Hacking | In cyberspace, the law of silence