• Skip to content
  • Skip to primary sidebar
  • Skip to footer

Deep Web

The Dark World

  • Deep Web
  • Deep Web Links
  • Best VPN
  • Tor
  • Darknet Markets
  • Hidden Wiki
  • News
You are here: Home / Deep Web Research Papers / Below the Surface-Exploring the Deep Web

deepwebadmin / November 20, 2015

Below the Surface-Exploring the Deep Web

Share
Pin

Abstract:

Interest in the Deep Web peaked in 2013 when the FBI took down the Silk Road marketplace and exposed the Internet’s notorious drug trafficking underbelly. Ross Ulbricht, aka Dread Pirate Roberts, was charged with narcotics trafficking, computer hacking conspiracy, and money laundering. While news reports were technically referring to the Dark Web—that portion of the Internet that can only be accessed using special browsing software, the most popular of which is TOR —negative stereotypes about the Deep Web spread.

The Deep Web is the vast section of the Internet that isn’t accessible via search engines, only a portion of which accounts for the criminal operations revealed in the FBI complaint. The Dark Web, meanwhile, wasn’t originally designed to enable anonymous criminal activities. In fact, TOR was created to secure communications and escape censorship as a way to guarantee free speech.

The Dark Web, for example, helped mobilize the Arab Spring protests. But just like any tool, its impact can change, depend on a user’s intent. In our 2013 paper, “Deep Web and Cybercrime,” and subsequent updates , we sought to analyze the different networks that guarantee anonymous access the Deep Web in the context of cybercrime.

In the process, we discovered that much more happens in the murkier portions of the Deep Web than just the sale of recreational drugs. It has also become a safe haven that harbors criminal activity both in the digital and physical realms. This paper presents some relevant statistics derived from our collection of Deep Web URLs and takes an even closer look at how criminal elements navigate and take advantage of the Deep Web.

It provides vivid examples that prove that people go there to not only anonymously purchase contraband but also to launch cyber crime operations, steal identities, dox high-profile personalities, trade firearms, and, in more depraved scenarios, hire contract killers.

Download

Share
Pin

Filed Under: Deep Web Research Papers Tagged With: deep web research papers

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

STAY ANONYMOUS

CyberGhost VPN Deep Web Access

Footer

Follow US

Recent Post

  • 11 Spine-Chilling and Nightmarish Deep Web Stories from Users
  • How Dark Web Whistleblowers Work
  • Money on the Dark Web: Bitcoin Fades as Monero Rises?
  • The Story of Deep Web Narcotics
  • How to Access .Onion Sites? – Noobs Guide

Disclaimer

The information contained in this website is for general information purposes only. The information is provided by Deep Web Sites and while we endeavour to keep the information up to date and correct, we make no representations or warranties of any kind, express or implied, about the completeness, accuracy, reliability, suitability or availability with respect to the website or the information, products, services, or related graphics contained on the website for any purpose. Any reliance you place on such information is therefore strictly at your own risk. Read more>>

© 2019 · Deep Web

  • Terms and Conditions
  • Privacy and Cookie policy
  • Disclaimer
  • Contact us