How to Hack into an Alien Space Ship

[In honor of this holiest of America’s fireworks-oriented days off from work, please enjoy this patriotic guest post from Ben Adams. —Ed.]

Pictured: Jeff Goldblum

Few instances of technology in movies have received more scorn than the Independence Day “hacking” scene, in which Jeff Goldblum’s David Levinson uses a mid-90s PowerBook to send a virus that takes down an entire alien star fleet. The scene regularly makes any list of ridiculous uses of computers and technology, and is the internet’s go-to example of bad Hollywod tech. So in honor of a few colonies that no one thought could defeat the greatest empire the world has ever known, I’m here today to fight for the little guy, to defend the indefensible: Why the Independence Day hacking scene could have worked.

There are really two issues that need to be addressed: compatibility and security. Compatibility is whether or not any code, much less a crippling virus, could plausibly have made it from David Levinson’s mind and keyboard into the alien computer system. This is an issue from both a hardware and a software standpoint. Security is whether or not, given a compatible system, David Levinson could really write a virus that does what’s shown.

Hardware Compatiblity: Alien Serial Bus

The first and most obvious hurdle that a would-be xeno-hacker has to conquer is a physical one: in order for one computer system to affect another, it needs some way of getting information from point A to point B. In the security world, an “air gap” is a security measure that relies on this limitation to prevent unauthorized access. If there’s no physical connection between your system and your adversary’s system, there’s nothing an attacker can do about it. The air gap between David, sitting in a hangar in Area 51, and the alien mother ship in orbit, is a large one to say the least.

Note however, that an air gap is rarely perfect. If someone uses portable media (like a USB drive) on an internet-facing computer and then uses the same media on your “air gapped” network, the air gap has just closed. That code can potentially make its way onto your network (like say, the one that controls your nuclear centrifuges). In the movie, that’s exactly what happens: the hackers compromise a presumably trusted “media device” (the crashed Fighter), and use it to gain access to the entire system.

USB Drive.

Of course, that only gets them half way there. They’ve moved data from the Fighter to the Mother Ship, but David prominently (and for the makers of ID4, profitably) uses a PowerBook Pro to do his hacking. This issue is the source of most of the scorn heaped on ID4, because any human-made computer is going to be wildly different in fundamental design than any alien space ship.

This becomes less ridiculous, though, when we consider the background of the alien craft in question. The Fighter has been in Area 51 for 40 years. It is the most technologically significant machine in the world and the brightest minds of multiple generations have probably had their hands in this endeavor. The head of the lab makes it clear that they’ve been rebuilding it for decades, even if the “gizmos and gadgets” haven’t been powered on until the arrival of the rest of the Fleet. There’s no doubt that every millimeter of that craft has been taken apart and diagrammed, with full schematics available.

They also know what the aliens look like, so they have an idea of xeno-ergonomics. From this, it’s likely they could have inferred where on the ship the alien interfaces and I/O ports are – essentially, what an Alien Serial Bus looks like and how it might work. It’s likely that the Area 51 team developed some form of human-to-alien compatible adapter long before the fleet even arrived. That adapter would mean that a signal generated by the PowerBook could make its way into the computer system of the alien Fighter, and then from the fighter to the alien Mother Ship.

Software Compatibility: Xeno-Linux

Of course, PCs and Macs sometimes have compatible ports too, and they can’t talk to each other. Just having a path for your signal doesn’t mean that the signal is going to mean anything to the other system when it arrives. The most common argument against the ID4 hacking scene runs along the lines of “If a Mac and a PC aren’t compatible, it certainly isn’t going to be compatible with an alien’s operating system (insert Linux joke here).”

This is where the “team of brightest minds” thing comes into play again. In the movie, the mission of Area 51 is to figure out how the craft works and how to fly it. Even if they haven’t previously got enough power to actually fly the spacecraft, it’s likely that the computer system could be at least booted up and tinkered with. Because none of the mechanical systems could be powered on, the computer on the ship would be by far the most studied piece of equipment on the craft. Getting data in and out of the Fighter’s computer would have been heavily researched, and it’s likely they already had a good idea of at least the basic building blocks of code used by the system.

The arrival of David Levinson is the last piece of the puzzle—he has already figured out at least part of the alien’s computer language by looking at the binary code the aliens send through our satellites. Even before he knows about Area 51, he’s created an interface on his computer for translating the alien computer language into a semi-usable form. In that sense, the PowerBook is really just a human-friendly GUI to access the Fighter’s computer system. From there, Levinson can use Area 51’s preexisting research to translate the Mac’s code into Alien++ and send it via the Fighter’s communications to the mother ship.

Security: The Trusting Alien

The next question is, even assuming that David Levinson can write and transmit usable code to the alien ship, could he really take the whole fleet down with just one virus? Remember, all the code he writes has to do is A) shut down the shields and B) spread itself to other alien ships (and C) display a kick-ass skull and cross bones.)

The “shut-down shield” code would presumably be the easiest, since the Fighter has a similar shield and David is shown shutting it down in the hangar. The “spread itself” part depends on how good the alien security is. The naïve view is that their computer security would be as overwhelming as the rest of their defensive technology. This tongue-in-cheek critique of the movie from the security-centric website “InfoSec Island” is telling: “the remotest possibility that a human-written virus could affect their superior system is completely without substance.” [emphasis added].

The assumption that the alien technology is superior to ours across the board is unfounded. We know that their space travel and weapons technology is far superior, but computer security is a very different ball of wax. As the US military is learning in a painful way, having the best planes and biggest bombs doesn’t mean your systems will be the most secure.

The assumption behind having computer security is that other people might try and do something they’re not supposed to on your system. The problem is that we know nothing about their culture’s propensity or even capacity for this sort of behavior—the assumption of widespread and systematic dishonesty on computer systems is a very human one.

Perhaps their culture is so rigidly honest that lying, even to a computer system, is utterly taboo. The captured alien certainly isn’t reticent to tell the President all of their plans. Perhaps, like in Harry Turltedove’s World War series, their culture was united under one empire so early in their history that certain aspects of war never really became an issue, and they are woefully unprepared for an asymmetric “insider”-attack. In a society where individuals can communicate mind to mind (as the aliens can), would unauthorized access to computers even be a thing? There’s no reason to assume that just because one aspect of their technology is powerful that another will be as well developed.

What’s clear from the movie, however, is that their security sucks. Centralization is generally a bad sign from a computer security standpoint. Their system is so heavily centralized that an external agent (the Mother Ship) can manipulate an individual Fighter to a ridiculous level of granularity, even overriding the system and opening the cockpit doors. Any human security expert would lose their mind if they discovered than an F/A-18 was designed so that a remote signal could lower the landing gear or open the cockpit hatch without the pilot’s consent – the potential for abuse by an enemy is too great.

Their behavior in the movie shows that they have simply not considered the possibility that humans have access to their technology. They are arrogant enough to use our own satellites and assume we won’t try and reverse engineer their signal—so arrogant, in fact, that the signal isn’t even encrypted. It’s also clear that the aliens have a particular blind-spot for simple, obvious solutions: they can’t even break Morse code when it’s used by the human forces. Even their largest and most important invasion ships are designed with a massive and fatal single point of failure so large that a drunken Randy Quaid can hit it.

With all of that apparent, it’s possible that their computer security is non-existent. Perhaps the ships are all just linked together, prepared to accept whatever codes and commands are given to them, confident in the good-intentions of the party sending those commands. The virus might be as simple as:

virus.exe
if(shield)
then shield=FALSE
for all(connected_host)
upload virus.exe to connected_host
execute virus.exe on connected_host
display(skull.bmp)
play(evil_laugh.wav)

Hacking a computer means gaining physical access with a compatible computer and sending the right code to defeat the system’s defenses. In Independence Day, the crashed fighter and forty years worth of research into it provides the necessary hardware and software background, and the alien’s arrogance provides the nuclear-bomb sized hole in their computer defenses. When David Levinson arrives on scene at Area 51, 99% of the leg work of figuring out the interface and system code is already done, either by him or by Area 51’s scientists. The virus doesn’t have to be perfect, either. As David admits, the virus won’t knock out the shields completely, just turn them off for a few minutes while the aliens figure out what happens and reset the system. Given access to an “insider” threat like the crashed Fighter and a team of the Earth’s most brilliant scientists, it’s conceivable that the infamous “PowerBook hacking an alien space craft” scene could happen to an alien fleet completely unprepared for a cyber-threat .

The aliens came to conquer a supposedly inferior species—just as the haters attack our beloved film by telling you that a PowerBook pro with 16MB of RAM can’t hack an entire alien space fleet. But we believers are fighting for our right to live, to exist. We’re going to live on. We’re going to survive. Today, we celebrate Independence Day.

Ben Adams is a Naval Officer living in Southern California who should probably be using his time more effectively. When he’s not driving warships or fighting pirates, he maintains a blog.

Reading about Independence Day making you want to watch it? Get The Overview: Independence Day and watch it with the writers from Overthinking It.

11 Comments on “How to Hack into an Alien Space Ship”

  1. Lee #

    Just when I thought I couldn’t love this movie–or my country–any more than I do already, this post came along.

     
  2. Leigh #

    Plausible, yet wildly improbable. Regardless, this was a fun article.

     
  3. Mark #

    Excellent! Two points:

    1) Well, actually… it would probably be skull.gif, since it’s animated.

    2) I would take your compatibility argument a step further. You say that since they’ve had the Fighter 40 years, the “brightest minds” have had a long time to figure it out. But that 40-year period coincides with our own development of modern computer hardware and software. It’s not a stretch to say everything we have now (in 1996) is actually based on (or at least heavily influenced by) what those guys learned by examining the Fighter. Like how Dyson in ‘Terminator 2′ says that Skynet is largely based on what they learned from the recovered ‘Terminator’ chip. There may be a little divergent evolution, but basically David’s PowerBook has the same hardware and software DNA as the alien systems.

    This common DNA theory helps with the virus aspect too, if we stretch the analogy. Real viruses can be passed between species that are genetically similar, as long as the right factors are in place. So basically, David is giving the Mother Ship the computer version of bird flu, for which their systems have no natural immunity, a la ‘War of the Worlds.’

     
    • Alex #

      According to a recent discussion on Reddit, there’s a deleted scene to exactly that effect – computers were invented based on the alien technology from the ship.

       
    • Wizardy #

      Bravo for that “Well, actually” :D

       
    • PrettyMind #

      Problem to your theory that modern computers where developed based on the technology of the aliens software and hardware is, that the modern computers where based on inventions of Charles Babbage (England) and todays computers from Konrad Zuse (Germany) the Z1,Z2, Z3, Z4 and other ones.
      Both inventions happened before (Konrad Zuse 5 years prior and Charles Babbage more than a 100 years prior) the Area 51 incident.
      They didn´t had the Alien spaceship to work with. This means that the brightest people working on the space ship, didn´t figure out anything useful on the software side.
      It would be true if the computer would have been invented from the Americans.

       
  4. Lex Apostata #

    The aliens are strongly telepathic. Ergo, they would not have any concept of individuality. Ergo, there are no alien “hackers.” Theirs is a collective intelligence and no individual could get away with committing a crime even if such an individualist notion ever crossed its mind. As soon as one of them thought “I’ll write a virus” everyone else in the civilization would know about it. Indeed, they probably don’t even have the pronoun “I.” Everything is “we.”

    Therefore, it would never occur to them to develop Norton Antivirus for Aliens.

     
  5. Jens Yenzo #

    Thank you very much for this great analysis. It got me thinking about this particular alien species a little more and one thing came up: how come they have to rely on human satellite systems anyway? If you attack an inferior enemy, it seems foolish to rely on their own technological systems. They should have been at least able to place some of their ships around Earth for communication purposes, if not their own comm satellites. Come to think of it, their whole technology seems very simple in some ways (strong centralization, no drones, no nanotechnology or similar advances) and quite advanced in others (force fields, persumed faster-than-light travel, presumed stealth for prior recon missions).
    Combine this with the rather odd goal of their mission: They came quite a long way and use an awful lot of energy wiping out the local population in order to exploit our planet’s resources. Does our planet even have resources that are not found in other, uninhabited places in the solar system (other than life, which they are not interested in)?

    These two things lead me to a hypothesis: The ID aliens are scavengers, in the sense that they have acquired parts of their technology from other species or planets. This accounts for their very simple approach to partly advanced weapons or defense systems. It is conceivable that there are parts of their technology that they don’t even understand themselves. It reminds me of the rebel Incas in Vilcabamba, scavenging muskets from the Spaniards and using them without being able to properly clean and load them, leading to weak shots – which would, of course, still suffice to defeat a more technically inferior civilization. By that analogy, the ID aliens may be the weaker members of a larger network of Galactic civilizations, going around using brute force and bits and pieces of advanced weaponry to destroy those who seem inferior to them.

    This would also explain a) any severe gaps in their computer systems as well as b) the lack of any further development in technology between the 1950s and 1990s (they seemingly do not even recognize that a 40-year-old fighter drops in on them).

    I am not too familiar with the secondary literature to ID – did anybody else have that suspicion before me?

     
  6. Psy #

    There is the problem of embedded systems, why engineer would have the fighter space ship run of a general purpose computer rather then a embedded system only meant to do the tasks expected of the ship. To a engineer making a space fighter you want to strip the system down as much as possible to get away with the smallest, lightest and most power effect system as possible while on a large mothership you don’t have the same constraints.

    I mean think about it for a second, do you honestly think anyone could hack NASA’s ground computers from the on-board computer of one the Space Shuttles? The Shuttle computers are literally nothing more then glorified programmable calculators, and the NASA ground computers are only talking to the on-board computer to retrieve data not commands. This is not a security feature it is just NASA engineers never say any point in adding the functionality of their ground computers being able to run commands from the Space Shuttle.

     
  7. Andew #

    This article wins on so many levels, but the best part is “Jeff Goldblum” crossing the Delaware. I’m not the only one who saw that, right?