@Hypnotica Said
I dunno to be honest. I was watching a documentry and it actually stated that a lot of cyber crime goes un reported. If abig company admits it was hacked, it is going to lose stock value. Also the Sys Admin would have to admit that they messed up.
And then I dont know if you have ever been on TOR, deepweb, darknet, whatever you want to call it, but things like Credit Card Numbers are currency.
There are a lot of Botnets out there, being utilised for various tasks and roles, which have not been shut down, nor have the creators and controllers been apprehended.
Yes. Lots of cyber crime goes unreported.
To put it in perspective;
In the USA: "More than half of the nation’s violent crimes, or
nearly 3.4 million violent victimizations per year, went unreported to the police between 2006 and 2010, according to a new report published by the Bureau of Justice Statistics (BJS)."
But, sticking with hacker related activity. Essentially there are:
1. Computer viruses (which are really very much different from hacking). When most people say that their email was "hacked" typically it was not actually "hacked". They just down loaded a virus. Sometimes it is a bot that collects specific data... but normally it is not a true "hack". It may or may not be illegal and if illegal may or may not result in a prosecution... it depends on the specifics of the virus.
2. electronic/computer scanning of networks, which (in the USA) is almost never a crime;
3. electronic/computer probing of networks, which (in the USA) is almost never a Federal crime;
Note: Even though governments (for example the USA's Department of Defense) frequently call #2 and #3 "attacks" they are not "attacks" and are almost never illegal.
4. and then there is hacking, which (in the USA) is a crime... BUT, depending on the circumstances, might not reach the threshold for prosecution.
5. There are many affiliated crimes (again in the USA) like collecting passwords, pin numbers, user IDs, names, etc.... these are often done by bots and are criminal in nature... depending on the exact circumstances, and where the data was obtained.
6. And finally, the physical theft of data that does not use the internet in anyway (like what wikileaks typically does) ... which are not hacking.