This article is part of the Science in Sci-fi, Fact in Fantasy blog series. Each week, we tackle one of the scientific or technological concepts pervasive in science fiction — space travel, genetic engineering, artificial intelligence, etc. — with input from an expert.

Please join the mailing list to be notified every time new content is posted.

About the Expert

Matt Perkins is a Canadian writer and software developer. His science fiction thriller series Winterwakers, set in an alternate Earth where humans hibernate, is available in paperback and eBook. This is Matt’s second appearance on this blog, and his writing has also appeared on Buzzfeed and the Fantasy Literature blog. He is currently querying a sci-fi adventure novel about a young woman lost on a wild, unexplored planet. You can find him on Twitter, Facebook, or his website.

Computer and Internet Misconceptions in Fiction

Here’s a hard truth for anyone writing sci-fi, fantasy, or any other form of speculative fiction: a big part of your audience knows a lot more about computers than you do. If you choose to feature computing or the Internet in your work, you run a big risk of stretching credibility for these readers, who are, sadly, accustomed to being disappointed by portrayals of technology in fiction. Missteps like these take the reader out of the story, and hurt their suspension of disbelief. With a large percentage of today’s populace working in IT, these tech-savvy readers are too numerous to ignore.

Though reality isn’t always as exciting as the bad assumptions we’ve grown accustomed to, there are still plenty of opportunities for excitement and conflict in the digital world that you can use to your advantage. Your techie readers will certainly appreciate your attention to detail; plus, your respect for the reality of modern computing will make your story stand out in a crowd of tech ignorance.

Myth 001: The Know-It-All Computer Geek

You probably wouldn’t expect Maytag to make a good car, nor would you expect Volkswagen to make a good dishwasher. And I bet you wouldn’t want a psychiatrist doing your liver transplant. The world of computing is as highly specialized as engineering or medicine, if not more so. This is why the trope of the computer geek character who effortlessly masters every piece of technology in existence is so irritating: it’s impossible for one person to be that knowledgeable. Computers today are so complex and diverse, they are quite literally beyond the understanding of any one person.

Real IT pros tend to specialize in one small subset of computing, gaining deep knowledge and experience in their chosen discipline. When they encounter a problem outside their area of expertise, they consult with a specialist in that domain, much like a doctor would. Large companies employ dozens, if not hundreds of diverse specialists, while small organizations typically outsource their most demanding IT tasks to firms that provide these services. Nobody hires an IT generalist — even if such a person existed, the “jack of all trades, master of none” principle would apply.

In any case, having one character who can solve every tech problem imaginable is lazy writing. That doesn’t mean your computer geek can’t try to solve a given problem — there’s nothing a good techie likes more than a challenging puzzle — but you must put realistic limits on his abilities. There will be certain things he won’t be able to do, no matter how smart he is.

For your reference, some (definitely not all) of the most common areas of IT specialization are:

Software Developer/Engineer: these are the people who create and update software (apps).

these are the people who create and update software (apps). OS Developer: sub-speciality of the above; these guys work on the underlying operating system of the computer (e.g. Windows, Android).

sub-speciality of the above; these guys work on the underlying operating system of the computer (e.g. Windows, Android). Database Administrator: builds and maintains databases, big and small. Database security is part of their job.

builds and maintains databases, big and small. Database security is part of their job. Network Administrator: builds and maintains computer networks, keeps everything connected. Quite often handles network security as well.

builds and maintains computer networks, keeps everything connected. Quite often handles network security as well. Hardware Engineer: designs, builds, or maintains the hardware components of computers and computer accessories. This profession has a lot of sub-specialities, as you can probably imagine.

designs, builds, or maintains the hardware components of computers and computer accessories. This profession has a lot of sub-specialities, as you can probably imagine. Technical Support: these are the people who pick up the phone when someone has a problem with their computer. They fix basic issues on their own, and triage the more complex problems to other IT people.

Myth 010: Quick and Easy Hacking

We’ve all seen this one: a hacker sits in front of a hostile computer (or even a keypad on a locked door), types a magical sequence of characters/digits, then smiles and says those two thrilling words: “I’m in.” The door opens, the files are downloaded, the missile launch is aborted, and the protagonists have succeeded again, all thanks to the mighty hacker and her arcane computer knowledge.

This is patently absurd, especially the door-and-keypad scenario. Please don’t ever write anything like this. It’s lazy and unrealistic, and few computer tropes will cause more techie eye-rolls than this one.

Want to know the “magic” secret behind most real-world hacks? Someone was careless with their password, and a hacker got a hold of it. The Sony Pictures hack of 2014 is a perfect example of this: a sysadmin’s password was used to gain full access to their network. There’s no magic, no secret “open sesame” codes — just stolen network credentials. A hack like this is no more sophisticated than a liquor store robbery.

So, how do hackers obtain passwords? There are plenty of possibilities. The most common is basic negligence on the part of the account holder. At a previous job, my colleagues and I would always joke that if you flipped over ten of our client’s keyboards, you’d find nine passwords. Worse, a lot of clueless users have passwords that are very easy to guess, like “password”, or “letmein” (side note: for your own sake, please come up with a password that’s long and complex, but easy for you to remember). In a few cases, a software vulnerability in weak or out-of-date software can expose passwords to someone who knows where to look; this is exactly what the Heartbleed bug in OpenSSL was about. And, of course, there’s the old fashioned way: you can give the sysadmin a briefcase full of cash, or point a gun at his head. There’s a saying in information security: your network is only as secure as your weakest IT employee.

One possibility is to have the hack be an inside job, which is alarmingly common in the real world. In my Winterwakers series, the hacker protagonist is a network support tech whose job grants him legitimate access to plenty of computer networks.

Myth 011: The One and Only Copy

“I have the last remaining copy of your mom’s secret banana pancake recipe,” cackled the villain. “Give me the nuclear launch codes, or I delete it forever!”

This one always makes me laugh. Data is everywhere, and it’s virtually immortal. This is true now more than ever, with real-time backups and cloud drives being the new normal. Companies and governments know their data is precious and treat it accordingly, employing frequent backups and redundant storage. If something ever gets erased, either deliberately or accidentally, it’s a trivial matter to bring it back from the dead. Conversely, finding and erasing all traces of a file from all these backups and redundant systems is a complex, laborious task.

Even private individuals today have access to very strong data protection. Home backup drives are quite common and easy to use, and cloud storage services like Dropbox and iCloud preserve your data in secure servers you can access anytime, anywhere.

Assuming none of your backups or clouds have you covered, there are still ways you can retrieve deleted files. Consumer apps exist that find deleted data and reconstitute it, often with perfect success. Data recovery pros have access to even more advanced tools, and can sometimes recover files from fire or flood-damaged computers.

If you want data to be lost or inaccessible to your characters, consider encryption instead of deletion. A properly encrypted file is nearly impossible to crack without the decryption key (the rules in “Quick and Easy Hacking” apply here as well).

100: Enhance From Nothing

This one has been used and abused countless times in police procedurals and sci-fi thrillers alike. Using what appears to be simple computer software, a tech transforms a grainy, indistinct image into a crisp, sharp rendering of a license plate, an address, or a person’s face. Fictional techs can zoom in and enhance virtually any image the hard-nosed detective throws at them.

Reality is nowhere near this convenient. A computer image is stored as a grid of pixels: tiny colored squares that combine to create a picture. When you zoom in on an image, all the computer can do is make those pixels larger, which just looks like a blockier version of the same image. The software can’t add more pixels — it has no way of knowing what’s supposed to be there after the image was created.

That said, if you had a massive, hi-res image, it might in fact be possible to zoom in on it and get better detail, simply because of the sheer number of pixels available. Beware of making this assumption, though. A Youtube-quality (i.e. not that great) video weighs in at around 3 GB per hour of footage. Higher resolution uncompressed video files are hundreds of times that size. If your villain’s secret compound has dozens of security cameras (as all good secret compounds do), the data storage demands of hi-def video would be cost-prohibitive, if not massively taxing on the hardware. This is why security camera footage is so grainy: if it wasn’t, you’d only be able to store a few minutes at a time.

Instead of zoom-and-enhance, real police departments use quantity over quality. Cameras are everywhere nowadays, and most positive ID’s are made by examining and comparing images from multiple cameras, usually without the aid of software. Learn from the real world and don’t lazily rely on this well-worn trope: make your characters work hard to crack that case. Computers can do many amazing things, but magically enhancing an image to move your plot along isn’t one of them.

Please Share the #ScienceInSF

If you liked this article, please share it with your writing friends using the buttons below. You can also click to send one of these ready-made tweets:

Click to Tweet Computer and internet myths in fiction, by tech expert @mrperki: http://bit.ly/1xHZwk3 Part of the #ScienceInSF series by @DanKoboldt Click to Tweet Computer and internet myths in fiction, by tech expert @mrperki: http://bit.ly/1xHZwk3 Myth #1: the know-it-all computer geek #ScienceInSF Click to Tweet Computer and internet myths in fiction, by tech expert @mrperki: http://bit.ly/1xHZwk3 Myth #2: quick and easy hacking #ScienceInSF

Please share this article:Follow me and you'll never miss a post: