Book Image

Hands-On Dark Web Analysis

By : Sion Retzkin
Book Image

Hands-On Dark Web Analysis

By: Sion Retzkin

Overview of this book

The overall world wide web is divided into three main areas - the Surface Web, the Deep Web, and the Dark Web. The Deep Web and Dark Web are the two areas which are not accessible through standard search engines or browsers. It becomes extremely important for security professionals to have control over these areas to analyze the security of your organization. This book will initially introduce you to the concept of the Deep Web and the Dark Web and their significance in the security sector. Then we will deep dive into installing operating systems and Tor Browser for privacy, security and anonymity while accessing them. During the course of the book, we will also share some best practices which will be useful in using the tools for best effect. By the end of this book, you will have hands-on experience working with the Deep Web and the Dark Web for security analysis
Table of Contents (18 chapters)
Title Page
About Packt

Military organizations

Military organizations us the Dark Web for covert communications, protecting military actions, operations, and adhering to military information security procedures (such as non-disclosure).

It also allows military, governmental, and civilian intelligence, and counter-intelligence units to collect information without revealing themselves to the subjects of their research.

As you now know, the internet was originally designed and launched by DARPA, to ensure continued communication in case of attacks on the US, and to hide the physical location of the communicating objects, Tor was developed, based on this, and further ensures the above.

In an attempt to combat the use of the Dark Web for sex trafficking, DARPA built a search engine called Memex to try to find information and leads from the Dark Web.

It cost DARPA $67,000,000, and is in use by over 33 law enforcement agencies since 2014. It looks for online behavioral signals in ads and helps detect whether a person is being...