“Can You Teach Me How to Navigate the Dark Web?”
go.ncsu.edu/readext?1042843
en Español / em Português
El inglés es el idioma de control de esta página. En la medida en que haya algún conflicto entre la traducción al inglés y la traducción, el inglés prevalece.
Al hacer clic en el enlace de traducción se activa un servicio de traducción gratuito para convertir la página al español. Al igual que con cualquier traducción por Internet, la conversión no es sensible al contexto y puede que no traduzca el texto en su significado original. NC State Extension no garantiza la exactitud del texto traducido. Por favor, tenga en cuenta que algunas aplicaciones y/o servicios pueden no funcionar como se espera cuando se traducen.
Português
Inglês é o idioma de controle desta página. Na medida que haja algum conflito entre o texto original em Inglês e a tradução, o Inglês prevalece.
Ao clicar no link de tradução, um serviço gratuito de tradução será ativado para converter a página para o Português. Como em qualquer tradução pela internet, a conversão não é sensivel ao contexto e pode não ocorrer a tradução para o significado orginal. O serviço de Extensão da Carolina do Norte (NC State Extension) não garante a exatidão do texto traduzido. Por favor, observe que algumas funções ou serviços podem não funcionar como esperado após a tradução.
English
English is the controlling language of this page. To the extent there is any conflict between the English text and the translation, English controls.
Clicking on the translation link activates a free translation service to convert the page to Spanish. As with any Internet translation, the conversion is not context-sensitive and may not translate the text to its original meaning. NC State Extension does not guarantee the accuracy of the translated text. Please note that some applications and/or services may not function as expected when translated.
Collapse ▲In a post class evaluation I was posed a provocative question: “Can you teach me how to navigate the dark web?”
One word picture used to describe the dark web, is an iceberg.
We see the tip, the Internet we use for ordering groceries or responding to social media posts, but there is a dark mirror that lurks beneath. N.C. Cooperative Extension values research and evaluation, so I listened and considered the value of this feedback. The thought experiment led to this article on cybersecurity and the veracity of information. Cybersecurity is the discipline of guarding networks and individuals against scams, phishing, misinformation, malware and even social engineering. The Internet has vast amounts of information but not all of the posts are true.
In a recent poll by Pew Research, 73% of Americans said they have seen inaccurate news coverage about the 2024 presidential election at least somewhat often. (Pew Research)
The evaluation response about the dark web led me to revamp the curriculum I was teaching on cybersecurity. One response was to research the pathways of data and how those packets may be intercepted. (MIT Introduction, Verizons 2024 report). Virtual private networks as defined by Cisco are a tool that creates a secure connection between a device and a remote server, allowing users to transmit data over the Internet safely and anonymously (Cisco). Ironically, a 2022 congressional report verifies that vpns are also the tool used by criminals in navigating the dark web. I was prompted to consider how innovative criminal thinking can be and it led me to consider how outside of the box thinking can sharpen the response of cybersecurity. What are the ethical solutions to these challenges?
The field of integrated marketing communication investigates the realm of global marketing. Historically, media technology required significant capital and thus only a few voices could afford to broadcast the news and market products and services. The technological advancements of the Internet, including social media has leveled the playing field, anyone can speak to everyone. Misinformation and polarization have become unwanted results in this stage of media technological advancement.
Historically, the world’s largest library is a victory of intellectual and historical achievement.
- In 323 B.C. the Library of Alexandria was created and then burned by Julius Caesar in 48 B.C.
- In the 8th Century Hanlin Library was created in present day Beijing. It was later burned during the Boxer Revolution in 1900.
- Currently the U.S. Library of Congress is the world’s largest library. Its first iteration began in 1800 and was burned down by the British in 1814, later to be reestablished with the purchase of Thomas Jefferson’s personal library.
But if we consider the largest repository of data, the Internet is the winner. Currently, the data created, copied and consumed is around 147 zettabytes. (Statistica) That is about 250 billion DVDs. By 2028, that number is projected to double. What is tricky about this digital library is that not all of the data is stored longterm. In 2020, there was only about 6.7 zettabytes of standing storage available, with a growth rate of over 19 percent from 2020 to 2025. When will we reevaluate the storage limits of what qualifies for longterm storage?
Media technology has taken a turn in an unpredictable direction with artificial intelligence.
AI filters our search engine results, AI ranks and recommends our social media feeds. AI collaborates with us on creative content from news articles to deep fakes. AI scrapes the Internet for training and building data sets. AI has become the Internet’s librarian.
The dark web values obfuscation and veils of secrecy. Misinformation in social media is similar to sleight of hand with distraction and polarization. Knowledge is power and the accessibility of information on the Internet is dramatically changing the perception of companies internally and externally. Research by MIT indicates that the desire of Internet consumers is leading to an “Age of Transparency.” What’s interesting is that the desire for authenticity and veracity in messaging has become all the more important. Which leads to the questions:
- In a library without borders, how will our communities respond to knowing everything and will they take the time to verify if the information is true?
- How will we move as institutions to safeguard the information that should be confidential?
- What policies will the U.S. establish in regards to data ethics in the age of using artificial intelligence as the librarians of the Internet?
Here are a few additional resources on the topics of cybersecurity and information veracity.
- Learn more about cybersecurity.NIST.gov
- Use strong passwords. Password strength testing tool by Bitwarden
- Backup your data regularly. Google Drive and Paragon offer free options.
- Be careful about passing sensitive data when using open networks, those without a closed padlock in your Internet browser.
- Consider using a vpn. (Guide for vpns).
- Update your software regularly.
- Verify all news stories.
- Join a class on the topics of cybersecurity, scam prevention or social media.
If you’re interested in any of these types of classes or digital literacy in general, please refer to the Guilford County calendar: https://guilford.ces.ncsu.edu. Questions? Contact our digital skills agent, Jeffrey Cates with questions: jeff_cates@ncsu.edu, 336.641.2400.