Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Is SETI at risk of downloading a malicious virus from outer space?
io9 ^ | 6/27/12 | George Dvorsky

Posted on 07/11/2012 2:09:03 PM PDT by LibWhacker

We take it for granted that the search for extraterrestrial intelligence (SETI) is a safe endeavor. Seriously, what could possibly go wrong with passively searching for interstellar radio signals? Unfortunately, the answer is quite a lot –- especially if the incoming signal contains something malicious, like a computer virus or Trojan horse.

And according to the experts, this isn't just idle speculation – the threat is very real. So, just how concerned do we need to be?

To get a better sense of this possibility, we spoke to two experts on the matter: Andrew Siemion, a PhD candidate in astronomy at SETI-Berkeley, and Milan Cirkovic, Senior Research Associate at the Astronomical Observatory of Belgrade and a leading expert on SETI.

We'll get to their answers in just a second, but it's worth doing a quick review to understand where this idea came from –- and not surprisingly, it's science fiction inspired by science.

Visions of viral doom

Science fiction writers have been worried about this possibility ever since the advent of SETI, back in the early 1960's.

Soon after the launch of Frank Drake's Project Ozma in 1960, which was the pioneering attempt to listen for extraterrestrial radio signals, the BBC produced A for Andromeda, a television series that was written by the acclaimed cosmologist and science fiction writer Fred Hoyle. The story concerns a group of scientists who detect a radio signal from a distant galaxy that contains instructions for the design of an advanced computer. The scientists decide to go ahead and build the computer, which in turn produces a new set of instructions for the creation of a living organism, named Andromeda. It's at this point where one of the scientists raises an objection, amid fears that Andromeda's purpose is to subjugate humanity.

In 1968, Stanislaw Lem reprised this issue in his novel His Master's Voice. In the story, scientists work to decode what seems to be a message from outer space, specifically a neutrino signal from the Canis Minor constellation. As the scientists decode the data, they conclude that it is a mathematical description of an object, possibly a molecule or even an entire genome. They go on to construct two strange substances that exhibit odd properties, a glutinous liquid and a solid object that looks like a slab of red meat. They learn that the liquid can cause an atomic blast at a remote location –- which, if used as a weapon, would make deterrence impossible. As a result, many of the scientists become convinced that it's an extraterrestrial weapon of some sort.

And more recently, the idea of receiving instructions from aliens was explored by Carl Sagan in his 1985 novel Contact (which was made into a major motion picture in 1997). But unlike his worrywart sci-fi predecessors, Sagan portrayed aliens as being genuinely friendly.

In Sagan's story, extraterrestrial contact is made, with the aliens transmitting the blueprints to a massive engineering project — supposedly for us to build. After much consideration, the device is constructed, and it turns out to be a transportation device for a single human occupant.

Carl Sagan always held firmly to his belief in benign aliens. He was convinced that any advanced civilization had to be friendly by default — that overly aggressive or misguided aliens would have destroyed themselves prior to advancing to such a stage. His theory suggested that an interstellar selectional effect was happening, and the only advanced aliens left standing would be the good ones.

Be careful

Sagan's optimism notwithstanding, we should probably be more than a little bit wary of receiving a signal from a civilization that's radically more advanced than our own.

When we spoke to SETI-Berkeley's Andrew Siemion, he admitted that SETI is aware of this particular risk, and that they've given the issue some thought. He stressed that SETI's primary objective is just to detect a signal. "Detecting signals is far easier than decoding them," he told io9. "Our searches don't attempt to decode or decipher any information content from signals that trigger our algorithms." In other words, the folks at SETI-Berkeley are only concerned with whether or not a signal is present, and whether it's real.

But that doesn't mean they're still not careful. When we asked Siemion about the possibility of inadvertently receiving or downloading a virus, he stressed that the possibility is extraordinarily low, but not impossible.

"Our instruments are connected to computers, and like any computers, they can be reprogrammed," he warned. "Our software receives input that ultimately comes from unknown sources, and again, while this input is never executed or decoded, we don't perform rigorous checks to validate this unknown input like a computer security conscious programmer might do with an internet application."

Siemion speculated that, if an extraterrestrial intelligence had very deep knowledge of the software systems we use for our experiments and the architecture of our computers, they might be able to send a sequence of signals that would cause a memory buffer to overflow and perhaps allow arbitrary code execution.

"However, if ET had this level of knowledge about terrestrial technology," he said, "it would make far more sense to use a similar technique with the thousands of satellite downlink stations dotting the globe, or the billions of cell phone radios constantly listening for a ping from a cellphone tower."

Siemion stressed that this doesn't apply to such projects as SETI@Home and Astropulse, which he said are "thoroughly vetted by very competent computer security professionals, and every effort is made to ensure [their] safety."

In regards to the threat of a Trojan horse, Siemion admitted the possibility, but doubted that humanity would ever blindly follow a set of blueprints or instructions that we received from another intelligent civilization.

"Just as human cultures establish trust over many decades and centuries moving in small steps, humanities' relationship with an extraterrestrial civilization would likely evolve slowly over perhaps many millennia," he told io9. "Maybe after many thousands of years, when humanity has established some level of rapport with our cosmic neighbors, we might feel comfortable accepting and utilizing their technology."

Be afraid

Like Siemion, Milan Cirkovic also believes that the risk of acquiring something nasty from an ETI is very real. But he's a bit more worried. Alien invaders won't attack us with their spaceships, he argues — instead, they'll come in the form of pieces of information. And they may be capable of infiltrating and damaging or subverting our computing networks, in a manner that's similar to the computer viruses we're all too familiar with.

Cirkovic admits, however, that the possibility should be taken with a grain of salt. In order to work, an alien virus would have to somehow know or intuit our protocols and operating systems.

"The efficiency of a virus in achieving its malicious task is proportional to the degree of its specialization. More general viruses are, therefore, less efficient," he tells io9. "To be able to infiltrate our networks, the alien virus should be general to a fantastic degree."

When we asked Cirkovic what the purpose of an ET virus might be, he responded, "If we discard anthropocentric malice, it seems that the most probable response is that they have evolved autonomously in a network of an advanced civilization -– which may or may not persist to this day." If this is the case, speculated Cirkovic, these extraterrestrial viruses would probably just replicate themselves and subvert our resources to further transmit themselves across the Galaxy. In other words, the virus may or may not be under the control of any extraterrestrial civilization –- it could be an advanced AI that's out of control and replicating itself by taking over the broadcast capabilities of each civilization it touches. A very frightening thought.

To prevent this, Cirkovic suggests that we should sever any connection between the SETI and METI (messages to ET) equipment, and the rest of the human info-sphere. He admits that this is easier said than done.

Cirkovic's fear is not without warrant — after all, people write viruses here on Earth all the time, for no particular reason. Perhaps signals such as these are the ultimate manifestation of computer viruses — a self-replicating information system that finds compatibility with others, thereby infecting it.

It's clear from our conversations with Siemion and Cirkovic that extraterrestrial life may be more bizarre and dangerous than we can imagine. Should humanity eventually receive a transmission from the depths of space, we would do well to treat it with great caution and consideration.


TOPICS: Astronomy; Science
KEYWORDS: malicious; seti; virus; xplanets
Navigation: use the links below to view more comments.
first 1-2021-4041-46 next last

1 posted on 07/11/2012 2:09:12 PM PDT by LibWhacker
[ Post Reply | Private Reply | View Replies]

To: LibWhacker
Is SETI at risk of downloading a malicious virus from outer space?

Quarantine it in an Airstream.

2 posted on 07/11/2012 2:11:11 PM PDT by Roccus
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker

“about the possibility of inadvertently receiving or downloading a virus, he stressed that the possibility is extraordinarily low, but not impossible.”

It’s actually far more likely that I’d be able to flap my arms and fly to the moon, naked.


3 posted on 07/11/2012 2:14:39 PM PDT by Psycho_Bunny (Future generations will curse what we've done to them.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker
they might be able to send a sequence of signals that would cause a memory buffer to overflow and perhaps allow arbitrary code execution.

buffer overflows come from poor assumptions about the data. For example allocating 256 bytes of memory but trying to load a text string into it until you hit a null character, even if that is more than 256. Since we don't expect any data format from the aliens (or the random noise of space), we don't make faulty assumptions of what that format will be.

4 posted on 07/11/2012 2:19:07 PM PDT by KarlInOhio (You only have three billion heartbeats in a lifetime.How many does the government claim as its own?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker

The ones you’ve got to watch out for are the Arcturian advance fee schemes...


5 posted on 07/11/2012 2:19:45 PM PDT by Noumenon (I will not pay the Obama jizya.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker

I can’t get some of my Mac applications to work on my PC. I doubt that aliens would have universal viral applications.


6 posted on 07/11/2012 2:19:52 PM PDT by Mikey_1962 (Obama: The Affirmative Action President.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker
Is SETI at risk of downloading a malicious virus from outer space?

No... but in 2009 a malicious swine flu virus was spread by some illegal aliens.

7 posted on 07/11/2012 2:23:51 PM PDT by GregoTX (Federalist)
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker

When things go wrong:

http://en.wikipedia.org/wiki/Virus_(1999_film)


8 posted on 07/11/2012 2:25:40 PM PDT by Truth29
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker

A civilization of machines would not be constained by Sagan’s hypothesis. They could infect our machines to destroy us, in effect turning earth technology into Decepticons.


9 posted on 07/11/2012 2:27:31 PM PDT by omega4179 ( el 0bama comio un perro)
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker

The invaders of “Independence Day” were destroyed by a Mac virus.

Which I why I use Windows....


10 posted on 07/11/2012 2:31:06 PM PDT by Old Sarge (We are now officially over the precipice, we just havent struck the ground yet)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Noumenon

I use Macaferengi virus protection.

If you can outcheat them outright, they’re fine business partners.

Ferengi rules of acquisition

http://www.sjtrek.com/trek/rules/


11 posted on 07/11/2012 2:42:06 PM PDT by cripplecreek (What does it profit a man if he gains the whole world but loses his soul?)
[ Post Reply | Private Reply | To 5 | View Replies]

To: LibWhacker

how about this scenario?

A small group of computer intelligentsia get together, and device
a set of signals (which are a “ code “ of sorts) that are
beamed down to known SETI detectors, through a privately
launched satellite

These signals are non sensical, non codelike (computerwise) in simple
analysis, but are some type of code nevertheless.But when all of
these signals are fed into the SETI computers,
this non codelike information is built to find other data segments which have
been beamed down and fed into the SETI computer main
information bank. The code segments assimilate and
self assemble into a computer virus of sorts. From the
SETI banks this information is shared on millions of
computers, silently siphoning off information, and
turning the private computers into computer “zombies” which
send out malicious and information sucking code to other
connected networks. Pretty soon, you can knock out the whole
systems. They may even be able to tap into military/government
data banks....and disable the system when a emergency
situtation develops....

Bring back pigeons and pencils and paper.


12 posted on 07/11/2012 2:42:39 PM PDT by Getready (Wisdom is more valuable than gold and diamonds, and harder to find.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: KarlInOhio
buffer overflows come from poor assumptions about the data. For example allocating 256 bytes of memory but trying to load a text string into it until you hit a null character, even if that is more than 256.

Ah, C-isms. Using Ada, or LISP-like languages and this problem goes away (unless you specifically tell it not to do bounds-checking): precisely because both were designed with a concept of array/list whose implementation required bounds. {In the case of LISP, the bounds being in-theory the memory of the Computer/VM [but wouldn't overflow, in any case]}

Since we don't expect any data format from the aliens (or the random noise of space), we don't make faulty assumptions of what that format will be.

I'm not so sure about that. The last few programs I've been on could be called horrid chimeras created and fostered by cut-and-paste. -- Sometimes assumptions are made in a certain section of code which are valid, but in another are invalid.

13 posted on 07/11/2012 2:54:42 PM PDT by OneWingedShark (Q: Why am I here? A: To do Justly, to love mercy, and to walk humbly with my God.)
[ Post Reply | Private Reply | To 4 | View Replies]

To: Noumenon
Subject: Nigerian Astronaut Wants To Come Home
Dr. Bakare Tunde
Astronautics Project Manager
National Space Research and Development Agency (NASRDA)
Plot 555
Misau Street
PMB 437
Garki, Abuja, FCT NIGERIA

Dear Mr. Sir,

REQUEST FOR ASSISTANCE-STRICTLY CONFIDENTIAL

I am Dr. Bakare Tunde, the cousin of Nigerian Astronaut, Air Force Major Abacha Tunde. He was the first African in space when he made a secret flight to the Salyut 6 space station in 1979. He was on a later Soviet spaceflight, Soyuz T-16Z to the secret Soviet military space station Salyut 8T in 1989. He was stranded there in 1990 when the Soviet Union was dissolved. His other Soviet crew members returned to earth on the Soyuz T-16Z, but his place was taken up by return cargo. There have been occasional Progrez supply flights to keep him going since that time. He is in good humor, but wants to come home.

In the 14-years since he has been on the station, he has accumulated flight pay and interest amounting to almost $ 15,000,000 American Dollars. This is held in a trust at the Lagos National Savings and Trust Association. If we can obtain access to this money, we can place a down payment with the Russian Space Authorities for a Soyuz return flight to bring him back to Earth. I am told this will cost $ 3,000,000 American Dollars. In order to access the his trust fund we need your assistance.

Consequently, my colleagues and I are willing to transfer the total amount to your account or subsequent disbursement, since we as civil servants are prohibited by the Code of Conduct Bureau (Civil Service Laws) from opening and/ or operating foreign accounts in our names.

Needless to say, the trust reposed on you at this juncture is enormous. In return, we have agreed to offer you 20 percent of the transferred sum, while 10 percent shall be set aside for incidental expenses (internal and external) between the parties in the course of the transaction. You will be mandated to remit the balance 70 percent to other accounts in due course.

Kindly expedite action as we are behind schedule to enable us include downpayment in this financial quarter.

Please acknowledge the receipt of this message via my direct number 234 (0) 9-234-2220 only.

Yours Sincerely, Dr. Bakare Tunde
Astronautics Project Manager
tip@nasrda.gov.ng

http://www.nasrda.gov.ng/

*********************************

14 posted on 07/11/2012 2:58:43 PM PDT by Charles Martel (Endeavor to persevere...)
[ Post Reply | Private Reply | To 5 | View Replies]

To: LibWhacker

Oh crap! We’re doomed! Some idiot is going to broadcast Windows Vista into space and the aliens are gonna come and nuke us.


15 posted on 07/11/2012 2:58:43 PM PDT by Ronin (Dumb, dependent and Democrat is no way to go through life - Rep. L. Gohmert, Tex)
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker
especially if the incoming signal contains something malicious, like a computer virus or Trojan horse

Well, I guess that would provide the answer they're searching for.

16 posted on 07/11/2012 3:01:47 PM PDT by Cementjungle
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker

On my “things I’m worried about” list, this possibility ranks just below the lack of trans-gendered bathrooms in Portland Oregon.


17 posted on 07/11/2012 3:05:21 PM PDT by dead (I've got my eye out for Mullah Omar.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Charles Martel

That poor Nigerian fellow!


18 posted on 07/11/2012 3:08:44 PM PDT by dead (I've got my eye out for Mullah Omar.)
[ Post Reply | Private Reply | To 14 | View Replies]

To: LibWhacker
Not one Apple computer has ever been infected with a computer virus written by aliens.
19 posted on 07/11/2012 3:10:43 PM PDT by HereInTheHeartland ("The writing is on the wall - Unions are screwed. reformist2 10:04 PM #27")
[ Post Reply | Private Reply | To 1 | View Replies]

To: LibWhacker

Perhaps we’ll download the secret formula for making Natasha Henstridge!


20 posted on 07/11/2012 3:13:53 PM PDT by jimmygrace
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-46 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson