lines the back of the eye. The processed signal is sent to the brain through the optical nerve. If any part of this pathway is damaged blindness can occur. 

Blindness can result from damage to the optical pathway (cornea, aqueous humor, crystalline lens, and vitreous). This can happen as a result of accident or disease. The two most common retinal degenerative diseases that result in blindness secondary to photoreceptor loss is age related macular degeneration (AMD) and retinitis pigmentosa (RP). 

The first clinical trial of a permanently implanted retinal prosthesis was a device with a passive microphotodiode array with 3500 elements. This trial was implemented at Optobionics, Inc., in 2000. In 2002, Second Sight Medical Products, Inc. (Sylmar, CA) began a trial with a prototype epiretinal implant with 16 electrodes. The subjects were six individuals with bare light perception secondary to RP. The subjects demonstrated their ability to distinguish between three common objects (plate, cup, and knife) at levels statistically above chance. An active sub retinal device developed by Retina Implant GMbH (Reutlingen, Germany) began clinical trials in 2006. An IC with 1500 microphotodiodes was implanted under the retina. The microphotodiodes serve to modulate current pulses based on the amount of light incident on the photo diode.

The seminal experimental work towards the development of visual prostheses was done by cortical stimulation using a grid of large surface electrodes. In 1968 Giles Brindley implanted an 80 electrode device on the visual cortical surface of a 52-year-old blind woman. As a result of the stimulation the patient was able to see phosphenes in 40 different positions of the visual field. This experiment showed that an implanted electrical stimulator device could restore some degree of vision. Recent efforts in visual cortex prosthesis have evaluated efficacy of visual cortex stimulation in a non-human primate. In this experiment after a training and mapping process the monkey is able to perform the same visual saccade task with both light and electrical stimulation.

The requirements for a high resolution retinal prosthesis should follow from the needs and desires of blind individuals who will benefit from the device. Interactions with these patients indicate that mobility without a cane, face recognition and reading are the main necessary enabling capabilities.

The results and implications of fully functional visual prostheses are exciting. However, the challenges are grave. In order for a good quality image to be mapped in the retina a high number of micro-scale electrode arrays are needed. Also, the image quality is dependent on how much information can be sent over the wireless link. Also this high amount of information must be received and processed by the implant without much power dissipation which can damage the tissue. The size of the implant is also of great concern. Any implant would be preferred to be minimally invasive.

With this new technology, several scientists, including Karen Moxon at Drexel, John Chapin at SUNY, and Miguel Nicolelis at Duke University, started research on the design of a sophisticated visual prosthesis. Other scientists have disagreed with the focus of their research, arguing that the basic research and design of the densely populated microscopic wire was not sophisticated enough to proceed.

Auditory prosthetics

Cochlear implants (CIs), auditory brain stem implants (ABIs), and auditory midbrain implants (AMIs) are the three main categories for auditory prostheses. CI electrode arrays are implanted in the cochlea, ABI electrode arrays stimulate the cochlear nucleus complex in the lower brain stem, and AMIs stimulates auditory neurons in the inferior colliculus. Cochlear implants have been very successful among these three categories. Today the Advanced Bionics Corporation, the Cochlear Corporation and the Med-El Corporation are the major commercial providers of cochlea implants. 

In contrast to traditional hearing aids that amplify sound and send it through the external ear, cochlear implants acquire and process the sound and convert it into electrical energy for subsequent delivery to the auditory nerve. The microphone of the CI system receives sound from the external environment and sends it to processor. The processor digitizes the sound and filters it into separate frequency bands that are sent to the appropriate tonotonic region in the cochlea that approximately corresponds to those frequencies. 

In 1957, French researchers A. Djourno and C. Eyries, with the help of D. Kayser, provided the first detailed description of directly stimulation the auditory nerve in a human subject. The individuals described hearing chirping sounds during simulation. In 1972, the first portable cochlear implant system in an adult was implanted at the House Ear Clinic. The U.S. Food and Drug Administration (FDA) formally approved the marketing of the House-3M cochlear implant in November 1984.

Improved performance on cochlear implant not only depends on understanding the physical and biophysical limitations of implant stimulation but also on an understanding of the brain's pattern processing requirements. Modern signal processing represents the most important speech information while also providing the brain the pattern recognition information that it needs. Pattern recognition in the brain is more effective than algorithmic preprocessing at identifying important features in speech. A combination of engineering, signal processing, biophysics, and cognitive neuroscience was necessary to produce the right balance of technology to maximize the performance of auditory prosthesis.

Cochlear implants have been also used to allow acquiring of spoken language development in congenitally deaf children, with remarkable success in early implants (before 2–4 years of life have been reached). There have been about 80,000 children implanted worldwide.

The concept of combining simultaneous electric-acoustic stimulation (EAS) for the purposes of better hearing was first described by C. von Ilberg and J. Kiefer, from the Universitätsklinik Frankfurt, Germany, in 1999. That same year the first EAS patient was implanted. Since the early 2000s FDA has been involved in a clinical trial of device termed the "Hybrid" by Cochlear Corporation. This trial is aimed at examining the usefulness of cochlea implantation in patients with residual low-frequency hearing. The "Hybrid" utilizes a shorter electrode than the standard cochlea implant, since the electrode is shorter it stimulates the basil region of the cochlea and hence the high-frequency tonotopic region. In theory these devices would benefit patients with significant low-frequency residual hearing who have lost perception in the speech frequency range and hence have decreased discrimination scores.

Prosthetics for pain relief

The SCS (Spinal Cord Stimulator) device has two main components: an electrode and a generator. The technical goal of SCS for neuropathic pain is to mask the area of a patient's pain with a stimulation induced tingling, known as "paresthesia", because this overlap is necessary (but not sufficient) to achieve pain relief. Paresthesia coverage depends upon which afferent nerves are stimulated. The most easily recruited by a dorsal midline electrode, close to the pial surface of spinal cord, are the large dorsal column afferents, which produce broad paresthesia covering segments caudally. 

In ancient times the electrogenic fish was used as a shocker to subside pain. Healers had developed specific and detailed techniques to exploit the generative qualities of the fish to treat various types of pain, including headache. Because of the awkwardness of using a living shock generator, a fair level of skill was required to deliver the therapy to the target for the proper amount of time. (Including keeping the fish alive as long as possible) Electro analgesia was the first deliberate application of electricity. By the nineteenth century, most western physicians were offering their patients electrotherapy delivered by portable generator. In the mid-1960s, however, three things converged to ensure the future of electro stimulation.
  1. Pacemaker technology, which had it start in 1950, became available.
  2. Melzack and Wall published their gate control theory of pain, which proposed that the transmission of pain could be blocked by stimulation of large afferent fibers.
  3. Pioneering physicians became interested in stimulating the nervous system to relieve patients from pain.
The design options for electrodes include their size, shape, arrangement, number, and assignment of contacts and how the electrode is implanted. The design option for the pulse generator include the power source, target anatomic placement location, current or voltage source, pulse rate, pulse width, and number of independent channels. Programming options are very numerous (a four-contact electrode offers 50 functional bipolar combinations). The current devices use computerized equipment to find the best options for use. This reprogramming option compensates for postural changes, electrode migration, changes in pain location, and suboptimal electrode placement.

Motor prosthetics

Devices which support the function of autonomous nervous system include the implant for bladder control. In the somatic nervous system attempts to aid conscious control of movement include Functional electrical stimulation and the lumbar anterior root stimulator.

Bladder control implants

Where a spinal cord lesion leads to paraplegia, patients have difficulty emptying their bladders and this can cause infection. From 1969 onwards Brindley developed the sacral anterior root stimulator, with successful human trials from the early 1980s onwards. This device is implanted over the sacral anterior root ganglia of the spinal cord; controlled by an external transmitter, it delivers intermittent stimulation which improves bladder emptying. It also assists in defecation and enables male patients to have a sustained full erection. 

The related procedure of sacral nerve stimulation is for the control of incontinence in able-bodied patients.

Motor prosthetics for conscious control of movement

Researchers are currently investigating and building motor neuroprosthetics that will help restore movement and the ability to communicate with the outside world to persons with motor disabilities such as tetraplegia or amyotrophic lateral sclerosis. Research has found that the striatum plays a crucial role in motor sensory learning. This was demonstrated by an experiment in which lab rats' firing rates of the striatum was recorded at higher rates after performing a task consecutively. 

To capture electrical signals from the brain, scientists have developed microelectrode arrays smaller than a square centimeter that can be implanted in the skull to record electrical activity, transducing recorded information through a thin cable. After decades of research in monkeys, neuroscientists have been able to decode neuronal signals into movements. Completing the translation, researchers have built interfaces that allow patients to move computer cursors, and they are beginning to build robotic limbs and exoskeletons that patients can control by thinking about movement. 

The technology behind motor neuroprostheses is still in its infancy. Investigators and study participants continue to experiment with different ways of using the prostheses. Having a patient think about clenching a fist, for example, produces a different result than having him or her think about tapping a finger. The filters used in the prostheses are also being fine-tuned, and in the future, doctors hope to create an implant capable of transmitting signals from inside the skull wirelessly, as opposed to through a cable. 

Preliminary clinical trials suggest that the devices are safe and that they have the potential to be effective. Some patients have worn the devices for over two years with few, if any, ill effects.

Prior to these advancements, Philip Kennedy (Emory and Georgia Tech) had an operable if somewhat primitive system which allowed an individual with paralysis to spell words by modulating their brain activity. Kennedy's device used two neurotrophic electrodes: the first was implanted in an intact motor cortical region (e.g. finger representation area) and was used to move a cursor among a group of letters. The second was implanted in a different motor region and was used to indicate the selection.

Developments continue in replacing lost arms with cybernetic replacements by using nerves normally connected to the pectoralis muscles. These arms allow a slightly limited range of motion, and reportedly are slated to feature sensors for detecting pressure and temperature.

Dr. Todd Kuiken at Northwestern University and Rehabilitation Institute of Chicago has developed a method called targeted reinnervation for an amputee to control motorized prosthetic devices and to regain sensory feedback.

Sensory/motor prosthetics

In 2002 a Multielectrode array of 100 electrodes, which now forms the sensor part of a Braingate, was implanted directly into the median nerve fibers of scientist Kevin Warwick. The recorded signals were used to control a robot arm developed by Warwick's colleague, Peter Kyberd and was able to mimic the actions of Warwick's own arm. Additionally, a form of sensory feedback was provided via the implant by passing small electrical currents into the nerve. This caused a contraction of the first lumbrical muscle of the hand and it was this movement that was perceived.

Surgical Innovations for Neural Interfacing

The MIT Biomechatronics Group has designed a novel amputation paradigm that enables biological muscles and myoelectric prostheses to interface neurally with high reliability. This surgical paradigm, termed the agonist-antagonist myoneural interface (AMI), provides the user with the ability to sense and control their prosthetic limb as an extension of their own body, rather than using a prosthetic that merely resembles an appendage. In a normal agonist-antagonist muscle pair relationship (e.g. bicep-tricep), when the agonist muscle contracts, the antagonist muscle is stretched, and vice versa, providing one with the knowledge of the position of one's limb without even having to look at it. During a standard amputation, agonist-antagonist muscles (e.g. bicep-tricep) are isolated from each other, preventing the ability to have the dynamic contract-extend mechanism that generates sensory feedback. Therefore, current amputees have no way of feeling the physical environment their prosthetic limb encounters. Moreover, with the current amputation surgery which has been in place for over 200 years, 1/3 patients undergo revision surgeries due to pain in their stumps. 

An AMI is composed of two muscles that originally shared an agonist-antagonist relationship. During the amputation surgery, these two muscles are mechanically linked together within the amputated stump. One AMI muscle pair can be created for each joint degree of freedom in a patient in order to establish control and sensation of multiple prosthetic joints. In preliminary testing of this new neural interface, patients with an AMI have demonstrated and reported greater control over the prosthesis. Additionally, more naturally reflexive behavior during stair walking was observed compared to subjects with a traditional amputation. An AMI can also be constructed through the combination of two devascularized muscle grafts. These muscle grafts (or flaps) are spare muscle that is denervated (detached from original nerves) and removed from one part of the body to be re-innervated by severed nerves found in the limb to be amputated. Through the use of regenerated muscle flaps, AMIs can be created for patients with muscle tissue that has experienced extreme atrophy or damage or for patients who are undergoing revision of an amputated limb for reasons such as neuroma pain, bone spurs, etc.

Obstacles

Mathematical modelling

Accurate characterization of the nonlinear input/output (I/O) parameters of the normally functioning tissue to be replaced is paramount to designing a prosthetic that mimics normal biologic synaptic signals. Mathematical modeling of these signals is a complex task "because of the nonlinear dynamics inherent in the cellular/molecular mechanisms comprising neurons and their synaptic connections". The output of nearly all brain neurons are dependent on which post-synaptic inputs are active and in what order the inputs are received. (spatial and temporal properties, respectively).

Once the I/O parameters are modeled mathematically, integrated circuits are designed to mimic the normal biologic signals. For the prosthetic to perform like normal tissue, it must process the input signals, a process known as transformation, in the same way as normal tissue.

Size

Implantable devices must be very small to be implanted directly in the brain, roughly the size of a quarter. One of the example of microimplantable electrode array is the Utah array.

Wireless controlling devices can be mounted outside of the skull and should be smaller than a pager.

Power consumption

Power consumption drives battery size. Optimization of the implanted circuits reduces power needs. Implanted devices currently need on-board power sources. Once the battery runs out, surgery is needed to replace the unit. Longer battery life correlates to fewer surgeries needed to replace batteries. One option that could be used to recharge implant batteries without surgery or wires is being used in powered toothbrushes. These devices make use of inductive coupling to recharge batteries. Another strategy is to convert electromagnetic energy into electrical energy, as in radio-frequency identification tags.

Biocompatibility

Cognitive prostheses are implanted directly in the brain, so biocompatibility is a very important obstacle to overcome. Materials used in the housing of the device, the electrode material (such as iridium oxide), and electrode insulation must be chosen for long term implantation. Subject to Standards: ISO 14708-3 2008-11-15, Implants for Surgery - Active implantable medical devices Part 3: Implantable neurostimulators. 

Crossing the blood–brain barrier can introduce pathogens or other materials that may cause an immune response. The brain has its own immune system that acts differently from the immune system of the rest of the body. 

Questions to answer: How does this affect material choice? Does the brain have unique phages that act differently and may affect materials thought to be biocompatible in other areas of the body?

Data transmission

Wireless Transmission is being developed to allow continuous recording of neuronal signals of individuals in their daily life. This allows physicians and clinicians to capture more data, ensuring that short term events like epileptic seizures can be recorded, allowing better treatment and characterization of neural disease. 

A small, light weight device has been developed that allows constant recording of primate brain neurons at Stanford University. This technology also enables neuroscientists to study the brain outside of the controlled environment of a lab.

Methods of data transmission must be robust and secure. Neurosecurity is a new issue. Makers of cognitive implants must prevent unwanted downloading of information or thoughts from and uploading of detrimental data to the device that may interrupt function.

Correct implantation

Implantation of the device presents many problems. First, the correct presynaptic inputs must be wired to the correct postsynaptic inputs on the device. Secondly, the outputs from the device must be targeted correctly on the desired tissue. Thirdly, the brain must learn how to use the implant. Various studies in brain plasticity suggest that this may be possible through exercises designed with proper motivation.

Technologies involved

Local field potentials

Local field potentials (LFPs) are electrophysiological signals that are related to the sum of all dendritic synaptic activity within a volume of tissue. Recent studies suggest goals and expected value are high-level cognitive functions that can be used for neural cognitive prostheses. Also, Rice University scientists have discovered a new method to tune the light-induced vibrations of nanoparticles through slight alterations to the surface to which the particles are attached. According to the university, the discovery could lead to new applications of photonics from molecular sensing to wireless communications. They used ultrafast laser pulses to induce the atoms in gold nanodisks to vibrate.

Automated movable electrical probes

One hurdle to overcome is the long term implantation of electrodes. If the electrodes are moved by physical shock or the brain moves in relation to electrode position, the electrodes could be recording different nerves. Adjustment to electrodes is necessary to maintain an optimal signal. Individually adjusting multi electrode arrays is a very tedious and time consuming process. Development of automatically adjusting electrodes would mitigate this problem. Anderson's group is currently collaborating with Yu-Chong Tai's lab and the Burdick lab (all at Caltech) to make such a system that uses electrolysis-based actuators to independently adjust electrodes in a chronically implanted array of electrodes.

Imaged guided surgical techniques

Image-guided surgery is used to precisely position brain implants.

Cybercrime

From Wikipedia, the free encyclopedia

Cybercrime, or computer-oriented crime, is the crime that involves a computer and a network.The computer may have been used in the commission of a crime, or it may be the target. Cybercrimes can be defined as "Offenses that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)". Cybercrime may threaten a person or a nation's security and financial health. Issues surrounding these types of crimes have become high-profile, particularly those surrounding hacking, copyright infringement, unwarranted mass-surveillance, sextortion, child pornography, and child grooming. There are also problems of privacy when confidential information is intercepted or disclosed, lawfully or otherwise. Debarati Halder and K. Jaishankar further define cybercrime from the perspective of gender and defined 'cybercrime against women' as "Crimes targeted against women with a motive to intentionally harm the victim psychologically and physically, using modern telecommunication networks such as internet and mobile phones". Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Cybercrimes crossing international borders and involving the actions of at least one nation state is sometimes referred to as cyberwarfare

A report (sponsored by McAfee), published in 2014, estimated that the annual damage to the global economy was $445 billion. Approximately $1.5 billion was lost in 2012 to online credit and debit card fraud in the US. In 2018, a study by Center for Strategic and International Studies (CSIS), in partnership with McAfee, concludes that close to $600 billion, nearly one percent of global GDP, is lost to cybercrime each year.

Classifications

Computer crime encompasses a broad range of activities.

Financial fraud crimes

Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss. In this context, the fraud will result in obtaining a benefit by:
  • Altering in an unauthorized way. This requires little technical expertise and is common form of theft by employees altering the data before entry or entering false data, or by entering unauthorized instructions or using unauthorized processes;
  • Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions. This is difficult to detect;
  • Altering or deleting stored data.
Other forms of fraud may be facilitated using computer systems, including bank fraud, carding, identity theft, extortion, and theft of classified information.

Cyberterrorism

Government officials and information technology security specialists have documented a significant increase in Internet problems and server scans since early 2001. But there is a growing concern among government agencies such as the Federal Bureau of Investigations (FBI) and the Central Intelligence Agency (CIA) that such intrusions are part of an organized effort by cyberterrorists, foreign intelligence services, or other groups to map potential security holes in critical systems. A cyberterrorist is someone who intimidates or coerces a government or an organization to advance his or her political or social objectives by launching a computer-based attack against computers, networks, or the information stored on them. 

Cyberterrorism in general can be defined as an act of terrorism committed through the use of cyberspace or computer resources (Parker 1983). As such, a simple propaganda piece in the Internet that there will be bomb attacks during the holidays can be considered cyberterrorism. There are also hacking activities directed towards individuals, families, organized by groups within networks, tending to cause fear among people, demonstrate power, collecting information relevant for ruining peoples' lives, robberies, blackmailing etc.

Cyberextortion

Cyberextortion occurs when a website, e-mail server, or computer system is subjected to or threatened with repeated denial of service or other attacks by malicious hackers. These hackers demand money in return for promising to stop the attacks and to offer "protection". According to the Federal Bureau of Investigation, cybercrime extortionists are increasingly attacking corporate websites and networks, crippling their ability to operate and demanding payments to restore their service. More than 20 cases are reported each month to the FBI and many go unreported in order to keep the victim's name out of the public domain. Perpetrators typically use a distributed denial-of-service attack. However, other cyberextortion techniques exist such as doxing extortion and bug poaching

An example of cyberextortion was the attack on Sony Pictures of 2014.

Cyberwarfare

Sailors analyze, detect and defensively respond to unauthorized activity within U.S. Navy information systems and computer networks

The U.S. Department of Defense (DoD) notes that the cyberspace has emerged as a national-level concern through several recent events of geostrategic significance. Among those are included, the attack on Estonia's infrastructure in 2007, allegedly by Russian hackers. "In August 2008, Russia again allegedly conducted cyberattacks, this time in a coordinated and synchronized kinetic and non-kinetic campaign against the country of Georgia. The December 2015 Ukraine power grid cyberattack has also been attributed to Russia and is considered the first successful cyberattack on a power grid. Fearing that such attacks may become the norm in future warfare among nation-states, the concept of cyberspace operations impacts and will be adapted by military commanders in the future.

Computer as a target

These crimes are committed by a selected group of criminals. Unlike crimes using the computer as a tool, these crimes require the technical knowledge of the perpetrators. As such, as technology evolves, so too does the nature of the crime. These crimes are relatively new, having been in existence for only as long as computers have—which explains how unprepared society and the world in general is towards combating these crimes. There are numerous crimes of this nature committed daily on the internet. 

Crimes that primarily target computer networks or devices include:

Computer as a tool

When the individual is the main target of cybercrime, the computer can be considered as the tool rather than the target. These crimes generally involve less technical expertise. Human weaknesses are generally exploited. The damage dealt is largely psychological and intangible, making legal action against the variants more difficult. These are the crimes which have existed for centuries in the offline world. Scams, theft, and the likes have existed even before the development in high-tech equipment. The same criminal has simply been given a tool which increases their potential pool of victims and makes them all the harder to trace and apprehend.

Crimes that use computer networks or devices to advance other ends include:
  • Fraud and identity theft (although this increasingly uses malware, hacking or phishing, making it an example of both "computer as target" and "computer as tool" crime)
  • Information warfare
  • Phishing scams
  • Spam
  • Propagation of illegal obscene or offensive content, including harassment and threats
The unsolicited sending of bulk email for commercial purposes (spam) is unlawful in some jurisdictions

Phishing is mostly propagated via email. Phishing emails may contain links to other websites that are affected by malware. Or, they may contain links to fake online banking or other websites used to steal private account information.

Obscene or offensive content

The content of websites and other electronic communications may be distasteful, obscene or offensive for a variety of reasons. In some instances these communications may be illegal. 

The extent to which these communications are unlawful varies greatly between countries, and even within nations. It is a sensitive area in which the courts can become involved in arbitrating between groups with strong beliefs. 

One area of Internet pornography that has been the target of the strongest efforts at curtailment is child pornography, which is illegal in most jurisdictions in the world.
Online harassment
Various aspects needed to be considered when understanding harassment online.

Whereas content may be offensive in a non-specific way, harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation. This often occurs in chat rooms, through newsgroups, and by sending hate e-mail to interested parties. Harassment on the internet also includes revenge porn

There are instances where committing a crime using a computer can lead to an enhanced sentence. For example, in the case of United States v. Neil Scott Kramer, Kramer was served an enhanced sentence according to the U.S. Sentencing Guidelines Manual §2G1.3(b)(3) for his use of a cell phone to "persuade, induce, entice, coerce, or facilitate the travel of, the minor to engage in prohibited sexual conduct." Kramer argued that this claim was insufficient because his charge included persuading through a computer device and his cellular phone technically is not a computer. Although Kramer tried to argue this point, U.S. Sentencing Guidelines Manual states that the term computer "means an electronic, magnetic, optical, electrochemically, or other high-speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such device."

Connecticut was the U.S. state to pass a statute making it a criminal offense to harass someone by computer. Michigan, Arizona, and Virginia and South Carolina have also passed laws banning harassment by electronic means.

Harassment as defined in the U.S. computer statutes is typically distinct from cyberbullying, in that the former usually relates to a person's "use a computer or computer network to communicate obscene, vulgar, profane, lewd, lascivious, or indecent language, or make any suggestion or proposal of an obscene nature, or threaten any illegal or immoral act," while the latter need not involve anything of a sexual nature. 

Although freedom of speech is protected by law in most democratic societies (in the US this is done by the First Amendment), it does not include all types of speech. In fact spoken or written "true threat" speech/text is criminalized because of "intent to harm or intimidate", that also applies for online or any type of network related threats in written text or speech. The US Supreme Court definition of "true threat" is "statements where the speaker means to communicate a serious expression of an intent to commit an act of unlawful violence to a particular individual or group".

Drug trafficking

Darknet markets are used to buy and sell recreational drugs online. Some drug traffickers use encrypted messaging tools to communicate with drug mules. The dark web site Silk Road was a major online marketplace for drugs before it was shut down by law enforcement (then reopened under new management, and then shut down by law enforcement again). After Silk Road 2.0 went down, Silk Road 3 Reloaded emerged. However, it was just an older marketplace named Diabolus Market, that used the name for more exposure from the brand's previous success.

Documented cases

  • One of the highest profiled banking computer crime occurred during a course of three years beginning in 1970. The chief teller at the Park Avenue branch of New York's Union Dime Savings Bank embezzled over $1.5 million from hundreds of accounts.
  • A hacking group called MOD (Masters of Deception), allegedly stole passwords and technical data from Pacific Bell, Nynex, and other telephone companies as well as several big credit agencies and two major universities. The damage caused was extensive, one company, Southwestern Bell suffered losses of $370,000 alone.
  • In 1983, a 19-year-old UCLA student used his PC to break into a Defense Department International Communications system.
  • Between 1995 and 1998 the Newscorp satellite pay to view encrypted SKY-TV service was hacked several times during an ongoing technological arms race between a pan-European hacking group and Newscorp. The original motivation of the hackers was to watch Star Trek reruns in Germany; which was something which Newscorp did not have the copyright to allow.
  • On 26 March 1999, the Melissa worm infected a document on a victim's computer, then automatically sent that document and a copy of the virus spread via e-mail to other people.
  • In February 2000, an individual going by the alias of MafiaBoy began a series denial-of-service attacks against high-profile websites, including Yahoo!, Dell, Inc., E*TRADE, eBay, and CNN. About 50 computers at Stanford University, and also computers at the University of California at Santa Barbara, were among the zombie computers sending pings in DDoS attacks. On 3 August 2000, Canadian federal prosecutors charged MafiaBoy with 54 counts of illegal access to computers, plus a total of ten counts of mischief to data for his attacks.
  • The Stuxnet worm corrupted SCADA microprocessors, particularly of the types used in Siemens centrifuge controllers.
  • The Russian Business Network (RBN) was registered as an internet site in 2006. Initially, much of its activity was legitimate. But apparently, the founders soon discovered that it was more profitable to host illegitimate activities and started hiring its services to criminals. The RBN has been described by VeriSign as "the baddest of the bad". It offers web hosting services and internet access to all kinds of criminal and objectionable activities, with individual activities earning up to $150 million in one year. It specialized in and in some cases monopolized personal identity theft for resale. It is the originator of MPack and an alleged operator of the now defunct Storm botnet.
  • On 2 March 2010, Spanish investigators arrested 3 in infection of over 13 million computers around the world. The "botnet" of infected computers included PCs inside more than half of the Fortune 1000 companies and more than 40 major banks, according to investigators.
  •  
  • In August 2010 the international investigation Operation Delego, operating under the aegis of the Department of Homeland Security, shut down the international pedophile ring Dreamboard. The website had approximately 600 members and may have distributed up to 123 terabytes of child pornography (roughly equivalent to 16,000 DVDs). To date this is the single largest U.S. prosecution of an international child pornography ring; 52 arrests were made worldwide.
  •  
  • In January 2012 Zappos.com experienced a security breach after as many as 24 million customers' credit card numbers, personal information, billing and shipping addresses had been compromised.
  •  
  • In June 2012 LinkedIn and eHarmony were attacked, compromising 65 million password hashes. 30,000 passwords were cracked and 1.5 million EHarmony passwords were posted online.
  • December 2012 Wells Fargo website experienced a denial of service attack. Potentially compromising 70 million customers and 8.5 million active viewers. Other banks thought to be compromised: Bank of America, J. P. Morgan U.S. Bank, and PNC Financial Services.
  • April 23, 2013 saw the Associated Press' Twitter account's hacked - the hacker posted a hoax tweet about fictitious attacks in the White House that they claimed left President Obama injured. This hoax tweet resulted in a brief plunge of 130 points from the Dow Jones Industrial Average, removal of $136 billion from S&P 500 index, and the temporary suspension of AP's Twitter account. The Dow Jones later restored its session gains.
  • In May 2017, 74 countries logged a ransomware cybercrime, called "WannaCry"
  • Illicit access to camera sensors, microphone sensors, phonebook contacts, all internet-enabled apps, and metadata of mobile telephones running Android and IOS were reportedly made accessible by Israeli spyware, found to be being in operation in at least 46 nation-states around the world. Journalists, Royalty and government officials were amongst the targets. Previous accusations of cases of Israeli-weapons companies meddling in international telephony and smartphones have been eclipsed in the 2018 reported case.

Combating computer crime

Diffusion of cybercrime

The broad diffusion of cybercriminal activities is an issue in computer crimes detection and prosecution. According to Jean-Loup Richet (Research Fellow at ESSEC ISIS), technical expertise and accessibility no longer act as barriers to entry into cybercrime. Indeed, hacking is much less complex than it was a few years ago, as hacking communities have greatly diffused their knowledge through the Internet. Blogs and communities have hugely contributed to information sharing: beginners could benefit from older hackers' knowledge and advice. Furthermore, hacking is cheaper than ever: before the cloud computing era, in order to spam or scam one needed a dedicated server, skills in server management, network configuration, and maintenance, knowledge of Internet service provider standards, etc. By comparison, a mail software-as-a-service is a scalable, inexpensive, bulk, and transactional e-mail-sending service for marketing purposes and could be easily set up for spam. Jean-Loup Richet explains that cloud computing could be helpful for a cybercriminal as a way to leverage his attack – brute-forcing a password, improve the reach of a botnet, or facilitating a spamming campaign.

Investigation

A computer can be a source of evidence. Even where a computer is not directly used for criminal purposes, it may contain records of value to criminal investigators in the form of a logfile. In most countries Internet Service Providers are required, by law, to keep their logfiles for a predetermined amount of time. For example; a European wide Data Retention Directive (applicable to all EU member states) states that all e-mail traffic should be retained for a minimum of 12 months. 

Methodology of cybercrime investigation 

There are many ways for cybercrime to take place, and investigations tend to start with an IP Address trace, however that is not necessarily a factual basis upon which detectives can solve a case. Different types of high-tech crime may also include elements of low-tech crime, and vice versa, making cybercrime investigators an indispensable part of modern law-enforcement. Methodology of cybercrime detective work is dynamic and is constantly improving, whether in closed police units, or in international cooperation framework.

Legislation

Due to easily exploitable laws, cybercriminals use developing countries in order to evade detection and prosecution from law enforcement. In developing countries, such as the Philippines, laws against cybercrime are weak or sometimes nonexistent. These weak laws allow cybercriminals to strike from international borders and remain undetected. Even when identified, these criminals avoid being punished or extradited to a country, such as the United States, that has developed laws that allow for prosecution. While this proves difficult in some cases, agencies, such as the FBI, have used deception and subterfuge to catch criminals. For example, two Russian hackers had been evading the FBI for some time. The FBI set up a fake computing company based in Seattle, Washington. They proceeded to lure the two Russian men into the United States by offering them work with this company. Upon completion of the interview, the suspects were arrested outside of the building. Clever tricks like this are sometimes a necessary part of catching cybercriminals when weak legislation makes it impossible otherwise.

President Barack Obama released in an executive order in April 2015 to combat cybercrime. The executive order allows the United States to freeze assets of convicted cybercriminals and block their economic activity within the United States. This is some of the first solid legislation that combats cybercrime in this way.

The European Union adopted directive 2013/40/EU. All offenses of the directive, and other definitions and procedural institutions are also in the Council of Europe's Convention on Cybercrime.

It is not only the USA and the European Union who are introducing new measures against cybercrime. ON 31 May 2017 China announced that its new cybersecurity law takes effect on this date.

Penalties

Penalties for computer-related crimes in New York State can range from a fine and a short period of jail time for a Class A misdemeanor such as unauthorized use of a computer up to computer tampering in the first degree which is a Class C felony and can carry 3 to 15 years in prison.

However, some hackers have been hired as information security experts by private companies due to their inside knowledge of computer crime, a phenomenon which theoretically could create perverse incentives. A possible counter to this is for courts to ban convicted hackers from using the Internet or computers, even after they have been released from prison – though as computers and the Internet become more and more central to everyday life, this type of punishment may be viewed as more and more harsh and draconian. However, nuanced approaches have been developed that manage cyber offenders' behavior without resorting to total computer or Internet bans. These approaches involve restricting individuals to specific devices which are subject to computer monitoring or computer searches by probation or parole officers.

Awareness

As technology advances and more people rely on the internet to store sensitive information such as banking or credit card information, criminals increasingly attempt to steal that information. Cybercrime is becoming more of a threat to people across the world. Raising awareness about how information is being protected and the tactics criminals use to steal that information continues to grow in importance. According to the FBI's Internet Crime Complaint Center in 2014, there were 269,422 complaints filed. With all the claims combined there was a reported total loss of $800,492,073. But cybercrime does yet seem to be on the average person's radar. There are 1.5 million cyber-attacks annually, that means that there are over 4,000 attacks a day, 170 attacks every hour, or nearly three attacks every minute, with studies showing us that only 16% of victims had asked the people who were carrying out the attacks to stop. Anybody who uses the internet for any reason can be a victim, which is why it is important to be aware of how one is being protected while online.

Intelligence

As cybercrime has proliferated, a professional ecosystem has evolved to support individuals and groups seeking to profit from cybercriminal activities. The ecosystem has become quite specialized, including malware developers, botnet operators, professional cybercrime groups, groups specializing in the sale of stolen content, and so forth. A few of the leading cybersecurity companies have the skills, resources and visibility to follow the activities of these individuals and group. A wide variety of information is available from these sources which can be used for defensive purposes, including technical indicators such as hashes of infected files or malicious IPs/URLs, as well as strategic information profiling the goals, techniques and campaigns of the profiled groups. Some of it is freely published, but consistent, on-going access typically requires subscribing to an adversary intelligence subscription service. At the level of an individual threat actor, threat intelligence is often referred to that actor's "TTP", or "tactics, techniques, and procedures," as the infrastructure, tools, and other technical indicators are often trivial for attackers to change. Corporate sectors are considering crucial role of artificial intelligence cyber security.

Agencies

Earth Is 'Missing' at Least 20 Ft of Sea Level Rise. Antarctica Could Be The Time Bomb

main article image
Mass change of Antarctica in the 20th century. (NASA's Scientific Visualization Studio)


Some 115,000 years ago, Homo sapiens were still living in bands of hunter gatherers, largely confined to Africa. We still shared the globe with the Neanderthals, although it's not clear we had met them yet.

And though these various hominids didn't know it, the Earth was coming to the end of a major warm period. It was one that's quite close to our current climate, but with one major discrepancy - seas at the time were 20 to 30 feet (6 to 9 meters) higher.

During this ancient period, sometimes called the Eemian, the oceans were about as warm as they are today.

And last month, intriguing new research emerged suggesting that Northern Hemisphere glaciers have already retreated just as far as they did in the Eemian, driven by dramatic warming in Arctic regions.

The finding arose when a team of researchers working on Baffin Island, in northeastern Canada, sampled the remains of ancient plants that had emerged from beneath fast-retreating mountain glaciers.

And they found that the plants were very old indeed, and had probably last grown in these spots some 115,000 years ago.

That's the last time the areas were actually not covered by ice, the scientists believe.

"It's very hard to come up with any other explanation, except that at least in that one area where we're working ... the last century is as warm as any century in the last 115,000 years," said Gifford Miller, a geologist at the University of Colorado in Boulder who led the research on Baffin Island.

But if Miller is right, there's a big problem. We have geological records of sea levels from the Eemian. And the oceans, scientists believe, were 20 to 30 feet (6 to 9 meters) higher.

Some extra water likely came from Greenland, whose ice currently contains over 20 feet (6 metres) of potential sea level rise. But it couldn't have been just Greenland, because that entire ice sheet did not melt at the time.

That's why researchers also suspect a collapse of the most vulnerable part of Antarctica, the West Antarctic ice sheet. This region could easily supply another 10 feet (3 metres) of sea level rise, or more.

"There's no way to get tens of meters of sea level rise without getting tens of meters of sea level rise from Antarctica," said Rob DeConto, an Antarctic expert at the University of Massachusetts.

Trying to understand how Antarctica will fall

Scientists are now intensely debating precisely which processes could have played out then — and how soon they'll play out again. After all, West Antarctica has already been shown, once again, to be beginning a retreat.

Some researchers, including DeConto, think they have found a key process - called marine ice cliff collapse - that can release a lot of sea level rise from West Antarctica in a hurry.

But they're being challenged by another group, whose members suspect the changes in the past were slow - and will be again.

To understand the dispute, consider the vulnerable setting of West Antarctica itself.

Essentially, it's an enormous block of ice mostly submerged in very cold water. Its glaciers sit up against the ocean in all directions, and toward the center of the ice sheet, the seafloor slopes rapidly downward, even as the surface of the ice sheet itself grows much thicker, as much as two miles thick in total.

As much as a mile and a half of that ice rests below the sea level, but there is still plenty of ice above it, too.

So if the gateway glaciers start to move backward - particularly a glacier named Thwaites, by far the largest of them - the ocean would quickly have access to much thicker ice.

The idea is that during the Eemian, this whole area was not a block of ice at all, but an unnamed sea. Somehow, the ocean got in, toppling the outer glacial defenses, and gradually setting all of West Antarctica afloat and on course to melting.

DeConto, with his colleague David Pollard, built a model that looked to the Eemian, and another ancient warm period called the Pliocene, to try to understand how this could happen.

In particular, they included two processes that can remove glaciers. One, dubbed 'marine ice sheet instability,' describes a situation in which a partially submerged glacier gets deeper and thicker as you move toward its center.

In this configuration, warm water can cause a glacier to move backward and downhill, exposing ever thicker ice to the ocean - and thicker ice flows outward faster.

So the loss feeds upon itself.

Marine ice sheet instability is probably underway already in West Antarctica, but in the model, it wasn't enough. DeConto and Pollard also added another process that they say is currently playing out in Greenland, at a large glacier called Jakobshavn.

Jakobshavn is moving backward down an undersea hill slope, just in the way that it is feared the much larger Thwaites will drift. But Jakobshavn is also doing something else. It is constantly breaking off thick pieces at its front, almost like a loaf of bread, dropping slice after slice.

That's because Jakobshavn no longer has an ice shelf, a floating extension that used to grow out over the ocean at the front of the glacier and stabilize it. The shelf collapsed as Greenland warmed in the past two decades.

As a result, Jakobshavn now presents a steep vertical front to the sea. Most of the glacier's ice is under the water, but more than 100 meters (330 feet) extend above it - and for DeConto and Pollard, that's the problem. That's too much to be sustained.

Ice is not steel. It breaks. And breaks. And breaks.

This additional process, called 'marine ice cliff collapse,' causes an utter disaster if you apply it to Thwaites. If Thwaites someday loses its own ice shelf and exposes a vertical front to the ocean, you would have ice cliffs hundreds of meters above the surface of the water.

DeConto and Pollard say that such cliffs would continually fall into the sea. And when they added this computation, it not only recreated Eemian sea level rise, it greatly increased their projection of how much ice Antarctica could yield in this century - more than three feet.

Since there are other drivers of sea level rise, like Greenland, this meant that we could see as much as six feet in total in this century, roughly double prior projections. And in the next century, the ice loss would get even worse.

"What we pointed out was, if the kind of calving that we see in Greenland today were to start turning on in analogous settings in Antarctica, then Antarctica has way thicker ice, it's a way bigger ice sheet, the consequences would be potentially really monumental for sea level rise," DeConto said.

Moreover, the process, he argues, is essential to understanding the past - and thus how we could replicate it.

"We cannot recreate six meters of sea level rise early in the Eemian without accounting for some brittle fracture in the ice sheet model," said DeConto.

A massive debate over marine ice cliffs

Tamsin Edwards is not convinced. A glaciologist at Kings College London, she is lead author - with a number of other Antarctic experts - of a study published Wednesday in Nature (the same journal that published DeConto and Pollard in 2016) that disputes their model, in great detail.

Using a statistical technique to examine the results, Edwards and her collaborators find that the toppling of ice cliffs is not necessary to reproduce past warm periods after all.

They also present lower sea level rise possibilities from Antarctica in this century. If they're right, the worst case is back down to about 40 centimeters, or a little over a foot, rather than three to four feet.

"Things may not be as absolutely terrible as that last study predicted," Edwards said. "But they're still bad."

It is a new science, she said, and without more modeling it's unclear how ice cliffs will ultimately affect sea level rise.

But then what happened in the Eemian? Edwards thinks it just took a long time to lose West Antarctica. That it wasn't fast. After all, the entire geologic period was thousands of years long.

"We're an impatient lot, humans, and the ice sheets don't respond in a decade, they're slow beasts," she said.

DeConto says he's learned something from the critique.

"The Edwards study does illustrate the need for more in-depth statistics than we originally applied to our 2016 model output, but the models are evolving rapidly and they have already changed considerably since 2016," he said in a written statement.

But he's not backing down on marine ice cliffs. The new critique, DeConto said, implies that "these processes aren't important for future sea level rise. And I think to me, that's kind of a dangerous message."

He certainly has his allies. Richard Alley, a well known glaciologist at Penn State University who has published with DeConto and Pollard, wrote in an email that "cliff retreat is not some strange and unexpected physical process; it is happening now in some places, has happened in the past, and is expected wherever sufficiently high temperatures occur in ocean or air around ice flowing into the ocean."

The Eemian - but worse?

There's one important thing to consider - the Eemian occurred without humans emitting lots of greenhouse gases.

Atmospheric carbon dioxide was far lower than it is today. The event was instead driven by changes in the Earth's orbit around the sun, leading to more sunlight falling on the northern hemisphere.

The big difference, this time around, is that humans are heating things up far faster than what is believed to have happened in the geologic past.

And that makes a key difference, said Ted Scambos, an Antarctic researcher who is leading the US side of an international multimillion dollar mission to study Thwaites Glacier, and who is a senior researcher at the National Snow and Ice Data Center in Colorado.

"The current pace of climate change is very fast," Scambos said, and the rate of warming might cause glaciers to behave differently than they did in the past.

Accordingly, Scambos says he sees the current debate as fruitful - "it's the discussion that needs to happen" - but that it doesn't lessen his worry about the fate of Thwaites Glacier if it retreats far enough.

"There's no model that says the glacier won't accelerate if it gets into those conditions," said Scambos. "It just has to."

Humans were nowhere near the Antarctic in the Eemian - and we have never, in the modern period, seen a glacier as big as Thwaites retreat. It's possible something is going to happen that we don't have any precedent or predictions for.

Just last week, for instance, scientists reported a large cavity opening beneath one part of the glacier - something they said models could not have predicted.

There is a massive stake involved now in at least trying to figure out what could happen - before it actually does. It will help determine whether humans, now organized and industrialized and masters of fossil fuels, are poised to drive a repeat of our own geological history.

2019 © The Washington Post
This article was originally published by The Washington Post.

Bayesian inference

From Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/Bayesian_inference Bayesian inference ( / ...