SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
Framing the Debate
Mike Chapple, Ph.D.
University of Notre Dame
mchapple@nd.edu
@mchapple
vs.
iPhone 5c
Found in the
suspect’s Lexus
Investigators
obtain a
search
warrant
But don’t know the
passcode!
Apple
receives a
court
order
Government Demands
1. Apple must “bypass or disable the auto-erase
function”
2. Apple must “enable the FBI to submit
passcodes” to the device
3. Apple must “not purposefully introduce any
additional delay between passcode attempts”
Why do these features exist?
All Writs Act of 1789
Courts may
“issue all writs necessary
or appropriate in aid of
their respective
jurisdictions and
agreeable to the usages
and principles of law.”
Ted Olson
responds
on behalf of
Apple
First Argument
“The All Writs Act does not provide a basis to
conscript Apple to create software enabling
the government to hack into iPhones.”
By This Same Logic…
“If the government can…
compel Apple to create a
special operating system that
undermines important
security measures…”
“It could argue in future
cases that the courts should
compel Apple to create a
version to track the location
of suspects, or secretly use
the iPhone’s microphone and
camera to record”
Second Argument
“The First Amendment
prohibits the
Government from
compelling Apple to
create code.”
Third Argument
“The Fifth Amendment’s
Due Process Clause
prohibits the
government from
compelling Apple to
create code.”
What do you think?

Weitere ähnliche Inhalte

Was ist angesagt?

Apple vs Samsung: Design Patents
Apple vs Samsung: Design PatentsApple vs Samsung: Design Patents
Apple vs Samsung: Design PatentsHedi Fauzi
 
Marketing Mix of Apple iPhone
Marketing Mix of Apple iPhoneMarketing Mix of Apple iPhone
Marketing Mix of Apple iPhonePratik Shah
 
Global fight between apple and Samsung
Global fight between apple and SamsungGlobal fight between apple and Samsung
Global fight between apple and SamsungHARIKRISHNAN N R
 
Strategic Analysis of Apple_Inc - 2015
Strategic Analysis of Apple_Inc - 2015Strategic Analysis of Apple_Inc - 2015
Strategic Analysis of Apple_Inc - 2015Adama KOMOU
 
Apple Inc 2008 Report
Apple Inc 2008 ReportApple Inc 2008 Report
Apple Inc 2008 ReportMercy Antony
 
Strategic Analysis of Apple inc_ 2015
Strategic Analysis of Apple inc_ 2015Strategic Analysis of Apple inc_ 2015
Strategic Analysis of Apple inc_ 2015Adama KOMOU
 
Presentation On Apple INC
Presentation On Apple INCPresentation On Apple INC
Presentation On Apple INCHusnain Shah
 
Apple marketing strategy
Apple marketing strategyApple marketing strategy
Apple marketing strategyhamid obaidi
 
Marketing Mix of Apple Inc
Marketing Mix of Apple IncMarketing Mix of Apple Inc
Marketing Mix of Apple IncJay Tripathy
 
Apple vs samsung
Apple vs samsungApple vs samsung
Apple vs samsungWhirax
 
Marketing Strategy Analysis Apple iPhone
Marketing Strategy Analysis Apple iPhoneMarketing Strategy Analysis Apple iPhone
Marketing Strategy Analysis Apple iPhoneMKTGatHPU
 
Apple inc. latest 2019 data Presentation B.VOC Retail management
Apple inc. latest  2019 data Presentation B.VOC Retail managementApple inc. latest  2019 data Presentation B.VOC Retail management
Apple inc. latest 2019 data Presentation B.VOC Retail managementGovt PG College Dharamshala
 

Was ist angesagt? (20)

Apple vs Samsung: Design Patents
Apple vs Samsung: Design PatentsApple vs Samsung: Design Patents
Apple vs Samsung: Design Patents
 
Apple
AppleApple
Apple
 
Apple inc.
Apple inc.Apple inc.
Apple inc.
 
Marketing Mix of Apple iPhone
Marketing Mix of Apple iPhoneMarketing Mix of Apple iPhone
Marketing Mix of Apple iPhone
 
Global fight between apple and Samsung
Global fight between apple and SamsungGlobal fight between apple and Samsung
Global fight between apple and Samsung
 
Strategic Analysis of Apple_Inc - 2015
Strategic Analysis of Apple_Inc - 2015Strategic Analysis of Apple_Inc - 2015
Strategic Analysis of Apple_Inc - 2015
 
Apple Inc 2008 Report
Apple Inc 2008 ReportApple Inc 2008 Report
Apple Inc 2008 Report
 
Strategic Analysis of Apple inc_ 2015
Strategic Analysis of Apple inc_ 2015Strategic Analysis of Apple inc_ 2015
Strategic Analysis of Apple inc_ 2015
 
Presentation On Apple INC
Presentation On Apple INCPresentation On Apple INC
Presentation On Apple INC
 
The Apple Story
The Apple StoryThe Apple Story
The Apple Story
 
Apple marketing strategy
Apple marketing strategyApple marketing strategy
Apple marketing strategy
 
Marketing Mix of Apple Inc
Marketing Mix of Apple IncMarketing Mix of Apple Inc
Marketing Mix of Apple Inc
 
Apple
AppleApple
Apple
 
Apple vs samsung
Apple vs samsungApple vs samsung
Apple vs samsung
 
Presentation On Apple Inc
Presentation On Apple IncPresentation On Apple Inc
Presentation On Apple Inc
 
Marketing Strategy Analysis Apple iPhone
Marketing Strategy Analysis Apple iPhoneMarketing Strategy Analysis Apple iPhone
Marketing Strategy Analysis Apple iPhone
 
Apple
AppleApple
Apple
 
Apple inc. latest 2019 data Presentation B.VOC Retail management
Apple inc. latest  2019 data Presentation B.VOC Retail managementApple inc. latest  2019 data Presentation B.VOC Retail management
Apple inc. latest 2019 data Presentation B.VOC Retail management
 
SWOT Analysis of Apple iPhone
SWOT Analysis of Apple iPhoneSWOT Analysis of Apple iPhone
SWOT Analysis of Apple iPhone
 
Apple inc.
Apple inc.Apple inc.
Apple inc.
 

Andere mochten auch

Apple and the FBI
Apple and the FBIApple and the FBI
Apple and the FBIBlake Uhing
 
Apple SSL Vulnerability Explained
Apple SSL Vulnerability ExplainedApple SSL Vulnerability Explained
Apple SSL Vulnerability ExplainedMike Chapple
 
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017Benjamin Ang
 
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterRSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterPhil Agcaoili
 
Collateral damage in cyberwarfare
Collateral damage in cyberwarfareCollateral damage in cyberwarfare
Collateral damage in cyberwarfareMike Chapple
 
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Benjamin Ang
 
The Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and CaretoThe Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and CaretoMike Chapple
 
A Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons LearnedA Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons LearnedMike Chapple
 
Guia de estudio i ngles
Guia de estudio i nglesGuia de estudio i ngles
Guia de estudio i nglesClaudio Vera
 
The Elephant in the Mobile Industry’s Room: Women
The Elephant in the Mobile Industry’s Room: WomenThe Elephant in the Mobile Industry’s Room: Women
The Elephant in the Mobile Industry’s Room: WomenGraham Brown
 
Social media - Developments
Social media - DevelopmentsSocial media - Developments
Social media - DevelopmentsArthur Weiss
 
Keeping up to date & comparing journal apps. the stockholm workshop 2016
Keeping up to date &  comparing journal apps. the stockholm workshop 2016Keeping up to date &  comparing journal apps. the stockholm workshop 2016
Keeping up to date & comparing journal apps. the stockholm workshop 2016Guus van den Brekel
 
Presentation4.pptx [autosaved]
Presentation4.pptx [autosaved]Presentation4.pptx [autosaved]
Presentation4.pptx [autosaved]baski6308
 
η αβ στη νοηματική από τα παιδιά
η αβ στη νοηματική από τα παιδιάη αβ στη νοηματική από τα παιδιά
η αβ στη νοηματική από τα παιδιάJohn C. Yiannoudis
 
TMA Mobile Solutions (TMS)
TMA Mobile Solutions (TMS)TMA Mobile Solutions (TMS)
TMA Mobile Solutions (TMS)quangbui
 
Hopelessly Addicted to Web 2.0, Social Networks, & Facebook
Hopelessly Addicted to Web 2.0, Social Networks, & FacebookHopelessly Addicted to Web 2.0, Social Networks, & Facebook
Hopelessly Addicted to Web 2.0, Social Networks, & FacebookDave McClure
 

Andere mochten auch (20)

Apple and the FBI
Apple and the FBIApple and the FBI
Apple and the FBI
 
Security news 20160225
Security news 20160225Security news 20160225
Security news 20160225
 
Privacy vs Security
Privacy vs SecurityPrivacy vs Security
Privacy vs Security
 
Apple SSL Vulnerability Explained
Apple SSL Vulnerability ExplainedApple SSL Vulnerability Explained
Apple SSL Vulnerability Explained
 
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
 
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterRSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
 
Collateral damage in cyberwarfare
Collateral damage in cyberwarfareCollateral damage in cyberwarfare
Collateral damage in cyberwarfare
 
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
 
The Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and CaretoThe Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and Careto
 
A Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons LearnedA Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons Learned
 
Guia de estudio i ngles
Guia de estudio i nglesGuia de estudio i ngles
Guia de estudio i ngles
 
Apple inc.
Apple inc.Apple inc.
Apple inc.
 
The Elephant in the Mobile Industry’s Room: Women
The Elephant in the Mobile Industry’s Room: WomenThe Elephant in the Mobile Industry’s Room: Women
The Elephant in the Mobile Industry’s Room: Women
 
Social media - Developments
Social media - DevelopmentsSocial media - Developments
Social media - Developments
 
Keeping up to date & comparing journal apps. the stockholm workshop 2016
Keeping up to date &  comparing journal apps. the stockholm workshop 2016Keeping up to date &  comparing journal apps. the stockholm workshop 2016
Keeping up to date & comparing journal apps. the stockholm workshop 2016
 
Overload
OverloadOverload
Overload
 
Presentation4.pptx [autosaved]
Presentation4.pptx [autosaved]Presentation4.pptx [autosaved]
Presentation4.pptx [autosaved]
 
η αβ στη νοηματική από τα παιδιά
η αβ στη νοηματική από τα παιδιάη αβ στη νοηματική από τα παιδιά
η αβ στη νοηματική από τα παιδιά
 
TMA Mobile Solutions (TMS)
TMA Mobile Solutions (TMS)TMA Mobile Solutions (TMS)
TMA Mobile Solutions (TMS)
 
Hopelessly Addicted to Web 2.0, Social Networks, & Facebook
Hopelessly Addicted to Web 2.0, Social Networks, & FacebookHopelessly Addicted to Web 2.0, Social Networks, & Facebook
Hopelessly Addicted to Web 2.0, Social Networks, & Facebook
 

Ähnlich wie The FBI vs. Apple: Framing the Debate

Would like to know if I can have a grad.docx
Would like to know if I can have a grad.docxWould like to know if I can have a grad.docx
Would like to know if I can have a grad.docxwrite4
 
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docxEdwardk3aWallacey
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiEkankita Agrawalla
 
FBI vs DOJ vs Microsoft
FBI vs DOJ vs MicrosoftFBI vs DOJ vs Microsoft
FBI vs DOJ vs MicrosoftOlivia Farrow
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedMichael Sexton
 
Hello I would like a 3 full pages essay ready by Jan1917 at .docx
Hello I would like a 3 full pages essay ready by Jan1917 at .docxHello I would like a 3 full pages essay ready by Jan1917 at .docx
Hello I would like a 3 full pages essay ready by Jan1917 at .docxaidaclewer
 
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...Webrazzi
 
iPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsiPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsMariano Amartino
 
iOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsiOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsDario Caliendo
 

Ähnlich wie The FBI vs. Apple: Framing the Debate (11)

Would like to know if I can have a grad.docx
Would like to know if I can have a grad.docxWould like to know if I can have a grad.docx
Would like to know if I can have a grad.docx
 
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbi
 
WRT 205 U3
WRT 205 U3WRT 205 U3
WRT 205 U3
 
Op Ed piece
Op Ed pieceOp Ed piece
Op Ed piece
 
FBI vs DOJ vs Microsoft
FBI vs DOJ vs MicrosoftFBI vs DOJ vs Microsoft
FBI vs DOJ vs Microsoft
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Hello I would like a 3 full pages essay ready by Jan1917 at .docx
Hello I would like a 3 full pages essay ready by Jan1917 at .docxHello I would like a 3 full pages essay ready by Jan1917 at .docx
Hello I would like a 3 full pages essay ready by Jan1917 at .docx
 
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
 
iPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsiPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanisms
 
iOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsiOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanisms
 

Kürzlich hochgeladen

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Kürzlich hochgeladen (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

The FBI vs. Apple: Framing the Debate

  • 1. Framing the Debate Mike Chapple, Ph.D. University of Notre Dame mchapple@nd.edu @mchapple vs.
  • 2.
  • 3.
  • 4. iPhone 5c Found in the suspect’s Lexus
  • 7. Government Demands 1. Apple must “bypass or disable the auto-erase function” 2. Apple must “enable the FBI to submit passcodes” to the device 3. Apple must “not purposefully introduce any additional delay between passcode attempts” Why do these features exist?
  • 8. All Writs Act of 1789 Courts may “issue all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law.”
  • 10. First Argument “The All Writs Act does not provide a basis to conscript Apple to create software enabling the government to hack into iPhones.”
  • 11. By This Same Logic… “If the government can… compel Apple to create a special operating system that undermines important security measures…” “It could argue in future cases that the courts should compel Apple to create a version to track the location of suspects, or secretly use the iPhone’s microphone and camera to record”
  • 12. Second Argument “The First Amendment prohibits the Government from compelling Apple to create code.”
  • 13.
  • 14. Third Argument “The Fifth Amendment’s Due Process Clause prohibits the government from compelling Apple to create code.”
  • 15.
  • 16. What do you think?