SlideShare a Scribd company logo
Framing the Debate
Mike Chapple, Ph.D.
University of Notre Dame
mchapple@nd.edu
@mchapple
vs.
iPhone 5c
Found in the
suspect’s Lexus
Investigators
obtain a
search
warrant
But don’t know the
passcode!
Apple
receives a
court
order
Government Demands
1. Apple must “bypass or disable the auto-erase
function”
2. Apple must “enable the FBI to submit
passcodes” to the device
3. Apple must “not purposefully introduce any
additional delay between passcode attempts”
Why do these features exist?
All Writs Act of 1789
Courts may
“issue all writs necessary
or appropriate in aid of
their respective
jurisdictions and
agreeable to the usages
and principles of law.”
Ted Olson
responds
on behalf of
Apple
First Argument
“The All Writs Act does not provide a basis to
conscript Apple to create software enabling
the government to hack into iPhones.”
By This Same Logic…
“If the government can…
compel Apple to create a
special operating system that
undermines important
security measures…”
“It could argue in future
cases that the courts should
compel Apple to create a
version to track the location
of suspects, or secretly use
the iPhone’s microphone and
camera to record”
Second Argument
“The First Amendment
prohibits the
Government from
compelling Apple to
create code.”
Third Argument
“The Fifth Amendment’s
Due Process Clause
prohibits the
government from
compelling Apple to
create code.”
What do you think?

More Related Content

What's hot

Apple marketing strategy
Apple marketing strategyApple marketing strategy
Apple marketing strategy
hamid obaidi
 
Apple Inc. presentation
Apple Inc. presentationApple Inc. presentation
Apple Inc. presentation
Yash Patel
 
Design Thinking and Innovation at Apple Inc
Design Thinking and Innovation at Apple IncDesign Thinking and Innovation at Apple Inc
Design Thinking and Innovation at Apple Inc
SHREYANSH VATS
 
Apple Supply Chain Mgmt
Apple Supply Chain MgmtApple Supply Chain Mgmt
Apple Supply Chain Mgmt
Lloyd Soans
 
Business risk(1)
Business risk(1)Business risk(1)
Business risk(1)
Marta Diana Bilogan
 
Cyber attacks in Ukraine
Cyber attacks in UkraineCyber attacks in Ukraine
Cyber attacks in Ukraine
Nick Bilogorskiy
 
Apple inc. Strategic Case Analysis Presentation
Apple inc. Strategic Case Analysis PresentationApple inc. Strategic Case Analysis Presentation
Apple inc. Strategic Case Analysis Presentation
Mahy Helal
 
Marketing strategy of apple inc
Marketing strategy of apple incMarketing strategy of apple inc
Marketing strategy of apple inc
Akhil Vempali
 
Apple History
Apple HistoryApple History
Apple History
Pradeep Srinivas
 
Target data breach case study
Target data breach case studyTarget data breach case study
Target data breach case study
Abhilash vijayan
 
Apple Inc Presentatioin
Apple Inc PresentatioinApple Inc Presentatioin
Apple Inc Presentatioin
2AM
 
Best buy strategic analysis (bb team) final
Best buy strategic analysis (bb team) finalBest buy strategic analysis (bb team) final
Best buy strategic analysis (bb team) final
Richard Chan, MBA
 
Apple product strategies
Apple product strategiesApple product strategies
Apple product strategies
salman_zamzam
 
Apple inc.
Apple inc.Apple inc.
Apple inc.
Jawad Chaudhry
 
Apple presentation.ppt
Apple presentation.pptApple presentation.ppt
Apple presentation.ppt
Rakesh Kumar
 
Apple - PESTLE Analysis
Apple - PESTLE AnalysisApple - PESTLE Analysis
Apple - PESTLE Analysis
Guru Nanak Institute of Management
 
Apple Strategic Management Case Analysis
Apple Strategic Management Case AnalysisApple Strategic Management Case Analysis
Apple Strategic Management Case Analysis
Katherine Fitzsimmons
 
Presentation On Apple INC
Presentation On Apple INCPresentation On Apple INC
Presentation On Apple INC
Husnain Shah
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
Sreejith Nair
 
APPLE INC.
APPLE INC.APPLE INC.
APPLE INC.
Vaishali Singh
 

What's hot (20)

Apple marketing strategy
Apple marketing strategyApple marketing strategy
Apple marketing strategy
 
Apple Inc. presentation
Apple Inc. presentationApple Inc. presentation
Apple Inc. presentation
 
Design Thinking and Innovation at Apple Inc
Design Thinking and Innovation at Apple IncDesign Thinking and Innovation at Apple Inc
Design Thinking and Innovation at Apple Inc
 
Apple Supply Chain Mgmt
Apple Supply Chain MgmtApple Supply Chain Mgmt
Apple Supply Chain Mgmt
 
Business risk(1)
Business risk(1)Business risk(1)
Business risk(1)
 
Cyber attacks in Ukraine
Cyber attacks in UkraineCyber attacks in Ukraine
Cyber attacks in Ukraine
 
Apple inc. Strategic Case Analysis Presentation
Apple inc. Strategic Case Analysis PresentationApple inc. Strategic Case Analysis Presentation
Apple inc. Strategic Case Analysis Presentation
 
Marketing strategy of apple inc
Marketing strategy of apple incMarketing strategy of apple inc
Marketing strategy of apple inc
 
Apple History
Apple HistoryApple History
Apple History
 
Target data breach case study
Target data breach case studyTarget data breach case study
Target data breach case study
 
Apple Inc Presentatioin
Apple Inc PresentatioinApple Inc Presentatioin
Apple Inc Presentatioin
 
Best buy strategic analysis (bb team) final
Best buy strategic analysis (bb team) finalBest buy strategic analysis (bb team) final
Best buy strategic analysis (bb team) final
 
Apple product strategies
Apple product strategiesApple product strategies
Apple product strategies
 
Apple inc.
Apple inc.Apple inc.
Apple inc.
 
Apple presentation.ppt
Apple presentation.pptApple presentation.ppt
Apple presentation.ppt
 
Apple - PESTLE Analysis
Apple - PESTLE AnalysisApple - PESTLE Analysis
Apple - PESTLE Analysis
 
Apple Strategic Management Case Analysis
Apple Strategic Management Case AnalysisApple Strategic Management Case Analysis
Apple Strategic Management Case Analysis
 
Presentation On Apple INC
Presentation On Apple INCPresentation On Apple INC
Presentation On Apple INC
 
Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
 
APPLE INC.
APPLE INC.APPLE INC.
APPLE INC.
 

Viewers also liked

Apple and the FBI
Apple and the FBIApple and the FBI
Apple and the FBI
Blake Uhing
 
Security news 20160225
Security news 20160225Security news 20160225
Security news 20160225
Logicaltrust pl
 
Privacy vs Security
Privacy vs SecurityPrivacy vs Security
Privacy vs Security
Ilse Genovese
 
Apple SSL Vulnerability Explained
Apple SSL Vulnerability ExplainedApple SSL Vulnerability Explained
Apple SSL Vulnerability Explained
Mike Chapple
 
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
Benjamin Ang
 
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterRSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
Phil Agcaoili
 
Collateral damage in cyberwarfare
Collateral damage in cyberwarfareCollateral damage in cyberwarfare
Collateral damage in cyberwarfare
Mike Chapple
 
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Benjamin Ang
 
The Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and CaretoThe Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and Careto
Mike Chapple
 
A Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons LearnedA Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons Learned
Mike Chapple
 
Guia de estudio i ngles
Guia de estudio i nglesGuia de estudio i ngles
Guia de estudio i ngles
Claudio Vera
 
Apple inc.
Apple inc.Apple inc.
Apple inc.
dexter222
 
The Elephant in the Mobile Industry’s Room: Women
The Elephant in the Mobile Industry’s Room: WomenThe Elephant in the Mobile Industry’s Room: Women
The Elephant in the Mobile Industry’s Room: Women
Graham Brown
 
Social media - Developments
Social media - DevelopmentsSocial media - Developments
Social media - Developments
Arthur Weiss
 
Keeping up to date & comparing journal apps. the stockholm workshop 2016
Keeping up to date &  comparing journal apps. the stockholm workshop 2016Keeping up to date &  comparing journal apps. the stockholm workshop 2016
Keeping up to date & comparing journal apps. the stockholm workshop 2016
Guus van den Brekel
 
Overload
OverloadOverload
Overload
Jason Kichline
 
Presentation4.pptx [autosaved]
Presentation4.pptx [autosaved]Presentation4.pptx [autosaved]
Presentation4.pptx [autosaved]
baski6308
 
η αβ στη νοηματική από τα παιδιά
η αβ στη νοηματική από τα παιδιάη αβ στη νοηματική από τα παιδιά
η αβ στη νοηματική από τα παιδιά
John C. Yiannoudis
 
TMA Mobile Solutions (TMS)
TMA Mobile Solutions (TMS)TMA Mobile Solutions (TMS)
TMA Mobile Solutions (TMS)
quangbui
 
Hopelessly Addicted to Web 2.0, Social Networks, & Facebook
Hopelessly Addicted to Web 2.0, Social Networks, & FacebookHopelessly Addicted to Web 2.0, Social Networks, & Facebook
Hopelessly Addicted to Web 2.0, Social Networks, & Facebook
Dave McClure
 

Viewers also liked (20)

Apple and the FBI
Apple and the FBIApple and the FBI
Apple and the FBI
 
Security news 20160225
Security news 20160225Security news 20160225
Security news 20160225
 
Privacy vs Security
Privacy vs SecurityPrivacy vs Security
Privacy vs Security
 
Apple SSL Vulnerability Explained
Apple SSL Vulnerability ExplainedApple SSL Vulnerability Explained
Apple SSL Vulnerability Explained
 
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
Internet Society Singapore Chapter - AGM review of 2015-2016 and plans for 2017
 
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta ChapterRSA: CSA GRC Stack Update for the CSA Atlanta Chapter
RSA: CSA GRC Stack Update for the CSA Atlanta Chapter
 
Collateral damage in cyberwarfare
Collateral damage in cyberwarfareCollateral damage in cyberwarfare
Collateral damage in cyberwarfare
 
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
Smart Nation, smart hacks and legal liability for cybersecurity breaches in t...
 
The Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and CaretoThe Other Advanced Attacks: DNS/NTP Amplification and Careto
The Other Advanced Attacks: DNS/NTP Amplification and Careto
 
A Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons LearnedA Year of Cloud First: Lessons Learned
A Year of Cloud First: Lessons Learned
 
Guia de estudio i ngles
Guia de estudio i nglesGuia de estudio i ngles
Guia de estudio i ngles
 
Apple inc.
Apple inc.Apple inc.
Apple inc.
 
The Elephant in the Mobile Industry’s Room: Women
The Elephant in the Mobile Industry’s Room: WomenThe Elephant in the Mobile Industry’s Room: Women
The Elephant in the Mobile Industry’s Room: Women
 
Social media - Developments
Social media - DevelopmentsSocial media - Developments
Social media - Developments
 
Keeping up to date & comparing journal apps. the stockholm workshop 2016
Keeping up to date &  comparing journal apps. the stockholm workshop 2016Keeping up to date &  comparing journal apps. the stockholm workshop 2016
Keeping up to date & comparing journal apps. the stockholm workshop 2016
 
Overload
OverloadOverload
Overload
 
Presentation4.pptx [autosaved]
Presentation4.pptx [autosaved]Presentation4.pptx [autosaved]
Presentation4.pptx [autosaved]
 
η αβ στη νοηματική από τα παιδιά
η αβ στη νοηματική από τα παιδιάη αβ στη νοηματική από τα παιδιά
η αβ στη νοηματική από τα παιδιά
 
TMA Mobile Solutions (TMS)
TMA Mobile Solutions (TMS)TMA Mobile Solutions (TMS)
TMA Mobile Solutions (TMS)
 
Hopelessly Addicted to Web 2.0, Social Networks, & Facebook
Hopelessly Addicted to Web 2.0, Social Networks, & FacebookHopelessly Addicted to Web 2.0, Social Networks, & Facebook
Hopelessly Addicted to Web 2.0, Social Networks, & Facebook
 

Similar to The FBI vs. Apple: Framing the Debate

Would like to know if I can have a grad.docx
Would like to know if I can have a grad.docxWould like to know if I can have a grad.docx
Would like to know if I can have a grad.docx
write4
 
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx
Edwardk3aWallacey
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbi
Ekankita Agrawalla
 
WRT 205 U3
WRT 205 U3WRT 205 U3
WRT 205 U3
Vincent Perez
 
Op Ed piece
Op Ed pieceOp Ed piece
Op Ed piece
Siera Parker
 
FBI vs DOJ vs Microsoft
FBI vs DOJ vs MicrosoftFBI vs DOJ vs Microsoft
FBI vs DOJ vs Microsoft
Olivia Farrow
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
Michael Sexton
 
Hello I would like a 3 full pages essay ready by Jan1917 at .docx
Hello I would like a 3 full pages essay ready by Jan1917 at .docxHello I would like a 3 full pages essay ready by Jan1917 at .docx
Hello I would like a 3 full pages essay ready by Jan1917 at .docx
aidaclewer
 
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Webrazzi
 
iPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsiPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanisms
Mariano Amartino
 
iOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsiOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanisms
Dario Caliendo
 

Similar to The FBI vs. Apple: Framing the Debate (11)

Would like to know if I can have a grad.docx
Would like to know if I can have a grad.docxWould like to know if I can have a grad.docx
Would like to know if I can have a grad.docx
 
1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx1- In the dispute between the FBI and Apple- which side do you support.docx
1- In the dispute between the FBI and Apple- which side do you support.docx
 
Google & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbiGoogle & microsoft joins apple vs fbi
Google & microsoft joins apple vs fbi
 
WRT 205 U3
WRT 205 U3WRT 205 U3
WRT 205 U3
 
Op Ed piece
Op Ed pieceOp Ed piece
Op Ed piece
 
FBI vs DOJ vs Microsoft
FBI vs DOJ vs MicrosoftFBI vs DOJ vs Microsoft
FBI vs DOJ vs Microsoft
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Hello I would like a 3 full pages essay ready by Jan1917 at .docx
Hello I would like a 3 full pages essay ready by Jan1917 at .docxHello I would like a 3 full pages essay ready by Jan1917 at .docx
Hello I would like a 3 full pages essay ready by Jan1917 at .docx
 
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
Identifying Back Doors, Attack Points, and Surveillance Mechanisms in iOS Dev...
 
iPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanismsiPhone Apple iOS backdoors attack-points surveillance mechanisms
iPhone Apple iOS backdoors attack-points surveillance mechanisms
 
iOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanismsiOS backdoors attack points and surveillance mechanisms
iOS backdoors attack points and surveillance mechanisms
 

Recently uploaded

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 

Recently uploaded (20)

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 

The FBI vs. Apple: Framing the Debate

  • 1. Framing the Debate Mike Chapple, Ph.D. University of Notre Dame mchapple@nd.edu @mchapple vs.
  • 2.
  • 3.
  • 4. iPhone 5c Found in the suspect’s Lexus
  • 7. Government Demands 1. Apple must “bypass or disable the auto-erase function” 2. Apple must “enable the FBI to submit passcodes” to the device 3. Apple must “not purposefully introduce any additional delay between passcode attempts” Why do these features exist?
  • 8. All Writs Act of 1789 Courts may “issue all writs necessary or appropriate in aid of their respective jurisdictions and agreeable to the usages and principles of law.”
  • 10. First Argument “The All Writs Act does not provide a basis to conscript Apple to create software enabling the government to hack into iPhones.”
  • 11. By This Same Logic… “If the government can… compel Apple to create a special operating system that undermines important security measures…” “It could argue in future cases that the courts should compel Apple to create a version to track the location of suspects, or secretly use the iPhone’s microphone and camera to record”
  • 12. Second Argument “The First Amendment prohibits the Government from compelling Apple to create code.”
  • 13.
  • 14. Third Argument “The Fifth Amendment’s Due Process Clause prohibits the government from compelling Apple to create code.”
  • 15.
  • 16. What do you think?