SlideShare ist ein Scribd-Unternehmen logo
1 von 26
RESEARCH INTHE
DEEPWEB
Outline
■ The SurfaceWebVS the Deep Web
■ DeepWeb vs DarkWeb
■ How to get deeper
■ DarkWeb access
■ Tools
SurfaceWeb
Anything that can be indexed by a
typical search engine.
DeepWeb
■ Quality content is 1,000 to 2,000 times greater than surface web
■ 95% of DeepWeb is accessible to public (no fees or subscription required)
■ The deep web is the internet that has not been indexed by commercial search engines such as Google and
Yahoo!.These search engines send out crawlers or spiders to index and catalog available web sites, but the
vast majority of the internet, 500X the surface net, includes many of the best resources which are not
indexed by these search engines. Such as:
– Unlinked pages:Spiders can’t find web pages that are not linked to others.
– Private intranets and web pages, password protected and more.
– Non HTML content: e.g., content rich, lots of different file type
– Library & Government Databases -How StuffWorks.com
Types of deep web
■ InvisibleWeb: Material that can be, but is not included in search engine results. EG:
new material added and not yet picked up.
■ PrivateWeb: Sites intentionally excluded from search engine results. Ex: password
protected
■ Subscriptions websites & databases: ESPN Insider, (Library Databases) Proquest
databases, EbscoHost. -How StuffWorks.com
How to get deeper
■ Directories
– http://www.dmoz.org/
■ Specialized Search Engines
– http://biznar.com/biznar/desktop/en/search.html
– http://www.wolframalpha.com/
– http://archive.org/web/web.php
■ Academic Databases
– Jstor
– Science Direct
■ Specialized Databases
– https://www.archives.gov/
■ GovernmentWebsites
– https://www.data.gov/
– https://www.govinfo.gov/
The DarkWeb
■ The Dark web: An area of the web which information is hidden deep and anonymously.
■ The DarkWeb then is a small portion of the DeepWeb that has been intentionally
hidden and is inaccessible through standard web browsers.
"The deepWeb may be a shadow land of untapped potential, but with a bit of skill and
some luck, you can illuminate a lot of valuable information that many people worked to
archive. On the dark Web, where people purposely hide information, they'd prefer it if
you left the lights off.
The dark Web is a bit like the Web's id. It's private. It's anonymous. It's powerful. It
unleashes human nature in all its forms, both good and bad.
The bad stuff, as always, gets most of the headlines.You can find illegal goods and
activities of all kinds through the dark Web.That includes illicit drugs, child pornography,
stolen credit card numbers, human trafficking, weapons, exotic animals, copyrighted
media and anything else you can think of.Theoretically, you could even, say, hire a hit
man to kill someone you don't like.
But you won't find this information with a Google search.These kinds ofWeb sites
require you to use special software, such asThe Onion Router, more commonly known
asTor.
Tor is software that installs into your browser and sets up the specific connections you
need to access dark Web sites.Critically,Tor is an encrypted technology that helps
people maintain anonymity online. It does this in part by routing connections through
servers around the world, making them much harder to track." -How StuffWorks.com
“Tor is a program you can run on your computer that helps keep you safe on
the Internet. It protects you by bouncing your communications around a
distributed network of relays run by volunteers all around the world: it
prevents somebody watching your Internet connection from learning what
sites you visit, and it prevents the sites you visit from learning your physical
location.This set of volunteer relays is called the Tor network (Tor Project)”
HowTor works
■ TheTor network is a volunteer-operated servers that individuals use to improve
privacy and security.
■ Tor connects through masked virtual links instead of a direct connection.
■ Tor directs Internet traffic through a free, worldwide, volunteer network consisting of
more than seven thousand relays to conceal a user's location and usage from anyone
conducting network surveillance or traffic analysis (How StuffWorks).
The Onion Router
“Onion routing is a technique for anonymous communication over a computer network. In
an onion network, messages are encapsulated in layers of encryption, analogous to layers
of an onion.The encrypted data is transmitted through a series of network nodes called
onion routers, each of which "peels" away a single layer, uncovering the data's next
destination.When the final layer is decrypted, the message arrives at its destination.The
sender remains anonymous because each intermediary knows only the location of the
immediately preceding and following nodes” (Tor (anonymity network)
Hidden Service
“Tor makes it possible for users to hide their locations while offering various kinds of
services, such as web publishing or an instant messaging server. UsingTor "rendezvous
points," otherTor users can connect to these hidden services, each without knowing the
other's network identity (Tor project).”
Why
■ Privacy
– Protect from traffic analysis
■ Traffic analysis is the process of intercepting and examining messages in order to deduce
information from patterns in communication. It can be performed even when the messages
are encrypted and cannot be decrypted.
– Personal Privacy from government privacy abuse
– Identity thieves
– Unscrupulous marketers
– Protect communication from corporations
– Skirt censorship
■ Whistleblowing & news leaks
– Chinese journalist communicate onTor
Tips
■ 1.) Don’t Download anything.
■ 2.) Don’t go to illegal sites (Duh).
■ 3.) Never pay with any credit card.
■ 4.) However, if you are going to use it because of personal privacy concerns, also be
aware of the dangerous e.g., illegal material, viruses, and slow websites!
References
■ How the DeepWebWorks:
http://computer.howstuffworks.com/internet/basics/how-the-deep-web-works.htm
■ Who usesTor:
https://www.torproject.org/about/torusers.html.en
■ Tor (anonymity network)
https://en.wikipedia.org/wiki/Tor_%28anonymity_network%29

Weitere ähnliche Inhalte

Was ist angesagt?

The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
 
Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019Priyanka Aash
 
The dark web
The dark webThe dark web
The dark webBella M
 
The Dark Web
The Dark WebThe Dark Web
The Dark WebJan Siy
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark WebMiteshWani
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Sudhanshu Chauhan
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and PrivacyBrian Pichman
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNetJames Bollen
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security RaviPrashant5
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)phexcom1
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Anshu Prateek
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceDeep Shankar Yadav
 

Was ist angesagt? (20)

Deep web and Dark web
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Introduction To Dark Web
Introduction To Dark WebIntroduction To Dark Web
Introduction To Dark Web
 
Osint presentation nov 2019
Osint presentation nov 2019Osint presentation nov 2019
Osint presentation nov 2019
 
The dark web
The dark webThe dark web
The dark web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Dark web (1)
Dark web (1)Dark web (1)
Dark web (1)
 
Dark web
Dark webDark web
Dark web
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)Tools for Open Source Intelligence (OSINT)
Tools for Open Source Intelligence (OSINT)
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Deep web
Deep webDeep web
Deep web
 
Dark Web
Dark WebDark Web
Dark Web
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 

Andere mochten auch

Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep WebTrend Micro
 
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESSNEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESSForgeRock
 
ما هو جوجل ادسنس؟ أسئلة وأجوبة حول جوجل أدسنس
ما هو جوجل ادسنس؟ أسئلة وأجوبة حول جوجل أدسنسما هو جوجل ادسنس؟ أسئلة وأجوبة حول جوجل أدسنس
ما هو جوجل ادسنس؟ أسئلة وأجوبة حول جوجل أدسنسmosab elhag
 
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeConsent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeForgeRock
 
The dark net illescas ecommer_k32
The dark net illescas ecommer_k32The dark net illescas ecommer_k32
The dark net illescas ecommer_k32Zach Illescas
 
The "whatever" Web
The "whatever" WebThe "whatever" Web
The "whatever" WebKAZAR Yassir
 
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers 1) Th...
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers  1) Th...DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers  1) Th...
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers 1) Th...Eugene Kowalzki
 
Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Bich (Evelyn) Chu
 

Andere mochten auch (20)

The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Deep and Dark Web
Deep and Dark WebDeep and Dark Web
Deep and Dark Web
 
Deep web
Deep webDeep web
Deep web
 
Scuba diving into The Deep Dark Web
Scuba diving into The Deep Dark WebScuba diving into The Deep Dark Web
Scuba diving into The Deep Dark Web
 
Cybercrime In The Deep Web
Cybercrime In The Deep WebCybercrime In The Deep Web
Cybercrime In The Deep Web
 
Darknet
DarknetDarknet
Darknet
 
Subject liaison model
Subject liaison modelSubject liaison model
Subject liaison model
 
Teaching Innovation at Georgia Tech
Teaching Innovation at Georgia TechTeaching Innovation at Georgia Tech
Teaching Innovation at Georgia Tech
 
ACRL statistical literacy
ACRL statistical literacyACRL statistical literacy
ACRL statistical literacy
 
UAH information literacy
UAH information literacyUAH information literacy
UAH information literacy
 
Charleston poster session
Charleston poster sessionCharleston poster session
Charleston poster session
 
The collective
The collectiveThe collective
The collective
 
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESSNEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
NEW INNOVATIONS IN CONSENT, PRIVACY, AND USER-MANAGED ACCESS
 
ما هو جوجل ادسنس؟ أسئلة وأجوبة حول جوجل أدسنس
ما هو جوجل ادسنس؟ أسئلة وأجوبة حول جوجل أدسنسما هو جوجل ادسنس؟ أسئلة وأجوبة حول جوجل أدسنس
ما هو جوجل ادسنس؟ أسئلة وأجوبة حول جوجل أدسنس
 
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy ChallengeConsent 2.0: Applying User-Managed Access to the Privacy Challenge
Consent 2.0: Applying User-Managed Access to the Privacy Challenge
 
The dark net illescas ecommer_k32
The dark net illescas ecommer_k32The dark net illescas ecommer_k32
The dark net illescas ecommer_k32
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
The "whatever" Web
The "whatever" WebThe "whatever" Web
The "whatever" Web
 
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers 1) Th...
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers  1) Th...DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers  1) Th...
DEEPWEB, Dark Web, TOR NETWORK, Bitcoin, Encryption, Codes and Ciphers 1) Th...
 
Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016
 

Ähnlich wie Research in the deep web

Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)Ali Saif Mirza
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight IntelliaggGavin O'Toole
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Marcus Leaning
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfAuto Parts Wholesale Online
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentationTo Mal
 
DEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptxDEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptxismailwinofo
 
Dark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfDark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfTopLinkSeo
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfAuto Parts Wholesale Online
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterMohammed Bharmal
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504 Prashant Rana
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Auto Parts Wholesale Online
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using TorJack Maynard
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxGeetha982072
 

Ähnlich wie Research in the deep web (20)

Darknet
DarknetDarknet
Darknet
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR Dark Side of the Net Lecture 4 TOR
Dark Side of the Net Lecture 4 TOR
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
DEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptxDEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptx
 
.Onion
.Onion.Onion
.Onion
 
Dark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfDark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdf
 
Deep Web
Deep WebDeep Web
Deep Web
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
Deep web
Deep webDeep web
Deep web
 
Tor network seminar by 13504
Tor network seminar  by 13504 Tor network seminar  by 13504
Tor network seminar by 13504
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
Acpe 2014 Internet Anonymity Using Tor
Acpe 2014  Internet Anonymity Using TorAcpe 2014  Internet Anonymity Using Tor
Acpe 2014 Internet Anonymity Using Tor
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 

Mehr von Seth Porter, MA, MLIS

Georgia Tech Library Information Literacy Program-First Year Experience
Georgia Tech Library Information Literacy Program-First Year ExperienceGeorgia Tech Library Information Literacy Program-First Year Experience
Georgia Tech Library Information Literacy Program-First Year ExperienceSeth Porter, MA, MLIS
 
Program evaluation instead of assessment AABIG
Program evaluation instead of assessment AABIGProgram evaluation instead of assessment AABIG
Program evaluation instead of assessment AABIGSeth Porter, MA, MLIS
 
Georgia Tech teaching best practices
Georgia Tech teaching best practices Georgia Tech teaching best practices
Georgia Tech teaching best practices Seth Porter, MA, MLIS
 
Accessing government statistical information online
Accessing government statistical information onlineAccessing government statistical information online
Accessing government statistical information onlineSeth Porter, MA, MLIS
 
Green, Gold, and the red white and blue: using open access and government inf...
Green, Gold, and the red white and blue: using open access and government inf...Green, Gold, and the red white and blue: using open access and government inf...
Green, Gold, and the red white and blue: using open access and government inf...Seth Porter, MA, MLIS
 
Curriculum Mapping Conference AABIG 2016
Curriculum Mapping Conference AABIG 2016Curriculum Mapping Conference AABIG 2016
Curriculum Mapping Conference AABIG 2016Seth Porter, MA, MLIS
 
Green, gold, uncle sam, and information literacy
Green, gold, uncle sam, and information literacyGreen, gold, uncle sam, and information literacy
Green, gold, uncle sam, and information literacySeth Porter, MA, MLIS
 
Human cognition and aesthetic design in pedagogy and online learning
Human cognition and aesthetic design in pedagogy and online learningHuman cognition and aesthetic design in pedagogy and online learning
Human cognition and aesthetic design in pedagogy and online learningSeth Porter, MA, MLIS
 
Economics introduction and data access
Economics introduction and data accessEconomics introduction and data access
Economics introduction and data accessSeth Porter, MA, MLIS
 
Thesis: INNOVATIONS IN ACCOUNTABILITY AND HIGHER EDUCATION ACCREDITATION: A L...
Thesis: INNOVATIONS IN ACCOUNTABILITY AND HIGHER EDUCATION ACCREDITATION: A L...Thesis: INNOVATIONS IN ACCOUNTABILITY AND HIGHER EDUCATION ACCREDITATION: A L...
Thesis: INNOVATIONS IN ACCOUNTABILITY AND HIGHER EDUCATION ACCREDITATION: A L...Seth Porter, MA, MLIS
 
Space, Place, and Information Literacy
Space, Place, and Information LiteracySpace, Place, and Information Literacy
Space, Place, and Information LiteracySeth Porter, MA, MLIS
 
Education policy and Civic Engagement: My Capstone
Education policy and Civic Engagement: My CapstoneEducation policy and Civic Engagement: My Capstone
Education policy and Civic Engagement: My CapstoneSeth Porter, MA, MLIS
 

Mehr von Seth Porter, MA, MLIS (20)

Georgia Tech Library Information Literacy Program-First Year Experience
Georgia Tech Library Information Literacy Program-First Year ExperienceGeorgia Tech Library Information Literacy Program-First Year Experience
Georgia Tech Library Information Literacy Program-First Year Experience
 
GT1000 training IL
GT1000 training ILGT1000 training IL
GT1000 training IL
 
Program evaluation instead of assessment AABIG
Program evaluation instead of assessment AABIGProgram evaluation instead of assessment AABIG
Program evaluation instead of assessment AABIG
 
Ib workshop
Ib workshopIb workshop
Ib workshop
 
Georgia Tech teaching best practices
Georgia Tech teaching best practices Georgia Tech teaching best practices
Georgia Tech teaching best practices
 
Accessing government statistical information online
Accessing government statistical information onlineAccessing government statistical information online
Accessing government statistical information online
 
Engaging Design and Learning
Engaging Design and LearningEngaging Design and Learning
Engaging Design and Learning
 
Green, Gold, and the red white and blue: using open access and government inf...
Green, Gold, and the red white and blue: using open access and government inf...Green, Gold, and the red white and blue: using open access and government inf...
Green, Gold, and the red white and blue: using open access and government inf...
 
Curriculum Mapping Conference AABIG 2016
Curriculum Mapping Conference AABIG 2016Curriculum Mapping Conference AABIG 2016
Curriculum Mapping Conference AABIG 2016
 
USG teaching & Learning Conference
USG teaching & Learning ConferenceUSG teaching & Learning Conference
USG teaching & Learning Conference
 
Introduction to Nvivo
Introduction to NvivoIntroduction to Nvivo
Introduction to Nvivo
 
Green, gold, uncle sam, and information literacy
Green, gold, uncle sam, and information literacyGreen, gold, uncle sam, and information literacy
Green, gold, uncle sam, and information literacy
 
Human cognition and aesthetic design in pedagogy and online learning
Human cognition and aesthetic design in pedagogy and online learningHuman cognition and aesthetic design in pedagogy and online learning
Human cognition and aesthetic design in pedagogy and online learning
 
Instruction bootcamp
Instruction bootcampInstruction bootcamp
Instruction bootcamp
 
Graduate introduction INTA
Graduate introduction INTAGraduate introduction INTA
Graduate introduction INTA
 
Economics introduction
Economics introductionEconomics introduction
Economics introduction
 
Economics introduction and data access
Economics introduction and data accessEconomics introduction and data access
Economics introduction and data access
 
Thesis: INNOVATIONS IN ACCOUNTABILITY AND HIGHER EDUCATION ACCREDITATION: A L...
Thesis: INNOVATIONS IN ACCOUNTABILITY AND HIGHER EDUCATION ACCREDITATION: A L...Thesis: INNOVATIONS IN ACCOUNTABILITY AND HIGHER EDUCATION ACCREDITATION: A L...
Thesis: INNOVATIONS IN ACCOUNTABILITY AND HIGHER EDUCATION ACCREDITATION: A L...
 
Space, Place, and Information Literacy
Space, Place, and Information LiteracySpace, Place, and Information Literacy
Space, Place, and Information Literacy
 
Education policy and Civic Engagement: My Capstone
Education policy and Civic Engagement: My CapstoneEducation policy and Civic Engagement: My Capstone
Education policy and Civic Engagement: My Capstone
 

Kürzlich hochgeladen

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Kürzlich hochgeladen (20)

mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 

Research in the deep web

  • 2. Outline ■ The SurfaceWebVS the Deep Web ■ DeepWeb vs DarkWeb ■ How to get deeper ■ DarkWeb access ■ Tools
  • 3. SurfaceWeb Anything that can be indexed by a typical search engine.
  • 4.
  • 5.
  • 6.
  • 7. DeepWeb ■ Quality content is 1,000 to 2,000 times greater than surface web ■ 95% of DeepWeb is accessible to public (no fees or subscription required) ■ The deep web is the internet that has not been indexed by commercial search engines such as Google and Yahoo!.These search engines send out crawlers or spiders to index and catalog available web sites, but the vast majority of the internet, 500X the surface net, includes many of the best resources which are not indexed by these search engines. Such as: – Unlinked pages:Spiders can’t find web pages that are not linked to others. – Private intranets and web pages, password protected and more. – Non HTML content: e.g., content rich, lots of different file type – Library & Government Databases -How StuffWorks.com
  • 8. Types of deep web ■ InvisibleWeb: Material that can be, but is not included in search engine results. EG: new material added and not yet picked up. ■ PrivateWeb: Sites intentionally excluded from search engine results. Ex: password protected ■ Subscriptions websites & databases: ESPN Insider, (Library Databases) Proquest databases, EbscoHost. -How StuffWorks.com
  • 9. How to get deeper ■ Directories – http://www.dmoz.org/ ■ Specialized Search Engines – http://biznar.com/biznar/desktop/en/search.html – http://www.wolframalpha.com/ – http://archive.org/web/web.php ■ Academic Databases – Jstor – Science Direct ■ Specialized Databases – https://www.archives.gov/ ■ GovernmentWebsites – https://www.data.gov/ – https://www.govinfo.gov/
  • 10. The DarkWeb ■ The Dark web: An area of the web which information is hidden deep and anonymously. ■ The DarkWeb then is a small portion of the DeepWeb that has been intentionally hidden and is inaccessible through standard web browsers.
  • 11. "The deepWeb may be a shadow land of untapped potential, but with a bit of skill and some luck, you can illuminate a lot of valuable information that many people worked to archive. On the dark Web, where people purposely hide information, they'd prefer it if you left the lights off. The dark Web is a bit like the Web's id. It's private. It's anonymous. It's powerful. It unleashes human nature in all its forms, both good and bad. The bad stuff, as always, gets most of the headlines.You can find illegal goods and activities of all kinds through the dark Web.That includes illicit drugs, child pornography, stolen credit card numbers, human trafficking, weapons, exotic animals, copyrighted media and anything else you can think of.Theoretically, you could even, say, hire a hit man to kill someone you don't like. But you won't find this information with a Google search.These kinds ofWeb sites require you to use special software, such asThe Onion Router, more commonly known asTor. Tor is software that installs into your browser and sets up the specific connections you need to access dark Web sites.Critically,Tor is an encrypted technology that helps people maintain anonymity online. It does this in part by routing connections through servers around the world, making them much harder to track." -How StuffWorks.com
  • 12.
  • 13. “Tor is a program you can run on your computer that helps keep you safe on the Internet. It protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.This set of volunteer relays is called the Tor network (Tor Project)”
  • 14. HowTor works ■ TheTor network is a volunteer-operated servers that individuals use to improve privacy and security. ■ Tor connects through masked virtual links instead of a direct connection. ■ Tor directs Internet traffic through a free, worldwide, volunteer network consisting of more than seven thousand relays to conceal a user's location and usage from anyone conducting network surveillance or traffic analysis (How StuffWorks).
  • 15. The Onion Router “Onion routing is a technique for anonymous communication over a computer network. In an onion network, messages are encapsulated in layers of encryption, analogous to layers of an onion.The encrypted data is transmitted through a series of network nodes called onion routers, each of which "peels" away a single layer, uncovering the data's next destination.When the final layer is decrypted, the message arrives at its destination.The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes” (Tor (anonymity network)
  • 16. Hidden Service “Tor makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant messaging server. UsingTor "rendezvous points," otherTor users can connect to these hidden services, each without knowing the other's network identity (Tor project).”
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24. Why ■ Privacy – Protect from traffic analysis ■ Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. It can be performed even when the messages are encrypted and cannot be decrypted. – Personal Privacy from government privacy abuse – Identity thieves – Unscrupulous marketers – Protect communication from corporations – Skirt censorship ■ Whistleblowing & news leaks – Chinese journalist communicate onTor
  • 25. Tips ■ 1.) Don’t Download anything. ■ 2.) Don’t go to illegal sites (Duh). ■ 3.) Never pay with any credit card. ■ 4.) However, if you are going to use it because of personal privacy concerns, also be aware of the dangerous e.g., illegal material, viruses, and slow websites!
  • 26. References ■ How the DeepWebWorks: http://computer.howstuffworks.com/internet/basics/how-the-deep-web-works.htm ■ Who usesTor: https://www.torproject.org/about/torusers.html.en ■ Tor (anonymity network) https://en.wikipedia.org/wiki/Tor_%28anonymity_network%29