All throughout history and in all cultures around the world, humans have fanaticized about transcending these meat sacks that we were born into. Today we can make deaf people hear again and we can make blind people see again. Enter the bio-backers.
For those not familiar with the term, bio-hacking means applying a hacker ethic to the modification of biology. Where traditional hackers modify computer hardware and software, bio-hackers explore various technologies to modify biological systems. With biological systems we mean anything from bacteria and plants to animals and humans.
The essence of hacking is to take something that is designed for a certain purpose and see if it can be used for another purpose. It does not mean inventing from scratch but making do with what is available. Examples of a bio-hack would include the modification of bacteria to make them smell like strawberries or growing a yogurt culture using a person’s own microbiome.
It can also mean applying electronics to control a cockroach remotely through a smartphone app. Or it can mean taking an ID-chip implant originally designed for pets and inject it in your own hand in order to open the door at your office.
My body, my choice
A core aspect of bio-hacking is the idea of morphological freedom: the freedom to do whatever I want with one’s own body. The same freedom also applies to the right to refuse to have anything done to one’s body by an external party such as an employer or a government against one’s will.
I also believe in the power of community and the power of collective thought. If you work together with others, surrounded by positive role models, it will inspire people to do good and meaningful work. The hacker that sits isolated in a basement is a bigger risk than a hacker working with others in a public “maker-space.”
Knowledge is always the best defense. What if a viral agent is released in a subway train and on that same train there are dozens of people with DNA-sequencing devices and the skills to use them. Within seconds, the new agent is identified, sequenced and shared online so that warnings can be shared and counter-vectors applied. Our capacity to identify and act upon a threat is enormously greater with an informed public.
Because of these insights, I do think that the ongoing conversations about emerging technologies are critical. There are two reasons why one has to stay on top of new technologies: one, in order to use them and two, and perhaps more importantly, to understand if they are being used against you.
* This article is a repost which originally appeared on DW