How Does Snowden Lose Privacy

Better Essays
Losing Privacy to Capture Criminals

With the loss of privacy becoming an uncompromising way of the future, the internet and electronic devices has become an asset in capturing criminals. The loss of privacy has affected all users; the ordinary citizen that is not involved in criminal activities has suffered a loss of privacy as well. This loss of privacy has thwarted terror attacks on United States (US) soil, helped catch thieves of small petty crimes all the way to federal crimes such as “Identity Theft”. According to the Telecommunications Act of 1996, the "Communication Service Providers (CSP) are required to keep records of your internet usage” (Poullet, Y. 2004 Pg. 251-273) becoming a digital record of your activities. When an agency
…show more content…
This has been seen recently in the case of the United States Vs. Edward Snowden. Mr. Snowden was able to mask his activities of obtaining viable Government information and pass it to multiple sources to use against the US Government. The use of cryptography was a way that allowed for Snowden to mask his theft of this information to pass along to sources so that he could allow for the world to see that the UK and US government were tasked to spy on the country of Turkey. This use of cryptography has created a very difficult task to capture Mr. Snowden, it allowed for normal text to become a series of random letters, number, and symbols until deciphered by whoever possesses the encryption key. A simple message of “hello my name is Mario” can look like “asd9f89%$@#$65%@#$&&*%”, until deciphered back to “hello my name is Mario”. In the case of Edward Snowden vs. US, Mr. Snowden’s extraction of this information was not an illegal act; however his passing it along to another source was a direct violation of the Privacy Act he signed when he started employment with the National Security Agency (NSA). Mr. Snowden has not been caught and is currently oversees where he can be out of reach for US officials to capture. The fallacy in the use of cryptography is that it creates a digital signature to a specific user. The use of cryptography can only mask activities for certain levels and can be decrypted with the …show more content…
The capturing and deterrence of criminal activity towards the public have helped keep the public and our country safe. The storage of information of internet usage from CSP’s helps track criminals and terrorist here in the US by allowing government agencies to retrace web page views of sites that enable criminals to learn how or enable to carry out criminal acts in the US. When criminals steal credit card or financial information agencies can track the whereabouts of these criminals and provides a starting point to conduct their investigation to pursue these criminals no matter where they are in the world. The usage of GPS has enabled exact locations of criminal activities or whereabouts of criminals to capture or convict criminals. The loss of privacy has provided many companies to help the public keep their PII safe such as Lifelock a company invented by a former FBI identity theft agent. The usage of cryptography is a viable way to extract secret or confidential information in the case of US vs Snowden cryptography is how he was exposed as the source of this extraction of information, and the decrypting of this information allowed the US government to name him as the source which will in time become the information to convict him. The loss of privacy for the normal citizen has been comprised in this digital era, but the gain far outweighs what is

Related Documents

  • Decent Essays

    There is a subtle difference between security and protection, we will perceive that both of them are extremely close concepts but still not the same. Protection is assured if one has all the necessary security measures as security itself is a type of protection to all the external hazards. Information is a treasure which is immensely worthy to an organization and thus it needs to be protected firmly. It is easy to corrupt, lose and steal thus the measures needed or taken to secure them from irrelevant entries are mentioned as Information Security. The significant step taken by most of the Organizations or firms recently is the use of ethical hacking process or techniques to evaluate the success or failure of their current security measures.…

    • 1032 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Using cyber terrorism is a serious crime and should be stopped. The CIA group keeps track of this happening daily to stop people from hacking others email addresses or passwords. (csciwww.etsu.edu) More types of terrorism are: state sponsored, anti state, international, and domestic. They all involve with finding out information secretly by using terrorists groups. But terrorists focus on one part of a country at a time.…

    • 1184 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    Cyber Security Failure

    • 802 Words
    • 4 Pages

    The purpose behind the policy brief is to inform the Department Heads and all City branch department of the Federal Bureau of Investigation on the rising cyber security breaches due to the fact of human error. This brief will outline the major instances and reason behind a successful cyber security attack. The Failure of Cyber Security Systems Humans Executive Summery Without human’s computer viruses and cybersecurity systems would be stuck in a stand still because they are built to combat perfectly. It is human error that makes helps hackers and cyber-attackers get what they want. “Only amateurs attack machines, professionals target people” (Gallagher) Introduction With cyberwarfare becoming a huge part of how nations and terror groups are…

    • 802 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Ethics Of Hacking

    • 1119 Words
    • 5 Pages

    Hacking as many types of different levels of ethical reasons behind why a person goes into someone else computer without their permission or password. Such as, people who are hackers and not just hacking information that they can use later, tend to do hack systems just do it for the fulfillment of entertainment and the joy in bringing those geranial population of people (pg. 231). Another example, of this people who use hacking for criminal actives because of the fact that they realize that hacking is a form of getting information without being caught by the government. For example, a criminal who hacks into a government building or a milt dollar corporation and get his hands on passwords and other types of information (pg.…

    • 1119 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    The cellular devices have many capabilities such as SIRI, and they are also known for their tight security. Therefore, protecting the privacy of their consumers is vital for this company because once a Apple product is lost or stolen, it then becomes useless for the abductors. However, the Federal Department of Investigation thinks indifferent because according to Greg Keizer “Essentially, what the FBI has asked Apple to do -- with a federal magistrate 's concurrence -- was to make it possible for investigators to brute-force the passcode on the iPhone 5C by subverting iOS 's limitations on entering such codes, as well as removing the auto-wipe feature, triggered when several incorrect passcodes are entered (Keizer, 2016).” The FBI has been cautious about the amount of password attempts to access the December’s terrorist attackers phone. The FBI believes that the IPhone 5c might have vital information stored on the device.…

    • 805 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Both are government agencies that watch, intercept communications and try to manipulate thoughts of its citizens. The He was prophetic that the government would want to keep an eye on its citizens, but he could have never imagined how far they could and would take it. With most of the ways that privacy invasion happens in the modern world and in 1984 is through technology and electronic surveillance. The internet and other technological advantages have proven to be a fantastic vehicle for doing just that. If George Orwell could see what the NSA can do now he would be…

    • 2539 Words
    • 10 Pages
    Decent Essays
  • Decent Essays

    They really can help protect us as citizens of this nation by monitoring criminals and terrorist. When probable cause is presented to a court of law a warrant can issued to help aid in government surveillance. I wouldn’t mind a government program like this when used to potentially protect my family and I. One con argument is that programs like this can cause government to bend rules and rewrite laws to be in line with an organizations objective. The programs our government uses have not so good intentions as pointed out to us by NSA whistleblower Edward Snowden.…

    • 1038 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    (Wells, 2014) Because of his position Winkler had access to multiple different financial statements. By stealing and destroying the documents he made it tough to prosecute. By adding an electronic filing system and backup copies non accessible to anyone other than top management, Mogel Inc. could have avoided this issue, and prevent it from happening again. 9) By adding computer programs that regularly audit the companies statements is another preventive control that could be set in place to detect fraud. Although Computer programs are only as good as the program itself, it still one step that could truly help prevent Winkler’s crime from happening again.…

    • 1002 Words
    • 4 Pages
    Decent Essays
  • Decent Essays

    Honestly, we are able to have a say to it. Apple should give into the FBI and should not to the government’s orders to break into their own devices. Apple is representing us as citizens, so they should help the citizens and decline assisting the FBI. Apple as a business should guarantee the safety and privacy of users information because it is confidential and should not be released without users’ permission. The government wielding too much power in that way would make way for a lot of potential abuse cases, especially when it comes down to accusing someone of being a terrorist and having their private information released just to see whether or not it is true.…

    • 1219 Words
    • 5 Pages
    Decent Essays
  • Decent Essays

    The law also breached the Fourth Amendment, which should protect people from being search and seizure. It raised controversial issues, such as violating the Constitution and agents could monitor a terrorist even if they haven’t found evidence he belongs to a foreign terrorist organization. As a result, it had a tremendous impact on our social lives and Patriot Act gave the FBI to access personal information. The government had the authority of surveillance, which allowed them to see on particular person’s communications and suspect houses. US senator Edward Snowden showed the government information about the agency was using the law to justify the bulk collection of data about millions of phone calls.…

    • 433 Words
    • 2 Pages
    Decent Essays

Related Topics