The DARK NET/WEB – a short Summary.

This connects to : CHINA: “Cat Torture Ring”, “Crush Videos”

England – On Friday 2nd February, two young teenagers – a boy and a girl, were given 22 years and 20 year prison sentences respectively for the murder of another innocent teenager.

https://www.bbc.co.uk/news/uk-england-manchester-68184224

From what is being said, the two murderers did a lot of communication – including the planning of the murder, in which this poor girl was stabbed no less than 28 times ! – which was undertaken using the “Dark Web or DARK NET’.
Through our work relating to Chinese cat torture/abuse/killings and the production and distribution of “Crush Videos“, we know that this is also, in the main, done using the Dark Web – given that these activities are, in many countries, illegal and subject to criminal investigation and punishment.

So what exactly is the Dark Web; what is special to it and how does it operate when compared to the ‘normal’ web ?
Hopefully we can give you an oversight of what it is about; and why it is so very difficult to track the perpetrators of these terrible crimes or other illegal activity associated with it.

Murder and gross abuse of Human and non-Human alike – the Dark Web seems to be a place where both can thrive undetected.

So, what is it ?

By the definition given on “www.pcmag.com” the Dark Web is ..

A file sharing network used to illegally distribute copyrighted music and videos, as well as nefarious documents.

The Dark Web is the World Wide Web content that exists on darknetsoverlay networks which use the Internet but which require specific software, configurations, or authorization to access. Through the Dark Web, private computer networks can communicate and conduct business anonymously without divulging identifying information, such as a user’s location, i.e. IP (IP: see below).

We all use URLs, or a Uniform Resource Locator during our daily computer work to visit webpages and other resources on the web. The URL is an address that sends users to a specific resource online, such as a webpage, video or other document or resource. When you search on Google, for example, the search results will display the URL of the resources that match your search query. The title in search results is simply a hyperlink to the URL of the resource.

“Although we use a “Clustrmap” on our site, which you can view at https://clustrmaps.com/site/1a9kn – you will see that there is no specific detail for any visitor; other than the country of origin, as the flags show. For us, the “Clustrmap” is used solely as a resource for identifying where visitors (to the site) are from, and to potentially see, by the absence of visitors from certain countries, which areas, in terms of “Animal Welfare/Rights” news, are under-represented on the site.

Hence it is for us a very useful identifier of where the current site visitors are located – UK, USA, Italy, Netherlands etc.

The IP Address

The Dark Web forms a small part of the deep web, the part of the web not indexed by web search engines, although sometimes the term ‘deep web’ is mistakenly used to refer specifically to the Dark Web.

An Internet Protocol address (an ‘IP’ address) is a numerical label such as 192.0.2.1 that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface identification, and location addressing.

As a word of warning, your own IP address is something you should guard. Many of these Dark Web sites use applications such as “IP loggers”, which record your IP upon visiting, and so disclose to the potentially criminal users of these services your personal data, such as your exact location, etc.
So please be mindful, ideally DO NOT visit such sites/networks – even if, as in the case of the Crush Video/Cat Torture groups, you wish to assist in bringing these “people” to justice.

The Deep Web

The Deep Web, also referred to as the ‘invisible web‘[, or ‘hidden web‘ are parts of the World Wide Web (www) whose contents are not indexed by standard web search-engine programs. This is in contrast to the “surface web“, which is accessible to anyone using the Internet. 

Deep Web sites can be accessed by a direct URL or IP address, but may require entering a password or other security information to access actual content. Uses of Deep Web sites include web mailonline bankingcloud storage, restricted-access social-media pages and profiles, and web forums that require registration for viewing content. It also includes paywalled services such as video on demand and some online magazines and newspapers.

The Dark Nets which constitute the Dark Web include small, friend-to-friend networks, as well as large, popular networks such as TorFreenetI2P, and Riffle operated by public organizations. Individuals users of the Dark Web refer to the regular web as Clearnet due to its unencrypted nature.

So all data on the net is either unencrypted (not converted into a code), or encrypted (converted into a code), for a variety of reasons. Usually encryption is used to protect data from access by unauthorized persons, or indeed to conceal potentially illegal activity, as in the case of the Dark Web. Encryption is also used to conceal/hide data itself by converting it to (often nonsensical) “code”, altering its entire appearance, and so masquerading as something it is not.

Another way of making it hard for outsiders to access “sensitive” or forbidden data is the hiding of data in a layered construct, much like, and so called, an onion – the TOR Dark Web, or otherwise known as “onionland]” uses this technique. It is a traffic anonymization technique of onion routing under the network’s top-level domain suffix .onion.

Onion routing refers to the fact that Tor encapsulates your internet traffic in layers of encryption, which are nested like the layers of an onion.
Onion routing is the reason why, when you access a site through Tor, it takes a very long time to load – your internet traffic is being routed through many different Tor “nodes” (volunteers on the network who are helping run it on their devices).

Perhaps not quite as complex and futuristic as in this clip, but you get the idea:
https://www.youtube.com/watch?v=YOQUVpEGyqg

We cannot, here, go into more detail – “World Animals Voice” is not a site devoted to technical issues. It was, however, our intention to give you some idea why pursuing the perpetrators committing the terrible crimes we have highlighted so far – and will continue to do so – is difficult.

However, once again: we will renew our commitment, together with all the cooperating parties, and our supporters, to this cause, and the animals concerned.

To those hiding in the shadows, feeling safe and sneering at those who pursue them, we will say this:

YOU WILL BE FOUND, AND YOU WILL FACE THE CONSEQUENCES. MAKE NO MISTAKE

Mark & Diana

Here are past links to our work associated with Cat Torture, Crush, and animal liings by perverted supporters who use the above to cover their tracks and identities.

China: ‘Crush’ Information. – World Animals Voice

China: Did You Hear the One About the Sick Pervert of a Doctor Who Lures Teenage Girls Into Pornography and Then Uses Them In An Animal ‘Crush’ Video Website ? – World Animals Voice

China: INVESTIGATION: Inside the sadistic world of the gruesome cat torture craze, campaigners call on Chinese authorities to act NOW. – World Animals Voice

EXPOSING AND COMBATING CAT TORTURE NETWORKS. 6/1/24. – World Animals Voice

China: Cat Torture Actions Follow Up – No. 1 – World Animals Voice

China – Cat Torture – Major Information and Actions – Follow Up No. 2 – World Animals Voice

A new Chinese cat torturer is identified and exposed:

The fight to defend terribly abused animals continues.

2 thoughts on “The DARK NET/WEB – a short Summary.”

Leave a comment