There are millions of websites on the internet. Here, you'll find everything from CNN.com to YouTube cooking channels. But you might not realize what you're seeing online is only a fraction of what's really out there. Vast networks called the Deep and Dark Web are what's hiding beneath the surface.

You've probably heard about the Dark Web before, but there's a good chance the term "Deep Web" is less familiar to you. It's not as widely discussed as the Dark Web, even though it's much larger. And, the Dark Web sometimes gives the Deep Web a bad name because the two are often mistaken for one another. Click here to see five common myths about the Dark Web.

The Deep Web, however, is everything on the internet that isn't easily accessible to the average internet user. In many cases, you need a special web browser to access its content. In others, the content is hidden behind the firewall and security protection of private networks - typically, small businesses and corporations.

What regular search engines are missing

Nine times out of 10, a regular Google search will suffice and bring back the results you're looking for. However, search engines such as Google, Yahoo and Bing only have access to information that has been indexed. This means any site that's marked as private can pretty much go undetected.

Just think of all the information that's being shared right under our noses. If you'd like to do a deeper search, these web browsers are what you need.


Easing away from Google is no easy task. We've all become so familiar with how the search engine works, and how it will display our results. So, one of the best places to start is a site called Deeperweb.com. This search engine is powered by Google, so it organizes your results similarly to what you're used to.


This powerful search engine pulls its results from Google, Yahoo, and Yandex, digging specifically through the metasearch engine for the information you need. The benefit to you is that every search engine has its own method and algorithms for searching, and Dogpile uses all of them to pull the most extensive results.


DuckDuckGo is a solid Google replacement, and it doesn’t track or target your IP address or search history. So, you don’t have to worry about targeted ads or being trapped in a search filter bubble, which actually means you get more results. You can also make DuckDuckGo an extension of your browser and activate more privacy settings to keep your search history as protected as possible. 


This Google-type site called Yippy goes beyond producing search results and blocks adult content, including pornography, gambling sites, and other inappropriate websites.

Plus, the site protects your privacy. It will not collect personally identifiable information about you, like your name, telephone number, address or email address. That is, as long as you're in the United States. "Yippy will not track a U.S. citizen for any reason" unless required by court order, subpoena or required by law. If you're not in the U.S., Yippy said you're subject to tracking so that it can comply with government required protocols.


If you're considering Tor as an option for web browsing, be sure to do your homework. This free software has a dark side. Not the software itself, but the places to where it grants access on the internet. Tor gives you access to the Dark Web, a portion of the internet that is often used for illegal activities. However, there could also be information shared on the Dark Web that isn't shared anywhere else. Reporters often use Tor to uncover new leads or communicate privately with their sources. 

Specialty search engines

When you're hunting for information, sometimes you know exactly what you're looking for, and sometimes you don't. The sites above will help you search through a broad scope of information out there. However, when you need to narrow it down, these are amazing specialty databases you should check out.

  • Archive.org: Non-profit library of millions of free books, movies, software, music and more.
  • Library of Congress: Sift through historical archives from the Civil War, Great Depression, World War I, World War II and other monumental events that shaped our country.
  • Osti.gov: Wondering what the government has been up to with all of its research? This helpful search engine puts that information right at your fingertips.
  • Smithsonian Libraries: Collections covering everything from anthropology to zoology.
  • Encyclopedia Britannica: Remember all of the information held in the Encyclopedia Britannica? It's still available. Here's where you'll find it.
  • Pipl.com: Want to know what's out there on the internet associated with your name, or a loved one? This site will search the Deep Web for that information.

A word of warning

One of the biggest advantages to common search engines such as Google, Yahoo and Bing, is that they provide a certain level of protection. In the same way, it's less likely for a robbery to take place in broad daylight, it's also less likely for someone to post illegal things out in the open.

For this reason, the Dark Web has become the home to some pretty horrific online activity. Click here and listen to our special podcast explaining the Dark Web, and the things you should avoid.

Source: This article was published on Komando.com by Kelli Uhrich

Categorized in Deep Web

Short Bytes: The internet is vast, yet an enormous chunk of it is still untouched by the ordinary world. We address that part by the names Deep Web, Darknet, and Dark Web. Darknet is a type of network not accessible using normal modes. Deep Web – which includes dark web as a subset – is the part of the world wide web not indexed by the search engines like Google, Bing, DuckDuckGo.

For most of us, the web is limited to ten twenty or maybe fifty websites. Most of this limited collection is in the form of Google sites and services. In reality, the internet is enormous, and it has around one billion websites existing on servers around the globe.

Even with those billion websites, the web isn’t complete. Many believe the world wide web we see is only the tip of an iceberg. Two terms Darknet and Deep Web, in some sense, justify the presence of this hidden web about which most people are unaware. And those who know about the darknet often confuse it with deep web. Whereas, both are completely separate.

What is Deep Web?

Over the centuries, when the technology became advanced, humans built machines capable of diving to the depths of the oceans. That’s how we were able to discover the remains of RMS Titanic. The search engine crawlers do the same work as done by the explorer submarines. They dive into the internet and take a note of whatever they find.

We might have found Titanic, but there is a lot to discover in the bottomless oceans. Similar is the case of the search engine crawlers, they haven’t identified various parts of the World Wide Web, and we call it the Deep Web.

For instance, the search engines won’t be able to access the servers and websites hosting data about some government-led secret alien mission. But the deep web isn’t as mysterious as it sounds. A private network, tagged as deep web, can be right next to your house. It’s just the internet that isn’t within reach of standard search engine crawlers. For instance, the network maintained by some paid streaming service. It is a type of deep web or hidden web. Obviously, the search engines won’t be opting for a monthly subscription to index the catalog of such websites.

What is Darknet?

Contrary to deep web, Darknet is better known to the people. It is an encrypted network built on top of the existing internet, and specific software or tools are required to access the darknet. It is possible, conventional protocols used on the internet might not work on the darknet.

Darknet provides anonymity to the users. One such darknet is Tor or The Onion Router. You require the Tor browser to enter into the Tor’s network.

Tor can be used to visit everyday internet websites, but it also has numerous hidden websites and services which we can’t be accessed on the regular internet. Tor powers them using its protocol known as Tor Hidden Service Protocol. And the websites limited to the Tor network have a special .onion address. Due to this, Tor’s darknet is also known as onionland.

Friend-to-Friend (F2F) networks are another kind of darknet. In this case, two familiar people communicate with each other directly over the internet. They might want to share some file over a P2P connection. Such networks, not accessible by other people, can be encrypted or password protected. So, only the concerned people have the access.

Increasing the confusion…..

What Is Dark Web

Deep Web Dark Web



There is another thing you would like to be aware of, the dark web. You can think of the dark web as a subset of the deep web. You need to understand the distinction between deep web and darknet, and the fact that the internet and WWW (World Wide Web) aren’t the same things.

The darknet is a network, and the deep web constitutes the chunk of the World Wide Web that is beyond the reach of the search engines. So, we can decipher dark web as the World Wide Web of the darknets like Tor, Freenet, etc. That is, the services and websites running on the darknet is the dark web.

Did you find this helpful? Drop your thoughts and feedback.

Source: This article was published on fossbytes.com by Aditya Tiwari

Categorized in Deep Web

Watch out, Hollywood has found the "Deep" and "Dark Web." In Netflix's "House of Cards," a reporter uses it to hire a hacker to learn more about Vice President Frank Underwood's past. "CSI: Cyber" says that their team works on the edges of the darknet, the anonymous side of the Internet. "Deep Web" is new documentary about Ross Ulbricht, the convicted creator and operator of Silk Road, an online black market known best for selling illegal drugs.

There is the Internet that you and I use. Then, there is the other Internet that we don't.

The "Surface Web" is Google, Facebook, Amazon, Komando.com, eBay, and everything else a search site typically shows. Depending on the survey, Google only catalogs and searches anywhere from 4 percent to 16 percent of the Surface Web.

Below the Surface Web is the Deep Web. There, you'll find abandoned websites, paywalled sites, research firm databases, government databases and other things that aren't meant to be public. In the Deep Web, there is a place called the Dark Web.

The Dark Web is where the Internet's illicit activities reside. If you want to buy illegal drugs, guns, counterfeit money, stolen items, fake degrees or passports, cloned debit cards, hacking tools, weapons and more, you can. Dark Web sites also let you hire a hit man or escort, buy someone's identity or swap child pornography.

Finding sites on the Dark Web isn't easy and I am not going to give you the steps how to do it. Suffice to say, you need to visit the right online directory or hidden search site first to even find it. However, that doesn't mean Dark Web sites aren't popular or get mainstream attention.

Let me tell more about Silk Road. 

The FBI took the site down in 2013, but its name and legend still live on. When the FBI raided the home of Silk Road's creator, Ross Ulbricht, it seized $28.5 million in untraceable digital currency that was sitting on Ulbricht's computer. That was just Ulbricht's cut of the Silk Road transactions. Black market sites are doing hundreds of millions, potentially billions, of dollars in illicit business.

Even with Silk Road gone, there are still numerous sites selling illegal goods, services and the unconscionable. However, the Dark Web might not be dark for much longer.

DARPA, the research arm of the Defense Department that also works on projects like flying aircraft carriers, is making key parts of its Memex search system available as open-source software. That means anyone can download and adapt Memex in new ways.

Unlike other popular search systems, Memex can search the Dark Web, and it's already being used to hunt down human traffickers. Other research organizations, including NASA's Jet Propulsion Laboratory, MIT, Carnegie Mellon University, and Stanford University are working on their own software built on Memex technology.

Some of these programs are going to help law enforcement track down criminals, while others could give Google a run for its money. Stanford's DeepDive figures out connections between groups of data. So you can search for a person and an organization and the system will figure out how they're related. Carnegie Mellon's TJBatchExtractor creates personal and company profiles from advertisements, which is useful for tracking down criminals offering illegal activities on Dark Web forums.

A company named Diffeo has a system that learns what kind of answers you're looking for so it can exclude irrelevant information. Hyperion Gray is working on a Web crawler that doesn't rely on links for connecting websites. It can find similar information on sites that are completely unrelated.

Most of these applications are geared toward law enforcement, researchers and scholars, but so was the original Internet. You never know what new super-powered search system is going to come out of it that changes the way we find information.

In the meantime, you're going to be hearing more about the Dark Web from both Hollywood and in the news. In fact, you might even have your kids or grandkids asking about it. Click here to find out what I said to my son about the Dark Web when he asked, and what you need your kids to know. After you're done watching that video, be sure to check out more exclusive clips from my weekly national talk radio show.

On the Kim Komando Show, the nation's largest weekend radio talk show, Kim takes calls and dispenses advice on today's digital lifestyle, from smartphones and tablets to online privacy and data hacks. For her daily tips, free newsletters and more, visit her website at Komando.com. Kim also posts breaking tech news 24/7 at News.Komando.com.

This article was published in foxnews.com

Categorized in Deep Web

Most of the world wide web is invisible. Beyond the “surface web”—the parts accessible to search engines—there is a “deep web” containing (by one estimate) 500 times the content, secured in databases and hidden behind login screens. And within this deep web is a tiny corner known as the “dark web,” which requires special, anonymizing software such as the Tor Browser to access and contains everything from black markets selling drugs and counterfeit IDs to whistleblowing forums.

Categorized in Deep Web

Unpaywall is a web browser plug-in that brings free information to those who seek facts. The open-source service is disrupting traditional publishing by giving users access to peer-reviewed journal articles for free, and it's all totally legal.


Getting blocked by a paywall can be irritating, especially if you’re trying to access peer-reviewed scientific research. Open access advocates would certainly think so. To paraphrase Richard from HBO’s “Silicon Valley,” who doesn’t want free information? Well, there may now be a way to get scientific publications for free — and it’s completely legal.
Open-source nonprofit Impactstory, funded by the National Science Foundation and the Alfred P. Sloan Foundation, has developed a web browser plug-in called Unpaywall, and as the name suggests, it’s a way to get through to paywalled research papers for free.
“Now more than ever, humanity needs to access our collective knowledge, not hoard it behind paywalls,” according to Unpaywall’s website. “Lots of researchers feel the same; that’s why they upload their papers to free, legal servers online. We want to help bring that open access content to the masses.”


Unlike similar services that rely on means like automated web scraping, Unpaywall’s method of getting full-text access to scientific journals is totally legal. It scans a database of more than 90 million digital object identifiers (DOIs) for copies of papers that the researchers themselves have uploaded, whether on some pre-press servers or university websites. Unpaywall is also completely secure, as it doesn’t ask you for any personal information.

Best of all, to use the service, you just need to install the plug-in on your Chrome or Firefox desktop browser. A little lock symbol will appear every time you visit a journal article’s landing page. If the lock is green, you have access to a full-text copy of the article. A gold lock means an article already has open license access from the publisher.
Image credit: Unpaywall, screenshotImage credit:
Unpaywall, screenshot “We’re able to deliver an OA copy to users more than half the time,” Jason Priem, one of Unpaywall’s creators, told The Chronicle of Higher Education. He’s excited for the service to hit critical mass: “That’s when people start thinking, ‘Hey, why are we paying millions of dollars to subscribe to tens of thousands of journals when our researchers have about a better-than-even chance of reading an article with no subscription at all?'
”A service like Unpaywall’s can help fight the flood of fake news or unverified information. It’s a fact-checking tool that’s readily accessible to anyone with an internet connection and the appropriate web browsers. Truly, the only thing worse than no information might just be information that’s false.
This article was  published in futurism.com by Dom Galeon
Categorized in Deep Web

Newly Updated List – Deep Web Links 2017, .Onion Links 2017, .Onion sites 2017, Deep Web linkleri, Tor Links, Dark Websites, Deep web websites, Deep Onion sites, the deep web, dark internet and much more.

Deep Web is the hidden part of the internet which is not indexed or crawled by any standard search engine like Google or Yahoo or bing. You have no idea how big it is?  And you might not have visited any deep web links that are hidden in the dark world. According to the reports, only a 4% of the web is visible to the public and the rest of the 96% are hidden underneath. The links available on the deep web is something rare that is unavailable in the normal search engines. You can get them here.

Note: We have list out some of the best Deep/Dark Web Links which is been updated today. You can visit those links here. Before accessing those deep web links, I strongly recommend you to use a VPN. This could prevent you from being tracked or watched by any hacker. Be anonymous.

Deep web links: Our Expert team is keen on finding New Deep Web Links which are found to be interesting. These deep web links is a great source of new information such as for discovering deep websites and further go down into deep web research. Follow the security tips recommended by our team as follow.

Security tips for deep web users

I know we are all curious in finding what is in the deep web but there have been many deep web stories noting the cautions and security problems that might arise if you use them. Have you ever heard some of the deep web facts ?.

The deep web is the place where anonymity is the key factor.

Security Tips: To remain anonymous, The Deep Web team strongly recommends you to buy NordVPN to surf the deep web safely. Also, compare other Powerful VPN Service too. Be Safe.

For one to stay anonymous he must do these following things. First, you must install the Tor Browser (Step-by-Step Instruction guidelines are given). To prevent the theft of your personal data and avoiding data breach we strongly recommend you to Setup a VPN to hide your IP or buy these Best VPN Directly. Hidden Wiki links are the best place to start for the newbies. Get to know how to register and purchase from various Darknet markets. In order to purchase from these markets, you need to buy bitcoins from top bitcoin vendors.

“How to find deep web links, what is deep web links, what is called as tor deep web links, Where to find deep web links.”This is the questions that will arise in the mind of everyone so here we present the solution. Before heading down this path know about what is the deep web.

This article was  published in deepweb-sites.com

Categorized in Deep Web

Our Emperor Elect Donald Trump might send out decisions via drums. Maybe smoke signals. Or carrier pigeons. He’s saying in today’s tech heck you can’t trust computers.

He’s right.

I was just allowed into a highly protected Internet Data Center outside New York. Undistinguished neighborhood. Its buildings lacked markings. Multiple gates. Doors upon doors. Cameras overhead. My passport documented. I was photographed, fingerprinted. Car license plate noted. One ID’d worker was fingerprinted six times in six hallways.

Technologist Don Harris: “People using the term ‘the cloud’ don’t know its meaning. Nothing goes to the sky in some mysterious satellite. Nothing’s ever deleted. Everything sent — photos, voices, messages, games, whatever — all end in similar facilities. Thousands of data centers are all over the US.”

The point made? “From now on information remains available always. Nobody’s safe anymore anywhere.”

All seeing

Air-condition units, plus microwave and directional Wi-Fi antennae, top the building. Inside cold and hot aisles alternate. Cold for the front of the servers, hot for the electric heat emanating from them.

“Using metrics, cellphones, cell towers, dates, times, credit card usage, E-ZPass and all other pointers, even rogue hackers have ability to find you. Computer technologists all know who you are, with whom, when, what you’re eating, what time, when you’re traveling, ads you answered. Everything about you.

“Users take pregnancy photos, birth photos, baby pictures, grandparent close-ups, high school graduation shots, stills of bedrooms, celebrity selfies. They mark dates. We know birthdays, nicknames, favorites, addresses.

“Worst is users typing ‘Out of Office . . . back Jan. 29.’ Hackers know your place is empty. Time to rob. Never leave that message on your screen. Computer scientists can utilize this type stuff. There’s no firewall. Ways exist to pierce encryption. From inside their own kitchen, if your computer’s on, specialists can monitor your conversation. Nothing stops them collecting data.”

US data on lockdown

The government builds its own facilities. Google has redundant multiple centers. Amazon’s stored Minnesota, Seattle, everywhere. Public site Facebook’s billions of accounts are believed kept forever. Inside a single, tiny 10-by-20 cordoned-off locked cell — near another marked “Dell,” another belonging to a travel agency, another servicing 911 — hummed one particular company’s 50 million servers.

One specialist: “All that’s sent — private, personal, smut, slots, games, computers talking to one another, some guy uploaded 1,500 photos — everything winds up right here. Computers backed onto the Internet end on one of these storage machines.”

Forever lasting pix

Figuring no benefit to retaining content indefinitely, some companies purge the images after 72 hours, but daily snapshots of it all get stored elsewhere.

Say a “Let’s meet for coffee” social networker’s a bad guy. If his computer’s in Maryland, hers isn’t and they agree to meet in Arizona, it crosses state lines. Also, different international laws exist. You’re robbed in France, but the info’s here. FBI and law enforcement have employed data center experts to track it down.

There’s terms like load balancer, $50,000 wires, but if electricity goes down, and Web traffic halts and those trillions of lights stop blinking, then what? There’s backup, plus an emergency generator kicks in. And this is only one tiny section of the US. Not classified material. Not sensitive government issue. Not high security. It’s social media.

So watch for smoke puffing out of 56th Street and Fifth Avenue’s White House North. Soon, high above Gucci, shoppers will be able to detect our Emperor Elect’s decisions.

It’ll be: One if by sea; two if by Libs.

Source : pagesix.com

Categorized in Deep Web

The so-called Islamic State (IS) is the most innovative terrorist group the world has seen. In the backdrop of its loss on the ground, IS is expanding its cyber capabilities to conduct more cyber-attacks and hacking. This and its migration into the ‘darknet’ will make IS more dangerous than before.

Terrorist and non-state actors have used different modes and mediums to spread their message and communicate with their comrades. The dawn of the Internet has also provided such groups with unparalleled opportunities to establish communications and operational links that were not possible before. Starting from websites, terrorist groups moved to more interactive mediums like chatrooms and forums. It was social media platforms, such as Facebook and Twitter that truly revolutionised how militants, terrorists and non-state actors communicated with each other, recruited sympathisers and supporters and disseminated their propaganda.

The self-proclaimed Islamic State (IS) perfected the use of social media, which became the preferred source for the so-called ‘jihadists’ or ‘soldiers of the Caliphate’. In response, tech companies have been compelled to take down Facebook and Twitter accounts affiliated with IS. The unintended cost of this policy is that supporters, sympathisers and members of jihadist groups have moved into the deep web and the darknet.

What is Deep Web and Darknet?

The deep web and darknet are terms that are interchangeably used but they are two different things. The deep web includes all those web pages that a search engine such as Google cannot find. This includes web pages that are password-protected and includes all webmail, private Facebook accounts, user databases and pages behind paywalls. Websites that are not indexed by Google are also considered as part of the deep web. The surface web is all that Google has indexed and a user can access it using any search engine. It is said that the surface web is only the ‘tip of the iceberg’ and the deep web comprises more than 90% of the total Internet, which is almost 500 times of what Google can see.

The darknet is a part of the deep web but there is an important distinction. We access the deep web every day when retrieving our emails, checking bank statements online or logging into Facebook account. However, we cannot enter the dark net through a regular browser. The darknet is accessed using ‘dot onion’ software and not a ‘dot com’ one. As such, dot com browsers such as the Google Chrome and Firefox cannot access ‘onion’ websites. A different browser, the Tor browser, is used for this purpose.

Tor is an onion browser that sends the user through an unusual route to access a web page. For instance, if a user wishes to access a website using Tor, the browser will wrap the request through numerous layers, which will keep bouncing off different domains in different countries. The layers of the onion (hence the name) ensures anonymity and makes it almost impossible to trace the user’s footprints. This makes the Tor browser and dot onion web pages attractive for those wishing to maintain their privacy and secrecy.

IS in the Darknet

Indeed, anonymity does not mean that the darknet is a dangerous place. Individuals, especially journalists, use such avenues to hide themselves from prying eyes of authoritarian states and dictators. Similarly, Tor is used by those who wish to protect their privacy. However, illegal practices can and do happen because of the anonymity that is guaranteed by Tor and the darknet.

The darknet has provided criminals, non-state actors and terrorists tools and avenues that are absent in the surface net. For instance, a webpage by the name of ‘Silk Road’ functioned like the ‘Amazon.com’ for illegal activities, including the sale of drugs, weapons, fake passports and even hitmen. Criminals were comfortable dealing on this platform because of the anonymity in the darknet. The owner/founder of the Silk Road, Ross Ulbricht, was caught by FBI in 2013.

For IS and potential hackers, another attractive market in the dark net is that of hacking tools. IS and its United Cyber Caliphate has conducted several cyber-attacks in the last one year, usually in the form of defacing websites or hacking Twitter and Facebook accounts. The hacking tools and malware toolkits such as Keyloggers and Remote Access Trojans (RAT) are available in the darknet and it is highly probable that cyber terrorists and hackers download them from there.

Keylogger is a computer program that records every keystroke made by a computer user, while RAT is a malware program that enables administrative control over the target computer. As such, both are utilised to steal private and confidential information. Even IS has attempted to distribute such tools amongst its ‘cyber soldiers’. Additionally, IS hackers have also conducted cyberattacks such as the denial-of-service (DoS) attack, where a machine or service is made unavailable.

Islamic State is known for its innovations and ability to adapt to changing environments. When law enforcement agencies started snooping around social media, IS members, supporters and sympathisers migrated to mobile applications such as the WhatsApp and Telegram. The applications have become attractive modes of communication because of their end-to-end encryption, which prevents any ‘peeping’ by intelligence and law enforcement authorities.

Now a pro-IS deep web forum user has recommended that the group’s users migrate to Tor and stop using VPN services, hence ensuring greater anonymity. The distribution of hacking tools also signifies IS’ ambitions to expand its cyber capability. Considering the versatility of the group, this should not take too long.

Policy Implications

The 9/11 attack was the biggest terrorist attack which changed the complexion of global security. The American leadership and public never expected that an attack of this scale in a post-Cold War era could ever happen in the homeland. Yet, it did. Today, the attack that defined Bin Laden’s notorious legacy seems less possible because of all the security measures and precautions that have been taken by countries around the world.

The lack of imagination before was the serious shortfall of security analysts and counter-terrorism specialists who failed to predict or even anticipate 9/11. If IS wants to surpass 9/11, it will conduct a cyber-9/11. This is not an impossible task considering the lax cybersecurity measures. The recent hacks of the Democratic National Committee emails and leaks to Wikileaks signify the vulnerability of private information. The DoS attacks by hacking groups such as Anonymous further underline the capacity of non-state actors to inflict damage.

Indeed, IS does not possess the capacity and capability to attack infrastructure as was the case with Stuxnet. However, even stealing information, hacking and denial-of-service attacks have serious implications. Furthermore, the loss in Syria and Iraq and the narrow space available to the group make a ‘cyber caliphate’ with hacking capabilities the most viable option and dangerous force.

A terrorist organisation that is anonymous and possesses an army of hackers is already becoming a reality. The world is increasingly becoming more connected via the Internet with government and private infrastructure heavily dependent on cyber technology. This is why, with or without IS, the next wave of terrorism is most likely to be ‘cyber terrorism’. Rather than reacting to an attack in the future, the international community must pre-empt this threat now and take necessary steps.

*Shahzeb Ali Rathore is a Research Analyst with the International Centre for Political Violence & Terrorism Research (ICPVTR), a constituent unit of the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University, Singapore.

Source : eurasiareview.com

Categorized in Deep Web

Believe it or not, there are parts of the internet that Google can’t reach.

The dark web is made up of websites hidden from search engines that can only be accessed using special software.

The dark web is used by many people for different things but it’s infamously used by criminals to hide illegal activity online.

So what exactly is the dark web, where did it come from and how does it work?

What is the dark web?

The internet is actually made up of three different layers: the surface web, the deep web, and the dark web.

The top layer, the surface web, are web pages that show up using search engines such as Google – like The Sun’s website.

The deep web are web pages that search engines can’t access and are therefore hidden, accessed via passwords and authorization. Any time you log into an account you’re accessing deep web content that won’t show up on a search engine. For example, work intranets, password-protected areas of online banking, and draft blog posts are all stored on the deep web.

This means that if someone was to Google your name, your banking information or Amazon wishlist won’t show up in the results.

The dark web is a network of untraceable online activity and websites on the internet. They cannot be found using search engines and to access them you need to use specific software, configurations or have authorization. They are used by lots of different people to keep their web activity hidden.

Just like the forest, the dark web hides things well – it hides actions and it hides identities.

Where did the dark web come from?

The dark web was actually created by the US government to allow spies to exchange information completely anonymously.

US military researchers developed the technology, known as Tor (The Onion Router) in the mid-1990s and released it into the public domain for everyone to use.

The reason was so that they could stay anonymous – it would be harder to distinguish the government’s messages between spies if thousands of other people were using the same system for lots of different things. Tor now hosts roughly 30,000 hidden sites.

It’s called The Onion Router because it uses the technique of onion routing – making websites anonymous through layers of encryption.

Most websites are also hosted on the .onion domain.

How does the dark web work?


The best explanation so far has been published by Daniel Prince, Associate Director Security at Lancaster University, on The Conversation.

Prince says: “So just for a minute imagine that the whole internet is a forest – a vast expanse of luscious green as far as the eye can see. And in the forest are well-worn paths – to get from A to B.”

“Think of these paths as popular search engines – like Google – allowing you as the user the option to essentially see the wood from the trees and be connected. But away from these paths – and away from Google – the trees of the forest mask your vision.”

“Off the paths, it is almost impossible to find anything – unless you know what you’re looking for – so it feels a bit like a treasure hunt. Because really the only way to find anything in this vast forest is to be told where to look.”

“This is how the dark web works – and it is essentially the name given to all the hidden places on the internet.”

“Just like the forest, the dark web hides things well – it hides actions and it hides identities. The dark web also prevents people from knowing who you are, what you are doing and where you are doing it.”

Who uses the dark web and why?

The dark web is used by all sorts of people for all sorts of reasons – but it’s not surprising that it’s used for illegal activity.

A study by the University of Portsmouth in 2014 found that the most wanted type of content on Tor was child porn, followed by black markets for goods such as drugs, personal details, and even guns.


This type of site is regularly busted by police, who compromise them by distributing viruses and malware to users.

The dark web is also used for hiding online activity related to finance, extremism, arms, hacking, abuse and fraud.

However, for others, the dark web has positive uses. For example, it can be used to avoid a national firewall, such as China, where users are normally blocked from accessing hidden sites.

It can also be used as a tool for whistleblowing – infamous website WikiLeaks is hosted on the dark web, allowing whistleblowers to anonymously upload classified information to the press.

Do police ever catch people using the dark web?

Yes – although using the dark web makes it easier to evade detection, governments around the world are working to index, sort, and catalog the dark web as well as monitor it as much as they can. The UK government has a dedicated cybercrime unit to tackle the dark web with a focus on taking down serious crime rings and child porn.

Just earlier this year police caught Richard Huckle ‘Britain’s worst-ever pedophile’ by secretly taking over a dark website dedicated to child abuse.

The online network was made up of over 45,000 people who swapped sickening videos and images of children on a dark-web forum which was only accessible through a specially encrypted browser.

Another takedown, called Operation Onymous, involved seventeen different countries, coordinated by Europol and the FBI, which revealed over 400 “hidden services.”

The operation led to hundreds of pounds worth of Bitcoin being seized and 17 arrests – but only one person was identified and taken into custody.

Who is Ross Ulbricht?

One of Ross Ulbricht’s supporters stands outside a federal courthouse in Manhattan on the first day of his trial in 2015.Getty Images

Ross Ulbricht was the man behind Silk Road, the internet’s biggest market for illegal drugs – which was hosted on the dark web.

A courtroom sketch of Ross UlbrichtAP

Silk Road was reportedly worth $34.5 million and had nearly one million anonymous customers. On Silk Road, you could buy drugs, services (such as hacking into Facebook accounts), pirated content, fakes passports and more. You could even check the reviews and star ratings of each dealer left by other customers.

Ulbricht was caught by the FBI in 2013, who shut down Silk Road and convicted him of money laundering, computer hacking, conspiracy to traffic fraudulent identity documents and conspiracy to traffic narcotics in February 2015. He was sentenced to life in prison.

Ulbricht will also be tried for procuring murder – FBI indictments claimed he ordered two hitmen to kill people he thought would expose the identity of his clients.

Source : nypost.com

Categorized in Deep Web

Sorry, Captain Kirk. Space is no longer the final frontier.

As reported by Danielle Wiener-Bronner at Fusion, NASA is setting its sights on the furthest, most wretched lengths of the known universe: the deep web.

"The space agency announced last month that it will join forces with the Defense Advanced Research Projects Agency (DARPA) to help make sense of that part of the Internet commonly referred to as the Deep or Dark Web. Most Internet users first heard about it, if they’ve heard about it at all, in the context of Silk Road, the now-defunct online drug marketplace that was hosted on a hidden Web service. Silk Road was only accessible using the anonymity-enhancing browser The Onion Router, or TOR."

For anyone who had been around the Internet long enough, the deep web was like the old abandoned house on the corner only the really brave (or foolish) kids broke into. The arrest, trial, and conviction of Silk Road's Ross Ulbricht shed a new light on that house for laypeople. Now everyone wants to know what's inside. That's where NASA comes in with its missions to "access and catalog this mysterious online world."

The effort isn't merely a pet project. Deep search technology is important to NASA's long-term goals. Here's Wiener-Bronner again:

"Some sites aren’t linked to by Google because they’re private — behind paywalls, for example, or simply not worth Google’s efforts to index, like scientific data. That’s the kind of information in which NASA’s Jet Propulsion Laboratory is interested, because that’s where the information its spacecraft send back to earth winds up."

So it's legitimately a scientific effort, though the fun/scary byproduct is going to be an advanced new way for the public to explore the 96 percent of the web beyond Google's grasp.

To learn more about the how and the why behind NASA's plan, check out both the aforementioned story at Fusion and NASA's own press release in conjunction with JPL.

Does deep search and advanced machine learning interest you? We've got Microsoft's Director of Search Stefan Weitz here to tell you just how different your search engine will be in 20 years:

Screenshot 2

Categorized in Deep Web

airs logo

Association of Internet Research Specialists is the world's leading community for the Internet Research Specialist and provide a Unified Platform that delivers, Education, Training and Certification for Online Research.

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.

Follow Us on Social Media