With the loss of privacy becoming an uncompromising way of the future, the internet and electronic devices has become an asset in capturing criminals. The loss of privacy has affected all users; the ordinary citizen that is not involved in criminal activities has suffered a loss of privacy as well. This loss of privacy has thwarted terror attacks on United States (US) soil, helped catch thieves of small petty crimes all the way to federal crimes such as “Identity Theft”. According to the Telecommunications Act of 1996, the "Communication Service Providers (CSP) are required to keep records of your internet usage” (Poullet, Y. 2004 Pg. 251-273) becoming a digital record of your activities. When an agency …show more content…
This has been seen recently in the case of the United States Vs. Edward Snowden. Mr. Snowden was able to mask his activities of obtaining viable Government information and pass it to multiple sources to use against the US Government. The use of cryptography was a way that allowed for Snowden to mask his theft of this information to pass along to sources so that he could allow for the world to see that the UK and US government were tasked to spy on the country of Turkey. This use of cryptography has created a very difficult task to capture Mr. Snowden, it allowed for normal text to become a series of random letters, number, and symbols until deciphered by whoever possesses the encryption key. A simple message of “hello my name is Mario” can look like “asd9f89%$@#$65%@#$&&*%”, until deciphered back to “hello my name is Mario”. In the case of Edward Snowden vs. US, Mr. Snowden’s extraction of this information was not an illegal act; however his passing it along to another source was a direct violation of the Privacy Act he signed when he started employment with the National Security Agency (NSA). Mr. Snowden has not been caught and is currently oversees where he can be out of reach for US officials to capture. The fallacy in the use of cryptography is that it creates a digital signature to a specific user. The use of cryptography can only mask activities for certain levels and can be decrypted with the …show more content…
The capturing and deterrence of criminal activity towards the public have helped keep the public and our country safe. The storage of information of internet usage from CSP’s helps track criminals and terrorist here in the US by allowing government agencies to retrace web page views of sites that enable criminals to learn how or enable to carry out criminal acts in the US. When criminals steal credit card or financial information agencies can track the whereabouts of these criminals and provides a starting point to conduct their investigation to pursue these criminals no matter where they are in the world. The usage of GPS has enabled exact locations of criminal activities or whereabouts of criminals to capture or convict criminals. The loss of privacy has provided many companies to help the public keep their PII safe such as Lifelock a company invented by a former FBI identity theft agent. The usage of cryptography is a viable way to extract secret or confidential information in the case of US vs Snowden cryptography is how he was exposed as the source of this extraction of information, and the decrypting of this information allowed the US government to name him as the source which will in time become the information to convict him. The loss of privacy for the normal citizen has been comprised in this digital era, but the gain far outweighs what is