SlideShare a Scribd company logo
1 of 12
BEYOND THE KNOWN INTERNET:
THE DARKNET OR THE DEEP WEB
By: Matthew Kwong
Suppose you key a search into Google. What
percentage of the total number of pages on the
internet do you think is actually being
searched?
THE ANSWER? 0.03%, OR A RATIO OF
3 PER 10000 WEB PAGES ARE
ACTUALLY ACCESSIBLE TO SEARCH
ENGINES
So where is the remaining
99.97% of the internet?
SO WHAT IS THE DARKNET?
• The internet consists of hyperlinks, all indexed by a search engine
– this is the surface web
• Darknet is a collection of un-indexed webpages, meaning they
cannot be found through a search
• Often the pages themselves are hidden, meaning you need a
program such as “Tor” to access them
Surface
Web
Deep
Web
HOW TO ACCESS THE
DARKNET
• Viewing Darknet pages requires the use of software that conceals
your IP address
• The best known is Tor, initially developed for use by the US
military
• Tor stands for “the onion router” – any URL that ends in .onion is
a hidden page
THE DARKNET CONTINUED
• In short, Tor works by sending data through multiple nodes
before reaching its destination
• Even with Tor installed Darknet pages still cannot be searched –
pages are accessed either through a hub, or links provided by
“members”
• Currently the fastest growing sector of the internet, over 500
times larger then the “surface” web
THE DARKNET AND CRIME
• As eerie as it may sound, the Darknet is primarily not criminal
• Nonetheless, anonymity has helped foster criminal activity
• A site called The Silk Road sells drugs and another illicit items for
Bitcoins, a digital currency
• There are also sites for distributing child pornography (with tight
security), provide information on making bombs for terrorism
and even for hiring hitmen
ORGANIZED CRIME
ELEMENTS
• A crime syndicate called the Russian Business Network
(RBN) is known for using murky address space to send
spam
• These "dark address spaces" are online addresses which
have been abandoned or forgotten over time
• The RBN can send spam through these addresses and
then quickly disconnect to avoid detection
• They may also rent these spaces out to criminals for
spreading viruses or online identity theft
IN SUMMARY...
• The Darknet was conceived to allow anonymous online
communication – it is now predominantly used for criminal
activity
• The characteristics of the Darknet allows criminals to
market illicit goods and services, and may even bring like-
minded individuals together
• The sheer scale and tight security of the Darknet means that
is very difficult and time consuming for law enforcement to
control it – even if they say otherwise
DISCUSSION
In a sense the Darknet
represents contradicting
ideas: a place of true freedom,
but also a platform for
criminal elements to
organize, advertise and carry
out their activities. Given a
choice, should a place such as
the Darknet even exist?
The administrators of Tor
have stated that if they detect
criminal activity using Tor,
they do report it; however
they do not actively look for
such activity. Should the
creators of Tor be doing more
to control how their program
is used?

More Related Content

What's hot

The dark web
The dark webThe dark web
The dark web
Bella M
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
James Bollen
 

What's hot (20)

Deep Web - what to do and what not to do
Deep Web - what to do and what not to do	Deep Web - what to do and what not to do
Deep Web - what to do and what not to do
 
Dark web by Pranesh Kulkarni
Dark web by Pranesh KulkarniDark web by Pranesh Kulkarni
Dark web by Pranesh Kulkarni
 
Deep web and Dark web
Deep web and Dark webDeep web and Dark web
Deep web and Dark web
 
Dark web by Claudine Impas
Dark web by Claudine ImpasDark web by Claudine Impas
Dark web by Claudine Impas
 
The dark web
The dark webThe dark web
The dark web
 
Journey To The Dark Web
Journey To The Dark WebJourney To The Dark Web
Journey To The Dark Web
 
Deep web
Deep webDeep web
Deep web
 
Deep web (amatuer level)
Deep web (amatuer level)Deep web (amatuer level)
Deep web (amatuer level)
 
Darknet
DarknetDarknet
Darknet
 
The dark web
The dark webThe dark web
The dark web
 
Dark Web and Privacy
Dark Web and PrivacyDark Web and Privacy
Dark Web and Privacy
 
TOR NETWORK
TOR NETWORKTOR NETWORK
TOR NETWORK
 
Cybersecurity and the DarkNet
Cybersecurity and the DarkNetCybersecurity and the DarkNet
Cybersecurity and the DarkNet
 
Research in the deep web
Research in the deep webResearch in the deep web
Research in the deep web
 
The Dark side of the Web
The Dark side of the WebThe Dark side of the Web
The Dark side of the Web
 
The Dark Web
The Dark WebThe Dark Web
The Dark Web
 
Dark web
Dark webDark web
Dark web
 
Deep web
Deep webDeep web
Deep web
 
Dark Web
Dark WebDark Web
Dark Web
 
Dark web (1)
Dark web (1)Dark web (1)
Dark web (1)
 

Viewers also liked

Deep Web
Deep WebDeep Web
Deep Web
St John
 
Darknet - Jerv Marquez
Darknet - Jerv MarquezDarknet - Jerv Marquez
Darknet - Jerv Marquez
Jerv Marquez
 
Deep web power point presentation
Deep web power point presentationDeep web power point presentation
Deep web power point presentation
albafg55
 
Darknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint fileDarknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint file
raevenroxas
 

Viewers also liked (20)

Darknet
DarknetDarknet
Darknet
 
Darknet
DarknetDarknet
Darknet
 
Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet? Darknet - Is this the future of Internet?
Darknet - Is this the future of Internet?
 
Darknet
DarknetDarknet
Darknet
 
Tor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden SitesTor, Darknet, And Hidden Sites
Tor, Darknet, And Hidden Sites
 
Deep Web
Deep WebDeep Web
Deep Web
 
The Dark Net
The Dark NetThe Dark Net
The Dark Net
 
Darknet
DarknetDarknet
Darknet
 
Darknet - Jerv Marquez
Darknet - Jerv MarquezDarknet - Jerv Marquez
Darknet - Jerv Marquez
 
Daknet by moinuddin
Daknet by moinuddinDaknet by moinuddin
Daknet by moinuddin
 
WWII global history
WWII global historyWWII global history
WWII global history
 
Darknet
DarknetDarknet
Darknet
 
Darknet (ec)
Darknet (ec) Darknet (ec)
Darknet (ec)
 
Deep web power point presentation
Deep web power point presentationDeep web power point presentation
Deep web power point presentation
 
daknet
daknetdaknet
daknet
 
DakNet PPT
DakNet PPTDakNet PPT
DakNet PPT
 
Daknet ppt
Daknet pptDaknet ppt
Daknet ppt
 
The DarkNet
The DarkNetThe DarkNet
The DarkNet
 
Darknet: We Are Not Alone
Darknet: We Are Not AloneDarknet: We Are Not Alone
Darknet: We Are Not Alone
 
Darknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint fileDarknet (roxas, juan raveeno s) powerpoint file
Darknet (roxas, juan raveeno s) powerpoint file
 

Similar to Darknet

Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Auto Parts Wholesale Online
 
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxWhat is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
helzerpatrina
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
Geetha982072
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Auto Parts Wholesale Online
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
Gavin O'Toole
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Auto Parts Wholesale Online
 

Similar to Darknet (20)

Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
Deep Web
Deep WebDeep Web
Deep Web
 
The Dark Web : Hidden Services
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
Investigating Using the Dark Web
Investigating Using the Dark WebInvestigating Using the Dark Web
Investigating Using the Dark Web
 
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdfDark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
Dark web sites -Unveiling the Dark Web and its Enigmatic Links.pdf
 
Dark web
Dark webDark web
Dark web
 
Tor: The Second Generation Onion Router
Tor: The Second Generation Onion RouterTor: The Second Generation Onion Router
Tor: The Second Generation Onion Router
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
Darkweb
DarkwebDarkweb
Darkweb
 
Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
Darknet
DarknetDarknet
Darknet
 
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docxWhat is the Dark Web & How to Access itWe explain the Dark Web, .docx
What is the Dark Web & How to Access itWe explain the Dark Web, .docx
 
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptxdarkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
darkwebbbvxvbjvccjjbvcgjnbvvvbnhc nmk.pptx
 
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdfDark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
Dark web sites - Navigating the Depths of Secrecy, Sites, and Links.pdf
 
Deeplight Intelliagg
Deeplight IntelliaggDeeplight Intelliagg
Deeplight Intelliagg
 
Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)Pichman privacy, the dark web, & hacker devices i school (1)
Pichman privacy, the dark web, & hacker devices i school (1)
 
Using the Internet to hide crime
Using the Internet to hide crimeUsing the Internet to hide crime
Using the Internet to hide crime
 
The Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet AnonymityThe Deep Web, TOR Network and Internet Anonymity
The Deep Web, TOR Network and Internet Anonymity
 
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
Dark web sites - Exploring the Dark Web, Dark Web Sites, and the Elusive Link...
 

Darknet

  • 1. BEYOND THE KNOWN INTERNET: THE DARKNET OR THE DEEP WEB By: Matthew Kwong
  • 2. Suppose you key a search into Google. What percentage of the total number of pages on the internet do you think is actually being searched?
  • 3. THE ANSWER? 0.03%, OR A RATIO OF 3 PER 10000 WEB PAGES ARE ACTUALLY ACCESSIBLE TO SEARCH ENGINES So where is the remaining 99.97% of the internet?
  • 4. SO WHAT IS THE DARKNET? • The internet consists of hyperlinks, all indexed by a search engine – this is the surface web • Darknet is a collection of un-indexed webpages, meaning they cannot be found through a search • Often the pages themselves are hidden, meaning you need a program such as “Tor” to access them
  • 6. HOW TO ACCESS THE DARKNET • Viewing Darknet pages requires the use of software that conceals your IP address • The best known is Tor, initially developed for use by the US military • Tor stands for “the onion router” – any URL that ends in .onion is a hidden page
  • 7. THE DARKNET CONTINUED • In short, Tor works by sending data through multiple nodes before reaching its destination • Even with Tor installed Darknet pages still cannot be searched – pages are accessed either through a hub, or links provided by “members” • Currently the fastest growing sector of the internet, over 500 times larger then the “surface” web
  • 8. THE DARKNET AND CRIME • As eerie as it may sound, the Darknet is primarily not criminal • Nonetheless, anonymity has helped foster criminal activity • A site called The Silk Road sells drugs and another illicit items for Bitcoins, a digital currency • There are also sites for distributing child pornography (with tight security), provide information on making bombs for terrorism and even for hiring hitmen
  • 9.
  • 10. ORGANIZED CRIME ELEMENTS • A crime syndicate called the Russian Business Network (RBN) is known for using murky address space to send spam • These "dark address spaces" are online addresses which have been abandoned or forgotten over time • The RBN can send spam through these addresses and then quickly disconnect to avoid detection • They may also rent these spaces out to criminals for spreading viruses or online identity theft
  • 11. IN SUMMARY... • The Darknet was conceived to allow anonymous online communication – it is now predominantly used for criminal activity • The characteristics of the Darknet allows criminals to market illicit goods and services, and may even bring like- minded individuals together • The sheer scale and tight security of the Darknet means that is very difficult and time consuming for law enforcement to control it – even if they say otherwise
  • 12. DISCUSSION In a sense the Darknet represents contradicting ideas: a place of true freedom, but also a platform for criminal elements to organize, advertise and carry out their activities. Given a choice, should a place such as the Darknet even exist? The administrators of Tor have stated that if they detect criminal activity using Tor, they do report it; however they do not actively look for such activity. Should the creators of Tor be doing more to control how their program is used?