SlideShare a Scribd company logo
Deep Web &Dark Web
By:
WHAT ARE THEY?
Surface web is only about 19 TB in size
The deep net has a whopping size
of over 7500 TB !
HOW DO WE GET THERE?
-need browser that masks our
identity
-need access to otherwise
inaccessible parts of the web
WHY USE THESE BROWSERS?
Search engine crawlers do not pick up most resources including:
● Dynamic content: dynamic pages which are returned in response to a submitted query or accessed only through a form
● Unlinked content: pages which are not linked to by other pages (ie backlinks or inlinks)
● Private Web: sites that require registration and login
● Limited access content: sites that limit access to their pages in a technical way
● Scripted content: pages that are only accessible through links produced in script (ex javascript)
● Non-HTML/text content: textual content encoded in multimedia files
● Text content using the Gopher protocol and files hosted on irregular FTP
ILLEGALACTIVITIES
PURCHASING ILLEGAL ITEMS/SUBSTANCES
● millions of dollars of transactions made
each year
● can purchase weapons, narcotics, credit
cards, organs, hackers, hitmen, etc
● From February 6, 2011 to July 23, 2013
roughly $1.2 billion in revenue and $79.8
million in commissions were made through
Silk Road alone
LEAK OF SENSITIVE INFORMATION
SCAMS
● credit card frauds
● fake passports and ID
● Hitmen
● Stealing private and
personal info
● exploitations to upload
malware
HUMAN TRAFFICKING & ORGAN DEALING
● Slaves can be bought and sold
over the dark web
● Sites involving human
experimentation
● Organs can also be purchased
● People can intentionally sell
their organs
● amateur surgery kits
CHILD PORNOGRAPHY
PROSTITUTION
● Services are provided
discretely through the deep
net
● one of the biggest problems on the dark
web
● more and more sites keep emerging
ASSASSINATION
TERRORIST ACTIVITY
● Hitman services
● Widely regarded as a hoax
● the Deep net has
always been
considered a place
of communication
between terrorist
groups
LEGAL USES
● Whistleblowers
● Military
● Policy & Crime units
● Access to additional information
● Accessing websites not available
to other countries.
● Everyday buying and selling
UNDERGROUND JOURNALISTS
● Access for places with heavy censorship laws over the internet
● Obtaining information on the events occurring in other countries
● Cohort exchange of messages
● Private message sending within the country
● Information leaking concerning the states of other places
● Leaking of Classified information for betterment of someone
DEEP WEB USED BY THE GOVERNMENT
● In august 2013, the US intercepted messages being sent amongst senior al
qaeda officials
● US embassies were the target
● This was intercepted by the US government. 22 US embassies were shut
down across the Middle East and North Africa as part of a counter effort
● Messages were sent through an anonymous email service
CICADA 3301
● Unknown organization
●
● Tons of rumors revolving its involvement or meaning. Some believe it be a
recruitment agency for government or even terrorist activity.
●
● Has only appeared 4 times, posting complex puzzles to be solved. Latest one
on January 5, 2016.
●
● All that's known is that they are trying to find “highly intelligent individuals”.
●
● Puzzles involved media, music, bootable Linux CDs, signs, cryptography,
steganography etc.
IS THE DEEP NET / DARK NET SAFE?
No matter how updated, browsers still have
vulnerabilities that can be exploited
● YES ● NO
●
● There are much more safety precautions ●
involved in using these deep web browsers
●
● Example: masking IP address, encryptions, etc. ●
●
● There are directories that you can use to browse
safely in the deep web.
Even just using your normal email or a regular
username can have serious effects
● NEVER give up personal info, or credit card info
● Should be wary when making purchases etc.
● Provides additional security in terms of hacking
and malware prevention
QUESTIONS AND ANSWERS
● What is the difference between the deep web and the dark web?
- The Deep Web refers to the broad swath of the internet that traditional search engines are unable to access, including
password-protected web forums, chat services, file sharing and P2P technologies. While the Dark Web is a
subcomponent of the Deep Web that is not only inaccessible to mainstream search engines but only visible to users who
have installed specialized software enabling access to these regions of the internet.
● Why can’t you use a surface web browsers and search engines to enter the
deep web?
- Using a regular web browser would not protect your identity and it can arouse suspicion with the law. Tor is
exceptionally good because there are several layers of encryption (like an onion) to mask your IP.
- Using a search engine such as Google is futile as it cannot index or retrieve the amount of data that is not accessed via
public DNS services. The Dark Web and the Deep Web itself have their own search engines.
-
● Name three illegal and legal activities that can be done in the deep web.
- Illegal: Prostitution, Drug deals, Hitmen services.
- Legal: Journalism, accessing banned novels, whistleblowing.
QUESTIONS AND ANSWERS
●
REFERENCES
● http://securityaffairs.co/wordpress/8719/cyber-crime/the-good-and-the-bad-of-the-deep-web.html
● https://www.cigionline.org/sites/default/files/gcig_paper_no6.pdf
● https://www.flashpoint-intel.com/home/assets/File/Flashpoint_IlluminatingTheDeep%26DarkWeb.pdf
● https://en.wikipedia.org/wiki/Dark_web

More Related Content

Similar to Team11_DeepDarkWeb.pptx

Invisible Web
Invisible Web Invisible Web
Invisible Web
Muhammad Azeem Mazhar
 
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
IbrahimSami14
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
Abhimanyu Singh
 
Deep Web – Deepweb.pdf
Deep Web – Deepweb.pdfDeep Web – Deepweb.pdf
Deep Web – Deepweb.pdf
TopLinkSeo
 
What Is Dark Web.docx
What Is Dark Web.docxWhat Is Dark Web.docx
What Is Dark Web.docx
RoshniChauhan24
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh
 
Darknet
DarknetDarknet
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
Swecha | స్వేచ్ఛ
 
Deep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdfDeep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdf
kabirhasan11
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
Nitish Joshi
 
Dark web (2)
Dark web (2)Dark web (2)
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep Web
IRJET Journal
 
Dark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfDark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdf
TopLinkSeo
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
PraneshKulkarni22
 
Demystifying the Dark Web
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark Web
Tom Kranz
 
Deep web
Deep webDeep web
Dark net (escalona)
Dark net (escalona)Dark net (escalona)
Dark net (escalona)
Nico Escalona
 
Dark web
Dark webDark web
Dark web
TopLinkSeo
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
Shubh Thakkar
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
Niña Guno
 

Similar to Team11_DeepDarkWeb.pptx (20)

Invisible Web
Invisible Web Invisible Web
Invisible Web
 
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Deep Web – Deepweb.pdf
Deep Web – Deepweb.pdfDeep Web – Deepweb.pdf
Deep Web – Deepweb.pdf
 
What Is Dark Web.docx
What Is Dark Web.docxWhat Is Dark Web.docx
What Is Dark Web.docx
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Darknet
DarknetDarknet
Darknet
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
Deep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdfDeep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdf
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 
Dark web (2)
Dark web (2)Dark web (2)
Dark web (2)
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep Web
 
Dark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfDark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdf
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
Demystifying the Dark Web
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark Web
 
Deep web
Deep webDeep web
Deep web
 
Dark net (escalona)
Dark net (escalona)Dark net (escalona)
Dark net (escalona)
 
Dark web
Dark webDark web
Dark web
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 

Recently uploaded

A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Sinan KOZAK
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
Madan Karki
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
171ticu
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
171ticu
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
sachin chaurasia
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
University of Maribor
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
MDSABBIROJJAMANPAYEL
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
gerogepatton
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
NidhalKahouli2
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
JamalHussainArman
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
NazakatAliKhoso2
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
Aditya Rajan Patra
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
mamamaam477
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
zubairahmad848137
 

Recently uploaded (20)

A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Manufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptxManufacturing Process of molasses based distillery ppt.pptx
Manufacturing Process of molasses based distillery ppt.pptx
 
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样官方认证美国密歇根州立大学毕业证学位证书原版一模一样
官方认证美国密歇根州立大学毕业证学位证书原版一模一样
 
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样学校原版美国波士顿大学毕业证学历学位证书原版一模一样
学校原版美国波士顿大学毕业证学历学位证书原版一模一样
 
The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.The Python for beginners. This is an advance computer language.
The Python for beginners. This is an advance computer language.
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
Presentation of IEEE Slovenia CIS (Computational Intelligence Society) Chapte...
 
Properties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptxProperties Railway Sleepers and Test.pptx
Properties Railway Sleepers and Test.pptx
 
International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...International Conference on NLP, Artificial Intelligence, Machine Learning an...
International Conference on NLP, Artificial Intelligence, Machine Learning an...
 
basic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdfbasic-wireline-operations-course-mahmoud-f-radwan.pdf
basic-wireline-operations-course-mahmoud-f-radwan.pdf
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptxML Based Model for NIDS MSc Updated Presentation.v2.pptx
ML Based Model for NIDS MSc Updated Presentation.v2.pptx
 
Textile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdfTextile Chemical Processing and Dyeing.pdf
Textile Chemical Processing and Dyeing.pdf
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
Recycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part IIRecycled Concrete Aggregate in Construction Part II
Recycled Concrete Aggregate in Construction Part II
 
Engine Lubrication performance System.pdf
Engine Lubrication performance System.pdfEngine Lubrication performance System.pdf
Engine Lubrication performance System.pdf
 
Casting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdfCasting-Defect-inSlab continuous casting.pdf
Casting-Defect-inSlab continuous casting.pdf
 

Team11_DeepDarkWeb.pptx

  • 1. Deep Web &Dark Web By:
  • 2. WHAT ARE THEY? Surface web is only about 19 TB in size The deep net has a whopping size of over 7500 TB !
  • 3. HOW DO WE GET THERE? -need browser that masks our identity -need access to otherwise inaccessible parts of the web
  • 4. WHY USE THESE BROWSERS? Search engine crawlers do not pick up most resources including: ● Dynamic content: dynamic pages which are returned in response to a submitted query or accessed only through a form ● Unlinked content: pages which are not linked to by other pages (ie backlinks or inlinks) ● Private Web: sites that require registration and login ● Limited access content: sites that limit access to their pages in a technical way ● Scripted content: pages that are only accessible through links produced in script (ex javascript) ● Non-HTML/text content: textual content encoded in multimedia files ● Text content using the Gopher protocol and files hosted on irregular FTP
  • 6. PURCHASING ILLEGAL ITEMS/SUBSTANCES ● millions of dollars of transactions made each year ● can purchase weapons, narcotics, credit cards, organs, hackers, hitmen, etc ● From February 6, 2011 to July 23, 2013 roughly $1.2 billion in revenue and $79.8 million in commissions were made through Silk Road alone
  • 7. LEAK OF SENSITIVE INFORMATION SCAMS ● credit card frauds ● fake passports and ID ● Hitmen ● Stealing private and personal info ● exploitations to upload malware
  • 8. HUMAN TRAFFICKING & ORGAN DEALING ● Slaves can be bought and sold over the dark web ● Sites involving human experimentation ● Organs can also be purchased ● People can intentionally sell their organs ● amateur surgery kits
  • 9. CHILD PORNOGRAPHY PROSTITUTION ● Services are provided discretely through the deep net ● one of the biggest problems on the dark web ● more and more sites keep emerging
  • 10. ASSASSINATION TERRORIST ACTIVITY ● Hitman services ● Widely regarded as a hoax ● the Deep net has always been considered a place of communication between terrorist groups
  • 11. LEGAL USES ● Whistleblowers ● Military ● Policy & Crime units ● Access to additional information ● Accessing websites not available to other countries. ● Everyday buying and selling
  • 12. UNDERGROUND JOURNALISTS ● Access for places with heavy censorship laws over the internet ● Obtaining information on the events occurring in other countries ● Cohort exchange of messages ● Private message sending within the country ● Information leaking concerning the states of other places ● Leaking of Classified information for betterment of someone
  • 13. DEEP WEB USED BY THE GOVERNMENT ● In august 2013, the US intercepted messages being sent amongst senior al qaeda officials ● US embassies were the target ● This was intercepted by the US government. 22 US embassies were shut down across the Middle East and North Africa as part of a counter effort ● Messages were sent through an anonymous email service
  • 14. CICADA 3301 ● Unknown organization ● ● Tons of rumors revolving its involvement or meaning. Some believe it be a recruitment agency for government or even terrorist activity. ● ● Has only appeared 4 times, posting complex puzzles to be solved. Latest one on January 5, 2016. ● ● All that's known is that they are trying to find “highly intelligent individuals”. ● ● Puzzles involved media, music, bootable Linux CDs, signs, cryptography, steganography etc.
  • 15. IS THE DEEP NET / DARK NET SAFE? No matter how updated, browsers still have vulnerabilities that can be exploited ● YES ● NO ● ● There are much more safety precautions ● involved in using these deep web browsers ● ● Example: masking IP address, encryptions, etc. ● ● ● There are directories that you can use to browse safely in the deep web. Even just using your normal email or a regular username can have serious effects ● NEVER give up personal info, or credit card info ● Should be wary when making purchases etc. ● Provides additional security in terms of hacking and malware prevention
  • 16. QUESTIONS AND ANSWERS ● What is the difference between the deep web and the dark web? - The Deep Web refers to the broad swath of the internet that traditional search engines are unable to access, including password-protected web forums, chat services, file sharing and P2P technologies. While the Dark Web is a subcomponent of the Deep Web that is not only inaccessible to mainstream search engines but only visible to users who have installed specialized software enabling access to these regions of the internet. ● Why can’t you use a surface web browsers and search engines to enter the deep web? - Using a regular web browser would not protect your identity and it can arouse suspicion with the law. Tor is exceptionally good because there are several layers of encryption (like an onion) to mask your IP. - Using a search engine such as Google is futile as it cannot index or retrieve the amount of data that is not accessed via public DNS services. The Dark Web and the Deep Web itself have their own search engines. - ● Name three illegal and legal activities that can be done in the deep web. - Illegal: Prostitution, Drug deals, Hitmen services. - Legal: Journalism, accessing banned novels, whistleblowing.
  • 18. REFERENCES ● http://securityaffairs.co/wordpress/8719/cyber-crime/the-good-and-the-bad-of-the-deep-web.html ● https://www.cigionline.org/sites/default/files/gcig_paper_no6.pdf ● https://www.flashpoint-intel.com/home/assets/File/Flashpoint_IlluminatingTheDeep%26DarkWeb.pdf ● https://en.wikipedia.org/wiki/Dark_web