0% found this document useful (0 votes)
310 views14 pages

The Deep Web

Uploaded by

Fuad Nasir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
310 views14 pages

The Deep Web

Uploaded by

Fuad Nasir
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

Information Assurance Club

Collin Donaldson
What is it?
 World Wide Web content that is not part of the
Surface Web and is indexed by search engines.
 Most content that is not readily accessible using
standard means (i.e. search engines ).
 For example, web pages regarding private user
accounts are in the deep web (Private Info).
 The Deep Web is the majority of online content,
estimated to be 400-550 times larger than the surface
web.
Surface Web vs. Deep Web
Surface Web Deep Web
 Entries are statically  Entries are dynamically
generated generated (submitted to a
query or accessed via form).
 Linked Content (web
 Unlinked Content
crawled)
 Contextual Web
 Readily accessible through
 Private Web
any browser or search engine
unlike the Deep Web, which  Scripted Content
requires special search  Non-HTML content
engines, browsers, and  Limited Access Content (anti-
proxies to access. robot protocols like
CAPTCHA)
Level 1- The Surface Web
 The web that the vast majority of internet users are
accustomed to.
 Accessible in any nation that does not block internet
access, even places like China and Egypt.
 Social media sites like Facebook, informational
websites like Wikipedia, general websites, etc.
Level 2-The Bergie Web
 The layer of the Surface Web that is blocked in some
nations. Some other information is only accessible
through illegal means.
 Google locked results
 Recently web crawled old content
 Pirated Media
 Pornography
Level 3-The Deep Web
 Requires a proxy or two (namely Tor) to access.
 Contains most of the archived web pages of the 1990s
Web that did not renew their domain names and such.
 Government/Business/Collegiate Research.
 Hackers/Script Kiddies/Virus Information.
 Illegal and Obscene Content (CP, Gore, Suicides, etc.)
Level 4- The Charter Web
 Like the Regular Deep Web, but harder to get into and
more illegal content.
 Advanced covert government research.
 Most of the internet black market (run on bitcoins)
 Human/Arms/Drug/Rare Animal Trafficking.
 Assassination networks , bounty hunters, illegal game
hunting, line of blood locations, etc.
 More banned obscene content like CP, Gore, etc.
Level 5-Marianas Web
 Lowest known level of the Deep Web.
 Named after the Spanish Technician who created it.
 Extremely difficult to access, users say it is the safest
part of the internet due to how private it is.
 Julian Assange and other top-level Wikileaks members
are believed to have access.
Rumored Levels 6-8
 Mostly the stuff of conspiracy theorists.
 Level 6 is a giant firewall meant to prevent people from
going any further.
 Level 7 “The Fog” is where various worldwide power-
players jockey for control of PrimArch. Said to be very
dangerous, full of viruses and such.
 Level 8 is called PrimArch and is claimed to be
controlled by an extremely powerful AI (possibly
running on a quantum computer).
Ethical Uses
 Some organizations such as BrightPlanet claim the Deep
Web has higher quality articles than the surface web (3 to 1
quality ration) , and a lot more of them. Deep Web capable
search engines like ipl2 and Infomine can be used to find
them.
 Dig deep enough and you will find some interesting
information about past and present experiments and
research.
 Assuming you use them ethically, there are hacking/virus
creation tutorials and information as well as a large
community of hackers and script kiddies to learn from.
How to Access Safely
 Vertical and Split Searching
 Proxies (namely Tor) and AV programs.
 Turn off ALL plug ins before accessing (especially the
shady parts).
 If your computer has a webcam, remove or obstruct it.
 Stay away from anything that looks remotely criminal
or suggestive.
 Use a safe, private network connection (DO NOT USE
THE IUP WIFI)
Additional Resources
 http://deepweb.us/
 http://quod.lib.umich.edu/cgi/t/text/text-
idx?c=jep;view=text;rgn=main;idno=3336451.0007.104
 http://www.internettutorials.net/deepweb.asp
 http://unpromisedone.blogspot.com/2011/09/informat
ion-about-deep-web.html
 http://cyberwarzone.com/cyberwarfare/darknet-
marianas-web-and-other-levels
 http://en.wikipedia.org/wiki/Deep_Web

You might also like