![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
I can't recall in whose Livejournal I read about Richard Carrigan's recent paper. He speculates about the dangers of inimical software possibly buried in SETI signals.
All the discussion on the Web seems to be coming from an article in The Guardian.
You can read more about his ideas in "Do Potential SETI Signals Need to Be Decontaminated?" (it's in Word *.doc format).
At least two scenarios need to be considered in protecting against a malevolent SETI Hacker signal. One is a computer virus in the message that takes over the computer at the receiver. The other is an open message that gives an impenetrable software code or instructions for a hardware translator to handle an opaque message. Both cases are dangerous. The damage may be done before the receiver appreciates that it is under attack. This is the current experience even with earth-based hacker attacks. There may not be an opportunity to pull the signal out of the computer or turn off the power before the intruding signal has taken over.
It is an open question whether an earth-based computer virus can penetrate a computer if it is not familiar with the operating system. The computer and computer security experts I have discussed this with don’t think it is possible. The argument goes that viruses typically enter a computer by exploiting known features in the operating system. Further, experts argue, typical computer operating systems are quite idiosyncratic so that it can be difficult to analyze their structure from a logical point of view.
However, it seems worthwhile to approach the question with an open mind. For example, one could set up a thought or even a practical test with a primitive “toy” computer, perhaps modeled along the lines of the first Illiac and have programmers unfamiliar with the Illiac system try to hack the program. I believe it would also be useful to convene a workshop with diverse participants to discuss the subject in some detail. This might be coupled with broader discussions on the topic of denaturing ETI signals.
All the discussion on the Web seems to be coming from an article in The Guardian.
You can read more about his ideas in "Do Potential SETI Signals Need to Be Decontaminated?" (it's in Word *.doc format).
At least two scenarios need to be considered in protecting against a malevolent SETI Hacker signal. One is a computer virus in the message that takes over the computer at the receiver. The other is an open message that gives an impenetrable software code or instructions for a hardware translator to handle an opaque message. Both cases are dangerous. The damage may be done before the receiver appreciates that it is under attack. This is the current experience even with earth-based hacker attacks. There may not be an opportunity to pull the signal out of the computer or turn off the power before the intruding signal has taken over.
It is an open question whether an earth-based computer virus can penetrate a computer if it is not familiar with the operating system. The computer and computer security experts I have discussed this with don’t think it is possible. The argument goes that viruses typically enter a computer by exploiting known features in the operating system. Further, experts argue, typical computer operating systems are quite idiosyncratic so that it can be difficult to analyze their structure from a logical point of view.
However, it seems worthwhile to approach the question with an open mind. For example, one could set up a thought or even a practical test with a primitive “toy” computer, perhaps modeled along the lines of the first Illiac and have programmers unfamiliar with the Illiac system try to hack the program. I believe it would also be useful to convene a workshop with diverse participants to discuss the subject in some detail. This might be coupled with broader discussions on the topic of denaturing ETI signals.
no subject
Date: 2005-11-29 02:30 pm (UTC)For this to be a good analogy, they'd have to be able to hack it without ever being allowed to see or interact with the computer. Corrigan's first step—bootstrapping to a working program—already requires the results of his second step, in which the program analyzes the system it's in. Unmotivated biological viruses arise out of a biological environment in which the host organisms are already present.
So it seems to me that this is about as likely a danger as the aliens simply beaming invasion soldiers over physically with a Star Trek transporter. If they're godlike enough to do things that can't be done according to any Earth conception of possibility, how would you possibly plan against it? What if they write a signal so cunning that it is able to reconstruct the missing information after you denature it? What about a signal that turns into a shark and eats you? A signal that makes 2+2 equal 5 so that the laws of physics break and you explode?
Now, the more interesting possibility that I think is a real danger is something like the A for Andromeda scenario, in which the message starts with social engineering assuming that something like an intelligent being is reading it. Begin with schematics for a physical machine, Contact-style, or even an abstract description of a processor with an instruction set; and then once the silly monkeys build that machine, it can do the malicious work. Much more likely than the signal doing it all to the receiver's controller upon receipt.
no subject
Date: 2005-11-29 02:39 pm (UTC)no subject
Date: 2005-11-29 02:39 pm (UTC)This is choice. ^_^
no subject
Date: 2005-11-29 02:41 pm (UTC)%> s/inset/insert
%> grep coffee kitchen
no subject
Date: 2005-11-29 02:57 pm (UTC)As for alien signals taking over our computers over interstellar distances... about as likely as alien diseases being able to attack humans, or human diseases to attack aliens, without physical contact and time to evolve.
no subject
Date: 2005-11-29 03:15 pm (UTC)And of course...
Date: 2005-11-29 03:07 pm (UTC)no subject
Date: 2005-11-29 04:06 pm (UTC)B
Dates
Date: 2011-06-04 08:26 pm (UTC)Re: Dates
Date: 2011-06-06 03:11 am (UTC)(although Fermilab was one of the first organizations to have the internet)
And the World Wide Web in particular-- as far as I can determine, Fermilab was the fourth institution to host a Web site.
Could they not gain slight entry and then analyze and improvise their way in through the portals, gaining control?
Yes, that is the essential question.
It's hard to imagine how this would be possible, starting with reception a passive radio signal.
In numerous SF stories, including the ones mentioned above, trouble starts when someone, using plans provided by aliens, builds a computer he doesn't really understand. Would we really be this dumb? Still a hypothetical question at this point.
Re: Dates
Date: 2011-07-08 05:08 am (UTC)Consider even a situation which doesn't involve a material object: what are the odds that someone correctly solves a problem in, say, mathematical physics if they neither understand the mathematical techniques involved, nor the physical model? (I haven't see a student manage it yet...)
Sure, Cal Meacham built a working interrossiter, but that was a pre-fab kit. The aliens probably aren't sending us packing crates over the radio...
*It occurs to me that the *real* danger is if the aliens include a tech support number...