Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong.

Slides:



Advertisements
Similar presentations
Transfer Content to a Website What is FTP? File Transfer Protocol FTP is a protocol – a set of rules Designed to allow files to be transferred across.
Advertisements

Freedom of Speech (Part 3)
Safety SAFETY. Protecting Privacy  Don’t broadcast your location.  You Tube settings  Read privacy policies  Real names?  Revealing your status.
Respect for All: Digital Footprint. Lesson Objectives: Students will be able to …  Define the term digital footprint and understand how their actions.
The Tor Browser Network Anonymity and its Relation to the Public By Jackson Wright.
What is the invisible web?  All information that cannot be indexed using general web search engines  Also known as the deep internet, deepnet, or the.
Cookies Are small text filer with or unique ID tag that are embedded in a Web browser and saved on the user hard drive. Cookies also make it possible.
Dark net . . Invisible Web . . Hidden Web . .
1 Freedom of Expression Prepared By Joseph Leung.
Anonymity on the Internet Jess Wilson. Anonymizing Proxy What is a proxy? – An intermediary between you and the internet How does it make you anonymous?
Mgt 20600: IT Management & Applications Telecommuncations and Networks Tuesday March 28, 2006.
ToR. Tor: anonymity online Tor is a toolset for a wide range of organizations and people that want to improve their safety and security on the Internet.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Harvard University CSCI E-2a Life, Liberty, and Happiness After the Digital Explosion 2: Privacy.
Tracking, Privacy, You & The 21 st Century When you talk online the internet listens.
Scams Stevie's Scam School videos
 Digital marketing: Uses digital media to develop communications and exchanges with customers  Electronic media (E-marketing): Refers to the strategic.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
Norman SecureSurf Protect your users when surfing the Internet.
RSS (Really Simple Syndication) Feed Created Revised 6/9/ Office of Information, Technology and Accountability.
Sofya Rozenblat 11/26/2012 CS 105 TOR ANONYMITY NETWORK.
Privacy refers to being free from intrusion—the right to be left alone, to be free from surveillance, and to have control over the information collected.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Protecting your Family From the dark places on the Internet Going beyond the standard PC Filter, and dealing with the multiple devices that access the.
© Copyright 2012 STI INNSBRUCK Tor project: Anonymity online.
CHAPTER 2 Communications, Networks, the Internet, and the World Wide Web.
Cyber Crimes.
CSE 486/586, Spring 2012 CSE 486/586 Distributed Systems Case Study: TOR Anonymity Network Bahadir Ismail Aydin Computer Sciences and Engineering University.
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
Internet SafetyInternet Safety Danita RussellDanita Russell Intro.
Mi-Gyeong Gwak, Christian Vargas, Jonathan Vinson
Computer and Internet privacy (2) University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot Feb 2011 Feb 2011 ITSS 4201 Internet.
Internet  Major:Safety science and engineering  Author:jiangqian( 蒋乾 )
Presented by: Your Name Your Phone Number Your Website Address How Mobile Apps Can Help You Connect With Local Consumers.
What Is Wiki ? Wiki is a piece of server software that allows users to freely create and edit Web page content using any Web browser. Wiki supports hyperlinks.
Shelby Foster. Cyber Stalking- Use of internet or electronic devices to harass an individual or organization “Cyber stalking usually involves a course.
Networked Communicators in Burma Fight for Democracy Soe Myint, Mizzima News Yogyakarta, Indonesia November 4-7, 2007 Please note that photos have been.
Communication Systems The Internet The largest wide area network in the world. It is made up of thousands of linked networks. What.
NETWORK HARDWARE AND SOFTWARE MR ROSS UNIT 3 IT APPLICATIONS.
CHAPTER 17 INTERNATIONAL MARKETING IN E-COMMERCE.
ICS 424: Freedom of expression Aj. Thoranin Intarajak.
Jeff Reintjes, Kevin Hao, Carinne Rawlins. Background 1975 in Redmond, WA 3 rd most successful start-up company ever Founded by Bill Gates and Paul Allen.
The Silk Road: An Online Marketplace
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
Understand Internet Security LESSON Security Fundamentals.
COMPUTER INTERNET, INTRANET & EXTRANET. INTERNET 1) It is a worldwide system which has the following characteristics: 2) Internet is a world-wide / global.
30 Apps for Librarians Sana Moulder & Bryson Kopf.
Internet Privacy Define PRIVACY? How important is internet privacy to you? What privacy settings do you utilize for your social media sites?
Reach people on mobile. Mobile Search Ads Reach people with Mobile Search Ads.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
#ABATECHSHOW PRESENTED BY: The Deep Dark Web Presenters John Simek #Idon’tTweet Amanda
ANONYMIZING / WEB PRIVACY. TOOLS: STAYING ANONYMOUS ON THE INTERNET Proxy Server Tor.
The Hacking Suite For Governmental Interception. The pain: the impact of encryption on Law Enforcement and National Security FBI - Statement Before the.
Lecture 3 1Norazirah Ayob, FEB. Ch  Technology advances allow individuals to self-select  what,  when, and  where messages are sent and received.
Benjamin Knapic Nicholas Johnson.  “Tor is free software and an open network that helps you defend against a form of network surveillance that threatens.
The Hacking Suite For Governmental Interception. Which are todays challenges? Encryption Cloud Mobility.
Hotspot Shield Protect Your Online Identity
VPN Joshua Turner.
Dark Web – the modern threat for the Internet Security
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Privacy Online.
PART III Ethical Issues in Business
McAfee Total Protection 2018 Protection for PC, MAC, Smartphones and Tablets.
Exercise ?: TOR.
Chapter 7 Electronic Business Systems
The dark web By Riley. Sampare.
Chapter 7 Electronic Business Systems
Privacy and Data Mining
Presentation transcript:

Digital Law -The Deep Web- Digital Law -The Deep Web- Liam Leppard Matthias Lee Russell Wong

WHAT IS Tor (The Onion Router) is a technology that allows people to browse the web and access online services without revealing their identities. Originally developed with the U.S Navy in mind for the purpose of protecting government communications Normal people Militaries Journalists and their audience Law enforcement officers (Police) Activists & Whistleblowers Business executives (Investment bankers) IT professionals Who uses Tor?

HOW DOES WORK? The Tor network directs traffic through a worldwide, volunteer network consisting of more than 5,000 relays. Your identity is disguised as your traffic is encrypted as it move across Tor’s thousands of servers.

IS LEGAL? YES! You can use it as you would like any other Internet Browser. Many people are now beginning to use TOR as a way of maintaining their privacy whilst online. Due to anonymity that TOR offers, the Deep Web has become a popular nesting ground for criminal activities. BECAREFUL of the dark side. THIS INCLUDES THINGS SUCH AS

DEEP WEB CURRENCY Ever wondered what is the preferred medium of exchange in the deep web? The digital black market needs the digital equivalent of cash. And that's exactly what Bitcoin is. Bitcoin, like cash, allows transactions to be made anonymously bitcoin Why Bitcoin?

WHAT DO YOU THINK OF OR

THE LEGAL GRAY ZONE

(Map of Tor Usage around the world.)

WHY USE TOR? Anonymity Online Tor protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world Prevents somebody from watching your Internet connection from learning what sites you visit, and it prevents the sites you visit from learning your physical location.

WHO ARE THE ENEMIES OF INTERNET FREEDOM? NSA Government convinced the major telecommunications companies in the US, including AT&T, MCI, and Sprint, to hand over the “call-detail records” of their customers. Included “customers' names, street addresses, and other personal information Same telecommunications companies also allowed for installation of sophisticated communications surveillance equipment in secret rooms at key telecommunications facilities around the country Access to large streams of domestic and international communications in real time

WHAT CAN THEY ACCESS? Weakening privacy Project Bullrun aimed to weaken online privacy by inserting vulnerabilities into commercial encryption systems. Monitoring citizens Under the auspices of the Foreign Intelligence Surveillance Act, the PRSIM surveillance program set out to monitor electronic exchanges among users of Google, Facebook and Skype. Smartphone spying The NSA is capable of accessing users’ data from leading manufacturers of smartphones, including iPhones and Android mobile operating systems.

QUESTION Do you think it is right for the NSA to be constantly monitoring us? Why?

WHO ELSE IS WATCHING? Countries on every continent have formed special organizations and task forces to monitor the activity of not only their own citizens, but of people around the world. They’re not only monitoring activity, but restricting it as well. Any website deemed illegal or harmful to their citizens is blocked, including news sites, blogs, and even social media. In some countries they can even enter your home to search for illegal media if evidence of your activities is found online. Even countries you may think of as valuing the freedom of their citizens may not be governed by people who believe in a free Internet.

REFERENCES

Have you ever wanted to browse the Internet anonymously? The truth is that browser settings such as "incognito mode" or "private window" don't quite cut it. If you want real anonymity, you're going to want to use The Onion Router, aka Tor. Surprisingly, Tor was created with financial support from the US government, which wanted to promote the free flow of information. Government support for Tor has continued in recent years as part of the State Department's internet freedom agenda, which seeks to help people in repressive regimes gain access to information censored by their governments. In 1984(novel), a government known as Big Brother controls nearly every aspect of citizens' lives. TO BE DELETED. It’s for extra info.