If you’ve watched any movie involving computer hacking made in the last three decades, you know the scene. The hero, who needs access to some sensitive files, meets up with a hacker, typically revealed to be an unkempt loner in a dark room. The hacker types rapidly, occasionally throwing out some technobabble about the firewall or the mainframe, and, boom, they’re in.
The myth has stuck, even in Silicon Valley, and now it’s threatening to unravel our government.
This is, of course, nonsense. Hackers working alone quickly has about as much to do with software programming as jumping out of a helicopter does with policing. But the myth has stuck, even in Silicon Valley, and now it’s threatening to unravel our government.
According to multiple reports, billionaire federal contractor Elon Musk has taken over the U.S. Digital Service, essentially the IT department for the executive branch, with a small team of young computer programmers who are demanding access to sensitive government databases and payment programs. Details about their work remain sketchy, but critics worry that they are making changes to the underlying code or downloading sensitive information to unsecured laptops.
A Treasury Department official told Congress that the programmers had “read-only access,” which would mean they could look at the code but not change it.
Without wading into various unconfirmed reports about how they are doing this work, let me just say: This is bad.
Musk’s team — since renamed the U.S. DOGE Service, after a jokey cryptocurrency — is small and moving fast. Already, they appear to be looking at sensitive systems at the U.S. Agency for International Development, the Treasury Department’s Bureau of the Fiscal Service, the Centers for Medicare and Medicaid Services, the Education Department and the National Oceanic and Atmospheric Administration. Given the handful of staffers involved and the number of agencies, it’s likely that any programming work they’re doing would be much like that of the mythical movie hacker: fast and alone.
There’s a term for this: cowboy coding. And while that sounds kind of cool, it’s actually extremely dangerous, especially in the wrong circumstances.
Cowboy coding is a method of computer programming in which a person works by themself, often in long shifts. The stereotypical cowboy coder works overnight surrounded by cans of Mountain Dew or Red Bull. This approach can work if you’re developing, say, a simple app or an online tool where it’s not hard to lose track of your own work. But for anything more complicated, it can quickly get out of hand, causing crashes and leaving programs vulnerable to viruses and hackers.
Cowboy coding grew out of the early years of Silicon Valley techies working in their garages on computers they built themselves. As programming matured, new processes developed. One is the slow but diligent waterfall, in which requirements are laid out and the overall design planned before any coding begins. More popular these days is agile, in which teams work closely in short sprints to make incremental improvements and test them constantly.
When he took over Twitter, he demanded in a late-night email that staff members commit to being “extremely hardcore.”
Musk has long clung to the old mythology, though. He has claimed to work 120-hour weeks (while somehow constantly posting on X and playing video games competitively) serving as CEO of SpaceX and Tesla and helping run several other companies he owns, plus serve as a “special government employee” for President Donald Trump. He bragged about keeping a sleeping bag at a Tesla factory. When he took over Twitter (now X), he famously fired 80% of employees and demanded in a late-night email that staff members commit to being “extremely hardcore.”








