This 5-page paper provides the pros and cons of using hackers as security guardians in an information technology system. Bibliography lists 5 sources.