Introduction
An unnamed third party entity has found a backdoor to the San Bernardino shooters’ iPhone just in time to avoid one of history's biggest technological clashes. With the FBI and White House having tried by means of the law to push tech-giant Apple to hack its own software's security system, they have effectively demanded from Apple not only to give up, but essentially to undo decades worth of efforts in advancing privacy and cybersecurity. By appealing to First Amendment rights and the right to privacy, Apple has stood on principle despite the enormous legal risks. Luckily, said unnamed deus ex machina entity has made its appearance, the court showdown has been cancelled, and the crisis has been averted. Or has it?
In this climate of technological cold war, the time is ripe to focus on the nature of our gadgets and the information stored in them.Footnote 1 Just how close are the parallels between the information individuals have traditionally stored in their biological brains and the information that is now being stored in their gadgets, and what might such parallels mean with respect to the ethical and legal protection we should afford our ‘smartifacts’?
First of all, there is a personal question we may ask ourselves: How would we feel, and what actions would we take, if someone intentionally broke our phone, stole our smartwatch, or hacked our laptop in a way that significantly undermined our ability to organize our lives? Suppose, for example, that someone compromised the gadgets you rely on daily, such that your diary appointments, your contacts list, photos, system preferences and functionalities, research notes, folders, reminders, push notifications, and so on have all turned into a jumbled, corrupted mess of disorganized data. Would it feel like someone merely damaged your property? Or might the situation perhaps be worse, as if someone had actually assaulted you?
Personal assault is a particular form of harm that involves the actual or intended use of force to another person without the person’s consent (see, for example, Fagan versus Metropolitan Police Commissioner [1968]).Footnote 2 As a concept, assault has an important history, both ethically and legally. For one thing, the freedom from a violation of bodily integrity is at the very heart of one's right to self-ownershipFootnote 3 and personal autonomy.Footnote 4 Legally, assault has long been designated as a special category of offence, one whose status in criminal and civil law is distinct from the offence one commits by merely damaging another's property. Even though legal complexities to do with assault have typically clustered around the question of intent (for instance, features of intent are important in distinguishing between simple assault and aggravated assault), the part about the person is often taken for granted. One obvious reason for this is that hardly anyone ever questions, at least for most practical purposes, the boundaries of a person. But where does a person really end?
Consider the following question: What makes the difference between whether I've intended to use force against your person as opposed to merely your property? Perhaps it just seems obvious. Here's one explicit answer, which has become a precedent in the law of the United Kingdom:
The body of the victim includes all parts of his body, including his organs, his nervous system and his brain. Bodily injury therefore may include injury to any of those parts of his body responsible for his mental and other faculties. (Lord Hobhouse, Regina v. M. Chan Fook, our italicsFootnote 5 )
This is more or less unsurprising. However, notice that the two statements above capture subtly different ideas. While the first clause attempts to spell out what one's body (and thereby bodily injury) consists in reductively, by pointing out specific organismic parts, the second clause does so in a functionalist way: If a part of one is responsible for (e.g., by being a material realizer of) one's mental or other faculties, then you can harm that individual by injuring whatever materially realizes such faculties.
Functionalism, within philosophy of mind, is the doctrine that what makes something a mental state of a particular type does not depend on its internal constitution, but rather on the way it functions or on the role it plays in the system of which it is a part. As such, functionalism denies that the essence of a mental state can be identified with a particular material basis. A mental state may be realized by any material or nonmaterial (functionalism is neutral between dualism and materialism) basis, so long as the basis under consideration gives rise to the kind of function that the target mental state is identified with. Functionalism's refusal to identify mental states with a specific underlying basis is supposed to be one of the view's main advantages because it allows for the phenomenon of multiple realizability. Creatures with bodies unlike ours can share our sensations, beliefs, and desires, provided that their behavior and functional organization are similar to our own. Thus, functionalism is supposed to provide a more inclusive theory of mind that avoids species-chauvinism (Block Reference Block and Block1980; for more details on functionalism, see Levin Reference Levin and Zalta2013).
Normally, what is responsible for an individual's faculties are exactly the sort of organismic parts that are listed as examples in the first statement: organs, the central nervous system, and the brain. Yet, the second (functionalist) clause leaves it open as to whether all faculties that make up one's person can be reduced to one's biological organism or whether, possibly, there could be more to it. In other words, it might be possible to harm the body of an individual by harming whatever underwrites that individual's mental and other faculties.
On this more liberal and open-ended way of thinking about the relevance of the person to assault, one uses force against another's person if one injures (along with physical body parts) that person's powers by harming whatever underwrites these powers. In discussions of the importance of freedom from violation of self-ownership, we find a similar implicit functionalism. As political philosopher Gerald Cohen (Reference Cohen1995: 12) remarks, the very concept of self-ownership holds that ‘each person enjoys, over himself and his powers, full and exclusive rights of control and use, and therefore owes no service or product to anyone else that he has not contracted to supply’ (italics added). Similarly, Charles Taylor (Reference Taylor1991) has argued that a satisfying criterion for what it is to violate an individual's personal autonomy should advert to a conception of personhood that does not simply identify the person with the person’s biological constitution.Footnote 6 As Taylor (Reference Taylor1991) remarks, ‘In a number of ways we are constituted by factors that lie beyond our reflective control but which nonetheless structure our values, thoughts, and motivations’ (Taylor Reference Taylor1991: 33–32).Footnote 7 In none of these discussions of the relevance of the person to either the legal conception of assault or the ethical discussions of the significance of freedom from harm to one's person do we find a necessary reductive identification of an individual's person with her biological constitution. Rather, it seems that what makes freedom from assault have the ethical and legal significance that it has is that freedom from harm to one's physical constitution and/or one’s powers or capacities (including one’s capacities for reflection, thought, and the structuring of one’s values) has a distinctive kind of status.Footnote 8
It would be convenient and theoretically elegant (for the purposes of ethical and legal assessment) if the material realizers of an individual's capacities and powers were always just one's biological constituents and nothing else. Nevertheless, as the foregoing demonstrates, this is in principle treated as an open question, even within the practical domain of law making. It is evident that harm to what underwrites an individual's powers and capacities is a kind of offence with an added significance that is absent from mere harm to an individual's property. But the prevailing thought that we can simply circumscribe the material realizers of our personal powers and capacities to the magisterium of biology is one that we may be forced to give up—especially with the advent of new technologies.
As our daily reliance on certain artifacts grows, it may become impossible to count all extra-organismic possessions as distinct from our personhood and thereby merely as our property—a thought that can obviously have far-reaching implications for the law. Of course, an immediate objection is to say that, absent the relevant theoretical background and practical need for such a reconceptualization of the concept of personal assault, this is just stretching the concept too far. The above functionalist-looking descriptions of personal assault do not imply anything other than what is obvious—they were introduced as identical with their reductive counterparts simply because their authors could not possibly imagine that one's person may consist of anything besides one's biological body.
While this is an appealing line for resisting the possibility of having to reconsider what may count as personal assault, it could be mistaken on both fronts. Over the past three decades, functionalist approaches within philosophy of mind and cognitive science have been on the rise, with the approaches of embodied cognition and its more radical consequent, the approach of extended cognition, being at the forefront of studies concerning the workings of the human mind.Footnote 9 Similarly, the emergence of personal computing and the advent of the cloud as well as wearable and autobiographical, or ‘lifelogging’, technologies (O'Harra et a;. Reference O'Hara, Tufflied and Shadbolt2008; Hoven et al. Reference Hoven, Cas and Whittaker2012)—all of which regularly store personal data automatically in order to structure our daily schedules, offer suggestions, and monitor our health on a moment-to-moment basis—have begun to blur the lines between our biological and digital existence.
In this paper, we attempt to explore how far these considerations can take us and whether, in certain cases, we should indeed try to protect our technological equipment legally in the same way we protect our biological body parts. In section 1, we outline the main contours of the extended cognition program in the philosophy of mind and cognitive science and note the importance of cognitive integration with respect to whether an external artifact could count as a proper part of a cognitive process. Section 2 draws from the discussion in section 1 and the introduction and provides a rationale for embracing as bona fide cases of personal assault cases where what is compromised are, with reference to the hypothesis of extended cognition, extracranial material realizers of one's mental faculties. In section 3, we sharpen this point by studying recent legal and ethical cases that involve damage of what might count as processes of extended memory and extended perception. Finally, in section 4, we consider further implications of widening our conception of assault in the way suggested, and we explain why it may be a matter of urgent social importance that we do so sooner rather than later.
1. Cognitive Extension
Consider active externalism (Clark and Chalmers Reference Clark and Chalmers1998; Menary Reference Menary2007; Hutchins Reference Hutchins1995; Sutton, Reference Sutton2008; Sutton et al. Reference Sutton, Barnier, Harris and Wilson2008; Theiner et al. Reference Theiner, Allen and Goldstone2010; Wilson Reference Wilson and Sperber2000, Reference Wilson2004)—a recent advancement within philosophy of mind and cognitive science—according to which epistemic artifacts, such as telescopes, microscopes, pen and paper, Tactile Visual Substitution Systems (TVSS), and other technological equipment may count (under the appropriate conditions) as constitutive parts of one's cognitive system. In other words, epistemic artifacts, such as the ones listed above, might occasionally count as literally extending—beyond our brains—the cognitive processes that are thought to make up our minds.
This is a bold claim, but once we trace its theoretical lineage and motivation it may not sound as implausible as it does at first. Active externalism is the extreme consequent of the approach of embodied cognition. In the nineties, several cognitive scientists and philosophers of mind (Varela et al. Reference Varela, Thompson and Rosch1991; Clark Reference Clark1997) as well as roboticists (Brooks Reference Brooks1991a, Reference Brooks1991b) noted that cognition is embodied in the sense that aspects of the agent's body beyond the brain play a physically constitutive role in cognitive processing (i.e., literally speaking, with respect to several cognitive operations, our bodies are parts of our minds). In particular, for those aspects of an agent's mind where the agent’s brain and body are heavily interdependent, we should think of the latter as a constitutive element of the agent's overall cognitive system.
Nearly three decades later, the approach of embodied cognition has come to occupy a central position within philosophy of mind and cognitive science. But if one is willing to accept the embodied cognition hypothesis then one might not be so far from being at least open to the idea of active externalism. No doubt, it might initially be counterintuitive to accept that cognitive systems can extend beyond our organisms to the artifacts we interact with, but the spirit of the approach is very similar to that of embodied cognition. If we are prepared to accept that our minds are embodied when our brains and bodies heavily depend on each other, then there is no principled reason to deny that cognitive processes are extended in those situations where our brains and the artifacts we employ are also heavily interdependent. Indeed, active externalism in all its forms has been developed, refined, and defended by many philosophers (Clark and Chalmers Reference Clark and Chalmers1998; Clark Reference Clark2008; Hutchins Reference Hutchins1995; Menary Reference Menary2006, Reference Menary2007; Theiner Reference Theiner2011; Wheeler Reference Wheeler2005, Wilson Reference Wilson and Sperber2000, Reference Wilson2004), making the approach a viable hypothesis.Footnote 10
Here, we will only concern ourselves with what we consider to be the most plausible formulation of the view, known as the hypothesis of extended cognition. Focusing on cognitive processing, the hypothesis of extended cognition is the claim that ‘the actual local operations that realize certain forms of human cognizing include inextricable tangles of feedback, feedforward and feed-around loops: loops that promiscuously criss-cross the boundaries of brain, body and world’ (Clark Reference Clark2008: §2); cognitive processing can and—under the appropriate conditions—literally extends to the agent's surrounding environment. According to the hypothesis of extended cognition, the artifacts involved are proper parts of the ongoing cognitive processing.
But what exactly are the ‘appropriate conditions’ under which cognitive systems extend beyond the agents’ brains and bodies? Answering this question is crucial for determining whether one's approach to active externalism is going to be sufficiently plausible. We do not and cannot argue here for the correctness of active externalism, but we believe we should at least provide a strict answer to the question above. By doing so, we will be able to draw the line in a clear and perhaps intuitive way between what may count as part of one's cognitive system and what may not—at least for those readers who are well accustomed to using technology on a daily basis.
Several cognitive scientists have recently pointed out that the answer to what might count as a constitutive element of one's cognitive system comes from the mathematical framework of dynamical systems theory (DST)—the most powerful mathematical framework for studying the behavior of dynamical systems in general. According to DST, in order to claim that two systems give rise to some extended process and, thereby, to an overall extended system (or to a coupled system, in DST terms), what is required is the existence of nonlinear interactions that arise out of feedback loops between the contributing parts (Clark and Chalmers Reference Clark and Chalmers1998; Chemero Reference Chemero2009; Froese et al. Reference Froese, Gershenson and Rosenblueth2013; Sutton et al. Reference Sutton, Barnier, Harris and Wilson2008; Theiner et al. Reference Theiner, Allen and Goldstone2010; Wegner et al. Reference Wegner, Giuliano, Hertel and Ickes1985; Tollefsen and Dale Reference Tollefsen and Dale2011; Palermos Reference Palermos2014). The underlying rationale is that the aforementioned nonlinear interactions give rise to an overall integrated system that consists of all the contributing subcomponents.
There are two main reasons for postulating this overall coupled system: (1) The aforementioned nonlinear interactions give rise to new systemic properties that belong only to the overall system and to none of the contributing subsystems alone (therefore one has to postulate the overall extended system), and (2) said interactions also make it impossible to decompose the two systems in terms of distinct inputs and outputs between them (therefore one cannot but postulate the overall system). Accordingly, the claim based on DST is that in order to have an extended cognitive system—as opposed to merely an embedded one (cf. Adams and Aizawa, Reference Adams and Aizawa2001, Reference Adams, Aizawa and Zalta2010; Rupert Reference Rupert2004, Reference Rupert2009)—all that is required is that the contributing members (i.e., the relevant cognitive agents and their artifacts) interact continuously and reciprocally (on the basis of feedback loops) with each other.Footnote 11
To appreciate why this might be a plausible approach to cognitive extension, it is interesting to see how the approach applies in practice. By following the above criterion of cognitive constitution, it is not possible to claim that having our friends’ phone numbers stored on our SIM cards or having created a shopping list means that those pieces of information are already parts of our (extended) cognitive systems—in other words, that we remember them in the same way that we remember pieces of information that we have learned by heart. The reason is that there are no nonlinear interactions between our intracranial cognitive processing and the phonebook or the shopping list. In such cases, there is only one-way, linear dependence between our onboard cognitive capacities and our artifacts because the processes of storing and retrieving the relevant information do not interact reciprocally, but are instead entirely independent of our organismic cognitive processing. We do not affect the artifact, it only affects us. In the light of DST, this sort of dependence does not give rise to a coupled system. Therefore, in such cases, we may only talk of embedded, but not extended, cognition (Rupert Reference Rupert2004, Reference Rupert2009).
In contrast, our everyday interactions with telescopes, microscopes, laptops, smartphones, pen and paper when solving complex mathematical problems, and the way blind people interact with their canes and Tactile Visual Substitution Systems would all qualify as genuine cases of cognitive extension. In such cases, the completion of the relevant cognitive task does involve dense feedback loops between the individual agent and her artifact. For example, telescopic observation qualifies as a case of cognitive extension because it is a dynamic process that involves ongoing reciprocal interactions between the agent and the artifact. Moving the telescope around while adjusting the lenses generates certain effects (e.g., shapes on the lens of the telescope) whose feedback drives the ongoing cognitive loops along. Eventually, the coupled system of the agent and his telescope is able to identify—that is, see—the target satellite. Accordingly, in the light of DST, in such cases we may indeed have to talk of the presence of an overall extended cognitive system that consists of both the individual agent and her artifact. This, however, may not be such an unwelcome result. Indeed, we are inclined to think that a growing number of people who have experienced such close technological coupling would be open to the idea of cognitive extension.
2. Extended Assault
Let's now put the pieces together. In the introduction we identified a common factor to various legal and ethical discussions on personal assault: personal assault is the intentional harm to parts of persons responsible for the person’s mental and other faculties. In section 1, we saw that, according to an increasingly popular position embraced in recent philosophy of mind and cognitive science—viz., HEC—our mental faculties can be partly constituted by external artifacts so long as these artifacts have been appropriately integrated into our overall cognitive system. Taking these ideas together, we get the seemingly radical suggestion that having our integrated epistemic artifacts intentionally compromised plausibly qualifies as a case of personal assault. Put more carefully, the argument can be expressed with two premises and a conclusion; call this the argument for extended assault.
Argument for Extended Assault (AEA)
-
(P1) Intentional harm to a part of a person responsible for the person’s mental and other faculties constitutes personal assault. (Definition)
-
(P2) Our mental faculties can be partly constituted by external artifacts so long as these artifacts have been appropriately integrated into our overall cognitive system. (From HEC)
-
(C) Therefore, having our integrated epistemic artifacts intentionally compromised plausibly qualifies as a case of personal assault. (From P1 and P2)
Consider first (P1). Obviously, one may try to reject the claim on the grounds that it is unnecessarily permissive regarding what may be the target of personal assault, especially when it seems perfectly sufficient simply to point toward one's organismic boundaries. And yet, as we saw in the introduction, an increasing number of legal and ethical theorists appear to steer away from such a reductionist approach to personhood and personal assault and move toward a more functionalist understanding of the relevant notions. And this is so even if they take no stance on the matter of whether the hypothesis of extended cognition is correct—indeed, in all likelihood they are entirely unaware of it.
A more straightforward way to avoid the conclusion could be to deny (P2) by insisting that the hypothesis of extended cognition is false. This paper is not the place to adjudicate whether (P2) is actually true or false and thus whether AEA is ultimately sound. Rather, the point of AEA is to make explicit that if HEC is true, then, in light of independently reasonable and widely embraced assumptions about what personal assault involves, our ethical and legal theorizing and practice should be prepared to include intentional damage of appropriately integrated gadgets within the category of personal assault—not outside of it.
Moreover, the conditions that our preferred version of HEC specifies may not be so difficult to satisfy. On the view we have offered, artifacts are part of our cognitive processing whenever the two of them interact densely on the basis of feedback loops. Whether such biotechnologically hybrid feedback loops will occur rarely or frequently will depend on opportunity conditions, such as the availability of appropriate technology and social norms. For example, during the comparatively technologically unsophisticated seventeenth century, such dense feedback loops were exceedingly rare, perhaps realized in very atypical cases in which an individual would (in a socially unconventional manner) carry around an unwieldy quill, ink, and paper for default information storage and retrieval, using it as a sort of prototypical extended memory.Footnote 12 Technological progress has shifted dramatically the opportunity conditions for such dense interactions. Correspondingly, the related shift in social norms associated with cognitive off-loading technology (e.g., Lynch Reference Lynch2016) has continued to ‘normalize’ the heavy use of external artifacts for carrying out cognitive tasks that were so far executed in a primarily intracranial fashion. For example, dense feedback loops between organismic and technological information-processing are now generated on a day-to-day basis, in entirely normal circumstances, with iPhones, tablets, Google Glasses, smart watches, among other things. If we also factor in the simple observation that none of these possibilities for cognitive off-loading was prevalent or normal even as recently as 10 years ago, then the effect of extrapolation is increased.
And it is not only that there are more possibilities for generating mutually interacting biotechnological hybrids as time goes by. Technological progress also allows them to become increasingly subtler and more intimate. Our gadgets are becoming physically and visibly smaller and more discreet. On the basis of well-documented technological trending, it is really just a matter of time before the majority of the cognitive extension gadgetry we use will be by and large seamless and ‘invisible’.Footnote 13 A striking example for consideration here is Google's future plans beyond Google Glass, which include the Google ‘smart lens’ project. The aim is to market ‘smart’ contact lenses with tiny wireless chips inside and with a wireless antenna thinner than a human hair.
Therefore, if HEC is true, then not only will there be some cases of extended cognition, but there will be increasingly more instances of extended cognition being realized in the world and, eventually, increasingly more instances in which—in real-life settings—our integrated epistemic artifacts might be intentionally compromised.
3. Two Case Studies
In some respects, legal thinking is catching up with cognitive science. In others ways, there is important room for improvement. Let's begin with a bit of optimism, though not yet in the arena of assault, per se. Consider the 2014 landmark US Supreme Court ruling in Riley v. California. Footnote 14 The background is that David Riley, a US citizen living in California, was stopped for a routine traffic violation but was charged with weapons charges after a police officer searching Riley in the course of the arrest had seized Riley's cell phone and found incriminating evidence on it. Riley had moved to suppress all evidence that the police had obtained from his cell phone; however, the trial court denied the motion, and Riley was convicted. The California Court of Appeal affirmed the lower court's ruling.
Nevertheless, in June 2014, the US Supreme Court unanimously overturned the conviction upheld by the California Court of Appeal. Riley's original conviction was based on a legal precedent called search incident to arrest (SITA).Footnote 15 SITA permits arresting police officers to perform, without a warrant, search of an arrested person's physical area, which is defined as the area within the person's physical control (see United States v. Rabinowitz 1950). SITA, of course, does not permit a warrantless search of an individual’s physical interior (i.e., an investigation of the contents of one's leg, arm, or brain) nor any transgression into her private thoughts (i.e., a mandatory lie detector test, in this circumstance, would be unconstitutional) even though it does permit a warrantless search of the actual physical items in the arrested individual's pockets or of anything he or she may have immediate access to.
With respect to material constitution, it is natural to treat a cell phone as just another part of the arrested person's ‘physical area’, as on a par (for the relevance of SITA) with pens, keys, and such. However, in the written opinion of the court, Chief Justice John Roberts argued that cell phones should be treated very differently in the context of such warrantless searches. His reasoning is interesting and, though Roberts hardly embraces the extended cognition approach of philosophy of cognitive science explicitly, his remarks in delivering the court's opinion betray some clear sympathy. Roberts writes that
modern cell phones. . . are now such a pervasive and insistent part of daily life that the proverbial visitor from Mars might conclude they were an important feature of human anatomy. Modern cell phones are not just another technological convenience. With all they contain and all they may reveal, they hold for many Americans ‘the privacies of life’. The fact that technology now allows an individual to carry such information in his hand does not make the information any less worthy of the protection for which the Founders fought. (2014: 17–18, italics added)
Strikingly, Roberts's assessment here coincides more or less with the point Clark (Reference Clark and Menary2010) makes when defending certain kinds of extended memory by pointing out the functional similarities between biological parts and well-integrated technological parts.Footnote 16 A Martian's silicon-based memory system may be made out of materials different from those used in an earthling's memory system, but it would still count as a memory system because it is functionally equivalent to what we call a memory system. But if an earthling had a smartphone that was made out of the same stuff as the Martian's memory system and also provided its owner with the same functionality that is provided by both the Martian's and the earthling's biological memory systems, then on what grounds would we deny that the smartphone is part of the earthling's memory system?
Apparently, thinking along similar lines and given the lack of a convincing response, Supreme Court Justice Samuel Alito noted in his concurring opinion that the changing nature of cell phones’ functions and the way we interact with them demand a rethinking of the bounds of SITA; as he put it, modern cell phones now afford an individual an ability to store information ‘that no person would ever [sic previously] have had on his person in hard-copy form (2014: 2469–67)’. Of course, what goes for cell phones in this case should go, mutatis mutandis, for similar gadgets, including smart watches, Google Glasses, and in the near future even Google contact lenses.
To reiterate, Riley v. California is not a case that establishes (or even purports to establish) that harming an individual's gadgets is a form of personal assault. There is unsurprisingly no such legal precedent—yet. Instead, we register Riley v. California as a landmark case that features an important shift in legal thinking concerning the technology we densely interact with. And this, we think, is a shift in the right direction: Verdicts such as Riley v. California are important precursors to what we suspect will be a future recognition of the kind of extended assault that (as we argued in section 2) is implied by HEC.
A second case we want to consider shows why a more dramatic shift in thinking is required to accommodate what are—by the lights of HEC—real-life extended cognizers. The example we think is most suggestive on this score involves Neil Harbisson, a British artist and cyborg activist who was born with achromatopsia, a condition that left him able to see only monochromatically. Despite being born with this condition, colors are no longer imperceptible to him. For the past 10 years, Harbisson has been able to hear colors thanks to his ‘eyeborg’, a device that is osseointigrated inside his skull, specifically in his occipital bone, and that converts visible colors into sound waves.Footnote 17 He now has a favorite color: aubergine.
As Harbisson writes:
I started using it 24 hours a day, carrying it around in a backpack and feeling that the cybernetic device, the eyeborg, and my organism were completely connected. I haven't taken it off my head since 2004, except to change the equipment when it breaks.Footnote 18
Interestingly, in 2004 and after some months of initial difficulty, Harbisson's integration of the eyeborg was instrumental in successfully persuading the UK Passport Agency to allow him to include the eyeborg in his passport photo. The passport agency initially insisted that he had to remove it for the official photo in the same way one is required to remove an electronic device or a hat. However, Harbisson's argument for its inclusion in the photo was that the eyeborg was a part of his body, not something extra to it—an argument that was supported by his doctor and others in their letters to the passport agency (Miah and Rich Reference Miah and Rich2008). Harbisson's self-perspective was that ‘he became a cyborg when the union between his organism and his antenna created a new sense’ (Serra Reference Serra2011).
The wider legal situation for Harbisson has been more complicated, however. In 2012, police approached Harbisson at a demonstration (believing that he was using his eyeborg to film them) and in the process tried to pull the device off his head. Now suppose that, in the process, Neil's eyeborg had been damaged and as a result of this his auditory color spectrum had been confusingly inverted.Footnote 19 Also suppose that all that had been damaged in the scuffle was just the eyeborg device, leaving Harbisson's biological body entirely untouched. With this in mind, would you say that we should regard Harbisson as having been personally assaulted, or should the inversion of his color spectrum via intentional harm to the eyeborg be understood as being property damage?
We contend that an interpretation of personal assault along the lines of HEC generates the more intuitive answer. It's not hard to see how compromising Harbisson's eyeborg in such a way would be in all relevant respects the same kind of harm an individual with otherwise perfectly healthy eyesight would incur if her color spectrum were confusingly manipulated against her will. Put another way, if Harbisson's eyeborg were intentionally corrupted, an assessment of this offense as anything other than personal assault would seem to betray a kind of unprincipled ‘bioprejudice’, where a disproportionate weight is given to the physical constitution of the material realizers of one's faculties over their functional role. After all, the passport agency had already recognized Harbisson's eyeborg as part of his body, and this is clearly a part of his extended body responsible for his mental and other faculties.
We compare Riley v. California and the case of Neil Harbisson because the former shows how legal thinking might be moving in the direction of the conclusion of AEA and the latter shows that failure to embrace its conclusion would seem to generate an unwanted biochauvinistic legal and ethical prejudice.
4. Discussion
But what is it exactly we are proposing for consideration? How could a jury plausibly decide that a case of having one's gadget compromised counts as a case of personal assault? One way to make this clear is to think about the following case. Subject 1 and Subject 2 have both downloaded and installed an application that turns out to contain some malware that was intentionally planted by a hacker. As a result, both laptop operations are fatally disrupted. The only difference is that the laptop of Subject 1 is new—in fact, the infected application was one of the very first to be installed—whereas Subject 2 has already had his laptop for a couple of years. During this time, Subject 2 has moved the computer's default and customized folders, has set up shortcuts, mouse pad preferences, push notifications, and he has changed the way folders are ordered, the places where files are automatically stored. Moreover, he has set up default programs for opening a number of different files, installed an antivirus program and configured the preferences, set up ad-blocker exemptions, and so on. In this way, Subject 2, unlike Subject 1, has spent a significant amount of time to tailor his laptop in a way that allows him to carry out fluently the cognitive tasks he habitually performs on its basis—many of which plausibly constitute the kind of person he is. In other words, Subject 2—unlike Subject 1—has set up all these small details that allow him to interact mutually with his laptop in a continuous and fluent way. In the light of HEC, this is a clear indication that the two systems constitute an extended cognitive system. Accordingly, if AEA is taken to its conclusion, the result is that Subject 2—unlike Subject 1—is the victim of (extended) personal assault, because the damaged laptop does not just constitute property for him but rather is part of the cognitive machinery that makes up the kind of person he is.
In other words, we suggest: Just as in the case of cognitive extension so in the case of (extended) personal assault, whenever an individual's mental powers and faculties rely for their operation on continuous mutual interactions between some of the individual's organismic faculties and some artifact of the individual’s, we have sufficient indication that the relevant person—and the individual’s legal and ethical rights against personal assault—should be extended to include the artifacts involved.Footnote 20
An anticipated objection to this approach of including intentional damage to artifacts such as the ones mentioned above under the category of personal assault is the claim that such artifacts are not really parts of one's person because unlike body parts, they can be easily replaced by new ones. Initially this might be a tempting response, but it is one that is ultimately bound to fail. If anything, it has the somewhat disconcerting implication that once bionic limbs become as functionally successful as real limbs, then serious and intentional bodily injury—one that could potentially lead to amputation—would be downgraded from counting as personal assault to counting as damage of personal property.
Of course, it is possible to insist further on the difference between organismic body parts and external artifacts by noting that biological body parts, unlike electronic devices, are not simply hardware whose behavior is guided by some digital software that can be easily stored in the cloud any time we like. Biological body parts also have a number of analogue features (such as muscle memory) whose dynamic status continuously feeds back to one's physiological, peripheral, and central nervous systems. Such analogue features, however, could not be backed up or replicated as easily as the state of a laptop's operating system. This is a very interesting objection, a reply to which can reveal a number of instructive observations.
First, even though most contemporary information-processing artifacts operate mainly on the basis of their digital features—with the parameters of their analogue features remaining static and entirely unaffected throughout the operation of the software—this is far from a necessary feature of technology, and it is most likely bound to change. Just like our body parts, so the functionality of future technologies is not going to depend merely on a set of digital rules inscribed, say, on the motherboard of the relevant technological machinery; instead, their functionality will be based on the dynamic interplay between these digital instructions, the artifact's continuously responsive and highly malleable analogue features, and the physiological and neurological functions of the whole organism. As a result, in the near future, restoring the functionality of one's damaged but previously highly personalized equipment will require more than simply replacing it with the default hardware equipment and returning the underlying software to the state it was in before the damage occurred. The new hardware will also have to be restored to the analogue state it was in before the assault, a state idiosyncratic to each user. While an artifact's digital state might be easy to replicate, it is very likely that this is not going to be the case with respect to its analogue nature, mainly for practical reasons concerning the originating factory's production line. Indeed, it is highly unlikely that factories could physically tailor their products to match the needs of their customers individually. What is more likely is that they would make their products plastic enough so that each user could extensively calibrate them to match the user's needs.
Moreover, while the considerations above pertain exclusively to the status of the external artifacts, we must not forget that the equation also includes the brain and body of the organismic agent. The appropriate integration of any piece of equipment most certainly involves a number of changes to one's physical body, with the most important being the rewiring of one's brain so that it can fluently interact with the external equipment. Therefore, the treatment of future cases of disrupted cognitive extension would require that one bring the overall (extended) system back to its previous state of mutual dynamic interaction between all components. Most likely, this would involve a form of ‘technotherapy’ (with cognitive rehabilitation being only a subcomponent of the overall treatment) that could potentially be as long and distressing as the physiotherapies one has to undertake after an accident or operation.
Granted, as far as current technologies are concerned, reintegrating one's artifacts is not as time-consuming and stressful as it might eventually be in the future. For the time being, most of our equipments’ personalized functionalities depend merely on the underlying software, which can easily be backed up in the cloud, such that one's new laptop can within a few hours run in the exact same way as one's old laptop. As noted above, this is merely a contingent matter of fact that is most likely going to change in the near future, but what are the lessons we can draw from it for the current situation?
We can easily imagine that the opponent of the argument for extended assault is going to take advantage of this contingency by claiming that for the time being damaging one's hardware equipment cannot possibly count as a case of personal assault simply because this hardware can be replaced and its software can be backed up easily. While this is true, it does not really speak to the heart of the matter we are here concerned with, but simply transfers the problematic from the hardware to the online world. For while our hardware equipment, at least for the time being, is an easily replaceable supervenience base that supports our operating systems, the state of these software operating systems is crucial for the appropriate cognitive integration of our technological equipment. In cases where it is possible to back up one's software online—and note that this is not always possible—we might indeed be able to stop worrying about whether extended personal assault could apply to one's hardware equipment. This is not so, however, with respect to cyber attacks against our online personal accounts—such as those we have with Google or Apple—and against the backup of our operating systems and information in the cloud.
Even if for the time being we can stop worrying about whether damage of one's hardware should constitute a case of personal assault, it seems that it is not easy to employ as lenient an approach toward cyberattacks against our online accounts and against our cloud backups. And this should be of concern not only to hackers but also to major companies such as Google, Microsoft, and Apple. For if our cloud accounts are part of who we are, then we should also expect such companies to be legally bound and responsible toward their users in ways that have, perhaps, so far been significantly underestimated.Footnote 21
As the recent conflict between Apple and the FBI demonstrates, some technology companies (e.g., Apple, Google, Whatsapp, Twitter) appear to be sensitive to this sort of responsibility, and they seem willing to protect their user's privacy and safety from cyber attacks even in the face of potentially serious legal costs. The good news is that according to the considerations above, such companies may now have one more argument to offer against the demands of the FBI and the White House: Assuming that the argument for extended assault is correct, then by hacking its own operating system, Apple would not only expose its users potentially to having their personal property damaged, but it would also make them subject to the far greater risk of being personally assaulted by anyone who might get hold of the controversial key.Footnote 22
To return to an observation we made earlier, whether one's intuitions are going to align with such a conclusion—and, more generally, with the conclusion of the argument for extended assault—depends on the extent to which technology has already penetrated one's everyday life. Nevertheless, before we allow ourselves to draw any conclusions based on our personal and thus limited experience, it is perhaps also worth considering that sometimes integrated technology can play a central role in the well-being of some people who could not possibly survive without it.
While everyone may agree that having our smartphones or laptops severely compromised might feel like a great (personal) loss, to most of us it is still a kind of loss that, given enough time, effort, and resources, we can hope to get past without worrying that our well-being is going to be severely threatened in the process. Nevertheless, as films such as Still Alice have recently brought to popular attention, there is a part of the population for which technology plays a central and largely irreplaceable role. There are numerous stories of people who after having suffered irreversible brain damage or being afflicted with dementia,Footnote 23 use their smartphones and social media accounts as substitutes for their long-term and short-term memories—a fact that is clearly mirrored by the emergence of an increasing number of applications designed to help such patients.Footnote 24 For these patients, their integrated technology really is a central aspect of who they are and what they can do, supporting their personal autonomy to an extent that few of us can fully appreciate.
5. Concluding Remarks
Contrary to what the dialectics above might suggest, we would like to close by pointing to a moderate direction. Our aim has not been to suggest that accepting the argument for extended assault should be the way forward. Rather, this paper is an attempt to demonstrate that given (1) current legal as well as normative ethical theorizing, (2) recent advances in cognitive science and (3) the rapidly growing and proliferating use of technologies, the idea of extended personal assault is at least worthy of serious consideration. This is admittedly an early idea, and more needs to be said in its defense. Nevertheless, we hope to have demonstrated here that making a case for it is possible. This is a possibility that, even if it turned out to be wrong, would still require a thorough understanding of its motivation and rationale.