KERR, ORIN



BOOKS


Computer Crime Law. 3rd ed. St. Paul, MN : Thomson West, 2012. 

First edition published in 2006.

Second edition published in 2009.


(With Kamisar, Yale, et al.) Modern Criminal Procedure, Basic Criminal Procedure, and Advanced Criminal Procedure. 13th ed. St. Paul : West, 2012. 

Twelfth edition published in 2008; supplemented in 2009 and 2011.


(With LaFave, Wayne, et al.) Criminal Procedure. 5th ed. St. Paul, MN: West, 2009. 


(With LaFave, Wayne R., et al.) Criminal Procedure. 3rd ed. St. Paul : West, 2007. 


Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations. Washington, DC: U.S. Department of Justice, 2001. 

Chinese edition published in 2006.



LAW REVIEW ARTICLES & CHAPTERS IN BOOKS


"The Next Generation Communications Privacy Act," 162 University of Pennsylvania Law Review 373-419 (2014).


"Foreword: Accounting for Technological Change," 36 Harvard Journal of Law & Public Policy 403-408 (2013).

Available at: http://www.harvard-jlpp.com/wp-content/uploads/2013/04/36_2_403_Kerr.pdf.


"A Theory of Law," 16 Green Bag 2d 111 (2012).


(With Nojeim, Greg.) "The Data Question: Third-Party Information," in Patriots Debate: Contemporary Issues in National Security Law. Ed. by Harvey Rishikof, Steward A. Baker and Bernard Horowitz. Chicago: ABA, 2012.


"The Mosaic Theory of the Fourth Amendment," 111 Michigan Law Review 311-354 (2012).


"An Equilibrium-Adjustment Theory of the Fourth Amendment," 125 Harvard Law Review 476-543 (2011).


"Good Faith, New Law, and the Scope of the Exclusionary Rule," 99 Georgetown Law Journal 1077-1118 (2011).


"The Outer Bounds of Criminal Law: Fourth Amendment Remedies and Development of the Law: A Comment on Camreta v. Greene and Davis v. United States," 2010-11 Cato Supreme Court Review 237-261.


"Ex Ante Regulation of Computer Search and Seizure," 96 Virginia Law Review 1241-1293 (2010).


"Applying the Fourth Amendment to the Internet: A General Approach," 62 Stanford Law Review 1005-1049 (2010).


"Fourth Amendment Seizures of Computer Data," 119 Yale Law Journal 700-724 (2010).


"The Modest Role of the Warrant Clause in National Security Investigations," (Symposium: Law at the Intersection of National Security, Privacy, and Technology) 88 Texas Law Review 1669-1684 (2010).


"Vagueness Challenges to the Computer Fraud and Abuse Act," (Symposium: Cyberspace & the Law: Privacy, Property and Crime in the Virtual Frontier) 94 Minnesota Law Review 1561 (2010).


"Defending the Third-Party Doctrine: A Response to Epstein and Murphy," (Symposium: Security Breach Notification Six Years Later) 24 Berkeley Technology Law Journal 1229-1237 (2009).


"The Case for the Third-Party Doctrine," 107 Michigan Law Review 561-601 (2009).


"The Limits of Fourth Amendment Injunctions," (The Digital Broadband Migration: Information Policy for the Next Administration, the 8th Anniversary Silicon Flatirons Program Symposium) 7 Journal on Telecommunications and High Technology Law 127-138 (2009).


"Criminal Law in Virtual Worlds," 2008 University of Chicago Legal Forum 415-429.


"Updating the Foreign Intelligence Surveillance Act," 75 University of Chicago Law Review 225-243 (2008).


"Four Models of Fourth Amendment Protection," 60 Stanford law Review 503-551 (2007).


"How to Read a Legal Opinion: A Guide for New Law Students," 11 Green Bag 51-63 (2007).


"Blogs and the Legal Academy." 84 Washington University Law Review 1127-1134 (2006).


"Congress, The Courts, and New Technologies: A Response to Professor Solove." (Symposium: Law and the Information Society). 74 Fordham Law Review 779-790 (2005).


"Digital Evidence and the New Criminal Procedure." 105 Columbia Law Review 279-318 (2005).


"Search Warrants in an Era of Digital Evidence." 75 Mississippi Law Journal 85-135 (2005).


"Searches and Seizures in a Digital World." 119 Harvard Law Review 531-585 (2005).


"Virtual Crime, Virtual Deterrence: A Skeptical View of Self-Help, Architecture, and Civil Liability." 1 Journal of Law, Economics & Policy 197-214 (2005).


"A User's Guide to the Stored Communications Act, and a Legislator's Guide to Amending It." 72 George Washington Law Review 1208-1243 (2004).


"Foreword: The Future of Internet Surveillance Law." 72 George Washington Law Review 1139-1141 (2004).


"Technology, Privacy, and the Courts: A Reply to Colb and Swire." 102 Michigan Law Review 933-943 (2004).


"The Fourth Amendment and New Technologies: Constitutional Myths and the Case for Caution." 102 Michigan Law Review 801-888 (2004).


"Cybercrime's Scope: Interpreting 'Access' and 'Authorization' in Computer Misuse Statutes." 78 New York University Law Review 1596-1668 (2003).


"Internet Surveillance Law After the USA Patriot Act: The Big Brother That Isn't," 97 Northwestern University Law Review 607-673 (2003).


"Lifting the 'Fog' of Internet Surveillance: How a Suppression Remedy Would Change Computer Crime Law." 54 Hastings Law Journal 805-845 (2003).


"Seeing it Both Ways." Legal Affairs 36 (July/Aug. 2003).


"Upholding the Law." (Exchange with Cass R. Sunstein). Legal Affairs 31 (Mar./Apr. 2003).


"A Lukewarm Defense of the Digital Millennium Copyright Act," Copy Fights: The Future of Intellectual Property in the Information Age, p. 163-170. Edited by Adam Thierer and Wayne Crew. Washington, D.C. : Cato Institute, 2002.


"Computers and the Patent System: The Problem of the Second Step." 28 Rutgers Computer & Technology Law Journal 47-59 (2002).


"The Fourth Amendment in Cyberspace: Can Encryption Create a 'Reasonable Expectation of Privacy?'" 33 Connecticut Law Review 503-533 (2001).


"Are We Overprotecting Code? Thoughts on First-Generation Internet Law." 57 Washington & Lee Law Review 1287-1300 (2000).


"Rethinking Patent Law in the Administrative State." 42 William & Mary Law Review 127-194 (2000). Reprinted at 32 Intellectual Property Law Review 119 (2001).


"The Decline of the Socratic Method at Harvard." 78 Nebraska Law Review 113-134 (1999).


"Shedding Light on Chevron: An Empirical Study of the Chevron Doctrine in the U.S. Courts of Appeals." 15 Yale Journal on Regulation 1-60 (1998).


"Note. The Limits of Computer Conversion: United States v. Collins." 9 Harvard Journal of Law and Technology 205-212 (1996).


"Recent Case. Good Friday Vacation as an Establishment of Religion: Metzl v. Leininger." 19 Harvard Journal of Law & Public Policy 627-634 (1996).



BOOK REVIEWS


"Do We Need a New Fourth Amendment?" Review of Privacy at Risk: The New Government Surveillance and the Fourth Amendment, by Christopher Slobogin. 107 Michigan Law Review 951-966 (2009).


"Enforcing Law Online." Review of Who Controls the Internet, by Goldsmith, Jack L. 74 University of Chicago Law Review 745-760 (2007).



OTHER


"Should Faking a Name on Facebook Be a Felony?," Op-Ed., Wall Street Journal, Sept. 14, 2011.


"The Strange Case of Ashcroft v. Al-Kidd," SCOTUSblog (Feb. 21, 2011, 11:48 PM) http://www.scotusblog.com/2011/02/the-strange-case-of-ashcroft-v-al-kidd/.


The Volokh Conspiracy, regular contributor. Available at http://volokh.com/.


"Police-Created Exigent Circumstances in Kentucky v. King," SCOTUSblog (Jan. 5, 2011, 1:44 AM), http://www.scotusblog.com/?p=111396.


(with Etzioni, Amitai, et al.). Terrorism & Privacy Issues. Licensed off-air recording made by Northwestern University Library Media Facility from a broadcast by C-Span, 2001. (1 videocassette).