SlideShare a Scribd company logo
1 of 18
Download to read offline
Deep Web & Dark Web
By: Michael Williams, Catherine Yan, Mark Zhang
WHAT ARE THEY?
Surface web is only about 19 TB in size
The deep net has a whopping size
of over 7500 TB !
HOW DO WE GET THERE?
-need browser that masks our
identity
-need access to otherwise
inaccessible parts of the web
WHY USE THESE BROWSERS?
Search engine crawlers do not pick up most resources including:
● Dynamic content: dynamic pages which are returned in response to a submitted query or accessed only through a form
● Unlinked content: pages which are not linked to by other pages (ie backlinks or inlinks)
● Private Web: sites that require registration and login
● Limited access content: sites that limit access to their pages in a technical way
● Scripted content: pages that are only accessible through links produced in script (ex javascript)
● Non-HTML/text content: textual content encoded in multimedia files
● Text content using the Gopher protocol and files hosted on irregular FTP
ILLEGAL ACTIVITIES
PURCHASING ILLEGAL ITEMS/SUBSTANCES
● millions of dollars of transactions made
each year
● can purchase weapons, narcotics, credit
cards, organs, hackers, hitmen, etc
● From February 6, 2011 to July 23, 2013
roughly $1.2 billion in revenue and $79.8
million in commissions were made through
Silk Road alone
LEAK OF SENSITIVE INFORMATION
SCAMS
● credit card frauds
● fake passports and ID
● Hitmen
● Stealing private and
personal info
● exploitations to upload
malware
HUMAN TRAFFICKING & ORGAN DEALING
● Slaves can be bought and sold
over the dark web
● Sites involving human
experimentation
● Organs can also be purchased
● People can intentionally sell
their organs
● amateur surgery kits
CHILD PORNOGRAPHY
PROSTITUTION
● Services are provided
discretely through the deep
net
● one of the biggest problems on the dark
web
● more and more sites keep emerging
ASSASSINATION
TERRORIST ACTIVITY
● Hitman services
● Widely regarded as a hoax
● the Deep net has
always been
considered a place
of communication
between terrorist
groups
LEGAL USES
● Whistleblowers
● Military
● Policy & Crime units
● Access to additional information
● Accessing websites not available
to other countries.
● Everyday buying and selling
UNDERGROUND JOURNALISTS
● Access for places with heavy censorship laws over the internet
● Obtaining information on the events occurring in other countries
● Cohort exchange of messages
● Private message sending within the country
● Information leaking concerning the states of other places
● Leaking of Classified information for betterment of someone
DEEP WEB USED BY THE GOVERNMENT
● In august 2013, the US intercepted messages being sent amongst senior al
qaeda officials
● US embassies were the target
● This was intercepted by the US government. 22 US embassies were shut
down across the Middle East and North Africa as part of a counter effort
● Messages were sent through an anonymous email service
CICADA 3301
● Unknown organization
●
● Tons of rumors revolving its involvement or meaning. Some believe it be a
recruitment agency for government or even terrorist activity.
●
● Has only appeared 4 times, posting complex puzzles to be solved. Latest one
on January 5, 2016.
●
● All that's known is that they are trying to find “highly intelligent individuals”.
●
● Puzzles involved media, music, bootable Linux CDs, signs, cryptography,
steganography etc.
IS THE DEEP NET / DARK NET SAFE?
● YES
●
● There are much more safety precautions
involved in using these deep web browsers
●
● Example: masking IP address, encryptions, etc.
●
● There are directories that you can use to browse
safely in the deep web.
● NO
● No matter how updated, browsers still have
vulnerabilities that can be exploited
● Even just using your normal email or a regular
username can have serious effects
● NEVER give up personal info, or credit card info
● Should be wary when making purchases etc.
● Provides additional security in terms of hacking
and malware prevention
QUESTIONS AND ANSWERS
● What is the difference between the deep web and the dark web?
- The Deep Web refers to the broad swath of the internet that traditional search engines are unable to access, including
password-protected web forums, chat services, file sharing and P2P technologies. While the Dark Web is a
subcomponent of the Deep Web that is not only inaccessible to mainstream search engines but only visible to users who
have installed specialized software enabling access to these regions of the internet.
● Why can’t you use a surface web browsers and search engines to enter the
deep web?
- Using a regular web browser would not protect your identity and it can arouse suspicion with the law. Tor is
exceptionally good because there are several layers of encryption (like an onion) to mask your IP.
- Using a search engine such as Google is futile as it cannot index or retrieve the amount of data that is not accessed via
public DNS services. The Dark Web and the Deep Web itself have their own search engines.
-
● Name three illegal and legal activities that can be done in the deep web.
- Illegal: Prostitution, Drug deals, Hitmen services.
- Legal: Journalism, accessing banned novels, whistleblowing.
QUESTIONS AND ANSWERS
●
REFERENCES
● http://securityaffairs.co/wordpress/8719/cyber-crime/the-good-and-the-bad-of-the-deep-web.html
● https://www.cigionline.org/sites/default/files/gcig_paper_no6.pdf
● https://www.flashpoint-intel.com/home/assets/File/Flashpoint_IlluminatingTheDeep%26DarkWeb.pdf
● https://en.wikipedia.org/wiki/Dark_web

More Related Content

Similar to Team11_DeepDarkWebrthrthghhtjrjjyjyjyjyjyj

Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxIbrahimSami14
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityAbhimanyu Singh
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
 
Deep Web – Deepweb.pdf
Deep Web – Deepweb.pdfDeep Web – Deepweb.pdf
Deep Web – Deepweb.pdfTopLinkSeo
 
Demystifying the Dark Web
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark WebTom Kranz
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed webNitish Joshi
 
Deep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdfDeep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdfkabirhasan11
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniPraneshKulkarni22
 
Dark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfDark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfTopLinkSeo
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep WebIRJET Journal
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Stephen Abram
 

Similar to Team11_DeepDarkWebrthrthghhtjrjjyjyjyjyjyj (20)

Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptxJourney into the Shadows A Beginner's Guide to the Dark Web.pptx
Journey into the Shadows A Beginner's Guide to the Dark Web.pptx
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Darknet
DarknetDarknet
Darknet
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Deep Web – Deepweb.pdf
Deep Web – Deepweb.pdfDeep Web – Deepweb.pdf
Deep Web – Deepweb.pdf
 
What Is Dark Web.docx
What Is Dark Web.docxWhat Is Dark Web.docx
What Is Dark Web.docx
 
Demystifying the Dark Web
Demystifying the Dark WebDemystifying the Dark Web
Demystifying the Dark Web
 
Dark net (escalona)
Dark net (escalona)Dark net (escalona)
Dark net (escalona)
 
Deep web, the unIndexed web
Deep web, the unIndexed webDeep web, the unIndexed web
Deep web, the unIndexed web
 
Deep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdfDeep Web Stories_ Tales from the Unindexed Internet.pdf
Deep Web Stories_ Tales from the Unindexed Internet.pdf
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
Dark web
Dark webDark web
Dark web
 
Deep and dark web
Deep and dark web Deep and dark web
Deep and dark web
 
Dark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdfDark Web Links - Dark Web Links Guide.pdf
Dark Web Links - Dark Web Links Guide.pdf
 
Introduction to Deep Web
Introduction to Deep WebIntroduction to Deep Web
Introduction to Deep Web
 
The Deep and Dark Web
The Deep and Dark WebThe Deep and Dark Web
The Deep and Dark Web
 
dark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdfdark-web-and-cybercrime.pdf
dark-web-and-cybercrime.pdf
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 

Recently uploaded

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Team11_DeepDarkWebrthrthghhtjrjjyjyjyjyjyj

  • 1. Deep Web & Dark Web By: Michael Williams, Catherine Yan, Mark Zhang
  • 2. WHAT ARE THEY? Surface web is only about 19 TB in size The deep net has a whopping size of over 7500 TB !
  • 3. HOW DO WE GET THERE? -need browser that masks our identity -need access to otherwise inaccessible parts of the web
  • 4. WHY USE THESE BROWSERS? Search engine crawlers do not pick up most resources including: ● Dynamic content: dynamic pages which are returned in response to a submitted query or accessed only through a form ● Unlinked content: pages which are not linked to by other pages (ie backlinks or inlinks) ● Private Web: sites that require registration and login ● Limited access content: sites that limit access to their pages in a technical way ● Scripted content: pages that are only accessible through links produced in script (ex javascript) ● Non-HTML/text content: textual content encoded in multimedia files ● Text content using the Gopher protocol and files hosted on irregular FTP
  • 6. PURCHASING ILLEGAL ITEMS/SUBSTANCES ● millions of dollars of transactions made each year ● can purchase weapons, narcotics, credit cards, organs, hackers, hitmen, etc ● From February 6, 2011 to July 23, 2013 roughly $1.2 billion in revenue and $79.8 million in commissions were made through Silk Road alone
  • 7. LEAK OF SENSITIVE INFORMATION SCAMS ● credit card frauds ● fake passports and ID ● Hitmen ● Stealing private and personal info ● exploitations to upload malware
  • 8. HUMAN TRAFFICKING & ORGAN DEALING ● Slaves can be bought and sold over the dark web ● Sites involving human experimentation ● Organs can also be purchased ● People can intentionally sell their organs ● amateur surgery kits
  • 9. CHILD PORNOGRAPHY PROSTITUTION ● Services are provided discretely through the deep net ● one of the biggest problems on the dark web ● more and more sites keep emerging
  • 10. ASSASSINATION TERRORIST ACTIVITY ● Hitman services ● Widely regarded as a hoax ● the Deep net has always been considered a place of communication between terrorist groups
  • 11. LEGAL USES ● Whistleblowers ● Military ● Policy & Crime units ● Access to additional information ● Accessing websites not available to other countries. ● Everyday buying and selling
  • 12. UNDERGROUND JOURNALISTS ● Access for places with heavy censorship laws over the internet ● Obtaining information on the events occurring in other countries ● Cohort exchange of messages ● Private message sending within the country ● Information leaking concerning the states of other places ● Leaking of Classified information for betterment of someone
  • 13. DEEP WEB USED BY THE GOVERNMENT ● In august 2013, the US intercepted messages being sent amongst senior al qaeda officials ● US embassies were the target ● This was intercepted by the US government. 22 US embassies were shut down across the Middle East and North Africa as part of a counter effort ● Messages were sent through an anonymous email service
  • 14. CICADA 3301 ● Unknown organization ● ● Tons of rumors revolving its involvement or meaning. Some believe it be a recruitment agency for government or even terrorist activity. ● ● Has only appeared 4 times, posting complex puzzles to be solved. Latest one on January 5, 2016. ● ● All that's known is that they are trying to find “highly intelligent individuals”. ● ● Puzzles involved media, music, bootable Linux CDs, signs, cryptography, steganography etc.
  • 15. IS THE DEEP NET / DARK NET SAFE? ● YES ● ● There are much more safety precautions involved in using these deep web browsers ● ● Example: masking IP address, encryptions, etc. ● ● There are directories that you can use to browse safely in the deep web. ● NO ● No matter how updated, browsers still have vulnerabilities that can be exploited ● Even just using your normal email or a regular username can have serious effects ● NEVER give up personal info, or credit card info ● Should be wary when making purchases etc. ● Provides additional security in terms of hacking and malware prevention
  • 16. QUESTIONS AND ANSWERS ● What is the difference between the deep web and the dark web? - The Deep Web refers to the broad swath of the internet that traditional search engines are unable to access, including password-protected web forums, chat services, file sharing and P2P technologies. While the Dark Web is a subcomponent of the Deep Web that is not only inaccessible to mainstream search engines but only visible to users who have installed specialized software enabling access to these regions of the internet. ● Why can’t you use a surface web browsers and search engines to enter the deep web? - Using a regular web browser would not protect your identity and it can arouse suspicion with the law. Tor is exceptionally good because there are several layers of encryption (like an onion) to mask your IP. - Using a search engine such as Google is futile as it cannot index or retrieve the amount of data that is not accessed via public DNS services. The Dark Web and the Deep Web itself have their own search engines. - ● Name three illegal and legal activities that can be done in the deep web. - Illegal: Prostitution, Drug deals, Hitmen services. - Legal: Journalism, accessing banned novels, whistleblowing.
  • 18. REFERENCES ● http://securityaffairs.co/wordpress/8719/cyber-crime/the-good-and-the-bad-of-the-deep-web.html ● https://www.cigionline.org/sites/default/files/gcig_paper_no6.pdf ● https://www.flashpoint-intel.com/home/assets/File/Flashpoint_IlluminatingTheDeep%26DarkWeb.pdf ● https://en.wikipedia.org/wiki/Dark_web