5 cyber security concerns in ‘Back 2 the Future II’

Looking back at the tech predictions made in Back to the Future II, it’s interesting to see how far we’ve come. Made in 1989, the movie follows the story of Marty McFly travelling to the future and witnessing the world on 21st October, 2015. Admittedly, we’re not quite there yet with some of the predictions – we haven’t seen the likes of the flying car or self-lacing shoes, for example.

However, a remarkable amount of the ‘futuristic’ technology we see in the film has come true, even if it has yet to become mainstream. Looking at these examples allows us to reflect on the progress of cyber security – a key enabler of most inventions becoming available to the public. The cyber world has changed drastically since 1989, and every new connected device, smart car or password is at risk of being hacked. Let’s consider some of the predictions made in the movie and how the technology should be secured:

Video conference calling

Pure science fiction in 1989, the scene where Marty talks to his boss via his TV was a memorable one. Today, this sort of communication is commonplace with the likes of Skype, Face Time and other video conferencing tools. As sensitive information is often shared over calls, video conferencing has posed a number of security challenges, particularly if a user is making calls from home with an Internet connection not secured by the company. Video conferencing therefore relies on the use of a secure network in the cloud, with strong encryption techniques.

Biometric security systems

While in the future, Marty enters his home using a fingerprint scanner. Biometrics are a familiar form of authentication today, particularly with newer smartphones. Cars and homes could soon be seeing this type of security as well. However, risks remain regarding biometrics, as shown by the recent US government data hack, which saw thousands of fingerprint IDs stolen. Unlike passwords, fingerprints can’t be changed, which creates extra complications if hacked. Biometric authentication should be paired with another type of authentication, such as a password or key to provide added layers of security.

The connected home

Marty’s future home is kitted out with some of today’s latest smart home technology, including voice-activated lights. Heating, ovens, fridges and alarms can now all be controlled from anywhere in the world, and electronic systems can take voice commands. However, people could be unwittingly opening their homes to hackers if their systems are unsecured, so firewalls and encryption should be implemented.

Hoverboards

Marty’s use of a skateboard equipped with magnetic hover technology remains arguably the film’s iconic moment. While not an invention that has gone mainstream yet, a hover board prototype was launched just last year. Before they get anywhere near ready for consumer use, hover boards will need the same security measures that connected cars require, plus plenty of testing before being made public. Self-driving cars have been hacked in the past, as have connected cars. The user’s physical safety needs to be guaranteed before smart transportation becomes a mainstream reality.

Rise of the robots

When Marty stepped into the future, he saw robotic gas pumps and restaurant waiters. Although developments in robotics have been significant, there hasn’t been widespread use of them in services – with the exception of the world’s first robot hotel in Japan. Putting robots in front of the public requires strong security measures to ensure their controls cannot be hacked and taken over. Hackers could programme robotic petrol stations to put petrol in diesel engines, for example, or even something much more sinister.

Security is one of the major barriers for technology in its transition from concept to use in everyday life. The Back to the Future II predictions that are true today are also inventions that would be deemed secure enough to enter the consumer or B2B market. For those yet to come, such as flying cars and virtual waiters, there’s no doubt they will demand stricter security advances before becoming a reality.

More

News

Sign up to our newsletter to get the latest in digital insights. sign up

Welcome to Memeburn

Sign up to our newsletter to get the latest in digital insights.