SlideShare a Scribd company logo
1 of 16
Download to read offline
Framing the Debate
Mike Chapple, Ph.D.
University of Notre Dame
mchapple@nd.edu
@mchapple
vs.
iPhone 5c
Found in the
suspect’s Lexus
Investigators
obtain a
search
warrant
But don’t know the
passcode!
Apple
receives a
court
order
Government Demands
1. Apple must “bypass or disable the auto-erase
function”
2. Apple must “enable the FBI to submit
passcodes” to the device
3. Apple must “not purposefully introduce any
additional delay between passcode attempts”
Why do these features exist?
All Writs Act of 1789
Courts may
“issue all writs necessary
or appropriate in aid of
their respective
jurisdictions and
agreeable to the usages
and principles of law.”
Ted Olson
responds
on behalf of
Apple
First Argument
“The All Writs Act does not provide a basis to
conscript Apple to create software enabling
the government to hack into iPhones.”
By This Same Logic…
“If the government can…
compel Apple to create a
special operating system that
undermines important
security measures…”
“It could argue in future
cases that the courts should
compel Apple to create a
version to track the location
of suspects, or secretly use
the iPhone’s microphone and
camera to record”
Second Argument
“The First Amendment
prohibits the
Government from
compelling Apple to
create code.”
Third Argument
“The Fifth Amendment’s
Due Process Clause
prohibits the
government from
compelling Apple to
create code.”
What do you think?

More Related Content

What's hot

Apple - PESTEL Analysis
Apple - PESTEL AnalysisApple - PESTEL Analysis
Apple - PESTEL AnalysisSuyash Birje
 
Apple vs samsung
Apple vs samsungApple vs samsung
Apple vs samsungWhirax
 
Apple product strategies
Apple product strategiesApple product strategies
Apple product strategiessalman_zamzam
 
Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case StudyDylan Holbrook
 
Apple Strategic Management Case Analysis
Apple Strategic Management Case AnalysisApple Strategic Management Case Analysis
Apple Strategic Management Case AnalysisKatherine Fitzsimmons
 
Apple Marketing strategy
Apple Marketing strategyApple Marketing strategy
Apple Marketing strategyParas Gupta
 
Apple Product Mix and Marketing Mix
Apple Product Mix and Marketing MixApple Product Mix and Marketing Mix
Apple Product Mix and Marketing Mixnb1234
 
Apple company slide show..
Apple company slide show..Apple company slide show..
Apple company slide show..MelissaM727
 
Apple Inc. presentation
Apple Inc. presentationApple Inc. presentation
Apple Inc. presentationYash Patel
 
Marketing presentation for Apple inc.
Marketing presentation for Apple inc.Marketing presentation for Apple inc.
Marketing presentation for Apple inc.Yazan Nayrab
 
Apple INC Presentation
Apple INC Presentation Apple INC Presentation
Apple INC Presentation Kapil Shendge
 
MARKETING STRATEGIES OF BRANDING APPLE INC
MARKETING STRATEGIES OF BRANDING APPLE INCMARKETING STRATEGIES OF BRANDING APPLE INC
MARKETING STRATEGIES OF BRANDING APPLE INCVivek Mahajan
 
Case Study of Microsoft !
Case Study of Microsoft !Case Study of Microsoft !
Case Study of Microsoft !Kaushal Gupta
 
Apple presentation
Apple presentationApple presentation
Apple presentationmikeyfendick
 

What's hot (20)

Apple - PESTEL Analysis
Apple - PESTEL AnalysisApple - PESTEL Analysis
Apple - PESTEL Analysis
 
Apple vs samsung
Apple vs samsungApple vs samsung
Apple vs samsung
 
Apple product strategies
Apple product strategiesApple product strategies
Apple product strategies
 
Sony - A Crisis Management Case Study
Sony - A Crisis Management Case StudySony - A Crisis Management Case Study
Sony - A Crisis Management Case Study
 
Apple Inc.
Apple Inc.Apple Inc.
Apple Inc.
 
Apple Strategic Management Case Analysis
Apple Strategic Management Case AnalysisApple Strategic Management Case Analysis
Apple Strategic Management Case Analysis
 
Apple Marketing strategy
Apple Marketing strategyApple Marketing strategy
Apple Marketing strategy
 
Apple INC Case Study
Apple INC Case StudyApple INC Case Study
Apple INC Case Study
 
Apple Product Mix and Marketing Mix
Apple Product Mix and Marketing MixApple Product Mix and Marketing Mix
Apple Product Mix and Marketing Mix
 
Apple company slide show..
Apple company slide show..Apple company slide show..
Apple company slide show..
 
Apple inc
Apple incApple inc
Apple inc
 
Apple
AppleApple
Apple
 
Apple Inc.
Apple Inc.Apple Inc.
Apple Inc.
 
Apple Inc. presentation
Apple Inc. presentationApple Inc. presentation
Apple Inc. presentation
 
Pestle analysis of apple
Pestle analysis of applePestle analysis of apple
Pestle analysis of apple
 
Marketing presentation for Apple inc.
Marketing presentation for Apple inc.Marketing presentation for Apple inc.
Marketing presentation for Apple inc.
 
Apple INC Presentation
Apple INC Presentation Apple INC Presentation
Apple INC Presentation
 
MARKETING STRATEGIES OF BRANDING APPLE INC
MARKETING STRATEGIES OF BRANDING APPLE INCMARKETING STRATEGIES OF BRANDING APPLE INC
MARKETING STRATEGIES OF BRANDING APPLE INC
 
Case Study of Microsoft !
Case Study of Microsoft !Case Study of Microsoft !
Case Study of Microsoft !
 
Apple presentation
Apple presentationApple presentation
Apple presentation
 

Viewers also liked

Apple and the FBI
Apple and the FBIApple and the FBI
Apple and the FBIBlake Uhing
 
Apple vs USG, Ethics
Apple vs USG, EthicsApple vs USG, Ethics
Apple vs USG, EthicsKate Organ
 
Apple SSL Vulnerability Explained
Apple SSL Vulnerability ExplainedApple SSL Vulnerability Explained
Apple SSL Vulnerability ExplainedMike Chapple
 
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017Benjamin Ang
 
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterRSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterPhil Agcaoili
 
Collateral damage in cyberwarfare
Collateral damage in cyberwarfareCollateral damage in cyberwarfare
Collateral damage in cyberwarfareMike Chapple
 
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Benjamin Ang
 
The Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and CaretoThe Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and CaretoMike Chapple
 
A Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons LearnedA Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons LearnedMike Chapple
 
Guia de estudio i ngles
Guia de estudio i nglesGuia de estudio i ngles
Guia de estudio i nglesClaudio Vera
 
The Elephant in the Mobile Industry’s Room: Women
The Elephant in the Mobile Industry’s Room: WomenThe Elephant in the Mobile Industry’s Room: Women
The Elephant in the Mobile Industry’s Room: WomenGraham Brown
 
Social media - Developments
Social media - DevelopmentsSocial media - Developments
Social media - DevelopmentsArthur Weiss
 
Keeping up to date & comparing journal apps. the stockholm workshop 2016
Keeping up to date &  comparing journal apps. the stockholm workshop 2016Keeping up to date &  comparing journal apps. the stockholm workshop 2016
Keeping up to date & comparing journal apps. the stockholm workshop 2016Guus van den Brekel
 
Presentation4.pptx [autosaved]
Presentation4.pptx [autosaved]Presentation4.pptx [autosaved]
Presentation4.pptx [autosaved]baski6308
 
η αβ στη νοηματική από τα παιδιά
η αβ στη νοηματική από τα παιδιάη αβ στη νοηματική από τα παιδιά
η αβ στη νοηματική από τα παιδιάJohn C. Yiannoudis
 
TMA Mobile Solutions (TMS)
TMA Mobile Solutions (TMS)TMA Mobile Solutions (TMS)
TMA Mobile Solutions (TMS)quangbui
 

Viewers also liked (20)

Apple and the FBI
Apple and the FBIApple and the FBI
Apple and the FBI
 
Security news 20160225
Security news 20160225Security news 20160225
Security news 20160225
 
Privacy vs Security
Privacy vs SecurityPrivacy vs Security
Privacy vs Security
 
Apple vs USG, Ethics
Apple vs USG, EthicsApple vs USG, Ethics
Apple vs USG, Ethics
 
Apple SSL Vulnerability Explained
Apple SSL Vulnerability ExplainedApple SSL Vulnerability Explained
Apple SSL Vulnerability Explained
 
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
 
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterRSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
 
Collateral damage in cyberwarfare
Collateral damage in cyberwarfareCollateral damage in cyberwarfare
Collateral damage in cyberwarfare
 
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
 
The Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and CaretoThe Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and Careto
 
A Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons LearnedA Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons Learned
 
Guia de estudio i ngles
Guia de estudio i nglesGuia de estudio i ngles
Guia de estudio i ngles
 
Apple inc.
Apple inc.Apple inc.
Apple inc.
 
The Elephant in the Mobile Industry’s Room: Women
The Elephant in the Mobile Industry’s Room: WomenThe Elephant in the Mobile Industry’s Room: Women
The Elephant in the Mobile Industry’s Room: Women
 
Social media - Developments
Social media - DevelopmentsSocial media - Developments
Social media - Developments
 
Keeping up to date & comparing journal apps. the stockholm workshop 2016
Keeping up to date &  comparing journal apps. the stockholm workshop 2016Keeping up to date &  comparing journal apps. the stockholm workshop 2016
Keeping up to date & comparing journal apps. the stockholm workshop 2016
 
Overload
OverloadOverload
Overload
 
Presentation4.pptx [autosaved]
Presentation4.pptx [autosaved]Presentation4.pptx [autosaved]
Presentation4.pptx [autosaved]
 
η αβ στη νοηματική από τα παιδιά
η αβ στη νοηματική από τα παιδιάη αβ στη νοηματική από τα παιδιά
η αβ στη νοηματική από τα παιδιά
 
TMA Mobile Solutions (TMS)
TMA Mobile Solutions (TMS)TMA Mobile Solutions (TMS)
TMA Mobile Solutions (TMS)
 

Similar to The FBI vs. Apple: Framing the Debate

Would like to know if I can have a grad.docx
Would like to know if I can have a grad.docxWould like to know if I can have a grad.docx
Would like to know if I can have a grad.docxwrite4
 
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docxEdwardk3aWallacey
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiEkankita Agrawalla
 
FBI vs DOJ vs Microsoft
FBI vs DOJ vs MicrosoftFBI vs DOJ vs Microsoft
FBI vs DOJ vs MicrosoftOlivia Farrow
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedMichael Sexton
 
Hello I would like a 3 full pages essay ready by Jan1917 at .docx
Hello I would like a 3 full pages essay ready by Jan1917 at .docxHello I would like a 3 full pages essay ready by Jan1917 at .docx
Hello I would like a 3 full pages essay ready by Jan1917 at .docxaidaclewer
 
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...Webrazzi
 
iPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsiPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsMariano Amartino
 
iOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsiOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsDario Caliendo
 

Similar to The FBI vs. Apple: Framing the Debate (11)

Would like to know if I can have a grad.docx
Would like to know if I can have a grad.docxWould like to know if I can have a grad.docx
Would like to know if I can have a grad.docx
 
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbi
 
WRT 205 U3
WRT 205 U3WRT 205 U3
WRT 205 U3
 
Op Ed piece
Op Ed pieceOp Ed piece
Op Ed piece
 
FBI vs DOJ vs Microsoft
FBI vs DOJ vs MicrosoftFBI vs DOJ vs Microsoft
FBI vs DOJ vs Microsoft
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Hello I would like a 3 full pages essay ready by Jan1917 at .docx
Hello I would like a 3 full pages essay ready by Jan1917 at .docxHello I would like a 3 full pages essay ready by Jan1917 at .docx
Hello I would like a 3 full pages essay ready by Jan1917 at .docx
 
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
 
iPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsiPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanisms
 
iOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsiOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanisms
 

Recently uploaded

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

The FBI vs. Apple: Framing the Debate

  • 1. Framing the Debate Mike Chapple, Ph.D. University of Notre Dame mchapple@nd.edu @mchapple vs.
  • 2.
  • 3.
  • 4. iPhone 5c Found in the suspect’s Lexus
  • 7. Government Demands 1. Apple must “bypass or disable the auto-erase function” 2. Apple must “enable the FBI to submit passcodes” to the device 3. Apple must “not purposefully introduce any additional delay between passcode attempts” Why do these features exist?
  • 8. All Writs Act of 1789 Courts may “issue all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law.”
  • 10. First Argument “The All Writs Act does not provide a basis to conscript Apple to create software enabling the government to hack into iPhones.”
  • 11. By This Same Logic… “If the government can… compel Apple to create a special operating system that undermines important security measures…” “It could argue in future cases that the courts should compel Apple to create a version to track the location of suspects, or secretly use the iPhone’s microphone and camera to record”
  • 12. Second Argument “The First Amendment prohibits the Government from compelling Apple to create code.”
  • 13.
  • 14. Third Argument “The Fifth Amendment’s Due Process Clause prohibits the government from compelling Apple to create code.”
  • 15.
  • 16. What do you think?