Hero background

Beneath the Web

Technology • Year 9 • 45 • 6 students • Created with AI following Aligned with Australian Curriculum (F-10)

Technology
9Year 9
45
6 students
4 April 2025

Teaching Instructions

Create an easily accessible lesson for students at a behavioural school about the Dark Web & Stolen Information. Include really interesting examples/stories and prepare all documents needed

Beneath the Web

Overview

This engaging and age-appropriate 45-minute Technology lesson is designed for Year 9 students in a behavioural school context. It explores the hidden parts of the internet, specifically the Dark Web and how personal information can be stolen and misused. Using vivid examples, simple explanations, and interactive activities, students will develop digital literacy and gain awareness to protect themselves online.


Australian Curriculum Links

Learning Area: Technologies → Digital Technologies

Year Level: Year 9

Curriculum Strands:

  • Knowledge and Understanding
    Evaluate how text, images, and sound data can be manipulated and secured (ACTDIK034)
  • Processes and Production Skills
    Critically analyse problems and evaluate solutions, taking into account privacy and cybersecurity considerations (ACTDIP036)

Learning Intentions

By the end of this lesson, students will:

  • Understand that the internet has different layers, including the Surface Web, Deep Web, and Dark Web.
  • Recognise real-world consequences of stolen personal information.
  • Reflect on how personal actions online can protect or expose sensitive data.
  • Discuss ethical and legal issues relating to data privacy and online behaviour.

Success Criteria

Students will be successful when they can: ✔ Explain the difference between the Surface Web, Deep Web, and Dark Web.
✔ Discuss a true story about stolen information from Australia.
✔ Identify ways to protect their personal information online.
✔ Participate in discussion and group decision-making activity.


Resources Needed

  • Printed handout: “Layers of the Internet” diagram
  • Printed role-play scenario cards (see below)
  • Butcher’s paper and markers
  • Whiteboard and markers
  • Starter Slides (Teacher pack provided)
  • Exit ticket slips (included below)

Lesson Breakdown: 45 Minutes

1. Warm-Up Activity – “Three Layers of the Web” (5 minutes)

Purpose: To activate prior knowledge and introduce the layers of the internet.

Instructions:

  • Ask: “How many of you have ever Googled something today?”
  • Display the “Layers of the Internet” diagram (printed or drawn on board).
  • Ask students to guess what might exist in the “bottom layers.”
LayerDescriptionCan we access it with Google?
Surface WebEveryday websites (YouTube, news)✅ Yes
Deep WebHidden content (bank logins, emails)❌ No
Dark WebEncrypted, anonymous networks❌ No

2. Story Time – Real Example: “The Medicare Hack” (10 minutes)

Purpose: Generate interest using a real Australian case.

  • Share this simplified, dramatic retelling:

In 2017, someone used the Dark Web to sell Medicare details of Australians—including names, numbers, and personal info. One journalist was able to “buy” her own Medicare details for just $30.
This wasn’t a movie—it happened in Australia. The hacker used a weakness in an online form that didn’t need a password to access private info.

Discussion Questions:

  • How would you feel if someone sold your Medicare information?
  • Who should be responsible for protecting this information—us, the government, or both?

(optional: allow students to act out short parts of this scenario)


3. Activity – “Hack Attack” Group Roleplay (20 minutes)

Instructions: Split the class into 3 pairs. Each pair receives a different Scenario Card (see below), detailing a realistic Australian-based case related to data theft or the Dark Web.

Pairs prepare a short skit (2 minutes) and answer the following:

  1. What happened?
  2. What was the consequence?
  3. How could it have been prevented?

Roleplay Scenarios:

Scenario #1: "Jaylen’s Snap Hack"

Jaylen clicked a suspicious link on Snapchat. His camera roll and location were instantly accessible. The attacker threatened to release private photos unless paid in crypto. Jaylen didn’t even know this was possible.

Scenario #2: “Stolen School Emails”

A local high school experienced email hacking. A student responded to a fake school admin email. Timetables and assignment info were leaked, and some student accounts were locked out.

Scenario #3: “The Marketplace Mystery”

Someone bought fake IDs, drugs, and stolen credit card details via the Dark Web in a Sydney suburb—and posted about it on TikTok. Days later, the student was arrested. The police had been monitoring the site for months.

Whole Class Share & Discussion (5–7 minutes):

  • Each pair shares their scenario.
  • Rapid brainstorm: “How can we improve online safety in schools?”

4. Takeaway – “Protect Yourself Online” Quick Tips (3 minutes)

Teacher-led recap of tips:

  • Use strong, unique passwords.
  • Don’t click suspicious links, especially from unknown sources.
  • Use 2-step authentication.
  • Keep accounts private.
  • Never share personal info—even with someone you trust online.

5. Exit Ticket Activity (2 minutes)

Students complete a quick sentence on a slip of paper:

📝 “My biggest takeaway about online safety today is…”
Collected as they leave to measure understanding.


Extension / Follow-up Activities

  • Write a news article or record a video PSA as a cybersecurity journalist.
  • Design a poster warning others of something you learned today about protecting personal info.

Differentiation

  • Behavioural Support: Ground students early with clear expectations and pacing. Use student interests (e.g., social media risks) as entry points.
  • Engagement: High energy, short bursts of input, and interactive performance work to hold attention.
  • Tiered Questions: Allow some students to present a poster or summary if performing causes anxiety.

Assessment

Formative Assessment:

  • Observations during roleplay prep: listening, collaboration, understanding.
  • Participation in discussion.
  • Exit Ticket response: shows individual understanding.

Teacher Preparation Resources

Printable Handout – Layers of the Internet

(Black & white for easy printing)

Title: Three Layers of the Internet
Visual: Use concentric circles or pyramid shape

  • Surface Web – Websites like Google, YouTube, School Pages
  • Deep Web – Private email, medical records, banking
  • Dark Web – Hidden networks often used for illegal trading

Printable Roleplay Scenario Cards

[See scenarios in Section 3 above – print and distribute]


Exit Ticket – Print or cut up this prompt:

"My biggest takeaway about online safety today is ____________."


Reflection + Advice for Teachers

Teachers in behavioural schools may find abstract concepts like the Dark Web difficult to unpack. Keep the energy high and the focus on real, local, shocking stories to drive personal relevance. Use simple, clear language and offer multiple ways to express understanding. AI can help create accessible entry points to complex technology topics—this lesson is a strong example of that.


Prepared by AI, aligned to Australian Curriculum – ready to print and go!

Create Your Own AI Lesson Plan

Join thousands of teachers using Kuraplan AI to create personalized lesson plans that align with Aligned with Australian Curriculum (F-10) in minutes, not hours.

AI-powered lesson creation
Curriculum-aligned content
Ready in minutes

Created with Kuraplan AI

🌟 Trusted by 1000+ Schools

Join educators across Australia