SlideShare a Scribd company logo
By: Janna Ulit
K31
Hiring a contract killer nor purchasing illegal drugs nor
viewing horrific child pornography has never been
easy but now black markets can now be accessed
easily. You can hire a hitman at home at the click of a
button and policemen can do nothing about it.
This worrying development of the criminal black
market is the Deep Web - that allows users to surf
beneath the everyday internet with complete
anonymity.

The Deep Web accounts for at least 96% of the World
Wide Web! While the remaining portion is the visible
we web we have known and using such as Google,
Facebook and the like.


a.k.a the Deep net, the Invisible Web, the Undernet or the Hidden
Web



It was built by the US government – THE US NAVAL RESEARCH
LABORATORY. It was worked out as theory during the 90’s and
was established in 2003.



It is a World Wide Web content that is not part of the visible web,
which is indexed by search engines. These are computers the can
no longer be reached via the Internet,



Refers to all unseen, un-indexed and often intentionally hidden
web content.



Users of computers are hardly located and are anonymous.


Tor (short for The Onion Router) also referred to as
“Onion Routing” is structured around layers of
encryption to access data.



The main point of the Tor network is to mask a user’s
location or Internet usage from people whom they
suspect might be viewing their traffic activities.
Using Tor does not make you completely invisible but
it certainly does make it more difficult to trace an
end-users Internet activity.
The main principle and purpose of Tor is to protect
users’ personal privacy and freedom, and ensure their
right of privacy. This is somewhat achieved by Tor
through their relays that their Internet activities from
being monitored.


 For

the next two years, bigger population
will be aware of this deep web. We cannot
conclude if people will either try to enter
the deep web and be engaged in the illegal
transactions that are happening in the deep
web. Or they can help in trying to terminate
this web or stop people having such criminal
transactions by implementing more agencies
that will manipulate the web.
 More

people will develop a system that will
expose to Google users and contradict the
purpose of deep web which is to hide users’
identity.


Deep Web has garnered a lot of unusual
attention and it is very disturbing that this kind
of activities exist.



However knowing that it can hide your identity.
On the Deep Web, the purchase of any kind of
products while preserving the anonymity of the
transaction is prevalent which promotes privacy
and freedom. It gives an impact to ecommerce
because personal information and activities you
do on the visible web are easily tracked down
and privacy is very limited which is very opposite
with the deep web.
 Consequently,

it can attract a lot of online
business sellers and buyers and encourage
them to join the band. Through this
encouragements, the continuance of the
development of this criminal business
transactions on the deep web will reign. in
respect to any kind of illegal activities.

More Related Content

PDF
Dark Web Forensics
PDF
The Dark web - Why the hidden part of the web is even more dangerous?
PDF
I2P and the Dark Web
PPTX
Why We Need a Dark(er) Web
PDF
How Much is My Information Worth on the Dark Web?
PPTX
Darknet (ec)
PPTX
Darknet - Is this the future of Internet?
PPT
Darknet
Dark Web Forensics
The Dark web - Why the hidden part of the web is even more dangerous?
I2P and the Dark Web
Why We Need a Dark(er) Web
How Much is My Information Worth on the Dark Web?
Darknet (ec)
Darknet - Is this the future of Internet?
Darknet

What's hot (20)

PDF
Scuba diving into The Deep Dark Web
PPTX
Darknet
PDF
Rolling in the Deep. ISACA.SV.2016
PPT
The Dark Net
PPTX
PPTX
Deep web
PDF
OSINT Social Media Techniques - Macau social mediat lc
PDF
Dark net
PPT
Darknet
PPTX
Introduction To Dark Web
PPTX
Deepweb and darkweb vinodkumar ancha
PDF
AI and Machine Learning for Analyzing Cryptocurrencies and the Blockchain
PDF
Cybercrime in the Deep Web (BHEU 2015)
PPTX
The Dark Web
PPTX
The Deep Web, TOR Network and Internet Anonymity
PPTX
Dark web
PPTX
Deepweb darknet mansukhani
PPTX
Cybersecurity and the DarkNet
PPTX
A visit to the darknet
PPTX
Dark web by Claudine Impas
Scuba diving into The Deep Dark Web
Darknet
Rolling in the Deep. ISACA.SV.2016
The Dark Net
Deep web
OSINT Social Media Techniques - Macau social mediat lc
Dark net
Darknet
Introduction To Dark Web
Deepweb and darkweb vinodkumar ancha
AI and Machine Learning for Analyzing Cryptocurrencies and the Blockchain
Cybercrime in the Deep Web (BHEU 2015)
The Dark Web
The Deep Web, TOR Network and Internet Anonymity
Dark web
Deepweb darknet mansukhani
Cybersecurity and the DarkNet
A visit to the darknet
Dark web by Claudine Impas
Ad

Similar to Deep web (20)

PDF
Introduction to Deep Web
PPTX
The dark net illescas ecommer_k32
PPTX
Ali shahbazi khojasteh - deep web
PPTX
Deep Web
PPTX
Deep web
PPTX
Deep web, the unIndexed web
PPTX
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
PPTX
Montilla K32 - DEEP WEB
PPTX
Dark Web
PPT
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
PPTX
Journey To The Dark Web
PPTX
Darknet (roxas, juan raveeno s) powerpoint file
PDF
Wp below the_surface
PDF
Team4_DeepDarkWeb the reality of dark web
PPTX
Dark web presentation
PPTX
Dark Web.pptx
PPTX
The Dark Web : Hidden Services
PPTX
Illuminating the dark web
PPTX
Darkle Slideshow _ by Slidesgo.pptx
PPTX
The Deep Web
Introduction to Deep Web
The dark net illescas ecommer_k32
Ali shahbazi khojasteh - deep web
Deep Web
Deep web
Deep web, the unIndexed web
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
Montilla K32 - DEEP WEB
Dark Web
Darknets - Introduction & Deanonymization of Tor Users By Hitesh Bhatia
Journey To The Dark Web
Darknet (roxas, juan raveeno s) powerpoint file
Wp below the_surface
Team4_DeepDarkWeb the reality of dark web
Dark web presentation
Dark Web.pptx
The Dark Web : Hidden Services
Illuminating the dark web
Darkle Slideshow _ by Slidesgo.pptx
The Deep Web
Ad

Recently uploaded (20)

PPTX
master seminar digital applications in india
PPTX
Cell Types and Its function , kingdom of life
PDF
Pre independence Education in Inndia.pdf
PDF
Basic Mud Logging Guide for educational purpose
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Sports Quiz easy sports quiz sports quiz
PPTX
Cell Structure & Organelles in detailed.
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Complications of Minimal Access Surgery at WLH
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
Classroom Observation Tools for Teachers
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Lesson notes of climatology university.
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
master seminar digital applications in india
Cell Types and Its function , kingdom of life
Pre independence Education in Inndia.pdf
Basic Mud Logging Guide for educational purpose
O7-L3 Supply Chain Operations - ICLT Program
Sports Quiz easy sports quiz sports quiz
Cell Structure & Organelles in detailed.
Module 4: Burden of Disease Tutorial Slides S2 2025
Pharma ospi slides which help in ospi learning
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Microbial diseases, their pathogenesis and prophylaxis
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Complications of Minimal Access Surgery at WLH
VCE English Exam - Section C Student Revision Booklet
Classroom Observation Tools for Teachers
PPH.pptx obstetrics and gynecology in nursing
Lesson notes of climatology university.
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...

Deep web

  • 2. Hiring a contract killer nor purchasing illegal drugs nor viewing horrific child pornography has never been easy but now black markets can now be accessed easily. You can hire a hitman at home at the click of a button and policemen can do nothing about it. This worrying development of the criminal black market is the Deep Web - that allows users to surf beneath the everyday internet with complete anonymity. The Deep Web accounts for at least 96% of the World Wide Web! While the remaining portion is the visible we web we have known and using such as Google, Facebook and the like.
  • 3.  a.k.a the Deep net, the Invisible Web, the Undernet or the Hidden Web  It was built by the US government – THE US NAVAL RESEARCH LABORATORY. It was worked out as theory during the 90’s and was established in 2003.  It is a World Wide Web content that is not part of the visible web, which is indexed by search engines. These are computers the can no longer be reached via the Internet,  Refers to all unseen, un-indexed and often intentionally hidden web content.  Users of computers are hardly located and are anonymous.
  • 4.  Tor (short for The Onion Router) also referred to as “Onion Routing” is structured around layers of encryption to access data.  The main point of the Tor network is to mask a user’s location or Internet usage from people whom they suspect might be viewing their traffic activities. Using Tor does not make you completely invisible but it certainly does make it more difficult to trace an end-users Internet activity. The main principle and purpose of Tor is to protect users’ personal privacy and freedom, and ensure their right of privacy. This is somewhat achieved by Tor through their relays that their Internet activities from being monitored. 
  • 5.  For the next two years, bigger population will be aware of this deep web. We cannot conclude if people will either try to enter the deep web and be engaged in the illegal transactions that are happening in the deep web. Or they can help in trying to terminate this web or stop people having such criminal transactions by implementing more agencies that will manipulate the web.
  • 6.  More people will develop a system that will expose to Google users and contradict the purpose of deep web which is to hide users’ identity.
  • 7.  Deep Web has garnered a lot of unusual attention and it is very disturbing that this kind of activities exist.  However knowing that it can hide your identity. On the Deep Web, the purchase of any kind of products while preserving the anonymity of the transaction is prevalent which promotes privacy and freedom. It gives an impact to ecommerce because personal information and activities you do on the visible web are easily tracked down and privacy is very limited which is very opposite with the deep web.
  • 8.  Consequently, it can attract a lot of online business sellers and buyers and encourage them to join the band. Through this encouragements, the continuance of the development of this criminal business transactions on the deep web will reign. in respect to any kind of illegal activities.

Editor's Notes

  • #3: Sources:http://www.dailymail.co.uk/news/article-2454735/The-disturbing-world-Deep-Web-contract-killers-drug-dealers-ply-trade-internet.htmlhttp://www.sickchirpse.com/deep-web-guide/http://en.wikipedia.org/wiki/Deep_Web
  • #5: You can’t just access the deep web from a normal web browser – like Firefox for example – you can only access the deep web through a deep web browser. The most famous of these deep web browsers is called Tor. Downloads of Tor soared in August by almost 100% . More and more people are turning to the deep web to protect their information.