SlideShare a Scribd company logo
1 of 8


The Deep Web consists of Web content that is not
part of the surface web



It contains pages that are not and cannot be
indexed by standard search engines
(Google, Yahoo!, Bing, etc.)



Network of anonymous users that make use of their
anonymity to conduct business and store content
that is either illegal or of no interest to majority of
internet users



Special software (TOR, Freenet, etc.) is required in
order for internet users to gain access to and make
use of the deep web


Public information on the Deep Web is currently 400
to 550 times larger than the commonly defined World
Wide Web



The Deep Web contains 7,500 terabytes of
information compared to 19 terabytes of information
in the surface web



Contains nearly 550 billion individual documents
compared to 1 billion documents in the surface web



Deep Web currently has more than 200,000 websites



The Deep Web is currently the largest growing
category of new information on the Internet


Total quality content of the Deep Web is 1,000 to
2,000 times greater than that of the surface web



Deep Web content is highly relevant to every
information need and market



More than half of the Deep Web content resides in
topic-specific databases



95% of the Deep Web is publicly accessible
information that is not subject to any fees or
subscriptions



Deep Web has a large community of hackers,
scientists, drug dealers, assassins, perverts, terrorists,
kidnappers, data miners, and others


The Deep Web makes E-Commerce a possibility for
individuals and businesses that engage in illegal activity,
much in the same way the legit businesses are making
use of E-Commerce



E-Commerce is practiced by the following individuals
- murderers/hit men
- drug dealers
- rapists/child molesters
- spies
- ammunitions/weapons dealers
- terrorists


The Deep Web will effectively put E-Commerce in a
negative light



Focus will be placed on the disadvantages of
technology instead of the benefits



Will raise issues of legitimacy in E-Commerce



Could potentially force the government and other
monitoring bodies to violate privacy rights of legitimate
E-commerce users for the sake of security
(passwords, private information, confidential financial
data/records/transactions will be accessed)


The Deep Web will continue
to grow and expand in the
next 2 years, and long after



Governments won’t be able
to do anything significant to
control it



The Deep Web will continue
to gain more power and
popularity amongst ECommerce practitioners


Developments in advanced
technology will improve tracking
on the dark net, but anonymity
will prove to be users’ greatest
asset



Struggling businesses will
consider moving to the deep
web to carry out more
unrestricted and unmonitored
operations that will increase
revenue



Occasional successful busts of
illegal activity in the Deep Web

More Related Content

What's hot

Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of ExpressionMark Jhon Oxillo
 
Hass & Associates Online Reviews
Hass & Associates Online ReviewsHass & Associates Online Reviews
Hass & Associates Online Reviewsaleenia23
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelinesdlwadsworth
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedMichael Sexton
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activismjwilso
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer SystemEjiro Ndifereke
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarThomas Jones
 
2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and security2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and securityGolden Locksmith
 
legal aspects in e marketing
legal aspects in e marketinglegal aspects in e marketing
legal aspects in e marketingSHIVANI SINGH
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012Jim Ayson
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons LawThomas Jones
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3misecho
 

What's hot (20)

Cyber law1
Cyber law1Cyber law1
Cyber law1
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Privacy and Freedom of Expression
Privacy and Freedom of ExpressionPrivacy and Freedom of Expression
Privacy and Freedom of Expression
 
Hass & Associates Online Reviews
Hass & Associates Online ReviewsHass & Associates Online Reviews
Hass & Associates Online Reviews
 
Aceptable use policy user guidelines
Aceptable use policy   user guidelinesAceptable use policy   user guidelines
Aceptable use policy user guidelines
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
66 keith kupferschmid_presentation
66 keith kupferschmid_presentation66 keith kupferschmid_presentation
66 keith kupferschmid_presentation
 
The securitization of online activism
The securitization of online activismThe securitization of online activism
The securitization of online activism
 
Ways of Misusing The Computer System
Ways of Misusing The Computer SystemWays of Misusing The Computer System
Ways of Misusing The Computer System
 
Multimedia digital piracy
Multimedia digital piracyMultimedia digital piracy
Multimedia digital piracy
 
Wikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information WarWikileaks, Hactivism, and Government: An Information War
Wikileaks, Hactivism, and Government: An Information War
 
2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and security2014’s biggest winners and losers in privacy and security
2014’s biggest winners and losers in privacy and security
 
legal aspects in e marketing
legal aspects in e marketinglegal aspects in e marketing
legal aspects in e marketing
 
After 9 11
After 9 11After 9 11
After 9 11
 
The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012The Philippine Cybercrime Prevention Act of 2012
The Philippine Cybercrime Prevention Act of 2012
 
The CFAA and Aarons Law
The CFAA and Aarons LawThe CFAA and Aarons Law
The CFAA and Aarons Law
 
2013 01-14
2013 01-142013 01-14
2013 01-14
 
Chapter 10, part 3
Chapter 10, part 3Chapter 10, part 3
Chapter 10, part 3
 

Viewers also liked

Respiration (basic biology) unm
Respiration (basic biology) unmRespiration (basic biology) unm
Respiration (basic biology) unmJeny Hardiah
 
Suzi presentation
Suzi presentationSuzi presentation
Suzi presentationsm91397
 
Plan audit achat
Plan audit achatPlan audit achat
Plan audit achatyasmineoo
 
Audit opérationnel - Évaluation des procédures du cycle achats/fournisseurs a...
Audit opérationnel - Évaluation des procédures du cycle achats/fournisseurs a...Audit opérationnel - Évaluation des procédures du cycle achats/fournisseurs a...
Audit opérationnel - Évaluation des procédures du cycle achats/fournisseurs a...Miriam drissi kaitouni
 
audit des stocks
audit des stocks audit des stocks
audit des stocks Mirafitia
 

Viewers also liked (10)

Pivot stratégique
Pivot stratégiquePivot stratégique
Pivot stratégique
 
Respiration (basic biology) unm
Respiration (basic biology) unmRespiration (basic biology) unm
Respiration (basic biology) unm
 
Lucro-Arbitrado-ligue (11)98950-3543
Lucro-Arbitrado-ligue (11)98950-3543Lucro-Arbitrado-ligue (11)98950-3543
Lucro-Arbitrado-ligue (11)98950-3543
 
CV Mats Heuzen
CV Mats HeuzenCV Mats Heuzen
CV Mats Heuzen
 
Suzi presentation
Suzi presentationSuzi presentation
Suzi presentation
 
The deepweb
The deepwebThe deepweb
The deepweb
 
The Deep Web
The Deep WebThe Deep Web
The Deep Web
 
Plan audit achat
Plan audit achatPlan audit achat
Plan audit achat
 
Audit opérationnel - Évaluation des procédures du cycle achats/fournisseurs a...
Audit opérationnel - Évaluation des procédures du cycle achats/fournisseurs a...Audit opérationnel - Évaluation des procédures du cycle achats/fournisseurs a...
Audit opérationnel - Évaluation des procédures du cycle achats/fournisseurs a...
 
audit des stocks
audit des stocks audit des stocks
audit des stocks
 

Similar to Montilla K32 - DEEP WEB

Similar to Montilla K32 - DEEP WEB (20)

Ali shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep webAli shahbazi khojasteh - deep web
Ali shahbazi khojasteh - deep web
 
Deep web
Deep webDeep web
Deep web
 
Wp below the_surface
Wp below the_surfaceWp below the_surface
Wp below the_surface
 
Dark web presentation
Dark web presentationDark web presentation
Dark web presentation
 
Invisible Web
Invisible Web Invisible Web
Invisible Web
 
Polinter11
Polinter11Polinter11
Polinter11
 
The Internet and World Wide Web
The Internet and World Wide Web The Internet and World Wide Web
The Internet and World Wide Web
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
The Deep Web.pptx
The Deep Web.pptxThe Deep Web.pptx
The Deep Web.pptx
 
Cyber Crime Challanges
Cyber Crime ChallangesCyber Crime Challanges
Cyber Crime Challanges
 
Darknet
DarknetDarknet
Darknet
 
Dw communication
Dw communicationDw communication
Dw communication
 
Dark Web.pptx
Dark Web.pptxDark Web.pptx
Dark Web.pptx
 
The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?The Dark web - Why the hidden part of the web is even more dangerous?
The Dark web - Why the hidden part of the web is even more dangerous?
 
Deep web
Deep webDeep web
Deep web
 
unit-1.pptx
unit-1.pptxunit-1.pptx
unit-1.pptx
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cyber Law & Forensics
Cyber Law & ForensicsCyber Law & Forensics
Cyber Law & Forensics
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Understand Internet Before You Regret.
Understand Internet Before You Regret.Understand Internet Before You Regret.
Understand Internet Before You Regret.
 

Recently uploaded

FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsMichael W. Hawkins
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...rajveerescorts2022
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 

Recently uploaded (20)

FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
👉Chandigarh Call Girls 👉9878799926👉Just Call👉Chandigarh Call Girl In Chandiga...
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 

Montilla K32 - DEEP WEB

  • 1.
  • 2.  The Deep Web consists of Web content that is not part of the surface web  It contains pages that are not and cannot be indexed by standard search engines (Google, Yahoo!, Bing, etc.)  Network of anonymous users that make use of their anonymity to conduct business and store content that is either illegal or of no interest to majority of internet users  Special software (TOR, Freenet, etc.) is required in order for internet users to gain access to and make use of the deep web
  • 3.  Public information on the Deep Web is currently 400 to 550 times larger than the commonly defined World Wide Web  The Deep Web contains 7,500 terabytes of information compared to 19 terabytes of information in the surface web  Contains nearly 550 billion individual documents compared to 1 billion documents in the surface web  Deep Web currently has more than 200,000 websites  The Deep Web is currently the largest growing category of new information on the Internet
  • 4.  Total quality content of the Deep Web is 1,000 to 2,000 times greater than that of the surface web  Deep Web content is highly relevant to every information need and market  More than half of the Deep Web content resides in topic-specific databases  95% of the Deep Web is publicly accessible information that is not subject to any fees or subscriptions  Deep Web has a large community of hackers, scientists, drug dealers, assassins, perverts, terrorists, kidnappers, data miners, and others
  • 5.  The Deep Web makes E-Commerce a possibility for individuals and businesses that engage in illegal activity, much in the same way the legit businesses are making use of E-Commerce  E-Commerce is practiced by the following individuals - murderers/hit men - drug dealers - rapists/child molesters - spies - ammunitions/weapons dealers - terrorists
  • 6.  The Deep Web will effectively put E-Commerce in a negative light  Focus will be placed on the disadvantages of technology instead of the benefits  Will raise issues of legitimacy in E-Commerce  Could potentially force the government and other monitoring bodies to violate privacy rights of legitimate E-commerce users for the sake of security (passwords, private information, confidential financial data/records/transactions will be accessed)
  • 7.  The Deep Web will continue to grow and expand in the next 2 years, and long after  Governments won’t be able to do anything significant to control it  The Deep Web will continue to gain more power and popularity amongst ECommerce practitioners
  • 8.  Developments in advanced technology will improve tracking on the dark net, but anonymity will prove to be users’ greatest asset  Struggling businesses will consider moving to the deep web to carry out more unrestricted and unmonitored operations that will increase revenue  Occasional successful busts of illegal activity in the Deep Web

Editor's Notes

  1. The Deep Web is often referred to as “The Silk Road”, named after the ancient trade routes that ran all across Eurasia.References:http://www.youtube.com/watch?v=wMgqTWdk3tw
  2. An analogy that is typically used to describe the surface web and the deep web is an iceberg – where the surface web is the tip of the iceberg or the portion that is clearly and easily visible, and the deep web is the LARGER portion of the iceberg underwater that is not visible to most internet users.References:http://www.youtube.com/watch?v=wMgqTWdk3tw
  3. Not all of the information found in the Deep Web is illegal or illicit. The Deep Web also contains massive archives of old documents of large corporations that is of no use to them anymore and that the general public doesn’t care about.References:http://www.youtube.com/watch?v=wMgqTWdk3tw