Since this year’s RootsTech wrapped up, there has been some grumbling amongst the techier attendees about the relative dearth of technical sessions this year compared to RootsTech’s early days. And yet, the conference drew by far its largest audience, showing that changes which troubled a minority appealed to the overwhelming majority. These conservations about RootsTech’s evolution got me thinking about whether there really is such a divide between genealogists and technologists. As a member of both groups, I’ve long seen an overlap in how good genealogists and good technologists work, because we’re all hackers.
Your first thought may be to bristle at the comparison. Hackers are evil geniuses who steal your emails, selfies, and credit card and social security numbers for fun and profit, right? Well, not exactly. For one thing, they’re hardly required to have genius-level skills anymore, with so many tools freely available and so many under-protected systems there for the taking. But more importantly, they aren’t always evil, either. Paul Graham, a well-known tech investor, articulates how most programmers would define the term:
To programmers, “hacker” connotes mastery in the most literal sense: someone who can make a computer do what he wants—whether the computer wants to or not… When you do something so clever that you somehow beat the system, that’s…called a hack.
—The Word “Hacker”
Graham goes on to explain that hacking predates computers, giving examples of people who cracked safes not to steal anything, but just for the curiosity of discovering how the device worked and the intellectual satisfaction of having solved the puzzle. “Show any hacker a lock,” he writes, “and his first thought is how to pick it.”
Some years ago I met Paul Graham and had to give him an example of something I hacked. My first thought was, who, me?! But I’m the textbook example of a goodie-goodie! I like to think I have as much curiosity as the next person, but I’d never dream of channeling it in such ambiguous ways.
And then I realized: I hack history every day! As a genealogist, the locks I pick aren’t on doors, safes, or firewalls — they’re on time itself. The system I reverse-engineer is the by-product of the fundamental human impulse to keep records of our existence. The lives of our ancestors intersected with these record-keeping systems — military, governmental, religious, fraternal — that took down their information long ago and are often still out there preserving it. A good genealogist knows how to find those intersections, and if the records of those intersections survive, s/he can provide answers others would consider irrevocably lost. A good genealogist makes the system give up its secrets. (And in case it isn’t clear, I present this analogy as someone who researches family history and writes code in equal measure.)
My uncle said to me after his parents, my grandparents, passed away, “I guess we’ll never know where their parents came from,” and within a month I had a pile of records — primarily censuses, ship manifests, and bank records — documenting the immigration stories of all of four of his grandparents, my great-grandparents. If you’re a genealogist, you know that this research isn’t impressive. But my uncle’s eyes welled up when he read stories he had given up on ever knowing. Rediscovering my family’s immigration story — towns, dates, even original names that I, too, had once believed lost — was the moment I gave myself up to genealogy forever. I cracked the system once. I needed that fix again.
Last summer a cousin sighed, “I wish I could know how our great-grandfather made his fortune.” Naturally his rumination became my challenge. Like any hacker, my natural impulse is to prove I can pick this lock, too, but it’s a much harder one. I had no easy clues to start with, no letters, journals, or bank statements someone threw into an attic. And the kinds of genealogical records that opened doors before turned up little this time; his ship manifest is missing, the pivotal 1890 census is gone, and the town’s city directory, by its own admission, bothered little with poor “Hunkies” like my great-grandfather. But they revealed just enough for me to see the shape of the story I must fill in. Somehow my great-grandfather went from delivering liquor for a local wholesaler in the 1890s to building and running his own hotel in the early 1900s.
So off I went, considering every possible way such a man would have intersected with the record-keepers of his time. Old newspapers tell me he appeared in Pennsylvania’s annual license court for a judge to decide if he was fit to sell liquor; does the county have transcripts recording his testimony? Deeds show me when he bought the land for his hotel, and Sanborn maps suggest the timeframe when the building went up; does the borough have building permits? Tax records? Voter rolls? What about records from before he made the leap — peddling licenses, bank loans, personal loans, credit reports? The more I press on, the more I see that — to paraphrase Daniel Mendelsohn — the records are not so much lost as waiting. I ask clerks to show me ledgers covered in dust and archivists to escort me into rooms closed to the public, and I wind my way, literally, through miles of microfilm. Through sheer dint of effort, I will make the past give up what secrets it retains. I have already gleaned some; ’til I got started, no one living even knew my great-grandfather had started as a teamster. This discovery is satisfying, but it is only the beginning.
What we do as genealogists isn’t always intellectually demanding. There is a tremendous amount of brute force in a reasonably exhaustive search (though there is in programmatic hacking, too, only one can automate such tasks). But just as surely as there is artistry to hacking (see Graham’s essay Hackers and Painters), there is artistry in knowing how to dance from record to record. You have to know how to frame a question clearly and precisely. You have to know how to determine what sources are out there. You have to know how to bend the sources you find to your will. In Jewish exegesis, there is the p’shat, the surface meaning, and then three deeper levels of meaning. Genealogical records aren’t as many-layered as scripture, but if you can’t get beyond the p’shat, you’ll miss most about what a record is telling you — and more importantly, where it is pointing you next. Part of moving beyond the p’shat is having a sufficient command of the period you’re researching. Even this most indigenous aspect of historical research has an analog in hacking. “Great hackers can load a large amount of context into their head,” Graham writes, “so that when they look at a line of code, they see not just that line but the whole program around it.” Similarly, a great genealogist doesn’t see a record in isolation, but as the product of the historical circumstances that created it and link it to other such records. Though we genealogists push ourselves through long periods of semi-engaged searching ’til we find the needle in the haystack, those periods are framed by a creative, considered approach not unlike how a hacker assesses his or her mark.
Genealogists and hackers are united in their delight in cracking seemingly impenetrable systems. So many of the qualities Graham articulates about great hackers are what I see in the best genealogists I know — a love for their work, a marked preference for interesting problems they can learn something from, and a special ability to focus. Both groups take on inherently imaginative work, engaging in it cyclically based on shifting levels of inspiration. In sum, we demonstrate a similar work ethic as we pick at our respective locks, trying to open doors others consider impossible to budge.
You may or may not see yourself in this analogy… yet. I pointed out at the start that today plenty of wannabe hackers lack the qualities Graham articulates — script kiddies, this lesser group is called, after the scripts they run without understanding just to see what havoc they can wreak. Here, too, I see an analogy with genealogical research. Digitization has come so far that it’s easier and easier to fall into the trap of being a “search kiddie,” just typing your ancestors’ names into online databases to see what’ll come up. Script kiddies are beholden to the scripts better hackers share; search kiddies are beholden to the records others choose to put online. Sometimes those records get you where you want to go; they were more than enough for me to give my uncle the answers he was looking for. But if I had believed those records were the beginning and end of what remains from the past, I’d have believed my great-grandfather’s early years in the U.S. were entirely lost.
There’s one more quality about good hackers that applies equally to good genealogists: a sense of wonder. You have that, too, wherever you are on the genealogy learning curve. The wonder about the past that got you started in family history is the same wonder you need to apply to researching more creatively. There is much more information out there than you realize, waiting for you to discover it. The heart of hacking is “[doing] something so clever that you somehow beat the system,” so embrace your innate curiosity and start hacking those historical records. For many of your most pressing questions, it is not too late to find answers.