Could Fast Radio Bursts Be Powering Alien Probes?

Could Fast Radio Bursts Be Powering Alien Probes?
Release No.: 
2017-09
For Release: 
Thursday, March 9, 2017 - 11:00am
The search for extraterrestrial intelligence has looked for many different signs of alien life, from radio broadcasts to laser flashes, without success. However, newly published research suggests that mysterious phenomena called fast radio bursts could be evidence of advanced alien technology. Specifically, these bursts might be leakage from planet-sized transmitters powering interstellar probes in distant galaxies.
"Fast radio bursts are exceedingly bright given their short duration and origin at great distances, and we haven't identified a possible natural source with any confidence," said theorist Avi Loeb of the Harvard-Smithsonian Center for Astrophysics. "An artificial origin is worth contemplating and checking."
As the name implies, fast radio bursts are millisecond-long flashes of radio emission. First discovered in 2007, fewer than two dozen have been detected by gigantic radio telescopes like the Parkes Observatory in Australia or the Arecibo Observatory in Puerto Rico. They are inferred to originate from distant galaxies, billions of light-years away.
Loeb and his co-author Manasvi Lingam (Harvard University) examined the feasibility of creating a radio transmitter strong enough for it to be detectable across such immense distances. They found that, if the transmitter were solar powered, the sunlight falling on an area of a planet twice the size of the Earth would be enough to generate the needed energy. Such a vast construction project is well beyond our technology, but within the realm of possibility according to the laws of physics.
Lingam and Loeb also considered whether such a transmitter would be viable from an engineering perspective, or whether the tremendous energies involved would melt any underlying structure. Again, they found that a water-cooled device twice the size of Earth could withstand the heat.
They then asked, why build such an instrument in the first place? They argue that the most plausible use of such power is driving interstellar light sails. The amount of power involved would be sufficient to push a payload of a million tons, or about 20 times the largest cruise ships on Earth.
"That's big enough to carry living passengers across interstellar or even intergalactic distances," added Lingam.
To power a light sail, the transmitter would need to focus a beam on it continuously. Observers on Earth would see a brief flash because the sail and its host planet, star and galaxy are all moving relative to us. As a result, the beam sweeps across the sky and only points in our direction for a moment. Repeated appearances of the beam, which were observed but cannot be explained by cataclysmic astrophysical events, might provide important clues about its artificial origin.
Loeb admits that this work is speculative. When asked whether he really believes that any fast radio bursts are due to aliens, he replied, "Science isn't a matter of belief, it's a matter of evidence. Deciding what’s likely ahead of time limits the possibilities. It's worth putting ideas out there and letting the data be the judge.”
The paper reporting this work has been accepted for publication in the Astrophysical Journal Letters and is available online.
Headquartered in Cambridge, Mass., the Harvard-Smithsonian Center for Astrophysics (CfA) is a joint collaboration between the Smithsonian Astrophysical Observatory and the Harvard College Observatory. CfA scientists, organized into six research divisions, study the origin, evolution and ultimate fate of the universe.
For more information, contact:
Megan Watzke
Harvard-Smithsonian Center for Astrophysics
+1 617-496-7998
mwatzke@cfa.harvard.edu
Peter Edmonds
Harvard-Smithsonian Center for Astrophysics
+1 617-571-7279
pedmonds@cfa.harvard.edu

Big Brother is watching you[in the past it was GOD watching you ]

CIA hacking Q&A: Is your TV spying on you and your phone listening in?

The leaked documents by Wikileaks suggest the CIA has a catalogue of 'zero-day' vulnerabilities

Daniele Sgandurra | The Conversation 
CIA
CIA


WikiLeaks has released thousands of documents that appear to show how the US Central Intelligence Agency (CIA) is able to spy on smartphones, computers and other internet-connected devices. They apparently have the ability to break into any and smartphone, as well as devices running Windows, Mac OS or Linux operating systems. Though the leak doesn’t tell us how widely these techniques are used, it does highlight just how vulnerable the technology on which we increasingly rely is to security breaches.

How can the hack these devices?
The leaked documents suggest the has a catalogue of “zero-day” vulnerabilities. A software vulnerability is typically a flaw in a program that a hacker can use to undermine the security of a system and break in to control it or steal its data. Usually, vulnerabilities are reported to vendors so they can produce a software patch that will fix the flaw and to eliminate or reduce the chances of a successful attack. Those flaws that the software manufacturer doesn’t know about are called zero-day vulnerabilities (referring to the number of days the manufacturer has known about the problem).
By exploiting these zero-day vulnerabilities, the could theoretically undermine the controls of computer operating systems and smartphones. This would allow it to bypass, for example, the security of many messaging apps that are considered secure, such as WhatsApp, Telegram or Signal. It doesn’t show that these apps have had their strong encryption methods broken – instead the messages can be read directly from the operating system before being encrypted.
What can the do with these techniques?
The leaked documents also detail a highly technical catalogue of hacking tools, such as instructions for compromising Skype, Wi-Fi networks, PDF documents and commercial anti-virus programs. There are also instructions on how to steal passwords, such as those inputted into internet browsers. For example, a technique called “QuarkMatter” can insert stealthy spying software on an Apple computer by hiding it in the EFI system partition, the part of the hard drive where the startup files are kept.
The documents also report that the might be able to listen to conversations heard by the microphones in smart TVs even when the TVs appear to be switched off. But that doesn’t mean the can exploit anyone’s smart TV. The program, called “Weeping Angel”, was designed specifically for the F8000 TV. And it is entirely possible that the created this technique (and like it) just to target specific individuals. It also seems that the program can only be loaded onto a television via a software update from a So someone would have to enter your house and access your TV to be able to hack it.
But we should also note that other “Internet of Things” connected devices could be used for similar purposes, such as the Amazon Echo home assistant. The CIA has, it is claimed, even explored ways of remotely controlling and hacking into cars in order to crash them, creating a “nearly undetectable assassination”.


How serious is the issue? Many commenters have noted that some of the vulnerabilities that are shown in the catalogue are old and some of them have already been patched up. For example, the TV hack is not possible anymore in recent devices with updated firmware. But that doesn’t mean that the (or any other intelligence agency) hasn’t updated its arsenal to exploit newer vulnerabilities.
The document suggests the is willing to exploit public technology for spying and put it at further risk of hacking. If manufacturers don’t know about vulnerabilities then they can’t fix them and so they are also available for malicious hackers or other governments to exploit as well.
The US government has established the Vulnerabilities Equities Process (VEP) as a way of helping its agencies deciding whether or not to disclose or not a vulnerability. If the CIA is stockpiling a catalogue of vulnerabilities it discovers, as other agencies have previously denied doing, then it may be ignoring this protocol. There are exceptions, such as if the exploit has “a clear national security or law enforcement need”. But as we don’t know how the vulnerabilities have been exploited, it isn’t clear if they fall into this category.
It’s also not clear what other hacking activities the may be undertaking. The leak includes 8,761 documents and files, many of which haven’t yet been analysed, and there are likely more documents to come. Some documents have been redacted by editors to avoid disclosing the actual programming code for the attacks, to make it difficult to copy them.
Finally, it appears that the entire archive of disclosed toolkit consists of several hundred million lines of code (by comparison, Windows 7 is composed of 25m lines of code). So it might take some time to fully understand the extent of their hacking capabilities.

Daniele Sgandurra, Lecturer in Information Security, Royal Holloway
This article was originally published on The Conversation. Read the original article.
The Conversation

Could potatoes grow on Mars? Preliminary study says yes.Image result for couch potato on mars

Christian Science Monitor - ‎7 hours ago‎
Image result for couch potato on mars.