Appearance
Excerpt
Excerpt from Hackers, Heroes of the Computer Revolution. Chapters 1 and 2, by Steven Levy
Just why Peter Samson was wandering around in Building 26 in the
middle of the night is a matter that he would find difficult to
explain. Some things are not spoken. If you were like the
people whom Peter Samson was coming to know and befriend in this,
his freshman year at the Massachusetts Institute of Technology in
the winter of 1958-59, no explanation would be required.
Wandering around the labyrinth of laboratories and storerooms,
searching for the secrets of telephone switching in machine
rooms, tracing paths of wires or relays in subterranean steam
tunnels . . . for some, it was common behavior, and there was
no need to justify the impulse, when confronted with a closed
door with an unbearably intriguing noise behind it, to open the
door uninvited. And then, if there was no one to physically bar
access to whatever was making that intriguing noise, to touch the
machine, start flicking switches and noting responses, and
eventually to loosen a screw, unhook a template, jiggle some
diodes and tweak a few connections. Peter Samson and his friends
had grown up with a specific relationship to the world, wherein
things had meaning only if you found out how they worked. And
how would you go about that if not by getting your hands on them?
It was in the basement of Building 26 that Samson and his friends
discovered the EAM room. Building 26 was a long glass-and-steel
structure, one of MIT's newer buildings, contrasting with the
venerable pillared structures that fronted the Institute on
Massachusetts Avenue. In the basement of this building void of
personality, the EAM room. Electronic Accounting Machinery. A
room that housed machines which ran like computers.
Not many people in 1959 had even seen a computer, let alone
touched one. Samson, a wiry, curly-haired redhead with a way of
extending his vowels so that it would seem he was racing through
lists of possible meanings of statements in mid-word, had viewed
computers on his visits to MIT from his hometown of Lowell,
Massachusetts, less than thirty miles from campus. This made him
a "Cambridge urchin," one of dozens of science-crazy high
schoolers in the region who were drawn, as if by gravitational
pull, to the Cambridge campus. He had even tried to rig up his
own computer with discarded parts of old pinball machines: they
were the best source of logic elements he could find.
Explanation
Detailed Explanation of the Excerpt from Hackers: Heroes of the Computer Revolution (Chapters 1–2) by Steven Levy
This passage introduces Peter Samson, a freshman at MIT in 1958–59, and sets the stage for the emergence of the hacker ethos—a culture of curiosity, hands-on exploration, and defiance of institutional barriers in the pursuit of technological mastery. Levy’s prose captures the rebellious, inquisitive spirit of early computer hackers, framing their actions as both a personal compulsion and a collective cultural phenomenon.
1. Context & Background
- Source: Hackers: Heroes of the Computer Revolution (1984) by Steven Levy is a foundational work on the history of computing, chronicling the lives of early programmers, engineers, and enthusiasts who shaped the digital age.
- Setting: MIT in the late 1950s, a hub for technological innovation where access to computers was extremely limited (most machines were restricted to military or corporate use).
- Peter Samson: A prototype of the "hacker"—a brilliant, obsessive tinkerer who saw technology not as a closed system but as something to dissect, modify, and improve. His actions foreshadow the hacker ethic Levy later defines: "access to computers should be unlimited and total" and "hands-on imperative" (the belief that the best way to understand a system is to interact with it directly).
2. Themes
A. The Hacker Mindset: Curiosity as Compulsion
- The passage opens with an unexplained, almost mystical act: Samson wandering MIT’s Building 26 at night, drawn by an "unbearably intriguing noise" behind a closed door.
- The phrase "some things are not spoken" suggests this behavior is instinctual, not rationalized—hackers act first, justify later (if at all).
- The physicality of exploration is emphasized: "touch the machine, start flicking switches, loosen a screw, unhook a template"—knowledge comes from direct manipulation, not theory.
- This reflects the hacker’s rejection of authority; if a door is locked, the impulse is to open it anyway. Institutions (like MIT) are seen as gatekeepers of knowledge, but hackers bypass them.
B. Technology as a Playground
- The EAM (Electronic Accounting Machinery) room is described as a hidden treasure—a space where machines "ran like computers" (a rare sight in 1959).
- The basement setting symbolizes the underground, subversive nature of hacking—these explorations happen in hidden, neglected spaces, away from oversight.
- The machines are not yet "computers" in the modern sense but prototypes, making Samson’s fascination even more pioneering.
C. The "Cambridge Urchin" Phenomenon
- Samson is part of a generation of science-obsessed teens (called "Cambridge urchins") who were drawn to MIT like a "gravitational pull."
- The comparison to gravity suggests an inevitable, almost predestined attraction to technology.
- His DIY attempts (building a computer from pinball machine parts) show the resourcefulness of early hackers—when formal access was denied, they scavenged and improvised.
D. The Loneliness & Camaraderie of Hacking
- While hacking is often a solitary act (Samson wanders alone at night), it’s also a shared culture.
- The line "no explanation would be required" implies a tacit understanding among hackers—they recognize each other’s compulsions.
- This foreshadows the collaborative yet competitive hacker communities that would emerge (e.g., MIT’s Tech Model Railroad Club, where Samson and others like Richard Greenblatt would later congregate).
3. Literary Devices & Stylistic Choices
| Device | Example | Effect |
|---|---|---|
| Foreshadowing | "Some things are not spoken" | Hints at the unwritten rules of hacker culture—actions matter more than words. |
| Sensory Imagery | "unbearably intriguing noise" | Makes the allure of the unknown visceral; the reader feels Samson’s curiosity. |
| Metaphor | "gravitational pull" | Portrays MIT as an inescapable force for young tech enthusiasts. |
| Juxtaposition | "long glass-and-steel structure" vs. "venerable pillared structures" | Contrasts modern, utilitarian tech spaces with traditional academia, symbolizing the new vs. old guard. |
| Hyperbole | "things had meaning only if you found out how they worked" | Emphasizes the extreme, almost religious devotion to understanding systems. |
| Irony | A freshman (inexperienced in academia’s eyes) is more knowledgeable about machines than most professors. | Highlights how hackers operate outside formal hierarchies. |
4. Significance of the Passage
A. The Birth of Hacker Culture
- This scene is origin mythology for hackers. Samson’s actions—sneaking in, tinkering, defying restrictions—become the blueprint for hacker behavior.
- It challenges the sterile, institutional view of technology (computers as tools for experts) and replaces it with a playful, rebellious approach.
B. The Democratization of Technology
- In 1959, computers were military-industrial secrets. Samson’s generation demystified them, treating them as accessible, malleable objects.
- This mindset would later fuel the personal computer revolution (e.g., Apple, Microsoft) and the open-source movement.
C. The Ethics of Exploration vs. Trespassing
- The passage romanticizes hacking but also raises questions:
- Is this innocent curiosity or theft of institutional resources?
- Levy presents it as justified—the machines were underutilized, and hackers unlocked their potential.
- This tension foreshadows later debates (e.g., phone phreaking, cybersecurity ethics).
D. The Hacker as a Cultural Archetype
- Samson embodies the "heroic hacker"—a loner, a genius, a rule-breaker who pushes boundaries for the sake of knowledge.
- This archetype would later appear in figures like Steve Wozniak, Linus Torvalds, and even fictional characters (e.g., Neo in The Matrix, Lisbeth Salander in The Girl with the Dragon Tattoo).
5. Key Takeaways from the Text Itself
- Hacking is a physical, tactile experience—not just coding, but touching, modifying, and repurposing machines.
- The best hackers are self-taught—Samson’s pinball machine computer shows that constraints breed creativity.
- Institutions are obstacles—MIT’s locked doors are challenges to overcome, not barriers to respect.
- Curiosity is its own justification—the passage never explains why Samson does what he does because, in hacker culture, the "why" is self-evident.
- Technology is a frontier—just as early explorers mapped uncharted lands, hackers map the unseen workings of machines.
Conclusion: Why This Matters
This excerpt is not just history—it’s a manifestation of a philosophy that would reshape the world. The hacker ethos described here—hands-on learning, defiance of authority, and relentless curiosity—became the foundation of Silicon Valley, open-source software, and even internet culture. Levy’s writing captures the romance of discovery, making Samson’s midnight wanderings feel like the first steps in a revolution.
Would you like a deeper dive into any specific aspect (e.g., the Tech Model Railroad Club, the evolution of the hacker ethic, or comparisons to modern hacking culture)?