Deep web – a.k.a. underground Internet – is an immense universe of information that is hidden from the naked eye of the common Internet user. Information that exists in the deep web is mostly untraceable by search engines such as Google and popular browsers e.g. Chrome, Firefox etc., and special techniques or tactics may be needed to access the data. But what goes on in the underground Internet that makes it so enticing and mysterious? And is it possible to trace the activities of individuals and groups dealing within the deep web? Let us find out!

What Goes on in Deep Web?

Many people believe that the deep web holds some of the greatest secrets the Internet has to offer – and that is partly true. This deep, dark part of the Internet is a hub of illegal and dangerous activities, including drug dealing, guns, child pornography, mafia rings, sale of private jets at extremely competitive prices, and even assassins and hit men for hire. Some of the sites even provide links to grotesque scenes of child abuse! On this platform, trade of illegal goods takes place openly and freely, and one can get hold of virtually all kinds of drugs such as Ecstasy, heroin, ketamine, cocaine, MDMA etc, and get them delivered at their doorstep! What’s interesting is that all of these are totally untraceable by search engines.

Authorities have also expressed a concern regarding terrorists who are believed to be plotting and communicating through this medium without the fear of detection, making it all the more difficult for security forces to catch them. For example, there is a website that aims to provide Muslims with guidelines on carrying out Jihad against the Western world.

Is it Traceable?

The transactions that take place between individuals in the deep web are done by using Bitcoins, a digital form of currency that cannot be traced. Moreover, the software used by websites in deep web completely hides your identity as well as the identity of the other party you are dealing with by encrypting all your data and directing you through a network of various Internet protocol addresses.

It is extremely difficult for security forces to trace the activities going on within this part of the Internet without the use of latest techniques and technology. According to Internet security expert, John Carr, we have to look forward to the time when user authentication is at the core of the Internet, so that any such activities may be effectively traced and those responsible can be apprehended.