MENU

 

The following information was obtained from the different cyber security sources for notification to all parties concerned pursuant to the mandate of the Philippine National Police Anti-Cybercrime Group (PNP ACG).

The information provided was classified as Restricted pursuant to the PNP Regulation 200-012 on Document Security and Impact Rating as high based on PNP Information Communication Technology (ICT) Security Manual s.2010-01 p. 22 and p.129.

SUMMARY

There are 3 layers of the Internet: the surface web, the deep web and the dark web.

The surface web is also known as the world wide web, clearnet or the visible net. This is the topmost level of the web which is searchable by surface crawlers such as Bing, Google and Yahoo.

The second layer of the Internet is the deepweb also known as the deepnet, the invisible web or the hidden web. This portion of the Internet is not reachable by the traditional search engines, accessible but not indexed. It may require username and password before it can be accessed. Some common examples of the deep web includes academic information, medical records, legal documents, government resources, subscription information, scientific reports, corporate intranets and the like.

The last layer is the dark web which is also known as the darknet. It is a small portion of the Internet that is intentionally hidden, restricted, encrypted and not fully indexed. This layer of the Internet is often associated with criminal activities.

The dark web creates an overlay network, a new network that rides on top of the Internet which control how data flows between devices but still relies on the connectivity provided by the Internet. It uses the new control to keep any two computers from directly connecting and making it hard to trace the sender or the receiver of the data.

The dark web make use of anonymity to enable secret communications, peer-to-peer (P2P) file sharing, anonymous access to the Internet, and hidden market places for trade of illegal items. The dark web is accessible via specialized or proxy configurations such as the onion router (TOR), I2P and Zeronet. It is used for circumventing Internet filters, free speech chat forums, anonymous reports to journalists, conducting black market trade, exploiting children, sharing terrorism techniques and tools, sharing malware and software, and engaging in financial card fraud.


RECOMMENDATION

PNP personnel and the public are advised to be extra careful when using specialized engine to explore the dark web. It may contain a wealthy valuable information but be warned that it is a dangerous place. You may never know whom you are dealing with and what information may have been stolen from you when you enter into the dark web.

For additional information, please refer to the following websites:

• https://en.wikipedia.org/wiki/Dark_web
• https://darkwebnews.com/help-advice/access-dark-web/
• https://www.quora.com/What-is-the-deep-dark-web-and-how-do-you-access-it
• http://www.iflscience.com/technology/what-dark-web

POINT OF CONTACT

Please contact CSRAD, PNP ACG for any inquiries related to this CYBER SECURITY BULLETIN at This email address is being protected from spambots. You need JavaScript enabled to view it. or call 7230401 local 5337.