SlideShare a Scribd company logo
What is Deep Web?
 Deep web is a World Wide Web content that
is not part of the surface web (content
that is available to the general public)
which is indexed by the standard search
engine.
 Surface web has 4% World Wide Web content
while Deep web has 96% World Wide Web
content.
Difference between Surface
Web and Deep Web
Surface Web DeepWeb
-Social Medias
websites
eg.)
Facebook,Twitter,
E-commerce,Youtube,
instagram etc.
-Unsearchable websites
-Remain anonymous
-Drugs, Pornography, and
illegal markets
-Mysteries, conspiracies
Child Pornography
Website: Candy
Livestream show: Daisy Destruction
Founder: Peter Scully
(Father of Pedophile)
Peter Scully
(Father of Pedophile)
 Peter Gerard Scully(born January 13, 1963) is an Australian
who is, as of September 2016, on trial in the Philippines for
numerous crimes, including child molestation, the murder of an
11-year-old Filipina girl, and the torture and sexual abuse of
at least eight girls, including an 18-month-old infant.
 In 2011, Scully fled from Melbourne, Australia, to the
Philippines after being accused of multiple fraud offences. From
the Philippine Island of Mindanao, he is alleged to have run an
international pedophile ring and offered pay-per-view video
streams of children being tortured and sexually abused on
the deep web including a video titled Daisy's Destruction.[2][3]
 On February 20, 2015, Scully was arrested in his rented house
in Malaybalay City after investigators discovered the remains of
a teenage girl, Rosie, buried under an apartment he had rented.
He allegedly strangled her to death according to police who were
led to the apartment by Scully's partner, a 17-year-old Filipino
girl, who was also his girlfriend and a prior victim of his
abuse.
Illegal Market
Mysteries
Suicide Mouse
(Lost episode of Mickey Mouse)
-Suicide Mouse, also known as
“suicidemouse.avi”, is a black-and-
white cartoon featuring a looped
animation of the Disney character
Mickey Mouse walking along several
buildings accompanied by eerie piano
music. The video cuts to black for
several minutes and returns with
distorted video and loud screaming
audio at the end.
Conspiracy
landing in the moon streamed by
NASA
 Mr Markin, who resigned from the post in October, did
not go as far as suggesting the missions were faked,
but said as part of world history it was right to
establish what happened and an inquiry could provide
new insights into the historical journeys.
 -He argued this lay the US open to scrutiny of its
own actions due to the high number of conspiracy
theories that the Moon landing videos were faked due
one of the flags having an shadow and blowing in the
wind despite thee being no atmosphere and other
anomalies.
Deep Web Usage
 Vital tool for Intelligence agents
 Law Enforcement
 Political dissidents
 Criminals
 Anybody
Law Enforcement
 Personal Information
-
Advantages and Disadvantages
of Deep Web
Advantages :
- Privacy, confidentiality, and being anonymous on the web
- Enlightenment
Disadvantages :
- Criminals makes use of deepweb to commit serious crimes
and it takes time to trace them
- Your life was in danger if you accidentally discover illegal
transaction
- It can destroy your device , it contains lots of viruses and
malwares
Do not fear the unknown.
Let it embrace you.
Let it enlighten you.
For in it, you will come to
realizations
….about reality and fallacy.
…about truth
…about liberation and
…about freedom from ignorance.
-unknown
REMINDER : DON’T GO DEEPER
“CURIOUSITY CAN HARM PEOPLE SOMETIMES”
THANKS FORWATCHING. 

More Related Content

What's hot

Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Bich (Evelyn) Chu
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
Paula Ripoll Cacho
 
The dark web
The dark webThe dark web
The dark web
Bella M
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
Kenny Yu
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
vinod kumar
 
What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)
Molfar
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
Khaled Sany
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
Suraj Jaundoo
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
DallasHaselhorst
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)
phexcom1
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
Deep Shankar Yadav
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }
AkshayJha40
 
Dark web
Dark webDark web
Dark web
Nikki Noveno
 
Deep web
Deep webDeep web
Deep web
Abu Kaisar
 
Deep web & Darknet Präsentation
Deep web & Darknet PräsentationDeep web & Darknet Präsentation
Deep web & Darknet Präsentation
Tomturbo11
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan Braganza
NSConclave
 
Osint primer
Osint primerOsint primer
The Dark Web
The Dark WebThe Dark Web
The Dark Web
jamiecornista
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Prabhat kumar Suman
 
Cyberstalking
Cyberstalking Cyberstalking
Cyberstalking
Dawid Kryniewski
 

What's hot (20)

Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016Rolling in the Deep. ISACA.SV.2016
Rolling in the Deep. ISACA.SV.2016
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
The dark web
The dark webThe dark web
The dark web
 
The Dark Web by Kenneth Yu
The Dark Web by Kenneth YuThe Dark Web by Kenneth Yu
The Dark Web by Kenneth Yu
 
Deepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar anchaDeepweb and darkweb vinodkumar ancha
Deepweb and darkweb vinodkumar ancha
 
What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)What is Open Source Intelligence (OSINT)
What is Open Source Intelligence (OSINT)
 
Dark and Deep web
Dark and Deep webDark and Deep web
Dark and Deep web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
 
Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)Open source intelligence information gathering (OSINT)
Open source intelligence information gathering (OSINT)
 
OSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligenceOSINT- Leveraging data into intelligence
OSINT- Leveraging data into intelligence
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }
 
Dark web
Dark webDark web
Dark web
 
Deep web
Deep webDeep web
Deep web
 
Deep web & Darknet Präsentation
Deep web & Darknet PräsentationDeep web & Darknet Präsentation
Deep web & Darknet Präsentation
 
OSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan BraganzaOSINT: Open Source Intelligence - Rohan Braganza
OSINT: Open Source Intelligence - Rohan Braganza
 
Osint primer
Osint primerOsint primer
Osint primer
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Cyberstalking
Cyberstalking Cyberstalking
Cyberstalking
 

Viewers also liked

Pedophile Reporter Google chrome extension
Pedophile Reporter Google chrome extensionPedophile Reporter Google chrome extension
Pedophile Reporter Google chrome extension
Joe Seanor
 
Sexual Rights of a Pedophile
Sexual Rights of a PedophileSexual Rights of a Pedophile
Sexual Rights of a Pedophile
Sexpo-säätiö / Sexpo Foundation
 
The Hidden Web
The Hidden WebThe Hidden Web
The Hidden Web
Jon Kane
 
Ethical & Practical Issues in Managing Internal Investigations
Ethical & Practical Issues in Managing Internal InvestigationsEthical & Practical Issues in Managing Internal Investigations
Ethical & Practical Issues in Managing Internal Investigations
Gowling WLG
 
Smart Crawler -A Two Stage Crawler For Efficiently Harvesting Deep Web
Smart Crawler -A Two Stage Crawler For Efficiently Harvesting Deep WebSmart Crawler -A Two Stage Crawler For Efficiently Harvesting Deep Web
Smart Crawler -A Two Stage Crawler For Efficiently Harvesting Deep Web
S Sai Karthik
 
Darknet
DarknetDarknet
Pedophile Symbols
Pedophile SymbolsPedophile Symbols
Pedophile Symbols
hamomilaki .
 
Deep web
Deep webDeep web
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
Swecha | స్వేచ్ఛ
 
Pedopile powerpoint
Pedopile powerpointPedopile powerpoint
Pedopile powerpoint
xoshayvsyou
 
Deep Web
Deep WebDeep Web
Deep Web
St John
 

Viewers also liked (12)

Pedophile Reporter Google chrome extension
Pedophile Reporter Google chrome extensionPedophile Reporter Google chrome extension
Pedophile Reporter Google chrome extension
 
Sexual Rights of a Pedophile
Sexual Rights of a PedophileSexual Rights of a Pedophile
Sexual Rights of a Pedophile
 
The Hidden Web
The Hidden WebThe Hidden Web
The Hidden Web
 
Ethical & Practical Issues in Managing Internal Investigations
Ethical & Practical Issues in Managing Internal InvestigationsEthical & Practical Issues in Managing Internal Investigations
Ethical & Practical Issues in Managing Internal Investigations
 
Smart Crawler -A Two Stage Crawler For Efficiently Harvesting Deep Web
Smart Crawler -A Two Stage Crawler For Efficiently Harvesting Deep WebSmart Crawler -A Two Stage Crawler For Efficiently Harvesting Deep Web
Smart Crawler -A Two Stage Crawler For Efficiently Harvesting Deep Web
 
The dark web
The dark webThe dark web
The dark web
 
Darknet
DarknetDarknet
Darknet
 
Pedophile Symbols
Pedophile SymbolsPedophile Symbols
Pedophile Symbols
 
Deep web
Deep webDeep web
Deep web
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Pedopile powerpoint
Pedopile powerpointPedopile powerpoint
Pedopile powerpoint
 
Deep Web
Deep WebDeep Web
Deep Web
 

Similar to DEEP WEB

2600 v10 n4 (winter 1993)
2600 v10 n4 (winter 1993)2600 v10 n4 (winter 1993)
2600 v10 n4 (winter 1993)
Felipe Prado
 
Phreaks, hackers & trolls
Phreaks, hackers & trollsPhreaks, hackers & trolls
Phreaks, hackers & trolls
EJThompson
 
Famous hackers
Famous hackersFamous hackers
Famous hackers
Ashokkumar Gnanasekar
 
We couldbeheroes -recon2014
We couldbeheroes -recon2014We couldbeheroes -recon2014
We couldbeheroes -recon2014
evacide
 
Updated flipbook
Updated flipbookUpdated flipbook
Updated flipbook
Mika Ch
 
Tik tok influencers instantly got Pays Through Law of Karma.pdf
Tik tok influencers instantly got Pays Through Law of Karma.pdfTik tok influencers instantly got Pays Through Law of Karma.pdf
Tik tok influencers instantly got Pays Through Law of Karma.pdf
Medihertz
 
What we can learn from LulzSec
What we can learn from LulzSecWhat we can learn from LulzSec
What we can learn from LulzSec
Positive Hack Days
 
Anonymous
AnonymousAnonymous
Anonymous
neovas
 
https---uii.io-Oneanomiusandrussia.pdf
https---uii.io-Oneanomiusandrussia.pdfhttps---uii.io-Oneanomiusandrussia.pdf
https---uii.io-Oneanomiusandrussia.pdf
Lucas395677
 
How to protect yourself in e world?
How to protect yourself in e world? How to protect yourself in e world?
How to protect yourself in e world?
Dipak Parmar
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
khansalman19
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Scott Mills
 
Anonymous
AnonymousAnonymous
Anonymous
discon
 
Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014
protected7000
 
Top 100 illuminati banksters meeting for satanic ceremony in colorado on june...
Top 100 illuminati banksters meeting for satanic ceremony in colorado on june...Top 100 illuminati banksters meeting for satanic ceremony in colorado on june...
Top 100 illuminati banksters meeting for satanic ceremony in colorado on june...
RepentSinner
 
5 of the world’s most famous hackers
5 of the world’s most famous hackers5 of the world’s most famous hackers
5 of the world’s most famous hackers
MohsinHusenManasiya
 
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
aesalem06
 
Phone hacking scandal
Phone hacking scandalPhone hacking scandal
Phone hacking scandal
ClaySkorski
 
Censorship
CensorshipCensorship
Censorship
hannazajbert
 
The hacker crackdown 2 the digital underground
The hacker crackdown 2 the digital undergroundThe hacker crackdown 2 the digital underground
The hacker crackdown 2 the digital underground
rmvvr143
 

Similar to DEEP WEB (20)

2600 v10 n4 (winter 1993)
2600 v10 n4 (winter 1993)2600 v10 n4 (winter 1993)
2600 v10 n4 (winter 1993)
 
Phreaks, hackers & trolls
Phreaks, hackers & trollsPhreaks, hackers & trolls
Phreaks, hackers & trolls
 
Famous hackers
Famous hackersFamous hackers
Famous hackers
 
We couldbeheroes -recon2014
We couldbeheroes -recon2014We couldbeheroes -recon2014
We couldbeheroes -recon2014
 
Updated flipbook
Updated flipbookUpdated flipbook
Updated flipbook
 
Tik tok influencers instantly got Pays Through Law of Karma.pdf
Tik tok influencers instantly got Pays Through Law of Karma.pdfTik tok influencers instantly got Pays Through Law of Karma.pdf
Tik tok influencers instantly got Pays Through Law of Karma.pdf
 
What we can learn from LulzSec
What we can learn from LulzSecWhat we can learn from LulzSec
What we can learn from LulzSec
 
Anonymous
AnonymousAnonymous
Anonymous
 
https---uii.io-Oneanomiusandrussia.pdf
https---uii.io-Oneanomiusandrussia.pdfhttps---uii.io-Oneanomiusandrussia.pdf
https---uii.io-Oneanomiusandrussia.pdf
 
How to protect yourself in e world?
How to protect yourself in e world? How to protect yourself in e world?
How to protect yourself in e world?
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
Social Media For Investigations By Detective Jeff Bangild Toronto Police #Boo...
 
Anonymous
AnonymousAnonymous
Anonymous
 
Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014Privacy isdeadgetoveritredux 10.12.2014
Privacy isdeadgetoveritredux 10.12.2014
 
Top 100 illuminati banksters meeting for satanic ceremony in colorado on june...
Top 100 illuminati banksters meeting for satanic ceremony in colorado on june...Top 100 illuminati banksters meeting for satanic ceremony in colorado on june...
Top 100 illuminati banksters meeting for satanic ceremony in colorado on june...
 
5 of the world’s most famous hackers
5 of the world’s most famous hackers5 of the world’s most famous hackers
5 of the world’s most famous hackers
 
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
 
Phone hacking scandal
Phone hacking scandalPhone hacking scandal
Phone hacking scandal
 
Censorship
CensorshipCensorship
Censorship
 
The hacker crackdown 2 the digital underground
The hacker crackdown 2 the digital undergroundThe hacker crackdown 2 the digital underground
The hacker crackdown 2 the digital underground
 

Recently uploaded

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 

Recently uploaded (20)

Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 

DEEP WEB

  • 1.
  • 2.
  • 3. What is Deep Web?  Deep web is a World Wide Web content that is not part of the surface web (content that is available to the general public) which is indexed by the standard search engine.  Surface web has 4% World Wide Web content while Deep web has 96% World Wide Web content.
  • 4. Difference between Surface Web and Deep Web Surface Web DeepWeb -Social Medias websites eg.) Facebook,Twitter, E-commerce,Youtube, instagram etc. -Unsearchable websites -Remain anonymous -Drugs, Pornography, and illegal markets -Mysteries, conspiracies
  • 5. Child Pornography Website: Candy Livestream show: Daisy Destruction Founder: Peter Scully (Father of Pedophile)
  • 6.
  • 7. Peter Scully (Father of Pedophile)  Peter Gerard Scully(born January 13, 1963) is an Australian who is, as of September 2016, on trial in the Philippines for numerous crimes, including child molestation, the murder of an 11-year-old Filipina girl, and the torture and sexual abuse of at least eight girls, including an 18-month-old infant.  In 2011, Scully fled from Melbourne, Australia, to the Philippines after being accused of multiple fraud offences. From the Philippine Island of Mindanao, he is alleged to have run an international pedophile ring and offered pay-per-view video streams of children being tortured and sexually abused on the deep web including a video titled Daisy's Destruction.[2][3]  On February 20, 2015, Scully was arrested in his rented house in Malaybalay City after investigators discovered the remains of a teenage girl, Rosie, buried under an apartment he had rented. He allegedly strangled her to death according to police who were led to the apartment by Scully's partner, a 17-year-old Filipino girl, who was also his girlfriend and a prior victim of his abuse.
  • 8.
  • 9.
  • 11.
  • 12. Mysteries Suicide Mouse (Lost episode of Mickey Mouse) -Suicide Mouse, also known as “suicidemouse.avi”, is a black-and- white cartoon featuring a looped animation of the Disney character Mickey Mouse walking along several buildings accompanied by eerie piano music. The video cuts to black for several minutes and returns with distorted video and loud screaming audio at the end.
  • 13.
  • 14. Conspiracy landing in the moon streamed by NASA  Mr Markin, who resigned from the post in October, did not go as far as suggesting the missions were faked, but said as part of world history it was right to establish what happened and an inquiry could provide new insights into the historical journeys.  -He argued this lay the US open to scrutiny of its own actions due to the high number of conspiracy theories that the Moon landing videos were faked due one of the flags having an shadow and blowing in the wind despite thee being no atmosphere and other anomalies.
  • 15.
  • 16. Deep Web Usage  Vital tool for Intelligence agents  Law Enforcement  Political dissidents  Criminals  Anybody
  • 18.
  • 19. Advantages and Disadvantages of Deep Web Advantages : - Privacy, confidentiality, and being anonymous on the web - Enlightenment Disadvantages : - Criminals makes use of deepweb to commit serious crimes and it takes time to trace them - Your life was in danger if you accidentally discover illegal transaction - It can destroy your device , it contains lots of viruses and malwares
  • 20. Do not fear the unknown. Let it embrace you. Let it enlighten you. For in it, you will come to realizations ….about reality and fallacy. …about truth …about liberation and …about freedom from ignorance. -unknown
  • 21. REMINDER : DON’T GO DEEPER “CURIOUSITY CAN HARM PEOPLE SOMETIMES” THANKS FORWATCHING. 