(With LaFave, Wayne, et al.) Criminal Procedure. 4th ed. St. Paul, MN: West, 2015. 

Third edition published in 2009.

(With Kamisar, Yale, et. al.) Modern Criminal Procedure: Cases, Comments, and Questions. 14th ed. St. Paul, MN: West Academic Pub., 2015. 

(With Barnett, Randy E., et al.) A Conspiracy Against Obamacare: The Volokh Conspiracy and the Health Care Case. New York: Palgrave Macmillan, 2013. 

(With Kamisar, Yale, et. al.) Advanced Criminal Procedure: Cases, Comments, and Questions. 13th ed. St. Paul, MN: West, 2012. 

(With Kamisar, Yale, et. al.) Basic Criminal Procedure: Cases, Comments, and Questions. 13th ed. St. Paul, MN: West, 2012. 

Computer Crime Law. 3rd ed. St. Paul, MN : Thomson West, 2012. 

First edition published in 2006.

Second edition published in 2009.

Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. Washington, DC: U.S. Department of Justice, 2001. 

Chinese edition published in 2006.


"An Economic Understanding of Search and Seizure Law," 164 University of Pennsylvania Law Review 591-647 (2016).

"Katz Has Only One Step: The Irrelevance of Subjective Expectations," 82 University of Chicago Law Review 113-134 (2015).

"Executing Warrants for Digital Evidence: The Case for Use Restrictions on Nonresponsive Data," 48 Texas Tech Law Review 1-36 (2015).

"The Fourth Amendment and the Global Internet," 67 Stanford Law Review 285-329 (2015).

"The Influence of Immanuel Kant on Evidentiary Approaches in 18th-Century Bulgaria," 18 Green Bag 251-253 (2015).

"A Rule of Lenity for National Security Surveillance Law," 100 Virginia Law Review 1513-1543 (2014).

"The Next Generation Communications Privacy Act," 162 University of Pennsylvania Law Review 373-419 (2014).

"Foreword: Accounting for Technological Change," 36 Harvard Journal of Law & Public Policy 403-408 (2013).

Available at:

"A Theory of Law," 16 Green Bag 2d 111 (2012).

"The Curious History of Fourth Amendment Searches," 2012 Supreme Court Review 67-97.

"The Curious History of Fourth Amendment Searches," 2012 Supreme Court Review 67-97 (2012).

"The Mosaic Theory of the Fourth Amendment," 111 Michigan Law Review 311-354 (2012).

"An Equilibrium-Adjustment Theory of the Fourth Amendment," 125 Harvard Law Review 476-543 (2011).

"Good Faith, New Law, and the Scope of the Exclusionary Rule," 99 Georgetown Law Journal 1077-1118 (2011).

"The Outer Bounds of Criminal Law: Fourth Amendment Remedies and Development of the Law: A Comment on Camreta v. Greene and Davis v. United States," 2010-11 Cato Supreme Court Review 237-261.

"Ex Ante Regulation of Computer Search and Seizure," 96 Virginia Law Review 1241-1293 (2010).

"Applying the Fourth Amendment to the Internet: A General Approach," 62 Stanford Law Review 1005-1049 (2010).

"Fourth Amendment Seizures of Computer Data," 119 Yale Law Journal 700-724 (2010).

"The Modest Role of the Warrant Clause in National Security Investigations," (Symposium: Law at the Intersection of National Security, Privacy, and Technology) 88 Texas Law Review 1669-1684 (2010).

"Vagueness Challenges to the Computer Fraud and Abuse Act," (Symposium: Cyberspace & the Law: Privacy, Property and Crime in the Virtual Frontier) 94 Minnesota Law Review 1561 (2010).

"Defending the Third-Party Doctrine: A Response to Epstein and Murphy," (Symposium: Security Breach Notification Six Years Later) 24 Berkeley Technology Law Journal 1229-1237 (2009).

"The Case for the Third-Party Doctrine," 107 Michigan Law Review 561-601 (2009).

"The Limits of Fourth Amendment Injunctions," (The Digital Broadband Migration: Information Policy for the Next Administration, the 8th Anniversary Silicon Flatirons Program Symposium) 7 Journal on Telecommunications and High Technology Law 127-138 (2009).

"Criminal Law in Virtual Worlds," 2008 University of Chicago Legal Forum 415-429.

"Updating the Foreign Intelligence Surveillance Act," 75 University of Chicago Law Review 225-243 (2008).

"Four Models of Fourth Amendment Protection," 60 Stanford law Review 503-551 (2007).

"How to Read a Legal Opinion: A Guide for New Law Students," 11 Green Bag 51-63 (2007).

"Blogs and the Legal Academy." 84 Washington University Law Review 1127-1134 (2006).

"Congress, The Courts, and New Technologies: A Response to Professor Solove." (Symposium: Law and the Information Society). 74 Fordham Law Review 779-790 (2005).

"Digital Evidence and the New Criminal Procedure." 105 Columbia Law Review 279-318 (2005).

"Search Warrants in an Era of Digital Evidence." 75 Mississippi Law Journal 85-135 (2005).

"Searches and Seizures in a Digital World." 119 Harvard Law Review 531-585 (2005).

"Virtual Crime, Virtual Deterrence: A Skeptical View of Self-Help, Architecture, and Civil Liability." 1 Journal of Law, Economics & Policy 197-214 (2005).

"A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending It." 72 George Washington Law Review 1208-1243 (2004).

"Foreword: The Future of Internet Surveillance Law." 72 George Washington Law Review 1139-1141 (2004).

"Technology, Privacy, and the Courts: A Reply to Colb and Swire." 102 Michigan Law Review 933-943 (2004).

"The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution." 102 Michigan Law Review 801-888 (2004).

"Cybercrime's Scope: Interpreting 'Access' and 'Authorization' in Computer Misuse Statutes." 78 New York University Law Review 1596-1668 (2003).

"Internet Surveillance Law After the USA Patriot Act: The Big Brother That Isn't," 97 Northwestern University Law Review 607-673 (2003).

"Lifting the 'Fog' of Internet Surveillance: How a Suppression Remedy Would Change Computer Crime Law." 54 Hastings Law Journal 805-845 (2003).

"Seeing it Both Ways." Legal Affairs 36 (July/Aug. 2003).

"Upholding the Law." (Exchange with Cass R. Sunstein). Legal Affairs 31 (Mar./Apr. 2003).

"A Lukewarm Defense of the Digital Millennium Copyright Act," Copy Fights: The Future of Intellectual Property in the Information Age, p. 163-170. Edited by Adam Thierer and Wayne Crew. Washington, D.C. : Cato Institute, 2002.

"Computers and the Patent System: The Problem of the Second Step." 28 Rutgers Computer & Technology Law Journal 47-59 (2002).

"The Fourth Amendment in Cyberspace: Can Encryption Create a 'Reasonable Expectation of Privacy?'" 33 Connecticut Law Review 503-533 (2001).

"Are We Overprotecting Code? Thoughts on First-Generation Internet Law." 57 Washington & Lee Law Review 1287-1300 (2000).

"Rethinking Patent Law in the Administrative State." 42 William & Mary Law Review 127-194 (2000). Reprinted at 32 Intellectual Property Law Review 119 (2001).

"The Decline of the Socratic Method at Harvard." 78 Nebraska Law Review 113-134 (1999).

"Shedding Light on Chevron: An Empirical Study of the Chevron Doctrine in the U.S. Courts of Appeals." 15 Yale Journal on Regulation 1-60 (1998).

"Note. The Limits of Computer Conversion: United States v. Collins." 9 Harvard Journal of Law and Technology 205-212 (1996).

"Recent Case. Good Friday Vacation as an Establishment of Religion: Metzl v. Leininger." 19 Harvard Journal of Law & Public Policy 627-634 (1996).


"Do We Need a New Fourth Amendment?" Review of Privacy at Risk: The New Government Surveillance and the Fourth Amendment, by Christopher Slobogin. 107 Michigan Law Review 951-966 (2009).

"Enforcing Law Online." Review of Who Controls the Internet, by Goldsmith, Jack L. 74 University of Chicago Law Review 745-760 (2007).


"The Strange Case of Ashcroft v. Al-Kidd," SCOTUSblog (Feb. 21, 2011, 11:48 PM)

"Should Faking a Name on Facebook Be a Felony?," Op-Ed., Wall Street Journal, Sept. 14, 2011.

"Police-Created Exigent Circumstances in Kentucky v. King," SCOTUSblog (Jan. 5, 2011, 1:44 AM),

The Volokh Conspiracy, regular contributor. Available at

(with Etzioni, Amitai, et al.). Terrorism & Privacy Issues. Licensed off-air recording made by Northwestern University Library Media Facility from a broadcast by C-Span, 2001. (1 videocassette).