Feeds

Space firm to send Christmas Day tweets to dead people

Is there anybody out there? Let's hope not

The Power of One Infographic

Bereaved Brits desperate to send a message to their departed loved ones this Christmas could instead simply alert hostile aliens to our tenuous Earthly existence.

The Bereavement Register - a useful service to help bereaved families avoid being deluged with junk mail and cold calls targeted at their dead relatives - is offering the chance to beam into space "a personal message in remembrance of someone who has died".

The Bereavement Register will forward the messages to "Our broadcast service provider, Deep Space Communications Network (DSCN)... located next to the Kennedy Space Centre in Florida, USA".

DCN will then squirt out all the messages on Christmas Day, "as a single data package into an area of deep space where there are no known satellites".

This will be done using "state-of-the-art broadcasting equipment (inclusive of redundant, high-powered klystron amplifiers connected by a travelling wave-guide to a five-meter parabolic dish antenna)".

While the service may have an appeal to bereaved folk looking to feel a connection to their dear departeds at a particularly difficult time of the year, it ignores the obvious dangers of sending random messages out into deep space.

Just two years ago, a brace of space thinkers - Michael Michaud, a former Deputy Assistant Secretary of State for Science and Technology, and Dr John Billingham, former chief of the NASA SETI office - expressed their dismay at the active SETI initiative.

Michaud said it was "a deliberate attempt to provoke a response by an alien civilization whose capabilities, intentions, and distance are not known to us". Such initiatives should be a matter of government policy, he said, not left to madcap scientists with access to a satellite dish.

The fact that the Bereavement Register is restricting messages to a Twitter-style 140 characters gives further cause for concern, as any life form that picks up the message is likely to take one look and write us off as a non-intelligent life form ripe for harvesting. ®

Seven Steps to Software Security

More from The Register

next story
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Yahoo! Japan! launches! service! for! the! dead!
If you're reading this email, I am no longer alive
Plucky Rockall podule man back on (proper) dry land
Bold, barmy Brit adventurer Nick Hancock escapes North Atlantic islet
NSA man: 'Tell me about your Turkish connections'
Spooks ask Dabbsy to suggest a nice hotel with pool
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.