Two views of hackking For different perspectives on hacking, CNN Interactive posed a series of questions via e-mail to two experts in the field, one a computer security expert for IBM, the other, editor of 2600, the Hackers' Quarterly. View 1: ÒHackers Are NecessaryÓ Emmanuel Goldstein of 2600: The Hacker's Quarterly (CNN) -- Emmanuel Goldstein is the editor-in-chief of 2600: The Hacker Quarterly and hosts a weekly radio program in New York called "Off the Hook." 1. How do you define haccking? Hacking is, very simply, asking a lot of questions and refusing to stop asking. This is why computers are perfect for inquisitive people -- they don't tell you to shut up when you keep asking questions or inputting commands over and over and over. But hacking doesn't have to confine itself to computers. Anyone with an inquisitive mind, a sense of adventure and strong beliefs in free speech and the right to know most definitely has a bit of the hacker spirit in them. 2. Are there legal or appropriate forms of hacking? One of the common misconceptions is that anyone considered a hacker is doing something illegal. It's a sad commentary on the state of our society when someone who is basically seeking knowledge and the truth is assumed to be up to something nefarious. Nothing could be further from the truth. 3. What kind of hackcing do you do? My main interest has always been phones and rarely does a day pass when I don't experiment in some way with a phone system, voice mail system, pay phone, or my own telephone. I've always been fascinated by the fact that we're only a few buttons away from virtually anyone on the planet and I hope that I never lose that sense of marvel. 4. What is the future of hacking? As long as the human spirit is alive, there will always be hackers. We may have a hell of a fight on our hands if we continue to be imprisoned and victimized for exploring, but that will do anything but stop us. 5. Your real name is Eric Corley. Why do you use the name Emmanuel Goldstein? I believe everyone should be given the opportunity to name themselves. That name should reflect something about who you are and what you believe in and stand for. View 2 ÒHacking is FelonyÓ IBM's Charles Palmer (CNN) -- Dr. Charles C. Palmer is the manager of Network Security and Cryptography and head of the Global Security Analysis Lab, which includes IBM's ethical hacking unit. 1. How do you define hacking? Hacking is unauthorized use of computer and network resources. (The term "hacker" originally meant a very gifted programmer. In recent years though, with easier access to multiple systems, it now has negative implications.) 2. In "Helpful Hacking" from IBM Research magazine in 1997, you are quoted as saying you don't hire reformed hackers and "there's no such thing." Could you explain? The number of really gifted hackers in the world is very small, but there are lots of wannabes.... When we do an ethical hack, we could be holding the keys to that company once we gain access. 3. Is it fair to say that you are opposed to hacking? As I said before, hacking is a felony -- for good reason. Some of the "joyriders" -- hackers who access systems just for the challenge -- think it's harmless since they usually don't "do" anything besides go in and look around. But if a stranger came into your house, looked through everything, touched several items, would you consider that harmless? These joyriders could be causing damage inadvertently since just by their presence they are using system resources. 4. Do you think hacking can be useful? Hacking can be useful in a controlled environment where there are ground rules and contractual agreements. 5. What is the long-term outlook for hacking? Most kids today know much more about computers than their parents do, and some start "messing around" at earlier ages than in the past. The best thing we can do is to show them how interesting it can be to work at protecting systems and networks. 66. What about the outlook for computer security? While better security technologies are appearing all the time, education and awareness will continue to be the limiting factor. Innovations like biometrics and smart cards will go a long way toward making security easier for the end user as well as for the system administrators.