CS154 Formal Languages and Computability Thaddeus Aid Department of Computer Science San Jose State University Spring 2016 Creative Commons Attribution-ShareAlike.

Slides:



Advertisements
Similar presentations
SEARCH AND SEIZURE A REASONABLE TEST Created by the Ohio State Bar Foundation.
Advertisements

The Patriot ACt. Amendment IV The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures.
THEFT BURGLARY THEFT VIOLENT CRIME THEFT CAR THEFT THEFT BURGLARY THEFT.
Law enforcement officers conduct searches every day in an effort to find evidence that can be seized and used in court to prosecute people who have violated.
Privacy & Personal Information -- Why do we care or do we?
POLICE LAW & SOCIETY What are the distinct characteristics of police in U.S. society? Police play multiple roles Law prescribes parameters of police practice.
WHAT CAN ROCK OUR WORLD? 1. 2 …but very dangerous!!! ….but very dangerous!!!
BY: Alexis Stern, Mikey Thompson and Hao Pang.  Freedom of Press- Hazelwood v. Kuhlmeier. This affects us because it tells us our boundaries on to what.
Fourth Amendment Assignment. Amendment 4: Right to Search and Seizure The right of the people to be secure in their persons, houses, papers, and effects,
4th Amendment.
CS 3043 Social Implications Of Computing 9/7/2015© 2004 Keith A. Pray 1 Class 7 Crime And Privacy Keith A. Pray Instructor socialimps.keithpray.net.
California vs. Acevedo By: Caroline Correa & Raul Perez.
By Marta Telatin and Andrew Koennig 4 TH AMENDMENT.
Legal Case Studies November 8,  1 st Amendment to US Constitution  4 th Amendment to US Constitution  Tinker vs. Des Moines.
The Investigation Process.  Remember that there is a lot of “stuff” that happens before a person is charged or even a trial thought of  Figure 12.1.
What right do you have to keep your stuff private? How does this right change depending on whether you are home or at school? Does it change depending.
2.6 Protecting Individual Citizens 1 st & 4 th Amendments In Depth Government & Citizenship Timpanogos High School.
CS 3043 Social Implications Of Computing 10/21/2015© 2008 Keith A. Pray 1 Class 5 Crime and Privacy Keith A. Pray Instructor socialimps.keithpray.net.
The Use and Effectiveness of Digital Video in the Classroom Presented by: Traci Evans.
DO NOW – Friday, December 6 What do you think “unreasonable” means? A man is seen walking into an apartment with a grey duffel bag. He is then seen coming.
Search and Seizure. I) Search and Seizure A) The 4 th amendment outlines the rules governing search and seizure.
The Bill of Rights The First Fundamental Changes of the Constitution.
THE 4 TH AMENDMENT The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Lecture 2 Applications of Propositional Logic. Translating English into Logic " The right of the people to be secure in their persons, houses, papers,
The Fourth Amendment and the Home By Laura Zajac.
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated;
The Fourth Amendment, Technology, and a Right to Privacy
A student’s rights to privacy and freedom of speech in a school setting.  Objective:  Students will describe student rights and constitutional issues.
RIGHT TO PRIVACY A presentation by: Stacy Leatherberry Kristyn Bryson Mandy Timms Lisa Wheeler Jacob Sabins.
According to the Bill of Rights, you have the freedom of speech which means that you have the right to practice your religion › The rules are a little.
Ann Marie Perez Professor CRIMINAL PROCEDURE WEEK 1 - UNIT 1.
THEFT BURGLARY THEFT VIOLENT CRIME THEFT CAR THEFT THEFT BURGLARY THEFT.
 The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
CALL TO ORDER  Have you or someone you’ve known ever been searched by the police, legally or illegally?  What do you know about the rules that police.
4 th Amendment  “The right of the people to be secure in their persons, houses, papers, and effects against unreasonable searches and seizures, shall.
By, Kris Coles Eva Ortega Christina Torres. Veronia School District v. Acton First court case to go to Supreme Court, were the school district demand.
CS 154 Formal Languages and Computability February 9 Class Meeting Department of Computer Science San Jose State University Spring 2016 Instructor: Ron.
T HE R IGHT TO B E L EFT A LONE Essential Question: How has an individual’s right to privacy changed over time?
Legal Studies * Mr. Marinello ARRESTS AND WARRANTS.
CJ305 UNIT 7 Instructor: K. Austin Zimmer, J.D. Make sure you adjust your speakers and audio settings on your computer so you can hear the music.
Fourth Amendment And Probable Cause. By the end of this presentation you should be able to understand; ◦Fourth Amendment of the U.S. Constitution ◦How.
Criminal Investigation: Laws of Arrest, Search and Seizure Chapter 12 Law and Government.
Arrest and Detainment How do you know you’ve been arrested?
CS412/413 Introduction to Compilers Radu Rugina Lecture 3: Finite Automata 25 Jan 02.
FBI vs Apple Currently, the FBI and Apple are in a battle over an iPhone owned by a domestic terrorist from San Bernardino California. The cell phone could.
HW due today- Finish researching a second case Agenda NVCs Warm-up Establishment clause and balancing test Crime and amendments Rights of the accused Objectives.
Created by Lorena Espinoza U.S History Mc-Elmoyl – p. 7.
Limiting the Right of Search
CS154 Formal Languages and Computability
Personal protections and liberties added to the Constitution for you!
Grab a book off the shelf and look it up. (Article V)
Forensics Week 7.
Chapter 14 Searches and Seizures
The Fourth Amendment and the Home
Understanding Law: Mr Thompson, APT Academy
Fourth Amendment.
Fourth Amendment And Probable Cause.
4th Amendment According to the Fourth Amendment, the people have a right “to be secure in their persons, houses, papers and effects, against unreasonable.
Bell Work (Think of your response and be prepared to share)
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
4th amendment By: KEila Aguilar.
Bill of Rights Do Now: Paraphrase the Fourth Amendment to the Constitution. Rewrite it into your own words without leaving out any information. You can.
Chapter 1 Regular Language
Warm Up – February 11 Grab the handouts from the front table
How does this Constitutional amendment protect Americans?
Arrest.
Ch. 3-1 Criminal Procedure and the Constitution
Teori Bahasa dan Automata Lecture 6: Regular Expression
Judicial Restraint vs. Judicial Activism
“The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated,
Presentation transcript:

CS154 Formal Languages and Computability Thaddeus Aid Department of Computer Science San Jose State University Spring 2016 Creative Commons Attribution-ShareAlike 4.0 International License 1

Apple and the FBI The Fourth Amendment of the U.S. Constitution provides, "[t]he right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.“ San Bernardino Shooting - December 2, 2015, 14 people were killed and 22 were seriously injured. The FBI recovered an encrypted cell phone belonging to the shooter. Creative Commons Attribution-ShareAlike 4.0 International License 2

Apple and the FBI (cont.) The FBI has a valid reason for wanting to get into the phone. Owned by a domestic terrorist and could contain information to stop future shootings. The FBI does not have the technical capability to hack the phone. Well known bias against counter culture hackers and “criminals” Apple made the phone Apple has spent years improving the security on the iPhone in order to protect users, businesses, and the government. The FBI wants Apple to create a backdoor into the iPhone. Creative Commons Attribution-ShareAlike 4.0 International License 3

Apple and the FBI (cont) A Judge has issued a warrant to tell Apple to cooperate. What does that mean? Apple is being forced to create a tool that will break their own encryption. This will be a “master key”, you have to defeat the algorithm. Once it is invented it cannot be uninvented. Hackers are really good at getting things they want. It will be a matter of time before the master key is released into the wild. Creative Commons Attribution-ShareAlike 4.0 International License 4

Apple and the FBI Apple is refusing. CEO is willing to take it to the Supreme Court What does this mean for the rest of us. Security vs Privacy? Ecommerce? Creative Commons Attribution-ShareAlike 4.0 International License 5

Citation Lecture developed in conjunction with: Introduction to Theory of Computation Anil Maheshwari Michiel Smid Creative Commons Attribution-ShareAlike 4.0 International License 6

Finite Automata - Review DFA – 5-tuple Creative Commons Attribution-ShareAlike 4.0 International License 7

Finite Automata - Review Non-deterministic Finite Automata Adds ε-transitions to the DFA in order to get different results from the same input. For any NFA there exists a more complicated DFA. Creative Commons Attribution-ShareAlike 4.0 International License 8

Closure Closure is a concept that often comes up when discussion sets of things. Closure is the idea that you can take some member of a set Change it by doing [some operation] to it Because the set is closed under [some operation] The new thing must still be in the set. Source: Creative Commons Attribution-ShareAlike 4.0 International License 9

Closure Example The set “Candy” The set Candy contains all individual pieces of candy. If you take a piece of candy, and drop it on the ground, is it still candy? According to the 5-second rule, I would still eat it, so it's still candy. That means that our set Candy is closed under the operation "drop.“ What if I take two pieces of candy, x and y, and stick them together? stick(x,y)--to make a new piece of candy. Since what comes out of stick(x.y) is a piece of candy, Candy is closed under stick. Note: it only works if both operands are candy. Source: Creative Commons Attribution-ShareAlike 4.0 International License 10

Closure Example (Cont.) I take a piece of candy, x, and feed it to a bird. Then later, after digesting the candy, the bird leaves some droppings on my car Assume the droppings came from the candy, and we'll call this bird(x) Is bird(x) candy? No way. So Candy is not closed under bird. Source: Creative Commons Attribution-ShareAlike 4.0 International License 11

Closure Example (Final) An important part of closure is that when we say that the set is "closed under" an operation. It has to be true for everything in the set. So even if all kinds of candies--except for one--were still candy after the bird() operation. Candy would still not be closed under bird(). Source: Creative Commons Attribution-ShareAlike 4.0 International License 12

Closed Operators Creative Commons Attribution-ShareAlike 4.0 International License 13

Regular Expressions - Review Creative Commons Attribution-ShareAlike 4.0 International License 14

Regular Expressions – Review (Cont) Creative Commons Attribution-ShareAlike 4.0 International License 15

Languages - Review Creative Commons Attribution-ShareAlike 4.0 International License 16

Regular Expression Identities Creative Commons Attribution-ShareAlike 4.0 International License 17

Regular Expression Identities Creative Commons Attribution-ShareAlike 4.0 International License 18

The Equivalence of Regular Expressions and Languages Let L be a language. Then L is regular if and only if there exists a regular expression that describes L. Creative Commons Attribution-ShareAlike 4.0 International License 19

Converting a DFA to a Regular Expression To the board! Creative Commons Attribution-ShareAlike 4.0 International License 20