8. Terrorism and Espionage
It is expected that terrorist will enjoy the benefits of complete anonymity of the Deep Web. Although they use the Visible Internet for recruitment, for detailed and specific communication they usually turn to Deep Web. According to CNN, ISIS is also using cyber-world as its weapon. All of this is possible by using TOR and even the best intelligence agencies are in the dark about criminals’ communication on the Dark Web.