A Mimicry Privacy Shield a System’S Approach to Data Privacy on Public Cloud

Total Page:16

File Type:pdf, Size:1020Kb

A Mimicry Privacy Shield a System’S Approach to Data Privacy on Public Cloud Mimesis Aegis: A Mimicry Privacy Shield A System’s Approach to Data Privacy on Public Cloud Billy Lau, Simon Chung, Chengyu Song, Yeongjin Jang, Wenke Lee, and Alexandra Boldyreva College of Computing, Georgia Institute of Technology, Atlanta, GA 30332 fbilly, pchung, csong84, yeongjin.jang, wenke, [email protected] Abstract on Android: imperceptible encryption/decryption la- Users are increasingly storing, accessing, and ex- tency and a low and adjustable false positive rate when changing data through public cloud services such as searching over encrypted data. those provided by Google, Facebook, Apple, and Mi- crosoft. Although users may want to have faith in cloud 1 Introduction providers to provide good security protection, the confi- dentiality of any data in public clouds can be violated, A continuously increasing number of users now utilize and consequently, while providers may not be “doing mobile devices [2] to interact with public cloud services evil,” we can not and should not trust them with data con- (PCS) (e.g. Gmail, Outlook, and WhatsApp) as an es- fidentiality. sential part of their daily lives. While the user’s con- To better protect the privacy of user data stored in the nectivity to the Internet is improved with mobile plat- cloud, in this paper we propose a privacy-preserving sys- forms, the problem of preserving data privacy while in- tem called Mimesis Aegis (M-Aegis) that is suitable for teracting with PCS remains unsolved. In fact, news about mobile platforms. M-Aegis is a new approach to user the US government’s alleged surveillance programs re- data privacy that not only provides isolation but also pre- minds everybody about a very unsatisfactory status quo: serves the user experience through the creation of a con- while PCS are essentially part of everyday life, the de- ceptual layer called Layer 7.5 (L-7.5), which is inter- fault method of utilizing them exposes users to privacy posed between the application (OSI Layer 7) and the user breaches, because it implicitly requires the users to trust (Layer 8). This approach allows M-Aegis to implement the PCS providers with the confidentiality of their data; true end-to-end encryption of user data with three goals but such trust is unjustified, if not misplaced. Incidents in mind: 1) complete data and logic isolation from un- that demonstrate breach of this trust are easy to come by: trusted entities; 2) the preservation of original user ex- 1) PCS providers are bound by law to share their users’ perience with target apps; and 3) applicable to a large data with surveillance agencies [14], 2) it is the business number of apps and resilient to app updates. model of the PCS providers to mine their users’ data and In order to preserve the exact application workflow share it with third parties [11, 22, 24, 40], 3) operator er- and look-and-feel, M-Aegis uses L-7.5 to put a transpar- rors [34] can result in unintended data access, and 4) data ent window on top of existing application GUIs to both servers can be compromised by attackers [47]. intercept plaintext user input before transforming the in- To alter this undesirable status quo, solutions should put and feeding it to the underlying app, and to reverse- be built based on an updated trust model of every- transform the output data from the app before displaying day communication that better reflects the reality of the the plaintext data to the user. This technique allows M- threats mentioned above. In particular, new solutions Aegis to transparently integrate with most cloud services must first assume PCS providers to be untrusted. This without hindering usability and without the need for re- implies that all other entities that are controlled by the verse engineering. We implemented a prototype of M- PCS providers, including the apps that users installed to Aegis on Android and show that it can support a number engage with the PCS, must also be assumed untrusted. of popular cloud services, e.g. Gmail, Facebook Messen- Although there are a plethora of apps available today ger, WhatsApp, etc. that come in various combinations of look and feel and Our performance evaluation and user study show that features, we observed that many of these apps provide users incur minimal overhead when adopting M-Aegis text communication services (e.g. email or private/group 1 messaging categories). Users can still enjoy the same fering more reliable infrastructure to facilitate user quality of service1 without needing to reveal their plain- communication, but also by offering a better user text data to PCS providers. PCS providers are essen- experience [16, 58]. Ultimately, users will choose tially message routers that can function normally with- apps that feel the most comfortable. To reduce in- out needing to know the content of the messages being terference with a user’s interaction with the app of delivered, analogous to postmen delivering letters with- their choice, security solutions must be retrofittable out needing to learn the actual content of the letters. to existing apps. Solutions that repackage/rewrite Therefore, applying end-to-end encryption (E2EE) existing apps have this criterion. without assuming trust in the PCS providers seems to 3. For a solution to be sustainable, it must be easy to solve the problem. However, in practice, the direct ap- maintain and scalable: the solution must be suffi- plication of E2EE solutions onto the mobile device envi- ciently general-purpose, require minimal effort to ronment is more challenging than originally thought [65, support new apps, and withstand app updates. In the 59]. A good solution must present clear advantages to the past, email was one of the very few means of com- entire mobile security ecosystem. In particular it must munication. Protecting it is relatively straightfor- account for these factors: 1) the users’ ease-of-use, hence ward because email protocols (e.g. POP and IMAP) acceptability and adoptability; 2) the developers’ efforts are well defined. Custom privacy-preserving apps to maintain support; and 3) the feasibility and deploya- can therefore be built to serve this need. How- bility of solution on a mobile system. From this analysis, ever, with the introduction of PCS that are becom- we formulate three design goals that must be addressed ing indispensable in a user’s everyday life, a good coherently: solution should also be able to integrate security 1. For a solution to be secure, it must be properly features into apps without requiring reverse engi- isolated from untrusted entities. It is obvious that neering of the apps’ logic and/or network protocols, E2EE cannot protect data confidentiality if plain- which are largely undocumented and possibly pro- text data or an encryption key can be compromised prietary (e.g. Skype, WhatsApp, etc.). by architectures that risk exposing these values. Traditional solutions like PGP [15] and newer so- In this paper, we introduce Mimesis Aegis (M-Aegis), lutions like Gibberbot [5], TextSecure [12], and a privacy-preserving system that mimics the look and SafeSlinger [41] provide good isolation, but force feel of existing apps to preserve their user experience users to use custom apps, which can cause usabil- and workflow on mobile devices, without changing the ity problems (refer to (2)). Solutions that repack- underlying OS or modifying/repackaging existing apps. age/rewrite existing apps to introduce additional se- M-Aegis achieves the three design goals by operating at curity checks [68, 26] do not have this property a conceptual layer we call Layer 7.5 (L-7.5) that is po- (further discussed in Sect. 2.3). Solutions in the sitioned above the existing application layer (OSI Layer form of browser plugins/extensions also do not have 7 [8]), and interacts directly with the user (popularly la- this property (further discussed in Sect. 2.2), and beled as Layer 8 [19, 4]). they generally do not fit into the mobile security From a system’s perspective, L-7.5 is a transparent landscape because many mobile browsers do not window in an isolated process that interposes itself be- support extensions [7], and mobile device users tween Layer 7 and 8. The interconnectivity between do not favor using mobile browsers [27] to access these layers is achieved using the accessibility frame- PCS. Therefore, we rule out conventional browser- work, which is available as an essential feature on mod- plugin/extension-based solutions. ern operating systems. Note that utilizing accessibility features for unorthodox purposes have been proposed by 2. For a solution to be adoptable, it must preserve the prior work [56, 48] that achieves different goals. L-7.5 user experience. We argue that users will not accept extracts the GUI information of an app below it through solutions that require them to switch between dif- the OS’s user interface automation/accessibility (UIA) li- ferent apps to perform their daily tasks. Therefore, brary. Using this information, M-Aegis is then able to simply porting solutions like PGP to a mobile plat- proxy user input by rendering its own GUI (with a differ- form would not work, because it forces users to use ent color as visual cue) and subsequently handle those in- a separate and custom app, and it is impossible to put (e.g. to process plaintext data or intercept user button recreate the richness and unique user experience of click). Using the same UIA library, L-7.5 can also pro- all existing text routing apps offered by various PCS grammatically interact with various UI components of providers today. In the context of mobile devices, the app below on behalf of the user (refer to Sect.
Recommended publications
  • Captain America
    The Star-spangled Avenger Adapted from Wikipedia, the free encyclopedia Captain America first appeared in Captain America Comics #1 (Cover dated March 1941), from Marvel Comics' 1940s predecessor, Timely Comics, and was created by Joe Simon and Jack Kirby. For nearly all of the character's publication history, Captain America was the alter ego of Steve Rogers , a frail young man who was enhanced to the peak of human perfection by an experimental serum in order to aid the United States war effort. Captain America wears a costume that bears an American flag motif, and is armed with an indestructible shield that can be thrown as a weapon. An intentionally patriotic creation who was often depicted fighting the Axis powers. Captain America was Timely Comics' most popular character during the wartime period. After the war ended, the character's popularity waned and he disappeared by the 1950s aside from an ill-fated revival in 1953. Captain America was reintroduced during the Silver Age of comics when he was revived from suspended animation by the superhero team the Avengers in The Avengers #4 (March 1964). Since then, Captain America has often led the team, as well as starring in his own series. Captain America was the first Marvel Comics character adapted into another medium with the release of the 1944 movie serial Captain America . Since then, the character has been featured in several other films and television series, including Chris Evans in 2011’s Captain America and The Avengers in 2012. The creation of Captain America In 1940, writer Joe Simon conceived the idea for Captain America and made a sketch of the character in costume.
    [Show full text]
  • Tied up in Knotts? Gps Technology and the Fourth Amendment
    TIED UP IN KNOTTS? GPS TECHNOLOGY AND THE FOURTH AMENDMENT * Renée McDonald Hutchins Judicial and scholarly assessment of emerging technology seems poised to drive the Fourth Amendment down one of three paths. The first would simply relegate the amendment to a footnote in history books by limiting its reach to harms that the framers specifically envisioned. A modified version of this first approach would dispense with expansive constitutional notions of privacy and replace them with legislative fixes. A third path offers the amendment continued vitality but requires the U.S. Supreme Court to overhaul its Fourth Amendment analysis. Fortunately, a fourth alternative is available to cabin emerging tech- nologies within the existing doctrinal framework. Analysis of satellite-based tracking illustrates this last approach. The Global Positioning System (GPS) allows law enforcement officials to monitor an individual’s precise movements for weeks or months at a time. GPS technology not only is substantially different than anything the Court has previously considered, but also is a substantial threat to fundamental notions of privacy. By illustrating how, with only minor tweaking, existing Fourth Amendment law can effectively rein in intrusive applications of this one emerging technology, this Article begins to construct an analytical framework that can be applied more broadly to future technological enhancements. This Article begins by reviewing the science and capabilities of GPS- enhanced surveillance. It concludes that satellite-based tracking is a powerful investigative tool that enables authorities to monitor the movements (both indoors and out) of an unlimited number of people for weeks or months at a time. This Article then examines the Court’s historical treatment of techno- logically enhanced surveillance, and shows that the intrusiveness of an emerging technology is critical to its constitutional treatment.
    [Show full text]
  • Bill Analysis and Fiscal Impact Statement
    The Florida Senate BILL ANALYSIS AND FISCAL IMPACT STATEMENT (This document is based on the provisions contained in the legislation as of the latest date listed below.) Prepared By: The Professional Staff of the Committee on Judiciary BILL: SB 144 INTRODUCER: Senators Brandes and Rodrigues SUBJECT: Searches of Cellular Phones and Other Electronic Devices DATE: March 1, 2021 REVISED: ANALYST STAFF DIRECTOR REFERENCE ACTION 1. Cellon Jones CJ Favorable 2. Bond Cibula JU Pre-meeting 3. RC I. Summary: SB 144 amends chs. 933 and 934, F.S., relating to search warrants and the security of communications, to address privacy issues related to the use of communication technology and the contents of stored electronic communications. The bill amends ch. 933, F.S., by: Codifying the state constitutional provision that extends the security against unreasonable searches or seizures to the interception of private communications by any means; and Expanding the grounds for issuance of a search warrant to include that the content within certain communication devices constitutes evidence relevant to proving a felony. The bill amends ch. 934, F.S., by: Providing legislative intent; Defining the terms “historical location data,” “microphone-enabled household device,” “mobile tracking device,” “real-time location tracking,” and “portable electronic communication device”; Amending the definition of oral communication to include the use of a microphone-enabled household device; Amending the definition of electronic communication, adding the terms “communication
    [Show full text]
  • Privacy-Preserving Location Tracking of Lost Or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with Dhts
    Privacy-Preserving Location Tracking of Lost or Stolen Devices: Cryptographic Techniques and Replacing Trusted Third Parties with DHTs Thomas Ristenpart∗ Gabriel Maganis† Arvind Krishnamurthy† Tadayoshi Kohno† ∗University of California, San Diego †University of Washington [email protected] {gym,arvind,yoshi}@cs.washington.edu Abstract recover the device itself. The number of companies of- We tackle the problem of building privacy-preserving fering such services, e.g., [1, 9, 21, 29, 34, 37, 38], attests device-tracking systems — or private methods to assist in to the large and growing market for device tracking. the recovery of lost or stolen Internet-connected mobile Unfortunately, these systems are incompatible with devices. The main goals of such systems are seemingly the oft-cited goal of location privacy [17, 22, 23] since contradictory: to hide the device’s legitimately-visited the device-tracking services can always monitor the lo- locations from third-party services and other parties (lo- cation of an Internet-enabled device — even while the cation privacy) while simultaneously using those same device is in its owner’s possession. This presents a signif- services to help recover the device’s location(s) after it icant barrier to the psychological acceptability of track- goes missing (device-tracking). We propose a system, ing services. To paraphrase one industry representative: named Adeona, that nevertheless meets both goals. It companies will deploy these systems in order to track provides strong guarantees of location privacy while pre- their devices, but they won’t like it. The current situation serving the ability to efficiently track missing devices. leaves users of mobile devices in the awkward position of We build a version of Adeona that uses OpenDHT as the either using tracking services or protecting their location third party service, resulting in an immediately deploy- privacy.
    [Show full text]
  • Evaluation of Real-Time Location Systems in Their Hospital Contexts
    Author's personal copy i n t e r n a t i o n a l j o u r n a l o f m e d i c a l i n f o r m a t i c s 8 1 ( 2 0 1 2 ) 705–712 j ournal homepage: www.ijmijournal.com Evaluation of real-time location systems in their hospital contexts a,∗ b Jill A. Fisher , Torin Monahan a Center for Biomedical Ethics and Society, Vanderbilt University, Nashville, TN, USA b Department of Human and Organizational Development, Vanderbilt University, Nashville, TN, USA a r t i c l e i n f o a b s t r a c t Article history: Objective: The purpose of the research was to assess real-time location systems (RTLS) that Received 9 November 2011 have been implemented in U.S. hospitals. We examined the type of uses to which RTLS Received in revised form have been put, the degree of functionality of the various technologies and software, and the 14 May 2012 organizational effects of implementing RTLS. Accepted 3 July 2012 Methods: The project was a 3-year qualitative study of 23 U.S. hospitals that had imple- mented RTLS for the purpose of tracking assets, personnel, and/or patients. We observed the systems in use and conducted 80 semi-structured interviews with hospital personnel Keywords: and vendors. In order to protect the confidentiality of the hospitals and vendors in our sam- Real-time location systems (RTLS) ple, we conducted an aggregate analysis of our findings rather than providing evaluations RFID of specific technologies or hospital case studies.
    [Show full text]
  • The Limits of Location Tracking in an Epidemic
    The Limits of Location Tracking in an Epidemic By Jay Stanley and Jennifer Stisa Granick April 8, 2020 As Americans struggle to confront the COVID-19 outbreak, some have suggested that cell phone location tracking technology can help in the effort to contain the disease. The tech industry and the White House are reportedly having conversations over how information technology might be deployed, and there is increasing discussion about how foreign countries are using technology. The governor of Florida has even floated the idea of using an app to track visitors from COVID-19 hotspot New York. However, policymakers must have a realistic understanding of what data produced by individuals’ mobile phones can and cannot do. As always, there is a danger that simplistic understandings of how technology works will lead to investments that do little good, or are actually counterproductive, and that invade privacy without producing commensurate benefits. As we write this white paper, public health experts say that the nation has three urgent needs: strong social distancing measures, widespread testing capability, and material support for hospitals being overwhelmed by victims. However, once our hospitals reach a point where they’re able to handle the stream of new patients, experts say that indiscriminate population- wide social distancing measures may give way to a new phase: chronic, lower-level waves of infection in which a combination of widespread testing, individualized quarantine orders, and traditional epidemiological contact tracing once again become a principal means of combatting the disease. It would be in such a period — the window between the end of the initial wave and the development of a vaccine — that using certain forms of data generated by cell phones — such as location histories or records of proximity to other devices — might make sense.
    [Show full text]
  • Reasonable Expectations of Privacy and Novel Search Technologies: an Economic Approach Steven Penney
    Journal of Criminal Law and Criminology Volume 97 Article 3 Issue 2 Winter Winter 2007 Reasonable Expectations of Privacy and Novel Search Technologies: An Economic Approach Steven Penney Follow this and additional works at: https://scholarlycommons.law.northwestern.edu/jclc Part of the Criminal Law Commons, Criminology Commons, and the Criminology and Criminal Justice Commons Recommended Citation Steven Penney, Reasonable Expectations of Privacy and Novel Search Technologies: An Economic Approach, 97 J. Crim. L. & Criminology 477 (2006-2007) This Symposium is brought to you for free and open access by Northwestern University School of Law Scholarly Commons. It has been accepted for inclusion in Journal of Criminal Law and Criminology by an authorized editor of Northwestern University School of Law Scholarly Commons. 0091-4169/07/9702-0477 THEJOURNAL OF CRIMINAL LAW & CRIMINOLOGY Vol. 97, No. 2 Copyright © 2007 by NorthwesternUniversity, Schoolof Law Printed in U.S.A. REASONABLE EXPECTATIONS OF PRIVACY AND NOVEL SEARCH TECHNOLOGIES: AN ECONOMIC APPROACH STEVEN PENNEY* The "reasonable expectation of privacy" test, which defines the scope of constitutionalprotection from governmental privacy intrusions in both the United States and Canada, is notoriously indeterminate. This indeterminacy stems in large measure from the tendency ofjudges to think ofprivacy in non-instrumentalistterms. This "moral" approach to privacy is normatively questionable, and it does a poor job of identifying the circumstances in which privacy should prevail over countervailing interests, such as the deterrence of crime. In this Article, I develop an alternative,economically-informed approach to the reasonable expectation of privacy test. In contrast to the moral approach, which treatsprivacy as a fundamental right, the economic approach views it as an (normatively neutral) aspect of self-interest: the desire to conceal and control potentially damagingpersonal information.
    [Show full text]
  • Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children
    Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children on the Technologies of New Information Study on the Effects Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children UNITED NATIONS OFFICE ON DRUGS AND CRIME Vienna Study on the Effects of New Information Technologies on the Abuse and Exploitation of Children UNITED NATIONS New York, 2015 © United Nations, May 2015. All rights reserved, worldwide. This report has not been formally edited and remains subject to editorial changes. The contents of this report do not necessarily reflect the views or policies of UNODC or contributory organizations and neither do they imply any endorsement. The designations employed and the presentation of material in this publication do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations concerning the legal status of any country, territory, city or area, or of its authorities, or concerning the delimitation of its frontiers or boundaries. Information on uniform resource locators and links to Internet sites contained in the present publication are provided for the convenience of the reader and are correct at the time of issue. The United Nations takes no responsibility for the continued accuracy of that information or for the content of any external website. Publishing production: English, Publishing and Library Section, United Nations Office at Vienna. Acknowledgements This report was prepared pursuant to ECOSOC resolution 2011/33 on Prevention, protection and international cooperation against the use of new information technologies to abuse and/or exploit children by Conference Support Section, Organized Crime Branch, Division for Treaty Affairs, UNODC, under the supervision of John Sandage (former Director, Division for Treaty Affairs), Sara Greenblatt and Loide Lungameni (former and current Chief, Organized Crime Branch, respectively), and Gillian Murray (former Chief, Conference Support Section).
    [Show full text]
  • The Star a Window to the Widow
    The Star Section: Lifestyle Ad Value: RM 47,105 3-Aug-2021 Size : 936cm2 PR Value: RM 141,315 A window to the Widow WORLDS OF WONDER A window to the Widow By ANDREW A. SMITH The Malaysian release of the Black Widow film may have been delayed again, but THE saga of Natalia Alianovna Romanova, aka Natasha Romanoff; while waiting, here are 10 things to know about Natasha Romanoff. has come to its bittersweet end wifli the Black Widow movie. Probably. But here are 10 Fun Facts to AOPEP wju. e MT «OP.PiEC» V MAT TEH pt co VW/ST- Y I 6FFKGT1V6 I Know and Tell about Marvel's MY PPWEJ» Z Superspy Avenger from the comics that spawned her. AN^THIN^! 1. Romanova wasn't Marvel's first Black Widow Back in 1940, when Marvel was called Timely Comics, it trotted out a character named Black Widow, who appeared a total of five times. Her story begins when she is still mortal, a medium called Claire Voyant (let's be kind and assume it's a stage name). After she puts a curse on some nonbelievers, she is murdered and goes to hell. And Satan is fiiere to greet her! “Come,“ he says, "Let me show you my kingdom of eternal pain!" It isn't really clear why Claire is bad enough to be damned for eter­ nity, nor why the devil takes such a Natasha finally got her trademark leather catsuit in 1967. personal interest in her. But he gives her a costume (basically a black onesie, severe eye makeup and boots) and sends her back to Earth.
    [Show full text]
  • Surveillance and Privacy – Beyond the Panopticon. an Exploration of 720-Degree Observation in Level 3 and 4 Vehicle Automation
    Technology in Society 66 (2021) 101667 Contents lists available at ScienceDirect Technology in Society journal homepage: www.elsevier.com/locate/techsoc Surveillance and privacy – Beyond the panopticon. An exploration of 720-degree observation in level 3 and 4 vehicle automation Tim Jannusch a,b,*, Florian David-Spickermann a, Darren Shannon a, Juliane Ressel a,b, Michaele Voller¨ b, Finbarr Murphy a, Irini Furxhi a, Martin Cunneen a, Martin Mullins a a Emerging Risk Group, Kemmy Business School, University of Limerick, Ireland b Institute for Insurance Studies, TH Koln,¨ Germany ARTICLE INFO ABSTRACT Keywords: On the path to high-level vehicle automation, the degree of surveillance both inside and outside the car increases Vehicle Automation significantly.Consequently, ethical considerations are becoming central to questions around surveillance regimes Surveillance and data privacy implicit in level 3 and 4 vehicle automation. In this paper, we focus on outputs from the EU Privacy Horizon 2020 project Vision Inspired Driver Assistance Systems (VI-DAS). In particular, we assess the VI-DAS Panopticon 720-degree observation technology, critical to ensuring a safe Human Machine Interaction (HMI), from multi­ Contextual Integrity 720-Degree Observation ple theoretical perspectives to contribute to a better understanding of the phenomena of privacy. As a synonym for surveillance, we started our evaluation with Bentham’s ideation of the panopticon. From there, it is a rela­ tively short step to radical Foucauldian critiques that offered more dystopian technologies of power. However, both theorems demonstrate a limited understanding of the issue of data privacy in the context of safe trans­ portation along the evolution of highly automated vehicles.
    [Show full text]
  • How the Supreme Court Failed to Save Spider-Man
    Loyola of Los Angeles Law Review Volume 49 Number 3 Article 8 Fall 2016 With Great Power Comes Ignored Responsibility: How the Supreme Court Failed to Save Spider-Man Maya Zagayer Follow this and additional works at: https://digitalcommons.lmu.edu/llr Part of the Supreme Court of the United States Commons Recommended Citation Maya Zagayer, With Great Power Comes Ignored Responsibility: How the Supreme Court Failed to Save Spider-Man, 49 Loy. L.A. L. Rev. 751 (2016). This Comments is brought to you for free and open access by the Law Reviews at Digital Commons @ Loyola Marymount University and Loyola Law School. It has been accepted for inclusion in Loyola of Los Angeles Law Review by an authorized administrator of Digital Commons@Loyola Marymount University and Loyola Law School. For more information, please contact [email protected]. WITH GREAT POWER COMES IGNORED RESPONSIBILITY: HOW THE SUPREME COURT FAILED TO SAVE SPIDER-MAN Maya Zagayer I. INTRODUCTION In the famous words of Spider-Man’s Uncle Ben, “[I]n this world, with great power there must also come—great responsibility.”1 The Supreme Court may be endowed with inordinate power, but it ignored its responsibility to properly interpret and apply the law in its recent decision, Kimble v. Marvel Entertainment, LLC.2 The Court was given the opportunity to right a long-standing wrong by overturning erroneous precedent; instead the Court unjustifiably applied a “superpowered form of stare decisis,”3 thereby reaffirming the flawed decision. In a 6-3 split, the Court reiterated the
    [Show full text]
  • Electronic Tracking Devices and Privacy: See No Evil, Hear No Evil, but Beware of Trojan Horses Kara L
    Loyola University Chicago Law Journal Volume 9 Article 8 Issue 1 Fall 1977 1977 Electronic Tracking Devices and Privacy: See No Evil, Hear No Evil, But Beware of Trojan Horses Kara L. Cook Follow this and additional works at: http://lawecommons.luc.edu/luclj Part of the Fourth Amendment Commons Recommended Citation Kara L. Cook, Electronic Tracking Devices and Privacy: See No Evil, Hear No Evil, But Beware of Trojan Horses, 9 Loy. U. Chi. L. J. 227 (2015). Available at: http://lawecommons.luc.edu/luclj/vol9/iss1/8 This Note is brought to you for free and open access by LAW eCommons. It has been accepted for inclusion in Loyola University Chicago Law Journal by an authorized administrator of LAW eCommons. For more information, please contact [email protected]. Electronic Tracking Devices and Privacy: See No Evil, Hear No Evil, But Beware Of Trojan Horses The danger of unbounded liberty and the danger of bounding it have produced a problem in the science of government which human understanding seems hitherto unable to solve. Dr. Samuel Johnson INTRODUCTION In the late 1700's when Dr. Samuel Johnson wrote of the conflict between "bounded and unbounded liberty" he was unduly optimis- tic when he implied that the problem was solvable. Two hundred years later, the attainment of an equilibrium between the needs of law enforcement and the right to individual privacy continues to elude human understanding. Privacy, the right "to be let alone,"' needs to be weighed by the courts against the long-recognized maxim that "the safety of the people is the highest law."'2 However, an imbalance exists because each interest, and the importance attached to each by society, is dynamic.
    [Show full text]