SlideShare ist ein Scribd-Unternehmen logo
1 von 18
Deep Web &Dark Web
By:
WHAT ARE THEY?
Surface web is only about 19 TB in size
The deep net has a whopping size
of over 7500 TB !
HOW DO WE GET THERE?
-need browser that masks our
identity
-need access to otherwise
inaccessible parts of the web
WHY USE THESE BROWSERS?
Search engine crawlers do not pick up most resources including:
● Dynamic content: dynamic pages which are returned in response to a submitted query or accessed only through a form
● Unlinked content: pages which are not linked to by other pages (ie backlinks or inlinks)
● Private Web: sites that require registration and login
● Limited access content: sites that limit access to their pages in a technical way
● Scripted content: pages that are only accessible through links produced in script (ex javascript)
● Non-HTML/text content: textual content encoded in multimedia files
● Text content using the Gopher protocol and files hosted on irregular FTP
ILLEGALACTIVITIES
PURCHASING ILLEGAL ITEMS/SUBSTANCES
● millions of dollars of transactions made
each year
● can purchase weapons, narcotics, credit
cards, organs, hackers, hitmen, etc
● From February 6, 2011 to July 23, 2013
roughly $1.2 billion in revenue and $79.8
million in commissions were made through
Silk Road alone
LEAK OF SENSITIVE INFORMATION
SCAMS
● credit card frauds
● fake passports and ID
● Hitmen
● Stealing private and
personal info
● exploitations to upload
malware
HUMAN TRAFFICKING & ORGAN DEALING
● Slaves can be bought and sold
over the dark web
● Sites involving human
experimentation
● Organs can also be purchased
● People can intentionally sell
their organs
● amateur surgery kits
CHILD PORNOGRAPHY
PROSTITUTION
● Services are provided
discretely through the deep
net
● one of the biggest problems on the dark
web
● more and more sites keep emerging
ASSASSINATION
TERRORIST ACTIVITY
● Hitman services
● Widely regarded as a hoax
● the Deep net has
always been
considered a place
of communication
between terrorist
groups
LEGAL USES
● Whistleblowers
● Military
● Policy & Crime units
● Access to additional information
● Accessing websites not available
to other countries.
● Everyday buying and selling
UNDERGROUND JOURNALISTS
● Access for places with heavy censorship laws over the internet
● Obtaining information on the events occurring in other countries
● Cohort exchange of messages
● Private message sending within the country
● Information leaking concerning the states of other places
● Leaking of Classified information for betterment of someone
DEEP WEB USED BY THE GOVERNMENT
● In august 2013, the US intercepted messages being sent amongst senior al
qaeda officials
● US embassies were the target
● This was intercepted by the US government. 22 US embassies were shut
down across the Middle East and North Africa as part of a counter effort
● Messages were sent through an anonymous email service
CICADA 3301
● Unknown organization
●
● Tons of rumors revolving its involvement or meaning. Some believe it be a
recruitment agency for government or even terrorist activity.
●
● Has only appeared 4 times, posting complex puzzles to be solved. Latest one
on January 5, 2016.
●
● All that's known is that they are trying to find “highly intelligent individuals”.
●
● Puzzles involved media, music, bootable Linux CDs, signs, cryptography,
steganography etc.
IS THE DEEP NET / DARK NET SAFE?
No matter how updated, browsers still have
vulnerabilities that can be exploited
● YES ● NO
●
● There are much more safety precautions ●
involved in using these deep web browsers
●
● Example: masking IP address, encryptions, etc. ●
●
● There are directories that you can use to browse
safely in the deep web.
Even just using your normal email or a regular
username can have serious effects
● NEVER give up personal info, or credit card info
● Should be wary when making purchases etc.
● Provides additional security in terms of hacking
and malware prevention
QUESTIONS AND ANSWERS
● What is the difference between the deep web and the dark web?
- The Deep Web refers to the broad swath of the internet that traditional search engines are unable to access, including
password-protected web forums, chat services, file sharing and P2P technologies. While the Dark Web is a
subcomponent of the Deep Web that is not only inaccessible to mainstream search engines but only visible to users who
have installed specialized software enabling access to these regions of the internet.
● Why can’t you use a surface web browsers and search engines to enter the
deep web?
- Using a regular web browser would not protect your identity and it can arouse suspicion with the law. Tor is
exceptionally good because there are several layers of encryption (like an onion) to mask your IP.
- Using a search engine such as Google is futile as it cannot index or retrieve the amount of data that is not accessed via
public DNS services. The Dark Web and the Deep Web itself have their own search engines.
-
● Name three illegal and legal activities that can be done in the deep web.
- Illegal: Prostitution, Drug deals, Hitmen services.
- Legal: Journalism, accessing banned novels, whistleblowing.
QUESTIONS AND ANSWERS
●
REFERENCES
● http://securityaffairs.co/wordpress/8719/cyber-crime/the-good-and-the-bad-of-the-deep-web.html
● https://www.cigionline.org/sites/default/files/gcig_paper_no6.pdf
● https://www.flashpoint-intel.com/home/assets/File/Flashpoint_IlluminatingTheDeep%26DarkWeb.pdf
● https://en.wikipedia.org/wiki/Dark_web

Weitere ähnliche Inhalte

Ähnlich wie Team11_DeepDarkWeb.pptx

Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxIbrahimSami14
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
 
Deep Web – Deepweb.pdf
Deep Web – Deepweb.pdfDeep Web – Deepweb.pdf
Deep Web – Deepweb.pdfTopLinkSeo
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Deep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdfDeep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdfkabirhasan11
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed webNitish Joshi
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep WebIRJET Journal
 
Dark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfDark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfTopLinkSeo
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniPraneshKulkarni22
 
Demystifying the Dark Web
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark WebTom Kranz
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 

Ähnlich wie Team11_DeepDarkWeb.pptx (20)

Invisible Web
Invisible Web Invisible Web
Invisible Web
 
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Deep Web – Deepweb.pdf
Deep Web – Deepweb.pdfDeep Web – Deepweb.pdf
Deep Web – Deepweb.pdf
 
What Is Dark Web.docx
What Is Dark Web.docxWhat Is Dark Web.docx
What Is Dark Web.docx
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Darknet
DarknetDarknet
Darknet
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Deep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdfDeep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdf
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 
Dark web (2)
Dark web (2)Dark web (2)
Dark web (2)
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep Web
 
Dark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfDark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdf
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
Demystifying the Dark Web
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark Web
 
Deep web
Deep webDeep web
Deep web
 
Dark net (escalona)
Dark net (escalona)Dark net (escalona)
Dark net (escalona)
 
Dark web
Dark webDark web
Dark web
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 

Kürzlich hochgeladen

Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...Amil baba
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"mphochane1998
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARKOUSTAV SARKAR
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdfKamal Acharya
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxSCMS School of Architecture
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 

Kürzlich hochgeladen (20)

Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments""Lesotho Leaps Forward: A Chronicle of Transformative Developments"
"Lesotho Leaps Forward: A Chronicle of Transformative Developments"
 
Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptxS1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
S1S2 B.Arch MGU - HOA1&2 Module 3 -Temple Architecture of Kerala.pptx
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 

Team11_DeepDarkWeb.pptx

  • 1. Deep Web &Dark Web By:
  • 2. WHAT ARE THEY? Surface web is only about 19 TB in size The deep net has a whopping size of over 7500 TB !
  • 3. HOW DO WE GET THERE? -need browser that masks our identity -need access to otherwise inaccessible parts of the web
  • 4. WHY USE THESE BROWSERS? Search engine crawlers do not pick up most resources including: ● Dynamic content: dynamic pages which are returned in response to a submitted query or accessed only through a form ● Unlinked content: pages which are not linked to by other pages (ie backlinks or inlinks) ● Private Web: sites that require registration and login ● Limited access content: sites that limit access to their pages in a technical way ● Scripted content: pages that are only accessible through links produced in script (ex javascript) ● Non-HTML/text content: textual content encoded in multimedia files ● Text content using the Gopher protocol and files hosted on irregular FTP
  • 6. PURCHASING ILLEGAL ITEMS/SUBSTANCES ● millions of dollars of transactions made each year ● can purchase weapons, narcotics, credit cards, organs, hackers, hitmen, etc ● From February 6, 2011 to July 23, 2013 roughly $1.2 billion in revenue and $79.8 million in commissions were made through Silk Road alone
  • 7. LEAK OF SENSITIVE INFORMATION SCAMS ● credit card frauds ● fake passports and ID ● Hitmen ● Stealing private and personal info ● exploitations to upload malware
  • 8. HUMAN TRAFFICKING & ORGAN DEALING ● Slaves can be bought and sold over the dark web ● Sites involving human experimentation ● Organs can also be purchased ● People can intentionally sell their organs ● amateur surgery kits
  • 9. CHILD PORNOGRAPHY PROSTITUTION ● Services are provided discretely through the deep net ● one of the biggest problems on the dark web ● more and more sites keep emerging
  • 10. ASSASSINATION TERRORIST ACTIVITY ● Hitman services ● Widely regarded as a hoax ● the Deep net has always been considered a place of communication between terrorist groups
  • 11. LEGAL USES ● Whistleblowers ● Military ● Policy & Crime units ● Access to additional information ● Accessing websites not available to other countries. ● Everyday buying and selling
  • 12. UNDERGROUND JOURNALISTS ● Access for places with heavy censorship laws over the internet ● Obtaining information on the events occurring in other countries ● Cohort exchange of messages ● Private message sending within the country ● Information leaking concerning the states of other places ● Leaking of Classified information for betterment of someone
  • 13. DEEP WEB USED BY THE GOVERNMENT ● In august 2013, the US intercepted messages being sent amongst senior al qaeda officials ● US embassies were the target ● This was intercepted by the US government. 22 US embassies were shut down across the Middle East and North Africa as part of a counter effort ● Messages were sent through an anonymous email service
  • 14. CICADA 3301 ● Unknown organization ● ● Tons of rumors revolving its involvement or meaning. Some believe it be a recruitment agency for government or even terrorist activity. ● ● Has only appeared 4 times, posting complex puzzles to be solved. Latest one on January 5, 2016. ● ● All that's known is that they are trying to find “highly intelligent individuals”. ● ● Puzzles involved media, music, bootable Linux CDs, signs, cryptography, steganography etc.
  • 15. IS THE DEEP NET / DARK NET SAFE? No matter how updated, browsers still have vulnerabilities that can be exploited ● YES ● NO ● ● There are much more safety precautions ● involved in using these deep web browsers ● ● Example: masking IP address, encryptions, etc. ● ● ● There are directories that you can use to browse safely in the deep web. Even just using your normal email or a regular username can have serious effects ● NEVER give up personal info, or credit card info ● Should be wary when making purchases etc. ● Provides additional security in terms of hacking and malware prevention
  • 16. QUESTIONS AND ANSWERS ● What is the difference between the deep web and the dark web? - The Deep Web refers to the broad swath of the internet that traditional search engines are unable to access, including password-protected web forums, chat services, file sharing and P2P technologies. While the Dark Web is a subcomponent of the Deep Web that is not only inaccessible to mainstream search engines but only visible to users who have installed specialized software enabling access to these regions of the internet. ● Why can’t you use a surface web browsers and search engines to enter the deep web? - Using a regular web browser would not protect your identity and it can arouse suspicion with the law. Tor is exceptionally good because there are several layers of encryption (like an onion) to mask your IP. - Using a search engine such as Google is futile as it cannot index or retrieve the amount of data that is not accessed via public DNS services. The Dark Web and the Deep Web itself have their own search engines. - ● Name three illegal and legal activities that can be done in the deep web. - Illegal: Prostitution, Drug deals, Hitmen services. - Legal: Journalism, accessing banned novels, whistleblowing.
  • 18. REFERENCES ● http://securityaffairs.co/wordpress/8719/cyber-crime/the-good-and-the-bad-of-the-deep-web.html ● https://www.cigionline.org/sites/default/files/gcig_paper_no6.pdf ● https://www.flashpoint-intel.com/home/assets/File/Flashpoint_IlluminatingTheDeep%26DarkWeb.pdf ● https://en.wikipedia.org/wiki/Dark_web