← kevqi.com

Defining a discipline

Neurosecurity

The interdisciplinary study of securing neural systems and understanding the neural dimensions of security. Like neuroethics, it has two branches.

SCROLL

Modeled after neuroethics · Roskies 2002

Neuroethics

The ethics of neuroscience — what constraints apply to brain research?

The neuroscience of ethics — what does the brain reveal about morality?

Neurosecurity

The security of neuroscience — how do you protect neural systems?

The neuroscience of security — what does the brain reveal about what security means?

Branch I

The Security of Neuroscience

Engineering. Protecting the systems.

Threat Intelligence

How are neural devices attacked?

Signal injection, data exfiltration, adversarial stimulation, firmware manipulation, side-channel leakage. 161 documented techniques and growing. Each one cataloged, scored, and mapped to defensive controls.

click to expand

Defensive Architecture

What does a firewall for the brain look like?

Zero-trust at the hardware-biology boundary. Amplitude bounds that reject signals outside safe ranges. Rate limiting that prevents neural DoS. Anomaly detection on live neural streams. The same SIEM methodology used in enterprise security, applied to the brain.

click to expand

Protocol Security

Is neural data encrypted in transit?

Today, no. The most widely used BCI streaming protocol transmits raw neural data in plaintext with zero authentication. Anyone on the same network can read your brain signals. This is a discovered vulnerability, not a hypothetical.

click to expand

Severity Scoring

How do you measure the impact of a neural attack?

Not just "was the device compromised" but "what was the neural effect." Amplitude disruption, frequency interference, coherence degradation. Mapping signal-level changes to clinical impact categories for threat modeling purposes.

click to expand

Branch II

The Neuroscience of Security

Philosophy. Questioning the boundaries.

Consent & Autonomy

Who authorized that signal to enter your brain?

When a device modulates neural activity, who authorized it? The doctor? The manufacturer? The algorithm? What does informed consent mean when the intervention operates below conscious awareness? Can you consent to something you can't perceive?

click to expand

Monitoring vs. Surveillance

When does protection become surveillance?

A neural firewall must observe signals to protect them. It must classify patterns to detect anomalies. At what point does a security tool become a mind-reading device? The same system that detects an attack can also decode intent.

click to expand

Attack vs. Treatment

The physics are identical. The boundary is governance.

Deep brain stimulation treats Parkinson's. The same signal pattern, delivered without authorization, is an attack. Same amplitude. Same frequency. Same electrode. The difference is not technical. The difference is consent, dosage, and oversight.

click to expand

Neural Identity

If your neural patterns are modified, are you still you?

If a BCI alters your neural patterns, and someone "restores" them to baseline, who chose the baseline? What if the "attack" improved your cognition? What if the "restoration" erased a new ability? The security model presumes a self to protect. Philosophy asks what that self is.

click to expand

Neither branch is complete without the other

A firewall without philosophy is surveillance.
Philosophy without engineering is speculation.

The first branch builds the tools. The second asks whether you should.

Work across both branches

QIF

Proposed open framework for BCI threat intelligence. 161 attack techniques cataloged with severity scoring and neural impact chains.

Threat catalog NISS scoring Impact ethics

Neural Firewall

Zero-trust at the hardware-biology boundary. Amplitude bounds, rate limiting, anomaly detection on live neural streams.

Architecture Monitoring limits

LSL Vulnerability

Discovered plaintext neural data transport in the most-used BCI streaming protocol. Zero authentication. Reported to maintainers.

Vuln research Disclosure ethics

SixDots

Haptic braille learning through the same sensory channel BCIs will use for output. The encoding layer between silicon and perception.

Haptic encoding Accessibility

EEG Data Lake

10 GB of neural data. ASD/ADHD/IDD datasets with feature extraction pipeline. The raw material for understanding neural security in practice.

Signal analysis Data consent

Governance

Policy bridge between technical controls and ethical constraints. Consent models, disclosure requirements, regulatory alignment.

Policy Both branches