Kerr, Orin S.

GW Law Faculty Publications

August 31, 2017

SSRN | Scholarly Commons

BOOKS

(With Kamisar, Yale, et al.) Advanced Criminal Procedure: Cases, Comments, and Questions. 14th ed. St. Paul, MN: West, 2017.
     Thirteenth edition published in 2012. 

(With LaFave, Wayne, et al.) Criminal Procedure. 6th ed. St. Paul, MN: West, 2017.
     Fourth edition published in 2015.
     Third edition published in 2009.

(With LaFave, Wayne, et al.) Criminal Procedure.  4th ed. St. Paul, MN:  West, 2015.
    Third edition published in 2007.

(With Kamisar, Yale, et al.) Basic Criminal Procedure: Cases, Comments, and Questions. 14th ed. St. Paul, MN: West, 2015.
     Thirteenth edition published in 2012. 

(With Kamisar, Yale, et al.) Modern Criminal Procedure: Cases, Comments, and Questions. 14th ed. St. Paul, MN: West Academic Pub., 2015. 

(With Barnett, Randy E., et al.) A Conspiracy Against Obamacare: The Volokh Conspiracy and the Health Care Case. New York: Palgrave Macmillan, 2013. 

Computer Crime Law. 3rd ed. St. Paul, MN : Thomson West, 2013.
     First edition published in 2006.
     Second edition published in 2009.

Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. Washington, DC: U.S. Department of Justice, 2001.
     Chinese edition published in 2006.


LAW REVIEW ARTICLES & CHAPTERS IN BOOKS

(With Sean D. Murphy.)  Government Hacking to Light the Dark Web:  What Risks to International Relations and International Law?, 70 Stan. L. Rev. Online 58 (2017), https://www.stanfordlawreview.org/online/government-hacking-to-light-the-dark-web/.

The Effect of Legislation on Fourth Amendment Protection, 115 Mich. L. Rev. 117 (2017).

Norms of Computer Trespass, 116 Colum. L. Rev. 1143 (2016).

Trespass, Not Fraud:  The Need for New Sentencing Guidelines in CFAA Cases, 84 Geo. Wash. L. Rev. 1544 (2016).

"An Economic Understanding of Search and Seizure Law," 164 University of Pennsylvania Law Review 591-647 (2016).

"Katz Has Only One Step: The Irrelevance of Subjective Expectations," 82 University of Chicago Law Review 113-134 (2015).

"Executing Warrants for Digital Evidence: The Case for Use Restrictions on Nonresponsive Data," 48 Texas Tech Law Review 1-36 (2015).

"The Fourth Amendment and the Global Internet," 67 Stanford Law Review 285-329 (2015).

"The Influence of Immanuel Kant on Evidentiary Approaches in 18th-Century Bulgaria," 18 Green Bag 251-253 (2015).

"A Rule of Lenity for National Security Surveillance Law," 100 Virginia Law Review 1513-1543 (2014).

"The Next Generation Communications Privacy Act," 162 University of Pennsylvania Law Review 373-419 (2014).

"Foreword: Accounting for Technological Change," 36 Harvard Journal of Law & Public Policy 403-408 (2013).
     Available at: http://www.harvard-jlpp.com/wp-content/uploads/2013/04/36_2_403_Kerr.pdf.

"A Theory of Law," 16 Green Bag 2d 111 (2012).

"The Curious History of Fourth Amendment Searches," 2012 Supreme Court Review 67-97.

"The Curious History of Fourth Amendment Searches," 2012 Supreme Court Review 67-97 (2012).

"The Mosaic Theory of the Fourth Amendment," 111 Michigan Law Review 311-354 (2012).

“Use Restrictions and the Future of Surveillance Law,” in The Future of the Constitution Series.  Washington, D.C.:  Brookings Institution, 2011.
     Available at:  https://www.brookings.edu/wp-content/uploads/2016/06/0419_surveillance_law_kerr.pdf.

"An Equilibrium-Adjustment Theory of the Fourth Amendment," 125 Harvard Law Review 476-543 (2011).

"Good Faith, New Law, and the Scope of the Exclusionary Rule," 99 Georgetown Law Journal 1077-1118 (2011).

"The Outer Bounds of Criminal Law: Fourth Amendment Remedies and Development of the Law: A Comment on Camreta v. Greene and Davis v. United States," 2010-11 Cato Supreme Court Review 237-261.

"Ex Ante Regulation of Computer Search and Seizure," 96 Virginia Law Review 1241-1293 (2010).

"Applying the Fourth Amendment to the Internet: A General Approach," 62 Stanford Law Review 1005-1049 (2010).

"Fourth Amendment Seizures of Computer Data," 119 Yale Law Journal 700-724 (2010).

"The Modest Role of the Warrant Clause in National Security Investigations," (Symposium: Law at the Intersection of National Security, Privacy, and Technology) 88 Texas Law Review 1669-1684 (2010).

"Vagueness Challenges to the Computer Fraud and Abuse Act," (Symposium: Cyberspace & the Law: Privacy, Property and Crime in the Virtual Frontier) 94 Minnesota Law Review 1561 (2010).

"Defending the Third-Party Doctrine: A Response to Epstein and Murphy," (Symposium: Security Breach Notification Six Years Later) 24 Berkeley Technology Law Journal 1229-1237 (2009).

"The Case for the Third-Party Doctrine," 107 Michigan Law Review 561-601 (2009).

"The Limits of Fourth Amendment Injunctions," (The Digital Broadband Migration: Information Policy for the Next Administration, the 8th Anniversary Silicon Flatirons Program Symposium) 7 Journal on Telecommunications and High Technology Law 127-138 (2009).

"Criminal Law in Virtual Worlds," 2008 University of Chicago Legal Forum 415-429.

"Updating the Foreign Intelligence Surveillance Act," 75 University of Chicago Law Review 225-243 (2008).

"Four Models of Fourth Amendment Protection," 60 Stanford law Review 503-551 (2007).

"How to Read a Legal Opinion: A Guide for New Law Students," 11 Green Bag 51-63 (2007).

"Blogs and the Legal Academy." 84 Washington University Law Review 1127-1134 (2006).

"Congress, The Courts, and New Technologies: A Response to Professor Solove." (Symposium: Law and the Information Society). 74 Fordham Law Review 779-790 (2005).

"Digital Evidence and the New Criminal Procedure." 105 Columbia Law Review 279-318 (2005).

"Search Warrants in an Era of Digital Evidence." 75 Mississippi Law Journal 85-135 (2005).

"Searches and Seizures in a Digital World." 119 Harvard Law Review 531-585 (2005).

"Virtual Crime, Virtual Deterrence: A Skeptical View of Self-Help, Architecture, and Civil Liability." 1 Journal of Law, Economics & Policy 197-214 (2005).

"A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending It." 72 George Washington Law Review 1208-1243 (2004).

"Foreword: The Future of Internet Surveillance Law." 72 George Washington Law Review 1139-1141 (2004).

"Technology, Privacy, and the Courts: A Reply to Colb and Swire." 102 Michigan Law Review 933-943 (2004).

"The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution." 102 Michigan Law Review 801-888 (2004).

"Cybercrime's Scope: Interpreting 'Access' and 'Authorization' in Computer Misuse Statutes." 78 New York University Law Review 1596-1668 (2003).

"Internet Surveillance Law After the USA Patriot Act: The Big Brother That Isn't," 97 Northwestern University Law Review 607-673 (2003).

"Lifting the 'Fog' of Internet Surveillance: How a Suppression Remedy Would Change Computer Crime Law." 54 Hastings Law Journal 805-845 (2003).

"Seeing it Both Ways." Legal Affairs 36 (July/Aug. 2003).

"Upholding the Law." (Exchange with Cass R. Sunstein). Legal Affairs 31 (Mar./Apr. 2003).

"A Lukewarm Defense of the Digital Millennium Copyright Act," Copy Fights: The Future of Intellectual Property in the Information Age, p. 163-170. Edited by Adam Thierer and Wayne Crew. Washington, D.C. : Cato Institute, 2002.

"Computers and the Patent System: The Problem of the Second Step." 28 Rutgers Computer & Technology Law Journal 47-59 (2002).

"The Fourth Amendment in Cyberspace: Can Encryption Create a 'Reasonable Expectation of Privacy?'" 33 Connecticut Law Review 503-533 (2001).

"Are We Overprotecting Code? Thoughts on First-Generation Internet Law." 57 Washington & Lee Law Review 1287-1300 (2000).

"Rethinking Patent Law in the Administrative State." 42 William & Mary Law Review 127-194 (2000). Reprinted at 32 Intellectual Property Law Review 119 (2001).

"The Decline of the Socratic Method at Harvard." 78 Nebraska Law Review 113-134 (1999).

"Shedding Light on Chevron: An Empirical Study of the Chevron Doctrine in the U.S. Courts of Appeals." 15 Yale Journal on Regulation 1-60 (1998).

"Note. The Limits of Computer Conversion: United States v. Collins." 9 Harvard Journal of Law and Technology 205-212 (1996).

"Recent Case. Good Friday Vacation as an Establishment of Religion: Metzl v. Leininger." 19 Harvard Journal of Law & Public Policy 627-634 (1996).

 

BOOK REVIEWS

"Do We Need a New Fourth Amendment?" Review of Privacy at Risk: The New Government Surveillance and the Fourth Amendment, by Christopher Slobogin. 107 Michigan Law Review 951-966 (2009).

"Enforcing Law Online." Review of Who Controls the Internet, by Goldsmith, Jack L. 74 University of Chicago Law Review 745-760 (2007).

 

OTHER

The Volokh Conspiracy, regular contributor. Available at https://www.washingtonpost.com/news/volokh-conspiracy/?utm_term=.16a84ff06a9a.

"The Strange Case of Ashcroft v. Al-Kidd," SCOTUSblog (Feb. 21, 2011, 11:48 PM), http://www.scotusblog.com/2011/02/the-strange-case-of-ashcroft-v-al-kidd/.

"Should Faking a Name on Facebook Be a Felony?," Op-Ed., Wall Street Journal, Sept. 14, 2011.

"Police-Created Exigent Circumstances in Kentucky v. King," SCOTUSblog (Jan. 5, 2011, 1:44 AM), http://www.scotusblog.com/?p=111396.

(with Etzioni, Amitai, et al.). Terrorism & Privacy Issues. Licensed off-air recording made by Northwestern University Library Media Facility from a broadcast by C-Span, 2001. (1 videocassette).