In ten pages this paper evaluates whether or not hacking is constructive or destructive. Ten sources are cited in the bibliography.