So you think that you know what "hacker" means?


While its linguistic imagery may not rise to the level of your favorite author, the computer world has its share of colorful
terms adopted from other contexts, such as "surf", "mouse" and "cookie". But perhaps no term in the field has yielded as much diversity as has the word "hack/hacker". Probably a few hoary Kat readers, such as this Kat, were around close to the genesis of the adoption of the term in connection with computers, but most Kat readers probably have fewer, or no, grey Kat hairs. As such, it is worth recalling how the term has developed over more than a 60-year period, both because of the intrinsic fascination in seeing how a term changes meaning over time and to better appreciate the term's various current shades of meaning within the discourse about computers, software and networks.

Given the negative connotation of the term today, I recall my surprise when I first read (alas, the source has long been forgotten) that in the world of mainframe computer in the 1960's, where the principal revenue stream were licensing fees for the hardware, "hacker" referred to a person who was encouraged to tinker with the software to improve its performance. After all, there was no or little money to be made in the software per se, so that any improvements in performance would only serve to enhance the value of the mainframe itself. Hacking appeared to be a beneficial activity in support of the hardware.

But it transpires that the earliest adoption of the term with respect to the computer industry occurred in the 1950's. Ben Yagoda, writing in the March 6, 2014 issue of The New Yorker, notes that the term was used in the 1950’s at MIT “to mean fussing with machines”, a benign sort of activity. The negative connotation that we have come to associate with the term apparently only began to creep into our lexicon in the 1970’s. Thus, in a 1975 glossary for computer programs, one of the meanings given is “[a] malicious meddler who tries to discover sensitive information by poking around. Hence password hacker, network hacker. The correct term is cracker.” Any reference to “cracker” in this context seems to have disappeared, leaving us with “hacker” in the negative sense that is prevalent today, conjuring up a “digital trespasser.”

Lest one think however that "hacker" has come to connote only nefarious intruders into computers, software and networks, the meaning term has further developed so that are, in fact, under certain circumstances, "good" and "bad" hackers. Consider the following definitions that appear on technopedia.com.
"A white hat hacker is a computer security specialist who breaks into protected systems and networks to test and asses their security. White hat hackers use their skills to improve security by exposing vulnerabilities before malicious hackers (known as black hat hackers) can detect and exploit them. Although the methods used are similar, if not identical, to those employed by malicious hackers, white hat hackers have permission to employ them against the organization that has hired them."

"White hat hackers are usually seen as hackers who use their skills to benefit society. They may be reformed black hat hackers or they may simply be well-versed in the methods and techniques used by hackers. An organization can hire these consultants to do tests and implement best practices that make them less vulnerable to malicious hacking attempts in the future."

"For the most part, the term is synonymous with "ethical hacker." The term comes from old Western movies where the cliché was for the "good guy" to wear a white cowboy hat. Of course, the "bad guys" always seemed to wear a black hat."


Yagoda traces this black/white dichotomy back to the 1960’s in connection with intruding into telephone lines, but the understandings quoted above are largely of more recent vintage.

It is interesting to note that the difference between "hacker good" and "hacker bad" is not determined as much by the nature of the activity per se as by the surrounding circumstances, including whether the target gave permission to be hacked. Perhaps it is fair to say that the difference between black and white hacking reflects a more general ambivalence in society about how to view hackers and hacking. Is he a “righteous dude”, in the words of eulogy to an M.I.T. student who died in a plane crash in 1995, or a malicious trespasser of a computer or network. And then, of course, there is the national security aspect of "hacking". When it is the enemy's network that has been successfully hacked, the resulting activity might be positively viewed, but when it is a network in one's own country that has been hacked by foreign perpetrators, the activity takes on an entirely different character.

What is “hacking” and who is a “hacker”? It very much depends upon whom you ask.