Tuesday, March 13, 2012

The Irish Independent

http://www.independent.ie/opinion/comment/wayne-doyle-welcome-to-the-deep-web-a-world-of-gunrunning-sex-trafficking-and-assassins-for-hire-3047794.html

A fellow blogger's work. Check it out !!

http://filmproductionschools.org/

Tuesday, March 6, 2012

Exposing the Deep Web

The Internet we don’t know



By Wayne Doyle

“I cannot say that we are familiar with the deep web. What I can tell you is that any server or website that interacts or promotes crime will be subject to an investigation, once a complaint has been made”, stated John , who declined to give his second name, from the Garda Press office.

An investigation made by this publication into the illegal activity within the “Deep Web” has revealed a world of corruption, guns, sex trafficking and information about high profile individuals and their personal lives.

The Deep Web (also called Deepnet, the invisible Web, DarkNet, Undernet or the hidden Web) refers to World Wide Web content that is not part of the Surface Web, which is indexed by standard search engines such as Google, Bing and Dogpile.

When pushed further on the Gardai’s knowledge around the area of the deep web the Garda source concluded, “You can find all our information in relation to internet safety on our website under the frequently asked questions section.

William, a computer programme who is extremely efficient in areas such as Java script, HTML and general software encryption stated, “It’s not a case of just typing into Google and logging in, the deep web is complex and dangerous for those who can’t operate down there anonymously”.

Further investigation proved Williams point as statistical information within the seep web revealed only 800,000 individuals worldwide have made it inside the deep web to date.

To find out more about what the deep web contained there was six hours of programming and downloading plug ins, adjusting our privacy setting manually and removing any tangible trace of our location led us to the deep and murky underworld of the Deep Web.

Within the inner sanctum of the deep web individuals can avail of a multitude of illegal services such as rent-a-hacker, false documentation such as passports, and a wide range of guns and also view sensitive documents and user manuals for heavy weaponry and bombs.
“These doxboxes or documents as we would call them, are constantly being monitored by the FBI and CIA, if you stumble on the wrong images or wrong page, you could find yourself in serious trouble”, states William.

Contact was made with the New York Headquarters of the Federal Bureau of Investigation’s internet crime department in order to understand where and how exactly law enforcement is dealing with this current global problem. The investigation was directed to the FBI cyber crime section where evidence of up to seventy prosecutions to date in relation to cyber crime ranging from illegal music and movies to child pornography was discovered.


In 2008, the U.S. President mandated the NCIJTF to be the focal point for all government agencies to coordinate, integrate, and share information related to all domestic cyber threat investigations. The FBI is responsible for developing and supporting the joint task force, which includes 18 intelligence agencies and law enforcement, working side by side to identify key players and schemes.

Its goal is to predict and prevent what’s on the horizon and to pursue the enterprises behind cyber attacks. Unfortunately I did not uncover any evidence which would suggest that the Irish Police force in terms of Cyber Crime is aware of the severity of what is going on inside the deep web through the use of Irish servers.

Access to the deep web was gained through the Tor network, which essentially allows the user to browse the deep net unidentified. For example, when you request information from Google the information travels from the site/server you requested it from thus it can be easily tracked to your computer with your unique user identity.

However, the Tor network uses multiple servers and multiple computers from all around the world, all connected to the Tor network to relay the information back and forth. In this situation it is almost impossible to identify the requester or server of that particular information. These are layers and layers of security to provide maximum anonymity.