SlideShare a Scribd company logo
1 of 8


The Deep Web consists of Web content that is not
part of the surface web



It contains pages that are not and cannot be
indexed by standard search engines
(Google, Yahoo!, Bing, etc.)



Network of anonymous users that make use of their
anonymity to conduct business and store content
that is either illegal or of no interest to majority of
internet users



Special software (TOR, Freenet, etc.) is required in
order for internet users to gain access to and make
use of the deep web


Public information on the Deep Web is currently 400
to 550 times larger than the commonly defined World
Wide Web



The Deep Web contains 7,500 terabytes of
information compared to 19 terabytes of information
in the surface web



Contains nearly 550 billion individual documents
compared to 1 billion documents in the surface web



Deep Web currently has more than 200,000 websites



The Deep Web is currently the largest growing
category of new information on the Internet


Total quality content of the Deep Web is 1,000 to
2,000 times greater than that of the surface web



Deep Web content is highly relevant to every
information need and market



More than half of the Deep Web content resides in
topic-specific databases



95% of the Deep Web is publicly accessible
information that is not subject to any fees or
subscriptions



Deep Web has a large community of hackers,
scientists, drug dealers, assassins, perverts, terrorists,
kidnappers, data miners, and others


The Deep Web makes E-Commerce a possibility for
individuals and businesses that engage in illegal activity,
much in the same way the legit businesses are making
use of E-Commerce



E-Commerce is practiced by the following individuals
- murderers/hit men
- drug dealers
- rapists/child molesters
- spies
- ammunitions/weapons dealers
- terrorists


The Deep Web will effectively put E-Commerce in a
negative light



Focus will be placed on the disadvantages of
technology instead of the benefits



Will raise issues of legitimacy in E-Commerce



Could potentially force the government and other
monitoring bodies to violate privacy rights of legitimate
E-commerce users for the sake of security
(passwords, private information, confidential financial
data/records/transactions will be accessed)


The Deep Web will continue
to grow and expand in the
next 2 years, and long after



Governments won’t be able
to do anything significant to
control it



The Deep Web will continue
to gain more power and
popularity amongst ECommerce practitioners


Developments in advanced
technology will improve tracking
on the dark net, but anonymity
will prove to be users’ greatest
asset



Struggling businesses will
consider moving to the deep
web to carry out more
unrestricted and unmonitored
operations that will increase
revenue



Occasional successful busts of
illegal activity in the Deep Web

More Related Content

What's hot

Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of ExpressionMark Jhon Oxillo
 
Hass & Associates Online Reviews
Hass & Associates Online ReviewsHass & Associates Online Reviews
Hass & Associates Online Reviewsaleenia23
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelinesdlwadsworth
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedMichael Sexton
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activismjwilso
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer SystemEjiro Ndifereke
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarThomas Jones
 
2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and security2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and securityGolden Locksmith
 
legal aspects in e marketing
legal aspects in e marketinglegal aspects in e marketing
legal aspects in e marketingSHIVANI SINGH
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012Jim Ayson
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons LawThomas Jones
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3misecho
 

What's hot (20)

Cyber law1
Cyber law1Cyber law1
Cyber law1
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
 
Hass & Associates Online Reviews
Hass & Associates Online ReviewsHass & Associates Online Reviews
Hass & Associates Online Reviews
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelines
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
66 keith kupferschmid_presentation
66 keith kupferschmid_presentation66 keith kupferschmid_presentation
66 keith kupferschmid_presentation
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer System
 
Multimedia digital piracy
Multimedia digital piracyMultimedia digital piracy
Multimedia digital piracy
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information War
 
2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and security2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and security
 
legal aspects in e marketing
legal aspects in e marketinglegal aspects in e marketing
legal aspects in e marketing
 
After 9 11
After 9 11After 9 11
After 9 11
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons Law
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3
 

Viewers also liked

Respiration (basic biology) unm
Respiration (basic biology) unmRespiration (basic biology) unm
Respiration (basic biology) unmJeny Hardiah
 
Suzi presentation
Suzi presentationSuzi presentation
Suzi presentationsm91397
 
Plan audit achat
Plan audit achatPlan audit achat
Plan audit achatyasmineoo
 
Audit opérationnel - Évaluation des procédures du cycle achats/fournisseurs a...
Audit opérationnel - Évaluation des procédures du cycle achats/fournisseurs a...Audit opérationnel - Évaluation des procédures du cycle achats/fournisseurs a...
Audit opérationnel - Évaluation des procédures du cycle achats/fournisseurs a...Miriam drissi kaitouni
 
audit des stocks
audit des stocks audit des stocks
audit des stocks Mirafitia
 

Viewers also liked (10)

Pivot stratégique
Pivot stratégiquePivot stratégique
Pivot stratégique
 
Respiration (basic biology) unm
Respiration (basic biology) unmRespiration (basic biology) unm
Respiration (basic biology) unm
 
Lucro-Arbitrado-ligue (11)98950-3543
Lucro-Arbitrado-ligue (11)98950-3543Lucro-Arbitrado-ligue (11)98950-3543
Lucro-Arbitrado-ligue (11)98950-3543
 
CV Mats Heuzen
CV Mats HeuzenCV Mats Heuzen
CV Mats Heuzen
 
Suzi presentation
Suzi presentationSuzi presentation
Suzi presentation
 
The deepweb
The deepwebThe deepweb
The deepweb
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Plan audit achat
Plan audit achatPlan audit achat
Plan audit achat
 
Audit opérationnel - Évaluation des procédures du cycle achats/fournisseurs a...
Audit opérationnel - Évaluation des procédures du cycle achats/fournisseurs a...Audit opérationnel - Évaluation des procédures du cycle achats/fournisseurs a...
Audit opérationnel - Évaluation des procédures du cycle achats/fournisseurs a...
 
audit des stocks
audit des stocks audit des stocks
audit des stocks
 

Similar to Montilla K32 - DEEP WEB

Similar to Montilla K32 - DEEP WEB (20)

Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
Deep web
Deep webDeep web
Deep web
 
Wp below the_surface
Wp below the_surfaceWp below the_surface
Wp below the_surface
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
Polinter11
Polinter11Polinter11
Polinter11
 
The Internet and World Wide Web
The Internet and World Wide Web The Internet and World Wide Web
The Internet and World Wide Web
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
The Deep Web.pptx
The Deep Web.pptxThe Deep Web.pptx
The Deep Web.pptx
 
Cyber Crime Challanges
Cyber Crime ChallangesCyber Crime Challanges
Cyber Crime Challanges
 
Darknet
DarknetDarknet
Darknet
 
Dw communication
Dw communicationDw communication
Dw communication
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?
 
Deep web
Deep webDeep web
Deep web
 
unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Understand Internet Before You Regret.
Understand Internet Before You Regret.Understand Internet Before You Regret.
Understand Internet Before You Regret.
 

Recently uploaded

Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...lizamodels9
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menzaictsugar
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,noida100girls
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis UsageNeil Kimberley
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfpollardmorgan
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesKeppelCorporation
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 

Recently uploaded (20)

Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
Call Girls In Connaught Place Delhi ❤️88604**77959_Russian 100% Genuine Escor...
 
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu MenzaYouth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
Youth Involvement in an Innovative Coconut Value Chain by Mwalimu Menza
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Corporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information TechnologyCorporate Profile 47Billion Information Technology
Corporate Profile 47Billion Information Technology
 
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
BEST Call Girls In Old Faridabad ✨ 9773824855 ✨ Escorts Service In Delhi Ncr,
 
2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage2024 Numerator Consumer Study of Cannabis Usage
2024 Numerator Consumer Study of Cannabis Usage
 
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdfIntro to BCG's Carbon Emissions Benchmark_vF.pdf
Intro to BCG's Carbon Emissions Benchmark_vF.pdf
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Annual General Meeting Presentation Slides
Annual General Meeting Presentation SlidesAnnual General Meeting Presentation Slides
Annual General Meeting Presentation Slides
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 

Montilla K32 - DEEP WEB

  • 1.
  • 2.  The Deep Web consists of Web content that is not part of the surface web  It contains pages that are not and cannot be indexed by standard search engines (Google, Yahoo!, Bing, etc.)  Network of anonymous users that make use of their anonymity to conduct business and store content that is either illegal or of no interest to majority of internet users  Special software (TOR, Freenet, etc.) is required in order for internet users to gain access to and make use of the deep web
  • 3.  Public information on the Deep Web is currently 400 to 550 times larger than the commonly defined World Wide Web  The Deep Web contains 7,500 terabytes of information compared to 19 terabytes of information in the surface web  Contains nearly 550 billion individual documents compared to 1 billion documents in the surface web  Deep Web currently has more than 200,000 websites  The Deep Web is currently the largest growing category of new information on the Internet
  • 4.  Total quality content of the Deep Web is 1,000 to 2,000 times greater than that of the surface web  Deep Web content is highly relevant to every information need and market  More than half of the Deep Web content resides in topic-specific databases  95% of the Deep Web is publicly accessible information that is not subject to any fees or subscriptions  Deep Web has a large community of hackers, scientists, drug dealers, assassins, perverts, terrorists, kidnappers, data miners, and others
  • 5.  The Deep Web makes E-Commerce a possibility for individuals and businesses that engage in illegal activity, much in the same way the legit businesses are making use of E-Commerce  E-Commerce is practiced by the following individuals - murderers/hit men - drug dealers - rapists/child molesters - spies - ammunitions/weapons dealers - terrorists
  • 6.  The Deep Web will effectively put E-Commerce in a negative light  Focus will be placed on the disadvantages of technology instead of the benefits  Will raise issues of legitimacy in E-Commerce  Could potentially force the government and other monitoring bodies to violate privacy rights of legitimate E-commerce users for the sake of security (passwords, private information, confidential financial data/records/transactions will be accessed)
  • 7.  The Deep Web will continue to grow and expand in the next 2 years, and long after  Governments won’t be able to do anything significant to control it  The Deep Web will continue to gain more power and popularity amongst ECommerce practitioners
  • 8.  Developments in advanced technology will improve tracking on the dark net, but anonymity will prove to be users’ greatest asset  Struggling businesses will consider moving to the deep web to carry out more unrestricted and unmonitored operations that will increase revenue  Occasional successful busts of illegal activity in the Deep Web

Editor's Notes

  1. The Deep Web is often referred to as “The Silk Road”, named after the ancient trade routes that ran all across Eurasia.References:http://www.youtube.com/watch?v=wMgqTWdk3tw
  2. An analogy that is typically used to describe the surface web and the deep web is an iceberg – where the surface web is the tip of the iceberg or the portion that is clearly and easily visible, and the deep web is the LARGER portion of the iceberg underwater that is not visible to most internet users.References:http://www.youtube.com/watch?v=wMgqTWdk3tw
  3. Not all of the information found in the Deep Web is illegal or illicit. The Deep Web also contains massive archives of old documents of large corporations that is of no use to them anymore and that the general public doesn’t care about.References:http://www.youtube.com/watch?v=wMgqTWdk3tw