E.T. Hackers
SETI@home should come with a virus detector. This according to particle physicist Richard Carrigan.
In his report, entitled "Do potential SETI signals need to be decontaminated?," he suggests the SETI scientists may be too blase about finding a signal. "In science fiction, all the aliens are bad, but in the world of science, they are all good and simply want to get in touch." His main concern is that, intentionally or otherwise, an extra-terrestrial signal picked up by the SETI team could cause widespread damage to computers if released on to the internet without being checked.
A crime generally requires both means and motive. For "means" Carrigan is probably relying on the Church-Turing thesis. One statement of this thesis is:
"Any 'reasonable' model of computation can be efficiently simulated on a probabilistic Turing machine."
So, if you want to emulate an old arcade game on your new laptop (I'm particularly fond of "Mr. Do") it can be done. You just need the proper software emulator.
The theory is that any program written for any computer can, via a software emulator, be made to run on any other computer that has sufficient memory and processing power. But writing a software emulator has always required an understanding of both the original machine and the emulating machine.
Presumably a extraterrestrial civilization located hundreds of light years away would have no knowledge of the machines and operating systems that have been developed here on Earth in the last few years.
The "motive" half of "means and motive" also seems problematic. Terrestrial virus writers - those who are not somehow profiting financially from their hacking - do what they do for the feeling of power they get by watching the Internet slow to a crawl as computers crash. Would E.T. get that same thrill by just broadcasting his malevolence randomly into the universe? Maybe...but that jerk would never hear about the systems damaged back here on Earth.
If an interstellar computer crime seems implausible, the possibility of an accident remains. Imagine an alien civilization crippled by the "perfect" virus. It would be a virus that could cross all platforms to do mischief on any computer or network it comes into contact with. Perhaps such a virus could do harm here.
Question for the tech guys: Is such a computer virus theoretically possible?
UPDATE: I'm glad a commentor brought up "Independence Day."
ID4 was a great popcorn flick. It was the kind of summer blockbuster you enjoy without having to engage your brain too much. I loved it, and I don't care that it's not a "thinking man's" SciFi film. One of the things that's often made fun of is the final resolution of the conflict...
SPOILER WARNING FOR ANYBODY WHO'S MANANGED NOT TO SEE THIS MOVIE IN THE LAST TEN YEARS BUT IS ACHING TO SEE IT NOW...
In the movie, an alien craft that's been sitting in Area 51 for the last forty years allows us to test a computer virus that, after some hair-raising cigar-chomping bravery, gets administered to the alien mother ship rendering all the alien tech useless. We win!
As far fetched as that scenario is, its more believable than purposeful long-distance E.T. hacking if:
- We've got an alien computer to experiment with - the means.
- And we have to do it to survive - the motive.
UPDATE II: MaryAnn Johanson at Geek Philosophy thinks we'll get spammed:
I am Xqwo Zordlorf, Keeper of the Specie of the High Royal Family of Slkikl Sector. I have an important business proposition for you.
You see, they have all this money and they just want to deposit it in your account...
Comments
Of course, didn't you see 'Independence Day'?
I received this CERT-like advisory and shot coffee out my nose:
http://www.f-secure.se/virus/hoax/hoaxinfo.asp?Id=82
Tob
Posted by: Toby928
|
November 30, 2005 08:59 AM
I argue that a "perfect", system-hopping, all-destructive virus would be impossible to program for anyone having only a black-box view of a system.
We must not forget that any piece of software is only a means to switch some transistors in a meaningful fashion. Any abstraction of code that goes beyond this principle (i.e. higher-level programming languages) is based on a seperate piece of software (a compiler/interpreter) hiding the actual hardware from us humans (or aliens, for that matter). I deem it impossible to write any purposeful piece of software lacking any knowledge of the underlying hardware, which would be the situation an alien programmer would find itself in.
The most pseudo-plausible (and far-fetched) approach would probably be to implement an advanced AI software that is somehow "aware" of the system environment it is placed in, and could self-modify to do something harmful (possibly by recognizing some kind of bit patterns that identify certain parts of the system, i.e. network functionality). This still implies that alien computer technology rests on the same pillars as ours, namely transistors and the binary system, which is wildly unlikely if you ask me. But then again, this is just the kind of anthropomorphic (wishful) thinking the SETI people seem to caught up in.
Posted by: eisendorn
|
November 30, 2005 03:18 PM
I think that eisendorn is correct. Computer code requires a knowledge of the the instruction set. A virus written for x86 hardware would not run on a mainframe.
I seem to remember an 'Outer Limits' show that had a more interesting take. If memory serves, a teenager astronomer records transmissions from deep space that sound addictively like new-age music. As people listen to the 'songs', biochemical changes occurred that caused them to mutate. As far fetched as that sounds, I would think that more likely than a super-JAVA (write-once-run-anywhere) virus.
Tob
Posted by: Toby928
|
November 30, 2005 03:51 PM
Eisendorn:
I agree that a standard virus couldn't work.
Even a learn-as-you-go approach would need to have some knowledge of the system environment.
Perhaps if you had many digital "spores" one might work welll enough to evolve into something. But the hacker alien civ couldn't predetermine what it would evolve into - It might turn out to be a great recipee for oatmeal raison cookies.
Toby:
Eisendorn has convinced me too, but the example you gave - a biological hack - is the exact same problem on a different substrate. You still have to know how to address the system, right?
The only thing that would make this (slightly) more likely than the SETI hack is the fact that our biology has changed little in millions of years. This would give ET's more time to learn our biology, write the hack, and deliver.
Sounds like more trouble than it would be worth to a highly advanced civilization.
Posted by: Stephen Gordon
|
November 30, 2005 05:11 PM
Stephan, I agree that both scenarios are unbelievable remote. I guess I was just suggesting that it was more likely for us to have similar biology with ET than for us to independently derive the same binary instruction set for our computers and that is key. Even a self-modifying program has to get loaded from a PSW and then understood by the chipset to get executed. Its not 'alive' to be modified until its running. I'm doubtfull that an alien tech would even use binary systems. There is a good argument that analog systems (yes/no/maybe/some/alot) will be the preferred computer eventually. I've been in the computer industry for almost 30 years and IMHO the chance for this alien virus scenario approaches zero.
Tob
Posted by: Toby928
|
November 30, 2005 06:12 PM
The 419 letters is one thing. I just don't want any pseudopod enlargement emails.
Posted by: triticale
|
November 30, 2005 08:36 PM
Alien hacking is not a problem if you have Mac OS -- the Aliens have been Wintel since the mid 1980s.
Posted by: Supercat
|
November 30, 2005 09:44 PM
Ok, since the hacker ET side is losing, let me present a "Fire in the Deep" scenario. An alien civilization at A sends elaborate nested plans for building nanotech machines. They don't even have to be close enough to otherwise communicate. The plans describe how to build machines which build machines, etc. At some point down the road when the builders at B no longer have the intellectual capacity to keep track of what's going on, the nanotech goes "grey goo" using secret codes hidden in the complex plans, terraforms planet B, and builds replicas of the aliens from A. Ie, the aliens from A have colonized a planet just by broadcasting information.
Posted by: Karl Hallowell
|
December 7, 2005 02:49 PM