SlideShare a Scribd company logo
1 of 12
Download to read offline
DARK WEB
DARK WEB
DARK WEB
A SECRET WORLD
1
1
1 2
2
2
3
3
3 4
4
4
TODAY'S AGENDA
TODAY'S AGENDA
TODAY'S AGENDA
INTRODUCTION TYPES OF WEB
TOR BROWSER
5
RISKY CONTENTS THAT
FOUND IN DARK WEB
6 LEGAL ACTIONS
7
DANGERS OF THE DARK WEB TO
USERS
CONCLUSION
8
CASE LAW
Tomas and Chloe
INTRODUCTION
INTRODUCTION
INTRODUCTION
The dark web, also known as the
darknet, makes up a large portion of
the internet.
The Dark Web contains information
that is not searchable using the
traditional search engines such as
google,yahoo,etc.
Deep net, Invicible web or Hidden web,
Under net.
TYPES OF WEB
TYPES OF WEB
TYPES OF WEB
1. SURFACE WEB: It includes websites, web pages, and other online
content that can be easily accessed through search engines like
Google, Yahoo, and Bing.
2. DEEP WEB: This is the part of the internet that is not indexed by
search engines and is hidden from public view. It includes websites
and online content that require authentication, such as email
accounts, online banking, and social media profiles.
3. DARK WEB: The dark web is known for hosting illegal activities, such
as drug trafficking, weapons sales, and human trafficking, but it can also
be used for legitimate purposes such as anonymous communication and
protecting privacy in countries with oppressive governments or
surveillance.
TOR is software that installs into your browser and sets up
the specific connections you need to access Dark Web
sites.
This helps to the users to hide their locations.
The IP address of the site cannot be identified, hiding
information about its host, location or content .
Instead of seeing Domains that end in .com or .org, these
hidden sites end in .onion.
It was originally developed by the U.S. Naval Research
Laboratory in the mid-1990s and later released as a free
software project.
THE ONION ROUTER (TOR)
THE ONION ROUTER (TOR)
THE ONION ROUTER (TOR)
1. HiddenWiki
2. TorDir
3. deepweblinks.org
4. http://2vlqpcqpjlhmd5r2.onion/ - Gateway to Freenet
5. http://wiki5kauuihowqi5.onion/ - Onion Wiki
Some common sites to walk in the tor
network.
RISKY CONTENTS THAT ARE FOUND
RISKY CONTENTS THAT ARE FOUND
RISKY CONTENTS THAT ARE FOUND
IN DARK WEB
IN DARK WEB
IN DARK WEB
1. ILLEGAL GOODS AND SERVICES: The dark web is known for hosting marketplaces where
users can buy and sell illegal goods and services, such as drugs, weapons, counterfeit
documents, stolen credit card information, and hacking tools.
2. ADULT CONTENT: There are also sites on the dark web that host adult content, including
pornography and extreme or illegal forms of pornography.
3. POLITICAL AND EXTREMIST CONTENT: The dark web is often used by individuals and
groups to share and promote extremist ideologies and political agendas.
4. WHISTLEBLOWER SITES: There are sites on the dark web that allow individuals to
anonymously report illegal or unethical activities, often targeted at governments or
corporations.
5. ANONYMOUS COMMUNICATION: The dark web is also used by individuals who want to
communicate anonymously, such as journalists, activists, and whistleblowers.
1. ILLEGAL ACTIVITIES: The dark web is often associated with illegal activities, including drug
trafficking, human trafficking, weapon sales, and other criminal enterprises. Engaging in such
activities can lead to legal troubles and even physical harm.
2. MALWARE AND VIRUSES: Dark web sites can contain malware and viruses that can infect a
user's computer or device, potentially leading to data theft, identity theft, or financial fraud.
3. SCAMS AND FRAUDS: Many sites on the dark wb are scams, designed to trick users into
giving up personal information or money. These scams can be difficult to identify and can
lead to financial losses.
4. CYBER ATTACKS: The dark web is a haven for hackers and cybercriminals, who may use it to
launch attacks on individuals, businesses, and governments.
5. VIOLENT CONTENT: The dark web can also contain content related to extremist ideologies,
violent acts, and other dangerous material. Exposing oneself to such content can have
negative psychological effects.
DANGERS OF
DANGERS OF
DANGERS OF DARK WEB TO USERS
DARK WEB TO USERS
DARK WEB TO USERS
1. The Information Technology (IT) Act, 2000 is the
primary law that deals with cybercrime in India.
2. Section 66 of the IT Act deals with computer-related offenses, including
unauthorized access, damage to computer systems, and hacking.
3. Section 67 of the IT Act deals with the publishing or transmission of
obscene material in electronic form, including through the dark web.
4. The penalties for these offenses can vary depending
on the severity of the crime and the jurisdiction.
LEGAL ACTIONS
LEGAL ACTIONS
LEGAL ACTIONS
Silk Road was an online marketplace on the dark web that
Ross Ulbricht created the Silk Road website in 2011.
Silk Road used the Tor network to anonymize user activity and make it difficult for
law enforcement to track.
"Dread Pirate Roberts" was the online pseudonym used by Ross Ulbricht.
In 2013, the FBI shut down the Silk Road website and arrested Ulbricht.
operated from 2011 to 2013, where users could buy and sell illegal
drugs, fake IDs, and other illegal items.
CASE
CASE
CASE LAWS
LAWS
LAWS
THE SILK ROAD CASE
The dark web is a part of the internet that is not easily accessible
and is often associated with illegal activities. While it does have
legitimate uses, individuals who use the dark web for illegal
purposes can face severe legal consequences. Law enforcement
agencies around the world are working to combat criminal activity
on the dark web, but the anonymous nature of the network makes it
challenging to identify and prosecute those involved. It is important
for individuals to be aware of the risks associated with the dark web
and to take steps to protect themselves online.
CONCLUSION
CONCLUSION
CONCLUSION
THANK
THANK
THANK
YOU
YOU
YOU
A VENKATA SAI
VU22LAWS0200036

More Related Content

What's hot

Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016
Bich (Evelyn) Chu
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
James Bollen
 
Deep web power point presentation
Deep web power point presentationDeep web power point presentation
Deep web power point presentation
albafg55
 

What's hot (20)

Deep web and dark web
Deep web and dark webDeep web and dark web
Deep web and dark web
 
Guide to dark web
Guide to dark webGuide to dark web
Guide to dark web
 
Deep web and Dark web
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
Dark web (1)
Dark web (1)Dark web (1)
Dark web (1)
 
Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016
 
Dark web
Dark webDark web
Dark web
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
 
The dark web
The dark webThe dark web
The dark web
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
Deep Web
Deep WebDeep Web
Deep Web
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Deep web power point presentation
Deep web power point presentationDeep web power point presentation
Deep web power point presentation
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Dark Web
Dark WebDark Web
Dark Web
 
dark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdfdark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdf
 
Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?Deep Dark Web - How to get inside?
Deep Dark Web - How to get inside?
 

Similar to ABOUT DARK WEB

darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
Geetha982072
 
Dark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic SeDark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic Se
OllieShoresna
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Auto Parts Wholesale Online
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Auto Parts Wholesale Online
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Auto Parts Wholesale Online
 

Similar to ABOUT DARK WEB (20)

darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web5 Ultimate Things You Should Know About Dark Web
5 Ultimate Things You Should Know About Dark Web
 
Dark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic SeDark Web Kristin Finklea Specialist in Domestic Se
Dark Web Kristin Finklea Specialist in Domestic Se
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
 
Godfather 2.0
Godfather 2.0Godfather 2.0
Godfather 2.0
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
 
Wp below the_surface
Wp below the_surfaceWp below the_surface
Wp below the_surface
 
Tor Project and The Darknet
Tor Project and The DarknetTor Project and The Darknet
Tor Project and The Darknet
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Dark Net
Dark NetDark Net
Dark Net
 
Deep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdfDeep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdf
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Deep web
Deep webDeep web
Deep web
 
Ecommer
Ecommer Ecommer
Ecommer
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Ecommer
Ecommer Ecommer
Ecommer
 
Deep web
Deep webDeep web
Deep web
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Recently uploaded (20)

Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data PlatformLess Is More: Utilizing Ballerina to Architect a Cloud Data Platform
Less Is More: Utilizing Ballerina to Architect a Cloud Data Platform
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 

ABOUT DARK WEB

  • 1. DARK WEB DARK WEB DARK WEB A SECRET WORLD
  • 2. 1 1 1 2 2 2 3 3 3 4 4 4 TODAY'S AGENDA TODAY'S AGENDA TODAY'S AGENDA INTRODUCTION TYPES OF WEB TOR BROWSER 5 RISKY CONTENTS THAT FOUND IN DARK WEB 6 LEGAL ACTIONS 7 DANGERS OF THE DARK WEB TO USERS CONCLUSION 8 CASE LAW
  • 3. Tomas and Chloe INTRODUCTION INTRODUCTION INTRODUCTION The dark web, also known as the darknet, makes up a large portion of the internet. The Dark Web contains information that is not searchable using the traditional search engines such as google,yahoo,etc. Deep net, Invicible web or Hidden web, Under net.
  • 4. TYPES OF WEB TYPES OF WEB TYPES OF WEB 1. SURFACE WEB: It includes websites, web pages, and other online content that can be easily accessed through search engines like Google, Yahoo, and Bing. 2. DEEP WEB: This is the part of the internet that is not indexed by search engines and is hidden from public view. It includes websites and online content that require authentication, such as email accounts, online banking, and social media profiles. 3. DARK WEB: The dark web is known for hosting illegal activities, such as drug trafficking, weapons sales, and human trafficking, but it can also be used for legitimate purposes such as anonymous communication and protecting privacy in countries with oppressive governments or surveillance.
  • 5. TOR is software that installs into your browser and sets up the specific connections you need to access Dark Web sites. This helps to the users to hide their locations. The IP address of the site cannot be identified, hiding information about its host, location or content . Instead of seeing Domains that end in .com or .org, these hidden sites end in .onion. It was originally developed by the U.S. Naval Research Laboratory in the mid-1990s and later released as a free software project. THE ONION ROUTER (TOR) THE ONION ROUTER (TOR) THE ONION ROUTER (TOR)
  • 6. 1. HiddenWiki 2. TorDir 3. deepweblinks.org 4. http://2vlqpcqpjlhmd5r2.onion/ - Gateway to Freenet 5. http://wiki5kauuihowqi5.onion/ - Onion Wiki Some common sites to walk in the tor network.
  • 7. RISKY CONTENTS THAT ARE FOUND RISKY CONTENTS THAT ARE FOUND RISKY CONTENTS THAT ARE FOUND IN DARK WEB IN DARK WEB IN DARK WEB 1. ILLEGAL GOODS AND SERVICES: The dark web is known for hosting marketplaces where users can buy and sell illegal goods and services, such as drugs, weapons, counterfeit documents, stolen credit card information, and hacking tools. 2. ADULT CONTENT: There are also sites on the dark web that host adult content, including pornography and extreme or illegal forms of pornography. 3. POLITICAL AND EXTREMIST CONTENT: The dark web is often used by individuals and groups to share and promote extremist ideologies and political agendas. 4. WHISTLEBLOWER SITES: There are sites on the dark web that allow individuals to anonymously report illegal or unethical activities, often targeted at governments or corporations. 5. ANONYMOUS COMMUNICATION: The dark web is also used by individuals who want to communicate anonymously, such as journalists, activists, and whistleblowers.
  • 8. 1. ILLEGAL ACTIVITIES: The dark web is often associated with illegal activities, including drug trafficking, human trafficking, weapon sales, and other criminal enterprises. Engaging in such activities can lead to legal troubles and even physical harm. 2. MALWARE AND VIRUSES: Dark web sites can contain malware and viruses that can infect a user's computer or device, potentially leading to data theft, identity theft, or financial fraud. 3. SCAMS AND FRAUDS: Many sites on the dark wb are scams, designed to trick users into giving up personal information or money. These scams can be difficult to identify and can lead to financial losses. 4. CYBER ATTACKS: The dark web is a haven for hackers and cybercriminals, who may use it to launch attacks on individuals, businesses, and governments. 5. VIOLENT CONTENT: The dark web can also contain content related to extremist ideologies, violent acts, and other dangerous material. Exposing oneself to such content can have negative psychological effects. DANGERS OF DANGERS OF DANGERS OF DARK WEB TO USERS DARK WEB TO USERS DARK WEB TO USERS
  • 9. 1. The Information Technology (IT) Act, 2000 is the primary law that deals with cybercrime in India. 2. Section 66 of the IT Act deals with computer-related offenses, including unauthorized access, damage to computer systems, and hacking. 3. Section 67 of the IT Act deals with the publishing or transmission of obscene material in electronic form, including through the dark web. 4. The penalties for these offenses can vary depending on the severity of the crime and the jurisdiction. LEGAL ACTIONS LEGAL ACTIONS LEGAL ACTIONS
  • 10. Silk Road was an online marketplace on the dark web that Ross Ulbricht created the Silk Road website in 2011. Silk Road used the Tor network to anonymize user activity and make it difficult for law enforcement to track. "Dread Pirate Roberts" was the online pseudonym used by Ross Ulbricht. In 2013, the FBI shut down the Silk Road website and arrested Ulbricht. operated from 2011 to 2013, where users could buy and sell illegal drugs, fake IDs, and other illegal items. CASE CASE CASE LAWS LAWS LAWS THE SILK ROAD CASE
  • 11. The dark web is a part of the internet that is not easily accessible and is often associated with illegal activities. While it does have legitimate uses, individuals who use the dark web for illegal purposes can face severe legal consequences. Law enforcement agencies around the world are working to combat criminal activity on the dark web, but the anonymous nature of the network makes it challenging to identify and prosecute those involved. It is important for individuals to be aware of the risks associated with the dark web and to take steps to protect themselves online. CONCLUSION CONCLUSION CONCLUSION