In recent years the United States has found out that they are not the sovereign super power they once thought they were. The economic boom of India and the increase in production, trade and sheer population growth in China has contributed to the countries rise on a global scale. However, the States still remain the oldest and perhaps most military advanced and important player in world politics. There is no doubt that many countries look to the United States when it comes to times of crisis. With hard lines on “terrorism” both at home and abroad the States continues to adapt to technological advancements in order to stay ahead of the opposition. Despite being a country that incorporates the lyrics “the land of the free” into their national anthem, the United States is anything but. The development of technologies like the internet has made it increasingly harder for the government to monitor what its people are doing. In today’s current political and social climate the government’s desire to monitor those online is usually met with resistance. Those against it dove into the deep web in hope to seek refuge from prying eyes.
America appears to by fighting a war on several fronts. This research paper has an overarching theme of war running through it, which seems somewhat appropriate because a battlefield seems a somewhat appropriate synonym for the internet.
The deep web itself is a kind of digital civil war between the citizen who demand privacy and anonymity online and the governments who want to control everything. As the governments abuse their power to invade personal information of its citizens, the people opposing it continue to develop this platform where they can be safe, anonymous and free. Although its creation was orchestrated by the United States government, The Onion Router (Tor) gave refuge to those who sought after privacy. Yet with recent information leaks, it appears that this may not be the case. This part of the report looks at both the positive and negative aspects of Tor, focusing on the potential breach of the router and the issues that may arise from it.