In 1957, a blind boy in Virginia used a high-pitched whistle to unlock his phone line, giving him free long-distance phone calls and establishing a hack with a direct line to Apple Inc.
Joe Engrassia, Jr., who changed his name in 1991 to “Joybubbles,” is widely considered to be the father of phone “phreaking,” a technology famous for inspiring Steve Jobs and Steve Wozniak to build a machine that could emulate the pitch frequency needed to control AT&T’s phone lines.
Wozniak, then a 21-year-old Berkeley college student, designed his “digital blue box” after reading 1971 Esquire article “Secrets Of the Little Blue Box.” For little more than $100 in parts, he and Jobs had hacked the global phone network. Jobs said the experience led them to build the Apple computer, a company worth more than $500 billion.
Technology journalist Clive Thompson, who’s currently working on a book for Penguin about how programmers think called Hello, World, says the blue box is emblematic of a certain subset of computer hackers.
“There’s a type of hacker that gets into computer because they enjoy screwing around with what they can get computer system to do, and that often involves stuff that’s thinly legal or totally illegal, because the fun is taking a system and seeing how to exploit weaknesses,” Thompson says.
That kind of curiosity-driven hacking made Wozniak a white-hat hacker, a term used to describe people who, loosely, like to take things apart to see how they work (and don’t work). Whether it’s legal or illegal is often beside the point because white-hat hackers are generally non-malicious and their exploits are often used to strengthen the very systems they hacked. Thompson points out that Apple has hired several people who were able to jailbreak and hack iPhones.
Those activities have also led to a number of tech advancements, perhaps most notably the open-source movement responsible for creating reams of non-proprietary software used by many of the world’s biggest technology companies. It was one of the first times a single piece of software was so widely adopted by the free market. “That kind of creativity can easily fold over into the type of creativity that capitalism rewards,” Thompson says.
There’s a direct correlation between the way open-source software permeated business and the developer culture we have today. It’s been enormously advantageous for companies to hire people who want to crack software open to play around with its insides, because they are some of the most motivated, clever and creative people in the world.
So many hacker sensibilities, projects, and products are motivated by, threatened by, or easily folded into corporate imperatives. Take, for instance, the hacker commitment to autonomy. Technology giant Google, seeking to lure top talent, instituted the ‘20 per cent policy.’ The company affords its engineers, many of whom value technical sovereignty as part of their ethos, the freedom to work one day a week on their own self-directed projects.
Coleman points out that this does, unfortunately, lead to some people working 100 hours a week — a profound devotion to programming that has become a hallmark of developer culture. “Silicon Valley is smart in exploiting hacker tendencies, but people are also willing,” she says in a phone interview with TechPORTFOLIO.
Hackers in this area are generally amenable to the prospect of making money, though it’s usually not their main motivation — at least not at first. Coleman says hackers who become developers at companies often tire of the clock-in, clock-out grind of the corporate world and seek to create their own, more fulfilling projects, which has been a major catalyst in startup culture.
“In regions like Silicon Valley, and in other startup culture areas, there’s a very tight fusion of actual hackers who want to make cool technology and also want to make a lot of money,” she says.
There’s another side to hacking that’s probably best represented in popular culture by Mr. Robot, which focuses on an antisocial, anti-capitalist hacker widely believed to be inspired by hacktivist group Anonymous.
The Occupy movement, WikiLeaks, Edward Snowden and Chelsea Manning have all helped the public gain a greater consciousness, and even admiration, for hacking as a public service, leading to the rise of the Robin Hood hacker profile.
That such seemingly selfless acts, often driven by anti-capitalist ideas, have been repurposed by film and TV studios to make millions of dollars is ironic. “Hollywood has long made a lot of money off domesticating supposedly seditious ideas,” Thompson says.
Still, whether archetypal hackers — often highly intelligent and creative individuals who like to take things apart and who are generally mistrustful of the establishment — have been co-opted to form a developer culture that has fed tech startups, and therefore, capitalism, is a tricky question.
“It’s a really weird, and interesting moment, where the two discourses are really strong. They are in competition with each other,” Coleman says.
That said, the divides between discovery-driven hacking, Robin Hood-style hacking, hacktivism and black-hat hacking, aren’t as deep as some may believe. In fact, these spaces can be very fluid, and many hackers (and developers, by extension) dip their toes into these different waters from time to time. Experimentation and publishing boundaries are part of hacking’s core ethos, after all.
“There’s a politics to hacking no matter what, because so many of them are willing to call out bullshit and break the rules,” Coleman says.
Follow @traceylindeman on Twitter