SlideShare a Scribd company logo
1 of 9
Download to read offline
qwertyuiopasdfghjklzxcvbnmqwertyui
deepweb intergalactic interwebs
anarchists P2P hackers crackers drug
dealers 4chan 4chan preachers sick
slaughter sex porn red zone tube
pipers haters crackers danger weed
experiments human experiments
nukes sandcat Russian mafia surface
web deepweb shell network MIT
NASA FSB interpol brutality massacre
slavery suicide bombs cannibalism
necrophilia pedophiles beepers
blackmarket hidden wiki marinas web
raw data floating data conspiracy
hardcore hacks research source code
The Deepweb
Way beyond the Internet
Among all the various creations, the most powerful resources, web pages, blogs, personal research and
academic articles we come across the internet, there is a whole new world to the internet in itself. The
darkest corners of the internet has still not been explored by many. Ninety percent of the internet users
are still not aware of this "dark" corner, wherein lies the deepest articles, variety of uncommon
resources, shopping items, and other anarchic materials which hides beyond the regular internet. This
article will walk through the darkest corners of the internet, aware the regular users, how big and what
data size is the real internet, and what we get out of it. There are people who have been already visiting
the darknet (or the deepweb) for profit, fun, knowledge, resources and to mine more data for the sake
of curiosity. But there are very fewer people who publish their research, the underweb and the material
in open public. The reason, they wish not to share could range from "not want to share" to "the normal
people just don't get it" answers. To believe or not to believe the deepnet is wholly to a internet user
perspective, but the hidden web does exists. People already have access to them, people already
exchange data within the realms of the deepnet, also, people already make a business out of them. 70
percentile of the deepweb is considered illegal, if seen from a country government perspective. Either
that or not, the deepweb still exists and will continue to work, because no one has control over it. With
rising censorship and devastation of regulations on the internet, certain individuals have already shifted
from the regular internet via a browser to the deepweb, wherein they can discuss their own ideas,
maintain their own personal blog, share theories and discuss data which is limited to the regular
internet as a whole. What we will go through is a perspective analysis of why, where and how did the
darknet come to existence and what are the ways to access it. We will first look back to the roots of the
internet, where the internet was born and what anomaly triggered which gave birth to the existence of
the internet and the deepweb.
To look back through the history of the internet, one has to consider where it all began. The internet
was born out of ARPANET (The Advanced Research Projects Agency Network). The ARPANET was the
first operational packet switching experimental network limited only to four university, among which
one was research center. Being a test experimental subject on packet switching, the ARPANET
connected UCLA (University of California, Los Angeles), Stanford Research Institutes Augmentation
Research Center, UCSB (University of California, Santa Barbara), and University of Utah's Computer
Science Department. The defense communication agency then took control over the ARPANET since the
project was to be funded. The DDN, Defense Data Network was then established within the ARPANET
which consisted of the MILNET, Military Network, for unclassified information flow and for
communication. Because the ARPANET was separated, the nodes connected to the ARPANET was
reduced in regards to the civil network, and the military network, both had their own domain and
control over it. The ARPANET was supposed to limit over 1,000 hosts, but fortunately the TCP/IP
architecture gave birth to new network design and about 30,000 different hosts were connected to the
ARPANET by the end of 1987. This is turn gave birth to services like USENET. USENET provided discussion
zones to the hands of the public and the network went viral worldwide. USENET used newsgroups and
BBS, a short for Bulletin Board System. Further, AOL (America Online) came up with its own services
which largely affected the USENET users and the quality. Random people from all over the world began
using the services and hence the point of no return occurred. This anomaly where the network was just
accessible to few people and the drastic changes with new mass users added was termed "Eternal
September". Because this happened on September, 1993 people kept the name as this way. A whole
new network with diversity and a culture was formed, which is now known as the "internet". The
journey from the ARPANET to the internet what it is today, molded people in a different way. Some
went being cowboys and some went practically living on the internet with rise in social media,
Multiplayer games, which then became Virtual Reality (VR) and the cyberspace.
The Internet at an early stage used static pages, wherein information was public and people could only
see text all over the pages. At the very beginning, there was no buffering of videos, people could only
use FTP and download music, videos and documents. With rise in P2P network, files, music, videos, and
documents went shared, people downloaded with more bandwidth, more speed and went spending
time more often on the internet. Developers jumped in and corporations started realizing internet could
be of profit and started making money with advertisements, commercials and providing services. Soon
after the dot com bubble burst, the era of Web 2.0 marked revolution. There were dynamic pages, web
content videos, blogs, pages everywhere. The use of easy to script Java language made web coding
easier and this went. People started registering their own domain name, file servers, and data space.
Since the web was now so much easier to handle with all the automation, people started using the web
and the internet as their daily donuts. Mass media went providing news services, Different ISP offered
cheap internet access on competition, web developers went bargaining over their customers on web
development, personal blogs with personal, irrational, national views went up. People went using
internet as a weapon against injustice by writing blogs, stating their personal views, communities came
up, to which the government saw as a threat. This threat as largely due to the "freedom of speech". The
giant corporation, and the government policies went through changes and bills were passed to oppose
the flow of free information. It was at this moment, people from different culture showed up. These
people were the internet cowboys, they believed in information flow. Most often, these people had
been called with different names, some call them hackers, some call them crackers, still some call them
problem makers, yet others call them the heroes of the computer revolution. Since hackers and people
alike with certain ideas and rare culture are themselves bound and called "cyber terrorist" worldwide,
people often fail to realize these are the same people who gave birth to the internet, the ones who keep
the internet running. There were explorers who already had dug the internet and had left the public to
see the treasure beyond to that of the internet. Fact is, the internet itself is just the surface web. There
are layers and there are intermediates in-between these layers. The deeper one goes down, the closer
comes the darknet. Between the surface web and the deepweb, there is an interesting web which is
known as the "Underground".
The Underground consists of different services, most of them are illegal. There are people from drug
dealers to professional stealers who have found their ways to sell their services with anonymity. These
services could be purchased either via bitcoins or paypal, liberty reserve. The service providers can also
ask for direct Western Union wired money transfers if they wish to. Bitcoin and all others similar are
virtual money system are based on virtual money transfer, hence providing partial anonymity to total
anonymity. Carders and drug dealers could also be found on the surface web (which is sometimes
referred to as clearnet). The criminal underground goes much more deeper than this, which is darknet
(the deepweb!). Paypal accounts, premium porn accounts, sony playstation accounts, minecraft
accounts, and even mass facebook accounts are sold in the underground. There are professional hackers
and carders who sell these services to the one who wish to buy these services. Normally the
underground services majorly depends upon anonymous email setup, or IRC network. An IRC is an
Internet Relay Chat system, where people join specific channels of their interest and discuss topics. The
underground plus the surface web still covers 20 percent of the whole ocean web. The rest 80 percent is
the deepnet. To explore the deepweb, one needs special browser setup with proxy. Beyond the
underground lies the deepweb. The Underground is also referred as the "gray" area which lies between
the surface web and the deepweb.
a.) Russian Mafia and the underground
b.) Carders and bomb artists
To access the deepweb, one has to have special proxy browsers which encrypts and tunnels the source
packets, this again works on exit and entrance nodes. Once installed, this special web browser would
relay the packets and forward it to different known nodes of entrance and pass through many other
host and then would land up to the desired special address. 'Tor', or The Onion Router is a special proxy
browser of its kind which provides access to the deepweb locations (special addresses). These sites have
been setup on private servers across the globe. These addresses contains special content which might
not be found on the surface net. The quality of contents found on these special sites differs, and
recognizes the different layers of the deepweb. The deepweb is 80% rest of the internet, which consists
of floating data, raw data and accessible private data. Most of this private data comes from universities,
NASA research center, geological and astrological hidden data, biological data and different services,
which are mostly illegal. These following images have been taken from the deepweb to illustrate what
happens and what goes on beyond the general surface web.
a.) Anarchic posts on the deepweb
b.) Drugs sold in the deepweb
The different layers of the deepweb could be differentiated by its contents and quality of the data
obtained. The layer one of the deepweb consists from source code exchange to suicide, porn tapes,
isolated FTP servers, private servers, mathematics research, visual processing, virus information, hackers
are its kind. People also sell pirated software, ripped source code, personal experimental research, and
credit card, SSN information. The second level of the web consists of discussions on circuit development,
AI theory, the MIT and its research, shell networking, node transfers, data analysis, data mining and
cosmologists. From second to the third level, one would find banned videos, banned books, black magic
practices, Assassination boards, human trafficking, corporate exchange, line of blood locations, hidden
wiki, anarchists, political hunters, drug sales, weapon inventory, arms and ammunition, nuclear
weapons, black market, human experiments., conspiracy, pedophilia, cannibal discussion and
procedure, the Silk road, privacy and pirating software's, movies and celebrity leaks. Bounty hackers
could also be found here (also on the clearnet) who takes up payment for finding software, web
application and network vulnerabilities on different corporate sites and it's network infrastructure. All
these corporate exchange happen in this third level, where people are anonymous and the only thing
what matters is to share information. Moving from the third level to the fourth level, one could figure
out, they are way too long from the surfacenet and will find themselves landing onto pedophile zones,
where pedophiles discuss child porn, hardcore candy, necrophilia, zoophiles, professional international
assassin market, high cost exploits for web vulnerabilities, WW2 files and future extradition files,
concepts on redesigning electronic processors, also called GGGQEP (Gadolinium Gallium Garnet),
geometric algorithm shortcuts, the second world order revolts, theorists, global assassination planners,
revolutionary anarchists and human experiments.
a.) Bitcoin transaction for illegal services
b.) Hackers in the deepweb.
Beyond the fourth level , there is plenty of information on government policies, national priority data,
NASA raw documents and footage records, astrological skyline plans and extraction points, heavy
interNIC databases, old forbidden and lone servers which are not connected directly to the internet,
closed shell servers and its access, nuclear datasheet plans, international energy crisis plans, black arms
and ammunition market including military weapons, data smugglers smuggling drug information,
military information and international surveillance systems. All classified information is available only if
one has a strong heart to reach it and the proper resources with contacts. Everything that happens in
the deepweb or even on the gray area, that is the underground, is achieved with proper illegal contacts,
who has further information and the web resources to dig out the darkest corners of the deepweb. The
deepweb still is vast, and no one man has ever surfed the whole of the information which keeps floating
around. The surface area itself looks so vast and it easily accessible because the search engine does half
the work on behalf of the users. Search engines like yahoo, google, bing are designed to pick up
common popular search keywords which keep incoming from the users and save it and then repeat the
search. The concept with the clearnet (or the surfaceweb) only lies in indexing and crawling the different
part of the surfaceweb to fetch contents.
a.) Stolen items on the deepweb
b.) Child Pornography.
Conclusion: There is a hidden wiki, which has access to 20 percent of the deepweb data and their
location. When people visit these links, they fall addicted to the sites and in urge to get deeper, negative
thoughts and self destruction thoughts are perceived. This is due to the fact the human mind has certain
trained ability to see and conceive things, which they have been prepared for, but on the deepweb,
there is necrophilia, child hunters, human slavery and things which might not be suitable for any normal
web user. According to the statistical reports, following data has been achieved till date:
Table 1. Baseline Surface Web Size Assumptions
Total No. of Documents Content Size (GBs) (HTML basis)
1,000,000,000 18,700
Table 2. Distribution of Deep Sites by Subject Area
Deep Web Coverage
Agriculture 2.7%
Arts 6.6%
Business 5.9%
Computing/Web 6.9%
Education 4.3%
Employment 4.1%
Engineering 3.1%
Government 3.9%
Health 5.5%
Humanities 13.5%
Law/Politics 3.9%
Lifestyles 4.0%
News, Media 12.2%
People, Companies 4.9%
Recreation, Sports 3.5%
References 4.5%
Science, Math 4.0%
Travel 3.4%
Shopping 3.2%
There is more to the deepweb than the findings. An individual can never dig the whole deepweb in one
life. There exists corners of deepweb which might be disturbing, but illuminating. The Tor, I2P and the
Freenet projects have done a lot to keep the information free and flexible. The community of free users
are growing, people are revolting against the will of their government, the internet just gets more
deeper and deeper until the day arrives when censorship is no more an option, and common people
move out to the deepnet to discuss their grievances.

More Related Content

Similar to An Analysis Of The Deep Web

Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
Gavin O'Toole
Β 
Websites 2007/2010 version
Websites 2007/2010 versionWebsites 2007/2010 version
Websites 2007/2010 version
Johan Koren
Β 

Similar to An Analysis Of The Deep Web (19)

Dark Net
Dark NetDark Net
Dark Net
Β 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
Β 
Presentacion informacion sobre el internet
Presentacion informacion sobre el internetPresentacion informacion sobre el internet
Presentacion informacion sobre el internet
Β 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
Β 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
Β 
The Future of the Internet
The Future of the InternetThe Future of the Internet
The Future of the Internet
Β 
Internet
InternetInternet
Internet
Β 
Deep Web
Deep WebDeep Web
Deep Web
Β 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
Β 
Deep web
Deep webDeep web
Deep web
Β 
Websites
WebsitesWebsites
Websites
Β 
Rc 11.networks
Rc 11.networksRc 11.networks
Rc 11.networks
Β 
The Internet is shaping the future
The Internet is shaping the futureThe Internet is shaping the future
The Internet is shaping the future
Β 
Websites 2007/2010 version
Websites 2007/2010 versionWebsites 2007/2010 version
Websites 2007/2010 version
Β 
Bjmc i, dcm,unit-ii, internet as a mass medium
Bjmc i, dcm,unit-ii, internet as a mass mediumBjmc i, dcm,unit-ii, internet as a mass medium
Bjmc i, dcm,unit-ii, internet as a mass medium
Β 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
Β 
Internet and technology
Internet and  technologyInternet and  technology
Internet and technology
Β 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
Β 
DEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptxDEEP WEB PRESENTATION.pptx
DEEP WEB PRESENTATION.pptx
Β 

More from Joe Osborn

More from Joe Osborn (20)

Research Paper Template Outline For A Short Resear
Research Paper Template Outline For A Short ResearResearch Paper Template Outline For A Short Resear
Research Paper Template Outline For A Short Resear
Β 
Narrative Essay Graphic Organizer BrainPOP Edu
Narrative Essay Graphic Organizer BrainPOP EduNarrative Essay Graphic Organizer BrainPOP Edu
Narrative Essay Graphic Organizer BrainPOP Edu
Β 
Fantastic College Admissions Essay Help
Fantastic College Admissions Essay HelpFantastic College Admissions Essay Help
Fantastic College Admissions Essay Help
Β 
College Essay Career Goals Career Goals Essay Exa
College Essay Career Goals Career Goals Essay ExaCollege Essay Career Goals Career Goals Essay Exa
College Essay Career Goals Career Goals Essay Exa
Β 
Professional Paper Writing
Professional Paper WritingProfessional Paper Writing
Professional Paper Writing
Β 
Consumer Reports Buying Guide 2022 Mustang
Consumer Reports Buying Guide 2022 MustangConsumer Reports Buying Guide 2022 Mustang
Consumer Reports Buying Guide 2022 Mustang
Β 
College Athletes Should Get Paid Argument Essay. Should College
College Athletes Should Get Paid Argument Essay. Should CollegeCollege Athletes Should Get Paid Argument Essay. Should College
College Athletes Should Get Paid Argument Essay. Should College
Β 
Edit My College Essay. College Essay Editing And Proofreading Service
Edit My College Essay. College Essay Editing And Proofreading ServiceEdit My College Essay. College Essay Editing And Proofreading Service
Edit My College Essay. College Essay Editing And Proofreading Service
Β 
Academic Writing CELC E-Resources
Academic Writing CELC E-ResourcesAcademic Writing CELC E-Resources
Academic Writing CELC E-Resources
Β 
Patriotic Computer Paper - TCR5894 Teacher Create
Patriotic Computer Paper - TCR5894 Teacher CreatePatriotic Computer Paper - TCR5894 Teacher Create
Patriotic Computer Paper - TCR5894 Teacher Create
Β 
Quality Writing Paper. Paper Help For Studen
Quality Writing Paper. Paper Help For StudenQuality Writing Paper. Paper Help For Studen
Quality Writing Paper. Paper Help For Studen
Β 
Scholarship Application Essay Format. Write A Tel
Scholarship Application Essay Format. Write A TelScholarship Application Essay Format. Write A Tel
Scholarship Application Essay Format. Write A Tel
Β 
An Effective Topic Sentence Will Reflect Which Of The Following
An Effective Topic Sentence Will Reflect Which Of The FollowingAn Effective Topic Sentence Will Reflect Which Of The Following
An Effective Topic Sentence Will Reflect Which Of The Following
Β 
General Agreement Contract Template Word 2003 Mas
General Agreement Contract Template Word 2003 MasGeneral Agreement Contract Template Word 2003 Mas
General Agreement Contract Template Word 2003 Mas
Β 
21 Hilarious Tumblr Posts To Read When
21 Hilarious Tumblr Posts To Read When21 Hilarious Tumblr Posts To Read When
21 Hilarious Tumblr Posts To Read When
Β 
Film Analysis Paper. How To Write A Film Analysis Essa
Film Analysis Paper. How To Write A Film Analysis EssaFilm Analysis Paper. How To Write A Film Analysis Essa
Film Analysis Paper. How To Write A Film Analysis Essa
Β 
White Writing On Black Background Cotton F
White Writing On Black Background Cotton FWhite Writing On Black Background Cotton F
White Writing On Black Background Cotton F
Β 
A Feminist Critical Discourse Analysis Of Qaisra Shahraz S The Holy Woman In ...
A Feminist Critical Discourse Analysis Of Qaisra Shahraz S The Holy Woman In ...A Feminist Critical Discourse Analysis Of Qaisra Shahraz S The Holy Woman In ...
A Feminist Critical Discourse Analysis Of Qaisra Shahraz S The Holy Woman In ...
Β 
A Glance To Teachers Work With Resources Case Of Olcay
A Glance To Teachers  Work With Resources  Case Of OlcayA Glance To Teachers  Work With Resources  Case Of Olcay
A Glance To Teachers Work With Resources Case Of Olcay
Β 
3G RBS Overview Field Support Operations Contents
3G RBS Overview Field Support   Operations Contents3G RBS Overview Field Support   Operations Contents
3G RBS Overview Field Support Operations Contents
Β 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
Β 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
Β 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
Β 

Recently uploaded (20)

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
Β 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
Β 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
Β 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
Β 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Β 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
Β 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
Β 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
Β 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
Β 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Β 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
Β 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
Β 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
Β 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
Β 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
Β 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
Β 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
Β 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
Β 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
Β 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
Β 

An Analysis Of The Deep Web

  • 1. qwertyuiopasdfghjklzxcvbnmqwertyui deepweb intergalactic interwebs anarchists P2P hackers crackers drug dealers 4chan 4chan preachers sick slaughter sex porn red zone tube pipers haters crackers danger weed experiments human experiments nukes sandcat Russian mafia surface web deepweb shell network MIT NASA FSB interpol brutality massacre slavery suicide bombs cannibalism necrophilia pedophiles beepers blackmarket hidden wiki marinas web raw data floating data conspiracy hardcore hacks research source code The Deepweb Way beyond the Internet
  • 2. Among all the various creations, the most powerful resources, web pages, blogs, personal research and academic articles we come across the internet, there is a whole new world to the internet in itself. The darkest corners of the internet has still not been explored by many. Ninety percent of the internet users are still not aware of this "dark" corner, wherein lies the deepest articles, variety of uncommon resources, shopping items, and other anarchic materials which hides beyond the regular internet. This article will walk through the darkest corners of the internet, aware the regular users, how big and what data size is the real internet, and what we get out of it. There are people who have been already visiting the darknet (or the deepweb) for profit, fun, knowledge, resources and to mine more data for the sake of curiosity. But there are very fewer people who publish their research, the underweb and the material in open public. The reason, they wish not to share could range from "not want to share" to "the normal people just don't get it" answers. To believe or not to believe the deepnet is wholly to a internet user perspective, but the hidden web does exists. People already have access to them, people already exchange data within the realms of the deepnet, also, people already make a business out of them. 70 percentile of the deepweb is considered illegal, if seen from a country government perspective. Either that or not, the deepweb still exists and will continue to work, because no one has control over it. With rising censorship and devastation of regulations on the internet, certain individuals have already shifted from the regular internet via a browser to the deepweb, wherein they can discuss their own ideas, maintain their own personal blog, share theories and discuss data which is limited to the regular internet as a whole. What we will go through is a perspective analysis of why, where and how did the darknet come to existence and what are the ways to access it. We will first look back to the roots of the internet, where the internet was born and what anomaly triggered which gave birth to the existence of the internet and the deepweb. To look back through the history of the internet, one has to consider where it all began. The internet was born out of ARPANET (The Advanced Research Projects Agency Network). The ARPANET was the first operational packet switching experimental network limited only to four university, among which one was research center. Being a test experimental subject on packet switching, the ARPANET connected UCLA (University of California, Los Angeles), Stanford Research Institutes Augmentation
  • 3. Research Center, UCSB (University of California, Santa Barbara), and University of Utah's Computer Science Department. The defense communication agency then took control over the ARPANET since the project was to be funded. The DDN, Defense Data Network was then established within the ARPANET which consisted of the MILNET, Military Network, for unclassified information flow and for communication. Because the ARPANET was separated, the nodes connected to the ARPANET was reduced in regards to the civil network, and the military network, both had their own domain and control over it. The ARPANET was supposed to limit over 1,000 hosts, but fortunately the TCP/IP architecture gave birth to new network design and about 30,000 different hosts were connected to the ARPANET by the end of 1987. This is turn gave birth to services like USENET. USENET provided discussion zones to the hands of the public and the network went viral worldwide. USENET used newsgroups and BBS, a short for Bulletin Board System. Further, AOL (America Online) came up with its own services which largely affected the USENET users and the quality. Random people from all over the world began using the services and hence the point of no return occurred. This anomaly where the network was just accessible to few people and the drastic changes with new mass users added was termed "Eternal September". Because this happened on September, 1993 people kept the name as this way. A whole new network with diversity and a culture was formed, which is now known as the "internet". The journey from the ARPANET to the internet what it is today, molded people in a different way. Some went being cowboys and some went practically living on the internet with rise in social media, Multiplayer games, which then became Virtual Reality (VR) and the cyberspace. The Internet at an early stage used static pages, wherein information was public and people could only see text all over the pages. At the very beginning, there was no buffering of videos, people could only use FTP and download music, videos and documents. With rise in P2P network, files, music, videos, and documents went shared, people downloaded with more bandwidth, more speed and went spending time more often on the internet. Developers jumped in and corporations started realizing internet could be of profit and started making money with advertisements, commercials and providing services. Soon after the dot com bubble burst, the era of Web 2.0 marked revolution. There were dynamic pages, web content videos, blogs, pages everywhere. The use of easy to script Java language made web coding easier and this went. People started registering their own domain name, file servers, and data space. Since the web was now so much easier to handle with all the automation, people started using the web and the internet as their daily donuts. Mass media went providing news services, Different ISP offered cheap internet access on competition, web developers went bargaining over their customers on web development, personal blogs with personal, irrational, national views went up. People went using internet as a weapon against injustice by writing blogs, stating their personal views, communities came up, to which the government saw as a threat. This threat as largely due to the "freedom of speech". The giant corporation, and the government policies went through changes and bills were passed to oppose the flow of free information. It was at this moment, people from different culture showed up. These people were the internet cowboys, they believed in information flow. Most often, these people had been called with different names, some call them hackers, some call them crackers, still some call them problem makers, yet others call them the heroes of the computer revolution. Since hackers and people alike with certain ideas and rare culture are themselves bound and called "cyber terrorist" worldwide, people often fail to realize these are the same people who gave birth to the internet, the ones who keep
  • 4. the internet running. There were explorers who already had dug the internet and had left the public to see the treasure beyond to that of the internet. Fact is, the internet itself is just the surface web. There are layers and there are intermediates in-between these layers. The deeper one goes down, the closer comes the darknet. Between the surface web and the deepweb, there is an interesting web which is known as the "Underground". The Underground consists of different services, most of them are illegal. There are people from drug dealers to professional stealers who have found their ways to sell their services with anonymity. These services could be purchased either via bitcoins or paypal, liberty reserve. The service providers can also ask for direct Western Union wired money transfers if they wish to. Bitcoin and all others similar are virtual money system are based on virtual money transfer, hence providing partial anonymity to total anonymity. Carders and drug dealers could also be found on the surface web (which is sometimes referred to as clearnet). The criminal underground goes much more deeper than this, which is darknet (the deepweb!). Paypal accounts, premium porn accounts, sony playstation accounts, minecraft accounts, and even mass facebook accounts are sold in the underground. There are professional hackers and carders who sell these services to the one who wish to buy these services. Normally the underground services majorly depends upon anonymous email setup, or IRC network. An IRC is an Internet Relay Chat system, where people join specific channels of their interest and discuss topics. The underground plus the surface web still covers 20 percent of the whole ocean web. The rest 80 percent is the deepnet. To explore the deepweb, one needs special browser setup with proxy. Beyond the underground lies the deepweb. The Underground is also referred as the "gray" area which lies between the surface web and the deepweb. a.) Russian Mafia and the underground
  • 5. b.) Carders and bomb artists To access the deepweb, one has to have special proxy browsers which encrypts and tunnels the source packets, this again works on exit and entrance nodes. Once installed, this special web browser would relay the packets and forward it to different known nodes of entrance and pass through many other host and then would land up to the desired special address. 'Tor', or The Onion Router is a special proxy browser of its kind which provides access to the deepweb locations (special addresses). These sites have been setup on private servers across the globe. These addresses contains special content which might not be found on the surface net. The quality of contents found on these special sites differs, and recognizes the different layers of the deepweb. The deepweb is 80% rest of the internet, which consists of floating data, raw data and accessible private data. Most of this private data comes from universities, NASA research center, geological and astrological hidden data, biological data and different services, which are mostly illegal. These following images have been taken from the deepweb to illustrate what happens and what goes on beyond the general surface web. a.) Anarchic posts on the deepweb b.) Drugs sold in the deepweb The different layers of the deepweb could be differentiated by its contents and quality of the data obtained. The layer one of the deepweb consists from source code exchange to suicide, porn tapes, isolated FTP servers, private servers, mathematics research, visual processing, virus information, hackers are its kind. People also sell pirated software, ripped source code, personal experimental research, and credit card, SSN information. The second level of the web consists of discussions on circuit development, AI theory, the MIT and its research, shell networking, node transfers, data analysis, data mining and cosmologists. From second to the third level, one would find banned videos, banned books, black magic
  • 6. practices, Assassination boards, human trafficking, corporate exchange, line of blood locations, hidden wiki, anarchists, political hunters, drug sales, weapon inventory, arms and ammunition, nuclear weapons, black market, human experiments., conspiracy, pedophilia, cannibal discussion and procedure, the Silk road, privacy and pirating software's, movies and celebrity leaks. Bounty hackers could also be found here (also on the clearnet) who takes up payment for finding software, web application and network vulnerabilities on different corporate sites and it's network infrastructure. All these corporate exchange happen in this third level, where people are anonymous and the only thing what matters is to share information. Moving from the third level to the fourth level, one could figure out, they are way too long from the surfacenet and will find themselves landing onto pedophile zones, where pedophiles discuss child porn, hardcore candy, necrophilia, zoophiles, professional international assassin market, high cost exploits for web vulnerabilities, WW2 files and future extradition files, concepts on redesigning electronic processors, also called GGGQEP (Gadolinium Gallium Garnet), geometric algorithm shortcuts, the second world order revolts, theorists, global assassination planners, revolutionary anarchists and human experiments. a.) Bitcoin transaction for illegal services
  • 7. b.) Hackers in the deepweb. Beyond the fourth level , there is plenty of information on government policies, national priority data, NASA raw documents and footage records, astrological skyline plans and extraction points, heavy interNIC databases, old forbidden and lone servers which are not connected directly to the internet, closed shell servers and its access, nuclear datasheet plans, international energy crisis plans, black arms and ammunition market including military weapons, data smugglers smuggling drug information, military information and international surveillance systems. All classified information is available only if one has a strong heart to reach it and the proper resources with contacts. Everything that happens in the deepweb or even on the gray area, that is the underground, is achieved with proper illegal contacts, who has further information and the web resources to dig out the darkest corners of the deepweb. The deepweb still is vast, and no one man has ever surfed the whole of the information which keeps floating around. The surface area itself looks so vast and it easily accessible because the search engine does half the work on behalf of the users. Search engines like yahoo, google, bing are designed to pick up common popular search keywords which keep incoming from the users and save it and then repeat the search. The concept with the clearnet (or the surfaceweb) only lies in indexing and crawling the different part of the surfaceweb to fetch contents.
  • 8. a.) Stolen items on the deepweb b.) Child Pornography. Conclusion: There is a hidden wiki, which has access to 20 percent of the deepweb data and their location. When people visit these links, they fall addicted to the sites and in urge to get deeper, negative thoughts and self destruction thoughts are perceived. This is due to the fact the human mind has certain trained ability to see and conceive things, which they have been prepared for, but on the deepweb, there is necrophilia, child hunters, human slavery and things which might not be suitable for any normal web user. According to the statistical reports, following data has been achieved till date: Table 1. Baseline Surface Web Size Assumptions Total No. of Documents Content Size (GBs) (HTML basis) 1,000,000,000 18,700
  • 9. Table 2. Distribution of Deep Sites by Subject Area Deep Web Coverage Agriculture 2.7% Arts 6.6% Business 5.9% Computing/Web 6.9% Education 4.3% Employment 4.1% Engineering 3.1% Government 3.9% Health 5.5% Humanities 13.5% Law/Politics 3.9% Lifestyles 4.0% News, Media 12.2% People, Companies 4.9% Recreation, Sports 3.5% References 4.5% Science, Math 4.0% Travel 3.4% Shopping 3.2% There is more to the deepweb than the findings. An individual can never dig the whole deepweb in one life. There exists corners of deepweb which might be disturbing, but illuminating. The Tor, I2P and the Freenet projects have done a lot to keep the information free and flexible. The community of free users are growing, people are revolting against the will of their government, the internet just gets more deeper and deeper until the day arrives when censorship is no more an option, and common people move out to the deepnet to discuss their grievances.