Professional Documents
Culture Documents
Deep Web Menace or A Bliss
Deep Web Menace or A Bliss
Deep Web Menace or A Bliss
Introduction
The deep web, invisible web, or hidden web are parts of the World Wide Web whose contents are
not indexed by standard web search engines for any reason. The opposite term to the deep web is
the surface web, which is accessible to anyone using the internet. The presence of deep web has
become a credibility, which many of us question. Due to large amounts of data present on the deep
web and very few restrictions it has become a hub for the hackers. Henceforth, the most prominent
question mark on presence of deep web remains that is the deep web beneficial for the world or
harmful? The article Dark Web by Kristin Finklea describes about legal and illegal activities along
with payments required for accessing the deep web. Another article Under the Ocean of Internet-
The Deep Web by Brett Hawkins emphasizes on the size of deep web and informs us how dark
web is a part of deep web along with the article White Paper: The Deep Web: Surfacing Hidden
Value by Michael K. Bergman. Finally the article Behind the Curtain by Judith Aldrith, Nathan
Ryan and Richard Warnes informs about the Silk Route, illegal activity, and payment methods
on the websites. The objectives of this research are, to introduce the topics of deep web and to
reveal the insights of the term along with the importance it holds in the recent era of development
and progression. Also this paper strives to highlight the positive and the negative aspects deep web
carries.
This paper deals with the questions like How is accessing deep web not easy? What are the
cautions one needs to take for accessing deep web? Is the deep web really a problem for
Internet is comprised of two parts one is the surface web and the other one is the deep web. The
data that can be found by the search engines is surface web and the other data that is not accessible
by the search engines is the deep web. As the deep web is not accessible by the simple search
engines the content on the deep web is accessed by the special software like TOR as given by
The Surface Web is the area of the Internet that a person visits like Facebook, Google, Amazon,
YouTube, and Yahoo. These web pages can be accessed using simple software of web browsers
like Google Chrome, Safari, Mozilla Firefox, and Internet Explorer as given in the journal Under
the ocean of the Internet- the Deep Web by Brett Hawkins (2016).
“TOR relies upon a network of volunteer computers to route users’ web traffic through a series of
other users’ computers such that the traffic cannot be traced to the original user” (Kristen Finklea,
On Dark Web one can hide the activity and can communicate through secure emails, or personal
messages hosted by the TOR. This hiding is used by the individuals for legal and illegal purposes
ranging from privacy to selling felonious goods, and hiring assassins. Criminals and terrorists also
have the edge of the anonymity on the deep web for the coordination and action. On the other hand
security officials use deep web for sting operations, and for the surveillance. Military and
Intelligence use the deep web to study the operational risk present in the area for the operations of
purposes” (Brett Hawkins, Under The Ocean of the Internet-The Deep Web, 2016, p.3).
Tor software can be used by the military to conduct a clandestine or covert computer network
operation such as taking down a website or a denial of service attack, or to intercept and inhibit
where the military uses the Dark Web to plant disinformation about troop movements and targets,
As stated in the article Under the Ocean of Internet-The Deep Web by Brett Hawkins (2016), The
truth however is that these zones and islands only make up 4% of the net. The rest of the net is
made up of the Deep Web, which is situated under the ocean. This 96% makes up the rest of the
At another place Kristin Finklea in her journal Dark Web (2017), proposed that it’s almost
impossible to quantify the magnitude of the Deep Web. Meanwhile, some early assessments put
the size of the Deep Web at 4,000–5,000 times greater than the surface web, the shifting dynamic
of how data is retrieved and presented means that the Deep Web is mounting exponentially and at
a speed that disregards quantification. “The Deep Web is 500 times larger than the Surface Web”
(Brett Hawkins, Under The Ocean of the Internet - The Deep Web, 2016, p.7).
The White Paper: The Deep Web: Surfacing Hidden Value by Michael K. Bergman stated “Public
information on the deep Web is currently 400 to 550 times larger than the commonly defined
World Wide Web. The deep Web contains nearly 550 billion individual documents compared to
the one billion of the surface Web. More than 200,000 deep Web sites presently exist” ( 2001, p.1).
When it comes to the types of content available on the deep web, as given in Under the Ocean of
the Internet - The Deep Web (2016) by Brett Hawkins, every individual is using the deep web for
a motive. It could be used for unlawful purposes as well and also by the law enforcement agencies.
The Deep Web can also be used to perform veteran research, or search for anyone’s lineage history.
Different legitimate investigations are also conducted on the Deep Web. Students can also use the
Deep Web, there are several academic databases that can be searched through for different topics,
such as scientific journals. Another character of The Deep Web is that it offers total anonymity,
henceforth it is a popular destination for criminals to buy and sell information. The info that can
be traded on the Deep Web comprise of medical records, social security numbers, other Personally
Identifiable Information (PII) and credit card numbers. Enough data on someone can be purchased
that their identity can be stolen easily. Furthermore, according to a reporter in 2013, The Deep
Web is also used to trade weapons, display child pornography, sell drugs and hire hitmen.
Brett Hawkins in his journal Under the Ocean of the Internet - The Deep Web (2016) also
mentioned that there are also countless people that are not the lawbreakers to access the Deep
Web. One such example is of an individual who only desires to access the web anonymously. They
have no criminal intentions or purposes, but simply don't want to be chased by the public or private
sectors. Some other institutions that use the Deep Web are journalists, police, and military.
This in turn increases the number of people opening the deep web and such disclosure assists
illegal trade at a global scale where purchasers and vendors, possibly situated on different sides of
the world, are just a few clicks away from joining and conducting unlawful business. The Dark
Web is a zone that resides on the Deep Web. Quite a few people confuse the Deep Web and the
Dark Web thinking they are the same thing. This is certainly not the case. The dark web is the part
of the deep web which is largely accessed via a software client called TOR as continued by Brett
Hawkins in his journal Under the Ocean of the Internet - The Deep Web (2016). “The furthest
corners of the Deep Web, known as the Dark Web, contain content that has been intentionally
According to Brett Hawkins in his journal Under the Ocean of the Internet - The Deep Web (2016),
Silk Road was an online marketplace on the Dark Web that was used to trade malware, guns,
personal data, drugs, and more. It was pretty much the Amazon of the black market and was formed
by Ross William Ulbricht. The site had a similar impression to Amazon. One could shop by
categories, communicate with sellers, search for products and the currency used to pay for the
Moreover, Kristin Finklea mentions in her journal Dark Web (2017) suggests that the vendors of
the prohibited substances on Silk Road were placed in more than 10 countries around the world,
and illegal goods and services were delivered to more than 100,000 buyers. It has been projected
that the Silk Road produced about $1.2 billion in sales between January 2011 and September 2013,
Describing the markets on the dark web, Giacomo Persi Paoli, Judith Aldridge, Nathan Ryan and
Richard Warnes in their combined journal Behind The Curtain (2017), articulates that crypto
markets look similar to authorized online marketplaces like eBay or Amazon. Clients typically
need to set up accounts to view the marketplace, and once logged in, access the Web page.
Marketplaces have a set of pre-defined categories into which retailers, known as ‘vendors’, can
categorize their items to allow customers to quickly find the type of product or service they are
looking for. Even though not all crypto markets sell firearms, the markets that store weapons often
Marking a dissimilarity between clear and dark web markets Kristin Finklea in her journal Dark
Web (2017), says is the method of payment. On dark web markets, payments are through
cryptocurrencies. The first, well-known, and still most frequently used is Bitcoin, although
gradually popular replacements (‘altcoins’) include Monero, Ethereum, Ripple and Litecoin.
Also Giacomo Persi Paoli, Judith Aldridge, Nathan Ryan and Richard Warnes in Behind the
Curtain (2017), remark that the dealings done using cryptocurrencies are not essentially associated
to the real-world identities of purchasers and providers, and this makes it challenging for law
enforcement to trace illegal dealings. Bitcoin is the currency frequently used in dealings on the
Dark Web.85 It is a decentralized digital currency that uses unidentified, peer-to-peer transactions.
People generally acquire bitcoins by accepting them as payment, trading them for traditional