The Invisible Areas Of The World Wide Web

Even after more than 20 years of online access, the world is still at the beginning of the Internet revolution. 

Now the importance and influence of digital technology and media has already dwarfed that of television.  The pace of digital change and its impact will continue to accelerate over the next ten years.

 

The Internet: Still in the Early Evolutionary Stages
The Internet has globally transformed data and communications like nothing before. The inventions of the telegraph, telephone, radio, television and computer set the stage for this unprecedented integration of capabilities. The Internet is at once a world-wide broadcasting capability, a mechanism for information dissemination, and a medium for collaboration and interaction between individuals and their computers without regard for geographic location. 

The history of the Internet begins with the development of electronic computers in the 1950s. Initial concepts of wide area networking originated in several computer science laboratories in the United States, United Kingdom, and France. 
The Internet represents one of the most successful examples of the benefits of sustained investment and commitment to research and development of information infrastructure. 

Beginning with the early research in packet switching, the government, industry and academia have been partners in evolving and deploying this exciting new technology. Following the Second World War and lasting through to the late 1980’s, a Cold War was fought between the world’s two superpowers, the United States and the now defunct Union of Soviet Socialist Republics. 

While military build ups, political sparring, and diplomatic manoeuvring were the most obvious activities, there were also many spin-off effects into other areas including some nearer and dearer to the heart of librarians and documentarists, such as research and education. For example, the Soviet Union’s jump-start of the space race with the launch of the Sputnik satellite in 1957 sparked a dedicated effort in the United States to boost scientific research. Academic and research libraries, by and large, became beneficiaries of the government largesse that resulted from this “knowledge race.” 

Collections boomed in order to keep up with the production of scientific literature. In order to control the resulting surge in bibliographical data, computers were enlisted to process the information then published as print or microfilmed indexes, and which subsequently would be transformed into databases accessible through the large host services that sprang up in the early 1970s 

This Internet now includes the World Wide Web which includes both the Deep Web and the Dark Web.
The Dark Web has a sinister, even foreboding, reputation for good reason. People go to the Dark Web to anonymously buy illegal narcotics, even to see child pornography.  Terrorists use the dark web to hide and organise. There are libraries of pirated books and music on the dark web. If the internet is an online world of towns and cities, then the dark web is the red-light districts, the hideouts of criminals and all the other dark alleys and criminal enterprises that exist the underground economy.

Nevertheless, the dark web is growing. More than growing, before long it will change the Internet as we know it.
Now okay, with that opening you might be picturing a darkness descending, pushing out the light of the Internet. In your head might be scenes reminiscent of a modern Batman movie as some villain takes over Gotham by shutting out the lights.
The thing is there is a lot more to the dark web than villains of every type.

The dark web is simply the portion of the Internet that can only be accessed on darknet, overlay networks that require specific software, configurations or authorisation to access.  The dark web is only a small part of the deep web, as the “deep web” is the portion of the Internet not indexed by web search engines.

Basically, the dark web is comprised of small peer-to-peer networks and larger and growing dark web networks like Tor, Freenet and I2P. The Tor portion of the dark web requires someone to download free software to be used as a browser. 
The name “Tor” comes from an acronym for the original software project name “The Onion Router.” Tor simply directs Internet traffic through a free, worldwide, volunteer overlay network. Round and around your signal goes in thousands of relays in an unknown sequence. This conceals your IP address and location.

The dark web then is certainly used by criminals, but it is increasingly also being used by individuals in countries that ban access to certain parts of the Internet, or that even hunt down and arrest people who say certain things or communicate with political dissidents.

The dark web is also being used by people in freer nations who simply are tired of their Internet traffic being watched and monetized by corporations. Some people would also rather not have their Google searches used against them in the future. Many aren’t interested in criminal behavior, but just have a penchant for privacy from government surveillance or the corporate world.

For more information: please read Cyber Security Intelligence’s book Easy Cyber Knowledge

Medium:           DigitalCenter

You Might Also Read:

Going To The Dark Web:

 

 

« Cyber Attacks On Africa Are Soaring
Few Businesses Are Ready For California’s New Consumer Data Privacy Law »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Assured Data Protection

Assured Data Protection

Assured Data Protection specialises in data protection and disaster recovery services for large SME and enterprise organisations.

Secure Thingz

Secure Thingz

Secure Thingz focus on developing and delivering advanced security solutions into the emerging Industrial Internet of Things (IIoT) and Critical Infrastructure markets.

CyberOne

CyberOne

CyberOne (formerly Comtact) offer a full stack cybersecurity service to ensure our customers understand the cyber maturity of their organisation.

Executive Women's Forum (EWF)

Executive Women's Forum (EWF)

The Executive Women's Forum is the largest member organization serving emerging leaders and influential female executives in the Information Security, Risk Management and Privacy industries.

Subgraph

Subgraph

Subgraph is an open source security company, committed to making secure and usable open source computing available to everyone.

Cobalt Labs

Cobalt Labs

Pen Testing as a Service for Modern SaaS Businesses. Cobalt is redefining the modern pen test for companies who want serious hacker-like testing built into their development cycle.

Qufaro

Qufaro

Qufaro is a new initiative designed to make it simpler for those with career ambitions in cyber security to access the UK’s cyber-specific education and innovation opportunities.

Horiba Mira

Horiba Mira

Horiba Mira is a global provider of automotive engineering, research and test services including services and solutions for automotive cybersecurity.

IntelliDyne

IntelliDyne

IntelliDyne is a leading information technology consulting firm enabling better mission performance through innovative technology solutions.

Shield Capital

Shield Capital

Shield Capital helps founders build frontier solutions in cybersecurity, artificial intelligence, space & autonomy for commercial and government enterprises.

Atomic Data

Atomic Data

Atomic Data is an on-demand, always-on, pay-as-you-go expert extension of your enterprise IT team and infrastructure.

HiddenLayer

HiddenLayer

HiddenLayer is a provider of security solutions for machine learning algorithms, models and the data that power them.

Cybernatics

Cybernatics

Cybernatics is inspired by bringing together best-in-class innovations around Cybersecurity and Analytics. We offer tailored enterprise solutions to safeguard your organisations best interests.

Cysurance

Cysurance

Cysurance is a next-generation risk mitigation company that insures, warranties and certifies security solutions.

Stratascale

Stratascale

Stratascale is a consultant, systems integrator, and technology advisor with expertise in Automation, Cloud Ascension, Cybersecurity, Data Intelligence, and Digital Experience solutions.

IDCARE

IDCARE

IDCARE is Australia and New Zealand’s national identity & cyber support service. Our service is the only one of its type in the world.